Deck 10: Application Development

Full screen (f)
exit full mode
Question
Unlike 2GL programs, 3GL programs must be translated into binary CPU instructions before the program is executed.
Use Space or
up arrow
down arrow
to flip the card.
Question
The main advantage of compilation over interpretation is that it offers the flexibility to incorporate new or updated code into an application program.
Question
Java bytecode programs usually run 10 times faster than native applications.
Question
A CPU BRANCH instruction requires two operands, one containing the address of another instruction and one containing the address of the previous instruction.
Question
Compiler output is called source code.
Question
Source and object code files are compiled and linked as a whole.
Question
Class models and other types of diagrams document user and system requirements.
Question
A symbolic debugger uses the symbol table, memory map, and source code files to trace memory addresses to specific source code statements and variables.
Question
With scripting languages, programmers can assemble application software rapidly by "gluing" together the capabilities of many other programs.
Question
The process of designing and constructing software translates users' information-processing needs into CPU instructions that, when executed, address these needs.
Question
The most comprehensive CASE tools automate the process of deploying working systems from analysis and design models.
Question
The main disadvantage of compiling and linking compared with interpretation is increased memory and CPU requirements during program execution.
Question
Programming languages, program translation tools, and debugging tools address only the implementation discipline of the Unified Process.
Question
Debugging and tracing cannot be done on machine code or OS service calls.
Question
Reduced productivity, dissatisfied customers, and poor managerial decisions are just a few indirect costs of software that doesn't address users' needs completely or correctly.
Question
Software has surpassed hardware to become the most costly component of most information systems.
Question
C++ was the first commercial OOP language.
Question
UP design models include package diagrams, interaction diagrams, and deployment diagrams.
Question
User needs are stated in general or abstract terms in basic computer language.
Question
A 5GL program contains nonprocedural rules that mimic the rules people use to solve problems.
Question
____ linking is performed during program loading or execution.

A) Dynamic
B) Static
C) Early
D) Objective
Question
____ perform design activities to create models that produce an architectural blueprint for system implementation.

A) System developers
B) System architects
C) System managers
D) System engineers
Question
​____ are integrated collections of models, tools, techniques, and processes.

A) Software models​
B) ​Development strategies
C) ​Development tools
D) ​Development methodologies
Question
Program instructions are sometimes called ____.

A) bytes
B) bits
C) languages
D) code
Question
A(n) ____ is a placeholder for missing executable code.

A) external function call
B) internal function call
C) function header
D) reference function call
Question
A(n) ____ enables programmers to develop applications that do most of their work by calling other applications and system software.

A) compiled language
B) interpreted language
C) functional language
D) scripting language
Question
A(n) ____ searches an object code file for external function calls.

A) compiler
B) parser
C) link editor
D) interpreter
Question
____ specify detailed blueprints for software component construction and the interaction between software components and users.

A) Layout models
B) Interaction models
C) Design models
D) Data models
Question
A ____ is a request to execute a specific method and return a response.

A) conduit
B) message
C) path
D) function
Question
A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.

A) fifth-generation language
B) fourth-generation language
C) third-generation language
D) second-generation language
Question
A ____ defines the name and data type of program variables.

A) function declaration
B) class declaration
C) data declaration
D) method declaration
Question
A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.

A) next-generation language
B) next-generation language
C) third-generation language
D) fifth-generation language
Question
A(n) ____ reads a single source code instruction, translates it into CPU instructions or a DLL call, and executes the instructions or DLL call immediately, before the next program statement is read.

A) compiler
B) interpreter
C) parser
D) link editor
Question
Today, the term ____ is often used to describe a mnemonic representing a data item's memory address.

A) constant
B) instruction
C) literal
D) variable
Question
____ models provide the detail needed to develop a system that meets users' needs.

A) System planning
B) System requirements
C) System development
D) System design
Question
The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.

A) instruction explosion
B) instruction expansion
C) mnemonic explosion
D) instruction compression
Question
Binary CPU instructions, called ____, are the earliest programming languages.

A) base-generation languages
B) first-generation languages
C) third-generation languages
D) fourth-generation languages
Question
____ programming languages guarantee program portability between other OSs and application programs.

A) Standard
B) Interpreted
C) Scripted
D) Proprietary
Question
A ____ is any instruction, such as an assignment statement or a computation that updates or computes a data value.

A) data function
B) data operation
C) data declaration
D) control structure
Question
A ____ is a source code instruction that controls the execution of other source code instructions.

A) data declaration
B) control structure
C) data operation
D) function call
Question
In OOP, objects contain data and programs or procedures, called ____________________, that manipulate the data.
Question
The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.

A) computer-generated software development
B) computer-assisted software development
C) computer-assisted system engineering
D) computer-assisted software engineering
Question
The person who writes code is called a(n) ____________________.
Question
____________________ code is stored in a file, such as an .exe file in Windows, and contains CPU instructions that are ready for an OS to load and execute.
Question
A(n) ____ is a collection of automated support tools to speed development and testing.

A) integrated development environment
B) linker
C) graphical development environment
D) system development environment
Question
A tool suite that primarily supports model development is sometimes called a ____ tool.

A) front-end CASE
B) back-end CASE
C) mid-tier CASE
D) late-bound CASE
Question
____ are those compiled and linked for a particular CPU and OS.

A) Compiled applications
B) Interpreted applications
C) Native applications
D) Intermediate applications
Question
A second-generation language (2GL) is more commonly known as a(n) ____________________ language.
Question
​A(n) ____________________ is a program that translates an assembly-language program into binary CPU instructions.
Question
The term ____________________ is used to describe a mnemonic representing a program instruction's memory address.
Question
____ tools generate program and other source code from models, compile and link the programs, create databases, and create, register, and install all components.

A) CAD
B) CASE
C) CADE
D) CASD
Question
A Java compiler or interpreter translates Java source code into machine instructions and service routine calls for a hypothetical computer and OS called the ____.

A) Java Intermediate Machine
B) Java Internal Machine
C) Java Virtual Medium
D) Java Virtual Machine
Question
​SQL is a(n) ____________________ language because it describes a processing requirement without specifying a procedure for satisfying the requirement.
Question
A program's ____ version omits the symbol table and debugging checkpoints to reduce program size and increase execution speed.

A) production
B) debug
C) developer
D) reference
Question
A compiler keeps an internal table, called a(n) ____________________, to keep track of data names, types, and assigned memory addresses.
Question
A tool suite that primarily supports application development based on specific analysis and design models is sometimes called a(n) ____ tool.

A) early-bound CASE
B) front-end CASE
C) back-end CASE
D) mid-tier CASE
Question
____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.

A) C++
B) Visual Basic
C) Java
D) C#
Question
​____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.
Question
Developers attempt to minimize errors by using proven development ____________________.
Question
A Java ____ runs inside another program, such as a Web browser, and performs functions such as accepting user input and displaying forms and images.

A) application
B) applet
C) servlet
D) bean
Question
A(n) ____________________ provides extensive security controls to prevent programs from accessing unauthorized resources or damaging the hardware, OS, or file system.
Question
With ____________________, programmers can reuse source and executable code, thus speeding up application development.
Question
A(n) ____________________ is an automated tool for testing executable programs.
Question
​List two capabilities of a symbolic debugger.
Question
​A(n) ____________________ is a file containing related executable functions and an index of the library contents.
Question
Why has changed as a result of hardware cost declining over time as a proportion of total system costs?
Question
Why were fourth-generation languages developed?
Question
What are factors have caused Java's popularity to far exceed most initial expectations?
Question
What does a programming language define?
Question
____________________ assist programmers in writing syntactically correct code by verifying syntax as the code is being typed and highlighting errors.
Question
A(n) ____________________ instruction transfers control to the first instruction in a function.
Question
Instructions and library calls to the JVM are called Java "____________________."
Question
List three components that an integrated development environment generally includes.
Question
A(n) ____________________ lists the memory location of every function and program variable, and a programmer can use it to trace error messages containing memory addresses to corresponding program statements and variables.
Question
A Java ____________________ runs in a Web server and performs functions such as calculations, database access, and creation of Web pages that are transmitted to a Web browser for display.
Question
An executable program containing symbol table entries and debugging checkpoints is sometimes called a(n) ____________________ version.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/76
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Application Development
1
Unlike 2GL programs, 3GL programs must be translated into binary CPU instructions before the program is executed.
False
2
The main advantage of compilation over interpretation is that it offers the flexibility to incorporate new or updated code into an application program.
False
3
Java bytecode programs usually run 10 times faster than native applications.
False
4
A CPU BRANCH instruction requires two operands, one containing the address of another instruction and one containing the address of the previous instruction.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
5
Compiler output is called source code.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
6
Source and object code files are compiled and linked as a whole.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
7
Class models and other types of diagrams document user and system requirements.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
8
A symbolic debugger uses the symbol table, memory map, and source code files to trace memory addresses to specific source code statements and variables.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
9
With scripting languages, programmers can assemble application software rapidly by "gluing" together the capabilities of many other programs.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
10
The process of designing and constructing software translates users' information-processing needs into CPU instructions that, when executed, address these needs.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
11
The most comprehensive CASE tools automate the process of deploying working systems from analysis and design models.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
12
The main disadvantage of compiling and linking compared with interpretation is increased memory and CPU requirements during program execution.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
13
Programming languages, program translation tools, and debugging tools address only the implementation discipline of the Unified Process.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
14
Debugging and tracing cannot be done on machine code or OS service calls.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
15
Reduced productivity, dissatisfied customers, and poor managerial decisions are just a few indirect costs of software that doesn't address users' needs completely or correctly.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
16
Software has surpassed hardware to become the most costly component of most information systems.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
17
C++ was the first commercial OOP language.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
18
UP design models include package diagrams, interaction diagrams, and deployment diagrams.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
19
User needs are stated in general or abstract terms in basic computer language.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
20
A 5GL program contains nonprocedural rules that mimic the rules people use to solve problems.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
21
____ linking is performed during program loading or execution.

A) Dynamic
B) Static
C) Early
D) Objective
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
22
____ perform design activities to create models that produce an architectural blueprint for system implementation.

A) System developers
B) System architects
C) System managers
D) System engineers
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
23
​____ are integrated collections of models, tools, techniques, and processes.

A) Software models​
B) ​Development strategies
C) ​Development tools
D) ​Development methodologies
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
24
Program instructions are sometimes called ____.

A) bytes
B) bits
C) languages
D) code
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ is a placeholder for missing executable code.

A) external function call
B) internal function call
C) function header
D) reference function call
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) ____ enables programmers to develop applications that do most of their work by calling other applications and system software.

A) compiled language
B) interpreted language
C) functional language
D) scripting language
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ searches an object code file for external function calls.

A) compiler
B) parser
C) link editor
D) interpreter
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
28
____ specify detailed blueprints for software component construction and the interaction between software components and users.

A) Layout models
B) Interaction models
C) Design models
D) Data models
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ is a request to execute a specific method and return a response.

A) conduit
B) message
C) path
D) function
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ is a nonprocedural language suitable for developing software that mimics human intelligence.

A) fifth-generation language
B) fourth-generation language
C) third-generation language
D) second-generation language
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
31
A ____ defines the name and data type of program variables.

A) function declaration
B) class declaration
C) data declaration
D) method declaration
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.

A) next-generation language
B) next-generation language
C) third-generation language
D) fifth-generation language
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ____ reads a single source code instruction, translates it into CPU instructions or a DLL call, and executes the instructions or DLL call immediately, before the next program statement is read.

A) compiler
B) interpreter
C) parser
D) link editor
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
34
Today, the term ____ is often used to describe a mnemonic representing a data item's memory address.

A) constant
B) instruction
C) literal
D) variable
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
35
____ models provide the detail needed to develop a system that meets users' needs.

A) System planning
B) System requirements
C) System development
D) System design
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
36
The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.

A) instruction explosion
B) instruction expansion
C) mnemonic explosion
D) instruction compression
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
37
Binary CPU instructions, called ____, are the earliest programming languages.

A) base-generation languages
B) first-generation languages
C) third-generation languages
D) fourth-generation languages
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
38
____ programming languages guarantee program portability between other OSs and application programs.

A) Standard
B) Interpreted
C) Scripted
D) Proprietary
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
39
A ____ is any instruction, such as an assignment statement or a computation that updates or computes a data value.

A) data function
B) data operation
C) data declaration
D) control structure
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
40
A ____ is a source code instruction that controls the execution of other source code instructions.

A) data declaration
B) control structure
C) data operation
D) function call
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
41
In OOP, objects contain data and programs or procedures, called ____________________, that manipulate the data.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
42
The term ____ tool usually refers to a tool that supports the UP requirements and design disciplines.

A) computer-generated software development
B) computer-assisted software development
C) computer-assisted system engineering
D) computer-assisted software engineering
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
43
The person who writes code is called a(n) ____________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
44
____________________ code is stored in a file, such as an .exe file in Windows, and contains CPU instructions that are ready for an OS to load and execute.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ____ is a collection of automated support tools to speed development and testing.

A) integrated development environment
B) linker
C) graphical development environment
D) system development environment
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
46
A tool suite that primarily supports model development is sometimes called a ____ tool.

A) front-end CASE
B) back-end CASE
C) mid-tier CASE
D) late-bound CASE
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
47
____ are those compiled and linked for a particular CPU and OS.

A) Compiled applications
B) Interpreted applications
C) Native applications
D) Intermediate applications
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
48
A second-generation language (2GL) is more commonly known as a(n) ____________________ language.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
49
​A(n) ____________________ is a program that translates an assembly-language program into binary CPU instructions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
50
The term ____________________ is used to describe a mnemonic representing a program instruction's memory address.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
51
____ tools generate program and other source code from models, compile and link the programs, create databases, and create, register, and install all components.

A) CAD
B) CASE
C) CADE
D) CASD
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
52
A Java compiler or interpreter translates Java source code into machine instructions and service routine calls for a hypothetical computer and OS called the ____.

A) Java Intermediate Machine
B) Java Internal Machine
C) Java Virtual Medium
D) Java Virtual Machine
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
53
​SQL is a(n) ____________________ language because it describes a processing requirement without specifying a procedure for satisfying the requirement.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
54
A program's ____ version omits the symbol table and debugging checkpoints to reduce program size and increase execution speed.

A) production
B) debug
C) developer
D) reference
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
55
A compiler keeps an internal table, called a(n) ____________________, to keep track of data names, types, and assigned memory addresses.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
56
A tool suite that primarily supports application development based on specific analysis and design models is sometimes called a(n) ____ tool.

A) early-bound CASE
B) front-end CASE
C) back-end CASE
D) mid-tier CASE
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
57
____ is an OOP language and program execution environment developed by Sun Microsystems during the early and mid-1990s.

A) C++
B) Visual Basic
C) Java
D) C#
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
58
​____________________ are detailed, precise statements of formal logic written as sequences of CPU instructions.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
59
Developers attempt to minimize errors by using proven development ____________________.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
60
A Java ____ runs inside another program, such as a Web browser, and performs functions such as accepting user input and displaying forms and images.

A) application
B) applet
C) servlet
D) bean
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
61
A(n) ____________________ provides extensive security controls to prevent programs from accessing unauthorized resources or damaging the hardware, OS, or file system.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
62
With ____________________, programmers can reuse source and executable code, thus speeding up application development.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) ____________________ is an automated tool for testing executable programs.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
64
​List two capabilities of a symbolic debugger.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
65
​A(n) ____________________ is a file containing related executable functions and an index of the library contents.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
66
Why has changed as a result of hardware cost declining over time as a proportion of total system costs?
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
67
Why were fourth-generation languages developed?
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
68
What are factors have caused Java's popularity to far exceed most initial expectations?
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
69
What does a programming language define?
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
70
____________________ assist programmers in writing syntactically correct code by verifying syntax as the code is being typed and highlighting errors.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) ____________________ instruction transfers control to the first instruction in a function.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
72
Instructions and library calls to the JVM are called Java "____________________."
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
73
List three components that an integrated development environment generally includes.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ____________________ lists the memory location of every function and program variable, and a programmer can use it to trace error messages containing memory addresses to corresponding program statements and variables.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
75
A Java ____________________ runs in a Web server and performs functions such as calculations, database access, and creation of Web pages that are transmitted to a Web browser for display.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
76
An executable program containing symbol table entries and debugging checkpoints is sometimes called a(n) ____________________ version.
Unlock Deck
Unlock for access to all 76 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 76 flashcards in this deck.