Anda di halaman 1dari 240

U01 - Q.

008 - M Which of the following examples best illustrates the systems theo ry principle that "systems try to maintain balance in their environment"? Member s may take time off to "play" when work becomes too intense. Members may unexpec tedly come up with new ideas and techniques. Effective groups have clear goals. Groups suffer if members fail to cooperate. Groups rely on member input to achie ve a common goal. - Members may take time off to "play" when work becomes too in tense.a clear goal. - Members may unexpectedly come up with new ideas and techni ques. a clear goal. - Effective groups have clear goals.a clear goal. - Groups s uffer if members fail to cooperate.a clear goal. - Groups rely on member input t o achieve a common goal. a clear goal. answer: Members may take time off to "play" when work becomes too intense. U01 - Q.010 - M A stamp collecting club is an example a self-help group. social group. learning group. service group. public group. - self-help group. Members m ay take time off to "play" when work becomes too intense. - social group. Member s may take time off to "play" when work becomes too intense. - learning group. M embers may take time off to "play" when work becomes too intense. - service grou p. Members may take time off to "play" when work becomes too intense. - public g roup. Members may take time off to "play" when work becomes too intense. answer: social group. U01 - Q.012 - M A local Alcoholics Anonymous chapter is an example of a primary group. self-help group. learning group. service group. public group. - primary g roup. social group. - self-help group. social group. - learning group. social gr oup. - service group. social group. - public group. social group. answer: self-help group. U01 - Q.016 - M A college's Board of Trustees that makes public policy decisions may be classified as a symposium. forum. panel discussion. governance group. se rvice group. - symposium. self-help group. - forum. self-help group. - panel dis cussion. self-help group. - governance group. self-help group. - service group.s elf-help group. answer: governance group. U01 - Q.020 - M When seeking to resolve group tensions, the dialectic approach r ecommends a __________________ approach. compromise either/or both/and approach/ avoidance task/maintenance - compromise governance group. - either/or governance group. - both/and governance group. - approach/avoidance governance group. - ta sk/maintenance governance group. answer: both/and U01 - Q.022 - M In group dialectic terms, effective groups balance structure and heterogeneity. disengagement. spontaneity. engagement. individual goals. - hete rogeneity. both/and - disengagement.both/and - spontaneity. both/and - engagemen t. both/and - individual goals. both/and answer: spontaneity. U01 - Q.026 - M The homogeneous heterogeneous group dialectic can be described a s balancing a commitment to group norms and standards with a willingness to diff er and change. balancing member similarities and differences. balancing external support and recognition with internal group solidarity and rewards. balancing e ffective leadership with responsible followership. balancing members' personal g oals with the group's common goal. - balancing a commitment to group norms and s tandards with a willingness to differ and change.spontaneity. - balancing member similarities and differences.spontaneity. - balancing external support and reco gnition with internal group solidarity and rewards. spontaneity. - balancing eff ective leadership with responsible followership. spontaneity. - balancing member s' personal goals with the group's common goal. spontaneity. answer: balancing member similarities and differences. U01 - Q001 Choose two elements that help you to succeed in groups: Listen in a s kimming mode Understand your role Ask clear questions Dominate the group - Liste n in a skimming mode balancing member similarities and differences. - Understand your role balancing member similarities and differences. - Ask clear questions balancing member similarities and differences. - Dominate the group balancing me mber similarities and differences. answer: Understand your role Ask clear questions

U01 - Q002 Choose two elements that prevent you from working effectively in grou ps: Communicate effectively with homogeneous group members only Use jargons at a ll times to show professionalism. Resolve group conflict Convey a professional i mage - Communicate effectively with homogeneous group members only Understand yo ur role Ask clear questions - Use jargons at all times to show professionalism. Understand your role Ask clear questions - Resolve group conflict Understand you r role Ask clear questions - Convey a professional image Understand your role As k clear questions answer: Communicate effectively with homogeneous group members only Use jargons at all times to show professionalism. U01 - Q003 What is the ideal size for a problem-solving group ? Two to three mem bers Three to five members Four to six members Five to seven members - Two to th ree members Communicate effectively with homogeneous group members only Use jarg ons at all times to show professionalism. - Three to five members Communicate ef fectively with homogeneous group members only Use jargons at all times to show p rofessionalism. - Four to six members Communicate effectively with homogeneous g roup members only Use jargons at all times to show professionalism. - Five to se ven members Communicate effectively with homogeneous group members only Use jarg ons at all times to show professionalism. answer: Five to seven members U01 - Q004 What does NOT belong to group dialectics ? Individual Goals `\leftrig htarrow` Group Goals Conforming `\leftrightarrow` Nonconforming Homogenous `\lef trightarrow` Heterogeneous Leadership `\leftrightarrow` Ethics - Individual Goal s `\leftrightarrow` Group Goals Five to seven members - Conforming `\leftrightar row` Nonconforming Five to seven members - Homogenous `\leftrightarrow` Heteroge neous Five to seven members - Leadership `\leftrightarrow` Ethics Five to seven members answer: Leadership `\leftrightarrow` Ethics According to your textbook, the most important factor separating successful grou ps from unsuccessful ones is having a minimum of 5 and a maximum of 12 members i n a group. a clear goal. strong leadership. member independence and interdepende nce. group morale - having a minimum of 5 and a maximum of 12 members in a group .Leadership `\leftrightarrow` Ethics - a clear goal.Leadership `\leftrightarrow` Ethics - strong leadership.Leadership `\leftrightarrow` Ethics - member indepen dence and interdependence.Leadership `\leftrightarrow` Ethics - group moraleLead ership `\leftrightarrow` Ethics answer: a clear goal. U01 - Q005 The engaged disengaged group dialectic can be described as balancing a commitment to group norms and standards with a willingness to differ and chang e balancing a motivation to complete tasks with promoting member relationships b alancing external support and recognition with internal group solidarity and rew ards balancing effective leadership with responsible followership balancing memb er energy and labor with the group's need for rest and renewal - balancing a com mitment to group norms and standards with a willingness to differ and change a c lear goal. - balancing a motivation to complete tasks with promoting member rela tionships a clear goal. - balancing external support and recognition with intern al group solidarity and rewards a clear goal. - balancing effective leadership w ith responsible followership a clear goal. - balancing member energy and labor w ith the group's need for rest and renewal a clear goal. answer: balancing member energy and labor with the group's need for rest and ren ewal U01 - Q006 In dialectic terms, effective groups balance conflict with conformity cohesion Structure closed systems. social dimensions - conformity balancing mem ber energy and labor with the group's need for rest and renewal - cohesion balan cing member energy and labor with the group's need for rest and renewal - Struct ure balancing member energy and labor with the group's need for rest and renewal - closed systems. balancing member energy and labor with the group's need for r est and renewal - social dimensions balancing member energy and labor with the g roup's need for rest and renewal answer: cohesion

U01 - Q007 A group of police officers presenting short, uninterrupted speeches o n different aspects of community safety are participating in a symposium. forum. governance group panel discussion self-help group - symposium.cohesion - forum. cohesion - governance groupcohesion - panel discussioncohesion - self-help group cohesion answer: symposium. U01 - Q008 A virtual group is one which relies on technology to communicate exis ts only for a short period of time lacks a leader lacks a clear purpose has the same dynamic as other groups - relies on technology to communicatesymposium. - e xists only for a short period of timesymposium. - lacks a leadersymposium. - lac ks a clear purposesymposium. - has the same dynamic as other groupssymposium. answer: relies on technology to communicate U01 - Q009 The homogeneous heterogeneous group dialectic can be described as bal ancing a commitment to group norms and standards with a willingness to differ an d change. balancing member similarities and differences balancing external suppo rt and recognition with internal group solidarity and rewards balancing effectiv e leadership with responsible followership balancing members' personal goals wit h the group's common goal - balancing a commitment to group norms and standards with a willingness to differ and change.relies on technology to communicate - ba lancing member similarities and differencesrelies on technology to communicate balancing external support and recognition with internal group solidarity and r ewardsrelies on technology to communicate - balancing effective leadership with responsible followershiprelies on technology to communicate - balancing members' personal goals with the group's common goalrelies on technology to communicate answer: balancing member similarities and differences U01 - Q010 A local Alcoholics Anonymous chapter is an example of a primary group . self-help group. learning group. service group public group - primary group.ba lancing member similarities and differences - self-help group.balancing member s imilarities and differences - learning group.balancing member similarities and d ifferences - service groupbalancing member similarities and differences - public groupbalancing member similarities and differences answer: self-help group. U01 - Q010 - M A stamp collecting club is an example a. self-help group learning group social group. public group - self-help groupself-help group. - learning g roupself-help group. - social group.self-help group. - public groupself-help gro up. answer: social group. U01 - Q011 When seeking to resolve group tensions, the dialectic approach recomm ends a ____________ approach. compromise either/or both/and approach/avoidance compromisesocial group. - either/orsocial group. - both/andsocial group. - appr oach/avoidancesocial group. answer: both/and U01 - Q014 A both/and approach to resolving dialectic tensions in groups empower s members.Which of the following examples demonstrates the characteristics of au tonomy in an empowered group? The group believes it has the ability to achieve i ts common goal. The group believes that its common goal is important and worthwh ile. The group has the freedom to make decisions and implements its decisions. T he group believes that its work produces significant benefits for other people a nd organizations. The group has high morale and understands the value of play as well as work. - The group believes it has the ability to achieve its common goa l.both/and - The group believes that its common goal is important and worthwhile .both/and - The group has the freedom to make decisions and implements its decis ions.both/and - The group believes that its work produces significant benefits f or other people and organizations.both/and - The group has high morale and under stands the value of play as well as work.both/and answer: The group has the freedom to make decisions and implements its decisions . U01 - Q015 In dialectic terms, effective groups balance task dimensions with con formity dimensions cohesion dimensions. structure dimensions closed dimensions s

ocial dimensions - conformity dimensionsThe group has the freedom to make decisi ons and implements its decisions. - cohesion dimensions.The group has the freedo m to make decisions and implements its decisions. - structure dimensionsThe grou p has the freedom to make decisions and implements its decisions. - closed dimen sionsThe group has the freedom to make decisions and implements its decisions. social dimensionsThe group has the freedom to make decisions and implements its decisions. answer: social dimensions U01 - Q017 A group of police officers presenting short, ninterrupted speeches on different aspects of community safety are participating in a symposium forum pa nel discussion governance group self-help group - symposiumsocial dimensions - f orumsocial dimensions - panel discussionsocial dimensions - governance groupsoci al dimensions - self-help groupsocial dimensions answer: symposium U01 - Q018 Which of the following examples best illustrates the systems theory p rinciple that "systems try to maintain balance in their environment" ? Members m ay take time off to "play" when work becomes too intense. Members may unexpected ly come up with new ideas and techniques Effective groups have clear goals Group s suffer if members fail to cooperate Groups rely on member input to achieve a c ommon goal - Members may take time off to "play" when work becomes too intense.s ymposium - Members may unexpectedly come up with new ideas and techniquessymposi um - Effective groups have clear goalssymposium - Groups suffer if members fail to cooperatesymposium - Groups rely on member input to achieve a common goalsymp osium answer: Members may take time off to "play" when work becomes too intense. U01 - Q019 A group with 7 members has the potential for _____different types of interactions. 9 90 666 900 966 - 9Members may take time off to "play" when work becomes too intense. - 90Members may take time off to "play" when work becomes t oo intense. - 666Members may take time off to "play" when work becomes too inten se. - 900Members may take time off to "play" when work becomes too intense. - 96 6Members may take time off to "play" when work becomes too intense. answer: 966 U01 - Q020 To which basic element of communication is Grace giving special atten tion when she prepares for an important group meeting by making sure her busines s suit is pressed, that her hair is well-groomed, that her perfume is pleasant b ut subtle, and that she takes a breath mint before entering the meeting room? ch annels external noise feedback verbal message internal noise - channels966 - ext ernal noise966 - feedback966 - verbal message966 - internal noise966 answer: channels U02 - Q.002 - M In which of Tuckman's Group Development Stages are members socia lly cautious and overly polite? adjourning forming performing norming storming adjourning channels - forming channels - performing channels - norming channels - storming channels answer: forming U02 - Q.004 - M Which is the correct order for Tuckman's 5 group development sta ges? forming, storming, norming, performing, adjourning forming, norming, perfor ming, storming, adjourning norming, forming, storming, performing, adjourning no rming, storming, performing, forming, adjourning storming, norming, forming, per forming, adjourning - forming, storming, norming, performing, adjourning forming - forming, norming, performing, storming, adjourning forming - norming, forming , storming, performing, adjourning forming - norming, storming, performing, form ing, adjourning forming - storming, norming, forming, performing, adjourningform ing answer: forming, storming, norming, performing, adjourning U02 - Q.010 - M According to Locke and Latham's Goal Theory, all of the followin g criteria are critical for developing effective group goals EXCEPT the goals ar e specific. the goals are accepted by members. the goals are simple and easy to achieve. the goals are set by members and the group. the goals allow for member growth. - the goals are specific.forming, storming, norming, performing, adjourn ing - the goals are accepted by members. forming, storming, norming, performing,

adjourning - the goals are simple and easy to achieve.forming, storming, normin g, performing, adjourning - the goals are set by members and the group.forming, storming, norming, performing, adjourning - the goals allow for member growth.fo rming, storming, norming, performing, adjourning answer: the goals are simple and easy to achieve. U02 - Q.016 - M Your group has discussed and decided that members will take turn s recording and typing the minutes from each meeting. A( n ) _______________ has been established. conforming norm implicit norm deviant norm explicit norm incl usion norm - conforming norm the goals are simple and easy to achieve. - implici t norm the goals are simple and easy to achieve. - deviant norm the goals are si mple and easy to achieve. - explicit norm the goals are simple and easy to achie ve. - inclusion norm the goals are simple and easy to achieve. answer: explicit norm U02 - Q.018 - M Which of the 4 categories of norms is operating in the following example? Your group makes decisions by majority rule. A( n ) _______________ is operating in this circumstance. status norm interaction norm achievement norm p rocedural norm inclusion norm - status norm explicit norm - interaction norm exp licit norm - achievement norm explicit norm - procedural norm explicit norm - in clusion norm explicit norm answer: procedural norm U02 - Q.020 - M Stanley Milgram's classic experiment to find out whether people would obey commands to give "subjects" painful electric shocks demonstrated that people are ruthless when making decisions about the welfare of strangers. press ure from an authority figure can outweigh individual judgment and morality. peop le who know they're in experiments like to fool the researchers. inclusion and a ffection needs are strong in groups. group members are punished for violating no rms. - people are ruthless when making decisions about the welfare of strangers. procedural norm - pressure from an authority figure can outweigh individual jud gment and morality. procedural norm - people who know they're in experiments lik e to fool the researchers. procedural norm - inclusion and affection needs are s trong in groups.procedural norm - group members are punished for violating norms . procedural norm answer: pressure from an authority figure can outweigh individual judgment and m orality. U02 - Q.024 - M Which of the following strategies is recommended as an effective method for dealing with destructive nonconformity in groups? Accept the member' s disruptive behavior. Confront the disruptive member and try to modify his or h er behavior. Exclude the disruptive member by ignoring his or her comments durin g the discussion. all of the others. none of the others. - Accept the member's d isruptive behavior.pressure from an authority figure can outweigh individual jud gment and morality. - Confront the disruptive member and try to modify his or he r behavior. pressure from an authority figure can outweigh individual judgment a nd morality. - Exclude the disruptive member by ignoring his or her comments dur ing the discussion. pressure from an authority figure can outweigh individual ju dgment and morality. - all of the others. pressure from an authority figure can outweigh individual judgment and morality. - none of the others. pressure from a n authority figure can outweigh individual judgment and morality. answer: all of the others. U02 - Q.026 - M Which of the following characteristics was NOT one of the 8 char acteristics that emerged in the Carl Larson and Frank LaFasto study that asked " What are the secrets of successful teams?" adherence to group norms a clear, ele vated goal competent team members a collaborative climate principled leadership - adherence to group norms all of the others. - a clear, elevated goal all of th e others. - competent team members all of the others. - a collaborative climate all of the others. - principled leadership all of the others. answer: adherence to group norms U02 - Q001 Which is the correct order of Group Development Stages ? Forming`\rig htarrow` Storming `\rightarrow` Norming `\rightarrow` Performing `\rightarrow` A djourning Forming`\rightarrow` Storming `\rightarrow`Performing `\rightarrow` No rming `\rightarrow` Adjourning Forming`\rightarrow` Adjourning `\rightarrow` Nor

ming `\rightarrow` Performing `\rightarrow` Storming Forming`\rightarrow` Stormi ng `\rightarrow`Adjourning `\rightarrow`Performing `\rightarrow` Norming - Formi ng`\rightarrow` Storming `\rightarrow` Norming `\rightarrow` Performing `\righta rrow` Adjourning adherence to group norms - Forming`\rightarrow` Storming `\righ tarrow`Performing `\rightarrow` Norming `\rightarrow` Adjourning adherence to gr oup norms - Forming`\rightarrow` Adjourning `\rightarrow` Norming `\rightarrow` Performing `\rightarrow` Storming adherence to group norms - Forming`\rightarrow ` Storming `\rightarrow`Adjourning `\rightarrow`Performing `\rightarrow` Norming adherence to group norms answer: Forming`\rightarrow` Storming `\rightarrow` Norming `\rightarrow` Perfor ming `\rightarrow` Adjourning U02 - Q002 Which stage is Members achieve the groups goal and may begin to disband ? Forming Storming Norming Performing Adjourning - Forming Forming`\rightarrow` Storming `\rightarrow` Norming `\rightarrow` Performing `\rightarrow` Adjourning - Storming Forming`\rightarrow` Storming `\rightarrow` Norming `\rightarrow` Pe rforming `\rightarrow` Adjourning - Norming Forming`\rightarrow` Storming `\righ tarrow` Norming `\rightarrow` Performing `\rightarrow` Adjourning - Performing F orming`\rightarrow` Storming `\rightarrow` Norming `\rightarrow` Performing `\ri ghtarrow` Adjourning - Adjourning Forming`\rightarrow` Storming `\rightarrow` No rming `\rightarrow` Performing `\rightarrow` Adjourning answer: Adjourning U02 - Q002 - M In which of Tuckman's Group Development Stages are members social ly cautious and overly polite? adjourning forming performing norming storming adjourningAdjourning - formingAdjourning - performingAdjourning - normingAdjourn ing - stormingAdjourning answer: forming U02 - Q003 Define TWO characteristics of effective groups A clear, elevated goal Hidden Agendas Collaborative climate Disruptive member exclusion - A clear, ele vated goal forming - Hidden Agendas forming - Collaborative climate forming - Di sruptive member exclusion forming answer: A clear, elevated goal Collaborative climate U02 - Q004 When setting group goals, consider two elements that are: Clarity Cha llenge Cultural diversity Nonverbal languages - Clarity A clear, elevated goal C ollaborative climate - Challenge A clear, elevated goal Collaborative climate Cultural diversity A clear, elevated goal Collaborative climate - Nonverbal lang uages A clear, elevated goal Collaborative climate answer: Clarity Challenge U02 - Q004 - M Which is the correct order for Tuckman's 5 group development stag es? forming, storming, norming, performing, adjourning forming, norming, perform ing, storming, adjourning norming, forming, storming, performing, adjourning nor ming, storming, performing, forming, adjourning storming, norming, forming, perf orming, adjourning - forming, storming, norming, performing, adjourningClarity C hallenge - forming, norming, performing, storming, adjourningClarity Challenge norming, forming, storming, performing, adjourningClarity Challenge - norming, storming, performing, forming, adjourningClarity Challenge - storming, norming, forming, performing, adjourningClarity Challenge answer: forming, storming, norming, performing, adjourning U02 - Q005 Because most members of a new group want to create a good first impre ssion, they tend to be overly polite with one another during their initial meeti ngs. They don't interrupt one another and avoid expressing strong opinions. Thes e behaviors are characteristic of dialectic tension. primary tension. secondary tension tertiary tension. assimilation tension - dialectic tension. forming, sto rming, norming, performing, adjourning - primary tension. forming, storming, nor ming, performing, adjourning - secondary tension forming, storming, norming, per forming, adjourning - tertiary tension. forming, storming, norming, performing, adjourning - assimilation tension forming, storming, norming, performing, adjour ning answer: primary tension. U02 - Q006 Nonconformity will always undermine group performance can improve gro up performance occurs only when stubborn members are present occurs under poor l

eadership occurs only in the storming stage - will always undermine group perfor mance primary tension. - can improve group performance primary tension. - occurs only when stubborn members are present primary tension. - occurs under poor lea dership primary tension. - occurs only in the storming stage primary tension. answer: can improve group performance U02 - Q007 All of the following statements are true about hidden agendas EXCEPT Hidden agendas exist in most groups Hidden agendas occur when there is poor grou p leadership. Hidden agendas disrupt the flow of communication Hidden agendas sh ould be discussed and dealt with by the group Hidden agendas do not cause proble ms in a group - Hidden agendas exist in most groupscan improve group performance - Hidden agendas occur when there is poor group leadership.can improve group pe rformance - Hidden agendas disrupt the flow of communicationcan improve group pe rformance - Hidden agendas should be discussed and dealt with by the groupcan im prove group performance - Hidden agendas do not cause problems in a groupcan imp rove group performance answer: Hidden agendas occur when there is poor group leadership. U02 - Q008 Which of the following strategies is recommended as an effective meth od for dealing with destructive nonconformity in groups? Accept the member's dis ruptive behavior Confront the disruptive member and try to modify his or her beh avior. Exclude the disruptive member by ignoring his or her comments during the discussion all of the above none of the above - Accept the member's disruptive b ehaviorHidden agendas occur when there is poor group leadership. - Confront the disruptive member and try to modify his or her behavior.Hidden agendas occur whe n there is poor group leadership. - Exclude the disruptive member by ignoring hi s or her comments during the discussionHidden agendas occur when there is poor g roup leadership. - all of the aboveHidden agendas occur when there is poor group leadership. - none of the aboveHidden agendas occur when there is poor group le adership. answer: all of the above U02 - Q010 All of the following statements are true about hidden agendas EXCEPT Hidden agendas exist in most groups Hidden agendas occur when there is poor grou p leadership. Hidden agendas disrupt the flow of communication Hidden agendas sh ould be discussed and dealt with by the group Hidden agendas do not cause proble ms in a group - Hidden agendas exist in most groupsall of the above - Hidden age ndas occur when there is poor group leadership.all of the above - Hidden agendas disrupt the flow of communicationall of the above - Hidden agendas should be di scussed and dealt with by the groupall of the above - Hidden agendas do not caus e problems in a groupall of the above answer: Hidden agendas occur when there is poor group leadership. U02 - Q011 Which of the following strategies is recommended as an effective meth od for dealing with destructive nonconformity in groups? Accept the member's dis ruptive behavior Confront the disruptive member and try to modify his or her beh avior Exclude the disruptive member by ignoring his or her comments during the d iscussion All of the others None of the others - Accept the member's disruptive behaviorHidden agendas occur when there is poor group leadership. - Confront the disruptive member and try to modify his or her behaviorHidden agendas occur whe n there is poor group leadership. - Exclude the disruptive member by ignoring hi s or her comments during the discussionHidden agendas occur when there is poor g roup leadership. - All of the othersHidden agendas occur when there is poor grou p leadership. - None of the othersHidden agendas occur when there is poor group leadership. answer: Accept the member's disruptive behaviorConfront the disruptive member an d try to modify his or her behaviorExclude the disruptive member by ignoring his or her comments during the discussion U02 - Q014 Ernest Bormann's description of primary tension resembles Tuckman's _ ________ stage of group development. Forming Storming Norming Performing Adjourn ing - FormingAccept the member's disruptive behaviorConfront the disruptive memb er and try to modify his or her behaviorExclude the disruptive member by ignorin g his or her comments during the discussion - StormingAccept the member's disrup tive behaviorConfront the disruptive member and try to modify his or her behavio

rExclude the disruptive member by ignoring his or her comments during the discus sion - NormingAccept the member's disruptive behaviorConfront the disruptive mem ber and try to modify his or her behaviorExclude the disruptive member by ignori ng his or her comments during the discussion - PerformingAccept the member's dis ruptive behaviorConfront the disruptive member and try to modify his or her beha viorExclude the disruptive member by ignoring his or her comments during the dis cussion - AdjourningAccept the member's disruptive behaviorConfront the disrupti ve member and try to modify his or her behaviorExclude the disruptive member by ignoring his or her comments during the discussion answer: Forming U02 - Q015 Which of the following strategies is recommended as an effective meth od for dealing with destructive nonconformity in groups? Accept the member's dis ruptive behavior. Confront the disruptive member and try to modify his or her be havior. Exclude the disruptive member by ignoring his or her comments during the discussion All of the others. None of the others. - Accept the member's disrupt ive behavior.Forming - Confront the disruptive member and try to modify his or h er behavior.Forming - Exclude the disruptive member by ignoring his or her comme nts during the discussionForming - All of the others.Forming - None of the other s.Forming answer: All of the others. U02 - Q016 Which of the following characteristics was NOT one of the 8 character istics that emerged in the Carl Larson and Frank LaFasto study that asked "What are the secrets of successful teams?" adherence to group norms a clear, elevated goal competent team members a collaborative climate principled leadership - adh erence to group normsAll of the others. - a clear, elevated goalAll of the other s. - competent team membersAll of the others. - a collaborative climateAll of th e others. - principled leadershipAll of the others. answer: adherence to group norms U02 - Q017 Stanley Milgram's classic experiment to find out whether people would obey commands to give "subjects" painful electric shocks demonstrated that peop le are ruthless when making decisions about the welfare of strangers pressure fr om an authority figure can outweigh individual judgment and morality people who know they're in experiments like to fool the researchers inclusion and affection needs are strong in groups group members are punished for violating norms - peo ple are ruthless when making decisions about the welfare of strangersadherence t o group norms - pressure from an authority figure can outweigh individual judgme nt and moralityadherence to group norms - people who know they're in experiments like to fool the researchersadherence to group norms - inclusion and affection needs are strong in groupsadherence to group norms - group members are punished for violating normsadherence to group norms answer: pressure from an authority figure can outweigh individual judgment and m orality U02 - Q018 Which of the 4 categories of norms is operating in the following exam ple? Your group makes decisions by majority rule. A ( n ) ____________________ i s operating in this circumstance. Status norm interaction norm achievement norm procedural norm inclusion norm - Status normpressure from an authority figure ca n outweigh individual judgment and morality - interaction normpressure from an a uthority figure can outweigh individual judgment and morality - achievement norm pressure from an authority figure can outweigh individual judgment and morality - procedural normpressure from an authority figure can outweigh individual judgm ent and morality - inclusion normpressure from an authority figure can outweigh individual judgment and morality answer: procedural norm U02 - Q019 Ernest Bormann's description of primary tension resembles Tuckman's _ __ stage of group development. forming storming norming performing Adjourning formingprocedural norm - stormingprocedural norm - normingprocedural norm - perf ormingprocedural norm - Adjourningprocedural norm answer: forming U02 - Q020 In which of which of Carolyn Anderson's group socialization stages do members adjust to group expectations, assume needed roles, and balance their pe

rsonal goals with the group's goals? antecedent phase anticipatory phase encount er phrase assimilation phase exit phase - antecedent phaseforming - anticipatory phaseforming - encounter phraseforming - assimilation phaseforming - exit phase forming answer: encounter phrase U03 - Q.001 - M - BS Who might say this: I feel accepted by the group ? A social m ember An undersocial member An oversocial member A group leader - A social membe r encounter phrase - An undersocial member encounter phrase - An oversocial memb er encounter phrase - A group leader encounter phrase answer: A social member U03 - Q.002 - M Which of Maslow's Hierarchy of Needs is primarily met when someo ne joins an exclusive club or is elected as leader of a prestigious group? safet y self-actualization esteem belongingness physiological - safety A social member - self-actualization A social member - esteem A social member - belongingness A social member - physiologicalA social member answer: esteem U03 - Q.004 - M According to Schutz's FIRO Theory, a group member who feels acce pted by the group is an ideal social member. undersocial member. ideal personal member. overpersonal member. underpersonal member. - ideal social member. esteem - undersocial member. esteem - ideal personal member. esteem - overpersonal mem ber. esteem - underpersonal member. esteem answer: ideal social member. U03 - Q.006 - M Control in a group refers to the individual holding an official leadership position. individual holding an unofficial leadership position. exten t to which members behave as though they know more than everyone else. extent to which members feel competent, confident, and free to make their own decisions. extent to which meetings stay on the agenda. - individual holding an official le adership position.ideal social member. - individual holding an unofficial leader ship position.ideal social member. - extent to which members behave as though th ey know more than everyone else. ideal social member. - extent to which members feel competent, confident, and free to make their own decisions. ideal social me mber. - extent to which meetings stay on the agenda.ideal social member. answer: extent to which members feel competent, confident, and free to make thei r own decisions. U03 - Q.012 - M All of the following functions are group maintenance roles EXCEP T harmonizer. tension releaser. gatekeeper. observer-interpreter. information gi ver. - harmonizer. extent to which members feel competent, confident, and free t o make their own decisions. - tension releaser. extent to which members feel com petent, confident, and free to make their own decisions. - gatekeeper. extent to which members feel competent, confident, and free to make their own decisions. - observer-interpreter. extent to which members feel competent, confident, and f ree to make their own decisions. - information giver. extent to which members fe el competent, confident, and free to make their own decisions. answer: information giver. U03 - Q.020 - M Which of the following descriptions is likely to be true of high ly apprehensive group members compared to low apprehensive members? Highly appre hensive members talk more in group discussions. Highly apprehensive members are more likely to become group leaders. Highly apprehensive members appear more con fident. Highly apprehensive members assert themselves and their beliefs. Highly apprehensive members agree with others rather than voice disagreement. - Highly apprehensive members talk more in group discussions.information giver. - Highly apprehensive members are more likely to become group leaders. information giver. - Highly apprehensive members appear more confident. information giver. - Highl y apprehensive members assert themselves and their beliefs. information giver. Highly apprehensive members agree with others rather than voice disagreement. i nformation giver. answer: Highly apprehensive members agree with others rather than voice disagree ment. U03 - Q.022 - M All of the following are means of providing constructive feedbac k EXCEPT Focus on the behaviors rather than the person. Describe the behavior ra

ther than judging it. Provide observations rather than assumptions. Choose an ap propriate time and place. Give feedback to advance your own goals. - Focus on th e behaviors rather than the person. Highly apprehensive members agree with other s rather than voice disagreement. - Describe the behavior rather than judging it . Highly apprehensive members agree with others rather than voice disagreement. - Provide observations rather than assumptions. Highly apprehensive members agre e with others rather than voice disagreement. - Choose an appropriate time and p lace. Highly apprehensive members agree with others rather than voice disagreeme nt. - Give feedback to advance your own goals. Highly apprehensive members agree with others rather than voice disagreement. answer: Give feedback to advance your own goals. U03 - Q.026 - M Assertiveness seeks an appropriate balance between engagement an d disengagement. passivity and aggression. conformity and nonconformity. conflic t and cohesion. high apprehension and low apprehension. - engagement and disenga gement. Give feedback to advance your own goals. - passivity and aggression. Giv e feedback to advance your own goals. - conformity and nonconformity. Give feedb ack to advance your own goals. - conflict and cohesion. Give feedback to advance your own goals. - high apprehension and low apprehension. Give feedback to adva nce your own goals. answer: passivity and aggression. U03 - Q.032 - M Which of the following strategies and skill are effective when y ou need to and should say "No" to someone? Use assertive words but passive nonve rbal communication. Don't say "Yes" or "No" until you hear and understand a spec ific request Ask permission to say "No" such as "Will you be upset if I don't do this?" Anticipate the person's request before you hear the question so you can stop him or her rom asking. Avoid saying "No" if the other person won't like you r answer. - Use assertive words but passive nonverbal communication. passivity a nd aggression. - Don't say "Yes" or "No" until you hear and understand a specifi c request passivity and aggression. - Ask permission to say "No" such as "Will y ou be upset if I don't do this?" passivity and aggression. - Anticipate the pers on's request before you hear the question so you can stop him or her rom asking. passivity and aggression. - Avoid saying "No" if the other person won't like you r answer.passivity and aggression. answer: Don't say "Yes" or "No" until you hear and understand a specific request U03 - Q002 An energizer Motivates group members to do their best and helps creat e enthusiasm for the task Keeps and provides accurate records Asks for others opi nions Assesses ideas, arguments and suggestions - Motivates group members to do their best and helps create enthusiasm for the task Don't say "Yes" or "No" unti l you hear and understand a specific request - Keeps and provides accurate recor ds Don't say "Yes" or "No" until you hear and understand a specific request - As ks for others opinions Don't say "Yes" or "No" until you hear and understand a sp ecific request - Assesses ideas, arguments and suggestions Don't say "Yes" or "N o" until you hear and understand a specific request answer: Motivates group members to do their best and helps create enthusiasm for the task U03 - Q002 - M Which of Maslow's Hierarchy of Needs is primarily met when someon e joins an exclusive club or is elected as leader of a prestigious group? safety self-actualization Esteem Belongingness Physiological - safetyMotivates group m embers to do their best and helps create enthusiasm for the task - self-actualiz ationMotivates group members to do their best and helps create enthusiasm for th e task - EsteemMotivates group members to do their best and helps create enthusi asm for the task - BelongingnessMotivates group members to do their best and hel ps create enthusiasm for the task - PhysiologicalMotivates group members to do t heir best and helps create enthusiasm for the task answer: Esteem U03 - Q003 Members with High Apprehension may express two features. They may Use awkward fillers as well, uh, you know Fidget Dominate a discussion Assert themselves and their beliefs - Use awkward fillers as well, uh, you know Esteem - Fidget Esteem Dominate a discussion Esteem - Assert themselves and their beliefs Esteem answer: Use awkward fillers as well, uh, you know Fidget

U03 - Q004 Choose two strategies for reducing communication apprehension: Relax physically Be well- prepared Think about bad things Visualize failure - Relax ph ysically Use awkward fillers as well, uh, you know Fidget - Be well- prepared Use awkw ard fillers as well, uh, you know Fidget - Think about bad things Use awkward fillers as well, uh, you know Fidget - Visualize failure Use awkward fillers as well, uh, idget answer: Relax physically Be well- prepared U03 - Q004 - M According to Schutz's FIRO Theory, a group member who feels accep ted by the group is an ideal social member undersocial member ideal personal mem ber overpersonal member underpersonal member - ideal social memberRelax physical ly Be well- prepared - undersocial memberRelax physically Be well- prepared - id eal personal memberRelax physically Be well- prepared - overpersonal memberRelax physically Be well- prepared - underpersonal memberRelax physically Be well- pr epared answer: ideal social member U03 - Q005 According to Maslow's Hierarchy of Needs, in what order do we satisfy the following needs? safety, self-actualization, esteem, belongingness, physiol ogical self-actualization, esteem, safety, physiological, belongingness esteem, physiological, belongingness, self-actualization, safety belongingness, physiolo gical, safety, self-actualization, esteem physiological, safety, belongingness, esteem, self-actualization - safety, self-actualization, esteem, belongingness, physiological ideal social member - self-actualization, esteem, safety, physiolo gical, belongingness ideal social member - esteem, physiological, belongingness, self-actualization, safety ideal social member - belongingness, physiological, safety, self-actualization, esteem ideal social member - physiological, safety, belongingness, esteem, self-actualization ideal social member answer: physiological, safety, belongingness, esteem, self-actualization U03 - Q006 All of the following functions are group task roles EXCEPT initiator. Compromiser clarifier-summarizer. opinion seeker evaluator-critic. - initiator. physiological, safety, belongingness, esteem, self-actualization - Compromiser physiological, safety, belongingness, esteem, self-actualization - clarifier-sum marizer. physiological, safety, belongingness, esteem, self-actualization - opin ion seeker physiological, safety, belongingness, esteem, self-actualization - ev aluator-critic. physiological, safety, belongingness, esteem, self-actualization answer: Compromiser U03 - Q007 Your textbook suggests all of the following strategies for reducing c ommunication apprehension in groups EXCEPT Realize that everyone experiences com munication apprehension. Be well prepared Force yourself to speak as much and as often as you can to a variety of large and small audiences Substitute worrisome , irrational thoughts about communicating with more positive thoughts. Take time to visualize yourself communicating effectively - Realize that everyone experie nces communication apprehension. Compromiser - Be well prepared Compromiser - Fo rce yourself to speak as much and as often as you can to a variety of large and small audiences Compromiser - Substitute worrisome, irrational thoughts about co mmunicating with more positive thoughts. Compromiser - Take time to visualize yo urself communicating effectively Compromiser answer: Force yourself to speak as much and as often as you can to a variety of large and small audiences U03 - Q008 Control in a group refers to the individual holding an official leade rship position individual holding an unofficial leadership position. extent to w hich members behave as though they know more than everyone else. extent to which members feel competent, confident, and free to make their own decisions extent to which meetings stay on the agenda - individual holding an official leadership positionForce yourself to speak as much and as often as you can to a variety of large and small audiences - individual holding an unofficial leadership positio n.Force yourself to speak as much and as often as you can to a variety of large and small audiences - extent to which members behave as though they know more th an everyone else.Force yourself to speak as much and as often as you can to a va riety of large and small audiences - extent to which members feel competent, con

fident, and free to make their own decisionsForce yourself to speak as much and as often as you can to a variety of large and small audiences - extent to which meetings stay on the agendaForce yourself to speak as much and as often as you c an to a variety of large and small audiences answer: extent to which members feel competent, confident, and free to make thei r own decisions U03 - Q009 _____________ refers to the level of fear or anxiety associated with either real or anticipated communication with another person or persons. Self-co ncept Feedback Communication apprehension Assertiveness Confidence - Self-concep textent to which members feel competent, confident, and free to make their own d ecisions - Feedbackextent to which members feel competent, confident, and free t o make their own decisions - Communication apprehensionextent to which members f eel competent, confident, and free to make their own decisions - Assertivenessex tent to which members feel competent, confident, and free to make their own deci sions - Confidenceextent to which members feel competent, confident, and free to make their own decisions answer: Communication apprehension U03 - Q010 Assertiveness seeks an appropriate balance between engagement and dis engagement passivity and aggression conflict and cohesion conformity and nonconf ormity high apprehension and low apprehension - engagement and disengagementComm unication apprehension - passivity and aggressionCommunication apprehension - co nflict and cohesionCommunication apprehension - conformity and nonconformityComm unication apprehension - high apprehension and low apprehensionCommunication app rehension answer: passivity and aggression U03 - Q011 All of the following functions are group maintenance roles EXCEPT har monizer tension releaser gatekeeper observer-interpreter information giver. - ha rmonizerpassivity and aggression - tension releaserpassivity and aggression - ga tekeeperpassivity and aggression - observer-interpreterpassivity and aggression - information giver.passivity and aggression answer: information giver. U03 - Q012 ___________ refers to the level of fear or anxiety associated with ei ther real or anticipated communication with another person or persons. Self-conc ept Feedback Communication apprehension Assertiveness Confidence - Self-concepti nformation giver. - Feedbackinformation giver. - Communication apprehensioninfor mation giver. - Assertivenessinformation giver. - Confidenceinformation giver. answer: Communication apprehension U03 - Q014 All of the following are characteristics of passive-aggressive group members EXCEPT They undermine others behind their backs They rarely exhibit aggr essive behaviors They usually follow through with promised contributions They ha ve little respect for the rights of others They usually behave cooperatively - T hey undermine others behind their backsCommunication apprehension - They rarely exhibit aggressive behaviorsCommunication apprehension - They usually follow thr ough with promised contributionsCommunication apprehension - They have little re spect for the rights of othersCommunication apprehension - They usually behave c ooperativelyCommunication apprehension answer: They usually follow through with promised contributions U03 - Q015 Assertiveness seeks an appropriate balance between engagement and dis engagement passivity and aggression conformity and nonconformity conflict and co hesion high apprehension and low apprehension - engagement and disengagementThey usually follow through with promised contributions - passivity and aggressionTh ey usually follow through with promised contributions - conformity and nonconfor mityThey usually follow through with promised contributions - conflict and cohes ionThey usually follow through with promised contributions - high apprehension a nd low apprehensionThey usually follow through with promised contributions answer: engagement and disengagement U03 - Q017 of the following are characteristics of passive-aggressive group memb ers EXCEPT They undermine others behind their backs They rarely exhibit aggressi ve behaviors They usually follow through with promised contributions They have l ittle respect for the rights of others They usually behave cooperatively - They

undermine others behind their backsengagement and disengagement - They rarely ex hibit aggressive behaviorsengagement and disengagement - They usually follow thr ough with promised contributionsengagement and disengagement - They have little respect for the rights of othersengagement and disengagement - They usually beha ve cooperativelyengagement and disengagement answer: They usually follow through with promised contributions U03 - Q018 All of the following are means of providing constructive feedback EXC EPT Focus on the behaviors rather than the person Describe the behavior rather t han judging it Provide observations rather than assumptions Choose an appropriat e time and place Give feedback to advance your own goals - Focus on the behavior s rather than the personThey usually follow through with promised contributions - Describe the behavior rather than judging itThey usually follow through with p romised contributions - Provide observations rather than assumptionsThey usually follow through with promised contributions - Choose an appropriate time and pla ceThey usually follow through with promised contributions - Give feedback to adv ance your own goalsThey usually follow through with promised contributions answer: Give feedback to advance your own goals U03 - Q019 ___functions describe group members who strive to get along and satis fy one another's needs while pursuing a shared goal. Self-centered Task Maintena nce Participation All of the above - Self-centeredGive feedback to advance your own goals - TaskGive feedback to advance your own goals - MaintenanceGive feedba ck to advance your own goals - ParticipationGive feedback to advance your own go als - All of the aboveGive feedback to advance your own goals answer: Maintenance U03 - Q020 "I will check our Affirmative Action Policy and see what it says abou t..." This statement would most likely be made by a group member functioning in which of the following task roles? information seeker information giver opinion seeker opinion giver clarifier-summarizer - information seekerMaintenance - info rmation giverMaintenance - opinion seekerMaintenance - opinion giverMaintenance - clarifier-summarizerMaintenance answer: opinion seeker U04 - Q.004 - M In the homogeneous heterogeneous group dialectic, homogeneous re fers to a group composed of members who are different from one another. a group composed of members who are the same or similar. a group with a mixed sexual ori entation. a group of men. a group of women. - a group composed of members who ar e different from one another. opinion seeker - a group composed of members who a re the same or similar. opinion seeker - a group with a mixed sexual orientation . opinion seeker - a group of men. opinion seeker - a group of women.opinion see ker answer: a group composed of members who are the same or similar. U04 - Q.008 - M All of the following statements are characteristics of people wh o have prejudices EXCEPT They deny opportunities granted to certain groups of pe ople such as employment, equal rights, and housing. Their beliefs about others a re rarely based on extensive experience and firsthand knowledge. They have irrat ional feelings or dislike for certain groups. They justify negative feelings tow ard members of certain groups. They have negative attitudes about people that ar e based on faulty stereotypes. - They deny opportunities granted to certain grou ps of people such as employment, equal rights, and housing. a group composed of members who are the same or similar. - Their beliefs about others are rarely bas ed on extensive experience and firsthand knowledge.a group composed of members w ho are the same or similar. - They have irrational feelings or dislike for certa in groups. a group composed of members who are the same or similar. - They justi fy negative feelings toward members of certain groups. a group composed of membe rs who are the same or similar. - They have negative attitudes about people that are based on faulty stereotypes. a group composed of members who are the same o r similar. answer: They deny opportunities granted to certain groups of people such as empl oyment, equal rights, and housing. U04 - Q.010 - M In dialectic terms, the opposite or counterpart of a Myers-Brigg s judger is an extrovert. an intuitive. a sensor. a thinker. a perceiver. - an e

xtrovert. They deny opportunities granted to certain groups of people such as em ployment, equal rights, and housing. - an intuitive.They deny opportunities gran ted to certain groups of people such as employment, equal rights, and housing. a sensor.They deny opportunities granted to certain groups of people such as em ployment, equal rights, and housing. - a thinker. They deny opportunities grante d to certain groups of people such as employment, equal rights, and housing. - a perceiver.They deny opportunities granted to certain groups of people such as e mployment, equal rights, and housing. answer: a perceiver. U04 - Q.016 - M Reggie is highly structured and good at coordinating the group's work and keeping it organized. He never misses a deadline and expects others to do the same. Which Myers-Briggs personality trait best describes Reggie? sensor judger intuitive perceiver thinker - sensor a perceiver. - judger a perceiver. - intuitive a perceiver. - perceiver a perceiver. - thinker a perceiver. answer: judger U04 - Q.022 - M In high-context cultures, messages are implicit. explicit. objec tive. factual. all of the above. - implicit. judger - explicit. judger - objecti ve. judger - factual. judger - all of the above.judger answer: implicit. U04 - Q.024 - M In ___________cultures, people are more dependent on language to express what they mean. high power distance monochronic low-context low power d istance high-context - high power distance implicit. - monochronic implicit. - l ow-context implicit. - low power distance implicit. - high-context implicit. answer: low-context U04 - Q.026 - M Which characteristics are common in monochronic time cultures? M embers like to concentrate on one job before moving to another. Members are freq uently late for appointments. Members like thinking about several tasks at one t ime. Members feel comfortable holding 2 or 3 conversations at the same time. Rel ationships are far more important than schedules. - Members like to concentrate on one job before moving to another. low-context - Members are frequently late f or appointments. low-context - Members like thinking about several tasks at one time.low-context - Members feel comfortable holding 2 or 3 conversations at the same time. low-context - Relationships are far more important than schedules. lo w-context answer: Members like to concentrate on one job before moving to another. U04 - Q.030 - M According to Hofstede's dimensions of culture, which country is ranked #1 in terms of masculine values? U.S.A. Japan Italy Mexico Israel - U.S.A . Members like to concentrate on one job before moving to another. - Japan Membe rs like to concentrate on one job before moving to another. - Italy Members like to concentrate on one job before moving to another. - Mexico Members like to co ncentrate on one job before moving to another. - Israel Members like to concentr ate on one job before moving to another. answer: Japan U04 - Q001 Which layer of Diversity does sexual orientation belong to ? Personal ity Internal Dimension External dimension None of the others - Personality Japan - Internal Dimension Japan - External dimension Japan - None of the others Japa n answer: Internal Dimension U04 - Q002 Define Two characteristics of an Extrovert. May dominate discussion T hinks out loud Thinks to himself or herself Thinks first, then talks - May domin ate discussion Internal Dimension - Thinks out loud Internal Dimension - Thinks to himself or herself Internal Dimension - Thinks first, then talks Internal Dim ension answer: May dominate discussion Thinks out loud U04 - Q003 Define Two characteristics of a Thinker Objective, firm, analytical V alues competence, reason Tactful and tenderhearted Subjective, humane, appreciat ive - Objective, firm, analytical May dominate discussion Thinks out loud - Valu es competence, reason May dominate discussion Thinks out loud - Tactful and tend erhearted May dominate discussion Thinks out loud - Subjective, humane, apprecia tive May dominate discussion Thinks out loud -

answer: Objective, firm, analytical Values competence, reason U04 - Q004 Define Two characteristics of a Perceiver Goes with the flow Plays no w/ Works later Punctual Likes deadlines - Goes with the flow Objective, firm, an alytical Values competence, reason - Plays now/ Works later Objective, firm, ana lytical Values competence, reason - Punctual Objective, firm, analytical Values competence, reason - Likes deadlines Objective, firm, analytical Values competen ce, reason answer: Goes with the flow Plays now/ Works later U04 - Q005 Which of the following cultural dimensions is ranked very high in the United States? individualism collectivism high power distance low power distanc e high context - individualism Goes with the flow Plays now/ Works later - colle ctivism Goes with the flow Plays now/ Works later - high power distance Goes wit h the flow Plays now/ Works later - low power distance Goes with the flow Plays now/ Works later - high context Goes with the flow Plays now/ Works later answer: individualism U04 - Q006 Collectivist cultures place greater value on uncertainty. esteem and self-actualization needs. personal freedom collaboration and cooperation directn ess of communication - uncertainty. individualism - esteem and self-actualizatio n needs. individualism - personal freedom individualism - collaboration and coop eration individualism - directness of communication individualism answer: collaboration and cooperation U04 - Q007 All of the following statements are characteristics of people who hav e prejudices EXCEPT They deny opportunities granted to certain groups of people such as employment, equal,rights, and housing Their beliefs about others are rar ely based on extensive experience and firsthand knowledge They have irrational f eelings or dislike for certain groups. They justify negative feelings toward mem bers of certain groups. They have negative attitudes about people that are based on faulty stereotypes. - They deny opportunities granted to certain groups of p eople such as employment, equal,rights, and housingcollaboration and cooperation - Their beliefs about others are rarely based on extensive experience and first hand knowledgecollaboration and cooperation - They have irrational feelings or d islike for certain groups.collaboration and cooperation - They justify negative feelings toward members of certain groups.collaboration and cooperation - They h ave negative attitudes about people that are based on faulty stereotypes.collabo ration and cooperation answer: They deny opportunities granted to certain groups of people such as empl oyment, equal,rights, and housing U04 - Q008 Trait Leadership Theory, also known as the "Great Man" theory, conten ds that democratic leaders are always best charismatic leaders are always best l eaders are born, not made leaders are made, not born women cannot be effective l eaders - democratic leaders are always bestThey deny opportunities granted to ce rtain groups of people such as employment, equal,rights, and housing - charismat ic leaders are always bestThey deny opportunities granted to certain groups of p eople such as employment, equal,rights, and housing - leaders are born, not made They deny opportunities granted to certain groups of people such as employment, equal,rights, and housing - leaders are made, not bornThey deny opportunities gr anted to certain groups of people such as employment, equal,rights, and housing - women cannot be effective leadersThey deny opportunities granted to certain gr oups of people such as employment, equal,rights, and housing answer: leaders are born, not made U04 - Q009 high-context cultures, messages are implicit explicit objective factu al all of the others. - implicitleaders are born, not made - explicitleaders are born, not made - objectiveleaders are born, not made - factualleaders are born, not made - all of the others.leaders are born, not made answer: implicit U04 - Q010 In the homogeneous `leftrightarrow` heterogeneous group dialectic, ho mogeneous refers to a group composed of members who are different from one anoth er a group composed of members who are the same or similar a group with a mixed sexual orientation a group of men a group of women - a group composed of members who are different from one anotherimplicit - a group composed of members who ar

e the same or similarimplicit - a group with a mixed sexual orientationimplicit - a group of menimplicit - a group of womenimplicit answer: a group composed of members who are the same or similar U04 - Q010 - M In dialectic terms, the opposite or counterpart of a Myers-Briggs judger is an extrovert an intuitive a sensor a thinker a perceiver - an extrove rta group composed of members who are the same or similar - an intuitivea group composed of members who are the same or similar - a sensora group composed of me mbers who are the same or similar - a thinkera group composed of members who are the same or similar - a perceivera group composed of members who are the same o r similar answer: a perceiver U04 - Q011 In ___________ cultures, people are more dependent on language to exp ress what they mean. high power distance monochronic low-context low power dista nce high-context - high power distancea perceiver - monochronica perceiver - low -contexta perceiver - low power distancea perceiver - high-contexta perceiver answer: low-context U04 - Q013 People who believe that their culture is better than other cultures o r that their culture should be the role model for other cultures would be classi fied as ethnocentric Stereotypical Prejudiced Discriminatory Racist - ethnocentr iclow-context - Stereotypicallow-context - Prejudicedlow-context - Discriminator ylow-context - Racistlow-context answer: ethnocentric U04 - Q014 All of the following statements about religion are true EXCEPT Mormon ism is a Christian faith founded in the United States. 1/3 of the world's popula tion is Christian. 1/2 of the world's population is Muslim Islam is a monotheist ic religion (belief in one God) just like Christianity and Judaism. Roman Cathol ics throughout the world outnumber all other Christians combined. - Mormonism is a Christian faith founded in the United States.ethnocentric - 1/3 of the world' s population is Christian.ethnocentric - 1/2 of the world's population is Muslim ethnocentric - Islam is a monotheistic religion (belief in one God) just like Ch ristianity and Judaism.ethnocentric - Roman Catholics throughout the world outnu mber all other Christians combined.ethnocentric answer: 1/2 of the world's population is Muslim U04 - Q017 All of the following statements about religion are true EXCEPT Mormon ism is a Christian faith founded in the United States 1/3 of the world's populat ion is Christian 1/2 of the world's population is Muslim Islam is a monotheistic religion (belief in one God) just like Christianity and Judaism Roman Catholics throughout the world outnumber all other Christians combined - Mormonism is a C hristian faith founded in the United States1/2 of the world's population is Musl im - 1/3 of the world's population is Christian1/2 of the world's population is Muslim - 1/2 of the world's population is Muslim1/2 of the world's population is Muslim - Islam is a monotheistic religion (belief in one God) just like Christi anity and Judaism1/2 of the world's population is Muslim - Roman Catholics throu ghout the world outnumber all other Christians combined1/2 of the world's popula tion is Muslim answer: 1/2 of the world's population is Muslim U04 - Q018 Which cultural dimension would be characterized by the following comp onents: (1) subordinates should be consulted; (2) privileges and status symbols are frowned upon; (3) parents treat their children as equals; and (4) teachers e xpect students to express their opinions in class? individualism collectivism un certainty avoidance low power distance high power distance - individualism1/2 of the world's population is Muslim - collectivism1/2 of the world's population is Muslim - uncertainty avoidance1/2 of the world's population is Muslim - low pow er distance1/2 of the world's population is Muslim - high power distance1/2 of t he world's population is Muslim answer: low power distance U04 - Q019 During the 1990s,___were the fastest growing racial/ethnic group Afri can Americans Asian Americans Hispanic/Latino Americans European Americans Nativ e Americans - African Americanslow power distance - Asian Americanslow power dis tance - Hispanic/Latino Americanslow power distance - European Americanslow powe

r distance - Native Americanslow power distance answer: Hispanic/Latino Americans U04 - Q020 People who believe that their culture is better than other cultures o r that their culture should be the role model for other cultures would be classi fied as ethnocentric stereotypical prejudiced Discriminatory racist - ethnocentr icHispanic/Latino Americans - stereotypicalHispanic/Latino Americans - prejudice dHispanic/Latino Americans - DiscriminatoryHispanic/Latino Americans - racistHis panic/Latino Americans answer: ethnocentric U04 -Q010 - M In dialectic terms, the opposite or counterpart of a Myers-Briggs judger is an extrovert an intuitive a sensor a thinker a perceiver - an extrover tethnocentric - an intuitiveethnocentric - a sensorethnocentric - a thinkerethno centric - a perceiverethnocentric answer: a perceiver U05 - Q.002 - M A supervisor threatens to dismiss any member of the sales team w ho does not meet the sales quota by the end of the quarter. What type of power i s this leader using? referent power coercive power reward power legitimate power expert power - referent power a perceiver - coercive power a perceiver - reward power a perceiver - legitimate power a perceiver - expert power a perceiver answer: coercive power U05 - Q.008 - M When designated leaders are "plucked from a group in order to le ad," they should start out by making strong decisions to solve problems. avoid d iscussing their leadership concerns with group members until they have establish ed referent power. dramatically change their behavior with members who were once their friends and colleagues in the group. begin by using reward and coercive p ower to establish their new position. discuss ground rules for interaction while assuring group members of continued friendship. - start out by making strong de cisions to solve problems. coercive power - avoid discussing their leadership co ncerns with group members until they have established referent power. coercive p ower - dramatically change their behavior with members who were once their frien ds and colleagues in the group.coercive power - begin by using reward and coerci ve power to establish their new position. coercive power - discuss ground rules for interaction while assuring group members of continued friendship.coercive po wer answer: discuss ground rules for interaction while assuring group members of con tinued friendship. U05 - Q.010 - M Trait Leadership Theory, also known as the "Great Man" theory, c ontends that democratic leaders are always best. charismatic leaders are always best. leaders are born, not made. leaders are made, not born. women cannot be ef fective leaders. - democratic leaders are always best. discuss ground rules for interaction while assuring group members of continued friendship. - charismatic leaders are always best. discuss ground rules for interaction while assuring gro up members of continued friendship. - leaders are born, not made. discuss ground rules for interaction while assuring group members of continued friendship. - l eaders are made, not born.discuss ground rules for interaction while assuring gr oup members of continued friendship. - women cannot be effective leaders. discus s ground rules for interaction while assuring group members of continued friends hip. answer: leaders are born, not made. U05 - Q.014 - M Autocratic leaders are always counterproductive. make many of th e group's decisions expect followers to obey orders. Both a and b. Both b and c. - are always counterproductive.leaders are born, not made. - make many of the g roup's decisions leaders are born, not made. - expect followers to obey orders.l eaders are born, not made. - Both a and b. leaders are born, not made. - Both b and c. leaders are born, not made. answer: Both b and c. U05 - Q.016 - M Which theory of leadership explains how leaders can become more effective once they have carefully analyzed themselves, their groups, and the ci rcumstances in which they must lead? trait theory style theory situational theor y functional theory transformational theory - trait theory Both b and c. - style

theory Both b and c. - situational theory Both b and c. - functional theory Bot h b and c. - transformational theory Both b and c. answer: situational theory U05 - Q.018 - M Fred Fiedler's Contingency Model of Leadership Effectiveness con tends that the 3 important dimensions in every leadership situation are leader-m ember relations, task structure, and the leader's amount of power and control. t he leader's style, the leadership situation, and the leader's character. the lea der's charisma, vision, and creativity. the leader's ability to model leadership behavior, to motivate group members, and to make decisions. the leader's use of autocratic, democratic, and laissez-faire styles. - leader-member relations, ta sk structure, and the leader's amount of power and control. situational theory the leader's style, the leadership situation, and the leader's character. situa tional theory - the leader's charisma, vision, and creativity. situational theor y - the leader's ability to model leadership behavior, to motivate group members , and to make decisions. situational theory - the leader's use of autocratic, de mocratic, and laissez-faire styles. situational theory answer: leader-member relations, task structure, and the leader's amount of powe r and control. U05 - Q.024 - M All of the following characteristics distinguish transformationa l leadership EXCEPT experience. empowering. innovative. visionary. charismatic. - experience. leader-member relations, task structure, and the leader's amount o f power and control. - empowering. leader-member relations, task structure, and the leader's amount of power and control. - innovative. leader-member relations, task structure, and the leader's amount of power and control. - visionary. lead er-member relations, task structure, and the leader's amount of power and contro l. - charismatic.leader-member relations, task structure, and the leader's amoun t of power and control. answer: experience. U05 - Q.032 - M Members from uncertainty avoidance cultures prefer more structur e and instructions from a leader. less structure and fewer instructions from a l eader. more nurturing from a leader. less nurturing from a leader. a closer rela tionship with a leader. - more structure and instructions from a leader. experie nce. - less structure and fewer instructions from a leader. experience. - more n urturing from a leader. experience. - less nurturing from a leader. experience. - a closer relationship with a leader. experience. answer: more structure and instructions from a leader. U05 - Q001 I have the duty and power to lead is an example of Informational power Reward power Legitimate power Coercive power - Informational power more structu re and instructions from a leader. - Reward power more structure and instruction s from a leader. - Legitimate power more structure and instructions from a leade r. - Coercive power more structure and instructions from a leader. answer: Legitimate power U05 - Q002 Define the 3 Ms from the 5M Model of Leadership Effectiveness. Motive members Mentor members Manage members behavior Model followership behavior Make d ecisions - Motive members Legitimate power - Mentor members Legitimate power - M anage members behavior Legitimate power - Model followership behavior Legitimate power - Make decisions Legitimate power answer: Motive members Mentor members Make decisions U05 - Q002 - M A supervisor threatens to dismiss any member of the sales team wh o does not meet the sales quota by the end of the quarter. What type of power is this leader using? referent power coercive power reward power legitimate power expert power - referent powerMotive members Mentor members Make decisions - coer cive powerMotive members Mentor members Make decisions - reward powerMotive memb ers Mentor members Make decisions - legitimate powerMotive members Mentor member s Make decisions - expert powerMotive members Mentor members Make decisions answer: coercive power U05 - Q003 The correct order of Hersey-Blanchards Situational Model is The Partic ipating`\rightarrow`The Telling `\rightarrow` The Delegating `\rightarrow` The S elling The Delegating `\rightarrow` The Participating`\rightarrow` The Telling ` \rightarrow` The Selling The Selling `\rightarrow` The Delegating `\rightarrow`

The Participating `\rightarrow` The Telling The Telling `\rightarrow` The Sellin g `\rightarrow` The Participating `\rightarrow`The Delegating - The Participatin g`\rightarrow`The Telling `\rightarrow` The Delegating `\rightarrow` The Selling coercive power - The Delegating `\rightarrow` The Participating`\rightarrow` Th e Telling `\rightarrow` The Selling coercive power - The Selling `\rightarrow` T he Delegating `\rightarrow` The Participating `\rightarrow` The Telling coercive power - The Telling `\rightarrow` The Selling `\rightarrow` The Participating ` \rightarrow`The Delegating coercive power answer: The Telling `\rightarrow` The Selling `\rightarrow` The Participating `\ rightarrow`The Delegating U05 - Q004 What is required when dealing with different cultural dimensions and behavior in leadership ? Understanding Respect Adaptation All of the other optio ns - Understanding The Telling `\rightarrow` The Selling `\rightarrow` The Parti cipating `\rightarrow`The Delegating - Respect The Telling `\rightarrow` The Sel ling `\rightarrow` The Participating `\rightarrow`The Delegating - Adaptation Th e Telling `\rightarrow` The Selling `\rightarrow` The Participating `\rightarrow `The Delegating - All of the other options The Telling `\rightarrow` The Selling `\rightarrow` The Participating `\rightarrow`The Delegating answer: All of the other options U05 - Q005 You have been promoted to a management position at work. You expect e mployees to fulfill your requests because you are the boss. What type of power i s this? referent power coercive power reward power legitimate power charismatic power - referent power All of the other options - coercive power All of the othe r options - reward power All of the other options - legitimate power All of the other options - charismatic power All of the other options answer: legitimate power U05 - Q006 Fred Fiedler's Contingency Model of Leadership Effectiveness claims t hat relationshipmotivated leaders may ignore task requirements may tolerate disr uptive behavior by members may appear inefficient and weak may do the work of ot her members to avoid asking them to do more may do all of the above - may ignore task requirements legitimate power - may tolerate disruptive behavior by member s legitimate power - may appear inefficient and weak legitimate power - may do t he work of other members to avoid asking them to do more legitimate power - may do all of the above legitimate power answer: may do all of the above U05 - Q007 According to the 5M Model of Leadership Effectiveness, all of the fol lowing items are characteristic of effective decision making by group leaders EX CEPT the ability to make timely decisions the ability to provide a rationale for decisions the ability to identify and make popular decisions. the willingness t o solicit feedback. the ability to clearly communicate the reasons for a decisio n to the group. - the ability to make timely decisions may do all of the above the ability to provide a rationale for decisions may do all of the above - the ability to identify and make popular decisions. may do all of the above - the wi llingness to solicit feedback. may do all of the above - the ability to clearly communicate the reasons for a decision to the group. may do all of the above answer: the ability to identify and make popular decisions. U05 - Q008 Fred Fiedler's Contingency Model of Leadership Effectiveness contends that the 3 important dimensions in every leadership situation are leader-member relations, task structure, and the leader's amount of power and control. the le ader's style, the leadership situation, and the leader's character. the leader's charisma, vision, and creativity the leader's ability to model leadership behav ior, to motivate group members, and to make decisions the leader's use of autocr atic, democratic, and laissez-faire styles - leader-member relations, task struc ture, and the leader's amount of power and control.the ability to identify and m ake popular decisions. - the leader's style, the leadership situation, and the l eader's character.the ability to identify and make popular decisions. - the lead er's charisma, vision, and creativitythe ability to identify and make popular de cisions. - the leader's ability to model leadership behavior, to motivate group members, and to make decisionsthe ability to identify and make popular decisions . - the leader's use of autocratic, democratic, and laissez-faire stylesthe abil

ity to identify and make popular decisions. answer: leader-member relations, task structure, and the leader's amount of powe r and control. U05 - Q009 Modeling leadership behavior in the 5M Model of Leadership Effectivne ss includes all of the following strategies EXCEPT publicly championing your gro up and its goals behaving consistently and assertively maintaining control at al l times praising group members to others outside the group demonstrating compete nce and trustworthiness - publicly championing your group and its goalsleader-me mber relations, task structure, and the leader's amount of power and control. behaving consistently and assertivelyleader-member relations, task structure, an d the leader's amount of power and control. - maintaining control at all timesle ader-member relations, task structure, and the leader's amount of power and cont rol. - praising group members to others outside the groupleader-member relations , task structure, and the leader's amount of power and control. - demonstrating competence and trustworthinessleader-member relations, task structure, and the l eader's amount of power and control. answer: maintaining control at all times U05 - Q010 Members from uncertainty avoidance cultures prefer more structure and instructions from a leader less structure and fewer instructions from a leader more nurturing from a leader less nurturing from a leader a closer relationship with a leader - more structure and instructions from a leadermaintaining control at all times - less structure and fewer instructions from a leadermaintaining c ontrol at all times - more nurturing from a leadermaintaining control at all tim es - less nurturing from a leadermaintaining control at all times - a closer rel ationship with a leadermaintaining control at all times answer: more structure and instructions from a leader U05 - Q010 - M Trait Leadership Theory, also known as the "Great Man" theory, co ntends that democratic leaders are always best charismatic leaders are always be st leaders are born, not made leaders are made, not born women cannot be effecti ve leaders - democratic leaders are always bestmore structure and instructions f rom a leader - charismatic leaders are always bestmore structure and instruction s from a leader - leaders are born, not mademore structure and instructions from a leader - leaders are made, not bornmore structure and instructions from a lea der - women cannot be effective leadersmore structure and instructions from a le ader answer: leaders are born, not made U05 - Q011 Modeling leadership behavior in the 5M Model of Leadership Effectivne ss includes all of the following strategies EXCEPT publicly championing your gro up and its goals behaving consistently and assertively maintaining control at al l times praising group members to others outside the group demonstrating compete nce and trustworthiness - publicly championing your group and its goalsleaders a re born, not made - behaving consistently and assertivelyleaders are born, not m ade - maintaining control at all timesleaders are born, not made - praising grou p members to others outside the groupleaders are born, not made - demonstrating competence and trustworthinessleaders are born, not made answer: maintaining control at all times U05 - Q014 As the group's leader, Grace makes sure that everyone in her group is committed to the group's common goal. She also helps solve interpersonal proble ms and conflicts, recognizing outstanding group work. Which of the following lea dership functions in the 5M Model of Leadership Effectiveness does Grace's behav ior exemplify? Modeling leadership Motivating members Managing group process Mak ing decisions Mentoring members - Modeling leadershipmaintaining control at all times - Motivating membersmaintaining control at all times - Managing group proc essmaintaining control at all times - Making decisionsmaintaining control at all times - Mentoring membersmaintaining control at all times answer: Motivating members U05 - Q015 Modeling leadership behavior in the 5M Model of Leadership Effectivne ss includes all of the following strategies EXCEPT publicly championing your gro up and its goals behaving consistently and assertively maintaining control at al l times praising group members to others outside the group demonstrating compete

nce and trustworthiness - publicly championing your group and its goalsMotivatin g members - behaving consistently and assertivelyMotivating members - maintainin g control at all timesMotivating members - praising group members to others outs ide the groupMotivating members - demonstrating competence and trustworthinessMo tivating members answer: maintaining control at all times U05 - Q017 Dianna has been elected as leader of the research group because she h as published more than any other team member on the research topic. What type of power is this? referent power coercive power informational power legitimate pow er reward power - referent powermaintaining control at all times - coercive powe rmaintaining control at all times - informational powermaintaining control at al l times - legitimate powermaintaining control at all times - reward powermaintai ning control at all times answer: informational power U05 - Q018 Your group has chosen Madeleine as its leader because she has demonst rated strong organizational and problem-solving skills as well as a talent for m otivating members and resolving conflict. What type of power does Madeleine have ? referent power coercive power informational power legitimate power expert powe r - referent powerinformational power - coercive powerinformational power - info rmational powerinformational power - legitimate powerinformational power - exper t powerinformational power answer: referent power U05 - Q019 Dianna has been elected as leader of the research group because she h as published more than any other team member on the research topic. What type of power is this? referent power coercive power informational power Legitimate pow er reward power - referent powerreferent power - coercive powerreferent power informational powerreferent power - Legitimate powerreferent power - reward powe rreferent power answer: informational power U05 - Q020 Your group has chosen Madeleine as its leader because she has demonst rated strong organizational and problem-solving skills as well as a talent for m otivating members and resolving conflict. What type of power does Madeleine have ? referent power coercive power informational power Legitimate power expert powe r - referent powerinformational power - coercive powerinformational power - info rmational powerinformational power - Legitimate powerinformational power - exper t powerinformational power answer: referent power U06 - Q.004 - M Which 2 of Maslow's needs would be classified as satisfiers rath er than motivators? physiological and safety needs safety and belongingness need s belongingness and esteem needs esteem needs and self-actualization needs selfactualization and control needs - physiological and safety needs referent power - safety and belongingness needs referent power - belongingness and esteem needs referent power - esteem needs and self-actualization needs referent power - sel f-actualization and control needs referent power answer: physiological and safety needs U06 - Q.006 - M Which of the following strategies is most likely to motivate gro up members with strong inclusion needs? Spend time with them in social settings. Tell them how valuable they are to the group. Make them chair of a subcommittee . Give them special, individual assignments. Let them know how much you like the m as friends. - Spend time with them in social settings. physiological and safet y needs - Tell them how valuable they are to the group. physiological and safety needs - Make them chair of a subcommittee. physiological and safety needs - Giv e them special, individual assignments.physiological and safety needs - Let them know how much you like them as friends. physiological and safety needs answer: Tell them how valuable they are to the group. U06 - Q.014 - M Which of the following strategies can help you motivate other me mbers by promoting a sense of choice in your group? Express enthusiasm; don't be critical or cynical. Set high standards for yourself. Seek and take advantage o f new opportunities. Develop a group method for tracking and measuring progress. Recognize and celebrate the accomplishments of others. - Express enthusiasm; do

n't be critical or cynical. Tell them how valuable they are to the group. - Set high standards for yourself.Tell them how valuable they are to the group. - Seek and take advantage of new opportunities.Tell them how valuable they are to the group. - Develop a group method for tracking and measuring progress.Tell them ho w valuable they are to the group. - Recognize and celebrate the accomplishments of others.Tell them how valuable they are to the group. answer: Seek and take advantage of new opportunities. U06 - Q.016 - M The most visible symptom of an unmotivated group is hostility. a pathy. resistance. non-cooperation. confusion. - hostility. Seek and take advant age of new opportunities. - apathy. Seek and take advantage of new opportunities . - resistance. Seek and take advantage of new opportunities. - non-cooperation. Seek and take advantage of new opportunities. - confusion. Seek and take advant age of new opportunities. answer: apathy. U06 - Q.018 - M Controlling feedback tells members what to do. tells members how they are doing. focuses on group work and how that work contributes to group su ccess. substitutes "it" statements for "you" statements. does all of the above. - tells members what to do. apathy. - tells members how they are doing. apathy. - focuses on group work and how that work contributes to group success. apathy. - substitutes "it" statements for "you" statements. apathy. - does all of the ab ove.apathy. answer: tells members what to do. U06 - Q.020 - M A reprimand can best be described as a punishment. a form of fee dback that identifies deficiencies. an action that should only be taken by the l eader. the last step before expulsion. a personal attack on the member. - a puni shment. tells members what to do. - a form of feedback that identifies deficienc ies. tells members what to do. - an action that should only be taken by the lead er. tells members what to do. - the last step before expulsion. tells members wh at to do. - a personal attack on the member.tells members what to do. answer: a form of feedback that identifies deficiencies. U06 - Q.024 - M Leaders with ________________ power are more likely to motivate their members. legitimate and reward referent and persuasive reward coercive and charismatic all of the above types of - legitimate and reward a form of feedbac k that identifies deficiencies. - referent and persuasive a form of feedback tha t identifies deficiencies. - reward a form of feedback that identifies deficienc ies. - coercive and charismatic a form of feedback that identifies deficiencies. - all of the above types of a form of feedback that identifies deficiencies. answer: referent and persuasive U06 - Q.026 - M The textbook suggests 4 criteria for punishing a group member. W hich answer reflects these criteria? fair; equitable; competitive; appropriate p redictable; immediate; consistent; impersonal universal; compassionate; standard ; final meaningful; choices of options; based on competencies; progressive warni ngs; reprimands; suspension; dismissal - fair; equitable; competitive; appropria te referent and persuasive - predictable; immediate; consistent; impersonal refe rent and persuasive - universal; compassionate; standard; final referent and per suasive - meaningful; choices of options; based on competencies; progressive ref erent and persuasive - warnings; reprimands; suspension; dismissalreferent and p ersuasive answer: predictable; immediate; consistent; impersonal U06 - Q001 Define Three needs from Schutzs Theory of Interpersonal Needs Need for inclusion Need for control Need for affection Need for Safety Need for Esteem Need for inclusion predictable; immediate; consistent; impersonal - Need for co ntrol predictable; immediate; consistent; impersonal - Need for affection predic table; immediate; consistent; impersonal - Need for Safety predictable; immediat e; consistent; impersonal - Need for Esteem predictable; immediate; consistent; impersonal answer: Need for inclusion Need for control Need for affection U06 - Q002 When motivating virtual groups, remember to do three things. Schedule a face-to-face orientation meeting. Provide agendas after all online meetings A dapt to members' needs, personality types, and cultural differences Encourage "v

irtual" friendships Keep virtual meetings asynchronous - Schedule a face-to-face orientation meeting. Need for inclusion Need for control Need for affection - P rovide agendas after all online meetings Need for inclusion Need for control Nee d for affection - Adapt to members' needs, personality types, and cultural diffe rences Need for inclusion Need for control Need for affection - Encourage "virtu al" friendships Need for inclusion Need for control Need for affection - Keep vi rtual meetings asynchronous Need for inclusion Need for control Need for affecti on answer: Schedule a face-to-face orientation meeting. Adapt to members' needs, pe rsonality types, and cultural differences Encourage "virtual" friendships U06 - Q003 Define three of the many purposes that assessment serves. Clarify the job to be done Enhance and improve communication Encourage responsibility Exclu de a disruptive member Reprimand a member - Clarify the job to be done Schedule a face-to-face orientation meeting. Adapt to members' needs, personality types, and cultural differences Encourage "virtual" friendships - Enhance and improve c ommunication Schedule a face-to-face orientation meeting. Adapt to members' need s, personality types, and cultural differences Encourage "virtual" friendships Encourage responsibility Schedule a face-to-face orientation meeting. Adapt to members' needs, personality types, and cultural differences Encourage "virtual" friendships - Exclude a disruptive member Schedule a face-to-face orientation me eting. Adapt to members' needs, personality types, and cultural differences Enco urage "virtual" friendships - Reprimand a member Schedule a face-to-face orienta tion meeting. Adapt to members' needs, personality types, and cultural differenc es Encourage "virtual" friendships answer: Clarify the job to be done Enhance and improve communication Encourage r esponsibility U06 - Q004 Define the features of rewards. Fair Equitable Competitive Appropriat e All of the other options - Fair Clarify the job to be done Enhance and improve communication Encourage responsibility - Equitable Clarify the job to be done E nhance and improve communication Encourage responsibility - Competitive Clarify the job to be done Enhance and improve communication Encourage responsibility Appropriate Clarify the job to be done Enhance and improve communication Encoura ge responsibility - All of the other options Clarify the job to be done Enhance and improve communication Encourage responsibility answer: All of the other options U06 - Q004 - M Which 2 of Maslow's needs would be classified as satisfiers rathe r than motivators? physiological and safety needs safety and belongingness needs belongingness and esteem needs esteem needs and self-actualization needs self-a ctualization and control needs - physiological and safety needsAll of the other options - safety and belongingness needsAll of the other options - belongingness and esteem needsAll of the other options - esteem needs and self-actualization needsAll of the other options - self-actualization and control needsAll of the o ther options answer: physiological and safety needs U06 - Q005 In order to achieve an optimal group experience, which of the followi ng dialectic tensions should a group negotiate to achieve a both/and resolution? individual goals group goals task dimensions social dimensions engagement disenga gement leadership followership all of the others. - individual goals group goals physiological and safety needs - task dimensions social dimensions physiological and safety needs - engagement disengagement physiological and safety needs - lea dership followership physiological and safety needs - all of the others. physiol ogical and safety needs answer: all of the others. U06 - Q006 Which 2 of Maslow's needs would be classified as satisfiers rather th an motivators? physiological and safety needs safety and belongingness needs bel ongingness and esteem needs esteem needs and self-actualization needs self-actua lization and control needs - physiological and safety needsall of the others. safety and belongingness needsall of the others. - belongingness and esteem need sall of the others. - esteem needs and self-actualization needsall of the others . - self-actualization and control needsall of the others. -

answer: physiological and safety needs U06 - Q007 Kenneth Thomas describes 4 categories of intrinsic motivation needed to energize and reinforce work. They are inclusion, affection, control, and open ness meaningfulness, choice, competence, and progress achievement, responsibilit y, recognition, and advancement esteem, belongingness, self-actualization, and s afety motivation, assessment, rewards, and punishment - inclusion, affection, co ntrol, and opennessphysiological and safety needs - meaningfulness, choice, comp etence, and progressphysiological and safety needs - achievement, responsibility , recognition, and advancementphysiological and safety needs - esteem, belonging ness, self-actualization, and safetyphysiological and safety needs - motivation, assessment, rewards, and punishmentphysiological and safety needs answer: meaningfulness, choice, competence, and progress U06 - Q008 Controlling feedback tells members what to do tells members how they are doing focuses on group work and how that work contributes to group success s ubstitutes "it" statements for "you" statements does all of the above - tells me mbers what to domeaningfulness, choice, competence, and progress - tells members how they are doingmeaningfulness, choice, competence, and progress - focuses on group work and how that work contributes to group successmeaningfulness, choice , competence, and progress - substitutes "it" statements for "you" statementsmea ningfulness, choice, competence, and progress - does all of the abovemeaningfuln ess, choice, competence, and progress answer: tells members what to do U06 - Q009 Suppose someone tells your group "If you finish this eighteen-month p roject on time,I'll send each of you a person thank-you note. " According to you r textbook, this reward is not based on well-conceived, objective criteria. In t his case, the reward is not fair equitable competitive appropriate intrinsic - f airtells members what to do - equitabletells members what to do - competitivetel ls members what to do - appropriatetells members what to do - intrinsictells mem bers what to do answer: appropriate U06 - Q011 Leaders with _________ power are more likely to motivate their member s. legitimate and reward referent and persuasive reward coercive and charismatic all of the above types of - legitimate and rewardappropriate - referent and per suasiveappropriate - rewardappropriate - coercive and charismaticappropriate - a ll of the above types ofappropriate answer: referent and persuasive U06 - Q014 In terms of the 8 basic Myers-Briggs types, which of the following st rategies is most likely to motivate an introvert? Provide thinking time before a nd during discussions Request real and practical information Encourage debate on substantive issues Focus on a variety of alternatives Encourage closure on issu es - Provide thinking time before and during discussionsreferent and persuasive - Request real and practical informationreferent and persuasive - Encourage deba te on substantive issuesreferent and persuasive - Focus on a variety of alternat ivesreferent and persuasive - Encourage closure on issuesreferent and persuasive answer: Provide thinking time before and during discussions U06 - Q015 Which of the following statements about the value of extrinsic reward s is the most accurate? They are granted by supervisors rather than group member s. They satisfy only physical and safety needs They motivate group members to wo rk together They appeal to members' passions They place primary emphasis on the group's goals. - They are granted by supervisors rather than group members.Provi de thinking time before and during discussions - They satisfy only physical and safety needsProvide thinking time before and during discussions - They motivate group members to work togetherProvide thinking time before and during discussion s - They appeal to members' passionsProvide thinking time before and during disc ussions - They place primary emphasis on the group's goals.Provide thinking time before and during discussions answer: They are granted by supervisors rather than group members. U06 - Q016 The textbook suggests 4 criteria for punishing a group member. Which answer reflects these criteria? fair; equitable; competitive; appropriate predic

table; immediate; consistent; impersonal universal; compassionate; standard; fin al meaningful; choices of options; based on competencies; progressive warnings; reprimands; suspension; dismissal - fair; equitable; competitive; appropriateThe y are granted by supervisors rather than group members. - predictable; immediate ; consistent; impersonalThey are granted by supervisors rather than group member s. - universal; compassionate; standard; finalThey are granted by supervisors ra ther than group members. - meaningful; choices of options; based on competencies ; progressiveThey are granted by supervisors rather than group members. - warnin gs; reprimands; suspension; dismissalThey are granted by supervisors rather than group members. answer: predictable; immediate; consistent; impersonal U06 - Q017 Leaders with ______________________ power are more likely to motivate their members. legitimate and reward referent and persuasive reward coercive an d charismatic all of the above types of - legitimate and rewardpredictable; imme diate; consistent; impersonal - referent and persuasivepredictable; immediate; c onsistent; impersonal - rewardpredictable; immediate; consistent; impersonal - c oercive and charismaticpredictable; immediate; consistent; impersonal - all of t he above types ofpredictable; immediate; consistent; impersonal answer: referent and persuasive U06 - Q018 Which of the following statements about the value of extrinsic reward s is the most accurate? They are granted by supervisors rather than group member s They satisfy only physical and safety needs They motivate group members to wor k together. They appeal to members' passions They place primary emphasis on the group's goals - They are granted by supervisors rather than group membersreferen t and persuasive - They satisfy only physical and safety needsreferent and persu asive - They motivate group members to work together.referent and persuasive - T hey appeal to members' passionsreferent and persuasive - They place primary emph asis on the group's goalsreferent and persuasive answer: They are granted by supervisors rather than group members U06 - Q019 Which of the following group dialectics is MOST applicable in Chapter 6, "Group Motivation"? conflict <-> cohesion conformity <-> nonconformity homog eneous <-> heterogeneous structure <-> spontaneity engaged <-> disengaged - conf lict <-> cohesionThey are granted by supervisors rather than group members - con formity <-> nonconformityThey are granted by supervisors rather than group membe rs - homogeneous <-> heterogeneousThey are granted by supervisors rather than gr oup members - structure <-> spontaneityThey are granted by supervisors rather th an group members - engaged <-> disengagedThey are granted by supervisors rather than group members answer: engaged <-> disengaged U06 - Q020 Which theory would explain why even when a goal is highly valued (bec oming a billionaire or dancing with the stars), you may not be highly motivated to pursue that goal if the chance of reaching it is very small? Goal Theory Schu tz's Theory of Interpersonal Needs Expectancy Value Theory Maslow's Hierarchy of Needs Myers-Briggs Personality Theory - Goal Theoryengaged <-> disengaged - Sch utz's Theory of Interpersonal Needsengaged <-> disengaged - Expectancy Value The oryengaged <-> disengaged - Maslow's Hierarchy of Needsengaged <-> disengaged Myers-Briggs Personality Theoryengaged <-> disengaged answer: Expectancy Value Theory U07 - Q.002 - M Defining a computer as "a programmable electronic device that st ores, retrieves, and processes data" represents what type of meaning? bypassing denotation connotation abstract jargon - bypassing Expectancy Value Theory - den otation Expectancy Value Theory - connotation Expectancy Value Theory - abstract Expectancy Value Theory - jargon Expectancy Value Theory answer: denotation U07 - Q.004 - M Which of the following is an example of an abstract word? meetin g table computer dictionary fairness - meeting denotation - table denotation - c omputer denotation - dictionary denotation - fairness denotation answer: fairness U07 - Q.010 - M How should you use team talk to produce a stronger, more coopera tive group? Encourage group members to express disagreements and listen patientl

y to dissenters. Ask more "what if" questions and make fewer "we can't do it" st atements. Ask group members to address you by your first name or nickname. Speak in a specific and active voice rather than an abstract and passive voice. all o f the others - Encourage group members to express disagreements and listen patie ntly to dissenters. fairness - Ask more "what if" questions and make fewer "we c an't do it" statements. fairness - Ask group members to address you by your firs t name or nickname. fairness - Speak in a specific and active voice rather than an abstract and passive voice. fairness - all of the others fairness answer: all of the others U07 - Q.014 - M In a section on avoiding abusive language, your textbook suggest s that if you take action against others, make sure you avoid all forms of verba l abuse EXCEPT raising your voice. swearing. calling members insulting names. us ing sarcasm to wound others. expressing your personal objections. - raising your voice. all of the others - swearing. all of the others - calling members insult ing names. all of the others - using sarcasm to wound others.all of the others expressing your personal objections. all of the others answer: expressing your personal objections. U07 - Q.018 - M The variations in vocabulary, pronunciation, syntax, and style t hat distinguish speakers from different ethnic groups and geographic areas are r eferred to as denotative differences. dialects codeswitching. abstract meaning. jargon. - denotative differences. expressing your personal objections. - dialect s expressing your personal objections. - codeswitching. expressing your personal objections. - abstract meaning. expressing your personal objections. - jargon. expressing your personal objections. answer: dialects U07 - Q.022 - M The study of body movement and physical expression is referred t o as kinesics. word stress. proxemics. territoriality. polychronic. - kinesics. dialects - word stress.dialects - proxemics. dialects - territoriality. dialects - polychronic. dialects answer: kinesics. U07 - Q.028 - M Members of most well-established groups interact with one anothe r at Hall's intimate distance. personal distance. social distance. business dist ance. public distance. - intimate distance. kinesics. - personal distance.kinesi cs. - social distance. kinesics. - business distance.kinesics. - public distance .kinesics. answer: personal distance. U07 - Q.030 - M According to Jack Gibb and his notion of supportive/defensive co mmunication, which communication behavior is the opposite of strategic? evaluati on neutral superiority empathetic spontaneous - evaluation personal distance. neutral personal distance. - superiority personal distance. - empathetic persona l distance. - spontaneous personal distance. answer: spontaneous U07 - Q001 What kind of language demeans, inappropriately excludes, or stereotyp es people ? Offensive language Jargon Bypassing None of the other options - Offe nsive language spontaneous - Jargon spontaneous - Bypassing spontaneous - None o f the other options spontaneous answer: Offensive language U07 - Q002 To avoid or stop verbal abuse, take such actions as Quote the law Tak e a time out Express your objections Practice what you preach All of the other o ptions - Quote the law Offensive language - Take a time out Offensive language Express your objections Offensive language - Practice what you preach Offensive language - All of the other options Offensive language answer: All of the other options U07 - Q002 - M Defining a computer as "a programmable electronic device that sto res, retrieves, and processes data" represents what type of meaning? bypassing D enotation Connotation Abstract Jargon - bypassingAll of the other options - Deno tationAll of the other options - ConnotationAll of the other options - AbstractA ll of the other options - JargonAll of the other options answer: Denotation U07 - Q003 Which does NOT belong to nonverbal behavior ? Personal Appearance Fac

ial Expression and Eye Contact Vocal Expression Physical Expression Using foul a nd absence words - Personal Appearance Denotation - Facial Expression and Eye Co ntact Denotation - Vocal Expression Denotation - Physical Expression Denotation - Using foul and absence words Denotation answer: Using foul and absence words U07 - Q004 When talking to strangers or new acquaintances, use: Intimate Distanc e Personal Distance Social Distance Public Distance - Intimate Distance Using fo ul and absence words - Personal Distance Using foul and absence words - Social D istance Using foul and absence words - Public Distance Using foul and absence wo rds answer: Social Distance U07 - Q004 - M Which of the following is an example of an abstract word? meeting Table Computer Dictionary Fairness - meetingSocial Distance - TableSocial Dista nce - ComputerSocial Distance - DictionarySocial Distance - FairnessSocial Dista nce answer: Fairness U07 - Q005 All of the following communication strategies can help improve a grou p's team talk EXCEPT Express your individual needs. Use the pronouns "we," "us," and "our." Listen to dissenters. Speak in a specific and active voice. Ask more "what if" questions - Express your individual needs. Fairness - Use the pronoun s "we," "us," and "our." Fairness - Listen to dissenters. Fairness - Speak in a specific and active voice. Fairness - Ask more "what if" questions Fairness answer: Express your individual needs. U07 - Q006 At a regular study group meeting, one member asks that everyone be ab le to"summarize the most important information in each chapter." At the next mee ting, a group member distributes an outline of the textbook's important concepts but wonders why no one else in the group has made the same effort. This misunde rstanding is an example of failure to follow the rules of language. Denotation f ailure to interpret nonverbal behavior. Bypassing concrete words. - failure to f ollow the rules of language. Express your individual needs. - Denotation Express your individual needs. - failure to interpret nonverbal behavior. Express your individual needs. - Bypassing Express your individual needs. - concrete words. E xpress your individual needs. answer: Bypassing U07 - Q007 According to your textbook, task-oriented leaders are attracted to th e head of a table, while more socially oriented leaders are likely to sit in the middle position at the side of a table at the corner of a table in order to avo id sitting at the head of the table at various places around the table in order to sit side-by-side with every member. at the head of the table, just like taskoriented leaders next to a task-oriented member who can keep the leader on track . - in the middle position at the side of a table Bypassing - at the corner of a table in order to avoid sitting at the head of the table Bypassing - at various places around the table in order to sit side-by-side with every member. Bypassi ng - at the head of the table, just like task-oriented leaders Bypassing - next to a task-oriented member who can keep the leader on track. Bypassing answer: in the middle position at the side of a table U07 - Q008 Which of the following is an example of an abstract word? meeting tab le computer dictionary fairness - meetingin the middle position at the side of a table - tablein the middle position at the side of a table - computerin the mid dle position at the side of a table - dictionaryin the middle position at the si de of a table - fairnessin the middle position at the side of a table answer: fairness U07 - Q009 The specialized or technical language of a profession is referred to as denotative dialects concrete abstract jargon - denotativefairness - dialectsf airness - concretefairness - abstractfairness - jargonfairness answer: jargon U07 - Q010 The variations in vocabulary, pronunciation, syntax, and style that d istinguish speakers from different ethnic groups and geographic areas are referr ed to as denotative differences dialects codeswitching abstract meaning . jargon - denotative differencesjargon - dialectsjargon - codeswitchingjargon - abstrac

t meaningjargon - . jargonjargon answer: dialects U07 - Q011 In a section on avoiding abusive language, your textbook suggests tha t if you take action against others, make sure you avoid all forms of verbal abu se EXCEPT raising your voice swearing calling members insulting names using sarc asm to wound others expressing your personal objections - raising your voicedial ects - swearingdialects - calling members insulting namesdialects - using sarcas m to wound othersdialects - expressing your personal objectionsdialects answer: expressing your personal objections U07 - Q012 Which of the following answers represents an accent rather than a dia lect? Someone from Boston says "cah" rather than car. Someone from Alabama says "Ah nevah go theyuh." Someone from Asia says "lice" instead of rice. People from different states call a carbonated beverage a soda, pop, tonic, or soda pop All of the above are accents - Someone from Boston says "cah" rather than car.expre ssing your personal objections - Someone from Alabama says "Ah nevah go theyuh." expressing your personal objections - Someone from Asia says "lice" instead of r ice.expressing your personal objections - People from different states call a ca rbonated beverage a soda, pop, tonic, or soda popexpressing your personal object ions - All of the above are accentsexpressing your personal objections answer: Someone from Asia says "lice" instead of rice. U08 - Q.004 - M Unlike working memory theory, short-term memory has a large capa city, enabling group members to remember names, numbers, and discussion issues. is highly effective for listening to speeches and lectures. helps you remember a bout 7 (plus or minus 2) different items or bits of information at one time. all ows you to sift through what you've heard to create new meaning. does all of the above. - has a large capacity, enabling group members to remember names, number s, and discussion issues. Someone from Asia says "lice" instead of rice. - is hi ghly effective for listening to speeches and lectures. Someone from Asia says "l ice" instead of rice. - helps you remember about 7 (plus or minus 2) different i tems or bits of information at one time. Someone from Asia says "lice" instead o f rice. - allows you to sift through what you've heard to create new meaning.Som eone from Asia says "lice" instead of rice. - does all of the above. Someone fro m Asia says "lice" instead of rice. answer: helps you remember about 7 (plus or minus 2) different items or bits of information at one time. U08 - Q.008 - M Two committee members make significantly different recommendatio ns for the date and format of the company's annual picnic.Which type of listenin g will help you decide which suggestion to support? analytical listening empathi c listening comprehensive listening appreciative listening discriminative listen ing - analytical listening helps you remember about 7 (plus or minus 2) differen t items or bits of information at one time. - empathic listening helps you remem ber about 7 (plus or minus 2) different items or bits of information at one time . - comprehensive listening helps you remember about 7 (plus or minus 2) differe nt items or bits of information at one time. - appreciative listening helps you remember about 7 (plus or minus 2) different items or bits of information at one time. - discriminative listening helps you remember about 7 (plus or minus 2) d ifferent items or bits of information at one time. answer: analytical listening U08 - Q.012 - M What type of listening is most appropriate when you want to unde rstand and identify a person's feelings or motives? comprehensive listening empa thic listening analytical listening appreciative listening discriminative listen ing - comprehensive listening analytical listening - empathic listening analytic al listening - analytical listening analytical listening - appreciative listenin g analytical listening - discriminative listening analytical listening answer: empathic listening U08 - Q.014 - M You can become a more empathic listener by being conscious of yo ur feedback. focusing on the speaker, not yourself. avoiding talking about your own experiences and feelings. monitoring your feedback to show concern. doing al l of the above. - being conscious of your feedback. empathic listening - focusin g on the speaker, not yourself. empathic listening - avoiding talking about your

own experiences and feelings. empathic listening - monitoring your feedback to show concern. empathic listening - doing all of the above.empathic listening answer: doing all of the above. U08 - Q.018 - M Maintenance-oriented members tend to be particularly effective a t empathic and comprehensive listening. empathic and analytical listening. empat hic and appreciative listening. comprehensive and analytical listening. comprehe nsive and appreciative listening. - empathic and comprehensive listening. doing all of the above. - empathic and analytical listening.doing all of the above. empathic and appreciative listening. doing all of the above. - comprehensive and analytical listening. doing all of the above. - comprehensive and appreciative listening. doing all of the above. answer: empathic and appreciative listening. U08 - Q.020 - M All of the following answers describe the strong link between li stening skills and successful leadership EXCEPT Leaders make sure all members co mprehend what is said to avoid misunderstandings. Leaders intervene at the sligh test hint of hostility to defuse destructive conflict. Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and lis ten. Leaders ask members what they think and feel rather than guessing what is o n their minds. Leaders do not fake attention. - Leaders make sure all members co mprehend what is said to avoid misunderstandings. empathic and appreciative list ening. - Leaders intervene at the slightest hint of hostility to defuse destruct ive conflict. empathic and appreciative listening. - Leaders interrupt members w ho talk too much to ensure that everyone gets an equal chance to speak and liste n. empathic and appreciative listening. - Leaders ask members what they think an d feel rather than guessing what is on their minds. empathic and appreciative li stening. - Leaders do not fake attention. empathic and appreciative listening. answer: Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen. U08 - Q.024 - M Which of the follow listening strategies would you be using if y ou asked "Am I right in saying that all of us agree to meet on Saturday to finis h the project?" listen for big ideas overcome distractions "listen" to nonverbal behavior listen before you leap help your group listen - listen for big ideas L eaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen. - overcome distractions Leaders interrupt members w ho talk too much to ensure that everyone gets an equal chance to speak and liste n. - "listen" to nonverbal behavior Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen. - listen befor e you leap Leaders interrupt members who talk too much to ensure that everyone g ets an equal chance to speak and listen. - help your group listen Leaders interr upt members who talk too much to ensure that everyone gets an equal chance to sp eak and listen. answer: help your group listen U08 - Q.028 - M Differences in personality types may affect the way group member s listen. Which of the Myers-Briggs personality types may be the best comprehens ive listeners in a group? introverts extroverts feelers judgers all of the above - introverts help your group listen - extroverts help your group listen - feele rs help your group listen - judgers help your group listen - all of the above he lp your group listen answer: introverts U08 - Q001 When asking a question, we should Have a plan Ask permission Avoid bi ased questions Wait for the answer All of the other options - Have a plan introv erts - Ask permission introverts - Avoid biased questions introverts - Wait for the answer introverts - All of the other options introverts answer: All of the other options U08 - Q002 Define Two positive listening attitudes Equal Group-centered Superior Closed-minded - Equal All of the other options - Group-centered All of the othe r options - Superior All of the other options - Closed-minded All of the other o ptions answer: Equal Group-centered U08 - Q003 Define two purposes of paraphrasing. Ensure comprehension before eval

uation Summarize lengthy comments Demean the speaker by showing his/her mistakes Show off your knowledge to correct the speakers incorrect information - Ensure c omprehension before evaluation Equal Group-centered - Summarize lengthy comments Equal Group-centered - Demean the speaker by showing his/her mistakes Equal Gro up-centered - Show off your knowledge to correct the speakers incorrect informati on Equal Group-centered answer: Ensure comprehension before evaluation Summarize lengthy comments U08 - Q004 High-Context Listening requires Ear Eyes Attention Heart All of the o ther options - Ear Ensure comprehension before evaluation Summarize lengthy comm ents - Eyes Ensure comprehension before evaluation Summarize lengthy comments Attention Ensure comprehension before evaluation Summarize lengthy comments - He art Ensure comprehension before evaluation Summarize lengthy comments - All of t he other options Ensure comprehension before evaluation Summarize lengthy commen ts answer: All of the other options U08 - Q005 Good listeners use their extra thought speed productively. They do al l of the following EXCEPT Identify and summarize main ideas. Pay extra attention to nonverbal behavior Analyze arguments Assess the relevance of a speaker's com ments. Listen exclusively for specific facts and statistics. - Identify and summ arize main ideas. All of the other options - Pay extra attention to nonverbal be havior All of the other options - Analyze arguments All of the other options - A ssess the relevance of a speaker's comments. All of the other options - Listen e xclusively for specific facts and statistics. All of the other options answer: Listen exclusively for specific facts and statistics. U08 - Q007 You can become a more effective appreciative listener by setting asid e time for appreciative listening preparing to listen appreciatively welcoming o pportunities to hear something challenging both a and b all of the above - setti ng aside time for appreciative listeningListen exclusively for specific facts an d statistics. - preparing to listen appreciativelyListen exclusively for specifi c facts and statistics. - welcoming opportunities to hear something challengingL isten exclusively for specific facts and statistics. - both a and bListen exclus ively for specific facts and statistics. - all of the aboveListen exclusively fo r specific facts and statistics. answer: all of the above U08 - Q008 Maintenance-oriented members tend to be particularly effective at emp athic and comprehensive listening empathic and analytical listening empathic and appreciative listening comprehensive and analytical listening comprehensive and appreciative listening - empathic and comprehensive listeningall of the above empathic and analytical listeningall of the above - empathic and appreciative l isteningall of the above - comprehensive and analytical listeningall of the abov e - comprehensive and appreciative listeningall of the above answer: empathic and appreciative listening U08 - Q009 What type of listening is most appropriate when you want to accuratel y understand the meaning of group members' spoken and nonverbal messages? compre hensive listening empathic listening analytical listening appreciative listening discriminative listening - comprehensive listeningempathic and appreciative lis tening - empathic listeningempathic and appreciative listening - analytical list eningempathic and appreciative listening - appreciative listeningempathic and ap preciative listening - discriminative listeningempathic and appreciative listeni ng answer: comprehensive listening U08 - Q009 What type of listening is most appropriate when you want to accuratel y understand the meaning of group members' spoken and nonverbal messages? compre hensive listening empathic listening analytical listening appreciative listening discriminative listening - comprehensive listeningcomprehensive listening - emp athic listeningcomprehensive listening - analytical listeningcomprehensive liste ning - appreciative listeningcomprehensive listening - discriminative listeningc omprehensive listening answer: comprehensive listening U08 - Q010 Identify the negative listening attitude that does not follow the Gol

den Listening Rule interested responsible group-centered superior open-minded interestedcomprehensive listening - responsiblecomprehensive listening - group-c enteredcomprehensive listening - superiorcomprehensive listening - open-mindedco mprehensive listening answer: superior U08 - Q012 - M What type of listening is most appropriate when you want to under stand and identify a person's feelings or motives? comprehensive listening empat hic listening analytical listening appreciative listening discriminative listeni ng - comprehensive listeningsuperior - empathic listeningsuperior - analytical l isteningsuperior - appreciative listeningsuperior - discriminative listeningsupe rior answer: empathic listening U08 - Q013 Studies have found that listening occupies _______________ of a colle ge student's communicating time. less than 10% less than 30% more than 50% more than 70% about 95% - less than 10%empathic listening - less than 30%empathic lis tening - more than 50%empathic listening - more than 70%empathic listening - abo ut 95%empathic listening answer: more than 50% U08 - Q014 Differences in personality types may affect the way group members lis ten. Which of the Myers-Briggs personality types may be the best comprehensive l isteners in a group? Introverts Extroverts Feelers Judgers all of the others. Introvertsmore than 50% - Extrovertsmore than 50% - Feelersmore than 50% - Judge rsmore than 50% - all of the others.more than 50% answer: Introverts U08 - Q015 All of the following answers describe the strong link between listeni ng skills and successful leadership EXCEPT Leaders make sure all members compreh end what is said to avoid misunderstandings. Leaders intervene at the slightest hint of hostility to defuse destructive conflict. Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen L eaders ask members what they think and feel rather than guessing what is on thei r minds Leaders do not fake attention - Leaders make sure all members comprehend what is said to avoid misunderstandings.Introverts - Leaders intervene at the s lightest hint of hostility to defuse destructive conflict.Introverts - Leaders i nterrupt members who talk too much to ensure that everyone gets an equal chance to speak and listenIntroverts - Leaders ask members what they think and feel rat her than guessing what is on their mindsIntroverts - Leaders do not fake attenti onIntroverts answer: Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen U08 - Q017 Your textbook describes the dilemma students face when taking notes d uring a discussion or in the classroom. Which of the following statements best d escribes this dilemma? Most of us listen at only 25% efficiency The value of not es decreases as the volume of your notes increase. We are not flexible notetaker s A meeting's minutes or an instructor's handouts are better than the notes take n by a listener Effective notetakers take notes in outline form - Most of us lis ten at only 25% efficiencyLeaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen - The value of notes decr eases as the volume of your notes increase.Leaders interrupt members who talk to o much to ensure that everyone gets an equal chance to speak and listen - We are not flexible notetakersLeaders interrupt members who talk too much to ensure th at everyone gets an equal chance to speak and listen - A meeting's minutes or an instructor's handouts are better than the notes taken by a listenerLeaders inte rrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen - Effective notetakers take notes in outline formLeaders interr upt members who talk too much to ensure that everyone gets an equal chance to sp eak and listen answer: The value of notes decreases as the volume of your notes increase. U08 - Q018 All of the following answers describe the strong link between listeni ng skills and successful leadership EXCEPT Leaders make sure all members compreh end what is said to avoid misunderstandings. Leaders intervene at the slightest

hint of hostility to defuse destructive conflict Leaders interrupt members who t alk too much to ensure that everyone gets an equal chance to speak and listen Le aders ask members what they think and feel rather than guessing what is on their minds Leaders do not fake attention. - Leaders make sure all members comprehend what is said to avoid misunderstandings.The value of notes decreases as the vol ume of your notes increase. - Leaders intervene at the slightest hint of hostili ty to defuse destructive conflictThe value of notes decreases as the volume of y our notes increase. - Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listenThe value of notes decreases a s the volume of your notes increase. - Leaders ask members what they think and f eel rather than guessing what is on their mindsThe value of notes decreases as t he volume of your notes increase. - Leaders do not fake attention.The value of n otes decreases as the volume of your notes increase. answer: Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen U08 - Q019 Studies have found that listening occupies ____of a college student's communicating time. less than 10% less than 30% more than 50% more than 70% abo ut 95% - less than 10%Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen - less than 30%Leaders interr upt members who talk too much to ensure that everyone gets an equal chance to sp eak and listen - more than 50%Leaders interrupt members who talk too much to ens ure that everyone gets an equal chance to speak and listen - more than 70%Leader s interrupt members who talk too much to ensure that everyone gets an equal chan ce to speak and listen - about 95%Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen answer: more than 50% U08 - Q020 Stephen Covey, author of The 7 Habits of High Effective People, uses listening to illustrate the 3 components of an effective habit. According to Cov ey, which of the following answers is a critical component of an effective liste ning habit? hearing desire opportunity memory empathy - hearingmore than 50% - d esiremore than 50% - opportunitymore than 50% - memorymore than 50% - empathymor e than 50% answer: desire U09 - Q006 When a member searches for new solutions that will achieve both the i ndividual goals of group members and the group goals, what conflict style is the member using? competition Avoidance Collaboration Accommodation Compromise - co mpetition desire - Avoidance desire - Collaboration desire - Accommodation desir e - Compromise desire answer: Collaboration U09 - Q.006 - M You can help promote constructive conflict by abiding by all of the following principles EXCEPT Disagreement does not result in punishment. Memb ers encourage tough competition among one another in order to make the best deci sions. Members will work with one another to achieve mutually satisfying resolut ion of conflicts Lower-status members are free to disagree with higher-status me mbers. the group has an agreed-upon approach for conflict resolution and decisio n making. - Disagreement does not result in punishment. Collaboration - Members encourage tough competition among one another in order to make the best decision s.Collaboration - Members will work with one another to achieve mutually satisfy ing resolution of conflicts Collaboration - Lower-status members are free to dis agree with higher-status members. Collaboration - the group has an agreed-upon a pproach for conflict resolution and decision making. Collaboration answer: Members encourage tough competition among one another in order to make t he best decisions. U09 - Q.008 - M When a member is more concerned with his or her own goals than m eeting the needs of the group, which conflict style is the member using? accommo dation collaboration competition avoidance compromise - accommodation Members en courage tough competition among one another in order to make the best decisions. - collaboration Members encourage tough competition among one another in order to make the best decisions. - competition Members encourage tough competition am ong one another in order to make the best decisions. - avoidance Members encoura

ge tough competition among one another in order to make the best decisions. - co mpromise Members encourage tough competition among one another in order to make the best decisions. answer: competition U09 - Q.014 - M When a member gives in to others at the expense of his or her ow n goals, what conflict style is the member using? collaboration compromise avoid ance accommodation competition - collaboration competition - compromise competit ion - avoidance competition - accommodation competition - competition competitio n answer: accommodation U09 - Q.016 - M When a member concedes some goals in order to achieve others, wh at conflict style is the member using? compromise collaboration avoidance accomm odation competition - compromise accommodation - collaborationaccommodation - av oidance accommodation - accommodationaccommodation - competition accommodation answer: compromise U09 - Q.018 - M Which dialectic tension is represented in the 5 traditional conf lict styles: accommodation, avoidance, collaboration, competition, and compromis e? reward punish reliance on emotions reliance on reasoning and logic homogeneou s heterogeneous concern for personal goals Concern for group goals open system c losed system - reward punish compromise - reliance on emotions reliance on reaso ning and logic compromise - homogeneous heterogeneous compromise - concern for p ersonal goals Concern for group goals compromise - open system closed system com promise answer: concern for personal goals Concern for group goals U09 - Q.024 - M Which method of conflict resolution employs the services of an i mpartial third party for the purpose of guiding, coaching, and encouraging the d isputants toward agreement? arbitration mediation negotiation the 4Rs Method the A-E-I-O-U Model - arbitration concern for personal goals Concern for group goal s - mediation concern for personal goals Concern for group goals - negotiation c oncern for personal goals Concern for group goals - the 4Rs Method concern for p ersonal goals Concern for group goals - the A-E-I-O-U Model concern for personal goals Concern for group goals answer: mediation U09 - Q.028 - M All of the following behaviors are more characteristic of the wa ys in which women respond to conflict EXCEPT Women are more likely to leave a gr oup that experiences continuous conflict. Women are more likely to focus on subs tantive issues than men. Women are more likely to address conflict privately rat her than in front of the entire group. Women tend to cooperate more than men und er ideal conditions. Women are more likely to avoid conflict than men are. - Wom en are more likely to leave a group that experiences continuous conflict. mediat ion - Women are more likely to focus on substantive issues than men. mediation Women are more likely to address conflict privately rather than in front of the entire group.mediation - Women tend to cooperate more than men under ideal cond itions. mediation - Women are more likely to avoid conflict than men are. mediat ion answer: Women are more likely to address conflict privately rather than in front of the entire group. U09 - Q.030 - M Which of the following statements is characteristic of a cohesiv e group? Members interact with each other less. Members make a lot of negative s tatements about the group. Members want to conform to group expectations. The gr oup lacks creativity. none of the above - Members interact with each other less. Women are more likely to address conflict privately rather than in front of the entire group. - Members make a lot of negative statements about the group. Wome n are more likely to address conflict privately rather than in front of the enti re group. - Members want to conform to group expectations. Women are more likely to address conflict privately rather than in front of the entire group. - The g roup lacks creativity. Women are more likely to address conflict privately rathe r than in front of the entire group. - none of the above Women are more likely t o address conflict privately rather than in front of the entire group. answer: Members want to conform to group expectations.

U09 - Q001 Only fools think like that is an example of Substantive conflict Affect ive Conflict Procedural Conflict Substantive and Affective Conflict - Substantiv e conflict Members want to conform to group expectations. - Affective Conflict M embers want to conform to group expectations. - Procedural Conflict Members want to conform to group expectations. - Substantive and Affective Conflict Members want to conform to group expectations. answer: Substantive and Affective Conflict U09 - Q002 Constructive conflicts have such features as Focus on issues Respect others Cooperation Flexibility All of the other options - Focus on issues Substa ntive and Affective Conflict - Respect others Substantive and Affective Conflict - Cooperation Substantive and Affective Conflict - Flexibility Substantive and Affective Conflict - All of the other options Substantive and Affective Conflict answer: All of the other options U09 - Q003 Sometimes the end justifies the means is an examples of which feature i n Groupthink ? Invulnerability Morality Mindguarding Self-censorship - Invulnera bility All of the other options - Morality All of the other options - Mindguardi ng All of the other options - Self-censorship All of the other options answer: Morality U09 - Q004 To prevent Groupthink, we should Ask each member to serve in the role of critical evaluator Discuss the groups progress with someone outside the group . Periodically invite an expert to join the groups meeting Follow a formal decisi on-making procedure Do All of the other options - Ask each member to serve in th e role of critical evaluator Morality - Discuss the groups progress with someone outside the group. Morality - Periodically invite an expert to join the groups me eting Morality - Follow a formal decision-making procedure Morality - Do All of the other options Morality answer: Do All of the other options U09 - Q005 Which of the following statements characterizes constructive conflict ? Members focus on the issues. Members' contributions are devalued. Members prot ect and defend their own ideas. Members avoid conflict Members resist change and try to maintain traditional procedures. - Members focus on the issues. Do All o f the other options - Members' contributions are devalued. Do All of the other o ptions - Members protect and defend their own ideas. Do All of the other options - Members avoid conflict Do All of the other options - Members resist change an d try to maintain traditional procedures. Do All of the other options answer: Members focus on the issues. U09 - Q007 Which of the following conflict management methods is expressed as "W e should express our concerns about the conflict and suggest a solution"? Arbitr ation Mediation Negotiation the 4Rs Method the A-E-I-O-U Model - Arbitration Mem bers focus on the issues. - Mediation Members focus on the issues. - Negotiation Members focus on the issues. - the 4Rs Method Members focus on the issues. - th e A-E-I-O-U Model Members focus on the issues. answer: the A-E-I-O-U Model U09 - Q008 - M When a member is more concerned with his or her own goals than me eting the needs of the group, which conflict style is the member using? accommod ation collaboration competition avoidance compromise - accommodationthe A-E-I-OU Model - collaborationthe A-E-I-O-U Model - competitionthe A-E-I-O-U Model - av oidancethe A-E-I-O-U Model - compromisethe A-E-I-O-U Model answer: competition U09 - Q008 - M When a member is more concerned with his or her own goals than me eting the needs of the group, which conflict style is the member using? accommod ation Collaboration Competition Avoidance Compromise - accommodationcompetition - Collaborationcompetition - Competitioncompetition - Avoidancecompetition - Com promisecompetition answer: Competition U09 - Q009 Which dialectic tension is represented in the 5 traditional conflict styles: accommodation, avoidance, collaboration, competition, and compromise? re ward punish reliance on emotions reliance on reasoning and logic homogeneous het erogeneous concern for personal goals Concern for group goals open system closed

system - reward punishCompetition - reliance on emotions reliance on reasoning and logicCompetition - homogeneous heterogeneousCompetition - concern for person al goals Concern for group goalsCompetition - open system closed systemCompetiti on answer: concern for personal goals Concern for group goals U09 - Q010 Which method of conflict resolution employs the services of an impart ial third party for the purpose of guiding, coaching, and encouraging the disput ants toward agreement? arbitration mediation negotiation the 4Rs Method the A-EI-O-U Model - arbitrationconcern for personal goals Concern for group goals - me diationconcern for personal goals Concern for group goals - negotiationconcern f or personal goals Concern for group goals - the 4Rs Methodconcern for personal g oals Concern for group goals - the A-E-I-O-U Modelconcern for personal goals Con cern for group goals answer: mediation U09 - Q011 All of the following answers are characteristic of groupthink EXCEPT overconfidence discounting of warnings stereotyping of outsiders mindguarding cr itically evaluating options - overconfidencemediation - discounting of warningsm ediation - stereotyping of outsidersmediation - mindguardingmediation - critical ly evaluating optionsmediation answer: critically evaluating options U09 - Q012 "Which of the following statements is characteristic of a cohesive gr oup? Members interact with each other less. Members make a lot of negative state ments about the group Members want to conform to group expectations The group la cks creativity none of the above - Members interact with each other less.critica lly evaluating options - Members make a lot of negative statements about the gro upcritically evaluating options - Members want to conform to group expectationsc ritically evaluating options - The group lacks creativitycritically evaluating o ptions - none of the abovecritically evaluating options answer: Members want to conform to group expectations U09 - Q014 Which of the following statements is characteristic of a cohesive gro up? Members interact with each other less Members make a lot of negative stateme nts about the group Members want to conform to group expectations The group lack s creativity. None of the others. - Members interact with each other lessMembers want to conform to group expectations - Members make a lot of negative statemen ts about the groupMembers want to conform to group expectations - Members want t o conform to group expectationsMembers want to conform to group expectations - T he group lacks creativity.Members want to conform to group expectations - None o f the others.Members want to conform to group expectations answer: Members want to conform to group expectations U09 - Q014 - M "When a member gives in to others at the expense of his or her ow n goals, what conflict style is the member using? collaboration Compromise Avoid ance Accommodation Competition - collaborationMembers want to conform to group e xpectations - CompromiseMembers want to conform to group expectations - Avoidanc eMembers want to conform to group expectations - AccommodationMembers want to co nform to group expectations - CompetitionMembers want to conform to group expect ations answer: Accommodation U09 - Q015 What do the 4Rs stand for in the 4Rs Method of Analyzing a Conflict? React, Reply, Reason, Reprimand Recognize, Reflect, Reconsider, Relate Reasons, Reactions, Results, Resolution Resources, Repetitions, Readiness, and Resolution Recognize, Reflect, Reconsider, Reject - React, Reply, Reason, ReprimandAccommo dation - Recognize, Reflect, Reconsider, RelateAccommodation - Reasons, Reaction s, Results, ResolutionAccommodation - Resources, Repetitions, Readiness, and Res olutionAccommodation - Recognize, Reflect, Reconsider, RejectAccommodation answer: Reasons, Reactions, Results, Resolution U09 - Q017 All of the following behaviors are more characteristic of the ways in which women respond to conflict EXCEPT Women are more likely to leave a group t hat experiences continuous conflict. Women are more likely to focus on substanti ve issues than men Women are more likely to address conflict privately rather th an in front of the entire group. Women tend to cooperate more than men under ide

al conditions Women are more likely to avoid conflict than men are - Women are m ore likely to leave a group that experiences continuous conflict.Reasons, Reacti ons, Results, Resolution - Women are more likely to focus on substantive issues than menReasons, Reactions, Results, Resolution - Women are more likely to addre ss conflict privately rather than in front of the entire group.Reasons, Reaction s, Results, Resolution - Women tend to cooperate more than men under ideal condi tionsReasons, Reactions, Results, Resolution - Women are more likely to avoid co nflict than men areReasons, Reactions, Results, Resolution answer: Women are more likely to address conflict privately rather than in front of the entire group. U09 - Q018 Which of the following is NOT part of the 4R method of Conflict Manag ement? Reasons Reactions Results Reinterpretation Resolution - ReasonsWomen are more likely to address conflict privately rather than in front of the entire gro up. - ReactionsWomen are more likely to address conflict privately rather than i n front of the entire group. - ResultsWomen are more likely to address conflict privately rather than in front of the entire group. - ReinterpretationWomen are more likely to address conflict privately rather than in front of the entire gro up. - ResolutionWomen are more likely to address conflict privately rather than in front of the entire group. answer: Reinterpretation U09 - Q019 The members of a civic association committee charged with addressing safety issues in the community disagree over whether to begin by surveying resid ents about their safety concerns or to start by consulting local law enforcement for safety suggestions. What type of conflict is the group experiencing? affect ive collaborative substantive competitive procedural - affectiveReinterpretation - collaborativeReinterpretation - substantiveReinterpretation - competitiveRein terpretation - proceduralReinterpretation answer: procedural U09 - Q020 Attribution Theory is useful in explaining the sources of group confl ict. All of the following answers are examples of how attributions can prompt an ger among group members EXCEPT What other members do seems abnormal What other m embers do seems unfair What other members do seems to constrain what I want to d o What other members do seems intended to harm me or others What other members d o seems to reflect member needs - What other members do seems abnormalprocedural - What other members do seems unfairprocedural - What other members do seems to constrain what I want to doprocedural - What other members do seems intended to harm me or othersprocedural - What other members do seems to reflect member nee dsprocedural answer: What other members do seems to reflect member needs U10 - Q.002 - M All of the following statements describe decision making in grou ps EXCEPT Groups usually take less time to make a decision than an individual wo rking alone. A group generates more ideas than an individual working alone. Grou ps generally produce better decisions than individuals. all of the above none of the above - Groups usually take less time to make a decision than an individual working alone. What other members do seems to reflect member needs - A group ge nerates more ideas than an individual working alone. What other members do seems to reflect member needs - Groups generally produce better decisions than indivi duals. What other members do seems to reflect member needs - all of the above Wh at other members do seems to reflect member needs - none of the above What other members do seems to reflect member needs answer: Groups usually take less time to make a decision than an individual work ing alone. U10 - Q.006 - M What are the signs of a false consensus? Every group member agre es to support a decision or action. In order to avoid disagreement and conflict, group members agree on a common decision. In order to achieve consensus, all gr oup members take part in shaping a decision. A decision is made that avoids a wi n/loss vote. Consensus presents a united front to outsiders. - Every group membe r agrees to support a decision or action.Groups usually take less time to make a decision than an individual working alone. - In order to avoid disagreement and conflict, group members agree on a common decision. Groups usually take less ti

me to make a decision than an individual working alone. - In order to achieve co nsensus, all group members take part in shaping a decision. Groups usually take less time to make a decision than an individual working alone. - A decision is m ade that avoids a win/loss vote.Groups usually take less time to make a decision than an individual working alone. - Consensus presents a united front to outsid ers. Groups usually take less time to make a decision than an individual working alone. answer: In order to avoid disagreement and conflict, group members agree on a co mmon decision. U10 - Q.010 - M "Is it appropriate for parents to bring their children to work w hen they can't get a babysitter or their daycare center closes for a day?" This group discussion question represents a question of policy. procedure. fact. conj ecture. value. - policy. In order to avoid disagreement and conflict, group memb ers agree on a common decision. - procedure.In order to avoid disagreement and c onflict, group members agree on a common decision. - fact. In order to avoid dis agreement and conflict, group members agree on a common decision. - conjecture. In order to avoid disagreement and conflict, group members agree on a common dec ision. - value.In order to avoid disagreement and conflict, group members agree on a common decision. answer: value. U10 - Q.020 - M The first 3 steps in the Standard Agenda format of group problem solving are problem identification, fact finding, solution evaluation and selec tion. problem identification, task clarification, solution implementation. task clarification, problem identification, fact finding. fact finding, problem ident ification, task clarification. fact finding, solution criteria, solution selecti on. - problem identification, fact finding, solution evaluation and selection. v alue. - problem identification, task clarification, solution implementation.valu e. - task clarification, problem identification, fact finding. value. - fact fin ding, problem identification, task clarification. value. - fact finding, solutio n criteria, solution selection. value. answer: task clarification, problem identification, fact finding. U10 - Q.026 - M All of the following answers represent basic stages in the devel opment of group creativity EXCEPT investigation. imagination. interpretation. in cubation. insight. - investigation. task clarification, problem identification, fact finding. - imagination. task clarification, problem identification, fact fi nding. - interpretation. task clarification, problem identification, fact findin g. - incubation. task clarification, problem identification, fact finding. - ins ight. task clarification, problem identification, fact finding. answer: interpretation. U10 - Q.028 - M All of the following are considered guidelines for effective bra instorming EXCEPT Evaluate ideas only at the end. Post the ideas for all to see. Wait awhile for group members to think before starting the brainstorming. Avoid combining ideas. Do not praise other members' ideas as they're suggested. - Eva luate ideas only at the end. interpretation. - Post the ideas for all to see. in terpretation. - Wait awhile for group members to think before starting the brain storming. interpretation. - Avoid combining ideas. interpretation. - Do not prai se other members' ideas as they're suggested. interpretation. answer: Avoid combining ideas. U10 - Q.032 - M Consider using the Decreasing Options Technique (DOT) when the g roup is small, with no more than 7 members. members cannot generate many ideas o r solutions. the group wants to hear from expert and influential members. the gr oup wants to ensure equal opportunities for input by all members. the group has plenty of time to discuss multiple or controversial ideas. - the group is small, with no more than 7 members. Avoid combining ideas. - members cannot generate m any ideas or solutions. Avoid combining ideas. - the group wants to hear from ex pert and influential members. Avoid combining ideas. - the group wants to ensure equal opportunities for input by all members. Avoid combining ideas. - the grou p has plenty of time to discuss multiple or controversial ideas. Avoid combining ideas. answer: the group wants to ensure equal opportunities for input by all members.

U10 - Q.036 - M One of the reasons groups are often reluctant to think creativel y is that they have preconceived notions about what can and can't be done. In su ch cases, your group may want to try the _____________ method of enhancing creat ivity. control judgment ask "what if?" encourage innovation use metaphors use im itation - control judgment the group wants to ensure equal opportunities for inp ut by all members. - ask "what if?" the group wants to ensure equal opportunitie s for input by all members. - encourage innovation the group wants to ensure equ al opportunities for input by all members. - use metaphors the group wants to en sure equal opportunities for input by all members. - use imitation the group wan ts to ensure equal opportunities for input by all members. answer: ask "what if?" U10 - Q001 Problem-solving has such features as Analyze the problem Develop opti ons Debate pros and cons Select and implement a solution All of the other option s - Analyze the problem ask "what if?" - Develop options ask "what if?" - Debate pros and cons ask "what if?" - Select and implement a solution ask "what if?" All of the other options ask "what if?" answer: All of the other options U10 - Q002 Voting works best when There is no other way to break a deadlock A gr oup has plenty of time The issue is highly controversial The groups is small eno ugh to be managed - There is no other way to break a deadlock All of the other o ptions - A group has plenty of time All of the other options - The issue is high ly controversial All of the other options - The groups is small enough to be man aged All of the other options answer: There is no other way to break a deadlock U10 - Q003 The correct order to carry out DOT (Decreasing Options Techniques) is : Generate, Post, Sort and Dot the ideas Post, Sort, Dot and Generate the ideas Sort, Dot, Generate and Post the ideas Dot, Generate, Post and Sort the ideas Generate, Post, Sort and Dot the ideas There is no other way to break a deadlock - Post, Sort, Dot and Generate the ideas There is no other way to break a deadl ock - Sort, Dot, Generate and Post the ideas There is no other way to break a de adlock - Dot, Generate, Post and Sort the ideas There is no other way to break a deadlock answer: Generate, Post, Sort and Dot the ideas U10 - Q004 What should be done to enhance Group Creativity ? Control judgment En courage innovation Ask what if Use metaphors Do ALL of the other options - Control judgment Generate, Post, Sort and Dot the ideas - Encourage innovation Generate , Post, Sort and Dot the ideas - Ask what if Generate, Post, Sort and Dot the idea s - Use metaphors Generate, Post, Sort and Dot the ideas - Do ALL of the other o ptions Generate, Post, Sort and Dot the ideas answer: Do ALL of the other options U10 - Q005 Which of the following characteristics makes the Single Question Form at different compared to the Standard Agenda? It focuses on decision making and creativity. It focuses on the competent performance of each problem-solving phas e. It focuses on task clarification solution implementation It focuses on goal c larity and cultivating a supportive communication climate. It focuses on seeking consensus and avoiding false consensus. - It focuses on decision making and cre ativity. Do ALL of the other options - It focuses on the competent performance o f each problem-solving phase. Do ALL of the other options - It focuses on task c larification solution implementation Do ALL of the other options - It focuses on goal clarity and cultivating a supportive communication climate. Do ALL of the other options - It focuses on seeking consensus and avoiding false consensus. Do ALL of the other options answer: It focuses on goal clarity and cultivating a supportive communication cl imate. U10 - Q006 _______________ was developed by Delbecq and Van de Ven as a way of m aximizing participation in problem-solving and program-planning groups while min imizing some of the interpersonal problems associated with group interaction. Th e Standard Agenda Brainstorming The DOT Method Nominal Group Technique Single Qu estion Format - The Standard Agenda It focuses on goal clarity and cultivating a supportive communication climate. - Brainstorming It focuses on goal clarity an

d cultivating a supportive communication climate. - The DOT Method It focuses on goal clarity and cultivating a supportive communication climate. - Nominal Grou p Technique It focuses on goal clarity and cultivating a supportive communicatio n climate. - Single Question Format It focuses on goal clarity and cultivating a supportive communication climate. answer: Nominal Group Technique U10 - Q007 The major advantage and reason for using the DOT method is that it fo cuses on preparation, competence, and communication functions. requires members to analyze questions of fact, value, conjecture, and policy. helps reduce and re fine a large number of suggestions into a manageable number of ideas. relies on the creativity of all members. helps avoid negative evaluation and criticism of ideas and solutions. - focuses on preparation, competence, and communication fun ctions. Nominal Group Technique - requires members to analyze questions of fact, value, conjecture, and policy. Nominal Group Technique - helps reduce and refin e a large number of suggestions into a manageable number of ideas. Nominal Group Technique - relies on the creativity of all members. Nominal Group Technique helps avoid negative evaluation and criticism of ideas and solutions. Nominal Gr oup Technique answer: helps reduce and refine a large number of suggestions into a manageable number of ideas. U10 - Q008 The first 3 steps in the Standard Agenda format of group problem solv ing are problem identification, fact finding, solution evaluation and selection problem identification, task clarification, solution implementation task clarifi cation, problem identification, fact finding fact finding, problem identificatio n, task clarification fact finding, solution criteria, solution selection - prob lem identification, fact finding, solution evaluation and selectionhelps reduce and refine a large number of suggestions into a manageable number of ideas. - pr oblem identification, task clarification, solution implementationhelps reduce an d refine a large number of suggestions into a manageable number of ideas. - task clarification, problem identification, fact findinghelps reduce and refine a la rge number of suggestions into a manageable number of ideas. - fact finding, pro blem identification, task clarificationhelps reduce and refine a large number of suggestions into a manageable number of ideas. - fact finding, solution criteri a, solution selectionhelps reduce and refine a large number of suggestions into a manageable number of ideas. answer: task clarification, problem identification, fact finding U10 - Q009 All of the following are considered guidelines for effective brainsto rming EXCEPT Evaluate ideas only at the end Post the ideas for all to see Wait a while for group members to think before starting the brainstorming Avoid combini ng ideas Do not praise other members' ideas as they're suggested - Evaluate idea s only at the endtask clarification, problem identification, fact finding - Post the ideas for all to seetask clarification, problem identification, fact findin g - Wait awhile for group members to think before starting the brainstormingtask clarification, problem identification, fact finding - Avoid combining ideastask clarification, problem identification, fact finding - Do not praise other membe rs' ideas as they're suggestedtask clarification, problem identification, fact f inding answer: Avoid combining ideas U10 - Q010 Consider using the Decreasing Options Technique (DOT) when members ca nnot generate many ideas or solutions the group is small, with no more than 7 me mbers. the group wants to hear from expert and influential members the group wan ts to ensure equal opportunities for input by all members the group has plenty o f time to discuss multiple or controversial ideas - members cannot generate many ideas or solutionsAvoid combining ideas - the group is small, with no more than 7 members.Avoid combining ideas - the group wants to hear from expert and influ ential membersAvoid combining ideas - the group wants to ensure equal opportunit ies for input by all membersAvoid combining ideas - the group has plenty of time to discuss multiple or controversial ideasAvoid combining ideas answer: the group wants to ensure equal opportunities for input by all members U10 - Q011 Which is the correct order of the four steps in the Decreasing Option

s Technique? generate ideas, post ideas, sort ideas, dot ideas dot ideas, sort i deas, post ideas, generate ideas generate ideas, post ideas, dot ideas, sort ide as post ideas, generate ideas, dot ideas, sort ideas post ideas, generate ideas, sort ideas, dot ideas - generate ideas, post ideas, sort ideas, dot ideasthe gr oup wants to ensure equal opportunities for input by all members - dot ideas, so rt ideas, post ideas, generate ideasthe group wants to ensure equal opportunitie s for input by all members - generate ideas, post ideas, dot ideas, sort ideasth e group wants to ensure equal opportunities for input by all members - post idea s, generate ideas, dot ideas, sort ideasthe group wants to ensure equal opportun ities for input by all members - post ideas, generate ideas, sort ideas, dot ide asthe group wants to ensure equal opportunities for input by all members answer: generate ideas, post ideas, sort ideas, dot ideas U10 - Q012 All of the following are considered guidelines for effective brainsto rming EXCEPT Evaluate ideas only at the end. Post the ideas for all to see. Wait awhile for group members to think before starting the brainstorming Avoid combi ning ideas Do not praise other members' ideas as they're suggested - Evaluate id eas only at the end.generate ideas, post ideas, sort ideas, dot ideas - Post the ideas for all to see.generate ideas, post ideas, sort ideas, dot ideas - Wait a while for group members to think before starting the brainstorminggenerate ideas , post ideas, sort ideas, dot ideas - Avoid combining ideasgenerate ideas, post ideas, sort ideas, dot ideas - Do not praise other members' ideas as they're sug gestedgenerate ideas, post ideas, sort ideas, dot ideas answer: Avoid combining ideas U10 - Q013 In their book, Decision Making Styles, Suzanne Scott and Reginald Bru ce look at 5 decision-making styles. Group members who say "It just feels like t he right thing to do" are most likely using the __________ decision-making style . rational Intuitive Dependent Avoidant Spontaneous - rationalAvoid combining id eas - IntuitiveAvoid combining ideas - DependentAvoid combining ideas - Avoidant Avoid combining ideas - SpontaneousAvoid combining ideas answer: Intuitive U10 - Q014 Which of the following problem-solving procedures is based on John De wey's Reflective Thinking Process? the Standard Agenda the Single Question Forma t Nominal Group Technique Brainstorming Functional Theory - the Standard AgendaI ntuitive - the Single Question FormatIntuitive - Nominal Group TechniqueIntuitiv e - BrainstormingIntuitive - Functional TheoryIntuitive answer: the Standard Agenda U10 - Q015 During Phase 1 (Idea Generation) of Nominal Group Technique, members explain their support or nonsupport for each item. members, in turn, present one idea from their privately written list members discuss the merits of each idea before voting occurs members vote by ranking or rating ideas privately and in wr iting the group decision is the mathematically pooled outcome of members' indivi dual votes. - members explain their support or nonsupport for each item.the Stan dard Agenda - members, in turn, present one idea from their privately written li stthe Standard Agenda - members discuss the merits of each idea before voting oc cursthe Standard Agenda - members vote by ranking or rating ideas privately and in writingthe Standard Agenda - the group decision is the mathematically pooled outcome of members' individual votes.the Standard Agenda answer: members, in turn, present one idea from their privately written list U10 - Q016 One of the reasons groups are often reluctant to think creatively is that they have preconceived notions about what can and can't be done. In such ca ses, your group may want to try the method of enhancing creativity. control judg ment ask "what if?" encourage innovation use metaphors use imitation - control j udgmentmembers, in turn, present one idea from their privately written list - as k "what if?"members, in turn, present one idea from their privately written list - encourage innovationmembers, in turn, present one idea from their privately w ritten list - use metaphorsmembers, in turn, present one idea from their private ly written list - use imitationmembers, in turn, present one idea from their pri vately written list answer: ask "what if?" U10 - Q017 During Phase 1 (Idea Generation) of Nominal Group Technique, members

explain their support or nonsupport for each item. members, in turn, present one idea from their privately written list members discuss the merits of each idea before voting occurs. members vote by ranking or rating ideas privately and in w riting the group decision is the mathematically pooled outcome of members' indiv idual votes - members explain their support or nonsupport for each item.ask "wha t if?" - members, in turn, present one idea from their privately written listask "what if?" - members discuss the merits of each idea before voting occurs.ask " what if?" - members vote by ranking or rating ideas privately and in writingask "what if?" - the group decision is the mathematically pooled outcome of members' individual votesask "what if?" answer: members, in turn, present one idea from their privately written list U10 - Q018 first 3 steps in the Single Question Format for problem solving are a nalyze the issues, identify the problem, identify possible solutions. identify t he problem, create a collaborative setting, analyze the issues. create a collabo rative setting, analyze the issues, identify the problem. analyze the issues, id entify possible solutions, answer the single questions. task clarification, fact finding, solution selection. - analyze the issues, identify the problem, identi fy possible solutions.members, in turn, present one idea from their privately wr itten list - identify the problem, create a collaborative setting, analyze the i ssues.members, in turn, present one idea from their privately written list - cre ate a collaborative setting, analyze the issues, identify the problem.members, i n turn, present one idea from their privately written list - analyze the issues, identify possible solutions, answer the single questions.members, in turn, pres ent one idea from their privately written list - task clarification, fact findin g, solution selection.members, in turn, present one idea from their privately wr itten list answer: identify the problem, create a collaborative setting, analyze the issues . U10 - Q019 All of the following statements describe decision making in groups EX CEPT Groups usually take less time to make a decision than an individual working alone A group generates more ideas than an individual working alone. Groups gen erally produce better decisions than individuals all of the above none of the ab ove - Groups usually take less time to make a decision than an individual workin g aloneidentify the problem, create a collaborative setting, analyze the issues. - A group generates more ideas than an individual working alone.identify the pr oblem, create a collaborative setting, analyze the issues. - Groups generally pr oduce better decisions than individualsidentify the problem, create a collaborat ive setting, analyze the issues. - all of the aboveidentify the problem, create a collaborative setting, analyze the issues. - none of the aboveidentify the pro blem, create a collaborative setting, analyze the issues. answer: Groups usually take less time to make a decision than an individual work ing alone U10 - Q020 A company's recycling task force is composed of 15 members. If the ta sk force makes decisions based on a consensus, how many members must be in favor of the group decision? 5 7 8 10 15 - 5Groups usually take less time to make a d ecision than an individual working alone - 7Groups usually take less time to mak e a decision than an individual working alone - 8Groups usually take less time t o make a decision than an individual working alone - 10Groups usually take less time to make a decision than an individual working alone - 15Groups usually take less time to make a decision than an individual working alone answer: 15 U11 - Q.002 - M An argument is the thinking we use to analyze what we read, see, and hear in order to arrive at a justified conclusion. the way in which we use critical thinking to advocate proposals, examine competing ideas, and influence one another. a hostile confrontation between two or more people. a form of debat ing in which a judge makes the final decision. a claim supported by evidence and reasons for accepting it. - the thinking we use to analyze what we read, see, a nd hear in order to arrive at a justified conclusion. 15 - the way in which we u se critical thinking to advocate proposals, examine competing ideas, and influen ce one another. 15 - a hostile confrontation between two or more people. 15 - a

form of debating in which a judge makes the final decision. 15 - a claim support ed by evidence and reasons for accepting it. 15 answer: a claim supported by evidence and reasons for accepting it. U11 - Q.006 - M Which of the following statements best describes a highly argume ntative group member? The member is not confrontational. The member has less inf luence in group decision making. The member is less likely to be persuaded by ot hers. The member is less likely to be chosen as the group leader. all of the abo ve - The member is not confrontational. a claim supported by evidence and reason s for accepting it. - The member has less influence in group decision making. a claim supported by evidence and reasons for accepting it. - The member is less l ikely to be persuaded by others. a claim supported by evidence and reasons for a ccepting it. - The member is less likely to be chosen as the group leader. a cla im supported by evidence and reasons for accepting it. - all of the above a clai m supported by evidence and reasons for accepting it. answer: The member is less likely to be persuaded by others. U11 - Q.012 - M Which component of the Toulmin Model of Argument is indicated by words in a claim such as "likely," "possibly," or "probably"? reservation evide nce data qualifier warrant - reservation The member is less likely to be persuad ed by others. - evidence The member is less likely to be persuaded by others. data The member is less likely to be persuaded by others. - qualifier The member is less likely to be persuaded by others. - warrant The member is less likely t o be persuaded by others. answer: qualifier U11 - Q.018 - M "Horsepower is a unit for measuring the power of engines roughly equal to 746 watts or 33,000 foot-pounds per minute. " What type of evidence is used in this example? example definition illustration opinion statistic - examp le qualifier - definition qualifier - illustration qualifier - opinion qualifier - statistic qualifier answer: definition U11 - Q.024 - M "Sex education in schools promotes teenage promiscuity." This st atement is an example of a claim of fact. conjecture. value. policy. fiction - f act. definition - conjecture.definition - value.definition - policy.definition fiction definition answer: fact. U11 - Q.026 - M "Our group is the best in the class." This statement is an examp le of a claim of fact. conjecture. policy. value. fiction. - fact. fact. - conje cture. fact. - policy. fact. - value. fact. - fiction. fact. answer: value. U11 - Q.028 - M The act of proving an argument either erroneous or false, or bot h, is defined as argumentation. refutation. argumentativeness. reasoning. cooper ative argumentation. - argumentation. value. - refutation. value. - argumentativ eness. value. - reasoning. value. - cooperative argumentation. value. answer: refutation. U11 - Q.028 - M The act of proving an argument either erroneous or false, or bot h, is defined as argumentation refutation argumentativeness reasoning cooperativ e argumentation - argumentationrefutation. - refutationrefutation. - argumentati venessrefutation. - reasoningrefutation. - cooperative argumentationrefutation. answer: refutation U11 - Q.042 - M All of the following traits are characteristic of emotional inte lligence EXCEPT empathy. self-awareness. self-regulation. self-confidence. selfassertion. - empathy. refutation - self-awareness. refutation - self-regulation. refutation - self-confidence. refutation - self-assertion. refutation answer: self-assertion. U11 - Q001 Define two values of argumentation in groups. Avoid Groupthink Promot e Critical thinking Resolve affective conflicts Adapt to cultural diversity - Av oid Groupthink self-assertion. - Promote Critical thinking self-assertion. - Res olve affective conflicts self-assertion. - Adapt to cultural diversity self-asse rtion. answer: Avoid Groupthink Promote Critical thinking

U11 - Q002 How did you get there? is a question to define: Claim Evidence Warrant None of the other options - Claim Avoid Groupthink Promote Critical thinking - E vidence Avoid Groupthink Promote Critical thinking - Warrant Avoid Groupthink Pr omote Critical thinking - None of the other options Avoid Groupthink Promote Cri tical thinking answer: Warrant U11 - Q002 - M An argument is the thinking we use to analyze what we read, see, and hear in order to arrive at a justified conclusion. the way in which we use c ritical thinking to advocate proposals, examine competing ideas, and influence o ne another. a hostile confrontation between two or more people a form of debatin g in which a judge makes the final decision. a claim supported by evidence and r easons for accepting it - the thinking we use to analyze what we read, see, and hear in order to arrive at a justified conclusion.Warrant - the way in which we use critical thinking to advocate proposals, examine competing ideas, and influe nce one another.Warrant - a hostile confrontation between two or more peopleWarr ant - a form of debating in which a judge makes the final decision.Warrant - a c laim supported by evidence and reasons for accepting itWarrant answer: a claim supported by evidence and reasons for accepting it U11 - Q003 When refuting arguments, you should Listen to the argument Preview yo ur objections Assess the evidence Assess the reasoning Do ALL of the other optio ns - Listen to the argument a claim supported by evidence and reasons for accept ing it - Preview your objections a claim supported by evidence and reasons for a ccepting it - Assess the evidence a claim supported by evidence and reasons for accepting it - Assess the reasoning a claim supported by evidence and reasons fo r accepting it - Do ALL of the other options a claim supported by evidence and r easons for accepting it answer: Do ALL of the other options U11 - Q004 Define two ethical argumentation Research responsibility Social code responsibility Power responsibility Validity of evidence - Research responsibili ty Do ALL of the other options - Social code responsibility Do ALL of the other options - Power responsibility Do ALL of the other options - Validity of evidenc e Do ALL of the other options answer: Research responsibility Social code responsibility U11 - Q005 Which of the following answers is an example of the kind of evidence you could use in an argument? facts and opinions definitions and descriptions ex amples and illustrations Statistics all of the others. - facts and opinions Rese arch responsibility Social code responsibility - definitions and descriptions Re search responsibility Social code responsibility - examples and illustrations Re search responsibility Social code responsibility - Statistics Research responsib ility Social code responsibility - all of the others. Research responsibility So cial code responsibility answer: all of the others. U11 - Q006 When presenting an argument, in which order should you use the follow ing steps? summarize your argument, provide reasons, support your claim, state y our claim support your claim, summarize your argument, state your claim, provide reasons state your claim, support your claim, provide reasons, summarize your a rgument provide reasons, summarize your argument, state your claim, support your claim state your claim, summarize your argument, provide reasons, support your claim - summarize your argument, provide reasons, support your claim, state your claim all of the others. - support your claim, summarize your argument, state y our claim, provide reasons all of the others. - state your claim, support your c laim, provide reasons, summarize your argument all of the others. - provide reas ons, summarize your argument, state your claim, support your claim all of the ot hers. - state your claim, summarize your argument, provide reasons, support your claim all of the others. answer: state your claim, support your claim, provide reasons, summarize your ar gument U11 - Q006 - M Which of the following statements best describes a highly argumen tative group member? The member is not confrontational The member has less influ ence in group decision making. The member is less likely to be persuaded by othe

rs. The member is less likely to be chosen as the group leader all of the above - The member is not confrontationalstate your claim, support your claim, provide reasons, summarize your argument - The member has less influence in group decis ion making.state your claim, support your claim, provide reasons, summarize your argument - The member is less likely to be persuaded by others.state your claim , support your claim, provide reasons, summarize your argument - The member is l ess likely to be chosen as the group leaderstate your claim, support your claim, provide reasons, summarize your argument - all of the abovestate your claim, su pport your claim, provide reasons, summarize your argument answer: The member is less likely to be persuaded by others. U11 - Q007 "My uncle's visit to New Mexico was horrible. The weather was bad and the people were unfriendly. New Mexico is not a good choice for a vacation." Wh at fallacy is being committed in this statement? ad hominem attack hasty general ization appeal to popularity faulty analogy faulty cause - ad hominem attack The member is less likely to be persuaded by others. - hasty generalization The mem ber is less likely to be persuaded by others. - appeal to popularity The member is less likely to be persuaded by others. - faulty analogy The member is less li kely to be persuaded by others. - faulty cause The member is less likely to be p ersuaded by others. answer: hasty generalization U11 - Q008 An argument is the thinking we use to analyze what we read, see, and hear in order to arrive at a justified conclusion the way in which we use critic al thinking to advocate proposals, examine competing a hostile confrontation bet ween two or more people a form of debating in which a judge makes the final deci sion a claim supported by evidence and reasons for accepting it - the thinking w e use to analyze what we read, see, and hear in order to arrive at a justified c onclusionhasty generalization - the way in which we use critical thinking to adv ocate proposals, examine competinghasty generalization - a hostile confrontation between two or more peoplehasty generalization - a form of debating in which a judge makes the final decisionhasty generalization - a claim supported by eviden ce and reasons for accepting ithasty generalization answer: a claim supported by evidence and reasons for accepting it U11 - Q011 Which component of the Toulmin Model of Argument is indicated by word s in a claim such as "likely," "possibly," or "probably"? Reservation Evidence D ata Qualifier warrant - Reservationa claim supported by evidence and reasons for accepting it - Evidencea claim supported by evidence and reasons for accepting it - Dataa claim supported by evidence and reasons for accepting it - Qualifiera claim supported by evidence and reasons for accepting it - warranta claim suppo rted by evidence and reasons for accepting it answer: Qualifier U11 - Q014 All of the following traits are characteristic of emotional intellige nce EXCEPT empathy. self-awareness self-regulation self-confidence self-assertio n. - empathy.Qualifier - self-awarenessQualifier - self-regulationQualifier - se lf-confidenceQualifier - self-assertion.Qualifier answer: self-assertion. U11 - Q015 Some group members have suggested that the company sponsor an annual picnic rather than a more formal annual dinner. John disagrees with the others b ecause the company has held a formal dinner every year for more than 10 years. W hich fallacy of argument could be attributed to John's comment? ad hominem attac k appeal to authority appeal to popularity appeal to tradition faulty cause - ad hominem attackself-assertion. - appeal to authorityself-assertion. - appeal to popularityself-assertion. - appeal to traditionself-assertion. - faulty causesel f-assertion. answer: appeal to tradition U11 - Q017 "Everyone in our group has signing the petition. You should, too." Wh at fallacy is being committed in this statement? ad hominem attack appeal to aut hority appeal to popularity appeal to tradition none of the above - ad hominem a ttackappeal to tradition - appeal to authorityappeal to tradition - appeal to po pularityappeal to tradition - appeal to traditionappeal to tradition - none of t he aboveappeal to tradition -

answer: appeal to popularity U11 - Q018 Some group members have suggested that the company sponsor an annual picnic rather than a more formal annual dinner. John disagrees with the others b ecause the company has held a formal dinner every year for more than 10 years. W hich fallacy of argument could be attributed to John's comment? ad hominem attac k appeal to authority appeal to popularity appeal to tradition faulty cause - ad hominem attackappeal to popularity - appeal to authorityappeal to popularity appeal to popularityappeal to popularity - appeal to traditionappeal to populari ty - faulty causeappeal to popularity answer: appeal to tradition U11 - Q019 Argumentativeness is a claim supported by evidence and reasons for ac cepting it. a process of reasoned interaction intended to help participants make the best decision in a given situation a decision based on listening to and ana lyzing arguments a willingness to argue controversial issues with others a form of debating in which a judge makes the final decision - a claim supported by evi dence and reasons for accepting it.appeal to tradition - a process of reasoned i nteraction intended to help participants make the best decision in a given situa tionappeal to tradition - a decision based on listening to and analyzing argumen tsappeal to tradition - a willingness to argue controversial issues with othersa ppeal to tradition - a form of debating in which a judge makes the final decisio nappeal to tradition answer: a willingness to argue controversial issues with others U11 - Q020 The warrant in an argument answers the question What makes you say th at? What do you have to go on? How did you get there? Are there any exceptions? What conclusion or position do you advocate? - What makes you say that?a willing ness to argue controversial issues with others - What do you have to go on?a wil lingness to argue controversial issues with others - How did you get there?a wil lingness to argue controversial issues with others - Are there any exceptions?a willingness to argue controversial issues with others - What conclusion or posit ion do you advocate?a willingness to argue controversial issues with others answer: How did you get there? U11 - Q024 - M "Sex education in schools promotes teenage promiscuity." This sta tement is an example of a claim of fact conjecture value policy fiction - factHo w did you get there? - conjectureHow did you get there? - valueHow did you get t here? - policyHow did you get there? - fictionHow did you get there? answer: fact U11 - Q026 - M "Our group is the best in the class." This statement is an exampl e of a claim of fact. conjecture policy value fiction - fact.fact - conjecturefa ct - policyfact - valuefact - fictionfact answer: value U12 - Q.002 - M Which two group dialectics are particularly relevant when planni ng and conducting meetings? structure spontaneity and leadership followership in dividual goals group goals and conformity nonconformity heterogeneous homogeneou s and conflict cohesion engaged disengaged and open system closed system both b and c - structure spontaneity and leadership followership value - individual goa ls group goals and conformity nonconformity value - heterogeneous homogeneous an d conflict cohesion value - engaged disengaged and open system closed systemvalu e - both b and c value answer: structure spontaneity and leadership followership U12 - Q.004 - M The meeting planning questions in your textbook include all of t he following EXCEPT Why are we meeting? Who should attend the meeting? How shoul d we write the agenda? When and where should we meet? What materials do we need? - Why are we meeting? structure spontaneity and leadership followership - Who s hould attend the meeting? structure spontaneity and leadership followership - Ho w should we write the agenda? structure spontaneity and leadership followership - When and where should we meet? structure spontaneity and leadership followersh ip - What materials do we need? structure spontaneity and leadership followershi p answer: How should we write the agenda? U12 - Q.010 - M According to the guidelines presented in the textbook, when is t

he best time to address important and difficult issues? at the beginning of the meeting during the middle portion of the meeting during the last third of the me eting at the end of the meeting these items do not need to be placed on the agen da - at the beginning of the meeting How should we write the agenda? - during th e middle portion of the meeting How should we write the agenda? - during the las t third of the meeting How should we write the agenda? - at the end of the meeti ng How should we write the agenda? - these items do not need to be placed on the agenda How should we write the agenda? answer: during the middle portion of the meeting U12 - Q.012 - M The chairperson of a meeting should notify everyone who should a ttend. prepare for participation in the discussion. distribute minutes and repor ts after the meeting. keep the group focused on the task. do all of the above. notify everyone who should attend. during the middle portion of the meeting - p repare for participation in the discussion. during the middle portion of the mee ting - distribute minutes and reports after the meeting. during the middle porti on of the meeting - keep the group focused on the task. during the middle portio n of the meeting - do all of the above.during the middle portion of the meeting answer: do all of the above. U12 - Q.014 - M In order to keep a meeting moving at a comfortable pace, the cha irperson should review the agenda with all members. distribute materials needed for the discussion of issues. ask members to evaluate the meeting at the end of the meeting. begin on time without waiting for latecomers. avoid placing a time limit on each agenda item. - review the agenda with all members. do all of the a bove. - distribute materials needed for the discussion of issues.do all of the a bove. - ask members to evaluate the meeting at the end of the meeting. do all of the above. - begin on time without waiting for latecomers. do all of the above. - avoid placing a time limit on each agenda item. do all of the above. answer: begin on time without waiting for latecomers. U12 - Q.016 - M When members are late to a meeting, the chairperson should wait to start until all members have arrived. review what has been accomplished whene ver a latecomer arrives. let latecomers sit without participating until they hav e observed enough to be able to contribute. publicly reprimand latecomers. assig n latecomers tasks that no one else wants to do. - wait to start until all membe rs have arrived. begin on time without waiting for latecomers. - review what has been accomplished whenever a latecomer arrives. begin on time without waiting f or latecomers. - let latecomers sit without participating until they have observ ed enough to be able to contribute. begin on time without waiting for latecomers . - publicly reprimand latecomers. begin on time without waiting for latecomers. - assign latecomers tasks that no one else wants to do. begin on time without w aiting for latecomers. answer: let latecomers sit without participating until they have observed enough to be able to contribute. U12 - Q.018 - M What does your textbook suggest a group can do to curb the disru ptive behavior of a loudmouth? Interrupt the loudmouth. Have that person take mi nutes. Acknowledge that you understand the person's positions. Ask for viewpoint s from other members. Do any or all of the above. - Interrupt the loudmouth. let latecomers sit without participating until they have observed enough to be able to contribute. - Have that person take minutes. let latecomers sit without part icipating until they have observed enough to be able to contribute. - Acknowledg e that you understand the person's positions. let latecomers sit without partici pating until they have observed enough to be able to contribute. - Ask for viewp oints from other members. let latecomers sit without participating until they ha ve observed enough to be able to contribute. - Do any or all of the above.let la tecomers sit without participating until they have observed enough to be able to contribute. answer: Do any or all of the above. U12 - Q.018 - M What does your textbook suggest a group can do to curb the disru ptive behavior of a loudmouth? Interrupt the loudmouth Have that person take min utes Acknowledge that you understand the person's positions Ask for viewpoints f

rom other members Do any or all of the above - Interrupt the loudmouthDo any or all of the above. - Have that person take minutesDo any or all of the above. - A cknowledge that you understand the person's positionsDo any or all of the above. - Ask for viewpoints from other membersDo any or all of the above. - Do any or all of the aboveDo any or all of the above. answer: Do any or all of the above U12 - Q.022 - M All of the following statements about the minutes of a meeting a re true EXCEPT The format of the minutes should follow the format of the agenda. The more formal the meeting, the more information should be included in the min utes. The minutes should be accurate and impartial. The minutes should be a word -for-word record of everything that members say. The chairperson should delegate the task of taking minutes to another member. - The format of the minutes shoul d follow the format of the agenda.Do any or all of the above - The more formal t he meeting, the more information should be included in the minutes. Do any or al l of the above - The minutes should be accurate and impartial. Do any or all of the above - The minutes should be a word-for-word record of everything that memb ers say. Do any or all of the above - The chairperson should delegate the task o f taking minutes to another member. Do any or all of the above answer: The minutes should be a word-for-word record of everything that members say. U12 - Q001 Two reasons why people do not want to attend meetings are Ineffective chairperson Clear agenda Minutes-taking Inappropriate time and place - Ineffect ive chairperson The minutes should be a word-for-word record of everything that members say. - Clear agenda The minutes should be a word-for-word record of ever ything that members say. - Minutes-taking The minutes should be a word-for-word record of everything that members say. - Inappropriate time and place The minute s should be a word-for-word record of everything that members say. answer: Ineffective chairperson Inappropriate time and place U12 - Q002 During what stage should the Chairperson facilitate discussion ? Premeeting During-meeting Post- meeting None of the other options - Pre-meeting Ine ffective chairperson Inappropriate time and place - During-meeting Ineffective c hairperson Inappropriate time and place - Post- meeting Ineffective chairperson Inappropriate time and place - None of the other options Ineffective chairperson Inappropriate time and place answer: During-meeting U12 - Q003 A loudmouth should sometimes be assigned to Chair the meeting Take mi nutes Prepare for discussion Call to order - Chair the meeting During-meeting Take minutes During-meeting - Prepare for discussion During-meeting - Call to or der During-meeting answer: Take minutes U12 - Q004 One of the best ways to deal with latecomers is to let them Take minu tes Prepare for the discussion Distribute minutes after meetings Sit without par ticipating until they have observed enough to contribute - Take minutes Take min utes - Prepare for the discussion Take minutes - Distribute minutes after meetin gs Take minutes - Sit without participating until they have observed enough to c ontribute Take minutes answer: Sit without participating until they have observed enough to contribute U12 - Q004 - M The meeting planning questions in your textbook include all of th e following EXCEPT Why are we meeting? Who should attend the meeting? How should we write the agenda? When and where should we meet? What materials do we need? - Why are we meeting?Sit without participating until they have observed enough t o contribute - Who should attend the meeting?Sit without participating until the y have observed enough to contribute - How should we write the agenda?Sit withou t participating until they have observed enough to contribute - When and where s hould we meet?Sit without participating until they have observed enough to contr ibute - What materials do we need?Sit without participating until they have obse rved enough to contribute answer: How should we write the agenda? U12 - Q005 All of the following labels represent how member behavior can disrupt a meeting EXCEPT loudmouth. interrupter. whisperer. latecomer. tension releaser

- loudmouth. How should we write the agenda? - interrupter. How should we write the agenda? - whisperer. How should we write the agenda? - latecomer. How shoul d we write the agenda? - tension releaser How should we write the agenda? answer: tension releaser U12 - Q006 At what point in a business meeting should group members approve the agenda and minutes? right after the call to order right after routine reports ar e shared before the discussion of unfinished business before the discussion of n ew business right before final announcements by members - right after the call t o order tension releaser - right after routine reports are shared tension releas er - before the discussion of unfinished business tension releaser - before the discussion of new business tension releaser - right before final announcements b y members tension releaser answer: right after the call to order U12 - Q007 According to the guidelines presented in the textbook, when is the be st time to address important and difficult issues ? at the beginning of the meet ing during the middle portion of the meeting during the last third of the meetin g at the end of the meeting these items do not need to be placed on the agenda at the beginning of the meetingright after the call to order - during the middl e portion of the meetingright after the call to order - during the last third of the meetingright after the call to order - at the end of the meetingright after the call to order - these items do not need to be placed on the agendaright aft er the call to order answer: during the middle portion of the meeting U12 - Q008 When members are late to a meeting, the chairperson should wait to st art until all members have arrived review what has been accomplished whenever a latecomer arrives let latecomers sit without participating until they have obser ved enough to be able to contribute publicly reprimand latecomers assign latecom ers tasks that no one else wants to do - wait to start until all members have ar rivedduring the middle portion of the meeting - review what has been accomplishe d whenever a latecomer arrivesduring the middle portion of the meeting - let lat ecomers sit without participating until they have observed enough to be able to contributeduring the middle portion of the meeting - publicly reprimand latecome rsduring the middle portion of the meeting - assign latecomers tasks that no one else wants to doduring the middle portion of the meeting answer: let latecomers sit without participating until they have observed enough to be able to contribute U12 - Q010 All of the following statements about the minutes of a meeting are tr ue EXCEPT The format of the minutes should follow the format of the agenda The m ore formal the meeting, the more information should be included in the minutes T he minutes should be accurate and impartial The minutes should be a word-for-wor d record of everything that members say The chairperson should delegate the task of taking minutes to another member - The format of the minutes should follow t he format of the agendalet latecomers sit without participating until they have observed enough to be able to contribute - The more formal the meeting, the more information should be included in the minuteslet latecomers sit without partici pating until they have observed enough to be able to contribute - The minutes sh ould be accurate and impartiallet latecomers sit without participating until the y have observed enough to be able to contribute - The minutes should be a word-f or-word record of everything that members saylet latecomers sit without particip ating until they have observed enough to be able to contribute - The chairperson should delegate the task of taking minutes to another memberlet latecomers sit without participating until they have observed enough to be able to contribute answer: The minutes should be a word-for-word record of everything that members say U12 - Q011 What does your textbook suggest a group can do to curb the disruptive behavior of a loudmouth? Interrupt the loudmouth Have that person take minutes Acknowledge that you understand the person's positions Ask for viewpoints from o ther members Do any or all of the above - Interrupt the loudmouthThe minutes sho uld be a word-for-word record of everything that members say - Have that person take minutesThe minutes should be a word-for-word record of everything that memb

ers say - Acknowledge that you understand the person's positionsThe minutes shou ld be a word-for-word record of everything that members say - Ask for viewpoints from other membersThe minutes should be a word-for-word record of everything th at members say - Do any or all of the aboveThe minutes should be a word-for-word record of everything that members say answer: Do any or all of the above U12 - Q014 _______________ is the outline of items to be discussed and the tasks to be accomplished at a meeting. A set of minutes An action item An agenda A re port A call to order - A set of minutesDo any or all of the above - An action it emDo any or all of the above - An agendaDo any or all of the above - A reportDo any or all of the above - A call to orderDo any or all of the above answer: An agenda U12 - Q015 Deborah Duarte and Nancy Snyder point out that "technology cannot mak e up for poor planning or ill-conceived meetings. In fact, it can make the situa tion worse". In order to avoid such problems in a virtual meeting, you should be gin a virtual meeting by sharing the meeting agenda invite more people to partic ipate because virtual meeting are typically not restricted in size due to the nu mber of seats in a conference room make sure that participants have access to th e technology and know how to use it effectively use technology you've used befor e so you don't have to worry about testing it prior to meeting with the group us e all of the others. - begin a virtual meeting by sharing the meeting agendaAn a genda - invite more people to participate because virtual meeting are typically not restricted in size due to the number of seats in a conference roomAn agenda - make sure that participants have access to the technology and know how to use it effectivelyAn agenda - use technology you've used before so you don't have to worry about testing it prior to meeting with the groupAn agenda - use all of th e others.An agenda answer: make sure that participants have access to the technology and know how t o use it effectively U12 - Q016 Complexity theory helps explain why groups need agendas to structure their meetings. why groups should rely on minutes to make sure that assigned tas ks are completed. why groups need to balance dialectic tensions. why groups hold long, unnecessary meetings why groups should ask why, who, when, where, and wha t questions as part of the meeting planning process - why groups need agendas to structure their meetings.make sure that participants have access to the technol ogy and know how to use it effectively - why groups should rely on minutes to ma ke sure that assigned tasks are completed.make sure that participants have acces s to the technology and know how to use it effectively - why groups need to bala nce dialectic tensions.make sure that participants have access to the technology and know how to use it effectively - why groups hold long, unnecessary meetings make sure that participants have access to the technology and know how to use it effectively - why groups should ask why, who, when, where, and what questions a s part of the meeting planning processmake sure that participants have access to the technology and know how to use it effectively answer: why groups need to balance dialectic tensions. U12 - Q017 The Committee to Save the Park began a discussion of plans to organiz e a park clean-up day. There was not enough time during the meeting to finish th e discussion. In what part of the agenda for the next meeting should this issue appear? call to order reports from individuals and subcommittees unfinished busi ness new business announcements - call to orderwhy groups need to balance dialec tic tensions. - reports from individuals and subcommitteeswhy groups need to bal ance dialectic tensions. - unfinished businesswhy groups need to balance dialect ic tensions. - new businesswhy groups need to balance dialectic tensions. - anno uncementswhy groups need to balance dialectic tensions. answer: unfinished business U12 - Q018 Complexity theory helps explain why groups need agendas to structure their meetings why groups should rely on minutes to make sure that assigned task s are completed. why groups need to balance dialectic tensions. why groups hold long, unnecessary meetings why groups should ask why, who, when, where, and what questions as part of the meeting planning process. - why groups need agendas to

structure their meetingsunfinished business - why groups should rely on minutes to make sure that assigned tasks are completed.unfinished business - why groups need to balance dialectic tensions.unfinished business - why groups hold long, unnecessary meetingsunfinished business - why groups should ask why, who, when, where, and what questions as part of the meeting planning process.unfinished bus iness answer: why groups need to balance dialectic tensions. U12 - Q019 ___is the outline of items to be discussed and the tasks to be accomp lished at a meeting. A set of minutes An action item An agenda A report A call t o order - A set of minuteswhy groups need to balance dialectic tensions. - An ac tion itemwhy groups need to balance dialectic tensions. - An agendawhy groups ne ed to balance dialectic tensions. - A reportwhy groups need to balance dialectic tensions. - A call to orderwhy groups need to balance dialectic tensions. answer: An agenda U12 - Q020 According to the guidelines presented in the textbook, when is the be st time to address important and difficult issues? at the beginning of the meeti ng during the middle portion of the meeting during the last third of the meeting at the end of the meeting these items do not need to be placed on the agenda at the beginning of the meetingAn agenda - during the middle portion of the meet ingAn agenda - during the last third of the meetingAn agenda - at the end of the meetingAn agenda - these items do not need to be placed on the agendaAn agenda answer: during the middle portion of the meeting U14 - Q.004 - M Computer conferences that occur simultaneously in real time are examples of parallel communication. serial communication. synchronous communicat ion. asynchronous communication. all of the above. - parallel communication. dur ing the middle portion of the meeting - serial communication. during the middle portion of the meeting - synchronous communication. during the middle portion of the meeting - asynchronous communication.during the middle portion of the meeti ng - all of the above. during the middle portion of the meeting answer: synchronous communication. U14 - Q.006 - M Which of the following answers describes a characteristic of asy nchronous communication? It is linear. Immediate feedback is not received. It is not interactive. It is more deliberate than synchronous communication. all of t he above - It is linear. synchronous communication. - Immediate feedback is not received.synchronous communication. - It is not interactive. synchronous communi cation. - It is more deliberate than synchronous communication. synchronous comm unication. - all of the above synchronous communication. answer: all of the above U14 - Q.012 - M Which of the following guidelines will help you conduct and part icipate in an effective audioconference? Limit participation to no more than 15 group members. Begin the meeting by reading the agenda to all members. Distribut e the minutes of the meeting as soon as possible. Regardless of their roles, dis courage members from signing off during the audioconference. Avoid taking audioc onference time to schedule the date and time for a subsequent meeting. - Limit p articipation to no more than 15 group members. all of the above - Begin the meet ing by reading the agenda to all members. all of the above - Distribute the minu tes of the meeting as soon as possible. all of the above - Regardless of their r oles, discourage members from signing off during the audioconference.all of the above - Avoid taking audioconference time to schedule the date and time for a su bsequent meeting.all of the above answer: Distribute the minutes of the meeting as soon as possible. U14 - Q.018 - M Which of the following answers is NOT an advantage of using text conferencing for virtual group communication? It can save time and money. It all ows time for reflection. It reduces nonverbal influences. It produces a written record. It allows for quick dissemination of information. - It can save time and money. Distribute the minutes of the meeting as soon as possible. - It allows t ime for reflection. Distribute the minutes of the meeting as soon as possible. It reduces nonverbal influences.Distribute the minutes of the meeting as soon a s possible. - It produces a written record. Distribute the minutes of the meetin

g as soon as possible. - It allows for quick dissemination of information.Distri bute the minutes of the meeting as soon as possible. answer: It reduces nonverbal influences. U14 - Q.020 - M All of the following statements represent disadvantages to using text conferences EXCEPT They can lead to misunderstandings because they lack vi sual and oral cues. They can limit participation by members who are poor typists or writers. They can frustrate members who like or need to talk through ideas. They can limit participation by highly talkative members. They can decrease soci al support for members. - They can lead to misunderstandings because they lack v isual and oral cues. It reduces nonverbal influences. - They can limit participa tion by members who are poor typists or writers. It reduces nonverbal influences . - They can frustrate members who like or need to talk through ideas. It reduce s nonverbal influences. - They can limit participation by highly talkative membe rs. It reduces nonverbal influences. - They can decrease social support for memb ers. It reduces nonverbal influences. answer: They can limit participation by highly talkative members. U14 - Q.024 - M Which of the following answers is NOT an advantage of using elec tronic meeting systems to conduct group work? They usually result in shorter and more productive meetings. They require training, facilitation, and technical su pport. They are efficient ways to tap expertise and opinions. They can reorganiz e and prioritize ideas and issues in a variety of ways. They are good for brains torming, displaying data, and evaluating options. - They usually result in short er and more productive meetings. They can limit participation by highly talkativ e members. - They require training, facilitation, and technical support. They ca n limit participation by highly talkative members. - They are efficient ways to tap expertise and opinions.They can limit participation by highly talkative memb ers. - They can reorganize and prioritize ideas and issues in a variety of ways. They can limit participation by highly talkative members. - They are good for b rainstorming, displaying data, and evaluating options.They can limit participati on by highly talkative members. answer: They require training, facilitation, and technical support. U14 - Q.028 - M Threaded discussions are characteristics of virtual groups using email. audioconferences. videoconferences. bulletin boards. all of the above. email. They require training, facilitation, and technical support. - audioconfe rences. They require training, facilitation, and technical support. - videoconfe rences. They require training, facilitation, and technical support. - bulletin b oards. They require training, facilitation, and technical support. - all of the above.They require training, facilitation, and technical support. answer: bulletin boards. U14 - Q.030 - M The digital divide refers to inequalities in access to, distribu tion of, and use of information technology between 2 or more populations. inequa lities in quality and quantity of participation in virtual groups by members. in equalities in the amount of money spent on computer technology for groups servin g different departments in a company or association. inequalities in the credibi lity given to online resources such as Wikipedia. all of the above. - inequaliti es in access to, distribution of, and use of information technology between 2 or more populations. bulletin boards. - inequalities in quality and quantity of pa rticipation in virtual groups by members. bulletin boards. - inequalities in the amount of money spent on computer technology for groups serving different depar tments in a company or association. bulletin boards. - inequalities in the credi bility given to online resources such as Wikipedia. bulletin boards. - all of th e above. bulletin boards. answer: inequalities in access to, distribution of, and use of information techn ology between 2 or more populations. U14 - Q001 Define two best practices in virtual groups Adequate resources Approp riate technical support Inadequate communication skills training No role models for day-to-day interactions - Adequate resources inequalities in access to, dist ribution of, and use of information technology between 2 or more populations. Appropriate technical support inequalities in access to, distribution of, and us e of information technology between 2 or more populations. - Inadequate communic

ation skills training inequalities in access to, distribution of, and use of inf ormation technology between 2 or more populations. - No role models for day-to-d ay interactions inequalities in access to, distribution of, and use of informati on technology between 2 or more populations. answer: Adequate resources Appropriate technical support U14 - Q002 Two examples of Synchronous Communication are Yahoo Messenger Skype v ideoconference Hotmail messages Facebook Entries - Yahoo Messenger Adequate reso urces Appropriate technical support - Skype videoconference Adequate resources A ppropriate technical support - Hotmail messages Adequate resources Appropriate t echnical support - Facebook Entries Adequate resources Appropriate technical sup port answer: Yahoo Messenger Skype videoconference U14 - Q003 Define two of the Ten Commandments for Computer Ethics. Do not use ot her peoples computer resources without authorization or proper compensation Think about the social consequences of the program you are writing or the system you are designing Copy or use proprietary software for which you have not paid Snoop around in other peoples computer files - Do not use other peoples computer resour ces without authorization or proper compensation Yahoo Messenger Skype videoconf erence - Think about the social consequences of the program you are writing or t he system you are designing Yahoo Messenger Skype videoconference - Copy or use proprietary software for which you have not paid Yahoo Messenger Skype videoconf erence - Snoop around in other peoples computer files Yahoo Messenger Skype video conference answer: Do not use other peoples computer resources without authorization or prop er compensation Think about the social consequences of the program you are writi ng or the system you are designing U14 - Q004 Define two disadvantages of Asynchronous Communication Typing speed i s slower than speaking speed Messages might be received out of order Lacking spo ntaneity Linear rather than interactive - Typing speed is slower than speaking s peed Do not use other peoples computer resources without authorization or proper compensation Think about the social consequences of the program you are writing or the system you are designing - Messages might be received out of order Do not use other peoples computer resources without authorization or proper compensatio n Think about the social consequences of the program you are writing or the syst em you are designing - Lacking spontaneity Do not use other peoples computer reso urces without authorization or proper compensation Think about the social conseq uences of the program you are writing or the system you are designing - Linear r ather than interactive Do not use other peoples computer resources without author ization or proper compensation Think about the social consequences of the progra m you are writing or the system you are designing answer: Lacking spontaneity Linear rather than interactive U14 - Q004 - M Computer conferences that occur simultaneously in real time are e xamples of parallel communication serial communication synchronous communication asynchronous communication all of the others. - parallel communicationLacking s pontaneity Linear rather than interactive - serial communicationLacking spontane ity Linear rather than interactive - synchronous communicationLacking spontaneit y Linear rather than interactive - asynchronous communicationLacking spontaneity Linear rather than interactive - all of the others.Lacking spontaneity Linear r ather than interactive answer: synchronous communication U14 - Q004 - M Computer conferences that occur simultaneously in real time are e xamples of parallel communication. serial communication. synchronous communicati on asynchronous communication all of the others. - parallel communication.synchr onous communication - serial communication.synchronous communication - synchrono us communicationsynchronous communication - asynchronous communicationsynchronou s communication - all of the others.synchronous communication answer: synchronous communication U14 - Q005 Email is an example of parallel communication. concurrent communicati on synchronous communication asynchronous communication. all of the others. - pa rallel communication. synchronous communication - concurrent communication synch

ronous communication - synchronous communication synchronous communication - asy nchronous communication. synchronous communication - all of the others. synchron ous communication answer: asynchronous communication. U14 - Q006 All of the following statements represent disadvantages to using audi oconferences EXCEPT They can make group members feel isolated. They may reduce g roup cohesion. They are less expensive than videoconferences They are inffective for sharing and editing documents They allow members to tune in and out of the meeting. - They can make group members feel isolated. asynchronous communication . - They may reduce group cohesion. asynchronous communication. - They are less expensive than videoconferences asynchronous communication. - They are inffectiv e for sharing and editing documents asynchronous communication. - They allow mem bers to tune in and out of the meeting. asynchronous communication. answer: They are less expensive than videoconferences U14 - Q007 According to your textbook, software and hardware that provide group members with the ability to generate and evaluate ideas, make decisions, and use different voting procedures are known as meetingware. electronic meeting system s. decisionware taskware. problemware. - meetingware. They are less expensive th an videoconferences - electronic meeting systems. They are less expensive than v ideoconferences - decisionware They are less expensive than videoconferences - t askware. They are less expensive than videoconferences - problemware. They are l ess expensive than videoconferences answer: electronic meeting systems. U14 - Q009 Which of the following answers describes 1 of the many advantages of using audioconferences as a medium for virtual group work? Audioconferences allo w members to work on nongroup work during the meeting are easier to set up than face-to-face meetings require an investment in compatible equipment use telephon es to which most members have easy access intensify the viewpoints of individual group members - allow members to work on nongroup work during the meetingelectr onic meeting systems. - are easier to set up than face-to-face meetingselectroni c meeting systems. - require an investment in compatible equipmentelectronic mee ting systems. - use telephones to which most members have easy accesselectronic meeting systems. - intensify the viewpoints of individual group memberselectroni c meeting systems. answer: use telephones to which most members have easy access U14 - Q010 Threaded discussions are characteristics of virtual groups using emai l audioconferences videoconferences bulletin boards all of the above - emailuse telephones to which most members have easy access - audioconferencesuse telephon es to which most members have easy access - videoconferencesuse telephones to wh ich most members have easy access - bulletin boardsuse telephones to which most members have easy access - all of the aboveuse telephones to which most members have easy access answer: bulletin boards U14 - Q011 The digital divide refers to inequalities in access to, distribution of, and use of information technology between 2 or more populations inequalities in quality and quantity of participation in virtual groups by members inequalit ies in the amount of money spent on computer technology for groups serving diffe rent departments in a company or association inequalities in the credibility giv en to online resources such as Wikipedia all of the above - inequalities in acce ss to, distribution of, and use of information technology between 2 or more popu lationsbulletin boards - inequalities in quality and quantity of participation i n virtual groups by membersbulletin boards - inequalities in the amount of money spent on computer technology for groups serving different departments in a comp any or associationbulletin boards - inequalities in the credibility given to onl ine resources such as Wikipediabulletin boards - all of the abovebulletin boards answer: inequalities in access to, distribution of, and use of information techn ology between 2 or more populations U14 - Q012 Some group members find it easier, more comfortable, and safer expres sing disapproval and disagreement online than in face-to-face situations. Which

group dialectic is represented in this aspect of virtual groups? open system `le ftrightarrow` closed system task dimensions `leftrightarrow` social dimensions c onflict `leftrightarrow` cohesion leadership `leftrightarrow` followership struc tured `leftrightarrow` spontaneous - open system `leftrightarrow` closed systemi nequalities in access to, distribution of, and use of information technology bet ween 2 or more populations - task dimensions `leftrightarrow` social dimensionsi nequalities in access to, distribution of, and use of information technology bet ween 2 or more populations - conflict `leftrightarrow` cohesioninequalities in a ccess to, distribution of, and use of information technology between 2 or more p opulations - leadership `leftrightarrow` followershipinequalities in access to, distribution of, and use of information technology between 2 or more populations - structured `leftrightarrow` spontaneousinequalities in access to, distributio n of, and use of information technology between 2 or more populations answer: conflict `leftrightarrow` cohesion U14 - Q014 A study by the American Association of University Women found that, i n general, girls consistently rate themselves lower on computer ability than boy s do. girls and boys rate themselves comparable on computer ability. software pr ograms are gender neutral girls enter the classroom with more computer experienc e than boys have. none of the others is true - girls consistently rate themselve s lower on computer ability than boys do.conflict `leftrightarrow` cohesion - gi rls and boys rate themselves comparable on computer ability.conflict `leftrighta rrow` cohesion - software programs are gender neutralconflict `leftrightarrow` c ohesion - girls enter the classroom with more computer experience than boys have .conflict `leftrightarrow` cohesion - none of the others is trueconflict `leftri ghtarrow` cohesion answer: girls consistently rate themselves lower on computer ability than boys d o. U14 - Q015 Duarte and Snyder recommend a set of best practices for making electr onic meeting system conferences more effective. Which of the following answers i n NOT a best practice for this type of group meeting? Make sure everyone in the group has a turn facilitating the meeting to keep the group moving through the a genda Make sure everyone's system is compatible and working properly. Develop a clear and focused agenda and set of technical instructions. Decide if and when i nput will be anonymous for activities such as brainstorming and voting Rotate fu nctions such as sorting information to avoid fatigue - Make sure everyone in the group has a turn facilitating the meeting to keep the group moving through the agendagirls consistently rate themselves lower on computer ability than boys do. - Make sure everyone's system is compatible and working properly.girls consiste ntly rate themselves lower on computer ability than boys do. - Develop a clear a nd focused agenda and set of technical instructions.girls consistently rate them selves lower on computer ability than boys do. - Decide if and when input will b e anonymous for activities such as brainstorming and votinggirls consistently ra te themselves lower on computer ability than boys do. - Rotate functions such as sorting information to avoid fatiguegirls consistently rate themselves lower on computer ability than boys do. answer: Make sure everyone in the group has a turn facilitating the meeting to k eep the group moving through the agenda U14 - Q017 All of the following statements represent disadvantages to using text conferences EXCEPT They can lead to misunderstandings because they lack visual and oral cues They can limit participation by members who are poor typists or wr iters They can frustrate members who like or need to talk through ideas. They ca n limit participation by highly talkative members They can decrease social suppo rt for members. - They can lead to misunderstandings because they lack visual an d oral cuesMake sure everyone in the group has a turn facilitating the meeting t o keep the group moving through the agenda - They can limit participation by mem bers who are poor typists or writersMake sure everyone in the group has a turn f acilitating the meeting to keep the group moving through the agenda - They can f rustrate members who like or need to talk through ideas.Make sure everyone in th e group has a turn facilitating the meeting to keep the group moving through the agenda - They can limit participation by highly talkative membersMake sure ever

yone in the group has a turn facilitating the meeting to keep the group moving t hrough the agenda - They can decrease social support for members.Make sure every one in the group has a turn facilitating the meeting to keep the group moving th rough the agenda answer: They can limit participation by highly talkative members U14 - Q018 Which of the following answers is NOT an essential guideline for cond ucting and participating in an effective videoconference? Limit participation to no more than 3-6 group members Dress appropriately Identify yourself by name wh enever you speak Always keep your comments short and to the point all of the abo ve - Limit participation to no more than 3-6 group membersThey can limit partici pation by highly talkative members - Dress appropriatelyThey can limit participa tion by highly talkative members - Identify yourself by name whenever you speakT hey can limit participation by highly talkative members - Always keep your comme nts short and to the pointThey can limit participation by highly talkative membe rs - all of the aboveThey can limit participation by highly talkative members answer: Dress appropriately U14 - Q019 A study by Staples and Webster identifies several "best practices" th at can significantly improve group performance and member satisfaction in virtua l groups. Which of the following answers is NOT one of their best practices? We have the right people, skills, and funding to achieve our goal We have members w ho prefer to work in virtual groups rather than in face-to-face meetings We have adequate electronic communication skills training We have adequate remote coord ination skills training We have appropriate and effective information technology and support - We have the right people, skills, and funding to achieve our goal Dress appropriately - We have members who prefer to work in virtual groups rathe r than in face-to-face meetingsDress appropriately - We have adequate electronic communication skills trainingDress appropriately - We have adequate remote coor dination skills trainingDress appropriately - We have appropriate and effective information technology and supportDress appropriately answer: We have members who prefer to work in virtual groups rather than in face -to-face meetings U14 - Q020 Which group dialectic is represented in Patricia Wallace's concept of group polarization? engaged <-> disengaged task dimensions <-> social dimension s conformity <-> nonconformity leadership <-> followership homogeneous <-> heter ogeneous - engaged <-> disengagedWe have members who prefer to work in virtual g roups rather than in face-to-face meetings - task dimensions <-> social dimensio nsWe have members who prefer to work in virtual groups rather than in face-to-fa ce meetings - conformity <-> nonconformityWe have members who prefer to work in virtual groups rather than in face-to-face meetings - leadership <-> followershi pWe have members who prefer to work in virtual groups rather than in face-to-fac e meetings - homogeneous <-> heterogeneousWe have members who prefer to work in virtual groups rather than in face-to-face meetings answer: conformity <-> nonconformity U14 - Q024 - M Which of the following answers is NOT an advantage of using elect ronic meeting systems to conduct group work? They usually result in shorter and more productive meetings. They require training, facilitation, and technical sup port. They are efficient ways to tap expertise and opinions. They can reorganize and prioritize ideas and issues in a variety of ways. They are good for brainst orming, displaying data, and evaluating options - They usually result in shorter and more productive meetings.conformity <-> nonconformity - They require traini ng, facilitation, and technical support.conformity <-> nonconformity - They are efficient ways to tap expertise and opinions.conformity <-> nonconformity - They can reorganize and prioritize ideas and issues in a variety of ways.conformity <-> nonconformity - They are good for brainstorming, displaying data, and evalua ting optionsconformity <-> nonconformity answer: They require training, facilitation, and technical support. U14-Q1-28 - Ko yeu cau email audioconferences videoconferences bulletin boards a ll of the above - emailThey require training, facilitation, and technical suppor t. - audioconferencesThey require training, facilitation, and technical support. - videoconferencesThey require training, facilitation, and technical support. -

bulletin boardsThey require training, facilitation, and technical support. - al l of the aboveThey require training, facilitation, and technical support. answer: bulletin boards U01 - Q001 - T When group members work together to achieve a common goal, the si ze of the group, the physical setting, and the group's role and status in an org anization are components of the communication context. True False - Truebulletin boards - Falsebulletin boards answer: True U01 - Q002 - T Without understanding group communication theories, you will have difficulty understanding why a particular method works in one situation and fai ls in another. True False - TrueTrue - FalseTrue answer: True U02 - Q001 - T During the assimilation phrase of newcomer socialization, establi shed members and newcomers blend into a comfortable state of working together to achieve a common goal. True False - TrueTrue - FalseTrue answer: True U02 - Q002 - T When there is enormous pressure for group members to conform, a d isruptive member can help the group by not conforming to group norms. True False - TrueTrue - FalseTrue answer: True U02 - Q003 - T Members who engage in disruptive or nonconforming behavior should always be confronted about their behavior as soon as possible. True False - Tru eTrue - FalseTrue answer: False U03 - Q001 - T Group members who experience communication apprehension tend to s peak less, agreewith others rather than voice disagreement, and use more filler phrases such as "well," "you know," and "uh." True False - TrueFalse - FalseFals e answer: True U03 - Q002 - T The strategies of cognitive restructuring help highly apprehensiv e group members communicate more confidently because they teach them important s kills for participating in a discussion. True False - TrueTrue - FalseTrue answer: False U04 - Q.002 - T In low power distance cultures, members accept major differences in power as normal, assuming that all people are not created equal. True False - TrueFalse - FalseFalse answer: False U04 - Q001 - T Prejudices are based on extensive and direct experience as well a s personal, firsthand knowledge about a group of people. True False - TrueFalse - FalseFalse answer: False U05 - Q001 - T A designated leader is selected by group members or by an outside authority. True False - TrueFalse - FalseFalse answer: False U05 - Q002 - T Leaders can motivate members from collectivist cultures by helpin g members achieve personal goals and high status positions. True False - TrueFal se - FalseFalse answer: False U06 - Q001 - T Motivation recognizes and financially compensates group members f or work well done. True False - TrueFalse - FalseFalse answer: False U06 - Q002 - T For the most part, extrinsic rewards do not motivate groups to wo rk together in pursuit of a shared goal. True False - TrueFalse - FalseFalse answer: True U07 - Q001 - T When dealing with a group member who uses abusive language to att ack or intimidate others, your textbook suggests asking the person to repeat wha t he or she has said. True False - TrueTrue - FalseTrue answer: True U07 - Q002 - T Touch in groups can result in greater teamwork, solidarity, and s haring among members. True False - TrueTrue - FalseTrue -

answer: True U08 - Q001 - T Effective empathic listeners welcome opportunities to hear someth ing new or challenging and pay special attention to the eloquence of a member's words. True False - TrueTrue - FalseTrue answer: False U08 - Q002- T The Golden Listening Rule is: speak unto others as you would have them speak to you. True False - TrueFalse - FalseFalse answer: False U09 - Q001 - T Constructive conflict is characterized by competition and conflic t avoidance. True False - TrueFalse - FalseFalse answer: False U09 - Q002 - T Negotiation requires third-party intervention in which an outside r who has conflict resolution skills can help the group analyze and resolve a co nflict. True False - TrueFalse - FalseFalse answer: False U10 - Q001 - T Creativity requires the nonjudgmental process of searching for, s eparating, and connecting unrelated ideas and elements. True False - TrueFalse FalseFalse answer: True U10 - Q002 - T Nominal Group Technique is a decision-making tool that helps grou ps reduce and refine a large number of suggestions into a manageable number of i deas. True False - TrueTrue - FalseTrue answer: False U11 - Q001 - T "A claim of value evaluates whether something is good or bad, rig ht or wrong, worthwhile or worthless" is an example of a definition. True False - TrueFalse - FalseFalse answer: True U11 - Q002 - T An appeal to tradition is a fallacy that justifies an action beca use many others do the same thing or share the same opinion. True False - TrueTr ue - FalseTrue answer: False U12 - Q001 - T Questions such as "Is an immediate decision needed?" and "Are mem bers prepared to discuss the topic?" should be asked when determining the Meetin g Planning Question "Why are we meeting?" True False - TrueFalse - FalseFalse answer: True U12 - Q002 - T If members come late to a scheduled meeting, they should sit with out participating until they have observed enough of the meeting's discussion to contribute responsibly. True False - TrueTrue - FalseTrue answer: True U12 - Q003 - T Regardless of the complexity or importance of an issue, parliamen tary rules state that a group must accepts the will of the majority even if the majority wins by only 1 vote. True False - TrueTrue - FalseTrue answer: True U01 - Q.043 Which of the following situations best represents group communicatio n as defined in the textbook? answer: Jury members deliberating a court case. U01 - Q.043 A group with 7 members has the potential for _______ different types of interactions. answer: 966 U01 - Q.044 What is the ideal group size for a problem-solving discussion? answer: 57 people U01 - Q.047 According to your textbook, the most important factor separating suc cessful groups from unsuccessful ones is answer: clear goal. U01 - Q.048 According to your textbook, a group's context refers to answer: all of the above. U01 - Q.049 To which basic element of communication is Grace giving special atte ntion when she prepares for an important group meeting by making sure her busine ss suit is pressed, that her hair is well-groomed, that her perfume is pleasant but subtle, and that she takes a breath mint before entering the meeting room?

answer: channels U01 - Q.050 In a communication transaction, feedback represents answer: the response or reaction to a message. U01 - Q.051 Which of the following examples best illustrates the systems theory principle that "systems try to maintain balance in their environment"? answer: Members may take time off to "play" when work becomes too intense. U01 - Q.043 The cooperative interaction of several factors that results in a com bined effect greater than the total of all individual parts is referred to as answer: synergy. U01 - Q.044 A stamp collecting club is an example a answer: social group. U01 - Q.047 Your family is an example of a answer: primary group. U01 - Q.048 A local Alcoholics Anonymous chapter is an example of a answer: self-help group. U01 - Q.049 Guests who appear on talk shows and interact with other guests for t he benefit of an audience are participating in a answer: panel discussion. U01 - Q.050 A group of police officers presenting short, uninterrupted speeches on different aspects of community safety are participating in a answer: symposium. U01 - Q.051 A college appoints a moderator and holds an open discussion to provi de students with the opportunity to ask questions and express their concerns reg arding a proposed increase in tuition. This setting for group communication is a n example of a answer: forum. U01 - Q001 A college's Board of Trustees that makes public policy decisions may be classified as a answer: governance group. U01 - Q002 Which of the following characteristics demonstrates one of the disadv antages of working in groups? answer: Groups require significant time, energy, and resources. U01 - Q003 A virtual group is one which answer: relies on technology to communicate. U01 - Q004 Statements that explain or predict how people communicate are answer: theories. U01 - Q005 When seeking to resolve group tensions, the dialectic approach recomm ends a __________________ approach. answer: both/and U01 - Q006 All of the following pairs of common folk proverbs illustrate the con tradictory nature of dialectic tensions EXCEPT answer: "Waste not, want not" and "Music makes the world go 'round. " U01 - Q.043 In group dialectic terms, effective groups balance structure and answer: spontaneity. U01 - Q.044 In dialectic terms, effective groups balance conflict with answer: cohesion. U01 - Q.047 In dialectic terms, effective groups balance task dimensions with answer: social dimensions. U01 - Q.048 The open system ? closed system group dialectic can be described as a. balancing a commitment to group norms and standards with a willingness to dif fer and change. answer: balancing external support and recognition with internal group solidarit y and rewards. U01 - Q.049 The homogeneous ? heterogeneous group dialectic can be described as answer: balancing member similarities and differences. U01 - Q.050 The engaged ? disengaged group dialectic can be described as answer: balancing member energy and labor with the group's need for rest and ren ewal. U01 - Q.051 A both/and approach to resolving dialectic tensions in groups empowe rs members. Which of the following examples demonstrates the characteristics of

autonomy in an empowered group? answer: The group has the freedom to make decisions and implements its decisions . U01 - Q001 In Latin, the word credo means answer: "I believe." U01 - Q002 All of the following principles of ethical communication are included in the National Communication Association's Credo for Ethical Communication EXC EPT answer: We endorse freedom of speech only when the truth does not cause detrimen tal results or harm others. U01 - Q003 According to a study commissioned by the Association of American Coll eges and Universities, "teamwork skills and the ability to collaborate with othe rs in diverse group settings" was ranked first as an essential learning outcome in 2 of 4 major categories. answer: True U01 - Q004 Employers view proficiency in a field of study as more important than group communication skills. answer: False U01 - Q005 Your textbook defines group communication as the interaction of 5 to 7 people working to make a good decision. answer: False U01 - Q006 The basic components of group communication are members, interaction, independence, goals, and working. answer: True U01 - Q007 A group of 5 members has the potential for 90 different types of inte raction. answer: True U01 - Q008 In groups with more than 15 members, coordination and control become difficult. answer: True U01 - Q009 According to your textbook, leadership is the single factor that sepa rates successful groups from unsuccessful groups. answer: False U01 - Q010 As groups grow larger, member satisfaction increases. answer: False U01 - Q011 Generally, there are 2 sources of noise: external and internal. answer: True U01 - Q012 A soft speaking voice can create noise in a communication transaction . answer: True U01 - Q013 Feedback is always verbal rather than nonverbal. answer: False U01 - Q014 When group members work together to achieve a common goal, the size o f the group, the physical setting, and the group's role and status in an organiz ation are components of the communication context. answer: True U01 - Q015 Your biases, distracting thoughts about other activities, fatigue, an d hunger can cause noise in a communication transaction. answer: True U01 - Q.043 Unlike the digestive system, a computer system, or even the solar sy stem, groups do not function as a system because they involve interdependent mem bers interacting with one another. answer: False U01 - Q.044 Systems theory assumes that groups and their members are unpredictab le. answer: True U01 - Q.047 The term synergy comes from the Greek word synonym which means "simi lar meaning." answer: False U01 - Q.048 Synergy refers to a situation in which "the whole is greater than th

e sum of its individual parts." answer: True U01 - Q.049 PTAs, labor unions, veterans' groups, fire and police auxiliary grou ps, and neighborhood and community associations are examples of self-help groups . answer: False U01 - Q.050 On college campuses, intramural athletic teams as well as sororities and fraternities are examples of social groups. answer: True U01 - Q.051 Work groups collaborate to achieve specific goals on behalf of a bus iness or organization. answer: True U01 - Q001 Ad hoc committees remain active in order to accomplish ongoing tasks on behalf of a larger group. answer: False U01 - Q002 In a panel discussion, several group members interact with one anothe r on a common topic for the benefit of an audience. answer: True U01 - Q003 In a group symposium, group members interact with one another on a co mmon topic for the benefit of an audience. answer: False U01 - Q004 Asynchronous group communication occurs simultaneously and in real ti me. answer: False U01 - Q005 When a task is complex and the answers are unclear, an effective grou p will perform better than individuals working alone. answer: True U01 - Q006 Generally, a smart person can generate more innovative ideas and crea tive solutions than a group can. answer: False U01 - Q007 A Microsoft study found that nonproductive meetings can waste 2 of ev ery 5 workdays. answer: True U01 - Q008 Without understanding group communication theories, you will have dif ficulty understanding why a particular method works in one situation and fails i n another. answer: True U01 - Q009 Resolving group dialects requires an either/or approach rather than a both/and approach. answer: False U01 - Q.043 Relational Dialectics Theory claims that relationships are character ized by ongoing tensions between the contradictory and complex elements of human experiences. answer: True U01 - Q.044 In the best of groups, individual goals support the group's common g oal. answer: True U01 - Q.047 "Two's company; three's a crowd" and "Music makes the world go 'roun d" are examples of dialectic tensions. answer: False U01 - Q.048 Groups without constructive conflict have difficulty analyzing the w isdom of their decisions. answer: True U01 - Q.049 The structure ? spontaneity dialectic relies on both tested procedur es to help a group achieve its goal as well as creative thinking. answer: True U01 - Q.050 Heterogeneous groups include members who are different from one anot her. answer: True U01 - Q.051 When a group functions as an open system, it guards its boundaries a

nd discourages input from or interaction with the outside. answer: False U01 - Q001 The key to balancing both the complex and competing elements in a gro up is a commitment to working toward the group's goal. answer: True U01 - Q002 Empowered groups feel free to exert control over other groups in orde r to achieve their personal goals. answer: False U01 - Q003 The National Communication Association's Credo for Ethical Communicat ion states that every group member should condemn communication that degrades in dividuals and that expresses intolerance or hatred. answer: True U01 - Q004 The National Communication Association's Credo for Ethical Communicat ion contends that group members should accept the consequences of their communic ation and expect the same of others. answer: True

U01 - Q005 In which of Tuckman's Group Development Stages do members resolve sta tus conflicts and learn to work as a cohesive team? answer: norming U01 - Q006 In which of Tuckman's Group Development Stages are members socially c autious and overly polite? answer: forming U01 - Q007 You have just joined a newly formed group responsible for developing a recycling program for your community. At first, group members are somewhat unc omfortable working with strangers. Which of Tuckman's stages of group developmen t is your group experiencing? answer: forming U01 - Q008 Which is the correct order for Tuckman's 5 group development stages? answer: forming, storming, norming, performing, adjourning U01 - Q009 Because most members of a new group want to create a good first impre ssion, they tend to be overly polite with one another during their initial meeti ngs. They don't interrupt one another and avoid expressing strong opinions. Thes e behaviors are characteristic of answer: primary tension. U01 - Q005 Ernest Bormann's description of primary tension resembles Tuckman's _ ________ stage of group development. answer: forming U01 - Q006 Ernest Bormann's description of _________ resembles Tuckman's forming stage of group development. answer: primary tension U01 - Q007 In which of which of Carolyn Anderson's group socialization stages do members adjust to group expectations, assume needed roles, and balance their pe rsonal goals with the group's goals? answer: encounter phrase U01 - Q008 In which of which of Carolyn Anderson's group socialization stages do members become fully integrated into the group's culture? answer: the goals are simple and easy to achieve. U01 - Q009 _________ occur when members' private goals conflict with the group's common goals and represent what people really want rather than what they say th ey want. answer: Hidden agendas U01 - Q005 All of the following statements are true about hidden agendas EXCEPT answer: Hidden agendas occur when there is poor group leadership. U01 - Q006 Implicit norms are answer: rarely discussed by members. U01 - Q007 Which of the following examples depicts an explicit norm? answer: Everyone abides by the "be on time; be out on time" rule set on the firs

t day of the group meetings. U01 - Q008 Which of the following examples depicts an implicit norm? answer: Members have learned that because meetings usually begin fifteen minutes later than scheduled, they can arrive a little late. U01 - Q009 Your group has discussed and decided that members will take turns rec ording and typing the minutes from each meeting. A(n) _______________ has been e stablished. answer: explicit norm U01 - Q005 Whenever your department has a staff meeting, the supervisor always s its at the head of the table. Group members know they should not take the seat a t the head of the table even though they have not been told to avoid that seat. A(n) _______________ is operating in the group. answer: implicit norm U01 - Q006 Which of the 4 categories of norms is operating in the following exam ple? Your group makes decisions by majority rule. A(n) _______________ is operat ing in this circumstance. answer: procedural norm U01 - Q007 Which of the 4 categories of norms is operating in the following exam ple? Most group members defer to or agree with Tasha and Bill when they make a r ecommendation. A(n) _______________ is operating in this circumstance. answer: status norm U01 - Q008 Stanley Milgram's classic experiment to find out whether people would obey commands to give "subjects" painful electric shocks demonstrated that answer: pressure from an authority figure can outweigh individual judgment and m orality. U01 - Q009 In Philip Zimbardo's famous study, students were assigned the role of guard or prisoner in a realistic-looking prison in a Stanford University baseme nt. The experiment was halted before its scheduled completion because answer: the "guards" became abusive and the "prisoners" became passive and depre ssed. U01 - Q005 Stanley Milgrim (Yale University) and Philip Zimbardo (Stanford Unive rsity) conducted famous experiments that demonstrated the answer: pressure to conform to authority rule. U01 - Q006 Nonconformity answer: can improve group performance. U01 - Q007 Which of the following strategies is recommended as an effective meth od for dealing with destructive nonconformity in groups? answer: all of the above U01 - Q008 Max was disturbed by the way in which group members interrupted one a nother during discussions. He could see that some of the quieter members were in timidated by this norm. Max decided that he would try to change the norm by cont inuing to talk right through an interruption in the hope that the members who us ually interrupted would stop. What strategy was Max using to change group norms? answer: continued interaction using a different behavior U01 - Q009 Which of the following characteristics was NOT one of the 8 character istics that emerged in the Carl Larson and Frank LaFasto study that asked "What are the secrets of successful teams?" answer: adherence to group norms U01 - Q005 How do virtual groups differ from face-to-face groups during the stor ming stage of group development? answer: Technical problems and differences in members' technical expertise affec t how members compete for high-status roles. U01 - Q006 The correct order for the 5 stages in Tuckman's Group Development Sta ges are forming, performing, storming, norming, adjourning. answer: False U01 - Q007 During the forming stage of Tuckman's Group Development model, the gr oup's most important job to "orient itself to itself." answer: True U01 - Q008 The frustration and personality conflicts that occur in groups as mem bers compete for acceptance and status are the source of primary tension.

answer: False U01 - Q009 Most groups experience some form of primary and secondary tension dur ing the forming and storming stages of group development. answer: True U01 - Q005 Groups resolve primary tension by being positive and energetic, patie nt and openminded, and well prepared. answer: True U01 - Q006 Face-to-face meetings may be desirable in the early stages of virtual groups. answer: True U01 - Q007 During the norming stage of group development, groups primarily confr ont the conflict ? cohesion dialectic and the leadership ? followership dialecti c. answer: False U01 - Q008 Bormann's secondary tension has similar characteristics to the behavi or of members during Tuckman's storming stage of group development. answer: True U01 - Q009 During Tuckman's performing stage of group development, feelings of t rust and clear goals emerge as members become more comfortable with one another and agree upon group procedures. answer: False U01 - Q.043 During Tuckman's performing stage of group development, members focu s their energies on both the task and social dimensions of group work as they ma ke major decisions and solve critical problems. answer: True U01 - Q.044 During the antecedent phase of newcomer socialization, new members a djust to group expectations and assume needed roles. answer: False U01 - Q.047 During the assimilation phrase of newcomer socialization, establishe d members and newcomers blend into a comfortable state of working together to ac hieve a common goal. answer: True U01 - Q.048 Locke and Latham's Goal Theory emphasizes the value of setting group goals. answer: True U01 - Q.049 Locke and Latham's Goal Theory concludes that groups function best w hen their goals are easy to accomplish and are set by a strong leader. answer: False U01 - Q.050 When setting goals, groups should ask questions about the goal's cla rity, difficulty, meaningfulness, and cost. answer: True U01 - Q.051 Hidden agendas occur when a member's private goal conflicts with the group's goal. answer: True U01 - Q001 Groups should avoid discussing hidden agendas openly in order to avoi d member embarrassment and the potential for interpersonal conflict. answer: False U01 - Q002 Although group norms are often difficult to express in words, they ar e real and have a major effect on group productivity and member satisfaction. answer: True U01 - Q003 Explicit norms are rarely discussed or openly communicated, whereas i mplicit norms are put in writing or stated verbally. answer: False U01 - Q004 Your textbook divides norms into four categories: interaction norms, procedural norms, status norms, and achievement norms. answer: True U01 - Q005 When group members expect and receive an agenda in advance of meeting s and follow the agenda during meetings, they are abiding by an interaction norm . answer: False

U01 - Q006 When a group is having difficulty deciding and the leader has the rig ht to make the final decision, the group is abiding by a status norm. answer: True U01 - Q007 Stanley Milgram and Philip Zimbardo's classic studies demonstrated th at people in authority positions exert enormous pressure on people to conform. answer: True U01 - Q.043 When there is enormous pressure for group members to conform, a disr uptive member can help the group by not conforming to group norms. answer: True U01 - Q.044 Destructive nonconformity occurs when a member resists conforming to norms without regard for the best interests of the group and its goals. answer: True U01 - Q.047 Members who engage in disruptive or nonconforming behavior should al ways be confronted about their behavior as soon as possible. answer: False U01 - Q.048 When a highly disruptive member prevents a group from achieving its common goals, a group should use the following strategiesin the following orderto deal with the troublesome member: confront, exclude, and accept. answer: False U01 - Q.049 You can change group communication norms by changing the way you spe ak during a discussion. answer: True U01 - Q.050 In Carl Larson and Frank LaFasto's three-year study of characteristi cs that explain how and why effective groups develop, they put "a clear and elev ated goal" at the top of their list. answer: True U01 - Q.051 In Carl Larson and Frank LaFasto's three-year study of characteristi cs of highly effective groups, "the ability to change group norms" was included in their list of eight key characteristics. answer: False U01 - Q001 Carl Larson and Frank LaFasto describe principled leadership as the a bility of leaders to curb their own ego needs in favor of the group's goal. answer: True

U01 - Q005 Which of Maslow's Hierarchy of Needs is primarily met when a neighbor hood watch group forms to deter crime in the community? safety - self-actualizat ion - esteem - belongingness - physiological answer: safety U01 - Q006 Which of Maslow's Hierarchy of Needs is primarily met when someone jo ins an exclusive club or is elected as leader of a prestigious group? safety - s elf actualization - esteem - belongingness - physiological answer: esteem U01 - Q007 According to Maslow's Hierarchy of Needs, in what order do we satisfy the following needs? safety, self-actualization, esteem, belongingness, physiol ogical - self-actualization, esteem, safety, physiological, belongingness - este em, physiological, belongingness, self-actualization, safety - belongingness, ph ysiological, safety, self-actualization, esteem - physiological, safety, belongi ngness, esteem, self-actualization answer: physiological, safety, belongingness, esteem, self-actualization U01 - Q008 According to Schutz's FIRO Theory, a group member who feels accepted by the group is an? ideal social member. - undersocial member. - ideal personal member. - overpersonal member. - underpersonal member. answer: ideal social member. U01 - Q009 According to Schutz's FIRO Theory, if group members' affection needs are not met, they may become? undersocial or oversocial members. - abdicrats or autocratics. - ideal personal or ideal social members. - overpersonal or underpe rsonal members. - undersocial or underpersonal members. -

answer: overpersonal or underpersonal members. U01 - Q010 Control in a group refers to the? individual holding an official lead ership position. - individual holding an unofficial leadership position. - exten t to which members behave as though they know more than everyone else. - extent to which members feel competent, confident, and free to make their own decisions . - extent to which meetings stay on the agenda. answer: extent to which members feel competent, confident, and free to make thei r own decisions. U01 - Q011 When a group member exhibits a unique set of skills or behavioral pat terns that serve specific functions within the group, that member has assumed a( n) ___________. norm - role - autocratic function - abdicratic function - leader ship function answer: role U01 - Q012 _______________ functions describe group members who strive to get al ong and satisfy one another's needs while pursuing a shared goal. Self-centered - Task - Maintenance - Participation - All of the above answer: Maintenance U01 - Q013 _______________ functions describe negative roles in which individual needs are put ahead of both the group's goal and other members' needs. Self-cen tered - Task - Maintenance - Participation - All of the above answer: Self-centered U01 - Q014 "I will check our Affirmative Action Policy and see what it says abou t. . . ." This statement would most likely be made by a group member functioning in which of the following task roles? information seeker - information giver opinion seeker - opinion giver - clarifier-summarizer answer: information seeker U01 - Q015 All of the following functions are group task roles EXCEPT answer: compromiser. U01 - Q016 All of the following functions are group maintenance roles EXCEPT? ha rmonizer. - tension releaser. - gatekeeper. - observer-interpreter. - informati on giver. answer: information giver. U01 - Q017 R. Meredith Belvin's Team-Role Theory differs from the older Benne an d Sheats's role classifications in that Belvin's roles? apply to most groups reg ardless of their goal. - focus on how members interact with one another in a var iety of roles. - recognize that group members seek out and perform roles that ar e most natural to them. - apply to most groups regardless of their context. - in clude gatekeeper and harmonizer. answer: recognize that group members seek out and perform roles that are most na tural to them. U01 - Q018 According to Belvin's Team-Role Theory, which of the following roles describes a conscientious, methodical person who transforms group decisions into practical actions? harmonizer - implementer - shaper - gatekeeper - resource in vestigator answer: implementer U01 - Q019 "Maria, we haven't heard from you yet and want to make sure that ever yone gets a chance to weigh in on this issue. " This statement would most likely be made by a group member functioning in which of the following roles? harmoniz er - standard monitor - observer-interpreter - gatekeeper - procedural technicia n answer: gatekeeper U01 - Q020 "That's fine with me. Just tell me what to do." This statement would most likely be made by a group member functioning in which of the following role s? teamworker-follower - deserter - harmonizer answer: teamworker-follower U01 - Q021 If a group member says "That's a stupid idea. Think you could come up with anything better?" as a way of intimidating others, asserting authority, an d monopolizing discussion, which role is this person demonstrating? clown - tens ion releaser - dominator - recognition seeker - deserter answer: dominator

U01 - Q022 _____________ refers to the level of fear or anxiety associated with either real or anticipated communication with another person or persons. Self-co ncept - Feedback - Communication apprehension - Assertiveness - Confidence answer: Communication apprehension U01 - Q023 According to McCroskey's research, what percent of the general popula tion experiences very high levels of communication apprehension? 10% - 20% - 30% - 40% - 50% answer: 20% U01 - Q024 Which of the following descriptions is likely to be true of highly ap prehensive group members compared to low apprehensive members? Highly apprehensi ve members talk more in group discussions. - Highly apprehensive members are mor e likely to become group leaders. - Highly apprehensive members appear more conf ident. - Highly apprehensive members assert themselves and their beliefs. - High ly apprehensive members agree with others rather than voice disagreement. answer: Highly apprehensive members agree with others rather than voice disagree ment. U01 - Q025 Your textbook suggests all of the following strategies for reducing c ommunication apprehension in groups EXCEPT Realize that everyone experiences com munication apprehension. - Be well prepared. - Force yourself to speak as much a nd as often as you can to a variety of large and small audiences. - Substitute w orrisome, irrational thoughts about communicating with more positive thoughts. Take time to visualize yourself communicating effectively. answer: Force yourself to speak as much and as often as you can to a variety of large and small audiences. U01 - Q026 All of the following are means of providing constructive feedback EXC EPT Focus on the behaviors rather than the person. - Describe the behavior rathe r than judging it. - Provide observations rather than assumptions. - Choose an a ppropriate time and place. - Give feedback to advance your own goals. answer: Give feedback to advance your own goals. U01 - Q027 Cognitive restructuring is an anxiety reduction technique that involv es learning communication skills such as following an agenda, speaking clearly, and becoming more sensitive to feedback. - taking time to visualize yourself com municating effectively. - substituting worrisome, irrational thoughts about comm unicating with more positive thoughts. - relaxing physically in order to relax y our mind. - realizing that you are not the only person who gets nervous when cal led upon to speak in front of others. answer: substituting worrisome, irrational thoughts about communicating with mor e positive thoughts. U01 - Q028 Walther's theory of hyperpersonal communication in virtual groups ind icates that some members ask more personal questions of other group members. - a sk less personal questions of other group members. - are more confident in media ted settings than face-to-face meetings. answer: are more confident in mediated settings than face-to-face meetings. U01 - Q029 Group members with low levels of communication apprehension can help members with high apprehension reduce their level of fear and anxieties about co mmunicating by using all of the following strategies EXCEPT openly discuss a mem ber's apprehension with the entire group. - provide supportive and constructive feedback. - actively encourage and include anxious members in group discussions. - stop talking. answer: openly discuss a member's apprehension with the entire group. U01 - Q030 Assertiveness seeks an appropriate balance between answer: passivity and aggression. U01 - Q036 Compulsive talkers tend to answer: dominate discussions. U01 - Q037 All of the following are characteristics of passive (nonassertive) gr oup members EXCEPT answer: They feel a greater sense of power. U01 - Q038 All of the following are characteristics of aggressive group members EXCEPT answer: They are highly respected.

U01-Q045 All of the following are characteristics of passive-aggressive group me mbers EXCEPT answer: They usually follow through with promised contributions. U01-Q046 Mark agrees to take notes during an important meeting at which he disag rees with many group decisions. The group asks him to bring copies of the notes to the next meeting so that everyone has a written record of the discussion and group decisions. At the next meeting, Mark is absent. At the following meeting, he tells everyone that he's still working on the notes and may not have them for awhile. What sort of behavior does Mark exhibit? answer: passive aggression U04 - Q.043 Which of the following strategies and skill are effective when you n eed to and should say "No" to someone? answer: Don't say "Yes" or "No" until you hear and understand a specific request U04 - Q.044 Maslow's Hierarchy of Needs ranks critical needs in the following or der: physiological, safety, belongingness, esteem, and self-actualization. answer: True U04 - Q.047 Maslow's Hierarchy of Needs includes control, inclusion, and affecti on needs. answer: False U04 - Q.048 Maslow's most basic needs are physiological and safety needs. answer: True U04 - Q.049 When people join groups for the personal reward that comes with help ing others, they are satisfying Maslow's belongingness need. answer: False U04 - Q.050 Will Schutz's FIRO theory examines the impact of 3 interpersonal nee ds: the need for inclusion, control, and affection. answer: True U04 - Q.051 If Julie confides in and tries to become very close with every group member, she may be exhibiting behavior characteristic of an overpersonal member . answer: True U04 - Q001 An abdicrat is a group member whose control needs are met, who has no problem with power, and who is comfortable giving and taking orders. answer: True U04 - Q002 If Gabe tries to impress others with what and whom he knows and frequ ently attracts attention to compensate for feelings of inadequacy, he may be exh ibiting behavior characteristic of an overpersonal member. answer: False U04 - Q003 You can help satisfy a member's control need by giving that person re sponsibility for and leadership of a special project or a highly visible and imp ortant subcommittee. answer: True U04 - Q004 A member who seeks attention or tries to impress other members may ha ve a strong inclusion need. answer: True U04 - Q005 Group maintenance roles affect a group's ability to achieve its commo n goal by focusing on behaviors that help get the job done. answer: False U04 - Q006 An opinion seeker is fulfilling group maintenance roles. answer: False U04 - Q007 One group member can function effectively in several different roles at the same time. answer: True U04 - Q008 Benne and Sheats's roles include information seeker, energizer, harmo nizer, compromiser, aggressor, and clown. answer: True U04 - Q009 Belvin's team roles include information seeker, energizer, harmonizer , compromiser, aggressor, and clown. answer: False U04 - Q010 According to Belvin, a successful coordinator/chair role is filled by

a person who is calm, trusting, mature, confident, and decisive. answer: True U04 - Q011 According to Benne and Sheats, the gatekeeper of a group encourages q uiet members to speak and talkative members to stop speaking. answer: True U04 - Q012 Communication apprehension occurs only in a public speaking situation . answer: False U04 - Q013 The Personal Report of Communication Apprehension (PRCA) measures a r elatively permanent personality type that is unlikely to change significantly un less there is some type of effective intervention or training. answer: True U04 - Q014 As a result of talking less, apprehensive participants are often view ed as less confident, less assertive, and less responsible. answer: True U04 - Q015 Communication apprehension has significant effects on the amount of t alk, the content of communication, and the resulting perceptions of other group members. answer: True U04 - Q018 Group members who experience communication apprehension tend to speak less, agree with others rather than voice disagreement, and use more filler phr ases such as "well," "you know," and "uh." answer: True U04 - Q019 Richmond and McCroskey report that "almost 50% of the population repo rts being scared about communicating with a person or group at some point in the ir lives." answer: False U04 - Q020 Group members who speak more are often better liked than those who sp eak infrequently and are more likely to become a group's leader. answer: True U04 - Q021 Research has found that some people are more confident when communica ting online and in computer-mediated discussions than they are communicating fac eto- face with group members. answer: True U04 - Q022 The strategies of cognitive restructuring help highly apprehensive gr oup members communicate more confidently because they teach them important skill s for participating in a discussion. answer: False U04 - Q023 There is nothing a group can do to help members who suffer from high levels of communication apprehension. answer: False U04 - Q024 Assertiveness can help raise a group member's level of confidence and reduce communication apprehension. answer: True U04 - Q025 Aggressive communicators ask and answer questions without fear or hos tility and stand up for their beliefs even when others disagree. answer: False U04 - Q026 Passive group members are rarely satisfied with their group experienc es. answer: True U04 - Q027 Compulsive talkers try or tend to direct the course of a group's disc ussion and take charge of the group. answer: True U04 - Q028 Passive-aggressive group members often get their way by working again st or undermining other members behind their backs and by appearing to agree whi le privately planning an opposite action. answer: True U04 - Q029 Group member effectiveness increases as you move from passivity to as sertiveness and then decreases as you move beyond assertiveness into aggressiven ess.

answer: True U04 - Q030 When deciding how to say "No" to someone, make sure your statement is clear, as in "No, I'm not willing to take notes again." answer: True U04 - Q036 When analyzing and adapting group member diversity, you should consid er members' answer: all of the above U04 - Q037 During the 1990s, ______________ were the fastest growing racial/ethn ic group. answer: Hispanic/Latino Americans U04 - Q038 Which of the following groups would be considered a co-culture? answer: all of the above U04 - Q039 In the homogeneous ? heterogeneous group dialectic, homogeneous refer s to answer: a group composed of members who are the same or similar. U04-Q045 According to your textbook, there are 3 levels of diversity in every gr oup. Which of the following dimensions characterize the third (external) dimensi on? answer: education, religion, and income, U04-Q046 People who believe that their culture is better than other cultures or that their culture should be the role model for other cultures would be classifi ed as answer: ethnocentric. U05 - Q.043 People who have biased beliefs about group members that are not base d on direct experience and firsthand knowledge or have irrational feelings of di slike and even hatred for certain groups would be classified as answer: prejudiced U05 - Q.044 All of the following statements are characteristics of people who ha ve prejudices EXCEPT answer: They deny opportunities granted to certain groups of people such as empl oyment, equal rights, and housing. U05 - Q.047 Which of the following traits are included in the Big Five Personali ty Traits and in the Myers-Briggs Type Indicator? answer: extraversion U05 - Q.048 In dialectic terms, the opposite or counterpart of a Myers-Briggs ju dger is answer: a perceiver. U05 - Q.049 Oscar is very outgoing and tends to talk more than others during gro up discussions. He enjoys working in the group and encourages others to get invo lved. Which Myers-Briggs personality trait best describes Jasper? answer: extrovert U05 - Q.050 Wanda tends to focus on details of the group project. She prefers to concentrate on one task at a time. Of all the group members, Wanda may be the m ost practical and realistic. Which Myers-Briggs personality trait best describes Wanda? answer: sensor U05 - Q.051 Kim is people-oriented. She wants everyone in the group to get along . She often spends extra time helping other group members. Which Myers-Briggs pe rsonality trait best describes Kim? answer: feeler U05 - Q001 Dennis is always the most organized member of his group. He frequentl y encourages the group to plan ahead. He develops lengthy "To Do" lists of tasks for the group to follow. Which Myers-Briggs personality trait best describes De nnis? answer: judger U05 - Q002 Even when everyone else in the group is upset or confused, Anthony st ays cool, calm, and objective. He doesn't mind making tough decisions and can't understand why other group members get upset about things that are not relevant to the issue under discussion. In most situations, Anthony thinks it is more imp ortant to be right than liked. Which Myers-Briggs personality trait best describ

es Anthony? answer: thinker U05 - Q003 Reggie is highly structured and good at coordinating the group's work and keeping it organized. He never misses a deadline and expects others to do t he same. Which Myers-Briggs personality trait best describes Reggie? answer: judger U05 - Q004 Jason appears to be a very private person. He carefully thinks about what he is going to say before speaking. He enjoys the group but would prefer to work alone. Which Myers-Briggs personality trait best describes Jason? answer: introvert U05 - Q005 Which scholar(s) define(s) an intercultural dimension as an aspect of a culture that can be measured relative to other cultures? answer: Geert Hofstede U05 - Q006 Which of the following cultural dimensions is ranked very high in the United States? answer: individualism U05 - Q007 Which of the following groups of countries is the most collectivist? answer: Central and South America U05 - Q008 Collectivist cultures place greater value on answer: collaboration and cooperation. U05 - Q009 In high-context cultures, messages are answer: implicit. U05 - Q010 In cultures with high uncertainty avoidance, people answer: want predictability and clear rules of behavior. U05 - Q011 In ___________cultures, people are more dependent on language to expr ess what they mean. answer: low-context U05 - Q011 More monochronic cultures are in answer: northern Europe and North America. U05 - Q012 Which characteristics are common in monochronic time cultures? answer: Members like to concentrate on one job before moving to another. U05 - Q013 In cultures with masculine values, answer: all of the above are true U05 - Q014 According to Hofstede, the people of Japan, Venezuela, and Italy live in a(n) ________________ culture. answer: masculine U05 - Q015 People who share beliefs such as "It is the duck that squawks that ge ts shot," or "Seeing is better than hearing," would be characterized as members of a _______________ culture. answer: high-context U05 - Q016 According to Hofstede's dimensions of culture, which country is ranke d #1 in terms of masculine values? answer: Japan U05 - Q017 High uncertainty avoidance is characterized by beliefs that answer: deviant ideas and behavior should be suppressed. U05 - Q018 Which cultural dimension would be characterized by the following comp onents:(1) subordinates should be consulted; (2) privileges and status symbols a re frowned upon; (3) parents treat their children as equals; and (4) teachers ex pect students to express their opinions in class? answer: low power distance U05 - Q020 Which of the following statements would be made by someone from a low -context culture? answer: I like to be accurate, clear, and direct when I talk to others. U05 - Q021 In You Just Don't Understand, Deborah Tannen's two-world hypothesis c oncludes that answer: all of the above are true U05 - Q022 Your textbook urges both men and women to adapt to the opposite sex's way of thinking and making decisions by heeding all of the following recommenda tions EXCEPT answer: Women should avoid disagreeing and arguing with men.

U05 - Q023 All of the following communication behaviors are discussed in Cheris Kramarae's Muted Group Theory EXCEPT answer: Women should avoid challenging men in positions of power. U05 - Q024 Which generation is described as follows: they are confident and have high selfesteem, are collaborators who favor teamwork, and generally like keepi ng their career options open. answer: Millennials U05 - Q025 Which generation is described as follows: they are workaholics who ar e willing to challenge the status quo and are politically adept on the job. They believe that they are always right, but are willing to work hard to get what th ey want. answer: Boomers U05 - Q026 A 2007 study of college students investigating whether men or women t alk more found that answer: generally, men talk more than women. U05 - Q027 All of the following statements about religion are true EXCEPT answer: 1/2 of the world's population is Muslim. U05 - Q028 Which of the following religions is the oldest? answer: Judaism U05 - Q029 During the 1990s, the African American population increased 58%, and the European American population increased 48%. answer: False U05 - Q030 A culture is a learned set of shared interpretations about beliefs, v alues, and norms which affect the behaviors of a relatively large group of peopl e. answer: True U05 - Q036 American Indian tribes, African Americans, Hispanic/Latino Americans, Asian Americans, Arab Americans, Irish Americans, and members of large and smal l religious groups are all examples of co-cultures. answer: True U05 - Q037 The second layer of diversity depicted in your textbook represents in ternal dimensions over which you have no control such as religion, marital statu s, and educational background. answer: False U05 - Q038 4 barriers to working in diverse groups are ethnocentrism, stereotypi ng, prejudice, and discrimination. answer: True U05 - Q039 A study of college students in the 1990s found that African Americans were stereotyped as lazy and loud, and Jews were described as shrewd and intell igent. answer: True U05-Q045 Ethnocentrism is a generalization about a group of people that oversimp lifies their characteristics. answer: False U05-Q046 Discrimination describes how we act out and express prejudices. answer: True U06 - Q.043 Stereotypes often lead to prejudices. answer: True U06 - Q.044 Prejudices are based on extensive and direct experience as well as p ersonal, firsthand knowledge about a group of people. answer: False U06 - Q.047 Scott Page, a political scientist at the University of Michigan, con cludes that "intelligence alone is the most important factor in guaranteeing a g roup different perspectives on a problem." answer: False U06 - Q.048 The Myers-Briggs Type Indicator looks at the different ways in which people p refer to use their minds: specifically, the way they perceive and the way they make judgments. answer: True U06 - Q.049 In group discussions, introverts find it hard to both absorb all the

information and formulate an opinion about it. answer: True U06 - Q.050 According to the Myers-Briggs Type Indicator, sensor is the opposite personality trait preference of intuitive. answer: True U06 - Q.051 Sensor personalities in the Myers-Briggs typology prefer to deal wit h details. answer: True U06 - Q001 According to the Myers-Briggs Type Indicator, perceivers value flexib ility, dislike deadlines, and often do their work at the last minute. answer: True U06 - Q002 The ideal group would be composed of members who represent the MyersBriggs personality type of extroverted thinker. answer: False U06 - Q003 Edward Hall's work on cultural differences identifies 2 dimensions th at characterize cultural groups: uncertainty avoidance and masculine-feminine va lues. answer: False U06 - Q004 4 of Geert Hofstede's cultural dimensions are individualism-collectiv ism, power distance, uncertainty avoidance, and masculine-feminine values. answer: True U06 - Q005 To someone from a collectivist culture, a U.S. communicator's style a nd behavior may be viewed as selfish, arrogant, antagonistic, power-hungry, ruth less, and impatient. answer: True U06 - Q006 In collectivist cultures, there is greater readiness to cooperate wit h group members. answer: True U06 - Q007 About 70% of the world's population regards independence and individu alism as a more important value than collectivism. answer: False U06 - Q008 Low power distance cultures include those in Israel, New Zealand, and Denmark. answer: True U06 - Q009 In low power distance cultures, members accept major differences in p ower as normal, assuming that all people are not created equal. answer: False U06 - Q010 The way in which Japanese people bow to one another in a face-to-face greeting demonstrates how the culture expresses power distance. answer: True U06 - Q011 Group members with more feminine cultural values may be highly effect ive and supportive but are less likely to achieve a real voice or influence in g roup decision making or leadership. answer: True U06 - Q012 Members of a high-context culture tend to speak more, speak louder, a nd speak more rapidly than people from a low-context culture. answer: False U06 - Q013 Germans represent people from a low-context culture. answer: True U06 - Q014 Polychronic time people are frequently late for appointments or may n ot show up at all. answer: True U06 - Q015 People in polychronic cultures usually adhere to plans, schedules, an d deadlines because time is valuable. answer: False U06 - Q017 People from low-context cultures may prefer more information-rich tec hnologies(such as videoconferences), as well as those that offer the feeling of social presence. answer: False U06 - Q018 Books such as Men Are from Mars, Women Are from Venus have perpetuate

d stereotypes that cause harm to both men and women, including women's opportuni ties in the workplace, couple conflict and communication, and selfesteem problem s among teenagers. answer: True U06 - Q019 Research in group communication claims that some female members feel undervalued or invisible when working with male group members. answer: True U06 - Q020 In light of Myers-Briggs personality traits, women will be more succe ssful in groups if they do not use sarcasm with male members or tell them that t hey're illogical. answer: False U06 - Q021 In light of Myers-Briggs personality traits, women may be more effect ive by asking men what they think rather than what they feel. answer: True U06 - Q022 Cheris Kramarae's Muted Group Theory claims that those with power in a society "mute" the voices of women, the poor, and other minority groups. answer: True U06 - Q023 In general, women talk more than men do. answer: False U06 - Q024 Generation Xers or the Generation X are confident and have high selfesteem. They like to collaborate and favor teamwork. answer: False U06 - Q025 Baby Boomersthe workaholic generationare often adept when it comes to n avigating political minefields in the workplace. answer: True U06 - Q026 Religious literacy requires the ability to understand and use the rel igious terms, symbols, images, beliefs, practices, scripture, heroes, themes, an d stories that are employed in American public life. answer: True U06 - Q027 Islam is older than Judaism. answer: False U06 - Q028 Members of the Christian Scientist religious group believe that disea se is a delusion of the carnal mind that can be cured by prayer. answer: True U01 - Q.043 At the end of every month, a sales manager offers a cash bonus to th e most successful salesperson. What type of power is this leader using? answer: reward power U01 - Q.044 A supervisor threatens to dismiss any member of the sales team who d oes not meet the sales quota by the end of the quarter. What type of power is th is leader using? answer: coercive power U01 - Q.047 You have been promoted to a management position at work. You expect employees to fulfill your requests because you are the boss. What type of power is this? answer: legitimate power U01 - Q.048 Dianna has been elected as leader of the research group because she has published more than any other team member on the research topic. What type o f power is this? answer: informational power U01 - Q.049 Which category of power is operating when a group member nominates s omeone as a leader by saying, "I recommend that Romero be appointed chair of the building committee given his extensive experience as a successful contractor"? answer: expert power U01 - Q.050 Your group has chosen Madeleine as its leader because she has demons trated strong organizational and problem-solving skills as well as a talent for motivating members and resolving conflict. What type of power does Madeleine hav e? answer: referent power U01 - Q.051 The Center for Business Ethics at Bentley College poses all of the f ollowing questions to help leaders decide whether their behavior is ethical EXCE

PT answer: Do you avoid expressing your own opinions to make sure that they do not. how group members think and act? U01 - Q001 When designated leaders are "plucked from a group in order to lead," they should answer: iscuss ground rules for interaction while assuring group members of . fr iendship. U01 - Q002 All of the following behaviors are recommended strategies for becomin g an emergent group leader EXCEPT answer: Avoid expressing your own opinion U01 - Q003 Trait Leadership Theory, also known as the "Great Man" theory, conten ds that answer: leaders are born, not made U01 - Q004 Vu tries to maintain strict control over the Spring Festival Planning Committee. He insists on determining the direction and outcome of the committee 's discussion. According to Styles Leadership Theory, which leadership style is Vu using? answer: autocratic U01 - Q005 As chairperson of the PTA's election committee, Vicky believes in pra cticing social equality. She shares decision making with the group. According to Styles Leadership Theory, which leadership style is Vicky using? answer: democratic U01 - Q006 Even though Wayne is chairperson of the finance committee, he does li ttle or nothing to help the group. He tends to let the group take charge of its decisions and actions. Which leadership style is Wayne using? answer: laissez-faire U01 - Q007 Autocratic leaders answer: Both b and c U01 - Q008 Laissez-faire leaders answer: all of the above U01 - Q009 Which theory of leadership explains how leaders can become more effec tive once they have carefully analyzed themselves, their groups, and the circums tances in which they must lead? answer: situational theory U01 - Q010 If "task-motivated" describes your leadership style, Fiedler's Contin gency Model of Leadership Effectiveness predicts that you will be least successf ul when answer: you have a moderate degree of power and task structure U01 - Q011 Fred Fiedler's Contingency Model of Leadership Effectiveness contends that the 3 important dimensions in every leadership situation are answer: leader-member relations, task structure, and the leader's amount of powe r U01 - Q012 Fred Fiedler's Contingency Model of Leadership Effectiveness claims t hat relationship-motivated leaders answer: may do all of the above U01 - Q013 According to Fiedler's Contingency Model of Leadership Effectiveness, which of the following situations is the best match for a relationship-motivate d leader? answer: There are moderately good leader-member relationships, a moderately . k, and a moderate amount of power. U01 - Q014 According to the Hersey-Blanchard Situational Leadership Model, as a group's readiness increases, leaders should move through 4 different leadership behaviors. Which answer depicts the order in which these behaviors usually occur ? answer: tell, sell, participate, delegate U01 - Q015 According to the Hersey-Blanchard Situational Leadership Model, a lea der should try to ____________ when group members are able as well as willing an d confident. answer: delegate

U01 - Q016 The participating stage in Hersey-Blanchard's Situational Leadership Model is similar to Tuckman's _________ stage of group development answer: performing U01 - Q017 All of the following characteristics distinguish transformational lea dership EXCEPT answer: experience. U01 - Q018 The 5M Model of Leadership Effectiveness focuses on all of the follow ing interdependent leadership functions EXCEPT answer: mediating conflict. U01 - Q019 Modeling leadership behavior in the 5M Model of Leadership Effectivne ss includes all of the following strategies EXCEPT answer: maintaining control at all times U01 - Q020 According to the 5M Model of Leadership Effectiveness, all of the fol lowing items are characteristic of effective decision making by group leaders EX CEPT answer: the ability to identify and make popular decisions U01 - Q021 As the group's leader, Grace makes sure that everyone in her group is committed to the group's common goal. She also helps solve interpersonal proble ms and conflicts, recognizing outstanding group work. Which of the following lea dership functions in the 5M Model of Leadership Effectiveness does Grace's behav ior exemplify? answer: Motivating members U01 - Q022 Raphael has been assigned the leadership task of managing an office i n which most of the employees are young or new to the company. He decides that w hen problems or setbacks occur, he will not blame the group or its members. Inst ead, he will use the situation as a teachable moment and make sure that members accept personal responsibility for a problem and its consequences. He will also look for situations in which group members can assume leadership responsibilitie s. Which of the following leadership functions in the 5M Model of Leadership Eff ectiveness does Raphael's behavior exemplify? answer: Mentoring members U01 - Q023 Research verifies all of the following conclusions about women and le adership EXCEPT answer: women who act "ladylike" are viewed as much more effective than women U01 - Q024 Jim Collins, author of Good to Great, claims that unless you are will ing to keep your ego in check for the sake of the group, you won't be an effecti ve leader. In other words, you must seek a balance between answer: professional will and personal humility U01 - Q025 Members from uncertainty avoidance cultures prefer answer: more structure and instructions from a leader. U01 - Q026 A leader who prefers a democratic approach to decision making and lea dership may frustrate members who come from a(n) ____________ culture. answer: high power distance. U01 - Q027 All groups need leadership answer: True U01 - Q028 Whereas managers focus on effectiveness, leaders are concerned with e fficiency answer: False U01 - Q029 Bennis and Nanus claim that power is the quality without which leader s cannot answer: True. U01 - Q030 Position power includes reward and coercive power whereas personal le adership power includes legitimate and informational power. answer: False U01 - Q036 Legitimate power is role model powerthe ability to influence that aris es when one person admires another. answer: False U01 - Q037 According to researchers, reward, legitimate, and coercive power are less effective than referent and expert power answer: True

U01 - Q038 Coercive power can be effective when group members are aware of the l eader's expectations and are warned in advance about the penalties for failing t o comply answer: True U01-Q045 A designated leader is selected by group members or by an outside autho rity answer: True U01-Q046 According to the Center for Business Ethics, an ethical leader would by pass a competent person in order to promote a less competent relative or close f riend answer: False U04 - Q.043 If you want to emerge as the leader of a group, you should talk firs t and more often than other members. answer: True U04 - Q.044 When someone from within a group is appointed as its leader, the new leader should openly discuss leadership and seek members' help in resolving pot ential problems. answer: True U04 - Q.047 Traits Leadership Theory assumes that leaders are made, not born answer: False U04 - Q.048 Autocratic leaders may be effective during a serious crisis when the re's not enough time to hold a group discussion answer: True U04 - Q.049 According to Styles Leadership Theory, the democratic leadership sty le is always best. answer: False U04 - Q.050 Laissez-faire leaders may have power, but they hesitate to exert the ir influence on group members and group work. answer: True U04 - Q.051 In mature and highly productive groups, a laissez-faire leader may b e a good match for the group answer: True U04 - Q001 Functional Leadership Theory claims that an effective group can have more than one member serving in a leadership role answer: True U04 - Q002 According to Fiedler's Contingency Model of Leadership Effectiveness, relationship-motivated leaders perform best in extremessuch as when the situatio n is highly controlled or when it is almost out of control answer: False U04 - Q003 According to Fiedler's Contingency Model of Leadership Effectiveness, taskmotivated leaders gain satisfaction from completing a task even if the cost is bad feelings between the leader and group members answer: True U04 - Q004 Fiedler's Contingency Model of Leadership Effectiveness claims that t here are 2 important dimensions to every leadership situation: the level of lead er charisma and the level of leader power answer: False U04 - Q005 According to Hersey and Blanchard, "member readiness" refers to the e xtent to which members are willing and able to work together answer: True U04 - Q006 According to Hersey and Blanchard's Situational Leadership Model, a l eader should tell a group what to do and closely supervise its work when members are able but not unwilling or insecure answer: False U04 - Q007 Hersey and Blanchard's selling stage of leadership is similar to Tuck man's storming stage of group development answer: True U04 - Q008 Charismatic leaders rely on reward, coercive, and legitimate power. answer: False U04 - Q009 Transformational leaders help members understand the need for change,

both emotionally and intellectually answer: True U04 - Q010 The 5M Model of Leadership Effectiveness divides leadership tasks int o 5 interdependent leadership functions: (1) Model leadership behavior; (2) Moti vate members; (3) Manage the group process; (4) Make decisions; and (5) Mentor m embers answer: True U04 - Q011 In the 5M Model of Leadership Effectiveness, leaders Manage group pro cess by organizing and fully preparing for group meetings and work sessions answer: True U04 - Q012 According to the 5M Model of Leadership Effectiveness, effective lead ers explain the rationale or reasons for the decisions they make answer: True U04 - Q013 Women are less likely than men to be preselected as leaders answer: True U04 - Q014 Multiple leaders are the exception rather than the rule in virtual gr oups answer: False U04 - Q015 Research indicates that there are only slight differences in the beha vior and style of male and female leaders answer: True U04 - Q018 In his book, Good to Great, Jim Collins claims that effective leaders act modestly, do not boast, and shun public glorification. answer: True U04 - Q019 In his book, Good to Great, Jim Collins claims that effective leaders do what needs to be done to achieve the group's goal in order to win public fam e and fortune. answer: False U04 - Q020 Leaders can motivate members from collectivist cultures by helping me mbers achieve personal goals and high status positions answer: False U04 - Q021 Group members from uncertainty avoidance cultures want more structure and instruction from a leader. answer: True U04 - Q022 A leader who prefers a democratic approach to decision making may fru strate members who come from high power distance cultures. answer: True U04 - Q023 In order to achieve an optimal group experience, which of the followi ng dialectic tensions should a group negotiate to achieve a both/and resolution? answer: all of the above U04 - Q024 Which of the following group dialectics is MOST applicable in Chapter 6, "Group Motivation"? answer: engaged ? disengaged U04 - Q025 For the purpose of discussing group motivation, Maslow's 5 needs can be divided into 2 categories: satisfiers and motivators. Which one of the following needs w ould be classified as a satisfier rather than a motivator? answer: safety needs U04 - Q026 Which 2 of Maslow's needs would be classified as satisfiers rather th an motivators? answer: physiological and safety needs U04 - Q027 Which of Maslow's needs can a group meet if it deliberately limits it s membership to carefully selected, notable individuals? answer: esteem needs U04 - Q028 Which of the following strategies is most likely to motivate group me mbers with strong inclusion needs? answer: Tell them how valuable they are to the group U04 - Q029 Expectancy-Value answer: explains why the probability of achieving a goal is as important as the

goal itself. U04 - Q030 Which theory would explain why even when a goal is highly valued (bec oming a billionaire or dancing with the stars), you may not be highly motivated to pursue that goal if the chance of reaching it is very small? answer: Expectancy Value Theory U04 - Q036 In terms of the 8 basic Myers-Briggs types, which of the following st rategies is most likely to motivate an intuitive? answer: Encourage visioning, creativity, and brainstorming U04 - Q037 In terms of the 8 basic Myers-Briggs types, which of the following st rategies is most likely to motivate an introvert? answer: Provide thinking time before and during discussionsorganizations have de veloped their own approach to software development. U04 - Q038 Group members' Myers-Briggs types affect their beliefs about and beha vior in groups. Which of the following beliefs would be characteristic of a perc eiver? answer: Groups need freedom to examine multiple options during a discussion U04 - Q039 Kenneth Thomas describes 4 categories of intrinsic motivation needed to energize and reinforce work. They are answer: meaningfulness, choice, competence, and progress U04-Q045 In terms of Thomas's 4 categories of motivators, you can promote a sens e of meaningfulness by answer: volunteering for worthwhile group tasks that interest you U04-Q046 Which of the following strategies can help you motivate other members b y promoting a sense of choice in your group? answer: Seek and take advantage of new opportunities U05 - Q.043 Which of the following motivational strategies can help you promote a sense of progress in your group? answer: Recognize and celebrate group accomplishments U05 - Q.044 The most visible symptom of an unmotivated group is answer: apathy U05 - Q.047 Which of the following strategies is NOT an effective tool for motiv ating virtual groups? answer: Let the group create its own agenda U05 - Q.048 Controlling feedback answer: tells members what to do. U05 - Q.049 All of the following guidelines can help you use "it" statements to provide informative feedback EXCEPT answer: "It" statements provide your personal opinion about a member of the grou p U05 - Q.050 A reprimand can best be described as answer: a form of feedback that identifies deficiencies U05 - Q.051 Before reprimanding a group member or a group as a whole, be sure yo u can answer all of the following questions EXCEPT U05 - Q002 Which of the following statements about the value of extrinsic reward s is the most accurate? answer: They are granted by supervisors rather than group members U05 - Q003 A survey examining employee turnover found that the chief reason peop le give for leaving a job is related to answer: the need for praise and recognition U05 - Q004 Leaders with ________________ power are more likely to motivate their members. answer: referent and persuasive U05 - Q005 The textbook suggests 4 criteria for developing a reward system for g roups. Which answer reflects those criteria? answer: fair; equitable; competitive; appropriate U05 - Q006 The textbook suggests 4 criteria for punishing a group member. Which answer reflects these criteria? answer: predictable; immediate; consistent; impersonal

U05 - Q007 Which of the following statements is most accurate about using punish ment as a motivational tool? answer: It does not motivate U05 - Q008Suppose someone tells your group "If you finish this eighteen-month pr oject on time, I'll send each of you a person thank-you note. " According to you r textbook, this reward is not based on well-conceived, objective criteria. In t his case, the reward is not answer: appropriate. U05 - Q009 In order to achieve an optimal group experience, groups must negotiat e several dialectic tensions such as engaged ? disengaged and task dimensions ? social dimensions. answer: True U05 - Q010 Motivation recognizes and financially compensates group members for w ork well done answer: False U05 - Q011 Maslow's belongingness, esteem, and self-actualization needs are clas sified as motivators rather than satisfiers answer: True U05 - Q011 Money can satisfy deficiency needs, but it will not necessarily motiv ate a group or its members to work harder or better answer: True U05 - Q012 Meeting Maslow's self-actualization needs can motivate group members when they provide prestige, status, and a sense of achievement answer: False U05 - Q013 According to Schutz's FIRO Theory, if you know that some group member s have an unmet inclusion need, you can motivate them by asking them to particip ate more actively and telling them how valuable they are to the group answer: True U05 - Q014 Brainstorming often works best in a high-inclusion, low-control atmos phere answer: True U05 - Q015 In Myers-Briggs terms, thinkers should be thanked for their analysis but also reminded that logical decisions impact real people answer: True U05 - Q016 In Myers-Briggs terms, you can motivate intuitives by providing a det ailed agenda, firm deadlines, and clear standards and expectations for success answer: False U05 - Q017 You can motivate judgers by assuring them that they will be given opp ortunities to reconsider all decisions and make midcourse adjustments whenever n eeded answer: False U05 - Q018 Group members from low-context cultures often complain that they neve r receive praise or rewards when, in fact, they are highly respected and valued by others answer: True U05 - Q020 Members from polychronic time cultures are motivated in groups that c oncentrate on a specific task or goal and that meet their deadlines answer: False U05 - Q021 When groups experience apathy, intrinsic motivatorssuch as a sense of meaningfulness and progressare minimal or missing answer: True U05 - Q022 In order to motivate the members of virtual groups, provide a detaile d agenda well in advance of a scheduled meeting, along with any resources and on line documents needed for the meeting answer: True U05 - Q023 In order to motivate members of virtual groups, insist that all membe rs stay online throughout the meeting regardless of the issues being discussed answer: False U05 - Q024 Informational feedback tells people what to do whereas controlling fe edback tells people how they are doing

answer: False U05 - Q025 When providing informational feedback to group members, "it" statemen ts focus more on personal traits of individual group members than on the task answer: True U05 - Q026 When providing informational feedback to group members, "it" statemen ts avoid using the word "you" when describing individual or group behavior answer: Feasibility study report document U05 - Q027 Reprimands motivate because they threaten to withhold valued extrinsi c rewards answer: False U05 - Q028 For the most part, extrinsic rewards do not motivate groups to work t ogether in pursuit of a shared goal answer: True U05 - Q029 Completing a challenging group project can provide intrinsic rewards answer: True U05 - Q030 One study examining employee turnover found that the chief reason peo ple give for leaving a job is the lack of intrinsic rewards answer: True U05 - Q036 Groups or leaders with the power to reward members should make sure t he rewards are fair, equitable, competitive, and appropriate answer: True U05 - Q037 Leaders with referent and informational power are least likely to mot ivate their group members answer: False U05 - Q038 If each group member does not have an equal opportunity to earn rewar ds, the group may become less productive answer: True U05 - Q039 Researchers have found that high-performing groups participate in a w ide variety and frequency of celebrations where recognition and appreciation is expressed answer: True U05-Q045 The highest-performing managers show more warmth, fondness, and affecti on towards others than do the bottom 25% of managers answer: True U05-Q046 If you and your group decide that someone deserves to be punished, the punishment should be unpredictable, gradual, and personal answer: False U06 - Q.043 Punishmentsubjecting members to a penalty or negative consequencedoes not motivate answer: True U06 - Q029 __________ is the ability to understand, analyze, respect, and respon d to the meaning of another person's spoken and nonverbal messages. answer: Listening U06 - Q030 Studies have found that listening occupies _______________ of a colle ge student's communicating time. answer: more than 50% U06 - Q036 Several studies report that without listening training, most people l isten at ______ efficiency. answer: 25% U06 - Q037 Unlike working memory theory, short-term memory answer: helps you remember about 7 (plus or minus 2) different items or bits of information at one time. U06 - Q038 Researchers conclude that of the total time most people spend communi cating in a given day, they spend about ________% of that time listening. answer: 4070 U06 - Q039 Stephen Covey, author of The 7 Habits of High Effective People, uses listening to illustrate the 3 components of an effective habit. According to Cov ey, which of the following answers is a critical component of an effective liste ning habit? answer: desire

U06 - Q040 Suppose your group suggests having a meeting on Saturday morning. Nic ole seems upset. You want to understand how she feels about the proposed meeting . When she explains her concerns, you should focus your efforts on answer: empathic listening. U06-Q045 Two committee members make significantly different recommendations for the date and format of the company's annual picnic. Which type of listening will help you decide which suggestion to support? answer: analytical listening U06-Q046 What type of listening is most appropriate when you want to acknowledge a member's effective language skills, use of humor, or skillful presentation of arguments? answer: appreciative listening U08 - Q.043 What type of listening is most appropriate when you want to accurate ly understand the meaning of group members' spoken and nonverbal messages? answer: comprehensive listening U08 - Q.044 What type of listening is most appropriate when you want to form app ropriate opinions about the content of a message? answer: analytical listening U08 - Q.047 What type of listening is most appropriate when you want to understa nd and identify a person's feelings or motives? answer: empathic listening U08 - Q.048 What type of listening is so essential that it forms the basis for t he other 4 types of listening? answer: discriminative listening U08 - Q.049 You can become a more empathic listener by answer: doing all of the above. U08 - Q.050 You can become a more effective analytical listener by answer: evaluating the quality of arguments and evidence. U08 - Q.051 You can become a more effective appreciative listener by answer: all of the above U08 - Q001 Task-oriented members tend to be particularly effective at answer: comprehensive and analytical listening. U08 - Q002 Maintenance-oriented members tend to be particularly effective at answer: empathic and appreciative listening. U08 - Q003 All of the following behaviors are examples of self-centered listenin g EXCEPT answer: listening to evaluate the quality of arguments and evidence used by othe rs. U08 - Q004 All of the following answers describe the strong link between listeni ng skills and successful leadership EXCEPT answer: Leaders interrupt members who talk too much to ensure that everyone gets an equal chance to speak and listen. U08 - Q005 Good listeners use their extra thought speed productively. They do al l of the following EXCEPT answer: Listen exclusively for specific facts and statistics. U08 - Q006 Identify the negative listening attitude that does not follow the Gol den Listening Rule. answer: superior U08 - Q007 When Ralph Nichols wrote "We must always withhold evaluation until ou r comprehension is complete," which listening strategy was he describing? answer: listen before you leap U08 - Q008 Which of the follow listening strategies would you be using if you as ked "Am I right in saying that all of us agree to meet on Saturday to finish the project?" answer: help your group listen U08 - Q009 Which of the following statements is NOT a characteristic of effectiv e paraphrasing? answer: It is the ability to repeat what a person has said. U08 - Q010 ______________refers to the degree to which you match the importance of and emotions in the speaker's message in your response.

answer: Paraphrasing depth U08 - Q011 Suppose Julia says, "Among all the other things I worry about, I have an important exam coming up and I fear that, given my busy schedule, I won't ha ve enough time to study." Responding with, "You seem to be very upset about doin g well on the exam" would be an inaccurate paraphrase because answer: it responds to only one example, instead of responding to Julia's larger problem of coping with a busy schedule. U08 - Q012 Differences in personality types may affect the way group members lis ten. Which of the Myers-Briggs personality types may be the best comprehensive l isteners in a group? answer: introverts U08 - Q013 A study of ways in which the college students from different cultures listen concludes that ________ students are less willing and less patient liste ners than students from other cultures. answer: U.S. American U08 - Q014 Your textbook describes the dilemma students face when taking notes d uring a discussion or in the classroom. Which of the following statements best d escribes this dilemma? answer: The value of notes decreases as the volume of your notes increase. U08 - Q015 All of the following questions can help you assess your internal thou ght processes as you listen EXCEPT answer: How can I interrupt to comment on what I'm hearing? U08 - Q016 Listening is the same thing as hearing. answer: False U08 - Q017 Listening is our number one communication activity. answer: True U08 - Q018 Effective listeners make themselves listen even when the topic or mem bers' comments are boring. answer: True U08 - Q019 The social pressure to listen is greater in groups than it is in a co nversation with just one person. answer: False U08 - Q020 Your textbook describes a study in which personnel managers identifie d effective listening as the most important communication skill needed by their employees. answer: True U08 - Q021 According to your textbook, people without listening training listen at only 25% efficiency. answer: True U08 - Q022 Working memory functions to help people remember a series of numbers, words, sentences, or paragraphs immediately after hearing them. answer: False U08 - Q023 Of the total time we spend communicating, about 2035% of that time is spent listening. answer: False U08 - Q024 Of the total time we spend communicating, about 1020% of that time is spent reading. answer: True U08 - Q025 Stephen Covey, author of The 7 Habits of Highly Effective People, def ines a habit as a practice requiring knowledge, skills, and desire. answer: True U08 - Q026 Discriminative listening reveals prejudices that impair our ability t o listen effectively to others. answer: False U08 - Q028 You can enhance listening comprehension by asking good questions duri ng a discussion. answer: True U08 - Q029 Effective comprehensive listeners ask themselves, "Can I accurately i dentify the main ideas and evidence used to support a group member's claims?" answer: True

U08 - Q031 Effective analytical listeners ask themselves, "Are group members' cl aims valid and based on logical reasoning?" answer: True U08 - Q036 Evaluating evidence while it is being presented interferes with good listening skills. answer: False U08 - Q037 Effective empathic listeners welcome opportunities to hear something new or challenging and pay special attention to the eloquence of a member's word s. answer: False U08 - Q038 Members who excel in task and maintenance roles are often skilled lis teners. answer: True U08 - Q039 Members who assume self-centered group roles may be excellent listene rs. answer: True U08-Q045 Effective leaders fake attention when listening to others as a way of s howing that they are interested in all members and their comments. answer: False U08-Q046 Most people can speak much faster than they can think. answer: False U11 - Q.043 Thought speed is the speed (in words per minute) that most people ca n think compared to the speed at which others can speak. answer: True U11 - Q.044 The Golden Listening Rule is: speak unto others as you would have th em speak to you. answer: False U11 - Q.047 According to your textbook, it may be easier to "listen" to group me mbers in a text-based virtual meeting than in a face-to-face setting. answer: True U11 - Q.048 If Will asks, "Could you help me out and summarize your point in a c ouple of sentences?" he is using the listening strategy referred to as listen fo r big ideas. answer: True U11 - Q.049 You can help your group by regularly interrupting a group discussion to remind everyone that it's important to listen well. answer: False U11 - Q.050 Active listeners often have higher blood pressure, a higher pulse ra te, and perspire more than members who are passive listeners. answer: True U11 - Q.051 Paraphrasing is a form of feedbacka listening checkthat asks, "Am I ri ghtis this what you mean?" answer: True U11 - Q001 According to your textbook, the phrasing of an effective paraphrase c an vary in 3 critical ways: knowledge, emotion, and desire. answer: False U11 - Q002 In general, women are more likely to listen to the content of what is said, while men tend to focus on the relationships among speakers. answer: False U11 - Q003 The Myers-Briggs Type Indicator predicts that introverts will be bett er comprehensive listeners than extroverts. answer: True U11 - Q004 One study concludes that international students see U.S. students as being more willing and more patient as listeners than students from African, Asi an, South American, or European cultures. answer: False U11 - Q005 Ralph Nichols notes that the volume of notes taken increases their va lue to the note taker. answer: False U11 - Q006 Good listeners adjust their note-taking system to a group's agenda or

impose a note-taking pattern on a disorganized discussion. answer: True U11 - Q007 "Do members seems to be listening to me or do I seem to be talking to a blank wall?" is a question that can help you translate member feedback into u seful information about the way you speak. answer: True U11 - Q008 You can engage in useful self-listening by asking yourself, "What do I really want to say to this member or the group?" and then saying it. answer: False U09 - Q.01 The members of a civic association's committee on community safety di sagree on whether to install more expensive street lighting throughout the devel opment. What type of conflict is the group experiencing? answer: substantive U09 - Q.01 The members of a civic association committee charged with addressing safety issues in the community disagree over whether to begin by surveying resid ents about their safety concerns or to start by consulting local law enforcement for safety suggestions. What type of conflict is the group experiencing? answer: procedural U09 - Q.01 Joe gets angry with Delores during a committee meeting because she in terrupts his remarks and suggests that his ideas are a waste of time. What type of conflict is occurring in this situation? answer: affective U09 - Q.01 Attribution Theory is useful in explaining the sources of group confl ict. All of the following answers are examples of how attributions can prompt an ger among group members EXCEPT answer: What other members do seems to reflect member needs U09 - Q.01 Which of the following statements characterizes constructive conflict ? answer: Members focus on the issues U09 - Q.01 You can help promote constructive conflict by abiding by all of the f ollowing principles EXCEPT answer: Members encourage tough competition among one another in order to make d ecisions U09 - Q.01 Which of the following suggestions can help you apologize to a group when an apology is appropriate? answer: Follow through on any promises to correct the situation U09 - Q.01 When a member is more concerned with his or her own goals than meetin g the needs of the group, which conflict style is the member using? answer: competition U09 - Q.01 Which conflict style would be appropriate if the issue is very import ant to others but is not very important to you; you realize that you are wrong o r that you have changed your mind; it is more important to preserve group harmon y than resolve the issue? answer: accommodation U09 - Q.01 Some club members want to increase membership dues by $7.00. Other cl ub members want to increase them by $3.00. They have reached an impasse on the i ssue, so they decide to split the difference and raise the dues by $5.00. What t ype of conflict style did the group use? answer: compromise U09 - Q.01 Which conflict style has a high concern for group goals and a low con cern for the member's personal goals? answer: accommodation U09 - Q.01 Family members disagree about where to go for a vacation this year. S ome members want a location where there will be a lot to do. Other members just want to relax. They discuss many possible sites before deciding on a cruise. They agr ee that a cruise offers opportunities for both relaxation and recreation. Which approach to conflict did this family use? answer: collaboration U09 - Q.01 Nang tries to change the subject whenever group members argue. She al

so refuses to comment on controversial issues. What conflict style does Nang use ? answer: avoidance U09 - Q.01 When a member gives in to others at the expense of his or her own goa ls, what conflict style is the member using? answer: accommodation U09 - Q.01 When a member searches for new solutions that will achieve both the i ndividual goals of group members and the group goals, what conflict style is the member using? answer: collaboration U09 - Q.01 When a member concedes some goals in order to achieve others, what co nflict style is the member using? answer: compromise U09 - Q.01 When a member attempts to change the topic, which conflict style is a member using? answer: avoidance U09 - Q.01 Which dialectic tension is represented in the 5 traditional conflict styles: accommodation, avoidance, collaboration, competition, and compromise? answer: concern for personal goals ? Concern for group goals U09 - Q.01 When face-to-face interaction is not convenient or possible, which of the following communication technologies is best suited for groups dealing with conflict? answer: videoconferences U09 - Q.01 Your textbook offers all of the following guidelines for making an ef fective apology EXCEPT answer: Explain why your actions are justified U09 - Q.01 What do the 4Rs stand for in the 4Rs Method of Analyzing a Conflict? answer: Reasons, Reactions, Results, Resolution U09 - Q.01 Which of the following is NOT part of the 4R method of Conflict Manag ement? answer: Reinterpretation U09 - Q.01 If you assume that group members mean well and you feel free to expre ss your feelings and ideas to others, you are on your way to dealing with confli ct using answer: the A-E-I-O-U Model U09 - Q.01 Which method of conflict resolution employs the services of an impart ial third party for the purpose of guiding, coaching, and encouraging the disput ants toward agreement? answer: mediation U09 - Q.01 Which of the following conflict management methods is expressed as "W e should express our concerns about the conflict and suggest a solution"? answer: the A-E-I-O-U Model U09 - Q.01 Mediation experts Stephen Littlejohn and Kathy Domenici suggest the f ollowing strategies for resolving conflict constructively EXCEPT answer: Show strength and conviction by supporting your own position U09 - Q.01 Which of the following elements in the Harvard Negotiation Project's principled negotiation process asks a group to seek fair standards for resolving a conflict or choosing an option? answer: criteria U09 - Q.01 All of the following behaviors are more characteristic of the ways in which women respond to conflict EXCEPT answer: Women are more likely to address conflict privately rather than in front of the entire group U09 - Q.01 When helping group members from collectivist cultures maintain and sa ve "face", you should keep in mind all of the following perspectives about confl ict and "face" EXCEPT answer: In individualistic cultures, "saving face" is more important than winnin g an argument U09 - Q.01 Which of the following statements is characteristic of a cohesive gro up?

answer: Members want to conform to group expectations U09 - Q.01 As leader of her group, Mira frequently reminds members that their co mbined contributions are essential to group success. Which strategy for developi ng group cohesiveness is Mira using? answer: emphasizing teamwork U09 - Q.01 Which symptom of groupthink is expressed when one group member confro nts another by saying "Why aren't you in favor of this? You're the only one who' s against it. Give it up!"? answer: pressure on dissent U09 - Q.01 Which symptom of groupthink is expressed when a group member says "Of course, we're right. We have a perfect safety record, have done this many times , and nothing's gone wrong"? answer: illusions of invulnerability U09 - Q.01 All of the following answers are characteristic of groupthink EXCEPT answer: critically evaluating options U09 - Q.01 All of the following methods are appropriate for minimizing the poten tial for groupthink EXCEPT answer: Avoid asking questions and do not demand justifications from others U09 - Q.01 Conflict in groups occurs when members disagree about issues, ideas, decisions, actions, or goals answer: True U09 - Q.01 Substantive conflict in groups can improve group problem solving, pro mote cohesiveness, increase group knowledge, enhance creativity, and help member s achieve the group's common goal answer: True U09 - Q.01 Conflict in groups is destructive and should be avoided if at all pos sible answer: False U09 - Q.01 When members disagree about issues, ideas, decisions, actions, or goa ls, substantive, affective, and procedural conflicts are likely to arise answer: False U09 - Q.01 When a group cannot negotiate a both/and approach to the individual g oal ? group goal dialectic, hidden agendas are likely to result answer: True U09 - Q.01 "She acted that way because she doesn't like me and doesn't want our group to succeed" could be a conclusion explained by the principles in Attributi on Theory answer: True U09 - Q.01 In groups that engage in constructive conflict, disagreement is not p unished and low-status members are free to challenge higher-status group members answer: True U09 - Q.01 Constructive conflict is characterized by competition and conflict av oidance answer: False U09 - Q.01 Once a group member apologizes for a hurtful comment or a harmful act ion, that member should demand forgiveness from other group members answer: False U09 - Q.01 The 5 traditional conflict styles reflect a dialectic tension of lead ership ? followership as well as engaged ? disengaged answer: False U09 - Q.01 All 5 of the traditional conflict styles reflect 2 factors: concern f or individual goals and concern for group goals answer: True U09 - Q.01 Avoidance is the most useful and safest conflict style answer: False U09 - Q.01 When an issue is not very important to you but very important to othe r group members, an accommodation conflict style may be appropriate answer: True U09 - Q.01 When you have strong beliefs about an issue and believe that the grou

p may be acting unethically or illegally, a compromise conflict style may be the most appropriate answer: False U09 - Q.01 The competitive conflict style reflects a high concern for self and a low concern for the group answer: True U09 - Q.01 The collaborative conflict style searches for new solutions that achi eve both the goals of individual members and the goals of the group. answer: True U09 - Q.01 The collaborative approach to conflict works best in all situations answer: False U09 - Q.01 Email messages are the best way to resolve conflict in virtual groups answer: False U09 - Q.01 The 4Rs Method helps group members analyze the conflict before select ing a method for resolving the conflict answer: True U09 - Q.01 The first step in the 4Rs Method of examining group conflict is to as k "What are the Results of the conflict if the group fails to act?" answer: False U09 - Q.01 The first step in the 4Rs Method of examining group conflict is to as k "What are the Reasons why we are having this conflict?" answer: True U09 - Q.01 In Wisinski's A-E-I-O-U Model of conflict resolution, the first step involves believing that other group members want to resolve the conflict answer: True U09 - Q.01 Negotiation and mediation are 2 terms for the same process answer: False U09 - Q.01 Negotiation requires third-party intervention in which an outsider wh o has conflict resolution skills can help the group analyze and resolve a confli ct answer: False U09 - Q.01 A mediator does not take sides in a dispute answer: True U09 - Q.01 Arbitration involves a third party who, after considering all sides i n a dispute, decides the conflict will be resolved answer: True U09 - Q.01 Studies show that men and women from similar cultures do not differ s ignificantly in terms of the conflict strategies and styles they use answer: True U09 - Q.01 Studies show that men and women from similar cultures do not differ s ignificantly in terms of the conflict strategies and styles they use answer: True U09 - Q.01 In intercultural terms, "face" is the positive image a group member w ishes to create or preserve answer: True U09 - Q.01 In individualistic cultures, members believe that displaying conflict publically threatens everyone's "face answer: False U09 - Q.01 Cultures that place a great deal of value on "saving face" discourage personal attacks and outcomes in which one person "loses" answer: True U09 - Q.01 Group cohesiveness is characterized by high levels of interaction and a friendly and supportive communication climate answer: True U09 - Q.01 You can enhance group cohesiveness by using terms such as "I" and "my " instead of "we" and "our" answer: False U09 - Q.01 Highly cohesive groups are at greater risk of succumbing to groupthin k

answer: True U09 - Q.01 In order to avoid groupthink, you should discourage individual group members from working on the group's problem individually answer: False U09 - Q.01 The groupthink symptom of rationalization is illustrated in the follo wing comment by a group member: "What do they expectmiracles? We didn't have enou gh time, members, or resources to solve this problem" answer: True U09 - Q.01 The groupthink symptom of mindguarding is illustrated in the followin g comment by a group member: "Let's not worry about the subcommittee reportthey c an't even correctly spell the name of the woman who did the research" answer: False U09 - Q.01 The groupthink symptom of self-censorship is illustrated in the follo wing comment by a group member: "I'm not crazy about this idea, but everyone els e seems to think it's terrific. I guess I'll go along with the group and vote 'y es' when it's time to approve or disapprove the proposal." answer: True U09 - Q.01 You can reduce the chances of groupthink by following a formal decisi on-making procedure that encourages members to disagree and evaluate one another 's ideas answer: True U11 - Q009 Problem solving occurs when a group answer: develops a plan for reducing or eliminating the harmful effects of a pro blem. U11 - Q010 All of the following statements describe decision making in groups EX CEPT answer: Groups usually take less time to make a decision than an individual work ing alone. U11 - Q011 As a decision-making method, voting works best when answer: there is no other way to break a deadlock. U11 - Q012 A company's recycling task force is composed of 15 members. If the ta sk force makes decisions based on a consensus, how many members must be in favor of the group decision? answer: 15 U11 - Q013 All of the following guidelines help a group achieve consensus EXCEPT answer: Use techniques such as trading one decision for another. U11 - Q014 What are the signs of a false consensus? answer: In order to avoid disagreement and conflict, group members agree on a co mmon decision. U11 - Q015 There are 12 members in your group. How many members must be in favor of a proposal when deciding by authority rule? answer: 1 U11 - Q016 A company's recycling task force gathered information on various recy cling programs and met several times to choose which program would best suit the needs of the company. The group's recommendation was presented to the company's vice president of operations, who ultimately chose a program other than the one recommended by the task force. Which method of decision making was used in this situation? answer: authority rule U11 - Q017 "How many of our company employees hire a daycare provider to watch t heir children during the workday?" This group discussion question represents a q uestion of answer: fact. U11 - Q018 "Is it appropriate for parents to bring their children to work when t hey can't get a babysitter or their daycare center closes for a day?" This group discussion question represents a question of answer: value. U11 - Q019 "How can the company assist employees with their childcare needs?" Th is group discussion question represents a question of answer: policy.

U11 - Q020 "Who will be the next student government president?" This discussion question represents a question of answer: conjecture. U11 - Q021 A Congressional debate on a bill to increase penalties for fraud comm itted by business CEOs is a question of answer: policy. U11 - Q022 In their book, Decision Making Styles, Suzanne Scott and Reginald Bru ce look at 5 decision-making styles. Group members who say "It just feels like t he right thing to do" are most likely using the __________ decision-making style . answer: intuitive U11 - Q023 In their book, Decision Making Styles, Suzanne Scott and Reginald Bru ce look at 5 decision-making styles. Groups members who say "If you think it's o kay, then I'll do it" are most likely using the __________ decision-making style . answer: dependent U11 - Q024 In their book, Decision Making Styles, Suzanne Scott and Reginald Bru ce look at 5 decision-making styles. Which of these styles is most like the Myer s-Briggs's personality trait of thinker? answer: rational U11 - Q025 All of the following benefits can result when a group uses structured problemsolving procedures effectively EXCEPT answer: increased time and effort. U11 - Q026 Which of the following problem-solving procedures is based on John De wey's Reflective Thinking Process? answer: the Standard Agenda U11 - Q027 All of the following steps are part of the Standard Agenda format for group problem solving EXCEPT answer: establishment of procedure U11 - Q028 The first 3 steps in the Standard Agenda format of group problem solv ing are answer: task clarification, problem identification, fact finding. U11 - Q029 Getting bogged down in analyzing the problem is referred to as answer: analysis paralysis. U11 - Q030 In what way is Functional Theory different than the Standard Agenda m ethod of problem solving? answer: all of the above U11 - Q031 The Functional Theory approach to problem solving focuses on answer: preparation, competence, and communication. U11 - Q036 The first 3 steps in the Single Question Format for problem solving a re answer: identify the problem, create a collaborative setting, analyze the issues . U11 - Q037 Which of the following characteristics makes the Single Question Form at different compared to the Standard Agenda? answer: It focuses on goal clarity and cultivating a supportive communication cl imate. U11 - Q038 All of the following answers represent basic stages in the developmen t of group creativity EXCEPT answer: interpretation. U11 - Q039 Your group needs to come up with a discussion topic for a class assig nment. The group works together, suggesting as many topics as possible. Members welcome all ideas and do not criticize the suggestions of other members. Which d ecision-making method is the group using? answer: brainstorming U11-Q045 All of the following are considered guidelines for effective brainstorm ing EXCEPT answer: Avoid combining ideas. U11-Q046 _______________ was developed by Delbecq and Van de Ven as a way of max imizing participation in problem-solving and program-planning groups while minim

izing some of the interpersonal problems associated with group interaction. answer: Nominal Group Technique U14 - Q.043 During Phase 1 (Idea Generation) of Nominal Group Technique, answer: members, in turn, present one idea from their privately written list. U14 - Q.044 Researchers investigating the usefulness of brainstorming and Nomina l Group Technique conclude that Nominal Group Technique (NGT) works better for g enerating ideas for all of the following reasons EXCEPT answer: members in brainstorming sessions produce fewer ideas than NGT groups. U14 - Q.047 Consider using the Decreasing Options Technique (DOT) when answer: the group wants to ensure equal opportunities for input by all members. U14 - Q.048 The major advantage and reason for using the DOT method is that it answer: helps reduce and refine a large number of suggestions into a manageable number of ideas. U14 - Q.049 Which is the correct order of the four steps in the Decreasing Optio ns Technique? answer: generate ideas, post ideas, sort ideas, dot ideas U14 - Q.050 Lee Towe presents 4 sources of action that guide how we solve proble ms. Which source does Towe describe as "We have developed a new way to do it"? answer: innovation U14 - Q.051 One of the reasons groups are often reluctant to think creatively is that they have preconceived notions about what can and can't be done. In such c ases, your group may want to try the _____________ method of enhancing creativit y. answer: ask "what if?" U14 - Q001 There are several problem-solving realities that can prevent a group from working effectively and ethically. For example, if members resist or dismis s information that doesn't mesh with their personal inclinations and attitudes, whatproblem-solving reality may impair group effectiveness? answer: pre-existing preferences U14 - Q002 There are several problem-solving realities that can prevent a group from working effectively and ethically. For example, a strong and stubborn leade r can lead group members off on tangents and irrelevant discussions that have no thing to do with the group's goal. In this particular case, ____________ will li kely affect the outcome of every decision and problem the group confronts. answer: power U14 - Q003 There are several problem-solving realities that can prevent a group from working effectively and ethically. For example, a member may side with a gr oup leader into order to gain the leader's attention and backing. In this partic ular case, ____________ will likely affect the outcome of every decision and pro blem the group confronts. answer: politics U14 - Q004 Decision making results in a position, judgment, or action. answer: True U14 - Q005 The process of decision making requires a group to analyze a problem, debate pros and cons, and select and implement a solution. answer: False U14 - Q006 As a rule, group problem solving generates more ideas and produces be tter solutions to complex problems. answer: True U14 - Q007 Voting is the best way to make group decisions. answer: False U14 - Q008 Voting works best when a group is pressed for time and the issues is not highly controversial. answer: True U14 - Q009 Consensus occurs when the majority of group members agree to support a decision or action. answer: False U14 - Q010 When your group is trying to reach consensus, you should not agree to a decision or solution you adamantly dislike and can't possibly support. answer: True

U14 - Q011 False consensus occurs when members give in to group pressure and acc ept a decision they do not like or support. answer: True U14 - Q012 A question of policy asks whether something will or will not happen. answer: False U14 - Q013 A question of value asks whether something good or bad will or will n ot happen. answer: False U14 - Q014 "It just feels like the right thing to do" describes the thought proc ess of a dependent decision maker. answer: False U14 - Q016 "It feels like the right thing to do" describes the thought process o f an intuitive decision maker. answer: True U14 - Q017 The Standard Agenda is based on John Dewey's Reflective Thinking Proc ess. answer: True U14 - Q018 Research has identified the Standard Agenda approach as the most effe ctive problem-solving model. answer: False U14 - Q019 The Standard Agenda requires group members to follow 7 steps that beg in with task clarification and end with solution suggestions. answer: False U14 - Q020 During the fact-finding step of the Standard Agenda, members must ans wer questions such as "How serious or widespread is the problem?" and "What are the causes of the problem?" answer: True U14 - Q021 Analysis paralysis can immobilize a group because members cannot dete rmine the cause of problem or because they cannot figure out a way to change hum an nature. answer: True U14 - Q022 The Functional Approach to group problem solving is based on several models including John Dewey's Reflective Thinking Process. answer: True U14 - Q023 Each step of the Functional Approach to group problem solving should be completed in order. answer: False U14 - Q024 The Functional Approach to group problem solving claims that communic ation is the instrument groups use to reach decisions and generate solutions. answer: True U14 - Q025 The Functional Theory Approach to problem solving emphasizes that gro up members must identify the resources and research necessary for making a decis ion before selecting appropriate procedures for developing an effective solution . answer: True U14 - Q026 The Preparation Function in the Functional Approach to problem solvin g requires that group members establish and use agreed-upon criteria to evaluate possible solutions. answer: False U14 - Q027 One of the factors that makes the Single Question Format of group pro blem solving unique is its focus on creating a collaborative communication clima te. answer: True U14 - Q028 One of the factors that makes the Single Question Format of group pro blem solving unique is its focus on goal clarity and issue analysis. answer: True U14 - Q029 One of the factors that makes the Single Question Format of group pro blem solving unique is its focus on identifying and analyzing possible solutions . answer: False

U14 - Q030 Creativity requires the nonjudgmental process of searching for, separ ating, and connecting unrelated ideas and elements. answer: True U14 - Q031 When a group uses creativity to enhance problem solving, insight repr esents the "aha" moment that occurs when a new approach or solution emerges. answer: True U14 - Q036 The 3 creative problem-solving methods described in your textbook are the Single Question Format, brainstorming, and consensus seeking. answer: False U14 - Q037 Brainstorming is based on several models including John Dewey's Refle ctive Thinking Process. answer: False U14 - Q038 Brainstorming is based n the assumption that quantity of ideas and ou tput breeds quality. answer: True U14 - Q039 In a brainstorming session, the group should assign someone to write down the group's ideas rather than asking each member to write down all the grou p's ideas. answer: True U14-Q045 "All Input, No Putdown" is a characteristic of the Nominal Group Techni que (NGT). answer: False U14-Q046 Nominal Group Technique is a way of minimizing participation in problem solving and maximizing interpersonal interaction and debate. answer: False U17 - Q.043 The Nominal Group Technique (NGT) is structured so that all group me mbers have the opportunity to share ideas and know that their ideas will be cons idered by the group as a whole. answer: True U17 - Q.044 In a Nominal Group Technique (DOT) session, each group member writes down his or her ideas before sharing them with others. answer: True U17 - Q.047 Nominal Group Technique is a decision-making tool that helps groups reduce and refine a large number of suggestions into a manageable number of idea s. answer: False U17 - Q.048 Studies of brainstorming and Nominal Group Technique have found that Nominal Group Technique often works better for generating ideas that are both n umerous and creative. answer: True U17 - Q.049 DOT is a brainstorming technique intended primarily to generate more ideas. answer: False U17 - Q.050 The Decreasing Options Technique (DOT) is a decision-making tool tha t helps groups reduce and refine a large number of suggestions into a manageable number of ideas. answer: True U17 - Q.051 The steps in the Decreasing Options Technique should be taken in the following order: generate ideas, sort ideas, post ideas, dot the ideas. answer: False U17 - Q001 The DOT method works best when a group has generated a significant nu mber of competing ideas and wants to restrain dominant members from exerting too much influence. answer: True U17 - Q002 In virtual groups, all types of technology are not equally suited to all types of group interaction. answer: True U17 - Q003 One way of encouraging creativity is to encourage innovation and disc ourage problem solving through instruction and imitation. answer: True

U17 - Q004 Metaphors can help members explain, understand, guide, and direct cre ative thinking in ways they would not have thought of otherwise. answer: True U17 - Q005 Groups should ignore the fact that members may have preexisting prefe rences about what a group should do. answer: False U17 - Q006 Politics can impair group problem when, for example, a member who wan ts to get ahead is reluctant to oppose an idea supported by the boss. answer: True U11 - Q.01 Argumentation is answer: the way we advocate proposals, examine competing ideas, and influence on e another U11 - Q.01 An argument is answer: a claim supported by evidence and reasons for accepting it U11 - Q.01 Effective argumentation in groups answer: promotes critical thinking U11 - Q.01 Argumentativeness is a answer: a willingness to argue controversial issues with others U11 - Q.01 All of the following traits characterize highly argumentative group m embers EXCEPT answer: they promote hostility in the group U11 - Q.01 Which of the following statements best describes a highly argumentati ve group member? answer: The member is less likely to be persuaded by others U11 - Q.01 Which component of the Toulmin Model of Argument explains why the evi dence supports the claim? answer: warrant U11 - Q.01 The warrant in an argument answers the question answer: How did you get there? U11 - Q.01 Which component of the Toulmin Model of Argument is represented in Pa rt I of the following argument? I. Joan would be a good leader. / II. Good leade rs are effective communicators. / III. Joan got an A in the communication course she took answer: claim U11 - Q.01 Which component of the Toulmin Model of Argument is represented in Pa rt II of the following argument? I. Joan would be a good leader. / II. Good lead ers are effective communicators. / III. Joan got an A in the communication cours e she took answer: warrant U11 - Q.01 Which component of the Toulmin Model of Argument is represented in Pa rt III of the following argument? I. Joan would be a good leader. / II. Good lea ders are effective communicators. / III. Joan got an A in the communication cour se she took answer: evidence U11 - Q.01 Which component of the Toulmin Model of Argument is indicated by word s in a claim such as "likely," "possibly," or "probably"? answer: qualifier U11 - Q.01 Which of the following answers is an example of the kind of evidence you could use in an argument? answer: all of the above U11 - Q.01 "More than 40% of American claim to have read The da Vinci Code. What type of evidence is used in this example? answer: statistic U11 - Q.01 "The Biltmore Mansion is the largest private residence in the United States." What type of evidence is used in this example? answer: fact U11 - Q.01 "Sufism is not a sect of Islam, like Shiism or Shunnism, but rather t he mystical sides of Islam: a personal, experiential approach to Allah, which co ntrasts with the more prescriptive, doctrinal approach of fundamentalism like th e Taliban." What type of evidence is used in this example?

answer: description U11 - Q.01 The Wings of Freedom tour includes 3 famous World War II vintage airp lanes: a B-17 Flying Fortress, a B-24 Liberator, and a North American P-51. What type of evidence is used in this example? answer: example U11 - Q.01 "Horsepower is a unit for measuring the power of engines roughly equa l to 746 watts or 33,000 foot-pounds per minute. " What type of evidence is used in this example? answer: definition U11 - Q.01 The president and chief executive of a virtual web space in which use rs can share comments claims that "The best innovations occur when you have netw orks of people with diverse backgrounds gathering around a problem." What type o f evidence is used in this example? answer: opinion U11 - Q.01 "According to NORML (National Organization to Reform Marijuana Laws), marijuana is a harmless drug that has no long-term side effects." What criticis m should be made about this piece of evidence? answer: It's biased. U11 - Q.01 "According to a 1984 article in the Midland Times Herald, gang activi ty is not a significant problem in the community." What criticism should be made about this piece of evidence? answer: It's not recent U11 - Q.01 Paulo survived a car crash without any major injury while not wearing a seatbelt. If he uses this example to prove that seatbelts are not needed, he has failed to test his evidence for answer: consistency U11 - Q.01 You should ask all of the following questions when trying to determin e the objectivity or accuracy of evidence from an internet source EXCEPT answer: Do you agree with the source's claims and point of view? U11 - Q.01 "Sex education in schools promotes teenage promiscuity." This stateme nt is an example of a claim of answer: fact U11 - Q.01 "Our town should enact a curfew for all juveniles." This statement is an example of answer: policy U11 - Q.01 "Our group is the best in the class." This statement is an example of a claim of answer: value U11 - Q.01 When presenting an argument, in which order should you use the follow ing steps? answer: state your claim, support your claim, provide reasons, summarize your ar gument U11 - Q.01 The act of proving an argument either erroneous or false, or both, is defined as answer: refutation U11 - Q.01 What are the first 4 steps in refuting an argument? answer: listen to the argument, assess the evidence, state the claim you oppose, give an overview of your objections U11 - Q.01 Which step in refuting an argument would be characterized by a statem ent such as "I don't support the increase in student activity fees for 2 reasons : the college just raised tuition 5%, and the poor economy has stressed many stu dents and their parents to the limit"? answer: preview your objections U11 - Q.01 "My opponent says we can lower taxes. He can't be believed or trusted . Ten years ago, he admitted to being an alcoholic. What fallacy is being committ ed in this statement? answer: ad hominem attack U11 - Q.01 Some group members have suggested that the company sponsor an annual picnic rather than a more formal annual dinner. John disagrees with the others b ecause the company has held a formal dinner every year for more than 10 years. W

hich fallacy of argument could be attributed to John's comment? answer: appeal to tradition U11 - Q.01 "My uncle's visit to New Mexico was horrible. The weather was bad and the people were unfriendly. New Mexico is not a good choice for a vacation." Wh at fallacy is being committed in this statement? answer: hasty generalization U11 - Q.01 "Everyone in our group has signing the petition. You should, too." Wh at fallacy is being committed in this statement? answer: appeal to popularity U11 - Q.01 "I knew I wouldn't win the lottery because a black cat crossed my pat h right after I bought the ticket." What fallacy is being committed in this stat ement? answer: faulty cause U11 - Q.01 "If lawyers develop their cases with help from other lawyers, why can 't I write my term paper with help from other students?" What fallacy is being c ommitted in this statement? answer: faulty analogy U11 - Q.01 "Don't go to that restaurant. I went once, and the service was awful. " What fallacy is being committed in this statement? answer: hasty generalization U11 - Q.01 According to your textbook, one of the most significant cultural diff erences in argumentation is the way in which people use evidence to support a cl aim. In which of the following cultures is physical evidence often rejected beca use no connection is seen between the physical world and human actions? answer: Chinese culture U11 - Q.01 According to Rybacki and Rybacki, the reasoning responsibility requir es that ethical group members answer: avoid making arguments containing fallacies U11 - Q.01 According to Rybacki and Rybacki, the social code responsibility requ ires that ethical group members answer: treat other group members as equals U11 - Q.01 Emotional intelligence can benefit a group engaged in argumentation b ecause members will strive to answer: all of the above U11 - Q.01 All of the following traits are characteristic of emotional intellige nce EXCEPT answer: self-assertion. U11 - Q.01 Critical thinking is a process that always results in an outcome answer: True U11 - Q.01 An argument and an opinion are essentially the same concept answer: False U11 - Q.01 An argument is an idea or opinion supported by evidence and reasoning answer: True U11 - Q.01 Argumentation can improve decision making answer: True U11 - Q.01 Arguing in groups is always disruptive and should be avoided answer: False U11 - Q.01 Highly argumentative group members enjoy the challenge of a good argu ment and are eager to defend their points of view with confidence answer: True U11 - Q.01 Highly argumentative members dislike having their positions challenge d answer: False U11 - Q.01 Highly argumentative members create more arguments on both sides of a position, which helps a group avoid groupthink answer: True U11 - Q.01 The 3 essential components in the Toulmin Model of Argument are the c laim, evidence, and warrant answer: True U11 - Q.01 Rather than asking "How did you get there?" a warrant asks "What have

you got to go on?" answer: False U11 - Q.01 In the Toulmin Model of Argument, the qualifier states the degree to which the claim appears to be true answer: True U11 - Q.01 In the Toulmin Model of Argument, backing refers to exceptions to an argument that may invalidate the claim answer: False U11 - Q.01 As a form of evidence, a fact is a statement that evaluates an event, idea, person, or object answer: False U11 - Q.01 "Robert's Rules of Order is used by the majority of groups that follo w the rules of parliamentary procedure" is an example of a fact answer: True U11 - Q.01 "Leadership is the ability to make strategic decisions and use commun ication effectively to mobilize group members toward achieving a common goal" is an example of an opinion answer: False U11 - Q.01 "A claim of value evaluates whether something is good or bad, right o r wrong, worthwhile or worthless" is an example of a definition answer: True U11 - Q.01 "In one study, workers rate 69% of the meetings they attended as inef fective" is an example of statistics used as evidence answer: True U11 - Q.01 Whereas an example refers to a specific case or instance, illustratio ns are longer, extended examples answer: True U11 - Q.01 The question "Is the information recent?" is the test for explaining why The New York Times is a more valid source than the National Enquirer answer: False U11 - Q.01 Questions such as "Are the author's identify and qualifications evide nt?" and "Does the site account for opposing points of view? can help you determi ne the validity of internet research answer: True U11 - Q.01 "The Volvo is the best family vehicle in the market" is a claim of fa ct answer: False U11 - Q.01 "You should floss your teach every morning and every night before you go to sleep" is a claim of policy answer: True U11 - Q.01 When presenting an argument, you should state your claim, support you r claim with evidence, and provide reasons why your evidence supports your claim answer: True U11 - Q.01 When you provide reasons why your evidence supports your claim in an argument, you are explaining the argument's warrant answer: True U11 - Q.01 Refutation is the process of presenting an argument's claim, evidence , and warrant answer: False U11 - Q.01 When refuting an argument, make sure you have assessed whether the ar gument's evidence supports the claim or is faulty answer: True U11 - Q.01 The faulty cause fallacy is the basis for many superstitions answer: True U11 - Q.01 The following fallacy is an example of appeal to tradition: "Who are you to support our troops? As I recall, you were arrested at an anti-war demonst ration in the early 1970s" answer: False U11 - Q.01 The ad hominem fallacy involves attacking a person rather than the su

bstance of that person's argument answer: True U11 - Q.01 The following fallacy is an example of a faulty analogy: "Last semest er I had an excellent student whose last name was Whipple. This semester I have another student by that name, and I'm expecting good work from her" answer: True U11 - Q.01 The following fallacy is an example of an appeal to popularity: "Ever ybody I've talked to on my street intends to vote for Ms. Kullen. I'm sure she'l l win" answer: False U11 - Q.01 An appeal to tradition is a fallacy that justifies an action because many others do the same thing or share the same opinion answer: False U11 - Q.01 Men are more likely than women to use evidence in arguments answer: False U11 - Q.01 In general, women tend to search out more different perspectives in a rgument than do men answer: True U11 - Q.01 During the course of an argument, men are much more likely to search out many different perspectives on a subject as well as ask questions answer: False U11 - Q.01 One of the most significant cultural differences in argumentation is the way people use evidence to support a claim answer: True U11 - Q.01 Rybacki and Rybacki's 4 ethical responsibilities in argumentation foc us on claims of fact, conjecture, value, and policy answer: False U11 - Q.01 When ethical arguers look beyond their own needs and consider the cir cumstances of others, they are demonstrating the common good responsibility for ethical argumentation answer: True U11 - Q.01 In effective arguments, group members should use logical reasoning ra ther than engaging emotional intelligence to make effective decisions answer: False U11 - Q.01 Researchers such as Daniel Goleman and Antonio Damasio claim that fee lings and emotions are indispensable for rational decision making answer: True U11 - Q.01 Self-awareness, self-regulation, self-confidence, and self-control ch aracterize emotional intelligence answer: True U11 - Q.01 Self-concept, self-disclosure, self-assertion, and selflessness chara cterize emotional intelligence answer: False U12 - Q.002 - M Which two group dialectics are particularly relevant when planni ng and conducting meetings? structure spontaneity and leadership followership in dividual goals group goals and conformity nonconformity heterogeneous homogeneou s and conflict cohesion engaged disengaged and open system closed system both b and c - structure spontaneity and leadership followership value - individual goa ls group goals and conformity nonconformity value - heterogeneous homogeneous an d conflict cohesion value - engaged disengaged and open system closed systemvalu e - both b and c value answer: structure spontaneity and leadership followership U12 - Q.004 - M The meeting planning questions in your textbook include all of t he following EXCEPT Why are we meeting? Who should attend the meeting? How shoul d we write the agenda? When and where should we meet? What materials do we need? - Why are we meeting? structure spontaneity and leadership followership - Who s hould attend the meeting? structure spontaneity and leadership followership - Ho w should we write the agenda? structure spontaneity and leadership followership - When and where should we meet? structure spontaneity and leadership followersh ip - What materials do we need? structure spontaneity and leadership followershi

p answer: How should we write the agenda? U12 - Q.010 - M According to the guidelines presented in the textbook, when is t he best time to address important and difficult issues? at the beginning of the meeting during the middle portion of the meeting during the last third of the me eting at the end of the meeting these items do not need to be placed on the agen da - at the beginning of the meeting How should we write the agenda? - during th e middle portion of the meeting How should we write the agenda? - during the las t third of the meeting How should we write the agenda? - at the end of the meeti ng How should we write the agenda? - these items do not need to be placed on the agenda How should we write the agenda? answer: during the middle portion of the meeting U12 - Q.012 - M The chairperson of a meeting should notify everyone who should a ttend. prepare for participation in the discussion. distribute minutes and repor ts after the meeting. keep the group focused on the task. do all of the above. notify everyone who should attend. during the middle portion of the meeting - p repare for participation in the discussion. during the middle portion of the mee ting - distribute minutes and reports after the meeting. during the middle porti on of the meeting - keep the group focused on the task. during the middle portio n of the meeting - do all of the above.during the middle portion of the meeting answer: do all of the above. U12 - Q.014 - M In order to keep a meeting moving at a comfortable pace, the cha irperson should review the agenda with all members. distribute materials needed for the discussion of issues. ask members to evaluate the meeting at the end of the meeting. begin on time without waiting for latecomers. avoid placing a time limit on each agenda item. - review the agenda with all members. do all of the a bove. - distribute materials needed for the discussion of issues.do all of the a bove. - ask members to evaluate the meeting at the end of the meeting. do all of the above. - begin on time without waiting for latecomers. do all of the above. - avoid placing a time limit on each agenda item. do all of the above. answer: begin on time without waiting for latecomers. U12 - Q.016 - M When members are late to a meeting, the chairperson should wait to start until all members have arrived. review what has been accomplished whene ver a latecomer arrives. let latecomers sit without participating until they hav e observed enough to be able to contribute. publicly reprimand latecomers. assig n latecomers tasks that no one else wants to do. - wait to start until all membe rs have arrived. begin on time without waiting for latecomers. - review what has been accomplished whenever a latecomer arrives. begin on time without waiting f or latecomers. - let latecomers sit without participating until they have observ ed enough to be able to contribute. begin on time without waiting for latecomers . - publicly reprimand latecomers. begin on time without waiting for latecomers. - assign latecomers tasks that no one else wants to do. begin on time without w aiting for latecomers. answer: let latecomers sit without participating until they have observed enough to be able to contribute. U12 - Q.018 - M What does your textbook suggest a group can do to curb the disru ptive behavior of a loudmouth? Interrupt the loudmouth. Have that person take mi nutes. Acknowledge that you understand the person's positions. Ask for viewpoint s from other members. Do any or all of the above. - Interrupt the loudmouth. let latecomers sit without participating until they have observed enough to be able to contribute. - Have that person take minutes. let latecomers sit without part icipating until they have observed enough to be able to contribute. - Acknowledg e that you understand the person's positions. let latecomers sit without partici pating until they have observed enough to be able to contribute. - Ask for viewp oints from other members. let latecomers sit without participating until they ha ve observed enough to be able to contribute. - Do any or all of the above.let la tecomers sit without participating until they have observed enough to be able to contribute. answer: Do any or all of the above.

U12 - Q.018 - M What does your textbook suggest a group can do to curb the disru ptive behavior of a loudmouth? Interrupt the loudmouth Have that person take min utes Acknowledge that you understand the person's positions Ask for viewpoints f rom other members Do any or all of the above - Interrupt the loudmouthDo any or all of the above. - Have that person take minutesDo any or all of the above. - A cknowledge that you understand the person's positionsDo any or all of the above. - Ask for viewpoints from other membersDo any or all of the above. - Do any or all of the aboveDo any or all of the above. answer: Do any or all of the above U12 - Q.022 - M All of the following statements about the minutes of a meeting a re true EXCEPT The format of the minutes should follow the format of the agenda. The more formal the meeting, the more information should be included in the min utes. The minutes should be accurate and impartial. The minutes should be a word -for-word record of everything that members say. The chairperson should delegate the task of taking minutes to another member. - The format of the minutes shoul d follow the format of the agenda.Do any or all of the above - The more formal t he meeting, the more information should be included in the minutes. Do any or al l of the above - The minutes should be accurate and impartial. Do any or all of the above - The minutes should be a word-for-word record of everything that memb ers say. Do any or all of the above - The chairperson should delegate the task o f taking minutes to another member. Do any or all of the above answer: The minutes should be a word-for-word record of everything that members say. U12 - Q001 Two reasons why people do not want to attend meetings are Ineffective chairperson Clear agenda Minutes-taking Inappropriate time and place - Ineffect ive chairperson The minutes should be a word-for-word record of everything that members say. - Clear agenda The minutes should be a word-for-word record of ever ything that members say. - Minutes-taking The minutes should be a word-for-word record of everything that members say. - Inappropriate time and place The minute s should be a word-for-word record of everything that members say. answer: Ineffective chairperson Inappropriate time and place U12 - Q002 During what stage should the Chairperson facilitate discussion ? Premeeting During-meeting Post- meeting None of the other options - Pre-meeting Ine ffective chairperson Inappropriate time and place - During-meeting Ineffective c hairperson Inappropriate time and place - Post- meeting Ineffective chairperson Inappropriate time and place - None of the other options Ineffective chairperson Inappropriate time and place answer: During-meeting U12 - Q003 A loudmouth should sometimes be assigned to Chair the meeting Take mi nutes Prepare for discussion Call to order - Chair the meeting During-meeting Take minutes During-meeting - Prepare for discussion During-meeting - Call to or der During-meeting answer: Take minutes U12 - Q004 One of the best ways to deal with latecomers is to let them Take minu tes Prepare for the discussion Distribute minutes after meetings Sit without par ticipating until they have observed enough to contribute - Take minutes Take min utes - Prepare for the discussion Take minutes - Distribute minutes after meetin gs Take minutes - Sit without participating until they have observed enough to c ontribute Take minutes answer: Sit without participating until they have observed enough to contribute U12 - Q004 - M The meeting planning questions in your textbook include all of th e following EXCEPT Why are we meeting? Who should attend the meeting? How should we write the agenda? When and where should we meet? What materials do we need? - Why are we meeting?Sit without participating until they have observed enough t o contribute - Who should attend the meeting?Sit without participating until the y have observed enough to contribute - How should we write the agenda?Sit withou t participating until they have observed enough to contribute - When and where s hould we meet?Sit without participating until they have observed enough to contr ibute - What materials do we need?Sit without participating until they have obse rved enough to contribute -

answer: How should we write the agenda? U12 - Q005 All of the following labels represent how member behavior can disrupt a meeting EXCEPT loudmouth. interrupter. whisperer. latecomer. tension releaser - loudmouth. How should we write the agenda? - interrupter. How should we write the agenda? - whisperer. How should we write the agenda? - latecomer. How shoul d we write the agenda? - tension releaser How should we write the agenda? answer: tension releaser U12 - Q006 At what point in a business meeting should group members approve the agenda and minutes? right after the call to order right after routine reports ar e shared before the discussion of unfinished business before the discussion of n ew business right before final announcements by members - right after the call t o order tension releaser - right after routine reports are shared tension releas er - before the discussion of unfinished business tension releaser - before the discussion of new business tension releaser - right before final announcements b y members tension releaser answer: right after the call to order U12 - Q007 According to the guidelines presented in the textbook, when is the be st time to address important and difficult issues ? at the beginning of the meet ing during the middle portion of the meeting during the last third of the meetin g at the end of the meeting these items do not need to be placed on the agenda at the beginning of the meetingright after the call to order - during the middl e portion of the meetingright after the call to order - during the last third of the meetingright after the call to order - at the end of the meetingright after the call to order - these items do not need to be placed on the agendaright aft er the call to order answer: during the middle portion of the meeting U12 - Q008 When members are late to a meeting, the chairperson should wait to st art until all members have arrived review what has been accomplished whenever a latecomer arrives let latecomers sit without participating until they have obser ved enough to be able to contribute publicly reprimand latecomers assign latecom ers tasks that no one else wants to do - wait to start until all members have ar rivedduring the middle portion of the meeting - review what has been accomplishe d whenever a latecomer arrivesduring the middle portion of the meeting - let lat ecomers sit without participating until they have observed enough to be able to contributeduring the middle portion of the meeting - publicly reprimand latecome rsduring the middle portion of the meeting - assign latecomers tasks that no one else wants to doduring the middle portion of the meeting answer: let latecomers sit without participating until they have observed enough to be able to contribute U12 - Q010 All of the following statements about the minutes of a meeting are tr ue EXCEPT The format of the minutes should follow the format of the agenda The m ore formal the meeting, the more information should be included in the minutes T he minutes should be accurate and impartial The minutes should be a word-for-wor d record of everything that members say The chairperson should delegate the task of taking minutes to another member - The format of the minutes should follow t he format of the agendalet latecomers sit without participating until they have observed enough to be able to contribute - The more formal the meeting, the more information should be included in the minuteslet latecomers sit without partici pating until they have observed enough to be able to contribute - The minutes sh ould be accurate and impartiallet latecomers sit without participating until the y have observed enough to be able to contribute - The minutes should be a word-f or-word record of everything that members saylet latecomers sit without particip ating until they have observed enough to be able to contribute - The chairperson should delegate the task of taking minutes to another memberlet latecomers sit without participating until they have observed enough to be able to contribute answer: The minutes should be a word-for-word record of everything that members say U12 - Q011 What does your textbook suggest a group can do to curb the disruptive behavior of a loudmouth? Interrupt the loudmouth Have that person take minutes Acknowledge that you understand the person's positions Ask for viewpoints from o

ther members Do any or all of the above - Interrupt the loudmouthThe minutes sho uld be a word-for-word record of everything that members say - Have that person take minutesThe minutes should be a word-for-word record of everything that memb ers say - Acknowledge that you understand the person's positionsThe minutes shou ld be a word-for-word record of everything that members say - Ask for viewpoints from other membersThe minutes should be a word-for-word record of everything th at members say - Do any or all of the aboveThe minutes should be a word-for-word record of everything that members say answer: Do any or all of the above U12 - Q014 _______________ is the outline of items to be discussed and the tasks to be accomplished at a meeting. A set of minutes An action item An agenda A re port A call to order - A set of minutesDo any or all of the above - An action it emDo any or all of the above - An agendaDo any or all of the above - A reportDo any or all of the above - A call to orderDo any or all of the above answer: An agenda U12 - Q015 Deborah Duarte and Nancy Snyder point out that "technology cannot mak e up for poor planning or ill-conceived meetings. In fact, it can make the situa tion worse". In order to avoid such problems in a virtual meeting, you should be gin a virtual meeting by sharing the meeting agenda invite more people to partic ipate because virtual meeting are typically not restricted in size due to the nu mber of seats in a conference room make sure that participants have access to th e technology and know how to use it effectively use technology you've used befor e so you don't have to worry about testing it prior to meeting with the group us e all of the others. - begin a virtual meeting by sharing the meeting agendaAn a genda - invite more people to participate because virtual meeting are typically not restricted in size due to the number of seats in a conference roomAn agenda - make sure that participants have access to the technology and know how to use it effectivelyAn agenda - use technology you've used before so you don't have to worry about testing it prior to meeting with the groupAn agenda - use all of th e others.An agenda answer: make sure that participants have access to the technology and know how t o use it effectively U12 - Q016 Complexity theory helps explain why groups need agendas to structure their meetings. why groups should rely on minutes to make sure that assigned tas ks are completed. why groups need to balance dialectic tensions. why groups hold long, unnecessary meetings why groups should ask why, who, when, where, and wha t questions as part of the meeting planning process - why groups need agendas to structure their meetings.make sure that participants have access to the technol ogy and know how to use it effectively - why groups should rely on minutes to ma ke sure that assigned tasks are completed.make sure that participants have acces s to the technology and know how to use it effectively - why groups need to bala nce dialectic tensions.make sure that participants have access to the technology and know how to use it effectively - why groups hold long, unnecessary meetings make sure that participants have access to the technology and know how to use it effectively - why groups should ask why, who, when, where, and what questions a s part of the meeting planning processmake sure that participants have access to the technology and know how to use it effectively answer: why groups need to balance dialectic tensions. U12 - Q017 The Committee to Save the Park began a discussion of plans to organiz e a park clean-up day. There was not enough time during the meeting to finish th e discussion. In what part of the agenda for the next meeting should this issue appear? call to order reports from individuals and subcommittees unfinished busi ness new business announcements - call to orderwhy groups need to balance dialec tic tensions. - reports from individuals and subcommitteeswhy groups need to bal ance dialectic tensions. - unfinished businesswhy groups need to balance dialect ic tensions. - new businesswhy groups need to balance dialectic tensions. - anno uncementswhy groups need to balance dialectic tensions. answer: unfinished business U12 - Q018 Complexity theory helps explain why groups need agendas to structure their meetings why groups should rely on minutes to make sure that assigned task

s are completed. why groups need to balance dialectic tensions. why groups hold long, unnecessary meetings why groups should ask why, who, when, where, and what questions as part of the meeting planning process. - why groups need agendas to structure their meetingsunfinished business - why groups should rely on minutes to make sure that assigned tasks are completed.unfinished business - why groups need to balance dialectic tensions.unfinished business - why groups hold long, unnecessary meetingsunfinished business - why groups should ask why, who, when, where, and what questions as part of the meeting planning process.unfinished bus iness answer: why groups need to balance dialectic tensions. U12 - Q019 ___is the outline of items to be discussed and the tasks to be accomp lished at a meeting. A set of minutes An action item An agenda A report A call t o order - A set of minuteswhy groups need to balance dialectic tensions. - An ac tion itemwhy groups need to balance dialectic tensions. - An agendawhy groups ne ed to balance dialectic tensions. - A reportwhy groups need to balance dialectic tensions. - A call to orderwhy groups need to balance dialectic tensions. answer: An agenda U12 - Q020 According to the guidelines presented in the textbook, when is the be st time to address important and difficult issues? at the beginning of the meeti ng during the middle portion of the meeting during the last third of the meeting at the end of the meeting these items do not need to be placed on the agenda at the beginning of the meetingAn agenda - during the middle portion of the meet ingAn agenda - during the last third of the meetingAn agenda - at the end of the meetingAn agenda - these items do not need to be placed on the agendaAn agenda answer: during the middle portion of the meeting U14 - Q.004 - M Computer conferences that occur simultaneously in real time are examples of parallel communication. serial communication. synchronous communicat ion. asynchronous communication. all of the above. - parallel communication. dur ing the middle portion of the meeting - serial communication. during the middle portion of the meeting - synchronous communication. during the middle portion of the meeting - asynchronous communication.during the middle portion of the meeti ng - all of the above. during the middle portion of the meeting answer: synchronous communication. U14 - Q.006 - M Which of the following answers describes a characteristic of asy nchronous communication? It is linear. Immediate feedback is not received. It is not interactive. It is more deliberate than synchronous communication. all of t he above - It is linear. synchronous communication. - Immediate feedback is not received.synchronous communication. - It is not interactive. synchronous communi cation. - It is more deliberate than synchronous communication. synchronous comm unication. - all of the above synchronous communication. answer: all of the above U14 - Q.012 - M Which of the following guidelines will help you conduct and part icipate in an effective audioconference? Limit participation to no more than 15 group members. Begin the meeting by reading the agenda to all members. Distribut e the minutes of the meeting as soon as possible. Regardless of their roles, dis courage members from signing off during the audioconference. Avoid taking audioc onference time to schedule the date and time for a subsequent meeting. - Limit p articipation to no more than 15 group members. all of the above - Begin the meet ing by reading the agenda to all members. all of the above - Distribute the minu tes of the meeting as soon as possible. all of the above - Regardless of their r oles, discourage members from signing off during the audioconference.all of the above - Avoid taking audioconference time to schedule the date and time for a su bsequent meeting.all of the above answer: Distribute the minutes of the meeting as soon as possible. U14 - Q.018 - M Which of the following answers is NOT an advantage of using text conferencing for virtual group communication? It can save time and money. It all ows time for reflection. It reduces nonverbal influences. It produces a written record. It allows for quick dissemination of information. - It can save time and money. Distribute the minutes of the meeting as soon as possible. - It allows t

ime for reflection. Distribute the minutes of the meeting as soon as possible. It reduces nonverbal influences.Distribute the minutes of the meeting as soon a s possible. - It produces a written record. Distribute the minutes of the meetin g as soon as possible. - It allows for quick dissemination of information.Distri bute the minutes of the meeting as soon as possible. answer: It reduces nonverbal influences. U14 - Q.020 - M All of the following statements represent disadvantages to using text conferences EXCEPT They can lead to misunderstandings because they lack vi sual and oral cues. They can limit participation by members who are poor typists or writers. They can frustrate members who like or need to talk through ideas. They can limit participation by highly talkative members. They can decrease soci al support for members. - They can lead to misunderstandings because they lack v isual and oral cues. It reduces nonverbal influences. - They can limit participa tion by members who are poor typists or writers. It reduces nonverbal influences . - They can frustrate members who like or need to talk through ideas. It reduce s nonverbal influences. - They can limit participation by highly talkative membe rs. It reduces nonverbal influences. - They can decrease social support for memb ers. It reduces nonverbal influences. answer: They can limit participation by highly talkative members. U14 - Q.024 - M Which of the following answers is NOT an advantage of using elec tronic meeting systems to conduct group work? They usually result in shorter and more productive meetings. They require training, facilitation, and technical su pport. They are efficient ways to tap expertise and opinions. They can reorganiz e and prioritize ideas and issues in a variety of ways. They are good for brains torming, displaying data, and evaluating options. - They usually result in short er and more productive meetings. They can limit participation by highly talkativ e members. - They require training, facilitation, and technical support. They ca n limit participation by highly talkative members. - They are efficient ways to tap expertise and opinions.They can limit participation by highly talkative memb ers. - They can reorganize and prioritize ideas and issues in a variety of ways. They can limit participation by highly talkative members. - They are good for b rainstorming, displaying data, and evaluating options.They can limit participati on by highly talkative members. answer: They require training, facilitation, and technical support. U14 - Q.028 - M Threaded discussions are characteristics of virtual groups using email. audioconferences. videoconferences. bulletin boards. all of the above. email. They require training, facilitation, and technical support. - audioconfe rences. They require training, facilitation, and technical support. - videoconfe rences. They require training, facilitation, and technical support. - bulletin b oards. They require training, facilitation, and technical support. - all of the above.They require training, facilitation, and technical support. answer: bulletin boards. U14 - Q.030 - M The digital divide refers to inequalities in access to, distribu tion of, and use of information technology between 2 or more populations. inequa lities in quality and quantity of participation in virtual groups by members. in equalities in the amount of money spent on computer technology for groups servin g different departments in a company or association. inequalities in the credibi lity given to online resources such as Wikipedia. all of the above. - inequaliti es in access to, distribution of, and use of information technology between 2 or more populations. bulletin boards. - inequalities in quality and quantity of pa rticipation in virtual groups by members. bulletin boards. - inequalities in the amount of money spent on computer technology for groups serving different depar tments in a company or association. bulletin boards. - inequalities in the credi bility given to online resources such as Wikipedia. bulletin boards. - all of th e above. bulletin boards. answer: inequalities in access to, distribution of, and use of information techn ology between 2 or more populations. U14 - Q001 Define two best practices in virtual groups Adequate resources Approp riate technical support Inadequate communication skills training No role models for day-to-day interactions - Adequate resources inequalities in access to, dist

ribution of, and use of information technology between 2 or more populations. Appropriate technical support inequalities in access to, distribution of, and us e of information technology between 2 or more populations. - Inadequate communic ation skills training inequalities in access to, distribution of, and use of inf ormation technology between 2 or more populations. - No role models for day-to-d ay interactions inequalities in access to, distribution of, and use of informati on technology between 2 or more populations. answer: Adequate resources Appropriate technical support U14 - Q002 Two examples of Synchronous Communication are Yahoo Messenger Skype v ideoconference Hotmail messages Facebook Entries - Yahoo Messenger Adequate reso urces Appropriate technical support - Skype videoconference Adequate resources A ppropriate technical support - Hotmail messages Adequate resources Appropriate t echnical support - Facebook Entries Adequate resources Appropriate technical sup port answer: Yahoo Messenger Skype videoconference U14 - Q003 Define two of the Ten Commandments for Computer Ethics. Do not use ot her peoples computer resources without authorization or proper compensation Think about the social consequences of the program you are writing or the system you are designing Copy or use proprietary software for which you have not paid Snoop around in other peoples computer files - Do not use other peoples computer resour ces without authorization or proper compensation Yahoo Messenger Skype videoconf erence - Think about the social consequences of the program you are writing or t he system you are designing Yahoo Messenger Skype videoconference - Copy or use proprietary software for which you have not paid Yahoo Messenger Skype videoconf erence - Snoop around in other peoples computer files Yahoo Messenger Skype video conference answer: Do not use other peoples computer resources without authorization or prop er compensation Think about the social consequences of the program you are writi ng or the system you are designing U14 - Q004 Define two disadvantages of Asynchronous Communication Typing speed i s slower than speaking speed Messages might be received out of order Lacking spo ntaneity Linear rather than interactive - Typing speed is slower than speaking s peed Do not use other peoples computer resources without authorization or proper compensation Think about the social consequences of the program you are writing or the system you are designing - Messages might be received out of order Do not use other peoples computer resources without authorization or proper compensatio n Think about the social consequences of the program you are writing or the syst em you are designing - Lacking spontaneity Do not use other peoples computer reso urces without authorization or proper compensation Think about the social conseq uences of the program you are writing or the system you are designing - Linear r ather than interactive Do not use other peoples computer resources without author ization or proper compensation Think about the social consequences of the progra m you are writing or the system you are designing answer: Lacking spontaneity Linear rather than interactive U14 - Q004 - M Computer conferences that occur simultaneously in real time are e xamples of parallel communication serial communication synchronous communication asynchronous communication all of the others. - parallel communicationLacking s pontaneity Linear rather than interactive - serial communicationLacking spontane ity Linear rather than interactive - synchronous communicationLacking spontaneit y Linear rather than interactive - asynchronous communicationLacking spontaneity Linear rather than interactive - all of the others.Lacking spontaneity Linear r ather than interactive answer: synchronous communication U14 - Q004 - M Computer conferences that occur simultaneously in real time are e xamples of parallel communication. serial communication. synchronous communicati on asynchronous communication all of the others. - parallel communication.synchr onous communication - serial communication.synchronous communication - synchrono us communicationsynchronous communication - asynchronous communicationsynchronou s communication - all of the others.synchronous communication answer: synchronous communication

U14 - Q005 Email is an example of parallel communication. concurrent communicati on synchronous communication asynchronous communication. all of the others. - pa rallel communication. synchronous communication - concurrent communication synch ronous communication - synchronous communication synchronous communication - asy nchronous communication. synchronous communication - all of the others. synchron ous communication answer: asynchronous communication. U14 - Q006 All of the following statements represent disadvantages to using audi oconferences EXCEPT They can make group members feel isolated. They may reduce g roup cohesion. They are less expensive than videoconferences They are inffective for sharing and editing documents They allow members to tune in and out of the meeting. - They can make group members feel isolated. asynchronous communication . - They may reduce group cohesion. asynchronous communication. - They are less expensive than videoconferences asynchronous communication. - They are inffectiv e for sharing and editing documents asynchronous communication. - They allow mem bers to tune in and out of the meeting. asynchronous communication. answer: They are less expensive than videoconferences U14 - Q007 According to your textbook, software and hardware that provide group members with the ability to generate and evaluate ideas, make decisions, and use different voting procedures are known as meetingware. electronic meeting system s. decisionware taskware. problemware. - meetingware. They are less expensive th an videoconferences - electronic meeting systems. They are less expensive than v ideoconferences - decisionware They are less expensive than videoconferences - t askware. They are less expensive than videoconferences - problemware. They are l ess expensive than videoconferences answer: electronic meeting systems. U14 - Q009 Which of the following answers describes 1 of the many advantages of using audioconferences as a medium for virtual group work? Audioconferences allo w members to work on nongroup work during the meeting are easier to set up than face-to-face meetings require an investment in compatible equipment use telephon es to which most members have easy access intensify the viewpoints of individual group members - allow members to work on nongroup work during the meetingelectr onic meeting systems. - are easier to set up than face-to-face meetingselectroni c meeting systems. - require an investment in compatible equipmentelectronic mee ting systems. - use telephones to which most members have easy accesselectronic meeting systems. - intensify the viewpoints of individual group memberselectroni c meeting systems. answer: use telephones to which most members have easy access U14 - Q010 Threaded discussions are characteristics of virtual groups using emai l audioconferences videoconferences bulletin boards all of the above - emailuse telephones to which most members have easy access - audioconferencesuse telephon es to which most members have easy access - videoconferencesuse telephones to wh ich most members have easy access - bulletin boardsuse telephones to which most members have easy access - all of the aboveuse telephones to which most members have easy access answer: bulletin boards U14 - Q011 The digital divide refers to inequalities in access to, distribution of, and use of information technology between 2 or more populations inequalities in quality and quantity of participation in virtual groups by members inequalit ies in the amount of money spent on computer technology for groups serving diffe rent departments in a company or association inequalities in the credibility giv en to online resources such as Wikipedia all of the above - inequalities in acce ss to, distribution of, and use of information technology between 2 or more popu lationsbulletin boards - inequalities in quality and quantity of participation i n virtual groups by membersbulletin boards - inequalities in the amount of money spent on computer technology for groups serving different departments in a comp any or associationbulletin boards - inequalities in the credibility given to onl ine resources such as Wikipediabulletin boards - all of the abovebulletin boards answer: inequalities in access to, distribution of, and use of information techn

ology between 2 or more populations U14 - Q012 Some group members find it easier, more comfortable, and safer expres sing disapproval and disagreement online than in face-to-face situations. Which group dialectic is represented in this aspect of virtual groups? open system `le ftrightarrow` closed system task dimensions `leftrightarrow` social dimensions c onflict `leftrightarrow` cohesion leadership `leftrightarrow` followership struc tured `leftrightarrow` spontaneous - open system `leftrightarrow` closed systemi nequalities in access to, distribution of, and use of information technology bet ween 2 or more populations - task dimensions `leftrightarrow` social dimensionsi nequalities in access to, distribution of, and use of information technology bet ween 2 or more populations - conflict `leftrightarrow` cohesioninequalities in a ccess to, distribution of, and use of information technology between 2 or more p opulations - leadership `leftrightarrow` followershipinequalities in access to, distribution of, and use of information technology between 2 or more populations - structured `leftrightarrow` spontaneousinequalities in access to, distributio n of, and use of information technology between 2 or more populations answer: conflict `leftrightarrow` cohesion U14 - Q014 A study by the American Association of University Women found that, i n general, girls consistently rate themselves lower on computer ability than boy s do. girls and boys rate themselves comparable on computer ability. software pr ograms are gender neutral girls enter the classroom with more computer experienc e than boys have. none of the others is true - girls consistently rate themselve s lower on computer ability than boys do.conflict `leftrightarrow` cohesion - gi rls and boys rate themselves comparable on computer ability.conflict `leftrighta rrow` cohesion - software programs are gender neutralconflict `leftrightarrow` c ohesion - girls enter the classroom with more computer experience than boys have .conflict `leftrightarrow` cohesion - none of the others is trueconflict `leftri ghtarrow` cohesion answer: girls consistently rate themselves lower on computer ability than boys d o. U14 - Q015 Duarte and Snyder recommend a set of best practices for making electr onic meeting system conferences more effective. Which of the following answers i n NOT a best practice for this type of group meeting? Make sure everyone in the group has a turn facilitating the meeting to keep the group moving through the a genda Make sure everyone's system is compatible and working properly. Develop a clear and focused agenda and set of technical instructions. Decide if and when i nput will be anonymous for activities such as brainstorming and voting Rotate fu nctions such as sorting information to avoid fatigue - Make sure everyone in the group has a turn facilitating the meeting to keep the group moving through the agendagirls consistently rate themselves lower on computer ability than boys do. - Make sure everyone's system is compatible and working properly.girls consiste ntly rate themselves lower on computer ability than boys do. - Develop a clear a nd focused agenda and set of technical instructions.girls consistently rate them selves lower on computer ability than boys do. - Decide if and when input will b e anonymous for activities such as brainstorming and votinggirls consistently ra te themselves lower on computer ability than boys do. - Rotate functions such as sorting information to avoid fatiguegirls consistently rate themselves lower on computer ability than boys do. answer: Make sure everyone in the group has a turn facilitating the meeting to k eep the group moving through the agenda U14 - Q017 All of the following statements represent disadvantages to using text conferences EXCEPT They can lead to misunderstandings because they lack visual and oral cues They can limit participation by members who are poor typists or wr iters They can frustrate members who like or need to talk through ideas. They ca n limit participation by highly talkative members They can decrease social suppo rt for members. - They can lead to misunderstandings because they lack visual an d oral cuesMake sure everyone in the group has a turn facilitating the meeting t o keep the group moving through the agenda - They can limit participation by mem bers who are poor typists or writersMake sure everyone in the group has a turn f acilitating the meeting to keep the group moving through the agenda - They can f

rustrate members who like or need to talk through ideas.Make sure everyone in th e group has a turn facilitating the meeting to keep the group moving through the agenda - They can limit participation by highly talkative membersMake sure ever yone in the group has a turn facilitating the meeting to keep the group moving t hrough the agenda - They can decrease social support for members.Make sure every one in the group has a turn facilitating the meeting to keep the group moving th rough the agenda answer: They can limit participation by highly talkative members U14 - Q018 Which of the following answers is NOT an essential guideline for cond ucting and participating in an effective videoconference? Limit participation to no more than 3-6 group members Dress appropriately Identify yourself by name wh enever you speak Always keep your comments short and to the point all of the abo ve - Limit participation to no more than 3-6 group membersThey can limit partici pation by highly talkative members - Dress appropriatelyThey can limit participa tion by highly talkative members - Identify yourself by name whenever you speakT hey can limit participation by highly talkative members - Always keep your comme nts short and to the pointThey can limit participation by highly talkative membe rs - all of the aboveThey can limit participation by highly talkative members answer: Dress appropriately U14 - Q019 A study by Staples and Webster identifies several "best practices" th at can significantly improve group performance and member satisfaction in virtua l groups. Which of the following answers is NOT one of their best practices? We have the right people, skills, and funding to achieve our goal We have members w ho prefer to work in virtual groups rather than in face-to-face meetings We have adequate electronic communication skills training We have adequate remote coord ination skills training We have appropriate and effective information technology and support - We have the right people, skills, and funding to achieve our goal Dress appropriately - We have members who prefer to work in virtual groups rathe r than in face-to-face meetingsDress appropriately - We have adequate electronic communication skills trainingDress appropriately - We have adequate remote coor dination skills trainingDress appropriately - We have appropriate and effective information technology and supportDress appropriately answer: We have members who prefer to work in virtual groups rather than in face -to-face meetings U14 - Q020 Which group dialectic is represented in Patricia Wallace's concept of group polarization? engaged <-> disengaged task dimensions <-> social dimension s conformity <-> nonconformity leadership <-> followership homogeneous <-> heter ogeneous - engaged <-> disengagedWe have members who prefer to work in virtual g roups rather than in face-to-face meetings - task dimensions <-> social dimensio nsWe have members who prefer to work in virtual groups rather than in face-to-fa ce meetings - conformity <-> nonconformityWe have members who prefer to work in virtual groups rather than in face-to-face meetings - leadership <-> followershi pWe have members who prefer to work in virtual groups rather than in face-to-fac e meetings - homogeneous <-> heterogeneousWe have members who prefer to work in virtual groups rather than in face-to-face meetings answer: conformity <-> nonconformity U14 - Q024 - M Which of the following answers is NOT an advantage of using elect ronic meeting systems to conduct group work? They usually result in shorter and more productive meetings. They require training, facilitation, and technical sup port. They are efficient ways to tap expertise and opinions. They can reorganize and prioritize ideas and issues in a variety of ways. They are good for brainst orming, displaying data, and evaluating options - They usually result in shorter and more productive meetings.conformity <-> nonconformity - They require traini ng, facilitation, and technical support.conformity <-> nonconformity - They are efficient ways to tap expertise and opinions.conformity <-> nonconformity - They can reorganize and prioritize ideas and issues in a variety of ways.conformity <-> nonconformity - They are good for brainstorming, displaying data, and evalua ting optionsconformity <-> nonconformity answer: They require training, facilitation, and technical support. U14-Q1-28 - Ko yeu cau email audioconferences videoconferences bulletin boards a

ll of the above - emailThey require training, facilitation, and technical suppor t. - audioconferencesThey require training, facilitation, and technical support. - videoconferencesThey require training, facilitation, and technical support. bulletin boardsThey require training, facilitation, and technical support. - al l of the aboveThey require training, facilitation, and technical support. answer: bulletin boards U01 - Q001 - T When group members work together to achieve a common goal, the si ze of the group, the physical setting, and the group's role and status in an org anization are components of the communication context. True False - Truebulletin boards - Falsebulletin boards answer: True U01 - Q002 - T Without understanding group communication theories, you will have difficulty understanding why a particular method works in one situation and fai ls in another. True False - TrueTrue - FalseTrue answer: True U02 - Q001 - T During the assimilation phrase of newcomer socialization, establi shed members and newcomers blend into a comfortable state of working together to achieve a common goal. True False - TrueTrue - FalseTrue answer: True U02 - Q002 - T When there is enormous pressure for group members to conform, a d isruptive member can help the group by not conforming to group norms. True False - TrueTrue - FalseTrue answer: True U02 - Q003 - T Members who engage in disruptive or nonconforming behavior should always be confronted about their behavior as soon as possible. True False - Tru eTrue - FalseTrue answer: False U03 - Q001 - T Group members who experience communication apprehension tend to s peak less, agreewith others rather than voice disagreement, and use more filler phrases such as "well," "you know," and "uh." True False - TrueFalse - FalseFals e answer: True U03 - Q002 - T The strategies of cognitive restructuring help highly apprehensiv e group members communicate more confidently because they teach them important s kills for participating in a discussion. True False - TrueTrue - FalseTrue answer: False U04 - Q.002 - T In low power distance cultures, members accept major differences in power as normal, assuming that all people are not created equal. True False - TrueFalse - FalseFalse answer: False U04 - Q001 - T Prejudices are based on extensive and direct experience as well a s personal, firsthand knowledge about a group of people. True False - TrueFalse - FalseFalse answer: False U05 - Q001 - T A designated leader is selected by group members or by an outside authority. True False - TrueFalse - FalseFalse answer: False U05 - Q002 - T Leaders can motivate members from collectivist cultures by helpin g members achieve personal goals and high status positions. True False - TrueFal se - FalseFalse answer: False U06 - Q001 - T Motivation recognizes and financially compensates group members f or work well done. True False - TrueFalse - FalseFalse answer: False U06 - Q002 - T For the most part, extrinsic rewards do not motivate groups to wo rk together in pursuit of a shared goal. True False - TrueFalse - FalseFalse answer: True U07 - Q001 - T When dealing with a group member who uses abusive language to att ack or intimidate others, your textbook suggests asking the person to repeat wha t he or she has said. True False - TrueTrue - FalseTrue -

answer: True U07 - Q002 - T Touch in groups can result in greater teamwork, solidarity, and s haring among members. True False - TrueTrue - FalseTrue answer: True U08 - Q001 - T Effective empathic listeners welcome opportunities to hear someth ing new or challenging and pay special attention to the eloquence of a member's words. True False - TrueTrue - FalseTrue answer: False U08 - Q002- T The Golden Listening Rule is: speak unto others as you would have them speak to you. True False - TrueFalse - FalseFalse answer: False U09 - Q001 - T Constructive conflict is characterized by competition and conflic t avoidance. True False - TrueFalse - FalseFalse answer: False U09 - Q002 - T Negotiation requires third-party intervention in which an outside r who has conflict resolution skills can help the group analyze and resolve a co nflict. True False - TrueFalse - FalseFalse answer: False U10 - Q001 - T Creativity requires the nonjudgmental process of searching for, s eparating, and connecting unrelated ideas and elements. True False - TrueFalse FalseFalse answer: True U10 - Q002 - T Nominal Group Technique is a decision-making tool that helps grou ps reduce and refine a large number of suggestions into a manageable number of i deas. True False - TrueTrue - FalseTrue answer: False U11 - Q001 - T "A claim of value evaluates whether something is good or bad, rig ht or wrong, worthwhile or worthless" is an example of a definition. True False - TrueFalse - FalseFalse answer: True U11 - Q002 - T An appeal to tradition is a fallacy that justifies an action beca use many others do the same thing or share the same opinion. True False - TrueTr ue - FalseTrue answer: False U12 - Q001 - T Questions such as "Is an immediate decision needed?" and "Are mem bers prepared to discuss the topic?" should be asked when determining the Meetin g Planning Question "Why are we meeting?" True False - TrueFalse - FalseFalse answer: True U12 - Q002 - T If members come late to a scheduled meeting, they should sit with out participating until they have observed enough of the meeting's discussion to contribute responsibly. True False - TrueTrue - FalseTrue answer: True U12 - Q003 - T Regardless of the complexity or importance of an issue, parliamen tary rules state that a group must accepts the will of the majority even if the majority wins by only 1 vote. True False - TrueTrue - FalseTrue answer: True U17 - Q007 Which of the following reasons is sound justification for scheduling or attending a group meeting? answer: Group input and interaction are critical. U17 - Q008 Which of the following answers depicts the 3 elements of a meeting de scribed in the textbook? answer: structure, schedule, chairperson U17 - Q009 All of the following criteria should be considered when determining w ho should be invited to a meeting EXCEPT answer: individuals who are uninvolved in the issues scheduled for discussion. U17 - Q010 At what point in the agenda does a chairperson officially begin a mee ting? answer: at the call to order U17 - Q011 The elections committee of the Student Government Council is making p reparations for the upcoming campus elections. During what part of the agenda sh

ould the elections committee chairperson report on the status of the committee's work? answer: reports from individuals and subcommittees U17 - Q012 The person appointed or elected to conduct a meeting is the answer: chairperson. U17 - Q013 A sentence such as "Let Debbo finish her point first, and then we'll hear other viewpoints" can help a group deal with a member whose disruptive beha vior fits the description of a answer: interrupter. U17 - Q014 The written record of a group's discussion and activities is referred to as answer: the minutes. U17 - Q016 All of the following guiding principles form the basis for parliament ary procedure EXCEPT answer: The group uses a 2/3 vote to ensure that the majority rules. U17 - Q017 If there is nothing important to talk about, a meeting can do more ha rm than good. answer: True U17 - Q018 A coincidental gathering of group members does not constitute a meeti ng. answer: True U17 - Q019 What does the rapid application development concern with? A waterfall approach to software development leads to faster delivery of software An iterat ive approach to software development leads to faster delivery of software A soft ware development model that ensure that the software would have higher quality A waterfall approach to software development leads to faster delivery of softwa reTo save software prototype development effort - An iterative approach to softw are development leads to faster delivery of softwareTo save software prototype d evelopment effort - A software development model that ensure that the software w ould have higher qualityTo save software prototype development effort answer: An iterative approach to software development leads to faster delivery o f software U17 - Q020 Which of the following BEST describes the major difficulties with inc remental development? Contractual problems, requirement problems, implementation problems, management problems Requirement problems, design problems, implementa tion problems, validation problems Contractual problems, validation problems, ma nagement problems, maintenance problems Design problems, management problems, va lidation problems, maintenance problems - Contractual problems, requirement prob lems, implementation problems, management problemsAn iterative approach to softw are development leads to faster delivery of software - Requirement problems, des ign problems, implementation problems, validation problemsAn iterative approach to software development leads to faster delivery of software - Contractual probl ems, validation problems, management problems, maintenance problemsAn iterative approach to software development leads to faster delivery of software - Design p roblems, management problems, validation problems, maintenance problemsAn iterat ive approach to software development leads to faster delivery of software answer: Contractual problems, validation problems, management problems, maintena nce problems U17 - Q021 What is a user story in extreme programming? It is a history of user It is a requirement expressed as scenario It is a small card It is a small table - It is a history of userContractual problems, validation problems, management problems, maintenance problems - It is a requirement expressed as scenarioContra ctual problems, validation problems, management problems, maintenance problems It is a small cardContractual problems, validation problems, management problem s, maintenance problems - It is a small tableContractual problems, validation pr oblems, management problems, maintenance problems answer: It is a requirement expressed as scenario U17 - Q022 Which is the evidence when said that "pair programming is as efficien t as the same number of programmers working individually" ? (Choose one) In pair programming, all project team members have the same level Measurements suggest

that development productivity with pair programming is similar to that of two pe ople working independently In pair programming, project team member does not nee d to study requirement In pair programming, all project team members have the sa me skills - In pair programming, all project team members have the same levelIt is a requirement expressed as scenario - Measurements suggest that development p roductivity with pair programming is similar to that of two people working indep endentlyIt is a requirement expressed as scenario - In pair programming, project team member does not need to study requirementIt is a requirement expressed as scenario - In pair programming, all project team members have the same skillsIt is a requirement expressed as scenario answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently U17 - Q023 Rapid application development is A waterfall approach to software dev elopment leads to faster delivery of software An iterative approach to software development leads to faster delivery of software A software development model th at ensure that the software would have higher quality - A waterfall approach to software development leads to faster delivery of softwareMeasurements suggest th at development productivity with pair programming is similar to that of two peop le working independently - An iterative approach to software development leads t o faster delivery of softwareMeasurements suggest that development productivity with pair programming is similar to that of two people working independently - A software development model that ensure that the software would have higher qual ityMeasurements suggest that development productivity with pair programming is s imilar to that of two people working independently answer: An iterative approach to software development leads to faster delivery o f software U17 - Q024 Pair programming helps to increase the process visibility True False - TrueAn iterative approach to software development leads to faster delivery of software - FalseAn iterative approach to software development leads to faster de livery of software answer: False U17 - Q025 What is a user story in Extreme programming? It is a history of user It is a requirement expressed as scenario It is a small card It is a small table - It is a history of userFalse - It is a requirement expressed as scenarioFalse - It is a small cardFalse - It is a small tableFalse answer: It is a requirement expressed as scenario U17 - Q026 We use a Software Prototype to? Help with the elicitation and validat ion of requirements Explore software design solutions and support user interface design Run back-to-back tests with the implemented system. Save software protot ype development effort - Help with the elicitation and validation of requirement sIt is a requirement expressed as scenario - Explore software design solutions a nd support user interface designIt is a requirement expressed as scenario - Run back-to-back tests with the implemented system.It is a requirement expressed as scenario - Save software prototype development effortIt is a requirement express ed as scenario answer: Help with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with t he implemented system. U17 - Q027 Which of the following statements about pair programming is true? In pair programming, all project team members have the same level Measurements sugg est that development productivity with pair programming is similar to that of tw o people working independently In pair programming, project team member does not need to study requirement In pair programming, all project team members have th e same skills - In pair programming, all project team members have the same leve lHelp with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with the impl emented system. - Measurements suggest that development productivity with pair p rogramming is similar to that of two people working independentlyHelp with the e licitation and validation of requirementsExplore software design solutions and s upport user interface designRun back-to-back tests with the implemented system.

- In pair programming, project team member does not need to study requirementHel p with the elicitation and validation of requirementsExplore software design sol utions and support user interface designRun back-to-back tests with the implemen ted system. - In pair programming, all project team members have the same skills Help with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with the imple mented system. answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently U17 - Q028 Which of the following does NOT belong to important principles of agi le methods? Customer involvement Incremental delivery Process not people Embrace change Maintain simplicity - Customer involvementMeasurements suggest that deve lopment productivity with pair programming is similar to that of two people work ing independently - Incremental deliveryMeasurements suggest that development pr oductivity with pair programming is similar to that of two people working indepe ndently - Process not peopleMeasurements suggest that development productivity w ith pair programming is similar to that of two people working independently - Em brace changeMeasurements suggest that development productivity with pair program ming is similar to that of two people working independently - Maintain simplicit yMeasurements suggest that development productivity with pair programming is sim ilar to that of two people working independently answer: Process not people U17 - Q029 Which of these statements about extreme programming are true? New ver sions may be built several times per day All tests should only be run in the las t time Increments are delivered to customers at the end of process All of the ot hers - New versions may be built several times per dayProcess not people - All t ests should only be run in the last timeProcess not people - Increments are deli vered to customers at the end of processProcess not people - All of the othersPr ocess not people answer: New versions may be built several times per day U17 - Q030 All of the followings are the ways that a software prototype may be u sed EXCEPT To help with the elicitation and validation of requirements To explor e software design solutions and support user interface design To run back-to-bac k tests with the implemented system To test all functions of the completed syste m - To help with the elicitation and validation of requirementsNew versions may be built several times per day - To explore software design solutions and suppor t user interface designNew versions may be built several times per day - To run back-to-back tests with the implemented systemNew versions may be built several times per day - To test all functions of the completed systemNew versions may be built several times per day answer: To test all functions of the completed system U17 - Q031 Which of the following statements about test first development are tr ue? When a system feature is identified, the tests of the code implementing that feature are written before the code Tests are automated and all tests are run w hen a new increment is added to the system. All of the others None of the others - When a system feature is identified, the tests of the code implementing that feature are written before the codeTo test all functions of the completed system - Tests are automated and all tests are run when a new increment is added to th e system.To test all functions of the completed system - All of the othersTo tes t all functions of the completed system - None of the othersTo test all function s of the completed system answer: All of the others U17 - Q036 What are the advantages of pair programming It supports the idea of c ommon ownership and responsibility for the code It serves as an informal code re view process User engagement with the system It accelerates delivery of customer services - It supports the idea of common ownership and responsibility for the codeAll of the others - It serves as an informal code review processAll of the o thers - User engagement with the systemAll of the others - It accelerates delive ry of customer servicesAll of the others answer: It supports the idea of common ownership and responsibility for the code

It serves as an informal code review process U17 - Q037 Suggest three ways that a software prototype may be used? To help wit h the elicitation and validation of requirements To explore software design solu tions and support user interface design To run back-to-back tests with the imple mented system To improve the structure of the system - To help with the elicitat ion and validation of requirementsIt supports the idea of common ownership and r esponsibility for the codeIt serves as an informal code review process - To expl ore software design solutions and support user interface designIt supports the i dea of common ownership and responsibility for the codeIt serves as an informal code review process - To run back-to-back tests with the implemented systemIt su pports the idea of common ownership and responsibility for the codeIt serves as an informal code review process - To improve the structure of the systemIt suppo rts the idea of common ownership and responsibility for the codeIt serves as an informal code review process answer: To help with the elicitation and validation of requirementsTo explore so ftware design solutions and support user interface designTo run back-to-back tes ts with the implemented system U17 - Q038 Which are characteristics of RAD processes The processes of specifica tion, design and implementation are concurrent. System user interfaces are usual ly developed using an interactive development system The system is developed in a series of increments. The design documentation is maximal. - The processes of specification, design and implementation are concurrent.To help with the elicita tion and validation of requirementsTo explore software design solutions and supp ort user interface designTo run back-to-back tests with the implemented system System user interfaces are usually developed using an interactive development s ystemTo help with the elicitation and validation of requirementsTo explore softw are design solutions and support user interface designTo run back-to-back tests with the implemented system - The system is developed in a series of increments. To help with the elicitation and validation of requirementsTo explore software d esign solutions and support user interface designTo run back-to-back tests with the implemented system - The design documentation is maximal.To help with the el icitation and validation of requirementsTo explore software design solutions and support user interface designTo run back-to-back tests with the implemented sys tem answer: The processes of specification, design and implementation are concurrent .System user interfaces are usually developed using an interactive development s ystemThe system is developed in a series of increments. U17-Q045 Which is NOT a problem of agile development methods? It can be difficul t to keep the interest of customers who are involved in the process. The process es of specification, design and implementation are concurrent. Maintaining simpl icity requires extra work. None of the others - It can be difficult to keep the interest of customers who are involved in the process.The processes of specifica tion, design and implementation are concurrent.System user interfaces are usuall y developed using an interactive development systemThe system is developed in a series of increments. - The processes of specification, design and implementatio n are concurrent.The processes of specification, design and implementation are c oncurrent.System user interfaces are usually developed using an interactive deve lopment systemThe system is developed in a series of increments. - Maintaining s implicity requires extra work.The processes of specification, design and impleme ntation are concurrent.System user interfaces are usually developed using an int eractive development systemThe system is developed in a series of increments. None of the othersThe processes of specification, design and implementation are concurrent.System user interfaces are usually developed using an interactive dev elopment systemThe system is developed in a series of increments. answer: None of the others U17-Q046 Select the incorrect statement about pair programming This is the type of programming that programmers work in pairs, sitting together to develop code Pair programming helps develop common ownership of code and spreads knowledge ac ross the team. It serves as an informal review process as each line of code is l ooked at by more than 1 person. Measurements suggest that development productivi

ty with pair programming is greater than productivity of two people working inde pendently. - This is the type of programming that programmers work in pairs, sit ting together to develop codeNone of the others - Pair programming helps develop common ownership of code and spreads knowledge across the team.None of the othe rs - It serves as an informal review process as each line of code is looked at b y more than 1 person.None of the others - Measurements suggest that development productivity with pair programming is greater than productivity of two people wo rking independently.None of the others answer: Measurements suggest that development productivity with pair programming is greater than productivity of two people working independently. U18 - Q.043 The two main approaches to concept reuse are: Design patterns Genera tive programming Extreme programming Pair programming - Design patternsMeasureme nts suggest that development productivity with pair programming is greater than productivity of two people working independently. - Generative programmingMeasur ements suggest that development productivity with pair programming is greater th an productivity of two people working independently. - Extreme programmingMeasur ements suggest that development productivity with pair programming is greater th an productivity of two people working independently. - Pair programmingMeasureme nts suggest that development productivity with pair programming is greater than productivity of two people working independently. answer: Design patternsGenerative programming U18 - Q.044 A ______ is a way of reusing abstract knowledge about a problem and its solution. Design pattern Template Algothirim Diagram - Design patternDesign patternsGenerative programming - TemplateDesign patternsGenerative programming AlgothirimDesign patternsGenerative programming - DiagramDesign patternsGenerat ive programming answer: Design pattern U18 - Q.047 Which one is architecture of the product line? A shared data reposit ory style Client / Server The architectures must be structured to separate diffe rent components The architectures must be structured to separate different sub-s ystems - A shared data repository styleDesign pattern - Client / ServerDesign pa ttern - The architectures must be structured to separate different componentsDes ign pattern - The architectures must be structured to separate different sub-sys temsDesign pattern answer: The architectures must be structured to separate different sub-systems U18 - Q.048 In case the existing system was developed by COBOL programming langu age, and now it is expected to be added more functions. So which solution is bes t to change easily in the future? Re-design the system with the newest technolog ies Develop new system with at least number of requirements of the legacy system Continue to use the COBOL to develop additional functions Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - R e-design the system with the newest technologiesThe architectures must be struct ured to separate different sub-systems - Develop new system with at least number of requirements of the legacy systemThe architectures must be structured to sep arate different sub-systems - Continue to use the COBOL to develop additional fu nctionsThe architectures must be structured to separate different sub-systems Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systemsThe architectures must be structured to separate different subsystems answer: Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systems U18 - Q.049 In the management system, the customer notices to one of requirement s, with the same data, product information, the system should be performed diffe rence presentations for correspondent departments such as Product department, Qu ality department and Planning department. So which design or framework is applie d for? Program generator Aspect-oriented development ERP - Enterprise Resource P lanning MVC - Model View Controller - Program generatorUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - Aspec t-oriented developmentUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - ERP - Enterprise Resource PlanningUse

1 wrapping layer, it means define a set of interfaces for accessing from the ext ernal systems - MVC - Model View ControllerUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems answer: MVC - Model View Controller U18 - Q.050 Which one is program type of the Java compile, Javac? Application ge nerator Code generators MVC - Model View Controller generator Parser and lexical analyser generators - Application generatorMVC - Model View Controller - Code g eneratorsMVC - Model View Controller - MVC - Model View Controller generatorMVC - Model View Controller - Parser and lexical analyser generatorsMVC - Model View Controller answer: Parser and lexical analyser generators U18 - Q.051 Supposed that new system is very familiar because the same system wa s developed before, so what is re-used for developing new system quickly? COTS O bjects CASE tools Architecture - COTSParser and lexical analyser generators - Ob jectsParser and lexical analyser generators - CASE toolsParser and lexical analy ser generators - ArchitectureParser and lexical analyser generators answer: Architecture U18 - Q001 What are the benefits of software reuse ? Increase dependability Rapi d to delivery the product Maintenance costs may be increased as the reused eleme nts of the system may become incompatible with system changes Enhance the invent ion of developers - Increase dependabilityArchitecture - Rapid to delivery the p roductArchitecture - Maintenance costs may be increased as the reused elements o f the system may become incompatible with system changesArchitecture - Enhance t he invention of developersArchitecture answer: Increase dependabilityRapid to delivery the productMaintenance costs may be increased as the reused elements of the system may become incompatible with system changes U18 - Q002 When is the design pattern applied to? Re-use abstract knowledge abou t a problem and its solution Re-use difference settings of the abstract knowledg e Re-use experiences of the specialists who developed reusable software Re-use t o develop non-functionalities - Re-use abstract knowledge about a problem and it s solutionIncrease dependabilityRapid to delivery the productMaintenance costs m ay be increased as the reused elements of the system may become incompatible wit h system changes - Re-use difference settings of the abstract knowledgeIncrease dependabilityRapid to delivery the productMaintenance costs may be increased as the reused elements of the system may become incompatible with system changes Re-use experiences of the specialists who developed reusable softwareIncrease de pendabilityRapid to delivery the productMaintenance costs may be increased as th e reused elements of the system may become incompatible with system changes - Re -use to develop non-functionalitiesIncrease dependabilityRapid to delivery the p roductMaintenance costs may be increased as the reused elements of the system ma y become incompatible with system changes answer: Re-use abstract knowledge about a problem and its solutionRe-use differe nce settings of the abstract knowledgeRe-use experiences of the specialists who developed reusable software U18 - Q003 Which ones are framework classes? System infrastructure framework Mid dleware integration framework Enterprise application framework Parser and lexica l analysing framework - System infrastructure frameworkRe-use abstract knowledge about a problem and its solutionRe-use difference settings of the abstract know ledgeRe-use experiences of the specialists who developed reusable software - Mid dleware integration frameworkRe-use abstract knowledge about a problem and its s olutionRe-use difference settings of the abstract knowledgeRe-use experiences of the specialists who developed reusable software - Enterprise application framew orkRe-use abstract knowledge about a problem and its solutionRe-use difference s ettings of the abstract knowledgeRe-use experiences of the specialists who devel oped reusable software - Parser and lexical analysing frameworkRe-use abstract k nowledge about a problem and its solutionRe-use difference settings of the abstr act knowledgeRe-use experiences of the specialists who developed reusable softwa re answer: System infrastructure frameworkMiddleware integration frameworkEnterpris

e application framework U18 - Q004 Extending the framework involves Adding concrete classes that inherit operations from abstract classes in the framework Adding methods that are calle d in response to events that are recognised by the framework Adding data objects that are used in the framework - Adding concrete classes that inherit operation s from abstract classes in the frameworkSystem infrastructure frameworkMiddlewar e integration frameworkEnterprise application framework - Adding methods that ar e called in response to events that are recognised by the frameworkSystem infras tructure frameworkMiddleware integration frameworkEnterprise application framewo rk - Adding data objects that are used in the frameworkSystem infrastructure fra meworkMiddleware integration frameworkEnterprise application framework answer: Adding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are reco gnised by the framework U18 - Q005 Adaptation in software product lines may involve Component and system configuration Adding new components to the system Selecting from a library of e xisting components Modifying components to meet new requirements Modifying syste m design to meet new requirements - Component and system configurationAdding con crete classes that inherit operations from abstract classes in the frameworkAddi ng methods that are called in response to events that are recognised by the fram ework - Adding new components to the systemAdding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are recognised by the framework - Selecting from a li brary of existing componentsAdding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are recognised by the framework - Modifying components to meet new r equirementsAdding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are r ecognised by the framework - Modifying system design to meet new requirementsAdd ing concrete classes that inherit operations from abstract classes in the framew orkAdding methods that are called in response to events that are recognised by t he framework answer: Component and system configurationAdding new components to the systemSel ecting from a library of existing componentsModifying components to meet new req uirements U18 - Q006 What is the most effective approach of creating software product line s (application families)? Reuse user interface Reuse database Reuse design patte rn Reuse project team - Reuse user interfaceComponent and system configurationAd ding new components to the systemSelecting from a library of existing components Modifying components to meet new requirements - Reuse databaseComponent and syst em configurationAdding new components to the systemSelecting from a library of e xisting componentsModifying components to meet new requirements - Reuse design p atternComponent and system configurationAdding new components to the systemSelec ting from a library of existing componentsModifying components to meet new requi rements - Reuse project teamComponent and system configurationAdding new compone nts to the systemSelecting from a library of existing componentsModifying compon ents to meet new requirements answer: Reuse design pattern U18 - Q007 Which is NOT a reuse-based software engineering? Re-use the software manuals Re-use the whole of an application system Re-use components of an applic ation from sub-systems to single objects Re-use software components that impleme nt a single well-defined object or function - Re-use the software manualsReuse d esign pattern - Re-use the whole of an application systemReuse design pattern Re-use components of an application from sub-systems to single objectsReuse desi gn pattern - Re-use software components that implement a single well-defined obj ect or functionReuse design pattern answer: Re-use the software manuals U18 - Q008 List the main problems with software reuse increased implementation c ost Lack of tool support Increase process risk Increased maintenance costs - inc reased implementation costRe-use the software manuals - Lack of tool supportRe-u

se the software manuals - Increase process riskRe-use the software manuals - Inc reased maintenance costsRe-use the software manuals answer: Lack of tool supportIncreased maintenance costs U18 - Q009 Which are THREE essential elements of design patterns? (select three) A name that is a meaningful reference to the pattern A description of the probl em area that explains when the pattern may be applied A statement of the consequ ences of applying the pattern A concrete design description - A name that is a m eaningful reference to the patternLack of tool supportIncreased maintenance cost s - A description of the problem area that explains when the pattern may be appl iedLack of tool supportIncreased maintenance costs - A statement of the conseque nces of applying the patternLack of tool supportIncreased maintenance costs - A concrete design descriptionLack of tool supportIncreased maintenance costs answer: A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the co nsequences of applying the pattern U18 - Q011 What is NOT a type in Reuse-based software engineering ? Application system reuse Component reuse Object and function reuse Software development proc ess reuse - Application system reuseA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern - Component reuse A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequenc es of applying the pattern - Object and function reuseA name that is a meaningfu l reference to the patternA description of the problem area that explains when t he pattern may be appliedA statement of the consequences of applying the pattern - Software development process reuseA name that is a meaningful reference to th e patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern answer: Software development process reuse U18 - Q012 What is NOT a main problem with software reuse? Increased maintenance costs Lack of tool support Increased process risk Not-invented-here syndrome Increased maintenance costsSoftware development process reuse - Lack of tool sup portSoftware development process reuse - Increased process riskSoftware developm ent process reuse - Not-invented-here syndromeSoftware development process reuse answer: Increased process risk U18 - Q013 What is NOT an essential element of design patterns? A name that is a meaningful reference to the pattern A description of the problem area that expl ains when the pattern may be applied A statement of the consequences of applying the pattern A concrete design description - A name that is a meaningful referen ce to the patternIncreased process risk - A description of the problem area that explains when the pattern may be appliedIncreased process risk - A statement of the consequences of applying the patternIncreased process risk - A concrete des ign descriptionIncreased process risk answer: A concrete design description U18 - Q014 All of the following are the main benefits of software reuse EXCEPT I ncreased dependability Reduced process risk Reduce maintain cost Effective use o f specialists, standards compliance Accelerated development. - Increased dependa bilityA concrete design description - Reduced process riskA concrete design desc ription - Reduce maintain costA concrete design description - Effective use of s pecialists, standards complianceA concrete design description - Accelerated deve lopment.A concrete design description answer: Reduce maintain cost U18 - Q015 What is NOT a type in main approaches to concept reuse Design pattern s Generative programming Object and function reuse - Design patternsReduce maint ain cost - Generative programmingReduce maintain cost - Object and function reus eReduce maintain cost answer: Object and function reuse U18 - Q016 All of the following are types of program generator EXCEPT Applicatio n generators Parser and lexical analyser generators Code generators Component ge

nerators - Application generatorsObject and function reuse - Parser and lexical analyser generatorsObject and function reuse - Code generatorsObject and functio n reuse - Component generatorsObject and function reuse answer: Component generators U18 - Q017 All of the following are the design choices have to be made when reus ing COTS products EXCEPT Which COTS products offer the most appropriate function ality? How will data be exchanged between different products? What features of a product will actually be used? How will data be exchanged between different mod ules? - Which COTS products offer the most appropriate functionality?Component g enerators - How will data be exchanged between different products?Component gene rators - What features of a product will actually be used?Component generators How will data be exchanged between different modules?Component generators answer: How will data be exchanged between different modules? U18 - Q019 During requirement checking, which question you need to answer for th e consistency? Are there any requirements conflicts? Are all functions required by the customer included? Can the requirements be implemented given available bu dget and technology? Does the system provide the functions which best support th e customer's needs? - Are there any requirements conflicts?How will data be exch anged between different modules? - Are all functions required by the customer in cluded?How will data be exchanged between different modules? - Can the requireme nts be implemented given available budget and technology?How will data be exchan ged between different modules? - Does the system provide the functions which bes t support the customer's needs?How will data be exchanged between different modu les? answer: Are there any requirements conflicts? U18 - Q020 Which is the correct statement about Product line architectures? Arch itectures must be structured in such a way to separate different sub-systems and to allow them to be modified Architectures must be structured in such a way to include different sub-systems and not to allow them to be modified - Architectur es must be structured in such a way to separate different sub-systems and to all ow them to be modifiedAre there any requirements conflicts? - Architectures must be structured in such a way to include different sub-systems and not to allow t hem to be modifiedAre there any requirements conflicts? answer: Architectures must be structured in such a way to separate different sub -systems and to allow them to be modified U18 - Q021 What are the elements of design patterns? (Choose one) Pattern name, Problem description, The solution description, The consequences Pattern name, Pr oblem description, The guide line to use pattern Pattern name, Problem descripti on, The author description of the Pattern Pattern name, The solution description , The author description of the Pattern - Pattern name, Problem description, The solution description, The consequencesArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified - Patte rn name, Problem description, The guide line to use patternArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified - Pattern name, Problem description, The author description of the PatternArchitectures must be structured in such a way to separate different subsystems and to allow them to be modified - Pattern name, The solution descriptio n, The author description of the PatternArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified answer: Pattern name, Problem description, The solution description, The consequ ences U18 - Q022 What are problems of software reuse? (Choose one) Finding, understand ing and adapting reusable components; Creating and maintaining a component libra ry; Increased maintenance costs Finding, understanding and adapting reusable com ponents; Increased maintenance costs; Re-use design pattern Finding, understandi ng and adapting reusable components; Increased maintenance costs; develop softwa re in shorter duration - Finding, understanding and adapting reusable components ; Creating and maintaining a component library; Increased maintenance costsPatte rn name, Problem description, The solution description, The consequences - Findi ng, understanding and adapting reusable components; Increased maintenance costs;

Re-use design patternPattern name, Problem description, The solution descriptio n, The consequences - Finding, understanding and adapting reusable components; I ncreased maintenance costs; develop software in shorter durationPattern name, Pr oblem description, The solution description, The consequences answer: Finding, understanding and adapting reusable components; Creating and ma intaining a component library; Increased maintenance costs U18 - Q023 List the main benefits of software reuse Increased dependability Redu ced process risk Reduce maintain cost Effective use of specialists, standards co mpliance Accelerated development. - Increased dependabilityFinding, understandin g and adapting reusable components; Creating and maintaining a component library ; Increased maintenance costs - Reduced process riskFinding, understanding and a dapting reusable components; Creating and maintaining a component library; Incre ased maintenance costs - Reduce maintain costFinding, understanding and adapting reusable components; Creating and maintaining a component library; Increased ma intenance costs - Effective use of specialists, standards complianceFinding, und erstanding and adapting reusable components; Creating and maintaining a componen t library; Increased maintenance costs - Accelerated development.Finding, unders tanding and adapting reusable components; Creating and maintaining a component l ibrary; Increased maintenance costs answer: Increased dependabilityReduced process riskEffective use of specialists, standards complianceAccelerated development. U18 - Q023 - HN What are benefits of software reuse? (Choose one) Reduced proces s risk; Effective use of specialists; Accelerated development Reduced process ri sk; Effective use of specialists; Not-invented-here syndrome Reduced process ris k; Effective use of specialists; Finding, understanding and adapting reusable co mponents - Reduced process risk; Effective use of specialists; Accelerated devel opmentIncreased dependabilityReduced process riskEffective use of specialists, s tandards complianceAccelerated development. - Reduced process risk; Effective us e of specialists; Not-invented-here syndromeIncreased dependabilityReduced proce ss riskEffective use of specialists, standards complianceAccelerated development . - Reduced process risk; Effective use of specialists; Finding, understanding a nd adapting reusable componentsIncreased dependabilityReduced process riskEffect ive use of specialists, standards complianceAccelerated development. answer: Reduced process risk; Effective use of specialists; Accelerated developm ent U18 - Q024 List the main approaches of concept reuse Design patterns Generative programming Object and function reuse - Design patternsReduced process risk; Eff ective use of specialists; Accelerated development - Generative programmingReduc ed process risk; Effective use of specialists; Accelerated development - Object and function reuseReduced process risk; Effective use of specialists; Accelerate d development answer: U18 - Q025 List three types of program generator Application generators Parser a nd lexical analyser generators Code generators Component generators - Applicatio n generators - Parser and lexical analyser generators - Code generators - Compon ent generators answer: Application generatorsParser and lexical analyser generatorsCode generat ors U18 - Q026 One of the most effective approaches to reuse is creating software pr oduct lines or application families. True False - TrueApplication generatorsPars er and lexical analyser generatorsCode generators - FalseApplication generatorsP arser and lexical analyser generatorsCode generators answer: True U18 - Q027 Which is the design choice that should NOT be made when reusing COTS products? Which COTS products offer the most appropriate functionality? How will data be exchanged between different products? What features of a product will a ctually be used? How will data be exchanged between different modules? - Which C OTS products offer the most appropriate functionality?True - How will data be ex changed between different products?True - What features of a product will actual ly be used?True - How will data be exchanged between different modules?True -

answer: How will data be exchanged between different modules? U18 - Q028 What key factors should be considered when planning reuse? The develo pment schedule for the software The expected software lifetime The background, s kills and experience of the development team All of the others - The development schedule for the softwareHow will data be exchanged between different modules? - The expected software lifetimeHow will data be exchanged between different mod ules? - The background, skills and experience of the development teamHow will da ta be exchanged between different modules? - All of the othersHow will data be e xchanged between different modules? answer: All of the others U18 - Q029 All of the following statement about design pattern are true EXCEPT D esign patterns are detail-level abstractions that document successful design sol utions. They are fundamental to design reuse in object-oriented development A pa ttern description should include a pattern name, a problem and solution descript ion, and a statement of the results and trade-offs of using the pattern - Design patterns are detail-level abstractions that document successful design solution s.All of the others - They are fundamental to design reuse in object-oriented de velopmentAll of the others - A pattern description should include a pattern name , a problem and solution description, and a statement of the results and trade-o ffs of using the patternAll of the others answer: Design patterns are detail-level abstractions that document successful d esign solutions. U18 - Q030 All of the followings are main benefits of software reuse EXCEPT Incr eased dependability Reduced process risk Effective use of specialists Reduce mai ntenance costs Accelerated development - Increased dependabilityDesign patterns are detail-level abstractions that document successful design solutions. - Reduc ed process riskDesign patterns are detail-level abstractions that document succe ssful design solutions. - Effective use of specialistsDesign patterns are detail -level abstractions that document successful design solutions. - Reduce maintena nce costsDesign patterns are detail-level abstractions that document successful design solutions. - Accelerated developmentDesign patterns are detail-level abst ractions that document successful design solutions. answer: Reduce maintenance costs U18 - Q031 All of the following are the main benefits of software reuse EXCEPT I ncreased dependability Reduced process risk Reduce maintain cost Effective use o f specialists, standards compliance Accelerated development - Increased dependab ilityReduce maintenance costs - Reduced process riskReduce maintenance costs - R educe maintain costReduce maintenance costs - Effective use of specialists, stan dards complianceReduce maintenance costs - Accelerated developmentReduce mainten ance costs answer: Reduce maintain cost U18 - Q032 Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true? Enterprise Resource Planning systems are very widely used Specific ERP systems are created by configuring a generic system at develop ment time with information about the customer's business All of the others - Ent erprise Resource Planning systems are very widely usedReduce maintain cost - Spe cific ERP systems are created by configuring a generic system at development tim e with information about the customer's businessReduce maintain cost - All of th e othersReduce maintain cost answer: Specific ERP systems are created by configuring a generic system at deve lopment time with information about the customer's business U18 - Q036 List the main problems with software reuse Lack of tool support Incre ase process risk Increased maintenance costs - Lack of tool supportSpecific ERP systems are created by configuring a generic system at development time with inf ormation about the customer's business - Increase process riskSpecific ERP syste ms are created by configuring a generic system at development time with informat ion about the customer's business - Increased maintenance costsSpecific ERP syst ems are created by configuring a generic system at development time with informa tion about the customer's business answer: Lack of tool supportIncreased maintenance costs

U18 - Q037 Which are THREE essential elements of design patterns? (select three) A name that is a meaningful reference to the pattern A description of the probl em area that explains when the pattern may be applied A statement of the consequ ences of applying the pattern A concrete design description - A name that is a m eaningful reference to the patternLack of tool supportIncreased maintenance cost s - A description of the problem area that explains when the pattern may be appl iedLack of tool supportIncreased maintenance costs - A statement of the conseque nces of applying the patternLack of tool supportIncreased maintenance costs - A concrete design descriptionLack of tool supportIncreased maintenance costs answer: A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the co nsequences of applying the pattern U18 - Q038 Which are benefits of software reuse? Reduced process risks Effective using experiences of specialists Increase dependability Reduced maintain costs - Reduced process risksA name that is a meaningful reference to the patternA des cription of the problem area that explains when the pattern may be appliedA stat ement of the consequences of applying the pattern - Effective using experiences of specialistsA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern - Increase dependabilityA name that is a meaningful reference to the patternA description of the problem area that expl ains when the pattern may be appliedA statement of the consequences of applying the pattern - Reduced maintain costsA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern answer: Reduced process risksEffective using experiences of specialistsIncrease dependability U18 - Q039 Which are the two main approaches to concept reuse are? Design patter ns Generative programming Implementation pattern Aspect programming - Design pat ternsReduced process risksEffective using experiences of specialistsIncrease dep endability - Generative programmingReduced process risksEffective using experien ces of specialistsIncrease dependability - Implementation patternReduced process risksEffective using experiences of specialistsIncrease dependability - Aspect programmingReduced process risksEffective using experiences of specialistsIncrea se dependability answer: Design patternsGenerative programming U18-Q045 Select the incorrect statement about COTS product reuse COTS stand for: Customer Off-The-Shelf COTS systems are usually complete application systems th at offer an API. The key benefit is faster application development and, usually, lower development costs. Building large systems by integrating COTS systems is now a viable development strategy for some types of system such as E-commerce sy stems. - COTS stand for: Customer Off-The-ShelfDesign patternsGenerative program ming - COTS systems are usually complete application systems that offer an API.D esign patternsGenerative programming - The key benefit is faster application dev elopment and, usually, lower development costs.Design patternsGenerative program ming - Building large systems by integrating COTS systems is now a viable develo pment strategy for some types of system such as E-commerce systems.Design patter nsGenerative programming answer: COTS stand for: Customer Off-The-Shelf U18-Q045 Which is NOT an element of design patterns? Name: a meaningful pattern identifier. Problem description Solution description None of the others - Name: a meaningful pattern identifier.COTS stand for: Customer Off-The-Shelf - Problem descriptionCOTS stand for: Customer Off-The-Shelf - Solution descriptionCOTS st and for: Customer Off-The-Shelf - None of the othersCOTS stand for: Customer Off -The-Shelf answer: None of the others U23 - Q.043 Which of the followings belong to validation testing? To demonstrate to the developer and the system customer that the software meets its requiremen ts A successful test shows that the system operates as intended. To discover fau lts or defects in the software where its behaviour is incorrect or not in confor

mance with its specification A successful test is a test that makes the system p erform incorrectly and so exposes a defect in the system. - To demonstrate to th e developer and the system customer that the software meets its requirementsNone of the others - A successful test shows that the system operates as intended.No ne of the others - To discover faults or defects in the software where its behav iour is incorrect or not in conformance with its specificationNone of the others - A successful test is a test that makes the system perform incorrectly and so exposes a defect in the system.None of the others answer: To demonstrate to the developer and the system customer that the softwar e meets its requirementsA successful test shows that the system operates as inte nded. U23 - Q.044 What are two phases of system testing? Integration testing Release t esting Unit testing Component testing - Integration testingTo demonstrate to the developer and the system customer that the software meets its requirementsA suc cessful test shows that the system operates as intended. - Release testingTo dem onstrate to the developer and the system customer that the software meets its re quirementsA successful test shows that the system operates as intended. - Unit t estingTo demonstrate to the developer and the system customer that the software meets its requirementsA successful test shows that the system operates as intend ed. - Component testingTo demonstrate to the developer and the system customer t hat the software meets its requirementsA successful test shows that the system o perates as intended. answer: Integration testingRelease testing U23 - Q.047 Using equivalence partition testing for the following procedure: Sea rch (Key : ELEM ; T: {100, ..., 1000};Found : in out BOOLEAN; L: in out ELEM_IND EX) Which are numbers selected for testing? 100 ? 1000 Odd numbers Even numbers 99, 100, 500, 999, 1000 - 100 ? 1000Integration testingRelease testing - Odd num bersIntegration testingRelease testing - Even numbersIntegration testingRelease testing - 99, 100, 500, 999, 1000Integration testingRelease testing answer: 99, 100, 500, 999, 1000 U23 - Q.048 What is the function of stress testing? Testing individual component s in isolation Testing all interface methods of objects Planning a series of tes ts where the load is steadily increased until the system performance becomes una cceptable Making demands that are outside the design limits of the software - Te sting individual components in isolation99, 100, 500, 999, 1000 - Testing all in terface methods of objects99, 100, 500, 999, 1000 - Planning a series of tests w here the load is steadily increased until the system performance becomes unaccep table99, 100, 500, 999, 1000 - Making demands that are outside the design limits of the software99, 100, 500, 999, 1000 answer: Making demands that are outside the design limits of the software U23 - Q.049 Using equivalence partition testing to check employee ID by format 8 xxx: Boolean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected fo r testing? 8000 -> 9000 Odd employee IDs or even employee IDs within 8000 ->8999 8000, 8199, 8200, 8889, 8890 7999, 8000, 8500, 8999, 9000 - 8000 -> 9000Making demands that are outside the design limits of the software - Odd employee IDs or even employee IDs within 8000 ->8999Making demands that are outside the design limits of the software - 8000, 8199, 8200, 8889, 8890Making demands that are out side the design limits of the software - 7999, 8000, 8500, 8999, 9000Making dema nds that are outside the design limits of the software answer: 7999, 8000, 8500, 8999, 9000 U23 - Q.050 The CMS system is reliability if it can serve at least 2000 students at the same time without delays, so which testing method is used to check this non-functionality? System testing Stress testing Release testing Performance tes ting - System testing7999, 8000, 8500, 8999, 9000 - Stress testing7999, 8000, 85 00, 8999, 9000 - Release testing7999, 8000, 8500, 8999, 9000 - Performance testi ng7999, 8000, 8500, 8999, 9000 answer: Performance testing U23 - Q.051 A business management system runs well with sample test data but was failed with the real data, so which testing type is applied for this situation? System testing Performance testing Release testing Acceptance testing - System

testingPerformance testing - Performance testingPerformance testing - Release te stingPerformance testing - Acceptance testingPerformance testing answer: Acceptance testing U23 - Q001 How are the system testing? Testing on integrating components to crea te a system or sub-system Testing on integrating sub-systems to create a system Testing is done by an independent testing team Testing on individual program com ponents to create a sub-system - Testing on integrating components to create a s ystem or sub-systemAcceptance testing - Testing on integrating sub-systems to cr eate a systemAcceptance testing - Testing is done by an independent testing team Acceptance testing - Testing on individual program components to create a sub-sy stemAcceptance testing answer: Testing on integrating sub-systems to create a systemTesting on individu al program components to create a sub-system U23 - Q002 How are the component testing? Testing on individual program componen ts to create a sub-system Testing is done by component developers Testing is don e by an independent testing team Testing on interactive among components - Testi ng on individual program components to create a sub-systemTesting on integrating sub-systems to create a systemTesting on individual program components to creat e a sub-system - Testing is done by component developersTesting on integrating s ub-systems to create a systemTesting on individual program components to create a sub-system - Testing is done by an independent testing teamTesting on integrat ing sub-systems to create a systemTesting on individual program components to cr eate a sub-system - Testing on interactive among componentsTesting on integratin g sub-systems to create a systemTesting on individual program components to crea te a sub-system answer: Testing on individual program components to create a sub-systemTesting i s done by component developers U23 - Q003 Which types of testing are done by development team? Stress testing I nterface testing Release testing Acceptance testing - Stress testingTesting on i ndividual program components to create a sub-systemTesting is done by component developers - Interface testingTesting on individual program components to create a sub-systemTesting is done by component developers - Release testingTesting on individual program components to create a sub-systemTesting is done by componen t developers - Acceptance testingTesting on individual program components to cre ate a sub-systemTesting is done by component developers answer: Stress testingInterface testingRelease testing U23 - Q004 Which of the following need to be assessed during unit testing? Algor ithmic performance Code stability Error handling Execution paths - Algorithmic p erformanceStress testingInterface testingRelease testing - Code stabilityStress testingInterface testingRelease testing - Error handlingStress testingInterface testingRelease testing - Execution pathsStress testingInterface testingRelease t esting answer: Error handlingExecution paths U23 - Q005 Top-down integration testing has as it's major advantage(s) that Low level modules never need testing Major decision points are tested early No drive rs need to be written No stubs need to be written - Low level modules never need testingError handlingExecution paths - Major decision points are tested earlyEr ror handlingExecution paths - No drivers need to be writtenError handlingExecuti on paths - No stubs need to be writtenError handlingExecution paths answer: Major decision points are tested earlyNo drivers need to be written U23 - Q006 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorMajor decision poin ts are tested earlyNo drivers need to be written - Project managerMajor decision points are tested earlyNo drivers need to be written - DeveloperMajor decision points are tested earlyNo drivers need to be written - TesterMajor decision poin ts are tested earlyNo drivers need to be written answer: Developer U23 - Q007 What is the purpose of defect testing? To discover faults that make s oftware's behavior incorrect To verify that the software meet its requirements T o ensure about the performance of the software To test individual program compon

ents - To discover faults that make software's behavior incorrectDeveloper - To verify that the software meet its requirementsDeveloper - To ensure about the pe rformance of the softwareDeveloper - To test individual program componentsDevelo per answer: To discover faults that make software's behavior incorrect U23 - Q008 What is the normal order of activities in which traditional software testing is organized? a. Integration testing b. System testing c. Unit testing d . Validation testing a, d, c, b b, d, a, c c, a, d, b d, b, c, a - a, d, c, bTo discover faults that make software's behavior incorrect - b, d, a, cTo discover faults that make software's behavior incorrect - c, a, d, bTo discover faults th at make software's behavior incorrect - d, b, c, aTo discover faults that make s oftware's behavior incorrect answer: c, a, d, b U23 - Q009 What tests should be included in object class testing? Tests for all operations in isolation Tests that set and access all object attributes Tests th at force the object into all possible states Test the associations of the object s with the others - Tests for all operations in isolationc, a, d, b - Tests that set and access all object attributesc, a, d, b - Tests that force the object in to all possible statesc, a, d, b - Test the associations of the objects with the othersc, a, d, b answer: Tests for all operations in isolationTests that set and access all objec t attributesTests that force the object into all possible states U23 - Q010 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorTests for all opera tions in isolationTests that set and access all object attributesTests that forc e the object into all possible states - Project managerTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible states - DeveloperTests for all operations in isolation Tests that set and access all object attributesTests that force the object into all possible states - TesterTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible st ates answer: Developer U23 - Q011 What is the purpose of defect testing? To discover faults that make s oftware's behavior incorrect To verify that the software meet its requirements T o ensure about the performance of the software To test individual program compon ents - To discover faults that make software's behavior incorrectDeveloper - To verify that the software meet its requirementsDeveloper - To ensure about the pe rformance of the softwareDeveloper - To test individual program componentsDevelo per answer: U23 - Q012 What is the normal order of activities in which software testing proc ess is organized? 1. Prepare test data 2. Design test cases 3. Run program with test data 4. Compare results to test cases 1, 4, 3, 2 2, 1, 3, 4 3, 1, 4, 2 4, 2 , 3, 1 - 1, 4, 3, 2 - 2, 1, 3, 4 - 3, 1, 4, 2 - 4, 2, 3, 1 answer: 2, 1, 3, 4 U23 - Q013 What is the common limitation of automated testing? They are not usef ul for performance testing They cannot be used for requirement validation It is very difficult for automated scripts to verify a wide range of application respo nses They are not useful when requirements are changing frequently - They are no t useful for performance testing2, 1, 3, 4 - They cannot be used for requirement validation2, 1, 3, 4 - It is very difficult for automated scripts to verify a w ide range of application responses2, 1, 3, 4 - They are not useful when requirem ents are changing frequently2, 1, 3, 4 answer: They are not useful when requirements are changing frequently U23 - Q015 What is NOT a purpose of the testing process? To demonstrate that the software meets its requirements To discover faults or defects in the software T o fix faults or defects in the software - To demonstrate that the software meets its requirementsThey are not useful when requirements are changing frequently To discover faults or defects in the softwareThey are not useful when requireme

nts are changing frequently - To fix faults or defects in the softwareThey are n ot useful when requirements are changing frequently answer: To fix faults or defects in the software U23 - Q016 Which of these statements about defect testing is NOT true? The goal of defect testing is to discover defects in programs A successful test shows tha t the system operates as intended Tests show the presence not the absence of def ects - The goal of defect testing is to discover defects in programsTo fix fault s or defects in the software - A successful test shows that the system operates as intendedTo fix faults or defects in the software - Tests show the presence no t the absence of defectsTo fix faults or defects in the software answer: A successful test shows that the system operates as intended U23 - Q017 All of the following are the tests that should be included in object class testing EXCEPT Tests for all operations in isolation Tests that set and ac cess all object attributes Tests that force the object into all possible states Test the associations of the objects with the others - Tests for all operations in isolationA successful test shows that the system operates as intended - Tests that set and access all object attributesA successful test shows that the syste m operates as intended - Tests that force the object into all possible statesA s uccessful test shows that the system operates as intended - Test the association s of the objects with the othersA successful test shows that the system operates as intended answer: Test the associations of the objects with the others U23 - Q019 A successful defect test is a test which causes a program to behave i n an normal way True False - TrueTest the associations of the objects with the o thers - FalseTest the associations of the objects with the others answer: False U23 - Q020 Which of the following statement is about release testing? The test t eam tests the incomplete system right after it is component tested. It is to inc rease the supplier's confidence that the system meets its requirements It involv es building a system from its components and testing it for problems that arise It involves planning a series of tests where the load is steadily increased unti l the system performance becomes unacceptable - The test team tests the incomple te system right after it is component tested.False - It is to increase the suppl ier's confidence that the system meets its requirementsFalse - It involves build ing a system from its components and testing it for problems that ariseFalse - I t involves planning a series of tests where the load is steadily increased until the system performance becomes unacceptableFalse answer: It is to increase the supplier's confidence that the system meets its re quirements U23 - Q021 Please choose the correct definition of the unit testing? Unit testin g is the process of testing individual attributes, functions or methods within a n object Unit testing is usually black-box or functional testing Unit test team has to access to the system source code. The system is tested as components are integrated - Unit testing is the process of testing individual attributes, funct ions or methods within an objectIt is to increase the supplier's confidence that the system meets its requirements - Unit testing is usually black-box or functi onal testingIt is to increase the supplier's confidence that the system meets it s requirements - Unit test team has to access to the system source code. The sys tem is tested as components are integratedIt is to increase the supplier's confi dence that the system meets its requirements answer: Unit testing is the process of testing individual attributes, functions or methods within an object U23 - Q022 Which is right sequence in the software testing process? (1) Prepare test data (2) Create test case (3) Perform test (4) Create test report 1 `\Right arrow` 2 `\Rightarrow` 4 `\Rightarrow` 3 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rig htarrow` 4 2 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 1 2 `\Rightarrow` 1 ` \Rightarrow` 4 `\Rightarrow` 3 - 1 `\Rightarrow` 2 `\Rightarrow` 4 `\Rightarrow` 3Unit testing is the process of testing individual attributes, functions or met hods within an object - 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4Unit te sting is the process of testing individual attributes, functions or methods with

in an object - 2 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 1Unit testing is the process of testing individual attributes, functions or methods within an obj ect - 2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3Unit testing is the proce ss of testing individual attributes, functions or methods within an object answer: 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 U23 - Q023 Only exhaustive testing can show a program is free from defects. True False - True2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 - False2 `\Righta rrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 answer: True U23 - Q024 List the main purposes of the testing process? To demonstrate that th e software meets its requirements To discover faults or defects in the software To fix faults or defects in the software - To demonstrate that the software meet s its requirementsTrue - To discover faults or defects in the softwareTrue - To fix faults or defects in the softwareTrue answer: To demonstrate that the software meets its requirementsTo discover fault s or defects in the software U23 - Q025 Testing can only show the presence of errors, not their absence. True False - TrueTo demonstrate that the software meets its requirementsTo discover faults or defects in the software - FalseTo demonstrate that the software meets its requirementsTo discover faults or defects in the software answer: True U23 - Q026 List the tests that should be included in object class testing Tests for all operations in isolation Tests that set and access all object attributes Tests that force the object into all possible states Test the associations of th e objects with the others - Tests for all operations in isolationTrue - Tests th at set and access all object attributesTrue - Tests that force the object into a ll possible statesTrue - Test the associations of the objects with the othersTru e answer: Tests for all operations in isolationTests that set and access all objec t attributesTests that force the object into all possible states U23 - Q027 Please choose the correct statement about unit testing Unit testing i s the process of testing individual attributes, functions or methods within an o bject Unit testing is usually black-box or functional testing Unit test team has to access to the system source code. The system is tested as components are int egrated - Unit testing is the process of testing individual attributes, function s or methods within an objectTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible s tates - Unit testing is usually black-box or functional testingTests for all ope rations in isolationTests that set and access all object attributesTests that fo rce the object into all possible states - Unit test team has to access to the sy stem source code. The system is tested as components are integratedTests for all operations in isolationTests that set and access all object attributesTests tha t force the object into all possible states answer: Unit testing is the process of testing individual attributes, functions or methods within an object U23 - Q028 Which of the following statements about testing is NOT true? Testing can only show the presence of errors in a program It cannot demonstrate that the re are no remaining faults Its goal is to fix errors of the software system None of the others - Testing can only show the presence of errors in a programUnit t esting is the process of testing individual attributes, functions or methods wit hin an object - It cannot demonstrate that there are no remaining faultsUnit tes ting is the process of testing individual attributes, functions or methods withi n an object - Its goal is to fix errors of the software systemUnit testing is th e process of testing individual attributes, functions or methods within an objec t - None of the othersUnit testing is the process of testing individual attribut es, functions or methods within an object answer: Its goal is to fix errors of the software system U23 - Q029 Which of the following statements about Equivalence partitioning are NOT true? Equivalence partitioning is a way of deriving test cases It depends on finding partitions in the input and output data sets and exercising the program

with values from these partitions Often, the value that is most likely to lead to a successful test is a value at the boundary of a partition. None of the othe rs - Equivalence partitioning is a way of deriving test casesIts goal is to fix errors of the software system - It depends on finding partitions in the input an d output data sets and exercising the program with values from these partitionsI ts goal is to fix errors of the software system - Often, the value that is most likely to lead to a successful test is a value at the boundary of a partition.It s goal is to fix errors of the software system - None of the othersIts goal is t o fix errors of the software system answer: None of the others U23 - Q030 Which of the following are the testing process goals? The check that the software meets its requirements Discover faults or defects in the software A ll of the others - The check that the software meets its requirementsNone of the others - Discover faults or defects in the softwareNone of the others - All of the othersNone of the others answer: All of the others U23 - Q031 Which of the following statements about the differences between integ rating testing and component testing are true? The integrating testing tests the result of the component interaction The integrating testing test the result of the component while the component testing test its internal structure The compon ent testing tests the system's goals that will be applied to integrating system All of the others - The integrating testing tests the result of the component in teractionAll of the others - The integrating testing test the result of the comp onent while the component testing test its internal structureAll of the others The component testing tests the system's goals that will be applied to integrat ing systemAll of the others - All of the othersAll of the others answer: The integrating testing tests the result of the component interaction U23 - Q032 Which of the following statement about the two distinct phases of sys tem testing is NOT true? Integration testing where the components and subsystems making up the system are integrated and tested The integration team does NOT ha ve access to the source code of the system. Release testing where the version of the system to be released to users is tested. The release testing team treat th e system as a black-box while testing None of the others - Integration testing w here the components and subsystems making up the system are integrated and teste dThe integrating testing tests the result of the component interaction - The int egration team does NOT have access to the source code of the system.The integrat ing testing tests the result of the component interaction - Release testing wher e the version of the system to be released to users is tested.The integrating te sting tests the result of the component interaction - The release testing team t reat the system as a black-box while testingThe integrating testing tests the re sult of the component interaction - None of the othersThe integrating testing te sts the result of the component interaction answer: The integration team does NOT have access to the source code of the syst em. U23 - Q036 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorThe integration tea m does NOT have access to the source code of the system. - Project managerThe in tegration team does NOT have access to the source code of the system. - Develope rThe integration team does NOT have access to the source code of the system. - T esterThe integration team does NOT have access to the source code of the system. answer: Developer U23 - Q037 What is the purpose of defect testing? To discover faults that make s oftwares behavior incorrect To verify that the software meet its requirements To ensure about the performance of the software To test individual program componen ts - To discover faults that make softwares behavior incorrectDeveloper - To veri fy that the software meet its requirementsDeveloper - To ensure about the perfor mance of the softwareDeveloper - To test individual program componentsDeveloper answer: To discover faults that make softwares behavior incorrect

U23 - Q038 Which of the followings belong to component testing? Testing of indiv idual program components Usually the responsibility of the component developer T ests are derived from the developers experience The responsibility of an independ ent testing team Testing of groups of components integrated to create a system o r sub-system - Testing of individual program componentsTo discover faults that m ake softwares behavior incorrect - Usually the responsibility of the component de veloperTo discover faults that make softwares behavior incorrect - Tests are deri ved from the developers experienceTo discover faults that make softwares behavior incorrect - The responsibility of an independent testing teamTo discover faults that make softwares behavior incorrect - Testing of groups of components integrat ed to create a system or sub-systemTo discover faults that make softwares behavio r incorrect answer: Testing of individual program componentsUsually the responsibility of th e component developerTests are derived from the developers experience U23 - Q039 What are the goals of validation testing? To demonstrate to the devel oper and the system customer that the software meets its requirements Shows that the system operates as intended To discover faults or defects in the software w here its behavior is incorrect or not in conformance with its specification Expo ses the defects in the system - To demonstrate to the developer and the system c ustomer that the software meets its requirementsTesting of individual program co mponentsUsually the responsibility of the component developerTests are derived f rom the developers experience - Shows that the system operates as intendedTesting of individual program componentsUsually the responsibility of the component dev eloperTests are derived from the developers experience - To discover faults or de fects in the software where its behavior is incorrect or not in conformance with its specificationTesting of individual program componentsUsually the responsibi lity of the component developerTests are derived from the developers experience Exposes the defects in the systemTesting of individual program componentsUsuall y the responsibility of the component developerTests are derived from the develo pers experience answer: To demonstrate to the developer and the system customer that the softwar e meets its requirementsShows that the system operates as intended U23-Q045 Select incorrect statements about Unit testing Sometime called black-bo x testing. Derivation of test cases according to program structure. Knowledge of the program is used to identify additional test cases. Objective is to exercise all program statements - Sometime called black-box testing.To demonstrate to th e developer and the system customer that the software meets its requirementsShow s that the system operates as intended - Derivation of test cases according to p rogram structure.To demonstrate to the developer and the system customer that th e software meets its requirementsShows that the system operates as intended - Kn owledge of the program is used to identify additional test cases.To demonstrate to the developer and the system customer that the software meets its requirement sShows that the system operates as intended - Objective is to exercise all progr am statementsTo demonstrate to the developer and the system customer that the so ftware meets its requirementsShows that the system operates as intended answer: Sometime called black-box testing. U23-Q046 Who has responsible for component testing? Developers Testers Customers Testers and Customers - DevelopersSometime called black-box testing. - TestersS ometime called black-box testing. - CustomersSometime called black-box testing. - Testers and CustomersSometime called black-box testing. answer: Developers U29 - Q.043 New versions of software systems are created as they change: For dif ferent machines/OS Offering different functionality Tailored for particular user requirements All of the others - For different machines/OSDevelopers - Offering different functionalityDevelopers - Tailored for particular user requirementsDe velopers - All of the othersDevelopers answer: All of the others U29 - Q.044 What should we do first when we receive a change request from out cu stomer? Submit change request to Change Control Board Analyse the change request Make changes to the software Fill in the change request form - Submit change re

quest to Change Control BoardAll of the others - Analyse the change requestAll o f the others - Make changes to the softwareAll of the others - Fill in the chang e request formAll of the others answer: Fill in the change request form U29 - Q.047 How is variant of a system? An instance of a system which is functio nally distinct in some way from other system instances An instance of a system w hich is distributed to users outside of the development team A demostration An i nstance of a system which is functionally identical but non-functionally distinc t from other instances of a system - An instance of a system which is functional ly distinct in some way from other system instancesFill in the change request fo rm - An instance of a system which is distributed to users outside of the develo pment teamFill in the change request form - A demostrationFill in the change req uest form - An instance of a system which is functionally identical but non-func tionally distinct from other instances of a systemFill in the change request for m answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q.048 How is release of a system? An instance of a system which is functio nally distinct in some way from other system instances A demostration An instanc e of a system which is functionally identical but non-functionally distinct from other instances of a system An instance of a system which is distributed to use rs outside of the development team - An instance of a system which is functional ly distinct in some way from other system instancesAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - A demostrationAn instance of a system which is functionally identica l but non-functionally distinct from other instances of a system - An instance o f a system which is functionally identical but non-functionally distinct from ot her instances of a systemAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - An instance of a system which is distributed to users outside of the development teamAn instan ce of a system which is functionally identical but non-functionally distinct fro m other instances of a system answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q.049 The student management system was completed with two functions, mana ging student information and organizing quizes for review, after that the custom er added one more function, organizing online examination. Finally all of them a re put into the configuration management and are built for system testing, so wh at is the build called? Variant Delta Release Version - VariantAn instance of a system which is distributed to users outside of the development team - DeltaAn i nstance of a system which is distributed to users outside of the development tea m - ReleaseAn instance of a system which is distributed to users outside of the development team - VersionAn instance of a system which is distributed to users outside of the development team answer: Version U29 - Q.050 The student management system was completed and now it is needed to improve performance in case organizing online examination. After improvement was completed and was put into the configuration management, what is it called? Ver sion Delta Release Variant - VersionVersion - DeltaVersion - ReleaseVersion - Va riantVersion answer: Variant U29 - Q.051 The CM database stored configuration items as below, and now the cus tomer changes requirement A, so what will be affected by this change? 1. CMS / r equirement A / class 1 / function a 2. CMS / requirement A / class 2 / function b 3. CMS / requirement A / class 2 / function c 4. CMS / requirement B / class 1 / function e / function b 5. CMS / requirement B / class 3 / function d / funct ion a 6. CMS / requirement C / class 4 / function f / function g class 1, class 2 function a, function b, function c class 1, class 2, class 3, class 4 class 1, class 2, class 3 - class 1, class 2Variant - function a, function b, function c Variant - class 1, class 2, class 3, class 4Variant - class 1, class 2, class 3V

ariant answer: class 1, class 2, class 3 U29 - Q001 Why is the configuration management applied? Aim to control the costs and effort involved in making changes to a system Make the product development more quality Support to evolve software product Make necessary configurations fo r preparing software development environment - Aim to control the costs and effo rt involved in making changes to a systemclass 1, class 2, class 3 - Make the pr oduct development more qualityclass 1, class 2, class 3 - Support to evolve soft ware productclass 1, class 2, class 3 - Make necessary configurations for prepar ing software development environmentclass 1, class 2, class 3 answer: Aim to control the costs and effort involved in making changes to a syst emMake the product development more qualitySupport to evolve software product U29 - Q002 Which development phases are included in the configuration management plan? Design Implementation Testing Deployment - DesignAim to control the costs and effort involved in making changes to a systemMake the product development m ore qualitySupport to evolve software product - ImplementationAim to control the costs and effort involved in making changes to a systemMake the product develop ment more qualitySupport to evolve software product - TestingAim to control the costs and effort involved in making changes to a systemMake the product developm ent more qualitySupport to evolve software product - DeploymentAim to control th e costs and effort involved in making changes to a systemMake the product develo pment more qualitySupport to evolve software product answer: DesignImplementationTesting U29 - Q003 Which information are included in the component header? Project name Author of the component and creation date Version number and what were changed P re-conditions and post conditions - Project nameDesignImplementationTesting - Au thor of the component and creation dateDesignImplementationTesting - Version num ber and what were changedDesignImplementationTesting - Pre-conditions and post c onditionsDesignImplementationTesting answer: Project nameAuthor of the component and creation dateVersion number and what were changed U29 - Q004 Which of the following is not considered one of the four important el ements that should exist when a configuration management system is developed? Co mponent elements Human elements Process elements Validation elements - Component elementsProject nameAuthor of the component and creation dateVersion number and what were changed - Human elementsProject nameAuthor of the component and creat ion dateVersion number and what were changed - Process elementsProject nameAutho r of the component and creation dateVersion number and what were changed - Valid ation elementsProject nameAuthor of the component and creation dateVersion numbe r and what were changed answer: Human elements U29 - Q005 Which of the following tasks is not part of software configuration ma nagement? Change control Eporting Statistical quality control Version control Change controlHuman elements - EportingHuman elements - Statistical quality cont rolHuman elements - Version controlHuman elements answer: Statistical quality control U29 - Q006 What are the objectives of change management procedures? Analyzing th e costs and benefits of proposed changes Approving changes that are worthwhile T racking which components of the system have been changed To prevent customer req uirement change - Analyzing the costs and benefits of proposed changesStatistica l quality control - Approving changes that are worthwhileStatistical quality con trol - Tracking which components of the system have been changedStatistical qual ity control - To prevent customer requirement changeStatistical quality control answer: Analyzing the costs and benefits of proposed changesApproving changes th at are worthwhileTracking which components of the system have been changed U29 - Q007 When software configuration management is a formal activity, the soft ware configuration audit is conducted by the Development team Quality assurance group Senior managers Testing specialists - Development teamAnalyzing the costs and benefits of proposed changesApproving changes that are worthwhileTracking wh

ich components of the system have been changed - Quality assurance groupAnalyzin g the costs and benefits of proposed changesApproving changes that are worthwhil eTracking which components of the system have been changed - Senior managersAnal yzing the costs and benefits of proposed changesApproving changes that are worth whileTracking which components of the system have been changed - Testing special istsAnalyzing the costs and benefits of proposed changesApproving changes that a re worthwhileTracking which components of the system have been changed answer: Quality assurance group U29 - Q008 What are the two types of CM workbench? Open workbenches Integrated w orkbenches Development workbenches - Open workbenchesQuality assurance group - I ntegrated workbenchesQuality assurance group - Development workbenchesQuality as surance group answer: Open workbenchesIntegrated workbenches U29 - Q009 What are three basic techniques for component identification? Version numbering Attribute-based identification Change-oriented identification Methodbased identification - Version numberingOpen workbenchesIntegrated workbenches Attribute-based identificationOpen workbenchesIntegrated workbenches - Change-o riented identificationOpen workbenchesIntegrated workbenches - Method-based iden tificationOpen workbenchesIntegrated workbenches answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q010 What is NOT an objective of change management procedures? Analyzing t he costs and benefits of proposed changes Approving changes that are worthwhile Tracking which components of the system have been changed To prevent requirement changes - Analyzing the costs and benefits of proposed changesVersion numbering Attribute-based identificationChange-oriented identification - Approving changes that are worthwhileVersion numberingAttribute-based identificationChange-orient ed identification - Tracking which components of the system have been changedVer sion numberingAttribute-based identificationChange-oriented identification - To prevent requirement changesVersion numberingAttribute-based identificationChange -oriented identification answer: To prevent requirement changes U29 - Q011 When software configuration management is a formal activity, the soft ware configuration audit is conducted by the... Development team Quality assuran ce group Senior managers Testing specialists - Development teamTo prevent requir ement changes - Quality assurance groupTo prevent requirement changes - Senior m anagersTo prevent requirement changes - Testing specialistsTo prevent requiremen t changes answer: Quality assurance group U29 - Q012 What is a version? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesQuality assurance group - An instance of a system whic h is functionally identical but non-functionally distinct from other instances o f a systemQuality assurance group - An instance of a system which is distributed to users outside of the development teamQuality assurance group answer: An instance of a system which is functionally distinct in some way from other system instances U29 - Q013 What is NOT a technique for component identification? Version numberi ng Attribute-based identification Change-oriented identification Function-based identification - Version numberingAn instance of a system which is functionally distinct in some way from other system instances - Attribute-based identificatio nAn instance of a system which is functionally distinct in some way from other s ystem instances - Change-oriented identificationAn instance of a system which is functionally distinct in some way from other system instances - Function-based identificationAn instance of a system which is functionally distinct in some way from other system instances answer: Function-based identification

U29 - Q015 What is a release? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesFunction-based identification - An instance of a syste m which is functionally identical but non-functionally distinct from other insta nces of a systemFunction-based identification - An instance of a system which is distributed to users outside of the development teamFunction-based identificati on answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q016 What is a variant? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesAn instance of a system which is distributed to users outside of the development team - An instance of a system which is functionally identical but non-functionally distinct from other instances of a systemAn insta nce of a system which is distributed to users outside of the development team An instance of a system which is distributed to users outside of the development teamAn instance of a system which is distributed to users outside of the develo pment team answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q017 All of the following are techniques for component identification EXCE PT Version numbering Attribute-based identification Change-oriented identificati on Function-based identification - Version numberingAn instance of a system whic h is functionally identical but non-functionally distinct from other instances o f a system - Attribute-based identificationAn instance of a system which is func tionally identical but non-functionally distinct from other instances of a syste m - Change-oriented identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - Funct ion-based identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system answer: Function-based identification U29 - Q019 The customer wants to make a change to the project scope. The best th ing for the project team to evaluate is the: effect of the change on scope plann ing effect of the change on the project scope effect of the change on the projec t schedule, cost, quality, and risks effect of the change on the project baselin es - effect of the change on scope planningFunction-based identification - effec t of the change on the project scopeFunction-based identification - effect of th e change on the project schedule, cost, quality, and risksFunction-based identif ication - effect of the change on the project baselinesFunction-based identifica tion answer: effect of the change on the project schedule, cost, quality, and risks U29 - Q020 Who reviews and approves the change requests? Project manager Project director General director Change control board - Project managereffect of the c hange on the project schedule, cost, quality, and risks - Project directoreffect of the change on the project schedule, cost, quality, and risks - General direc toreffect of the change on the project schedule, cost, quality, and risks - Chan ge control boardeffect of the change on the project schedule, cost, quality, and risks answer: Change control board U29 - Q021 Which is the right sequence of the change management process? (1) Ana lyze change request (2) Request change by completing a change request form (3) M ake changes to software (4) Submit request to change control board (5) Create ne w system version 1 `\Rightarrow` 5 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 2 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 `\Rightarrow` 5 2 `\Rightar

row` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 2 `\Rightarrow` 1 `\Right arrow` 5 `\Rightarrow` 3 `\Rightarrow` 4 - 1 `\Rightarrow` 5 `\Rightarrow` 4 `\R ightarrow` 3 `\Rightarrow` 2Change control board - 2 `\Rightarrow` 1 `\Rightarro w` 3 `\Rightarrow` 4 `\Rightarrow` 5Change control board - 2 `\Rightarrow` 1 `\R ightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5Change control board - 2 `\Rightarro w` 1 `\Rightarrow` 5 `\Rightarrow` 3 `\Rightarrow` 4Change control board answer: 2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 U29 - Q023 The change requests should be reviewed and approved by Project manage r Project director General director Change control board - Project manager2 `\Ri ghtarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - Project director2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - General direct or2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - Change con trol board2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 answer: Change control board U29 - Q024 Which of the following statements belong to system release? An instan ce of a system which is functionally distinct in some way from other system inst ances An instance of a system which is functionally identical but non-functional ly distinct from other instances of a system An instance of a system which is di stributed to users outside of the development team - An instance of a system whi ch is functionally distinct in some way from other system instancesChange contro l board - An instance of a system which is functionally identical but non-functi onally distinct from other instances of a systemChange control board - An instan ce of a system which is distributed to users outside of the development teamChan ge control board answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q025 Which of the following statements belong to system variant? An instan ce of a system which is functionally distinct in some way from other system inst ances An instance of a system which is functionally identical but non-functional ly distinct from other instances of a system An instance of a system which is di stributed to users outside of the development team - An instance of a system whi ch is functionally distinct in some way from other system instancesAn instance o f a system which is distributed to users outside of the development team - An in stance of a system which is functionally identical but non-functionally distinct from other instances of a systemAn instance of a system which is distributed to users outside of the development team - An instance of a system which is distri buted to users outside of the development teamAn instance of a system which is d istributed to users outside of the development team answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q026 List techniques that can be used for component identification Version numbering Attribute-based identification Change-oriented identification Functio n - based identification - Version numberingAn instance of a system which is fun ctionally identical but non-functionally distinct from other instances of a syst em - Attribute-based identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - Chan ge-oriented identificationAn instance of a system which is functionally identica l but non-functionally distinct from other instances of a system - Function - ba sed identificationAn instance of a system which is functionally identical but no n-functionally distinct from other instances of a system answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q028 What is meant by configuration management? The development and use of standards and procedures for managing an evolving software system Configuration management is concerned with ensuring that software has a low number of defects and that it reaches the required standards of maintainability, reliability, and portability and so on. All of the others - The development and use of standards and procedures for managing an evolving software systemVersion numberingAttribu te-based identificationChange-oriented identification - Configuration management is concerned with ensuring that software has a low number of defects and that i

t reaches the required standards of maintainability, reliability, and portabilit y and so on.Version numberingAttribute-based identificationChange-oriented ident ification - All of the othersVersion numberingAttribute-based identificationChan ge-oriented identification answer: The development and use of standards and procedures for managing an evol ving software system U29 - Q029 Change request is proposal due to ______ Customers Developers Market forces All of the others - CustomersThe development and use of standards and pro cedures for managing an evolving software system - DevelopersThe development and use of standards and procedures for managing an evolving software system - Mark et forcesThe development and use of standards and procedures for managing an evo lving software system - All of the othersThe development and use of standards an d procedures for managing an evolving software system answer: All of the others U29 - Q036 What are the objectives of change management procedures? Analyzing th e costs and benefits of proposed changes Approving changes that are worthwhile T racking which components of the system have been changed To prevent customer req uirement change - Analyzing the costs and benefits of proposed changesAll of the others - Approving changes that are worthwhileAll of the others - Tracking whic h components of the system have been changedAll of the others - To prevent custo mer requirement changeAll of the others answer: Analyzing the costs and benefits of proposed changesApproving changes th at are worthwhileTracking which components of the system have been changed U29 - Q037 What are three basic techniques for component identification? Version numbering Attribute-based identification Change-oriented identification Method based identification - Version numberingAnalyzing the costs and benefits of prop osed changesApproving changes that are worthwhileTracking which components of th e system have been changed - Attribute-based identificationAnalyzing the costs a nd benefits of proposed changesApproving changes that are worthwhileTracking whi ch components of the system have been changed - Change-oriented identificationAn alyzing the costs and benefits of proposed changesApproving changes that are wor thwhileTracking which components of the system have been changed - Method based identificationAnalyzing the costs and benefits of proposed changesApproving chan ges that are worthwhileTracking which components of the system have been changed answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q038 New versions of software systems are created as they change: For diff erent machines/OS Offering different functionality Tailored for particular user requirements All of the others None of the others - For different machines/OSVer sion numberingAttribute-based identificationChange-oriented identification - Off ering different functionalityVersion numberingAttribute-based identificationChan ge-oriented identification - Tailored for particular user requirementsVersion nu mberingAttribute-based identificationChange-oriented identification - All of the othersVersion numberingAttribute-based identificationChange-oriented identifica tion - None of the othersVersion numberingAttribute-based identificationChange-o riented identification answer: All of the others U29 - Q039 Which of the following statements about configuration management (CM) are true? CM should always be based on a set of standards which are applied wit hin an organisation The standards should define how items are identified; how ch anges are controlled and how new versions are managed. Some existing standards a re based on a waterfall process model - new CM standards are needed for evolutio nary development Standards can be based on external CM standards only - CM shoul d always be based on a set of standards which are applied within an organisation All of the others - The standards should define how items are identified; how ch anges are controlled and how new versions are managed.All of the others - Some e xisting standards are based on a waterfall process model - new CM standards are needed for evolutionary developmentAll of the others - Standards can be based on external CM standards onlyAll of the others -

answer: CM should always be based on a set of standards which are applied within an organisationThe standards should define how items are identified; how change s are controlled and how new versions are managed.Some existing standards are ba sed on a waterfall process model - new CM standards are needed for evolutionary development U29-Q045 Which artifacts are included in system releases? Executable code, data, configuration files and documentation. Executable code, data and documentation. Software product, data, configuration files and documentation. Software product , data and documentation. - Executable code, data, configuration files and docum entation.CM should always be based on a set of standards which are applied withi n an organisationThe standards should define how items are identified; how chang es are controlled and how new versions are managed.Some existing standards are b ased on a waterfall process model - new CM standards are needed for evolutionary development - Executable code, data and documentation.CM should always be based on a set of standards which are applied within an organisationThe standards sho uld define how items are identified; how changes are controlled and how new vers ions are managed.Some existing standards are based on a waterfall process model - new CM standards are needed for evolutionary development - Software product, d ata, configuration files and documentation.CM should always be based on a set of standards which are applied within an organisationThe standards should define h ow items are identified; how changes are controlled and how new versions are man aged.Some existing standards are based on a waterfall process model - new CM sta ndards are needed for evolutionary development - Software product, data and docu mentation.CM should always be based on a set of standards which are applied with in an organisationThe standards should define how items are identified; how chan ges are controlled and how new versions are managed.Some existing standards are based on a waterfall process model - new CM standards are needed for evolutionar y development answer: Executable code, data, configuration files and documentation. U29-Q045 Select key issues when designing a secure architecture Organizing the s tructure of system to protect assets Concentrating assets to minimize losses Bui ld minimize system to avoid big damage when attacked. All of the others - Organi zing the structure of system to protect assetsExecutable code, data, configurati on files and documentation. - Concentrating assets to minimize lossesExecutable code, data, configuration files and documentation. - Build minimize system to av oid big damage when attacked.Executable code, data, configuration files and docu mentation. - All of the othersExecutable code, data, configuration files and doc umentation. answer: Organizing the structure of system to protect assets U30 - Q.043 ______security is a software engineering problem where the system is designed to resist attacks. Infrastructure Maintain None of the others Applicat ion - InfrastructureOrganizing the structure of system to protect assets - Maint ainOrganizing the structure of system to protect assets - None of the othersOrga nizing the structure of system to protect assets - ApplicationOrganizing the str ucture of system to protect assets answer: Application U30 - Q.044 Which of the followings belong to "Vulnerability" The possible loss or harm that could result from a successful attack. This can be loss or damage t o data or can be a loss of time and effort if recovery is necessary after a secu rity breach. An exploitation of a system's vulnerability. Generally, this is fro m outside the system and is a deliberate attempt to cause some damage. A protect ive measure that reduces a system's vulnerability. Encryption would be an exampl e of a control that reduced a vulnerability of a weak access control system. A w eakness in a computer-based system that may be exploited to cause loss or harm. - The possible loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is ne cessary after a security breach.Application - An exploitation of a system's vuln erability. Generally, this is from outside the system and is a deliberate attemp t to cause some damage.Application - A protective measure that reduces a system' s vulnerability. Encryption would be an example of a control that reduced a vuln

erability of a weak access control system.Application - A weakness in a computer -based system that may be exploited to cause loss or harm.Application answer: A weakness in a computer-based system that may be exploited to cause los s or harm. U30 - Q.047 What fundamental issue must be considered when designing system arch itecture for security? How the critical assets should be processed How system co mponents are arranged on the architecture to against external attack Graphic use r interface should be checked carefully to prevent malicious input data The syst em assets should be distributed - How the critical assets should be processedA w eakness in a computer-based system that may be exploited to cause loss or harm. - How system components are arranged on the architecture to against external att ackA weakness in a computer-based system that may be exploited to cause loss or harm. - Graphic user interface should be checked carefully to prevent malicious input dataA weakness in a computer-based system that may be exploited to cause l oss or harm. - The system assets should be distributedA weakness in a computer-b ased system that may be exploited to cause loss or harm. answer: The system assets should be distributed U30 - Q.048 Which level of protection that might be used to prevent malicious ac cesses to the database? Platform level Record level Infrastructure level Applica tion level - Platform levelThe system assets should be distributed - Record leve lThe system assets should be distributed - Infrastructure levelThe system assets should be distributed - Application levelThe system assets should be distribute d answer: Application level U30 - Q.049 When apply security control for the CMS system, which action is done first? The system should be equipped 1 secure login page All data should be enc oded Investigating gaps of the system which can be attacked All student informat ion needs to be evaluated and defines which ones are protected - The system shou ld be equipped 1 secure login pageApplication level - All data should be encoded Application level - Investigating gaps of the system which can be attackedApplic ation level - All student information needs to be evaluated and defines which on es are protectedApplication level answer: All student information needs to be evaluated and defines which ones are protected U30 - Q.050 How to build security for the CMS system? Validating all user input values Using highest security technologies such as biometric technology Using en cryption algorithm for all data Building system authentication, record accessed authorisation and database authorisation - Validating all user input valuesAll s tudent information needs to be evaluated and defines which ones are protected Using highest security technologies such as biometric technologyAll student info rmation needs to be evaluated and defines which ones are protected - Using encry ption algorithm for all dataAll student information needs to be evaluated and de fines which ones are protected - Building system authentication, record accessed authorisation and database authorisationAll student information needs to be eva luated and defines which ones are protected answer: Building system authentication, record accessed authorisation and databa se authorisation U30 - Q.051 In the Patient information management system at 1 hospital, when the system is started, list of patients as well as their information are downloaded to a secure area on the system client that is used by hospital staff to prevent the staffs connect to the server many times all day, and all patient informatio n will be updated back to server at the end of day as well as they were deleted from the system client. So which case is not security in the system? The patient information at the system client will be accessed by unauthorised user The staf f forgot updating patient information to server at the end of day The staff forg ot deleting patient information from the system client The system client is fail ed while working - The patient information at the system client will be accessed by unauthorised userBuilding system authentication, record accessed authorisati on and database authorisation - The staff forgot updating patient information to server at the end of dayBuilding system authentication, record accessed authori

sation and database authorisation - The staff forgot deleting patient informatio n from the system clientBuilding system authentication, record accessed authoris ation and database authorisation - The system client is failed while workingBuil ding system authentication, record accessed authorisation and database authorisa tion answer: The system client is failed while working U30 - Q001 What are the security risk management concerned? Assessing the possib le losses that might ensue from attacks on the system Balancing the possible los ses against the costs of security procedures that may reduce these losses Assess ing the life cycle of risks Analyse assets of the system - Assessing the possibl e losses that might ensue from attacks on the systemThe system client is failed while working - Balancing the possible losses against the costs of security proc edures that may reduce these lossesThe system client is failed while working - A ssessing the life cycle of risksThe system client is failed while working - Anal yse assets of the systemThe system client is failed while working answer: Assessing the possible losses that might ensue from attacks on the syste mBalancing the possible losses against the costs of security procedures that may reduce these losses U30 - Q002 How are analyse assets of the system? Identify system resources that have a value and have to be protected Set level of value of each asset Set the l evel of exposure of each asset Set level of vulnerabilities of each asset - Iden tify system resources that have a value and have to be protectedAssessing the po ssible losses that might ensue from attacks on the systemBalancing the possible losses against the costs of security procedures that may reduce these losses - S et level of value of each assetAssessing the possible losses that might ensue fr om attacks on the systemBalancing the possible losses against the costs of secur ity procedures that may reduce these losses - Set the level of exposure of each assetAssessing the possible losses that might ensue from attacks on the systemBa lancing the possible losses against the costs of security procedures that may re duce these losses - Set level of vulnerabilities of each assetAssessing the poss ible losses that might ensue from attacks on the systemBalancing the possible lo sses against the costs of security procedures that may reduce these losses answer: Identify system resources that have a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset U30 - Q003 What are the design guidelines to make the secure system? Raise aware mess of the security issues Consider as basic of a review checklist that is appl ied during the system validation process Process guidance to develop the system more secure Coding techniques to make the system more secure - Raise awaremess o f the security issuesIdentify system resources that have a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset - Consider as basic of a review checklist that is applied during the system val idation processIdentify system resources that have a value and have to be protec tedSet level of value of each assetSet the level of exposure of each asset - Pro cess guidance to develop the system more secureIdentify system resources that ha ve a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset - Coding techniques to make the system more secureIde ntify system resources that have a value and have to be protectedSet level of va lue of each assetSet the level of exposure of each asset answer: Raise awaremess of the security issuesConsider as basic of a review chec klist that is applied during the system validation process U30 - Q004 What is the first layer of system layers? Application Reusable compon ents and libraries Middleware Operation system - ApplicationRaise awaremess of t he security issuesConsider as basic of a review checklist that is applied during the system validation process - Reusable components and librariesRaise awaremes s of the security issuesConsider as basic of a review checklist that is applied during the system validation process - MiddlewareRaise awaremess of the security issuesConsider as basic of a review checklist that is applied during the system validation process - Operation systemRaise awaremess of the security issuesCons ider as basic of a review checklist that is applied during the system validation process -

answer: Application U30 - Q005 What is the last layer of system layers? Application Reusable compone nts and libraries Middleware Operation system - ApplicationApplication - Reusabl e components and librariesApplication - MiddlewareApplication - Operation system Application answer: Operation system U30 - Q006 Why do we need consider security for project? Security is a part of S oftware process To allow administrators manage user To have good architecture de sign To protect the system against external attack - Security is a part of Softw are processOperation system - To allow administrators manage userOperation syste m - To have good architecture designOperation system - To protect the system aga inst external attackOperation system answer: To protect the system against external attack U30 - Q007 Consider security design for username and password protection, what a re two good designs? (select two) System users are authenticated using a login n ame/password combination. No other authentication method is supported Requires u ser change password after 2 months Username can be any characters Password can b e blank - System users are authenticated using a login name/password combination . No other authentication method is supportedTo protect the system against exter nal attack - Requires user change password after 2 monthsTo protect the system a gainst external attack - Username can be any charactersTo protect the system aga inst external attack - Password can be blankTo protect the system against extern al attack answer: System users are authenticated using a login name/password combination. No other authentication method is supportedRequires user change password after 2 months U30 - Q008 Define the security terms 'attack' A weakness in a computer-based sys tem that may be exploited to cause loss or harm The possible loss or harm that c ould result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A n exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a comput er-based system that may be exploited to cause loss or harmSystem users are auth enticated using a login name/password combination. No other authentication metho d is supportedRequires user change password after 2 months - The possible loss o r harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a secur ity breach.System users are authenticated using a login name/password combinatio n. No other authentication method is supportedRequires user change password afte r 2 months - An exploitation of a system's vulnerability. Generally, this is fro m outside the system and is a deliberate attempt to cause some damageSystem user s are authenticated using a login name/password combination. No other authentica tion method is supportedRequires user change password after 2 months answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q009 What are the three levels of protection that might be used in an info rmation system? Platform-level protection Application-level protection Record-le vel protection Environment-level protection - Platform-level protectionAn exploi tation of a system's vulnerability. Generally, this is from outside the system a nd is a deliberate attempt to cause some damage - Application-level protectionAn exploitation of a system's vulnerability. Generally, this is from outside the s ystem and is a deliberate attempt to cause some damage - Record-level protection An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - Environment-level pro tectionAn exploitation of a system's vulnerability. Generally, this is from outs ide the system and is a deliberate attempt to cause some damage answer: Platform-level protectionApplication-level protectionRecord-level protec tion U30 - Q010 Why do we need to consider security for project? Security is a part o f Software process To allow administrators manage user To have good architecture

design To protect the system against external attack - Security is a part of So ftware processPlatform-level protectionApplication-level protectionRecord-level protection - To allow administrators manage userPlatform-level protectionApplica tion-level protectionRecord-level protection - To have good architecture designP latform-level protectionApplication-level protectionRecord-level protection - To protect the system against external attackPlatform-level protectionApplicationlevel protectionRecord-level protection answer: To protect the system against external attack U30 - Q011 Which of the following design guidelines for secure systems engineeri ng is NOT true? Base security decisions on an explicit security policy. Avoid a single point of failure. Avoid using redundancy and diversity to reduce risk Use redundancy and diversity to reduce risk. Validate all inputs - Base security de cisions on an explicit security policy.To protect the system against external at tack - Avoid a single point of failure.To protect the system against external at tack - Avoid using redundancy and diversity to reduce riskTo protect the system against external attack - Use redundancy and diversity to reduce risk.To protect the system against external attack - Validate all inputsTo protect the system a gainst external attack answer: Avoid using redundancy and diversity to reduce risk U30 - Q012 What is the first stage in survivability analysis Review system requi rements and architecture. Identify critical services and components. Identify at tacks and compromisable components. Identify softspots and survivability strateg ies. - Review system requirements and architecture.Avoid using redundancy and di versity to reduce risk - Identify critical services and components.Avoid using r edundancy and diversity to reduce risk - Identify attacks and compromisable comp onents.Avoid using redundancy and diversity to reduce risk - Identify softspots and survivability strategies.Avoid using redundancy and diversity to reduce risk answer: Review system requirements and architecture. U30 - Q013 Define the security terms 'attack' A weakness in a computer based sys tem that may be exploited to cause loss or harm The possible loss or harm that c ould result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A n exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a comput er based system that may be exploited to cause loss or harmReview system require ments and architecture. - The possible loss or harm that could result from a suc cessful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach.Review system requiremen ts and architecture. - An exploitation of a system's vulnerability. Generally, t his is from outside the system and is a deliberate attempt to cause some damageR eview system requirements and architecture. answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q014 All of the following are the complementary strategies to achieve surv ivability EXCEPT Resistance Recognition Recovery Conversion - ResistanceAn explo itation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecognitionAn exploitation of a system's vulnerability. Generally, this is from outside the system and is a d eliberate attempt to cause some damage - RecoveryAn exploitation of a system's v ulnerability. Generally, this is from outside the system and is a deliberate att empt to cause some damage - ConversionAn exploitation of a system's vulnerabilit y. Generally, this is from outside the system and is a deliberate attempt to cau se some damage answer: Conversion U30 - Q015 What is the last stage in survivability analysis? Review system requi rements and architecture. Identify critical services and components. Identify at tacks and compromisable components. Identify softspots and survivability strateg ies. - Review system requirements and architecture.Conversion - Identify critica l services and components.Conversion - Identify attacks and compromisable compon

ents.Conversion - Identify softspots and survivability strategies.Conversion answer: Identify softspots and survivability strategies. U30 - Q019 Consider security design for username and password protection, what i s the good design? System users are authenticated using a login name/password co mbination. Requires user change password after 2 months Requires user change pas sword after 2 months, Username can be any characters Username can be any charact ers, Password can be blank Username and Password cannot be blank, Username can b e any characters - System users are authenticated using a login name/password co mbination. Requires user change password after 2 monthsIdentify softspots and su rvivability strategies. - Requires user change password after 2 months, Username can be any charactersIdentify softspots and survivability strategies. - Usernam e can be any characters, Password can be blankIdentify softspots and survivabili ty strategies. - Username and Password cannot be blank, Username can be any char actersIdentify softspots and survivability strategies. answer: System users are authenticated using a login name/password combination. Requires user change password after 2 months U30 - Q020 Which is NOT the security requirement of the CMS (CMS of FPT Universi ty) system? Only teacher can upload training materials Password shall contains c haracters, numbers and special characters Allow administrator to create new user Use bright color in front pages - Only teacher can upload training materialsSys tem users are authenticated using a login name/password combination. Requires us er change password after 2 months - Password shall contains characters, numbers and special charactersSystem users are authenticated using a login name/password combination. Requires user change password after 2 months - Allow administrator to create new userSystem users are authenticated using a login name/password co mbination. Requires user change password after 2 months - Use bright color in fr ont pagesSystem users are authenticated using a login name/password combination. Requires user change password after 2 months answer: Use bright color in front pages U30 - Q021 Which are levels of protection in application security engineering? ( Choose one) Platform-level, Application-level, Record-level Windows-level, Appli cation-level, Database-level Unix-level, Application-level, Database-level Linux -level, Application-level, Record-level - Platform-level, Application-level, Rec ord-levelUse bright color in front pages - Windows-level, Application-level, Dat abase-levelUse bright color in front pages - Unix-level, Application-level, Data base-levelUse bright color in front pages - Linux-level, Application-level, Reco rd-levelUse bright color in front pages answer: Platform-level, Application-level, Record-level U30 - Q023 Which of the following definitions belong to terms 'attack' A weaknes s in a computer based system that may be exploited to cause loss or harm The pos sible loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary a fter a security breach. An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a computer based system that may be exploited to cause loss or harmPlatform-level, Application-level, Record-level - The possible loss or harm that could result from a successful attack. This can be loss or damage to data o r can be a loss of time and effort if recovery is necessary after a security bre ach.Platform-level, Application-level, Record-level - An exploitation of a syste m's vulnerability. Generally, this is from outside the system and is a deliberat e attempt to cause some damagePlatform-level, Application-level, Record-level answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q024 List the complementary strategies to achieve survivability EXCEPT Res istance Recognition Recovery Conversion - ResistanceAn exploitation of a system' s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecognitionAn exploitation of a system's vulnerab ility. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecoveryAn exploitation of a system's vulnerability. Genera lly, this is from outside the system and is a deliberate attempt to cause some d

amage - ConversionAn exploitation of a system's vulnerability. Generally, this i s from outside the system and is a deliberate attempt to cause some damage answer: ResistanceRecognitionRecovery U30 - Q025 What is the second stage in survivability analysis Review system requ irements and architecture. Identify critical services and components. Identify a ttacks and compromisable components. Identify softspots and survivability strate gies. - Review system requirements and architecture.ResistanceRecognitionRecover y - Identify critical services and components.ResistanceRecognitionRecovery - Id entify attacks and compromisable components.ResistanceRecognitionRecovery - Iden tify softspots and survivability strategies.ResistanceRecognitionRecovery answer: Identify critical services and components. U30 - Q028 What is application security? Application security is a software engi neering problem where the system is designed to resist attacks Application secur ity is a systems management problem where the infrastructure is configured to re sist attacks. All of the others - Application security is a software engineering problem where the system is designed to resist attacksIdentify critical service s and components. - Application security is a systems management problem where t he infrastructure is configured to resist attacks.Identify critical services and components. - All of the othersIdentify critical services and components. answer: Application security is a software engineering problem where the system is designed to resist attacks U30 - Q029 Which of the following statements about security is NOT true? Securit y engineering focuses on how to develop and maintain software systems that can r esist malicious attacks that are intended to damage a computer-based system or i ts data Security threats can be threats to the only confidentiality and integrit y of a system or its data. Security risk management involves assessing the losse s that might ensue from attacks on a system and deriving security requirements t hat are aimed at eliminating or reducing these losses. None of the others - Secu rity engineering focuses on how to develop and maintain software systems that ca n resist malicious attacks that are intended to damage a computer-based system o r its dataApplication security is a software engineering problem where the syste m is designed to resist attacks - Security threats can be threats to the only co nfidentiality and integrity of a system or its data.Application security is a so ftware engineering problem where the system is designed to resist attacks - Secu rity risk management involves assessing the losses that might ensue from attacks on a system and deriving security requirements that are aimed at eliminating or reducing these losses.Application security is a software engineering problem wh ere the system is designed to resist attacks - None of the othersApplication sec urity is a software engineering problem where the system is designed to resist a ttacks answer: Security threats can be threats to the only confidentiality and integrit y of a system or its data. U30 - Q036 Define the security terms attack A weakness in a computerbased system th at may be exploited to cause loss or harm The possible loss or harm that could r esult from a successful attack. This can be loss or damage to data or can be a l oss of time and effort if recovery is necessary after a security breach. An expl oitation of a systems vulnerability. Generally, this is from outside the system a nd is a deliberate attempt to cause some damage - A weakness in a computerbased s ystem that may be exploited to cause loss or harmSecurity threats can be threats to the only confidentiality and integrity of a system or its data. - The possib le loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary afte r a security breach.Security threats can be threats to the only confidentiality and integrity of a system or its data. - An exploitation of a systems vulnerabili ty. Generally, this is from outside the system and is a deliberate attempt to ca use some damageSecurity threats can be threats to the only confidentiality and i ntegrity of a system or its data. answer: An exploitation of a systems vulnerability. Generally, this is from outsi de the system and is a deliberate attempt to cause some damage U30 - Q037 What are the three levels of protection that might be used in an info

rmation system? Platform-level protection Application-level protection Record-le vel protection Development level protection - Platform-level protectionAn exploi tation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - Application-level protectionAn e xploitation of a systems vulnerability. Generally, this is from outside the syste m and is a deliberate attempt to cause some damage - Record-level protectionAn e xploitation of a systems vulnerability. Generally, this is from outside the syste m and is a deliberate attempt to cause some damage - Development level protectio nAn exploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage answer: Platform-level protectionApplication-level protectionRecord-level protec tion U30 - Q038 Which is the definition of the term Exposure? A system resource that ha s a value and has to be protected. The possible loss or harm that could result f rom a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploita tion of a systems vulnerability. Generally, this is from outside the system and i s a deliberate attempt to cause some damage. - A system resource that has a valu e and has to be protected.Platform-level protectionApplication-level protectionR ecord-level protection - The possible loss or harm that could result from a succ essful attack. This can be loss or damage to data or can be a loss of time and e ffort if recovery is necessary after a security breach.Platform-level protection Application-level protectionRecord-level protection - A weakness in a computer-b ased system that may be exploited to cause loss or harm.Platform-level protectio nApplication-level protectionRecord-level protection - An exploitation of a syst ems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage.Platform-level protectionApplication-level protect ionRecord-level protection answer: The possible loss or harm that could result from a successful attack. Th is can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. U30 - Q039 Which is the definition of the term Attack? A system resource that has a value and has to be protected. The possible loss or harm that could result fro m a successful attack. This can be loss or damage to data or can be a loss of ti me and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploitati on of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. - A system resource that has a value and has to be protected.The possible loss or harm that could result from a succe ssful attack. This can be loss or damage to data or can be a loss of time and ef fort if recovery is necessary after a security breach. - The possible loss or ha rm that could result from a successful attack. This can be loss or damage to dat a or can be a loss of time and effort if recovery is necessary after a security breach.The possible loss or harm that could result from a successful attack. Thi s can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. - A weakness in a computer-based system th at may be exploited to cause loss or harm.The possible loss or harm that could r esult from a successful attack. This can be loss or damage to data or can be a l oss of time and effort if recovery is necessary after a security breach. - An ex ploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage.The possible loss or harm that could result from a successful attack. This can be loss or damage to data or ca n be a loss of time and effort if recovery is necessary after a security breach. answer: An exploitation of a systems vulnerability. Generally, this is from outsi de the system and is a deliberate attempt to cause some damage. U30-Q045 What are the purposes of guidelines in secure systems design? They rais e awareness of security issues in a software engineering team. They can be used as the basis of a review checklist that is applied during the system validation

process. All of the others - They raise awareness of security issues in a softwa re engineering team.An exploitation of a systems vulnerability. Generally, this i s from outside the system and is a deliberate attempt to cause some damage. - Th ey can be used as the basis of a review checklist that is applied during the sys tem validation process.An exploitation of a systems vulnerability. Generally, thi s is from outside the system and is a deliberate attempt to cause some damage. All of the othersAn exploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. answer: All of the others U30-Q046 Select key issue(s) when designing a secure architecture: Organizing th e structure of system to protect assets Concentrating assets to minimize losses Build minimize system to avoid big damage when attacked. All of the others - Org anizing the structure of system to protect assetsAll of the others - Concentrati ng assets to minimize lossesAll of the others - Build minimize system to avoid b ig damage when attacked.All of the others - All of the othersAll of the others answer: Organizing the structure of system to protect assets U31 - Q.043 A critical distinction between a service and a component as defined in CBSE is that services are independent and: Services do not have a 'requires' interface Services rely on message-based communication with messages expressed i n XML All of the others None of the others - Services do not have a 'requires' i nterfaceOrganizing the structure of system to protect assets - Services rely on message-based communication with messages expressed in XMLOrganizing the structu re of system to protect assets - All of the othersOrganizing the structure of sy stem to protect assets - None of the othersOrganizing the structure of system to protect assets answer: All of the others U31 - Q.044 Which one is not a web service standard? SOAP WSDL UDDI SODP - SOAPA ll of the others - WSDLAll of the others - UDDIAll of the others - SODPAll of th e others answer: SODP U31 - Q.047 Which one is not a component of the WSDL specification? XML namespac e declarations Interface and message declarations Binding and ending declaration s Public method declarations - XML namespace declarationsSODP - Interface and me ssage declarationsSODP - Binding and ending declarationsSODP - Public method dec larationsSODP answer: Public method declarations U31 - Q.048 What information is maintained in a UDDI description? Design how to implement web service Guideline how to deploy web service Interfaces of a legacy system Information where to find the service's WSDL specification - Design how to implement web servicePublic method declarations - Guideline how to deploy web servicePublic method declarations - Interfaces of a legacy systemPublic method declarations - Information where to find the service's WSDL specificationPublic method declarations answer: Information where to find the service's WSDL specification U31 - Q.049 A resource management system is being run in the business, it includ es 3 primary functions, budget management, human management and production manag ement. Now the system needs to add 1 more function with changes and costs in lim itation, and web service is best solution, so how to do this? Creating workflow of services with 3 functions and new function Developing new function in the sep arate system as 1 service and connecting it to the current system Building new f unction as 1 website and the current system will connect to this Building servic e interfaces for 3 functions and new function - Creating workflow of services wi th 3 functions and new functionInformation where to find the service's WSDL spec ification - Developing new function in the separate system as 1 service and conn ecting it to the current systemInformation where to find the service's WSDL spec ification - Building new function as 1 website and the current system will conne ct to thisInformation where to find the service's WSDL specification - Building service interfaces for 3 functions and new functionInformation where to find the service's WSDL specification answer: Building service interfaces for 3 functions and new function

U31 - Q.050 The Google map is a web service to be used in the weather system, wh ich method is used in testing the system? Unit testing Integration testing Accep tance testing System testing - Unit testingBuilding service interfaces for 3 fun ctions and new function - Integration testingBuilding service interfaces for 3 f unctions and new function - Acceptance testingBuilding service interfaces for 3 functions and new function - System testingBuilding service interfaces for 3 fun ctions and new function answer: System testing U31 - Q.051 What is problem when the Google map service, isused for the weather system at Vietnam, is tested? It must be paided for testing Service may be close d and there is no backup for it Testcases will be changed because service operat ions may be changed Internet traffic - It must be paided for testingSystem testi ng - Service may be closed and there is no backup for itSystem testing - Testcas es will be changed because service operations may be changedSystem testing - Int ernet trafficSystem testing answer: Internet traffic U31 - Q001 Which ones are the service-oriented architectures? A system where the components are stand-alone services Services may execute on different computers Protocols have been developed to support service communication and information exchange Model-View-Controller - A system where the components are stand-alone s ervicesInternet traffic - Services may execute on different computersInternet tr affic - Protocols have been developed to support service communication and infor mation exchangeInternet traffic - Model-View-ControllerInternet traffic answer: A system where the components are stand-alone servicesServices may execu te on different computersProtocols have been developed to support service commun ication and information exchange U31 - Q002 Which phases are used for the service engineering? Identify candidate service Design service Implement service Test service - Identify candidate serv iceA system where the components are stand-alone servicesServices may execute on different computersProtocols have been developed to support service communicati on and information exchange - Design serviceA system where the components are st and-alone servicesServices may execute on different computersProtocols have been developed to support service communication and information exchange - Implement serviceA system where the components are stand-alone servicesServices may execu te on different computersProtocols have been developed to support service commun ication and information exchange - Test serviceA system where the components are stand-alone servicesServices may execute on different computersProtocols have b een developed to support service communication and information exchange answer: Identify candidate serviceDesign serviceImplement service U31 - Q003 What are the service testing problems? Non-functional behaviour of th e service is unpredictable External services may be modified by the service prov ider thus invalidating tests which have been completed Service testing is diffic ult as external services are 'black-boxes' Find defects and demonstrate that a s ystem meets its functional and non-functional requirements - Non-functional beha viour of the service is unpredictableIdentify candidate serviceDesign serviceImp lement service - External services may be modified by the service provider thus invalidating tests which have been completedIdentify candidate serviceDesign ser viceImplement service - Service testing is difficult as external services are 'b lack-boxes'Identify candidate serviceDesign serviceImplement service - Find defe cts and demonstrate that a system meets its functional and non-functional requir ementsIdentify candidate serviceDesign serviceImplement service answer: Non-functional behaviour of the service is unpredictableExternal service s may be modified by the service provider thus invalidating tests which have bee n completedService testing is difficult as external services are 'black-boxes' U31 - Q004 What is the last stage in service construction by composition? Formul ate outline workflow Discover services Refine workflow Create workflow program T est service - Formulate outline workflowNon-functional behaviour of the service is unpredictableExternal services may be modified by the service provider thus i nvalidating tests which have been completedService testing is difficult as exter nal services are 'black-boxes' - Discover servicesNon-functional behaviour of th

e service is unpredictableExternal services may be modified by the service provi der thus invalidating tests which have been completedService testing is difficul t as external services are 'black-boxes' - Refine workflowNon-functional behavio ur of the service is unpredictableExternal services may be modified by the servi ce provider thus invalidating tests which have been completedService testing is difficult as external services are 'black-boxes' - Create workflow programNon-fu nctional behaviour of the service is unpredictableExternal services may be modif ied by the service provider thus invalidating tests which have been completedSer vice testing is difficult as external services are 'black-boxes' - Test serviceN on-functional behaviour of the service is unpredictableExternal services may be modified by the service provider thus invalidating tests which have been complet edService testing is difficult as external services are 'black-boxes' answer: Test service U31 - Q005 What is the output of "Refine workflow" in Construction by compositio n? Workflow design Executable workflow Service list Deployable service Service s pecification - Workflow designTest service - Executable workflowTest service - S ervice listTest service - Deployable serviceTest service - Service specification Test service answer: Workflow design U31 - Q006 What does Web service description language (WSDL) define? What operat ions the service supports How the service is accessed Where the service is locat ed How the service is implemented - What operations the service supportsWorkflow design - How the service is accessedWorkflow design - Where the service is loca tedWorkflow design - How the service is implementedWorkflow design answer: What operations the service supportsHow the service is accessedWhere the service is located U31 - Q007 What are the three stages in service interface design? Logical interf ace design Message design Method design WSDL development - Logical interface des ignWhat operations the service supportsHow the service is accessedWhere the serv ice is located - Message designWhat operations the service supportsHow the servi ce is accessedWhere the service is located - Method designWhat operations the se rvice supportsHow the service is accessedWhere the service is located - WSDL dev elopmentWhat operations the service supportsHow the service is accessedWhere the service is located answer: Logical interface designMessage designWSDL development U31 - Q008 What is the first stage in service construction by composition? Formu late outline workflow Discover services Select possible services Refine workflow Create workflow program - Formulate outline workflowLogical interface designMes sage designWSDL development - Discover servicesLogical interface designMessage d esignWSDL development - Select possible servicesLogical interface designMessage designWSDL development - Refine workflowLogical interface designMessage designWS DL development - Create workflow programLogical interface designMessage designWS DL development answer: Formulate outline workflow U31 - Q009 What are the components of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specificationFormulate outline workflow - The bindingFormulate outline workflow - The location partFormulate outline workflow - The service specificationFormula te outline workflow answer: The interface specificationThe bindingThe location part U31 - Q010 What is WSDL standard? A message exchange standard that supports serv ice communication This standard allows a service interface and its bindings to b e defined Defines the components of a service specification that may be used to discover the existence of a service A standard for workflow languages used to de fine service composition - A message exchange standard that supports service com municationThe interface specificationThe bindingThe location part - This standar d allows a service interface and its bindings to be definedThe interface specifi cationThe bindingThe location part - Defines the components of a service specifi cation that may be used to discover the existence of a serviceThe interface spec ificationThe bindingThe location part - A standard for workflow languages used t

o define service compositionThe interface specificationThe bindingThe location p art answer: This standard allows a service interface and its bindings to be defined U31 - Q011 What is the first stage in service construction by composition? Formu late outline workflow Discover services Select possible services Refine workflow Create workflow program - Formulate outline workflowThis standard allows a serv ice interface and its bindings to be defined - Discover servicesThis standard al lows a service interface and its bindings to be defined - Select possible servic esThis standard allows a service interface and its bindings to be defined - Refi ne workflowThis standard allows a service interface and its bindings to be defin ed - Create workflow programThis standard allows a service interface and its bin dings to be defined answer: U31 - Q012 What is NOT a component of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specification - The binding - The location part - The service specification answer: The service specification U31 - Q013 What is SOAP standard? A message exchange standard that supports serv ice communication This standard allows a service interface and its bindings to b e defined Defines the components of a service specification that may be used to discover the existence of a service A standard for workflow languages used to de fine service composition - A message exchange standard that supports service com municationThe service specification - This standard allows a service interface a nd its bindings to be definedThe service specification - Defines the components of a service specification that may be used to discover the existence of a servi ceThe service specification - A standard for workflow languages used to define s ervice compositionThe service specification answer: A message exchange standard that supports service communication U31 - Q014 Which of the following is NOT a fundamental type of service that may be identified? Utility services Business services Coordination services Security services - Utility servicesA message exchange standard that supports service co mmunication - Business servicesA message exchange standard that supports service communication - Coordination servicesA message exchange standard that supports service communication - Security servicesA message exchange standard that suppor ts service communication answer: Security services U31 - Q015 What is the difference between BPMN and WS-BPEL? BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based langu age. WS-BPEL is a graphical language for defining workflows whereas BPMN is a lo wer-level XML-based language. - BPMN is a graphical language for defining workfl ows whereas WS-BPEL is a lower-level XML-based language.Security services - WS-B PEL is a graphical language for defining workflows whereas BPMN is a lower-level XML-based language.Security services answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. U31 - Q019 Which is the benefit of Service-oriented architectures? Inter-organiz ational computing is facilitated through simplified information exchange The Ser vice-oriented architecture systems are easy to protect resources and maintain Th e Service-oriented architecture systems are easy to test The Service-oriented ar chitecture systems are easy to deploy - Inter-organizational computing is facili tated through simplified information exchangeBPMN is a graphical language for de fining workflows whereas WS-BPEL is a lower-level XML-based language. - The Serv ice-oriented architecture systems are easy to protect resources and maintainBPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. - The Service-oriented architecture systems are easy to tes tBPMN is a graphical language for defining workflows whereas WS-BPEL is a lowerlevel XML-based language. - The Service-oriented architecture systems are easy t o deployBPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. answer: Inter-organizational computing is facilitated through simplified informa

tion exchange U31 - Q020 What is the BEST practice when design service interface? Service stat e information should not included in messages The number of messages exchanged t o complete a service request should normally be maximized The number of messages exchanged to complete a service request should normally be minimized - Service state information should not included in messagesInter-organizational computing is facilitated through simplified information exchange - The number of messages exchanged to complete a service request should normally be maximizedInter-organi zational computing is facilitated through simplified information exchange - The number of messages exchanged to complete a service request should normally be mi nimizedInter-organizational computing is facilitated through simplified informat ion exchange answer: The number of messages exchanged to complete a service request should no rmally be minimized U31 - Q021 What are stages of service interface design? Logical interface design , Message design, WSDL description Logical interface design, Message design, jav a object interface design Logical interface design, java object interface design , WSDL description - Logical interface design, Message design, WSDL descriptionT he number of messages exchanged to complete a service request should normally be minimized - Logical interface design, Message design, java object interface des ignThe number of messages exchanged to complete a service request should normall y be minimized - Logical interface design, java object interface design, WSDL de scriptionThe number of messages exchanged to complete a service request should n ormally be minimized answer: Logical interface design, Message design, WSDL description U31 - Q023 Which of the following statements belong to SOAP standard? A message exchange standard that supports service communication This standard allows a ser vice interface and its bindings to be defined Defines the components of a servic e specification that may be used to discover the existence of a service A standa rd for workflow languages used to define service composition - A message exchang e standard that supports service communicationLogical interface design, Message design, WSDL description - This standard allows a service interface and its bind ings to be definedLogical interface design, Message design, WSDL description - D efines the components of a service specification that may be used to discover th e existence of a serviceLogical interface design, Message design, WSDL descripti on - A standard for workflow languages used to define service compositionLogical interface design, Message design, WSDL description answer: A message exchange standard that supports service communication U31 - Q024 List the fundamental types of service that may be identified? Utility services Business services Coordination services Security services - Utility se rvicesA message exchange standard that supports service communication - Business servicesA message exchange standard that supports service communication - Coord ination servicesA message exchange standard that supports service communication - Security servicesA message exchange standard that supports service communicati on answer: Utility servicesBusiness servicesCoordination services U31 - Q025 Services can be provided locally or outsourced to external providers True False - TrueUtility servicesBusiness servicesCoordination services - FalseU tility servicesBusiness servicesCoordination services answer: True U31 - Q026 There are many standard protocols that have been developed to support service communication and information exchange True False - TrueTrue - FalseTru e answer: True U31 - Q027 Services may execute on different computers from different service pr oviders True False - TrueTrue - FalseTrue answer: True U31 - Q028 Which of the following statements about Service-oriented software eng ineering is true? Service-oriented software engineering is based on the notion t hat programs can be constructed by composing independent services that encapsula

te reusable functionality Services are language dependent and their implementati on is based on widely adopted XML-based standards All of the others - Service-or iented software engineering is based on the notion that programs can be construc ted by composing independent services that encapsulate reusable functionalityTru e - Services are language dependent and their implementation is based on widely adopted XML-based standardsTrue - All of the othersTrue answer: Service-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality U31 - Q029 Which of the following statements about service interfaces is true? S ervice interfaces are defined in an XML-based language called WSDL A WSDL specif ication includes a definition of the interface types and operations, the binding protocol used by the service and the service location. All of the others - Serv ice interfaces are defined in an XML-based language called WSDLService-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality - A WSDL specification includes a definition of the interface types and operations, the b inding protocol used by the service and the service location.Service-oriented so ftware engineering is based on the notion that programs can be constructed by co mposing independent services that encapsulate reusable functionality - All of th e othersService-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality answer: Service interfaces are defined in an XML-based language called WSDL U31 - Q030 What is the last milestone of the service engineering process Service requirements Service interface specification Validated and deployed service - S ervice requirementsService interfaces are defined in an XML-based language calle d WSDL - Service interface specificationService interfaces are defined in an XML -based language called WSDL - Validated and deployed serviceService interfaces a re defined in an XML-based language called WSDL answer: Validated and deployed service U31 - Q031 What is the first milestone of the service engineering process? Servi ce requirements Service interface specification Validated and deployed service Service requirementsValidated and deployed service - Service interface specific ationValidated and deployed service - Validated and deployed serviceValidated an d deployed service answer: Service requirements U31 - Q032 What is the second milestone of the service engineering process Servi ce requirements Service interface specification Validated and deployed service Service requirementsService requirements - Service interface specificationServi ce requirements - Validated and deployed serviceService requirements answer: Service interface specification U31 - Q036 What are the three stages in service interface design? Logical interf ace design Message design Method design WSDL development - Logical interface des ignService interface specification - Message designService interface specificati on - Method designService interface specification - WSDL developmentService inte rface specification answer: Logical interface designMessage designWSDL development U31 - Q037 What are the components of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specificationLogical interface designMessage designWSDL development - The bindin gLogical interface designMessage designWSDL development - The location partLogic al interface designMessage designWSDL development - The service specificationLog ical interface designMessage designWSDL development answer: The interface specificationThe bindingThe location part U31 - Q039 Which are benefits of service oriented architectures? Services can be provided locally or outsourced to external providers Services are language-depe ndent Investment in legacy systems can be preserved Inter-organizational computi ng is facilitated through simplified information exchange - Services can be prov ided locally or outsourced to external providersThe interface specificationThe b

indingThe location part - Services are language-dependentThe interface specifica tionThe bindingThe location part - Investment in legacy systems can be preserved The interface specificationThe bindingThe location part - Inter-organizational c omputing is facilitated through simplified information exchangeThe interface spe cificationThe bindingThe location part answer: Services can be provided locally or outsourced to external providersInve stment in legacy systems can be preservedInter-organizational computing is facil itated through simplified information exchange U31-Q045 ________ engineering is based on the notion that programs can be constr ucted by composing independent services which encapsulate reusable functionality . Service-oriented software System-oriented software Object-oriented software St ructural-oriented software - Service-oriented softwareServices can be provided l ocally or outsourced to external providersInvestment in legacy systems can be pr eservedInter-organizational computing is facilitated through simplified informat ion exchange - System-oriented softwareServices can be provided locally or outso urced to external providersInvestment in legacy systems can be preservedInter-or ganizational computing is facilitated through simplified information exchange Object-oriented softwareServices can be provided locally or outsourced to extern al providersInvestment in legacy systems can be preservedInter-organizational co mputing is facilitated through simplified information exchange - Structural-orie nted softwareServices can be provided locally or outsourced to external provider sInvestment in legacy systems can be preservedInter-organizational computing is facilitated through simplified information exchange answer: Service-oriented software U31-Q046 Service interfaces are defined in ____ . A _____ specification includes a definition of the interface types and operations, the binding protocol used b y the service and the service location. WSDL ASHL WSHL ASDL - WSDLService-orient ed software - ASHLService-oriented software - WSHLService-oriented software - AS DLService-oriented software answer: WSDL U01 - Q031 The economies of all developed nations are dependent on software. Tru e False - TrueWSDL - FalseWSDL answer: U01 - Q039 There is no single ideal approach to software engineering. True False - True - False answer: U04 - Q016 We should to make the distinction between developing the user require ments and developing system requirements in the requirement engineering process True False - True - False answer: U04 - Q017 The programs that are developed using evolutionary development are li kely to be easy to maintain True False - True - False answer: U04 - Q031 Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model. True False - True - False answer: U06 - Q016 It is impossible to completely separate system requirements and desig n. True False - True - False answer: U14 - Q015 Object oriented approach does not facilitate design evolution True Fa lse - True - False answer: U17 - Q015 Prototyping method starts with requirements that are best understood True False - True - False answer: U17 - Q039 Because of the changing environment, it is often impossible to arrive at a stable, consistent set of system requirements. True False - True - False answer: U18 - Q010 One of the key problems in software reuse is the inability to find ex

isting reusable design patterns when hundreds of candidates exist. True False True - False answer: U18 - Q033 Applications frameworks are collections of concrete and abstract obje cts that are designed to be reused through specialization and the addition of ne w objects. True False - True - False answer: U23 - Q014 Only exhaustive testing can show a program is free from defects. Ther efore, most of important systems should be tested exhaustively. True False - Tru e - False answer: U29 - Q014 The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective Tr ue False - True - False answer: U29 - Q030 The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective. T rue False - True - False answer: U31 - Q038 A critical distinction between a service and a component as defined i n CBSE is that services are independent True False - True - False answer: U01 - Q.043 Which key element of presentation speaking is represented by the gui ding principle "enhance your believability"? audience - credibility - logistics - content - performance answer: credibility U01 - Q.044 Which key element of presentation speaking is represented by the gui ding principle "select appropriate ideas and information"? purpose - audience logistics - content - organization answer: content U01 - Q.047 What question should you ask when determining a presentation's purpo se? Is there a natural order to the ideas and information you want to include in your presentation? - What do you want listeners to know, think, believe, or do as a result of your presentation? - How can you use information about your liste ners to improve your presentation? - Where and how can you find good ideas and i nformation for your presentation? - How can you adapt to the place where you wil l be speaking? answer: What do you want listeners to know, think, believe, or do as a result of your...ion? U01 - Q.048 Which of the following items will a speaker examine when analyzing t he demographic traits of an audience or group of listeners? gender - job titles - special interests - relationships with other members - length of group members hip answer: gender U01 - Q.049 Which of the following items will a speaker examine when analyzing t he individual attributes of an audience or group of listeners? gender - job titl es - race - religion - ethnicity answer: job titles U01 - Q.050 When you identify a belief or value that you share with audience mem bers who disagree, you have found a basis for demographic traits. - individual a ttributes. - claim of value. - common ground. - personal credibility. answer: common ground. U01 - Q.051 All of the following answers constitute an aspect of an audience's d emographics EXCEPT age. - gender. - race. - knowledge. - religion. answer: knowledge. U01 - Q001 If, when analyzing your listeners' opinions, you discover that most o f them disagree with you, which of the following strategies would be most succes sful in adapting to or changing their attitudes? Present a lot of information. Summarize important ideas. - Make sure the goal of your presentation is realist ic. - Motivate the audience to listen. - none of the above -

answer: Make sure the goal of your presentation is realistic. U01 - Q002 If, at the end of your presentation, listeners conclude that you lack expertise on the subject and that they have reason to question your honesty and sincerity, you have failed to devote enough attention to people. - place. - pla nning. - performance. - credibility. answer: credibility. U01 - Q003 The textbook identifies 3 major factors that contribute to a speaker' s credibility. What are they? competence, character, and caring - attitude, appe arance, and delivery - demographics, individual, and personal attributes - commo n ground, competence, and reason giving - purpose, logistics, and content answer: competence, character, and caring U01 - Q004 Aristotle's concept of ethos has evolved into what communication scho lars now call purpose. - audience. - content. - credibility. - performance. answer: credibility. U01 - Q005 Which of Maslow's Hierarchy of Needs is primarily met when a neighbor hood watch group forms to deter crime in the community? safety - self-actualizat ion - esteem - belongingness - physiological answer: safety U01 - Q006 Which of Maslow's Hierarchy of Needs is primarily met when someone jo ins an exclusive club or is elected as leader of a prestigious group? safety - s elf actualization - esteem - belongingness - physiological answer: esteem U01 - Q007 According to Maslow's Hierarchy of Needs, in what order do we satisfy the following needs? safety, self-actualization, esteem, belongingness, physiol ogical - self-actualization, esteem, safety, physiological, belongingness - este em, physiological, belongingness, self-actualization, safety - belongingness, ph ysiological, safety, self-actualization, esteem - physiological, safety, belongi ngness, esteem, self-actualization answer: physiological, safety, belongingness, esteem, self-actualization U01 - Q008 According to Schutz's FIRO Theory, a group member who feels accepted by the group is an? ideal social member. - undersocial member. - ideal personal member. - overpersonal member. - underpersonal member. answer: ideal social member. U01 - Q009 According to Schutz's FIRO Theory, if group members' affection needs are not met, they may become? undersocial or oversocial members. - abdicrats or autocratics. - ideal personal or ideal social members. - overpersonal or underpe rsonal members. - undersocial or underpersonal members. answer: overpersonal or underpersonal members. U01 - Q010 Control in a group refers to the? individual holding an official lead ership position. - individual holding an unofficial leadership position. - exten t to which members behave as though they know more than everyone else. - extent to which members feel competent, confident, and free to make their own decisions . - extent to which meetings stay on the agenda. answer: extent to which members feel competent, confident, and free to make thei r own decisions. U01 - Q011 When a group member exhibits a unique set of skills or behavioral pat terns that serve specific functions within the group, that member has assumed a( n) ___________. norm - role - autocratic function - abdicratic function - leader ship function answer: role U01 - Q012 _______________ functions describe group members who strive to get al ong and satisfy one another's needs while pursuing a shared goal. Self-centered - Task - Maintenance - Participation - All of the above answer: Maintenance U01 - Q013 _______________ functions describe negative roles in which individual needs are put ahead of both the group's goal and other members' needs. Self-cen tered - Task - Maintenance - Participation - All of the above answer: Self-centered U01 - Q014 "I will check our Affirmative Action Policy and see what it says abou

t. . . ." This statement would most likely be made by a group member functioning in which of the following task roles? information seeker - information giver opinion seeker - opinion giver - clarifier-summarizer answer: information seeker U01 - Q015 All of the following functions are group task roles EXCEPT? initiator . - compromiser. - clarifier-summarizer. - opinion seeker. - evaluator-critic. answer: compromiser. U01 - Q016 All of the following functions are group maintenance roles EXCEPT? ha rmonizer. - tension releaser. - gatekeeper. - observer-interpreter. - informati on giver. answer: information giver. U01 - Q017 R. Meredith Belvin's Team-Role Theory differs from the older Benne an d Sheats's role classifications in that Belvin's roles? apply to most groups reg ardless of their goal. - focus on how members interact with one another in a var iety of roles. - recognize that group members seek out and perform roles that ar e most natural to them. - apply to most groups regardless of their context. - in clude gatekeeper and harmonizer. answer: recognize that group members seek out and perform roles that are most na tural to them. U01 - Q018 According to Belvin's Team-Role Theory, which of the following roles describes a conscientious, methodical person who transforms group decisions into practical actions? harmonizer - implementer - shaper - gatekeeper - resource in vestigator answer: implementer U01 - Q019 "Maria, we haven't heard from you yet and want to make sure that ever yone gets a chance to weigh in on this issue. " This statement would most likely be made by a group member functioning in which of the following roles? harmoniz er - standard monitor - observer-interpreter - gatekeeper - procedural technicia n answer: gatekeeper U01 - Q020 "That's fine with me. Just tell me what to do." This statement would most likely be made by a group member functioning in which of the following role s? teamworker-follower - deserter - harmonizer answer: teamworker-follower U01 - Q021 If a group member says "That's a stupid idea. Think you could come up with anything better?" as a way of intimidating others, asserting authority, an d monopolizing discussion, which role is this person demonstrating? clown - tens ion releaser - dominator - recognition seeker - deserter answer: dominator U01 - Q022 _____________ refers to the level of fear or anxiety associated with either real or anticipated communication with another person or persons. Self-co ncept - Feedback - Communication apprehension - Assertiveness - Confidence answer: Communication apprehension U01 - Q023 According to McCroskey's research, what percent of the general popula tion experiences very high levels of communication apprehension? 10% - 20% - 30% - 40% - 50% answer: 20% U01 - Q024 Which of the following descriptions is likely to be true of highly ap prehensive group members compared to low apprehensive members? Highly apprehensi ve members talk more in group discussions. - Highly apprehensive members are mor e likely to become group leaders. - Highly apprehensive members appear more conf ident. - Highly apprehensive members assert themselves and their beliefs. - High ly apprehensive members agree with others rather than voice disagreement. answer: Highly apprehensive members agree with others rather than voice disagree ment. U01 - Q025 Your textbook suggests all of the following strategies for reducing c ommunication apprehension in groups EXCEPT Realize that everyone experiences com munication apprehension. - Be well prepared. - Force yourself to speak as much a nd as often as you can to a variety of large and small audiences. - Substitute w orrisome, irrational thoughts about communicating with more positive thoughts. -

Take time to visualize yourself communicating effectively. answer: Force yourself to speak as much and as often as you can to a variety of large and small audiences. U01 - Q026 All of the following are means of providing constructive feedback EXC EPT Focus on the behaviors rather than the person. - Describe the behavior rathe r than judging it. - Provide observations rather than assumptions. - Choose an a ppropriate time and place. - Give feedback to advance your own goals. answer: Give feedback to advance your own goals. U01 - Q027 Cognitive restructuring is an anxiety reduction technique that involv es learning communication skills such as following an agenda, speaking clearly, and becoming more sensitive to feedback. - taking time to visualize yourself com municating effectively. - substituting worrisome, irrational thoughts about comm unicating with more positive thoughts. - relaxing physically in order to relax y our mind. - realizing that you are not the only person who gets nervous when cal led upon to speak in front of others. answer: substituting worrisome, irrational thoughts about communicating with mor e positive thoughts. U01 - Q028 Walther's theory of hyperpersonal communication in virtual groups ind icates that some members ask more personal questions of other group members. - a sk less personal questions of other group members. - are more confident in media ted settings than face-to-face meetings. answer: are more confident in mediated settings than face-to-face meetings. U01 - Q029 Group members with low levels of communication apprehension can help members with high apprehension reduce their level of fear and anxieties about co mmunicating by using all of the following strategies EXCEPT openly discuss a mem ber's apprehension with the entire group. - provide supportive and constructive feedback. - actively encourage and include anxious members in group discussions. - stop talking. answer: openly discuss a member's apprehension with the entire group. U01 - Q030 Assertiveness seeks an appropriate balance between answer: passivity and aggression. U01 - Q036 Compulsive talkers tend to answer: dominate discussions. U01 - Q037 All of the following are characteristics of passive (nonassertive) gr oup members EXCEPT answer: They feel a greater sense of power. U01 - Q038 All of the following are characteristics of aggressive group members EXCEPT answer: They are highly respected. U01-Q045 All of the following are characteristics of passive-aggressive group me mbers EXCEPT answer: They usually follow through with promised contributions. U01-Q046 Mark agrees to take notes during an important meeting at which he disag rees with many group decisions. The group asks him to bring copies of the notes to the next meeting so that everyone has a written record of the discussion and group decisions. At the next meeting, Mark is absent. At the following meeting, he tells everyone that he's still working on the notes and may not have them for awhile. What sort of behavior does Mark exhibit? answer: passive aggression U04 - Q.043 Which of the following strategies and skill are effective when you n eed to and should say "No" to someone? answer: Don't say "Yes" or "No" until you hear and understand a specific request U04 - Q.044 Maslow's Hierarchy of Needs ranks critical needs in the following or der: physiological, safety, belongingness, esteem, and self-actualization. answer: True U04 - Q.047 Maslow's Hierarchy of Needs includes control, inclusion, and affecti on needs. answer: False U04 - Q.048 Maslow's most basic needs are physiological and safety needs. answer: True

U04 - Q.049 When people join groups for the personal reward that comes with help ing others, they are satisfying Maslow's belongingness need. answer: False U04 - Q.050 Will Schutz's FIRO theory examines the impact of 3 interpersonal nee ds: the need for inclusion, control, and affection. answer: True U04 - Q.051 If Julie confides in and tries to become very close with every group member, she may be exhibiting behavior characteristic of an overpersonal member . answer: True U04 - Q001 An abdicrat is a group member whose control needs are met, who has no problem with power, and who is comfortable giving and taking orders. answer: True U04 - Q002 If Gabe tries to impress others with what and whom he knows and frequ ently attracts attention to compensate for feelings of inadequacy, he may be exh ibiting behavior characteristic of an overpersonal member. answer: False U04 - Q003 You can help satisfy a member's control need by giving that person re sponsibility for and leadership of a special project or a highly visible and imp ortant subcommittee. answer: True U04 - Q004 A member who seeks attention or tries to impress other members may ha ve a strong inclusion need. answer: True U04 - Q005 Group maintenance roles affect a group's ability to achieve its commo n goal by focusing on behaviors that help get the job done. answer: False U04 - Q006 An opinion seeker is fulfilling group maintenance roles. answer: False U04 - Q007 One group member can function effectively in several different roles at the same time. answer: True U04 - Q008 Benne and Sheats's roles include information seeker, energizer, harmo nizer, compromiser, aggressor, and clown. answer: True U04 - Q009 Belvin's team roles include information seeker, energizer, harmonizer , compromiser, aggressor, and clown. answer: False U04 - Q010 According to Belvin, a successful coordinator/chair role is filled by a person who is calm, trusting, mature, confident, and decisive. answer: True U04 - Q011 According to Benne and Sheats, the gatekeeper of a group encourages q uiet members to speak and talkative members to stop speaking. answer: True U04 - Q012 Communication apprehension occurs only in a public speaking situation . answer: False U04 - Q013 The Personal Report of Communication Apprehension (PRCA) measures a r elatively permanent personality type that is unlikely to change significantly un less there is some type of effective intervention or training. answer: True U04 - Q014 As a result of talking less, apprehensive participants are often view ed as less confident, less assertive, and less responsible. answer: True U04 - Q015 Communication apprehension has significant effects on the amount of t alk, the content of communication, and the resulting perceptions of other group members. answer: True U04 - Q018 Group members who experience communication apprehension tend to speak less, agree with others rather than voice disagreement, and use more filler phr

ases such as "well," "you know," and "uh." answer: True U04 - Q019 Richmond and McCroskey report that "almost 50% of the population repo rts being scared about communicating with a person or group at some point in the ir lives." answer: False U04 - Q020 Group members who speak more are often better liked than those who sp eak infrequently and are more likely to become a group's leader. answer: True U04 - Q021 Research has found that some people are more confident when communica ting online and in computer-mediated discussions than they are communicating fac eto- face with group members. answer: True U04 - Q022 The strategies of cognitive restructuring help highly apprehensive gr oup members communicate more confidently because they teach them important skill s for participating in a discussion. answer: False U04 - Q023 There is nothing a group can do to help members who suffer from high levels of communication apprehension. answer: False U04 - Q024 Assertiveness can help raise a group member's level of confidence and reduce communication apprehension. answer: True U04 - Q025 Aggressive communicators ask and answer questions without fear or hos tility and stand up for their beliefs even when others disagree. answer: False U04 - Q026 Passive group members are rarely satisfied with their group experienc es. answer: True U04 - Q027 Compulsive talkers try or tend to direct the course of a group's disc ussion and take charge of the group. answer: True U04 - Q028 Passive-aggressive group members often get their way by working again st or undermining other members behind their backs and by appearing to agree whi le privately planning an opposite action. answer: True U04 - Q029 Group member effectiveness increases as you move from passivity to as sertiveness and then decreases as you move beyond assertiveness into aggressiven ess. answer: True U04 - Q030 When deciding how to say "No" to someone, make sure your statement is clear, as in "No, I'm not willing to take notes again." answer: True U04 - Q036 When analyzing and adapting group member diversity, you should consid er members' answer: all of the above U04 - Q037 During the 1990s, ______________ were the fastest growing racial/ethn ic group. answer: Hispanic/Latino Americans U04 - Q038 Which of the following groups would be considered a co-culture? answer: all of the above U04 - Q039 In the homogeneous ? heterogeneous group dialectic, homogeneous refer s to answer: a group composed of members who are the same or similar. U04-Q045 According to your textbook, there are 3 levels of diversity in every gr oup. Which of the following dimensions characterize the third (external) dimensi on? answer: education, religion, and income, U04-Q046 People who believe that their culture is better than other cultures or that their culture should be the role model for other cultures would be classifi

ed as answer: ethnocentric. U05 - Q.043 People who have biased beliefs about group members that are not base d on direct experience and firsthand knowledge or have irrational feelings of di slike and even hatred for certain groups would be classified as answer: prejudiced U05 - Q.044 All of the following statements are characteristics of people who ha ve prejudices EXCEPT answer: They deny opportunities granted to certain groups of people such as empl oyment, equal rights, and housing. U05 - Q.047 Which of the following traits are included in the Big Five Personali ty Traits and in the Myers-Briggs Type Indicator? answer: extraversion U05 - Q.048 In dialectic terms, the opposite or counterpart of a Myers-Briggs ju dger is answer: a perceiver. U05 - Q.049 Oscar is very outgoing and tends to talk more than others during gro up discussions. He enjoys working in the group and encourages others to get invo lved. Which Myers-Briggs personality trait best describes Jasper? answer: extrovert U05 - Q.050 Wanda tends to focus on details of the group project. She prefers to concentrate on one task at a time. Of all the group members, Wanda may be the m ost practical and realistic. Which Myers-Briggs personality trait best describes Wanda? answer: sensor U05 - Q.051 Kim is people-oriented. She wants everyone in the group to get along . She often spends extra time helping other group members. Which Myers-Briggs pe rsonality trait best describes Kim? answer: feeler U05 - Q001 Dennis is always the most organized member of his group. He frequentl y encourages the group to plan ahead. He develops lengthy "To Do" lists of tasks for the group to follow. Which Myers-Briggs personality trait best describes De nnis? answer: judger U05 - Q002 Even when everyone else in the group is upset or confused, Anthony st ays cool, calm, and objective. He doesn't mind making tough decisions and can't understand why other group members get upset about things that are not relevant to the issue under discussion. In most situations, Anthony thinks it is more imp ortant to be right than liked. Which Myers-Briggs personality trait best describ es Anthony? answer: thinker U05 - Q003 Reggie is highly structured and good at coordinating the group's work and keeping it organized. He never misses a deadline and expects others to do t he same. Which Myers-Briggs personality trait best describes Reggie? answer: judger U05 - Q004 Jason appears to be a very private person. He carefully thinks about what he is going to say before speaking. He enjoys the group but would prefer to work alone. Which Myers-Briggs personality trait best describes Jason? answer: introvert U05 - Q005 Which scholar(s) define(s) an intercultural dimension as an aspect of a culture that can be measured relative to other cultures? answer: Geert Hofstede U05 - Q006 Which of the following cultural dimensions is ranked very high in the United States? answer: individualism U05 - Q007 Which of the following groups of countries is the most collectivist? answer: Central and South America U05 - Q008 Collectivist cultures place greater value on answer: collaboration and cooperation. U05 - Q009 In high-context cultures, messages are

answer: implicit. U05 - Q010 In cultures with high uncertainty avoidance, people answer: want predictability and clear rules of behavior. U05 - Q011 In ___________cultures, people are more dependent on language to expr ess what they mean. answer: low-context U05 - Q011 More monochronic cultures are in answer: northern Europe and North America. U05 - Q012 Which characteristics are common in monochronic time cultures? answer: Members like to concentrate on one job before moving to another. U05 - Q013 In cultures with masculine values, answer: all of the above are true U05 - Q014 According to Hofstede, the people of Japan, Venezuela, and Italy live in a(n) ________________ culture. answer: masculine U05 - Q015 People who share beliefs such as "It is the duck that squawks that ge ts shot," or "Seeing is better than hearing," would be characterized as members of a _______________ culture. answer: high-context U05 - Q016 According to Hofstede's dimensions of culture, which country is ranke d #1 in terms of masculine values? answer: Japan U05 - Q017 High uncertainty avoidance is characterized by beliefs that answer: deviant ideas and behavior should be suppressed. U05 - Q018 Which cultural dimension would be characterized by the following comp onents:(1) subordinates should be consulted; (2) privileges and status symbols a re frowned upon; (3) parents treat their children as equals; and (4) teachers ex pect students to express their opinions in class? answer: low power distance U05 - Q020 Which of the following statements would be made by someone from a low -context culture? answer: I like to be accurate, clear, and direct when I talk to others. U05 - Q021 In You Just Don't Understand, Deborah Tannen's two-world hypothesis c oncludes that answer: all of the above are true U05 - Q022 Your textbook urges both men and women to adapt to the opposite sex's way of thinking and making decisions by heeding all of the following recommenda tions EXCEPT answer: Women should avoid disagreeing and arguing with men. U05 - Q023 All of the following communication behaviors are discussed in Cheris Kramarae's Muted Group Theory EXCEPT answer: Women should avoid challenging men in positions of power. U05 - Q024 Which generation is described as follows: they are confident and have high selfesteem, are collaborators who favor teamwork, and generally like keepi ng their career options open. answer: Millennials U05 - Q025 Which generation is described as follows: they are workaholics who ar e willing to challenge the status quo and are politically adept on the job. They believe that they are always right, but are willing to work hard to get what th ey want. answer: Boomers U05 - Q026 A 2007 study of college students investigating whether men or women t alk more found that answer: generally, men talk more than women. U05 - Q027 All of the following statements about religion are true EXCEPT answer: 1/2 of the world's population is Muslim. U05 - Q028 Which of the following religions is the oldest? answer: Judaism U05 - Q029 During the 1990s, the African American population increased 58%, and the European American population increased 48%.

answer: False U05 - Q030 A culture is a learned set of shared interpretations about beliefs, v alues, and norms which affect the behaviors of a relatively large group of peopl e. answer: True U05 - Q036 American Indian tribes, African Americans, Hispanic/Latino Americans, Asian Americans, Arab Americans, Irish Americans, and members of large and smal l religious groups are all examples of co-cultures. answer: True U05 - Q037 The second layer of diversity depicted in your textbook represents in ternal dimensions over which you have no control such as religion, marital statu s, and educational background. answer: False U05 - Q038 4 barriers to working in diverse groups are ethnocentrism, stereotypi ng, prejudice, and discrimination. answer: True U05 - Q039 A study of college students in the 1990s found that African Americans were stereotyped as lazy and loud, and Jews were described as shrewd and intell igent. answer: True U05-Q045 Ethnocentrism is a generalization about a group of people that oversimp lifies their characteristics. answer: False U05-Q046 Discrimination describes how we act out and express prejudices. answer: True U06 - Q.043 Stereotypes often lead to prejudices. answer: True U06 - Q.044 Prejudices are based on extensive and direct experience as well as p ersonal, firsthand knowledge about a group of people. answer: False U06 - Q.047 Scott Page, a political scientist at the University of Michigan, con cludes that "intelligence alone is the most important factor in guaranteeing a g roup different perspectives on a problem." answer: False U06 - Q.048 The Myers-Briggs Type Indicator looks at the different ways in which people p refer to use their minds: specifically, the way they perceive and the way they make judgments. answer: True U06 - Q.049 In group discussions, introverts find it hard to both absorb all the information and formulate an opinion about it. answer: True U06 - Q.050 According to the Myers-Briggs Type Indicator, sensor is the opposite personality trait preference of intuitive. answer: True U06 - Q.051 Sensor personalities in the Myers-Briggs typology prefer to deal wit h details. answer: True U06 - Q001 According to the Myers-Briggs Type Indicator, perceivers value flexib ility, dislike deadlines, and often do their work at the last minute. answer: True U06 - Q002 The ideal group would be composed of members who represent the MyersBriggs personality type of extroverted thinker. answer: False U06 - Q003 Edward Hall's work on cultural differences identifies 2 dimensions th at characterize cultural groups: uncertainty avoidance and masculine-feminine va lues. answer: False U06 - Q004 4 of Geert Hofstede's cultural dimensions are individualism-collectiv ism, power distance, uncertainty avoidance, and masculine-feminine values. answer: True

U06 - Q005 To someone from a collectivist culture, a U.S. communicator's style a nd behavior may be viewed as selfish, arrogant, antagonistic, power-hungry, ruth less, and impatient. answer: True U06 - Q006 In collectivist cultures, there is greater readiness to cooperate wit h group members. answer: True U06 - Q007 About 70% of the world's population regards independence and individu alism as a more important value than collectivism. answer: False U06 - Q008 Low power distance cultures include those in Israel, New Zealand, and Denmark. answer: True U06 - Q009 In low power distance cultures, members accept major differences in p ower as normal, assuming that all people are not created equal. answer: False U06 - Q010 The way in which Japanese people bow to one another in a face-to-face greeting demonstrates how the culture expresses power distance. answer: True U06 - Q011 Group members with more feminine cultural values may be highly effect ive and supportive but are less likely to achieve a real voice or influence in g roup decision making or leadership. answer: True U06 - Q012 Members of a high-context culture tend to speak more, speak louder, a nd speak more rapidly than people from a low-context culture. answer: False U06 - Q013 Germans represent people from a low-context culture. answer: True U06 - Q014 Polychronic time people are frequently late for appointments or may n ot show up at all. answer: True U06 - Q015 People in polychronic cultures usually adhere to plans, schedules, an d deadlines because time is valuable. answer: False U06 - Q017 People from low-context cultures may prefer more information-rich tec hnologies(such as videoconferences), as well as those that offer the feeling of social presence. answer: False U06 - Q018 Books such as Men Are from Mars, Women Are from Venus have perpetuate d stereotypes that cause harm to both men and women, including women's opportuni ties in the workplace, couple conflict and communication, and selfesteem problem s among teenagers. answer: True U06 - Q019 Research in group communication claims that some female members feel undervalued or invisible when working with male group members. answer: True U06 - Q020 In light of Myers-Briggs personality traits, women will be more succe ssful in groups if they do not use sarcasm with male members or tell them that t hey're illogical. answer: False U06 - Q021 In light of Myers-Briggs personality traits, women may be more effect ive by asking men what they think rather than what they feel. answer: True U06 - Q022 Cheris Kramarae's Muted Group Theory claims that those with power in a society "mute" the voices of women, the poor, and other minority groups. answer: True U06 - Q023 In general, women talk more than men do. answer: False U06 - Q024 Generation Xers or the Generation X are confident and have high selfesteem. They like to collaborate and favor teamwork.

answer: False U06 - Q025 Baby Boomersthe workaholic generationare often adept when it comes to n avigating political minefields in the workplace. answer: True U06 - Q026 Religious literacy requires the ability to understand and use the rel igious terms, symbols, images, beliefs, practices, scripture, heroes, themes, an d stories that are employed in American public life. answer: True U06 - Q027 Islam is older than Judaism. answer: False U06 - Q028 Members of the Christian Scientist religious group believe that disea se is a delusion of the carnal mind that can be cured by prayer. answer: True U06 - Q029 What are system requirements? A structured document setting out detai led descriptions of the system's functions, services and operational constraints . Statements in natural language plus diagrams of the services the system provid es and its operational constraints. Written for customers Requirements that come from the application domain of the system and that reflect characteristics of t hat domain None of the others - A structured document setting out detailed descr iptions of the system's functions, services and operational constraints.None of the others - Statements in natural language plus diagrams of the services the sy stem provides and its operational constraints. Written for customersNone of the others - Requirements that come from the application domain of the system and th at reflect characteristics of that domainNone of the others - None of the others None of the others answer: A structured document setting out detailed descriptions of the system's functions, services and operational constraints. U06 - Q030 What is the problem that cannot arise when requirements are written i n natural language? Lack of clarity Requirement confusion Lack of user's underst andability Requirement amalgamation - Lack of clarityA structured document setti ng out detailed descriptions of the system's functions, services and operational constraints. - Requirement confusionA structured document setting out detailed descriptions of the system's functions, services and operational constraints. Lack of user's understandabilityA structured document setting out detailed descr iptions of the system's functions, services and operational constraints. - Requi rement amalgamationA structured document setting out detailed descriptions of th e system's functions, services and operational constraints. answer: Lack of user's understandability U06 - Q036 Select correct statements about software requirements The requirement s for a system are the descriptions of the services provided by the system and i ts operational constraints. The process of finding out, analyzing, documenting a nd checking these services and constraints is called requirements engineering (R E) User requirements set out the system's functions, services and operational co nstraints in detail. We need to write requirements at different levels of detail because different types of readers use them in different ways - The requirement s for a system are the descriptions of the services provided by the system and i ts operational constraints.Lack of user's understandability - The process of fin ding out, analyzing, documenting and checking these services and constraints is called requirements engineering (RE)Lack of user's understandability - User requ irements set out the system's functions, services and operational constraints in detail.Lack of user's understandability - We need to write requirements at diff erent levels of detail because different types of readers use them in different waysLack of user's understandability answer: The requirements for a system are the descriptions of the services provi ded by the system and its operational constraints.The process of finding out, an alyzing, documenting and checking these services and constraints is called requi rements engineering (RE)We need to write requirements at different levels of det ail because different types of readers use them in different ways U06 - Q037 Which of the following statements belong to functional requirements? These are statements of services the system should provide, how the system shoul

d react to particular inputs and how the system should behave in particular situ ations The functional requirements may also explicitly state what the system sho uld not do These are constraints on the services or functions offered by the sys tem. They include timing constraints, constraints on the development process and standards. - These are statements of services the system should provide, how th e system should react to particular inputs and how the system should behave in p articular situationsThe requirements for a system are the descriptions of the se rvices provided by the system and its operational constraints.The process of fin ding out, analyzing, documenting and checking these services and constraints is called requirements engineering (RE)We need to write requirements at different l evels of detail because different types of readers use them in different ways The functional requirements may also explicitly state what the system should not doThe requirements for a system are the descriptions of the services provided b y the system and its operational constraints.The process of finding out, analyzi ng, documenting and checking these services and constraints is called requiremen ts engineering (RE)We need to write requirements at different levels of detail b ecause different types of readers use them in different ways - These are constra ints on the services or functions offered by the system.The requirements for a s ystem are the descriptions of the services provided by the system and its operat ional constraints.The process of finding out, analyzing, documenting and checkin g these services and constraints is called requirements engineering (RE)We need to write requirements at different levels of detail because different types of r eaders use them in different ways - They include timing constraints, constraints on the development process and standards.The requirements for a system are the descriptions of the services provided by the system and its operational constrai nts.The process of finding out, analyzing, documenting and checking these servic es and constraints is called requirements engineering (RE)We need to write requi rements at different levels of detail because different types of readers use the m in different ways answer: These are statements of services the system should provide, how the syst em should react to particular inputs and how the system should behave in particu lar situationsThe functional requirements may also explicitly state what the sys tem should not do U06 - Q038 Which of the followings belong to functional requirements? The user i nterface for LIBSYS shall be implemented as simple HTML without frames or Java a pplets. The system development process and deliverable documents shall conform t o the process and deliverables defined in XYZCo-SP-STAN-95 The user shall be abl e to search either all of the initial set of databases or select a subset from i t. The system shall provide appropriate viewers for the user to read documents i n the document store. Every order shall be allocated a unique identifier (ORDERJ D) , which the user shall be able to copy to the account's permanent storage are a. - The user interface for LIBSYS shall be implemented as simple HTML without f rames or Java applets.These are statements of services the system should provide , how the system should react to particular inputs and how the system should beh ave in particular situationsThe functional requirements may also explicitly stat e what the system should not do - The system development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STA N-95These are statements of services the system should provide, how the system s hould react to particular inputs and how the system should behave in particular situationsThe functional requirements may also explicitly state what the system should not do - The user shall be able to search either all of the initial set o f databases or select a subset from it.These are statements of services the syst em should provide, how the system should react to particular inputs and how the system should behave in particular situationsThe functional requirements may als o explicitly state what the system should not do - The system shall provide appr opriate viewers for the user to read documents in the document store.These are s tatements of services the system should provide, how the system should react to particular inputs and how the system should behave in particular situationsThe f unctional requirements may also explicitly state what the system should not do Every order shall be allocated a unique identifier (ORDERJD) , which the user s

hall be able to copy to the account's permanent storage area.These are statement s of services the system should provide, how the system should react to particul ar inputs and how the system should behave in particular situationsThe functiona l requirements may also explicitly state what the system should not do answer: The user shall be able to search either all of the initial set of databa ses or select a subset from it.The system shall provide appropriate viewers for the user to read documents in the document store.Every order shall be allocated a unique identifier (ORDERJD) , which the user shall be able to copy to the acco unt's permanent storage area. U06 - Q039 Which of the followings belong to non-functional requirements? The us er interface for LIBSYS shall be implemented as simple HTML without frames or Ja va applets The system development process and deliverable documents shall confor m to the process and deliverables defined in XYZCo-SP-STAN-95 The user shall be able to search either all of the initial set of databases or select a subset fro m it. The system shall provide appropriate viewers for the user to read document s in the document store. Every order shall be allocated a unique identifier (ORD ERJD) , which the user shall be able to copy to the account's permanent storage area. - The user interface for LIBSYS shall be implemented as simple HTML withou t frames or Java appletsThe user shall be able to search either all of the initi al set of databases or select a subset from it.The system shall provide appropri ate viewers for the user to read documents in the document store.Every order sha ll be allocated a unique identifier (ORDERJD) , which the user shall be able to copy to the account's permanent storage area. - The system development process a nd deliverable documents shall conform to the process and deliverables defined i n XYZCo-SP-STAN-95The user shall be able to search either all of the initial set of databases or select a subset from it.The system shall provide appropriate vi ewers for the user to read documents in the document store.Every order shall be allocated a unique identifier (ORDERJD) , which the user shall be able to copy t o the account's permanent storage area. - The user shall be able to search eithe r all of the initial set of databases or select a subset from it.The user shall be able to search either all of the initial set of databases or select a subset from it.The system shall provide appropriate viewers for the user to read docume nts in the document store.Every order shall be allocated a unique identifier (OR DERJD) , which the user shall be able to copy to the account's permanent storage area. - The system shall provide appropriate viewers for the user to read docum ents in the document store.The user shall be able to search either all of the in itial set of databases or select a subset from it.The system shall provide appro priate viewers for the user to read documents in the document store.Every order shall be allocated a unique identifier (ORDERJD) , which the user shall be able to copy to the account's permanent storage area. - Every order shall be allocate d a unique identifier (ORDERJD) , which the user shall be able to copy to the ac count's permanent storage area.The user shall be able to search either all of th e initial set of databases or select a subset from it.The system shall provide a ppropriate viewers for the user to read documents in the document store.Every or der shall be allocated a unique identifier (ORDERJD) , which the user shall be a ble to copy to the account's permanent storage area. answer: The user interface for LIBSYS shall be implemented as simple HTML withou t frames or Java appletsThe system development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STAN-95 U06 - Q040 What are the user requirements? The high-level abstract requirement T he statements in a natural language plus diagrams that describe the services' sy stem and their constraints The requirements are written for contractor managers All of the others - The high-level abstract requirementThe user interface for LI BSYS shall be implemented as simple HTML without frames or Java appletsThe syste m development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STAN-95 - The statements in a natural language plus diagrams that describe the services' system and their constraintsThe user interface for LIBSYS shall be implemented as simple HTML without frames or Java appletsThe system development process and deliverable documents shall conform to the process and deliverables defined in XYZCo-SP-STAN-95 - The requirements are

written for contractor managersThe user interface for LIBSYS shall be implement ed as simple HTML without frames or Java appletsThe system development process a nd deliverable documents shall conform to the process and deliverables defined i n XYZCo-SP-STAN-95 - All of the othersThe user interface for LIBSYS shall be imp lemented as simple HTML without frames or Java appletsThe system development pro cess and deliverable documents shall conform to the process and deliverables def ined in XYZCo-SP-STAN-95 answer: All of the others U06-Q045 Which is NOT a guideline for writing requirements? Use different templa te for each requirement Use language in a consistent way. Use text highlighting to identify key parts of the requirement. Avoid the use of computer jargon. - Us e different template for each requirementAll of the others - Use language in a c onsistent way.All of the others - Use text highlighting to identify key parts of the requirement.All of the others - Avoid the use of computer jargon.All of the others answer: Use different template for each requirement U06-Q046 ________ are statements of functions the system should provide and how the system should react to particular inputs and how the system should behave in particular situations. Functional requirements Non-functional requirements Doma in requirements User requirements - Functional requirementsUse different templat e for each requirement - Non-functional requirementsUse different template for e ach requirement - Domain requirementsUse different template for each requirement - User requirementsUse different template for each requirement answer: Functional requirements U08 - Q.043 Different models present the system from different perspectives: ___ ___perspective showing the system's context or environment; ______perspective sh owing the behaviour of the system; ______perspective showing the system or data architecture. External; Behavioural; Structural Structural; Behavioural; Externa l External; Structural; Behavioural External; Structural; Functional - External; Behavioural; StructuralFunctional requirements - Structural; Behavioural; Exter nalFunctional requirements - External; Structural; BehaviouralFunctional require ments - External; Structural; FunctionalFunctional requirements answer: External; Behavioural; Structural U08 - Q.044 Context models are used to illustrate the operational context of a s ystem - they show what lies outside the system ______. Functions Behaviors None of the others Boundaries - FunctionsExternal; Behavioural; Structural - Behavior sExternal; Behavioural; Structural - None of the othersExternal; Behavioural; St ructural - BoundariesExternal; Behavioural; Structural answer: Boundaries U08 - Q.047 Which perspective or system model is used to perform system componen ts? Behavioural perspective Functional perspective External perspective Structur al perspective - Behavioural perspectiveBoundaries - Functional perspectiveBound aries - External perspectiveBoundaries - Structural perspectiveBoundaries answer: Structural perspective U08 - Q.048 In the library management system, there are 3 objects: Student, Book and Newspaper, so which relationship is designed among them? Inheritance Intera ction Aggregation Association or no relationship - InheritanceStructural perspec tive - InteractionStructural perspective - AggregationStructural perspective - A ssociation or no relationshipStructural perspective answer: Association or no relationship U08 - Q.049 The CMS system connects to the file server and mail server, so which perspective is used to perform them? Behavioural perspective Functional perspec tive Structural perspective External perspective - Behavioural perspectiveAssoci ation or no relationship - Functional perspectiveAssociation or no relationship - Structural perspectiveAssociation or no relationship - External perspectiveAss ociation or no relationship answer: External perspective U08 - Q.050 In the CMS system, there are 3 objects: Subject, Quiz and Assignment , so which relationship is designed among them? Inheritance Interaction Associat ion or no relationship Aggregation - InheritanceExternal perspective - Interacti

onExternal perspective - Association or no relationshipExternal perspective - Ag gregationExternal perspective answer: Aggregation U08 - Q.051 To help the customer understand easily procedure of enrolling FU, wh ich diagram is suitable to modeling this process? Class diagram State chart Sequ ence diagram Data flow diagram - Class diagramAggregation - State chartAggregati on - Sequence diagramAggregation - Data flow diagramAggregation answer: Data flow diagram U08 - Q001 How are the context model? Social and organisational concerns may aff ect the decision on where to position system boundaries Relationship with other systems They show what lies outside the system boundaries They show what lies in side the system boundaries - Social and organisational concerns may affect the d ecision on where to position system boundariesData flow diagram - Relationship w ith other systemsData flow diagram - They show what lies outside the system boun dariesData flow diagram - They show what lies inside the system boundariesData f low diagram answer: Social and organisational concerns may affect the decision on where to p osition system boundariesRelationship with other systemsThey show what lies outs ide the system boundaries U08 - Q002 Which ones relate to the behavioural model? Data flow diagrams are us ed in performing the data exchange between a system and other systems Show the p rocessing steps as data flows through a system State diagrams show states when t he systems response to events Semantic data describe the logical structure of da ta processed by the system - Data flow diagrams are used in performing the data exchange between a system and other systemsSocial and organisational concerns ma y affect the decision on where to position system boundariesRelationship with ot her systemsThey show what lies outside the system boundaries - Show the processi ng steps as data flows through a systemSocial and organisational concerns may af fect the decision on where to position system boundariesRelationship with other systemsThey show what lies outside the system boundaries - State diagrams show s tates when the systems response to eventsSocial and organisational concerns may affect the decision on where to position system boundariesRelationship with othe r systemsThey show what lies outside the system boundaries - Semantic data descr ibe the logical structure of data processed by the systemSocial and organisation al concerns may affect the decision on where to position system boundariesRelati onship with other systemsThey show what lies outside the system boundaries answer: Data flow diagrams are used in performing the data exchange between a sy stem and other systemsShow the processing steps as data flows through a systemSt ate diagrams show states when the systems response to events U08 - Q003 Which relationships are used in the data model? Inheritance Aggregati on Association Interaction - InheritanceData flow diagrams are used in performin g the data exchange between a system and other systemsShow the processing steps as data flows through a systemState diagrams show states when the systems respon se to events - AggregationData flow diagrams are used in performing the data exc hange between a system and other systemsShow the processing steps as data flows through a systemState diagrams show states when the systems response to events AssociationData flow diagrams are used in performing the data exchange between a system and other systemsShow the processing steps as data flows through a syst emState diagrams show states when the systems response to events - InteractionDa ta flow diagrams are used in performing the data exchange between a system and o ther systemsShow the processing steps as data flows through a systemState diagra ms show states when the systems response to events answer: InheritanceAggregationAssociation U08 - Q004 Which of following is not a UML diagram used creating a system analys is model Activity diagram Class diagram Dataflow diagram State diagram - Activit y diagramInheritanceAggregationAssociation - Class diagramInheritanceAggregation Association - Dataflow diagramInheritanceAggregationAssociation - State diagramI nheritanceAggregationAssociation answer: Dataflow diagram U08 - Q005 The data dictionary contains descriptions of each software Control it

em Data object Diagram Notation - Control itemDataflow diagram - Data objectData flow diagram - DiagramDataflow diagram - NotationDataflow diagram answer: Control itemData object U08 - Q006 Which is not a diagram in the behavioral models? Deployment diagram D ata-low diagram Sequence diagram State machine diagram - Deployment diagramContr ol itemData object - Data-low diagramControl itemData object - Sequence diagramC ontrol itemData object - State machine diagramControl itemData object answer: Deployment diagram U08 - Q007(Trung U08 - Q012) Which is the purpose of data models? Describe the l ogical structure of data processed by the system Show the processing steps as da ta flows through a system (end-to-end processing of data) Show how the system re acts, responses to events Illustrate the operational context of a system - Descr ibe the logical structure of data processed by the systemDeployment diagram - Sh ow the processing steps as data flows through a system (end-to-end processing of data)Deployment diagram - Show how the system reacts, responses to eventsDeploy ment diagram - Illustrate the operational context of a systemDeployment diagram answer: Describe the logical structure of data processed by the system U08 - Q008 From various perspectives, different models are developed for the sys tem includes external, behavioral, structural and which of following models? Sta te machine model Architectural model Data flow model Object model - State machin e modelDescribe the logical structure of data processed by the system - Architec tural modelDescribe the logical structure of data processed by the system - Data flow modelDescribe the logical structure of data processed by the system - Obje ct modelDescribe the logical structure of data processed by the system answer: Object model U08 - Q009 What perspectives may be used for system modeling? An external perspe ctive A behavioral perspective An internal perspective A structural perspective - An external perspectiveObject model - A behavioral perspectiveObject model - A n internal perspectiveObject model - A structural perspectiveObject model answer: An external perspectiveA behavioral perspectiveA structural perspective U08 - Q010 What are the components of an object class definition in the UML? The name of the object class The interfaces of the class The attributes of the clas s The operations or methods associated with the class - The name of the object c lassAn external perspectiveA behavioral perspectiveA structural perspective - Th e interfaces of the classAn external perspectiveA behavioral perspectiveA struct ural perspective - The attributes of the classAn external perspectiveA behaviora l perspectiveA structural perspective - The operations or methods associated wit h the classAn external perspectiveA behavioral perspectiveA structural perspecti ve answer: The name of the object classThe attributes of the classThe operations or methods associated with the class U08 - Q011 Which of the following is NOT a type of behavioral model? Data proces sing models Stage machine models Semantic data models Architectural model - Data processing modelsThe name of the object classThe attributes of the classThe ope rations or methods associated with the class - Stage machine modelsThe name of t he object classThe attributes of the classThe operations or methods associated w ith the class - Semantic data modelsThe name of the object classThe attributes o f the classThe operations or methods associated with the class - Architectural m odelThe name of the object classThe attributes of the classThe operations or met hods associated with the class answer: U08 - Q012 Which is the purpose of data models? Describe the logical structure o f data processed by the system Show the processing steps as data flows through a system (end-to-end processing of data) Show how the system reacts, responses to events Illustrate the operational context of a system - Describe the logical st ructure of data processed by the system - Show the processing steps as data flow s through a system (end-to-end processing of data) - Show how the system reacts, responses to events - Illustrate the operational context of a system answer: Describe the logical structure of data processed by the system

U08 - Q013 What is described in a context model? How the system responds to exte rnal events The immediate external environment of the system defining the system 's context and the dependencies that a system has on its environment The logical structure of the data processed by a system or managed by a database. - How the system responds to external eventsDescribe the logical structure of data proces sed by the system - The immediate external environment of the system defining th e system's context and the dependencies that a system has on its environmentDesc ribe the logical structure of data processed by the system - The logical structu re of the data processed by a system or managed by a database.Describe the logic al structure of data processed by the system answer: The immediate external environment of the system defining the system's c ontext and the dependencies that a system has on its environment U08 - Q014 What is described in a state machine model? How the system responds t o external events The immediate external environment of the system defining the system's context and the dependencies that a system has on its environment The l ogical structure of the data processed by a system or managed by a database. - H ow the system responds to external eventsThe immediate external environment of t he system defining the system's context and the dependencies that a system has o n its environment - The immediate external environment of the system defining th e system's context and the dependencies that a system has on its environmentThe immediate external environment of the system defining the system's context and t he dependencies that a system has on its environment - The logical structure of the data processed by a system or managed by a database.The immediate external e nvironment of the system defining the system's context and the dependencies that a system has on its environment answer: How the system responds to external events U08 - Q015 Which of these statements about state machine models is NOT true? The se model the behaviour of the system in response to external and internal events They show the system's responses to stimuli so are often used for modelling rea l-time systems They are used to describe the logical structure of data processed by the system - These model the behaviour of the system in response to external and internal eventsHow the system responds to external events - They show the s ystem's responses to stimuli so are often used for modelling real-time systemsHo w the system responds to external events - They are used to describe the logical structure of data processed by the systemHow the system responds to external ev ents answer: They are used to describe the logical structure of data processed by the system U08 - Q016 Which of the following is NOT a type of behavioural model Data-flow m odels Stage machine models Semantic data models - Data-flow modelsThey are used to describe the logical structure of data processed by the system - Stage machin e modelsThey are used to describe the logical structure of data processed by the system - Semantic data modelsThey are used to describe the logical structure of data processed by the system answer: Semantic data models U08 - Q017 All of the following are the components of an object class definition in the UML EXCEPT The name of the object class The interfaces of the class The attributes of the class The operations or methods associated with the class - Th e name of the object classSemantic data models - The interfaces of the classSema ntic data models - The attributes of the classSemantic data models - The operati ons or methods associated with the classSemantic data models answer: The interfaces of the class U08 - Q018 All of the following are disadvantages of structured methods EXCEPT T hey do not support non-functional requirements modeling They rarely include guid elines to help users decide if they can be used in a particular area They tend t o produce too much documentation There are not many CASE tools support structure d methods The models produced are detailed and often hard to understand - They d o not support non-functional requirements modelingThe interfaces of the class They rarely include guidelines to help users decide if they can be used in a par ticular areaThe interfaces of the class - They tend to produce too much document

ationThe interfaces of the class - There are not many CASE tools support structu red methodsThe interfaces of the class - The models produced are detailed and of ten hard to understandThe interfaces of the class answer: There are not many CASE tools support structured methods U08 - Q019 When should you use data flow diagrams (DFD)? DFD is used to describi ng all of the things that can be done with a database system DFD is used to illu strate the sequence of steps that must be performed in order to complete a task DFD is used to showing all of system's functionalities available DFD is used to showing the data exchange between a system and other systems in its environment - DFD is used to describing all of the things that can be done with a database s ystemThere are not many CASE tools support structured methods - DFD is used to i llustrate the sequence of steps that must be performed in order to complete a ta skThere are not many CASE tools support structured methods - DFD is used to show ing all of system's functionalities availableThere are not many CASE tools suppo rt structured methods - DFD is used to showing the data exchange between a syste m and other systems in its environmentThere are not many CASE tools support stru ctured methods answer: DFD is used to showing the data exchange between a system and other syst ems in its environment U08 - Q020 Study object models for one system, each object has been named and sh owed the relation between them (by inheritance, aggregation...). What is a force d rule had to follow in terms below. (Choose one) One object must inherit from s ome one The object name must be different from each other. Every object must hav e at least one associated operation. - One object must inherit from some oneDFD is used to showing the data exchange between a system and other systems in its e nvironment - The object name must be different from each other.DFD is used to sh owing the data exchange between a system and other systems in its environment Every object must have at least one associated operation.DFD is used to showing the data exchange between a system and other systems in its environment answer: The object name must be different from each other. U08 - Q021 What are the purposes of system modelling? (Choose one) To help the a nalyst to understand more about the functionalities of the system, and help comm unicating with customer To help communicating with customer, validate user requi rement To validate user requirement, define the boundaries of the system To defi ne the boundaries of the system, validate system requirement - To help the analy st to understand more about the functionalities of the system, and help communic ating with customerThe object name must be different from each other. - To help communicating with customer, validate user requirementThe object name must be di fferent from each other. - To validate user requirement, define the boundaries o f the systemThe object name must be different from each other. - To define the b oundaries of the system, validate system requirementThe object name must be diff erent from each other. answer: To help the analyst to understand more about the functionalities of the system, and help communicating with customer U08 - Q022 What is the role of state machine model? (Choose one) State machine i s used to help the analyst to understand the functionality of the system, commun icating with customer State machine is used to define the boundaries of the syst em, validate system requirement State machine is used to describe how a system r esponses to external and internal events; It shows system states and events that cause transition from one state to another State machine is used in showing the data exchange between a system and other systems in its environment - State mac hine is used to help the analyst to understand the functionality of the system, communicating with customerTo help the analyst to understand more about the func tionalities of the system, and help communicating with customer - State machine is used to define the boundaries of the system, validate system requirementTo he lp the analyst to understand more about the functionalities of the system, and h elp communicating with customer - State machine is used to describe how a system responses to external and internal events; It shows system states and events th at cause transition from one state to anotherTo help the analyst to understand m ore about the functionalities of the system, and help communicating with custome

r - State machine is used in showing the data exchange between a system and othe r systems in its environmentTo help the analyst to understand more about the fun ctionalities of the system, and help communicating with customer answer: State machine is used to describe how a system responses to external and internal events; It shows system states and events that cause transition from o ne state to another U08 - Q023 What are the roles of state machine models? These model the behaviour of the system in response to external and internal events They show the system' s responses to stimuli so are often used for modelling real-time systems They ar e used to describe the logical structure of data processed by the system - These model the behaviour of the system in response to external and internal eventsSt ate machine is used to describe how a system responses to external and internal events; It shows system states and events that cause transition from one state t o another - They show the system's responses to stimuli so are often used for mo delling real-time systemsState machine is used to describe how a system response s to external and internal events; It shows system states and events that cause transition from one state to another - They are used to describe the logical str ucture of data processed by the systemState machine is used to describe how a sy stem responses to external and internal events; It shows system states and event s that cause transition from one state to another answer: These model the behaviour of the system in response to external and inte rnal eventsThey show the system's responses to stimuli so are often used for mod elling real-time systems U08 - Q024 Which of the following models does NOT belong to behavioral models Da ta processing models Stage machine models Semantic data models - Data processing modelsThese model the behaviour of the system in response to external and inter nal eventsThey show the system's responses to stimuli so are often used for mode lling real-time systems - Stage machine modelsThese model the behaviour of the s ystem in response to external and internal eventsThey show the system's response s to stimuli so are often used for modelling real-time systems - Semantic data m odelsThese model the behaviour of the system in response to external and interna l eventsThey show the system's responses to stimuli so are often used for modell ing real-time systems answer: Semantic data models U08 - Q025 Data flow diagrams (DFD?) is used to Describe all of the things that can be done with a database system Illustrate the sequence of steps that must be performed in order to complete a task Show all of system's functionalities avai lable Show the data exchange between a system and other systems in its environme nt - Describe all of the things that can be done with a database systemSemantic data models - Illustrate the sequence of steps that must be performed in order t o complete a taskSemantic data models - Show all of system's functionalities ava ilableSemantic data models - Show the data exchange between a system and other s ystems in its environmentSemantic data models answer: Show the data exchange between a system and other systems in its environ ment U08 - Q026 Which of the following statements about structured methods are true? They do not support non-functional requirements modeling They rarely include gui delines to help users decide if they can be used in a particular area They tend to produce too much documentation There are not many CASE tools support structur ed methods The models produced are detailed and often hard to understand - They do not support non-functional requirements modelingShow the data exchange betwee n a system and other systems in its environment - They rarely include guidelines to help users decide if they can be used in a particular areaShow the data exch ange between a system and other systems in its environment - They tend to produc e too much documentationShow the data exchange between a system and other system s in its environment - There are not many CASE tools support structured methodsS how the data exchange between a system and other systems in its environment - Th e models produced are detailed and often hard to understandShow the data exchang e between a system and other systems in its environment answer: They do not support non-functional requirements modelingThey rarely incl

ude guidelines to help users decide if they can be used in a particular areaThey tend to produce too much documentationThe models produced are detailed and ofte n hard to understand U08 - Q028 What are the components of an object class definition in the UML? The name of the object class The operations or methods associated with the class Th e attributes of the class All of the others - The name of the object classThey d o not support non-functional requirements modelingThey rarely include guidelines to help users decide if they can be used in a particular areaThey tend to produ ce too much documentationThe models produced are detailed and often hard to unde rstand - The operations or methods associated with the classThey do not support non-functional requirements modelingThey rarely include guidelines to help users decide if they can be used in a particular areaThey tend to produce too much do cumentationThe models produced are detailed and often hard to understand - The a ttributes of the classThey do not support non-functional requirements modelingTh ey rarely include guidelines to help users decide if they can be used in a parti cular areaThey tend to produce too much documentationThe models produced are det ailed and often hard to understand - All of the othersThey do not support non-fu nctional requirements modelingThey rarely include guidelines to help users decid e if they can be used in a particular areaThey tend to produce too much document ationThe models produced are detailed and often hard to understand answer: All of the others U08 - Q029 Which of the following is NOT a disadvantage of structured methods? T hey do not support non-functional requirements modeling They rarely include guid elines to help users decide if they can be used in a particular area They tend t o produce too much documentation There are not many CASE tools that support stru ctured methods The models produced are detailed and often hard to understand - T hey do not support non-functional requirements modelingAll of the others - They rarely include guidelines to help users decide if they can be used in a particul ar areaAll of the others - They tend to produce too much documentationAll of the others - There are not many CASE tools that support structured methodsAll of th e others - The models produced are detailed and often hard to understandAll of t he others answer: There are not many CASE tools that support structured methods 1 - State machine modelsThere are not many CASE tools that support structured me thods - Data-flow modelsThere are not many CASE tools that support structured me thods - Object modelsThere are not many CASE tools that support structured metho ds - Context modelsThere are not many CASE tools that support structured methods answer: Data-flow models U08 - Q031 Which of the following is NOT an object model that may be developed? Inheritance models Object aggregation models Workflow model Object behavior mode l - Inheritance modelsData-flow models - Object aggregation modelsData-flow mode ls - Workflow modelData-flow models - Object behavior modelData-flow models answer: Workflow model U08 - Q036 Select correct statements about types of system models A data- flow m odel Data-flow models show how data is processed at different stages in the syst em A composition model: A composition or aggregation model shows how the princip al sub-systems that make up a system An architectural model: Architectural model s show entities in the system are composed of other entities A classification mo del: Object class/inheritance diagrams show how entities have common characteris tics A stimulus-response model A stimulus-response model, or state transition di agram, shows how the system reacts to internal and external events. - A data- fl ow model Data-flow models show how data is processed at different stages in the systemWorkflow model - A composition model: A composition or aggregation model s hows how the principal sub-systems that make up a systemWorkflow model - An arch itectural model: Architectural models show entities in the system are composed o f other entitiesWorkflow model - A classification model: Object class/inheritanc e diagrams show how entities have common characteristicsWorkflow model - A stimu lus-response model A stimulus-response model, or state transition diagram, shows how the system reacts to internal and external events.Workflow model -

answer: A data- flow model Data-flow models show how data is processed at differ ent stages in the systemA classification model: Object class/inheritance diagram s show how entities have common characteristics U08 - Q037 Which are not the purposes of data models? Describe the logical struc ture of data processed by the system Show the processing steps as data flows thr ough a system (end-to-end processing of data) Show how the system reacts, respon ses to events Illustrate the operational context of a system - Describe the logi cal structure of data processed by the systemA data- flow model Data-flow models show how data is processed at different stages in the systemA classification mo del: Object class/inheritance diagrams show how entities have common characteris tics - Show the processing steps as data flows through a system (end-to-end proc essing of data)A data- flow model Data-flow models show how data is processed at different stages in the systemA classification model: Object class/inheritance diagrams show how entities have common characteristics - Show how the system rea cts, responses to eventsA data- flow model Data-flow models show how data is pro cessed at different stages in the systemA classification model: Object class/inh eritance diagrams show how entities have common characteristics - Illustrate the operational context of a systemA data- flow model Data-flow models show how dat a is processed at different stages in the systemA classification model: Object c lass/inheritance diagrams show how entities have common characteristics answer: Show the processing steps as data flows through a system (end-to-end pro cessing of data)Show how the system reacts, responses to eventsIllustrate the op erational context of a system U08 - Q038 Which of the following statements about system models are true? A mod el is an abstract view of a system that ignores some system details. Context mod els show how the system being modeled is positioned in an environment with other systems and processes. Data-flow diagrams may be used to model the data process ing carried out by a system. Sequence models are used to model a system's behavi or in response to internal or external events. State machine models that show in teractions between actors and objects in a system are used to model dynamic beha vior. - A model is an abstract view of a system that ignores some system details .Show the processing steps as data flows through a system (end-to-end processing of data)Show how the system reacts, responses to eventsIllustrate the operation al context of a system - Context models show how the system being modeled is pos itioned in an environment with other systems and processes.Show the processing s teps as data flows through a system (end-to-end processing of data)Show how the system reacts, responses to eventsIllustrate the operational context of a system - Data-flow diagrams may be used to model the data processing carried out by a system.Show the processing steps as data flows through a system (end-to-end proc essing of data)Show how the system reacts, responses to eventsIllustrate the ope rational context of a system - Sequence models are used to model a system's beha vior in response to internal or external events.Show the processing steps as dat a flows through a system (end-to-end processing of data)Show how the system reac ts, responses to eventsIllustrate the operational context of a system - State ma chine models that show interactions between actors and objects in a system are u sed to model dynamic behavior.Show the processing steps as data flows through a system (end-to-end processing of data)Show how the system reacts, responses to e ventsIllustrate the operational context of a system answer: A model is an abstract view of a system that ignores some system details .Context models show how the system being modeled is positioned in an environmen t with other systems and processes.Data-flow diagrams may be used to model the d ata processing carried out by a system. U08 - Q039 Which models are used to model system behaviors? Data flow models Sta te machine models Inheritance models Object models Semantic data models - Data f low modelsA model is an abstract view of a system that ignores some system detai ls.Context models show how the system being modeled is positioned in an environm ent with other systems and processes.Data-flow diagrams may be used to model the data processing carried out by a system. - State machine modelsA model is an ab stract view of a system that ignores some system details.Context models show how the system being modeled is positioned in an environment with other systems and

processes.Data-flow diagrams may be used to model the data processing carried o ut by a system. - Inheritance modelsA model is an abstract view of a system that ignores some system details.Context models show how the system being modeled is positioned in an environment with other systems and processes.Data-flow diagram s may be used to model the data processing carried out by a system. - Object mod elsA model is an abstract view of a system that ignores some system details.Cont ext models show how the system being modeled is positioned in an environment wit h other systems and processes.Data-flow diagrams may be used to model the data p rocessing carried out by a system. - Semantic data modelsA model is an abstract view of a system that ignores some system details.Context models show how the sy stem being modeled is positioned in an environment with other systems and proces ses.Data-flow diagrams may be used to model the data processing carried out by a system. answer: Data flow modelsState machine models U08-Q045 Which data models describe the logical structure of data which is impor ted to or exported by the systems? Semantic data models Object models Sequence m odels Data flow models - Semantic data modelsData flow modelsState machine model s - Object modelsData flow modelsState machine models - Sequence modelsData flow modelsState machine models - Data flow modelsData flow modelsState machine mode ls answer: Semantic data models U08-Q046 _______ show the interactions between actors and the system objects tha t they use. Sequence models Object models Semantic data models Data flow models - Sequence modelsSemantic data models - Object modelsSemantic data models - Sema ntic data modelsSemantic data models - Data flow modelsSemantic data models answer: Sequence models U11 - Q.043 In architecture design: Using large-grain components improves system ______ but reduces system _______. Security; Performance Availability; Maintain ability All of the others Performance; maintainability - Security; PerformanceSe quence models - Availability; MaintainabilitySequence models - All of the others Sequence models - Performance; maintainabilitySequence models answer: Performance; maintainability U11 - Q.044 ______ are ery abstract. They do not show the nature of component re lationships nor the externally visible properties of the sub-systems. However, t hey useful for communication with stakeholders and for project planning. Sequenc e diagrams Use case diagrams DFD diagrams Box and line diagrams - Sequence diagr amsPerformance; maintainability - Use case diagramsPerformance; maintainability - DFD diagramsPerformance; maintainability - Box and line diagramsPerformance; m aintainability answer: Box and line diagrams U11 - Q.047 Which architecture model is used in the network application? Client/ Server Centralised control Event-based control OSI - Client/ServerBox and line d iagrams - Centralised controlBox and line diagrams - Event-based controlBox and line diagrams - OSIBox and line diagrams answer: OSI U11 - Q.048 Which architecture style is used in the public systems, Gmail, Yahoo chat, etc.? Client/Server Control style Interrupt-driven control Broadcasting Client/ServerOSI - Control styleOSI - Interrupt-driven controlOSI - Broadcastin gOSI answer: Broadcasting U11 - Q.049 Which architecture model is used to transfer secure data between 2 P Cs? Centralised control Event-based control Client/Server OSI - Centralised cont rolBroadcasting - Event-based controlBroadcasting - Client/ServerBroadcasting OSIBroadcasting answer: OSI U11 - Q.050 In the banking management system, all transactions must be approved by manager, and if there are any withdraws or deposits from the customer, they w ill be recorded and sent to the manager, so which system architecture style is a pplied for this situation? Client/Server Control style Broadcasting Interrupt-dr iven control - Client/ServerOSI - Control styleOSI - BroadcastingOSI - Interrupt

-driven controlOSI answer: Interrupt-driven control U11 - Q.051 In the sale management system, each salesman will record all sale in formation to their database and the end of day, they will integrate their data w ith the central database of company, so which system architecture style is appli ed for this situation? Client/Server Control style Layer Repository - Client/Ser verInterrupt-driven control - Control styleInterrupt-driven control - LayerInter rupt-driven control - RepositoryInterrupt-driven control answer: Repository U11 - Q001 Which information are refered to make architectural design? Which com ponents are distributed in the system How the sub-system is decomposed into modu les A generic application architecture can be used Non-functional requirements a re requested by customer - Which components are distributed in the systemReposit ory - How the sub-system is decomposed into modulesRepository - A generic applic ation architecture can be usedRepository - Non-functional requirements are reque sted by customerRepository answer: Which components are distributed in the systemHow the sub-system is deco mposed into modulesA generic application architecture can be used U11 - Q002 Which ones mention to the decomposition style? An object model where the system is designed into interacting objects Data-flow model where the system is designed into functional modules which transform inputs to outputs One sub-s ystem has responsibility for starts and stops other sub-systems Each sub-system can respond to externally generated events from other sub-systems - An object mo del where the system is designed into interacting objectsWhich components are di stributed in the systemHow the sub-system is decomposed into modulesA generic ap plication architecture can be used - Data-flow model where the system is designe d into functional modules which transform inputs to outputsWhich components are distributed in the systemHow the sub-system is decomposed into modulesA generic application architecture can be used - One sub-system has responsibility for sta rts and stops other sub-systemsWhich components are distributed in the systemHow the sub-system is decomposed into modulesA generic application architecture can be used - Each sub-system can respond to externally generated events from other sub-systemsWhich components are distributed in the systemHow the sub-system is decomposed into modulesA generic application architecture can be used answer: An object model where the system is designed into interacting objectsDat a-flow model where the system is designed into functional modules which transfor m inputs to outputs U11 - Q003 Which ones mention to the control style? One sub-system has responsib ility for starts and stops other sub-systems Each sub-system can respond to exte rnally generated events from other sub-systems An object model where the system is designed into interacting objects Data-flow model where the system is designe d into functional modules which transform inputs to outputs - One sub-system has responsibility for starts and stops other sub-systemsAn object model where the system is designed into interacting objectsData-flow model where the system is d esigned into functional modules which transform inputs to outputs - Each sub-sys tem can respond to externally generated events from other sub-systemsAn object m odel where the system is designed into interacting objectsData-flow model where the system is designed into functional modules which transform inputs to outputs - An object model where the system is designed into interacting objectsAn objec t model where the system is designed into interacting objectsData-flow model whe re the system is designed into functional modules which transform inputs to outp uts - Data-flow model where the system is designed into functional modules which transform inputs to outputsAn object model where the system is designed into in teracting objectsData-flow model where the system is designed into functional mo dules which transform inputs to outputs answer: One sub-system has responsibility for starts and stops other sub-systems Each sub-system can respond to externally generated events from other sub-system s U11 - Q004 An architectural style encompasses which of the following elements? C onstraints Set of components Semantic models syntactic models - ConstraintsOne s

ub-system has responsibility for starts and stops other sub-systemsEach sub-syst em can respond to externally generated events from other sub-systems - Set of co mponentsOne sub-system has responsibility for starts and stops other sub-systems Each sub-system can respond to externally generated events from other sub-system s - Semantic modelsOne sub-system has responsibility for starts and stops other sub-systemsEach sub-system can respond to externally generated events from other sub-systems - syntactic modelsOne sub-system has responsibility for starts and stops other sub-systemsEach sub-system can respond to externally generated event s from other sub-systems answer: ConstraintsSet of componentsSemantic models U11 - Q005 To determine the architectural style or combination of styles that be st fits the proposed system, requirements engineering is used to uncover Algorit hmic complexity Characteristics and constraints Control and data Design patterns - Algorithmic complexityConstraintsSet of componentsSemantic models - Character istics and constraintsConstraintsSet of componentsSemantic models - Control and dataConstraintsSet of componentsSemantic models - Design patternsConstraintsSet of componentsSemantic models answer: Characteristics and constraints U11 - Q006 What are the advantage of explicitly designing and documenting softwa re architecture? It improves the stakeholder communication It encourages a detai led analysis of the system It encourages a outline analysis of the system It hel ps with large-scale reuse - It improves the stakeholder communicationCharacteris tics and constraints - It encourages a detailed analysis of the systemCharacteri stics and constraints - It encourages a outline analysis of the systemCharacteri stics and constraints - It helps with large-scale reuseCharacteristics and const raints answer: It improves the stakeholder communicationIt encourages a detailed analys is of the systemIt helps with large-scale reuse U11 - Q007 Check 4 fundamental questions that should be addressed in architectur al design? Is there a generic application architecture that can be used? How wil l the system be distributed? What approach will be used to test the system? What architectural style or styles are appropriate? How should the system be structu red? - Is there a generic application architecture that can be used?It improves the stakeholder communicationIt encourages a detailed analysis of the systemIt h elps with large-scale reuse - How will the system be distributed?It improves the stakeholder communicationIt encourages a detailed analysis of the systemIt help s with large-scale reuse - What approach will be used to test the system?It impr oves the stakeholder communicationIt encourages a detailed analysis of the syste mIt helps with large-scale reuse - What architectural style or styles are approp riate?It improves the stakeholder communicationIt encourages a detailed analysis of the systemIt helps with large-scale reuse - How should the system be structu red?It improves the stakeholder communicationIt encourages a detailed analysis o f the systemIt helps with large-scale reuse answer: Is there a generic application architecture that can be used?How will th e system be distributed?What architectural style or styles are appropriate?How s hould the system be structured? U11 - Q008 Which diagram should present on Architecture design? Deployment diagr am Class diagram Database diagram Use case diagram - Deployment diagramIs there a generic application architecture that can be used?How will the system be distr ibuted?What architectural style or styles are appropriate?How should the system be structured? - Class diagramIs there a generic application architecture that c an be used?How will the system be distributed?What architectural style or styles are appropriate?How should the system be structured? - Database diagramIs there a generic application architecture that can be used?How will the system be dist ributed?What architectural style or styles are appropriate?How should the system be structured? - Use case diagramIs there a generic application architecture th at can be used?How will the system be distributed?What architectural style or st yles are appropriate?How should the system be structured? answer: Use case diagram U11 - Q009 Which of these statements about architectural design are true? An lat

e stage of the system design process Represents the link between specification a nd design processes Often carried out in parallel with some specification activi ties It involves identifying major system components and their communications An late stage of the system design processUse case diagram - Represents the link between specification and design processesUse case diagram - Often carried out in parallel with some specification activitiesUse case diagram - It involves ide ntifying major system components and their communicationsUse case diagram answer: Represents the link between specification and design processesOften carr ied out in parallel with some specification activitiesIt involves identifying ma jor system components and their communications U11 - Q010 What are the advantages of repository model Efficient way to share la rge amounts of data Sharing model is published as the repository schema Easy to distribute efficiently Sub-systems need not be concerned with how data is produc ed Centralised management e.g. backup, security, etc. - Efficient way to share l arge amounts of dataRepresents the link between specification and design process esOften carried out in parallel with some specification activitiesIt involves id entifying major system components and their communications - Sharing model is pu blished as the repository schemaRepresents the link between specification and de sign processesOften carried out in parallel with some specification activitiesIt involves identifying major system components and their communications - Easy to distribute efficientlyRepresents the link between specification and design proc essesOften carried out in parallel with some specification activitiesIt involves identifying major system components and their communications - Sub-systems need not be concerned with how data is produced Centralised management e.g. backup, security, etc.Represents the link between specification and design processesOfte n carried out in parallel with some specification activitiesIt involves identify ing major system components and their communications answer: Efficient way to share large amounts of dataSharing model is published a s the repository schemaSub-systems need not be concerned with how data is produc ed Centralised management e.g. backup, security, etc. U11 - Q011 Which of the following is NOT an advantage of pipeline model Supports transformation reuse Intuitive organization for stakeholder communication Easy to add new transformations Easy to support event-based interaction - Supports tr ansformation reuseEfficient way to share large amounts of dataSharing model is p ublished as the repository schemaSub-systems need not be concerned with how data is produced Centralised management e.g. backup, security, etc. - Intuitive orga nization for stakeholder communicationEfficient way to share large amounts of da taSharing model is published as the repository schemaSub-systems need not be con cerned with how data is produced Centralised management e.g. backup, security, e tc. - Easy to add new transformationsEfficient way to share large amounts of dat aSharing model is published as the repository schemaSub-systems need not be conc erned with how data is produced Centralised management e.g. backup, security, et c. - Easy to support event-based interactionEfficient way to share large amounts of dataSharing model is published as the repository schemaSub-systems need not be concerned with how data is produced Centralised management e.g. backup, secur ity, etc. answer: U11 - Q012 Select the correct statements about client-server models ? A set of s ervices is provided by clients and servers access and use these services A set o f services is provided by servers and clients access and use these services A se t of services is created by clients and servers access and use these services A set of services is provided by clients and servers access and use these servic es - A set of services is provided by servers and clients access and use these s ervices - A set of services is created by clients and servers access and use the se services answer: A set of services is provided by servers and clients access and use thes e services U11 - Q013 Which of these statements about architectural design is NOT true? A l ate stage of the system design process Represents the link between specification and design processes Often carried out in parallel with some specification acti

vities It involves identifying major system components and their communications - A late stage of the system design processA set of services is provided by serv ers and clients access and use these services - Represents the link between spec ification and design processesA set of services is provided by servers and clien ts access and use these services - Often carried out in parallel with some speci fication activitiesA set of services is provided by servers and clients access a nd use these services - It involves identifying major system components and thei r communicationsA set of services is provided by servers and clients access and use these services answer: A late stage of the system design process U11 - Q014 What is NOT the advantage of repository model Efficient way to share large amounts of data Sharing model is published as the repository schema Easy t o distribute efficiently Sub-systems need not be concerned with how data is prod uced Centralised management e.g.backup, security, etc. - Efficient way to share large amounts of dataA late stage of the system design process - Sharing model i s published as the repository schemaA late stage of the system design process Easy to distribute efficientlyA late stage of the system design process - Sub-sy stems need not be concerned with how data is produced Centralised management e.g .backup, security, etc.A late stage of the system design process answer: Easy to distribute efficiently U11 - Q015 Which is NOT a principle style used for modular decomposition? Object -oriented decomposition Attribute-oriented pipelining Function-oriented pipelini ng - Object-oriented decompositionEasy to distribute efficiently - Attribute-ori ented pipeliningEasy to distribute efficiently - Function-oriented pipeliningEas y to distribute efficiently answer: Attribute-oriented pipelining U11 - Q016 If performance is a critical requirement, the architecture should be designed to Localize critical operations and minimize communications; use large rather than fine-grain components Use a layered architecture with critical asset s in the inner layers. Localize safety-critical features in a small number of su b-systems. Include redundant components and mechanisms for fault tolerance. - Lo calize critical operations and minimize communications; use large rather than fi ne-grain componentsAttribute-oriented pipelining - Use a layered architecture wi th critical assets in the inner layers.Attribute-oriented pipelining - Localize safety-critical features in a small number of sub-systems.Attribute-oriented pip elining - Include redundant components and mechanisms for fault tolerance.Attrib ute-oriented pipelining answer: Localize critical operations and minimize communications; use large rath er than fine-grain components U11 - Q017 All of the following are advantages of object model EXCEPT Objects ar e loosely coupled so their implementation can be modified without affecting othe r objects The objects may reflect real-world entities Complex entities are easy to represent as objects Object-Oriented implementation languages are widely used . - Objects are loosely coupled so their implementation can be modified without affecting other objectsLocalize critical operations and minimize communications; use large rather than fine-grain components - The objects may reflect real-worl d entitiesLocalize critical operations and minimize communications; use large ra ther than fine-grain components - Complex entities are easy to represent as obje ctsLocalize critical operations and minimize communications; use large rather th an fine-grain components - Object-Oriented implementation languages are widely u sed.Localize critical operations and minimize communications; use large rather t han fine-grain components answer: Complex entities are easy to represent as objects U11 - Q018 All of the following are advantages of repository model EXCEPT Effici ent way to share large amounts of data Sharing model is published as the reposit ory schema Easy to distribute efficiently Sub-systems need not be concerned with how data is produced - Efficient way to share large amounts of dataComplex enti ties are easy to represent as objects - Sharing model is published as the reposi tory schemaComplex entities are easy to represent as objects - Easy to distribut e efficientlyComplex entities are easy to represent as objects - Sub-systems nee

d not be concerned with how data is producedComplex entities are easy to represe nt as objects answer: Easy to distribute efficiently U11 - Q019 What are the models in architecture design? Static, Dynamic, Interfac e, Relationship, Distribution Static, Dynamic, Interface, Relationship, Evolutio n Static, Dynamic, Validation, Relationship, Distribution - Static, Dynamic, Int erface, Relationship, DistributionEasy to distribute efficiently - Static, Dynam ic, Interface, Relationship, EvolutionEasy to distribute efficiently - Static, D ynamic, Validation, Relationship, DistributionEasy to distribute efficiently answer: Static, Dynamic, Interface, Relationship, Distribution U11 - Q020 What are the non-functional system requirements that the software sys tem architecture may depend on? (Choose one) Performance, Security, Safety, Avai lability, Maintainability Performance, Security, Safety, Availability, Easy impl ement Performance, Efficiency, Safety, Availability, Maintainability Performance , Security, Safety, Availability, Easy deploy - Performance, Security, Safety, A vailability, MaintainabilityStatic, Dynamic, Interface, Relationship, Distributi on - Performance, Security, Safety, Availability, Easy implementStatic, Dynamic, Interface, Relationship, Distribution - Performance, Efficiency, Safety, Availa bility, MaintainabilityStatic, Dynamic, Interface, Relationship, Distribution Performance, Security, Safety, Availability, Easy deployStatic, Dynamic, Interfa ce, Relationship, Distribution answer: Performance, Security, Safety, Availability, Maintainability U11 - Q021 Which of the following styles belong to Modular decomposition? (Choos e one) Object - oriented decomposition, Call - return model Function - Oriented pipelining, Manager model Object - oriented decomposition, Function - Oriented p ipelining - Object - oriented decomposition, Call - return modelPerformance, Sec urity, Safety, Availability, Maintainability - Function - Oriented pipelining, M anager modelPerformance, Security, Safety, Availability, Maintainability - Objec t - oriented decomposition, Function - Oriented pipeliningPerformance, Security, Safety, Availability, Maintainability answer: Object - oriented decomposition, Function - Oriented pipelining U11 - Q022 Which of the following styles belong to Control styles? (Choose one) Centralised control, Event-based control Object - oriented control, Function - O riented control Shared data control, Shared services control - Centralised contr ol, Event-based controlObject - oriented decomposition, Function - Oriented pipe lining - Object - oriented control, Function - Oriented controlObject - oriented decomposition, Function - Oriented pipelining - Shared data control, Shared ser vices controlObject - oriented decomposition, Function - Oriented pipelining answer: Centralised control, Event-based control U11 - Q023 What are the non-functional system requirements that the particular s tyle and structure chosen for an application may depend on? Performance Security Safety Availability User friendly - PerformanceCentralised control, Event-based control - SecurityCentralised control, Event-based control - SafetyCentralised control, Event-based control - AvailabilityCentralised control, Event-based cont rol - User friendlyCentralised control, Event-based control answer: PerformanceSecuritySafetyAvailability U11 - Q024 What should we do to improve the performance of the system ? Localize critical operations and minimize communications; use large rather than fine-gra in components Use a layered architecture with critical assets in the inner layer s. Localize safety-critical features in a small number of sub-systems. Include r edundant components and mechanisms for fault tolerance. - Localize critical oper ations and minimize communications; use large rather than fine-grain componentsP erformanceSecuritySafetyAvailability - Use a layered architecture with critical assets in the inner layers.PerformanceSecuritySafetyAvailability - Localize safe ty-critical features in a small number of sub-systems.PerformanceSecuritySafetyA vailability - Include redundant components and mechanisms for fault tolerance.Pe rformanceSecuritySafetyAvailability answer: Localize critical operations and minimize communications; use large rath er than fine-grain components U11 - Q025 Which of the following statements about object models are true? Objec

ts are loosely coupled so their implementation can be modified without affecting other objects The objects may reflect real-world entities Complex entities are easy to represent as objects Object-Oriented implementation languages are widely used. - Objects are loosely coupled so their implementation can be modified wit hout affecting other objectsLocalize critical operations and minimize communicat ions; use large rather than fine-grain components - The objects may reflect real -world entitiesLocalize critical operations and minimize communications; use lar ge rather than fine-grain components - Complex entities are easy to represent as objectsLocalize critical operations and minimize communications; use large rath er than fine-grain components - Object-Oriented implementation languages are wid ely used.Localize critical operations and minimize communications; use large rat her than fine-grain components answer: Objects are loosely coupled so their implementation can be modified with out affecting other objectsThe objects may reflect real-world entitiesObject-Ori ented implementation languages are widely used. U11 - Q026 Which of the following statements about Reference models are true? Re ference models are more abstract and describe a larger class of systems. They ar e a way of informing designers about the general structure of that class of syst em. Reference models are usually derived from a study of the application domain. They encapsulate the principal characteristics of these systems. - Reference mo dels are more abstract and describe a larger class of systems.Objects are loosel y coupled so their implementation can be modified without affecting other object sThe objects may reflect real-world entitiesObject-Oriented implementation langu ages are widely used. - They are a way of informing designers about the general structure of that class of system.Objects are loosely coupled so their implement ation can be modified without affecting other objectsThe objects may reflect rea l-world entitiesObject-Oriented implementation languages are widely used. - Refe rence models are usually derived from a study of the application domain.Objects are loosely coupled so their implementation can be modified without affecting ot her objectsThe objects may reflect real-world entitiesObject-Oriented implementa tion languages are widely used. - They encapsulate the principal characteristics of these systems.Objects are loosely coupled so their implementation can be mod ified without affecting other objectsThe objects may reflect real-world entities Object-Oriented implementation languages are widely used. answer: Reference models are more abstract and describe a larger class of system s.They are a way of informing designers about the general structure of that clas s of system.Reference models are usually derived from a study of the application domain. U11 - Q027 Organizational models of a system include Repository models Client-se rver models Abstract machine models Server - server models - Repository modelsRe ference models are more abstract and describe a larger class of systems.They are a way of informing designers about the general structure of that class of syste m.Reference models are usually derived from a study of the application domain. Client-server modelsReference models are more abstract and describe a larger cl ass of systems.They are a way of informing designers about the general structure of that class of system.Reference models are usually derived from a study of th e application domain. - Abstract machine modelsReference models are more abstrac t and describe a larger class of systems.They are a way of informing designers a bout the general structure of that class of system.Reference models are usually derived from a study of the application domain. - Server - server modelsReferenc e models are more abstract and describe a larger class of systems.They are a way of informing designers about the general structure of that class of system.Refe rence models are usually derived from a study of the application domain. answer: Repository modelsClient-server modelsAbstract machine models U11 - Q028 If performance is a critical requirement, the architecture should be designed to localize critical operations and minimize communications; use large rather than fine-grain components use a layered architecture with critical asset s in the inner layers include redundant components and mechanisms for fault tole rance All of the others - localize critical operations and minimize communicatio ns; use large rather than fine-grain componentsRepository modelsClient-server mo

delsAbstract machine models - use a layered architecture with critical assets in the inner layersRepository modelsClient-server modelsAbstract machine models include redundant components and mechanisms for fault toleranceRepository models Client-server modelsAbstract machine models - All of the othersRepository models Client-server modelsAbstract machine models answer: localize critical operations and minimize communications; use large rath er than fine-grain components U11 - Q029 What are the advantages of explicitly designing and documenting softw are architecture? It improves stakeholder communications It encourages a detaile d analysis of the system All of the others - It improves stakeholder communicati onslocalize critical operations and minimize communications; use large rather th an fine-grain components - It encourages a detailed analysis of the systemlocali ze critical operations and minimize communications; use large rather than fine-g rain components - All of the otherslocalize critical operations and minimize com munications; use large rather than fine-grain components answer: All of the others U11 - Q030 How is the system organized in a client-server model? A set of servic es is provided by servers and clients access and use these services A set of ser vices is provided by clients and servers access and use these services All of th e others None of the others - A set of services is provided by servers and clien ts access and use these servicesAll of the others - A set of services is provide d by clients and servers access and use these servicesAll of the others - All of the othersAll of the others - None of the othersAll of the others answer: A set of services is provided by servers and clients access and use thes e services U11 - Q031 What are advantages of pipeline model? Intuitive organization for sta keholder communication Easy to add new transformations Supports transformation r euse All of the others - Intuitive organization for stakeholder communicationA s et of services is provided by servers and clients access and use these services - Easy to add new transformationsA set of services is provided by servers and cl ients access and use these services - Supports transformation reuseA set of serv ices is provided by servers and clients access and use these services - All of t he othersA set of services is provided by servers and clients access and use the se services answer: All of the others U11 - Q036 What are two types of behavioral model? Data processing models Stage machine models Semantic data models - Data processing modelsAll of the others Stage machine modelsAll of the others - Semantic data modelsAll of the others answer: Data processing modelsStage machine models U11 - Q037 What are advantages of object model? Objects are loosely coupled so t heir implementation can be modified without affecting other objects The objects may reflect real-world entities Complex entities are easy to represent as object s OO implementation languages are widely used - Objects are loosely coupled so t heir implementation can be modified without affecting other objectsData processi ng modelsStage machine models - The objects may reflect real-world entitiesData processing modelsStage machine models - Complex entities are easy to represent a s objectsData processing modelsStage machine models - OO implementation language s are widely usedData processing modelsStage machine models answer: Objects are loosely coupled so their implementation can be modified with out affecting other objectsThe objects may reflect real-world entitiesOO impleme ntation languages are widely used U11 - Q038 Suggest an appropriate structural model for the following system: A c omputer-controlled video conferencing system that allows video, audio and comput er data to be visible to several participants at the same time A client-server m odel A repository model A centralized model with a shared repository All of the others None of the others - A client-server modelObjects are loosely coupled so their implementation can be modified without affecting other objectsThe objects may reflect real-world entitiesOO implementation languages are widely used - A r epository modelObjects are loosely coupled so their implementation can be modifi ed without affecting other objectsThe objects may reflect real-world entitiesOO

implementation languages are widely used - A centralized model with a shared rep ositoryObjects are loosely coupled so their implementation can be modified witho ut affecting other objectsThe objects may reflect real-world entitiesOO implemen tation languages are widely used - All of the othersObjects are loosely coupled so their implementation can be modified without affecting other objectsThe objec ts may reflect real-world entitiesOO implementation languages are widely used None of the othersObjects are loosely coupled so their implementation can be mod ified without affecting other objectsThe objects may reflect real-world entities OO implementation languages are widely used answer: A client-server model U11 - Q039 Which of the following statements about architecture design are true? The software architecture is the fundamental framework for structuring the syst em. Organizational models of a system include repository models, client-server m odels and abstract machine models. Properties of a system such as performance, s ecurity and availability are not influenced by the architecture used In centrali zed models of control, control decisions are made depending on the system state; in event models, external events control the system - The software architecture is the fundamental framework for structuring the system.A client-server model Organizational models of a system include repository models, client-server mode ls and abstract machine models.A client-server model - Properties of a system su ch as performance, security and availability are not influenced by the architect ure usedA client-server model - In centralized models of control, control decisi ons are made depending on the system state; in event models, external events con trol the systemA client-server model answer: The software architecture is the fundamental framework for structuring t he system.Organizational models of a system include repository models, client-se rver models and abstract machine models.In centralized models of control, contro l decisions are made depending on the system state; in event models, external ev ents control the system U11-Q045 Select incorrect statement about architecture design: It is the last st age of the system design process It represents the link between specification an d design processes. It often carried out in parallel with some specification act ivities. None of the others - It is the last stage of the system design processT he software architecture is the fundamental framework for structuring the system .Organizational models of a system include repository models, client-server mode ls and abstract machine models.In centralized models of control, control decisio ns are made depending on the system state; in event models, external events cont rol the system - It represents the link between specification and design process es.The software architecture is the fundamental framework for structuring the sy stem.Organizational models of a system include repository models, client-server models and abstract machine models.In centralized models of control, control dec isions are made depending on the system state; in event models, external events control the system - It often carried out in parallel with some specification ac tivities.The software architecture is the fundamental framework for structuring the system.Organizational models of a system include repository models, client-s erver models and abstract machine models.In centralized models of control, contr ol decisions are made depending on the system state; in event models, external e vents control the system - None of the othersThe software architecture is the fu ndamental framework for structuring the system.Organizational models of a system include repository models, client-server models and abstract machine models.In centralized models of control, control decisions are made depending on the syste m state; in event models, external events control the system answer: It is the last stage of the system design process U11-Q046 Which is NOT a disadvantage of client-server model? Difficult to distri bute efficiently. Data interchange may be inefficient Redundant management in ea ch server All of the others - Difficult to distribute efficiently.It is the last stage of the system design process - Data interchange may be inefficientIt is t he last stage of the system design process - Redundant management in each server It is the last stage of the system design process - All of the othersIt is the l ast stage of the system design process -

answer: Difficult to distribute efficiently. U14 - Q.043 __________is concerned with developing an object-oriented model of t he application domain. The objects in that model reflect the entities and operat ions associated with the problem to be solved. Object-oriented programming All o f the others Object-oriented design Object-oriented analysis - Object-oriented p rogrammingDifficult to distribute efficiently. - All of the othersDifficult to d istribute efficiently. - Object-oriented designDifficult to distribute efficient ly. - Object-oriented analysisDifficult to distribute efficiently. answer: Object-oriented analysis U14 - Q.044 In the UML, a (an) ______ is represented as a named rectangle with t wo sections. The object attributes are listed in the top section. The operations that are associated with the object are set out in the bottom section. Attribut e Operation Object Object class - AttributeObject-oriented analysis - OperationO bject-oriented analysis - ObjectObject-oriented analysis - Object classObject-or iented analysis answer: Object class U14 - Q.047 Which statement is correct? Objects are templates for object classes Object classes represent instances of real-world entities Object classes are ge nerated when the software is executed Object classes are templates for objects Objects are templates for object classesObject class - Object classes represent instances of real-world entitiesObject class - Object classes are generated whe n the software is executedObject class - Object classes are templates for object sObject class answer: Object classes are templates for objects U14 - Q.048 Which diagram performs all system functionalities that user can oper ate on? Sequence diagram Class diagram State diagram Use case diagram - Sequence diagramObject classes are templates for objects - Class diagramObject classes a re templates for objects - State diagramObject classes are templates for objects - Use case diagramObject classes are templates for objects answer: Use case diagram U14 - Q.049 In the design of the FU CMS system, which one is not object class? L ist of students passed I2SE Student Nguyen Van An Book Software Engineering FU s tudent with ID number 40987 - List of students passed I2SEUse case diagram - Stu dent Nguyen Van AnUse case diagram - Book Software EngineeringUse case diagram FU student with ID number 40987Use case diagram answer: FU student with ID number 40987 U14 - Q.050 Which diagram is used to present "starting learning a new subject" a s I2SE? Use case diagram Data flow diagram State diagram Sequence diagram - Use case diagramFU student with ID number 40987 - Data flow diagramFU student with I D number 40987 - State diagramFU student with ID number 40987 - Sequence diagram FU student with ID number 40987 answer: Sequence diagram U14 - Q.051 In the sequence diagram of registering new account, object Register calls to object AccountMng by a method register(name, pass). So where is this me thod performed at? Object Register in the State diagram Object Register in the C lass diagram Object AccountMng in the State diagram Object AccountMng in the Cla ss diagram - Object Register in the State diagramSequence diagram - Object Regis ter in the Class diagramSequence diagram - Object AccountMng in the State diagra mSequence diagram - Object AccountMng in the Class diagramSequence diagram answer: Object AccountMng in the Class diagram U14 - Q001 Which relationships are used in the object-oriented design process? I nheritance Aggregation Association Interaction - InheritanceObject AccountMng in the Class diagram - AggregationObject AccountMng in the Class diagram - Associa tionObject AccountMng in the Class diagram - InteractionObject AccountMng in the Class diagram answer: InheritanceAggregationAssociation U14 - Q002 Which ones are used in the dynamic models? Object lifelines Active or passive objects Interaction relationships Object classes - Object lifelinesInhe ritanceAggregationAssociation - Active or passive objectsInheritanceAggregationA ssociation - Interaction relationshipsInheritanceAggregationAssociation - Object

classesInheritanceAggregationAssociation answer: Object lifelinesActive or passive objectsInteraction relationships U14 - Q003 How to identify objects within the system? Depend on the skill, exper ience and domain knowledge of system designers Base on iterative scenarios Base on tangible things in the application domain Base on the static and dynamic mode ls - Depend on the skill, experience and domain knowledge of system designersObj ect lifelinesActive or passive objectsInteraction relationships - Base on iterat ive scenariosObject lifelinesActive or passive objectsInteraction relationships - Base on tangible things in the application domainObject lifelinesActive or pas sive objectsInteraction relationships - Base on the static and dynamic modelsObj ect lifelinesActive or passive objectsInteraction relationships answer: Depend on the skill, experience and domain knowledge of system designers Base on iterative scenariosBase on tangible things in the application domain U14 - Q004 Which of the following is not a characteristic common to all design m ethods? configuration management Functional component Notation quality assessmen t Guidelines refinement heuristics - configuration managementDepend on the skill , experience and domain knowledge of system designersBase on iterative scenarios Base on tangible things in the application domain - Functional componentDepend o n the skill, experience and domain knowledge of system designersBase on iterativ e scenariosBase on tangible things in the application domain - Notation quality assessmentDepend on the skill, experience and domain knowledge of system designe rsBase on iterative scenariosBase on tangible things in the application domain Guidelines refinement heuristicsDepend on the skill, experience and domain know ledge of system designersBase on iterative scenariosBase on tangible things in t he application domain answer: configuration management U14 - Q005 What types of abstraction are used in software design? Control Data E nvironmental Procedural - Controlconfiguration management - Dataconfiguration ma nagement - Environmentalconfiguration management - Proceduralconfiguration manag ement answer: ControlDataProcedural U14 - Q006 UML (unified modeling language) analysis modeling focuses on the Beha vioral model and environment model Behavioral model and implementation model Use r model and environmental model User model and structural model - Behavioral mod el and environment modelControlDataProcedural - Behavioral model and implementat ion modelControlDataProcedural - User model and environmental modelControlDataPr ocedural - User model and structural modelControlDataProcedural answer: User model and structural model U14 - Q007 Which is not concern with patterns and design patterns? A way of reus ing abstract knowledge about a problem and its impacts A description of the prob lem and the essence of its solution They are high-level abstractions that docume nt successful design solutions They often rely on object characteristics such as inheritance and polymorphism - A way of reusing abstract knowledge about a prob lem and its impactsUser model and structural model - A description of the proble m and the essence of its solutionUser model and structural model - They are high -level abstractions that document successful design solutionsUser model and stru ctural model - They often rely on object characteristics such as inheritance and polymorphismUser model and structural model answer: A way of reusing abstract knowledge about a problem and its impacts U14 - Q008 Which is NOT an object-oriented strategy? Object-oriented analysis Ob ject-oriented design Object-oriented programming Object-oriented deployment - Ob ject-oriented analysisA way of reusing abstract knowledge about a problem and it s impacts - Object-oriented designA way of reusing abstract knowledge about a pr oblem and its impacts - Object-oriented programmingA way of reusing abstract kno wledge about a problem and its impacts - Object-oriented deploymentA way of reus ing abstract knowledge about a problem and its impacts answer: Object-oriented deployment U14 - Q009 What do you understand by the system context and model of use? The sy stem context is a static model of the other systems in the environment of the sy stem being designed. The model of use is a static model that describes how the s

ystem being designed interacts with its environment. The system context is a dyn amic model of the other systems in the environment of the system being designed. The model of use is a dynamic model that describes how the system being designe d interacts with its environment. - The system context is a static model of the other systems in the environment of the system being designed.Object-oriented de ployment - The model of use is a static model that describes how the system bein g designed interacts with its environment.Object-oriented deployment - The syste m context is a dynamic model of the other systems in the environment of the syst em being designed.Object-oriented deployment - The model of use is a dynamic mod el that describes how the system being designed interacts with its environment.O bject-oriented deployment answer: The system context is a static model of the other systems in the environ ment of the system being designed.The model of use is a dynamic model that descr ibes how the system being designed interacts with its environment. U14 - Q010 Which of the following is not an area of concern in the design model ? Architecture Data Interfaces Project scope - ArchitectureThe system context is a static model of the other systems in the environment of the system being desi gned.The model of use is a dynamic model that describes how the system being des igned interacts with its environment. - DataThe system context is a static model of the other systems in the environment of the system being designed.The model of use is a dynamic model that describes how the system being designed interacts with its environment. - InterfacesThe system context is a static model of the o ther systems in the environment of the system being designed.The model of use is a dynamic model that describes how the system being designed interacts with its environment. - Project scopeThe system context is a static model of the other s ystems in the environment of the system being designed.The model of use is a dyn amic model that describes how the system being designed interacts with its envir onment. answer: Project scope U14 - Q011 Which of the following is NOT a stage in an object-oriented developme nt process? Object-oriented analysis Object-oriented design Object-oriented prog ramming Object-oriented validation - Object-oriented analysisProject scope - Obj ect-oriented designProject scope - Object-oriented programmingProject scope - Ob ject-oriented validationProject scope answer: Object-oriented validation U14 - Q012 Which is Not an advantage of inheritance It is an abstraction mechani sm which may be used to classify entities. It is a reuse mechanism at both the d esign and the programming level. The inheritance graph is a source of organizati onal knowledge about domains and systems. Object classes are self-contained. The y can be understood without reference to their super-classes - It is an abstract ion mechanism which may be used to classify entities.Object-oriented validation - It is a reuse mechanism at both the design and the programming level.Object-or iented validation - The inheritance graph is a source of organizational knowledg e about domains and systems.Object-oriented validation - Object classes are self -contained. They can be understood without reference to their super-classesObjec t-oriented validation answer: Object classes are self-contained. They can be understood without refere nce to their super-classes U14 - Q013 Which is NOT an object-oriented strategy? Object-oriented analysis Ob ject-oriented design Object-oriented programming Object-oriented deployment - Ob ject-oriented analysisObject classes are self-contained. They can be understood without reference to their super-classes - Object-oriented designObject classes are self-contained. They can be understood without reference to their super-clas ses - Object-oriented programmingObject classes are self-contained. They can be understood without reference to their super-classes - Object-oriented deployment Object classes are self-contained. They can be understood without reference to t heir super-classes answer: Object-oriented deployment U14 - Q014 What is NOT an advantage of object model Objects are loosely coupled so their implementation can be modified without affecting other objects The obje

cts may reflect real-world entities Complex entities are easy to represent as ob jects Object oriented implementation languages are widely used. - Objects are lo osely coupled so their implementation can be modified without affecting other ob jectsObject-oriented deployment - The objects may reflect real-world entitiesObj ect-oriented deployment - Complex entities are easy to represent as objectsObjec t-oriented deployment - Object oriented implementation languages are widely used .Object-oriented deployment answer: Complex entities are easy to represent as objects U14 - Q016 All of the following are advantages of inheritance EXCEPT It is an ab straction mechanism which may be used to classify entities. It is a reuse mechan ism at both the design and the programming level. The inheritance graph is a sou rce of organizational knowledge about domains and systems. Object classes are se lf-contained. They can be understood without reference to their super-classes It is an abstraction mechanism which may be used to classify entities.Complex en tities are easy to represent as objects - It is a reuse mechanism at both the de sign and the programming level.Complex entities are easy to represent as objects - The inheritance graph is a source of organizational knowledge about domains a nd systems.Complex entities are easy to represent as objects - Object classes ar e self-contained. They can be understood without reference to their super-classe sComplex entities are easy to represent as objects answer: Object classes are self-contained. They can be understood without refere nce to their super-classes U14 - Q017 Which of the following is NOT an approach that may be used to identif y object classes Grammatical analysis identifying nouns and verbs Identify tangi ble things in the application domain Use an approach based on the behavior of th e system. Use Event-based analysis Use scenario-based analysis - Grammatical ana lysis identifying nouns and verbsObject classes are self-contained. They can be understood without reference to their super-classes - Identify tangible things i n the application domainObject classes are self-contained. They can be understoo d without reference to their super-classes - Use an approach based on the behavi or of the system.Object classes are self-contained. They can be understood witho ut reference to their super-classes - Use Event-based analysisObject classes are self-contained. They can be understood without reference to their super-classes - Use scenario-based analysisObject classes are self-contained. They can be und erstood without reference to their super-classes answer: Use Event-based analysis U14 - Q018 What is a system context? The system context is a static model of the other systems in the environment of the system being designed. The system conte xt is a dynamic model that describes how the system being designed interacts wit h its environment. - The system context is a static model of the other systems i n the environment of the system being designed.Use Event-based analysis - The sy stem context is a dynamic model that describes how the system being designed int eracts with its environment.Use Event-based analysis answer: The system context is a static model of the other systems in the environ ment of the system being designed. U14 - Q019 Another name for [...has a...] relationship is ________ Composition G eneralization Realization Association - CompositionThe system context is a stati c model of the other systems in the environment of the system being designed. GeneralizationThe system context is a static model of the other systems in the e nvironment of the system being designed. - RealizationThe system context is a st atic model of the other systems in the environment of the system being designed. - AssociationThe system context is a static model of the other systems in the e nvironment of the system being designed. answer: Composition U14 - Q020 Which of the following models is the dynamic model? Context model Use case model Sub-system model Architectural model - Context modelComposition - Us e case modelComposition - Sub-system modelComposition - Architectural modelCompo sition answer: Use case model U14 - Q021 The Dog class is inherited from Animal class; select the BEST answer

in this case Dog class has all of the attributes of Animal class Dog class has a ll of the operations of Animal class Dog class does not have any attributes and operation of Animal class Dog class has all of the attributes and operations of Animal class - Dog class has all of the attributes of Animal classUse case model - Dog class has all of the operations of Animal classUse case model - Dog class does not have any attributes and operation of Animal classUse case model - Dog class has all of the attributes and operations of Animal classUse case model answer: Dog class has all of the attributes and operations of Animal class U14 - Q022 What is Work Breakdown Structure? Work Breakdown Structure is the dec omposition of the project into smaller and more manageable parts. Work Breakdown Structure is the method to split the big work into small work Work Breakdown St ructure is the small work that has structure Work Breakdown Structure is the way to coding big functional - Work Breakdown Structure is the decomposition of the project into smaller and more manageable parts.Dog class has all of the attribu tes and operations of Animal class - Work Breakdown Structure is the method to s plit the big work into small workDog class has all of the attributes and operati ons of Animal class - Work Breakdown Structure is the small work that has struct ureDog class has all of the attributes and operations of Animal class - Work Bre akdown Structure is the way to coding big functionalDog class has all of the att ributes and operations of Animal class answer: Work Breakdown Structure is the decomposition of the project into smalle r and more manageable parts. U14 - Q023 Using object oriented approach is hard to facilitate design evolution True False - TrueWork Breakdown Structure is the decomposition of the project i nto smaller and more manageable parts. - FalseWork Breakdown Structure is the de composition of the project into smaller and more manageable parts. answer: False U14 - Q024 Which are the static models among following models? Context model Use case model State machine model Architectural model - Context modelFalse - Use c ase modelFalse - State machine modelFalse - Architectural modelFalse answer: Context modelArchitectural model U14 - Q025 List the good ways to identify object classes? Grammatical analysis i dentifying nouns and verbs Identify tangible things in the application domain Us e an approach based on the behavior of the system. Use Event-based analysis Use scenario-based analysis - Grammatical analysis identifying nouns and verbsContex t modelArchitectural model - Identify tangible things in the application domainC ontext modelArchitectural model - Use an approach based on the behavior of the s ystem.Context modelArchitectural model - Use Event-based analysisContext modelAr chitectural model - Use scenario-based analysisContext modelArchitectural model answer: Grammatical analysis identifying nouns and verbsIdentify tangible things in the application domainUse an approach based on the behavior of the system.Us e scenario-based analysis U14 - Q026 Which of the following statements is true? The system context is a st atic model of the other systems in the environment of the system being designed. The system context is a dynamic model that describes how the system being desig ned interacts with its environment. - The system context is a static model of th e other systems in the environment of the system being designed.Grammatical anal ysis identifying nouns and verbsIdentify tangible things in the application doma inUse an approach based on the behavior of the system.Use scenario-based analysi s - The system context is a dynamic model that describes how the system being de signed interacts with its environment.Grammatical analysis identifying nouns and verbsIdentify tangible things in the application domainUse an approach based on the behavior of the system.Use scenario-based analysis answer: The system context is a static model of the other systems in the environ ment of the system being designed. U14 - Q027 Which is the dynamic model among following models? Context model Use case model Sub-system model Architectural model - Context modelThe system contex t is a static model of the other systems in the environment of the system being designed. - Use case modelThe system context is a static model of the other syst

ems in the environment of the system being designed. - Sub-system modelThe syste m context is a static model of the other systems in the environment of the syste m being designed. - Architectural modelThe system context is a static model of t he other systems in the environment of the system being designed. answer: Use case model U14 - Q028 ____ is concerned with developing an object-oriented system model to implement requirements Object-oriented Paradigm Object-oriented Analysis Objectoriented Design None of the others - Object-oriented ParadigmUse case model - Ob ject-oriented AnalysisUse case model - Object-oriented DesignUse case model - No ne of the othersUse case model answer: Object-oriented Design U14 - Q029 Which of the followings belong to Server type of concurrent object im plementation? The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests The state o f the object is changed by internal operations within the object itself. The pro cess executing these operations runs continuously. All of the others - The objec t is a parallel process with methods corresponding to the object operations. Met hods execute in response to external requestsObject-oriented Design - The state of the object is changed by internal operations within the object itself. The pr ocess executing these operations runs continuously.Object-oriented Design - All of the othersObject-oriented Design answer: The object is a parallel process with methods corresponding to the objec t operations. Methods execute in response to external requests U14 - Q030 All of the following are stages in an object-oriented development pro cess EXCEPT? Object-oriented analysis Object-oriented design Object-oriented pro gramming Object-oriented evolution - Object-oriented analysisThe object is a par allel process with methods corresponding to the object operations. Methods execu te in response to external requests - Object-oriented designThe object is a para llel process with methods corresponding to the object operations. Methods execut e in response to external requests - Object-oriented programmingThe object is a parallel process with methods corresponding to the object operations. Methods ex ecute in response to external requests - Object-oriented evolutionThe object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests answer: Object-oriented evolution U14 - Q031 What are the distinctions between an object and an object class? An o bject is created at run-time by instantiating an object class. The object includ es state variables and operations on that state as defined in the object class d efinition. All of the others - An object is created at run-time by instantiating an object class.Object-oriented evolution - The object includes state variables and operations on that state as defined in the object class definition.Object-o riented evolution - All of the othersObject-oriented evolution answer: All of the others U14 - Q036 Select correct statements about Object-oriented design Object-oriente d design is an approach to software design where the fundamental components in t he design represent objects with their own private state as well as represent op erations rather than functions An object should have constructor and inspection operations allowing its state to be inspected and modified The object provides s ervices (operations using state information) to other objects Objects are not cr eated at run-time using a specification in an object class definition. - Objectoriented design is an approach to software design where the fundamental componen ts in the design represent objects with their own private state as well as repre sent operations rather than functionsAll of the others - An object should have c onstructor and inspection operations allowing its state to be inspected and modi fiedAll of the others - The object provides services (operations using state inf ormation) to other objectsAll of the others - Objects are not created at run-tim e using a specification in an object class definition.All of the others answer: Object-oriented design is an approach to software design where the funda mental components in the design represent objects with their own private state a s well as represent operations rather than functionsAn object should have constr

uctor and inspection operations allowing its state to be inspected and modifiedT he object provides services (operations using state information) to other object s U14 - Q037 The process of object-oriented design includes activities to Validate the system implementation Identify objects in the system Describe the design us ing different object models Document the object interfaces - Validate the system implementationObject-oriented design is an approach to software design where th e fundamental components in the design represent objects with their own private state as well as represent operations rather than functionsAn object should have constructor and inspection operations allowing its state to be inspected and mo difiedThe object provides services (operations using state information) to other objects - Identify objects in the systemObject-oriented design is an approach t o software design where the fundamental components in the design represent objec ts with their own private state as well as represent operations rather than func tionsAn object should have constructor and inspection operations allowing its st ate to be inspected and modifiedThe object provides services (operations using s tate information) to other objects - Describe the design using different object modelsObject-oriented design is an approach to software design where the fundame ntal components in the design represent objects with their own private state as well as represent operations rather than functionsAn object should have construc tor and inspection operations allowing its state to be inspected and modifiedThe object provides services (operations using state information) to other objects - Document the object interfacesObject-oriented design is an approach to softwar e design where the fundamental components in the design represent objects with t heir own private state as well as represent operations rather than functionsAn o bject should have constructor and inspection operations allowing its state to be inspected and modifiedThe object provides services (operations using state info rmation) to other objects answer: Identify objects in the systemDescribe the design using different object modelsDocument the object interfaces U14 - Q038 Select correct statements about objects and object classes In the UML , an object class is represented as a named rectangle with two sections. The obj ect attributes are listed in the bottom section An object is an entity that has a state and a defined set of operations that operate on that state. The state of an object is represented as a set of object attributes The operations associate d with the object provide services to other objects (clients) that request these services when some computation is required. - In the UML, an object class is re presented as a named rectangle with two sections. The object attributes are list ed in the bottom sectionIdentify objects in the systemDescribe the design using different object modelsDocument the object interfaces - An object is an entity t hat has a state and a defined set of operations that operate on that state.Ident ify objects in the systemDescribe the design using different object modelsDocume nt the object interfaces - The state of an object is represented as a set of obj ect attributesIdentify objects in the systemDescribe the design using different object modelsDocument the object interfaces - The operations associated with the object provide services to other objects (clients) that request these services when some computation is required.Identify objects in the systemDescribe the des ign using different object modelsDocument the object interfaces answer: An object is an entity that has a state and a defined set of operations that operate on that state.The state of an object is represented as a set of obj ect attributesThe operations associated with the object provide services to othe r objects (clients) that request these services when some computation is require d. U14 - Q039 Select correct statements about object oriented design evolution An i mportant advantage of an object-oriented approach to design is that it simplifie s the problem of making changes to the design. Changing the internal details of an object is likely to affect other system objects. Objects are loosely coupled it is usually straightforward to introduce new objects without significant effec ts on the rest of the system. The object state representation does not influence the design. - An important advantage of an object-oriented approach to design i

s that it simplifies the problem of making changes to the design.An object is an entity that has a state and a defined set of operations that operate on that st ate.The state of an object is represented as a set of object attributesThe opera tions associated with the object provide services to other objects (clients) tha t request these services when some computation is required. - Changing the inter nal details of an object is likely to affect other system objects.An object is a n entity that has a state and a defined set of operations that operate on that s tate.The state of an object is represented as a set of object attributesThe oper ations associated with the object provide services to other objects (clients) th at request these services when some computation is required. - Objects are loose ly coupled it is usually straightforward to introduce new objects without signif icant effects on the rest of the system.An object is an entity that has a state and a defined set of operations that operate on that state.The state of an objec t is represented as a set of object attributesThe operations associated with the object provide services to other objects (clients) that request these services when some computation is required. - The object state representation does not in fluence the design.An object is an entity that has a state and a defined set of operations that operate on that state.The state of an object is represented as a set of object attributesThe operations associated with the object provide servi ces to other objects (clients) that request these services when some computation is required. answer: An important advantage of an object-oriented approach to design is that it simplifies the problem of making changes to the design.Objects are loosely co upled it is usually straightforward to introduce new objects without significant effects on the rest of the system.The object state representation does not infl uence the design. U14-Q045 Select incorrect statement about object oriented design (OOD): Objects communicate by using their data directly. Objects are independent and encapsulat e state and representation information. Objects are abstractions of real-world o r system entities and manage themselves. None of the others - Objects communicat e by using their data directly.An important advantage of an object-oriented appr oach to design is that it simplifies the problem of making changes to the design .Objects are loosely coupled it is usually straightforward to introduce new obje cts without significant effects on the rest of the system.The object state repre sentation does not influence the design. - Objects are independent and encapsula te state and representation information.An important advantage of an object-orie nted approach to design is that it simplifies the problem of making changes to t he design.Objects are loosely coupled it is usually straightforward to introduce new objects without significant effects on the rest of the system.The object st ate representation does not influence the design. - Objects are abstractions of real-world or system entities and manage themselves.An important advantage of an object-oriented approach to design is that it simplifies the problem of making changes to the design.Objects are loosely coupled it is usually straightforward to introduce new objects without significant effects on the rest of the system.T he object state representation does not influence the design. - None of the othe rsAn important advantage of an object-oriented approach to design is that it sim plifies the problem of making changes to the design.Objects are loosely coupled it is usually straightforward to introduce new objects without significant effec ts on the rest of the system.The object state representation does not influence the design. answer: Objects communicate by using their data directly. U14-Q046 A/an ______ is an entity that has a state and a defined set of operatio ns which operate on that state. Object Class Entity Parameter - ObjectObjects co mmunicate by using their data directly. - ClassObjects communicate by using thei r data directly. - EntityObjects communicate by using their data directly. - Par ameterObjects communicate by using their data directly. answer: Object U17 - Q.043 The objective of _________ is to deliver a working system to end-use rs. The objective of _________ is to validate or derive the system requirements. incremental development; throw-away prototyping throw-away prototyping; increme

ntal development All of the others - incremental development; throw-away prototy pingObject - throw-away prototyping; incremental developmentObject - All of the othersObject answer: incremental development; throw-away prototyping U17 - Q.044 What are characteristics of RAD processes? System user interfaces ar e usually developed using an interactive development system. The system is devel oped in a series of increments. End users evaluate each increment and make propo sals for later increments. The processes of specification, design and implementa tion are separate The specification document must be clear and detailed - System user interfaces are usually developed using an interactive development system.i ncremental development; throw-away prototyping - The system is developed in a se ries of increments. End users evaluate each increment and make proposals for lat er increments.incremental development; throw-away prototyping - The processes of specification, design and implementation are separateincremental development; t hrow-away prototyping - The specification document must be clear and detailedinc remental development; throw-away prototyping answer: System user interfaces are usually developed using an interactive develo pment system.The system is developed in a series of increments. End users evalua te each increment and make proposals for later increments. U17 - Q.047 Which statement is correct for the Agile method? Deliver working sof tware quickly but not to meet changing requirements Not follow any process model s Easy to keep the interest of customers to involve in the process Focus on the code rather than the design - Deliver working software quickly but not to meet c hanging requirementsSystem user interfaces are usually developed using an intera ctive development system.The system is developed in a series of increments. End users evaluate each increment and make proposals for later increments. - Not fol low any process modelsSystem user interfaces are usually developed using an inte ractive development system.The system is developed in a series of increments. En d users evaluate each increment and make proposals for later increments. - Easy to keep the interest of customers to involve in the processSystem user interface s are usually developed using an interactive development system.The system is de veloped in a series of increments. End users evaluate each increment and make pr oposals for later increments. - Focus on the code rather than the designSystem u ser interfaces are usually developed using an interactive development system.The system is developed in a series of increments. End users evaluate each incremen t and make proposals for later increments. answer: Focus on the code rather than the design U17 - Q.048 Which statement is correct for the Extreme Programming method? Focus on the code rather than the design Not apply any process models Release final r elease and meet changing requirements quickly An automated unit test framework i s used to write tests for a new piece of functionality before that functionality itself is implemented - Focus on the code rather than the designFocus on the co de rather than the design - Not apply any process modelsFocus on the code rather than the design - Release final release and meet changing requirements quicklyF ocus on the code rather than the design - An automated unit test framework is us ed to write tests for a new piece of functionality before that functionality its elf is implementedFocus on the code rather than the design answer: An automated unit test framework is used to write tests for a new piece of functionality before that functionality itself is implemented U17 - Q.049 Which situation is considered as pair programming? Each programmer w ill work independence and when finishing, each of two programmers switch source code each others for reviewing One senior programmer will manage one junior prog rammer Development tasks will be planned by pairs and their production is evalua ted by pairs too Two programmers sit and code together - Each programmer will wo rk independence and when finishing, each of two programmers switch source code e ach others for reviewingAn automated unit test framework is used to write tests for a new piece of functionality before that functionality itself is implemented - One senior programmer will manage one junior programmerAn automated unit test framework is used to write tests for a new piece of functionality before that f unctionality itself is implemented - Development tasks will be planned by pairs

and their production is evaluated by pairs tooAn automated unit test framework i s used to write tests for a new piece of functionality before that functionality itself is implemented - Two programmers sit and code togetherAn automated unit test framework is used to write tests for a new piece of functionality before th at functionality itself is implemented answer: Two programmers sit and code together U17 - Q.050 As one of the quality standards of the software company, each activi ty on the software must be validated, so which practice is best suitable to appl y for? Refactoring Pair programming Continuous integration Test first developmen t - RefactoringTwo programmers sit and code together - Pair programmingTwo progr ammers sit and code together - Continuous integrationTwo programmers sit and cod e together - Test first developmentTwo programmers sit and code together answer: Test first development U17 - Q.051 In case, the customer shows five system requirements. Two of them ha ve completed information but they have not included in the first release. So whi ch strategy is used to deliver the system quickly? Suggesting the customer devel oping 2 well-understood requirements first while analyzing other requirements mo re Customer must involve to the project as one Team member Designing poor-unders tood requirements and sending design to the customer for confirmation Developing the prototypes for poor-understood requirements - Suggesting the customer devel oping 2 well-understood requirements first while analyzing other requirements mo reTest first development - Customer must involve to the project as one Team memb erTest first development - Designing poor-understood requirements and sending de sign to the customer for confirmationTest first development - Developing the pro totypes for poor-understood requirementsTest first development answer: Developing the prototypes for poor-understood requirements U17 - Q001 Which are the benefits of incremental development ? Rapid to delivery the highest priority functionalities to the customer Meet requirements quickly because users have to be involved in the development The processes of specificat ion, design and implementation are concurrent The system are often well structur ed. - Rapid to delivery the highest priority functionalities to the customerDeve loping the prototypes for poor-understood requirements - Meet requirements quick ly because users have to be involved in the developmentDeveloping the prototypes for poor-understood requirements - The processes of specification, design and i mplementation are concurrentDeveloping the prototypes for poor-understood requir ements - The system are often well structured.Developing the prototypes for poor -understood requirements answer: Rapid to delivery the highest priority functionalities to the customerMe et requirements quickly because users have to be involved in the developmentThe processes of specification, design and implementation are concurrent U17 - Q002 Which differences between Agile method and Extreme programming method ? Size of business systems Order of doing testing and implementing Base on the i terative development Customers involve full-time with the team - Size of busines s systemsRapid to delivery the highest priority functionalities to the customerM eet requirements quickly because users have to be involved in the developmentThe processes of specification, design and implementation are concurrent - Order of doing testing and implementingRapid to delivery the highest priority functional ities to the customerMeet requirements quickly because users have to be involved in the developmentThe processes of specification, design and implementation are concurrent - Base on the iterative developmentRapid to delivery the highest pri ority functionalities to the customerMeet requirements quickly because users hav e to be involved in the developmentThe processes of specification, design and im plementation are concurrent - Customers involve full-time with the teamRapid to delivery the highest priority functionalities to the customerMeet requirements q uickly because users have to be involved in the developmentThe processes of spec ification, design and implementation are concurrent answer: Size of business systemsOrder of doing testing and implementing U17 - Q003 Which differences between the incremental development and prototyping development? Problems when multiple development teams work on the large system Level of understanding requirements Output of the development Rapid to have the

output - Problems when multiple development teams work on the large systemSize o f business systemsOrder of doing testing and implementing - Level of understandi ng requirementsSize of business systemsOrder of doing testing and implementing Output of the developmentSize of business systemsOrder of doing testing and imp lementing - Rapid to have the outputSize of business systemsOrder of doing testi ng and implementing answer: Problems when multiple development teams work on the large systemLevel o f understanding requirementsOutput of the development U17 - Q004 Which of the following traits need to exist among the members of an a gile software team? Competence Decision-making ability Mutual trust and respect None of the above - CompetenceProblems when multiple development teams work on t he large systemLevel of understanding requirementsOutput of the development - De cision-making abilityProblems when multiple development teams work on the large systemLevel of understanding requirementsOutput of the development - Mutual trus t and respectProblems when multiple development teams work on the large systemLe vel of understanding requirementsOutput of the development - None of the abovePr oblems when multiple development teams work on the large systemLevel of understa nding requirementsOutput of the development answer: CompetenceDecision-making abilityMutual trust and respect U17 - Q005 Which of the following is not necessary to apply agility to a softwar e process? Eliminate the use of project planning and testing Only essential work products are produced Process allows team to streamline tasks Uses incremental product delivery strategy - Eliminate the use of project planning and testingCom petenceDecision-making abilityMutual trust and respect - Only essential work pro ducts are producedCompetenceDecision-making abilityMutual trust and respect - Pr ocess allows team to streamline tasksCompetenceDecision-making abilityMutual tru st and respect - Uses incremental product delivery strategyCompetenceDecision-ma king abilityMutual trust and respect answer: Only essential work products are produced U17 - Q006 Why water-fall model cannot be applied in Rapid development? This is not a modern model It requires deployment phase It requires requirement changing during the development phase Within the rapid development model, requirement ca n be change frequently - This is not a modern modelOnly essential work products are produced - It requires deployment phaseOnly essential work products are prod uced - It requires requirement changing during the development phaseOnly essenti al work products are produced - Within the rapid development model, requirement can be change frequentlyOnly essential work products are produced answer: Within the rapid development model, requirement can be change frequently U17 - Q007 What does the rapid application development concerns with? A waterfal l approach to software development leads to faster delivery of software An itera tive approach to software development leads to faster delivery of software A sof tware development model that ensure that the software would have higher quality It requires stable requirements - A waterfall approach to software development l eads to faster delivery of softwareWithin the rapid development model, requireme nt can be change frequently - An iterative approach to software development lead s to faster delivery of softwareWithin the rapid development model, requirement can be change frequently - A software development model that ensure that the sof tware would have higher qualityWithin the rapid development model, requirement c an be change frequently - It requires stable requirementsWithin the rapid develo pment model, requirement can be change frequently answer: It requires stable requirements U17 - Q008 Which is NOT related to a characteristic of rapid application develop ment processes? It is always possible to arrive at a stable, consistent set of s ystem requirements The processes of specification, design and implementation are concurrent System user interfaces are usually developed using an interactive de velopment system The system is developed in a series of increments. End users ev aluate each increment and make proposals for later increment - It is always poss ible to arrive at a stable, consistent set of system requirementsIt requires sta ble requirements - The processes of specification, design and implementation are concurrentIt requires stable requirements - System user interfaces are usually

developed using an interactive development systemIt requires stable requirements - The system is developed in a series of increments. End users evaluate each in crement and make proposals for later incrementIt requires stable requirements answer: It is always possible to arrive at a stable, consistent set of system re quirements U17 - Q009 What are the advantages of pair programming It supports the idea of c ommon ownership and responsibility for the code It serves as an informal code re view process. User engagement with the system It accelerates delivery of custome r services - It supports the idea of common ownership and responsibility for the codeIt is always possible to arrive at a stable, consistent set of system requi rements - It serves as an informal code review process.It is always possible to arrive at a stable, consistent set of system requirements - User engagement with the systemIt is always possible to arrive at a stable, consistent set of system requirements - It accelerates delivery of customer servicesIt is always possibl e to arrive at a stable, consistent set of system requirements answer: It supports the idea of common ownership and responsibility for the code It serves as an informal code review process. U17 - Q010 Suggest three ways that a software prototype may be used? To help wit h the elicitation and validation of requirements To explore software design solu tions and support user interface design To run back-to-back tests with the imple mented system. To improve the structure of the system. - To help with the elicit ation and validation of requirementsIt supports the idea of common ownership and responsibility for the codeIt serves as an informal code review process. - To e xplore software design solutions and support user interface designIt supports th e idea of common ownership and responsibility for the codeIt serves as an inform al code review process. - To run back-to-back tests with the implemented system. It supports the idea of common ownership and responsibility for the codeIt serve s as an informal code review process. - To improve the structure of the system.I t supports the idea of common ownership and responsibility for the codeIt serves as an informal code review process. answer: To help with the elicitation and validation of requirementsTo explore so ftware design solutions and support user interface designTo run back-to-back tes ts with the implemented system. U17 - Q011 The prototyping model of software development is A reasonable approac h when requirements are well defined. A useful approach when a customer cannot d efine requirements clearly. The best approach to use for projects with large dev elopment teams. A risky model that rarely produces a meaningful product. - A rea sonable approach when requirements are well defined.To help with the elicitation and validation of requirementsTo explore software design solutions and support user interface designTo run back-to-back tests with the implemented system. - A useful approach when a customer cannot define requirements clearly.To help with the elicitation and validation of requirementsTo explore software design solutio ns and support user interface designTo run back-to-back tests with the implement ed system. - The best approach to use for projects with large development teams. To help with the elicitation and validation of requirementsTo explore software d esign solutions and support user interface designTo run back-to-back tests with the implemented system. - A risky model that rarely produces a meaningful produc t.To help with the elicitation and validation of requirementsTo explore software design solutions and support user interface designTo run back-to-back tests wit h the implemented system. answer: A useful approach when a customer cannot define requirements clearly. U17 - Q012 What are the advantages of using an incremental approach to software development? Accelerated delivery of customer services, user engagement with the system. The systems are often well structured. Increase the process visibility - Accelerated delivery of customer services, user engagement with the system.A u seful approach when a customer cannot define requirements clearly. - The systems are often well structured.A useful approach when a customer cannot define requi rements clearly. - Increase the process visibilityA useful approach when a custo mer cannot define requirements clearly. answer: Accelerated delivery of customer services, user engagement with the syst

em. U17 - Q013 Which is NOT related to a characteristic of rapid application develop ment processes? It is always possible to arrive at a stable, consistent set of s ystem requirements The processes of specification, design and implementation are concurrent System user interfaces are usually developed using an interactive de velopment system The system is developed in a series of increments. End users ev aluate each increment and make proposals for later increment - It is always poss ible to arrive at a stable, consistent set of system requirementsAccelerated del ivery of customer services, user engagement with the system. - The processes of specification, design and implementation are concurrentAccelerated delivery of c ustomer services, user engagement with the system. - System user interfaces are usually developed using an interactive development systemAccelerated delivery of customer services, user engagement with the system. - The system is developed i n a series of increments. End users evaluate each increment and make proposals f or later incrementAccelerated delivery of customer services, user engagement wit h the system. answer: It is always possible to arrive at a stable, consistent set of system re quirements U17 - Q014 What is NOT a characteristic of extreme programming? Requirements exp ressed as scenarios Pair programming Test-first development Delivery-first devel opment - Requirements expressed as scenariosIt is always possible to arrive at a stable, consistent set of system requirements - Pair programmingIt is always po ssible to arrive at a stable, consistent set of system requirements - Test-first developmentIt is always possible to arrive at a stable, consistent set of syste m requirements - Delivery-first developmentIt is always possible to arrive at a stable, consistent set of system requirements answer: Delivery-first development U17 - Q016 All of the following are advantages of pair programming EXCEPT It sup ports the idea of common ownership and responsibility for the code It serves as an informal code review process. It helps support refactoring It helps to increa se the process visibility - It supports the idea of common ownership and respons ibility for the codeDelivery-first development - It serves as an informal code r eview process.Delivery-first development - It helps support refactoringDeliveryfirst development - It helps to increase the process visibilityDelivery-first de velopment answer: It helps to increase the process visibility U17 - Q017 Which of the following statement about agile methods is NOT true Agil e methods focus on the design rather than the code Agile methods are based on an iterative approach to software development Agile methods are intended to delive r working software quickly and evolve this quickly to meet changing requirements - Agile methods focus on the design rather than the codeIt helps to increase th e process visibility - Agile methods are based on an iterative approach to softw are developmentIt helps to increase the process visibility - Agile methods are i ntended to deliver working software quickly and evolve this quickly to meet chan ging requirementsIt helps to increase the process visibility answer: Agile methods focus on the design rather than the code U17 - Q018 Suggest a way that a software prototype may NOT be used? To help with the elicitation and validation of requirements To explore software design solut ions and support user interface design To run back-to-back tests with the implem ented system. To save software prototype development effort - To help with the e licitation and validation of requirementsAgile methods focus on the design rathe r than the code - To explore software design solutions and support user interfac e designAgile methods focus on the design rather than the code - To run back-toback tests with the implemented system.Agile methods focus on the design rather than the code - To save software prototype development effortAgile methods focus on the design rather than the code answer: To save software prototype development effort U17 - Q019 What does the rapid application development concern with? A waterfall approach to software development leads to faster delivery of software An iterat ive approach to software development leads to faster delivery of software A soft

ware development model that ensure that the software would have higher quality A waterfall approach to software development leads to faster delivery of softwa reTo save software prototype development effort - An iterative approach to softw are development leads to faster delivery of softwareTo save software prototype d evelopment effort - A software development model that ensure that the software w ould have higher qualityTo save software prototype development effort answer: An iterative approach to software development leads to faster delivery o f software U17 - Q020 Which of the following BEST describes the major difficulties with inc remental development? Contractual problems, requirement problems, implementation problems, management problems Requirement problems, design problems, implementa tion problems, validation problems Contractual problems, validation problems, ma nagement problems, maintenance problems Design problems, management problems, va lidation problems, maintenance problems - Contractual problems, requirement prob lems, implementation problems, management problemsAn iterative approach to softw are development leads to faster delivery of software - Requirement problems, des ign problems, implementation problems, validation problemsAn iterative approach to software development leads to faster delivery of software - Contractual probl ems, validation problems, management problems, maintenance problemsAn iterative approach to software development leads to faster delivery of software - Design p roblems, management problems, validation problems, maintenance problemsAn iterat ive approach to software development leads to faster delivery of software answer: Contractual problems, validation problems, management problems, maintena nce problems U17 - Q021 What is a user story in extreme programming? It is a history of user It is a requirement expressed as scenario It is a small card It is a small table - It is a history of userContractual problems, validation problems, management problems, maintenance problems - It is a requirement expressed as scenarioContra ctual problems, validation problems, management problems, maintenance problems It is a small cardContractual problems, validation problems, management problem s, maintenance problems - It is a small tableContractual problems, validation pr oblems, management problems, maintenance problems answer: It is a requirement expressed as scenario U17 - Q022 Which is the evidence when said that "pair programming is as efficien t as the same number of programmers working individually" ? (Choose one) In pair programming, all project team members have the same level Measurements suggest that development productivity with pair programming is similar to that of two pe ople working independently In pair programming, project team member does not nee d to study requirement In pair programming, all project team members have the sa me skills - In pair programming, all project team members have the same levelIt is a requirement expressed as scenario - Measurements suggest that development p roductivity with pair programming is similar to that of two people working indep endentlyIt is a requirement expressed as scenario - In pair programming, project team member does not need to study requirementIt is a requirement expressed as scenario - In pair programming, all project team members have the same skillsIt is a requirement expressed as scenario answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently U17 - Q023 Rapid application development is A waterfall approach to software dev elopment leads to faster delivery of software An iterative approach to software development leads to faster delivery of software A software development model th at ensure that the software would have higher quality - A waterfall approach to software development leads to faster delivery of softwareMeasurements suggest th at development productivity with pair programming is similar to that of two peop le working independently - An iterative approach to software development leads t o faster delivery of softwareMeasurements suggest that development productivity with pair programming is similar to that of two people working independently - A software development model that ensure that the software would have higher qual ityMeasurements suggest that development productivity with pair programming is s imilar to that of two people working independently -

answer: An iterative approach to software development leads to faster delivery o f software U17 - Q024 Pair programming helps to increase the process visibility True False - TrueAn iterative approach to software development leads to faster delivery of software - FalseAn iterative approach to software development leads to faster de livery of software answer: False U17 - Q025 What is a user story in Extreme programming? It is a history of user It is a requirement expressed as scenario It is a small card It is a small table - It is a history of userFalse - It is a requirement expressed as scenarioFalse - It is a small cardFalse - It is a small tableFalse answer: It is a requirement expressed as scenario U17 - Q026 We use a Software Prototype to? Help with the elicitation and validat ion of requirements Explore software design solutions and support user interface design Run back-to-back tests with the implemented system. Save software protot ype development effort - Help with the elicitation and validation of requirement sIt is a requirement expressed as scenario - Explore software design solutions a nd support user interface designIt is a requirement expressed as scenario - Run back-to-back tests with the implemented system.It is a requirement expressed as scenario - Save software prototype development effortIt is a requirement express ed as scenario answer: Help with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with t he implemented system. U17 - Q027 Which of the following statements about pair programming is true? In pair programming, all project team members have the same level Measurements sugg est that development productivity with pair programming is similar to that of tw o people working independently In pair programming, project team member does not need to study requirement In pair programming, all project team members have th e same skills - In pair programming, all project team members have the same leve lHelp with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with the impl emented system. - Measurements suggest that development productivity with pair p rogramming is similar to that of two people working independentlyHelp with the e licitation and validation of requirementsExplore software design solutions and s upport user interface designRun back-to-back tests with the implemented system. - In pair programming, project team member does not need to study requirementHel p with the elicitation and validation of requirementsExplore software design sol utions and support user interface designRun back-to-back tests with the implemen ted system. - In pair programming, all project team members have the same skills Help with the elicitation and validation of requirementsExplore software design solutions and support user interface designRun back-to-back tests with the imple mented system. answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently U17 - Q028 Which of the following does NOT belong to important principles of agi le methods? Customer involvement Incremental delivery Process not people Embrace change Maintain simplicity - Customer involvementMeasurements suggest that deve lopment productivity with pair programming is similar to that of two people work ing independently - Incremental deliveryMeasurements suggest that development pr oductivity with pair programming is similar to that of two people working indepe ndently - Process not peopleMeasurements suggest that development productivity w ith pair programming is similar to that of two people working independently - Em brace changeMeasurements suggest that development productivity with pair program ming is similar to that of two people working independently - Maintain simplicit yMeasurements suggest that development productivity with pair programming is sim ilar to that of two people working independently answer: Process not people U17 - Q029 Which of these statements about extreme programming are true? New ver sions may be built several times per day All tests should only be run in the las

t time Increments are delivered to customers at the end of process All of the ot hers - New versions may be built several times per dayProcess not people - All t ests should only be run in the last timeProcess not people - Increments are deli vered to customers at the end of processProcess not people - All of the othersPr ocess not people answer: New versions may be built several times per day U17 - Q030 All of the followings are the ways that a software prototype may be u sed EXCEPT To help with the elicitation and validation of requirements To explor e software design solutions and support user interface design To run back-to-bac k tests with the implemented system To test all functions of the completed syste m - To help with the elicitation and validation of requirementsNew versions may be built several times per day - To explore software design solutions and suppor t user interface designNew versions may be built several times per day - To run back-to-back tests with the implemented systemNew versions may be built several times per day - To test all functions of the completed systemNew versions may be built several times per day answer: To test all functions of the completed system U17 - Q031 Which of the following statements about test first development are tr ue? When a system feature is identified, the tests of the code implementing that feature are written before the code Tests are automated and all tests are run w hen a new increment is added to the system. All of the others None of the others - When a system feature is identified, the tests of the code implementing that feature are written before the codeTo test all functions of the completed system - Tests are automated and all tests are run when a new increment is added to th e system.To test all functions of the completed system - All of the othersTo tes t all functions of the completed system - None of the othersTo test all function s of the completed system answer: All of the others U17 - Q036 What are the advantages of pair programming It supports the idea of c ommon ownership and responsibility for the code It serves as an informal code re view process User engagement with the system It accelerates delivery of customer services - It supports the idea of common ownership and responsibility for the codeAll of the others - It serves as an informal code review processAll of the o thers - User engagement with the systemAll of the others - It accelerates delive ry of customer servicesAll of the others answer: It supports the idea of common ownership and responsibility for the code It serves as an informal code review process U17 - Q037 Suggest three ways that a software prototype may be used? To help wit h the elicitation and validation of requirements To explore software design solu tions and support user interface design To run back-to-back tests with the imple mented system To improve the structure of the system - To help with the elicitat ion and validation of requirementsIt supports the idea of common ownership and r esponsibility for the codeIt serves as an informal code review process - To expl ore software design solutions and support user interface designIt supports the i dea of common ownership and responsibility for the codeIt serves as an informal code review process - To run back-to-back tests with the implemented systemIt su pports the idea of common ownership and responsibility for the codeIt serves as an informal code review process - To improve the structure of the systemIt suppo rts the idea of common ownership and responsibility for the codeIt serves as an informal code review process answer: To help with the elicitation and validation of requirementsTo explore so ftware design solutions and support user interface designTo run back-to-back tes ts with the implemented system U17 - Q038 Which are characteristics of RAD processes The processes of specifica tion, design and implementation are concurrent. System user interfaces are usual ly developed using an interactive development system The system is developed in a series of increments. The design documentation is maximal. - The processes of specification, design and implementation are concurrent.To help with the elicita tion and validation of requirementsTo explore software design solutions and supp ort user interface designTo run back-to-back tests with the implemented system -

System user interfaces are usually developed using an interactive development s ystemTo help with the elicitation and validation of requirementsTo explore softw are design solutions and support user interface designTo run back-to-back tests with the implemented system - The system is developed in a series of increments. To help with the elicitation and validation of requirementsTo explore software d esign solutions and support user interface designTo run back-to-back tests with the implemented system - The design documentation is maximal.To help with the el icitation and validation of requirementsTo explore software design solutions and support user interface designTo run back-to-back tests with the implemented sys tem answer: The processes of specification, design and implementation are concurrent .System user interfaces are usually developed using an interactive development s ystemThe system is developed in a series of increments. U17-Q045 Which is NOT a problem of agile development methods? It can be difficul t to keep the interest of customers who are involved in the process. The process es of specification, design and implementation are concurrent. Maintaining simpl icity requires extra work. None of the others - It can be difficult to keep the interest of customers who are involved in the process.The processes of specifica tion, design and implementation are concurrent.System user interfaces are usuall y developed using an interactive development systemThe system is developed in a series of increments. - The processes of specification, design and implementatio n are concurrent.The processes of specification, design and implementation are c oncurrent.System user interfaces are usually developed using an interactive deve lopment systemThe system is developed in a series of increments. - Maintaining s implicity requires extra work.The processes of specification, design and impleme ntation are concurrent.System user interfaces are usually developed using an int eractive development systemThe system is developed in a series of increments. None of the othersThe processes of specification, design and implementation are concurrent.System user interfaces are usually developed using an interactive dev elopment systemThe system is developed in a series of increments. answer: None of the others U17-Q046 Select the incorrect statement about pair programming This is the type of programming that programmers work in pairs, sitting together to develop code Pair programming helps develop common ownership of code and spreads knowledge ac ross the team. It serves as an informal review process as each line of code is l ooked at by more than 1 person. Measurements suggest that development productivi ty with pair programming is greater than productivity of two people working inde pendently. - This is the type of programming that programmers work in pairs, sit ting together to develop codeNone of the others - Pair programming helps develop common ownership of code and spreads knowledge across the team.None of the othe rs - It serves as an informal review process as each line of code is looked at b y more than 1 person.None of the others - Measurements suggest that development productivity with pair programming is greater than productivity of two people wo rking independently.None of the others answer: Measurements suggest that development productivity with pair programming is greater than productivity of two people working independently. U18 - Q.043 The two main approaches to concept reuse are: Design patterns Genera tive programming Extreme programming Pair programming - Design patternsMeasureme nts suggest that development productivity with pair programming is greater than productivity of two people working independently. - Generative programmingMeasur ements suggest that development productivity with pair programming is greater th an productivity of two people working independently. - Extreme programmingMeasur ements suggest that development productivity with pair programming is greater th an productivity of two people working independently. - Pair programmingMeasureme nts suggest that development productivity with pair programming is greater than productivity of two people working independently. answer: Design patternsGenerative programming U18 - Q.044 A ______ is a way of reusing abstract knowledge about a problem and its solution. Design pattern Template Algothirim Diagram - Design patternDesign patternsGenerative programming - TemplateDesign patternsGenerative programming -

AlgothirimDesign patternsGenerative programming - DiagramDesign patternsGenerat ive programming answer: Design pattern U18 - Q.047 Which one is architecture of the product line? A shared data reposit ory style Client / Server The architectures must be structured to separate diffe rent components The architectures must be structured to separate different sub-s ystems - A shared data repository styleDesign pattern - Client / ServerDesign pa ttern - The architectures must be structured to separate different componentsDes ign pattern - The architectures must be structured to separate different sub-sys temsDesign pattern answer: The architectures must be structured to separate different sub-systems U18 - Q.048 In case the existing system was developed by COBOL programming langu age, and now it is expected to be added more functions. So which solution is bes t to change easily in the future? Re-design the system with the newest technolog ies Develop new system with at least number of requirements of the legacy system Continue to use the COBOL to develop additional functions Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - R e-design the system with the newest technologiesThe architectures must be struct ured to separate different sub-systems - Develop new system with at least number of requirements of the legacy systemThe architectures must be structured to sep arate different sub-systems - Continue to use the COBOL to develop additional fu nctionsThe architectures must be structured to separate different sub-systems Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systemsThe architectures must be structured to separate different subsystems answer: Use 1 wrapping layer, it means define a set of interfaces for accessing from the external systems U18 - Q.049 In the management system, the customer notices to one of requirement s, with the same data, product information, the system should be performed diffe rence presentations for correspondent departments such as Product department, Qu ality department and Planning department. So which design or framework is applie d for? Program generator Aspect-oriented development ERP - Enterprise Resource P lanning MVC - Model View Controller - Program generatorUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - Aspec t-oriented developmentUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems - ERP - Enterprise Resource PlanningUse 1 wrapping layer, it means define a set of interfaces for accessing from the ext ernal systems - MVC - Model View ControllerUse 1 wrapping layer, it means define a set of interfaces for accessing from the external systems answer: MVC - Model View Controller U18 - Q.050 Which one is program type of the Java compile, Javac? Application ge nerator Code generators MVC - Model View Controller generator Parser and lexical analyser generators - Application generatorMVC - Model View Controller - Code g eneratorsMVC - Model View Controller - MVC - Model View Controller generatorMVC - Model View Controller - Parser and lexical analyser generatorsMVC - Model View Controller answer: Parser and lexical analyser generators U18 - Q.051 Supposed that new system is very familiar because the same system wa s developed before, so what is re-used for developing new system quickly? COTS O bjects CASE tools Architecture - COTSParser and lexical analyser generators - Ob jectsParser and lexical analyser generators - CASE toolsParser and lexical analy ser generators - ArchitectureParser and lexical analyser generators answer: Architecture U18 - Q001 What are the benefits of software reuse ? Increase dependability Rapi d to delivery the product Maintenance costs may be increased as the reused eleme nts of the system may become incompatible with system changes Enhance the invent ion of developers - Increase dependabilityArchitecture - Rapid to delivery the p roductArchitecture - Maintenance costs may be increased as the reused elements o f the system may become incompatible with system changesArchitecture - Enhance t he invention of developersArchitecture -

answer: Increase dependabilityRapid to delivery the productMaintenance costs may be increased as the reused elements of the system may become incompatible with system changes U18 - Q002 When is the design pattern applied to? Re-use abstract knowledge abou t a problem and its solution Re-use difference settings of the abstract knowledg e Re-use experiences of the specialists who developed reusable software Re-use t o develop non-functionalities - Re-use abstract knowledge about a problem and it s solutionIncrease dependabilityRapid to delivery the productMaintenance costs m ay be increased as the reused elements of the system may become incompatible wit h system changes - Re-use difference settings of the abstract knowledgeIncrease dependabilityRapid to delivery the productMaintenance costs may be increased as the reused elements of the system may become incompatible with system changes Re-use experiences of the specialists who developed reusable softwareIncrease de pendabilityRapid to delivery the productMaintenance costs may be increased as th e reused elements of the system may become incompatible with system changes - Re -use to develop non-functionalitiesIncrease dependabilityRapid to delivery the p roductMaintenance costs may be increased as the reused elements of the system ma y become incompatible with system changes answer: Re-use abstract knowledge about a problem and its solutionRe-use differe nce settings of the abstract knowledgeRe-use experiences of the specialists who developed reusable software U18 - Q003 Which ones are framework classes? System infrastructure framework Mid dleware integration framework Enterprise application framework Parser and lexica l analysing framework - System infrastructure frameworkRe-use abstract knowledge about a problem and its solutionRe-use difference settings of the abstract know ledgeRe-use experiences of the specialists who developed reusable software - Mid dleware integration frameworkRe-use abstract knowledge about a problem and its s olutionRe-use difference settings of the abstract knowledgeRe-use experiences of the specialists who developed reusable software - Enterprise application framew orkRe-use abstract knowledge about a problem and its solutionRe-use difference s ettings of the abstract knowledgeRe-use experiences of the specialists who devel oped reusable software - Parser and lexical analysing frameworkRe-use abstract k nowledge about a problem and its solutionRe-use difference settings of the abstr act knowledgeRe-use experiences of the specialists who developed reusable softwa re answer: System infrastructure frameworkMiddleware integration frameworkEnterpris e application framework U18 - Q004 Extending the framework involves Adding concrete classes that inherit operations from abstract classes in the framework Adding methods that are calle d in response to events that are recognised by the framework Adding data objects that are used in the framework - Adding concrete classes that inherit operation s from abstract classes in the frameworkSystem infrastructure frameworkMiddlewar e integration frameworkEnterprise application framework - Adding methods that ar e called in response to events that are recognised by the frameworkSystem infras tructure frameworkMiddleware integration frameworkEnterprise application framewo rk - Adding data objects that are used in the frameworkSystem infrastructure fra meworkMiddleware integration frameworkEnterprise application framework answer: Adding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are reco gnised by the framework U18 - Q005 Adaptation in software product lines may involve Component and system configuration Adding new components to the system Selecting from a library of e xisting components Modifying components to meet new requirements Modifying syste m design to meet new requirements - Component and system configurationAdding con crete classes that inherit operations from abstract classes in the frameworkAddi ng methods that are called in response to events that are recognised by the fram ework - Adding new components to the systemAdding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are recognised by the framework - Selecting from a li brary of existing componentsAdding concrete classes that inherit operations from

abstract classes in the frameworkAdding methods that are called in response to events that are recognised by the framework - Modifying components to meet new r equirementsAdding concrete classes that inherit operations from abstract classes in the frameworkAdding methods that are called in response to events that are r ecognised by the framework - Modifying system design to meet new requirementsAdd ing concrete classes that inherit operations from abstract classes in the framew orkAdding methods that are called in response to events that are recognised by t he framework answer: Component and system configurationAdding new components to the systemSel ecting from a library of existing componentsModifying components to meet new req uirements U18 - Q006 What is the most effective approach of creating software product line s (application families)? Reuse user interface Reuse database Reuse design patte rn Reuse project team - Reuse user interfaceComponent and system configurationAd ding new components to the systemSelecting from a library of existing components Modifying components to meet new requirements - Reuse databaseComponent and syst em configurationAdding new components to the systemSelecting from a library of e xisting componentsModifying components to meet new requirements - Reuse design p atternComponent and system configurationAdding new components to the systemSelec ting from a library of existing componentsModifying components to meet new requi rements - Reuse project teamComponent and system configurationAdding new compone nts to the systemSelecting from a library of existing componentsModifying compon ents to meet new requirements answer: Reuse design pattern U18 - Q007 Which is NOT a reuse-based software engineering? Re-use the software manuals Re-use the whole of an application system Re-use components of an applic ation from sub-systems to single objects Re-use software components that impleme nt a single well-defined object or function - Re-use the software manualsReuse d esign pattern - Re-use the whole of an application systemReuse design pattern Re-use components of an application from sub-systems to single objectsReuse desi gn pattern - Re-use software components that implement a single well-defined obj ect or functionReuse design pattern answer: Re-use the software manuals U18 - Q008 List the main problems with software reuse increased implementation c ost Lack of tool support Increase process risk Increased maintenance costs - inc reased implementation costRe-use the software manuals - Lack of tool supportRe-u se the software manuals - Increase process riskRe-use the software manuals - Inc reased maintenance costsRe-use the software manuals answer: Lack of tool supportIncreased maintenance costs U18 - Q009 Which are THREE essential elements of design patterns? (select three) A name that is a meaningful reference to the pattern A description of the probl em area that explains when the pattern may be applied A statement of the consequ ences of applying the pattern A concrete design description - A name that is a m eaningful reference to the patternLack of tool supportIncreased maintenance cost s - A description of the problem area that explains when the pattern may be appl iedLack of tool supportIncreased maintenance costs - A statement of the conseque nces of applying the patternLack of tool supportIncreased maintenance costs - A concrete design descriptionLack of tool supportIncreased maintenance costs answer: A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the co nsequences of applying the pattern U18 - Q011 What is NOT a type in Reuse-based software engineering ? Application system reuse Component reuse Object and function reuse Software development proc ess reuse - Application system reuseA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern - Component reuse A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequenc es of applying the pattern - Object and function reuseA name that is a meaningfu l reference to the patternA description of the problem area that explains when t

he pattern may be appliedA statement of the consequences of applying the pattern - Software development process reuseA name that is a meaningful reference to th e patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern answer: Software development process reuse U18 - Q012 What is NOT a main problem with software reuse? Increased maintenance costs Lack of tool support Increased process risk Not-invented-here syndrome Increased maintenance costsSoftware development process reuse - Lack of tool sup portSoftware development process reuse - Increased process riskSoftware developm ent process reuse - Not-invented-here syndromeSoftware development process reuse answer: Increased process risk U18 - Q013 What is NOT an essential element of design patterns? A name that is a meaningful reference to the pattern A description of the problem area that expl ains when the pattern may be applied A statement of the consequences of applying the pattern A concrete design description - A name that is a meaningful referen ce to the patternIncreased process risk - A description of the problem area that explains when the pattern may be appliedIncreased process risk - A statement of the consequences of applying the patternIncreased process risk - A concrete des ign descriptionIncreased process risk answer: A concrete design description U18 - Q014 All of the following are the main benefits of software reuse EXCEPT I ncreased dependability Reduced process risk Reduce maintain cost Effective use o f specialists, standards compliance Accelerated development. - Increased dependa bilityA concrete design description - Reduced process riskA concrete design desc ription - Reduce maintain costA concrete design description - Effective use of s pecialists, standards complianceA concrete design description - Accelerated deve lopment.A concrete design description answer: Reduce maintain cost U18 - Q015 What is NOT a type in main approaches to concept reuse Design pattern s Generative programming Object and function reuse - Design patternsReduce maint ain cost - Generative programmingReduce maintain cost - Object and function reus eReduce maintain cost answer: Object and function reuse U18 - Q016 All of the following are types of program generator EXCEPT Applicatio n generators Parser and lexical analyser generators Code generators Component ge nerators - Application generatorsObject and function reuse - Parser and lexical analyser generatorsObject and function reuse - Code generatorsObject and functio n reuse - Component generatorsObject and function reuse answer: Component generators U18 - Q017 All of the following are the design choices have to be made when reus ing COTS products EXCEPT Which COTS products offer the most appropriate function ality? How will data be exchanged between different products? What features of a product will actually be used? How will data be exchanged between different mod ules? - Which COTS products offer the most appropriate functionality?Component g enerators - How will data be exchanged between different products?Component gene rators - What features of a product will actually be used?Component generators How will data be exchanged between different modules?Component generators answer: How will data be exchanged between different modules? U18 - Q019 During requirement checking, which question you need to answer for th e consistency? Are there any requirements conflicts? Are all functions required by the customer included? Can the requirements be implemented given available bu dget and technology? Does the system provide the functions which best support th e customer's needs? - Are there any requirements conflicts?How will data be exch anged between different modules? - Are all functions required by the customer in cluded?How will data be exchanged between different modules? - Can the requireme nts be implemented given available budget and technology?How will data be exchan ged between different modules? - Does the system provide the functions which bes t support the customer's needs?How will data be exchanged between different modu les? -

answer: Are there any requirements conflicts? U18 - Q020 Which is the correct statement about Product line architectures? Arch itectures must be structured in such a way to separate different sub-systems and to allow them to be modified Architectures must be structured in such a way to include different sub-systems and not to allow them to be modified - Architectur es must be structured in such a way to separate different sub-systems and to all ow them to be modifiedAre there any requirements conflicts? - Architectures must be structured in such a way to include different sub-systems and not to allow t hem to be modifiedAre there any requirements conflicts? answer: Architectures must be structured in such a way to separate different sub -systems and to allow them to be modified U18 - Q021 What are the elements of design patterns? (Choose one) Pattern name, Problem description, The solution description, The consequences Pattern name, Pr oblem description, The guide line to use pattern Pattern name, Problem descripti on, The author description of the Pattern Pattern name, The solution description , The author description of the Pattern - Pattern name, Problem description, The solution description, The consequencesArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified - Patte rn name, Problem description, The guide line to use patternArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified - Pattern name, Problem description, The author description of the PatternArchitectures must be structured in such a way to separate different subsystems and to allow them to be modified - Pattern name, The solution descriptio n, The author description of the PatternArchitectures must be structured in such a way to separate different sub-systems and to allow them to be modified answer: Pattern name, Problem description, The solution description, The consequ ences U18 - Q022 What are problems of software reuse? (Choose one) Finding, understand ing and adapting reusable components; Creating and maintaining a component libra ry; Increased maintenance costs Finding, understanding and adapting reusable com ponents; Increased maintenance costs; Re-use design pattern Finding, understandi ng and adapting reusable components; Increased maintenance costs; develop softwa re in shorter duration - Finding, understanding and adapting reusable components ; Creating and maintaining a component library; Increased maintenance costsPatte rn name, Problem description, The solution description, The consequences - Findi ng, understanding and adapting reusable components; Increased maintenance costs; Re-use design patternPattern name, Problem description, The solution descriptio n, The consequences - Finding, understanding and adapting reusable components; I ncreased maintenance costs; develop software in shorter durationPattern name, Pr oblem description, The solution description, The consequences answer: Finding, understanding and adapting reusable components; Creating and ma intaining a component library; Increased maintenance costs U18 - Q023 List the main benefits of software reuse Increased dependability Redu ced process risk Reduce maintain cost Effective use of specialists, standards co mpliance Accelerated development. - Increased dependabilityFinding, understandin g and adapting reusable components; Creating and maintaining a component library ; Increased maintenance costs - Reduced process riskFinding, understanding and a dapting reusable components; Creating and maintaining a component library; Incre ased maintenance costs - Reduce maintain costFinding, understanding and adapting reusable components; Creating and maintaining a component library; Increased ma intenance costs - Effective use of specialists, standards complianceFinding, und erstanding and adapting reusable components; Creating and maintaining a componen t library; Increased maintenance costs - Accelerated development.Finding, unders tanding and adapting reusable components; Creating and maintaining a component l ibrary; Increased maintenance costs answer: Increased dependabilityReduced process riskEffective use of specialists, standards complianceAccelerated development. U18 - Q023 - HN What are benefits of software reuse? (Choose one) Reduced proces s risk; Effective use of specialists; Accelerated development Reduced process ri sk; Effective use of specialists; Not-invented-here syndrome Reduced process ris

k; Effective use of specialists; Finding, understanding and adapting reusable co mponents - Reduced process risk; Effective use of specialists; Accelerated devel opmentIncreased dependabilityReduced process riskEffective use of specialists, s tandards complianceAccelerated development. - Reduced process risk; Effective us e of specialists; Not-invented-here syndromeIncreased dependabilityReduced proce ss riskEffective use of specialists, standards complianceAccelerated development . - Reduced process risk; Effective use of specialists; Finding, understanding a nd adapting reusable componentsIncreased dependabilityReduced process riskEffect ive use of specialists, standards complianceAccelerated development. answer: Reduced process risk; Effective use of specialists; Accelerated developm ent U18 - Q024 List the main approaches of concept reuse Design patterns Generative programming Object and function reuse - Design patternsReduced process risk; Eff ective use of specialists; Accelerated development - Generative programmingReduc ed process risk; Effective use of specialists; Accelerated development - Object and function reuseReduced process risk; Effective use of specialists; Accelerate d development answer: U18 - Q025 List three types of program generator Application generators Parser a nd lexical analyser generators Code generators Component generators - Applicatio n generators - Parser and lexical analyser generators - Code generators - Compon ent generators answer: Application generatorsParser and lexical analyser generatorsCode generat ors U18 - Q026 One of the most effective approaches to reuse is creating software pr oduct lines or application families. True False - TrueApplication generatorsPars er and lexical analyser generatorsCode generators - FalseApplication generatorsP arser and lexical analyser generatorsCode generators answer: True U18 - Q027 Which is the design choice that should NOT be made when reusing COTS products? Which COTS products offer the most appropriate functionality? How will data be exchanged between different products? What features of a product will a ctually be used? How will data be exchanged between different modules? - Which C OTS products offer the most appropriate functionality?True - How will data be ex changed between different products?True - What features of a product will actual ly be used?True - How will data be exchanged between different modules?True answer: How will data be exchanged between different modules? U18 - Q028 What key factors should be considered when planning reuse? The develo pment schedule for the software The expected software lifetime The background, s kills and experience of the development team All of the others - The development schedule for the softwareHow will data be exchanged between different modules? - The expected software lifetimeHow will data be exchanged between different mod ules? - The background, skills and experience of the development teamHow will da ta be exchanged between different modules? - All of the othersHow will data be e xchanged between different modules? answer: All of the others U18 - Q029 All of the following statement about design pattern are true EXCEPT D esign patterns are detail-level abstractions that document successful design sol utions. They are fundamental to design reuse in object-oriented development A pa ttern description should include a pattern name, a problem and solution descript ion, and a statement of the results and trade-offs of using the pattern - Design patterns are detail-level abstractions that document successful design solution s.All of the others - They are fundamental to design reuse in object-oriented de velopmentAll of the others - A pattern description should include a pattern name , a problem and solution description, and a statement of the results and trade-o ffs of using the patternAll of the others answer: Design patterns are detail-level abstractions that document successful d esign solutions. U18 - Q030 All of the followings are main benefits of software reuse EXCEPT Incr eased dependability Reduced process risk Effective use of specialists Reduce mai

ntenance costs Accelerated development - Increased dependabilityDesign patterns are detail-level abstractions that document successful design solutions. - Reduc ed process riskDesign patterns are detail-level abstractions that document succe ssful design solutions. - Effective use of specialistsDesign patterns are detail -level abstractions that document successful design solutions. - Reduce maintena nce costsDesign patterns are detail-level abstractions that document successful design solutions. - Accelerated developmentDesign patterns are detail-level abst ractions that document successful design solutions. answer: Reduce maintenance costs U18 - Q031 All of the following are the main benefits of software reuse EXCEPT I ncreased dependability Reduced process risk Reduce maintain cost Effective use o f specialists, standards compliance Accelerated development - Increased dependab ilityReduce maintenance costs - Reduced process riskReduce maintenance costs - R educe maintain costReduce maintenance costs - Effective use of specialists, stan dards complianceReduce maintenance costs - Accelerated developmentReduce mainten ance costs answer: Reduce maintain cost U18 - Q032 Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true? Enterprise Resource Planning systems are very widely used Specific ERP systems are created by configuring a generic system at develop ment time with information about the customer's business All of the others - Ent erprise Resource Planning systems are very widely usedReduce maintain cost - Spe cific ERP systems are created by configuring a generic system at development tim e with information about the customer's businessReduce maintain cost - All of th e othersReduce maintain cost answer: Specific ERP systems are created by configuring a generic system at deve lopment time with information about the customer's business U18 - Q036 List the main problems with software reuse Lack of tool support Incre ase process risk Increased maintenance costs - Lack of tool supportSpecific ERP systems are created by configuring a generic system at development time with inf ormation about the customer's business - Increase process riskSpecific ERP syste ms are created by configuring a generic system at development time with informat ion about the customer's business - Increased maintenance costsSpecific ERP syst ems are created by configuring a generic system at development time with informa tion about the customer's business answer: Lack of tool supportIncreased maintenance costs U18 - Q037 Which are THREE essential elements of design patterns? (select three) A name that is a meaningful reference to the pattern A description of the probl em area that explains when the pattern may be applied A statement of the consequ ences of applying the pattern A concrete design description - A name that is a m eaningful reference to the patternLack of tool supportIncreased maintenance cost s - A description of the problem area that explains when the pattern may be appl iedLack of tool supportIncreased maintenance costs - A statement of the conseque nces of applying the patternLack of tool supportIncreased maintenance costs - A concrete design descriptionLack of tool supportIncreased maintenance costs answer: A name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the co nsequences of applying the pattern U18 - Q038 Which are benefits of software reuse? Reduced process risks Effective using experiences of specialists Increase dependability Reduced maintain costs - Reduced process risksA name that is a meaningful reference to the patternA des cription of the problem area that explains when the pattern may be appliedA stat ement of the consequences of applying the pattern - Effective using experiences of specialistsA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be appliedA statement of the consequences of applying the pattern - Increase dependabilityA name that is a meaningful reference to the patternA description of the problem area that expl ains when the pattern may be appliedA statement of the consequences of applying the pattern - Reduced maintain costsA name that is a meaningful reference to the patternA description of the problem area that explains when the pattern may be

appliedA statement of the consequences of applying the pattern answer: Reduced process risksEffective using experiences of specialistsIncrease dependability U18 - Q039 Which are the two main approaches to concept reuse are? Design patter ns Generative programming Implementation pattern Aspect programming - Design pat ternsReduced process risksEffective using experiences of specialistsIncrease dep endability - Generative programmingReduced process risksEffective using experien ces of specialistsIncrease dependability - Implementation patternReduced process risksEffective using experiences of specialistsIncrease dependability - Aspect programmingReduced process risksEffective using experiences of specialistsIncrea se dependability answer: Design patternsGenerative programming U18-Q045 Select the incorrect statement about COTS product reuse COTS stand for: Customer Off-The-Shelf COTS systems are usually complete application systems th at offer an API. The key benefit is faster application development and, usually, lower development costs. Building large systems by integrating COTS systems is now a viable development strategy for some types of system such as E-commerce sy stems. - COTS stand for: Customer Off-The-ShelfDesign patternsGenerative program ming - COTS systems are usually complete application systems that offer an API.D esign patternsGenerative programming - The key benefit is faster application dev elopment and, usually, lower development costs.Design patternsGenerative program ming - Building large systems by integrating COTS systems is now a viable develo pment strategy for some types of system such as E-commerce systems.Design patter nsGenerative programming answer: COTS stand for: Customer Off-The-Shelf U18-Q045 Which is NOT an element of design patterns? Name: a meaningful pattern identifier. Problem description Solution description None of the others - Name: a meaningful pattern identifier.COTS stand for: Customer Off-The-Shelf - Problem descriptionCOTS stand for: Customer Off-The-Shelf - Solution descriptionCOTS st and for: Customer Off-The-Shelf - None of the othersCOTS stand for: Customer Off -The-Shelf answer: None of the others U23 - Q.043 Which of the followings belong to validation testing? To demonstrate to the developer and the system customer that the software meets its requiremen ts A successful test shows that the system operates as intended. To discover fau lts or defects in the software where its behaviour is incorrect or not in confor mance with its specification A successful test is a test that makes the system p erform incorrectly and so exposes a defect in the system. - To demonstrate to th e developer and the system customer that the software meets its requirementsNone of the others - A successful test shows that the system operates as intended.No ne of the others - To discover faults or defects in the software where its behav iour is incorrect or not in conformance with its specificationNone of the others - A successful test is a test that makes the system perform incorrectly and so exposes a defect in the system.None of the others answer: To demonstrate to the developer and the system customer that the softwar e meets its requirementsA successful test shows that the system operates as inte nded. U23 - Q.044 What are two phases of system testing? Integration testing Release t esting Unit testing Component testing - Integration testingTo demonstrate to the developer and the system customer that the software meets its requirementsA suc cessful test shows that the system operates as intended. - Release testingTo dem onstrate to the developer and the system customer that the software meets its re quirementsA successful test shows that the system operates as intended. - Unit t estingTo demonstrate to the developer and the system customer that the software meets its requirementsA successful test shows that the system operates as intend ed. - Component testingTo demonstrate to the developer and the system customer t hat the software meets its requirementsA successful test shows that the system o perates as intended. answer: Integration testingRelease testing U23 - Q.047 Using equivalence partition testing for the following procedure: Sea

rch (Key : ELEM ; T: {100, ..., 1000};Found : in out BOOLEAN; L: in out ELEM_IND EX) Which are numbers selected for testing? 100 ? 1000 Odd numbers Even numbers 99, 100, 500, 999, 1000 - 100 ? 1000Integration testingRelease testing - Odd num bersIntegration testingRelease testing - Even numbersIntegration testingRelease testing - 99, 100, 500, 999, 1000Integration testingRelease testing answer: 99, 100, 500, 999, 1000 U23 - Q.048 What is the function of stress testing? Testing individual component s in isolation Testing all interface methods of objects Planning a series of tes ts where the load is steadily increased until the system performance becomes una cceptable Making demands that are outside the design limits of the software - Te sting individual components in isolation99, 100, 500, 999, 1000 - Testing all in terface methods of objects99, 100, 500, 999, 1000 - Planning a series of tests w here the load is steadily increased until the system performance becomes unaccep table99, 100, 500, 999, 1000 - Making demands that are outside the design limits of the software99, 100, 500, 999, 1000 answer: Making demands that are outside the design limits of the software U23 - Q.049 Using equivalence partition testing to check employee ID by format 8 xxx: Boolean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected fo r testing? 8000 -> 9000 Odd employee IDs or even employee IDs within 8000 ->8999 8000, 8199, 8200, 8889, 8890 7999, 8000, 8500, 8999, 9000 - 8000 -> 9000Making demands that are outside the design limits of the software - Odd employee IDs or even employee IDs within 8000 ->8999Making demands that are outside the design limits of the software - 8000, 8199, 8200, 8889, 8890Making demands that are out side the design limits of the software - 7999, 8000, 8500, 8999, 9000Making dema nds that are outside the design limits of the software answer: 7999, 8000, 8500, 8999, 9000 U23 - Q.050 The CMS system is reliability if it can serve at least 2000 students at the same time without delays, so which testing method is used to check this non-functionality? System testing Stress testing Release testing Performance tes ting - System testing7999, 8000, 8500, 8999, 9000 - Stress testing7999, 8000, 85 00, 8999, 9000 - Release testing7999, 8000, 8500, 8999, 9000 - Performance testi ng7999, 8000, 8500, 8999, 9000 answer: Performance testing U23 - Q.051 A business management system runs well with sample test data but was failed with the real data, so which testing type is applied for this situation? System testing Performance testing Release testing Acceptance testing - System testingPerformance testing - Performance testingPerformance testing - Release te stingPerformance testing - Acceptance testingPerformance testing answer: Acceptance testing U23 - Q001 How are the system testing? Testing on integrating components to crea te a system or sub-system Testing on integrating sub-systems to create a system Testing is done by an independent testing team Testing on individual program com ponents to create a sub-system - Testing on integrating components to create a s ystem or sub-systemAcceptance testing - Testing on integrating sub-systems to cr eate a systemAcceptance testing - Testing is done by an independent testing team Acceptance testing - Testing on individual program components to create a sub-sy stemAcceptance testing answer: Testing on integrating sub-systems to create a systemTesting on individu al program components to create a sub-system U23 - Q002 How are the component testing? Testing on individual program componen ts to create a sub-system Testing is done by component developers Testing is don e by an independent testing team Testing on interactive among components - Testi ng on individual program components to create a sub-systemTesting on integrating sub-systems to create a systemTesting on individual program components to creat e a sub-system - Testing is done by component developersTesting on integrating s ub-systems to create a systemTesting on individual program components to create a sub-system - Testing is done by an independent testing teamTesting on integrat ing sub-systems to create a systemTesting on individual program components to cr eate a sub-system - Testing on interactive among componentsTesting on integratin g sub-systems to create a systemTesting on individual program components to crea

te a sub-system answer: Testing on individual program components to create a sub-systemTesting i s done by component developers U23 - Q003 Which types of testing are done by development team? Stress testing I nterface testing Release testing Acceptance testing - Stress testingTesting on i ndividual program components to create a sub-systemTesting is done by component developers - Interface testingTesting on individual program components to create a sub-systemTesting is done by component developers - Release testingTesting on individual program components to create a sub-systemTesting is done by componen t developers - Acceptance testingTesting on individual program components to cre ate a sub-systemTesting is done by component developers answer: Stress testingInterface testingRelease testing U23 - Q004 Which of the following need to be assessed during unit testing? Algor ithmic performance Code stability Error handling Execution paths - Algorithmic p erformanceStress testingInterface testingRelease testing - Code stabilityStress testingInterface testingRelease testing - Error handlingStress testingInterface testingRelease testing - Execution pathsStress testingInterface testingRelease t esting answer: Error handlingExecution paths U23 - Q005 Top-down integration testing has as it's major advantage(s) that Low level modules never need testing Major decision points are tested early No drive rs need to be written No stubs need to be written - Low level modules never need testingError handlingExecution paths - Major decision points are tested earlyEr ror handlingExecution paths - No drivers need to be writtenError handlingExecuti on paths - No stubs need to be writtenError handlingExecution paths answer: Major decision points are tested earlyNo drivers need to be written U23 - Q006 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorMajor decision poin ts are tested earlyNo drivers need to be written - Project managerMajor decision points are tested earlyNo drivers need to be written - DeveloperMajor decision points are tested earlyNo drivers need to be written - TesterMajor decision poin ts are tested earlyNo drivers need to be written answer: Developer U23 - Q007 What is the purpose of defect testing? To discover faults that make s oftware's behavior incorrect To verify that the software meet its requirements T o ensure about the performance of the software To test individual program compon ents - To discover faults that make software's behavior incorrectDeveloper - To verify that the software meet its requirementsDeveloper - To ensure about the pe rformance of the softwareDeveloper - To test individual program componentsDevelo per answer: To discover faults that make software's behavior incorrect U23 - Q008 What is the normal order of activities in which traditional software testing is organized? a. Integration testing b. System testing c. Unit testing d . Validation testing a, d, c, b b, d, a, c c, a, d, b d, b, c, a - a, d, c, bTo discover faults that make software's behavior incorrect - b, d, a, cTo discover faults that make software's behavior incorrect - c, a, d, bTo discover faults th at make software's behavior incorrect - d, b, c, aTo discover faults that make s oftware's behavior incorrect answer: c, a, d, b U23 - Q009 What tests should be included in object class testing? Tests for all operations in isolation Tests that set and access all object attributes Tests th at force the object into all possible states Test the associations of the object s with the others - Tests for all operations in isolationc, a, d, b - Tests that set and access all object attributesc, a, d, b - Tests that force the object in to all possible statesc, a, d, b - Test the associations of the objects with the othersc, a, d, b answer: Tests for all operations in isolationTests that set and access all objec t attributesTests that force the object into all possible states U23 - Q010 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorTests for all opera

tions in isolationTests that set and access all object attributesTests that forc e the object into all possible states - Project managerTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible states - DeveloperTests for all operations in isolation Tests that set and access all object attributesTests that force the object into all possible states - TesterTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible st ates answer: Developer U23 - Q011 What is the purpose of defect testing? To discover faults that make s oftware's behavior incorrect To verify that the software meet its requirements T o ensure about the performance of the software To test individual program compon ents - To discover faults that make software's behavior incorrectDeveloper - To verify that the software meet its requirementsDeveloper - To ensure about the pe rformance of the softwareDeveloper - To test individual program componentsDevelo per answer: U23 - Q012 What is the normal order of activities in which software testing proc ess is organized? 1. Prepare test data 2. Design test cases 3. Run program with test data 4. Compare results to test cases 1, 4, 3, 2 2, 1, 3, 4 3, 1, 4, 2 4, 2 , 3, 1 - 1, 4, 3, 2 - 2, 1, 3, 4 - 3, 1, 4, 2 - 4, 2, 3, 1 answer: 2, 1, 3, 4 U23 - Q013 What is the common limitation of automated testing? They are not usef ul for performance testing They cannot be used for requirement validation It is very difficult for automated scripts to verify a wide range of application respo nses They are not useful when requirements are changing frequently - They are no t useful for performance testing2, 1, 3, 4 - They cannot be used for requirement validation2, 1, 3, 4 - It is very difficult for automated scripts to verify a w ide range of application responses2, 1, 3, 4 - They are not useful when requirem ents are changing frequently2, 1, 3, 4 answer: They are not useful when requirements are changing frequently U23 - Q015 What is NOT a purpose of the testing process? To demonstrate that the software meets its requirements To discover faults or defects in the software T o fix faults or defects in the software - To demonstrate that the software meets its requirementsThey are not useful when requirements are changing frequently To discover faults or defects in the softwareThey are not useful when requireme nts are changing frequently - To fix faults or defects in the softwareThey are n ot useful when requirements are changing frequently answer: To fix faults or defects in the software U23 - Q016 Which of these statements about defect testing is NOT true? The goal of defect testing is to discover defects in programs A successful test shows tha t the system operates as intended Tests show the presence not the absence of def ects - The goal of defect testing is to discover defects in programsTo fix fault s or defects in the software - A successful test shows that the system operates as intendedTo fix faults or defects in the software - Tests show the presence no t the absence of defectsTo fix faults or defects in the software answer: A successful test shows that the system operates as intended U23 - Q017 All of the following are the tests that should be included in object class testing EXCEPT Tests for all operations in isolation Tests that set and ac cess all object attributes Tests that force the object into all possible states Test the associations of the objects with the others - Tests for all operations in isolationA successful test shows that the system operates as intended - Tests that set and access all object attributesA successful test shows that the syste m operates as intended - Tests that force the object into all possible statesA s uccessful test shows that the system operates as intended - Test the association s of the objects with the othersA successful test shows that the system operates as intended answer: Test the associations of the objects with the others U23 - Q019 A successful defect test is a test which causes a program to behave i n an normal way True False - TrueTest the associations of the objects with the o

thers - FalseTest the associations of the objects with the others answer: False U23 - Q020 Which of the following statement is about release testing? The test t eam tests the incomplete system right after it is component tested. It is to inc rease the supplier's confidence that the system meets its requirements It involv es building a system from its components and testing it for problems that arise It involves planning a series of tests where the load is steadily increased unti l the system performance becomes unacceptable - The test team tests the incomple te system right after it is component tested.False - It is to increase the suppl ier's confidence that the system meets its requirementsFalse - It involves build ing a system from its components and testing it for problems that ariseFalse - I t involves planning a series of tests where the load is steadily increased until the system performance becomes unacceptableFalse answer: It is to increase the supplier's confidence that the system meets its re quirements U23 - Q021 Please choose the correct definition of the unit testing? Unit testin g is the process of testing individual attributes, functions or methods within a n object Unit testing is usually black-box or functional testing Unit test team has to access to the system source code. The system is tested as components are integrated - Unit testing is the process of testing individual attributes, funct ions or methods within an objectIt is to increase the supplier's confidence that the system meets its requirements - Unit testing is usually black-box or functi onal testingIt is to increase the supplier's confidence that the system meets it s requirements - Unit test team has to access to the system source code. The sys tem is tested as components are integratedIt is to increase the supplier's confi dence that the system meets its requirements answer: Unit testing is the process of testing individual attributes, functions or methods within an object U23 - Q022 Which is right sequence in the software testing process? (1) Prepare test data (2) Create test case (3) Perform test (4) Create test report 1 `\Right arrow` 2 `\Rightarrow` 4 `\Rightarrow` 3 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rig htarrow` 4 2 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 1 2 `\Rightarrow` 1 ` \Rightarrow` 4 `\Rightarrow` 3 - 1 `\Rightarrow` 2 `\Rightarrow` 4 `\Rightarrow` 3Unit testing is the process of testing individual attributes, functions or met hods within an object - 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4Unit te sting is the process of testing individual attributes, functions or methods with in an object - 2 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 1Unit testing is the process of testing individual attributes, functions or methods within an obj ect - 2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3Unit testing is the proce ss of testing individual attributes, functions or methods within an object answer: 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 U23 - Q023 Only exhaustive testing can show a program is free from defects. True False - True2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 - False2 `\Righta rrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 answer: True U23 - Q024 List the main purposes of the testing process? To demonstrate that th e software meets its requirements To discover faults or defects in the software To fix faults or defects in the software - To demonstrate that the software meet s its requirementsTrue - To discover faults or defects in the softwareTrue - To fix faults or defects in the softwareTrue answer: To demonstrate that the software meets its requirementsTo discover fault s or defects in the software U23 - Q025 Testing can only show the presence of errors, not their absence. True False - TrueTo demonstrate that the software meets its requirementsTo discover faults or defects in the software - FalseTo demonstrate that the software meets its requirementsTo discover faults or defects in the software answer: True U23 - Q026 List the tests that should be included in object class testing Tests for all operations in isolation Tests that set and access all object attributes Tests that force the object into all possible states Test the associations of th

e objects with the others - Tests for all operations in isolationTrue - Tests th at set and access all object attributesTrue - Tests that force the object into a ll possible statesTrue - Test the associations of the objects with the othersTru e answer: Tests for all operations in isolationTests that set and access all objec t attributesTests that force the object into all possible states U23 - Q027 Please choose the correct statement about unit testing Unit testing i s the process of testing individual attributes, functions or methods within an o bject Unit testing is usually black-box or functional testing Unit test team has to access to the system source code. The system is tested as components are int egrated - Unit testing is the process of testing individual attributes, function s or methods within an objectTests for all operations in isolationTests that set and access all object attributesTests that force the object into all possible s tates - Unit testing is usually black-box or functional testingTests for all ope rations in isolationTests that set and access all object attributesTests that fo rce the object into all possible states - Unit test team has to access to the sy stem source code. The system is tested as components are integratedTests for all operations in isolationTests that set and access all object attributesTests tha t force the object into all possible states answer: Unit testing is the process of testing individual attributes, functions or methods within an object U23 - Q028 Which of the following statements about testing is NOT true? Testing can only show the presence of errors in a program It cannot demonstrate that the re are no remaining faults Its goal is to fix errors of the software system None of the others - Testing can only show the presence of errors in a programUnit t esting is the process of testing individual attributes, functions or methods wit hin an object - It cannot demonstrate that there are no remaining faultsUnit tes ting is the process of testing individual attributes, functions or methods withi n an object - Its goal is to fix errors of the software systemUnit testing is th e process of testing individual attributes, functions or methods within an objec t - None of the othersUnit testing is the process of testing individual attribut es, functions or methods within an object answer: Its goal is to fix errors of the software system U23 - Q029 Which of the following statements about Equivalence partitioning are NOT true? Equivalence partitioning is a way of deriving test cases It depends on finding partitions in the input and output data sets and exercising the program with values from these partitions Often, the value that is most likely to lead to a successful test is a value at the boundary of a partition. None of the othe rs - Equivalence partitioning is a way of deriving test casesIts goal is to fix errors of the software system - It depends on finding partitions in the input an d output data sets and exercising the program with values from these partitionsI ts goal is to fix errors of the software system - Often, the value that is most likely to lead to a successful test is a value at the boundary of a partition.It s goal is to fix errors of the software system - None of the othersIts goal is t o fix errors of the software system answer: None of the others U23 - Q030 Which of the following are the testing process goals? The check that the software meets its requirements Discover faults or defects in the software A ll of the others - The check that the software meets its requirementsNone of the others - Discover faults or defects in the softwareNone of the others - All of the othersNone of the others answer: All of the others U23 - Q031 Which of the following statements about the differences between integ rating testing and component testing are true? The integrating testing tests the result of the component interaction The integrating testing test the result of the component while the component testing test its internal structure The compon ent testing tests the system's goals that will be applied to integrating system All of the others - The integrating testing tests the result of the component in teractionAll of the others - The integrating testing test the result of the comp onent while the component testing test its internal structureAll of the others -

The component testing tests the system's goals that will be applied to integrat ing systemAll of the others - All of the othersAll of the others answer: The integrating testing tests the result of the component interaction U23 - Q032 Which of the following statement about the two distinct phases of sys tem testing is NOT true? Integration testing where the components and subsystems making up the system are integrated and tested The integration team does NOT ha ve access to the source code of the system. Release testing where the version of the system to be released to users is tested. The release testing team treat th e system as a black-box while testing None of the others - Integration testing w here the components and subsystems making up the system are integrated and teste dThe integrating testing tests the result of the component interaction - The int egration team does NOT have access to the source code of the system.The integrat ing testing tests the result of the component interaction - Release testing wher e the version of the system to be released to users is tested.The integrating te sting tests the result of the component interaction - The release testing team t reat the system as a black-box while testingThe integrating testing tests the re sult of the component interaction - None of the othersThe integrating testing te sts the result of the component interaction answer: The integration team does NOT have access to the source code of the syst em. U23 - Q036 Who is mainly responsible for the component (unit) testing? System in tegrator Project manager Developer Tester - System integratorThe integration tea m does NOT have access to the source code of the system. - Project managerThe in tegration team does NOT have access to the source code of the system. - Develope rThe integration team does NOT have access to the source code of the system. - T esterThe integration team does NOT have access to the source code of the system. answer: Developer U23 - Q037 What is the purpose of defect testing? To discover faults that make s oftwares behavior incorrect To verify that the software meet its requirements To ensure about the performance of the software To test individual program componen ts - To discover faults that make softwares behavior incorrectDeveloper - To veri fy that the software meet its requirementsDeveloper - To ensure about the perfor mance of the softwareDeveloper - To test individual program componentsDeveloper answer: To discover faults that make softwares behavior incorrect U23 - Q038 Which of the followings belong to component testing? Testing of indiv idual program components Usually the responsibility of the component developer T ests are derived from the developers experience The responsibility of an independ ent testing team Testing of groups of components integrated to create a system o r sub-system - Testing of individual program componentsTo discover faults that m ake softwares behavior incorrect - Usually the responsibility of the component de veloperTo discover faults that make softwares behavior incorrect - Tests are deri ved from the developers experienceTo discover faults that make softwares behavior incorrect - The responsibility of an independent testing teamTo discover faults that make softwares behavior incorrect - Testing of groups of components integrat ed to create a system or sub-systemTo discover faults that make softwares behavio r incorrect answer: Testing of individual program componentsUsually the responsibility of th e component developerTests are derived from the developers experience U23 - Q039 What are the goals of validation testing? To demonstrate to the devel oper and the system customer that the software meets its requirements Shows that the system operates as intended To discover faults or defects in the software w here its behavior is incorrect or not in conformance with its specification Expo ses the defects in the system - To demonstrate to the developer and the system c ustomer that the software meets its requirementsTesting of individual program co mponentsUsually the responsibility of the component developerTests are derived f rom the developers experience - Shows that the system operates as intendedTesting of individual program componentsUsually the responsibility of the component dev eloperTests are derived from the developers experience - To discover faults or de

fects in the software where its behavior is incorrect or not in conformance with its specificationTesting of individual program componentsUsually the responsibi lity of the component developerTests are derived from the developers experience Exposes the defects in the systemTesting of individual program componentsUsuall y the responsibility of the component developerTests are derived from the develo pers experience answer: To demonstrate to the developer and the system customer that the softwar e meets its requirementsShows that the system operates as intended U23-Q045 Select incorrect statements about Unit testing Sometime called black-bo x testing. Derivation of test cases according to program structure. Knowledge of the program is used to identify additional test cases. Objective is to exercise all program statements - Sometime called black-box testing.To demonstrate to th e developer and the system customer that the software meets its requirementsShow s that the system operates as intended - Derivation of test cases according to p rogram structure.To demonstrate to the developer and the system customer that th e software meets its requirementsShows that the system operates as intended - Kn owledge of the program is used to identify additional test cases.To demonstrate to the developer and the system customer that the software meets its requirement sShows that the system operates as intended - Objective is to exercise all progr am statementsTo demonstrate to the developer and the system customer that the so ftware meets its requirementsShows that the system operates as intended answer: Sometime called black-box testing. U23-Q046 Who has responsible for component testing? Developers Testers Customers Testers and Customers - DevelopersSometime called black-box testing. - TestersS ometime called black-box testing. - CustomersSometime called black-box testing. - Testers and CustomersSometime called black-box testing. answer: Developers U29 - Q.043 New versions of software systems are created as they change: For dif ferent machines/OS Offering different functionality Tailored for particular user requirements All of the others - For different machines/OSDevelopers - Offering different functionalityDevelopers - Tailored for particular user requirementsDe velopers - All of the othersDevelopers answer: All of the others U29 - Q.044 What should we do first when we receive a change request from out cu stomer? Submit change request to Change Control Board Analyse the change request Make changes to the software Fill in the change request form - Submit change re quest to Change Control BoardAll of the others - Analyse the change requestAll o f the others - Make changes to the softwareAll of the others - Fill in the chang e request formAll of the others answer: Fill in the change request form U29 - Q.047 How is variant of a system? An instance of a system which is functio nally distinct in some way from other system instances An instance of a system w hich is distributed to users outside of the development team A demostration An i nstance of a system which is functionally identical but non-functionally distinc t from other instances of a system - An instance of a system which is functional ly distinct in some way from other system instancesFill in the change request fo rm - An instance of a system which is distributed to users outside of the develo pment teamFill in the change request form - A demostrationFill in the change req uest form - An instance of a system which is functionally identical but non-func tionally distinct from other instances of a systemFill in the change request for m answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q.048 How is release of a system? An instance of a system which is functio nally distinct in some way from other system instances A demostration An instanc e of a system which is functionally identical but non-functionally distinct from other instances of a system An instance of a system which is distributed to use rs outside of the development team - An instance of a system which is functional ly distinct in some way from other system instancesAn instance of a system which is functionally identical but non-functionally distinct from other instances of

a system - A demostrationAn instance of a system which is functionally identica l but non-functionally distinct from other instances of a system - An instance o f a system which is functionally identical but non-functionally distinct from ot her instances of a systemAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - An instance of a system which is distributed to users outside of the development teamAn instan ce of a system which is functionally identical but non-functionally distinct fro m other instances of a system answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q.049 The student management system was completed with two functions, mana ging student information and organizing quizes for review, after that the custom er added one more function, organizing online examination. Finally all of them a re put into the configuration management and are built for system testing, so wh at is the build called? Variant Delta Release Version - VariantAn instance of a system which is distributed to users outside of the development team - DeltaAn i nstance of a system which is distributed to users outside of the development tea m - ReleaseAn instance of a system which is distributed to users outside of the development team - VersionAn instance of a system which is distributed to users outside of the development team answer: Version U29 - Q.050 The student management system was completed and now it is needed to improve performance in case organizing online examination. After improvement was completed and was put into the configuration management, what is it called? Ver sion Delta Release Variant - VersionVersion - DeltaVersion - ReleaseVersion - Va riantVersion answer: Variant U29 - Q.051 The CM database stored configuration items as below, and now the cus tomer changes requirement A, so what will be affected by this change? 1. CMS / r equirement A / class 1 / function a 2. CMS / requirement A / class 2 / function b 3. CMS / requirement A / class 2 / function c 4. CMS / requirement B / class 1 / function e / function b 5. CMS / requirement B / class 3 / function d / funct ion a 6. CMS / requirement C / class 4 / function f / function g class 1, class 2 function a, function b, function c class 1, class 2, class 3, class 4 class 1, class 2, class 3 - class 1, class 2Variant - function a, function b, function c Variant - class 1, class 2, class 3, class 4Variant - class 1, class 2, class 3V ariant answer: class 1, class 2, class 3 U29 - Q001 Why is the configuration management applied? Aim to control the costs and effort involved in making changes to a system Make the product development more quality Support to evolve software product Make necessary configurations fo r preparing software development environment - Aim to control the costs and effo rt involved in making changes to a systemclass 1, class 2, class 3 - Make the pr oduct development more qualityclass 1, class 2, class 3 - Support to evolve soft ware productclass 1, class 2, class 3 - Make necessary configurations for prepar ing software development environmentclass 1, class 2, class 3 answer: Aim to control the costs and effort involved in making changes to a syst emMake the product development more qualitySupport to evolve software product U29 - Q002 Which development phases are included in the configuration management plan? Design Implementation Testing Deployment - DesignAim to control the costs and effort involved in making changes to a systemMake the product development m ore qualitySupport to evolve software product - ImplementationAim to control the costs and effort involved in making changes to a systemMake the product develop ment more qualitySupport to evolve software product - TestingAim to control the costs and effort involved in making changes to a systemMake the product developm ent more qualitySupport to evolve software product - DeploymentAim to control th e costs and effort involved in making changes to a systemMake the product develo pment more qualitySupport to evolve software product answer: DesignImplementationTesting U29 - Q003 Which information are included in the component header? Project name

Author of the component and creation date Version number and what were changed P re-conditions and post conditions - Project nameDesignImplementationTesting - Au thor of the component and creation dateDesignImplementationTesting - Version num ber and what were changedDesignImplementationTesting - Pre-conditions and post c onditionsDesignImplementationTesting answer: Project nameAuthor of the component and creation dateVersion number and what were changed U29 - Q004 Which of the following is not considered one of the four important el ements that should exist when a configuration management system is developed? Co mponent elements Human elements Process elements Validation elements - Component elementsProject nameAuthor of the component and creation dateVersion number and what were changed - Human elementsProject nameAuthor of the component and creat ion dateVersion number and what were changed - Process elementsProject nameAutho r of the component and creation dateVersion number and what were changed - Valid ation elementsProject nameAuthor of the component and creation dateVersion numbe r and what were changed answer: Human elements U29 - Q005 Which of the following tasks is not part of software configuration ma nagement? Change control Eporting Statistical quality control Version control Change controlHuman elements - EportingHuman elements - Statistical quality cont rolHuman elements - Version controlHuman elements answer: Statistical quality control U29 - Q006 What are the objectives of change management procedures? Analyzing th e costs and benefits of proposed changes Approving changes that are worthwhile T racking which components of the system have been changed To prevent customer req uirement change - Analyzing the costs and benefits of proposed changesStatistica l quality control - Approving changes that are worthwhileStatistical quality con trol - Tracking which components of the system have been changedStatistical qual ity control - To prevent customer requirement changeStatistical quality control answer: Analyzing the costs and benefits of proposed changesApproving changes th at are worthwhileTracking which components of the system have been changed U29 - Q007 When software configuration management is a formal activity, the soft ware configuration audit is conducted by the Development team Quality assurance group Senior managers Testing specialists - Development teamAnalyzing the costs and benefits of proposed changesApproving changes that are worthwhileTracking wh ich components of the system have been changed - Quality assurance groupAnalyzin g the costs and benefits of proposed changesApproving changes that are worthwhil eTracking which components of the system have been changed - Senior managersAnal yzing the costs and benefits of proposed changesApproving changes that are worth whileTracking which components of the system have been changed - Testing special istsAnalyzing the costs and benefits of proposed changesApproving changes that a re worthwhileTracking which components of the system have been changed answer: Quality assurance group U29 - Q008 What are the two types of CM workbench? Open workbenches Integrated w orkbenches Development workbenches - Open workbenchesQuality assurance group - I ntegrated workbenchesQuality assurance group - Development workbenchesQuality as surance group answer: Open workbenchesIntegrated workbenches U29 - Q009 What are three basic techniques for component identification? Version numbering Attribute-based identification Change-oriented identification Methodbased identification - Version numberingOpen workbenchesIntegrated workbenches Attribute-based identificationOpen workbenchesIntegrated workbenches - Change-o riented identificationOpen workbenchesIntegrated workbenches - Method-based iden tificationOpen workbenchesIntegrated workbenches answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q010 What is NOT an objective of change management procedures? Analyzing t he costs and benefits of proposed changes Approving changes that are worthwhile Tracking which components of the system have been changed To prevent requirement

changes - Analyzing the costs and benefits of proposed changesVersion numbering Attribute-based identificationChange-oriented identification - Approving changes that are worthwhileVersion numberingAttribute-based identificationChange-orient ed identification - Tracking which components of the system have been changedVer sion numberingAttribute-based identificationChange-oriented identification - To prevent requirement changesVersion numberingAttribute-based identificationChange -oriented identification answer: To prevent requirement changes U29 - Q011 When software configuration management is a formal activity, the soft ware configuration audit is conducted by the... Development team Quality assuran ce group Senior managers Testing specialists - Development teamTo prevent requir ement changes - Quality assurance groupTo prevent requirement changes - Senior m anagersTo prevent requirement changes - Testing specialistsTo prevent requiremen t changes answer: Quality assurance group U29 - Q012 What is a version? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesQuality assurance group - An instance of a system whic h is functionally identical but non-functionally distinct from other instances o f a systemQuality assurance group - An instance of a system which is distributed to users outside of the development teamQuality assurance group answer: An instance of a system which is functionally distinct in some way from other system instances U29 - Q013 What is NOT a technique for component identification? Version numberi ng Attribute-based identification Change-oriented identification Function-based identification - Version numberingAn instance of a system which is functionally distinct in some way from other system instances - Attribute-based identificatio nAn instance of a system which is functionally distinct in some way from other s ystem instances - Change-oriented identificationAn instance of a system which is functionally distinct in some way from other system instances - Function-based identificationAn instance of a system which is functionally distinct in some way from other system instances answer: Function-based identification U29 - Q015 What is a release? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesFunction-based identification - An instance of a syste m which is functionally identical but non-functionally distinct from other insta nces of a systemFunction-based identification - An instance of a system which is distributed to users outside of the development teamFunction-based identificati on answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q016 What is a variant? An instance of a system which is functionally dist inct in some way from other system instances An instance of a system which is fu nctionally identical but non-functionally distinct from other instances of a sys tem An instance of a system which is distributed to users outside of the develop ment team - An instance of a system which is functionally distinct in some way f rom other system instancesAn instance of a system which is distributed to users outside of the development team - An instance of a system which is functionally identical but non-functionally distinct from other instances of a systemAn insta nce of a system which is distributed to users outside of the development team An instance of a system which is distributed to users outside of the development teamAn instance of a system which is distributed to users outside of the develo pment team -

answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q017 All of the following are techniques for component identification EXCE PT Version numbering Attribute-based identification Change-oriented identificati on Function-based identification - Version numberingAn instance of a system whic h is functionally identical but non-functionally distinct from other instances o f a system - Attribute-based identificationAn instance of a system which is func tionally identical but non-functionally distinct from other instances of a syste m - Change-oriented identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - Funct ion-based identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system answer: Function-based identification U29 - Q019 The customer wants to make a change to the project scope. The best th ing for the project team to evaluate is the: effect of the change on scope plann ing effect of the change on the project scope effect of the change on the projec t schedule, cost, quality, and risks effect of the change on the project baselin es - effect of the change on scope planningFunction-based identification - effec t of the change on the project scopeFunction-based identification - effect of th e change on the project schedule, cost, quality, and risksFunction-based identif ication - effect of the change on the project baselinesFunction-based identifica tion answer: effect of the change on the project schedule, cost, quality, and risks U29 - Q020 Who reviews and approves the change requests? Project manager Project director General director Change control board - Project managereffect of the c hange on the project schedule, cost, quality, and risks - Project directoreffect of the change on the project schedule, cost, quality, and risks - General direc toreffect of the change on the project schedule, cost, quality, and risks - Chan ge control boardeffect of the change on the project schedule, cost, quality, and risks answer: Change control board U29 - Q021 Which is the right sequence of the change management process? (1) Ana lyze change request (2) Request change by completing a change request form (3) M ake changes to software (4) Submit request to change control board (5) Create ne w system version 1 `\Rightarrow` 5 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 2 2 `\Rightarrow` 1 `\Rightarrow` 3 `\Rightarrow` 4 `\Rightarrow` 5 2 `\Rightar row` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 2 `\Rightarrow` 1 `\Right arrow` 5 `\Rightarrow` 3 `\Rightarrow` 4 - 1 `\Rightarrow` 5 `\Rightarrow` 4 `\R ightarrow` 3 `\Rightarrow` 2Change control board - 2 `\Rightarrow` 1 `\Rightarro w` 3 `\Rightarrow` 4 `\Rightarrow` 5Change control board - 2 `\Rightarrow` 1 `\R ightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5Change control board - 2 `\Rightarro w` 1 `\Rightarrow` 5 `\Rightarrow` 3 `\Rightarrow` 4Change control board answer: 2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 U29 - Q023 The change requests should be reviewed and approved by Project manage r Project director General director Change control board - Project manager2 `\Ri ghtarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - Project director2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - General direct or2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 - Change con trol board2 `\Rightarrow` 1 `\Rightarrow` 4 `\Rightarrow` 3 `\Rightarrow` 5 answer: Change control board U29 - Q024 Which of the following statements belong to system release? An instan ce of a system which is functionally distinct in some way from other system inst ances An instance of a system which is functionally identical but non-functional ly distinct from other instances of a system An instance of a system which is di stributed to users outside of the development team - An instance of a system whi ch is functionally distinct in some way from other system instancesChange contro l board - An instance of a system which is functionally identical but non-functi onally distinct from other instances of a systemChange control board - An instan ce of a system which is distributed to users outside of the development teamChan ge control board -

answer: An instance of a system which is distributed to users outside of the dev elopment team U29 - Q025 Which of the following statements belong to system variant? An instan ce of a system which is functionally distinct in some way from other system inst ances An instance of a system which is functionally identical but non-functional ly distinct from other instances of a system An instance of a system which is di stributed to users outside of the development team - An instance of a system whi ch is functionally distinct in some way from other system instancesAn instance o f a system which is distributed to users outside of the development team - An in stance of a system which is functionally identical but non-functionally distinct from other instances of a systemAn instance of a system which is distributed to users outside of the development team - An instance of a system which is distri buted to users outside of the development teamAn instance of a system which is d istributed to users outside of the development team answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system U29 - Q026 List techniques that can be used for component identification Version numbering Attribute-based identification Change-oriented identification Functio n - based identification - Version numberingAn instance of a system which is fun ctionally identical but non-functionally distinct from other instances of a syst em - Attribute-based identificationAn instance of a system which is functionally identical but non-functionally distinct from other instances of a system - Chan ge-oriented identificationAn instance of a system which is functionally identica l but non-functionally distinct from other instances of a system - Function - ba sed identificationAn instance of a system which is functionally identical but no n-functionally distinct from other instances of a system answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q028 What is meant by configuration management? The development and use of standards and procedures for managing an evolving software system Configuration management is concerned with ensuring that software has a low number of defects and that it reaches the required standards of maintainability, reliability, and portability and so on. All of the others - The development and use of standards and procedures for managing an evolving software systemVersion numberingAttribu te-based identificationChange-oriented identification - Configuration management is concerned with ensuring that software has a low number of defects and that i t reaches the required standards of maintainability, reliability, and portabilit y and so on.Version numberingAttribute-based identificationChange-oriented ident ification - All of the othersVersion numberingAttribute-based identificationChan ge-oriented identification answer: The development and use of standards and procedures for managing an evol ving software system U29 - Q029 Change request is proposal due to ______ Customers Developers Market forces All of the others - CustomersThe development and use of standards and pro cedures for managing an evolving software system - DevelopersThe development and use of standards and procedures for managing an evolving software system - Mark et forcesThe development and use of standards and procedures for managing an evo lving software system - All of the othersThe development and use of standards an d procedures for managing an evolving software system answer: All of the others U29 - Q036 What are the objectives of change management procedures? Analyzing th e costs and benefits of proposed changes Approving changes that are worthwhile T racking which components of the system have been changed To prevent customer req uirement change - Analyzing the costs and benefits of proposed changesAll of the others - Approving changes that are worthwhileAll of the others - Tracking whic h components of the system have been changedAll of the others - To prevent custo mer requirement changeAll of the others answer: Analyzing the costs and benefits of proposed changesApproving changes th at are worthwhileTracking which components of the system have been changed U29 - Q037 What are three basic techniques for component identification? Version

numbering Attribute-based identification Change-oriented identification Method based identification - Version numberingAnalyzing the costs and benefits of prop osed changesApproving changes that are worthwhileTracking which components of th e system have been changed - Attribute-based identificationAnalyzing the costs a nd benefits of proposed changesApproving changes that are worthwhileTracking whi ch components of the system have been changed - Change-oriented identificationAn alyzing the costs and benefits of proposed changesApproving changes that are wor thwhileTracking which components of the system have been changed - Method based identificationAnalyzing the costs and benefits of proposed changesApproving chan ges that are worthwhileTracking which components of the system have been changed answer: Version numberingAttribute-based identificationChange-oriented identific ation U29 - Q038 New versions of software systems are created as they change: For diff erent machines/OS Offering different functionality Tailored for particular user requirements All of the others None of the others - For different machines/OSVer sion numberingAttribute-based identificationChange-oriented identification - Off ering different functionalityVersion numberingAttribute-based identificationChan ge-oriented identification - Tailored for particular user requirementsVersion nu mberingAttribute-based identificationChange-oriented identification - All of the othersVersion numberingAttribute-based identificationChange-oriented identifica tion - None of the othersVersion numberingAttribute-based identificationChange-o riented identification answer: All of the others U29 - Q039 Which of the following statements about configuration management (CM) are true? CM should always be based on a set of standards which are applied wit hin an organisation The standards should define how items are identified; how ch anges are controlled and how new versions are managed. Some existing standards a re based on a waterfall process model - new CM standards are needed for evolutio nary development Standards can be based on external CM standards only - CM shoul d always be based on a set of standards which are applied within an organisation All of the others - The standards should define how items are identified; how ch anges are controlled and how new versions are managed.All of the others - Some e xisting standards are based on a waterfall process model - new CM standards are needed for evolutionary developmentAll of the others - Standards can be based on external CM standards onlyAll of the others answer: CM should always be based on a set of standards which are applied within an organisationThe standards should define how items are identified; how change s are controlled and how new versions are managed.Some existing standards are ba sed on a waterfall process model - new CM standards are needed for evolutionary development U29-Q045 Which artifacts are included in system releases? Executable code, data, configuration files and documentation. Executable code, data and documentation. Software product, data, configuration files and documentation. Software product , data and documentation. - Executable code, data, configuration files and docum entation.CM should always be based on a set of standards which are applied withi n an organisationThe standards should define how items are identified; how chang es are controlled and how new versions are managed.Some existing standards are b ased on a waterfall process model - new CM standards are needed for evolutionary development - Executable code, data and documentation.CM should always be based on a set of standards which are applied within an organisationThe standards sho uld define how items are identified; how changes are controlled and how new vers ions are managed.Some existing standards are based on a waterfall process model - new CM standards are needed for evolutionary development - Software product, d ata, configuration files and documentation.CM should always be based on a set of standards which are applied within an organisationThe standards should define h ow items are identified; how changes are controlled and how new versions are man aged.Some existing standards are based on a waterfall process model - new CM sta ndards are needed for evolutionary development - Software product, data and docu mentation.CM should always be based on a set of standards which are applied with

in an organisationThe standards should define how items are identified; how chan ges are controlled and how new versions are managed.Some existing standards are based on a waterfall process model - new CM standards are needed for evolutionar y development answer: Executable code, data, configuration files and documentation. U29-Q045 Select key issues when designing a secure architecture Organizing the s tructure of system to protect assets Concentrating assets to minimize losses Bui ld minimize system to avoid big damage when attacked. All of the others - Organi zing the structure of system to protect assetsExecutable code, data, configurati on files and documentation. - Concentrating assets to minimize lossesExecutable code, data, configuration files and documentation. - Build minimize system to av oid big damage when attacked.Executable code, data, configuration files and docu mentation. - All of the othersExecutable code, data, configuration files and doc umentation. answer: Organizing the structure of system to protect assets U30 - Q.043 ______security is a software engineering problem where the system is designed to resist attacks. Infrastructure Maintain None of the others Applicat ion - InfrastructureOrganizing the structure of system to protect assets - Maint ainOrganizing the structure of system to protect assets - None of the othersOrga nizing the structure of system to protect assets - ApplicationOrganizing the str ucture of system to protect assets answer: Application U30 - Q.044 Which of the followings belong to "Vulnerability" The possible loss or harm that could result from a successful attack. This can be loss or damage t o data or can be a loss of time and effort if recovery is necessary after a secu rity breach. An exploitation of a system's vulnerability. Generally, this is fro m outside the system and is a deliberate attempt to cause some damage. A protect ive measure that reduces a system's vulnerability. Encryption would be an exampl e of a control that reduced a vulnerability of a weak access control system. A w eakness in a computer-based system that may be exploited to cause loss or harm. - The possible loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is ne cessary after a security breach.Application - An exploitation of a system's vuln erability. Generally, this is from outside the system and is a deliberate attemp t to cause some damage.Application - A protective measure that reduces a system' s vulnerability. Encryption would be an example of a control that reduced a vuln erability of a weak access control system.Application - A weakness in a computer -based system that may be exploited to cause loss or harm.Application answer: A weakness in a computer-based system that may be exploited to cause los s or harm. U30 - Q.047 What fundamental issue must be considered when designing system arch itecture for security? How the critical assets should be processed How system co mponents are arranged on the architecture to against external attack Graphic use r interface should be checked carefully to prevent malicious input data The syst em assets should be distributed - How the critical assets should be processedA w eakness in a computer-based system that may be exploited to cause loss or harm. - How system components are arranged on the architecture to against external att ackA weakness in a computer-based system that may be exploited to cause loss or harm. - Graphic user interface should be checked carefully to prevent malicious input dataA weakness in a computer-based system that may be exploited to cause l oss or harm. - The system assets should be distributedA weakness in a computer-b ased system that may be exploited to cause loss or harm. answer: The system assets should be distributed U30 - Q.048 Which level of protection that might be used to prevent malicious ac cesses to the database? Platform level Record level Infrastructure level Applica tion level - Platform levelThe system assets should be distributed - Record leve lThe system assets should be distributed - Infrastructure levelThe system assets should be distributed - Application levelThe system assets should be distribute d answer: Application level

U30 - Q.049 When apply security control for the CMS system, which action is done first? The system should be equipped 1 secure login page All data should be enc oded Investigating gaps of the system which can be attacked All student informat ion needs to be evaluated and defines which ones are protected - The system shou ld be equipped 1 secure login pageApplication level - All data should be encoded Application level - Investigating gaps of the system which can be attackedApplic ation level - All student information needs to be evaluated and defines which on es are protectedApplication level answer: All student information needs to be evaluated and defines which ones are protected U30 - Q.050 How to build security for the CMS system? Validating all user input values Using highest security technologies such as biometric technology Using en cryption algorithm for all data Building system authentication, record accessed authorisation and database authorisation - Validating all user input valuesAll s tudent information needs to be evaluated and defines which ones are protected Using highest security technologies such as biometric technologyAll student info rmation needs to be evaluated and defines which ones are protected - Using encry ption algorithm for all dataAll student information needs to be evaluated and de fines which ones are protected - Building system authentication, record accessed authorisation and database authorisationAll student information needs to be eva luated and defines which ones are protected answer: Building system authentication, record accessed authorisation and databa se authorisation U30 - Q.051 In the Patient information management system at 1 hospital, when the system is started, list of patients as well as their information are downloaded to a secure area on the system client that is used by hospital staff to prevent the staffs connect to the server many times all day, and all patient informatio n will be updated back to server at the end of day as well as they were deleted from the system client. So which case is not security in the system? The patient information at the system client will be accessed by unauthorised user The staf f forgot updating patient information to server at the end of day The staff forg ot deleting patient information from the system client The system client is fail ed while working - The patient information at the system client will be accessed by unauthorised userBuilding system authentication, record accessed authorisati on and database authorisation - The staff forgot updating patient information to server at the end of dayBuilding system authentication, record accessed authori sation and database authorisation - The staff forgot deleting patient informatio n from the system clientBuilding system authentication, record accessed authoris ation and database authorisation - The system client is failed while workingBuil ding system authentication, record accessed authorisation and database authorisa tion answer: The system client is failed while working U30 - Q001 What are the security risk management concerned? Assessing the possib le losses that might ensue from attacks on the system Balancing the possible los ses against the costs of security procedures that may reduce these losses Assess ing the life cycle of risks Analyse assets of the system - Assessing the possibl e losses that might ensue from attacks on the systemThe system client is failed while working - Balancing the possible losses against the costs of security proc edures that may reduce these lossesThe system client is failed while working - A ssessing the life cycle of risksThe system client is failed while working - Anal yse assets of the systemThe system client is failed while working answer: Assessing the possible losses that might ensue from attacks on the syste mBalancing the possible losses against the costs of security procedures that may reduce these losses U30 - Q002 How are analyse assets of the system? Identify system resources that have a value and have to be protected Set level of value of each asset Set the l evel of exposure of each asset Set level of vulnerabilities of each asset - Iden tify system resources that have a value and have to be protectedAssessing the po ssible losses that might ensue from attacks on the systemBalancing the possible losses against the costs of security procedures that may reduce these losses - S

et level of value of each assetAssessing the possible losses that might ensue fr om attacks on the systemBalancing the possible losses against the costs of secur ity procedures that may reduce these losses - Set the level of exposure of each assetAssessing the possible losses that might ensue from attacks on the systemBa lancing the possible losses against the costs of security procedures that may re duce these losses - Set level of vulnerabilities of each assetAssessing the poss ible losses that might ensue from attacks on the systemBalancing the possible lo sses against the costs of security procedures that may reduce these losses answer: Identify system resources that have a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset U30 - Q003 What are the design guidelines to make the secure system? Raise aware mess of the security issues Consider as basic of a review checklist that is appl ied during the system validation process Process guidance to develop the system more secure Coding techniques to make the system more secure - Raise awaremess o f the security issuesIdentify system resources that have a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset - Consider as basic of a review checklist that is applied during the system val idation processIdentify system resources that have a value and have to be protec tedSet level of value of each assetSet the level of exposure of each asset - Pro cess guidance to develop the system more secureIdentify system resources that ha ve a value and have to be protectedSet level of value of each assetSet the level of exposure of each asset - Coding techniques to make the system more secureIde ntify system resources that have a value and have to be protectedSet level of va lue of each assetSet the level of exposure of each asset answer: Raise awaremess of the security issuesConsider as basic of a review chec klist that is applied during the system validation process U30 - Q004 What is the first layer of system layers? Application Reusable compon ents and libraries Middleware Operation system - ApplicationRaise awaremess of t he security issuesConsider as basic of a review checklist that is applied during the system validation process - Reusable components and librariesRaise awaremes s of the security issuesConsider as basic of a review checklist that is applied during the system validation process - MiddlewareRaise awaremess of the security issuesConsider as basic of a review checklist that is applied during the system validation process - Operation systemRaise awaremess of the security issuesCons ider as basic of a review checklist that is applied during the system validation process answer: Application U30 - Q005 What is the last layer of system layers? Application Reusable compone nts and libraries Middleware Operation system - ApplicationApplication - Reusabl e components and librariesApplication - MiddlewareApplication - Operation system Application answer: Operation system U30 - Q006 Why do we need consider security for project? Security is a part of S oftware process To allow administrators manage user To have good architecture de sign To protect the system against external attack - Security is a part of Softw are processOperation system - To allow administrators manage userOperation syste m - To have good architecture designOperation system - To protect the system aga inst external attackOperation system answer: To protect the system against external attack U30 - Q007 Consider security design for username and password protection, what a re two good designs? (select two) System users are authenticated using a login n ame/password combination. No other authentication method is supported Requires u ser change password after 2 months Username can be any characters Password can b e blank - System users are authenticated using a login name/password combination . No other authentication method is supportedTo protect the system against exter nal attack - Requires user change password after 2 monthsTo protect the system a gainst external attack - Username can be any charactersTo protect the system aga inst external attack - Password can be blankTo protect the system against extern al attack answer: System users are authenticated using a login name/password combination.

No other authentication method is supportedRequires user change password after 2 months U30 - Q008 Define the security terms 'attack' A weakness in a computer-based sys tem that may be exploited to cause loss or harm The possible loss or harm that c ould result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A n exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a comput er-based system that may be exploited to cause loss or harmSystem users are auth enticated using a login name/password combination. No other authentication metho d is supportedRequires user change password after 2 months - The possible loss o r harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a secur ity breach.System users are authenticated using a login name/password combinatio n. No other authentication method is supportedRequires user change password afte r 2 months - An exploitation of a system's vulnerability. Generally, this is fro m outside the system and is a deliberate attempt to cause some damageSystem user s are authenticated using a login name/password combination. No other authentica tion method is supportedRequires user change password after 2 months answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q009 What are the three levels of protection that might be used in an info rmation system? Platform-level protection Application-level protection Record-le vel protection Environment-level protection - Platform-level protectionAn exploi tation of a system's vulnerability. Generally, this is from outside the system a nd is a deliberate attempt to cause some damage - Application-level protectionAn exploitation of a system's vulnerability. Generally, this is from outside the s ystem and is a deliberate attempt to cause some damage - Record-level protection An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - Environment-level pro tectionAn exploitation of a system's vulnerability. Generally, this is from outs ide the system and is a deliberate attempt to cause some damage answer: Platform-level protectionApplication-level protectionRecord-level protec tion U30 - Q010 Why do we need to consider security for project? Security is a part o f Software process To allow administrators manage user To have good architecture design To protect the system against external attack - Security is a part of So ftware processPlatform-level protectionApplication-level protectionRecord-level protection - To allow administrators manage userPlatform-level protectionApplica tion-level protectionRecord-level protection - To have good architecture designP latform-level protectionApplication-level protectionRecord-level protection - To protect the system against external attackPlatform-level protectionApplicationlevel protectionRecord-level protection answer: To protect the system against external attack U30 - Q011 Which of the following design guidelines for secure systems engineeri ng is NOT true? Base security decisions on an explicit security policy. Avoid a single point of failure. Avoid using redundancy and diversity to reduce risk Use redundancy and diversity to reduce risk. Validate all inputs - Base security de cisions on an explicit security policy.To protect the system against external at tack - Avoid a single point of failure.To protect the system against external at tack - Avoid using redundancy and diversity to reduce riskTo protect the system against external attack - Use redundancy and diversity to reduce risk.To protect the system against external attack - Validate all inputsTo protect the system a gainst external attack answer: Avoid using redundancy and diversity to reduce risk U30 - Q012 What is the first stage in survivability analysis Review system requi rements and architecture. Identify critical services and components. Identify at tacks and compromisable components. Identify softspots and survivability strateg ies. - Review system requirements and architecture.Avoid using redundancy and di versity to reduce risk - Identify critical services and components.Avoid using r

edundancy and diversity to reduce risk - Identify attacks and compromisable comp onents.Avoid using redundancy and diversity to reduce risk - Identify softspots and survivability strategies.Avoid using redundancy and diversity to reduce risk answer: Review system requirements and architecture. U30 - Q013 Define the security terms 'attack' A weakness in a computer based sys tem that may be exploited to cause loss or harm The possible loss or harm that c ould result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A n exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a comput er based system that may be exploited to cause loss or harmReview system require ments and architecture. - The possible loss or harm that could result from a suc cessful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach.Review system requiremen ts and architecture. - An exploitation of a system's vulnerability. Generally, t his is from outside the system and is a deliberate attempt to cause some damageR eview system requirements and architecture. answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q014 All of the following are the complementary strategies to achieve surv ivability EXCEPT Resistance Recognition Recovery Conversion - ResistanceAn explo itation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecognitionAn exploitation of a system's vulnerability. Generally, this is from outside the system and is a d eliberate attempt to cause some damage - RecoveryAn exploitation of a system's v ulnerability. Generally, this is from outside the system and is a deliberate att empt to cause some damage - ConversionAn exploitation of a system's vulnerabilit y. Generally, this is from outside the system and is a deliberate attempt to cau se some damage answer: Conversion U30 - Q015 What is the last stage in survivability analysis? Review system requi rements and architecture. Identify critical services and components. Identify at tacks and compromisable components. Identify softspots and survivability strateg ies. - Review system requirements and architecture.Conversion - Identify critica l services and components.Conversion - Identify attacks and compromisable compon ents.Conversion - Identify softspots and survivability strategies.Conversion answer: Identify softspots and survivability strategies. U30 - Q019 Consider security design for username and password protection, what i s the good design? System users are authenticated using a login name/password co mbination. Requires user change password after 2 months Requires user change pas sword after 2 months, Username can be any characters Username can be any charact ers, Password can be blank Username and Password cannot be blank, Username can b e any characters - System users are authenticated using a login name/password co mbination. Requires user change password after 2 monthsIdentify softspots and su rvivability strategies. - Requires user change password after 2 months, Username can be any charactersIdentify softspots and survivability strategies. - Usernam e can be any characters, Password can be blankIdentify softspots and survivabili ty strategies. - Username and Password cannot be blank, Username can be any char actersIdentify softspots and survivability strategies. answer: System users are authenticated using a login name/password combination. Requires user change password after 2 months U30 - Q020 Which is NOT the security requirement of the CMS (CMS of FPT Universi ty) system? Only teacher can upload training materials Password shall contains c haracters, numbers and special characters Allow administrator to create new user Use bright color in front pages - Only teacher can upload training materialsSys tem users are authenticated using a login name/password combination. Requires us er change password after 2 months - Password shall contains characters, numbers and special charactersSystem users are authenticated using a login name/password combination. Requires user change password after 2 months - Allow administrator

to create new userSystem users are authenticated using a login name/password co mbination. Requires user change password after 2 months - Use bright color in fr ont pagesSystem users are authenticated using a login name/password combination. Requires user change password after 2 months answer: Use bright color in front pages U30 - Q021 Which are levels of protection in application security engineering? ( Choose one) Platform-level, Application-level, Record-level Windows-level, Appli cation-level, Database-level Unix-level, Application-level, Database-level Linux -level, Application-level, Record-level - Platform-level, Application-level, Rec ord-levelUse bright color in front pages - Windows-level, Application-level, Dat abase-levelUse bright color in front pages - Unix-level, Application-level, Data base-levelUse bright color in front pages - Linux-level, Application-level, Reco rd-levelUse bright color in front pages answer: Platform-level, Application-level, Record-level U30 - Q023 Which of the following definitions belong to terms 'attack' A weaknes s in a computer based system that may be exploited to cause loss or harm The pos sible loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary a fter a security breach. An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - A weakness in a computer based system that may be exploited to cause loss or harmPlatform-level, Application-level, Record-level - The possible loss or harm that could result from a successful attack. This can be loss or damage to data o r can be a loss of time and effort if recovery is necessary after a security bre ach.Platform-level, Application-level, Record-level - An exploitation of a syste m's vulnerability. Generally, this is from outside the system and is a deliberat e attempt to cause some damagePlatform-level, Application-level, Record-level answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage U30 - Q024 List the complementary strategies to achieve survivability EXCEPT Res istance Recognition Recovery Conversion - ResistanceAn exploitation of a system' s vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecognitionAn exploitation of a system's vulnerab ility. Generally, this is from outside the system and is a deliberate attempt to cause some damage - RecoveryAn exploitation of a system's vulnerability. Genera lly, this is from outside the system and is a deliberate attempt to cause some d amage - ConversionAn exploitation of a system's vulnerability. Generally, this i s from outside the system and is a deliberate attempt to cause some damage answer: ResistanceRecognitionRecovery U30 - Q025 What is the second stage in survivability analysis Review system requ irements and architecture. Identify critical services and components. Identify a ttacks and compromisable components. Identify softspots and survivability strate gies. - Review system requirements and architecture.ResistanceRecognitionRecover y - Identify critical services and components.ResistanceRecognitionRecovery - Id entify attacks and compromisable components.ResistanceRecognitionRecovery - Iden tify softspots and survivability strategies.ResistanceRecognitionRecovery answer: Identify critical services and components. U30 - Q028 What is application security? Application security is a software engi neering problem where the system is designed to resist attacks Application secur ity is a systems management problem where the infrastructure is configured to re sist attacks. All of the others - Application security is a software engineering problem where the system is designed to resist attacksIdentify critical service s and components. - Application security is a systems management problem where t he infrastructure is configured to resist attacks.Identify critical services and components. - All of the othersIdentify critical services and components. answer: Application security is a software engineering problem where the system is designed to resist attacks U30 - Q029 Which of the following statements about security is NOT true? Securit y engineering focuses on how to develop and maintain software systems that can r esist malicious attacks that are intended to damage a computer-based system or i

ts data Security threats can be threats to the only confidentiality and integrit y of a system or its data. Security risk management involves assessing the losse s that might ensue from attacks on a system and deriving security requirements t hat are aimed at eliminating or reducing these losses. None of the others - Secu rity engineering focuses on how to develop and maintain software systems that ca n resist malicious attacks that are intended to damage a computer-based system o r its dataApplication security is a software engineering problem where the syste m is designed to resist attacks - Security threats can be threats to the only co nfidentiality and integrity of a system or its data.Application security is a so ftware engineering problem where the system is designed to resist attacks - Secu rity risk management involves assessing the losses that might ensue from attacks on a system and deriving security requirements that are aimed at eliminating or reducing these losses.Application security is a software engineering problem wh ere the system is designed to resist attacks - None of the othersApplication sec urity is a software engineering problem where the system is designed to resist a ttacks answer: Security threats can be threats to the only confidentiality and integrit y of a system or its data. U30 - Q036 Define the security terms attack A weakness in a computerbased system th at may be exploited to cause loss or harm The possible loss or harm that could r esult from a successful attack. This can be loss or damage to data or can be a l oss of time and effort if recovery is necessary after a security breach. An expl oitation of a systems vulnerability. Generally, this is from outside the system a nd is a deliberate attempt to cause some damage - A weakness in a computerbased s ystem that may be exploited to cause loss or harmSecurity threats can be threats to the only confidentiality and integrity of a system or its data. - The possib le loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary afte r a security breach.Security threats can be threats to the only confidentiality and integrity of a system or its data. - An exploitation of a systems vulnerabili ty. Generally, this is from outside the system and is a deliberate attempt to ca use some damageSecurity threats can be threats to the only confidentiality and i ntegrity of a system or its data. answer: An exploitation of a systems vulnerability. Generally, this is from outsi de the system and is a deliberate attempt to cause some damage U30 - Q037 What are the three levels of protection that might be used in an info rmation system? Platform-level protection Application-level protection Record-le vel protection Development level protection - Platform-level protectionAn exploi tation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage - Application-level protectionAn e xploitation of a systems vulnerability. Generally, this is from outside the syste m and is a deliberate attempt to cause some damage - Record-level protectionAn e xploitation of a systems vulnerability. Generally, this is from outside the syste m and is a deliberate attempt to cause some damage - Development level protectio nAn exploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage answer: Platform-level protectionApplication-level protectionRecord-level protec tion U30 - Q038 Which is the definition of the term Exposure? A system resource that ha s a value and has to be protected. The possible loss or harm that could result f rom a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploita tion of a systems vulnerability. Generally, this is from outside the system and i s a deliberate attempt to cause some damage. - A system resource that has a valu e and has to be protected.Platform-level protectionApplication-level protectionR ecord-level protection - The possible loss or harm that could result from a succ essful attack. This can be loss or damage to data or can be a loss of time and e ffort if recovery is necessary after a security breach.Platform-level protection Application-level protectionRecord-level protection - A weakness in a computer-b

ased system that may be exploited to cause loss or harm.Platform-level protectio nApplication-level protectionRecord-level protection - An exploitation of a syst ems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage.Platform-level protectionApplication-level protect ionRecord-level protection answer: The possible loss or harm that could result from a successful attack. Th is can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. U30 - Q039 Which is the definition of the term Attack? A system resource that has a value and has to be protected. The possible loss or harm that could result fro m a successful attack. This can be loss or damage to data or can be a loss of ti me and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to cause loss or harm. An exploitati on of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. - A system resource that has a value and has to be protected.The possible loss or harm that could result from a succe ssful attack. This can be loss or damage to data or can be a loss of time and ef fort if recovery is necessary after a security breach. - The possible loss or ha rm that could result from a successful attack. This can be loss or damage to dat a or can be a loss of time and effort if recovery is necessary after a security breach.The possible loss or harm that could result from a successful attack. Thi s can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. - A weakness in a computer-based system th at may be exploited to cause loss or harm.The possible loss or harm that could r esult from a successful attack. This can be loss or damage to data or can be a l oss of time and effort if recovery is necessary after a security breach. - An ex ploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage.The possible loss or harm that could result from a successful attack. This can be loss or damage to data or ca n be a loss of time and effort if recovery is necessary after a security breach. answer: An exploitation of a systems vulnerability. Generally, this is from outsi de the system and is a deliberate attempt to cause some damage. U30-Q045 What are the purposes of guidelines in secure systems design? They rais e awareness of security issues in a software engineering team. They can be used as the basis of a review checklist that is applied during the system validation process. All of the others - They raise awareness of security issues in a softwa re engineering team.An exploitation of a systems vulnerability. Generally, this i s from outside the system and is a deliberate attempt to cause some damage. - Th ey can be used as the basis of a review checklist that is applied during the sys tem validation process.An exploitation of a systems vulnerability. Generally, thi s is from outside the system and is a deliberate attempt to cause some damage. All of the othersAn exploitation of a systems vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage. answer: All of the others U30-Q046 Select key issue(s) when designing a secure architecture: Organizing th e structure of system to protect assets Concentrating assets to minimize losses Build minimize system to avoid big damage when attacked. All of the others - Org anizing the structure of system to protect assetsAll of the others - Concentrati ng assets to minimize lossesAll of the others - Build minimize system to avoid b ig damage when attacked.All of the others - All of the othersAll of the others answer: Organizing the structure of system to protect assets U31 - Q.043 A critical distinction between a service and a component as defined in CBSE is that services are independent and: Services do not have a 'requires' interface Services rely on message-based communication with messages expressed i n XML All of the others None of the others - Services do not have a 'requires' i nterfaceOrganizing the structure of system to protect assets - Services rely on message-based communication with messages expressed in XMLOrganizing the structu re of system to protect assets - All of the othersOrganizing the structure of sy stem to protect assets - None of the othersOrganizing the structure of system to

protect assets answer: All of the others U31 - Q.044 Which one is not a web service standard? SOAP WSDL UDDI SODP - SOAPA ll of the others - WSDLAll of the others - UDDIAll of the others - SODPAll of th e others answer: SODP U31 - Q.047 Which one is not a component of the WSDL specification? XML namespac e declarations Interface and message declarations Binding and ending declaration s Public method declarations - XML namespace declarationsSODP - Interface and me ssage declarationsSODP - Binding and ending declarationsSODP - Public method dec larationsSODP answer: Public method declarations U31 - Q.048 What information is maintained in a UDDI description? Design how to implement web service Guideline how to deploy web service Interfaces of a legacy system Information where to find the service's WSDL specification - Design how to implement web servicePublic method declarations - Guideline how to deploy web servicePublic method declarations - Interfaces of a legacy systemPublic method declarations - Information where to find the service's WSDL specificationPublic method declarations answer: Information where to find the service's WSDL specification U31 - Q.049 A resource management system is being run in the business, it includ es 3 primary functions, budget management, human management and production manag ement. Now the system needs to add 1 more function with changes and costs in lim itation, and web service is best solution, so how to do this? Creating workflow of services with 3 functions and new function Developing new function in the sep arate system as 1 service and connecting it to the current system Building new f unction as 1 website and the current system will connect to this Building servic e interfaces for 3 functions and new function - Creating workflow of services wi th 3 functions and new functionInformation where to find the service's WSDL spec ification - Developing new function in the separate system as 1 service and conn ecting it to the current systemInformation where to find the service's WSDL spec ification - Building new function as 1 website and the current system will conne ct to thisInformation where to find the service's WSDL specification - Building service interfaces for 3 functions and new functionInformation where to find the service's WSDL specification answer: Building service interfaces for 3 functions and new function U31 - Q.050 The Google map is a web service to be used in the weather system, wh ich method is used in testing the system? Unit testing Integration testing Accep tance testing System testing - Unit testingBuilding service interfaces for 3 fun ctions and new function - Integration testingBuilding service interfaces for 3 f unctions and new function - Acceptance testingBuilding service interfaces for 3 functions and new function - System testingBuilding service interfaces for 3 fun ctions and new function answer: System testing U31 - Q.051 What is problem when the Google map service, isused for the weather system at Vietnam, is tested? It must be paided for testing Service may be close d and there is no backup for it Testcases will be changed because service operat ions may be changed Internet traffic - It must be paided for testingSystem testi ng - Service may be closed and there is no backup for itSystem testing - Testcas es will be changed because service operations may be changedSystem testing - Int ernet trafficSystem testing answer: Internet traffic U31 - Q001 Which ones are the service-oriented architectures? A system where the components are stand-alone services Services may execute on different computers Protocols have been developed to support service communication and information exchange Model-View-Controller - A system where the components are stand-alone s ervicesInternet traffic - Services may execute on different computersInternet tr affic - Protocols have been developed to support service communication and infor mation exchangeInternet traffic - Model-View-ControllerInternet traffic answer: A system where the components are stand-alone servicesServices may execu

te on different computersProtocols have been developed to support service commun ication and information exchange U31 - Q002 Which phases are used for the service engineering? Identify candidate service Design service Implement service Test service - Identify candidate serv iceA system where the components are stand-alone servicesServices may execute on different computersProtocols have been developed to support service communicati on and information exchange - Design serviceA system where the components are st and-alone servicesServices may execute on different computersProtocols have been developed to support service communication and information exchange - Implement serviceA system where the components are stand-alone servicesServices may execu te on different computersProtocols have been developed to support service commun ication and information exchange - Test serviceA system where the components are stand-alone servicesServices may execute on different computersProtocols have b een developed to support service communication and information exchange answer: Identify candidate serviceDesign serviceImplement service U31 - Q003 What are the service testing problems? Non-functional behaviour of th e service is unpredictable External services may be modified by the service prov ider thus invalidating tests which have been completed Service testing is diffic ult as external services are 'black-boxes' Find defects and demonstrate that a s ystem meets its functional and non-functional requirements - Non-functional beha viour of the service is unpredictableIdentify candidate serviceDesign serviceImp lement service - External services may be modified by the service provider thus invalidating tests which have been completedIdentify candidate serviceDesign ser viceImplement service - Service testing is difficult as external services are 'b lack-boxes'Identify candidate serviceDesign serviceImplement service - Find defe cts and demonstrate that a system meets its functional and non-functional requir ementsIdentify candidate serviceDesign serviceImplement service answer: Non-functional behaviour of the service is unpredictableExternal service s may be modified by the service provider thus invalidating tests which have bee n completedService testing is difficult as external services are 'black-boxes' U31 - Q004 What is the last stage in service construction by composition? Formul ate outline workflow Discover services Refine workflow Create workflow program T est service - Formulate outline workflowNon-functional behaviour of the service is unpredictableExternal services may be modified by the service provider thus i nvalidating tests which have been completedService testing is difficult as exter nal services are 'black-boxes' - Discover servicesNon-functional behaviour of th e service is unpredictableExternal services may be modified by the service provi der thus invalidating tests which have been completedService testing is difficul t as external services are 'black-boxes' - Refine workflowNon-functional behavio ur of the service is unpredictableExternal services may be modified by the servi ce provider thus invalidating tests which have been completedService testing is difficult as external services are 'black-boxes' - Create workflow programNon-fu nctional behaviour of the service is unpredictableExternal services may be modif ied by the service provider thus invalidating tests which have been completedSer vice testing is difficult as external services are 'black-boxes' - Test serviceN on-functional behaviour of the service is unpredictableExternal services may be modified by the service provider thus invalidating tests which have been complet edService testing is difficult as external services are 'black-boxes' answer: Test service U31 - Q005 What is the output of "Refine workflow" in Construction by compositio n? Workflow design Executable workflow Service list Deployable service Service s pecification - Workflow designTest service - Executable workflowTest service - S ervice listTest service - Deployable serviceTest service - Service specification Test service answer: Workflow design U31 - Q006 What does Web service description language (WSDL) define? What operat ions the service supports How the service is accessed Where the service is locat ed How the service is implemented - What operations the service supportsWorkflow design - How the service is accessedWorkflow design - Where the service is loca tedWorkflow design - How the service is implementedWorkflow design -

answer: What operations the service supportsHow the service is accessedWhere the service is located U31 - Q007 What are the three stages in service interface design? Logical interf ace design Message design Method design WSDL development - Logical interface des ignWhat operations the service supportsHow the service is accessedWhere the serv ice is located - Message designWhat operations the service supportsHow the servi ce is accessedWhere the service is located - Method designWhat operations the se rvice supportsHow the service is accessedWhere the service is located - WSDL dev elopmentWhat operations the service supportsHow the service is accessedWhere the service is located answer: Logical interface designMessage designWSDL development U31 - Q008 What is the first stage in service construction by composition? Formu late outline workflow Discover services Select possible services Refine workflow Create workflow program - Formulate outline workflowLogical interface designMes sage designWSDL development - Discover servicesLogical interface designMessage d esignWSDL development - Select possible servicesLogical interface designMessage designWSDL development - Refine workflowLogical interface designMessage designWS DL development - Create workflow programLogical interface designMessage designWS DL development answer: Formulate outline workflow U31 - Q009 What are the components of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specificationFormulate outline workflow - The bindingFormulate outline workflow - The location partFormulate outline workflow - The service specificationFormula te outline workflow answer: The interface specificationThe bindingThe location part U31 - Q010 What is WSDL standard? A message exchange standard that supports serv ice communication This standard allows a service interface and its bindings to b e defined Defines the components of a service specification that may be used to discover the existence of a service A standard for workflow languages used to de fine service composition - A message exchange standard that supports service com municationThe interface specificationThe bindingThe location part - This standar d allows a service interface and its bindings to be definedThe interface specifi cationThe bindingThe location part - Defines the components of a service specifi cation that may be used to discover the existence of a serviceThe interface spec ificationThe bindingThe location part - A standard for workflow languages used t o define service compositionThe interface specificationThe bindingThe location p art answer: This standard allows a service interface and its bindings to be defined U31 - Q011 What is the first stage in service construction by composition? Formu late outline workflow Discover services Select possible services Refine workflow Create workflow program - Formulate outline workflowThis standard allows a serv ice interface and its bindings to be defined - Discover servicesThis standard al lows a service interface and its bindings to be defined - Select possible servic esThis standard allows a service interface and its bindings to be defined - Refi ne workflowThis standard allows a service interface and its bindings to be defin ed - Create workflow programThis standard allows a service interface and its bin dings to be defined answer: U31 - Q012 What is NOT a component of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specification - The binding - The location part - The service specification answer: The service specification U31 - Q013 What is SOAP standard? A message exchange standard that supports serv ice communication This standard allows a service interface and its bindings to b e defined Defines the components of a service specification that may be used to discover the existence of a service A standard for workflow languages used to de fine service composition - A message exchange standard that supports service com municationThe service specification - This standard allows a service interface a nd its bindings to be definedThe service specification - Defines the components

of a service specification that may be used to discover the existence of a servi ceThe service specification - A standard for workflow languages used to define s ervice compositionThe service specification answer: A message exchange standard that supports service communication U31 - Q014 Which of the following is NOT a fundamental type of service that may be identified? Utility services Business services Coordination services Security services - Utility servicesA message exchange standard that supports service co mmunication - Business servicesA message exchange standard that supports service communication - Coordination servicesA message exchange standard that supports service communication - Security servicesA message exchange standard that suppor ts service communication answer: Security services U31 - Q015 What is the difference between BPMN and WS-BPEL? BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based langu age. WS-BPEL is a graphical language for defining workflows whereas BPMN is a lo wer-level XML-based language. - BPMN is a graphical language for defining workfl ows whereas WS-BPEL is a lower-level XML-based language.Security services - WS-B PEL is a graphical language for defining workflows whereas BPMN is a lower-level XML-based language.Security services answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. U31 - Q019 Which is the benefit of Service-oriented architectures? Inter-organiz ational computing is facilitated through simplified information exchange The Ser vice-oriented architecture systems are easy to protect resources and maintain Th e Service-oriented architecture systems are easy to test The Service-oriented ar chitecture systems are easy to deploy - Inter-organizational computing is facili tated through simplified information exchangeBPMN is a graphical language for de fining workflows whereas WS-BPEL is a lower-level XML-based language. - The Serv ice-oriented architecture systems are easy to protect resources and maintainBPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. - The Service-oriented architecture systems are easy to tes tBPMN is a graphical language for defining workflows whereas WS-BPEL is a lowerlevel XML-based language. - The Service-oriented architecture systems are easy t o deployBPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. answer: Inter-organizational computing is facilitated through simplified informa tion exchange U31 - Q020 What is the BEST practice when design service interface? Service stat e information should not included in messages The number of messages exchanged t o complete a service request should normally be maximized The number of messages exchanged to complete a service request should normally be minimized - Service state information should not included in messagesInter-organizational computing is facilitated through simplified information exchange - The number of messages exchanged to complete a service request should normally be maximizedInter-organi zational computing is facilitated through simplified information exchange - The number of messages exchanged to complete a service request should normally be mi nimizedInter-organizational computing is facilitated through simplified informat ion exchange answer: The number of messages exchanged to complete a service request should no rmally be minimized U31 - Q021 What are stages of service interface design? Logical interface design , Message design, WSDL description Logical interface design, Message design, jav a object interface design Logical interface design, java object interface design , WSDL description - Logical interface design, Message design, WSDL descriptionT he number of messages exchanged to complete a service request should normally be minimized - Logical interface design, Message design, java object interface des ignThe number of messages exchanged to complete a service request should normall y be minimized - Logical interface design, java object interface design, WSDL de scriptionThe number of messages exchanged to complete a service request should n ormally be minimized -

answer: Logical interface design, Message design, WSDL description U31 - Q023 Which of the following statements belong to SOAP standard? A message exchange standard that supports service communication This standard allows a ser vice interface and its bindings to be defined Defines the components of a servic e specification that may be used to discover the existence of a service A standa rd for workflow languages used to define service composition - A message exchang e standard that supports service communicationLogical interface design, Message design, WSDL description - This standard allows a service interface and its bind ings to be definedLogical interface design, Message design, WSDL description - D efines the components of a service specification that may be used to discover th e existence of a serviceLogical interface design, Message design, WSDL descripti on - A standard for workflow languages used to define service compositionLogical interface design, Message design, WSDL description answer: A message exchange standard that supports service communication U31 - Q024 List the fundamental types of service that may be identified? Utility services Business services Coordination services Security services - Utility se rvicesA message exchange standard that supports service communication - Business servicesA message exchange standard that supports service communication - Coord ination servicesA message exchange standard that supports service communication - Security servicesA message exchange standard that supports service communicati on answer: Utility servicesBusiness servicesCoordination services U31 - Q025 Services can be provided locally or outsourced to external providers True False - TrueUtility servicesBusiness servicesCoordination services - FalseU tility servicesBusiness servicesCoordination services answer: True U31 - Q026 There are many standard protocols that have been developed to support service communication and information exchange True False - TrueTrue - FalseTru e answer: True U31 - Q027 Services may execute on different computers from different service pr oviders True False - TrueTrue - FalseTrue answer: True U31 - Q028 Which of the following statements about Service-oriented software eng ineering is true? Service-oriented software engineering is based on the notion t hat programs can be constructed by composing independent services that encapsula te reusable functionality Services are language dependent and their implementati on is based on widely adopted XML-based standards All of the others - Service-or iented software engineering is based on the notion that programs can be construc ted by composing independent services that encapsulate reusable functionalityTru e - Services are language dependent and their implementation is based on widely adopted XML-based standardsTrue - All of the othersTrue answer: Service-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality U31 - Q029 Which of the following statements about service interfaces is true? S ervice interfaces are defined in an XML-based language called WSDL A WSDL specif ication includes a definition of the interface types and operations, the binding protocol used by the service and the service location. All of the others - Serv ice interfaces are defined in an XML-based language called WSDLService-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality - A WSDL specification includes a definition of the interface types and operations, the b inding protocol used by the service and the service location.Service-oriented so ftware engineering is based on the notion that programs can be constructed by co mposing independent services that encapsulate reusable functionality - All of th e othersService-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality answer: Service interfaces are defined in an XML-based language called WSDL

U31 - Q030 What is the last milestone of the service engineering process Service requirements Service interface specification Validated and deployed service - S ervice requirementsService interfaces are defined in an XML-based language calle d WSDL - Service interface specificationService interfaces are defined in an XML -based language called WSDL - Validated and deployed serviceService interfaces a re defined in an XML-based language called WSDL answer: Validated and deployed service U31 - Q031 What is the first milestone of the service engineering process? Servi ce requirements Service interface specification Validated and deployed service Service requirementsValidated and deployed service - Service interface specific ationValidated and deployed service - Validated and deployed serviceValidated an d deployed service answer: Service requirements U31 - Q032 What is the second milestone of the service engineering process Servi ce requirements Service interface specification Validated and deployed service Service requirementsService requirements - Service interface specificationServi ce requirements - Validated and deployed serviceService requirements answer: Service interface specification U31 - Q036 What are the three stages in service interface design? Logical interf ace design Message design Method design WSDL development - Logical interface des ignService interface specification - Message designService interface specificati on - Method designService interface specification - WSDL developmentService inte rface specification answer: Logical interface designMessage designWSDL development U31 - Q037 What are the components of a WSDL specification? The interface specif ication The binding The location part The service specification - The interface specificationLogical interface designMessage designWSDL development - The bindin gLogical interface designMessage designWSDL development - The location partLogic al interface designMessage designWSDL development - The service specificationLog ical interface designMessage designWSDL development answer: The interface specificationThe bindingThe location part U31 - Q039 Which are benefits of service oriented architectures? Services can be provided locally or outsourced to external providers Services are language-depe ndent Investment in legacy systems can be preserved Inter-organizational computi ng is facilitated through simplified information exchange - Services can be prov ided locally or outsourced to external providersThe interface specificationThe b indingThe location part - Services are language-dependentThe interface specifica tionThe bindingThe location part - Investment in legacy systems can be preserved The interface specificationThe bindingThe location part - Inter-organizational c omputing is facilitated through simplified information exchangeThe interface spe cificationThe bindingThe location part answer: Services can be provided locally or outsourced to external providersInve stment in legacy systems can be preservedInter-organizational computing is facil itated through simplified information exchange U31-Q045 ________ engineering is based on the notion that programs can be constr ucted by composing independent services which encapsulate reusable functionality . Service-oriented software System-oriented software Object-oriented software St ructural-oriented software - Service-oriented softwareServices can be provided l ocally or outsourced to external providersInvestment in legacy systems can be pr eservedInter-organizational computing is facilitated through simplified informat ion exchange - System-oriented softwareServices can be provided locally or outso urced to external providersInvestment in legacy systems can be preservedInter-or ganizational computing is facilitated through simplified information exchange Object-oriented softwareServices can be provided locally or outsourced to extern al providersInvestment in legacy systems can be preservedInter-organizational co mputing is facilitated through simplified information exchange - Structural-orie nted softwareServices can be provided locally or outsourced to external provider sInvestment in legacy systems can be preservedInter-organizational computing is facilitated through simplified information exchange answer: Service-oriented software

U31-Q046 Service interfaces are defined in ____ . A _____ specification includes a definition of the interface types and operations, the binding protocol used b y the service and the service location. WSDL ASHL WSHL ASDL - WSDLService-orient ed software - ASHLService-oriented software - WSHLService-oriented software - AS DLService-oriented software answer: WSDL U01 - Q031 The economies of all developed nations are dependent on software. Tru e False - TrueWSDL - FalseWSDL answer: U01 - Q039 There is no single ideal approach to software engineering. True False - True - False answer: U04 - Q016 We should to make the distinction between developing the user require ments and developing system requirements in the requirement engineering process True False - True - False answer: U04 - Q017 The programs that are developed using evolutionary development are li kely to be easy to maintain True False - True - False answer: U04 - Q031 Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model. True False - True - False answer: U06 - Q016 It is impossible to completely separate system requirements and desig n. True False - True - False answer: U14 - Q015 Object oriented approach does not facilitate design evolution True Fa lse - True - False answer: U17 - Q015 Prototyping method starts with requirements that are best understood True False - True - False answer: U17 - Q039 Because of the changing environment, it is often impossible to arrive at a stable, consistent set of system requirements. True False - True - False answer: U18 - Q010 One of the key problems in software reuse is the inability to find ex isting reusable design patterns when hundreds of candidates exist. True False True - False answer: U18 - Q033 Applications frameworks are collections of concrete and abstract obje cts that are designed to be reused through specialization and the addition of ne w objects. True False - True - False answer: U23 - Q014 Only exhaustive testing can show a program is free from defects. Ther efore, most of important systems should be tested exhaustively. True False - Tru e - False answer: U29 - Q014 The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective Tr ue False - True - False answer: U29 - Q030 The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective. T rue False - True - False answer: U31 - Q038 A critical distinction between a service and a component as defined i n CBSE is that services are independent True False - True - False answer: U01 - Q.043 At the end of every month, a sales manager offers a cash bonus to th e most successful salesperson. What type of power is this leader using?

answer: reward power U01 - Q.044 A supervisor threatens to dismiss any member of the sales team who d oes not meet the sales quota by the end of the quarter. What type of power is th is leader using? answer: coercive power U01 - Q.047 You have been promoted to a management position at work. You expect employees to fulfill your requests because you are the boss. What type of power is this? answer: legitimate power U01 - Q.048 Dianna has been elected as leader of the research group because she has published more than any other team member on the research topic. What type o f power is this? answer: informational power U01 - Q.049 Which category of power is operating when a group member nominates s omeone as a leader by saying, "I recommend that Romero be appointed chair of the building committee given his extensive experience as a successful contractor"? answer: expert power U01 - Q.050 Your group has chosen Madeleine as its leader because she has demons trated strong organizational and problem-solving skills as well as a talent for motivating members and resolving conflict. What type of power does Madeleine hav e? answer: referent power U01 - Q.051 The Center for Business Ethics at Bentley College poses all of the f ollowing questions to help leaders decide whether their behavior is ethical EXCE PT answer: Do you avoid expressing your own opinions to make sure that they do not. how group members think and act? U01 - Q001 When designated leaders are "plucked from a group in order to lead," they should answer: iscuss ground rules for interaction while assuring group members of . fr iendship. U01 - Q002 All of the following behaviors are recommended strategies for becomin g an emergent group leader EXCEPT answer: Avoid expressing your own opinion U01 - Q003 Trait Leadership Theory, also known as the "Great Man" theory, conten ds that answer: leaders are born, not made U01 - Q004 Vu tries to maintain strict control over the Spring Festival Planning Committee. He insists on determining the direction and outcome of the committee 's discussion. According to Styles Leadership Theory, which leadership style is Vu using? answer: autocratic U01 - Q005 As chairperson of the PTA's election committee, Vicky believes in pra cticing social equality. She shares decision making with the group. According to Styles Leadership Theory, which leadership style is Vicky using? answer: democratic U01 - Q006 Even though Wayne is chairperson of the finance committee, he does li ttle or nothing to help the group. He tends to let the group take charge of its decisions and actions. Which leadership style is Wayne using? answer: laissez-faire U01 - Q007 Autocratic leaders answer: Both b and c U01 - Q008 Laissez-faire leaders answer: all of the above U01 - Q009 Which theory of leadership explains how leaders can become more effec tive once they have carefully analyzed themselves, their groups, and the circums tances in which they must lead? answer: situational theory U01 - Q010 If "task-motivated" describes your leadership style, Fiedler's Contin gency Model of Leadership Effectiveness predicts that you will be least successf

ul when answer: you have a moderate degree of power and task structure U01 - Q011 Fred Fiedler's Contingency Model of Leadership Effectiveness contends that the 3 important dimensions in every leadership situation are answer: leader-member relations, task structure, and the leader's amount of powe r U01 - Q012 Fred Fiedler's Contingency Model of Leadership Effectiveness claims t hat relationship-motivated leaders answer: may do all of the above U01 - Q013 According to Fiedler's Contingency Model of Leadership Effectiveness, which of the following situations is the best match for a relationship-motivate d leader? answer: There are moderately good leader-member relationships, a moderately . k, and a moderate amount of power. U01 - Q014 According to the Hersey-Blanchard Situational Leadership Model, as a group's readiness increases, leaders should move through 4 different leadership behaviors. Which answer depicts the order in which these behaviors usually occur ? answer: tell, sell, participate, delegate U01 - Q015 According to the Hersey-Blanchard Situational Leadership Model, a lea der should try to ____________ when group members are able as well as willing an d confident. answer: delegate U01 - Q016 The participating stage in Hersey-Blanchard's Situational Leadership Model is similar to Tuckman's _________ stage of group development answer: performing U01 - Q017 All of the following characteristics distinguish transformational lea dership EXCEPT answer: experience. U01 - Q018 The 5M Model of Leadership Effectiveness focuses on all of the follow ing interdependent leadership functions EXCEPT answer: mediating conflict. U01 - Q019 Modeling leadership behavior in the 5M Model of Leadership Effectivne ss includes all of the following strategies EXCEPT answer: maintaining control at all times U01 - Q020 According to the 5M Model of Leadership Effectiveness, all of the fol lowing items are characteristic of effective decision making by group leaders EX CEPT answer: the ability to identify and make popular decisions U01 - Q021 As the group's leader, Grace makes sure that everyone in her group is committed to the group's common goal. She also helps solve interpersonal proble ms and conflicts, recognizing outstanding group work. Which of the following lea dership functions in the 5M Model of Leadership Effectiveness does Grace's behav ior exemplify? answer: Motivating members U01 - Q022 Raphael has been assigned the leadership task of managing an office i n which most of the employees are young or new to the company. He decides that w hen problems or setbacks occur, he will not blame the group or its members. Inst ead, he will use the situation as a teachable moment and make sure that members accept personal responsibility for a problem and its consequences. He will also look for situations in which group members can assume leadership responsibilitie s. Which of the following leadership functions in the 5M Model of Leadership Eff ectiveness does Raphael's behavior exemplify? answer: Mentoring members U01 - Q023 Research verifies all of the following conclusions about women and le adership EXCEPT answer: women who act "ladylike" are viewed as much more effective than women U01 - Q024 Jim Collins, author of Good to Great, claims that unless you are will ing to keep your ego in check for the sake of the group, you won't be an effecti

ve leader. In other words, you must seek a balance between answer: professional will and personal humility U01 - Q025 Members from uncertainty avoidance cultures prefer answer: more structure and instructions from a leader. U01 - Q026 A leader who prefers a democratic approach to decision making and lea dership may frustrate members who come from a(n) ____________ culture. answer: high power distance. U01 - Q027 All groups need leadership answer: True U01 - Q028 Whereas managers focus on effectiveness, leaders are concerned with e fficiency answer: False U01 - Q029 Bennis and Nanus claim that power is the quality without which leader s cannot answer: True. U01 - Q030 Position power includes reward and coercive power whereas personal le adership power includes legitimate and informational power. answer: False U01 - Q036 Legitimate power is role model powerthe ability to influence that aris es when one person admires another. answer: False U01 - Q037 According to researchers, reward, legitimate, and coercive power are less effective than referent and expert power answer: True U01 - Q038 Coercive power can be effective when group members are aware of the l eader's expectations and are warned in advance about the penalties for failing t o comply answer: True U01-Q045 A designated leader is selected by group members or by an outside autho rity answer: True U01-Q046 According to the Center for Business Ethics, an ethical leader would by pass a competent person in order to promote a less competent relative or close f riend answer: False U04 - Q.043 If you want to emerge as the leader of a group, you should talk firs t and more often than other members. answer: True U04 - Q.044 When someone from within a group is appointed as its leader, the new leader should openly discuss leadership and seek members' help in resolving pot ential problems. answer: True U04 - Q.047 Traits Leadership Theory assumes that leaders are made, not born answer: False U04 - Q.048 Autocratic leaders may be effective during a serious crisis when the re's not enough time to hold a group discussion answer: True U04 - Q.049 According to Styles Leadership Theory, the democratic leadership sty le is always best. answer: False U04 - Q.050 Laissez-faire leaders may have power, but they hesitate to exert the ir influence on group members and group work. answer: True U04 - Q.051 In mature and highly productive groups, a laissez-faire leader may b e a good match for the group answer: True U04 - Q001 Functional Leadership Theory claims that an effective group can have more than one member serving in a leadership role answer: True U04 - Q002 According to Fiedler's Contingency Model of Leadership Effectiveness,

relationship-motivated leaders perform best in extremessuch as when the situatio n is highly controlled or when it is almost out of control answer: False U04 - Q003 According to Fiedler's Contingency Model of Leadership Effectiveness, taskmotivated leaders gain satisfaction from completing a task even if the cost is bad feelings between the leader and group members answer: True U04 - Q004 Fiedler's Contingency Model of Leadership Effectiveness claims that t here are 2 important dimensions to every leadership situation: the level of lead er charisma and the level of leader power answer: False U04 - Q005 According to Hersey and Blanchard, "member readiness" refers to the e xtent to which members are willing and able to work together answer: True U04 - Q006 According to Hersey and Blanchard's Situational Leadership Model, a l eader should tell a group what to do and closely supervise its work when members are able but not unwilling or insecure answer: False U04 - Q007 Hersey and Blanchard's selling stage of leadership is similar to Tuck man's storming stage of group development answer: True U04 - Q008 Charismatic leaders rely on reward, coercive, and legitimate power. answer: False U04 - Q009 Transformational leaders help members understand the need for change, both emotionally and intellectually answer: True U04 - Q010 The 5M Model of Leadership Effectiveness divides leadership tasks int o 5 interdependent leadership functions: (1) Model leadership behavior; (2) Moti vate members; (3) Manage the group process; (4) Make decisions; and (5) Mentor m embers answer: True U04 - Q011 In the 5M Model of Leadership Effectiveness, leaders Manage group pro cess by organizing and fully preparing for group meetings and work sessions answer: True U04 - Q012 According to the 5M Model of Leadership Effectiveness, effective lead ers explain the rationale or reasons for the decisions they make answer: True U04 - Q013 Women are less likely than men to be preselected as leaders answer: True U04 - Q014 Multiple leaders are the exception rather than the rule in virtual gr oups answer: False U04 - Q015 Research indicates that there are only slight differences in the beha vior and style of male and female leaders answer: True U04 - Q018 In his book, Good to Great, Jim Collins claims that effective leaders act modestly, do not boast, and shun public glorification. answer: True U04 - Q019 In his book, Good to Great, Jim Collins claims that effective leaders do what needs to be done to achieve the group's goal in order to win public fam e and fortune. answer: False U04 - Q020 Leaders can motivate members from collectivist cultures by helping me mbers achieve personal goals and high status positions answer: False U04 - Q021 Group members from uncertainty avoidance cultures want more structure and instruction from a leader. answer: True U04 - Q022 A leader who prefers a democratic approach to decision making may fru strate members who come from high power distance cultures.

answer: True U04 - Q023 In order to achieve an optimal group experience, which of the followi ng dialectic tensions should a group negotiate to achieve a both/and resolution? answer: all of the above U04 - Q024 Which of the following group dialectics is MOST applicable in Chapter 6, "Group Motivation"? answer: engaged ? disengaged U04 - Q025 For the purpose of discussing group motivation, Maslow's 5 needs can be divided into 2 categories: satisfiers and motivators. Which one of the following needs w ould be classified as a satisfier rather than a motivator? answer: safety needs U04 - Q026 Which 2 of Maslow's needs would be classified as satisfiers rather th an motivators? answer: physiological and safety needs U04 - Q027 Which of Maslow's needs can a group meet if it deliberately limits it s membership to carefully selected, notable individuals? answer: esteem needs U04 - Q028 Which of the following strategies is most likely to motivate group me mbers with strong inclusion needs? answer: Tell them how valuable they are to the group U04 - Q029 Expectancy-Value answer: explains why the probability of achieving a goal is as important as the goal itself. U04 - Q030 Which theory would explain why even when a goal is highly valued (bec oming a billionaire or dancing with the stars), you may not be highly motivated to pursue that goal if the chance of reaching it is very small? answer: Expectancy Value Theory U04 - Q036 In terms of the 8 basic Myers-Briggs types, which of the following st rategies is most likely to motivate an intuitive? answer: Encourage visioning, creativity, and brainstorming U04 - Q037 In terms of the 8 basic Myers-Briggs types, which of the following st rategies is most likely to motivate an introvert? answer: Provide thinking time before and during discussionsorganizations have de veloped their own approach to software development. U04 - Q038 Group members' Myers-Briggs types affect their beliefs about and beha vior in groups. Which of the following beliefs would be characteristic of a perc eiver? answer: Groups need freedom to examine multiple options during a discussion U04 - Q039 Kenneth Thomas describes 4 categories of intrinsic motivation needed to energize and reinforce work. They are answer: meaningfulness, choice, competence, and progress U04-Q045 In terms of Thomas's 4 categories of motivators, you can promote a sens e of meaningfulness by answer: volunteering for worthwhile group tasks that interest you U04-Q046 Which of the following strategies can help you motivate other members b y promoting a sense of choice in your group? answer: Seek and take advantage of new opportunities U05 - Q.043 Which of the following motivational strategies can help you promote a sense of progress in your group? answer: Recognize and celebrate group accomplishments U05 - Q.044 The most visible symptom of an unmotivated group is answer: apathy U05 - Q.047 Which of the following strategies is NOT an effective tool for motiv ating virtual groups? answer: Let the group create its own agenda U05 - Q.048 Controlling feedback answer: tells members what to do.

U05 - Q.049 All of the following guidelines can help you use "it" statements to provide informative feedback EXCEPT answer: "It" statements provide your personal opinion about a member of the grou p U05 - Q.050 A reprimand can best be described as answer: a form of feedback that identifies deficiencies U05 - Q.051 Before reprimanding a group member or a group as a whole, be sure yo u can answer all of the following questions EXCEPT U05 - Q002 Which of the following statements about the value of extrinsic reward s is the most accurate? answer: They are granted by supervisors rather than group members U05 - Q003 A survey examining employee turnover found that the chief reason peop le give for leaving a job is related to answer: the need for praise and recognition U05 - Q004 Leaders with ________________ power are more likely to motivate their members. answer: referent and persuasive U05 - Q005 The textbook suggests 4 criteria for developing a reward system for g roups. Which answer reflects those criteria? answer: fair; equitable; competitive; appropriate U05 - Q006 The textbook suggests 4 criteria for punishing a group member. Which answer reflects these criteria? answer: predictable; immediate; consistent; impersonal U05 - Q007 Which of the following statements is most accurate about using punish ment as a motivational tool? answer: It does not motivate U05 - Q008Suppose someone tells your group "If you finish this eighteen-month pr oject on time, I'll send each of you a person thank-you note. " According to you r textbook, this reward is not based on well-conceived, objective criteria. In t his case, the reward is not answer: appropriate. U05 - Q009 In order to achieve an optimal group experience, groups must negotiat e several dialectic tensions such as engaged ? disengaged and task dimensions ? social dimensions. answer: True U05 - Q010 Motivation recognizes and financially compensates group members for w ork well done answer: False U05 - Q011 Maslow's belongingness, esteem, and self-actualization needs are clas sified as motivators rather than satisfiers answer: True U05 - Q011 Money can satisfy deficiency needs, but it will not necessarily motiv ate a group or its members to work harder or better answer: True U05 - Q012 Meeting Maslow's self-actualization needs can motivate group members when they provide prestige, status, and a sense of achievement answer: False U05 - Q013 According to Schutz's FIRO Theory, if you know that some group member s have an unmet inclusion need, you can motivate them by asking them to particip ate more actively and telling them how valuable they are to the group answer: True U05 - Q014 Brainstorming often works best in a high-inclusion, low-control atmos phere answer: True U05 - Q015 In Myers-Briggs terms, thinkers should be thanked for their analysis but also reminded that logical decisions impact real people answer: True U05 - Q016 In Myers-Briggs terms, you can motivate intuitives by providing a det ailed agenda, firm deadlines, and clear standards and expectations for success

answer: False U05 - Q017 You can motivate judgers by assuring them that they will be given opp ortunities to reconsider all decisions and make midcourse adjustments whenever n eeded answer: False U05 - Q018 Group members from low-context cultures often complain that they neve r receive praise or rewards when, in fact, they are highly respected and valued by others answer: True U05 - Q020 Members from polychronic time cultures are motivated in groups that c oncentrate on a specific task or goal and that meet their deadlines answer: False U05 - Q021 When groups experience apathy, intrinsic motivatorssuch as a sense of meaningfulness and progressare minimal or missing answer: True U05 - Q022 In order to motivate the members of virtual groups, provide a detaile d agenda well in advance of a scheduled meeting, along with any resources and on line documents needed for the meeting answer: True U05 - Q023 In order to motivate members of virtual groups, insist that all membe rs stay online throughout the meeting regardless of the issues being discussed answer: False U05 - Q024 Informational feedback tells people what to do whereas controlling fe edback tells people how they are doing answer: False U05 - Q025 When providing informational feedback to group members, "it" statemen ts focus more on personal traits of individual group members than on the task answer: True U05 - Q026 When providing informational feedback to group members, "it" statemen ts avoid using the word "you" when describing individual or group behavior answer: Feasibility study report document U05 - Q027 Reprimands motivate because they threaten to withhold valued extrinsi c rewards answer: False U05 - Q028 For the most part, extrinsic rewards do not motivate groups to work t ogether in pursuit of a shared goal answer: True U05 - Q029 Completing a challenging group project can provide intrinsic rewards answer: True U05 - Q030 One study examining employee turnover found that the chief reason peo ple give for leaving a job is the lack of intrinsic rewards answer: True U05 - Q036 Groups or leaders with the power to reward members should make sure t he rewards are fair, equitable, competitive, and appropriate answer: True U05 - Q037 Leaders with referent and informational power are least likely to mot ivate their group members answer: False U05 - Q038 If each group member does not have an equal opportunity to earn rewar ds, the group may become less productive answer: True U05 - Q039 Researchers have found that high-performing groups participate in a w ide variety and frequency of celebrations where recognition and appreciation is expressed answer: True U05-Q045 The highest-performing managers show more warmth, fondness, and affecti on towards others than do the bottom 25% of managers answer: True U05-Q046 If you and your group decide that someone deserves to be punished, the punishment should be unpredictable, gradual, and personal

answer: False U06 - Q.043 Punishmentsubjecting members to a penalty or negative consequencedoes not motivate answer: True

Anda mungkin juga menyukai