Exam 5: Trust, Safety, and Reliability

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each term with the correct statement below. -is useful and important, but can never be foolproof

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

High-quality software requires a high-quality ____ system for reporting, documenting, and correcting problems when they happen.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

C

Match each term with the correct statement below. -phase that determines what the software must do

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

Match each term with the correct statement below. -is often the product of a full-blown vendetta or terrorism

(Multiple Choice)
4.9/5
(31)

An anti-PowerPoint referendum may get on the ballot in the nation of ____________________.

(Short Answer)
4.8/5
(36)

____ language is a very low level language that is very similar to machine language.

(Multiple Choice)
4.8/5
(26)

What does the term real time mean?

(Essay)
4.8/5
(35)

The term multiprocess is used to refer to programs that may affect someone's safety if they fail to work properly.

(True/False)
4.8/5
(23)

____ can be used many times under a multitude of conditions, and are very valuable for control systems particularly.

(Multiple Choice)
4.7/5
(32)

The goal of a(n) ____________________ is to seek out vulnerabilities in a computer system so they can be removed before a malicious intruder discovers them and launches an attack.

(Short Answer)
4.8/5
(29)

For large projects, specialists called "____ engineers" interview clients to determine exactly what the system needs to do to best serve the clients.

(Multiple Choice)
4.9/5
(27)

Match each term with the correct statement below. -kind of programs that must coordinate with each other so that they do not get in each other's way

(Multiple Choice)
4.8/5
(33)

What does the misuse of the computer system involve? Provide an example.

(Essay)
4.7/5
(43)

The most obvious approach to making sure your program has no bugs is to ____ it.

(Multiple Choice)
4.8/5
(36)

What is a worm?

(Short Answer)
4.9/5
(39)

The Stuxnet worm is clearly the most sophisticated worm to date.

(True/False)
4.8/5
(34)

The exploitation of a previously unknown vulnerability, so-called ____________________ attacks, are commonly the most dangerous and unexpected.

(Essay)
4.8/5
(34)

Match each term with the correct statement below. -may not accurately represent the system under examination

(Multiple Choice)
4.7/5
(24)

Match each term with the correct statement below. -thousands of these can exist in a program

(Multiple Choice)
4.8/5
(39)

____'s Law says that "adding people to a late project makes it later."

(Multiple Choice)
4.8/5
(25)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)