Deck 8: Software

Full screen (f)
exit full mode
Question
Software development methods provide software developers and vendors guidelines for program creation. What software development method is used in instances where clearly-defined project objectives have not been presented?

A)Iterative Development
B)Structured Programming Development
C)Modified Prototype model
D)Exploratory Model
Use Space or
up arrow
down arrow
to flip the card.
Question
What would programmers, developers, project managers, and analysts use to make application development faster and with fewer errors?

A)Toolbox Engineering
B)Prototyping Development
C)Computer-aided Software Engineering
D)Extreme Programming
Question
What type of programming is a common way of developing expert systems and is based on if-then logic units?

A)Pattern Matching
B)Inference Engine Programming
C)Rule-based Programming
D)Artificial Neural Networks
Question
Carol thinks her computer is out of synch and the code that is being interpreted is incorrect. Where does the problem originate?

A)Central Access Unit
B)Control Unit
C)Central Processing Unit
D)System Processing Unit
Question
The control processing unit (CPU) has several different types of registers, containing information about the instruction set and data that must be executed. Which item is not one of the registers?

A)General Register
B)Special Register
C)Program Register
D)Program Counter Register
Question
Sometimes critical processes must have their functionality interrupted by another process. What item(s) is/are an interrupt type?

A)Maskable Interrupt
B)Non-maskable Interrupt
C)Both A and B
D)Neither A nor B
Question
There are an abundant amount of concepts that indicate how a computer operating system works. Which item is not one of those concepts?

A)Multiprogramming
B)Multitasking
C)Multithreading
D)Multicenter Sets
Question
Mary keeps inputting data at a furious pace to cause an attack. What is at risk of happening?

A)Buffering Attacks
B)Attack Overflow
C)Buffer Overflow
D)Attack Buffering
Question
What type of programming allows for easy maintenance by means of a random sequence of keystrokes that provide access into software?

A)Time-of-Check
B)Maintenance Locks
C)Maintenance Hooks
D)Countermeasures
Question
What technology allows processes to use the same resources?

A)Time-of-Check
B)Maintenance Locks
C)Maintenance Hooks
D)Multiplexing
Question
What is an integrated circuit made up of millions of transistors and capacitors?

A)Hardware Segments
B)Static RAM
C)Random Access Memory
D)None of the above
Question
Shelly needs to access information easier and faster than data that is stored in real memory. What type of memory should she access?

A)Cache Memory
B)Desktop Memory
C)Read-only Memory
D)Programmed Memory
Question
What type of operating system is referred to as "The Big Mess"?

A)Data Hiding Operating System
B)Layered Operating System
C)Monolithic Operating System
D)Domain Operating System
Question
What type of operating system provides data hiding and separates system functionality into hierarchical layers?

A)Data Hiding Operating System
B)Layered Operating System
C)Monolithic Operating System
D)Domain Operating System
Question
What term is defined as a set of objects that a subject is able to access?

A)Hardware Segments
B)Static RAM
C)Random Access Memory
D)Domain
Question
If more than one task can be carried out by a module, what does this reflect?

A)Cohesion
B)Coupling
C)Attributions
D)External Processing
Question
What indicates how much interaction one module requires in carrying out its tasks?

A)Cohesion
B)Coupling
C)Attributions
D)External Processing
Question
What uses artificial intelligence to create non-numerical algorithms to solve complex problems and is also called knowledge-based systems?

A)Toolbox Engineering
B)Expert Systems
C)Secure Design Methodology
D)Extreme Programming
Question
What works as a mathematical model based on the neural structure of the brain?

A)Neural Engineering
B)Expert Systems
C)Artificial Neural Network
D)Extreme Neural Network Programming
Question
Software requirements come from three models. Which item is not one of these models?

A)Informational
B)Functional
C)Testing
D)Behavioral
Question
What is created once a threat model has been created and provides a structured process for analyzing program entry points?

A)Toolbox Engineering
B)Attack Surface Analytics
C)Secure Design Methodology
D)Extreme Programming
Question
What has the capability to suppress unnecessary details so important, inherent properties can be examined?

A)Method
B)Abstraction
C)Attributions
D)External Processing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Software
1
Software development methods provide software developers and vendors guidelines for program creation. What software development method is used in instances where clearly-defined project objectives have not been presented?

A)Iterative Development
B)Structured Programming Development
C)Modified Prototype model
D)Exploratory Model
Exploratory Model
2
What would programmers, developers, project managers, and analysts use to make application development faster and with fewer errors?

A)Toolbox Engineering
B)Prototyping Development
C)Computer-aided Software Engineering
D)Extreme Programming
Computer-aided Software Engineering
3
What type of programming is a common way of developing expert systems and is based on if-then logic units?

A)Pattern Matching
B)Inference Engine Programming
C)Rule-based Programming
D)Artificial Neural Networks
Rule-based Programming
4
Carol thinks her computer is out of synch and the code that is being interpreted is incorrect. Where does the problem originate?

A)Central Access Unit
B)Control Unit
C)Central Processing Unit
D)System Processing Unit
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
The control processing unit (CPU) has several different types of registers, containing information about the instruction set and data that must be executed. Which item is not one of the registers?

A)General Register
B)Special Register
C)Program Register
D)Program Counter Register
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
Sometimes critical processes must have their functionality interrupted by another process. What item(s) is/are an interrupt type?

A)Maskable Interrupt
B)Non-maskable Interrupt
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
There are an abundant amount of concepts that indicate how a computer operating system works. Which item is not one of those concepts?

A)Multiprogramming
B)Multitasking
C)Multithreading
D)Multicenter Sets
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
Mary keeps inputting data at a furious pace to cause an attack. What is at risk of happening?

A)Buffering Attacks
B)Attack Overflow
C)Buffer Overflow
D)Attack Buffering
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
What type of programming allows for easy maintenance by means of a random sequence of keystrokes that provide access into software?

A)Time-of-Check
B)Maintenance Locks
C)Maintenance Hooks
D)Countermeasures
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
What technology allows processes to use the same resources?

A)Time-of-Check
B)Maintenance Locks
C)Maintenance Hooks
D)Multiplexing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
What is an integrated circuit made up of millions of transistors and capacitors?

A)Hardware Segments
B)Static RAM
C)Random Access Memory
D)None of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
Shelly needs to access information easier and faster than data that is stored in real memory. What type of memory should she access?

A)Cache Memory
B)Desktop Memory
C)Read-only Memory
D)Programmed Memory
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
What type of operating system is referred to as "The Big Mess"?

A)Data Hiding Operating System
B)Layered Operating System
C)Monolithic Operating System
D)Domain Operating System
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
What type of operating system provides data hiding and separates system functionality into hierarchical layers?

A)Data Hiding Operating System
B)Layered Operating System
C)Monolithic Operating System
D)Domain Operating System
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
What term is defined as a set of objects that a subject is able to access?

A)Hardware Segments
B)Static RAM
C)Random Access Memory
D)Domain
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
If more than one task can be carried out by a module, what does this reflect?

A)Cohesion
B)Coupling
C)Attributions
D)External Processing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
What indicates how much interaction one module requires in carrying out its tasks?

A)Cohesion
B)Coupling
C)Attributions
D)External Processing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
What uses artificial intelligence to create non-numerical algorithms to solve complex problems and is also called knowledge-based systems?

A)Toolbox Engineering
B)Expert Systems
C)Secure Design Methodology
D)Extreme Programming
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
What works as a mathematical model based on the neural structure of the brain?

A)Neural Engineering
B)Expert Systems
C)Artificial Neural Network
D)Extreme Neural Network Programming
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Software requirements come from three models. Which item is not one of these models?

A)Informational
B)Functional
C)Testing
D)Behavioral
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
What is created once a threat model has been created and provides a structured process for analyzing program entry points?

A)Toolbox Engineering
B)Attack Surface Analytics
C)Secure Design Methodology
D)Extreme Programming
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
What has the capability to suppress unnecessary details so important, inherent properties can be examined?

A)Method
B)Abstraction
C)Attributions
D)External Processing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 22 flashcards in this deck.