Question: please answer all please A25. Repairing coding errors is repairing requirement errors. A. More expensive than B. More cheaper than C. The same as D.

please answer all please  please answer all please A25. Repairing coding errors is repairing requirement
errors. A. More expensive than B. More cheaper than C. The same
as D. 50 percent more than A26. The process of converting a

A25. Repairing coding errors is repairing requirement errors. A. More expensive than B. More cheaper than C. The same as D. 50 percent more than A26. The process of converting a system specification into an executable system is known as A programming B. design C. implementation Desting A27. Software designers create design version(s) for a very software system they produce. A One B. Two C. Four D. Several A28. Interface design can be associated with A.GUI B. The system C.Subsystems D. Architecture A29. The essence of debugging is A.Location of errors B. Repairing errors C. Testing the system D.Locating and correction of errors A30. Context models are used to define the of the system A Behavior B.Environment C. Architecture D. State A31. Which of the following iwwe used in modeling the behavior of a system? I State machine model II. Data flow model III. Architectural model A. I only OF SAREERING B. Il only C.I and II LIONARY D.I, II and III Examiner: Robert Adjetey Sewah, PhD Page 5 of 10 A32. Which model is characterized by system states and events which cause transitions from one state to another? A. Data-flow model B. State machine model C. Architectural model D. Process model A33. Different types of users, using the system refers to the principle of A ser familiarity her diversity C. Consistency D. User guidance A34. The process of ensuring that the software meets the customer's expectation in A Testing B. Verification C. Validation D. Uwer requirements A35. The process of checking that the soft conforme o mas specification is referred to us A Testing B. Verification C Validation Deware requirements specification A36. What activity is needed to find inconsistencies between a program and its specification? A. Defect testing B. Debugging C Statistical testing D. None of the above A37. What name is given to the testing done by the customer Unit testing B. Module testing C Sub-system testing D. Acceptance testing ASE. Which of the following is usually the tespesiability of programmet Unit testing Module testing TIESubsystem ting A. I only 8. If only cand D.Ltd A39. Software that is used to support settware proces civiles is a A CASE B. CAD C. CADE D. CAES Examiner: Robert Adjetey Sowah, PD LIDSATY Page 6 of 10 GRASS TOHEN LC. A40. Which risk can be identified in the following statement "The underlying technology on which the system is built is superseded by new technolog" A. Hardware availability B. Requirement change C Technology change D. Business risk A41. The nature of software causes problem for management A. tangible Bintable C.complex Desting 142. What risk type can be dentified in the following statement There will be large number of changes to the requirements that cited A Requirement change B. product and project c. Product D. Business AC). The process of identifying activities milestones and deliverable produced by project is referred to as A. Proposal writing B. Project planning C. Project monitoring and review D. Personnel election and review A44. relationship is between a client and a supplier. A. an association B. an aggregation C. a dependency D. a schedule algorithms A45. In principle, the functional requirements specification of a system should be both...... A. complete and efficient B. consistent C. complete and consistent D. efficient A46. In an activity network diagram, the longest path is referred to as A. critical length B. critical deadline C. critical path D. critical milestone. A47. It is general knowledge that inspections and reviews are more effective in defects than testing. A. True B. False A48. There is a regular progress report in evolutionary development. A. True B. False A49. When using color in user interface design it is important to use color change to a significant event A. True B. False ASO. Program testing is the most widely used verification and validation technique. A. True B. False discovering illustrate

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!