Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Q1. A(n) ____ class is a design identifier for a problem domain class.
a. control
b. boundary
c. entity
d. data access

Q2. UML notation distinguishes between design class notation and domain model notation.
a. true
b. false

Q3. The realization of a use case is done through the development of a(n)activitydiagram.
a. true
b. false

Q4. In many programming languages, the constructor is given the same name as the class.
a. true
b. false

Q5. A detailed sequence diagram should only include classes that are listed in the use case preconditions and postconditions.
a. true
b. false

Q6. A(n) ____ diagram is useful to denote which classes work together as a subsystem.
a. package
b. design class
c. interaction
d. design statechart

Q7. ____ are classes that system designers create to serve as a collection point for incoming messages.
a. Persistent classes
b. Use case controllers
c. Control classes
d. Links

Q8.CRC cardsare index cards that are used to document the classes in a system, the ways the classes collaborate, and the responsibility for each class for each use case collaboration.
a. true
b. false

Q9. In the singleton template, the pattern is represented by code.
a. true
b. false

Q10. In an Internet-based system, ____ help simulate network-based capability.
a. framesets
b. scripting languages and applets
c. application program interfaces
d. browsers

Q11. In windows, the listener method that notifies the listeners when an event occurs is often calledaddListener().
a. true
b. false

Q12. A statechart can provide information about the internal details of a method through the use ofaction-expressions.
a. true
b. false

Q13. The disadvantage of.NETis that it is easy to mix the layers, scattering business logic in with user-interface processes and data access logic.
a. true
b. false

Q14. It is difficult to limit changes to a(n)adapterclass.
a. true
b. false

Q15. A ____ server applies the principle of indirection by appearing as a fake server, which catches all incoming messages and redistributes them to the recipients.
a. communications
b. client
c. network
d. proxy

Q16. DBMSs provide simultaneous access by many users and application programs.
a. true
b. false

Q17. A database model is considered flexible and maintainable if changes to the databaseschemacan be made with minimal disruption to existing data content and structure.
a. true
b. false

Q18. Invented keys cannot be externally assigned.
a. true
b. false

Q19. In a relational database, the uniqueness of rows within a table is guaranteed if the primary key is unique.
a. true
b. false

Q20. ODL class definitions derive from the corresponding UMLdomain model classdiagram.
a. true
b. false

Q21. Databases and DBMSs provide data access via a ____.
a. query language
b. data warehouse
c. persistent class
d. schema

Q22. ____ is a relational database table structure in which every non-key attribute is functionally dependent on the primary key.
a. First normal form
b. Second normal form
c. Third normal form
d. Fourth normal form

Q23. After identifying all required dialogs, the designers mustdocumentthe dialogs.
a. true
b. false

Q24. _____ first emphasized the benefits of consistency in the 1980s.
a. Microsoft Windows
b. Apple Macintosh
c. Xerox PARC
d. IBM mainframes

Q25. HTML is an acronym forHypertext Markup Language.
a. true
b. false

Q26. The _____ aspect of the user interface includes speech recognition software and computer-generated speech.
a. physical
b. conceptual
c. perceptual
d. virtual

Q27. Browser forms can be displayed using any Internet browser.
a. true
b. false

Q28. The underlying principles for forms differ for the Microsoft Windows, X-Windows (UNIX), and Macintosh environments.
a. true
b. false

Q29. System developers often construct forms with _____ to streamline the process and ensure user involvement.
a. paper diagrams
b. presentation tools
c. outside vendors
d. prototyping tools

Q30. Output messages that need to report on all objects within a class use a(n) ____ method.
a. external
b. class-level
c. object
d. abstract

Q31. A(n) ____ report includes both detailed and summary information.
a. turnaround
b. control break
c. executive
d. ad hoc

Q32. A principle of error reduction is to reuse the information already in the computer whenever possible.
a. true
b. false

Q33. ____ is a technique to link a summary field to its supporting detail and enable users to view the detail dynamically.
a. Drill down
b. Transaction logging
c. Encryption
d. Ad hoc

Q34. For XML to work, both systems must recognize the markup codes.
a. true
b. false

Q35. ____ and many Web-based systems are integrated with other systems through direct messaging.
a. HCI
b. EDI
c. HTML
d. DTD

Q36. All DBMSs today include transaction logging as part of the DBMS software.
a. true
b. false

Q37. A(n)beta versionis a system update that provides bug fixes and small changes to existing features.
a. true
b. false

Q38. Beta and production versions must be stored as long as they are installed on any user machines.
a. true
b. false

Q39. Less frequent testing provides rapidly diminishing benefits because more software has changed and errors are more difficult to track to their source.
a. true
b. false

Q40. It is sufficient to prepare one test case for each scenario.
a. true
b. false

Q41. Software components are built, acquired, and integrated in the ____ discipline.
a. design
b. implementation
c. testing
d. deployment

Q42.Throughputrequirements specify the desired or maximum allowable time limits for software responses to queries and updates.
a. true
b. false

Q43. The most common type ofuser acceptancetest evaluates functional requirements and the quality of a user interface.
a. true
b. false

Q44. The Scrum master sets the project schedule and assigns tasks.
a. true
b. false

Q45. Updating a single component requires recompiling, relinking, and redistributing the entire application.
a. true
b. false

Q46. ____ is a driving force in technologies such as Web services, CORBA, .NET, and ERP systems.
a. Modeling
b. Reuse
c. Refactoring
d. Inheritance

Q47. ____ is a philosophy and set of guidelines for developing software in an unknown, rapidly changing environment.
a. SOAP
b. Pair programming
c. Agile Development
d. Refactoring

Q48. Which of the following is an XP practice?
a. occasional big releases
b. long working hours
c. continual involvement of users
d. early detailed planning

Q49. Foundation classes are organized into one or more inheritance hierarchies.
a. true
b. false

Q50. We use ____ to document ideas that we need to remember and to communicate those ideas to other people.
a. refactoring
b. logs
c. models
d. classes

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91985009
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

1 under what circumstances is it advantageous for a company

1. Under what circumstances is it advantageous for a company competing in foreign markets to concentrate its value chain activities in a select few locations? Under what circumstances is it advantageous for a company com ...

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

Systems analysis projectpersonal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Suppose that on your birthday you checked the balance on

Suppose that on your birthday you checked the balance on your retirement account and you decided to make a $1,000 payment at the end of every month until you retire at the specified age. If you disreagard the inflation ( ...

Question the subnet mask for a class c network is

Question : The subnet mask for a class C network is 255.255.255.248. How many subnetworks are available? How many assignable hosts ids per subnet? The response must be typed, single spaced, must be in times new roman fon ...

Software engineeringanswer each of the following questions

Software Engineering Answer each of the following questions posed for control and data when applied a "stepwise refinement approach" to develop three different levels of procedural abstraction in a simple invoicing syste ...

Question skyeducation will develop a new branch in the city

Question : SkyEducation will develop a new branch in the city for J2EE programming training. The information is given in the following table. (Ignore the crashing parameters.) Task a b c d e f g Predecessors - - - a b c ...

How does a java server page uses the client-server model to

How does a Java Server Page uses the client-server model to make a Web page interactive?

A a simple encryption of a character a can be performed by

a) A simple encryption of a character A can be performed by exclusive-ORing A with some key K to produce the encrypted value E. The original value A can be recovered by exclusive-ORing again with the same key. Write a c/ ...

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As