Deck 5: Trust, Safety, and Reliability

Full screen (f)
exit full mode
Question
____'s Law says that "adding people to a late project makes it later."

A) Moore
B) Brooks
C) Smith
D) Pascal
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n) ____ point number is similar to scientific notation, used in the natural sciences.

A) floating
B) real
C) integral
D) prime
Question
All of the following are examples of uses of safety-critical software EXCEPT the software associated with ____.

A) the braking system of automobiles
B) control processes within a nuclear power plant
C) patient monitoring software in an intensive care unit
D) timekeeping at a local elementary school
Question
It is possible to roughly calculate the number of executions required to exhaustively test a program; to make this calculation, you need to understand the concept of ____ points.

A) process
B) decision
C) control
D) categorical
Question
The standards of creating, testing, and maintaining ____ software are much stricter than other software, for obvious reasons.

A) contextual
B) encrypted
C) safety-critical
D) multiprocess
Question
High-quality software requires a high-quality ____ system for reporting, documenting, and correcting problems when they happen.

A) backup
B) simulation
C) maintenance
D) redundancy
Question
____ programs control some sort of machinery.

A) Critical
B) Control
C) Multiprocess
D) Mechanized
Question
A rootkit is a piece of software that masquerades as an innocent, and perhaps useful, program, but that is actually designed for malicious purpose.
Question
The methods employed by white hat hackers are the same as those employed by other hackers.
Question
The term hacker has always had a negative connotation.
Question
When it was first used, the term ____ was actually the cause of a hardware problem.

A) jot
B) bug
C) junk
D) spam
Question
The term multiprocess is used to refer to programs that may affect someone's safety if they fail to work properly.
Question
In the ____ phase of the software development process, programmers use the design to create code in an appropriate programming language.

A) requirements
B) ideation
C) language
D) implementation
Question
Malicious software is often the product of ____.

A) terrorism
B) war
C) for-profit crime
D) Any of the above
Question
____ can be used many times under a multitude of conditions, and are very valuable for control systems particularly.

A) Real-world analysis
B) Simulations
C) Auxiliaries
D) Clones
Question
The Stuxnet worm is clearly the most sophisticated worm to date.
Question
The most obvious approach to making sure your program has no bugs is to ____ it.

A) test
B) invert
C) proofred
D) compile
Question
For large projects, specialists called "____ engineers" interview clients to determine exactly what the system needs to do to best serve the clients.

A) command
B) notational
C) protocol
D) requirements
Question
In scientific notation, the number of ____ digits determines the position, while the number of digits in the scale factor determines the range of magnitudes.

A) floating
B) significant
C) indexed
D) encapsulated
Question
____ is still one of the most important ways in which we attempt to ensure software reliability.

A) Proofreading
B) Control sourcing
C) Backpedalling
D) Testing
Question
In a ____ scam, the recipient is instructed to click a Web link, which opens a Web page that requests an e-mail address and password.

A) phishing
B) tracking
C) pharming
D) spamming
Question
An anti-PowerPoint referendum may get on the ballot in the nation of ____________________.
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a difficult kind of program to test
Question
The exploitation of a previously unknown vulnerability, so-called ____________________ attacks, are commonly the most dangerous and unexpected.
Question
The people who write and deploy malware commonly called ____.

A) jackers
B) hackers
C) slackers
D) trackers
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is useful and important, but can never be foolproof
Question
____ language is a very low level language that is very similar to machine language.

A) Assembly
B) AECL
C) Natural
D) Recorded
Question
Most advances in the techniques or tools for software involve a gain of ____ to ____ percent in productivity or reliability

A) 5, 35
B) 1, 3
C) 50, 80
D) 7, 12
Question
____________________ programs are particularly difficult to test because they are commonly multiprocess programs with real-time constraints.
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
thousands of these can exist in a program
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
phase that determines what the software must do
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a number that is similar to scientific notation
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
may not accurately represent the system under examination
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
kind of programs that must coordinate with each other so that they do not get in each other's way
Question
The goal of a(n) ____________________ is to seek out vulnerabilities in a computer system so they can be removed before a malicious intruder discovers them and launches an attack.
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
an example of this kind of software is an air traffic control system
Question
____________________ software is software that may affect someone's ability if it fails to work properly.
Question
The term "____" is sometimes used as a general term for malware, but that is not the way it is used by computer professionals.

A) Trojan horse
B) spam
C) virus
D) hacking
Question
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is often the product of a full-blown vendetta or terrorism
Question
The philosophy of the modern ____ process is to prevent errors rather than discover them after they have occurred.

A) integration
B) differentiation
C) development
D) establishment
Question
What is a phishing scam? Provide an example.
Question
What is spyware?
Question
What are control programs? In terms of testing, how do they compare to ordinary programs?
Question
What is a zero day attack?
Question
What is a decision point?
Question
What does the misuse of the computer system involve? Provide an example.
Question
What is a rootkit?
Question
For what are floating point numbers useful in programming?
Question
What does the term real time mean?
Question
What is a worm?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Trust, Safety, and Reliability
1
____'s Law says that "adding people to a late project makes it later."

A) Moore
B) Brooks
C) Smith
D) Pascal
B
2
A(n) ____ point number is similar to scientific notation, used in the natural sciences.

A) floating
B) real
C) integral
D) prime
A
3
All of the following are examples of uses of safety-critical software EXCEPT the software associated with ____.

A) the braking system of automobiles
B) control processes within a nuclear power plant
C) patient monitoring software in an intensive care unit
D) timekeeping at a local elementary school
D
4
It is possible to roughly calculate the number of executions required to exhaustively test a program; to make this calculation, you need to understand the concept of ____ points.

A) process
B) decision
C) control
D) categorical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The standards of creating, testing, and maintaining ____ software are much stricter than other software, for obvious reasons.

A) contextual
B) encrypted
C) safety-critical
D) multiprocess
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
High-quality software requires a high-quality ____ system for reporting, documenting, and correcting problems when they happen.

A) backup
B) simulation
C) maintenance
D) redundancy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ programs control some sort of machinery.

A) Critical
B) Control
C) Multiprocess
D) Mechanized
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A rootkit is a piece of software that masquerades as an innocent, and perhaps useful, program, but that is actually designed for malicious purpose.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The methods employed by white hat hackers are the same as those employed by other hackers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The term hacker has always had a negative connotation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When it was first used, the term ____ was actually the cause of a hardware problem.

A) jot
B) bug
C) junk
D) spam
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The term multiprocess is used to refer to programs that may affect someone's safety if they fail to work properly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In the ____ phase of the software development process, programmers use the design to create code in an appropriate programming language.

A) requirements
B) ideation
C) language
D) implementation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Malicious software is often the product of ____.

A) terrorism
B) war
C) for-profit crime
D) Any of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ can be used many times under a multitude of conditions, and are very valuable for control systems particularly.

A) Real-world analysis
B) Simulations
C) Auxiliaries
D) Clones
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Stuxnet worm is clearly the most sophisticated worm to date.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The most obvious approach to making sure your program has no bugs is to ____ it.

A) test
B) invert
C) proofred
D) compile
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
For large projects, specialists called "____ engineers" interview clients to determine exactly what the system needs to do to best serve the clients.

A) command
B) notational
C) protocol
D) requirements
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In scientific notation, the number of ____ digits determines the position, while the number of digits in the scale factor determines the range of magnitudes.

A) floating
B) significant
C) indexed
D) encapsulated
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ is still one of the most important ways in which we attempt to ensure software reliability.

A) Proofreading
B) Control sourcing
C) Backpedalling
D) Testing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In a ____ scam, the recipient is instructed to click a Web link, which opens a Web page that requests an e-mail address and password.

A) phishing
B) tracking
C) pharming
D) spamming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
An anti-PowerPoint referendum may get on the ballot in the nation of ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a difficult kind of program to test
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The exploitation of a previously unknown vulnerability, so-called ____________________ attacks, are commonly the most dangerous and unexpected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The people who write and deploy malware commonly called ____.

A) jackers
B) hackers
C) slackers
D) trackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is useful and important, but can never be foolproof
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ language is a very low level language that is very similar to machine language.

A) Assembly
B) AECL
C) Natural
D) Recorded
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Most advances in the techniques or tools for software involve a gain of ____ to ____ percent in productivity or reliability

A) 5, 35
B) 1, 3
C) 50, 80
D) 7, 12
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ programs are particularly difficult to test because they are commonly multiprocess programs with real-time constraints.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
thousands of these can exist in a program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
phase that determines what the software must do
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a number that is similar to scientific notation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
may not accurately represent the system under examination
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
kind of programs that must coordinate with each other so that they do not get in each other's way
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The goal of a(n) ____________________ is to seek out vulnerabilities in a computer system so they can be removed before a malicious intruder discovers them and launches an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
an example of this kind of software is an air traffic control system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ software is software that may affect someone's ability if it fails to work properly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The term "____" is sometimes used as a general term for malware, but that is not the way it is used by computer professionals.

A) Trojan horse
B) spam
C) virus
D) hacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is often the product of a full-blown vendetta or terrorism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The philosophy of the modern ____ process is to prevent errors rather than discover them after they have occurred.

A) integration
B) differentiation
C) development
D) establishment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is a phishing scam? Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is spyware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are control programs? In terms of testing, how do they compare to ordinary programs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is a zero day attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is a decision point?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What does the misuse of the computer system involve? Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is a rootkit?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
For what are floating point numbers useful in programming?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What does the term real time mean?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a worm?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.