|
Question 1. What question will help prevent defining a use case that is too small? A. What common behavior does this use case have with other use cases? B. What steps will an actor perform in this use case? C. What goal does an actor achieve with this use case? D. How does this use case fit into the overall structure of the system? Answer: C Question 2. Given: A developer is creating a use-case model for telephone installations. One of the sub-flows in the "Manage Installer's Schedule" use case displays an installer's schedule for a whole day. The client for whom the system is being built wants to add a new feature that allows a dispatcher to optionally display mileage between phone installation locations. Instead of modifying the "Manage Installer's Schedule" use case, the developer decides to create a new use case called "Display Mileage." What relationship should be created between the "Display Mileage" use case and the "Manage Installer's Schedule" use case? A. Include B. Generalization C. Modify D. Extend Answer: D Question 3. What are the advantages of the use-case approach over traditional development approaches? A. Use cases give context to requirements B. Use cases identify all stakeholders C. Use cases visualize constraints D. Use cases represent the user's perspective Answer: A,D Question 4. What question helps identify the actors in software requirements? A. Who will be using the system? B. Who will be paying for the system? C. What subsystems will be in the system? D. Who will be designing the system? Answer: A Question 5. Which statements are TRUE regarding a use case? (Select all that apply.) A. A use case is an isolated part that provides a piece of functionality for the system to be built. B. A use case describes actions the system takes to deliver something of value to the actor. C. A use case contains functional software requirements. D. A use case models a dialog between the system and its surroundings. Answer: B,C,D Question 6. What does a supplementary specification include? A. <> and < > relationships associated with a particular use case B. Use-case diagram for the entire system C. Non-functional requirements associated with a particular use case D. Non-functional requirements associated with the entire system Answer: D Question 7. Refer to the exhibit below. What are the three types of relationships in this use case? A. X includes, Y generalization, Z extends B. X extends, Y generalization, Z includes C. X extends, Y includes, Z generalization D. X generalization, Y includes, Z extends Answer: A Question 8. Given: Consider the following set of initial user requests from a telephone company about a new customer service system: * The telephone company customer service system shall be able to record and answer questions about telephone installations. * When a customer requests a new telephone, the service representative shall record the customer's name, address, assigned phone installer, and a projected time of the installation. * After installation is complete, start time and duration of installation are recorded. * Start time shall include the year, month, day, hour, and minute. What is the most appropriate name for one of the use cases in this software system? A. Schedule phone installation B. Update phone installation database C. Phone installation D. Record start time Answer: A Question 9. What is an actor? A. Role a person or thing plays when interacting with the system B. Anyone who will purchase the system C. Anyone who has a vested interest in the outcome of the system D. Role a tester plays when testing the system Answer: A Question 10. What does a post-condition describe? A. One way that a use case can end B. State of the system after the use case ends C. Last non-functional requirement D. Last step in the basic flow of events Answer: B Question 11. What characterizes a generic alternative flow of events? A. Applies at any point in a use case B. Is part of all scenarios C. Is part of several different use cases D. Handles several different error conditions Answer: A
|
Question 1. Which of these can you use to determine whether there is network connectivity between your computer and a web server on the Internet? A. Whois B. Finger C. Lookup D. Traceroute Answer: D Question 2. You are an admin user, and have enabled the Ignore Volume Ownership option for an external FireWire hard disk. What will happen the next time a standard user attempts to mount the disk? A. The disk will mount, and the user will be able to read, modify, and delete any file on the disk. B. The disk will mount, and the user will be able to read any file on the disk; the user will be required to enter an administrator password to modify or delete files on the disk. C. The user will be required to enter an administrator password to mount the disk; once the disk is mounted the user will be able to read, modify, and delete any file on the disk. D. The user will be required to enter an administrator password to mount the disk; once the disk is mounted, the user will be able to read any file on the disk, but will be required to re-enter an administrator password to modify or delete files. Answer: A Question 3. Review the screenshot of a user's home folder, and then answer the question below. Which folder did the user create? A. Music B. Pages C. Pictures D. Downloads Answer: B Question 4. Mac OS X v10.5 can read files on a volume that is ________-formatted, but it cannot write to files on the volume. A. UFS B. NTFS C. EXT2 D. FAT32 Answer: B Question 5. Which procedure will let someone who does not have a local user account log in to a local admin user account on a Mac OS X v10.5 computer that does NOT have a firmware password enabled? A. Log in to the computer with the user name "root" and the master password, open Accounts preferences, and reset the admin user password. B. Remove a RAM DIMM from one of the computers RAM slots, restart the computer while holding down the Command-Option-O-F keys until you hear the startup sound, then type "reset-all" at the prompt. C. Start the computer from the internal hard disk, log into a guest user account, open the Reset Password utility in the /Applications/Utilities folder, then reset the password on the admin user account that resides on the hard disk volume. D. Press the C key while restarting the computer with the Mac OS X v10.5 Install DVD inserted, then choose Reset Password from the Utilities menu. Select the hard disk volume and the admin user account, then enter a new password for the account and click Save. Answer: D Question 6. You have configured your Mac OS X v10.5 computer to share its connected USB printer. Mac OS X users can locate and print to it, but Windows users can not. What additional step must you take to allow Windows users to print to it? A. In Sharing preferences, enable file sharing over SMB. B. In Print & Fax preferences, enable the SMB printer driver. C. In Printer Setup Utility, enable Windows Printing from the Printers menu. D. In Print & Fax preferences, configure the Windows Printer name and queue. Answer: A Question 7. Review the screenshots of a files permissions, as seen in Finder and from Terminal, and then answer the question below. Why are Kim's permissions to the file, Report.rtf, NOT visible in the Terminal listing? A. Kims permissions are stored as POSIX settings. B. Kims permissions are stored in the volume catalog. C. Kims permissions are stored in the file data segment. D. Kims permissions are stored in an Access Control List (ACL). Answer: D Question 8. Tom wants to share a document with Harriet. Both have standard user accounts on the same Mac OS X v10.5 computer. Which of these is NOT a location where Tom can store the document so that Harriet can read it? A. /Users/Shared/ B. /Users/tom/Public/ C. /Users/harriet/Public/ D. /Users/harriet/Public/Drop Box/ Answer: C Question 9. The primary role of the master password in Mac OS X v10.5 is to let you ________. A. Access all the passwords stored in a local keychain B. Reset the password of an account that has FileVault enabled C. Change the startup device by holding down the Option key while the computer starts up D. Connect to any password-protected web server whose password is stored in a local keychain Answer: B Question 10. Which statement identifies a potential effect of resetting the master password for a Mac OS X v10.5 computer? A. Users with keychain files created before you changed the master password must use the old master password to unlock their keychains. B. Users who enabled FileVault before you changed the master password will not be able to access their home folder if they have forgotten their account password. C. Users with keychain files created before you changed the master password will have their keychain passwords automatically updated to match the new master password. D. Users whose accounts were created before you changed the master password must use the firmware password to access their home folder if they have forgotten their account password. Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.