What standard specifies a set of behaviors that an organization can adopt to ensure secure system and software engineering practice?

A. ISO/IEC 28127
B. ISO 15508
C. ISO 15548
D. ISO/IEC 21827


Answer: D

Computer Science & Information Technology

You might also like to view...

Suppose a system is not currently thrashing. List as many factors as you can that might cause it to begin thrashing.

What will be an ideal response?

Computer Science & Information Technology

The following is an old word puzzle: “Name a common word, besides tremendous, stupendous and horrendous, that ends in dous.” If you think about this for a while it will probably come to you. However, we can also solve this puzzle by reading a text file of English words and outputting the word if it contains “dous” at the end. The text file “words.txt” contains 87314 English words, including the word that completes the puzzle. This file is available online with the source code for the book. Write a program that reads each word from the text file and outputs only those containing “dous” at the end to solve the puzzle.

Fairly short text-file program. The dictionary of words can be used for many other puzzle-based programs involving words.

Computer Science & Information Technology

The least-frequently-used (LFU) page-replacement strategy can be implemented using ________.

a) a queue of pages in main memory b) a stack of pages in main memory c) a counter for each page in main memory d) none of the above

Computer Science & Information Technology

Display courses and prerequisites. If there is no prerequisite, display ‘none’ else display ‘one’.

Write queries for the following. (Use tables created in Chapter 4 Lab Activity.)

Computer Science & Information Technology