Exam 12: Computer Programming

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ modeling is a technique that can be used to identify potential vulnerabilities and develop mitigation strategies that can be implemented during coding.

(Short Answer)
4.9/5
(39)

A(n)____ is a unit of data that represents an abstraction or a real-world entity such as person,place,or thing.

(Multiple Choice)
4.7/5
(27)

  -In the context of a program like the one in the accompanying figure,a(n)____ is a statement that provides the computer with basic information for solving a problem. -In the context of a program like the one in the accompanying figure,a(n)____ is a statement that provides the computer with basic information for solving a problem.

(Multiple Choice)
4.9/5
(40)

A hierarchical diagram of potential attacks against a system is an attack ____________________.

(Short Answer)
4.8/5
(38)

Another name for threat modeling is risk analysis.

(True/False)
4.8/5
(38)

Define and discuss three techniques associated with defensive programming.

(Essay)
4.9/5
(40)

Polymorpism provides OO programs with easy extensibility and can help simplify program code.

(True/False)
4.8/5
(31)

Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can’t answer. You agree to help answer the questions. -Bert wants to draw a class.You suggest he use ____ to do so.

(Multiple Choice)
4.9/5
(31)

  -In the context of a program like the one in the accompanying figure,a(n)____ is a general statement about the relationship between facts. -In the context of a program like the one in the accompanying figure,a(n)____ is a general statement about the relationship between facts.

(Multiple Choice)
4.9/5
(35)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Information that you supply to the computer to help it solve a problem

(Multiple Choice)
4.8/5
(38)

The computer begins executing a Java program by locating a standard method called ____.

(Multiple Choice)
4.8/5
(29)

Polymorphism refers to the process of hiding the internal details of objects and their methods.

(True/False)
5.0/5
(32)

When high-level languages were originally conceived in the 1950s,they were dubbed ____-generation languages.

(Multiple Choice)
4.9/5
(30)

Languages which most closely resemble natural human languages are ____-generation languages.

(Multiple Choice)
4.8/5
(32)

In the threat model STRIDE,the T stands for ____ or changing,adding,or deleting data.

(Multiple Choice)
4.9/5
(35)

The ____ paradigm attempts to describe a problem without specifying exactly how to arrive at a solution.

(Multiple Choice)
4.9/5
(32)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Used to plan classes for a program

(Multiple Choice)
4.7/5
(45)

The ____ paradigm focuses on an algorithm that describes a solution.

(Multiple Choice)
4.7/5
(30)

____ refers to passing certain characteristics from one class to another class.

(Multiple Choice)
4.7/5
(41)

A ____ provides programmers with tools to build substantial sections of a program by pointing and clicking.

(Multiple Choice)
4.7/5
(35)
Showing 81 - 100 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)