Deck 2: Software Development Methodologies and Project Management Techniques

Full screen (f)
exit full mode
Question
An Elaboration of Waterfall which stresses the necessity for validation activities is known as __________.

A)extended waterfall.
B)iterative model.
C)v-process model.
D)spiral model.
Use Space or
up arrow
down arrow
to flip the card.
Question
The spiral model is originated by __________.

A)b.w.boehm.
B)b.w.williams.
C)b.w.britto.
D)b.w.hackman.
Question
_______ is a working model of one or more aspects of the projected system.

A)evolutionary model.
B)v-process model.
C)spiral model.
D)software prototyping.
Question
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
Question
In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
Question
SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
Question
Which are the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
Question
The statement "Putting more people on a late job makes it later" is from _________ law.

A)brooks.
B)peters.
C)parkinson\s.
D)brokers.
Question
KLOC indicates ___________.

A)hundred lines of code.
B)source lines of code.
C)thousand lines of code.
D)million lines of code.
Question
Effort = __________.

A)system size x productivity rate.
B)system size x kloc.
C)person in months / sloc.
D)person in months x productivity rate.
Question
UFP indicates ________.

A)unused function points.
B)unstructured function points.
C)uniform function points.
D)unadjusted function points.
Question
The activities have zero duration but are assumed to start at the same timeas the first and the end at the same time as the last one is called__________activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
Question
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
Question
Every risk is associated with a likely problem and an _______.

A)activity.
B)outcome.
C)action plan.
D)threats.
Question
Risk Management consists of ____________.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
Question
Ranking of the risks and determining risk aversion strategies is called _______.

A)risk analysis.
B)risk control.
C)risk identification.
D)risk evaluation.
Question
________ = risk likelihood X risk impact.

A)risk estimate.
B)risk expenditure.
C)risk identification
D)risk exposure.
Question
Ranking of the risks and determining risk aversion strategies is called ________.

A)risk analysis.
B)risk control.
C)risk identification
D)risk evaluation.
Question
The shortest time in which we could expect to complete the activity, barring outright miracles are called ________.

A)optimistic time.
B)pessimistic time.
C)most likely time.
D)shortest time.
Question
"Each activity has been scheduled to start at its earliest start date" is called as_________.

A)likelihood.
B)activity schedule.
C)probability.
D)planning.
Question
In _________, the priority activities are allocated resources in ascending order of total. float.

A)total free.
B)total float.
C)technical float.
D)top float
Question
_______ is an activity bar chart indicating scheduled activity dates and durations frequently augmented with activity floats.

A)bar chart.
B)ball chart.
C)slip chart.
D)gantt chart.
Question
The priorities we might apply in deciding levels in monitoring is called as ______.

A)hierarchical monitoring.
B)prioritized monitoring.
C)tracking.
D)tracing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Software Development Methodologies and Project Management Techniques
1
An Elaboration of Waterfall which stresses the necessity for validation activities is known as __________.

A)extended waterfall.
B)iterative model.
C)v-process model.
D)spiral model.
v-process model.
2
The spiral model is originated by __________.

A)b.w.boehm.
B)b.w.williams.
C)b.w.britto.
D)b.w.hackman.
b.w.boehm.
3
_______ is a working model of one or more aspects of the projected system.

A)evolutionary model.
B)v-process model.
C)spiral model.
D)software prototyping.
software prototyping.
4
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
Which are the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
The statement "Putting more people on a late job makes it later" is from _________ law.

A)brooks.
B)peters.
C)parkinson\s.
D)brokers.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
KLOC indicates ___________.

A)hundred lines of code.
B)source lines of code.
C)thousand lines of code.
D)million lines of code.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
Effort = __________.

A)system size x productivity rate.
B)system size x kloc.
C)person in months / sloc.
D)person in months x productivity rate.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
UFP indicates ________.

A)unused function points.
B)unstructured function points.
C)uniform function points.
D)unadjusted function points.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
The activities have zero duration but are assumed to start at the same timeas the first and the end at the same time as the last one is called__________activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
Every risk is associated with a likely problem and an _______.

A)activity.
B)outcome.
C)action plan.
D)threats.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
Risk Management consists of ____________.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
Ranking of the risks and determining risk aversion strategies is called _______.

A)risk analysis.
B)risk control.
C)risk identification.
D)risk evaluation.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
________ = risk likelihood X risk impact.

A)risk estimate.
B)risk expenditure.
C)risk identification
D)risk exposure.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
Ranking of the risks and determining risk aversion strategies is called ________.

A)risk analysis.
B)risk control.
C)risk identification
D)risk evaluation.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
The shortest time in which we could expect to complete the activity, barring outright miracles are called ________.

A)optimistic time.
B)pessimistic time.
C)most likely time.
D)shortest time.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
"Each activity has been scheduled to start at its earliest start date" is called as_________.

A)likelihood.
B)activity schedule.
C)probability.
D)planning.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
In _________, the priority activities are allocated resources in ascending order of total. float.

A)total free.
B)total float.
C)technical float.
D)top float
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
_______ is an activity bar chart indicating scheduled activity dates and durations frequently augmented with activity floats.

A)bar chart.
B)ball chart.
C)slip chart.
D)gantt chart.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
The priorities we might apply in deciding levels in monitoring is called as ______.

A)hierarchical monitoring.
B)prioritized monitoring.
C)tracking.
D)tracing
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 23 flashcards in this deck.