Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISC 3140 FINAL EXAM REVIEW WITH CORRECT ANSWERS!!

Beoordeling
-
Verkocht
-
Pagina's
4
Cijfer
A+
Geüpload op
27-10-2025
Geschreven in
2025/2026

What is the purpose of the .PHONY keyword in a makefile? - ANSWERTo name a recipe that will execute once requested/Targets that do not refer to files but are just actions are called phony targets. Source: a) Why is the Therac report of great importance to programmers (i.e. what is the fact demonstrated by the report that should be of major importance to the approach that should be taken when software is developed)? b) The Therac programmers engaged in several practices that either failed to prevent errors from being included in production code or failed to repair programming errors when incorrect program behavior was detected. Briefly state what two of those detrimental practices were. - ANSWERa) Bad software kills. if software is not designed correctly and tested carefully and correctly you are putting people's lives in danger. b) Failed to properly test code; Failed to listen to user feedback. Source: What is one reason why, despite its age and poor support for object oriented programming, does COBOL survive as a language of choice (if not the language of choice) for programming business applications? - ANSWERCOBOL supports decimal arithmetic. Write a Scheme function `build astring n` that will contruct a list of `n` copies of an arbitrary string `astring`, where `n` is a positive integer larger than 0. Assume that `astring` is a properly constructed list and `n` is an integer greater than 0, so not editing the parameters is required. Hint: The function `cons item alist` adds the element item

Meer zien Lees minder
Instelling
CISC 3140
Vak
CISC 3140

Voorbeeld van de inhoud

CISC 3140 FINAL EXAM REVIEW
WITH CORRECT ANSWERS!!
What is the purpose of the .PHONY keyword in a makefile? - ANSWERTo name a
recipe that will execute once requested/Targets that do not refer to files but are just
actions are called phony targets.
Source: https://www.gnu.org/software/make/manual/make.html#Simple-Makefile

a) Why is the Therac report of great importance to programmers (i.e. what is the fact
demonstrated by the report that should be of major importance to the approach that
should be taken when software is developed)?

b) The Therac programmers engaged in several practices that either failed to
prevent errors from being included in production code or failed to repair
programming errors when incorrect program behavior was detected. Briefly state
what two of those detrimental practices were. - ANSWERa) Bad software kills. if
software is not designed correctly and tested carefully and correctly you are putting
people's lives in danger.

b) Failed to properly test code; Failed to listen to user feedback.

Source: https://web.stanford.edu/class/cs240/old/sp2014/readings/therac-25.pdf

What is one reason why, despite its age and poor support for object oriented
programming, does COBOL survive as a language of choice (if not the language of
choice) for programming business applications? - ANSWERCOBOL supports
decimal arithmetic.

Write a Scheme function `build astring n` that will contruct a list of `n` copies of an
arbitrary string `astring`, where `n` is a positive integer larger than 0. Assume that
`astring` is a properly constructed list and `n` is an integer greater than 0, so not
editing the parameters is required. Hint: The function `cons item alist` adds the
element item to the left end of the list `alist`. - ANSWER(define build(lambda (astring
n) ;constructs a list with arguments/parameters
(if(= n 0) (list) ;if n is equal to 0, return a list
(cons astring (build (- n 1) ) ;cons constructs a list (cons X l) → (listof X)
)
)
)
)

What does the Subversion program do when it discovers that two programmers have
made different changes to the same line of code while that code is not in the
repository? - ANSWERNotifies both programmers, halting commits, to agree upon a
a set change for the file before committing that file.

a) What is a computer program?

Geschreven voor

Instelling
CISC 3140
Vak
CISC 3140

Documentinformatie

Geüpload op
27 oktober 2025
Aantal pagina's
4
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
papersbyjol West Virginia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
442
Lid sinds
3 jaar
Aantal volgers
254
Documenten
14151
Laatst verkocht
1 week geleden

3.7

78 beoordelingen

5
29
4
20
3
18
2
2
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen