Topic 3 Flashcards

(26 cards)

1
Q

The hardware might malfunction, causing erroneous results.

A

Hardware Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sometimes called bugs.
Are mistakes in either the programming or the design of the software.

A

Software Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two most important ways a computer might fail to meet
expectations

A
  • Hardware Errors
  • Software Errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves attempting to use a
computer for the wrong purpose or using one incorrectly for the right
purpose.

A

Misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software often interacts with humans. Sometimes the person who is prompted for some action misunderstands what is being asked.

A

Communication Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Has been growing more prevalent. In some cases it is simply a form of vandalism.

A

Malice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a software that may affect someone’s safety if it fails to work properly. This category usually includes software that could potentially harm the environment, as that would presumably indirectly harm humans.

A

Safety-Critical Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most obvious approach to making sure a program has no bugs

A

Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a place in computer code where the next instruction executed depends on input data.

A

Decision Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Programs that control some sort of machinery.

A

Control Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Means that the program must do something within a specific
amount of time.

A

Real Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is used to refer to programs that execute at the same time
as one or more other programs.

A

Multiprocess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Developing any commercial software system, and particularly safety critical software systems, involves multiple-tasks, which are usually performed by many different people.

A

The Software Development Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Literally what is required of the software.

A

Requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For large projects, specialists called ”_________________________” interview clients to determine exactly what the system needs to do to best serve the clients.

A

Requirements Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Once the requirements of a system are established, designers develop the particular set of component
program modules, or subprograms of the software system.

A

Specification and Design

17
Q

Programmers then use the design to create code in an appropriate programming language.

A

Implementation

18
Q

He is a well known applied ethicist and author from Shippensburg University who analyzed the moral responsibilities of some key people in the Therac-25 case.

A

Professor Douglas Birsch

19
Q

Is short for “malicious software”. It can take many forms. The most prevalent types are

A

Malware

  • Worm
  • Virus
  • Spyware
  • Trojan Horse
  • Rootkit
20
Q

A program that makes copies of itself and propagates those copies through a network to infect other computers.

21
Q

Malware that is similar to a worm, but which resides in another program. That program must execute in order for the virus to propagate itself.

22
Q

A computer program that is secretly installed for the purpose of collecting information about the computer’s user or users.

23
Q

A piece of software that masquerades as an innocent, and perhaps useful, program,
but that is actually designed for a malicious purpose.

24
Q

A program that embeds itself into a computer’s operating system and acquires special
privileges that would normally be available to the operating system.

25
The people who write and deploy malware are commonly called ________ and the activity of doing it is called ___________.
- Hacker - Hacking
26
Some people have legitimate jobs in which they are paid to break into systems by the people who own the systems. These people are sometimes called “______________”, Their goal is to seek out vulnerabilities so they can be removed before a malicious intruder discovers them and launches an attack. The team of people involved in this activity are sometimes called a “_________________” or a “__________________”
- White Hat Hackers - Tiger Team or Red Team