Core Flashcards

(191 cards)

1
Q

What are the complexity metrics?

A

The complexity metrics are nodes, lines and classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the segments in e-commerce.

A

The segments in e-commerce are Geographic,Psychographic and Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Phoenix Project’s 4 types of work.

A
The four types of work in the Phoenix project are 
Business projects
IT projects
Changes (affect overall system)
Unplanned work (bad)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What characteristics do companies with low turnover have?

A

Companies with low characteristics consist of
Jelled teams
Sense of pride
Quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What generic strategies should an e-commerce company adopt a la Porter?

A

Generic strategies that an e-commerce company should adopt according to Porter are
Customer focus
Cost leadership
Differentiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is methodological weight of a project?

A

The methodological weight of a project consist of the Number of activities and Tightness of deadlines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does one shape e-commerce competition a la Porter?

A
According to Porter to shape an e-commerce competition  
Avoid big buyers
Avoid big sellers 
Create barriers
Innovate
Use patents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe diseconomies of scale.

A

The diseconomies of scale states that as project scope expands, cost per deliverable increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ISO 9000 series of standards uses some management principles as a basis for assessing business systems for quality assurance. What are they?

A

The ISO 9000 management principles for assessing quality assurance are Customer focus and Quality leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Phoenix Project’s Goldratt’s Theory of Constraints.

A

Goldratts Theory of Constraints states to Improve bottleneck, only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What key concern does critical chain scheduling account for that critical path scheduling does not?

A

Critical chain scheduling uses Buffers to account for delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between V and W models?

A

V models Tests throughout iterations

W models Review based testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compare backward integration with forward integration a la e-commerce.

A

Making more sub-components → more overhead

Selling via own outlets → less overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the cardinal rule for meetings a la Drucker?

A

Druckers cardinal rule for meetings is Don’t waste people’s time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Attribute Driven Design (ADD) tactics regard?

A
The tactics in Attribute Driven Design regard 
Availability
Modifiability
Security
Testability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe test-first development vs TDD a la Meyer?

A

Deliver working tests with code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

State Meyer’s critique of Scrum’s principle of self-organization as it applies to Scrum teams.

A

Teams should be directed by team lead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the basic requirements for effective human relations a la Drucker?

A
According to Drucker, the basic requirements for effective human relations is 
Communication
Teamwork
Self-development
Co-development
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the behavioral models.

A

The behavioral models are Activity and State-machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are 2-4 of Ury’s five-step program for negotiation?

A

Brainstorm for value
Standardize value
Evaluate BATNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the types of coupling?

A
The types of coupling are 
Stamp
Data (good)
Control
Common
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the types of Scrum backlogs?

A

The types of scrum backlogs are

1) Product backlog → all user stories
2) Sprint backlog → scoped stories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a singleton creational pattern for?

A

The singleton creational pattern is used for Centralized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the Publish-Subscribe model?

A

The publish subscribe model is Event bus connected to message queue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the data models.
The data models are Class and ERD
26
What’s the difference between big-M and little-M?
The Big-M Produces a system | The Little-M Delivers parts of a system
27
Explain requirements analysis.
``` Requirements analysis is checking requirements with interaction matrices and checklist for: Accuracy Ambiguity Completeness Consistency ```
28
What are the SOLID principles?
The SOLID principles are Single responsibility Open-closed APIs Dependency injection with abstract (static) classes
29
What are the KPIs for brand awareness campaigns a la Dodson?
Dodson states that the KPI's for brand awareness are Pay per click (PPC) Cost per click (CPC) SERP CTR, views
30
How can one avoid spam filters for e-commerce emails?
Avoid image-heavy bodies Avoid excessive text formatting Avoid certain phrases
31
What are the KPIs for engagement campaigns a la Dodson?
Dodson states that the KPI's for engagement campaigns are Ratings and Time on site
32
A la Schneider, name the attributes of a product or service that makes it attractive for online selling.
According to Scheider the attributes of a product or service that make it attractive for online selling is Variety Samples and Generous return policy
33
What is Amazon law?
Amazon law states that State taxes must be applied to online stores
34
What some pros and cons of Packet Filtering Firewalls?
``` Pros Simple for users Fast Cons No user authentication schemes No IP spoof protection ```
35
Describe the difference between t-shirt sizing and story points.
Cost and benefits | Costs
36
What are the functional models.
The functional models are Sequence and Use-case
37
Compare TCP with UDP.
TCP → reliable, ordered; congestion/flow control → transport | UDP → unreliable, unordered; best-effort
38
Meyer argues that Agile YAGNI principle conflicts with Agile emphasis on embracing change. Explain the argument.
Anything not needed is goldplatting. This isn’t flexible a la Agile.
39
What are the KPIs for direct response marketing campaigns a la Dodson?
Dodson states that the KPI's for direct response marketing are Conversions and Conversion rates
40
What is a facade structural pattern for?
A facade structural pattern is used for Decoupling subsystems via interface
41
What are the types of project retrospectives a la Barrett?
Barret states that the type of project retrospectives are Social and Metric
42
How can one manage processes a la Bach?
Bach states that process can be managed via Experiments | and Past projects
43
What are the pros of Direct Display Advertising (DDA)?
The pros for direct display advertising are Segmentation | and Influence
44
What are the GRASP principles and patterns?
The GRASP principles and patterns are High cohesion and low coupling Controller Creator
45
How does one gather functional requirements?
Functional requirements are gathered through user stories and elicitation.
46
What is the difference between validation and verification.
Validation is Quality control vs quality assurance | Verification is are we Building right? vs right building?
47
What makes a good QA?
``` Good quality assurance consist of Feasible Measureable Testable Traceable ```
48
What is the difference between a leader and a manager?
The difference between a leader and a manager is a leader sets goals and a manager sets tasks.
49
How can one manage time a la Drucker?
According to Drucker, one manages time by recording it, managing it and consolidating time.
50
What are the roles of connectors?
The roles of connectors are communication and coordination.
51
What is the most powerful word in a negotiation a la Charles Voss?
According to Charles Voss, the most powerful word in negotiation is fair because of emotions.
52
What are Sutherland’s definitions of done?
According to Sutherland, the definition of done is that the project has met the requirements and tested acceptance.
53
Yourdon describes five attributes of a death march project. Name two.
Some attributes of the death march project are Compressing schedule < 50% Downsizing due to new tool
54
What is the difference between front-end and back-end payment processors?
Front end processors Authorize payments | and back end payment processors Settle payments
55
What are the essential elements in a contract.
The essential elements in a contract are Offer Consideration Acceptance
56
What are “commons” and how should they be handled on a homepage a la Krug?
Commons are a shared resources e.g., customer logos | Timeshare real estate or use different page
57
What are the types of e-commerce portals.
The two types of e-commerce portals are | B2B and B2C.
58
Name, explain, and describe the waterfall model.
``` The waterfall model is an Incremental, evolutionary development process with six steps. Requirements Analysis Design Implementation Maintenance Retirement ```
59
Name, explain, and describe the spiral model.
The spiral model is an Iterative, evolutionary model focused on risks and prototyping
60
Describe an organizational scheme.
An organizational schema fefines a system in a logical manner
61
What are the signs of a jelled team?
The signs of a jelled team are Quality and Identity
62
Name the process levels in the CMM (ranked)?
``` The process levels in CMM are ranked as Initial Repeatable Defined Managed Optimized ```
63
What are the types of navigation Rosenfeld et al. signifies?
The types of navigation Rosenfeld signifies Global Local Contextual
64
What is exact vs ambiguous schemes?
Exact schemes are Content/link and is mutually exclusive | Ambiguous schemes are Associative learning
65
Describe BNF
BNF stands for Backus–Naur form. | BNF is Meta-linguistic specification and notation
66
What activity is the second largest category of systems development work, taking 30% of a large project’s time a la Capers Jones?
Paperwork takes 30% of a large projects time
67
Name and explain the characteristics of a good SRS (software requirements specification).
A good SRS is Changeable, Consistent and correct.
68
Describe OCL.
``` OCL stands for object constraint language. It is a formal language to describe constraints on OOP. OCL Enhances class diagrams to show invariants OCL Enhances state machines to show guards ```
69
A la Schneider, how does customer-based marketing differ from product-based marketing, in objectives and execution?
Specific catalogs | Full, static catalog
70
Drucker states that every organization needs to build performance in major areas. Name them.
Druckers states that every organization needs to build performance in Building results ,Building values and Building people for tomorrow
71
What two design patterns are critical to SOA implementation?
The two design patters that are critical to service oriented architecture are adapter and proxy.
72
Name some Thomsett negotiation games?
Negotiation games are Double dummy split,Reverse double and Gotcha.
73
Describe how to generate revenue online with e-commerce a la Schneider.
To generate revenue online with e-commerce you can use | Ads, Content fees and Service fees
74
Name, and briefly describe, the types of proposals that Ury recommends formulating prior to a negotiation.
Ury recommends formulation proposals that are minimal, acceptable and ideal prior to a negotiation.
75
Describe the broker model.
The broker model is a Distributed system with decoupled components
76
What questions can one ask regarding wasted time a la Drucker?
According to Drucker one can ask the following questions with regards to time. Am I wasting my time? [delegate] Am I wasting subordinates time?
77
What is a builder creational pattern for?
The builder creational pattern is used for Sequential creation of complex objects
78
Describe the difference between the cloud and the cone a la McConnell.
According the Mcconell Cloud -> uncertainty Cone -> best-case accuracy
79
Name, explain, and describe the Scrum model.
The SCRUM model consist of three parts. First a plan, then sprint and finally closure.
80
What are the kinds of program properties that are counted in basic function point counting?
``` The kinds of program properties that are counted in basic function point counting is External input External output External logic Internal logic ```
81
What is Sime’s concern and solution to the Cone of Uncertainty?
Simes concern for the cone of uncertainty is that it does not account for bugs. He proposes using test-driven development as a solution.
82
How does one actively listen a la Ury?
According the Ury, one must paraphrase to actively listen.
83
Describe base-rate fallacy.
Base-rate fallacy is High detection rate and low false alarms are a difficult happy medium
84
Describe risk management best practices for vulnerabilities.
``` The best practices for risk management and vulnerabilities are to Identify Evaluate Judge Roll-out ```
85
What, a la Lewis, is the single most important element of any effective communication?
According to Lewis the single most important element of any effective communication is Empathy
86
What is the observer behavioral pattern for?
The observable behavioral pattern is used to observe changes to a model
87
What is guided navigation?
Guided navigation is a Facet-based search
88
How can a project’s methodological weight increase a la Cockburn?
Cockburn states that a projects methodological weight increases with more tools and more processes
89
What is an affordance a la Krug?
Accoreding to Krug and affordance is visual UI queues
90
What are the types of intruders?
Masquerader → hacker Misfeasor → misuse Clandestine user → anti-audit
91
What is the visitor behavioral pattern for?
The visitor behavioral pattern is used for Polymorphic views
92
What is Gawande’s remedy for failure?
Gawandes remedy for failure is checklists
93
What are the types of intrusion detection approaches?
Anomalies Rule-based Distributed
94
Describe PKI Encryption.
Asymmetric key methodology | A private key and a public key
95
Describe Meyer’s definitions of done.
Meyers definition of done is that a project meets requirements and acceptance testing
96
Describe a well-rounded employee a la Drucker?
A well rounded employee is a myth; strong people have strong weaknesses 2 mediocrities don’t equal 1 strength
97
How should project properties be converted to estimates of required effort a la McConnell; to trump guestimation?
``` Project properties can be converted by Revisiting Counting Computing Judging ```
98
Describe how to address channel conflict (cannibalization) as it pertains to e-commerce.
To address channel conflict discover 3rd party issues; if none, do nothing because 1st party sales are negligible
99
What is the difference between personalization and customization according to Rosenfeld et al.; also name there limitations?
The difference between personalization and customization Automatic → inaccurate Manual → work
100
What situations led to opportunities a la Drucker?
According to Drucker, the situations that led to opportunities are Technology, Innovation and Demographics
101
Describe and differentiate the two CMMI representations
The two CMMI representations are Continuous integration → processes assign capability levels Staged integration → company assigned maturity levels
102
What is the three-point estimation a la McConnell?
According to McConnel the three point estimation are Worst-case estimate Expected estimate Best-case estimate
103
Explain the rationale for distinguishing between what Jackson refers to as domain requirements and machine requirements, relative to requirements gathering
Domain is essential | Machine is accidental (varies / platform-dependent)
104
What are benefits from improved Search Engine Results Page (SERP) a la Dodson?
Dodson states that the benefits from improved SERP are | Clicks, Paid Ads and Organic reach.
105
A la Schneider, being the first to the digital marketplace comes with advantages and disadvantages. Describe them.
An advantage of being the first to the digital marketplace is no completion and a disadvantage is lack of insight.
106
What is the difference between an adapter and a proxy?
Legacy wrapper | Access controller
107
What are the goals of a software project a la Cockburn?
According to Cockburn the goals of a software project are Deliverables and maintenance.
108
What are ways to charge for ads (e.g., leaderboard, skyscraper)?
CPC CPM → cost per mile CPL → cost per lead
109
Explain requirements elicitation and name techniques
Joint events Questionnaires Observation
110
How does one deflect attacks a la Ury?
To deflect attacks ignore and reframe
111
What is the strategy behavioral pattern for?
The strategy behavioral pattern is Algorithm hierarchy
112
Describe Phoenix Project’s Goldratt’s WIP.
WIP: wasted capital until done
113
What are the e-commerce software categories?
Catalog Shopping cart Database
114
What are barriers to entry one may face in e-commerce.
Some barriers that many face when entering e-commerce is Predictability, Trust and Support
115
What are Bach’s criticisms of CMM?
Bach states that CMM Obscures engineering and is | only used for government contracts
116
Describe OSI Layer.
``` Application → send/receive messages [HTTP] Presentation → encrypt messages Session → sync messages Transportation → segments [TCP] Network → datagram packets [IP] Link → frames; error checking [802.11] Physical → bits on wire ```
117
What are the essential elements in a contract.
The three essential elements in a contract are offer, consideration and acceptance.
118
What is exact vs ambiguous schemes?
Exact schemes are Content/link is mutually exclusive | Ambiguous schemes are Associative learning
119
What must be known for a decision to be put into practice a la Drucker?
``` According to Drucker the following must be known for putting a decision into practice. Who must know Who must do What action What result ```
120
What is a factory creational pattern for?
The factory creational pattern is used for decoupling creation process from client
121
Describe disintermediation and reintermediation in e-commerce.
Disintermediation is replacing brick-and-mortar w/ website | Reintermediation Insert online service into brick-and-mortar
122
Characterize Meyer’s assessment of user stories as tools for managing requirements.
Meyers states that user stories and tools are inefficient for managing requirements
123
Describe Meyer’s difficulties with XP’s implementation of pair programming?
Meyer states that XP encourages Leechers | TDD assumed as sufficient for specification
124
Why are teams formed a la DeMarco and Lister?
Teams are formed for Alignment according to DeMarco and Lister
125
What is the difference between a taxonomy vs a thesauri?
A taxonomy is hierarchical and a thesauri is cyclical
126
What are ways to effect change a la DeMarco and Lister?
A few ways to effect change are Celebrating old as help and making failure feel ok
127
What are the essential habits of the mind for executives to become effective a la Drucker?
``` According to Drucker the essential habits of the mind for executives to become more effective are Schedule Contribute Strengthen Prioritize Decide ```
128
What element in production is targeted a la Goldratt?
The element in production that is targeted is the Work Center → it dictates output of entire system
129
Describe Phoenix Project’s takt time.
Takt time is the time it takes to meet customer demand
130
Describe a Honeypot network system.
Fake ERP w/ simulated traffic
131
What is the iterator behavioral pattern for?
Traversal
132
Name some contract torts.
Some examples of contract torts are Copyright,Trademark | and Defamation
133
Compare synonym rings to authority files.
Synonym rings are List of equivalent words | Authority files are synonym ring with a preferred word
134
What, according to McConnell, is lost with a short-term, iteration-driven approach to requirements gathering?
McConnel states that long-range predictions are lost with a short-term iteration driven approach.
135
How can one throttle a bottleneck a la Erik of The Phoenix Project?
``` To throttle a bottleneck Identify the constraint Exploit it Subordinate it Evaluate Find next constraint ```
136
How does one determine WBS granularity a la Burress?
To determine WBS granularity use Summaries are for requirements Leaves are for summaries
137
What are the primary and secondary goals of a project a la Cockburn?
According to Cockburn, the primary and secondary goals of a project are the Delivery of software and Set up new projects
138
What are the questions that are to be asked of each participant in the daily Scrum meeting?
Questions that should be asked at each Scrum meeting are: What’s been done What’s due What’s wrong
139
What Scrum meetings are time-limited?
Scrum meetings that are time limited are planning, sprints and retrospective.
140
What is a false challenge project a la DeMarco and Lister?
A false challenge project is setting goals to get project finished cheap and quick
141
A la Schneider, describe one way in which electronic support for B2B can improve a business’s profitability.
Just in time inventory management
142
What are the e-commerce architecture categories?
The three e-commerce architecture categories are CMS CRM ERP
143
Explain the motivations for selecting a development process.
Some motivations for selecting a Development process are Change,Cost, Criticality, Deadlines, Quality and Team.
144
What are the types of WBSs?
The three types of work breakdown structure are Process -- breaks down a process Product -- breaks down a product Hybrid -- process produces a product
145
Characterize Meyer’s assessment of Agile focus on minimalist software development.
Focus on productivity more-so than quality
146
What security policies should e-commerce address?
Security policies that e-commerce should address are | Protecting assets and avoiding threats.
147
Describe dual development of an API a la Meyer?
Dual development of an API should be closed to change and open to extend.
148
What are the types of QA maintenance?
``` The types of Quality Assurance maintenance are Adapt Correct Perfect Prevent ```
149
Why should one favor written documentation over spoken documentation a la Meyer?
Written documentation is preferred over spoken documentation because of Precision and Recollection
150
What’s a ceremony a la Cockburn?
According to Cockburn, a ceremony is a Requirement for controlling artifacts’ tolerances
151
What is the starting point to formulating a methodology a la Beck?
Fear of failing is a starting point for formulating a methodology
152
How does one “go to the balcony” a la Ury?
One goes to the balcony by pausing and rewinding
153
How can one devise labels a la Rosenfeld et al.?
According to Rosenfeld one can devise labels by being Modular Consistent
154
What is the purpose of discretionary, non-mandatory dependencies in a project schedule?
The purpose of discretionary, non-mandatory dependencies in a project schedule are leading tasks and lagging tasks.
155
What architectural style is related to the Observer pattern?
The model view controller is related to the observer pattern
156
Name and explain common requirements risks.
Common requirements risk are gold-plating features and overlooking stakeholders.
157
What is the difference between additive and multiplicative complexity, relative to feature-driven development?
Isolated features | Depended features
158
What is the difference between system 1 and system 2 thinking a la Weinschenk?
System 1 thinking is Effortless browsing → provide error checking System 2 thinking Questionnaires → use difficult font
159
Describe Phoenix Project’s 3 ways.
The three ways in the Phoenix project are Maximizing flow Amplifying feedback loops Continual improvement
160
Describe Software Systems Engineering.
Software Systems engineering is a Systematic plan with | Disciplined control and Quantifiable measure
161
What are the types of cohesion?
``` The types of cohesion are Procedural Temporal Sequential Functional Informational ```
162
What concern does the first way address? How does it address that concern?
This regards to maximizing the overall flow of work from dev to ops in small batches. This is addressed with "systems thinking".
163
What concern does the second way address? How does it address that concern?
This regards avoiding the repetition of mistakes with constant feedback loops. This "embeds knowledge" and supports "quality at the source".
164
Paige Jones identifies four types of COTS components, based on their relative availability. Name them, in order of increasing availability.
``` The four types of COTS components are Foundation Architectural Business Application ```
165
What is the average half-life of COTS expertise?
The average half life of COTS expertise is 6 months
166
What is the maximum shelf life of COTS?
The maximum shelf life of COTS is 2 years
167
What is dependency injection?
Dependency injection is a technique whereby one object (or static method) supplies the dependencies of another object. A dependency is an object that can be used (a service)
168
What is the common problem that RTTI and dependency inversion attempt to address?
RTTI and dependency inversion define methods that characterize common functionality of related objects
169
What specific maintainability-related concern do the Laws of Demeter attempt to address?
The Laws of Demeter addresses the concern of avoiding designs that reach "through" one object to another. It does so by limiting the use of inherited and reeferenced content from and classes.
170
How do the strong and weak laws of Demeter differ?
Strong Demeter limits the use of inherited content. Weak Demeter allows inheritance of any superclass attributes
171
What is variation inheritance?
Variation inheritance is describing a class in terms of difference with another class. It can be useful for defining a package in terms of an existing version
172
What is the relationship between tiered computing and the client-server architectural style?
Tiered computing is a multi-layered client server, where an immediate layer preprocesses clients request and or post process the server response
173
What do the broker and proxy architectural styles have in common and how do they differ?
Broker and Proxy are both forms of tiered computing. - A broker(host) intercepts an initial request then puts a client in direct contact with a server. - In a proxy, the proxy handles ALL communication between the client and server
174
In what ways are the deployment strategies for MVC and MVP the same? How do they differ?
Model View Controller and Model View Presenter are both forms of tiered computing. In MVC, the immediate layer(controller) resides on the server and handles all communication between views and models. On the other hand, a presenter is used instead of a controller which resided on the client side.
175
What does it mean for a request to be idempotent?
Simply put, an operation is idempotent if it produces the same result when called over and over. An identical request should return an identical result when done twice, two thousand, or two million times
176
What is RPC?
RPC stands for Remote Procedural Call. RPC makes a programs modules easy to deploy in a network by making location of a server completely transparent.
177
What is REST?
REST stands for Represental state transfer. REST decouples UI and datasource which allows for cross-platform.
178
What is a key difference between REST and RPC?
RPC directs request to procedures / API's while REST directs request to resources.
179
What is a key difference between REST and RPC?
RPC directs request to procedures / API's while REST directs request to resources.
180
What purpose(s) does an ORM serve in client-server implementation?
An object relational mapper is used to interchange data between code or underlying database. ORC handles two issues: 1) Creation and realization of schema 2) Creating logic for interchanging data between class and database
181
What is meant by the term "marshalling" in context of RPC?
Marshalling is the packing of procedure parameters into a message packet.
182
What is PUT?
PUT creates a new resource
183
What is POST?
POST updates an existing resource
184
What is data-first development?
Data-first development affords more control over detail and performance at a cost of additional coding and more expertise. You would want to use data-first when you are expecting a long lifetime of a database.
185
What is code-first development?
Code-first offers the opposite set of advantages and disadvantages of data first. You would use code first if the database has a short expected life.
186
Name the six types of cohesion in the Constantine hierarchy
Furry Soft Cats Prefer Tender Love Care ``` Functional Sequential Communicative Procedural Tempural Logical Coincidental ```
187
Coupling in Constantine Hierarchy
``` Null Data Stamp Control External Common Global ```
188
What is Hybrid Coupling?
A subset of data used as control Example: account numbers 00001 to 99999 ​ If 90000 - 90999, send mail to area code of last 3 digit (000 - 999)
189
Define the principles of common use and common closure as they pertain to components?
The Common Closure Principle (CCP) states: ”The classes in a component should be closed together against the same kind of changes. A change that affects a component affects all the classes in that component and no other components.”
190
How can content coupling occur?
Content coupling can occur if a function in one module can control a function in another such as modifying.
191
What is the principle of single choice?
Whenever a software system must support a set of alternatives, one and only one module in the system should know their exhaustive list.