Deck 5: Software Development and Management Terminology

ملء الشاشة (f)
exit full mode
سؤال
Zero duration activities but are assumed to start at the same time as the first and the end at the same time as the last one is called__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
……………..is called if subsequent have the time by which an activity may be delayed without affecting.

A)action float.
B)terminal float.
C)free float
D)null float
سؤال
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
سؤال
____________is part of Risk Management.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
سؤال
The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
سؤال
____ is carried out to calculate the earliest dates on which each activity may be started and completed.

A)backward pass.
B)forward pass.
C)no pass.
D)increasing pass.
سؤال
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
سؤال
. In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
سؤال
. The scope of the deliverables for an increment is rigidly constrained by an agreed deadline called as ____________.

A)sand boxing.
B)time boxing.
C)time delaying.
D)local delaying.
سؤال
. SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
سؤال
Sometimes redesigns of the code is often called as ________.

A)refactoring.
B)redesigning.
C)recoding.
D)rearranging.
سؤال
Find the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
سؤال
________ is refined by Barry Boehm and his co-workers.

A)cocomo iii.
B)cocomo iv.
C)cocomo ii.
D)cocomo i.
سؤال
CPM can be expanded as _______.

A)control path method.
B)critical path method.
C)cohesion path method.
D)control path model.
سؤال
he Cost Benefit Analysis is done for ___________ feasibility.

A)social
B)technical.
C)programm
D)economical.
سؤال
One can_______ is classified into Functional and Non-functional.

A)project.
B)requirements.
C)start date. .
D)risk
سؤال
Security (backups, firewall) will be a ________ requirement.

A)functional.
B)non-functional.
C)normal.
D)security.
سؤال
Time behaviour is the sub-characteristics of _______.

A)maintainability.
B)efficiency.
C)usability.
D)reliability.
سؤال
________ a set of attributes (data items) and that will be manipulated within the software (system).

A)instance.
B)class.
C)object.
D)data.
سؤال
_________ indicates the connectedness of the system that can be derived mechanically.

A)dependency.
B)re-occurrence.
C)inheritance
D)relationship.
سؤال
Diagrammatic form for Flow oriented Modelling………

A)functional diagrams.
B)er diagrams.
C)data flow diagrams.
D)system flow diagrams.
سؤال
The sub-characteristics of efficiency is …..

A)understandability.
B)learnability.
C)resource utilization.
D)accuracy.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Software Development and Management Terminology
1
Zero duration activities but are assumed to start at the same time as the first and the end at the same time as the last one is called__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
hammocked.
2
……………..is called if subsequent have the time by which an activity may be delayed without affecting.

A)action float.
B)terminal float.
C)free float
D)null float
free float
3
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
dummy.
4
____________is part of Risk Management.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
5
The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ is carried out to calculate the earliest dates on which each activity may be started and completed.

A)backward pass.
B)forward pass.
C)no pass.
D)increasing pass.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
7
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
8
. In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
9
. The scope of the deliverables for an increment is rigidly constrained by an agreed deadline called as ____________.

A)sand boxing.
B)time boxing.
C)time delaying.
D)local delaying.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
10
. SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
11
Sometimes redesigns of the code is often called as ________.

A)refactoring.
B)redesigning.
C)recoding.
D)rearranging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
12
Find the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
13
________ is refined by Barry Boehm and his co-workers.

A)cocomo iii.
B)cocomo iv.
C)cocomo ii.
D)cocomo i.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
14
CPM can be expanded as _______.

A)control path method.
B)critical path method.
C)cohesion path method.
D)control path model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
15
he Cost Benefit Analysis is done for ___________ feasibility.

A)social
B)technical.
C)programm
D)economical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
16
One can_______ is classified into Functional and Non-functional.

A)project.
B)requirements.
C)start date. .
D)risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
17
Security (backups, firewall) will be a ________ requirement.

A)functional.
B)non-functional.
C)normal.
D)security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
18
Time behaviour is the sub-characteristics of _______.

A)maintainability.
B)efficiency.
C)usability.
D)reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ a set of attributes (data items) and that will be manipulated within the software (system).

A)instance.
B)class.
C)object.
D)data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
20
_________ indicates the connectedness of the system that can be derived mechanically.

A)dependency.
B)re-occurrence.
C)inheritance
D)relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
21
Diagrammatic form for Flow oriented Modelling………

A)functional diagrams.
B)er diagrams.
C)data flow diagrams.
D)system flow diagrams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
22
The sub-characteristics of efficiency is …..

A)understandability.
B)learnability.
C)resource utilization.
D)accuracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.