Deck 5: Trust, Safety, and Reliability
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 5: Trust, Safety, and Reliability
1
____'s Law says that "adding people to a late project makes it later."
A) Moore
B) Brooks
C) Smith
D) Pascal
A) Moore
B) Brooks
C) Smith
D) Pascal
B
2
A(n) ____ point number is similar to scientific notation, used in the natural sciences.
A) floating
B) real
C) integral
D) prime
A) floating
B) real
C) integral
D) prime
A
3
All of the following are examples of uses of safety-critical software EXCEPT the software associated with ____.
A) the braking system of automobiles
B) control processes within a nuclear power plant
C) patient monitoring software in an intensive care unit
D) timekeeping at a local elementary school
A) the braking system of automobiles
B) control processes within a nuclear power plant
C) patient monitoring software in an intensive care unit
D) timekeeping at a local elementary school
D
4
It is possible to roughly calculate the number of executions required to exhaustively test a program; to make this calculation, you need to understand the concept of ____ points.
A) process
B) decision
C) control
D) categorical
A) process
B) decision
C) control
D) categorical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The standards of creating, testing, and maintaining ____ software are much stricter than other software, for obvious reasons.
A) contextual
B) encrypted
C) safety-critical
D) multiprocess
A) contextual
B) encrypted
C) safety-critical
D) multiprocess
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
High-quality software requires a high-quality ____ system for reporting, documenting, and correcting problems when they happen.
A) backup
B) simulation
C) maintenance
D) redundancy
A) backup
B) simulation
C) maintenance
D) redundancy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
____ programs control some sort of machinery.
A) Critical
B) Control
C) Multiprocess
D) Mechanized
A) Critical
B) Control
C) Multiprocess
D) Mechanized
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A rootkit is a piece of software that masquerades as an innocent, and perhaps useful, program, but that is actually designed for malicious purpose.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The methods employed by white hat hackers are the same as those employed by other hackers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The term hacker has always had a negative connotation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When it was first used, the term ____ was actually the cause of a hardware problem.
A) jot
B) bug
C) junk
D) spam
A) jot
B) bug
C) junk
D) spam
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The term multiprocess is used to refer to programs that may affect someone's safety if they fail to work properly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In the ____ phase of the software development process, programmers use the design to create code in an appropriate programming language.
A) requirements
B) ideation
C) language
D) implementation
A) requirements
B) ideation
C) language
D) implementation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Malicious software is often the product of ____.
A) terrorism
B) war
C) for-profit crime
D) Any of the above
A) terrorism
B) war
C) for-profit crime
D) Any of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ can be used many times under a multitude of conditions, and are very valuable for control systems particularly.
A) Real-world analysis
B) Simulations
C) Auxiliaries
D) Clones
A) Real-world analysis
B) Simulations
C) Auxiliaries
D) Clones
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Stuxnet worm is clearly the most sophisticated worm to date.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The most obvious approach to making sure your program has no bugs is to ____ it.
A) test
B) invert
C) proofred
D) compile
A) test
B) invert
C) proofred
D) compile
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
For large projects, specialists called "____ engineers" interview clients to determine exactly what the system needs to do to best serve the clients.
A) command
B) notational
C) protocol
D) requirements
A) command
B) notational
C) protocol
D) requirements
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In scientific notation, the number of ____ digits determines the position, while the number of digits in the scale factor determines the range of magnitudes.
A) floating
B) significant
C) indexed
D) encapsulated
A) floating
B) significant
C) indexed
D) encapsulated
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ is still one of the most important ways in which we attempt to ensure software reliability.
A) Proofreading
B) Control sourcing
C) Backpedalling
D) Testing
A) Proofreading
B) Control sourcing
C) Backpedalling
D) Testing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In a ____ scam, the recipient is instructed to click a Web link, which opens a Web page that requests an e-mail address and password.
A) phishing
B) tracking
C) pharming
D) spamming
A) phishing
B) tracking
C) pharming
D) spamming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
An anti-PowerPoint referendum may get on the ballot in the nation of ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a difficult kind of program to test
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a difficult kind of program to test
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The exploitation of a previously unknown vulnerability, so-called ____________________ attacks, are commonly the most dangerous and unexpected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The people who write and deploy malware commonly called ____.
A) jackers
B) hackers
C) slackers
D) trackers
A) jackers
B) hackers
C) slackers
D) trackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is useful and important, but can never be foolproof
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is useful and important, but can never be foolproof
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____ language is a very low level language that is very similar to machine language.
A) Assembly
B) AECL
C) Natural
D) Recorded
A) Assembly
B) AECL
C) Natural
D) Recorded
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Most advances in the techniques or tools for software involve a gain of ____ to ____ percent in productivity or reliability
A) 5, 35
B) 1, 3
C) 50, 80
D) 7, 12
A) 5, 35
B) 1, 3
C) 50, 80
D) 7, 12
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ programs are particularly difficult to test because they are commonly multiprocess programs with real-time constraints.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
thousands of these can exist in a program
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
thousands of these can exist in a program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
phase that determines what the software must do
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
phase that determines what the software must do
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a number that is similar to scientific notation
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
a number that is similar to scientific notation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
may not accurately represent the system under examination
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
may not accurately represent the system under examination
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
kind of programs that must coordinate with each other so that they do not get in each other's way
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
kind of programs that must coordinate with each other so that they do not get in each other's way
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The goal of a(n) ____________________ is to seek out vulnerabilities in a computer system so they can be removed before a malicious intruder discovers them and launches an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
an example of this kind of software is an air traffic control system
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
an example of this kind of software is an air traffic control system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ software is software that may affect someone's ability if it fails to work properly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The term "____" is sometimes used as a general term for malware, but that is not the way it is used by computer professionals.
A) Trojan horse
B) spam
C) virus
D) hacking
A) Trojan horse
B) spam
C) virus
D) hacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is often the product of a full-blown vendetta or terrorism
a.multiprocess
f.safety-critical
b.control
g.decision point
c.requirements
h.floating point
d.testing
i.malicious software
e.simulations
is often the product of a full-blown vendetta or terrorism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The philosophy of the modern ____ process is to prevent errors rather than discover them after they have occurred.
A) integration
B) differentiation
C) development
D) establishment
A) integration
B) differentiation
C) development
D) establishment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is a phishing scam? Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is spyware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are control programs? In terms of testing, how do they compare to ordinary programs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is a zero day attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is a decision point?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What does the misuse of the computer system involve? Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is a rootkit?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
For what are floating point numbers useful in programming?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What does the term real time mean?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is a worm?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck