Peer Instruction

Questions in Software

Engineering

Bhuvana Gopal

Lecturer

Department of Computer Science and Engineering

University of Nebraska-Lincoln

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

The documentation involved in agile is

A.Minimal

B.Extensive

C.Just another deliverable and depends on the project

D.Does not need to be completed and can be done at the end of the project

E.None of the above

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer

Instruction

Design involved in agile is

Peer Instruction

A. Minimal, and loaded upfront B. Extensive, and loaded upfront

C. Just another deliverable and depends on the project D. Omnipresent and happens throughout the project E. None of the above

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Agile is least suited for

A. Fixed deadline projects

B. Greenfield projects

C. Brownfield projects

D. All of the above

E. None of the above

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Here are some statements about database modeling. Arrange them in the correct order.

1.Document all entities discovered during the information-gathering stage.

2.Create new entities (tables) for multivalued attributes and repeating groups. Incorporate these new entities (tables) in the ER diagram. Review with appropriate personnel.

A.1,2,3,4,5

B.5,4,3,2,1

C.5,3,1,2,4

3.Document all attributes that belong to each entity. Select candidate and primary keys. Ensure that all non-key attributes for each entity are full-functionally dependent on the primary key.

4.Develop an initial ER diagram and review it with appropriate personnel. (Remember that this is an iterative process.)

5.Verify ER modeling by normalizing tables.

D.1,3,4,2,5

E.3,2,4,1,5

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

_____ limits who gains access to the database

while _____ limits what a user can access

within the database.

A. Access authentication, user definition

B. Access authentication, view definition

C. Data access, user monitoring

D. Access control, database security

E. Access authentication, user monitoring

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Which is the most suitable type of database for storing sensitive data?

A.RDBMS

B.XML

C.NoSQL

D.Open source

E.Only A and B

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

How does access context control combat privilege abuse and enforce access policies?

A. It provides authorization checks based on "what you have."

B. It provides authorization checks based on "what you do."

C. It provides authorization checks based on "what you know."

D. It provides authorization checks based on "what you have and what you do."

E. All of the above

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Why is the segregation of database administrator duties an important security control?

A. It means administrators have more time to do their jobs properly.

B. It ensures development and production data are kept on separate systems.

C. It means no one individual can act alone to misuse powerful database privileges for malicious purposes.

D. Administrators can specialize in a specific area of database administration.

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Which of the following is not a unit test?

A. Code that stuffs things into a database or that reads a file from disk

B. Test that throws thousands of requests for a service you’ve written

C. A test that can fail when run on a machine without the “proper setup”

D. All of the above

E. Only A and C

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Which of the following statements about writing a unit test in C# .NET is false?

A. It is decorated with the [TestMethod] attribute

B. It returns void

C. It cannot have parameters

D. It cannot test for exceptions

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Which of the following is the right way to unit test?

A. Each test method should have a few but not too many assert statements. B. Test multiple things at a time per test method.

C. Ignore empty cases and error cases D. Tests should avoid logic

E. Only A and D

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Which of the following are test case smells?

A. Constrained test order

B. Tests call shared helper methods

C. Tests call each other

D. A, B and C

E. Only A and C

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Which of the following artifacts can be examined by using review techniques?

A. Software code

B. Requirements specification

C. Test designs

D. All of the above

E. Only A and C

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Which statement about the function of a static analysis tool is true?

A.Gives quality information about the code without executing it.

B.Checks expected results against actual results.

C.Can detect memory leaks.

D.Gives information about what code has and has not been exercised.

E.Only A and D

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Static code analysis typically identifies all but one of the following problems. Which is it?

A. Unreachable code

B. Undeclared variables

C. Faults in the requirements

D. Too few comments

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Static code analysis typically identifies all but one of the following problems. Which is it?

A. Unreachable code

B. Undeclared variables

C. Faults in the requirements

D. Too few comments

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Classes that are hard to unit test often break:

A. Single Responsibility principle

B. Open/Closed principle

C. Liskov Substitution principle

D. Interface segregation principle

E. Dependency Inversion principle

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Go down to your local store and pay for something with a credit card. The clerk doesn't examine your card and get out the "Visa Machine" after seeing that your card is a Visa. He just takes your card, whatever it is, and swipes it. Which one of the SOLID principles does this exemplify?

A. Single Responsibility principle

B. Open/Closed principle

C. Liskov Substitution principle

D. Interface segregation principle

E. Dependency Inversion principle

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Think of going down to your local corner restaurant and checking out the menu. You'll see all of the normal menu mainstays, and then something that's just called "soup of the day." What SOLID principle is this an example of?

A. Single Responsibility principle

B. Open/Closed principle

C. Liskov Substitution principle

D. Interface segregation principle

E. Dependency Inversion principle

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer Instruction

Peer Instruction question

Some causes for merge hell are:

A. Merging late

B. Not merging often

C. Solution architecture - well defined boundaries between components

D. A, B

E. A, B and C

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Which of these is NOT an issue with traditional CI:

A. Once “bad” code is checked in, the “latest build” is broken

B. Developer lack of motivation to fix their code

C. Lack of automated unit tests

D. Once “it works”, management won’t prioritize a “make it work properly” task

E. The release branch always has high stability with traditional CI.

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

What are some common pitfalls of gated builds?

A. Build master can focus on improving the build process rather than track down failing tests

B. Tests take too long

C. all builds suddenly failing, or randomly failing - a big mess to clean up

D. Always have a working product

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Which of these reflects an increasing order of control given to the subscriber?

Peer Instruction

1.SaaS

2.Paas

3.IaaS

4.In house resources that are not on the cloud

A.1,2,3,4

B.1,3,2,4

C.4,1,2,3

D.4,2,3,1

E.1,4,2,3

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

Peer

In addition to identifying assets and threats,Instruction what are the two main steps involved in establishing a streamlined security analysis process for the cloud?

A. Identify countermeasures

B. Establish organizational context

C. Identify if the countermeasures are appropriate for organization independent analysis

D. A and C

E. A , B and C

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

What are the essential steps in creating a virtual machine on the cloud?

A. Select a machine image to run, select the size of the VM, select the security credentials

B. select the size of the VM, select the security credentials, select an application to run

C. Select a machine image to run, select the size of the VM, select an application to run

D. Select a machine image to run, select an application to run, select security credentials

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

For which of the following workloads can cloud computing have the greatest benefit?

A. Fixed and predictable workloads

B. Unexpectedly varying workloads

C. Steadily decreasing workloads

D. Steadily increasing workloads

E. A and C

Peer Instruction

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/

For which of the following workloads can cloud computing have the least benefit?

Peer Instruction

A.

B.

workloads that manage sensitive data

highly customized, regulation-sensitive data driven

workloads

C. where virtualization is not supported by third-party providers

D. All of the above

E.All but A

This HTML is created from PDF at https://www.pdfonline.com/convert-pdf-to-html/