Exam 9: Coding in the Cube: Developing Good Habit

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How should a developer code for DEBUGS?

Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
Verified

B

After the debug methods are built into the program, they can be called anywhere at anytime within the program you need to test.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

Where do most attacks to software come from?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

Open source code is greatly discouraged within the software community.

(True/False)
4.9/5
(33)

Application errors expose a lot of information about the code and its environment.

(True/False)
4.8/5
(35)

What is the grouping and storing of data inside a single object?

(Multiple Choice)
4.8/5
(38)

Which of the following steps are NOT needed to for exception handling?

(Multiple Choice)
4.8/5
(44)

Which option is NOT a characteristics of Organized code?

(Multiple Choice)
4.9/5
(28)

What is the best way to turn off DEBUG statements in the code?

(Multiple Choice)
4.8/5
(37)

Which item is NOT a characteristic of self-monitoring code?

(Multiple Choice)
4.9/5
(32)

Where should the variables that a program uses be defined?

(Multiple Choice)
4.9/5
(30)

Spaghetti code is rather inexpensive to maintain.

(True/False)
4.7/5
(36)

What is it called when software is developed on the premise that specifications, data, and environments will change?

(Multiple Choice)
4.8/5
(46)

The most notable security flaw with the C/C++ language is the buffer overflow attack.

(True/False)
4.7/5
(42)

What type of software looks up values stored in a database and determines what to display, allow, or execute based on those values

(Multiple Choice)
4.8/5
(32)

Code refactoring occurs when existing bodies of logic are broken up and moved into many smaller bodies of code.

(True/False)
4.9/5
(42)

You do not have to cancel a user's ID or password if they exceed a specified threshold of login times.

(True/False)
4.7/5
(34)

Logging user traffic, events and data flow is one of the best analysis techniques you can do for an application.

(True/False)
4.8/5
(42)

How can an application alert stakeholders of invasion?

(Multiple Choice)
5.0/5
(40)

Use singleton objects when a common object or task will be used across multiple use cases for the same reason.

(True/False)
4.9/5
(44)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)