Development
Which of these are NOT a benefit of following a sequential design process?
Clients may not know exactly what their requirements are before they see working software and so change their requirements, leading to redesign.
Time spent early in the software production cycle can reduce costs at later stages.
It places emphasis on documentation, such as requirements documents and design documents, as well as source code.
It provides a structured approach, progresses linearly through discrete, easily understandable and explainable phases and thus is easy to understand.
Clients may not know exactly what their requirements are before they see working software and so change their requirements, leading to redesign.
Which of these is a BEST practice for protecting passwords or personal data?
Keep passwords in desk drawers instead of on top of the desk.
Use strong passwords that are protected and not shared with anyone.
Tell only trusted associates your password.
Use email instead of your phone to send someone your password.
Use strong passwords that are protected and not shared with anyone.
What is a software license restriction?
It keeps users from accessing the software if they don't pay for it.
It allows users to only copy the software for family members.
It informs users of the software what they are legally allowed to do with it, especially with respect to copying it.
It keeps users from viewing the code the software was written in.
It informs users of the software what they are legally allowed to do with it, especially with respect to copying it.
What is the purpose of using hexadecimal numbering in computer science?
It is a convenient way to express numbers more efficiently than binary or decimal.
It is easier to do math calculations in hexadecimal.
Hexadecimal is the base number system used in computer hardware.
Because base-6 numbers are easier to use than other bases.
It is a convenient way to express numbers more efficiently than binary or decimal.
Which of these describes the Phishing scam?
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
Sending unsolicited advertising messages.
Masquerading as another program or person.
Disrupting services to make a network unavailable.
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
How can an efficient algorithm design reduce power consumption?
Algorithms that use fewer CPU cycles reduce demand on the processor.
Algorithms that find the answer with the most precision reduce power.
Algorithms that interact with the user more frequently are used more often.
The higher the level of the coding language used, the more efficient the algorithm.
Algorithms that use fewer CPU cycles reduce demand on the processor.
Which of these would most alert you that you may have a possible email threat?
Your bank sends you an email during non-business hours.
You are asked to click on a link and share private information such as account numbers and passwords.
An e-commerce site you use frequently sends you a notice at the end of the year that your credit card is about to expire.
You get an email from your employer while you are at work.
You are asked to click on a link and share private information such as account numbers and passwords.
Which of these is a disadvantage of software licensing?
It takes away the freedom of software developers.
It only helps a few big software companies.
It doesn’t match the goals of the US Constitution.
It limits the number of possible users of the software and makes it more expensive to use.
It limits the number of possible users of the software and makes it more expensive to use.
If A and B are both true, which of these logical statements is true?
A and not(B)
A and B
not (A and B)
B and not(A)
A and B
Which of these describes what spamming is?
Sending unsolicited messages, especially advertising, or repeatedly sending messages on the same site.
Masquerading as another program or person.
Disrupting network services.
Sending fake company emails.
Sending unsolicited messages, especially advertising, or repeatedly sending messages on the same site.
Which of these is NOT true about Big O notation?
The letter O is used because the growth rate of a function is also referred to as order of the function.
It is used to classify algorithms according to how their running time or space requirements grow as the input size grows.
In mathematics, it is commonly used to describe how closely a finite series approximates a given function.
A description of a function in terms of big O notation usually provides the most accurate value of the function.
A description of a function in terms of big O notation usually provides the most accurate value of the function.
What is the purpose of a firewall on your computer?
To increase the speed of data communication on the internet.
To remove viruses from your computer.
To block unauthorized systems on the internet from gaining access to your computer and its data.
To share data with identified friends and coworkers.
To block unauthorized systems on the internet from gaining access to your computer and its data.
What is the difference between open-source and proprietary software?
Open-source software allows users to modify and share code freely, while proprietary software restricts access to the code.
Open-source software is always free, while proprietary software is always paid.
Proprietary software is easier to modify than open-source software.
Open-source software does not require a license.
Open-source software allows users to modify and share code freely, while proprietary software restricts access to the code.
If A is true and B is false, which of these logical statements is false?
A or B
A and B
A and not(B)
not(B)
A and B
Which of the following BEST describes a spoofing attack?
Masquerading as another program or person by falsifying data.
Sending unsolicited advertising messages.
Disrupting network services.
Sending fake emails.
Masquerading as another program or person by falsifying data.
What is a key advantage of using modular programming?
It allows for easier debugging and maintenance by dividing the code into smaller, manageable parts.
It makes the program more complex and harder to test.
It reduces the need for documentation.
It increases the amount of code required.
It allows for easier debugging and maintenance by dividing the code into smaller, manageable parts.
How does antivirus software protect the computer?
It identifies malicious code on the computer by scanning the code and then removes or quarantines that piece of code.
It blocks unauthorized systems on the internet from gaining access to your computer and its data.
It erases all of the computer’s temporary files that are no longer needed.
It slows down the computer's processor so that viruses can't spread quickly enough.
It identifies malicious code on the computer by scanning the code and then removes or quarantines that piece of code.
What type of software license allows you to modify and distribute the code?
Commercial
Trial
Open-source
Proprietary
Open-source
What is the largest decimal number an eight-bit byte can represent?
256
255
512
1024
255
Which of the following BEST describes denial-of-service attack?
Disrupting network services to make a system unavailable.
Sending unsolicited messages.
Masquerading as another person.
Sending fake emails.
Disrupting network services to make a system unavailable.
What is the main goal of software testing?
To increase the complexity of the software.
To identify and fix bugs before the software is released.
To reduce the need for documentation.
To make the program run slower.
To identify and fix bugs before the software is released.
What is a cross-site scripting vulnerability?
It enables attackers to inject client-side scripts into web pages viewed by other users.
It enables users to write programs longer than 10K lines of code, thus weakening the operating system.
It is the use of a browser not developed by Microsoft Corporation or Google Inc.
It is the practice of placing computer programmers too close together in the work environment.
It enables attackers to inject client-side scripts into web pages viewed by other users.
What is a key benefit of using a site license for software?
It allows multiple users within an organization to use the software.
It allows for software modification by any user.
It prevents software from being copied.
It is free for non-commercial use.
It allows multiple users within an organization to use the software.
What is the hexadecimal number 0xAEF in decimal?
2783
2798
2799
3055
2799
What is social engineering in the context of cybersecurity?
Manipulating people into revealing confidential information.
Creating fake software.
Sending spam emails.
Hacking networks.
Manipulating people into revealing confidential information.