CS605 Software Engineering II MCQs
291 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Defect prevention is defined as avoiding defect insertion.

True

Which maturity level is characterised by 'Basic project management processes established to track cost, schedule and functionality. Has the necessary process discipline in place to repeat earlier successes on projects with similar applications'?

  • Level 4
  • Level 2 (correct)
  • Level 3
  • Level 1
  • What activity does a software project manager need to perform to minimize the risk of software failure?

  • Define milestones and track progress (correct)
  • Double the project team size
  • Allow absolutely no schedule slippage
  • Request a large budget
  • The linear sequential model of software development is also known as the?

    <p>Classical life cycle model</p> Signup and view all the answers

    Which of these benefits can be achieved when software is restructured?

    <p>All of the given options</p> Signup and view all the answers

    __________ QA technique involves typically execution of software and the observation of program behavior or outcome.

    <p>Testing</p> Signup and view all the answers

    ___________ testing verifies the correct handling of the external functions provided by the software.

    <p>Black box</p> Signup and view all the answers

    The quality expectations of a user are that a software system performs useful functions that?

    <p>Both A and B</p> Signup and view all the answers

    Incomplete requirements gathering can result in the ___________ of the project.

    <p>failure</p> Signup and view all the answers

    The root causes of project failure are?

    <p>All of the given options</p> Signup and view all the answers

    ____________ is a bad smell when a change requires lots of little changes in a lot of different classes.

    <p>Short gun surgery</p> Signup and view all the answers

    If you find the code such that one type of change requires changing one subset of methods, another type of change requires changing another subset, then it is a symptom of_____________.

    <p>Divergent change</p> Signup and view all the answers

    Following are the reasons for project failure except?

    <p>The name of the software</p> Signup and view all the answers

    Main characteristic of _______________ model is risk analysis and management.

    <p>Spiral</p> Signup and view all the answers

    Quantitative process-improvement objectives for the organization are established, continually revised to reflect changing business objectives at ______.

    <p>Level 5</p> Signup and view all the answers

    Reliability of a software is a:

    <p>Non-functional requirement</p> Signup and view all the answers

    Which of the following is NOT one of the degrees of rigor?

    <p>TSS</p> Signup and view all the answers

    Build and Fix model is a ___________ type of software development activity.

    <p>Haphazard</p> Signup and view all the answers

    Three categories of risks are:

    <p>Project risks, technical risks, business risks</p> Signup and view all the answers

    MTTC is the abbreviation of:

    <p>Mean time to change</p> Signup and view all the answers

    While creating a matrix for a set of projects, data should be collected that belongs to a similar domain.

    <p>True</p> Signup and view all the answers

    _________ is one of the techniques to prepare project schedule once we have defined 'task network'.

    <p>Program evaluation and review techniques (PERT)</p> Signup and view all the answers

    While managing the historical data, we should consider the following except:

    <p>Data should be collected only from scientific projects and applications</p> Signup and view all the answers

    Quality costs may be divided into costs associated with:

    <p>Prevention, appraisal, and failure</p> Signup and view all the answers

    When software is delivered to a client and then the client reports a bug in it, that bug is termed as:

    <p>Defect</p> Signup and view all the answers

    FTR stands for:

    <p>Formal Technical Review</p> Signup and view all the answers

    SQA is an umbrella activity in which the following activities are performed EXCEPT:

    <p>Project Planning</p> Signup and view all the answers

    Software configuration management is used to:

    <p>Manage change in the software</p> Signup and view all the answers

    Which of the following is not TRUE about 'Error Tracking'?

    <p>True</p> Signup and view all the answers

    SQA is an activity in which testing is performed only.

    <p>False</p> Signup and view all the answers

    Schedule Performance Index (SPI) is equal to:

    <p>BCWP / BCWS</p> Signup and view all the answers

    BCWS for a task will be equal to:

    <p>Effort (person-days etc) for task I</p> Signup and view all the answers

    If: E = Errors found before shipment and D = Errors found during operation then Defect Removal Efficiency (DRE) is equal to:

    <p>DRE = E / (E + D)</p> Signup and view all the answers

    Quality assurance helps management in providing the necessary data about:

    <p>Product quality</p> Signup and view all the answers

    The progress on a project at any given point in time can be calculated by:

    <p>Adding all the BCWS till that point for all tasks</p> Signup and view all the answers

    The process of rediscovering the software design is called:

    <p>Reverse Engineering</p> Signup and view all the answers

    OCI stands for:

    <p>Output, Control and Input</p> Signup and view all the answers

    A redesigned business process must be prototyped before it is fully integrated into the business.

    <p>True</p> Signup and view all the answers

    Critical path defines:

    <p>The chain of tasks that determines the duration of the project.</p> Signup and view all the answers

    BAC stands for:

    <p>Budget at Completion</p> Signup and view all the answers

    The first task in a concept development project is to:

    <p>Determine the scope of the concept</p> Signup and view all the answers

    Milestone represents:

    <p>The defined target which you need to achieve</p> Signup and view all the answers

    Timeline chart is also known as the _____________ chart.

    <p>Gantt</p> Signup and view all the answers

    A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is known as __________________.

    <p>Law of Diminishing Returns</p> Signup and view all the answers

    The more you refine the tasks, the more you can:

    <p>All of the given options</p> Signup and view all the answers

    In a complex system that will lead to much ………..code to write and maintain.

    <p>More</p> Signup and view all the answers

    __________ is not the construction part of software development activities.

    <p>Testing</p> Signup and view all the answers

    Which of the following is NOT one of the tasks in concept scoping?

    <p>Identify the ambiguous requirements</p> Signup and view all the answers

    Basic project management processes are established at _________ level of CMM.

    <p>Level 1</p> Signup and view all the answers

    The projects usually don’t fail due to

    <p>The fact that company was not CMM certified</p> Signup and view all the answers

    Defining a |Task Network| helps in defining:

    <p>Sequence in which activities will be performed</p> Signup and view all the answers

    ___________________ is a team organization where there is no permanent leader and task coordinators are appointed for short duration. Decisions on problems and approach are made by group consensus and communication among the team is horizontal.

    <p>Democratic Decentralized (DD)</p> Signup and view all the answers

    The first step in project planning is to:

    <p>Establish the objectives and scope.</p> Signup and view all the answers

    Function Point analysis is helpful in calculating the size of the software for ____________.

    <p>Both client and software organization</p> Signup and view all the answers

    Which of these is not a valid reason for measuring software processes, products, and resources?

    <p>To price them</p> Signup and view all the answers

    Integrity can be measured by the following formula:

    <p>integrity = ∑[(1 - threat) x (1 - security)]</p> Signup and view all the answers

    The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is said to be achieving the:

    <p>Correctness</p> Signup and view all the answers

    What activity/activities can we perform to identify the needs and benefits of a task?

    <p>All of these</p> Signup and view all the answers

    The rapid application development model is:

    <p>All of the given</p> Signup and view all the answers

    BCWS stands for:

    <p>Budgeted cost of work schedule</p> Signup and view all the answers

    An _______________ is a user identifiable group of logically related data or control information maintained within the boundary of the application.

    <p>Internal Logical File (ILF)</p> Signup and view all the answers

    When more than one user interprets the same requirement in different ways, then we can say that the requirements are:

    <p>Ambiguous</p> Signup and view all the answers

    BCWP refers to:

    <p>Budgeted cost of work performed so far</p> Signup and view all the answers

    Which statement is correct?

    <p>The greater the dependency between the components, the greater is coupling</p> Signup and view all the answers

    Testing and Software Quality Assurance activities are exactly similar activities with different names.

    <p>False</p> Signup and view all the answers

    If an error related to requirements is identified in the testing phase, this error will be considered as an error in ___________ phase.

    <p>Requirement</p> Signup and view all the answers

    In context of moving range and individual control charts, UNPL stands for:

    <p>Upper Natural Process Limit</p> Signup and view all the answers

    Usually the performance of the organization changes overnight.

    <p>False</p> Signup and view all the answers

    Effort required to test a program to ensure that it performs its intended function __________.

    <p>Testability</p> Signup and view all the answers

    Following are the implicit requirement(s) of software?

    <p>All of the given</p> Signup and view all the answers

    The extent to which a program can be expected to perform its intended function with required precision is called ______.

    <p>Reliability</p> Signup and view all the answers

    If an error related to requirements is identified in coding, this error will be considered as an error in ___________ phase.

    <p>Requirement</p> Signup and view all the answers

    Review is a type of _________ that helps prevent bugs from moving to the next stage of software development.

    <p>Filter</p> Signup and view all the answers

    ___________ help in finding the matrix to be stable or unstable.

    <p>Control chart</p> Signup and view all the answers

    While developing the software, if the bug is caught then it is termed as:

    <p>Defect</p> Signup and view all the answers

    Defect Removal Efficiency can be increased by:

    <p>Identifying the defect in early stages of development so that it may not be amplified</p> Signup and view all the answers

    Following are the types of Formal Technical Reviews except:

    <p>JAD</p> Signup and view all the answers

    _________ give you better insight into the state of the process or product.

    <p>Metrics</p> Signup and view all the answers

    The review participants should not focus on:

    <p>Weaknesses of the developer</p> Signup and view all the answers

    Determination of the .................... is a pre-requisite of all sorts of estimates, including resources, time, and budget.

    <p>software scope</p> Signup and view all the answers

    Review meeting is attended by the following except:

    <p>CEO</p> Signup and view all the answers

    Following are effective guidelines for Review except:

    <p>Tone should be high and strict</p> Signup and view all the answers

    Which statement is true in the light of Pareto principle?

    <p>80% of defects are caused by 20% of mistakes</p> Signup and view all the answers

    Reliability and Safety are the same concepts with respect to software quality.

    <p>False</p> Signup and view all the answers

    Function/Test matrix is a type of:

    <p>Project status report</p> Signup and view all the answers

    The prevention of defects being injected into the software can help in decreasing the cost of software.

    <p>True</p> Signup and view all the answers

    Poka Yoke is a Japanese term and it means:

    <p>Mistake Proofing</p> Signup and view all the answers

    We need to employ some statistical techniques and plot the result ---------------. This is known as statistical control techniques.

    <p>Graphically</p> Signup and view all the answers

    Poka Yoke is the name of a:

    <p>QA technique</p> Signup and view all the answers

    The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is ____.

    <p>Correctness</p> Signup and view all the answers

    If a new version of a product is released by fixing the bugs in the previous release then it is termed as ____.

    <p>Product Update</p> Signup and view all the answers

    The Evolution Graph signifies the:

    <p>All of the given</p> Signup and view all the answers

    Which is not correct in the context of Poka-Yoke technique?

    <p>Sophisticated and expensive</p> Signup and view all the answers

    In the software development life cycle, soon the defect is detected will result in:

    <p>Increase in cost of software</p> Signup and view all the answers

    Metrics to assess the quality of the analysis models and the corresponding software specification were proposed________:

    <p>Davis in 1993</p> Signup and view all the answers

    If Configuration item identification is not identified, it is possible to control changes and establish records.

    <p>False</p> Signup and view all the answers

    __________ testing verifies the correct implementation of internal units, structures, and relationships among them.

    <p>White box</p> Signup and view all the answers

    The template for organizing SRS given by the American Department of Defense and NASA should be used for:

    <p>Large and complex projects</p> Signup and view all the answers

    Incomplete Configuration identification documents may result in:

    <p>Defective Product</p> Signup and view all the answers

    If you know the relationship between the use cases, classes, GUIs, test cases, and other artifacts then we can say that requirements are traceable in that project.

    <p>True</p> Signup and view all the answers

    When an item is baselined, it becomes frozen; here frozen means that the item can be changed only by creating an old version.

    <p>True</p> Signup and view all the answers

    The most important objective of any engineering activity is to produce high quality product with limited resources and-----------------------

    <p>Time</p> Signup and view all the answers

    There may be one or more GUIs that are part of any good software but may not satisfy any requirement.

    <p>True</p> Signup and view all the answers

    Extent to which access to software or data by unauthorized persons can be controlled and called __________.

    <p>Integrity</p> Signup and view all the answers

    Following are the components of a Legacy system except:

    <p>Marketing</p> Signup and view all the answers

    Object un-lock is done by:

    <p>Check in</p> Signup and view all the answers

    There are many reasons for which the legacy system becomes difficult to maintain EXCEPT:

    <p>None of these</p> Signup and view all the answers

    Requirements engineering is the basis of the contract between the developer and the client.

    <p>True</p> Signup and view all the answers

    In ______________, new user and technology requirements can also be integrated into the re-engineering effort.

    <p>Forward re-engineering</p> Signup and view all the answers

    The amount of computing resources required by a program to perform its function is __________.

    <p>Efficiency</p> Signup and view all the answers

    Large classes reduce:

    <p>Cohesion</p> Signup and view all the answers

    While assessing a legacy system for further decision, one should decide the following about the supplier:

    <p>All of the given options</p> Signup and view all the answers

    Level _________ is the lowest capability level of CMMI in Continuous representation.

    <p>0</p> Signup and view all the answers

    In ___________ representation of CMMI model, consideration is given to improve selected process areas.

    <p>Staged</p> Signup and view all the answers

    The application software is assessed based on the following factors except:

    <p>Code Refactoring</p> Signup and view all the answers

    Empirical models are statistical models and are based upon historic data.

    <p>True</p> Signup and view all the answers

    We modify the internal ______________ in code restructuring.

    <p>design</p> Signup and view all the answers

    ______ technique was initially developed for manufacturing processes in the 1920s by Walter Shewart.

    <p>Statistical Process Control</p> Signup and view all the answers

    Error tracking provides a quantitative means of assessing the quality of the individuals implementing a software product.

    <p>True</p> Signup and view all the answers

    There are tools available in the market for project tracking. These tools can automatically track and manage the project replacing the need for any human being as a Project Manager.

    <p>False</p> Signup and view all the answers

    Two tools for computing critical path and project completion times from activity networks are:

    <p>CPM and PERT</p> Signup and view all the answers

    In order to measure the design quality, if the frequency of ripple defects is too large, then it means that there is tight coupling and hence the:

    <p>Design is not maintainable</p> Signup and view all the answers

    In _________________, there is both vertical and horizontal communication.

    <p>Controlled decentralized (CD)</p> Signup and view all the answers

    The only reason for an estimate to be unreliable is lack of experience related to the application on the part of the estimator.

    <p>False</p> Signup and view all the answers

    A consideration of software scope must include an evaluation of all external interfaces.

    <p>True</p> Signup and view all the answers

    Software quality is conformance to _____________

    <p>Explicitly stated functional and non-functional requirements</p> Signup and view all the answers

    The boundary time defines the following parameter(s) for a project:

    <p>All of the given options</p> Signup and view all the answers

    Quality is the compliance of software to implicit and explicit quality factors. Identify the explicit requirement from the following:

    <p>Compliance with CMMI</p> Signup and view all the answers

    Following are the benefits of conducting review except:

    <p>Help in finding the size of the project</p> Signup and view all the answers

    Mean Time To Repair (MTTR) is the:

    <p>All of the given options are correct.</p> Signup and view all the answers

    In order to use the PERT and CPM, which one of the following is not required?

    <p>Teams communication mode detail</p> Signup and view all the answers

    SCM is the requirement of the ________ level(s) of CMM.

    <p>Second and later</p> Signup and view all the answers

    We can include the following items during configuration item identification:

    <p>All of the given choices are correct</p> Signup and view all the answers

    CPM stands for:

    <p>Critical Path Method</p> Signup and view all the answers

    Software re-factoring is a process in which:

    <p>External behavior of the system does not change</p> Signup and view all the answers

    The Change Control Authority does not have the rights to permit to bring the change in the software.

    <p>False</p> Signup and view all the answers

    Check in and check out is actually one and the same process with two different names.

    <p>False</p> Signup and view all the answers

    There could be multiple GUIs to satisfy one requirement.

    <p>True</p> Signup and view all the answers

    _____________ is the process of design recovery. At this stage, the documentation of the overall functionality is created.

    <p>Reverse Engineering</p> Signup and view all the answers

    In code restructuring, we do not change the functionality of the code.

    <p>True</p> Signup and view all the answers

    Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.

    <p>Quantitative</p> Signup and view all the answers

    A _____________ process is ‘a set of logically related tasks performed to achieve a defined business outcome.’

    <p>Business</p> Signup and view all the answers

    Software Refactoring is a process in which:

    <p>External behavior of the system does not change</p> Signup and view all the answers

    The formal methods model of software development makes use of mathematical methods to:

    <p>All of the given</p> Signup and view all the answers

    Which one of the following describes the data and control to be processed, function, performance, constraints, interfaces, and reliability?

    <p>Software scope estimation</p> Signup and view all the answers

    A significant SQA plan, among others, should include:

    <p>Resources required for the project</p> Signup and view all the answers

    The software plan is not a static document; it is frequently adjusted to make the project appear on track to meet all deadlines and quality targets.

    <p>True</p> Signup and view all the answers

    The projects are classified into the following categories except:

    <p>Marketing Development Projects</p> Signup and view all the answers

    The processes at ________ is focused on continually improving process performance through both incremental and innovative technological changes/improvements.

    <p>Level 3</p> Signup and view all the answers

    QA is an activity performed ___________ of the software development.

    <p>Throughout</p> Signup and view all the answers

    _____________ the ability to encourage people to create and feel creative.

    <p>Motivation</p> Signup and view all the answers

    Caper Jones divided software related activities into _____________ different categories.

    <p>40</p> Signup and view all the answers

    By default every organization is working at _______________.

    <p>Level 1</p> Signup and view all the answers

    Software Engineering is the set of __________and ___________ to develop software.

    <p>Processes, tools</p> Signup and view all the answers

    Software has very close relationship with ___________.

    <p>Economics</p> Signup and view all the answers

    COCOMO is the classic LOC cost-estimation formula and used thousand delivered source instructions (KDSI) as his _________ of size.

    <p>Unit</p> Signup and view all the answers

    _______________ deadline is one of the reasons of project failure.

    <p>Unrealistic</p> Signup and view all the answers

    ___________ model is very sensitive to risk.

    <p>Spiral</p> Signup and view all the answers

    __________ is the ability to encourage technical people to produce to their best.

    <p>Motivation</p> Signup and view all the answers

    Caper Jones is a famous researcher in the field of ___________ who made a company named Software Productivity Research.

    <p>Software Engineering</p> Signup and view all the answers

    Reel has defined _________ steps process to improve the chances of success.

    <p>5</p> Signup and view all the answers

    In ________ model user feedback is received very quickly because product is delivered in small versions.

    <p>Incremental</p> Signup and view all the answers

    _____________ approach is better for team spirits point of view.

    <p>Democratic Decentralized</p> Signup and view all the answers

    Construction activities are directly related to the _____________ of the software.

    <p>Development</p> Signup and view all the answers

    Continuous process improvement is enabled by __________ feedback from the __________.

    <p>Qualitative, process</p> Signup and view all the answers

    The major activities related to software construction are whose options include:

    <p>Requirement gathering, design development, coding and testing</p> Signup and view all the answers

    If requirements are uncertain, ______ will be a suitable.

    <p>Incremental</p> Signup and view all the answers

    Capability maturity model (CMM) is used to judge the __________ model of an organization.

    <p>Maturity</p> Signup and view all the answers

    After passing through all the stages of software development when we deploy the new system at the user side that stage is called ______.

    <p>Installation</p> Signup and view all the answers

    Defects per function point are a ___ metric.

    <p>One</p> Signup and view all the answers

    In Capability Maturity Model (CMM), ___________ performs optimization.

    <p>Level 5</p> Signup and view all the answers

    If a software developer is going to develop software for a nuclear reactor which factor(s) will be more important?

    <p>Both B and C</p> Signup and view all the answers

    Capability Maturity Model (CMM) has __________ levels.

    <p>5</p> Signup and view all the answers

    Fred Brook is a famous software engineer who wrote a great book related to software engineering named _____________.

    <p>A Mythical Man Month</p> Signup and view all the answers

    W5HH Principle consists of seven ___________.

    <p>Questions</p> Signup and view all the answers

    In Rational Unified Process (RUP) horizontal dimension represents the ___________ aspect of the process.

    <p>Dynamic</p> Signup and view all the answers

    There are two very different approaches to cost estimation. The older approach is called LOC estimation, since it is ………….. on initially estimating the number of lines of code that will need to be developed for the project.

    <p>Bad</p> Signup and view all the answers

    Task coordinators are appointed for a short period of time in ______________ organization team structure.

    <p>Democratic Decentralized</p> Signup and view all the answers

    _________ model is opposite to waterfall model.

    <p>Spiral</p> Signup and view all the answers

    MOI model of leadership was developed by ______.

    <p>Weinberg</p> Signup and view all the answers

    Each process defines certain deliverables known as the _________.

    <p>Work products</p> Signup and view all the answers

    _____________ procedures include QA activities, design and code review, and status meetings.

    <p>Formal, interpersonal</p> Signup and view all the answers

    Miscommunication among project staff is one of the reasons of the failure of the software project.

    <p>True</p> Signup and view all the answers

    According to DeMarco a good team leader should have only _________ characteristics.

    <p>Four</p> Signup and view all the answers

    Synchronize and Stabilize model is adopted by __________________.

    <p>Microsoft</p> Signup and view all the answers

    Extreme programming model is very effective when requirements are very ________ and the project scope is very ___________.

    <p>Changing, limited</p> Signup and view all the answers

    _______________ model is a haphazard type of software development activity.

    <p>Build and Fix</p> Signup and view all the answers

    Waterfall model is a document driven model.

    <p>True</p> Signup and view all the answers

    ___________ paradigm structures a team loosely and depends on individual initiative of the team members.

    <p>Random</p> Signup and view all the answers

    Spiral model has _____________ dimensions.

    <p>2</p> Signup and view all the answers

    The ___________ model of software development is a good approach when core product is required quickly.

    <p>Incremental</p> Signup and view all the answers

    In ____________________ team organization, there is no permanent leader rather there are task coordinators.

    <p>Democratic Decentralized</p> Signup and view all the answers

    ___________________ is an Object Oriented model.

    <p>Fountain</p> Signup and view all the answers

    _______________ model is developed keeping in mind the element of risk in the development of software.

    <p>Spiral</p> Signup and view all the answers

    Vision phase in a software process focuses on __________.

    <p>Why</p> Signup and view all the answers

    Rapid application development is another form of _________________.

    <p>Prototyping model</p> Signup and view all the answers

    _____________________ phase in a software process focuses on change.

    <p>Maintenance</p> Signup and view all the answers

    ________________ model is adopted by Microsoft.

    <p>Synchronize and Stabilize</p> Signup and view all the answers

    ____________________ teams generate more and better solutions than individuals and are most useful for complex problems.

    <p>Decentralized</p> Signup and view all the answers

    The ___________ model of software development is a good approach when core product is required quickly.

    <p>Incremental</p> Signup and view all the answers

    The______________ model of software development is a useful approach when a customer cannot define requirements clearly.

    <p>Prototyping</p> Signup and view all the answers

    ______________ model has a major drawback in that the delivered product may not fulfill the customer's requirements.

    <p>Waterfall</p> Signup and view all the answers

    MOI model of leadership stands for?

    <p>Motivation, Organization, Innovation</p> Signup and view all the answers

    ____________ activity is performed throughout software production.

    <p>Quality Assurance</p> Signup and view all the answers

    In ________________ model the product is developed without any proper design and specifications.

    <p>Build and Fix</p> Signup and view all the answers

    Software project management focuses on the four P’s: These are?

    <p>People, Product, Process, Project</p> Signup and view all the answers

    The _______________ dimension in rational unified process model represents the dynamic aspect of the process.

    <p>Horizontal</p> Signup and view all the answers

    _____________ dimension of Spiral model represents the cumulative cost to date.

    <p>Radial</p> Signup and view all the answers

    The important feature of extreme programming is the concept of __________________.

    <p>Pair programming</p> Signup and view all the answers

    ‘A method requires lot of information from some other class’ is a symptom of _____________ bad smell.

    <p>Feature envy</p> Signup and view all the answers

    In software development ____________________ is performed at the end of each phase.

    <p>Verification</p> Signup and view all the answers

    _____________ integrates system and software disciplines into a single process improvement framework for introducing new disciplines as needs arise.

    <p>CMMI</p> Signup and view all the answers

    FAST is the abbreviation of?

    <p>Facilitated Application Specification Technique</p> Signup and view all the answers

    Unrealistic deadline is NOT one of the reasons of project failure.

    <p>False</p> Signup and view all the answers

    Software _____ relates individual software measures to provide a normalized view.

    <p>Metric</p> Signup and view all the answers

    In measuring Software Process Quality by using control charts, if the gap between the defects reported and defects fixed is increasing, then it means?

    <p>The product is in unstable condition.</p> Signup and view all the answers

    Quality can be measured if we measure the _____ of the product.

    <p>All of the given options</p> Signup and view all the answers

    Although there are many different models developed by different researchers for estimation, all of them share which one of the following basic structure?

    <p>E = A + B * (ev)C</p> Signup and view all the answers

    In case some software, it is extremely easy to operate with an intuitive interface conforming to most excellent GUI practices of the industry. It needs very little training ----------------.

    <p>Less than one hour</p> Signup and view all the answers

    A _____________is a user recognizable subgroup of data elements within an ILF or EIF.

    <p>Record element type (RET)</p> Signup and view all the answers

    Which one of the following is NOT a useful indicator of software quality?

    <p>Code size</p> Signup and view all the answers

    This chart is then used to develop the individual control chart is called statistical control techniques.

    <p>True</p> Signup and view all the answers

    The software reengineering process model includes restructuring activities for which of the following work items?

    <p>All of the given options</p> Signup and view all the answers

    Any delay in _____ path makes the whole project delayed.

    <p>Critical</p> Signup and view all the answers

    The responsibilities of a Project Manager does not include?

    <p>All these options</p> Signup and view all the answers

    One graphical technique for determining whether a process exhibits out-of-control change behavior is a.

    <p>Control chart</p> Signup and view all the answers

    Defect per unit function point is a.

    <p>Metric</p> Signup and view all the answers

    _________ subgroups are those that the user has the option of using one or none of the subgroups during an elementary process.

    <p>Optional</p> Signup and view all the answers

    Chart that is used to develop the individual control chart is called statistical control techniques.

    <p>True</p> Signup and view all the answers

    Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes are maintained during times of stress and this is done at CMM level ---------.

    <p>2</p> Signup and view all the answers

    Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management Plan?

    <p>Risk Projection</p> Signup and view all the answers

    ____________ is the set of tools and techniques used to develop software?

    <p>Software Engineering</p> Signup and view all the answers

    The characteristics of well developed software are__________.

    <p>All of the above</p> Signup and view all the answers

    Which one of the following principles/techniques is NOT software projects scheduling?

    <p>Function point analysis</p> Signup and view all the answers

    SE is a Balancing act.

    <p>True</p> Signup and view all the answers

    With a complex class you have to move data and methods around in small pieces to avoid errors, it seems slow but it is the __________ because you avoid debugging.

    <p>Quickest</p> Signup and view all the answers

    The purpose of earned value analysis is to?

    <p>Provide a quantitative means of assessing software project progress</p> Signup and view all the answers

    ________ is the process of balancing among different characteristics of software?

    <p>Software Management</p> Signup and view all the answers

    ______ is directly related to the development of the software.

    <p>Construction</p> Signup and view all the answers

    The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an effective strategy must consider:

    <p>All of the given choices</p> Signup and view all the answers

    The component-based development model is?

    <p>Dependent on object technologies for support.</p> Signup and view all the answers

    ___________ basic project management processes established to track cost, schedule and functionality.

    <p>Level 2</p> Signup and view all the answers

    Which is used to determine the most viable option for cost estimation when the information in the ‘Decision tree’ is complete?

    <p>Expected cost = (path probability)I x (estimated path cost)</p> Signup and view all the answers

    Change control is not necessary if a development group is making use of an automated project database tool.

    <p>False</p> Signup and view all the answers

    Which one of the following is the 4th level of the SEI Capability Maturity Model?

    <p>Optimizing</p> Signup and view all the answers

    After building the Decision Tree, the following formula is used to find the expected cost for an option. Choose the correct formula:

    <p>Expected Cost= (path probability)i * (estimated path cost)</p> Signup and view all the answers

    Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?

    <p>Performance risks</p> Signup and view all the answers

    Doubling the size of your software project team is guaranteed to cut project completion time in half.

    <p>False</p> Signup and view all the answers

    Every task or group of tasks should be associated with a project ------------.

    <p>Milestone</p> Signup and view all the answers

    Every task should be assigned to a specific team ------------.

    <p>Member</p> Signup and view all the answers

    Which one is not the Software project planning activity carried out by the project manager for estimation?

    <p>Product Quality</p> Signup and view all the answers

    Configuration Item identification involves:

    <p>All of the given</p> Signup and view all the answers

    Incomplete Configuration identification documents may result in:

    <p>All of the given choices are correct</p> Signup and view all the answers

    Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?

    <p>Performance risks</p> Signup and view all the answers

    Proactive risk management philosophy is also sometimes termed as Indiana Jones school of risk management.

    <p>False</p> Signup and view all the answers

    Software Availability can be calculated by the following equation:

    <p>Availability = (MTTF/MTBF) x 100</p> Signup and view all the answers

    Phase Index can be calculated by the help of the following formula, where Ei – the total number of errors uncovered during the ith step in the SE process?

    <p>PIi = ws(Si/Ei) + wm(Mi/Ei) + wt(Ti/Ei)</p> Signup and view all the answers

    The higher the Error Index, the higher will be the Defect Removal Efficiency.

    <p>False</p> Signup and view all the answers

    The goal of quality assurance is to provide management with the data needed to determine which software engineers are producing the most defects.

    <p>False</p> Signup and view all the answers

    From the following listed software development models, which one is an object-oriented model?

    <p>Spiral model</p> Signup and view all the answers

    The prototyping model of software development is?

    <p>A useful approach when a customer cannot define requirements clearly.</p> Signup and view all the answers

    Which one of the following does not belong to a strategy for dealing with risk?

    <p>Security risk assessment</p> Signup and view all the answers

    A _______ entity is one which has any ----------- in the problem domain without some other entity.

    <p>Strong, Role</p> Signup and view all the answers

    ILF is a --------------- identifiable group of logically controlled information ------------- the boundary of the application.

    <p>user, within</p> Signup and view all the answers

    Several entities are always created -------------- and deleted together then this is a strong indication that they should be grouped into ---------- logical file/files.

    <p>Together, Single</p> Signup and view all the answers

    Which of these software characteristics are used to determine the scope of a software project?

    <p>information objectives, function, performance</p> Signup and view all the answers

    In _________________ a team is structured along a traditional hierarchy of authority.

    <p>closed paradigm</p> Signup and view all the answers

    Integrity means that the software should?

    <p>Withstand the attack from a hacker</p> Signup and view all the answers

    Ambiguous requirements can be measured quantitatively.

    <p>False</p> Signup and view all the answers

    The Spiral model of software development is of iterative nature.

    <p>True</p> Signup and view all the answers

    While performing risk analysis, the impact of risk can not be measured quantitatively.

    <p>False</p> Signup and view all the answers

    _______ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.

    <p>Defect removal efficiency</p> Signup and view all the answers

    For software the total numbers of requirements are equal to _______.

    <p>Functional requirements and non-functional requirements</p> Signup and view all the answers

    The _____________ model is used to overcome issues related to understanding and capturing of user requirements.

    <p>Rapid Prototyping</p> Signup and view all the answers

    ___________ is not part of the software development loop.

    <p>Status Quo</p> Signup and view all the answers

    The level 1 of CMM is known as?

    <p>Initial</p> Signup and view all the answers

    According to DeMarco a good Project Manager?

    <p>Should have a big heart and ignore small mistakes</p> Signup and view all the answers

    The best project team organizational model to use when tackling extremely difficult problems is the?

    <p>Democratic decentralized model</p> Signup and view all the answers

    Which factor is the least important when choosing the organizational structure for a software team?

    <p>Size of the project budget</p> Signup and view all the answers

    Product and process decomposition occurs simultaneously as the project plan evolves.

    <p>True</p> Signup and view all the answers

    Measuring the quality and performance of software through any means is much better than just making a guess about it.

    <p>True</p> Signup and view all the answers

    __________________is data that influences an elementary process of the application being counted.

    <p>Control Information</p> Signup and view all the answers

    An entity which defines the many-to-many relationship between two or more entities is called?

    <p>Associative Entity Type</p> Signup and view all the answers

    Software risk impact assessment should focus on consequences affecting?

    <p>Performance, support, cost, schedule</p> Signup and view all the answers

    The number of people required for a software project is determined?

    <p>All of the given</p> Signup and view all the answers

    Defect Removal Efficiency (DRE) can be measured by where E is Errors found at delivery and D is error found after delivery (typically within the first year of operation)?

    <p>DRE = E/(E + D)</p> Signup and view all the answers

    In function point analysis technique EO stands for?

    <p>External output</p> Signup and view all the answers

    In ____________a team is structured loosely and depends on individual initiative of the team members.

    <p>Random paradigm</p> Signup and view all the answers

    ______________ is the first stage of waterfall lifecycle model?

    <p>Requirement definition</p> Signup and view all the answers

    __________ is not the management part of software development activities?

    <p>Coding</p> Signup and view all the answers

    Software process and product quality are controlled at ________.

    <p>Both Process and Product level</p> Signup and view all the answers

    Study Notes

    Software Engineering II - Key Concepts

    • Law of Diminishing Returns: A principle stating that beyond a certain performance level, continued effort may lead to decreased effectiveness.

    • Software Development Activities: Requirement gathering is key, while testing, configuration management, and coding are essential but not part of the construction phase.

    • CMM Levels: Basic project management processes are established at the Repeatable level (Level 2) of the Capability Maturity Model (CMM).

    • Project Failure Factors: Projects typically fail due to unclear requirements or changing customer needs, rather than the lack of CMM certification.

    • Team Organization: Democratic decentralized (DD) teams operate with no permanent leader, and decisions are made through group consensus.

    • Software Measurement: Measuring software processes helps in improvement and characterization, but not necessarily for pricing.

    • Integrity Measurement Formula: Integrity is calculated using the formula: integrity = ∑[(1-threat) x (1-security)].

    • Rapid Application Development: This model is a high-speed adaptation useful for projects with unclear requirements.

    • Internal Logical File (ILF): A user identifiable group of logically related data maintained within an application's boundary.

    • Ambiguous Requirements: When users interpret the same requirement differently, it indicates ambiguity.

    • Testing vs. QA: Testing and Software Quality Assurance are distinct; their activities are not identical.

    • Error Phase Identification: An error identified during testing is considered a requirement phase error.

    • Implicit Requirements: Key implicit requirements for software include efficiency, ease of use, and maintainability.

    • Bug Identification: Bugs caught during software development are termed defects.

    • Formal Technical Reviews: Types include inspections and walkthroughs, but not Joint Application Development (JAD).

    • Focus During Reviews: Review participants should prioritize the work product and not personal weaknesses of the developer.

    • Review Meeting Attendance: Review meetings generally do not include the CEO.

    • Pareto Principle: States that 80% of defects arise from 20% of mistakes, highlighting the need for focused corrections.

    • Reliability vs. Safety: In software quality, these concepts are often misunderstood as the same but have distinct definitions.

    • Defect Prevention: Proactively preventing defects can significantly decrease software costs.

    • Poka Yoke: A Japanese quality assurance technique aimed at preventing errors.

    • Product Update vs. Upgrade: A product update involves fixing bugs in previous versions.

    • Evolution Graph: Signifies version relationships and facilitates change control activities.

    • Defect Detection Cost: Detecting defects early in the software development lifecycle significantly reduces overall costs.

    • Testing Types: White box testing verifies correct implementation of internal units.

    • SRS Template: The American DoD and NASA's SRS template is best suited for large and complex projects.

    • Traceable Requirements: Requirements are considered traceable if relationships among use cases, classes, GUIs, and test cases are documented.

    • Legacy System Components: Include business processes, system hardware, and application software, but not marketing.

    • Legacy System Maintenance Issues: Difficulties arise from obsolete languages, lack of documentation, and inconsistency from different development teams.

    • Re-engineering Activities: Forward re-engineering allows new requirements and technologies to be integrated during re-engineering.

    • Cohesion vs. Coupling: Large classes can reduce cohesion, impacting software maintainability.

    • CMMI Capability Levels: Level 0 represents the lowest capability level, whereas Level 5 focuses on optimizing performance through technological improvements.

    • Empirical Models: Base on historical data for statistical analysis in project management and estimation.

    • Error Tracking: Provides a quantitative means to assess software quality and the individuals involved.

    • Project Tracking Tools: Available tools do not completely eliminate the need for human project managers.

    • Critical Path Method (CPM): Used alongside PERT for calculating project timelines and task dependencies.

    • Design Quality Measurement: Frequent ripple defects indicate tight coupling and poor maintainability in software design.

    • Controlled Decentralized Communication: Involves both vertical and horizontal communication in team dynamics.

    • Quality Requirements: Explicit requirements include maintainability and compliance with standards.

    These notes encapsulate key principles of Software Engineering II, highlighting essential processes, methodologies, and characteristics relevant to effective software development and project management.### Risk Categories

    • Three main categories of risks: project risks, technical risks, business risks.
    • Importance of identifying risks for effective project management.

    MTTC Abbreviation

    • MTTC stands for mean time to change, relevant in software development.

    Project Data Collection

    • Data for project matrices should be collected from similar domains to ensure accuracy and relevance.

    Project Scheduling Techniques

    • Program Evaluation and Review Technique (PERT) is a crucial method for preparing project schedules based on defined task networks.

    Historical Data Management

    • Historical data should include diverse project inputs, but not limited to only scientific projects.

    Quality Costs

    • Quality costs can be categorized into prevention, appraisal, and failure costs.

    Software Defects

    • A defect is a bug reported by the client after software delivery; this distinguishes it from an error or fault.

    Formal Technical Review (FTR)

    • FTR stands for Formal Technical Review, an important aspect of software quality assurance.

    Software Quality Assurance (SQA)

    • SQA involves activities like review, testing, project planning, and inspection as umbrella activities.

    Software Configuration Management

    • Used for managing changes in the software lifecycle, ensuring consistency and control.

    Error Tracking

    • Effective error tracking aids in estimating project progress and requires historical data for accuracy.

    Schedule Performance Index (SPI)

    • SPI is calculated as the ratio of BCWP (Budgeted Cost of Work Performed) to BCWS (Budgeted Cost of Work Scheduled).

    Budgeted Cost of Work Scheduled (BCWS)

    • BCWS represents the effort in person-days required for a specific task.

    Defect Removal Efficiency (DRE)

    • DRE is defined as E / (E + D), where E is errors found before shipment and D is errors found during operation.

    Quality Assurance Role

    • Quality assurance provides vital data regarding product quality, error status, and defect reports.

    Project Progress Calculation

    • Progress can be calculated by summing all BCWS until a given point for all tasks.

    Reverse Engineering

    • Refers to the process of rediscovering software design, crucial in improving or updating existing systems.

    Output Control Input (OCI)

    • OCI is a critical component addressing outputs in processes or software engineering.

    Prototyping in Business Process Redesign

    • A redesigned business process should be prototyped before full integration.

    Critical Path

    • The critical path defines the sequence of tasks that determines the overall project duration.

    Budget at Completion (BAC)

    • BAC refers to the total budgeted cost estimated for project completion.

    Milestones in Project Management

    • Milestones represent defined targets crucial for project tracking and success measurement.

    Gantt Chart

    • The timeline chart, commonly known as a Gantt chart, is used for project scheduling and visualization.

    Task Refinement Benefits

    • Refining tasks enhances accuracy in estimation, scope conclusion, and project scheduling.

    Complex Systems and Code Maintenance

    • More complex systems typically lead to increased code requirements, resulting in higher maintenance efforts.

    Concept Development

    • The initial task in concept development is to define the concept's scope.

    Stable vs. Unstable Process

    • In statistical control techniques, an increasing gap between defects reported and fixed indicates an unstable process.

    Metrics Importance

    • Metrics play a vital role in gaining insights into the process or product's status, facilitating improvements.

    Configuration Management

    • Effective configuration management is essential for controlling changes and maintaining records in software systems.

    Psychoanalytic Approval Techniques

    • Poka Yoke is a Japanese term meaning "mistake proofing," employed in quality assurance processes.

    Software Process Quality Measurement

    • Control charts are utilized in measuring software process quality by monitoring defect rates.

    Function Point Analysis

    • Function point analysis helps in estimating software size, beneficial for both clients and developers.

    CMMI Framework

    • The Capability Maturity Model Integration (CMMI) integrates system and software disciplines into a unified improvement framework.

    Project Management Responsibilities

    • A project manager's key responsibilities include scheduling, resource allocation, and task monitoring.

    Statistical Techniques in Software Quality

    • Employing statistical methods helps plot results, crucial for effective software process control.

    Legacy Systems Challenges

    • Migrating legacy systems is challenging primarily due to a lack of proper documentation.

    Development Team Guidelines

    • Effective reviews in development should focus on the product rather than individuals, fostering a constructive environment.

    Error Management and Control Techniques

    • Error tracking and management are paramount in mitigating risks throughout the software development life cycle.

    Major Project Management Principles

    • Recognizing dependencies and project constraints is fundamental for successful software project management.

    Risk Management Essentials

    • Risk mitigation, monitoring, and management plans are integral to identifying and addressing project uncertainties.

    Software Quality and Metrics

    • Software quality is assessed based on defined metrics, which provide insights into the development process.

    Importance of Configuration Item Identification

    • Proper identification of configuration items is essential for controlling changes in software projects.### Software Project Management
    • Interdependency identification, time allocation, effort validation, function point analysis, and milestone definition are crucial elements in project planning.
    • Earned value analysis quantifies software project progress, assessing productivity quantitatively.
    • RMMM (Risk Management and Mitigation Management) plans are essential for addressing risk through avoidance, monitoring, and contingency strategies.

    Software Development Models

    • The component-based development model relies on object technologies and supports the development of reusable components.
    • Rapid Prototyping helps in capturing user requirements effectively by providing quick feedback loops.
    • The Spiral model is sensitive to risks and facilitates iterative development.

    Risk Management

    • Performance risks assess how well a product meets requirements and suitability for use.
    • Proactive risk management is sometimes referred to as the "Indiana Jones school of risk management."
    • Effective risk strategies include avoidance, monitoring, and contingency planning.

    Cost Estimation and Analysis

    • The Decision Tree is utilized for cost estimation by determining expected costs via a formula involving path probabilities and estimated costs.
    • Defect Removal Efficiency (DRE) measures quality assurance effectiveness before a product's release.

    Quality Assurance and Metrics

    • Quality assurance aims to furnish management with information on defect rates per software engineer.
    • Phase Index and Error Index are metrics used to evaluate software quality at various stages of development.
    • Defects per function points offer insights into software efficiency measured through specific metrics.

    Team Organization and Structure

    • Effective project teams may adopt a democratic decentralized model for tackling complex challenges.
    • Communication and organization structures play critical roles in software project success.
    • Team member assignments should align with specific roles to facilitate accountability and efficiency.

    Capability Maturity Model (CMM)

    • CMM consists of five maturity levels, with level 5 focusing on optimization processes.
    • Initial levels are crucial for assessing an organization's capabilities and performance in software development practices.

    Software Characteristics and Features

    • Software characteristics influencing project scope include context, function, and communications requirements.
    • Integrity in software ensures defense against malicious attacks and enhances usability.

    Development Approaches

    • Controlling defect reduction and engaging team participation are key to successful project development.
    • Incremental development is appropriate when requirements are uncertain, offering flexibility through iterative releases.
    • Construct activities relate directly to the fundamental aspects of software development, including installation and debugging.

    Conclusion

    • Understanding these concepts aids in effective management and execution of software engineering projects, ensuring quality delivery and enhanced productivity.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with this quiz on Software Engineering II, specifically designed for the CS605 course. The quiz features multiple-choice questions derived from final term papers from Spring 2011. Challenge yourself and see how well you understand the key concepts of software engineering!

    More Like This

    Use Quizgecko on...
    Browser
    Browser