Podcast
Questions and Answers
Defect prevention is defined as avoiding defect insertion.
Defect prevention is defined as avoiding defect insertion.
True
Which maturity level is characterised by 'Basic project management processes established to track cost, schedule and functionality. Has the necessary process discipline in place to repeat earlier successes on projects with similar applications'?
Which maturity level is characterised by 'Basic project management processes established to track cost, schedule and functionality. Has the necessary process discipline in place to repeat earlier successes on projects with similar applications'?
What activity does a software project manager need to perform to minimize the risk of software failure?
What activity does a software project manager need to perform to minimize the risk of software failure?
The linear sequential model of software development is also known as the?
The linear sequential model of software development is also known as the?
Signup and view all the answers
Which of these benefits can be achieved when software is restructured?
Which of these benefits can be achieved when software is restructured?
Signup and view all the answers
__________ QA technique involves typically execution of software and the observation of program behavior or outcome.
__________ QA technique involves typically execution of software and the observation of program behavior or outcome.
Signup and view all the answers
___________ testing verifies the correct handling of the external functions provided by the software.
___________ testing verifies the correct handling of the external functions provided by the software.
Signup and view all the answers
The quality expectations of a user are that a software system performs useful functions that?
The quality expectations of a user are that a software system performs useful functions that?
Signup and view all the answers
Incomplete requirements gathering can result in the ___________ of the project.
Incomplete requirements gathering can result in the ___________ of the project.
Signup and view all the answers
The root causes of project failure are?
The root causes of project failure are?
Signup and view all the answers
____________ is a bad smell when a change requires lots of little changes in a lot of different classes.
____________ is a bad smell when a change requires lots of little changes in a lot of different classes.
Signup and view all the answers
If you find the code such that one type of change requires changing one subset of methods, another type of change requires changing another subset, then it is a symptom of_____________.
If you find the code such that one type of change requires changing one subset of methods, another type of change requires changing another subset, then it is a symptom of_____________.
Signup and view all the answers
Following are the reasons for project failure except?
Following are the reasons for project failure except?
Signup and view all the answers
Main characteristic of _______________ model is risk analysis and management.
Main characteristic of _______________ model is risk analysis and management.
Signup and view all the answers
Quantitative process-improvement objectives for the organization are established, continually revised to reflect changing business objectives at ______.
Quantitative process-improvement objectives for the organization are established, continually revised to reflect changing business objectives at ______.
Signup and view all the answers
Reliability of a software is a:
Reliability of a software is a:
Signup and view all the answers
Which of the following is NOT one of the degrees of rigor?
Which of the following is NOT one of the degrees of rigor?
Signup and view all the answers
Build and Fix model is a ___________ type of software development activity.
Build and Fix model is a ___________ type of software development activity.
Signup and view all the answers
Three categories of risks are:
Three categories of risks are:
Signup and view all the answers
MTTC is the abbreviation of:
MTTC is the abbreviation of:
Signup and view all the answers
While creating a matrix for a set of projects, data should be collected that belongs to a similar domain.
While creating a matrix for a set of projects, data should be collected that belongs to a similar domain.
Signup and view all the answers
_________ is one of the techniques to prepare project schedule once we have defined 'task network'.
_________ is one of the techniques to prepare project schedule once we have defined 'task network'.
Signup and view all the answers
While managing the historical data, we should consider the following except:
While managing the historical data, we should consider the following except:
Signup and view all the answers
Quality costs may be divided into costs associated with:
Quality costs may be divided into costs associated with:
Signup and view all the answers
When software is delivered to a client and then the client reports a bug in it, that bug is termed as:
When software is delivered to a client and then the client reports a bug in it, that bug is termed as:
Signup and view all the answers
FTR stands for:
FTR stands for:
Signup and view all the answers
SQA is an umbrella activity in which the following activities are performed EXCEPT:
SQA is an umbrella activity in which the following activities are performed EXCEPT:
Signup and view all the answers
Software configuration management is used to:
Software configuration management is used to:
Signup and view all the answers
Which of the following is not TRUE about 'Error Tracking'?
Which of the following is not TRUE about 'Error Tracking'?
Signup and view all the answers
SQA is an activity in which testing is performed only.
SQA is an activity in which testing is performed only.
Signup and view all the answers
Schedule Performance Index (SPI) is equal to:
Schedule Performance Index (SPI) is equal to:
Signup and view all the answers
BCWS for a task will be equal to:
BCWS for a task will be equal to:
Signup and view all the answers
If: E = Errors found before shipment and D = Errors found during operation then Defect Removal Efficiency (DRE) is equal to:
If: E = Errors found before shipment and D = Errors found during operation then Defect Removal Efficiency (DRE) is equal to:
Signup and view all the answers
Quality assurance helps management in providing the necessary data about:
Quality assurance helps management in providing the necessary data about:
Signup and view all the answers
The progress on a project at any given point in time can be calculated by:
The progress on a project at any given point in time can be calculated by:
Signup and view all the answers
The process of rediscovering the software design is called:
The process of rediscovering the software design is called:
Signup and view all the answers
OCI stands for:
OCI stands for:
Signup and view all the answers
A redesigned business process must be prototyped before it is fully integrated into the business.
A redesigned business process must be prototyped before it is fully integrated into the business.
Signup and view all the answers
Critical path defines:
Critical path defines:
Signup and view all the answers
BAC stands for:
BAC stands for:
Signup and view all the answers
The first task in a concept development project is to:
The first task in a concept development project is to:
Signup and view all the answers
Milestone represents:
Milestone represents:
Signup and view all the answers
Timeline chart is also known as the _____________ chart.
Timeline chart is also known as the _____________ chart.
Signup and view all the answers
A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is known as __________________.
A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is known as __________________.
Signup and view all the answers
The more you refine the tasks, the more you can:
The more you refine the tasks, the more you can:
Signup and view all the answers
In a complex system that will lead to much ………..code to write and maintain.
In a complex system that will lead to much ………..code to write and maintain.
Signup and view all the answers
__________ is not the construction part of software development activities.
__________ is not the construction part of software development activities.
Signup and view all the answers
Which of the following is NOT one of the tasks in concept scoping?
Which of the following is NOT one of the tasks in concept scoping?
Signup and view all the answers
Basic project management processes are established at _________ level of CMM.
Basic project management processes are established at _________ level of CMM.
Signup and view all the answers
The projects usually don’t fail due to
The projects usually don’t fail due to
Signup and view all the answers
Defining a |Task Network| helps in defining:
Defining a |Task Network| helps in defining:
Signup and view all the answers
___________________ is a team organization where there is no permanent leader and task coordinators are appointed for short duration. Decisions on problems and approach are made by group consensus and communication among the team is horizontal.
___________________ is a team organization where there is no permanent leader and task coordinators are appointed for short duration. Decisions on problems and approach are made by group consensus and communication among the team is horizontal.
Signup and view all the answers
The first step in project planning is to:
The first step in project planning is to:
Signup and view all the answers
Function Point analysis is helpful in calculating the size of the software for ____________.
Function Point analysis is helpful in calculating the size of the software for ____________.
Signup and view all the answers
Which of these is not a valid reason for measuring software processes, products, and resources?
Which of these is not a valid reason for measuring software processes, products, and resources?
Signup and view all the answers
Integrity can be measured by the following formula:
Integrity can be measured by the following formula:
Signup and view all the answers
The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is said to be achieving the:
The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is said to be achieving the:
Signup and view all the answers
What activity/activities can we perform to identify the needs and benefits of a task?
What activity/activities can we perform to identify the needs and benefits of a task?
Signup and view all the answers
The rapid application development model is:
The rapid application development model is:
Signup and view all the answers
BCWS stands for:
BCWS stands for:
Signup and view all the answers
An _______________ is a user identifiable group of logically related data or control information maintained within the boundary of the application.
An _______________ is a user identifiable group of logically related data or control information maintained within the boundary of the application.
Signup and view all the answers
When more than one user interprets the same requirement in different ways, then we can say that the requirements are:
When more than one user interprets the same requirement in different ways, then we can say that the requirements are:
Signup and view all the answers
BCWP refers to:
BCWP refers to:
Signup and view all the answers
Which statement is correct?
Which statement is correct?
Signup and view all the answers
Testing and Software Quality Assurance activities are exactly similar activities with different names.
Testing and Software Quality Assurance activities are exactly similar activities with different names.
Signup and view all the answers
If an error related to requirements is identified in the testing phase, this error will be considered as an error in ___________ phase.
If an error related to requirements is identified in the testing phase, this error will be considered as an error in ___________ phase.
Signup and view all the answers
In context of moving range and individual control charts, UNPL stands for:
In context of moving range and individual control charts, UNPL stands for:
Signup and view all the answers
Usually the performance of the organization changes overnight.
Usually the performance of the organization changes overnight.
Signup and view all the answers
Effort required to test a program to ensure that it performs its intended function __________.
Effort required to test a program to ensure that it performs its intended function __________.
Signup and view all the answers
Following are the implicit requirement(s) of software?
Following are the implicit requirement(s) of software?
Signup and view all the answers
The extent to which a program can be expected to perform its intended function with required precision is called ______.
The extent to which a program can be expected to perform its intended function with required precision is called ______.
Signup and view all the answers
If an error related to requirements is identified in coding, this error will be considered as an error in ___________ phase.
If an error related to requirements is identified in coding, this error will be considered as an error in ___________ phase.
Signup and view all the answers
Review is a type of _________ that helps prevent bugs from moving to the next stage of software development.
Review is a type of _________ that helps prevent bugs from moving to the next stage of software development.
Signup and view all the answers
___________ help in finding the matrix to be stable or unstable.
___________ help in finding the matrix to be stable or unstable.
Signup and view all the answers
While developing the software, if the bug is caught then it is termed as:
While developing the software, if the bug is caught then it is termed as:
Signup and view all the answers
Defect Removal Efficiency can be increased by:
Defect Removal Efficiency can be increased by:
Signup and view all the answers
Following are the types of Formal Technical Reviews except:
Following are the types of Formal Technical Reviews except:
Signup and view all the answers
_________ give you better insight into the state of the process or product.
_________ give you better insight into the state of the process or product.
Signup and view all the answers
The review participants should not focus on:
The review participants should not focus on:
Signup and view all the answers
Determination of the .................... is a pre-requisite of all sorts of estimates, including resources, time, and budget.
Determination of the .................... is a pre-requisite of all sorts of estimates, including resources, time, and budget.
Signup and view all the answers
Review meeting is attended by the following except:
Review meeting is attended by the following except:
Signup and view all the answers
Following are effective guidelines for Review except:
Following are effective guidelines for Review except:
Signup and view all the answers
Which statement is true in the light of Pareto principle?
Which statement is true in the light of Pareto principle?
Signup and view all the answers
Reliability and Safety are the same concepts with respect to software quality.
Reliability and Safety are the same concepts with respect to software quality.
Signup and view all the answers
Function/Test matrix is a type of:
Function/Test matrix is a type of:
Signup and view all the answers
The prevention of defects being injected into the software can help in decreasing the cost of software.
The prevention of defects being injected into the software can help in decreasing the cost of software.
Signup and view all the answers
Poka Yoke is a Japanese term and it means:
Poka Yoke is a Japanese term and it means:
Signup and view all the answers
We need to employ some statistical techniques and plot the result ---------------. This is known as statistical control techniques.
We need to employ some statistical techniques and plot the result ---------------. This is known as statistical control techniques.
Signup and view all the answers
Poka Yoke is the name of a:
Poka Yoke is the name of a:
Signup and view all the answers
The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is ____.
The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is ____.
Signup and view all the answers
If a new version of a product is released by fixing the bugs in the previous release then it is termed as ____.
If a new version of a product is released by fixing the bugs in the previous release then it is termed as ____.
Signup and view all the answers
The Evolution Graph signifies the:
The Evolution Graph signifies the:
Signup and view all the answers
Which is not correct in the context of Poka-Yoke technique?
Which is not correct in the context of Poka-Yoke technique?
Signup and view all the answers
In the software development life cycle, soon the defect is detected will result in:
In the software development life cycle, soon the defect is detected will result in:
Signup and view all the answers
Metrics to assess the quality of the analysis models and the corresponding software specification were proposed________:
Metrics to assess the quality of the analysis models and the corresponding software specification were proposed________:
Signup and view all the answers
If Configuration item identification is not identified, it is possible to control changes and establish records.
If Configuration item identification is not identified, it is possible to control changes and establish records.
Signup and view all the answers
__________ testing verifies the correct implementation of internal units, structures, and relationships among them.
__________ testing verifies the correct implementation of internal units, structures, and relationships among them.
Signup and view all the answers
The template for organizing SRS given by the American Department of Defense and NASA should be used for:
The template for organizing SRS given by the American Department of Defense and NASA should be used for:
Signup and view all the answers
Incomplete Configuration identification documents may result in:
Incomplete Configuration identification documents may result in:
Signup and view all the answers
If you know the relationship between the use cases, classes, GUIs, test cases, and other artifacts then we can say that requirements are traceable in that project.
If you know the relationship between the use cases, classes, GUIs, test cases, and other artifacts then we can say that requirements are traceable in that project.
Signup and view all the answers
When an item is baselined, it becomes frozen; here frozen means that the item can be changed only by creating an old version.
When an item is baselined, it becomes frozen; here frozen means that the item can be changed only by creating an old version.
Signup and view all the answers
The most important objective of any engineering activity is to produce high quality product with limited resources and-----------------------
The most important objective of any engineering activity is to produce high quality product with limited resources and-----------------------
Signup and view all the answers
There may be one or more GUIs that are part of any good software but may not satisfy any requirement.
There may be one or more GUIs that are part of any good software but may not satisfy any requirement.
Signup and view all the answers
Extent to which access to software or data by unauthorized persons can be controlled and called __________.
Extent to which access to software or data by unauthorized persons can be controlled and called __________.
Signup and view all the answers
Following are the components of a Legacy system except:
Following are the components of a Legacy system except:
Signup and view all the answers
Object un-lock is done by:
Object un-lock is done by:
Signup and view all the answers
There are many reasons for which the legacy system becomes difficult to maintain EXCEPT:
There are many reasons for which the legacy system becomes difficult to maintain EXCEPT:
Signup and view all the answers
Requirements engineering is the basis of the contract between the developer and the client.
Requirements engineering is the basis of the contract between the developer and the client.
Signup and view all the answers
In ______________, new user and technology requirements can also be integrated into the re-engineering effort.
In ______________, new user and technology requirements can also be integrated into the re-engineering effort.
Signup and view all the answers
The amount of computing resources required by a program to perform its function is __________.
The amount of computing resources required by a program to perform its function is __________.
Signup and view all the answers
Large classes reduce:
Large classes reduce:
Signup and view all the answers
While assessing a legacy system for further decision, one should decide the following about the supplier:
While assessing a legacy system for further decision, one should decide the following about the supplier:
Signup and view all the answers
Level _________ is the lowest capability level of CMMI in Continuous representation.
Level _________ is the lowest capability level of CMMI in Continuous representation.
Signup and view all the answers
In ___________ representation of CMMI model, consideration is given to improve selected process areas.
In ___________ representation of CMMI model, consideration is given to improve selected process areas.
Signup and view all the answers
The application software is assessed based on the following factors except:
The application software is assessed based on the following factors except:
Signup and view all the answers
Empirical models are statistical models and are based upon historic data.
Empirical models are statistical models and are based upon historic data.
Signup and view all the answers
We modify the internal ______________ in code restructuring.
We modify the internal ______________ in code restructuring.
Signup and view all the answers
______ technique was initially developed for manufacturing processes in the 1920s by Walter Shewart.
______ technique was initially developed for manufacturing processes in the 1920s by Walter Shewart.
Signup and view all the answers
Error tracking provides a quantitative means of assessing the quality of the individuals implementing a software product.
Error tracking provides a quantitative means of assessing the quality of the individuals implementing a software product.
Signup and view all the answers
There are tools available in the market for project tracking. These tools can automatically track and manage the project replacing the need for any human being as a Project Manager.
There are tools available in the market for project tracking. These tools can automatically track and manage the project replacing the need for any human being as a Project Manager.
Signup and view all the answers
Two tools for computing critical path and project completion times from activity networks are:
Two tools for computing critical path and project completion times from activity networks are:
Signup and view all the answers
In order to measure the design quality, if the frequency of ripple defects is too large, then it means that there is tight coupling and hence the:
In order to measure the design quality, if the frequency of ripple defects is too large, then it means that there is tight coupling and hence the:
Signup and view all the answers
In _________________, there is both vertical and horizontal communication.
In _________________, there is both vertical and horizontal communication.
Signup and view all the answers
The only reason for an estimate to be unreliable is lack of experience related to the application on the part of the estimator.
The only reason for an estimate to be unreliable is lack of experience related to the application on the part of the estimator.
Signup and view all the answers
A consideration of software scope must include an evaluation of all external interfaces.
A consideration of software scope must include an evaluation of all external interfaces.
Signup and view all the answers
Software quality is conformance to _____________
Software quality is conformance to _____________
Signup and view all the answers
The boundary time defines the following parameter(s) for a project:
The boundary time defines the following parameter(s) for a project:
Signup and view all the answers
Quality is the compliance of software to implicit and explicit quality factors. Identify the explicit requirement from the following:
Quality is the compliance of software to implicit and explicit quality factors. Identify the explicit requirement from the following:
Signup and view all the answers
Following are the benefits of conducting review except:
Following are the benefits of conducting review except:
Signup and view all the answers
Mean Time To Repair (MTTR) is the:
Mean Time To Repair (MTTR) is the:
Signup and view all the answers
In order to use the PERT and CPM, which one of the following is not required?
In order to use the PERT and CPM, which one of the following is not required?
Signup and view all the answers
SCM is the requirement of the ________ level(s) of CMM.
SCM is the requirement of the ________ level(s) of CMM.
Signup and view all the answers
We can include the following items during configuration item identification:
We can include the following items during configuration item identification:
Signup and view all the answers
CPM stands for:
CPM stands for:
Signup and view all the answers
Software re-factoring is a process in which:
Software re-factoring is a process in which:
Signup and view all the answers
The Change Control Authority does not have the rights to permit to bring the change in the software.
The Change Control Authority does not have the rights to permit to bring the change in the software.
Signup and view all the answers
Check in and check out is actually one and the same process with two different names.
Check in and check out is actually one and the same process with two different names.
Signup and view all the answers
There could be multiple GUIs to satisfy one requirement.
There could be multiple GUIs to satisfy one requirement.
Signup and view all the answers
_____________ is the process of design recovery. At this stage, the documentation of the overall functionality is created.
_____________ is the process of design recovery. At this stage, the documentation of the overall functionality is created.
Signup and view all the answers
In code restructuring, we do not change the functionality of the code.
In code restructuring, we do not change the functionality of the code.
Signup and view all the answers
Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.
Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.
Signup and view all the answers
A _____________ process is ‘a set of logically related tasks performed to achieve a defined business outcome.’
A _____________ process is ‘a set of logically related tasks performed to achieve a defined business outcome.’
Signup and view all the answers
Software Refactoring is a process in which:
Software Refactoring is a process in which:
Signup and view all the answers
The formal methods model of software development makes use of mathematical methods to:
The formal methods model of software development makes use of mathematical methods to:
Signup and view all the answers
Which one of the following describes the data and control to be processed, function, performance, constraints, interfaces, and reliability?
Which one of the following describes the data and control to be processed, function, performance, constraints, interfaces, and reliability?
Signup and view all the answers
A significant SQA plan, among others, should include:
A significant SQA plan, among others, should include:
Signup and view all the answers
The software plan is not a static document; it is frequently adjusted to make the project appear on track to meet all deadlines and quality targets.
The software plan is not a static document; it is frequently adjusted to make the project appear on track to meet all deadlines and quality targets.
Signup and view all the answers
The projects are classified into the following categories except:
The projects are classified into the following categories except:
Signup and view all the answers
The processes at ________ is focused on continually improving process performance through both incremental and innovative technological changes/improvements.
The processes at ________ is focused on continually improving process performance through both incremental and innovative technological changes/improvements.
Signup and view all the answers
QA is an activity performed ___________ of the software development.
QA is an activity performed ___________ of the software development.
Signup and view all the answers
_____________ the ability to encourage people to create and feel creative.
_____________ the ability to encourage people to create and feel creative.
Signup and view all the answers
Caper Jones divided software related activities into _____________ different categories.
Caper Jones divided software related activities into _____________ different categories.
Signup and view all the answers
By default every organization is working at _______________.
By default every organization is working at _______________.
Signup and view all the answers
Software Engineering is the set of __________and ___________ to develop software.
Software Engineering is the set of __________and ___________ to develop software.
Signup and view all the answers
Software has very close relationship with ___________.
Software has very close relationship with ___________.
Signup and view all the answers
COCOMO is the classic LOC cost-estimation formula and used thousand delivered source instructions (KDSI) as his _________ of size.
COCOMO is the classic LOC cost-estimation formula and used thousand delivered source instructions (KDSI) as his _________ of size.
Signup and view all the answers
_______________ deadline is one of the reasons of project failure.
_______________ deadline is one of the reasons of project failure.
Signup and view all the answers
___________ model is very sensitive to risk.
___________ model is very sensitive to risk.
Signup and view all the answers
__________ is the ability to encourage technical people to produce to their best.
__________ is the ability to encourage technical people to produce to their best.
Signup and view all the answers
Caper Jones is a famous researcher in the field of ___________ who made a company named Software Productivity Research.
Caper Jones is a famous researcher in the field of ___________ who made a company named Software Productivity Research.
Signup and view all the answers
Reel has defined _________ steps process to improve the chances of success.
Reel has defined _________ steps process to improve the chances of success.
Signup and view all the answers
In ________ model user feedback is received very quickly because product is delivered in small versions.
In ________ model user feedback is received very quickly because product is delivered in small versions.
Signup and view all the answers
_____________ approach is better for team spirits point of view.
_____________ approach is better for team spirits point of view.
Signup and view all the answers
Construction activities are directly related to the _____________ of the software.
Construction activities are directly related to the _____________ of the software.
Signup and view all the answers
Continuous process improvement is enabled by __________ feedback from the __________.
Continuous process improvement is enabled by __________ feedback from the __________.
Signup and view all the answers
The major activities related to software construction are whose options include:
The major activities related to software construction are whose options include:
Signup and view all the answers
If requirements are uncertain, ______ will be a suitable.
If requirements are uncertain, ______ will be a suitable.
Signup and view all the answers
Capability maturity model (CMM) is used to judge the __________ model of an organization.
Capability maturity model (CMM) is used to judge the __________ model of an organization.
Signup and view all the answers
After passing through all the stages of software development when we deploy the new system at the user side that stage is called ______.
After passing through all the stages of software development when we deploy the new system at the user side that stage is called ______.
Signup and view all the answers
Defects per function point are a ___ metric.
Defects per function point are a ___ metric.
Signup and view all the answers
In Capability Maturity Model (CMM), ___________ performs optimization.
In Capability Maturity Model (CMM), ___________ performs optimization.
Signup and view all the answers
If a software developer is going to develop software for a nuclear reactor which factor(s) will be more important?
If a software developer is going to develop software for a nuclear reactor which factor(s) will be more important?
Signup and view all the answers
Capability Maturity Model (CMM) has __________ levels.
Capability Maturity Model (CMM) has __________ levels.
Signup and view all the answers
Fred Brook is a famous software engineer who wrote a great book related to software engineering named _____________.
Fred Brook is a famous software engineer who wrote a great book related to software engineering named _____________.
Signup and view all the answers
W5HH Principle consists of seven ___________.
W5HH Principle consists of seven ___________.
Signup and view all the answers
In Rational Unified Process (RUP) horizontal dimension represents the ___________ aspect of the process.
In Rational Unified Process (RUP) horizontal dimension represents the ___________ aspect of the process.
Signup and view all the answers
There are two very different approaches to cost estimation. The older approach is called LOC estimation, since it is ………….. on initially estimating the number of lines of code that will need to be developed for the project.
There are two very different approaches to cost estimation. The older approach is called LOC estimation, since it is ………….. on initially estimating the number of lines of code that will need to be developed for the project.
Signup and view all the answers
Task coordinators are appointed for a short period of time in ______________ organization team structure.
Task coordinators are appointed for a short period of time in ______________ organization team structure.
Signup and view all the answers
_________ model is opposite to waterfall model.
_________ model is opposite to waterfall model.
Signup and view all the answers
MOI model of leadership was developed by ______.
MOI model of leadership was developed by ______.
Signup and view all the answers
Each process defines certain deliverables known as the _________.
Each process defines certain deliverables known as the _________.
Signup and view all the answers
_____________ procedures include QA activities, design and code review, and status meetings.
_____________ procedures include QA activities, design and code review, and status meetings.
Signup and view all the answers
Miscommunication among project staff is one of the reasons of the failure of the software project.
Miscommunication among project staff is one of the reasons of the failure of the software project.
Signup and view all the answers
According to DeMarco a good team leader should have only _________ characteristics.
According to DeMarco a good team leader should have only _________ characteristics.
Signup and view all the answers
Synchronize and Stabilize model is adopted by __________________.
Synchronize and Stabilize model is adopted by __________________.
Signup and view all the answers
Extreme programming model is very effective when requirements are very ________ and the project scope is very ___________.
Extreme programming model is very effective when requirements are very ________ and the project scope is very ___________.
Signup and view all the answers
_______________ model is a haphazard type of software development activity.
_______________ model is a haphazard type of software development activity.
Signup and view all the answers
Waterfall model is a document driven model.
Waterfall model is a document driven model.
Signup and view all the answers
___________ paradigm structures a team loosely and depends on individual initiative of the team members.
___________ paradigm structures a team loosely and depends on individual initiative of the team members.
Signup and view all the answers
Spiral model has _____________ dimensions.
Spiral model has _____________ dimensions.
Signup and view all the answers
The ___________ model of software development is a good approach when core product is required quickly.
The ___________ model of software development is a good approach when core product is required quickly.
Signup and view all the answers
In ____________________ team organization, there is no permanent leader rather there are task coordinators.
In ____________________ team organization, there is no permanent leader rather there are task coordinators.
Signup and view all the answers
___________________ is an Object Oriented model.
___________________ is an Object Oriented model.
Signup and view all the answers
_______________ model is developed keeping in mind the element of risk in the development of software.
_______________ model is developed keeping in mind the element of risk in the development of software.
Signup and view all the answers
Vision phase in a software process focuses on __________.
Vision phase in a software process focuses on __________.
Signup and view all the answers
Rapid application development is another form of _________________.
Rapid application development is another form of _________________.
Signup and view all the answers
_____________________ phase in a software process focuses on change.
_____________________ phase in a software process focuses on change.
Signup and view all the answers
________________ model is adopted by Microsoft.
________________ model is adopted by Microsoft.
Signup and view all the answers
____________________ teams generate more and better solutions than individuals and are most useful for complex problems.
____________________ teams generate more and better solutions than individuals and are most useful for complex problems.
Signup and view all the answers
The ___________ model of software development is a good approach when core product is required quickly.
The ___________ model of software development is a good approach when core product is required quickly.
Signup and view all the answers
The______________ model of software development is a useful approach when a customer cannot define requirements clearly.
The______________ model of software development is a useful approach when a customer cannot define requirements clearly.
Signup and view all the answers
______________ model has a major drawback in that the delivered product may not fulfill the customer's requirements.
______________ model has a major drawback in that the delivered product may not fulfill the customer's requirements.
Signup and view all the answers
MOI model of leadership stands for?
MOI model of leadership stands for?
Signup and view all the answers
____________ activity is performed throughout software production.
____________ activity is performed throughout software production.
Signup and view all the answers
In ________________ model the product is developed without any proper design and specifications.
In ________________ model the product is developed without any proper design and specifications.
Signup and view all the answers
Software project management focuses on the four P’s: These are?
Software project management focuses on the four P’s: These are?
Signup and view all the answers
The _______________ dimension in rational unified process model represents the dynamic aspect of the process.
The _______________ dimension in rational unified process model represents the dynamic aspect of the process.
Signup and view all the answers
_____________ dimension of Spiral model represents the cumulative cost to date.
_____________ dimension of Spiral model represents the cumulative cost to date.
Signup and view all the answers
The important feature of extreme programming is the concept of __________________.
The important feature of extreme programming is the concept of __________________.
Signup and view all the answers
‘A method requires lot of information from some other class’ is a symptom of _____________ bad smell.
‘A method requires lot of information from some other class’ is a symptom of _____________ bad smell.
Signup and view all the answers
In software development ____________________ is performed at the end of each phase.
In software development ____________________ is performed at the end of each phase.
Signup and view all the answers
_____________ integrates system and software disciplines into a single process improvement framework for introducing new disciplines as needs arise.
_____________ integrates system and software disciplines into a single process improvement framework for introducing new disciplines as needs arise.
Signup and view all the answers
FAST is the abbreviation of?
FAST is the abbreviation of?
Signup and view all the answers
Unrealistic deadline is NOT one of the reasons of project failure.
Unrealistic deadline is NOT one of the reasons of project failure.
Signup and view all the answers
Software _____ relates individual software measures to provide a normalized view.
Software _____ relates individual software measures to provide a normalized view.
Signup and view all the answers
In measuring Software Process Quality by using control charts, if the gap between the defects reported and defects fixed is increasing, then it means?
In measuring Software Process Quality by using control charts, if the gap between the defects reported and defects fixed is increasing, then it means?
Signup and view all the answers
Quality can be measured if we measure the _____ of the product.
Quality can be measured if we measure the _____ of the product.
Signup and view all the answers
Although there are many different models developed by different researchers for estimation, all of them share which one of the following basic structure?
Although there are many different models developed by different researchers for estimation, all of them share which one of the following basic structure?
Signup and view all the answers
In case some software, it is extremely easy to operate with an intuitive interface conforming to most excellent GUI practices of the industry. It needs very little training ----------------.
In case some software, it is extremely easy to operate with an intuitive interface conforming to most excellent GUI practices of the industry. It needs very little training ----------------.
Signup and view all the answers
A _____________is a user recognizable subgroup of data elements within an ILF or EIF.
A _____________is a user recognizable subgroup of data elements within an ILF or EIF.
Signup and view all the answers
Which one of the following is NOT a useful indicator of software quality?
Which one of the following is NOT a useful indicator of software quality?
Signup and view all the answers
This chart is then used to develop the individual control chart is called statistical control techniques.
This chart is then used to develop the individual control chart is called statistical control techniques.
Signup and view all the answers
The software reengineering process model includes restructuring activities for which of the following work items?
The software reengineering process model includes restructuring activities for which of the following work items?
Signup and view all the answers
Any delay in _____ path makes the whole project delayed.
Any delay in _____ path makes the whole project delayed.
Signup and view all the answers
The responsibilities of a Project Manager does not include?
The responsibilities of a Project Manager does not include?
Signup and view all the answers
One graphical technique for determining whether a process exhibits out-of-control change behavior is a.
One graphical technique for determining whether a process exhibits out-of-control change behavior is a.
Signup and view all the answers
Defect per unit function point is a.
Defect per unit function point is a.
Signup and view all the answers
_________ subgroups are those that the user has the option of using one or none of the subgroups during an elementary process.
_________ subgroups are those that the user has the option of using one or none of the subgroups during an elementary process.
Signup and view all the answers
Chart that is used to develop the individual control chart is called statistical control techniques.
Chart that is used to develop the individual control chart is called statistical control techniques.
Signup and view all the answers
Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes are maintained during times of stress and this is done at CMM level ---------.
Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes are maintained during times of stress and this is done at CMM level ---------.
Signup and view all the answers
Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management Plan?
Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management Plan?
Signup and view all the answers
____________ is the set of tools and techniques used to develop software?
____________ is the set of tools and techniques used to develop software?
Signup and view all the answers
The characteristics of well developed software are__________.
The characteristics of well developed software are__________.
Signup and view all the answers
Which one of the following principles/techniques is NOT software projects scheduling?
Which one of the following principles/techniques is NOT software projects scheduling?
Signup and view all the answers
SE is a Balancing act.
SE is a Balancing act.
Signup and view all the answers
With a complex class you have to move data and methods around in small pieces to avoid errors, it seems slow but it is the __________ because you avoid debugging.
With a complex class you have to move data and methods around in small pieces to avoid errors, it seems slow but it is the __________ because you avoid debugging.
Signup and view all the answers
The purpose of earned value analysis is to?
The purpose of earned value analysis is to?
Signup and view all the answers
________ is the process of balancing among different characteristics of software?
________ is the process of balancing among different characteristics of software?
Signup and view all the answers
______ is directly related to the development of the software.
______ is directly related to the development of the software.
Signup and view all the answers
The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an effective strategy must consider:
The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an effective strategy must consider:
Signup and view all the answers
The component-based development model is?
The component-based development model is?
Signup and view all the answers
___________ basic project management processes established to track cost, schedule and functionality.
___________ basic project management processes established to track cost, schedule and functionality.
Signup and view all the answers
Which is used to determine the most viable option for cost estimation when the information in the ‘Decision tree’ is complete?
Which is used to determine the most viable option for cost estimation when the information in the ‘Decision tree’ is complete?
Signup and view all the answers
Change control is not necessary if a development group is making use of an automated project database tool.
Change control is not necessary if a development group is making use of an automated project database tool.
Signup and view all the answers
Which one of the following is the 4th level of the SEI Capability Maturity Model?
Which one of the following is the 4th level of the SEI Capability Maturity Model?
Signup and view all the answers
After building the Decision Tree, the following formula is used to find the expected cost for an option. Choose the correct formula:
After building the Decision Tree, the following formula is used to find the expected cost for an option. Choose the correct formula:
Signup and view all the answers
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?
Signup and view all the answers
Doubling the size of your software project team is guaranteed to cut project completion time in half.
Doubling the size of your software project team is guaranteed to cut project completion time in half.
Signup and view all the answers
Every task or group of tasks should be associated with a project ------------.
Every task or group of tasks should be associated with a project ------------.
Signup and view all the answers
Every task should be assigned to a specific team ------------.
Every task should be assigned to a specific team ------------.
Signup and view all the answers
Which one is not the Software project planning activity carried out by the project manager for estimation?
Which one is not the Software project planning activity carried out by the project manager for estimation?
Signup and view all the answers
Configuration Item identification involves:
Configuration Item identification involves:
Signup and view all the answers
Incomplete Configuration identification documents may result in:
Incomplete Configuration identification documents may result in:
Signup and view all the answers
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the?
Signup and view all the answers
Proactive risk management philosophy is also sometimes termed as Indiana Jones school of risk management.
Proactive risk management philosophy is also sometimes termed as Indiana Jones school of risk management.
Signup and view all the answers
Software Availability can be calculated by the following equation:
Software Availability can be calculated by the following equation:
Signup and view all the answers
Phase Index can be calculated by the help of the following formula, where Ei – the total number of errors uncovered during the ith step in the SE process?
Phase Index can be calculated by the help of the following formula, where Ei – the total number of errors uncovered during the ith step in the SE process?
Signup and view all the answers
The higher the Error Index, the higher will be the Defect Removal Efficiency.
The higher the Error Index, the higher will be the Defect Removal Efficiency.
Signup and view all the answers
The goal of quality assurance is to provide management with the data needed to determine which software engineers are producing the most defects.
The goal of quality assurance is to provide management with the data needed to determine which software engineers are producing the most defects.
Signup and view all the answers
From the following listed software development models, which one is an object-oriented model?
From the following listed software development models, which one is an object-oriented model?
Signup and view all the answers
The prototyping model of software development is?
The prototyping model of software development is?
Signup and view all the answers
Which one of the following does not belong to a strategy for dealing with risk?
Which one of the following does not belong to a strategy for dealing with risk?
Signup and view all the answers
A _______ entity is one which has any ----------- in the problem domain without some other entity.
A _______ entity is one which has any ----------- in the problem domain without some other entity.
Signup and view all the answers
ILF is a --------------- identifiable group of logically controlled information ------------- the boundary of the application.
ILF is a --------------- identifiable group of logically controlled information ------------- the boundary of the application.
Signup and view all the answers
Several entities are always created -------------- and deleted together then this is a strong indication that they should be grouped into ---------- logical file/files.
Several entities are always created -------------- and deleted together then this is a strong indication that they should be grouped into ---------- logical file/files.
Signup and view all the answers
Which of these software characteristics are used to determine the scope of a software project?
Which of these software characteristics are used to determine the scope of a software project?
Signup and view all the answers
In _________________ a team is structured along a traditional hierarchy of authority.
In _________________ a team is structured along a traditional hierarchy of authority.
Signup and view all the answers
Integrity means that the software should?
Integrity means that the software should?
Signup and view all the answers
Ambiguous requirements can be measured quantitatively.
Ambiguous requirements can be measured quantitatively.
Signup and view all the answers
The Spiral model of software development is of iterative nature.
The Spiral model of software development is of iterative nature.
Signup and view all the answers
While performing risk analysis, the impact of risk can not be measured quantitatively.
While performing risk analysis, the impact of risk can not be measured quantitatively.
Signup and view all the answers
_______ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
_______ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.
Signup and view all the answers
For software the total numbers of requirements are equal to _______.
For software the total numbers of requirements are equal to _______.
Signup and view all the answers
The _____________ model is used to overcome issues related to understanding and capturing of user requirements.
The _____________ model is used to overcome issues related to understanding and capturing of user requirements.
Signup and view all the answers
___________ is not part of the software development loop.
___________ is not part of the software development loop.
Signup and view all the answers
The level 1 of CMM is known as?
The level 1 of CMM is known as?
Signup and view all the answers
According to DeMarco a good Project Manager?
According to DeMarco a good Project Manager?
Signup and view all the answers
The best project team organizational model to use when tackling extremely difficult problems is the?
The best project team organizational model to use when tackling extremely difficult problems is the?
Signup and view all the answers
Which factor is the least important when choosing the organizational structure for a software team?
Which factor is the least important when choosing the organizational structure for a software team?
Signup and view all the answers
Product and process decomposition occurs simultaneously as the project plan evolves.
Product and process decomposition occurs simultaneously as the project plan evolves.
Signup and view all the answers
Measuring the quality and performance of software through any means is much better than just making a guess about it.
Measuring the quality and performance of software through any means is much better than just making a guess about it.
Signup and view all the answers
__________________is data that influences an elementary process of the application being counted.
__________________is data that influences an elementary process of the application being counted.
Signup and view all the answers
An entity which defines the many-to-many relationship between two or more entities is called?
An entity which defines the many-to-many relationship between two or more entities is called?
Signup and view all the answers
Software risk impact assessment should focus on consequences affecting?
Software risk impact assessment should focus on consequences affecting?
Signup and view all the answers
The number of people required for a software project is determined?
The number of people required for a software project is determined?
Signup and view all the answers
Defect Removal Efficiency (DRE) can be measured by where E is Errors found at delivery and D is error found after delivery (typically within the first year of operation)?
Defect Removal Efficiency (DRE) can be measured by where E is Errors found at delivery and D is error found after delivery (typically within the first year of operation)?
Signup and view all the answers
In function point analysis technique EO stands for?
In function point analysis technique EO stands for?
Signup and view all the answers
In ____________a team is structured loosely and depends on individual initiative of the team members.
In ____________a team is structured loosely and depends on individual initiative of the team members.
Signup and view all the answers
______________ is the first stage of waterfall lifecycle model?
______________ is the first stage of waterfall lifecycle model?
Signup and view all the answers
__________ is not the management part of software development activities?
__________ is not the management part of software development activities?
Signup and view all the answers
Software process and product quality are controlled at ________.
Software process and product quality are controlled at ________.
Signup and view all the answers
Study Notes
Software Engineering II - Key Concepts
-
Law of Diminishing Returns: A principle stating that beyond a certain performance level, continued effort may lead to decreased effectiveness.
-
Software Development Activities: Requirement gathering is key, while testing, configuration management, and coding are essential but not part of the construction phase.
-
CMM Levels: Basic project management processes are established at the Repeatable level (Level 2) of the Capability Maturity Model (CMM).
-
Project Failure Factors: Projects typically fail due to unclear requirements or changing customer needs, rather than the lack of CMM certification.
-
Team Organization: Democratic decentralized (DD) teams operate with no permanent leader, and decisions are made through group consensus.
-
Software Measurement: Measuring software processes helps in improvement and characterization, but not necessarily for pricing.
-
Integrity Measurement Formula: Integrity is calculated using the formula: integrity = ∑[(1-threat) x (1-security)].
-
Rapid Application Development: This model is a high-speed adaptation useful for projects with unclear requirements.
-
Internal Logical File (ILF): A user identifiable group of logically related data maintained within an application's boundary.
-
Ambiguous Requirements: When users interpret the same requirement differently, it indicates ambiguity.
-
Testing vs. QA: Testing and Software Quality Assurance are distinct; their activities are not identical.
-
Error Phase Identification: An error identified during testing is considered a requirement phase error.
-
Implicit Requirements: Key implicit requirements for software include efficiency, ease of use, and maintainability.
-
Bug Identification: Bugs caught during software development are termed defects.
-
Formal Technical Reviews: Types include inspections and walkthroughs, but not Joint Application Development (JAD).
-
Focus During Reviews: Review participants should prioritize the work product and not personal weaknesses of the developer.
-
Review Meeting Attendance: Review meetings generally do not include the CEO.
-
Pareto Principle: States that 80% of defects arise from 20% of mistakes, highlighting the need for focused corrections.
-
Reliability vs. Safety: In software quality, these concepts are often misunderstood as the same but have distinct definitions.
-
Defect Prevention: Proactively preventing defects can significantly decrease software costs.
-
Poka Yoke: A Japanese quality assurance technique aimed at preventing errors.
-
Product Update vs. Upgrade: A product update involves fixing bugs in previous versions.
-
Evolution Graph: Signifies version relationships and facilitates change control activities.
-
Defect Detection Cost: Detecting defects early in the software development lifecycle significantly reduces overall costs.
-
Testing Types: White box testing verifies correct implementation of internal units.
-
SRS Template: The American DoD and NASA's SRS template is best suited for large and complex projects.
-
Traceable Requirements: Requirements are considered traceable if relationships among use cases, classes, GUIs, and test cases are documented.
-
Legacy System Components: Include business processes, system hardware, and application software, but not marketing.
-
Legacy System Maintenance Issues: Difficulties arise from obsolete languages, lack of documentation, and inconsistency from different development teams.
-
Re-engineering Activities: Forward re-engineering allows new requirements and technologies to be integrated during re-engineering.
-
Cohesion vs. Coupling: Large classes can reduce cohesion, impacting software maintainability.
-
CMMI Capability Levels: Level 0 represents the lowest capability level, whereas Level 5 focuses on optimizing performance through technological improvements.
-
Empirical Models: Base on historical data for statistical analysis in project management and estimation.
-
Error Tracking: Provides a quantitative means to assess software quality and the individuals involved.
-
Project Tracking Tools: Available tools do not completely eliminate the need for human project managers.
-
Critical Path Method (CPM): Used alongside PERT for calculating project timelines and task dependencies.
-
Design Quality Measurement: Frequent ripple defects indicate tight coupling and poor maintainability in software design.
-
Controlled Decentralized Communication: Involves both vertical and horizontal communication in team dynamics.
-
Quality Requirements: Explicit requirements include maintainability and compliance with standards.
These notes encapsulate key principles of Software Engineering II, highlighting essential processes, methodologies, and characteristics relevant to effective software development and project management.### Risk Categories
- Three main categories of risks: project risks, technical risks, business risks.
- Importance of identifying risks for effective project management.
MTTC Abbreviation
- MTTC stands for mean time to change, relevant in software development.
Project Data Collection
- Data for project matrices should be collected from similar domains to ensure accuracy and relevance.
Project Scheduling Techniques
- Program Evaluation and Review Technique (PERT) is a crucial method for preparing project schedules based on defined task networks.
Historical Data Management
- Historical data should include diverse project inputs, but not limited to only scientific projects.
Quality Costs
- Quality costs can be categorized into prevention, appraisal, and failure costs.
Software Defects
- A defect is a bug reported by the client after software delivery; this distinguishes it from an error or fault.
Formal Technical Review (FTR)
- FTR stands for Formal Technical Review, an important aspect of software quality assurance.
Software Quality Assurance (SQA)
- SQA involves activities like review, testing, project planning, and inspection as umbrella activities.
Software Configuration Management
- Used for managing changes in the software lifecycle, ensuring consistency and control.
Error Tracking
- Effective error tracking aids in estimating project progress and requires historical data for accuracy.
Schedule Performance Index (SPI)
- SPI is calculated as the ratio of BCWP (Budgeted Cost of Work Performed) to BCWS (Budgeted Cost of Work Scheduled).
Budgeted Cost of Work Scheduled (BCWS)
- BCWS represents the effort in person-days required for a specific task.
Defect Removal Efficiency (DRE)
- DRE is defined as E / (E + D), where E is errors found before shipment and D is errors found during operation.
Quality Assurance Role
- Quality assurance provides vital data regarding product quality, error status, and defect reports.
Project Progress Calculation
- Progress can be calculated by summing all BCWS until a given point for all tasks.
Reverse Engineering
- Refers to the process of rediscovering software design, crucial in improving or updating existing systems.
Output Control Input (OCI)
- OCI is a critical component addressing outputs in processes or software engineering.
Prototyping in Business Process Redesign
- A redesigned business process should be prototyped before full integration.
Critical Path
- The critical path defines the sequence of tasks that determines the overall project duration.
Budget at Completion (BAC)
- BAC refers to the total budgeted cost estimated for project completion.
Milestones in Project Management
- Milestones represent defined targets crucial for project tracking and success measurement.
Gantt Chart
- The timeline chart, commonly known as a Gantt chart, is used for project scheduling and visualization.
Task Refinement Benefits
- Refining tasks enhances accuracy in estimation, scope conclusion, and project scheduling.
Complex Systems and Code Maintenance
- More complex systems typically lead to increased code requirements, resulting in higher maintenance efforts.
Concept Development
- The initial task in concept development is to define the concept's scope.
Stable vs. Unstable Process
- In statistical control techniques, an increasing gap between defects reported and fixed indicates an unstable process.
Metrics Importance
- Metrics play a vital role in gaining insights into the process or product's status, facilitating improvements.
Configuration Management
- Effective configuration management is essential for controlling changes and maintaining records in software systems.
Psychoanalytic Approval Techniques
- Poka Yoke is a Japanese term meaning "mistake proofing," employed in quality assurance processes.
Software Process Quality Measurement
- Control charts are utilized in measuring software process quality by monitoring defect rates.
Function Point Analysis
- Function point analysis helps in estimating software size, beneficial for both clients and developers.
CMMI Framework
- The Capability Maturity Model Integration (CMMI) integrates system and software disciplines into a unified improvement framework.
Project Management Responsibilities
- A project manager's key responsibilities include scheduling, resource allocation, and task monitoring.
Statistical Techniques in Software Quality
- Employing statistical methods helps plot results, crucial for effective software process control.
Legacy Systems Challenges
- Migrating legacy systems is challenging primarily due to a lack of proper documentation.
Development Team Guidelines
- Effective reviews in development should focus on the product rather than individuals, fostering a constructive environment.
Error Management and Control Techniques
- Error tracking and management are paramount in mitigating risks throughout the software development life cycle.
Major Project Management Principles
- Recognizing dependencies and project constraints is fundamental for successful software project management.
Risk Management Essentials
- Risk mitigation, monitoring, and management plans are integral to identifying and addressing project uncertainties.
Software Quality and Metrics
- Software quality is assessed based on defined metrics, which provide insights into the development process.
Importance of Configuration Item Identification
- Proper identification of configuration items is essential for controlling changes in software projects.### Software Project Management
- Interdependency identification, time allocation, effort validation, function point analysis, and milestone definition are crucial elements in project planning.
- Earned value analysis quantifies software project progress, assessing productivity quantitatively.
- RMMM (Risk Management and Mitigation Management) plans are essential for addressing risk through avoidance, monitoring, and contingency strategies.
Software Development Models
- The component-based development model relies on object technologies and supports the development of reusable components.
- Rapid Prototyping helps in capturing user requirements effectively by providing quick feedback loops.
- The Spiral model is sensitive to risks and facilitates iterative development.
Risk Management
- Performance risks assess how well a product meets requirements and suitability for use.
- Proactive risk management is sometimes referred to as the "Indiana Jones school of risk management."
- Effective risk strategies include avoidance, monitoring, and contingency planning.
Cost Estimation and Analysis
- The Decision Tree is utilized for cost estimation by determining expected costs via a formula involving path probabilities and estimated costs.
- Defect Removal Efficiency (DRE) measures quality assurance effectiveness before a product's release.
Quality Assurance and Metrics
- Quality assurance aims to furnish management with information on defect rates per software engineer.
- Phase Index and Error Index are metrics used to evaluate software quality at various stages of development.
- Defects per function points offer insights into software efficiency measured through specific metrics.
Team Organization and Structure
- Effective project teams may adopt a democratic decentralized model for tackling complex challenges.
- Communication and organization structures play critical roles in software project success.
- Team member assignments should align with specific roles to facilitate accountability and efficiency.
Capability Maturity Model (CMM)
- CMM consists of five maturity levels, with level 5 focusing on optimization processes.
- Initial levels are crucial for assessing an organization's capabilities and performance in software development practices.
Software Characteristics and Features
- Software characteristics influencing project scope include context, function, and communications requirements.
- Integrity in software ensures defense against malicious attacks and enhances usability.
Development Approaches
- Controlling defect reduction and engaging team participation are key to successful project development.
- Incremental development is appropriate when requirements are uncertain, offering flexibility through iterative releases.
- Construct activities relate directly to the fundamental aspects of software development, including installation and debugging.
Conclusion
- Understanding these concepts aids in effective management and execution of software engineering projects, ensuring quality delivery and enhanced productivity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with this quiz on Software Engineering II, specifically designed for the CS605 course. The quiz features multiple-choice questions derived from final term papers from Spring 2011. Challenge yourself and see how well you understand the key concepts of software engineering!