1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
A. 1-True, 2-True
Application Domain
Staff stability
Programming language
External environment
Software Analysis
Software Design
Software quality
Software testing
Waterfall model
Incremental model
Spiral model
Iterative model
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
Understanding
Restrictions
Transparency
Controversy
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Entity- relation model
Data flow model
Structural model
Object model
Which is used by one person only
Which is assigned one and only one task
Which uses one kind of software
Which is meant for application software
major decision points are tested early
no drivers need to be written
no stubs need to be written
regression testing is not required
Spiral model
Incremental model
Iterative model
Waterfall model
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
Intermediation
Disintermediation
Mediation
None of the above
Lower
Back-end
Intermediate
Upper
A Combination of prototyping and waterfall model
Includes project risks evaluation during each iteration
A high speed adaptation of the linear sequential model
Used to suggests a systematic sequential approach to software development
classical life cycle model
Fountain model
Spiral model
Concurrent model
abstraction
refinement
information hiding
all of above three
Design
Project Management
Maintenance
Quality management
Fault avoidance
Fault tolerance
Fault detection
Fault repair
User Action Notation
User Action Norms
User Analogy Notation
User Analogy Norms
Failure detection
Damage assessment
Fault avoidance
Fault repair
not use your technical skills to misuse other peoples computers.
not knowingly accept work that is outside your competence.
be dependent on their colleagues.
maintain integrity and independence in their professional judgment.
Large system applications
Small system applications
Medium system applications
Very small system applications
processing
programming
storing
organizing
Madhavji
Sutton
Khalifa
Humphrey
that are not relevant to him
that re relevant to him
that may be maliciously handled by him
that are confidential
Confidentiality
Intellectual property rights
Managing Client Relationships
Both a & b
Unauthorized modification of computer material
Unauthorized access to computer material
Dissemination of viruses or other malware
All of the mentioned
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
Number of request for corrective maintenance
Average time required for impact analysis
All the above
Number of oustanding change request
Accounting Personnel
Database Manager
Salesman
System Operator