Software Engineering MCQ

Software Engineering MCQ
241. Risk analysis process is
  • Here each identified risk is analyzed and prioritized
  • It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
  • The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
  • None of these
Show Answer
242. Reusability is
  • Extent to which a software module can be used in more than one computing program.
  • It involves regular monitoring of the risks identified and of new risks that develops.
  • It considers each of the key risks that are identified and also identifies strategies to manage the risk.
  • None of these
Show Answer
243. Safety argument is
  • Associated with the role of people involved in software process and the involved in software process and the activites for which they are responsible.
  • The most effective technique for demonstrating the safety of a system is demonstrating the safety of a system is proof by contradiction
  • It is concerned with establishing a confidence level in the system that might vary from low to high
  • None of these
Show Answer
244. Risk assessment is
  • Here each identified risk is analyzed and prioritized
  • It begins after all hazards are identified For each hazard, the outcome of the risk assessment process is a statement of acceptability.
  • The anticipate risk which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
  • None of these
Show Answer
245. Risk is
  • The probability that the system will ause an accident
  • Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions.
  • The frequency of occurrence with which unexpeted behavior is likely to occur.
  • None of these
Show Answer
246. Safety is
  • Avoiding catastrophic moment
  • Ease with which a system or component are modified to fit the problem area.
  • It is a bounded area of responsibiity.
  • None of these
Show Answer
247. Role/action model is
  • Associated with the role of people involved in software process and the activities for which they are responsible
  • The most effective technique for demonstraiting the safety of a system is proof by contradiction.
  • It is concerned with establishing a confidence level in the system that might vary from low to high
  • None of these
Show Answer
248. Role is
  • Avoiding catastrophic moment
  • East with which a system of component are modified to fit the problem area.
  • It is a bounded area of responsibility
  • None of these
Show Answer
249. Robustness is
  • The probability that the system will cause an accident
  • Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions
  • The frequency of occurence with which unexpected behavior is likely to occur.
  • None of these.
Show Answer
250. Risk monitoring process
  • Extent to which a software module can be used in more than one computing program
  • It involves regular monitoring of the risks identified and of new risks that develops.
  • It considers each of the key risks that are identifies strategies to manage the risk.
  • None of these
Show Answer
Questions and Answers for Competitive Exams Various Entrance Test