Quiz 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What key factors should be considered when planning reuse? [A]All of the others [B]The development schedule for the software [C]The background, skills and experience of the development team [D]The expected software lifetime

A

What does computer science concern with? [A]Computer science is concerned with theories and methods that underlie computers and software systems [B]Computer science is concerned with the practicalities of developing and delivering useful software [C]All of the others

A

What is concerned with developing an oriented system model to implement requirements [A]Object-oriented Analysis [B]Object-oriented Design [C]Object-oriented Paradigm [D]None of the others

A

Which of the following statements about Service-oriented software engineering is true? [A]Service-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality [B]Services are language dependent and their implementation is based on widely adopted XML-based standards [C]All of the others

A

Which of the following statements about service interfaces is true? [A]All of the others [B]Service interfaces are defined in an XML-based language called WSDL [C]A WSDL specification includes a definition of the interface types and operations, the binding protocol used by the service and the service location

A

Which of the followings belong to Server type of concurrent object implementation? [A]The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests [B]The state of the object is changed by internal operations within the object itself. The process executing these operations runs continuously. [C]All of the others

A

Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects. [A]False [B]True

B

Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model. [A]False [B]True

B

Which of the following is a type of software process model that represents the roles of the people involved in the software process and the activities for which they are responsible? [A]An actor model [B]An role/action model [C]None of the others [D]An activity model

B

All of the following are stages in an object-oriented development process EXCEPT? [A]Object-oriented analysis [B]Object-oriented design [C]Object-oriented evolution [D]Object-oriented programming

C

What are included in a quality plan? [A]The resources and schedule used for system validation [B]All of the others [C]The quality procedures and standards that should be used in a project

C

What are system requirements? [A]None of the others [B]Requirements that come from the application domain of the system and that reflect characteristics of that domain [C]A structured document setting out detailed descriptions of the system's functions, services and operational constraints. [D]Statements in natural language plus diagrams of the services the system provides and its operational constraints. Written for customers

C

What is meant by configuration management? [A]All of the others [B]Configuration management is concerned with ensuring that software has a low number of defects and that it reaches the required standards of maintainability, reliability, and portability and so on [C]The development and use of standards and procedures for managing an evolving software system

C

What is the second stage of risk management process? [A]Risk planning [B]Risk monitoring [C]Risk analysis [D]Risk identification

C

Which of the following are the testing process goals? [A]Discover faults or defects in the software [B]The check that the software meets its requirements [C]All of the others

C

Which of the following statements about security is NOT true? [A]None of the others [B]Security engineering focuses on how to develop and maintain software systems that can resist malicious attacks that are intended to damage a computer-based system or its data [C]Security threats can be threats to the only confidentiality and integrity of a system or its data. [D]Security risk management involves assessing the losses that might ensue from attacks on a system and deriving security requirements that are aimed at eliminating or reducing these losses.

C

All of the following are the main benefits of software reuse EXCEPT [A]Increased dependability [B]Effective use of specialists, standards compliance [C]Accelerated development [D]Reduce maintain cost [E]Reduced process risk

D

Which of the following statements about Equivalence partitioning are NOT true? [A]Equivalence partitioning is a way of deriving test cases [B]Often, the value that is most likely to lead to a successful testis a value at the boundary of a partition. [C]It depends on finding partitions in the input and output data sets and exercising the program with values from these partitions [D]None of the others

D

Which of the followings does NOT belong to the important differences between software project management and other types of project management? [A]There are no standard for software processes [B]Large software projects are often one-off projects [C]The product (software) is intangible [D]Cost of software project maintenance is higher than other type of projects

D

Which of these statements about extreme programming are true? [A]All tests should only be run in the last time [B]All of the others [C]Increments are delivered to customers at the end of process [D]New versions may be built several times per day

D


Ensembles d'études connexes

Security Assessment and Testing - Chapter 15 Security Assessment and Testing

View Set

Health and Nutrition Chapter 4 Carbohydrates

View Set

Ch 8 Intermediate Accounting Concepts

View Set