next up previous
Next: About this document ...

CISP457 Practice Final

Prof. Tak Auyeung

Instructions: You may bring any material that is handwritten or printed prior to the examination to help you. You can also bring a calculator if you think it may help you. However, you can only use the calculator for numerical computations only. You cannot let your calculator compile a program, or to communicate with others.

You, as an individual, are expected to do your own work. This means you cannot seek, receive or otherwise acquire any assistance except clarifications from the professor during an examination. Any communication involving the contents of the subject matter or the examination is considered cheating. Do not initiate or accept such communication, or the result of your examination is automatically voided.

New rules, read this! As of 2003.09.22, I no longer deduct points for wrong answers. Each correct answer is worth one point, each wrong answer is worth zero point, and each unanswered question is also worth zero point. This means you should guess and leave no question unanswered.

As a result, I also need to adjust the letter grade assignment break points. For your individual examinuation, ``A'' means at least 94%, ``B'' means at least 74%, ``C'' means at least 54%, ``D'' means at least 34% and ``F'' means below 34%. The break points for the final grade are now 26.83%, 48.5%, 70.17% and 91.83% as minimums for ``D'', ``C'', ``B'' and ``A'', respectively.

Please note that this change does not affect your letter grade at all, it is just a number game to make some people feel better about guessing.

Make sure you write down you name on the upper right corner first, otherwise I cannot give points to anonymous students!

The baseline is XX, there are YY questions.

  1. The test engineer/QA can use the following diagram and test for what?

    \includegraphics{final_ud1}

    1. the logic involved in use case X
    2. the logic involved in use case Y
    3. that A can access use case X
    4. that B can access use case X and Y
    5. both 1c and 1d
  2. A class diagram can be used to display a lot of information. Which of the following cannot be represented by a class diagram?
    1. relationships among classes
    2. multiplicity of associations among classes
    3. lists of attributes of a class
    4. lists of methods (operations) of a class
    5. the logic of methods of a class
  3. In an online DVD rental service, such as Netflix, the information system must track a particular DVD. As a result, a particular DVD is represented as an object of the class ``DVD_Copy''.

    In the following state diagram for the ``DVD_Copy'' class, when an object of this class is in a ``Returned'' state, which triggers are meaningful?

    \includegraphics{final_dvd_sd}

    1. only Reserve
    2. only Inspected
    3. Received and Reserve
    4. it is not indicated by the diagram
    5. Received and Inspected
  4. In an online DVD rental service, a registered user is allowed to specify a queue of DVDs that he/she wants to rent.

    In the following class diagram, an object of the class ``Request_Queue'' is used to represent a request queue. An object of the class ``Queue_Entry'' is used to represent an entry in a request queue. An object of the class ``DVD_Copy'' is used to represent a particular DVD. An object of the class ``DVD_Title'' is used to represent a particular DVD title.

    \includegraphics{final_queue_cd}

    Select the statement that is false.

    1. a request queue can be empty (no requested DVD)
    2. a DVD title must have at least one copy of it
    3. there can be fewer copies of a DVD than the number of requests for it
    4. a DVD title can be requested by more than one request queues
    5. there can be more copies of a DVD than the number of requests for it
  5. Who is responsible to repair programs once defects are found?
    1. System analysts
    2. Programmers
    3. Testers/QA
    4. Technical writers
    5. Client
  6. Which of the following is not a security requirement?
    1. authorized only access to servers
    2. all transmissions over untrusted network be encrypted
    3. server be expandable to handle 200 operators
    4. all accepted passwords cannot be found in hacker dictionary
    5. both 6b and 6c



next up previous
Next: About this document ...
Tak Auyeung 2003-12-10