Chapter 9-12, 14-20 Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A software engineer does not perform component-level design. Select one: True False

False

Place the principle steps of Component-based software engineering in the correct order with that starting principle on the left. Outline system requirements Identify candidate components (first pass) Perform architectural design Identify candidate components (second pass) Modify requirements according to discovered components Compose components to create system

Outline system requirements Identify candidate components (first pass) Perform architectural design Identify candidate components (second pass) Modify requirements according to discovered components Compose components to create system

Component-based software engineering is a process that emphasizes the design and construction of computer-based systems using reusable software components. Select one: True False

True

In the context of object-oriented software engineering, a component contains a set of collaborating classes. Select one: True False

True

Pattern-based design begins with the recognition of patterns within the application you intend to build. Select one: True False

True

The boundary between content and function is often blurred in web-based systems and applications. Select one: True False

True

The first step in component-level design is to identify all design classes that correspond to the problem domain. Select one: True False

True

Which of the following testing techniques requires devising test cases to demonstrate that each program function is operational when called? a. Black-box testing. b. Gray-box testing. c. Glass-box testing. d. White-box testing.

a. Black-box testing.

Which of the following is the BEST explanation for scenario-based testing? a. Concentrates on actor and software interaction. b. Misses errors in specifications. c. Looks at first- and second-level actors. d. Misses errors in subsystem interactions.

a. Concentrates on actor and software interaction.

A formal technical review is a software quality control activity performed by software engineers. Which of the following is NOT part of the review process? a. Confirm that the application is extendable. b. Uncover errors in function, logic, or implementation for any representation of the software. c. Make projects more manageable. d. Ensure that the software has been represented according to predefined standards.

a. Confirm that the application is extendable.

Which of the following is NOT part of Microsoft's secure by design principles? a. Conservative default settings. b. Secure architecture, design, and structure. c. Threat modeling and mitigation. d. Elimination of vulnerabilities.

a. Conservative default settings.

In order to evaluate a first interactive prototype, which of the following methods would NOT be used? a. Critical evaluations b. Observation c. Questionnaires d. Time-study analysis

a. Critical evaluations

The SEI/CERT website provides a list of the top 10 secure coding practices. Which of the following explanations matches: Base access decisions on permission rather than exclusion? a. Default deny. b. Keep it simple. c. Adopt a secure coding standard. d. Validate input.

a. Default deny.

Six Sigma is the most widely used strategy for statistical quality assurance in industry today. What are the three (3) defined core steps? a. Define, measure, analyze. b. Define, measure, control. c. Define, design, analyze. d. Analyze, design, verify.

a. Define, measure, analyze.

Which answer BEST describes what a WebApp pattern refers to? a. Describes common problems and their solution with a system of forces that includes the specific characteristics of end users. b. Addresses a problem set that is encountered when building and often incorporates many of the other pattern categories. c. Describes how to implement all or part of a specific algorithm or data structure for a software component within the context of a specific programming language. d. Describes commonly encountered problems when developing solutions.

a. Describes common problems and their solution with a system of forces that includes the specific characteristics of end users.

Which of the following statements best fits as the definition of the design stage of software development? a. During design you make decisions that will ultimately affect the success of software construction and the ease with which software can be maintained. b. Design means you look at all aspects of the stakeholder's requirements to make them work in the final product. c. The design stage determines all the components of the project which means no changes will need to be made further into the project. d. Design ensures that you build a stable system.

a. During design you make decisions that will ultimately affect the success of software construction and the ease with which software can be maintained.

Which of the following is NOT part of the SQA tasks? a. Educates the development group in compliance issues. b. Records any noncompliance and reports to senior management. c. Participates in the development of the project's software process description. d. Reviews software engineering activities to verify compliance with the defined software process.

a. Educates the development group in compliance issues.

The ISO quality assurance standard that applies to software engineering is? a. ISO 9001:2015 b. ISO 9000 c. ISO 9001a d. ISO 9002

a. ISO 9001:2015

Creating internationalized interfaces can be challenging. Which of the following would be the BEST help with the design aspects of creating appropriate-looking interfaces for a global audience? a. Localization features. b. Limiting font choices. c. Careful color choices. d. Making sure icons are globally recognized.

a. Localization features

Fill in the blank. ___________ the security controls in the information system on an ongoing basis including assessing control effectiveness. a. Monitor b. Select c. Assess d. Authorize

a. Monitor

Which of the following is NOT considered a common design fault with pattern-based design? a. Pattern doesn't work and is rejected. b. Applied to literally with no leeway for adaptation. c. Poor or erroneous fit. d. Refusal to see the error or the pattern and force-fit it.

a. Pattern doesn't work and is rejected.

Fill in the blanks. The ___________ model describes eight characteristics that focus on both the static and dynamic nature of computer systems. a. Product quality b. Design quality c. Item quality d. Project quality

a. Product quality

Which of the following would NOT describe anti-patterns? a. Provide methods to totally remove patterns from the design. b. Provide detailed plans for reversing the underlying problems. c. Provide tools to help developers recognize when these problems exist. d. Provide guidance when looking for ways to refactor software products.

a. Provide methods to totally remove patterns from the design.

Which of the following answers matches the understanding of the transcendental view of quality? a. Quality is something you immediately recognize but cannot explicitly define. b. Quality relates to the original specification of the product. c. Quality can be tied to inherent characteristics. d. Quality relates to the end user's specific goals.

a. Quality is something you immediately recognize but cannot explicitly define.

From the following select the BEST definition of architectural decisions. a. Software architectural practice focuses on architectural views that represent and document the needs of various stakeholders. b. Software architectural practice narrows its focus to consideration of architectural patterns, application technologies, and programming language. c. Software architectural practice only looks at the structural elements and their interfaces. d. Software architectural practice considers all aspects of development, from the large view to the smallest subset views of data.

a. Software architectural practice focuses on architectural views that represent and document the needs of various stakeholders.

Which of the following statements BEST describes software architecture? a. Software architecture alludes to the overall structure of the software and the ways in which that structure provides conceptual integrity for a system. b. Software architecture is the process of determining programs and how to create the programs. c. Software architecture provides structure for the program components and describes how these components work. d. Software architecture allows for organization of the program components and the structure of data used within the components.

a. Software architecture alludes to the overall structure of the software and the ways in which that structure provides conceptual integrity for a system.

Which of the following is NOT part of the set of tests applied to a simple loop? a. Start at the innermost loop. b. m passes through the loop where m < n. c. Only one pass through the loop. d. Skip the loop entirely.

a. Start at the innermost loop

Which of the following is NOT a common architectural review technique? a. Structured reasoning. b. Prototype evaluation. c. Use of checklists. d. Experienced-based reasoning.

a. Structured reasoning

Looking at the cost of quality, which of the following are NOT considered part of internal failure costs? a. The cost of data collection and metrics evaluation. b. The costs associated with the collection of quality metrics that allow an organization to assess the modes of failure. c. The cost that occurs when rework inadvertently generates side effects that must be mitigated. d. The cost required to perform rework to correct an error.

a. The cost of data collection and metrics evaluation.

Looking at the following equation developed by Robert Glass, which is the correct answer to his intuitive relationship theory? a. User satisfaction = compliant product + good quality + delivery within budget and schedule b. User satisfaction = product + quality + within budget and schedule c. User satisfaction = compliant end product + excellent quality + delivery within budget d. User agreement = compliant product + acceptable quality + delivery within budget and on schedule

a. User satisfaction = compliant product + good quality + delivery within budget and schedule

Cyclomatic complexity V(G) for a flow graph G is defined as: a. V(G) = E - N + 2 b. V = E - 2 + N c. G = E - N d. V(G) = E - N - 2

a. V(G) = E - N + 2

Which role does a software module serve? a. All of these options b. A problem domain component that implements a complete or partial function that is required by the customer. c. An infrastructure component that is responsible for functions that support the processing required in the problem domain. d. A control component that coordinates the invocation of all other problem domain components.

a. All of these options

Which of the following would NOT be considered helpful in dealing with error handling? a. Describes the problem in jargon that the user can understand. b. Brings up an error message that flashes on the screen too quickly for the user to read and understand the problem. c. Indicates any negative consequences of the so that the user can check to ensure that they have not occurred. d. Provides constructive advice for recovering from the error.

b. Brings up an error message that flashes on the screen too quickly for the user to read and understand the problem.

Design patterns span a broad spectrum of abstraction and application. Which of the following is NOT a category of design pattern? a. Interface design patterns b. Data patterns c. Application patterns d. WebApp patterns

b. Data patterns

Which of the following is NOT part of the agile review process? a. Agile developers used pairs programming. b. Developers use documentation to review tasks. c. Scrum meetings are used to review and order tasks according to priority. d. Code producers walk through user stories.

b. Developers use documentation to review tasks.

Which of the following answers is NOT correct when considering adding value for both the producer and user using a software product? a. Less maintenance effort required. b. Easier to create linkages with other software. c. Reduced customer support. d. Fewer bug fixes.

b. Easier to create linkages with other software.

Fill in the blank. Test-case design for equivalence partitioning is based on an evaluation of _____________ for an input condition. a. Equivalence segregating. b. Equivalence classes. c. Equivalence isolating. d. Equivalence modules.

b. Equivalence classes.

Which of the following is NOT part of the error finding categories for black-box testing? a. Behavior or performance errors. b. Errors in user input. c. Interface errors. d. Incorrect or missing functions.

b. Errors in user input.

Which of the following is NOT a representation of software architecture? a. Consider architectural alternatives at a stage when making design changes is still relatively easy. b. Evaluate what parts of the design meet standards previously determined. c. Reduce the risks associated with the construction of the software. d. Analyze the effectiveness of the design in meeting its stated requirements.

b. Evaluate what parts of the design meet standards previously determined.

What is a typical term for connecting a framework skeleton into plug points of a domain? a. Anchors b. Hooks c. Marks d. Links

b. Hooks

When a user interface is analyzed and designed, the process involves a user model, a design model, a mental model, and a(n) _______________. a. Interface model b. Implementation model c. Process model d. Application model

b. Implementation model

Quality attributes for architectural design assessment include: a. Interactivity b. Interoperability c. Proximity d. Processivity

b. Interoperability

Within the software architecture language, metaphors are commonly used. Which metaphor matches the following description: Used to document architectural solutions constructed in the past. a. Decision metaphor b. Literature metaphor c. Language metaphor d. Blueprint metaphor

b. Literature metaphor

Fill in the blank. A(n) ______________ is a mechanism to determine what went right and what went wrong when software engineering process and practice is applied in a specific project. a. Challenges evaluation b. Postmortem evaluation c. Examination evaluation d. Tasks evaluation

b. Postmortem evaluation

Fill in the blank. A design concept called _____________ suggests that any complex problem can be more easily handled if it is subdivided into pieces that can be solved independently. a. Departure of content b. Separation of concerns c. Model separation d. Splitting of complexity

b. Separation of concerns

What does the acronym SQA stand for? a. System quality assurance. b. Software quality assurance. c. Software quality assistance. d. System quantity assistance.

b. Software quality assurance.

Looking at review metrics and their use, which of the following answer BEST matches the following question: Preparation effort, Ep a. The effort (in person-hours) that is expended during the actual review. b. The effort (in person-hours) required to review a work product prior to the actual review meeting. c. The effort (in person-hours) that is dedicated to the correction of those errors uncovered during the review. d. Represents the sum of effort measures for reviews.

b. The effort (in person-hours) required to review a work product prior to the actual review meeting.

Responsibility-driven architecture does NOT include the following? a. Who b. Why c. How d. When

b. why

Which of the following is NOT considered a criteria for good design in software engineering? a. A design should lead to components that exhibit independent functional characteristics. b. A design should contain distinct representations of data, architecture, interfaces, and components. c. A design should be totally self-contained; that is, the software should fit fully within one module. d. A design should be modular; that is, the software should be logically partitioned into elements or subsystems.

c. A design should be totally self-contained; that is, the software should fit fully within one module.

Statistical software quality assurance involves which of the following? a. Surveying customers to find out their opinions about product quality. b. Tracing each defect to its underlying causes and using the Pareto principle to correct each problem found. c. An attempt is made to trace each error and defect to its underlying cause. d. Using sampling in place of exhaustive testing of software.

c. An attempt is made to trace each error and defect to its underlying cause.

The goal of software quality control is to remove quality problems in the software. The problems are COMMONLY known by which of the following names? a. Infections, faults, or mistakes. b. Viruses, errors, or defects. c. Bugs, faults, errors, or defects. d. Bugs, infections, errors, or mistakes.

c. Bugs, faults, errors, or defects.

Which of the following explanation BEST describes error/defect collection and analysis? a. Analyze the data and the collection method in order to determine if the error is caused by human error. b. Collect data that is wrong in order to analyze it and make corrections. c. Collects and analyzes error and defect data to better understand how errors are introduced and what software engineering activities are best suited to eliminating them. d. Review the defective data to determine if the collection method is at fault.

c. Collects and analyzes error and defect data to better understand how errors are introduced and what software engineering activities are best suited to eliminating them.

Fill in the blank. For software design, ____________ allow(s) the reader to understand the environment in which the problem resides and what solution might be appropriate within that environment. a. Designs b. Patterns c. Context d. Frameworks

c. Context

Which of the following taken from the cost of quality discussion BEST matches the following statement: Costs incurred in the pursuit of quality or in performing quality-related activities and the downstream costs of lack of quality? a. Prevention costs b. Failure costs c. Cost of quality d. Appraisal costs

c. Cost of quality

A data abstraction is a named collection of data that does which of the following? a. Describes the use of the object. b. Describes an attribute. c. Describes a data object. d. Describes the abstraction.

c. Describes a data object.

Fill in the blank. _________ must be understood before the mechanics of design practice are applied. a. Design models b. Design practice c. Design concepts d. Design principles

c. Design concepts

Which of the following questions is the BEST fit in regard to software engineering design? a. Design is not that important in the overall success of a project. b. Design is less important than the implementation of a project. c. Design is pivotal to successful software engineering. d. Design is necessary in order complete a project.

c. Design is pivotal to successful software engineering.

Looking at the impact of management actions, which of the following answers matches BEST to the following statement: A software team is rarely given the luxury of providing an estimate for a project before delivery dates are established and an overall budget is specified. a. Risk-oriented decisions. b. Scheduling decisions. c. Estimation decisions. d. Project decisions.

c. Estimation decisions

Which is the BEST answer for deciding which of the following needs to be assessed during unit testing? a. Algorithmic performance. b. Code stability. c. Execution paths. d. User performance.

c. Execution paths.

Which of the following provides the BEST explanation about user experience design? a. Provides a framework for creating a usable interface. b. Establishes the best method of interacting with the system. c. Identifies user needs, customers' business goals, and the interaction design d. Allows for extensibility as new user actions are required.

c. Identifies user needs, customers' business goals, and the interaction design

Looking at the cost of quality, which of the following is NOT part of Prevention costs? a. Test planning costs. b. The cost of added technical activities to develop complete requirements and design models. c. Include activities to gain insight into product condition the "first time through" each process. d. The cost of management activities required to plan and coordinate all quality control and quality assurance activities.

c. Include activities to gain insight into product condition the "first time through" each process.

In addition to security life cycle models, there are many process models that are specific to security requirements. Which of the following is NOT included in the security requirements? a. Software cost reduction. b. Core security. c. Security error and bug fixes. d. Security requirements engineering process.

c. Security error and bug fixes.

Which of the following steps in the SQUARE process does the following explanation belong to: This step becomes important when there are diverse stakeholders. a. Perform risk assessment. b. Elicit security requirements. c. Select elicitation technique. d. Develop artifacts.

c. Select elicitation technique.

Which of the following is NOT an advantage of component-based software engineering? a. Reduced lead time b. Enhanced quality c. Simplicity of deployment and management d. Greater return on investment e. Leveraged costs of developing components f. Maintenance of component-based applications

c. Simplicity of deployment and management

Fill in the blanks. ______________ is defined as the probability of failure-free software operation for a specified time-period in a specified environment. a. Software quality b. Software effectiveness c. Software reliability d. Software error

c. Software reliability

Which of the following would NOT be used to describe the architectural style? a. Module view b. Data flow view c. Structured view d. Process view

c. Structured view

Which of the following is NOT part of the SQA plan road map? a. A description of all software engineering work products (e.g., models, documents, source code) that fall within the purview of SQA. b. The purpose and scope of the plan. c. The resources required to complete the plan. d. Actions and tasks (including reviews and audits) and their placement throughout the software process.

c. The resources required to complete the plan.

Which of the following is the BEST answer for explaining the role of an independent test group? a. The role is to stop the builder saying that the build is ok when it might not be. b. The role is preventing the builder testing their own work. c. The role is to remove inherent problems associated with letting the builder test what has been built. d. The role is to allow other users an opportunity to review the build.

c. The role is to remove inherent problems associated with letting the builder test what has been built.

Which of the following is NOT the point of attack surface analysis? a. Understand the risks areas in an application. b. To notice when and how the attack surface changes. c. To notice when an application is being used. d. To make developers and security specialists aware of vulnerabilities of an application.

c. To notice when an application is being used.

Is the following statement true or false? Making good decisions while defining the software architecture is critical to the success of a software product. a. True. Making good decisions is less costly for the overall project. b. False. It is not possible to fully know all aspects at the start of the project, so the situation is going to adapt. c. True. If the decision-making process is faulty or not fully investigated, the finished product is likely be of lower quality and more expensive. d. False. Using the agile model, it is always possible to review decisions further down the project pathway.

c. True. If the decision-making process is faulty or not fully investigated, the finished product is likely be of lower quality and more expensive.

What types of errors are missed by black-box testing and can be uncovered by white-box testing? a. Non-logic errors. b. Performance errors. c. Typographical errors. d. Behavioral errors.

c. Typographical errors.

A formal technical review summary report would typically include which of the following questions? a. Who was involved in the application? b. Does the application work? c. What were the findings and conclusions? d. What is the final purpose of the application?

c. What were the findings and conclusions?

Fill in the blank. At the highest level of ______________ a solution is stated in broad terms using the language of the problem environment. a. Architecture b. Modularity c. Refactoring d. Abstraction

d. Abstraction

Which of the following is NOT part of making the interface consistent? a. Input mechanisms are constrained to a limited set that is used consistently throughout the application. b. Mechanisms for navigating from task to task are consistently defined and implemented. c. All visual information is organized according to design rules that are maintained throughout all screen displays. d. Allow the user to provide input into screen design so that they relate to the finished application.

d. Allow the user to provide input into screen design so that they relate to the finished application.

What model is derived from the following three sources: Information about the domain, specific requirements model elements, and the availability of architectural styles. a. Component-level design elements b. Interface design elements c. Data design elements d. Architectural model

d. Architectural model

Fill in the blank. An ____________ is a transformation that is imposed on the design of an entire system. a. Architectural pattern b. Architectural behavior c. Architectural standard d. Architectural style

d. Architectural style

UX developers often create a customer journey map as a means of outlining their goals and plans for the software product. From the following indicate which answer creates a visualization of the touch points, channels, and actions taken by the customer. a. Refine the design b. Conduct research c. Identify the gaps d. Build the model

d. Build the model

Fill in the blank. ________ management is one of the most disruptive aspects of any software project. a. Vendor b. Risk c. Security d. Change

d. Change

Functional independence is assessed using two qualitative criteria: __________ and ___________ . a. Coupling and consistency b. Consistency and connectivity c. Cohesion and consistency d. Cohesion and coupling

d. Cohesion and coupling

From the following select the BEST answer for the following: Acceptance tests are normally conducted by the ________? a. Systems engineers. b. Test team. c. Developers. d. End users.

d. End users.

The term _____________ is used to connote structures that lead to better organization, labeling, navigation, and searching of content objects. a. Content architecture. b. Software architecture. c. Design architecture. d. Information architecture.

d. Information architecture.

Which of the following is NOT part of Mandel's three golden rules? a. Make the interface consistent. b. Reduce the user's memory load. c. Place the user in control. d. Make sure the design is attractive.

d. Make sure the design is attractive.

Which of the following does NOT explain why software security is important? a. Medical devices could be tampered with if there was no way to secure the applications. b. A corporate storage device could be breached giving access to the business information. c. Online banking users could have their money stolen from their accounts. d. Mobile devices can be easily stolen and used illegally unless there are restraints in place to stop access happening to the operating system.

d. Mobile devices can be easily stolen and used illegally unless there are restraints in place to stop access happening to the operating system

What is meant by the term "the use of navigation controls, menus, icons, and aesthetics should be consistent throughout" the application? a. On every page, the use of icons, etc. should be the same although it might be necessary to change some of them on different screens. b. Using iconic metaphors is acceptable as the users will understand their purpose. c. When designed a user should be able to work out, for example, icons mean. Once determined it doesn't matter if the icons are the same as for other programs. d. On Microsoft applications is it commonly known that the X means to close the application. This is being consistent across all of its platforms.

d. On Microsoft applications is it commonly known that the X means to close the application. This is being consistent across all of its platforms.

Fill in the blank. A _____________ encompasses a collection of patterns, each described using a standardized template and interrelated to show how these patterns collaborate to solve problems across an application domain. a. Broad task b. Design task c. Collaboration language d. Pattern language

d. Pattern language

Which of the following statements is NOT part of project management techniques? a. Schedule dependencies are understood, and the team resists the temptation to use shortcuts. b. Risk planning is conducted so problems do not breed chaos; software quality will be affected in a positive way. c. A project manager uses estimation to verify that delivery dates are achievable. d. Planning can be subverted by poor business decisions and questionable project management actions.

d. Planning can be subverted by poor business decisions and questionable project management actions.

Looking at the elements of software quality assurance, which of the following is NOT part of group? a. Reviews and audits b. Education c. Standards d. Programming

d. Programming

How do security touchpoints fit into secure software engineering? a. Security touchpoints are used to define the customer journey. b. Security touchpoints (activities) can be incorporated into any software life cycle model. c. Security touchpoints define the attack surface of the application. d. Security touchpoints represent the vulnerabilities in the system firewall.

d. Security touchpoints represent the vulnerabilities in the system firewall.

Which of the following statements BEST describes software security? a. Defects and vulnerabilities will continue to be part of creating software; there is nothing that can be done about it. b. Using measurement tools provides software with security as the sources of the attacks are known. c. Developing software using good security will automatically stop it being vulnerable to attacks. d. Software security en¬compasses a set of techniques that can im¬prove the security of software while it is under development.

d. Software security en¬compasses a set of techniques that can im¬prove the security of software while it is under development.

SACA represents which of the following: a. Structured architecture-continuity analysis b. Specific architecture-conformance analytics c. Software architecture-continuity analysis d. Static architecture-conformance analysis

d. Static architecture-conformance analysis

Which of the following BEST matches the following explanation: Focus on problems and solutions associated with how classes and objects are organized and integrated? a. Behavioral patterns b. Creational patterns c. Interface patterns d. Structural patterns

d. Structural patterns

Looking at review metrics and their use, which of the following answer BEST matches the following question: Rework effort, Er a. The effort (in person-hours) that is expended during the actual review. b. Represents the sum of effort measures for reviews. c. The effort (in person-hours) required to review a work product prior to the actual review meeting. d. The effort (in person-hours) that is dedicated to the correction of those errors uncovered during the review.

d. The effort (in person-hours) that is dedicated to the correction of those errors uncovered during the review.

The ISO 25010 quality model defines two quality models which are? a. The product quality model and usability model. b. The quality in use model and the usability model. c. The Quantitative quality assessment model and the product quality model. d. The quality in use model and the product quality model.

d. The quality in use model and the product quality model.

Using the review guidelines for conducting formal technical reviews, which of the following BEST matches: Set an agenda and maintain it. a. The review leader should conduct the review meeting to ensure that the proper tone and attitude are maintained and should immediately halt a review that has gotten out of control. b. Rather than spending time debating the question, the issue should be recorded for further discussion off-line. c. When an issue is raised by a reviewer, there may not be universal agreement on its impact. d. The review leader is chartered with the responsibility for maintaining the meeting schedule and should not be afraid to nudge people when drift sets in.

d. The review leader is chartered with the responsibility for maintaining the meeting schedule and should not be afraid to nudge people when drift sets in.

Using the review guidelines for conducting formal technical reviews, which of the following BEST matches: Conduct meaningful training for all reviewers. a. The very first product to be reviewed should be the review guidelines themselves. b. Debriefing can be beneficial in uncovering problems with the review process itself. c. For reviews to be effective, they should be scheduled as a task during the software process. d. The training should stress both process-related issues and the human psychological side of reviews.

d. The training should stress both process-related issues and the human psychological side of reviews. Clear my choice Question 69

Which of the following list would NOT be an expected item in a shopping cart user interface design pattern? a. Total costs b. List items c. Product code d. Unordered items

d. Unordered items

How effective have review techniques been in uncovering errors according to the software engineering industry? a. Up to 50% b. Up to 85% c. Up to 100% d. Up to 75%

d. Up to 75%

Fill in the blanks. _______________ refers to the set of tasks that ensure that software correctly implements a specific function whereas ______________ refers to a different set of tasks that ensure that the software that has been built is traceable to customer requirements. a. Confirmation, verification. b. Validation, authentication. c. Authentication, confirmation. d. Verification, validation.

d. Verification, validation.

Which of the following is NOT a risk of component-based software engineering? a. Quality risks b. Security risks c. Component selection risks d. Component integration risks e. System evolution risks f. Monolithic complexity risk

f. Monolithic complexity risk

Software engineers do not need to collaborate with security experts during the software development process. Select one: True False

false


संबंधित स्टडी सेट्स

Pharmacology II Prep U Chapter 45: Antiarrhythmic Agents

View Set

Mrkt 301 Chp 5 Test and Quiz Questions

View Set

Perception, Cognition, and Emotion 7,8,9

View Set

Personal Finance Chapter 13 Study Guide

View Set