Multiple Choice Questions (MCQs)
A ________ provides a quantitative value of some attribute of a process or a product.
Defects per function points is a ________.
Extent to which access to software or data by unauthorized persons can be controlled, is called ________.
Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)
Effort required to test a program to ensure that it performs its intended function ________.
________ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
Extent to which access to software or data by unauthorized persons can be controlled, is called _______.
The extent to which a program can be reused in other applications is called ________.
Quality can be measured if we measure the _____ of the product.
The amount of "computing resources", required by a program to perform its function is __________.
We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.
When more than one users interpret the same requirement in different ways then we can say that the requirement is:
Identify the most appropriate statement:
For a software the total number of requirements are equal to ________.
In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:
In context of moving range and individual control charts, UNPL stands for:
________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
Control charts are of following two types:
Select a course code for Objective Questions:
Select a course code for Subjective Questions: