CORRECT 100%
A programming company has been hired to write code that will send secure messages
from one device to another. The company policy is to follow the software development
lifecycle (SDLC) model for production. Which step will the team expect to go through
during the course of this process? - ANSWERTest the program. Rationale: The SDLC
model has seven structured steps: understand the problem, plan the logic, code the
program, use software to translate the program into machine language, test the
program, put the program into production, and maintain the program.
Which situation represents a violation of the Codes of Ethics for both the Association of
Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers
(IEEE)? - ANSWEROne of the division heads assigns work to employees that is outside
of their area of competence.
A programmer has been asked to lead a project that uses artificial intelligence to search
for patterns in Wi-Fi signals to improve efficiency and range. The programmer will use
the software development lifecycle (SDLC) as a model for design and implementation.
Which step is the programmer in when outlining the steps that the program will go
through? - ANSWERPlan the logic. Rationale: 2nd step of the SDLC, in this step, the
programmer develops all necessary algorithms often using either flowcharts or
pseudocode.
A computer scientist is writing a computer application that will manage financial records
for small businesses. The computer scientist is following the software development
lifecycle (SDLC) model and just completed the step, "understand the problem." Which
step is next in the SDLC? - ANSWERPlan the logic.
What does a technology company need to commit to if adopting the Association of
Computing Machinery (ACM) Code of Ethics? - ANSWERPerform work only in areas of
competence.
What is one situation that illustrates extortion? - ANSWERA person hacks into a
university's servers, locks them down, and will only unlock them for a large ransom.