swe Flashcards

(69 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary goal of Requirements Engineering (RE)?

A

To use methods and tools to help people specify the qualities and functions of the ‘right’ system to build.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is Requirements Engineering (RE) considered a hard discipline?

A

Because it is a mix of technical and social challenges, often with no single right answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to Sommerville, what is the key difference between requirements and design?

A

Requirements describe what the system should do, whereas design describes how the system will do it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the distinction between a ‘user’ and a ‘stakeholder’ in Requirements Engineering?

A

A user directly interacts with the system, while a stakeholder is anyone positively or negatively affected by it, which includes users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A non-functional requirement (NFR) is best thought of as a system _____.

A

quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are ‘Domain Properties’ or ‘Assumptions’ in the context of requirements?

A

Characteristics of the problem domain that are assumed to hold true but do not have to be achieved by the system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes global issues, often from business or legal sources, that shape a system’s requirements, such as a project deadline?

A

Constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the ‘say-do’ problem, also known as tacit knowledge, in requirements elicitation?

A

People find it difficult to describe knowledge they regularly use, leading to discrepancies between what they say and what they do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a significant drawback of using documentation for requirements elicitation?

A

The documentation may be out of date or reflect an ideal version of reality rather than the actual process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In requirements elicitation, what is the main advantage of interviews over surveys?

A

Interviews provide a rich source of data and allow for probing and asking follow-up questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a major disadvantage of using surveys or questionnaires for requirements elicitation?

A

There is no opportunity to clarify misunderstood questions or to ask follow-up questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What phenomenon in group elicitation techniques describes when people tend to follow the group consensus rather than offering divergent ideas?

A

Groupthink.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key benefit of using observation as an elicitation technique?

A

It allows the observer to see how things are really done, revealing details people might not otherwise mention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the standard format for writing a user story description?

A

As a <type>, I want <some> so that <some>.</some></some></type>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ‘Conditions of Satisfaction’ in the context of a user story?

A

They are high-level acceptance tests that will be true after the user story is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the INVEST acronym for user story quality, what does the ‘N’ stand for?

A

Negotiable, meaning details are not fixed contracts and can be discussed between the customer and development team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary purpose of a requirements context diagram?

A

To define the scope of a system by showing its boundaries, the external entities (actors) it interacts with, and the data flowing between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In a requirements context diagram, relationships between the system and actors must represent _____ and not actions.

A

data or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the difference between requirements validation and verification?

A

Validation asks ‘Are we building the right system?’, while verification asks ‘Are we building the system right?’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a major advantage of using paper prototypes for requirements validation?

A

They are fast to create, inexpensive, and make concepts concrete for stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of requirements traceability?

A

To track where each requirement came from and to trace how requirements are satisfied by design, code, and test elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A _____ system is a computer system with software that is embedded in system hardware, often in read-only memory.

A

embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a key characteristic of a real-time system?

A

Its correct functioning depends not only on the results produced but also the time at which these results are produced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Distinguish between a 'hard' and a 'soft' real-time system.
A hard real-time system's operation is incorrect if timing is missed, while a soft real-time system's operation is only degraded.
26
In a reactive system, stimuli that occur at predictable time intervals are known as _____ stimuli.
periodic
27
What are the three main software elements of an embedded system's architecture?
Sensor control processes, a data processor, and actuator control processes.
28
In the 'producer/consumer' process coordination pattern, what is the purpose of a shared buffer?
It allows producer and consumer processes to run at different speeds while ensuring mutual exclusion to shared data.
29
Which architectural pattern for embedded systems is used when data must be transformed through a sequence of processes before it can be used?
Process Pipeline.
30
The _____ pattern is an architectural pattern used in embedded systems to monitor sensors and update displays or trigger actions based on detected changes.
Observe and React
31
What is the goal of a timing analysis in a real-time system?
To calculate how often each process must execute to ensure all deadlines are met.
32
What is Software Engineering?
An engineering discipline concerned with all aspects of software production, from initial conception to operation and maintenance.
33
According to studies like one from IBM, when is the relative cost of fixing a software defect the highest?
During the deployment or maintenance phase of the development cycle.
34
What software bug caused the Therac-25 radiation therapy machine to deliver massive overdoses of radiation?
Concurrent programming errors, also known as race conditions.
35
The failure of the Ariane 5 rocket flight V88 was due to an integer overflow error in dead code intended for which previous rocket model?
Ariane 4.
36
Name two of the four key qualities of 'good software'.
Acceptability, Dependability & Security, Efficiency, and Maintainability.
37
What is a primary problem with the traditional Waterfall model of software development?
Its inflexibility makes it difficult to respond to changes in requirements once a phase is complete.
38
What is a key benefit of the incremental development model?
It allows for faster feedback and more rapid delivery of useful functionality to the customer.
39
What does a Work Breakdown Structure (WBS) do in project management?
It provides a deliverable-oriented breakdown of a project into smaller, more manageable components.
40
According to Brook's Law, what is the effect of adding more people to a late software project?
It delays the project even further due to increased communication and coordination overhead.
41
What are the four main stages of risk management in a project?
Risk identification, risk analysis, risk planning, and risk monitoring.
42
The EU's Cyber Resilience Act (CRA) is a legal framework that describes cybersecurity requirements for what types of products?
Hardware and software products with digital elements placed on the market of the European Union.
43
What is the term for the safeguarding of people, society, organisations, and nations from cyber risks?
Cybersecurity.
44
What are the three core principles of the CIA triad in information security?
Confidentiality, Integrity, and Availability.
45
In the CIA triad, which principle ensures that information is not disclosed to unauthorised individuals, entities, or processes?
Confidentiality.
46
The principle of _____ in the CIA triad is the property of accuracy and completeness of information.
Integrity
47
Which principle of the CIA triad describes the property of a system being accessible and usable on demand by an authorised entity?
Availability.
48
What security property ensures that the sender, receiver, and content of a transmitted file can be established, preventing denial of the transaction?
Non-repudiation.
49
What is a key trade-off when implementing multi-factor authentication (MFA) to improve confidentiality?
It can potentially hinder availability if users lose access to their authentication method.
50
A _____ is a weakness in a system, while a _____ is a potential event that could exploit that weakness.
vulnerability, threat
51
What is an attack vector in the context of cybersecurity?
The path or means by which an attacker can gain access to a computer or network server to deliver a payload or malicious outcome.
52
The Stuxnet worm specifically targeted which type of industrial control system component?
Programmable logic controllers (PLCs).
53
What is the goal of the 'exposure limitation and recovery' strategy in secure software design?
To design the system so that the adverse consequences of a successful attack are minimised.
54
The _____ cube is a model for classifying attack vectors along three dimensions: the state of the asset, the type of assurance, and the type of vulnerability.
McCumber
55
STRIDE Threat: Spoofing
This threat involves an attacker illicitly assuming the identity of another entity, such as mimicking a login screen to capture credentials.
56
STRIDE Threat: Tampering
This threat involves the malicious modification of data, such as using a virus to alter the logic of a host program.
57
STRIDE Threat: Repudiation
This threat involves a user denying having performed an action, which is often countered by mechanisms like secure logging (e.g., changing log files to hide actions).
58
STRIDE Threat: Information Disclosure
This threat involves exposing information to individuals who are not authorised to see it, such as viewing confidential data transmitted in plaintext.
59
STRIDE Threat: Denial-of-Service
This threat aims to make a system or network resource unavailable to its intended users, for instance, by overwhelming it with traffic.
60
In the user story quality acronym INVEST, what does the 'I' represent?
Independent, meaning user stories should not depend on each other as much as possible.
61
What type of interview for requirements elicitation uses a strict, predefined set of questions?
A structured interview.
62
Which software development life cycle model is described as a 'plan-driven model' with separate and distinct phases of specification and development?
The Waterfall model.
63
What is the term for the formal document that acts as a collection of requirements, often serving as a contract between analysts and developers?
Software Requirements Specification (SRS).
64
What type of requirements modelling, commonly used in UX, illustrates user needs, emotions, and interactions with an organisation over a specific timeline?
Customer Journey Map.
65
What is the key difference between an elicitation walkthrough and an inspection?
A walkthrough is typically an informal developer technique to find defects, while an inspection is a formal process management tool to improve the development process itself.
66
What term refers to the path an attacker follows to reach an asset, which may involve exploiting one or more vulnerabilities?
Attack vector.
67
In real-time systems, stimuli that occur at unpredictable times, such as a power failure, are known as _____ stimuli.
aperiodic
68
What is the main function of the 'scheduler' component in a Real-Time Operating System (RTOS)?
It chooses the next process to be run based on scheduling information and timing constraints.
69
Which architectural pattern is suitable for a system that includes sensors providing information about the environment and actuators that can change it?
Environmental Control.