Multiple Choice Questions (MCQs)
In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:
We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.
Defects per function points is a ________.
When more than one users interpret the same requirement in different ways then we can say that the requirement is:
Mean Time Between Failure (MTBF) can be calculated by:
If an error related to requirements is identified in testing phase, this error will be considered as an error of ___________ phase.
Configuration Status Reporting (CSR) reports on
BCWS stands for:
Critical path defines:
A ________ provides a quantitative value of some attribute of a process or a product.
For a software the total number of requirements are equal to ________.
FTR stands for:
Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)
Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.
CPM stands for:
________ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
The more you refine the tasks, the more you can:
Schedule Performance Index (SPI) is equal to
The software reengineering is a ________ activity.
The amount of "computing resources", required by a program to perform its function is __________.
Earned Value Analysis (EVA) is a ________ technique for assessing the progress of a project.
________ engineering for software is a process for analyzing a program in an effort to create a representation of the program at a higher level abstraction than the source code.
SQA is an umbrella activity in which following activities are performed EXCEPT
________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
A system is considered to be a legacy system if it has been in operation for ________ years. A legacy system has many components.
Milestone represents:
MTTF is the abbreviation of
The extent to which a program can be reused in other applications is called ________.
In context of moving range and individual control charts, UNPL stands for:
Which of the following is NOT an example of Software Configuration Item (SCI):
BAC stands for:
Which of the following is not TRUE about "Error Tracking"?
________ is one of the techniques used during severe deadline pressure.
Extent to which access to software or data by unauthorized persons can be controlled, is called _______.
Which of the following is incorrect?
Quality cost may be divided into costs associated with:
The boundary time defines the following parameter(s) for a project:
BCWS for a task i will be equal to:
Following are effective guidelines for Review EXCEPT
________ is one of the techniques to prepare project schedule once we have defined "task network"
Control charts are of following two types:
Quality assurance helps management in providing the necessary data about:
Effort required to test a program to ensure that it performs its intended function ________.
In order to use the PERT and CPM, which one of the following is NOT required?
A major issue in requirements engineering is the rate at at which requirements change once the requirements phase has "officially" ________.
Quality can be measured if we measure the _____ of the product.
The equation to find out the Availability of software is:
BCWP refers to:
________ engineering requires application of SE principles, methods, and concepts to re-create an existing application.
________ engineering does not simply create a modern equivalent of an older program, rather new user and technology requirements are integrated into the reengineering effort.
The progress on a project at any given point in time can be calculated by:
Configuration Auditing deals with:
Identify the most appropriate statement:
Defining a "Task Network" helps in defining:
Extent to which access to software or data by unauthorized persons can be controlled, is called ________.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: