Incorrect Exam Questions Flashcards

1
Q

Why should you write algorithms before writing code?

A

They help avoid problems/errors in logic early, and also allow the scope of the task to be determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What goes at the start and end of pseudocode?

A

START, STOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which search algorithm is the best option for unsorted lists?

A

Linear search, as binary search requires the data to be sorted FIRST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cross-site scripting?

A

When a web application inputs malicious script to the user’s web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some procedures to manage data and files?

A

1) Regular backups
2) Naming conventions of files/folders
3) Regular archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the disposal of files?

A

data is deleted PERMANENTLY (even copies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of naming conventions?

A

They aid the programmer by providing consistency in the naming of variables
in software solutions.

They also aid those who are reading the
program, providing them with better understanding, later on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a function and a procedure?

A

A function usually returns a value whereas a procedure does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purpose of the SRS

A

To document the needs of the stakeholders and to indicate how the system is expected to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is archiving used to manage data?

A

Archiving reduces the amount of data that is kept in active storage. This is done by moving data off of active storage and onto another system such as tape storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What impact will a delay of a task have on a Gantt chart project’s timeline if it isn’t on the critical path?

A

No impact at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the advantages of the Agile model?

A

1) Clients are more included in the process
2) Allows adaptive design
3) Produces early visible results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 2 reasons for collecting feedback on the user experience from different types of customers?

A

1) Better view of the user experience when gathered from a multitude of demographics

2) Better for finding holes/errors in the code, as more parts of the solution can be tested thoroughly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When asked to JUSTIFY your choice between some options, how should you answer the question?

A

1) Clearly outline which option
2) Why? -> List the advantages
3) List at least ONE LIMITATION of the alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What file type is a better option when transferring data?

A

XML, as it is extensible in its structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Man-in-the-middle attack?

A

Gaining access to a user’s data by inserting themselves in the middle of the communication that the user is having with the information system they are connected with (EAVESDROPPING)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why can selection sort be preferred over quick sort sometimes?

A

As selection sort is easier to program than a quick sort, and works best with SMALL amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some software security controls?

A

1) Encryption
2) Firewalls
3) Anti-virus protection
4) User authentication -> passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some risk management strategies?

A

1) Software auditing
2) Version control
3) Compliance checking in relation to the use of 3rd party sofware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is affordance?

A

What a user can do with an object based off their capabilities, or an attribute of an object that allow people to know how to use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which development model is best suited to projects involving changing scope, requirements, and few dependencies

A

Spiral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean if tasks are on the critical path?

A

Critical path is the longest time between start and finish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Difference between a Method and an Event?

A

A method is a function within a class which can be called anytime, whereas an Event is a detected change of state, such as a user pressing enter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does «includes» & «excludes» mean

A

Includes means that the first process always activates (includes) the second process

Extends means that the second process can be optionally activated by the first process (conditional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What data structure is most suitable to store multiple pieces of information?

A

Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Are archives stored in a short term or long term storage

A

Long term storage, compressed to preserve storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If a user is in breach of the privacy act for keeping client sensitive information open on a wireless network without a password, which principle is involved?

A

All personal information gathered from clients must be secured from any unauthorised access, use or disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the order of the 3 validation techniques?

A

1) Existence
2) Type
3) Range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is internal documentation?

A

Describes key variables and procedures within a program, that assist with the variety of users of the program, or future programmers in understanding the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which control structure is a For/While loop?

A

Iteration

19
Q

What are the benefits of encryption to secure data during transmission?

A

Makes the data unreadable, even if intercepted during transmission, the data will not be able to be read at all

20
Q

What is a suitable backup medium in the event of accidental data loss

A

Cloud storage, as it is kept offsite and can always be available if copies are lost or damaged

20
Q

What are the data integrity characteristics

A

1) Accuracy
2) Authenticity
3) Correctness
4) Timeliness
5) Reasonableness

21
Q

If a company is contracted by an Australian government, they are obliged to which legislation

A

Privacy act

21
Q

Purpose of a trace table

A

To test algorithms for logic errors that occur when the algorithm or program executes.

It allows the user to ‘step through’ the algorithm to track how variables change.

22
Q

Factors that influence design

A

1) Usability
2) Affordability
3) Security
4) Interoperability
5) Marketability

23
Q

If you need to store thousands of values with all of the same type, what data structure would you use?

A

Arrays

23
Q

What control structure is a IF then statement?

A

Selection

23
Q

In pseudocode, what are the only errors in the code?

A

Logic error

24
Q

Goal of usability testing

A

Usability testing is conducted to identify any usability problems by collecting quantitative and qualitative data and determining user satisfaction with the software system

24
Q

Difference between archiving and disposal

A

Arching is moving files that are no longer used to another location, whereas disposal is permanently removing those files entirely

25
Q

Two advantages of XML Files in relation to reduce the risk of damaging data integrity

A

1) Reduces the risk of the data being corrupt during transfer, reducing the risk to its accuracy
2) The readability for humans, allowing the correctness to be manually verified

26
Q

In a DFD and a UCD what is represented by a rectangle,

A

In a DFD= exteral entity
In a UCD= system boundary

26
Q

If a piece of code has an infinite loop what type of error is this

A

Runtime Error

26
Q

What data flow cannot occur in a DFD?

A

External entity to data store, or data store to entity

27
Q

If a network is running slower than usual, with no other problems to the software, what has likely happened to the network?

A

A worm has entered the network, and is duplicating itself

28
Q

What are 2 reasons for writing internal documentation for WRITING PROGRAMS THAT RUN EFFICIENTLY

A

1) It can assist in stepping through code, which may assist with developing a program more quickly

2) It is also not read by the computer, so writing the code does not make the program run less efficiently

28
Q

Explain Hungarian Notation

A

The first few letters should indicate the type of the particular subroutine, variable/object.

The second part should be meaningful to its purpose of the subroutine/variable

29
Q

Explain CamelCase

A

Words are combined together to form a single phrase, capitalising the first letter of each word without any whitespace inbetween them

30
Q

Compare and contrast Records and arrays

A

Records group together variables for a particular purpose. An array also groups together variables under the same name which are accessed via an index. However, a record can hold multiple data types, but an array can only hold on data type.

30
Q

Purpose of associative arrays

A

Associative arrays are used to represent the collection of data elements that can be retrieved by a key, through a (key, value) pair. Their operations include: add, remove, lookup.

30
Q

What is a function and how does it differ from a procedure?

A

A function is a segment of code that can be called from within the program, and generally returns a value whereas a procedure does not

31
Q

Do physical objects appear on context diagrams? Why?

A

No, because there is no data flow

32
Q

Difference between context diagram and UCD

A

Context diagrams are used to represent data flowing to and from external entities and the system. Whereas a UCD is used to represent the interactions with the system and the functional aspects of the system.

33
Q

Why are both context diagrams and UCD’s required for thorough analysis

A

They both are required to fully understand not only the logical data flow but how users interact with the system

34
Q

Distinguish between arrows in a context diagram and a line in a UCD

A

In a context diagram, the arrow indicates the direction of data flow, which is only one way

In a UCD, the lines represent an association between a role and a use case

35
Q

What does a data dictionary contain and why is it useful when developing the solution

A

A data dictionary contains the variables of the solution, including their type, size, scope, and a general description. They are useful when developing the solution as the developor will already have an understanding of the variables required for the solution, SO THE PROCESS WILL RUN MORE EFFICIENTLY

36
Q

What are some key features you have to consider when selecting a mobile computing device?

A

1) Storage Capacity
2) Memory
3) Processor
4) Battery
5) Resolution
6) Connectivity

37
Q

What is effectiveness?

A

A measure of how well a solution, information management strategy or network functions, and whether they achieve their intended goals.

37
Q

What is one piece of hardware required for setting up a network

A

a WAP (Wireless Access Point), which will enable the devices to connect to the network and to send and receive data.

38
Q

What is accurate data?

A

True to the source

38
Q

What is an instruction?

A

A single line of code used to accomplish a task

38
Q

Should actors in a UCD be labelled as the name of their role, such as Manager, or with the persons name, such as John?

A

Actors should be labelled with the name of their role, not their name.

38
Q

If someone has been downloading a TV series and there seems to be unusual credit card transcations, what is most likely to have occurred?

A

A trojan has been downloaded, as they disguise themselves in legal software and videos, such as TV series.

38
Q

What is a statement in pseudocode?

A

A line of code that modifies a variables content, for instance:

A <- A + 2

39
Q

Difference between a record and a file

A

A record is used to group together variables for a particular purpose and is able to hold multiple data types. A file is also used to store data, but can store large amounts of data that can be used at a later date.

40
Q

What are the 3 activities that will occur in the Analysis stage?

A

1) Solution Scope
2) Solution Constraints
3) Solution Requirements

41
Q

What is userfriendliness?

A

Clear, intuitive, logical

41
Q

Why is evaluation criteria written?

A

After the solution has been in operation for a while, it will help to check whether or not the solution has solved the original problem

41
Q

If payments are taken via paywave (credit card machines) what does the device need to be connected to in order for this to happen?

A

A peripheral, which would allow
customers to pay and print a receipt for the customer

42
Q

List 4 sections that make up a SRS

A

1) an introduction
2) a description of the proposed solution
3) specific requirements of the software solution
4) description of the environment in which the solution will operate.

43
Q

If a person who wishes to create a new solution is constantly wanting to add new features to the solution that weren’t agreed on initially, how can writing an SRS beforehand help with this?

A

A SRS often forms the basis of a legal
contract as it is agreed upon by both developer and client, and if this was done
correctly at the start then it would have been clear what is expected to be included in
the solution.

44
Q

How does a virus hide itself?

A

A polymorphic virus is a complex virus that is encrypted with a variable key so that each copy of this virus differs from the other.

A metamorphic virus can be transformed due to its ability to edit, rewrite and translate its own code. Metamorphic virus does not use encryption keys to change its copies.

45
Q

Interoperability vs Portability

A

Interoperability:
Interoperability means different software systems can work together and share information effectively.

Portability:
Portability means software can run on various devices or operating systems without needing major modifications.