Quiz 3 SWE102 Quizlet
Quiz 3 SWE102 Quizlet
Name: Score:
Term 1 of 60
What are the three important classes of interface errors?
Select one or more:
a. Interface misunderstanding
b. Interface misuse
c. Timing errors.
d. Function error
a, c, e
a, b, c
a, c, d
a, b, d
Term 2 of 60
List some important factors that effect in maintenance cost
Select one or more:
a.Contractual responsibility
b.Staff skills
c.Team stability
d. Test data
a, c, d
b, c
a, b, c
a, b, d
1 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 3 of 60
What is infrastructure security?
Select one:
2 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 4 of 60
Match the key service standards with their description
WSDL
WS-BPEL
SOAP
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
which shows the key abstractions in the system as objects or object classes.
which shows the system hardware and how software components are distributed across
the processors in the system.
speed
Portability
Reliability
3 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
size
Ease of use
Robustness
4 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 5 of 60
Match the following measurements with their corresponding software properties
Processed transactions/second
Probability of unavailability
Training time
Incremental development
Incremental development
Waterfall
Waterfall
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
a, d, e
speed
Portability
5 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Reliability
size
Ease of use
Robustness
Term 6 of 60
Select the incorrect statements about program testing goals
Select one:
For generic software products, this means that there should be at least one test for
every requirement in the requirements document.
Defect testing is concerned with rooting out undesirable system behavior such as
system crashes, unwanted interactions with other systems, incorrect computations and
data corruption.
To demonstrate to the developer and the customer that the software meets its
requirements.
Term 7 of 60
Why might it sometimes be necessary to bypass the normal change management system and
make urgent changes to a system?
Select one:
Repair fault
Resist change
6 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 8 of 60
New versions of software systems are created as they change
Select one or more:
a. Tailored for particular user requirements
b. Development team
c. For different machines/OS
d. Offering different functionality
a, b, c
a, c, d
a, b, d
a, d, e
Term 9 of 60
List 4 design guidelines for secure systems engineering?
Select one or more:
a. Validate all inputs
b. Avoid a single point of failure.
c. Use redundancy and diversity to reduce risk.
d. Base security decisions on an explicit security policy.
e. Avoid using redundancy and diversity to reduce risk
a, c, e
a, b, c
a, b, c, d
a, c, d
7 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 10 of 60
Software systems are subject to continual change requests
Select one or more:
a. From developers
b. From market forces
c. From testers
d. From users
a, d, e
a, c, d
a, b, d
a, b, c
Term 11 of 60
What are Lehmanʼs Laws and how were they derived?
Select one:
8 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 12 of 60
Define the security terms 'threats'
Select one:
Circumstances that have potential to cause loss or harm. You can think of these as a
system vulnerability that is subjected to an attack.
An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage
The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.
Term 13 of 60
What are the three levels of protection that might be used in an information system?
Select one or more:
a. Application-level protection
b. Environment-level protection
c. Record-level protection
d. Platform-level protection
a, d, e
a, c, d
a, c, e
a, b, d
9 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 14 of 60
What are the strategic options for legacy system evolution?
Select one or more:
a. Show
b. Reengineer
c. Scrap
d. Preserve
b, c
a, c, e
a, b, c
a, c
Term 15 of 60
What may be included in a system release?
Select one or more:
a. Data files
b. Electronic and paper documentation, packaging and publicity
c. Analysis report of CCB
d. Configuration files
e. Change request form
a, b, c
a, d, e
a, b, d
b, c, e
10 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 16 of 60
What are the types of signature that may be used to relate source code files and their
equivalent object code in a build system?
Select one or more:
a. If the modification time of the object code is later than the modification time of the source
code file of the same name then these are related
b. a checksum is calculated from the source code text and explicitly associated with the
corresponding object code file
c. a checksum is calculated from the modification time of the source code file of the same
name then these are related
d. the modification time of the object code is calculated from the source code text and
explicitly associated with the corresponding object code file
a, b
b, c
a, d
a, c, d
Term 17 of 60
What are the three complementary strategies to achieve survivability?
Select one or more:
a. Resistance
b. Recognition
c. Conversion
d. Recovery
a, b, d
a, c, d
a, b, c
b, c
11 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 18 of 60
What are the principal stages of systems engineering?
Select one or more:
a. Operation
b. Validation
c. Procurement
d. Development
e. Specification
a, d, e
a, c, e
a, b, d
a, c, d
Term 19 of 60
What is the first stage in survivability analysis
Select one:
12 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 20 of 60
Briefly describe the different platforms that may be involved in a system building process?
Select one or more:
a. Build server, where source code is compiled and managed
b. Change history recording
c. Development system, where source code is created and edited
d. Assess the impact of proposed changes
e. Target environment, where the built system is executed
a, d, e
a, c, d
a, c, e
b, c, e
Term 21 of 60
Acceptance tests are normally conducted by the _________
Select one:
Test team
Developers
System engineers
End users
13 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 22 of 60
Which benefits of software engineering are?
Select one or more:
a. Speculative generality
b. Data clumping
c. Reduced cost
d. Reduced risk
a, b, d
b, c
c, d
Term 23 of 60
How to prevent maintenance by refactoring?
Select one:
Refactoring involves modifying a program to improve its structure, reduce its complexity
or make it easier to understand.
When you refactor a program, you should not add functionality but rather concentrate
on program improvement.
You can think of refactoring as 'preventative maintenance' that reduces the problems of
future change.
14 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 24 of 60
What three approaches may be used when designing test cases?
Select one or more:
a. Structural testing
b. Requirements-based testing
c. Partition testing
d. Functional testing
a, c, d
a, b, d
a, c, e
a, b, c
Term 25 of 60
Define the security terms 'vulnerability'
Select one:
An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage
The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.
15 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 26 of 60
What is the difference between a technical and a sociotechnical system?
Select one or more:
a. Technical systems are self-aware and include defined operational processes and
procedures. Sociotechnical systems include hardware and software components but not
procedures and processes
b. People are an inherent part of sociotechnical systems. The technical systems do not
c. Technical systems include hardware and software components but not procedures and
processes. Sociotechnical systems are self-aware and include defined operational processes
and procedures
d. People are an inherent part of technical systems. The sociotechnical systems do not
a, b, c
b, c
a, c, e
a, c
Term 27 of 60
What are the main drivers for system procurement decisions?
Select one or more:
a. External competition
b. Operator reliability
c. Hardware reliability
d. Business re-organization
e. The need to comply with external regulations
a, b, c
a, c, e
a, d, e
a, c, d
16 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 28 of 60
What are the correct statements about system changes?
Select one:
For custom systems, the costs of software maintenance usually exceed the software
development costs.
Lehman's laws, such as the notion that change is continuous, describe a number of
insights derived from long-term studies of system evolution.
The process of software evolution is driven by requests for changes and includes
change impact analysis, release planning and change implementation.
Term 29 of 60
Which cost factors are affected in software maintenance?
Select one or more:
a. Contractual responsibility
b. Number of requests for corrective maintenance
c. Number of outstanding change requests
d. Staff skills
a, b
a, b, d
b, c
a, d
17 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 30 of 60
Match the following statement with their corresponding requirement types
Statements of services the system should provide, how the system should react to particular
inputs and how the system should behave in particular situations.
Often apply to the system as a whole rather than individual features or services.
Constraints on the services or functions offered by the system such as timing constraints,
constraints on the development process, standards, etc.
Incremental development
Incremental development
Waterfall
Waterfall
Domain requirements
Functional requirements
Non-functional requirements
Functional requirements
Non-functional requirements
18 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
19 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 31 of 60
Match the following disadvantage with their corresponding development methods
Incremental development
Incremental development
Waterfall
Waterfall
Domain requirements
Functional requirements
Non-functional requirements
Functional requirements
Non-functional requirements
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
20 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
speed
Portability
Reliability
size
Ease of use
Robustness
Term 32 of 60
What are the stages in the system evolution process and what triggers that process?
Select one or more:
a. Change implementation
b. Reverse engineering
c. Maintenance fault
d. Release planning
e. Impact analysis
a, d, e
a, b, c
a, b, d
a, c
21 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 33 of 60
The best reason for using Independent software test teams is that
Select one:
Testers do not get involved with the project until testing begins
22 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 34 of 60
Complete the Agile manifesto bellow
Incremental development
Incremental development
Waterfall
Waterfall
comprehensive documentation
contract negotiation
following a plan
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
23 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 35 of 60
What are the different types of software maintenance?
Select one or more:
a. Maintenance to add to people into current system
b. Maintenance to adapt the software to a different environment
c. Maintenance to repair software faults
d. Maintenance to adapt the software to a different software development
e. Maintenance to add to or modify the systemʼs functionality
a, c, d
a, c, e
b, c, e
a, b, c
Term 36 of 60
Why is software evolution important?
Select one:
They were derived from studies of the growth and evolution of a number of large
software systems
24 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 37 of 60
Define the security terms 'attack'
Select one:
An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage
The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.
Term 38 of 60
Why are sociotechnical systems non-deterministic?
Select one or more:
a. The true nature of the problem only emerges when the solution is developed
b. they include people whose behaviour may change from
c. changes to the hardware, software and data in these systems is so frequent
d. different parts of the system are developed by different groups at the same time and plans
are needed to coordinate their activities
a, b
a, d
b, c
a, b, c
25 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 39 of 60
What are the two complementary goals of the testing process?
Select one or more:
a. To discover faults or defects in the software.
b. To fix faults or defects in the software
c. To demonstrate that the software meets its requirements
a, b, c
a, c, e
b, c
a, c
Term 40 of 60
What is the purpose of defect testing?
Select one:
Term 41 of 60
What is a release?
Select one:
An instance of a system which is functionally distinct in some way from other system
instances
26 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 42 of 60
What are the objectives of change management procedures?
Select one or more:
a. Analyzing the costs and benefits of proposed changes
b. Approving changes that are worthwhile
c. Tracking which components of the system have been changed
d. To prevent customer requirement change
b, c, e
a, b, d
a, d, e
a, b, c
Term 43 of 60
What is the normal order of activities in which software testing process is organized?
1. Prepare test data
2. Design test cases
3. Run program with test data
4. Compare results to test cases
Select one:
3, 1, 4, 2
2, 1, 3, 4
4, 2, 3, 1
1, 4, 3, 2
27 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 44 of 60
Who review and approve the change requests?
Select one:
General director
Project director
Project manager
Term 45 of 60
What is the common limitation of automated testing?
Select one:
It is very difficult for automated scripts to verify a wide range of application responses
Term 46 of 60
Why are plan-driven processes used in systems engineering?
Select one:
they include people whose behaviour may change from day to day
28 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 47 of 60
Select the incorrect statements about Inspections and testing
Select one:
Inspections can check conformance with a specification but not conformance with the
customer's real requirements.
Inspections and testing are complementary and not opposing verification techniques.
29 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 48 of 60
Match the following properties with their corresponding development methods
More rapid delivery and deployment of useful software to the customer is possible.
This model is mostly used for large systems engineering projects where a system is developed
at several sites.
It is easier to get customer feedback on the development work that has been done.
Inflexible partitioning of the project into distinct stages makes it difficult to respond to
changing customer requirements.
Hardware devices, some of which may be computers. Most devices will include an
embedded system of some kind.
A set of processes involving people and computer systems that support the activities of
the business.
Higher level strategic business activities that affect the operation of the system.
Domain requirements
Functional requirements
Non-functional requirements
Functional requirements
Non-functional requirements
30 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
speed
Portability
Reliability
size
Ease of use
Robustness
Term 49 of 60
What is application security?
Select one:
31 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 50 of 60
What are the principal systems re-engineering activities?
Select one or more:
a. Program modularisation
b. System release
c. Data re-engineering
d. Release planning
e. Reverse engineering
a, c, d
a, b, c
a, c, e
a, d, e
Term 51 of 60
How are deltas used in a storage management system that is part of a version management
system?
Select one:
Store the differences between the most recent version and the created component
Store the differences between the first version and the created component
Store the differences between the first version and the last version component
32 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 52 of 60
Which type of test would you perform to accept a build?
Select one:
Beta test
Functional test
Automated test
Term 53 of 60
What tests should be included in object class testing?
Select one or more:
a. Tests that set and access all object attributes
b. Tests that force the object into all possible states
c. Tests for all operations in isolation
d. Test the associations of the objects with the others
a, c, e
a, b, c, d
a, b, c
a, c, d
Term 54 of 60
When software configuration management is a formal activity, the software configuration audit
is conducted by the
Select one:
Development team
Testing specialists
Senior managers
33 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 55 of 60
What does security risk management involve?
Select one or more:
a. Operational Risks assessment
b. Life cycle risk assessment
c. Preliminary risk assessment
a, d
c, d
b, c
a, c
34 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 56 of 60
Match the following Reengineering process activities with their corresponding description
Reverse engineering
Program modularisation
Data reengineering
speed
Portability
Reliability
size
Ease of use
35 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Robustness
Incremental development
Waterfall
Incremental development
Incremental development
Waterfall
Term 57 of 60
What is a version?
Select one:
An instance of a system which is functionally distinct in some way from other system
instances
36 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 58 of 60
What are influences on the reliability of a system?
Select one or more:
a. Social reliability
b. Operator reliability
c. Software reliability
d. Business reliability
e. Hardware reliability
a, c, d
a, d, e
a, c, e
b, c, e
37 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 59 of 60
What are 4 view model of software architecture?
A process view
A development view
A logical view
A physical view
b, c
which shows the key abstractions in the system as objects or object classes.
which shows the system hardware and how software components are distributed across
the processors in the system.
a, b, d
a, c, d
38 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Term 60 of 60
Match the following Layers in the STS stack with their corresponding descriptions
Equipment
Business processes
Organizations
Application systems
Operating system
Incremental development
Incremental development
Waterfall
Waterfall
speed
Portability
Reliability
size
Ease of use
Robustness
Incremental development
Waterfall
39 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...
Incremental development
Incremental development
Waterfall
Hardware devices, some of which may be computers. Most devices will include an
embedded system of some kind.
A set of processes involving people and computer systems that support the activities of
the business.
Higher level strategic business activities that affect the operation of the system.
40 of 40 5/23/2024, 11:35 PM