Multiple Choice Questions (MCQs)
Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.
The equation to find out the Availability of software is:
Defects per function points is a ________.
Quality cost may be divided into costs associated with:
In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:
If an error related to requirements is identified in testing phase, this error will be considered as an error of ___________ phase.
FTR stands for:
CPM stands for:
________ engineering for software is a process for analyzing a program in an effort to create a representation of the program at a higher level abstraction than the source code.
Quality can be measured if we measure the _____ of the product.
________ is one of the techniques to prepare project schedule once we have defined "task network"
SQA is an umbrella activity in which following activities are performed EXCEPT
Schedule Performance Index (SPI) is equal to
Milestone represents:
Effort required to test a program to ensure that it performs its intended function ________.
When more than one users interpret the same requirement in different ways then we can say that the requirement is:
Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)
________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
BCWP refers to:
The extent to which a program can be reused in other applications is called ________.
Critical path defines:
________ engineering requires application of SE principles, methods, and concepts to re-create an existing application.
Configuration Auditing deals with:
Defining a "Task Network" helps in defining:
________ is one of the techniques used during severe deadline pressure.
Quality assurance helps management in providing the necessary data about:
Which of the following is not TRUE about "Error Tracking"?
We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.
BCWS for a task i will be equal to:
________ engineering does not simply create a modern equivalent of an older program, rather new user and technology requirements are integrated into the reengineering effort.
Mean Time Between Failure (MTBF) can be calculated by:
BAC stands for:
A major issue in requirements engineering is the rate at at which requirements change once the requirements phase has "officially" ________.
The progress on a project at any given point in time can be calculated by:
Control charts are of following two types:
The more you refine the tasks, the more you can:
A system is considered to be a legacy system if it has been in operation for ________ years. A legacy system has many components.
Following are effective guidelines for Review EXCEPT
Configuration Status Reporting (CSR) reports on
Extent to which access to software or data by unauthorized persons can be controlled, is called _______.
BCWS stands for:
A ________ provides a quantitative value of some attribute of a process or a product.
Which of the following is NOT an example of Software Configuration Item (SCI):
In order to use the PERT and CPM, which one of the following is NOT required?
Earned Value Analysis (EVA) is a ________ technique for assessing the progress of a project.
The software reengineering is a ________ activity.
________ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
For a software the total number of requirements are equal to ________.
Identify the most appropriate statement:
MTTF is the abbreviation of
In context of moving range and individual control charts, UNPL stands for:
The boundary time defines the following parameter(s) for a project:
Which of the following is incorrect?
Extent to which access to software or data by unauthorized persons can be controlled, is called ________.
The amount of "computing resources", required by a program to perform its function is __________.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: