Computer Science Final

Is this your test? Login to manage it. If not, you can develop a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A ____ language uses command words and grammar based on human language.
2.
1 point
A computer programming language based on a declarative programming paradigm is a ____-generation language.
3.
1 point
The ____ technique is based on the idea that the best information systems are designed when end users and
4.
1 point
In the corporate world, a ____ symbolizes a company, its products, or services. This typically includes a name, trademark, and logo.
5.
1 point
A ____ control structure changes the order in which instructions are carried out by directing the computer to
6.
1 point
In the accompanying figure, F represents ____.
7.
1 point
The first computers were programmed using ____.
8.
1 point
The company owner has requested a document that describes what you envision to be the objectives for thenew information system. Which type of report will you create?
9.
1 point
In the accompanying figure, A represents ____.
10.
1 point
A single programmer can, on average, write, test, and document only ____ lines of code per day.
11.
1 point
The ____ quality of service (QoS) metric is defined as the amount of data processed in a particular time
12.
1 point
In the threat model STRIDE, the I stands for ____ or gaining unauthorized access.
13.
1 point
____ is a method for analyzing the time needed to complete each project task and identifying the minimum amount of time needed to complete the total project.
14.
1 point
During the ____ phase of the SDLC, the project team supervises the tasks necessary to construct the new
15.
1 point
A logic error is a type of ____ error.
16.
1 point
Among the steps you can take to avoid security problems is ____.
17.
1 point
In the PIECES framework, a ____ exists when an information system does not respond quickly enough to
18.
1 point
A(n) ____ table is a tabular method for visualizing and specifying rules based on multiple factors.
19.
1 point
A project team submits an RFQ to vendors when it knows all of the following EXCEPT ____.
20.
1 point
All of the following are guidelines to help corporations deal with identity theft EXCEPT ____.
21.
1 point
In the threat model STRIDE, the E stands for ____ or modifying user rights to gain access to data.
22.
1 point
A ____ provides programmers with tools to build substantial sections of a program by pointing and clicking.
23.
1 point
A ____ error occurs when an instruction does not follow the grammar of the programming language.
24.
1 point
In addition to buffer overflows, hackers can use ____ to find vulnerabilities.
25.
1 point
In the threat model STRIDE, the D stands for ____ or making a system unavailable to legitimate users.
26.
1 point
____ testing is performed to ensure that software modules operate together correctly.
27.
1 point
An enterprise-wide disaster recovery plan should do all of the following EXCEPT ____.
28.
1 point
In the instruction in the accompanying figure, Box B points to ____.
29.
1 point
A Project Development Plan includes all of the following EXCEPT ____.
30.
1 point
A ____ uses bars to show the timing of development tasks as they occur over time.
31.
1 point
In the ____ of the SDLC, the project team must decide how the new system will fulfill the requirements
32.
1 point
___ refers to the ability of the system to be continuously accessible to all the people who use it.
33.
1 point
Management has asked Jane to find an information system that will help them solve semi-structured problems. Jane knows that such a system is called a(n) ____.
34.
1 point
The first phase of the SDLC is ____.
35.
1 point
With ____, processing tasks are shared by servers and workstations.
36.
1 point
A common threat to the data stored on a corporate information system is an act of war, which includes all of the following EXCEPT ____.
37.
1 point
Cara and Bella want to avoid the risks of a direct conversion to a new information system because they have no backup for their current system. Which type of conversion would allow them to continue to use the old system during the conversion process?
38.
1 point
In the threat model STRIDE, the T stands for ____ or changing, adding, or deleting data.
39.
1 point
A system like the one shown in the accompanying figure is characterized by its ability to ____.
40.
1 point
The ____ paradigm focuses on an algorithm that describes a solution.
41.
1 point
A ____ metric is a technique for measuring a specific characteristic by monitoring system performance and
42.
1 point
____ help(s) programmers apply rigorous logical and mathematical models to software design.