that are not relevant to him
that re relevant to him
that may be maliciously handled by him
that are confidential
C. that may be maliciously handled by him
interface design
data design
procedural design
architectural design
Waterfall
Spiral
Iterative
Cleanroom
Study and understand the problem
Identify gross features of at least one possible solution.
Describe each abstraction used in the solution
Maintenance
Intermediation
Disintermediation
Mediation
None of the above
abstraction
refinement
information hiding
all of above three
An Old Fashioned model that cannot be used in a modern context
A good approach when a working program is required quickly
A useful approach when a customer cannot define requirements clearly.
A reasonable approach when requirement are well defined.
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
Accounting Personnel
Database Manager
Salesman
System Operator
Availability
Data Integrity
Security
Reliability
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
User satisfaction
Job satisfaction
Business success
Profit making
Asset
Resource
Problem Solver
Knowledge Provider
Entity- relation model
Data flow model
Structural model
Object model
Application Domain
Staff stability
Programming language
External environment
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Which is used by one person only
Which is assigned one and only one task
Which uses one kind of software
Which is meant for application software
Number of request for corrective maintenance
Average time required for impact analysis
All the above
Number of oustanding change request
Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
The product should be easy to use.
It means that the product designed /created should be easily available.
Software engineers shall ensure that their products and related modifications satisfy the client.
Failure detection
Damage assessment
Fault avoidance
Fault repair
Software Analysis
Software Design
Software quality
Software testing
Unauthorized modification of computer material
Unauthorized access to computer material
Dissemination of viruses or other malware
All of the mentioned
A useful approach when a customer cannot define requirements clearly.
Is more chaotic than the incremental model
Includes project risks evaluation during each iteration
Often used for the development of client/server applications
Confidentiality
Intellectual property rights
Managing Client Relationships
Both a & b
Design
Project Management
Maintenance
Quality management
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing software
Instability in the development team
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Unit testing
Integration testing
Validation testing
System testing
Identify system- processing transformation
Identify input transformation
Identify output transformation
All the above
Minimization, Satisfaction
Minimization, Dissatisfaction
Maximization, Satisfaction
Maximization, Dissatisfaction