Question # 1 of 10 ( Start time: 11:18:08 PM )
We need to employ some statistical techniques and plot the results ---------------. These are known as statistical control techniques.
Select correct option:
=>Graphically
Automatically
Manually
Personally
Question # 2 of 10 ( Start time: 11:19:42 PM )
Effort required to test a program to ensure that it performs its intended function __________
Select correct option:
=>Testability
Bug fixing
Debugging
Security
Question # 3 of 10 ( Start time: 11:21:08 PM )
Quality can be measured if we measure the _____ of the product.
Select correct option:
correctness
maintainability
integrity and usability
=>All of the given options
Question # 4 of 10 ( Start time: 11:22:42 PM )
In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:
Select correct option:
The process has been matured
The process is not mature yet
=>Process is out of control
Process is within control
Question # 5 of 10 ( Start time: 11:24:09 PM )
If the gap between the defects reported and defects fixed is increasing, then it means that:
Select correct option:
The product is in status quo
The product is near deployment
=>The product is in unstable condition
The product is in stable condition
Question # 6 of 10 ( Start time: 11:25:06 PM )
The extent to which a program satisfies its specifications and fulfills the customer's mission objectives is …………………
Select correct option:
Integrity
Reliability
=>Correctness
None of given
Question # 7 of 10 ( Start time: 11:26:11 PM )
_______ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
Select correct option:
=>Removal Deficiency
Defect removal efficiency
Bug Report
Bug Tracking Algorithm
Question # 8 of 10 ( Start time: 11:26:59 PM )
Metrics to assess the quality of the analysis models and the corresponding software specification were proposed by ________
Select correct option:
in 1993- 1999.
Ricado in 1993
Davis in 1990
=>Davis in 1993
Question # 9 of 10 ( Start time: 11:27:36 PM )
Extent to which access to software or data by unauthorized persons can be controlled, is called _______
Select correct option:
None of given
Efficiency
Reliability
=>Integrity
Question # 10 of 10 ( Start time: 11:28:26 PM )
The extent to which a program can be expected to perform its intended function with required precision is called ______
Select correct option:
Usability
=>Reliability
Portability
Maintainability
--
To post to this group, send email to vuhelp_pk@googlegroups.com
To unsubscribe from this group, send email to vuhelp_pk+unsubscribe@googlegroups.com
Group Rules Vuhelp4u
Sharing of Video songs links, movies links, dramas links are not allowed in study group. Only Islamic and general information Video links allowed.
SPAM, Advertisement, and Adult messages are NOT allowed and that member will be behaved strictly.
http://groups.google.com/group/vuhelp_pk?hl=en_US
No comments:
Post a Comment