Cst 183 50 questions need asap

i need this done in one hour?????????????????????????????????

Q1. In a communication diagram, a(n) sequence number indicates the order of the messages.
[removed]   a. true
[removed]   b. false

Q2. A(n) method signature shows all of the information needed to invoke, or call, the method.
[removed]   a. true
[removed]   b. false

Q3. A detailed sequence diagram should only include classes that are listed in the use case preconditions and postconditions.
[removed]   a. true
[removed]   b. false

Q4. A combination of prototyping and model building is the most effective approach for building systems.
[removed]   a. true
[removed]   b. false

Q5. Communication diagrams and sequence diagrams capture different types of information.
[removed]   a. true
[removed]   b. false

Q6. CRC cards are index cards that are used to document the classes in a system, the ways the classes collaborate, and the responsibility for each class for each use case collaboration.
[removed]   a. true
[removed]   b. false

Q7. In design class notation, a(n) plus sign indicates that an attribute is private.
[removed]   a. true
[removed]   b. false

Q8. ____ are classes that system designers create to serve as a collection point for incoming messages.
[removed]   a. Persistent classes
[removed]   b. Use case controllers
[removed]   c. Control classes
[removed]   d. Links

Q9. ____ is an advanced database tool to access databases from Web pages.
[removed]   a. HTML
[removed]   b. XML
[removed]   c. Cold Fusion
[removed]   d. JavaScript

Q10. Designers often sketch statechart fragments to illustrate a single control process in the system.
[removed]   a. true
[removed]   b. false

Q11. It is difficult to limit changes to a(n) adapter class.
[removed]   a. true
[removed]   b. false

Q12. In a three-layer Java-based architecture, the Java servlet identified for the input form can be the ____ that distributes input messages.
[removed]   a. application server processor
[removed]   b. use case controller
[removed]   c. code behind object
[removed]   d. compiler

Q13. A(n) two-layer architecture is appropriate for systems that need to support multiple user interfaces, both Internet-based and network-based.
[removed]   a. true
[removed]   b. false

Q14. A Web page can be depicted in an implementation diagram by a frameset and stereotype.
[removed]   a. true
[removed]   b. false

Q15. The code to implement the singleton pattern is complex.
[removed]   a. true
[removed]   b. false

Q16. Key attributes may be natural or invented.
[removed]   a. true
[removed]   b. false

Q17. Administrators access the physical store of a DBMS directly.
[removed]   a. true
[removed]   b. false

Q18. Using internally invented keys is the safest long-term strategy in most cases.
[removed]   a. true
[removed]   b. false

Q19. In a relational database, the uniqueness of rows within a table is guaranteed if the primary key is unique.
[removed]   a. true
[removed]   b. false

Q20. Invented keys cannot be externally assigned.
[removed]   a. true
[removed]   b. false

Q21. Declaring an association as a(n) ____ allows the ODBMS to allocate as many object identifier attributes of one object type to each object of the other type as are needed to represent association instances.
[removed]   a. primary key
[removed]   b. attribute
[removed]   c. complex type
[removed]   d. set

Q22. The ODMG standards are the basis of the JDO standards, as well as some interfaces between ODBMSs and the C++ and SmallTalk programming languages.
[removed]   a. true
[removed]   b. false

Q23. When designing for the computer medium, design for low bandwidth.
[removed]   a. true
[removed]   b. false

Q24. Easy-to-learn interfaces are appropriate for office workers that use a system all day.
[removed]   a. true
[removed]   b. false

Q25. _____ first emphasized the benefits of consistency in the 1980s.
[removed]   a. Microsoft Windows
[removed]   b. Apple Macintosh
[removed]   c. Xerox PARC
[removed]   d. IBM mainframes

Q26. In most system development projects, analysts design system interfaces and user interfaces together because the two types require similar expertise and technology.
[removed]   a. true
[removed]   b. false

Q27. After identifying all required dialogs, the designers must document the dialogs.
[removed]   a. true
[removed]   b. false

Q28. Designers should include Cancel buttons on all dialog boxes to allow users to go back one step at any time.
[removed]   a. true
[removed]   b. false

Q29. The object-oriented approach to user-centered design focuses on users and their work by identifying actors, use cases, and scenarios followed when using the system..
[removed]   a. true
[removed]   b. false

Q30. A(n) access control is an integrity control to validate the input data for correctness and appropriateness.
[removed]   a. true
[removed]   b. false

Q31. ____ is the process of determining whether a user is permitted to have access to the system and data.
[removed]   a. Authentication
[removed]   b. Certification
[removed]   c. Authorization
[removed]   d. Encryption

Q32. ____ is a technique to link a summary field to its supporting detail and enable users to view the detail dynamically.
[removed]   a. Drill down
[removed]   b. Transaction logging
[removed]   c. Encryption
[removed]   d. Ad hoc

Q33. A principle of error reduction is to reuse the information already in the computer whenever possible.
[removed]   a. true
[removed]   b. false

Q34. A(n) ____ report includes both detailed and summary information.
[removed]   a. turnaround
[removed]   b. control break
[removed]   c. executive
[removed]   d. ad hoc

Q35. ____ reports contain specific information on day-to-day business transactions.
[removed]   a. Detailed
[removed]   b. Summary
[removed]   c. Executive
[removed]   d. Exception

Q36. ____ and many Web-based systems are integrated with other systems through direct messaging.
[removed]   a. HCI
[removed]   b. EDI
[removed]   c. HTML
[removed]   d. DTD

Q37. Less frequent testing provides rapidly diminishing benefits because more software has changed and errors are more difficult to track to their source.
[removed]   a. true
[removed]   b. false

Q38. A common principle of team organization is that the team should have no more than ____ members.
[removed]   a. 5
[removed]   b. 10
[removed]   c. 15
[removed]   d. 20

Q39. The most common type of user acceptance test evaluates functional requirements and the quality of a user interface.
[removed]   a. true
[removed]   b. false

Q40. System testing is usually only performed at the conclusion of the implementation discipline.
[removed]   a. true
[removed]   b. false

Q41. Perhaps the most important and difficult acquisition task is choosing an appropriate component interaction standard and supporting system software.
[removed]   a. true
[removed]   b. false

Q42. Foundation classes are typically reused in many parts of the system.
[removed]   a. true
[removed]   b. false

Q43. Beta and production versions must be stored as long as they are installed on any user machines.
[removed]   a. true
[removed]   b. false

Q44. We use ____ to document ideas that we need to remember and to communicate those ideas to other people.
[removed]   a. refactoring
[removed]   b. logs
[removed]   c. models
[removed]   d. classes

Q45. The quality of the code is always higher in a pair-programming environment.
[removed]   a. true
[removed]   b. false

Q46. Which of the following is an XP practice?
[removed]   a. occasional big releases
[removed]   b. long working hours
[removed]   c. continual involvement of users
[removed]   d. early detailed planning

Q47. In XP, release-level activities occur once during each development project.
[removed]   a. true
[removed]   b. false

Q48. The first release-level activity in an XP development approach is ____.
[removed]   a. performing acceptance testing
[removed]   b. creating acceptance tests
[removed]   c. planning a series of iterations
[removed]   d. dividing code units among teams

Q49. The ____ is a standard for software component connection and interaction developed by Microsoft.
[removed]   a. COM+
[removed]   b. EJB
[removed]   c. .NET
[removed]   d. CORBA

Q50. Foundation classes are organized into one or more inheritance hierarchies.
[removed]   a. true
[removed]   b. false

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.
×

Contact Us on WhatsApp

× How can I help you?