A24. What is the most difficult and critical stage of the requirement engineering process? A. Feasibility...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A24. What is the most difficult and critical stage of the requirement engineering process? A. Feasibility study B. Requirements elicitation and analysis C. Requirements specification D. Requirements validation. .. Examiner: Robert Adjetey Sowah, PhD A25. Repairing coding errors is A. More expensive than B. More cheaper than C. The same as repairing requirement errors. D. 50 percent more than A26. The process of converting a system specification into an executable system is known as A. programming B. design C. implementation D. testing A27. Software designers create they produce. design version(s) for a every software system В. Two A28. Interface design can be associated with A.One C. Four D. Several A.GUI B.The system C.Subsystems D.Architecture A29. The essence of debugging is A.Location of errors B.Repairing errors C. Testing the D.Locating and correction of errors. A30. Context models are used to define the system of the system. A.Behavior B.Environment C. Architecture D.State A31. Which of the following is/are used in modeling the behavior of a system? I. State machine model II.Data-flow model III. Architectural model A.I only B.II only C.I and II D.I, II and III A32. Which model is characterized by system states and events which cause transitions from one state to another? A. Data-flow model B. State machine model C. Architectural model D. Process model A33. Different types of users, using the system refers to the principle of A. User familiarity B. User diversity C. Consistency D. User guidance A34. The process of ensuring that the software meets the customer's expectation is.. A. Testing B. Verification C. Validation D. User requirements. A35. The process of checking that the software conforms to its specification is referred to as C. Validation A. Testing specification B. Verification D. Software requirements A36. What activity is needed to find inconsistencies between a program and its specification? A. Defect testing B. Debugging C. Statistical testing D. None of the above A37. What name is given to the testing done by the customer? A. Unit testing B. Module testing C. Sub-system testing D. Acceptance testing A38. Which of the following is usually the responsibility of programmers? Unit testing Module testing I. II. Sub-system testing В. II only III. A. I only A39. Software that is used'to support software process activities is referred to as. C. I and II D. I, II and III A. CASE ES OF E GINEENNG LICRARY B. CAD С. CADE D. CAES Examiner: Robert Adjetey Sowah, PhD Page 6 of 10 UNIVELSITY OF GHAN SCIENCES OF ENC LIC. UN A40. Which riśk can be identified in the following statement “The underlying technology on which the system is built is superseded by new technology". A. Hardware unavailability B. Requirement change C. Technology change D. Business risk A41. The nature of software causes problems for management. A. tangible B. intangible C. complex D. testing A42. What ' risk type can be identified in the following statement "There will be a large number of changes to the requirements than anticipated". A. Requirement change B. product and project C. Product D. Buşiness A43. The process of identifying activities, milestones and deliverables produced by a project is referred to as A. Proposal writing B. Project planning C. Project monitoring and review D. Personnel selection'and reviews A44. relationship is between a client and a supplier. A. an association B. an aggregatiơn C. a dependency D. a schedule algorithms A45. In principle, the functional requirements specification of a system.should be both. A. complete and efficient B. consistent C. complete and consistent D. efficient A46. In an activity network diagram, the longest path is referred to as A. critical length B. critical deadline C. critical path D. critical milestone. A47. It is general knowledge that inspections and reviews are more effective in defects than testing. discovering A. True B. False A48. There is a regular progress report in evolutionary development. A. True B. False A49. When using color in user interface design it is important to use color change to a significant event. illustrate A. True B. False A50. Program testing is the most widely used verification and validation technique. A. True B. False A24. What is the most difficult and critical stage of the requirement engineering process? A. Feasibility study B. Requirements elicitation and analysis C. Requirements specification D. Requirements validation. .. Examiner: Robert Adjetey Sowah, PhD A25. Repairing coding errors is A. More expensive than B. More cheaper than C. The same as repairing requirement errors. D. 50 percent more than A26. The process of converting a system specification into an executable system is known as A. programming B. design C. implementation D. testing A27. Software designers create they produce. design version(s) for a every software system В. Two A28. Interface design can be associated with A.One C. Four D. Several A.GUI B.The system C.Subsystems D.Architecture A29. The essence of debugging is A.Location of errors B.Repairing errors C. Testing the D.Locating and correction of errors. A30. Context models are used to define the system of the system. A.Behavior B.Environment C. Architecture D.State A31. Which of the following is/are used in modeling the behavior of a system? I. State machine model II.Data-flow model III. Architectural model A.I only B.II only C.I and II D.I, II and III A32. Which model is characterized by system states and events which cause transitions from one state to another? A. Data-flow model B. State machine model C. Architectural model D. Process model A33. Different types of users, using the system refers to the principle of A. User familiarity B. User diversity C. Consistency D. User guidance A34. The process of ensuring that the software meets the customer's expectation is.. A. Testing B. Verification C. Validation D. User requirements. A35. The process of checking that the software conforms to its specification is referred to as C. Validation A. Testing specification B. Verification D. Software requirements A36. What activity is needed to find inconsistencies between a program and its specification? A. Defect testing B. Debugging C. Statistical testing D. None of the above A37. What name is given to the testing done by the customer? A. Unit testing B. Module testing C. Sub-system testing D. Acceptance testing A38. Which of the following is usually the responsibility of programmers? Unit testing Module testing I. II. Sub-system testing В. II only III. A. I only A39. Software that is used'to support software process activities is referred to as. C. I and II D. I, II and III A. CASE ES OF E GINEENNG LICRARY B. CAD С. CADE D. CAES Examiner: Robert Adjetey Sowah, PhD Page 6 of 10 UNIVELSITY OF GHAN SCIENCES OF ENC LIC. UN A40. Which riśk can be identified in the following statement “The underlying technology on which the system is built is superseded by new technology". A. Hardware unavailability B. Requirement change C. Technology change D. Business risk A41. The nature of software causes problems for management. A. tangible B. intangible C. complex D. testing A42. What ' risk type can be identified in the following statement "There will be a large number of changes to the requirements than anticipated". A. Requirement change B. product and project C. Product D. Buşiness A43. The process of identifying activities, milestones and deliverables produced by a project is referred to as A. Proposal writing B. Project planning C. Project monitoring and review D. Personnel selection'and reviews A44. relationship is between a client and a supplier. A. an association B. an aggregatiơn C. a dependency D. a schedule algorithms A45. In principle, the functional requirements specification of a system.should be both. A. complete and efficient B. consistent C. complete and consistent D. efficient A46. In an activity network diagram, the longest path is referred to as A. critical length B. critical deadline C. critical path D. critical milestone. A47. It is general knowledge that inspections and reviews are more effective in defects than testing. discovering A. True B. False A48. There is a regular progress report in evolutionary development. A. True B. False A49. When using color in user interface design it is important to use color change to a significant event. illustrate A. True B. False A50. Program testing is the most widely used verification and validation technique. A. True B. False
Expert Answer:
Answer rating: 100% (QA)
A24 Option B Requirement elicitation and analysis A25 Option B More cheape... View the full answer
Related Book For
Posted Date:
Students also viewed these computer engineering questions
-
What three different models are used to value stocks based on different dividend patterns?
-
What is the most obvious evidence that lava extruded under water?
-
What is the most abundant chemically (or biochemically) precipitated rock?
-
Revenue Recognition Alternatives Each of the following independent situations relates to the recognition of revenue: a. Interest on loans made by a bank b. Interest on loans made by a bank when the...
-
When a certain photoelectric material is illuminated with red light ( = 700 nm) and then blue light ( = 400 nm), it is found that the maximum kinetic energy of the photoelectrons resulting from the...
-
Block B rests on a smooth surface. If the coefficients of friction between A and B are μs = 0.4 and μk = 0.3, determine the acceleration of each block if (a) F = 6 lb, and (b) F = 50lb 20 ib ...
-
Suppose Peters Hardware sells merchandise on account, terms 2/10, n/45, for $750 (cost of the inventory is $460) on May 17, 2010. Peters Hardware later received $225 of goods (cost, $140) as sales...
-
The stockholders equity for Dairy Place Drive-Ins (DP) on December 31, 2012, follows: On April 16, 2013, the market price of DP common stock was $20 per share. Assume DP distributed an 18% stock...
-
Presented below is information related to Ayayai Inc. Cost Retail Inventory, 12/31/25 $246,200 $394,300 Purchases 951,116 1,478,700 Purchase returns 60,000 80,300 Purchase discounts 18,300 Gross...
-
Your firm represents Amanda and Sam Baker, grandparents of two year old Brian Baker. Brian was recently injured in a home accident. The two year old stuck a hairpin into an electrical outlet and was...
-
Assume that Marigold Corp. earned net income of $ 3,324,000 during 2021. In addition, it had 99,000 shares of 8%, $ 100 par nonconvertible, noncumulative preferred stock outstanding for the entire...
-
Design a PowerPoint presentation for the capital budgeting committee that includes all of the following: Create a brief 1-2 slide description of the proposed programs. Develop a comparison between...
-
A positive charge q = 1.63 C is fixed at the origin, and a second charge q2 = -2.49 C is fixed at x = 17.7 cm. Where along the x-axis should a third charge be positioned so that it experiences no...
-
Our HR department has determined that as an added incentive, all new employees hired into our Smoothie business unit should receive a pension of $100 for each year of employment payable annually...
-
Andersen et al. (2014) conducted an analysis of the costs of implementing a risk assessment system at the point of release for prisoners in Illinois who are being put on Mandatory Supervised...
-
How do power dynamics within institutions and organizations affect individuals' ability to uphold ethical standards, and what strategies can mitigate these influences ?
-
Content discussed some of the behavioral theories of leadership and their ethical implications. Consider and comment on the following questions: Of the Iowa Study leadership styles (autocratic,...
-
For the data in Exercise 17-19, use the FIFO method to summarize total costs to account for, and assign these costs to units completed and transferred out, and to units in ending work in process....
-
(a) Where should a declared but unpaid cash dividend be reported on the balance sheet? (b) Where should a declared but unissued stock dividend be reported on the balance sheet?
-
Based upon the data presented in Exercise 2-13, (a) prepare an unadjusted trial balance, listing the accounts in their proper order. (b) Based upon the unadjusted trial balance, determine the net...
-
Selected accounts and related amounts for Carpet Land Co. for the fiscal year ended October 31, 2012, are presented in Problem 5-1A. Instructions 1. Prepare a single-step income statement in the...
-
Describe circumstances that might cause a client to understate assets such as cash and financial investments.
-
Select the best answer for each of the following situations and give reasons for your choice. a. You have been assigned to the year-end audit of a financial institution and are planning the timing of...
-
What prevents the person who opens incoming mail from being able to abstract cash collections from customers?
Study smarter with the SolutionInn App