Q1. In a communication diagram, a(n) sequence number indicates the order of the messages.
a. true
b. false
Q2. A(n) method signature shows all of the information needed to invoke, or call, the method.
a. true
b. false
Q3. A detailed sequence diagram should only include classes that are listed in the use case preconditions and postconditions.
a. true
b. false
Q4. A combination of prototyping and model building is the most effective approach for building systems.
a. true
b. false
Q5. Communication diagrams and sequence diagrams capture different types of information.
a. true
b. false
Q6. CRC cards are index cards that are used to document the classes in a system, the ways the classes collaborate, and the responsibility for each class for each use case collaboration.
a. true
b. false
Q7. In design class notation, a(n) plus sign indicates that an attribute is private.
a. true
b. false
Q8. ____ are classes that system designers create to serve as a collection point for incoming messages.
a. Persistent classes
b. Use case controllers
c. Control classes
d. Links
Q9. ____ is an advanced database tool to access databases from Web pages.
a. HTML
b. XML
c. Cold Fusion
d. JavaScript
Q10. Designers often sketch statechart fragments to illustrate a single control process in the system.
a. true
b. false
Q11. It is difficult to limit changes to a(n) adapter class.
a. true
b. false
Q12. In a three-layer Java-based architecture, the Java servlet identified for the input form can be the ____ that distributes input messages.
a. application server processor
b. use case controller
c. code behind object
d. compiler
Q13. A(n) two-layer architecture is appropriate for systems that need to support multiple user interfaces, both Internet-based and network-based.
a. true
b. false
Q14. A Web page can be depicted in an implementation diagram by a frameset and stereotype.
a. true
b. false
Q15. The code to implement the singleton pattern is complex.
a. true
b. false
Q16. Key attributes may be natural or invented.
a. true
b. false
Q17. Administrators access the physical store of a DBMS directly.
a. true
b. false
Q18. Using internally invented keys is the safest long-term strategy in most cases.
a. true
b. false
Q19. In a relational database, the uniqueness of rows within a table is guaranteed if the primary key is unique.
a. true
b. false
Q20. Invented keys cannot be externally assigned.
a. true
b. false
Q21. Declaring an association as a(n) ____ allows the ODBMS to allocate as many object identifier attributes of one object type to each object of the other type as are needed to represent association instances.
a. primary key
b. attribute
c. complex type
d. set
Q22. The ODMG standards are the basis of the JDO standards, as well as some interfaces between ODBMSs and the C++ and SmallTalk programming language ...
Q1. In a communication diagram, a(n) sequence number indicates the.docx
1. Q1. In a communication diagram, a(n) sequence number
indicates the order of the messages.
a. true
b. false
Q2. A(n) method signature shows all of the information needed
to invoke, or call, the method.
a. true
b. false
Q3. A detailed sequence diagram should only include classes
that are listed in the use case preconditions and postconditions.
a. true
b. false
Q4. A combination of prototyping and model building is the
most effective approach for building systems.
a. true
b. false
Q5. Communication diagrams and sequence diagrams capture
different types of information.
a. true
b. false
Q6. CRC cards are index cards that are used to document the
classes in a system, the ways the classes collaborate, and the
responsibility for each class for each use case collaboration.
a. true
b. false
Q7. In design class notation, a(n) plus sign indicates that an
attribute is private.
a. true
2. b. false
Q8. ____ are classes that system designers create to serve as a
collection point for incoming messages.
a. Persistent classes
b. Use case controllers
c. Control classes
d. Links
Q9. ____ is an advanced database tool to access databases from
Web pages.
a. HTML
b. XML
c. Cold Fusion
d. JavaScript
Q10. Designers often sketch statechart fragments to illustrate a
single control process in the system.
a. true
b. false
Q11. It is difficult to limit changes to a(n) adapter class.
a. true
b. false
Q12. In a three-layer Java-based architecture, the Java servlet
identified for the input form can be the ____ that distributes
input messages.
a. application server processor
b. use case controller
c. code behind object
d. compiler
Q13. A(n) two-layer architecture is appropriate for systems that
need to support multiple user interfaces, both Internet-based and
network-based.
3. a. true
b. false
Q14. A Web page can be depicted in an implementation diagram
by a frameset and stereotype.
a. true
b. false
Q15. The code to implement the singleton pattern is complex.
a. true
b. false
Q16. Key attributes may be natural or invented.
a. true
b. false
Q17. Administrators access the physical store of a DBMS
directly.
a. true
b. false
Q18. Using internally invented keys is the safest long-term
strategy in most cases.
a. true
b. false
Q19. In a relational database, the uniqueness of rows within a
table is guaranteed if the primary key is unique.
a. true
b. false
Q20. Invented keys cannot be externally assigned.
a. true
b. false
Q21. Declaring an association as a(n) ____ allows the ODBMS
4. to allocate as many object identifier attributes of one object
type to each object of the other type as are needed to represent
association instances.
a. primary key
b. attribute
c. complex type
d. set
Q22. The ODMG standards are the basis of the JDO standards,
as well as some interfaces between ODBMSs and the C++ and
SmallTalk programming languages.
a. true
b. false
Q23. When designing for the computer medium, design for low
bandwidth.
a. true
b. false
Q24. Easy-to-learn interfaces are appropriate for office workers
that use a system all day.
a. true
b. false
Q25. _____ first emphasized the benefits of consistency in the
1980s.
a. Microsoft Windows
b. Apple Macintosh
c. Xerox PARC
d. IBM mainframes
Q26. In most system development projects, analysts design
system interfaces and user interfaces together because the two
types require similar expertise and technology.
a. true
b. false
5. Q27. After identifying all required dialogs, the designers must
document the dialogs.
a. true
b. false
Q28. Designers should include Cancel buttons on all dialog
boxes to allow users to go back one step at any time.
a. true
b. false
Q29. The object-oriented approach to user-centered design
focuses on users and their work by identifying actors, use cases,
and scenarios followed when using the system..
a. true
b. false
Q30. A(n) access control is an integrity control to validate the
input data for correctness and appropriateness.
a. true
b. false
Q31. ____ is the process of determining whether a user is
permitted to have access to the system and data.
a. Authentication
b. Certification
c. Authorization
d. Encryption
Q32. ____ is a technique to link a summary field to its
supporting detail and enable users to view the detail
dynamically.
a. Drill down
b. Transaction logging
c. Encryption
d. Ad hoc
6. Q33. A principle of error reduction is to reuse the information
already in the computer whenever possible.
a. true
b. false
Q34. A(n) ____ report includes both detailed and summary
information.
a. turnaround
b. control break
c. executive
d. ad hoc
Q35. ____ reports contain specific information on day-to-day
business transactions.
a. Detailed
b. Summary
c. Executive
d. Exception
Q36. ____ and many Web-based systems are integrated with
other systems through direct messaging.
a. HCI
b. EDI
c. HTML
d. DTD
Q37. Less frequent testing provides rapidly diminishing benefits
because more software has changed and errors are more difficult
to track to their source.
a. true
b. false
Q38. A common principle of team organization is that the team
should have no more than ____ members.
a. 5
7. b. 10
c. 15
d. 20
Q39. The most common type of user acceptance test evaluates
functional requirements and the quality of a user interface.
a. true
b. false
Q40. System testing is usually only performed at the conclusion
of the implementation discipline.
a. true
b. false
Q41. Perhaps the most important and difficult acquisition task
is choosing an appropriate component interaction standard and
supporting system software.
a. true
b. false
Q42. Foundation classes are typically reused in many parts of
the system.
a. true
b. false
Q43. Beta and production versions must be stored as long as
they are installed on any user machines.
a. true
b. false
Q44. We use ____ to document ideas that we need to remember
and to communicate those ideas to other people.
a. refactoring
b. logs
c. models
d. classes
8. Q45. The quality of the code is always higher in a pair-
programming environment.
a. true
b. false
Q46. Which of the following is an XP practice?
a. occasional big releases
b. long working hours
c. continual involvement of users
d. early detailed planning
Q47. In XP, release-level activities occur once during each
development project.
a. true
b. false
Q48. The first release-level activity in an XP development
approach is ____.
a. performing acceptance testing
b. creating acceptance tests
c. planning a series of iterations
d. dividing code units among teams
Q49. The ____ is a standard for software component connection
and interaction developed by Microsoft.
a. COM+
b. EJB
c. .NET
d. CORBA
Q50. Foundation classes are organized into one or more
inheritance hierarchies.
a. true
b. false