Exam 5: Trust, Safety, and Reliability
Exam 1: Critical Reasoning and Moral Theory49 Questions
Exam 2: Computing Professions and Professional Ethics50 Questions
Exam 3: Privacy50 Questions
Exam 4: Intellectual and Intangible Property50 Questions
Exam 5: Trust, Safety, and Reliability50 Questions
Exam 6: How Computing Is Changing Who We Are50 Questions
Exam 7: Democracy, Freedom of Speech, and Freedom of the Press50 Questions
Exam 8: Computing and Vulnerable Groups50 Questions
Exam 9: Autonomous and Pervasive Technology50 Questions
Select questions type
Match each term with the correct statement below.
-is useful and important, but can never be foolproof
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
High-quality software requires a high-quality ____ system for reporting, documenting, and correcting problems when they happen.
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
C
Match each term with the correct statement below.
-phase that determines what the software must do
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
Match each term with the correct statement below.
-is often the product of a full-blown vendetta or terrorism
(Multiple Choice)
4.9/5
(31)
An anti-PowerPoint referendum may get on the ballot in the nation of ____________________.
(Short Answer)
4.8/5
(36)
____ language is a very low level language that is very similar to machine language.
(Multiple Choice)
4.8/5
(26)
The term multiprocess is used to refer to programs that may affect someone's safety if they fail to work properly.
(True/False)
4.8/5
(23)
____ can be used many times under a multitude of conditions, and are very valuable for control systems particularly.
(Multiple Choice)
4.7/5
(32)
The goal of a(n) ____________________ is to seek out vulnerabilities in a computer system so they can be removed before a malicious intruder discovers them and launches an attack.
(Short Answer)
4.8/5
(29)
For large projects, specialists called "____ engineers" interview clients to determine exactly what the system needs to do to best serve the clients.
(Multiple Choice)
4.9/5
(27)
Match each term with the correct statement below.
-kind of programs that must coordinate with each other so that they do not get in each other's way
(Multiple Choice)
4.8/5
(33)
What does the misuse of the computer system involve? Provide an example.
(Essay)
4.7/5
(43)
The most obvious approach to making sure your program has no bugs is to ____ it.
(Multiple Choice)
4.8/5
(36)
The Stuxnet worm is clearly the most sophisticated worm to date.
(True/False)
4.8/5
(34)
The exploitation of a previously unknown vulnerability, so-called ____________________ attacks, are commonly the most dangerous and unexpected.
(Essay)
4.8/5
(34)
Match each term with the correct statement below.
-may not accurately represent the system under examination
(Multiple Choice)
4.7/5
(24)
Match each term with the correct statement below.
-thousands of these can exist in a program
(Multiple Choice)
4.8/5
(39)
____'s Law says that "adding people to a late project makes it later."
(Multiple Choice)
4.8/5
(25)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)