Source Code Management tools like Git allow developers to _______ changes, providing a history of code modifications.
- Commit
- Deploy
- Ignore
- Reject
Source Code Management tools like Git allow developers to "Commit" changes, which records the modifications made to the code, providing a history for version control.
Which stakeholders are typically involved in the process of gathering requirements?
- Customers and end-users
- Only developers
- Only project managers
- Only the testing team
Requirement gathering involves a range of stakeholders, including customers and end-users. These individuals provide insights into the system's requirements and how it should function from a user perspective.
What considerations are crucial when choosing a deployment strategy for a software application?
- Select the strategy that your competitor is using.
- Consider the impact on users, rollback options, and the complexity of the application.
- Deployment strategies have no impact on software development.
- Choose the strategy that requires the least effort.
When choosing a deployment strategy, critical factors include considering the impact on users, available rollback options, and the complexity of the application. These considerations ensure a successful software release.
What is the main purpose of a user story in Agile methodologies?
- To assign tasks to team members.
- To capture end-user needs.
- To describe technical details.
- To track project timelines.
A user story in Agile serves to capture end-user needs and requirements in a simple, non-technical manner, fostering collaboration and understanding among team members.
A team is developing a safety-critical system. Which code review techniques would be most appropriate to ensure the reliability and correctness of the code?
- Formal Inspections
- Lightweight Code Reviews
- No Code Review
- Pair Programming
In the context of safety-critical systems, where reliability and correctness are paramount, formal inspections are the most appropriate code review technique. Formal inspections involve rigorous, structured reviews that can uncover potential issues and defects in the code that might be missed in less formal processes.
What considerations should be made when choosing a software maintenance model for a legacy system?
- Compatibility with existing tools and systems.
- Cost is the only factor.
- Ignore user feedback.
- Only consider the latest technology trends.
When choosing a software maintenance model for a legacy system, compatibility with existing tools and systems is crucial. Cost, user feedback, and technology trends are also important but secondary factors.
What is the main purpose of validating requirements in a software development project?
- To create user documentation
- To design the user interface
- To eliminate project risks
- To identify and resolve issues early
Validating requirements in a software development project is essential to identify and resolve issues and discrepancies early in the project, ensuring that the final product meets the desired objectives and quality standards.
In the context of incident response, what is the purpose of the recovery phase?
- To analyze security logs
- To identify vulnerabilities
- To investigate the breach
- To restore normal operations
The recovery phase in incident response is focused on restoring normal operations, services, and data after a security incident, ensuring that the organization can continue its activities with as little disruption as possible.
How can servlet initialization parameters be used effectively for database connectivity?
- By embedding database connection details directly in the servlet code.
- By relying on default database configurations provided by the servlet container.
- By storing database connection details as initialization parameters and retrieving them in the servlet's init() method.
- By using context parameters instead of initialization parameters for database connectivity.
Servlet initialization parameters can be used effectively for database connectivity by storing database connection details in the web.xml file and retrieving them in the servlet's init() method for establishing connections.
A cookie's security can be enhanced by setting the _________ flag, which prevents its access via JavaScript.
- HttpOnly
- Max-Age
- Path
- Secure
The HttpOnly flag enhances a cookie's security by preventing its access via JavaScript.