Question: Good Modular Design has the following characteristics ____________________________ Modules are based on sequence, selection, and iteration Modules are highly coupled and loosely cohesive Control modules
- Good Modular Design has the following characteristics ____________________________
- Modules are based on sequence, selection, and iteration
- Modules are highly coupled and loosely cohesive
- Control modules should never invoke library modules
- Modules are loosely coupled and highly cohesive
- a and c
- a and d
- The ___________ in a Use Case diagram are external to the system boundary.
- actors c. extends d. includes e. processes
- Which of the following tools can be used to describe computer algorithms?
- Pseudocode b. Structured English c. Flowcharts d. b and c only d. All of these
- Chapter 8 lists 7 Habits of Successful Interface Designers. Which one of the following is not one of these habits?
- Think like a user
- Focus on usability
- Understand the business
- Maximize textual effectiveness
- Invite feedback
- Analogy: An Attribute is to an Entity as a Field is to a _________________.
- method b. property c. record d. schema e. flowchart
- An important feature of O-O design is that the data and the methods are self-contained, which prevents the internal code from being altered by another object or process. What is this feature called?
- encapsulation b. polymorphism c. cohesion d. coupling
- A Post Implementation of a system is an evaluation that assesses the overall quality of the new information system, and verifies that the system meets specified user requirements and performs correctly. What areas are verified?
- System reliability and maintainability
- Accuracy, completeness of system output and user satisfaction
- System performance
- Quality and effectiveness of training
- All of the above
- a, b and c only
- I distributed an article that we reviewed in class and that is on my site in Chapter Resources Chapter 6 titled Building in security instead of testing it in. The article introduced you to three additional Use Cases. They are the Abuse Case, the Misuse Case and the Confuse Case. Which of the following statements best describes the Misuse Case?
- Insiders doing inappropriate tasks unintentionally
- Outsiders trying to breach the system
- Insiders doing appropriate tasks
- Insiders doing inappropriate tasks intentionally
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
