SWR Tổng hợp tín vcl <3, SWR Checked, SWR302, SWR302

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

b

"Provide a description of the user actions and corresponding system responses that will take place during execution of the use case under normal, expected conditions". This activity belong the __________ section in use case document. Select one: a. Alternative Flows b. Normal Flow c. Exceptions d. Postconditions

A

"Provide a description of the user actions and corresponding system responses that will take place during execution of the use case under normal, expected conditions". This activity belong the __________ section in use case document. Select one: a. Normal Flow b. Postconditions c. Exceptions d. Alternative Flows

A

(15438) To depict the complex logic, which representation technique should be used? A. Decision tree B. Context diagram C. Swimlane diagram D. State-transition diagram E. Data flow diagram F. Data dictionary

D

....................is the process of examining a project to identify potential threats a. risk avoidance b. risk control c. risk resolution d. risk assessment e. risk monitoring

(119) Which of these steps in the planned change process puts the change plan into action? A. Implement the change B. Select the change agent C. Develop the change plan D. Recognize the need for change

A

(13) Which is NOT the helpful of product backlog? A. it helps in managing the demands of stakeholders B. It is prepared so that estimates can be given to each and every feature C. it helps in determining what to prioritize first. Team ranks the item and then builds value. D. It helps in planning the roadmap for the product E. it helps in re-ranking the features so that more value can be added to the product.

A

(147) As requirements are elicited. what source is most likely to impose previously unidentified user processes? A. Application domain specialists B. The operational environment C. The organizational environment D. Stakeholders

A

(207) Which is NOT the type of requirements development tools? A Requirement Management tools B. Elicitation tools C. Modeling tools D. Prototyping tools

A

(217) is the process of examining a project to identify potential threats A. Risk assessment B. Risk resolution C. Risk monitoring 0. Risk avoidance E. Risk control

A

(268) Which is NOT the reuse barrier? A. Organizational culture B. Inconsistent organization C. Writing style D. Ownership E. Projecttype

A

(34) To express the user task descriptions. which representation technique is NOT suitable? A. Use case specif‌ications B. Storyboards C. Scenarios D. Userstories

A

(40) Which of the following is NOT a type of software requirement? A. Complexity B. Performance C. Functionality D. External Interface

A

(45) The work products produced during requirement elicitation will vary depending on the _ A. Stakehotders needs B. software process being used C. size of the product being built D. size of the budget

A

(67) Which of the following property is least critical to the interaction between process actors and the requirements process? A)The education of the actor B. The nature of their 'stake' in the process C. The requirements they elicit D. Process actor identif‌ication

A

A key tool for software designer, developer and their test team is to carry out their respective tasks is defined by: Select one: a. Requirements documentation b. Software design documentation c. Technical documentation d. Users document

A

Change management can also be called Select one: a. change control b. change prevention c. change execution d. change coordination

A

Giving an example of quality requirements: "Authorization of an ATM withdrawal request shall take no more than 2.0 seconds". This is a__________ Select one: a. performance requirement b. reliability requirement c. robustness requirement d. interoperability requirement

A

QN=1 Which one of the following links is not a traceability type? a. Anticipation link b. Use link c. Revision link d. Variant link e. Derivation link f. Dependency li

A

The MoSCoW prioritization scheme stand for four possible priority classifications for the requirements in a set (IIBA 2009): Select one: a. Must, Should, Could, Won't b. May, Should, Can, Won't c. May, Should, Could, Won't d. Must, Should, Can, Will

A

The change management board has a scope of authority that indicates what changes the team has the ability to _____ before elevating to a higher authority Select one: a. approve or deny b. deny c. approve d. review

A

The requirement will be implemented in a future release, this is _______status Select one: a. deferred b. verified c. approved d. implemented e. deleted

A

What is a software requirements specification (SRS) document? Select one: a. A document detailing software requirements and specifications b. A document listing the time it takes to execute the existing manual processes c. A document which features instructions for how to install new software and test it for errors d. A document used while testing the software code for validity

A

d

A __________________ is discarded after it has been used to generate feedback, whereas an evolutionary prototype grows into the final product through a series of iterations. Select one: a. horizontal prototype b. paper prototype c. mock-up prototype d. throwaway prototype

D

A concept of operations document (ConOps) should not be written A. In the user's language using the user's format B. Mostly in narrative prose C. With visual forms D. Primarily in the developers technical language

D

A key tool for software designer, developer and their test team is to cany out their respective tasks is defined by: A. Technical documentation B. User document C. Software design documentation D. Requirement documentation

B

A key tool for software designer, developer and their test team is to carry out their respective tasks is defined by: Select one: a. Technical documentation b. Requirements documentation c. Software design documentation d. Users document

F

A listed acceptance criteria to fulfil certain requirements of a user and normally written from the perspective of an end-user. This is a ............ A. task B. release C. requirement D. timebox E. product backlog F. user story

E

A listed acceptance criteria to fulfil certain requirements of a user and normally written from the perspective of an end~user. This is a A. product backlog B. task C. requirement D. release E. user story F. time box

C

A throwaway prototype is most appropriate when: A. Users need to judge whether the requirements will enable the necessary business processes B. Have difficulty envisioning the system from the requirements alone C. all of the mentioned D. the team faces uncertainty. ambiguity. incompleteness. or vagueness in the requirements E. The gaps between customers and developers in the requirements

C

A throwaway prototype is most appropriate when: a. users need to judge whether the requirements will enable the necessary business processes b. The gaps between customers and developers in the requirements c. all the mentioned d. have difficulty envisioning the system from the requirements alone e. the team faces uncertainty, ambiguity, incompleteness, or vagueness in the requirements

(229) Select the true statements (two options)- A. Verif‌ication determines whether the product of some development activity meets its requirements (doing the thing right). B. Validation determines whether the product of some development activity meets its requirements (doing the right thing) C. Verif‌ication assesses whether a product satisf‌ies customer needs (doing the thing right). D. Validation assesses whether a product satisfies customer needs (doing the right thing)

A,D

The Software Requirements Specification document could not contain: Select one or more: a. The test case for every function b. The algorithm for software implementation c. Functional requirements d. Business rules e. Nonfunctional requirements

AB

Why should we prioritize the requirements? Select one or more: a. Help the project deliver the maximum business value as quickly as possible within the project constraints b. To deal with competing demands for limited resources c. Develop products through a series of fixed-schedule timeboxes for agile or other projects d. To provide the highest value at the lowest cost.

ABC

The requirements change management determines Select one or more: a. who does not need to be involved b. process for requirements change c. who will be consulted or informed of change d. which stakeholders need to approve change e. who will implement the functional changes

ABCD

Which are the challenges that outsourced projects have to face: Select one or more: a. Language and cultural barriers b. Remote developers lack the organizational and business knowledge c. Large time zone differences d. It's harder to get developer input on requirements and to pass along user feedback on delivered software to developers. e. Incorrect solution expectations f. Too many candidates

ABCD

How about estimating project size and effort from requirements? Based on Select one or more: a. estimated lines of code needed to implement specific requirements b. the number of individually testable requirements (Wilson 1995) c. story points (Cohn 2005; McConnell 2006) or use case points (Wiegers 2006) d. function points (Jones 1996b; IFPUG 2010) e. the number, type, and complexity of user interface elements

ABCE

Managing requirements changes is difficult because Select one or more: a. document-centric process b. difficult to understand the impact c. lack of visibility d. technology usually out of date e. stakeholders always change their demands f. high reliance on a single person

ABCF

Which are the most common challenges with packaged solutions? Select one or more: a. Vendor misrepresents package capabilities Users reject the solution b. Language and cultural barriers c. Large time zone differences. d. Incorrect solution expectations Incorrect solution expectations e. Too many candidates

ABDE

Requirements management includes all activities that maintain ______________ of requirements agreements throughout the project. Select one or more: a. currency b. compatibility c. integrity d. accuracy

ACD

Why reuse requirements? Select one or more: a. Faster delivery, lower development costs, consistency both within and across applications, higher team productivity, fewer defects, and reduced rework. b. to estimate implementation effort if you have data available from implementing the same requirements on a previous project. c. improve functional consistency across related members of a product line or among a set of business applications d. save review time, accelerate the approval cycle, and speed up other project activities, such as testing

ACD

B

According to the SWEBOK Guide, what are the four major activities of the requirements engineering process? A. Identification, specification, construction, and testing B. Elicitation, analysis, specification, and validation C. Analysis, planning, construction, and verification D. Elicitation, planning, construction, and testing

C

As requirements are elicited, what source is most likely to impose previously unidentified user process? a. stakeholder b. apllication domain specialists c. the organizational environment d. the oprerational environment

D

As requirements are elicited, what source is most likely to impose previously unidentified user processes? A. Stakeholders B. The operational environment C. Application domain specialists D. The organizational environment

(1) Why is base-lining project? A. To minimize miscommunication and unnecessary rework B. To get an agreement for each set of requirements after the team implements them C. To get disagreement for all the requirements of project D. To get an agreement for all the requirements of project

B

(136) Which activities are NOT belong to requirements status tracking? A. Tracking the status distribution of all requirements B. Tracking individual requirements versions C. Recording the status of each requirements D. Defining possible statuses

B

(181) Giving a business rule" All website images must include alternative text to be used by electronic reading devices to meet accessibility requirements for visually impaired users.' This is a type of _rule. A. inferences B. constraint C. facts D. action enabler E. computation

B

(197) Which technique overlaps for use in requirements elicitation and requirements validation? A. Prototypes B. Facilitator meetings C. Observations D. Interviews

B

(223) Which is NOT the advantage of Agile methods? A. adapt with the requirements changes of stakeholders B. puts considerable effort into trying to get the full requirements set 'right' early on. C. breaking the development of software into short cycles D. the development team could add a small set of functionalities based on priorities established by the customer E. modify what already exists. enrich the initial features. add new ones. and correct defats that were discovered

B

(263) If requirements are easily understandable and def‌ined then which software process model is best suited? A. Spiral model B. Waterfall model C. Prototyping model D. Agile model

B

(50) Which of the following is most true about a non-functional requirement? A. Describes functions software is to execute B. ls highly sensitive to the system architecture C. ls derived from hardware requirements D. Acts to constrain the software solution

B

(77) Classifying users should not base on: A. The tasks user perform during their business operations B. The knowledge user have C. User's access privilege or security levels (such as ordinary user. guest user. administrator) D. User's native language E. The features user use F. The frequency with which user use the product

B

(84) Which requirements should NOT be reused in the scope of cross an enterprise? A. Constraints B. Stakeholder profiles C. Security requirements D. Business rules

B

A __________________ is discarded after it has been used to generate feedback, whereas an evolutionary prototype grows into the final product through a series of iterations. Select one: a. paper prototype b. throwaway prototype c. mock-up prototype d. horizontal prototype

B

Requirements tracing is most likely concerned with the following(recovering the source of requirements from) Select one: a. Observation to elicitation technique b. Software requirement back to the system requirement it supports c. Analysis into requirements specification document d. Software requirement to validation test

B

What happens during static testing? Select one: a. The software is installed and tested for any logic errors b. The code is examined for quality and efficiency c. The programmers monitor the data entry screens as data is entered d. The users report missing functionality to the programmers

B

Which of the following is NOT the purpose of software verification and validation? Select one: a. To make sure that all software requirements have been implemented b. To make sure that the users are correctly using the program c. To make sure that there are no programming errors in the software d. To make sure there are no errors when running the program

B

[192) The requirements engineering process is _ A. The same for each organization and process B. lnitiated at the beginning of a project and continues to be ref‌ined throughout the lifecycle. C. A discrete fmntend activity of the software life cycle. D. A continuous process that ends when requirements are specif‌ied and documented

B

hich is(are) quality attributes that we should consider their effects on desktop and mobile systems: Select one: a. integrity, interoperability, performance b. performance, security, usability c. availability, integrity, interoperability d. performance, efficiency, reliability

B

To depict the data definitions and data object relationships, which representation technique should be used? Select one or more: a. Swimlane diagram b. Entity relationship diagram c. Data dictionary d. Context diagram e. Data flow diagram

BC

Which is(are) external quality? Select one or more: a. Efficiency b. Installability c. Security d. Integrity e. Availability

BCDE

Which is(are) the limitations of a document-based approach in developing and managing requirements ? Select one or more: a. Manage and prioritize backlogs, allocate requirements to iterations b. It's hard to define links between requirements and other system elements c. It's not easy to store supplementary information—attributes—about each requirement. d. Communicating changes to all affected team members is a manual process e. It's difficult to keep the documents current and synchronized.

BCDE

Which is (are) the type of Agile method? Select one or more: a. Use case driven b. Feature-Driven Development c. Kanban d. Extreme Programming e. Lean Software Development f. Scrum

BCDEF

The iterations in Agile method should be Select one or more: a. one year b. one month c. one day d. one week

BD

Which is (are) the essential Agile techniques to improve traditional requirements documentation? Select one or more: a. create prototypes b. compliment user stories with supporting artifacts c. Create story board d. groom your User Stories often e. create requirements that slice the cake f. invest in your User Stories

BDEF

a

Business requirements issues must be resolved: Select one: a. before the functional and nonfunctional requirements can be fully specified. b. after the nonfunctional requirements can be fully specified. c. along the functional and nonfunctional requirements can be fully specified. d. after the functional and nonfunctional requirements can be fully specified.

C

Business requirements issues must be resolved: Select one: a. after the functional and nonfunctional requirements can be fully specified. b. along the functional and nonfunctional requirements can be fully specified. c. before the functional and nonfunctional requirements can be fully specified. d. after the nonfunctional requirements can be fully specified.

a, b, d, e

Business requirements might come from Select one or more: a. funding sponsors b. corporate executives c. team members d. marketing managers e. end users f. product visionaries

ACEF

Business requirements might come from Select one or more: a. marketing managers b. end users c. corporate executives d. team members e. product visionaries f. funding sponsors

(159) Due to the iterative nature of the requirements process. change has to be managed through the review and approval process. Which of the following is likely to require the least amount of management? A. Requirements tracing B. Impact analysis C. System def‌inition D. Software conf‌iguration management

C

(171) Which of the following is NOT a good characteristic well written of a software requirements specification? A. Consistent B. Ranked C. Redundant D. Verif‌iable

C

(187) To understand user tasks and goals and the business objectives with which those tasks align. the Business Analysis should discuss with users at which stage(s)' A. Validation B. Specif‌ication C. Elicitation D. Analysis

C

(240) A throwaway prototype is most appropriate when: A. Users need to judge whether the requirements will enable the necessary business processes B. Have diff‌iculty envisioning the system from the requirements alone C. all of the mentioned D. the team faces uncertainty. ambiguity. incompleteness. or vagueness in the requirements E. The gaps between customers and developers in the requirements

C

(279) Giving a statement in an Airport check-in kiosk application: "As a traveler. I want to check in for a flight so that I can fly to my destination". This is a(n)_ example A. actor B. usecase C. user story D. entity

C

(72) Giving a condition example in specification of withdrawn money use case: "the ATM has dispensed money and printed a receipt'. This is a(n) A. exception B. precondition C. postcondition D. extension

C

(96) Which is NOT the most important characteristics of product backlog? A. Highest ranking items are decomposed into smaller stories during release planning so that they can be completed in future iterations B. Multiple teams can work on a single product backlog. C. Lowest ranking items are decomposed into smaller stories during release planning so that they can be completed in future iterations D. Each product should have one product backlog which can have a set of large to very large features. E. Ranking of features is done based on business value. technical value. risk management or strategic fitness.

C

Customer needs are traced______________, so you can tell which requirements will be affected if those needs change during or after development Select one: a. forward to requirements b. forward from requirements c. backward to requirements d. backward from requirements

C

In the V model, the user requirements are detected by ___________ Select one: a. Unit testing b. Integration testing c. Acceptance testing d. System testing

C

Performance is an external quality attribute which could be described: Select one: a. How well the system protects against unauthorized access to the application and its data b. How easy it is for people to learn, remember, and use the system c. How quickly and predictably the system responds to user inputs or other events d. How easily the system can grow to handle more users, transactions, servers, or other extensions e. How easily the system can interconnect and exchange data with other systems or components

C

To depict the complex logic, which representation technique should be used? Select one: a. Data dictionary b. State-transition diagram c. Decision tree d. Data flow diagram e. Swimlane diagram

C

Updating sets of requirements is an activity of Select one: a. requirements status tracking b. requirements tracing c. change control d. version control

C

What is not the essential aspects of an agile approach to requirements? Select one: a. The backlog and prioritization b. Expect change c. Budget change d. Documentation detail e. Customer involvement f. Timing

C

Which is not the purpose of software prototype? Select one: a. Explore design alternatives b. Clarify, complete, and validate requirements c. Specific technologies, tools, languages, and databases that must be used or avoided d. Create a subset that will grow into the ultimate product

C

_____________is a comparison of functionality between an existing system and a desired new system. Select one: a. Use cases analysis b. Requirement elicitation c. Gap analysis d. Document analysis

C

Which could requirements be reused within an operating environment or platform? Select one or more: a. Business rules b. stakeholder profiles c. Infrastructures of functionality needed to support certain types of requirements (such as a report generator) d. Interfaces e. Constraints

CDE

b

Change management can also be called Select one: a. change prevention b. change control c. change execution d. change coordination

B

Classifying users should not base on: A. The tasks user perform during their business operations B. The knowledge user have C. User's access privilege or security levels (such as ordinary user. guest user. administrator) D. User's native language E. The features user use F. The frequency with which user use the product

E

Classifying users should not base on: a. User's access privilege or security levels (such as ordinary user, guest user , adminitrator b. The tasks user perform during their business operations c. User's native language d. The frequency with which user use the product e. The knowledge user have f. The features user use

c

Customer needs are traced______________, so you can tell which requirements will be affected if those needs change during or after development Select one: a. forward from requirements b. backward to requirements c. forward to requirements d. backward from requirements

(102) Giving an example of quality requirements: 'After performing a f‌ile backup. the system shall verify the backup copy against the original and report any discrepancies'. This is a (an)— A. performance requirement B. interoperability requirement C. Robustness requirement D. Integrity requirement

D

(107) Which is (are) the skills of business analyst on Agile project? A. Understanif‌ing of the business area that the project is involved with B. Understanding of the agile development process C. Ability to document requirements formally or informally demnding on the need of the project D) All of the mentioned E. Ability to facilitate a team to consensus on scope. design decisions. and implementation decisions

D

(112) The software requirements specif‌ication should NOT be called _ A. system specif‌ication B. unctional specification C. a business requirements document (BRD) D. user requirements E. product specification F. requirements document

D

(131) Product requirement validation occurs primarily after A. Testing B. Analysis C. Elicitation D. Specif‌ication

D

(142) Which dimension of requirement classification is critical for consideration of tolerant design? A. Whether the requirement is functional or non-functional. B. Whether the requirement is a high or low priority. C. Whether the requirement is on the product or process. D. Whether the requirement is volatile or stable.

D

(164) Which is NOT a technique to f‌ind missing requirements? A. Decompose high-level requirements into enough detail to reveal exactly what is being requested B. Check boundary values for missing requirements C. Check a list of tasks corresponding with end users DCreate a checklist of common functional areas to consider for your projects E. Trace system requirements. user requirements. event-response lists. and busrness rules to their corresponding functional requirements to make sure that all the necessary functionality was derived

D

(176) What is a best practice for change control? A. Submit multiple changes at one time B. Open and honest communication C. Give overviews of the changes D. Hold change meetings

D

(202) What is considered the traditional means or requirements elicitation? A. Scenarios B. Observations C. Prototypes D. Interviews

D

(212) Software Requirement Specification (SRS) is also known as specification of A. White box testing B. Black boxtesting C. lntegratedtesting D. Acceptance testing

D

(234) Portability is an intemal quality attribute which could be described: A. How well the system protects against unauthorized access to the application and its data B. How quickly and predictably the system responds to user inputs or other events C. How easy it is for people to learn. remember. and use the system D. How easily the system can be made to work in other operating environments

D

(256) Which is NOT the type of internal quality? A. Verif‌iability B. Modif‌iability C. Eff‌iciency D. availability E. Scalability

D

(27) Which is not a reuse success factor"? A: Organizational culture B. Interactions C. Quality D. Dational culture E. Repository F. Terminology

D

(274) Process quality and improvement relies most on which of the following? A. Product operator performance B. Human factors C. Customer preferences D. Requirements process measures

D

(6) the requirement passed its tests after integration into the product. this is status A. approved B. implemented C. rejected D. verified E. deferred F. deleted

D

(62) The BEST way to conduct a requirements validation review is to _ A. examine the system model for errors B. have the customer look over the requirements C. send them to the design team and see if they have any concems D. use a checklist of questions to examine each requirement

D

Defining links between individual functional and nonfunctional requirements and specific system elements is an action of tracing ______________ Select one: a. backward from requirements b. forward to requirements c. backward to requirements d. forward from requirements

D

The Change Control Board will have a _____ who leads the team, and can often have the ability to overrule votes Select one: a. liaison b. coordinator c. president d. chairperson

D

The important goals of writing requirement: Select one: a. Each reader's interpretation matches what the author intended to communicate b. None of the answers c. Each implementation of readers matches what the author intended to communicate d. Anyone who reads the requirement comes to the same interpretation as any other reader

D

What happens to a rejected change request? Select one: a. It is closed b. Nothing c. It gets incorporated without anyone knowing d. It stops.

D

b

Defining links between individual functional and nonfunctional requirements and specific system elements is an action of tracing ______________ Select one: a. backward to requirements b. forward from requirements c. backward from requirements d. forward to requirements

a

Developing acceptance tests and criteria to confirm that a product based on the requirements Select one: a. validation phase b. elicitation phase c. analysis phase d. specification phase

B

Developing acceptance tests and criteria to confirm that a product based on the requirements Select one: a. elicitation phase b. validation phase c. specification phase d. analysis phase

C

Due to the iterative nature of the requirements process, change has to be managed through the review and approval process. Which of the following is likely to require the least amount of management? A. Requirements tracing B. Impact analysis C. System definition D. Software configuration management

D

Due to the iterative nature of the requirements process, change has to be managed through the review and approval process. Which of the following is likely to require the least amount of management? a. Software configuration management b. Impact analysis c. Requirements tracing d. System definition

C

Due to the iterative nature of the requirements process. change has to be managed through the review and approval process. Which of the following is likely to require the least amount of management? A. Requirements tracing B. Impact analysis C. System definition D. Software configuration management

(55) A listed acceptance criteria to fulfil certain requirements of a user and normally written from the perspective of an end~user. This is a A. product backlog B. task C. requirement D. release E. userstory F. timebox

E

(91) Why is Requirements Management important? It is due to the changes A. lotheenvironment B. intechnology C. in customers expectations D. in the demand of stakeholders E. All of the mentioned

E

(124) Which adverbs are the causes of requirements ambiguity in documenting Software Requirement Specif‌ication? A. appropriately B. generally C. reasonably D. usually E. approximately F. all of the mentioned

F

(152) Which are the processes in requirements engineering? A. Elicitation B. Specif‌ication C. Analysis D. Validation E. Requirements management F. All of the mentioned

F

(20) Which is NOT belong to the case of use case traps? A. Including data def‌initions in the use cases B. Including design in the use cases C. Highly complex use cases D. Use cases that users don't understand E. Too many use cases F. Depicts detail the use case story

F

B

Giving a business rule" All website images must include alternative text to be used by electronic reading devices to meet accessibility requirements for visually impaired users.' This is a type of _rule. A. inferences B. constraint C. facts D. action enabler E. computation

B

Giving a business rule: all website images must include alternative text to be used electronic reading devices to meet accessibility requirement for visually impaired users. this is a type of ..... rule a. facts b. action enabler c. constraint d. computation e. inferences

C

Giving a condition example in specification of withdrawn money use case: "the ATM has dispensed money and printed a receipt'. This is a(n) A. exception B. precondition C. postcondition D. extension

A

Giving a statement in an Airport check in kiosk application: "As a traveler. I want to check in for a flight so that i can fly to my destination:. This is an example: a. use story b. actor c. entity d. use case

C

Giving a statement in an Airport check-in kiosk application: "As a traveler. I want to check in for a flight so that I can fly to my destination". This is a(n)_ example A. actor B. usecase C. user story D. entity

B

Giving an example of quality requirements: "After performing a file backup, the system shall verify the backup copy against the original and report any discrepancies". This is a (an) ______ A. robustness requirement B. integrity requirement C. performance requirement D. interoperability requirement

D

Giving an example of quality requirements: "After performing a file backup, the system shall verity the backup copy against the original and report any discrepancies". This is a(an) __________ a. Robustness requirements b. performance requirement c. interoperability requirements d. intergrity requirements

a

Giving an example of quality requirements: "Authorization of an ATM withdrawal request shall take no more than 2.0 seconds". This is a__________ Select one: a. performance requirement b. interoperability requirement c. reliability requirement d. robustness requirement

D

Giving an example of quality requirements: 'After performing a file backup. the system shall verify the backup copy against the original and report any discrepancies'. This is a (an)— A. performance requirement B. interoperability requirement C. Robustness requirement D. Integrity requirement

a , b, c, d, e

How about estimating project size and effort from requirements? Based on Select one or more: a. function points (Jones 1996b; IFPUG 2010) b. the number, type, and complexity of user interface elements c. the number of individually testable requirements (Wilson 1995) d. story points (Cohn 2005; McConnell 2006) or use case points (Wiegers 2006) e. estimated lines of code needed to implement specific requirements

a

How to identify user classes? Select one: a. Base on the tasks that various users will perform with the system b. Base on the roles that various users will take with the system c. Base on the responsibilies that various users will play with the system d. Base on the jobs that various users will do with the system

C

How to identify user classes? Select one: a. Base on the jobs that various users will do with the system b. Base on the responsibilies that various users will play with the system c. Base on the tasks that various users will perform with the system d. Base on the roles that various users will take with the system

b

How to reduce the gap between what the customer needs and what the developer builds? Select one: a. developers should postpone the role of customer in project b. have ongoing conversations between developers and customers c. developers should do what the customer needs d. developers need to catch up with the demands of customers

B

How to reduce the gap between what the customer needs and what the developer builds? Select one: a. developers should do what the customer needs b. have ongoing conversations between developers and customers c. developers should postpone the role of customer in project d. developers need to catch up with the demands of customers

a

How to resolve requirements disputes between individual users? Select one: a. Product champion or product owner decide b. Favored user class gets preference c. Segment with greatest impact on business success gets preference d. Business objectives dictate direction

A

How to resolve requirements disputes between individual users? Select one: a. Product champion or product owner decide b. Business objectives dictate direction c. Favored user class gets preference d. Segment with greatest impact on business success gets preference

a, b, c

Identify class users could be based on their access privilege or security levels,the features and Select one or more: a. The frequency with which they use the product b. The tasks they perform during their business operations c. The platforms they will be using d. Their native language e. Their personality traits

BDE

Identify class users could be based on their access privilege or security levels,the features and Select one or more: a. Their personality traits b. The tasks they perform during their business operations c. Their native language d. The platforms they will be using e. The frequency with which they use the product

D

If a requirements status is proposed then it A. Is an approved requirement that has been removed B. Is work complete C. Has been requested by an authorized source D. Is a requirement that was proposed, but not planned for implementation

A

If a requirements status is proposed then it: A. Is an approved requirement that has been removed B. Is work complete C. Has been requested by an authorized source D. Is 4 requirement that was proposed. but not planned for implementation

A

If requirements are easily understandable and defined then which software process model is best suited? A. Waterfall model B. Agile model C. Spiral model D. Prototyping model

c

In Agile project, a single representative of stakeholders is called Select one: a. product representative b. product champion c. product owner d. product supplier

C

In Agile project, a single representative of stakeholders is called Select one: a. product supplier b. product representative c. product owner d. product champion

a

In Agile project, the product owner and product champion schemes are _______ Select one: a. not mutually exclusive b. not supported mutually c. supported mutually d. mutually exclusive

A

In Agile project, the product owner and product champion schemes are _______ Select one: a. not mutually exclusive b. mutually exclusive c. not supported mutually d. supported mutually

C

In order to determine solutions to business problems, the business analyst applies a set of: A. Inputs and outputs B. Practices and processes C. Tasks and techniques D. Activities and tasks

B

In the IEEE Std 1362 Concept of Operations (ConOps) Document, which of the following is fundamentally not included in the document? A. Current system or situation B. Proposed design method of system C. Justification for the nature of the change D. Operational scenarios

A

In the IEEE Std 1362 Concept of Operations (ConOps) Document, which of the following is fundamentally not included under the Concepts for the Proposed System (Clause 5)? A. Proposed design method of system B. Operational policies and constraints C. Description of the proposed system D. Modes of operation

B

In the V model, the user requirements are detected by A. Unittesting B. Acceptance testing C. Integration testing D. System testing

c

In the V model, the user requirements are detected by ___________ Select one: a. System testing b. Integration testing c. Acceptance testing d. Unit testing

a, b, d

In the elicitation process, which task(s) could be done? Select one or more: a. Perform document analysis b. Examine problem reports c. Adopt requirement document template d. Reuse existing requirements e. Create prototypes f. Identify requirement origins

ADE

In the elicitation process, which task(s) could be done? Select one or more: a. Perform document analysis b. Identify requirement origins c. Adopt requirement document template d. Reuse existing requirements e. Examine problem reports f. Create prototypes

a, c, e, f

Managing requirements changes is difficult because Select one or more: a. high reliance on a single person b. stakeholders always change their demands c. document-centric process d. technology usually out of date e. difficult to understand the impact f. lack of visibility

e

Performance is an external quality attribute which could be described: Select one: a. How easily the system can interconnect and exchange data with other systems or components b. How well the system protects against unauthorized access to the application and its data c. How easy it is for people to learn, remember, and use the system d. How easily the system can grow to handle more users, transactions, servers, or other extensions e. How quickly and predictably the system responds to user inputs or other events

D

Portability is an intemal quality attribute which could be described: A. How well the system protects against unauthorized access to the application and its data B. How quickly and predictably the system responds to user inputs or other events C. How easy it is for people to learn. remember. and use the system D. How easily the system can be made to work in other operating environments

D

Process quality and improvement relies most on which of the following? A. Product operator performance B. Human factors C. Customer preferences D. Requirements process measures

B

Process quality and improvement relies most on which of the following? a. customer preferences b. human factors c. product operator performance d. requirements process measures

D

Product requirement validation occurs primarily after A. Testing B. Analysis C. Elicitation D. Specification

D

Product requirement validation occurs primarily after ____________ a. Analysis b. Elicitation c. Testing d. Specification

a

Regarding user pesonas, a persona is a ____ Select one: a. a description of a hypothetical, generic person b. a description of characteristics person c. a description of a group of users giving requirements d. a characteristics of user class

B

Regarding user pesonas, a persona is a ____ Select one: a. a characteristics of user class b. a description of a hypothetical, generic person c. a description of a group of users giving requirements d. a description of characteristics person

A

Requirement baselines are: A. Requirements committed to be implemented B. Requirements committed to be tested C. Requirements within scope D. Requirements out of scope

C

Requirement elicitation is communication intensive and should be aligned with: A. The cost-benefit analysis B. The business case C. The stakeholders' needs and constraints D. The requirement management plan

a, c, d

Requirements management includes all activities that maintain ______________ of requirements agreements throughout the project. Select one or more: a. currency b. compatibility c. accuracy d. integrity

A

Requirements reviews: Can not be done before completion of the A. Systems definition document B. Systems specification document C. Software requirements specification document D. Baseline specification for new release

b

Requirements tracing is most likely concerned with the following(recovering the source of requirements from) Select one: a. Observation to elicitation technique b. Software requirement back to the system requirement it supports c. Software requirement to validation test d. Analysis into requirements specification document

A

Requirements tracing is most likely concerned with the following: Recovering the source of requirements from: A. Software requirement back to the system requirement it supports B. Observation to elicitation technique C. Analysis into requirements specification document D. Software requirement to validation test

a, b, d

Resolving conflicting requirements are Select one or more: a. finding the same voice of all class users b. determining who the decision makers will be for requirements issues c. supporting the end users who could understanding their tasks d. handling arbitrate questions of scope

ABC

Resolving conflicting requirements are Select one or more: a. determining who the decision makers will be for requirements issues b. handling arbitrate questions of scope c. finding the same voice of all class users d. supporting the end users who could understanding their tasks

AB

Select the true statement: a. Verification determines whether the product of some development activity meets its requirement (doing the thing right) b. Validation assesses whether a product satisfies customer needs c. Validation determines whether the product of some development activity meets its requirement d. Verification assesses whether a product satisfies customer needs

AD

Select the true statements (two options)- A. Verification determines whether the product of some development activity meets its requirements (doing the thing right). B. Validation determines whether the product of some development activity meets its requirements (doing the right thing) C. Verification assesses whether a product satisfies customer needs (doing the thing right). D. Validation assesses whether a product satisfies customer needs (doing the right thing)

D

Software Requirement Specification (SRS) is also known as specification of A. White box testing B. Black boxtesting C. lntegrated testing D. Acceptance testing

B

Software requirements validation should be viewed by whom and how often? A. Requirements analysts, often B. Stakeholders, often C. Customers, never D. Users, never

B

The BEST way to conduct a requirement validation review is to ______________ a. examine the system model for errors b. use a checklist of question to examine each requirement c. have the customer look over the requirements d. send them to the design team and see if they have any concerns

D

The BEST way to conduct a requirements validation review is to _ A. examine the system model for errors B. have the customer look over the requirements C. send them to the design team and see if they have any concems D. use a checklist of questions to examine each requirement

d

The Change Control Board will have a _____ who leads the team, and can often have the ability to overrule votes Select one: a. liaison b. coordinator c. president d. chairperson

d

The MoSCoW prioritization scheme stand for four possible priority classifications for the requirements in a set (IIBA 2009): Select one: a. May, Should, Could, Won't b. May, Should, Can, Won't c. Must, Should, Can, Will d. Must, Should, Could, Won't

a, b

The Software Requirements Specification document could not contain: Select one or more: a. The algorithm for software implementation b. The test case for every function c. Functional requirements d. Nonfunctional requirements e. Business rules

D

The business analysis team has put together the elicitation results documenting their understanding of the user needs. What types of requirements have they developed at this point in time? A. Maintained and reusable B. Communicated and confirmed C. Stated and unconfirmed D. Validated and confirmed

a, b, d, e, f

The business analyst could be Select one or more: a. Systems analyst b. Requirement analyst c. System developer d. Requirement manager e. Application analyst f. Requirements engineer

ABDEF

The business analyst could be Select one or more: a. Requirements engineer b. Requirement analyst c. System developer d. Application analyst e. Systems analyst f. Requirement manager

d

The change management board has a scope of authority that indicates what changes the team has the ability to _____ before elevating to a higher authority Select one: a. deny b. approve c. review d. approve or deny

AC

The important goals of writing requirement: A. Each reader's interpretation matches what the author intended to communicate B. Each implementation of readers matches what the author intended to communicate C. Anyone who reads the requirement comes to the same interpretation as any other reader D. None of the answers

c

The important goals of writing requirement: Select one: a. None of the answers b. Each reader's interpretation matches what the author intended to communicate c. Anyone who reads the requirement comes to the same interpretation as any other reader d. Each implementation of readers matches what the author intended to communicate

a, d

The iterations in Agile method should be Select one or more: a. one week b. one day c. one year d. one month

d

The product champions is Select one: a. a person supplying requirements b. a person of our user community to provide the requirements c. a group members of our user community to provide the requirements d. a few key members of user community to provide the requirements

C

The product champions is Select one: a. a person supplying requirements b. a person of our user community to provide the requirements c. a few key members of user community to provide the requirements d. a group members of our user community to provide the requirements

D

The requirement passed its tests after integration into the product. this is status A. approved B. implemented C. rejected D. verified E. deferred F. deleted

a

The requirement will be implemented in a future release, this is _______status Select one: a. deferred b. approved c. deleted d. implemented e. verified

a, c, d, e

The requirements change management determines Select one or more: a. process for requirements change b. who will implement the functional changes c. which stakeholders need to approve change d. who does not need to be involved e. who will be consulted or informed of change

D

The requirements engineering process is a. a discrete front end activity of the software life cycle b. the same for each organization and process c. a continuous process that ends when requirements are specified and documented d. initiated at the beginning of a project and continues to be refined through lifecycle

B

The requirements engineering process is _ A. The same for each organization and process B. lnitiated at the beginning of a project and continues to be refined throughout the lifecycle. C. A discrete fmntend activity of the software life cycle. D. A continuous process that ends when requirements are specified and documented

A

The software requirements specification should NOT be called ___ A. user requirements B. requirements document C. system specification D. product specification E. a business requirements document (BRD) F. functional specification

D

The software requirements specification should not be called.... a. requirement document b. product specification c. a business requirements document(BRD) d. functional specification e. system specification f. user requirements

A

The system users have stated their needs for revised online order entry system capabilities. Her team needs the ability to perform online, remote order entry when they are traveling worldwide. What class or type of requirements best describe this need? A. Functional requirements B. Business requirements C. User requirements D. Transition requirements

D

The use of traceability tables helps to ...... A. minimize miscommunication and unnecessary rework B. determine the performance of algorithm implementations C. debug programs following the detection of run-time errors D identify, control, and track requirements changes

D

The use of traceability tables helps to _ A. minimize miscommunication and unnecessary rework B. determine the performance of algorithm implementations C. debug programs following the detection of runtime errors D. identify, control and track requirements changes

B

The voice of the customers may be derived from? A. Impact analysis B. Customer complaints C. Business rules D. The business case

D

The work products during requirement elicitation will vary depending in the ............ a. size of budget b. software process being used c. stakeholders needs d. size of the product being built

C

The work products produced during requirement elicitation will vary depending on the _ A. Stakehotders needs B. software process being used C. size of the product being built D. size of the budget

b

To depict the complex logic, which representation technique should be used? Select one: a. Data dictionary b. Decision tree c. Swimlane diagram d. State-transition diagram e. Data flow diagram

a, d

To depict the data definitions and data object relationships, which representation technique should be used? Select one or more: a. Data dictionary b. Data flow diagram c. Context diagram d. Entity relationship diagram e. Swimlane diagram

D

To express the user task descriptions, which representation technique is NOT suitable? A. Scenarios B. User stories C. Use case specifications D. Storyboards

D

To express the users task descriptions, which representation technique is not suitable? a. user stories b. use case specifications c. scenarios d. storyboard

C

To understand user tasks and goals and the business objectives with which those tasks align, the Business Analysis should discuss with users at which stage(s): A. Analysis B. Specification C. Elicitation D. Validation

B

To understand user tasks and goals and the business objectives with which those tasks align, the business analysis should discuss with users at which stage: a. specification b. elicitation c. analysis d. validation

C

To understand user tasks and goals and the business objectives with which those tasks align. the Business Analysis should discuss with users at which stage(s)' A. Validation B. Specification C. Elicitation D. Analysis

c

Updating sets of requirements is an activity of Select one: a. version control b. requirements status tracking c. change control d. requirements tracing

a, b, d

We need decision makers and decision rules to move project ahead including Select one or more: a. resolving conflicts b. meeting between developers and end users c. approving a set of requirements d. accepting or rejecting a proposed change

ABD

We need decision makers and decision rules to move project ahead including Select one or more: a. approving a set of requirements b. resolving conflicts c. meeting between developers and end users d. accepting or rejecting a proposed change

A

What does allocation try to satisfy in the assigning of responsibility to components? A. Requirements B. Validation C. External interfaces D. Testing

c

What happens during static testing? Select one: a. The programmers monitor the data entry screens as data is entered b. The software is installed and tested for any logic errors c. The code is examined for quality and efficiency d. The users report missing functionality to the programmers

c

What happens to a rejected change request? Select one: a. It is closed b. It gets incorporated without anyone knowing c. It stops. d. Nothing

D

What is a best practice for change control? A. Submit multiple changes at one time B. Open and honest communication C. Give overviews of the changes D. Hold change meetings

B

What is a software engineer most likely to resolve by making a unilateral decision? A. Differences between incompatible features B. Differences between developer perception and developer reality C. Differences between requirements and resources D. Differences between functional and non-functional requirements

B

What is a software requirements specification (SRS) document? A. A document listing the time it takes to execute the existing manual processes B. A document detailing software requirements and specifications C. A document which features instructions for how to install new software and test it for errors D. A document used while testing the software code for validity

a

What is a software requirements specification (SRS) document? Select one: a. A document detailing software requirements and specifications b. A document which features instructions for how to install new software and test it for errors c. A document used while testing the software code for validity d. A document listing the time it takes to execute the existing manual processes

D

What is considered the traditional means or requirements elicitation? A. Scenarios B. Observations C. Prototypes D. Interviews

B

What is considered the traditional means or requirements elicitation? a. Observations b. Interviews c. Scenarios d. Prototypes

c

What is not the essential aspects of an agile approach to requirements? Select one: a. Documentation detail b. Expect change c. Budget change d. Customer involvement e. The backlog and prioritization f. Timing

B

What is the best practice for change control A. Hold change meeting B. Give overviews of the changes C. Submit multiple change at one time D. Open and honest communication

B

What is the most common type of scenario elicitation technique? A. The prototype B. The use case C. The facilitator meeting D. Observation

A

What is the most important attribute of a requirement? A. Identifier B. Source C. Verification procedure D. Priority

D

What should the software requirements specification (SRS) writer avoid placing in the SRS environment of the SRS? A. External interfaces B. Performance or functionality C. Attributes or classification D. Either design or project requirements

d

When the BA prepare questions and straw man models in a single requirements elicitation? Select one: a. document requirements b. Perform elicitation activities c. Follow up after elicitation d. Prepare for elicitation

B

When the BA prepare questions and straw man models in a single requirements elicitation? Select one: a. document requirements b. Prepare for elicitation c. Follow up after elicitation d. Perform elicitation activities

D

Which activities are NOT belong to requirements status tracking? A. Tracking the status distribution of all requirements B. Recording the status of each requirements C. Defining possible statuses D. Tracking individual requirements versions

D

Which activities are not belong to requirements status tracking? A. Recoding the status of each requirements B. Tracking the status distribution of all requirements C. Defining possible statuses D. Tracking individual requirements versions

F

Which adverbs are the causes of requirements ambiguity in documenting Software Requirement Specification? A. appropriately B. generally C. reasonably D. usually E. approximately F. all of the mentioned

E

Which adverbs are the causes of requirements ambiguity in documenting Software Requirement Specification? A. reasonably B. generally C. usually D. appropriately E. All of the mentioned F. approximately

C

Which adverbs are the causes of requirements ambiguity in documenting Software Requirement Specification? a. reasonably b. usually c. All of the mentioned d. generally e. approximately f. appropriate

a, d, e, f

Which are the challenges that outsourced projects have to face: Select one or more: a. Remote developers lack the organizational and business knowledge b. Too many candidates c. Incorrect solution expectations d. It's harder to get developer input on requirements and to pass along user feedback on delivered software to developers. e. Language and cultural barriers f. Large time zone differences

a, b, c, e

Which are the most common challenges with packaged solutions? Select one or more: a. Too many candidates b. Vendor misrepresents package capabilities, Users reject the solution c. Incorrect solution expectations d. Large time zone differences. e. Language and cultural barriers

D

Which are the processes in requirement engineering a. Validation b. Elicitation c. Analysis d. All of the mentioned e. Specification f. Requiments management

F

Which are the processes in requirements engineering? A. Elicitation B. Specification C. Analysis D. Validation E. Requirements management F. All of the mentioned

a, b, c, e

Which are the roles of business analyst? Select one or more: a. Document the needs of the project stakeholders b. Elicit the needs of the project stakeholders c. Analyze the needs of the project stakeholders d. Implement the needs of the project stakeholders e. Validate the needs of the project stakeholders

ABCE

Which are the roles of business analyst? Select one or more: a. Analyze the needs of the project stakeholders b. Validate the needs of the project stakeholders c. Elicit the needs of the project stakeholders d. Implement the needs of the project stakeholders e. Document the needs of the project stakeholders

a, b, d, e

Which are the techniques to reprent the project scope Select one or more: a. Feature tree b. Context diagram c. ERD d. Even list e. Ecosystem map f. Use case diagram

ABCF

Which are the techniques to reprent the project scope Select one or more: a. Context diagram b. Ecosystem map c. Feature tree d. Use case diagram e. ERD f. Even list

a, b, c

Which could requirements be reused within an operating environment or platform? Select one or more: a. Constraints b. Interfaces c. Infrastructures of functionality needed to support certain types of requirements (such as a report generator) d. Business rules e. stakeholder profiles

A

Which demension of requirements classification is critical for consideration of tolerant design? a. Whether requirement is a high or low priority b. Whether requirement is volatile or stable c. Whether requirement is functional or non-functional d. Whether requirement is on the product or process

D

Which dimension of requirement classification is critical for consideration of tolerant design? A. Whether the requirement is functional or non-functional. B. Whether the requirement is a high or low priority. C. Whether the requirement is on the product or process. D. Whether the requirement is volatile or stable.

B

Which document is used to derive the software requirements specification? A. The System Definition Document B. System Requirements Specification C. IEEE 1362 Concept of Operations D. IEEE 1016 Software Design Descriptions

b, e

Which is (are) not the roles of business analyst on Agile project? Select one or more: a. Help determine the best approach to document the backlog, including whether story cards or more formal tools are most appropriate b. Preparing reports on programming project specifications, activities, or status c. Ensure that requirements documentation is at the right level: not too little and not too much d. Work with the rest of the team to determine the impact of changes on iteration contents and release plans e. Consulting with engineering staff to evaluate software-hardware interfaces and develop specifications and performance requirements

BE

Which is (are) not the roles of business analyst on Agile project? Select one or more: a. Work with the rest of the team to determine the impact of changes on iteration contents and release plans b. Consulting with engineering staff to evaluate software-hardware interfaces and develop specifications and performance requirements c. Ensure that requirements documentation is at the right level: not too little and not too much d. Help determine the best approach to document the backlog, including whether story cards or more formal tools are most appropriate e. Preparing reports on programming project specifications, activities, or status

a, d

Which is (are) not the taks of business analyst? Select one or more: a. Directing software programming and documentation development b. Identify project stakeholders and user classes c. Manage requirements d. Directing system testing and validation procedure e. Define business requirements f. Plan the requirements approach

CF

Which is (are) not the taks of business analyst? Select one or more: a. Manage requirements b. Plan the requirements approach c. Directing system testing and validation procedure d. Define business requirements e. Identify project stakeholders and user classes f. Directing software programming and documentation development

a, b, c, e, f

Which is (are) the essential Agile techniques to improve traditional requirements documentation? Select one or more: a. compliment user stories with supporting artifacts b. invest in your User Stories c. create prototypes d. Create story board e. create requirements that slice the cake f. groom your User Stories often

D

Which is (are) the skills of business analyst on Agile project? A. Understanifing of the business area that the project is involved with B. Understanding of the agile development process C. Ability to document requirements formally or informally demnding on the need of the project D) All of the mentioned E. Ability to facilitate a team to consensus on scope. design decisions. and implementation decisions

a, b, d, e, f

Which is (are) the type of Agile method? Select one or more: a. Kanban b. Scrum c. Use case driven d. Extreme Programming e. Feature-Driven Development f. Lean Software Development

B

Which is NOT a purpose ofthe software prototype technique? A. Clarify, complete, and validate requirements B. Specific technologies, tools, languages, and databases that must be used or avoided C. Create a subset that will grow into the ultimate product D. Explore design alternatives

D

Which is NOT a technique to find missing requirements? A. Check boundary values for missing requirements B. Trace system requirements, user requirements, event-response lists, and business rules to their corresponding functional requirements to make sure that all the necessary functionality was derived. C. Create a checklist of common functional areas to consider for your projects D. Check a list of tasks corresponding with end users E. Decompose high-level requirements into enough detail to reveal exactly what is being requested

E

Which is NOT a technique to find missing requirements? a. Trace system requirements, user requirement, event-response lists, and business rules to their corresponding functional requirements to make sure that all the necessary functionality was derived b. Create a checklist of common functional areas to consider for your projects c. Decompose high-level requirements into enough detail to reveal exactly what is being requested d. Check boundary values for missing requiments e. Check a list tasks corresponding with end users

F

Which is NOT belong to the case of use case traps? A. Including data definitions in the use cases B. Including design in the use cases C. Highly complex use cases D. Use cases that users don't understand E. Too many use cases F. Depicts detail the use case story

C

Which is NOT describe the correct purpose of requirements elicitation? A. Collect, discover. extract. and define requirements B. Discover business. user. functional. and nonfunctional requirements. along with other types of information C. Collect. discover. extract. and define exactly what are the outputs of project. D. Identify the needs and constraints of the various stakeholders for a software system.

C

Which is NOT describe the correct purpose of requirements elicitation? a. Collect, discover, extract, and define requirements b. Discover bussiness, user. functional, and nonfunctional requirements. along with other types of information c. Collect, discover, extract and define exactly what are the outputs of project d. Identify the needs and constraints of the various stakeholders for a software system

C

Which is NOT the advantage of Agile methods? A. adapt with the requirements changes of stakeholders B. modify what already exists, enrich the initial features, add new ones, and correct defects that were discovered C. puts considerable effort into trying to get the full requirements set 'iight" early on. D. the development team could add a small set of functionalities based on priorities established by the customer E. breaking the development of software into short cycles

B

Which is NOT the helpful of product backlog? A. It helps in planning the roadmap forthe product B. It helps in managing the demands of stakeholders C. It helps in determining what to prioritize first. Team ranks the item and then builds value. D. It helps in re-ranking the features so that more value can be added to the product- E. It is prepared so that estimates can be given to each and every feature

B

Which is NOT the most important characteristics of product backlog? A. Ranking of features is done based on business value, technical value, risk management or strategic fitness. B. Lowest ranking items are decomposed into smaller stories during release planning so that they can be completed in future iterations C. Highest ranking items are decomposed into smaller stories during release planning so that they can be completed in future iterations D. Multiple teams can work on a single product backlog. E. Each product should have one product backlog which can have a set of large to very large features.

A

Which is NOT the reuse barrier? A. Organizational culture B. Inconsistent organization C. Writing style D. Ownership E. Projecttype

D

Which is NOT the type of internal quality? A. Verifiability B. Modifiability C. Efficiency D. availability E. Scalability

A

Which is NOT the type of requirements development tools? A Requirement Management tools B. Elicitation tools C. Modeling tools D. Prototyping tools

B

Which is not a reuse success factor? A. Organizational culture B. National culture C. Quality D. Terminology E. Repository F. Interactions

D

Which is not a reuse success fator? A. repository B. Organizational culture C. Teminology D. National culture E. Quality F. Interactions

E

Which is not advantages of agile methods? a. breaking the development of software into short cycles b. the development team could add a small set of functionalities based on priorities established by the customer c. modify what already exists, enrich the initial features, add new ones, and correct defects that were discovered d. adapt with the requirements changes of stakeholders e. puts considerable effort into trying to get the full requirements set "right" early on

c

Which is not an activity for a single requirements elicitation session? Select one: a. Follow up after elicitation b. Perform elicitation activities c. Requirements Documentation d. Prepare for elicitation

B

Which is not an activity for a single requirements elicitation session? Select one: a. Perform elicitation activities b. Requirements Documentation c. Prepare for elicitation d. Follow up after elicitation

E

Which is not the helpful of product backlog? a. it helps in re-ranking the features so the more value can be added to the product b. it helps in determining what to prioritize first. Team ranks the item and then build value c. it helps in managing the demands of stakeholder d. it helps in planning the roadmap for the product e. it is prepared so that estimates can be given to each and every feature

E

Which is not the most important characteristic of product backlog? a. Multiple teams can work on a single product backlog b. Each product should have one product backlog which can have a set of large to very large features c. Lowest ranking items are decomposed into smaller stories during release planning so that they can be completed in future iterations d. Ranking of futures is done based on business value, technical value, risk management or strategic fitness e. Highest ranking items are decomposed into smaller stories during release planning so that they can be complete in future iterations

b

Which is not the purpose of software prototype? Select one: a. Clarify, complete, and validate requirements b. Specific technologies, tools, languages, and databases that must be used or avoided c. Create a subset that will grow into the ultimate product d. Explore design alternatives

D

Which is not the reuse barrier? A. Ownership B. Project type C. Inconsistent organization D. Organizational culture E. Writing style

D

Which is not the type of requirements development tools? A. Modeling tool b. Elicitation tools c. Prototyping tools d. requirements management tools

C

Which is not type of internal quality? a. Modifiability b. Efficiency c. Availability d. Verifiability e. Scalability

b

Which is one of the most important stakeholder from the following ? Select one: a. Managers b. Users of the software c. Entry level personnel d. Middle level stakeholder

A

Which is one of the most important stakeholder from the following ? Select one: a. Users of the software b. Middle level stakeholder c. Managers d. Entry level personnel

B

Which is the benefits of the reuse requirements technique? A. to estimate implementation effort if you have data available from implementing the same requirements on a previous project. B. All of the mentioned answers C. improve functional consistency across related members of a product line or among a set of business applications D. Faster delivery, lower development costs, consistency both within and across applications, higher team productivity, fewer defects, and reduced rework. E. save review time, accelerate the approval cycle, and speed up other project activities, such as testing

d

Which is the definition of functional requirement? Select one: a. A goal or task that specific classes of users must be able to perform with a system, or a desired product attribute b. A policy, guideline, standard, or regulation that defines or constrains some aspect of the business. Not a software requirement in itself, but the origin of several types of software requirements c. A description of a property or characteristic that a system must exhibit or a constraint that it must respect d. A description of a behavior that a system will exhibit under specific conditions e. A top-level requirement for a product that contains multiple subsystems, which could be all software or software and hardware f. A restriction that is imposed on the choices available to the developer for the design and construction of a product

D

Which is the definition of functional requirement? Select one: a. A goal or task that specific classes of users must be able to perform with a system, or a desired product attribute b. A restriction that is imposed on the choices available to the developer for the design and construction of a product c. A description of a property or characteristic that a system must exhibit or a constraint that it must respect d. A description of a behavior that a system will exhibit under specific conditions e. A top-level requirement for a product that contains multiple subsystems, which could be all software or software and hardware f. A policy, guideline, standard, or regulation that defines or constrains some aspect of the business. Not a software requirement in itself, but the origin of several types of software requirements

d

Which is the definition of nonfunctional requirement? Select one: a. A description of a behavior that a system will exhibit under specific conditions b. A policy, guideline, standard, or regulation that defines or constrains some aspect of the business. Not a software requirement in itself, but the origin of several types of software requirements c. A top-level requirement for a product that contains multiple subsystems, which could be all software or software and hardware d. A description of a property or characteristic that a system must exhibit or a constraint that it must respect e. A goal or task that specific classes of users must be able to perform with a system, or a desired product attribute f. A restriction that is imposed on the choices available to the developer for the design and construction of a product

D

Which is the definition of nonfunctional requirement? Select one: a. A description of a behavior that a system will exhibit under specific conditions b. A restriction that is imposed on the choices available to the developer for the design and construction of a product c. A policy, guideline, standard, or regulation that defines or constrains some aspect of the business. Not a software requirement in itself, but the origin of several types of software requirements d. A description of a property or characteristic that a system must exhibit or a constraint that it must respect e. A goal or task that specific classes of users must be able to perform with a system, or a desired product attribute f. A top-level requirement for a product that contains multiple subsystems, which could be all software or software and hardware

a, b, d, e

Which is(are) external quality? Select one or more: a. Installability b. Integrity c. Efficiency d. Availability e. Security

a

Which is(are) quality attributes that we should consider their effects on desktop and mobile systems: Select one: a. performance, security, usability b. integrity, interoperability, performance c. availability, integrity, interoperability d. performance, efficiency, reliability

a, b, c, e

Which is(are) the limitations of a document-based approach in developing and managing requirements ? Select one or more: a. Communicating changes to all affected team members is a manual process b. It's not easy to store supplementary information—attributes—about each requirement. c. It's hard to define links between requirements and other system elements d. Manage and prioritize backlogs, allocate requirements to iterations e. It's difficult to keep the documents current and synchronized.

c

Which is(are) the main purpose of use cases? Select one: a. Provide a brief description of the reason for and outcome of system b. Exploring the requirements for embedded and other real-time systems c. Exploring the requirements for business applications, websites, kiosks, and systems that let a user control a piece of hardware d. Exploring the requirements for batch processes, computationally intensive systems, business analytics, and data warehousing.

D

Which is(are) the main purpose of use cases? Select one: a. Exploring the requirements for batch processes, computationally intensive systems, business analytics, and data warehousing. b. Exploring the requirements for embedded and other real-time systems c. Provide a brief description of the reason for and outcome of system d. Exploring the requirements for business applications, websites, kiosks, and systems that let a user control a piece of hardware

D

Which is(are) the skills of business analyst on Agile project? A. Understanding of the business area that the project is involved with B. Understanding of the agile development process C. Ability to facilitate a team to consensus on scope, design decisions, and implementation decisions D. All of the mentioned E. Ability to document requirements formally or informally depending on the need of the project

a, b, d

Which is(are) true when we compare the purpose use case diagram and context diagram? Select one or more: a. The arrows in a context diagram indicate the flow of data, control signals, or physical materials across the system boundary b. The arrows in a use case diagram simply indicate the connections between actors and use cases in which they participate; they do not represent a flow of any kind c. The use case diagram depicts the data and functions of project while context diagram only illustrates the flow of data. d. Both define the scope boundary between objects that lie outside the system and things inside the system

BCD

Which is(are) true when we compare the purpose use case diagram and context diagram? Select one or more: a. The use case diagram depicts the data and functions of project while context diagram only illustrates the flow of data. b. The arrows in a context diagram indicate the flow of data, control signals, or physical materials across the system boundary c. Both define the scope boundary between objects that lie outside the system and things inside the system d. The arrows in a use case diagram simply indicate the connections between actors and use cases in which they participate; they do not represent a flow of any kind

b

Which is/are not the requirements elicitation techniques? Select one or more: a. Interviews b. Rational Unified Process(RUP) c. Workshops d. Focus groups e. Questionaires

C

Which is/are not the requirements elicitation techniques? Select one or more: a. Workshops b. Focus groups c. Rational Unified Process(RUP) d. Interviews e. Questionaires

B

Which of the following is NOT a good characteristic well written of a software requirements specification? A. Ranked B. Redundant C. Consistent D. Verifiable

A

Which of the following is NOT a type of software requirement? A. Complexity B. Performance C. Functionality D. External Interface

c

Which of the following is NOT the purpose of software verification and validation? Select one: a. To make sure that there are no programming errors in the software b. To make sure that the users are correctly using the program c. To make sure there are no errors when running the program d. To make sure that all software requirements have been implemented

A

Which of the following is most true about a non-funcitional requirements ? a. acts to constrain the software solution b. describes funcitions software is to execute c. is derived from hardware requirements d. is highly sensitive to the system architecture

B

Which of the following is most true about a non-functional requirement? A. Describes functions software is to execute B. Acts to constrain the software solution C. Is highly sensitive to the system architecture D. Is derived from hardware requirements

B

Which of the following is not a good characteristic well written of a software requirement specification? a. consistent b. ranked c. verifiable d. redundant

C

Which of the following is not a type of software requirement? a. Functionality b. External Interface c. Complexity d. Performance

B

Which of the following is not embedded design that would be written in the SRS? A. Partitioning of software into modules B. Specify logical requirements for the software C. Describe the flow of information or control between modules D. Choose data structures

C

Which of the following is the technical manager not responsible for? A. Determining the adequacy of the requirements specifications. B. Controlling the volatility of the requirements and manage change history. C. Re-estimating the cost and schedule of the project when the requirements change. D. Negotiating requirements changes between the acquirer (customer) and the developer.

C

Which of the following phrases most closely approaches verifiable language? A. "A good operability" B. "Well enough" C. "According to Standard X" D. "Usually acceptable"

A

Which of the following property is least critical to the interaction between process actors and the requirements process? A. The education of the actor B. The nature of their 'stake' in the process C. The requirements they elicit D. Process actor identification

D

Which of the following property is least critical to the interaction between process actors and the requirements process? A. The nature of their stake in the process B. The requirements they elicit C. Process actor identification D. The education of the actor

C

Which of the following requirement properties would be considered an emergent property of a software program? A. The fault detection system of the software B. The programming language of the system C. The reliability of the software D. The number of lines of code

B

Which of the following you should be based on when you estimate the projectsize and effort? A. Function points (Jones 1996b;IFPUG 2010) B. All of the mentioned answers C. The number, type, and complexity of user interface elements D. Story points (Cohn 2005;McConnell 2006) or use case points (Wiegers 2006) E. Estimated lines of code needed to implement specific requirements F. The number of individually testable requirements (Wilson 1995)

D

Which of these steps in the planned change process puts the change plan in to action? a. Recognize the need for change b. Develop the change plan c. Select the change agent d. Implement the change

A

Which of these steps in the planned change process puts the change plan into action? A. Implement the change B. Select the change agent C. Develop the change plan D. Recognize the need for change

d

Which one of the following is a functional requirement ? Select one: a. Robustness b. Security c. Maintainability d. Order products e. Portability

D

Which one of the following is a functional requirement ? Select one: a. Maintainability b. Security c. Robustness d. Order products e. Portability

C

Which requirements should NOT be reused in the scope of cross an enterprise? A. Business rules B. Security requirements C. Constraints D. Stakeholder profiles

B

Which requirements should NOT be reused within an operating environment or platform? A. Infrastructures of functionality needed to support certain types of requirements (such as a report generator) B. stakeholder profiles C. Constraints D. Interfaces

B

Which technique overtaps for use in requirements elicitation and requirements validation? A. Facilitator meetings B. Prototypes C. Observations D. Interviews

a, b

Why do the business requirements conflict? Select one or more: a. Because they are collected from multiple documents b. Because they come from a wide range stakeholders c. Because they are issued from end users d. Because they are collected from group of developers

AC

Why do the business requirements conflict? Select one or more: a. Because they come from a wide range stakeholders b. Because they are issued from end users c. Because they are collected from multiple documents d. Because they are collected from group of developers

C

Why is Requirements Management important? It is due to the changes A. in technology B. in customer's expectations C. all ofthe mentioned D. to the environment E. in the demand of stakeholders

E

Why is Requirements Management important? It is due to the changes A. lotheenvironment B. intechnology C. in customers expectations D. in the demand of stakeholders E. All of the mentioned

B

Why is base-lining project? A. To get disagreement for all the requirements of project B. To get an agreement for each set of requirements after the team implements them C. To minimize miscommunication and unnecessary rework D. To get an agreement for all the requirements of project

B

Why is base-lining project? A. To minimize miscommunication and unnecessary rework B. To get an agreement for each set of requirements after the team implements them C. To get disagreement for all the requirements of project D. To get an agreement for all the requirements of project

A

Why is base-lining project? a. To get am agreement for all the requirement of project b. To minimize miscommunication and unnecessary rework c. To get disagreement for all the requirement of project d. to get an agreement for each set of requirement after the team implement them

A

Why is requirements management importance? it is due to the changes A. All of the mentioned B. to the environment C. in customer's expectations D. in technology E. in the demand of stakeholders

a, b, c, d

Why reuse requirements? Select one or more: a. Faster delivery, lower development costs, consistency both within and across applications, higher team productivity, fewer defects, and reduced rework. b. to estimate implementation effort if you have data available from implementing the same requirements on a previous project. c. save review time, accelerate the approval cycle, and speed up other project activities, such as testing d. improve functional consistency across related members of a product line or among a set of business applications

a, b, c, d

Why should we prioritize the requirements? Select one or more: a. To provide the highest value at the lowest cost. b. To deal with competing demands for limited resources c. Develop products through a series of fixed-schedule timeboxes for agile or other projects d. Help the project deliver the maximum business value as quickly as possible within the project constraints

A

____ is the process of examining a project to identify potential threats A. Risk assessment B. Risk resolution C. Risk monitoring 0. Risk avoidance E. Risk control

A

______________ the requirement passed its tests after intergration into the product, this is _________ status a. verified b. deferred c. deleted d. rejected e. implemented f. approved

d

_____________is a comparison of functionality between an existing system and a desired new system. Select one: a. Requirement elicitation b. Use cases analysis c. Document analysis d. Gap analysis

QN=10 In figure 4.15, the ER diagram is a confusing requirement. a. True b. False

a

QN=10 ________ Statements state properties about the system that hold regardless of how the system behaves. Such properties hold typically because of some natural law or physical constraint. a. Descriptive b. Description c. Prescriptive d. Prescription

a

QN=10 ____________________ form an effective technique for quality assurance, it is the widest in scope and applicability. a. "Requirements inspection and reviews" b. "Queries on a requirements database" c. "Requirements validation by specification animation" d. None of the others

a

QN=11 A_________ is captured by a sequence of state transitions for the system items that the component control a. Behavior b. State c. SM state transition d. SM trace e. SM State

a

QN=11 An______ link may be introduced between an object Ob and objects PartOb1,... PartObn if every current instance of Ob is a tuple of current instances of PartOb1, ...., PartObn. a. aggregation b. composition c. association d. combination

a

QN=12 Which of the following items is a range of estimated score percentage of option (opt) on criterion (crit): Score (opt, crit) ? a. 0-->1 b. 0-->0.99 c. 0-->10 d. 0-->100

a

QN=12 Which refinement pattern is applied for the goal refinement in the figure 8-12? [CopyBorrowedIfAvailable] Def A book has a copy available for the requesting borrower [CopyDueSoonIfNotAvailable] Def A book without any copy available for loan shall have a copy available within 15 days for the requesting borrower a. Case-driven refinement pattern b. Guard-introduction pattern c. Divide-and-conquer pattern d. Milestone-driven refinement pattern

a

QN=2 An agent is an ______ system component play a role in goal satisfaction. a. Active b. Passive c. Instantaneous d. none of the others

a

QN=2 Behavioral goals are used for building _________ specifications of the system. a. Operational b. Non-functional c. Critical d. None of the others

a

QN=2 Traceability relies on the existence of ___________ between items that we can follow backwards, towards source items, and forwards, towards target items. a. Dependency links b. Transitions c. Associations d. None of the others

a

QN=3 External events: the agent associated with the State Machine does not controls. a. True b. False

a

QN=3 The phase "Individual reviewing", inspectors reads the Requirement Document for defects. They can operate this phase in which of the following modes? a. Free mode, process-based mode, checklist-based mode b. Free mode, guideline-based mode, checklist-based mode c. Free mode, guideline-based mode, process-based mode d. Free mode and checklist-based mode

a

QN=3 To document assumption and requirement changes, we may assign qualitative levels of ________ to the statements, or levels of ________ in the case of multiple variants. a. Stability / Commonality b. Revisions / Variants c. Derivations / Dependencies d. None of the others

a

QN=4 In an SM diagram, a transition is labelled by _____ from a source state to a target state. a. an event b. an action c. an operation d. None of the others

a

QN=4 Which of the following is an elicitation technique that provides a concrete flavor of what the software will look like? a. Prototypes and mock-ups b. Background study c. Data collection d. Card sorts and repertory grids

a

QN=5 In Figure 4.9, "DetermineSchedule - <<include>> - ResolveConflicts" means: a. ResolveConflicts is a 'sub-operation' of DetermineSchedule. b. ResolveConflicts is an 'alternative-operation' of DetermineSchedule.

a

QN=5 In a _________ project, a brand new software solution is built from scratch to address problems with the system-as-is and exploit new opportunities from technology evolution or market conditions. a. greenfield b. customer-driven c. brownfield d. market-driven

a

QN=5 In figure 14.4, which one of the following word is the name of (A): a. Association b. Relationship. c. ConceptualObject. d. None of the others.

a

QN=5 Which is not a concept-driven acquisition technique? a. Interview b. Repertory grids c. Card sorts d. Conceptual laddering

a

QN=5 Which one of the following statements about required condition is true? In a state machine diagram, a guard condition captures a _______ condition for state transition. a. necessary b. sufficient

a

QN=6 Dependency is the most general type of traceability link that can be specialized into _____ and _____ links within a single version. a. Use / Derivation b. Variant / Revision c. Revision / Derivation d. None of the others

a

QN=6 Goals are generally found by top-down ________ of higher-level concerns and by bottom-up ______ from lower-level material such as scenario examples and operational descriptions. a. Refinement / abstraction b. Abstraction / refinement c. Generalization / specialization d. Specialization / generalization

a

QN=6 The goals of risk assessment is to assess likelihood of risks, _________, likelihood of consequences, to control high-priority risks a. risk severity b. risk resolution c. risk control d. risk management

a

QN=6 The operation is not applied if a trigger condition becomes true in a state where the operation's domain pre-condition is not true. a. True b. False

a

QN=7 Figure 4.10 shows an Event Trace Diagram specifying a meeting scheduling scenario. The first event is meetingRequest, ________ by an Initiator instance and _________ by a Scheduler instance. a. controlled/monitored b. monitored/controlled c. requested/responded d. responded/requested

a

QN=7 In figure 14.7, which one of the following word is the name of (C): a. BehaviourModel b. OperationModel c. GoalModel d. AgentModel

a

QN=8 An AND-refinement of obstacle O into sub-obstacles O1, O2,..., On should meet the following conditions: 1) {O1, O2, ..., On, Dom} |≠ false complete AND-refinement 2) {O1, O2, ..., On, Dom} |= O consistent AND-refinement 3) {O1,..., O(j-1), O(j+1), ..., On, Dom} |≠ O minimal AND-refinement Which pair of the arguments is wrong? a. 1 & 2 b. 1 & 3 c. 2 & 3 d. All of arguments are true

a

QN=8 An attribute is _______________. a. An intrinsic feature of an object regardless of other objects in the model b. A relevant feature of an object, including the association with other objects in the model c. A quantitative feature of an object d. none of the others

a

QN=8 For a binary decision table with N entry conditions, there must be _______ columns for the table to list all possible combinations of conditions exhaustively. a. 2^N b. 2xN c. N^2 d. None of the others

a

QN=8 For stepwise refinement of a state diagram, we decompose a state into sequential or parallel sub-states. a. true b. false

a

QN=8 Goals provide a basic abstraction for addressing the _____ dimension of requirements engineering. a. WHY b. WHO c. WHAT d. HOW

a

QN=8 In state machine diagram, the event occurrence is a ________ condition for transition firing, whereas a guard is a ________ condition for firing. a. sufficient/necessary b. necessary/sufficient

a

QN=8 The goals of _______ is to reduce high-exposure risks through countermeasures a. Risk control b. Risk assessment c. Risk management d. Risk identification

a

QN=9 In figure 4.11, the "Planning" state (source state) changes to "MeetingScheduled" state (target state) if __________ (the event) occurs and only if _________ (the guard condition) is true. a. scheduleDetermination/[No conflicts] b. [No conflicts]/scheduleDetermination

a

QN=9 A use case diagram provides an outline view of an operation model by showing the operations that an agent performs together with ________ with other agents. a. interaction links. b. responsibility links c. operationalization links d. None of the others

a

QN=9 In requirements validation by specification animation, the _______ is an execution of the software model, and an animation is a visualization of the simulated model in its environment. a. Simulation b. Scenarios c. Validation d. Animator

a

QN=9 The name of elements defined in a package are __________. a. local to the package and its descendants. b. public to all packages. c. None of the others.

a

QN=9 What is an agent-goal co-refinement process? a. A process in which an agent and its assigned goals are refined in parallel into finer-grained agents, sub-goals and responsibility assignments b. A process in which agents and assigned goals are generalized in parallel into coarse-grained agents and abstract goals c. Both of above statements are wrong

a

QN=9 Which part of Figure 13.4 is called "episode"?. a. (A) b. (B)

a

QN=9 _____________ requires us to identify likely changes, assess their likelihood and document them in the Requirement Document. a. Change anticipation b. Change assessment c. Change validation d. None of the others

a

QN=11 Which of the following actions does the review board need to do when reviewing changes of requirements (Choose three)? a. Understand the context of the requested change. b. Assess the benefits of proposed change. c. Estimate the cost and feasibility of the changes d. Maintains a wishlist of possible changes (identified by insiders or collected from outsiders) e. Consolidates the wishlist into a change request

a,b,c

QN=11 Which of the following questions are in the checklist used for verifying "Poor structuring" defect type (choose three)? a. Is the structuring rule for organizing these RD sections apparent? b. Does this RD item cover unrelated requirements? c. Does this RD item mix requirements and assumptions together? d. Would there be alternative sensible choices? e. Does this statement entail a premature design choice?

a,b,c

QN=12 Which of the following are differences of problem diagram comparing with context diagram? a. A rectangle with double vertical stripe represent the machine to be built b. A rectangle with a single vertical stripe represent the component to be designed c. Shared phenomena are controlled/monitored by components d. An interface can be declared separately the exclamation mark after a component name prefixing

a,b,d

QN=13 OR-refinement of obstacle O should be ... a. {subOi, Dom } |= O b. {subOi, subOj, Dom } |= false c. {subO1,..., subOj-1, subOj+1 , ..., subOn, Dom } |= O d. {not subO1,..., not subOn, Dom } |= not O e. {subOi, Dom } |≠ false

a,b,d,e

QN=11 Obstacles completeness can show about ______ and_______ (Choose two) a. what we know about the domain and how adequate our knowledge is b. existential property capturing unadmissible behavior (negative scenario) c. obstacle analysis may help elicit and validate relevant domain properties d. condition on system for violation of corresponding assertion

a,c

QN=13 Which of the following are semantic rules used to define sequential state decomposition? a. The instance modelled by the diagram is in the super-state if and only if it is in one (and only one) of the sequential sub-states b. The instance modelled by the diagram is in the super-state if and only if it is in each of the concurrent sub-states c. An incoming transition to the super-state is by default inherited by every sequential sub-states as an incoming transition to it.

a,c

QN=13 Which of the following questions are in the checklist used for verifying "Ambiguity" defect type (choose two)? a. Can this statement be interpreted differently in different relevant contexts? b. Is the structuring rule for organizing these RD sections apparent? c. Are there other statements using this term with different meaning? d. Does this RD item cover unrelated requirements? e. Does this RD item mix requirements and assumptions together?

a,c

QN=4 The goal model captures ______ and_______ a. responsibility links between goals and conceptual objects b. obstruction links between goals and obstacles c. reference links from goals to system agents d. operationalization links between goals and system operations e. coverage links between goals and scenarios

a,c

QN=12 Which of the following are activities to be done in "Change Consolidation" stage of change control process (choose three)? a. Baselining of the new version of the RD for sharing among project members until the next version is baselined b. Prioritize the accepted changes. c. Forward propagation of all RD changes downward to software lifecycle items along vertical links of traceability graph. d. Updating of the traceability graph. e. Detect potential conflicts among the proposed changes.

a,c,d

QN=11 Which of the following items are not non-functional goals (Choose two)? a. Information b. Compliance c. Safety d. Security e. Satisfaction

a,e

QN=1 A meta-model is a conceptual model for the meta-level, the highest level, thus consisting of concepts, relationships, attributes and constraints defined in all levels (meta-, domain- and instance-level). a. True b. False

b

QN=1 A/An ________ designates an object instance to which the operation applies. The state of this instance affects the application of the operation. a. State variable b. Input variable c. Out variable d. None of the others

b

QN=1 An AND-refinement states that the parent goal can be satisfied by satisfying ___ sub-goals in the refinement. a. one of b. all c. some of

b

QN=1 An agent model captures the ____-dimension of requirements engineering a. WHY b. WHO c. WHAT d. HOW

b

QN=1 Obstacle analysis is a ______ of risk analysis aimed at identifying, assessing and resolving the possibilities of breaking assertions in the system's goal mod a. assertion-based form b. goal-based form c. obstacle-based form d. requirement-based form

b

QN=1 The target of ________ is a set of low-risks, conflict-free requirements and assumptions that stakeholders agree on. a. Domain Understanding and Elicitation b. Requirements Evaluation c. Requirements Specification d. Requirements Validation

b

QN=1 Which of the following techniques has the process as below? 1. RETRIEVE relevant knowledge from other systems 2. TRANSPOSE it to the target system 3. VALIDATE the result, ADAPT it if necessary & INTEGRATE it with the system knowledge already acquired a. Scenarios b. Knowledge reuse c. Interview d. Data Collection

b

QN=10 figure 9.9 - Breaking goals and domain hypotheses in the airbus A320 braking logic (A) / (B) should be. a. Not ReverseThrustEnabled / Not WheelsTurning b. ReverseThrustEnabled And Not WheelsTurning / WheelsTurning And Not ReverseThrustEnabled c. ReverseThrustEnabled IF WheelsTurning / WheelsTurning IF Not ReverseThrustEnabled d. None of the others

b

QN=10 A scenario is a temporal sequence of interaction events among agent. a. True b. False

b

QN=10 In _______ scheme, the agent instance applies the operation when it is really obliged to do so; that is, when one of the operation's required trigger conditions becomes true. a. an eager behaviour b. a lazy behaviour

b

QN=10 In a Change Control process, the necessity, feasibility, benefits, impact and cost of the requested changes are evaluated by a __________ a. Inspector b. Review board c. Stakeholder d. None of the others

b

QN=10 In specialization, the object SubOb plays the role ______ whereas the object SuperOb plays the inverse role ______. a. Generalizes / Specializes b. Specializes / Generalizes c. IsA / SubClassOf d. SubClassOf / IsA

b

QN=11 Give Evaluation Criteria (NFRs) of scheduling Meeting program to quantitative reasoning for evaluation options as below: - Fast responds: (Significance weighting: 0.30; Option 1 score: 0.40) - Realizable response: (Significance weighting: 0.50; Option 1 score: 0.80) - Minimal inconvenience: (Significance weighting: 0.10; Option 1 score: 0.30) Which of the following is a total score of option 1? a. 0.52 b. 0.55 c. 0.57 d. 0.5

b

QN=11 Given figure 8-11 below. Which of the followings is a pattern used in the figure? a. Case-driven refinement pattern b. Guard-introduction pattern c. Divide-and-conquer pattern d. Milestone-driven refinement pattern

b

QN=11 The following statement is an example of ____ statement: - The same book copy can not be borrowed by two different people at the same time. a. Prescriptive b. Descriptive c. Description d. Prescription

b

QN=11 ______________ can be helpful for eliciting non-functional requirements related to usability, performance, and costs. a. Questionnaires b. Data Collection c. Background study d. Knowledge reuse

b

QN=12 All of the following statements about structural consistency of the goal and behavior models are incorrect, EXCEPT? a. Every conceptual item referred to in a goal specification in the goal model must appear as an attribute or action in the behavior model b. Every scenario in the behavior model must be covered by at least one goal in the goal model c. For every SM state in the goal model, there must be at least one goal in the goal model refer to it d. Every goal in the goal model must concern at least an action or an event in the behavior model

b

QN=12 _______ is a particular case of aggregation whether the composite object Ob and its parts PartObi appear and disappear together in the system. a. aggregation b. composition c. association d. combination

b

QN=13 Peter is responsible for goals discovery in RE. He uses some words like "in order to, so as to, so that,.. etc." to search goals in documents. Which of the followings is a Heuristic rules that Peter is using? a. Analyze current objectives & problems in system-as-is b. Search for goal-related keywords c. Instantiate goal categories d. By abstraction e. By refinement

b

QN=13 ________ shows aspects related to software functionalities. a. A Software prototypes b. A functional prototypes c. A user interface prototypes d. Screen mock-ups

b

QN=13 _____________ refers to the use of goals for requirements elicitation, evaluation, negotiation, elaboration, structuring, documentation, analysis and evolution. a. Goal b. Goal-oriented RE c. Requirement Engineering d. Requirement Management

b

QN=2 An obstacle is a pre-condition for ______ of some goal, hypothesis or questionable domain property used in the goal model. a. satisfaction b. non-satisfaction c. Weakness d. Divergent

b

QN=2 In positive scenario, the sequence of interactions illustrates a possible way of satisfying an obstacle to a goal. a. True b. False

b

QN=2 ______, the system as it should be when the machine will be built and operated in it. a. system-exist b. system-to-be c. system-to-be-next d. system-as-is

b

QN=3 An expectation is a goal assigned to a single agent of the _________. a. problem world b. environment c. system-to-be d. system-as-is

b

QN=3 Domain pre- and post-conditions are prescriptive. a. True b. False

b

QN=3 The data-activity duality principle requires actigram items to have some __________ in a datagram, and vice versa. a. Countermeasures b. Counterparts c. Opponents d. Companions

b

QN=3 The instance level is made of concepts that are instances of meta-level abstractions. a. True b. False

b

QN=3 The machine's software to be developed or modified is just one component of the system-to-be that refers to a. software-as-is b. software-to-be c. system-to-be-next d. system-as-is

b

QN=3 Which is not an obstacle to effective knowledge acquisition? a. Distributed and conflicting knowledge sources b. Stable conditions c. Difficult access to sources d. Tacit knowledge and hidden needs

b

QN=3 Which of the following statements about agent capabilities is wrong?. a. An agent monitors an attribute of an object if its instances can get the value of this attribute from object instances b. An agent monitors an association if its instances can control this association holds between object instances c. An agent controls an attribute of an object if its instances can set values for this attribute on object instances d. An agent controls an association if its instances can create and delete association instances

b

QN=4 A goal under the responsibility of an agent must be realizable by the agent in view of its ________. a. Responsibilities b. Capabilities c. Realizabilities d. None of the others

b

QN=4 Because the requirements errors are the most expensive, numerous and persistent software errors, so "requirements inspection & review process" should be applied as soon as possible. a. TRUE b. FALSE

b

QN=4 In "Traceability management process", which one of the following phases is concerned with four issues: the link granularity, link semantic richness, link accuracy and link overhead? a. Define traceability policy b. Establish traceability links c. Exploit traceability links d. Maintain traceability links

b

QN=4 The following sample statement is a ________ statement. The staff's viewpoint in our library system might state, 'a borrower should return a borrowed book copy within two weeks'. A stakeholder having the borrower's viewpoint might state, 'a borrower should keep a borrowed book copy as long as he or she needs it'. a. Strong conflict b. Weak conflict or divergence c. Structure clash d. Designation clash

b

QN=4 The specification of an operation therefore includes a set of prescriptive conditions on operation applications. These conditions are aimed at ensuring that ______. a. the operation is dependent on the goals b. the goals underlying the operation are satisfied c. the operation associates with the goals d. None of the others

b

QN=5 Goal obstruction propagates _______ along goal AND-refinement trees a. top-down b. bottom-up

b

QN=5 The association is also called under synonymous term __________ a. 'relation' b. 'relationship' c. 'linked object' d. none of the others

b

QN=5 Which one of the following activities should be done in "Change evaluation & prioritization" phase of "Change Control" process? a. The team in charge of the project handles all approved changes to produce a new system version. b. The review board is responsible to assess the merits, feasibility and cost of the proposed changes in the change request. Some proposed changes are approved, others are rejected and others are deferred. c. The team in charge of project maintains a wishlist of possible changes. At certain time intervals, the team consolidates the wishlist into a change request. d. None of the others.

b

QN=6 Each linked object in an association plays specific _____ in the association a. Relation b. Role c. Link d. none of the others

b

QN=6 In figure 14.6, which one of the following word is the name of (B): a. Responsibility b. Operationalization c. Performance d. Capability

b

QN=6 The goals G1, G2, ..., Gn are divergent in a domain Dom if we can find a feasible boundary condition B under which the goals cannot satisfied the arguments a. {G1, G2, ..., Gn, B, Dom} |= true b. {G1, G2, ..., Gn, B, Dom} |= false c. {G1, G2, ..., Gn, B, Dom} |= G d. {G1, G2, ..., Gn, B, Dom} |≠ G

b

QN=6 The initial states of the instance correspond to the states where it disappears from the system. a. True b. False

b

QN=6 Which one of the following modes of individual reviewing rely on lists of specific issues to address while searching for defects? a. Checklist-based mode b. Checklist-based and Process-based modes c. Free mode d. None of the others

b

QN=6 not (if A then B) amounts to: a. not A and not B b. A and not B c. not A and B d. not A or not B

b

QN=7 In figure 13.6, the pair of object instances [PatrID, self] is called: a. the parameters of event checkOut b. the attributes of event checkOut c. the guard conditions of event checkOut d. None of the others.

b

QN=7 A goal model makes it possible to capture _______ alternative options a. only one kind of (Alternative goal refinements) b. two kinds of (Alternative goal refinements, Alternative responsibility assignments) c. three kinds of (Alternative goal refinements, Alternative goal contributions, Alternative responsibility assignments) d. None of the others

b

QN=7 Assume that risk (r) only cause one consequence (c). Give Likelihood (c) = 0.7, Severity (c) = 5, cost(cm) = 0.5. Exposure(r) = a. 1.15 b. 3.5 c. 2.5 d. 0.35

b

QN=7 Domain-specific checklists specialize the defect-based ones to the specific constructs of the structured, semi-format or formal specification language used in the requirement document. a. TRUE b. FALSE

b

QN=7 Like in any risk management process, obstacle analysis is an iteration of _______ cycles. a. Elicit - Evaluate - Control b. Identify - Assess - Control c. Plan - review - evaluate - consolidate d. None of the others

b

QN=7 The multiplicity on one side of an association specifies the minimum and maximum number of object instances on _______ that may be associated. a. the other side b. this side c. both sides d. None of the others

b

QN=7 Which one of the following statements is the definition of "capability instance declaration" (CID)?. a. It annotating a performance link in an agent diagram makes precise which agent instance is performing the operation on which input/output object instance b. It annotating a monitoring or control link makes precise which agent instance is monitoring or controlling the attribute/association of which object instance c. It annotating a responsibility link in an agent diagram makes it precise which agent instance is responsible for which goal instantiation to specific object instances d. None of the others

b

QN=8 An operationalization diagram is an annotated graph showing the system operations, their ______ to goals in the goal model and input/output links to objects in the object model. a. performance links b. operationalization links c. capability links d. None of the others

b

QN=8 In the agent model, an agent ag1 is said to depend on another agent ag2 for a goal G under the responsibility of ag2, if ___'s failure to get G satisfied can result in ___'s failure to get one of its assigned goals satisfied a. ag1 / ag2 b. ag2 / ag1

b

QN=9 A specialization link may be introduced in a model between an object SubOb and an object SuperOb if every current instance of _____ is a current instance of _____ as well. a. SuperOb / SubOb b. SubOb / SuperOb

b

QN=9 _______ addresses the assignment of responsibilities for achieving the objectives, services, and constraints among the components of the system-to-be a. the WHAT dimension b. the WHO dimension c. the WHY dimension d. the HOW dimension

b

QN=12 Which conditions does a statement about an obstacle to an assertion need to meet? a. {not O1,..., not On, Dom } |= G b. {O, Dom } |= not G c. {O, Dom } |≠ false d. O can be satisfied by some system behavior

b,c,d

QN=12 Which of the followings are strengths of state machines model? a. expressive (functional, non-functional; alternative options) b. visual abstraction of explicit behaviors of any agent instance in a class c. acceptance test data d. code generation

b,d

QN=13 Which of the following are activities to be done in "Change Evaluation and prioritization" stage of change control process (choose two)? a. Baselining of the new version of the RD for sharing among project members until the next version is baselined b. Prioritize the accepted changes. c. Forward propagation of all RD changes downward to software lifecycle items along vertical links of traceability graph. d. Updating of the traceability graph. e. Detect potential conflicts among the proposed changes.

b,e

QN=1 An object model provides a _________ of the system-as-is and system-to-be. a. Intentional view b. Functional view c. structural view d. behavioral view

c

QN=1 In scenario diagram, an interaction is a/an _________. a. Active object b. Passive object c. Instantaneous object d. None of the others

c

QN=1 Which one of the following activities should not be done in the phase "Defect evaluation at review meetings" of "Requirements inspection & review process": a. The defects found by each inspector are collected and discussed by the meeting participants b. The meeting participants keep only defects on which all agree c. Each inspector reads the RD or part of it individually to look for defects. d. The team documents the conclusions in an inspection report

c

QN=10 In figure 11.6, "Train" and "TrainInfo" are classified as a. Agents b. Events c. Entities d. Associations

c

QN=10 A goal refinement graph show the refinement and contribution links among goals. ________ appear as leaf nodes in this graph. a. Soft goals b. Domain properties c. Requirements d. Behavior goals

c

QN=10 To facilitate model configuration and evolution, we should specify _________ among packages. a. Generalization links. b. Inheritance links. c. Dependency links. d. None of the others.

c

QN=12 ___________ prescribe different types of protection of agent assets against unintended behaviors. a. Accuracy goals b. Information goals c. Security goals d. Stimulus-response goals

c

QN=12 __________statements state desirable properties about the system that may hold or not depending on how system behaves a. Descriptive b. Description c. Prescriptive d. Prescription

c

QN=2 A particular application of the operation yields a state _______ from a state in InputState to a state in OutputState. a. transformation b. exchange c. transition d. none of the others

c

QN=2 An AND-refinement of a goal G into sub-goals G1, G2, ..., Gn should be a. Complete, inconsistent, minimal b. Complete, accuracy, coverage c. Complete, consistent, minimal d. None of others

c

QN=2 Requirements Inspection process uses __________ guidelines to make it more effective in finding defects. a. WHY-WHAT-WHO b. WHY-WHAT-WHO-HOW c. WHAT-WHO-WHEN-WHERE d. None of the others

c

QN=2 State machine diagram is made by two core constructs: a. States, Relationships b. States, Associations c. States, Transitions d. States, Operations

c

QN=2 The following criteria are used for stakeholder analysis, except for a. Relevant position in the organization b. Level of domain expertise c. Create prototypes for system-to-be d. Effective role in making decisions about the system-to-be

c

QN=2 Which of the following items is not a type of inconsistency of requirements? a. Terminology clash b. Designation clash c. Inconsistency management d. Structure clash

c

QN=3 Goals and obstacles are dual notions. Therefore, we can derive obstacle categories from _____. a. Goals b. Goal model c. Goal categories d. Goal obstructions

c

QN=3 The features shared by object instances include. a. common vocabularies, glossary of terms, object's attributes and definition b. goals, agents, operations and behavior models c. object's definition, type, individual attributes, associations, domain invariants d. None of the others

c

QN=4 Two meta-attributes are mandatory for any meta-concept whatever view it refers to: a. "Name" and "Category" b. "Identifier" and "Name" c. "Name" and "Def" d. "Identifier" and "Issue"

c

QN=4 Which one of the following statements is a "soft goal"? a. If a book is requested then within a week a copy of the book is borrowed by the requesting patron. b. If a train is at a platform then within 5 minutes the train is at the next platform. c. The meeting scheduler software should be easy to use by administrative staff. d. If a meeting is requested then sooner-or-later the meeting takes place and is attended by all important invited participants.

c

QN=5 "Queries on a requirements database" technique for "Requirements quality assurance" work on parts of the Requirements Document that are specified in terms of the __________. a. Structured natural language b. Unrestricted natural language c. Diagrammatic notations d. None of the others

c

QN=5 Agent capabilities are defined in terms of the system variables that the agent can _____ and _____ a. Assign / evaluate b. Specify / realize c. Monitor / control d. none of the others

c

QN=5 Risk management process contains the following stages, except for a. Risk identification b. Risk assessment c. Risk resolution d. Risk control

c

QN=6 In Figure 4.9, "DenyRequest - <<extend>> - AskConstraints" means: a. DenyRequest is a sub-operation of AskConstraints. b. DenyRequest is an alternative operation of AskConstraints. c. DenyRequest is an alternative operation of AskConstraints, when the condition named Unauthorized holds. d. None of the others

c

QN=6 In figure 11.4, what is the name of the annotation attached to the link between the agent and the operation in the agent model? a. Responsibility instance declaration b. Capability instance declaration c. Performance instance declaration d. none of the others

c

QN=7 Traceability management process composes of 4 phases: a) Exploit traceability links b) Establish traceability links c) Maintain traceability links d) Define traceability policy Which one is the appropriate order of these phases: a. a, b, c, d b. b, a, c, d c. d, b, a, c d. d, c, a, b

c

QN=7 Which is not an artefact-driven elicitation technique? a. Background study b. Data Collection c. Group sessions d. Questionnaires

c

QN=7 Which one of the following statements is false? a. An operation may operationalizes multiple goals. b. A goal may be operationalized by multiple operations. c. Multiple agents perform an operation. d. An agent may perform multiple operations.

c

QN=7 ____________refer to "the contextual reasons for a new version of a system must be made explicit in terms of objectives" to be satisfied by a. the WHAT dimension b. the WHO dimension c. the WHY dimension d. the HOW dimension

c

QN=8 We can build refinement and abstraction paths in a goal diagram by recursively asking ___ and ___ questions about available goals, respectively a. WHY / HOW b. WHY / WHAT c. HOW / WHY d. WHAT / WHY

c

QN=8 Which one of the following object is the root meta-concept: a. ObjectModel b. OperationModel. c. SystemModel. d. None of the others.

c

QN=9 Figure 9 shows the __________________ a. Unrealizability-driven refinement pattern. b. Unmonitorability-driven refinement pattern. c. Divide-and-conquer refinement pattern. d. None of the others e. Milestone-driven refinement pattern

c

QN=9 The following are obstacles to effective knowledge acquisition, except for a. Distributed and conflicting knowledge sources b. Difficult access to sources c. Interacting with stakeholders d. Obstacles to good communication

c

QN=9 Which one is the "domain completeness" condition for OR-refinement of obstacle O into alternative sub-obstacles Oi: a. {Oi, Dom} |≠ false. b. {Oi, Dom} |= O c. {not O1, not O2, ..., not On, Dom} |= not O d. {Oi, Oj, Dom} |= false (i ≠ j)

c

________ is the requirement document item, which stating a problem world feature in a way that can not be precisely compared with alternative options, or can not be tested or verified in machine solution a Omission b Inadequacy c Immeasurability d Noise

c

QN=10 The following are obstacles to effective knowledge acquisition, except for a. Sociopolitical factors b. Difficult access to sources c. Unstable conditions d. Interacting with stakeholders

c (nếu chọn 2 đáp án thì thêm d )

QN=11 Which of the followings are not strengths of goal model? a. satisfaction arguments b. concrete examples c. expressive (functional, non-functional; alternative options) d. acceptance test data

c,d

QN=12 Which of the following questions are in the checklist used for verifying "Over specification" defect type (choose two)? a. Is the structuring rule for organizing these RD sections apparent? b. Does this RD item cover unrelated requirements? c. Would there be alternative sensible choices? d. Does this RD item mix requirements and assumptions together? e. Does this statement entail a premature design choice?

c,e

QN=1 ER diagram is made from three core constructs: entities, __________ and relationships. a. Classes b. Methods c. Objects d. Attributes

d

QN=1 Unlike domain properties and ________, goals may be refined, negotiated, assigned as responsibilities to agents and transformed in case of conflict or overexposure to risks. a. assumptions b. expectations c. requirements d. hypotheses

d

QN=10 Figure 10 a. Case-driven refinement pattern b. Guard-introduction pattern c. Divide-and-conquer pattern d. Milestone-driven refinement pattern

d

QN=10 Which of the following items is not a step in the process of risk management with DDP for RE? a. Elaborate the Impact matrix b. Elaborate the Effectiveness matrix c. Determine optimal balance risk reduction vs. countermeasure cost d. Quantitative reasoning for evaluating options

d

QN=11 All of the following statements about structural consistency of the goal and object models are correct, EXCEPT? a. Every conceptual item referred to in a goal specification in the goal model must appear as an attribute or object in the object model b. Every goal in the goal model must concern at least one object in the object model c. For every object in the object model, there must be at least one goal in the goal model concerning with it d. Every goal in the goal model must be existent in the object model

d

QN=13 A_______ diagram can be further detailed by indicating explicitly which component controls a shared phenomena, which component constitutes the machine needs to be built, and which components are affected by which requirements. a. context b. Frame c. Problem d. state machine e. entity-relationship

d

QN=13 Which of the following items is not a step of Value-cost prioritization process? a. Estimate relative contribution of each requirement to project's value b. Estimate relative contribution of each requirement to project's cost c. Plot relative contributions on value-cost diagram d. Build comparison matrix

d

QN=13 __________is the requirement document item, which cannot be realistically implemented within assigned budget, schedule, or development platform. a. Omission b. Inadequacy c. Immeasurability d. Unfeasibility

d

QN=2 A/an _________ is a discrete set of instances of a domain-specific concept that are manipulated by the modelled system a. System state b. State variable c. Object class d. Conceptual object

d

QN=2 System model is made up of five views. Which one of the following view captured by goal model: a. Structural view b. Functional view c. Behavioural view d. None of the others

d

QN=3 Which one of the following statements about the leaf nodes in goals refinement trees is false? a. They are nodes that need not be refined further. b. They are nodes whose responsibility can be assigned to single software agents. c. They are nodes whose responsibility can be assigned to single environment agents. d. They can not be domain properties or hypotheses.

d

QN=3 _________________. These are statements that can not be satisfied when taken together; their logical conjunction evaluates to false in all circumstances. a. Weak conflict or divergence b. Designation clash c. Structure clash d. Strong conflict

d

QN=4 Actigrams (Datagrams) declare activities (data) by their input/output data (producing/consuming activities) and interconnect them through data (___________) dependency links. a. Action b. Value c. Data d. Control

d

QN=4 An entity is ___________. a. An autonomous and active object b. A conceptual object dependent on other objects that it links. c. An instantaneous object d. None of the others

d

QN=4 Components pertaining to the machine's surrounding world will form a. Environment of system-to-be b. Environment of system-as-is c. Environment of software-as-is d. Environment of software-to-be

d

QN=4 In obstacle diagram, leaf obstacles are connected to countermeasure goals through __________. a. Responsibility links b. Realizability links c. Feasibility links d. Resolution links

d

QN=5 To start building a goal model, we may obtain ________ goals. Once these goals are obtained, we may build refinement and abstraction paths in a goal diagram a. Behaviour b. Soft c. Critical d. Preliminary

d

QN=5 Which one of the following statements about required condition is true? a. Required pre-condition captures an obligation. b. Required trigger condition captures an additional effect. c. Required post-condition captures a permission. d. none of the others

d

QN=5 _______ are used as criteria for selecting system options among multiple alternatives. a. Maintain goals b. Avoid goals c. Achieve goals d. Soft goals

d

QN=6 Requirements engineering is a. the processes involved in developing system design b. the processes involved in developing system documents c. the processes involved in developing and verifying system d. the processes involved in developing system requirements

d

QN=6 Which is not a artefact-driven elicitation technique? a. Storyboards and scenarios for problem world exploration b. Mock-ups and prototypes for early feedback c. Knowledge reuse d. Unstructured group sessions

d

QN=7 In the goal model, the finer-grained a goal is, the _______ are required to satisfy it. a. fewer requirements b. better agents c. more agents d. fewer agents

d

QN=8 Traceability management refers to the process of establishing, recording, exploiting and maintaining traceability _____ in a traceability _____. a. Lines / Graph b. Relationships / Graph c. Connections / Graph d. Links / Graph

d

QN=8 Which is not a stakeholder-driven elicitation technique? a. Interview b. Group sessions c. Observation and ethnographic studies d. Stakeholder analysis

d

QN=8 Which of the following is not a stage of requirement engineering process? a. Domain understanding and elicitation b. Evaluation and Negotiation c. Specification and documentation d. Requirement Traceability

d

QN=9 Goals provide a precise ________ for requirements completeness and pertinence. a. Evidence b. Criterion c. Tool d. Role

d

QN=9 Which of the following items are not exploring risk countermeasures techniques? a. Using elicitation techniques b. Reusing known countermeasures c. Using risk reduction tactics d. Using design methodologies

d

QN=12 Which of the following is not an objective of domain understanding and requirements elicitation stage? a. Understanding the system-as-is b. Identify the problem and opportunities calling for q new system c. Discover the expectations of stakeholders with respect to the new system d. Explore alternative ways to develop the new system that could address those needs e. Select the preferred proposal system

e

A

giving a condition example in specification of withdrawn money use case: the ATM has dispensed money and printed a receipt. This a(n).......... a. postcondition b. precondition c. exception d. extension

C

if requirements are easily understandable and defined then which software process model is best suited? a. agile model b. prototyping model c. waterfall model d. spiral model

B

portability is an internal quality attribute which could be described: a. how well the system protects against anauthorized access to the application and its data b. how easily the system can be made to work in other operating environments c. how quickly and predictably the system responds to user inputs or other events d. How easy it is for people to learn, remember, and use the system

A

software requirements specification(SRS) is also known as specification of .... a. blackbox testing b. acceptance testing c. whitebox testing d. integrated testing

CA

which is (are) the skills of business analyst on Agile project? a. ability to facilitate a team to consensus on scope, design decisions, and implementation decisions b. ability to document requirements formally or informaly deppending on the need of the project c. all of the mentioned d. understanding of the business area that project is involved with e. understanding of the agile development process

B

which is not belong to the case of use case traps? a. highly complex use cases b. depicts detail the use case story c. including design in the use cases d. use cases that users don't understand e. too many use cases f. including data definitions in the use case

B

which requirements should not be reused in the scope of the cross an enterprice? a. business rules b. constraints c. security requirements d. stakeholder profiles

C

which technique overlaps for use in requirements elicitation and requirements validation? a, interviews b. observations c. prototypes d. facilitator meetings


Ensembles d'études connexes

Clinical Judgement Through the Nursing Process & Priority-Setting Frameworks

View Set

NUR 346 PrepU: Chapter 23: Assessing Abdomen

View Set

Cold War Terms (military complex until end)

View Set