Deck 2: Software Development Methodologies and Project Management Techniques

ملء الشاشة (f)
exit full mode
سؤال
An Elaboration of Waterfall which stresses the necessity for validation activities is known as __________.

A)extended waterfall.
B)iterative model.
C)v-process model.
D)spiral model.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The spiral model is originated by __________.

A)b.w.boehm.
B)b.w.williams.
C)b.w.britto.
D)b.w.hackman.
سؤال
_______ is a working model of one or more aspects of the projected system.

A)evolutionary model.
B)v-process model.
C)spiral model.
D)software prototyping.
سؤال
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
سؤال
In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
سؤال
SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
سؤال
Which are the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
سؤال
The statement "Putting more people on a late job makes it later" is from _________ law.

A)brooks.
B)peters.
C)parkinson\s.
D)brokers.
سؤال
KLOC indicates ___________.

A)hundred lines of code.
B)source lines of code.
C)thousand lines of code.
D)million lines of code.
سؤال
Effort = __________.

A)system size x productivity rate.
B)system size x kloc.
C)person in months / sloc.
D)person in months x productivity rate.
سؤال
UFP indicates ________.

A)unused function points.
B)unstructured function points.
C)uniform function points.
D)unadjusted function points.
سؤال
The activities have zero duration but are assumed to start at the same timeas the first and the end at the same time as the last one is called__________activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
سؤال
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
سؤال
Every risk is associated with a likely problem and an _______.

A)activity.
B)outcome.
C)action plan.
D)threats.
سؤال
Risk Management consists of ____________.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
سؤال
Ranking of the risks and determining risk aversion strategies is called _______.

A)risk analysis.
B)risk control.
C)risk identification.
D)risk evaluation.
سؤال
________ = risk likelihood X risk impact.

A)risk estimate.
B)risk expenditure.
C)risk identification
D)risk exposure.
سؤال
Ranking of the risks and determining risk aversion strategies is called ________.

A)risk analysis.
B)risk control.
C)risk identification
D)risk evaluation.
سؤال
The shortest time in which we could expect to complete the activity, barring outright miracles are called ________.

A)optimistic time.
B)pessimistic time.
C)most likely time.
D)shortest time.
سؤال
"Each activity has been scheduled to start at its earliest start date" is called as_________.

A)likelihood.
B)activity schedule.
C)probability.
D)planning.
سؤال
In _________, the priority activities are allocated resources in ascending order of total. float.

A)total free.
B)total float.
C)technical float.
D)top float
سؤال
_______ is an activity bar chart indicating scheduled activity dates and durations frequently augmented with activity floats.

A)bar chart.
B)ball chart.
C)slip chart.
D)gantt chart.
سؤال
The priorities we might apply in deciding levels in monitoring is called as ______.

A)hierarchical monitoring.
B)prioritized monitoring.
C)tracking.
D)tracing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Software Development Methodologies and Project Management Techniques
1
An Elaboration of Waterfall which stresses the necessity for validation activities is known as __________.

A)extended waterfall.
B)iterative model.
C)v-process model.
D)spiral model.
v-process model.
2
The spiral model is originated by __________.

A)b.w.boehm.
B)b.w.williams.
C)b.w.britto.
D)b.w.hackman.
b.w.boehm.
3
_______ is a working model of one or more aspects of the projected system.

A)evolutionary model.
B)v-process model.
C)spiral model.
D)software prototyping.
software prototyping.
4
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
5
In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
6
SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which are the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
8
The statement "Putting more people on a late job makes it later" is from _________ law.

A)brooks.
B)peters.
C)parkinson\s.
D)brokers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
9
KLOC indicates ___________.

A)hundred lines of code.
B)source lines of code.
C)thousand lines of code.
D)million lines of code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
10
Effort = __________.

A)system size x productivity rate.
B)system size x kloc.
C)person in months / sloc.
D)person in months x productivity rate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
11
UFP indicates ________.

A)unused function points.
B)unstructured function points.
C)uniform function points.
D)unadjusted function points.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
12
The activities have zero duration but are assumed to start at the same timeas the first and the end at the same time as the last one is called__________activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
13
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
14
Every risk is associated with a likely problem and an _______.

A)activity.
B)outcome.
C)action plan.
D)threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
15
Risk Management consists of ____________.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
16
Ranking of the risks and determining risk aversion strategies is called _______.

A)risk analysis.
B)risk control.
C)risk identification.
D)risk evaluation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
17
________ = risk likelihood X risk impact.

A)risk estimate.
B)risk expenditure.
C)risk identification
D)risk exposure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
18
Ranking of the risks and determining risk aversion strategies is called ________.

A)risk analysis.
B)risk control.
C)risk identification
D)risk evaluation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
19
The shortest time in which we could expect to complete the activity, barring outright miracles are called ________.

A)optimistic time.
B)pessimistic time.
C)most likely time.
D)shortest time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
20
"Each activity has been scheduled to start at its earliest start date" is called as_________.

A)likelihood.
B)activity schedule.
C)probability.
D)planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
21
In _________, the priority activities are allocated resources in ascending order of total. float.

A)total free.
B)total float.
C)technical float.
D)top float
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
22
_______ is an activity bar chart indicating scheduled activity dates and durations frequently augmented with activity floats.

A)bar chart.
B)ball chart.
C)slip chart.
D)gantt chart.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
23
The priorities we might apply in deciding levels in monitoring is called as ______.

A)hierarchical monitoring.
B)prioritized monitoring.
C)tracking.
D)tracing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 23 في هذه المجموعة.