Exam 7: Ethical Decisions in Software Development
Exam 1: An Overview of Ethics60 Questions
Exam 2: Ethics for IT Workers and IT Users60 Questions
Exam 3: Cyberattacks and Cybersecurity60 Questions
Exam 4: Privacy60 Questions
Exam 5: Freedom of Expression60 Questions
Exam 6: Intellectual Property60 Questions
Exam 7: Ethical Decisions in Software Development60 Questions
Exam 8: The Impact of Information Technology on Society60 Questions
Exam 9: Social Media60 Questions
Exam 10: Ethics of IT Organizations60 Questions
Select questions type
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
What type of programming is commonly found in airplane and spacecraft control systems?
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
B
In which of the following is a defendant held responsible for injuring another person, regardless of negligence or intent?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?
(Multiple Choice)
4.8/5
(40)
Transference is the provision of multiple interchangeable components to perform a single function in order to cope with failures and errors.
(True/False)
4.8/5
(35)
A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in which type of file servers?
(Multiple Choice)
4.9/5
(33)
In integration testing, special software programs called static analyzers are run against the new code.
(True/False)
4.8/5
(42)
The first release of a software product typically meets all its users' expectations.
(True/False)
4.8/5
(31)
Risk mitigation involves the reduction in either the likelihood or the impact of the occurrence of a risk.
(True/False)
4.9/5
(44)
Which of the following can be oral, written, or inferred from the seller's conduct?
(Multiple Choice)
4.9/5
(31)
In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.
(True/False)
4.8/5
(31)
When developing safety-critical systems, a key assumption must be that safety will automatically result from following an organization's standard development methodology.
(True/False)
4.9/5
(37)
In the context of Capability Maturity Model Integration, process is ad hoc and chaotic; organization tends to overcommit and processes are often abandoned during times of crisis in which of the following maturity levels?
(Multiple Choice)
4.8/5
(43)
Capability Maturity Model Integration (CMMI) is a process improvement approach that defines the essential elements of effective processes.
(True/False)
4.8/5
(37)
Which of the following are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output?
(Multiple Choice)
4.9/5
(43)
Software developers do not typically work closely with safety and software engineers.
(True/False)
4.8/5
(37)
Which of the following is a standard, proven work process that enables those involved to make controlled and orderly progress in developing high-quality software?
(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)