My study Guide 4/23/2010

joinherbalistΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

80 εμφανίσεις







My study Guide 4/23/2010


This may include the Software Engineer for T/F:

1
PUBLIC

-

Software engineers shall act consistently with the public interest.

2
CLIENT AND EMPLOYER

-

Software engineers shall act in a manner that is in the best
interests of their client and employer, consistent with the public interest.

3
PRODUCT

-

Software engineers shall ensure that their products and related modifications
meet the highest professional standards possible.

4
JUDGMENT

-

Software engineers shall maintain integrity and independence in their
professional judgment.

5
MANAGEMENT

-

Softwa
re engineering managers and leaders shall subscribe to and promote
an ethical approach to the management of software development and maintenance.

6
PROFESSION

-

Softw
are engineers shall advance the integrity and reputation of the
profession consistent with the public interest.

7
COLLEAGUES

-

Software engineers shall be fair to and

supportive of their colleagues.

8
SELF

-

Software engineers shall participate in lifelong learning regarding the practice of their
profession and shall promote an ethical
approach to the practice of the profession.


Chapter 5


1.

In January 2000 Yahoo!, eBay, Amazon, E*Trade and other Web sites were shut down for
several hours by what kind of attack?

Correct answer:
-

pg 260

2.

Which of the following is an example of biom
etrics:

Correct answer:
-

pg 281
-
282

3.

Software that monitors incoming communications and filters out those that are from untrusted
sites, or fit a profile of suspicious activity, is called:

Correct answer:
-

pg 271

4.

In the early days of computing (19
60's to the early 1970's), a "hacker" was:

Correct answer:
-

pg 254

5.

Dishonest sellers using online auction sites sometimes will bid on their own items to drive up
the price. This practice is known as:

Correct answer:
-

pg 283

6.

The hacker group that
broke into the BellSouth computers in the late 1980's was known as:

Correct answer:
-

pg 256

7.

Hacktivism is:

Correct answer:
-

pg 263

8.

Web sites that look attractive to hackers, but are closely monitored so that everything the hacker
does at the site

is recorded and studied are known as:

Correct answer:
-

pg 266

9.

Collecting evidence from computer files and disks is called:

Correct answer:
-

pg 266

10.

Which of the following is
NOT

a malicious program used by hackers to gain access to your
computer
:

Correct answer:
-

pg 266


Chapter 6

1.

Which of the following reasons for monitoring e
-
mail, voice mail, and computer files is
considered legitimate?

Correct answer:
-

pg 339
-
340

2.

What does the term ‘logic bomb’ mean?

Correct answer:
-

pg 333

3.

The

practice of hiring companies or employees in other countries is known as:

Correct answer:
-

pg 319


Chapter 7

1.

Which of the following is NOT a Neo
-
Luddite criticism of computers?

Correct answer:
-

pg 377

2.

Ken Olson, president of Digital Equipment Co
rp. in the late 1970's, Thomas J. Watson,
chairman of IBM in the early 1940's, and Thomas Edison all made predictions about technology
that were extremely wrong. Which of the following explains why the predictions of experts are
often so far off?

Correct
answer:
-

pg 388


3.

How many years did it take for approximately 25% of U.S. households to have World Wide
Web access?

Correct answer:
-

pg 374

4.

Microsoft removed several words from its thesaurus in Word 2000 that had been listed as
synonyms for fool.

Which of the following was NOT removed?

Correct answer:
-

pg 359

4.

Why do models of complex economic and social systems often give poor or inconsistent
results?

Correct answer:
-

pg 362


Chapter 8

1.

Most of the delay in the opening of the Denver Inte
rnational Airport was because of problems
with

Correct answer:
-

pg 417
-
418

2.

One of the sources of failure common to BOTH the Therac
-
25 and the Ariane 5 rocket was


Correct answer:
-

pg 426
-
430 and 432

4.

Which of the following jobs is subject to Repet
itive Strain Injuries (RSI):

Correct answer: d
-
pg 411

5.

The Hong Kong and Kuala Lumpur airports suffered from computer system failures on their
opening days. What was to blame for these failures?

Correct answer: c
-

pg 418


Chapter 9

1.

In one applicati
on of a voice
-
recognition system, the system failed to recognize female
speakers. A likely reason was

Correct answer:
-

pg 460

3.

Which of the following is NOT a principle for producing good systems?

Correct answer:
-

pg 458
-
460