PY365 Lesson 6 Exam SCORE 90 PERCENT

  

The discipline focused on the production of software, as well as the development of tools, methodologies, and theories supporting software production, is most accurately called:

Question options:

  

artificial intelligence.

 

computer engineering.

 

computer science.

 

software engineering.

 

Question 2

Which mistake was NOT made by AECL, the manufacturer of the Therac-25?

Question options:

  

It did not include software or   hardware devices to detect and report overdoses.

 

It did not tell other hospitals   about possible overdose incidents.

 

It reused code without proper   testing.

 

It continued to sell the Therac-25   after the FDA declared it to be defective.

 

Question 3

In November 2002 a programming error caused a touch-screen voting machine to fail to record 436 ballots cast in Wake County:

Question options:

  

North Carolina.

 

Indiana.

 

Florida.

 

California.

 

Question 4

Which of these statements about the National Crime Information Center (NCIC) is true?

Question options:

  

The NCIC databases contain about   40 million records.

 

Improper use of the NCIC has led   to about 1 million false arrests.

 

Local law enforcement agencies   enter most of the information that is in the NCIC databases.

 

The Department of Homeland   Security is in charge of the NCIC.

 

Question 5

__________ is the process of determining if a computer program correctly implements the simulation model.

Question options:

  

Identification

 

Verification

 

Conditioning

 

Specification

 

Question 6

The process of determining if a model is an accurate representation of the real system is called:

Question options:

  

the null hypothesis.

 

software engineering.

 

synthesis.

 

validation.

 

Question 7

In a(n) __________, two or more concurrent tasks share a variable, and the order in which they read or write the value of the variable can affect the behavior of the program.

Question options:

  

causal condition

 

integrated system

 

race condition

 

direct system

 

Question 8

Computer simulations can:

Question options:

  

accurately predict the weather a   month in advance.

 

save automobile manufacturers time   and money as they develop new cars.

 

prove our planet is overpopulated.

 

All of the above

 

Question 9

The AT&T long-distance network did not collapse entirely on January 15, 1990, because:

Question options:

  

the U.S. Secret Service arrested   the culprits before they could do any further damage.

 

AT&T technicians rapidly   fixed the software bug in the routing switches.

 

MCI loaned some equipment to   AT&T.

 

not all the routing switches had   been converted to the latest software.

 

Question 10

The Ariane 5 was a satellite launch vehicle designed by the __________ space agency.

Question options:

  

British

 

U.S.

 

German

 

French

 

Question 11

The Ariane 5 satellite launch vehicle failed because:

Question options:

  

a faulty on-board computer caused   the other computers in the network to crash repeatedly.

 

a bad sensor fed faulty   information into the flight control computer, causing it to fail.

 

the rocket’s on-board computer   sent back faulty information to ground control, causing the human controllers   to destroy the rocket.

 

code that worked correctly on the   Ariane 4 failed on the Ariane 5.

 

Question 12

Software engineers use a four-step process to develop a software product. Which of the following is NOT one of the steps?

Question options:

  

Validation

 

Simulation

 

Evolution

 

Specification

 

Question 13

The Patriot missile system:

Question options:

  

was designed to shoot down   airplanes.

 

failed to shoot down a Scud   missile that killed 28 U.S. soldiers in the Gulf War.

 

failed because it had been left   running too long.

 

All of the above

 

Question 14

Some computer experts have spoken out against the conversion to touch-screen voting machines because:

Question options:

  

there is no evidence that there   have been any problems with punched card systems.

 

they are made in China, which does   not even hold elections.

 

a power failure could make it   impossible for people to vote.

 

they do not have a paper audit   trail.

 

Question 15

In 1999 computer errors led to the loss of two NASA probes to:

Question options:

  

The Moon.

 

Mars.

 

Venus.

 

Saturn.

 

Question 16

Which of the following is NOT a reason to use a computer simulation?

Question options:

  

To model past events

 

To produce a detailed financial   model

 

To reduce costs

 

To save time

 

Question 17

The inability of BAE Automated Systems to create an automated baggage handling system led to a significant delay in the opening of the new airport outside the city of:

Question options:

  

Boston.

 

Chicago.

 

Philadelphia.

 

Denver.

 

Question 18

In 1975 Congress passed the __________. One goal of the act was to prevent manufacturers from putting unfair warranties on products costing more than $25.

Question options:

  

Retail Protection Act

 

Uniform Commercial Code

 

Limitation of Remedies and Liability   Act

 

Magnuson-Moss Warranty Act

 

Question 19

Which of the following is NOT an issue with DRE voting machines used in Brazil and India?

Question options:

  

Lack of a paper audit trail

 

Vulnerability to tampering

 

Voter identity may be revealed

 

Source code is a trade secret

 

Question 20

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to:

Question options:

  

shrink the size of the machine   considerably.

 

increase the stock price of its   subsidiary Digital Equipment Corporation.

 

reduce costs by replacing hardware   safety features with software safety features.

 

eliminate the need for lead   shielding.

Discussion

 

Write 400–600 words that respond to the following questions:  

  • Explain with example the practical cryptanalytic attacks on 3DES.
  • Is it possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and counter modes? If yes, how. If not, why not?

End product

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.

Essay

 

What is Diffie-Hellman key exchange algorithm, its use and protocol and how it works?

Demonstrate your understanding with examples.

Windows Server Project

Looking to get some assistance with this assignment.

  

There are specific requirements for the assignment: The final submission should contain at least 6 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

· At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader’s understanding of the proposal. Additional diagrams, images, or tables are welcome.

· The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

· The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

· At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end.