1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
D. 1-True, 2-True
Intermediation
Disintermediation
Mediation
None of the above
User Action Notation
User Action Norms
User Analogy Notation
User Analogy Norms
Waterfall model
Incremental model
Spiral model
Iterative model
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
objects inherit the properties of the class
classes are defined based on the attributes of the object
objects can belong to two classes
classes are always different
1-False, 2-False
1-True, 2-False
1-False, 2-True
1-True, 2-True
70 to 80
30 to 40
50 to 60
10 to 20
Design
Project Management
Maintenance
Quality management
distinctly specific
unambiguous
all of these
functional
Function reuse
Application system reuse
Sub- system reuse
Generator based reuse
Behavioural error
Logic errors
Performance error
Interface error
Polymorphism
Encapsulation
Inheritance
Information hiding
Availability
Data Integrity
Security
Reliability
Study and understand the problem
Identify gross features of at least one possible solution.
Describe each abstraction used in the solution
Maintenance
Random Application Development
Raw Application Development
Robust Application Development
Rapid Application Development
Application Domain
Staff stability
Programming language
External environment
Entity- relation model
Data flow model
Structural model
Object model
A Combination of prototyping and waterfall model
Includes project risks evaluation during each iteration
A high speed adaptation of the linear sequential model
Used to suggests a systematic sequential approach to software development
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing software
Instability in the development team
classical life cycle model
Fountain model
Spiral model
Concurrent model
Madhavji
Sutton
Khalifa
Humphrey
Large system applications
Small system applications
Medium system applications
Very small system applications
Failure detection
Damage assessment
Fault avoidance
Fault repair
Internet Explorer
Mozilla
MS-Office
Oracle
interface design
data design
procedural design
architectural design
Unauthorized modification of computer material
Unauthorized access to computer material
Dissemination of viruses or other malware
All of the mentioned
Fault avoidance
Fault tolerance
Fault detection
Fault repair
ensure that their products only meet the SRS.
act consistently with the public interest.
act in a manner that is in the best interests of his expertise and favour.
none
1-True, 2-True
1-True, 2-False
1-False, 2-True
1-False, 2-False
Indian Statistical Organization
Inter State Organization
International Standards Organization
Indian Standards Organization