The code to implement the singleton pattern is complex

Assignment Help Basic Computer Science
Reference no: EM131018371

Q1. In a communication diagram, a(n) sequence number indicates the order of the messages.

a. true

b. false

Q2. A(n) method signature shows all of the information needed to invoke, or call, the method.

a. true

b. false

Q3. A detailed sequence diagram should only include classes that are listed in the use case preconditions and postconditions.

a. true

b. false

Q4. A combination of prototyping and model building is the most effective approach for building systems.

a. true

b. false

Q5. Communication diagrams and sequence diagrams capture different types of information.

a. true

b. false

Q6. CRC cards are index cards that are used to document the classes in a system, the ways the classes collaborate, and the responsibility for each class for each use case collaboration.

a. true

b. false

Q7. In design class notation, a(n) plus sign indicates that an attribute is private.

a. true

b. false

Q8. ____ are classes that system designers create to serve as a collection point for incoming messages.

a. Persistent classes

b. Use case controllers

c. Control classes

d. Links

Q9. ____ is an advanced database tool to access databases from Web pages.

a. HTML

b. XML

c. Cold Fusion

d. JavaScript

Q10. Designers often sketch statechart fragments to illustrate a single control process in the system.

a. true

b. false

Q11. It is difficult to limit changes to a(n) adapter class.

a. true

b. false

Q12. In a three-layer Java-based architecture, the Java servlet identified for the input form can be the ____ that distributes input messages.

a. application server processor

b. use case controller

c. code behind object

d. compiler

Q13. A(n) two-layer architecture is appropriate for systems that need to support multiple user interfaces, both Internet-based and network-based.

a. true

b. false

Q14. A Web page can be depicted in an implementation diagram by a frameset and stereotype.

a. true

b. false

Q15. The code to implement the singleton pattern is complex.

a. true

b. false

Q16. Key attributes may be natural or invented.

a. true

b. false

Q17. Administrators access the physical store of a DBMS directly.

a. true

b. false

Q18. Using internally invented keys is the safest long-term strategy in most cases.

a. true

b. false

Q19. In a relational database, the uniqueness of rows within a table is guaranteed if the primary key is unique.

a. true

b. false

Q20. Invented keys cannot be externally assigned.

a. true

b. false

Q21. Declaring an association as a(n) ____ allows the ODBMS to allocate as many object identifier attributes of one object type to each object of the other type as are needed to represent association instances.

a. primary key

b. attribute

c. complex type

d. set

Q22. The ODMG standards are the basis of the JDO standards, as well as some interfaces between ODBMSs and the C++ and SmallTalk programming languages.

a. true

b. false

Q23. When designing for the computer medium, design for low bandwidth.

a. true

b. false

Q24. Easy-to-learn interfaces are appropriate for office workers that use a system all day.

a. true

b. false

Q25. _____ first emphasized the benefits of consistency in the 1980s.

a. Microsoft Windows

b. Apple Macintosh

c. Xerox PARC

d. IBM mainframes

Q26. In most system development projects, analysts design system interfaces and user interfaces together because the two types require similar expertise and technology.

a. true

b. false

Q27. After identifying all required dialogs, the designers must document the dialogs.

a. true

b. false

Q28. Designers should include Cancel buttons on all dialog boxes to allow users to go back one step at any time.

a. true

b. false

Q29. The object-oriented approach to user-centered design focuses on users and their work by identifying actors, use cases, and scenarios followed when using the system..

a. true

b. false

Q30. A(n) access control is an integrity control to validate the input data for correctness and appropriateness.

a. true

b. false

Q31. ____ is the process of determining whether a user is permitted to have access to the system and data.

a. Authentication

b. Certification

c. Authorization

d. Encryption

Q32. ____ is a technique to link a summary field to its supporting detail and enable users to view the detail dynamically.

a. Drill down

b. Transaction logging

c. Encryption

d. Ad hoc

Q33. A principle of error reduction is to reuse the information already in the computer whenever possible.

a. true

b. false

Q34. A(n) ____ report includes both detailed and summary information.

a. turnaround

b. control break

c. executive

d. ad hoc

Q35. ____ reports contain specific information on day-to-day business transactions.

a. Detailed

b. Summary

c. Executive

d. Exception

Q36. ____ and many Web-based systems are integrated with other systems through direct messaging.

a. HCI

b. EDI

c. HTML

d. DTD

Q37. Less frequent testing provides rapidly diminishing benefits because more software has changed and errors are more difficult to track to their source.

a. true

b. false

Q38. A common principle of team organization is that the team should have no more than ____ members.

a. 5

b. 10

c. 15

d. 20

Q39. The most common type of user acceptance test evaluates functional requirements and the quality of a user interface.

a. true

b. false

Q40. System testing is usually only performed at the conclusion of the implementation discipline.

a. true

b. false

Q41. Perhaps the most important and difficult acquisition task is choosing an appropriate component interaction standard and supporting system software.

a. true

b. false

Q42. Foundation classes are typically reused in many parts of the system.

a. true

b. false

Q43. Beta and production versions must be stored as long as they are installed on any user machines.

a. true

b. false

Q44. We use ____ to document ideas that we need to remember and to communicate those ideas to other people.

a. refactoring

b. logs

c. models

d. classes

Q45. The quality of the code is always higher in a pair-programming environment.

a. true

b. false

Q46. Which of the following is an XP practice?

a. occasional big releases

b. long working hours

c. continual involvement of users

d. early detailed planning

Q47. In XP, release-level activities occur once during each development project.

a. true

b. false

Q48. The first release-level activity in an XP development approach is ____.

a. performing acceptance testing

b. creating acceptance tests

c. planning a series of iterations

d. dividing code units among teams

Q49. The ____ is a standard for software component connection and interaction developed by Microsoft.

a. COM+

b. EJB

c. .NET

d. CORBA

Q50. Foundation classes are organized into one or more inheritance hierarchies.

a. true

b. false

Reference no: EM131018371

Questions Cloud

Examine the proposed business ethical problem : Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..
Calculate the profit maximizing quantity : Calculate the profit maximizing quantity and the profit maximizing price for this monopolist assuming that the monopolist only has one price for which it is willing to sell the good. In your answer be sure to identify your final answers clearly, b..
Find a linear trend line for expected freight car loadings : Determine a linear trend line for expected freight car loadings. Use the above trend equation to predict expected loadings for Weeks 20 & 21.
Is there an enforceable contract between tim and jen : Is there an enforceable contract between Tim and Jen - Is promissory estoppel relevant to Jen's dispute with Simon from Delish Cakes?
The code to implement the singleton pattern is complex : The object-oriented approach to user-centered design focuses on users and their work by identifying actors, use cases, and scenarios followed when using the system..
What is the estimated weight of an oval-shaped diamond : What is the estimated weight of an oval-shaped diamond with a length of 9.04 mm, width of 6.50 mm, depth of 3.33 mm, and a slightly thick girdle?
What are some of advantages of a safety management system : What are some of the advantages of a safety management system that emphasize processes rather than individual behavior?
Prepare the journal entry to record the completion : Prepare the journal entry to record the completion of any job(s) during the month.(Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Explain the impacts of great britains trade surpluses : Explain the impacts of a productive investment opportunity on trade balance, current account and external wealth in the short run and the long run.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Server interface

Research Assignment: Server Interface The Windows Server 2012 interface has changed significantly from Server 2008 and been made to resemble Windows 8.

  Well-publicized report from it analyst firm gartner

In 2003, a well-publicized report from IT analyst firm Gartner predicted that the market for stand-alone IDS tools would soon disappear, and urged Gartner clients to cease investing in IDS tools in favor of firewalls. Clearly, the obsolescence of IDS..

  Minimum number of nodes

3. * a. Give a precise expression for the minimum number of nodes in an AVL tree of height h. b. What is the minimum number of nodes in an AVL tree of height 15?

  What values if any are stored in x y z

Suppose you are given the following variable declarations: int x, y; double z; char ch; Assume you have the following input statement

  After create an object in one program

If a text value in a Word document is automatically updated after a corresponding text value is updated in an Excel® source document, you can infer that the text value in Word is __________ the source document.

  Identify the degree and cardinalities of the relationship

A vendor builds multiple types of tablet computers. Each hs a type identification number and a name. The key specifications for each type include amount of storage and display type.

  Many types of formal management plans

There are many types of formal management plans (scope, schedule, communication, etc.,) that should be created in order to complete a project on time and within budget. Consider the group project that you worked on for this class and choose on..

  Describe database elements primary key foreign key metadata

Describe a database and its various elements. Define Primary Key, foreign key, and metadata.

  How can you use planned attacks to identify vulnerabilities

How can you spot vulnerabilities in back-end systems and Structured Query Language (SQL) databases?

  Write a program to allow additional items and prices

Write a program to allow additional items and prices to be input by the user and added to the end of the Cowboy.txt. Include a method to terminate the process.

  Evaluate the level of impact of it

Evaluate the level of impact of IT / enterprise architecture on information management (e.g., the flow of information throughout the company / organization, etc.) within a company or industry of your choice.

  Protecting data transfer in network environment

It is expected your proposal has a length of 1 to 2 pages, the following information are needed:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd