Exam 12: Computer Programming

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ table is a tabular method for visualizing and specifying rules based on multiple factors.

(Multiple Choice)
4.8/5
(37)

John and Andy are planning a software project. You tell John and Andy there are several software development methodologies that exist to help program designers. These can be classified into two groupings. -The methodology that you have chosen allows little room for adaptation and change,now that the specifications for the software were completed in the design phase.Which methodology did you choose?

(Multiple Choice)
4.9/5
(31)

  -In the accompanying figure,D represents ____. -In the accompanying figure,D represents ____.

(Multiple Choice)
4.9/5
(36)

Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can’t answer. You agree to help answer the questions. -Agnes wants to know how to describe the characteristics of a class.You tell her characteristics are described using ____.

(Multiple Choice)
4.9/5
(39)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -A type of SDK

(Multiple Choice)
4.7/5
(34)

In the threat model STRIDE,the D stands for ____ or making a system unavailable to legitimate users.

(Multiple Choice)
4.8/5
(31)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Instructions that are executed one after another

(Multiple Choice)
4.9/5
(41)

  -In the jargon associated with the language in the accompanying figure,when you ask a question,it is a(n)____. -In the jargon associated with the language in the accompanying figure,when you ask a question,it is a(n)____.

(Multiple Choice)
4.9/5
(32)

COBOL and Fortran are considered second-generation languages.

(True/False)
4.7/5
(36)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Data in memory exceeds its expected boundaries

(Multiple Choice)
4.8/5
(42)

In the threat model STRIDE,the S stands for ____ or pretending to be someone else.

(Multiple Choice)
4.9/5
(36)

A predictive methodology requires extensive planning and documentation up front.

(True/False)
4.8/5
(41)

A computer program is typically stored as a file and transferred into ____ when needed.

(Multiple Choice)
4.7/5
(43)

OO programmers often use flowcharts to plan the classes to be programmed.

(True/False)
4.9/5
(33)

Much of the power and flexibility of the Prolog language stems from its ability to sift through facts.

(True/False)
4.8/5
(40)

Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can’t answer. You agree to help answer the questions. -Ernesto then wants to know what you call a single instance of an entity,and you tell him that it is a(n)____.

(Multiple Choice)
4.9/5
(42)

One of the first exploits to take advantage of buffer overflows was the ____.

(Multiple Choice)
4.8/5
(32)

John and Andy are planning a software project. You tell John and Andy there are several software development methodologies that exist to help program designers. These can be classified into two groupings. -You tell Andy and John that the ____ methodology is best for projects with a small core of developers working at a single location.

(Multiple Choice)
4.7/5
(35)

You can express an algorithm as pseudocode._________________________

(True/False)
5.0/5
(44)

A ____ language uses command words and grammar based on human language.

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)