Software Engineering MCQ
Software Engineering MCQ
241. Risk analysis process is
- Here each identified risk is analyzed and prioritized
- It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
- The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
- None of these
242. Reusability is
- Extent to which a software module can be used in more than one computing program.
- It involves regular monitoring of the risks identified and of new risks that develops.
- It considers each of the key risks that are identified and also identifies strategies to manage the risk.
- None of these
243. Safety argument is
- Associated with the role of people involved in software process and the involved in software process and the activites for which they are responsible.
- The most effective technique for demonstrating the safety of a system is demonstrating the safety of a system is proof by contradiction
- It is concerned with establishing a confidence level in the system that might vary from low to high
- None of these
244. Risk assessment is
- Here each identified risk is analyzed and prioritized
- It begins after all hazards are identified For each hazard, the outcome of the risk assessment process is a statement of acceptability.
- The anticipate risk which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
- None of these
245. Risk is
- The probability that the system will ause an accident
- Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions.
- The frequency of occurrence with which unexpeted behavior is likely to occur.
- None of these
246. Safety is
- Avoiding catastrophic moment
- Ease with which a system or component are modified to fit the problem area.
- It is a bounded area of responsibiity.
- None of these
247. Role/action model is
- Associated with the role of people involved in software process and the activities for which they are responsible
- The most effective technique for demonstraiting the safety of a system is proof by contradiction.
- It is concerned with establishing a confidence level in the system that might vary from low to high
- None of these
248. Role is
- Avoiding catastrophic moment
- East with which a system of component are modified to fit the problem area.
- It is a bounded area of responsibility
- None of these
249. Robustness is
- The probability that the system will cause an accident
- Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions
- The frequency of occurence with which unexpected behavior is likely to occur.
- None of these.
250. Risk monitoring process
- Extent to which a software module can be used in more than one computing program
- It involves regular monitoring of the risks identified and of new risks that develops.
- It considers each of the key risks that are identifies strategies to manage the risk.
- None of these