Multiple Choice Questions (MCQs)
Extent to which access to software or data by unauthorized persons can be controlled, is called ________.
The amount of "computing resources", required by a program to perform its function is __________.
________ is one of the techniques used during severe deadline pressure.
A major issue in requirements engineering is the rate at at which requirements change once the requirements phase has "officially" ________.
Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)
Defects per function points is a ________.
Which of the following is not TRUE about "Error Tracking"?
In context of moving range and individual control charts, UNPL stands for:
Critical path defines:
________ engineering does not simply create a modern equivalent of an older program, rather new user and technology requirements are integrated into the reengineering effort.
Quality can be measured if we measure the _____ of the product.
For a software the total number of requirements are equal to ________.
________ is one of the techniques to prepare project schedule once we have defined "task network"
Which of the following is incorrect?
Quality assurance helps management in providing the necessary data about:
The progress on a project at any given point in time can be calculated by:
The equation to find out the Availability of software is:
BCWS for a task i will be equal to:
Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.
BCWP refers to:
Milestone represents:
When more than one users interpret the same requirement in different ways then we can say that the requirement is:
Earned Value Analysis (EVA) is a ________ technique for assessing the progress of a project.
Defining a "Task Network" helps in defining:
________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
Quality cost may be divided into costs associated with:
MTTF is the abbreviation of
In order to use the PERT and CPM, which one of the following is NOT required?
The boundary time defines the following parameter(s) for a project:
Identify the most appropriate statement:
Following are effective guidelines for Review EXCEPT
BAC stands for:
Mean Time Between Failure (MTBF) can be calculated by:
Extent to which access to software or data by unauthorized persons can be controlled, is called _______.
________ engineering requires application of SE principles, methods, and concepts to re-create an existing application.
________ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
________ engineering for software is a process for analyzing a program in an effort to create a representation of the program at a higher level abstraction than the source code.
The extent to which a program can be reused in other applications is called ________.
Effort required to test a program to ensure that it performs its intended function ________.
Schedule Performance Index (SPI) is equal to
If an error related to requirements is identified in testing phase, this error will be considered as an error of ___________ phase.
Configuration Status Reporting (CSR) reports on
SQA is an umbrella activity in which following activities are performed EXCEPT
A ________ provides a quantitative value of some attribute of a process or a product.
Which of the following is NOT an example of Software Configuration Item (SCI):
A system is considered to be a legacy system if it has been in operation for ________ years. A legacy system has many components.
BCWS stands for:
CPM stands for:
The software reengineering is a ________ activity.
The more you refine the tasks, the more you can:
In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:
Control charts are of following two types:
FTR stands for:
We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.
Configuration Auditing deals with:
Select a course code for Objective Questions:
Select a course code for Subjective Questions: