Deck 2: Coding in the Sdlc: Not a Solitary Practice

ملء الشاشة (f)
exit full mode
سؤال
The iterative methodology is great for moderate to large applications with varying degrees of complexity.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The waterfall methodology is a way to develop software following through each phase of the life cycle from one to the next in a random manner.
سؤال
Anyone on the team can assign duties.
سؤال
Traditional methodologies include the following: Waterfall Iterative Spiral
سؤال
If you want to improve the SDLC on your team, learn how to work independently.
سؤال
An effective Project Manager has good people skills, communication skills, and interpersonal skills.
سؤال
CMMI defines how effective organizations are at following a formal development process by classifying the organization into maturity levels.
سؤال
Created by Barry Boehm, the Spiral Methodology was created for projects considered to be of low to moderate risk.
سؤال
Agile software development is a conceptual framework for undertaking software engineering projects.
سؤال
Software methodology is a set of methods, procedures and rules that can be performed only once during the production of software.
سؤال
Extreme Programming (XP) is an example of an agile development process.
سؤال
A secure software development process includes 3 main ingredients. They are: SDLC in the industry SDLC in the organization SDLC in the cube
سؤال
It is not the job of the PM to define roles and responsibilities.
سؤال
XP produces a lot of documentation.
سؤال
The software life cycles are the various activities, or phases, that software goes through from concept to implementation.
سؤال
Team Software Process (TSP) is an example of an advanced methodology.
سؤال
A Hybrid Methodology requires a development team to stick to only one process or standard.
سؤال
TSP and PSP are methodologies that do not work well with CMMI.
سؤال
Touchpoints are activities that the development team needs to do during a particular phase of the SDLC.
سؤال
All development methodologies share one common element: people.
سؤال
What is a set of methods, procedures, and rules that can be repeatedly carried out to produce software?

A) Standards
B) Software testing
C) Software methodology
D) Software development
سؤال
This methodology is based on 13 stages of activities that are primarily focused on building security in the development process.

A) Agile
B) Spiral
C) Security Development Lifecycle
D) TSP
سؤال
Why is following a methodology important?

A) Produces consistency
B) Produces reliability
C) Produces security
D) Produces quality
سؤال
C.I.A. stands for the 3 main principles in secure code: Confidentiality, integrity, and availability.
سؤال
Which of the following is not considered to be a Traditional methodology?

A) Waterfall
B) Iterative
C) Spiral
D) Agile
سؤال
Which process is not part of the IEEE 12207?

A) Primary
B) Organizational
C) Development
D) Supportive
سؤال
This methodology allows the users and developers more time to focus on building one requirement at a time.

A) TSP
B) Agile
C) Spiral
D) Iterative
سؤال
What are various activities, or phases, that software goes through from concept to retirement?

A) Software development
B) Software construction
C) Methodologies
D) Software life cycles
سؤال
Sharing sensitive information between applications has made writing code more of an orchestrated event than a ____ practice.

A) Group
B) Solitary
C) Team
D) Lonely
سؤال
A Framework is a process or structure with no set definition.
سؤال
This methodology is a way to develop software following through each phase of the life cycle from one to the next in a very sequential manner.

A) Spiral
B) Waterfall
C) Agile
D) TSP
سؤال
This methodology allows a very fluid communication stream with end users and uses the produced software as a measure of progress.

A) Security Development Lifecycle
B) TSP
C) Agile
D) Touchpoints
سؤال
Which standard is the standard of all standards regarding software development?

A) CMMI
B) ISO 12207
C) IEEE 1506
D) SEI
سؤال
This methodology strictly works in security design, principles, and features in each phase of the software life cycle.

A) Touchpoints
B) Agile
C) TSP
D) Iterative
سؤال
This standard is part of Carnegie Mellon University, defines standards with government organizations, businesses, and academia to improve the software development process.

A) CMMI
B) IEEE 12207
C) NIST
D) ISO
سؤال
PMP is a type of methodology.
سؤال
This methodology provides frameworks, a set of processes, and methods for producing quality and security principles in software.

A) Security Development Lifecycle
B) TSP
C) Agile
D) Touchpoints
سؤال
Cliques and office politics should be avoided when on a team.
سؤال
Coding and testing are 2 phases of the software life cycle.
سؤال
This methodology allows the users and developers to proceed to build the requirement only if the level of risk is acceptable.

A) Spiral
B) Iterative
C) Agile
D) TSP
سؤال
What one thing does all software methodologies share in common?

A) Detailed requirements
B) People
C) Sound design
D) Quality code
سؤال
What is the key ingredient of teamwork in software development?

A) Know the programming language
B) Know who your colleagues are
C) Know who the boss is
D) Know your role and responsibility
سؤال
This person is responsible for understanding the system's requirements and how the system was designed and developed, and knows how to break the software.

A) Tester
B) Developer
C) Business Analyst
D) Project Manager
سؤال
Why is active listening such an important part in the job of software development?

A) One must be able to convey meaning
B) One must be able to write emails and requirements
C) One must be able to draw
D) One must be able to paraphrase and summarize someone else's thoughts and ideas
سؤال
This person is responsible for knowing the security needs of the application, types of software attacks, and how to break the software.

A) Developer
B) Tester
C) Business Analyst
D) All of the above
سؤال
This person is responsible for knowing the technology, requirements, and application design.

A) Developer
B) Tester
C) Project Manager
D) Business Analyst
سؤال
This methodology allows the development team to start off very formal but lessens as the development team produces synergy, and system knowledge and experience.

A) Agile
B) Hybrid
C) TSP
D) Touchpoints
سؤال
This person is responsible for knowing the business rules and customer requirements.

A) Project Manager
B) Tester
C) Business Analyst
D) Developer
سؤال
What is the most common mistake project managers make with roles and responsibilities?

A) They are assumed and not defined
B) Hand them out too early
C) Define them too well
D) Make sure no one does more than they are supposed to.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Coding in the Sdlc: Not a Solitary Practice
1
The iterative methodology is great for moderate to large applications with varying degrees of complexity.
True
2
The waterfall methodology is a way to develop software following through each phase of the life cycle from one to the next in a random manner.
False
3
Anyone on the team can assign duties.
False
4
Traditional methodologies include the following: Waterfall Iterative Spiral
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
If you want to improve the SDLC on your team, learn how to work independently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
An effective Project Manager has good people skills, communication skills, and interpersonal skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
CMMI defines how effective organizations are at following a formal development process by classifying the organization into maturity levels.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
Created by Barry Boehm, the Spiral Methodology was created for projects considered to be of low to moderate risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
Agile software development is a conceptual framework for undertaking software engineering projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
Software methodology is a set of methods, procedures and rules that can be performed only once during the production of software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
Extreme Programming (XP) is an example of an agile development process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
A secure software development process includes 3 main ingredients. They are: SDLC in the industry SDLC in the organization SDLC in the cube
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
It is not the job of the PM to define roles and responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
XP produces a lot of documentation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
The software life cycles are the various activities, or phases, that software goes through from concept to implementation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
Team Software Process (TSP) is an example of an advanced methodology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
A Hybrid Methodology requires a development team to stick to only one process or standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
TSP and PSP are methodologies that do not work well with CMMI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
Touchpoints are activities that the development team needs to do during a particular phase of the SDLC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
All development methodologies share one common element: people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is a set of methods, procedures, and rules that can be repeatedly carried out to produce software?

A) Standards
B) Software testing
C) Software methodology
D) Software development
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
This methodology is based on 13 stages of activities that are primarily focused on building security in the development process.

A) Agile
B) Spiral
C) Security Development Lifecycle
D) TSP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
Why is following a methodology important?

A) Produces consistency
B) Produces reliability
C) Produces security
D) Produces quality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
C.I.A. stands for the 3 main principles in secure code: Confidentiality, integrity, and availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is not considered to be a Traditional methodology?

A) Waterfall
B) Iterative
C) Spiral
D) Agile
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which process is not part of the IEEE 12207?

A) Primary
B) Organizational
C) Development
D) Supportive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
This methodology allows the users and developers more time to focus on building one requirement at a time.

A) TSP
B) Agile
C) Spiral
D) Iterative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are various activities, or phases, that software goes through from concept to retirement?

A) Software development
B) Software construction
C) Methodologies
D) Software life cycles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
Sharing sensitive information between applications has made writing code more of an orchestrated event than a ____ practice.

A) Group
B) Solitary
C) Team
D) Lonely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
A Framework is a process or structure with no set definition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
This methodology is a way to develop software following through each phase of the life cycle from one to the next in a very sequential manner.

A) Spiral
B) Waterfall
C) Agile
D) TSP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
This methodology allows a very fluid communication stream with end users and uses the produced software as a measure of progress.

A) Security Development Lifecycle
B) TSP
C) Agile
D) Touchpoints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which standard is the standard of all standards regarding software development?

A) CMMI
B) ISO 12207
C) IEEE 1506
D) SEI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
This methodology strictly works in security design, principles, and features in each phase of the software life cycle.

A) Touchpoints
B) Agile
C) TSP
D) Iterative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
This standard is part of Carnegie Mellon University, defines standards with government organizations, businesses, and academia to improve the software development process.

A) CMMI
B) IEEE 12207
C) NIST
D) ISO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
PMP is a type of methodology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
This methodology provides frameworks, a set of processes, and methods for producing quality and security principles in software.

A) Security Development Lifecycle
B) TSP
C) Agile
D) Touchpoints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
Cliques and office politics should be avoided when on a team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
Coding and testing are 2 phases of the software life cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
This methodology allows the users and developers to proceed to build the requirement only if the level of risk is acceptable.

A) Spiral
B) Iterative
C) Agile
D) TSP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
What one thing does all software methodologies share in common?

A) Detailed requirements
B) People
C) Sound design
D) Quality code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the key ingredient of teamwork in software development?

A) Know the programming language
B) Know who your colleagues are
C) Know who the boss is
D) Know your role and responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
This person is responsible for understanding the system's requirements and how the system was designed and developed, and knows how to break the software.

A) Tester
B) Developer
C) Business Analyst
D) Project Manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
Why is active listening such an important part in the job of software development?

A) One must be able to convey meaning
B) One must be able to write emails and requirements
C) One must be able to draw
D) One must be able to paraphrase and summarize someone else's thoughts and ideas
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
This person is responsible for knowing the security needs of the application, types of software attacks, and how to break the software.

A) Developer
B) Tester
C) Business Analyst
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
This person is responsible for knowing the technology, requirements, and application design.

A) Developer
B) Tester
C) Project Manager
D) Business Analyst
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
This methodology allows the development team to start off very formal but lessens as the development team produces synergy, and system knowledge and experience.

A) Agile
B) Hybrid
C) TSP
D) Touchpoints
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
This person is responsible for knowing the business rules and customer requirements.

A) Project Manager
B) Tester
C) Business Analyst
D) Developer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is the most common mistake project managers make with roles and responsibilities?

A) They are assumed and not defined
B) Hand them out too early
C) Define them too well
D) Make sure no one does more than they are supposed to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.