Exam 7: Software Development
Exam 1: An Overview of Ethics85 Questions
Exam 2: Ethics for It Workers and It Users75 Questions
Exam 3: Computer and Internet Crime89 Questions
Exam 4: Privacy90 Questions
Exam 5: Freedom of Expression90 Questions
Exam 6: Intellectual Property90 Questions
Exam 7: Software Development75 Questions
Exam 8: The Impact of Information Technology on Productivity and Quality of Life90 Questions
Exam 9: Social Networking90 Questions
Exam 10: Ethics of It Organizations90 Questions
Select questions type
In the context of development of safety critical systems, if an undesirable event has a one percent probability of occurring, a 25 percent chance of going undetected, and a potential cost of $1,000,000, then the risk can be calculated as .
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
C
An airline's online ticketreservation system and an electronic funds transfer system that moves money among
banks, are examples of .
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
order-processing systems
When developing safety-critical systems, a key assumption must be that safety will automatically result from
following an organization's standard development methodology.
Free
(True/False)
4.7/5
(31)
Correct Answer:
False
A type of business system is the , which is used to develop accurate forecasts of customer demand, recommend stocks and bonds for an investment portfolio.
(Multiple Choice)
4.9/5
(34)
User acceptance testing is performed by trained end users to ensure that the system operates as they expect.
(True/False)
4.8/5
(34)
Defendants in a(n) action may use several legal defenses, including the doctrine of supervening event, the government contractor defense, and an expired statute of limitations.
(Short Answer)
4.8/5
(44)
treats the software unit as a device that has expected input and output behaviors but whose internal workings are known.
(Short Answer)
4.9/5
(31)
means that the defendant is held responsible for injuring another person, regardless of negligence or intent.
(Multiple Choice)
4.8/5
(30)
What are the standards that the warranty of merchantability requires to be met?
(Essay)
4.8/5
(40)
In the context of developing safety-critical systems, the safety engineer's role is limited to producing a hazard log.
(True/False)
4.8/5
(27)
After successful unit testing, the subsystems are combined to test the entire system as a complete entity using _____.
(Multiple Choice)
4.9/5
(31)
Poor design between systems and humans can greatly increase risk, sometimes with tragic consequences.
(Short Answer)
4.8/5
(34)
When software is well-designed, programmers make no mistakes in turning design specifications into lines of code.
(True/False)
4.8/5
(40)
In one lawsuit in the early , a financial institution became insolvent because defects in a purchased software application caused errors in several of its systems.
(Multiple Choice)
4.9/5
(32)
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for .
(Multiple Choice)
4.9/5
(22)
are defined as a set of interrelated components that include hardware, software, databases, networks, people, and procedures that collect data, process it, and disseminate the output.
(Multiple Choice)
4.8/5
(41)
In the context of the Capability Maturity Model Integration maturity levels, the percentage of organizations at the managed maturity level is .
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)