Software Engineering Flashcards

1
Q

Append

A

add a new record at the end of the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automated Testing

A

where computer-controlled equipment tests programs for functionality and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Automatic Formatting of Code

A

automatically formats code in the right way, for example, automatically indenting code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Back-Up

A

a second copy of data that can be used to recover data in the vent of data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Back-Up Cycle

A

the frequency with which old breakups are overwritten by newer backups. These are used to restored lost data, most of which are time-dependent, therefore, old backups are of little use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Back-Up Server

A

a server on which to store backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Binary File

A

stores data in non-human readable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Black Box Testing

A

a test technique in which the test feeds specific pieces of data into a system, before looking for expected outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Branch

A

requests and independent line of development that stems from a central database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Break Point

A

causes the program to run up to a point and then pause, allowing for variable inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Check In

A

involves uploading a modified file after making changes locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Check Out

A

refers to process by which a developer or user acquires a copy of a specific version of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code Repository

A

these hold libraries of reusable code or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CASE

A

Computer-Aided Software Engineering

the name given to a range of software tools that aid the design, development and testing of different types of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lower CASE

A

provides support in the later stages such as testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Upper CASE

A

provide support for the early stages of the system’s development life cycle, providing support for stages such as design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Collision

A

where an algorithm generates the same storage location for more than one key value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Closed Addressing/Chaining

A

a key is always stored in the bucket it’s hashed to; collisions are dealt with using separate data structures on a per-bucket basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Open Addressing/Linear Probing

A

the hash table is searched sequentially that starts from the original location of the hash; if the location is already occupied then we check for the next location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Dictionary

A

a collection of data and attributes about data elements that are being used in a database, describing the meanings and purpose of data elements within the projects context and provides guidance on interpretation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Double Buffering

A

where two buffers work simultaneously; whilst one buffer is being written to, the other is being written from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

File

A

a data structure that is always stored on a device that is a collection of records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

File Locking

A

mechanism that restricts access to a computer file, or to a region of a file, by allowing only one user or process to modify or delete it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

File Processing

A

usually very repetitive, carried out at off-peak with little, if any, human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

File System Snapshot

A

a snapshot of your files at any point point in time, done using disk mirroring; subsequent snapshots store data blocks that have been changed or added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CDP

A

Continuous Data Protection

created in real-time, meaning each tiem a change is made, a snapshot is made and saved to snaphsot storage, enabling continuous capturing and tracking of data modififcations, automatically saving every version of the data, however it may have a negative impact on network performance and bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Clone/Mirroring

A

an identical copy of the entire volume of storage rather than snapshots of data, allowing easy data recovery, but the process is slow and requires huge storage space

28
Q

Copy on Write

A

includes metadata to describe the blocks that have changed, making recovery almost instant, however they are performance intensive as they require three I/O operations for each write, one read and two writes

29
Q

Redirect on Write

A

use pointers to reference snapshot-protected blocks, meaning the original copy contains the point-in-time snapshot data whilst the altered data is saved to the snapshot storage. Consumes fewer performance resources since each modified block generates a single I/O operation, however if a snapshot is deleted, recovery becomes complex

30
Q

Full Backup

A

where everything is backed up every time, simple and easy to implement but takes a lot of time and is very expensive

31
Q

Hashing Algorithm

A

used to calculate the location of a record, where, to find a record, pass the key to a hashing function, then the physical location of the record is returned; if files need to be reorganised, hashing algorithms are used to recreate the file

32
Q

Folding Method

A

arrange numbers by size and put them into pairs, concatenate the pairs and find the sum of all the pairs, then mod the sum as a hash value

33
Q

Hash Strings

A

apply a series of mathematical operations resulting in a fixed-length string of characters

34
Q

Mid-Square Method

A

choose a random seed value, square the seed value and update it by a certain number of digits that occur in the square

35
Q

Remainder Method

A

take the item, divide it by the table size, use the remainder as hash value

36
Q

Incremental Backup

A

only backs up data that has changed and writes over older backups, useful as it saves storage space and is faster than full backup, but only allows the user to restore the most recent backup and recovery is most complex because you still need a full backup to apply incremental backups to

37
Q

Indexed Sequential File

A

where records are stored in key field order, using an index structure to allow direct access to the data, very efficient for batch processing, allows faster access, but index takes up extra storage space and new records must be inserted into the correct place or overflow areas and indexes must be updated

38
Q

Industrial Strength Backup

A

where one copy is kept online, one is kept offline, and one is kept online and offsite

39
Q

Local Backup

A

where the backup is stored on the same machine as the main data source

40
Q

Logical Backup

A

a backup that is stored in binary format, used to move or archive a database or verify database structures

41
Q

Manual Testing

A

where a person manually tests programs for functionality and performance

42
Q

Memory Protection

A

a way to control memory access rights to a computer, where RAM is set up so that, by default, it cannot access various pieces of data without causing a memory error so that two programs cannot use the same memory location

43
Q

Mirror Back-up

A

a normal copy of the selected folders and files at a given instant in time; whilst mirror backups are very fast, they take a lot of storage and are not very secure

44
Q

Multilevel File

A

where the top level contains the range of key fields stored and the location of the next level index; the next level index includes a range of key field and the location of the next index; the last index will contain the physical address of the record for each key field allowing us to find the data

45
Q

Performance Testing

A

carried out to ensure that a system will be able to cope with the required workload

46
Q

Physical Backup

A

a backup of all operating system files, used when you want to restore a database with minimal erros and data loss

47
Q

Remote Backup

A

where the backup is stored on a separate location to the main data source

48
Q

Roll-Back

A

allows software developers to undo changes made to a system and revert back to a previous version

49
Q

Run-Time Diagnostics

A

this creates a virtual machine that emulates a system that the program is designed for when it’s not specifically designed for that platform

50
Q

Screen Design Software

A

allows the design of screens

51
Q

Sequential File

A

records are stored and accessed in key field order, used when all records need to be processed in one batch, eg bills and payrolls

52
Q

Serial File

A

records are stored in no particular order so to find a record you must start at the beginning and read each record in turn until you find the target, meaning searches are slow

53
Q

Shared Memory

A

where memory protection does not occur but may lead to memory corruption if it is not made read-only

54
Q

Software Engineering

A

an engineering approach to software development and is the process of designing, developing, testing, and maintaining software systems, different to programming due to the focus on engineering, so a software engineer will involve more mathematic and scientific methods

55
Q

Step Through

A

steps through program one statement at a time, allowing faults in program logic to be identified

56
Q

Storage Snapshot

A

a collection of saved application data and a comprehensive log detailing how the saved data has changed over time, protecting an application’s data in real time, used in highly active systems where it is hard to find a convenient time to perform a full backup

57
Q

Syntax Highlighting

A

displays code in different colours and fonts according to categories of terms

58
Q

System Testing

A

often carried out by a specialist testing team, who will check that the system as a whole works as required. System testers will not usually be involved in the development of individual programs

59
Q

Tagging Versions

A

allows developers to assign a label to a specific point in history, serving as a reference point

60
Q

Text File

A

shares data in human readable format

61
Q

Transaction File

A

files like bank records and meter readings where data is stored serially, which are easy to program and very efficient, but have slow search times when looking for single records

62
Q

Unit Testing

A

often performed by the developer, and check that a program functions as required

63
Q

Variable Watch

A

the act of observing a specific variable whilst the program runs, which the programmer can do whilst using variable inspection

64
Q

Version Numbers

A

where previous versions are numbered in order to keep track of the current version

65
Q

Warning Messages

A

allow early detection of issues such as unused variables optimising performance

66
Q

Whitebox Testing

A

tester will feed data into a system that ensure that all path through the code are used and therefore testing

67
Q

Wire-Framing Software

A

help map out the user experience, layout, and overall flow, streamlining the design process