licensing
responsiveness
processing time
memory utilization
A. licensing
Number of request for corrective maintenance
Average time required for impact analysis
All the above
Number of oustanding change request
A Combination of prototyping and waterfall model
Includes project risks evaluation during each iteration
A high speed adaptation of the linear sequential model
Used to suggests a systematic sequential approach to software development
classical life cycle model
Fountain model
Spiral model
Concurrent model
Identify system- processing transformation
Identify input transformation
Identify output transformation
All the above
Profit maximization
Cost reduction
Customer satisfaction
All of the above
Fault avoidance
Fault tolerance
Fault detection
Fault repair
Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
The product should be easy to use.
It means that the product designed /created should be easily available.
Software engineers shall ensure that their products and related modifications satisfy the client.
Understanding
Restrictions
Transparency
Controversy
Function reuse
Application system reuse
Sub- system reuse
Generator based reuse
distinctly specific
unambiguous
all of these
functional
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Which is used by one person only
Which is assigned one and only one task
Which uses one kind of software
Which is meant for application software
Class Name
Entity
Attributes
Service
Availability
Data Integrity
Security
Reliability
Madhavji
Sutton
Khalifa
Humphrey
Grey- box testing
White box testing
Black box testing
Red Box Testing
Spiral model
Incremental model
Iterative model
Waterfall model
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing software
Instability in the development team
Confidentiality
Intellectual property rights
Managing Client Relationships
Both a & b
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Unauthorized modification of computer material
Unauthorized access to computer material
Dissemination of viruses or other malware
All of the mentioned
Large system applications
Small system applications
Medium system applications
Very small system applications
Entity- relation model
Data flow model
Structural model
Object model
ensure that their products only meet the SRS.
act consistently with the public interest.
act in a manner that is in the best interests of his expertise and favour.
none
Failure detection
Damage assessment
Fault avoidance
Fault repair
Random Application Development
Raw Application Development
Robust Application Development
Rapid Application Development
Unit testing
Integration testing
Validation testing
System testing
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
Boehm and Belz
Khalifa and Verner
Madhavji et al.
Blackburn et al.