Deck 5: Software Development and Management Terminology

Full screen (f)
exit full mode
Question
Zero duration activities but are assumed to start at the same time as the first and the end at the same time as the last one is called__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
Use Space or
up arrow
down arrow
to flip the card.
Question
……………..is called if subsequent have the time by which an activity may be delayed without affecting.

A)action float.
B)terminal float.
C)free float
D)null float
Question
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
Question
____________is part of Risk Management.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
Question
The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
Question
____ is carried out to calculate the earliest dates on which each activity may be started and completed.

A)backward pass.
B)forward pass.
C)no pass.
D)increasing pass.
Question
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
Question
. In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
Question
. The scope of the deliverables for an increment is rigidly constrained by an agreed deadline called as ____________.

A)sand boxing.
B)time boxing.
C)time delaying.
D)local delaying.
Question
. SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
Question
Sometimes redesigns of the code is often called as ________.

A)refactoring.
B)redesigning.
C)recoding.
D)rearranging.
Question
Find the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
Question
________ is refined by Barry Boehm and his co-workers.

A)cocomo iii.
B)cocomo iv.
C)cocomo ii.
D)cocomo i.
Question
CPM can be expanded as _______.

A)control path method.
B)critical path method.
C)cohesion path method.
D)control path model.
Question
he Cost Benefit Analysis is done for ___________ feasibility.

A)social
B)technical.
C)programm
D)economical.
Question
One can_______ is classified into Functional and Non-functional.

A)project.
B)requirements.
C)start date. .
D)risk
Question
Security (backups, firewall) will be a ________ requirement.

A)functional.
B)non-functional.
C)normal.
D)security.
Question
Time behaviour is the sub-characteristics of _______.

A)maintainability.
B)efficiency.
C)usability.
D)reliability.
Question
________ a set of attributes (data items) and that will be manipulated within the software (system).

A)instance.
B)class.
C)object.
D)data.
Question
_________ indicates the connectedness of the system that can be derived mechanically.

A)dependency.
B)re-occurrence.
C)inheritance
D)relationship.
Question
Diagrammatic form for Flow oriented Modelling………

A)functional diagrams.
B)er diagrams.
C)data flow diagrams.
D)system flow diagrams.
Question
The sub-characteristics of efficiency is …..

A)understandability.
B)learnability.
C)resource utilization.
D)accuracy.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Software Development and Management Terminology
1
Zero duration activities but are assumed to start at the same time as the first and the end at the same time as the last one is called__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
hammocked.
2
……………..is called if subsequent have the time by which an activity may be delayed without affecting.

A)action float.
B)terminal float.
C)free float
D)null float
free float
3
_________ activities on the network diagram have zero duration and use no resources.

A)dangling.
B)dummy.
C)null.
D)zero.
dummy.
4
____________is part of Risk Management.

A)risk analysis and risk estimation.
B)risk control and risk planning.
C)risk identification and monitoring.
D)risk control, planning, identification and monitoring.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity.

A)hijacked.
B)heuristic.
C)hammocked.
D)hole.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
____ is carried out to calculate the earliest dates on which each activity may be started and completed.

A)backward pass.
B)forward pass.
C)no pass.
D)increasing pass.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
In Software Prototype, ___________ means copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.

A)simulation.
B)annealing.
C)mock-ups.
D)rad system.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
. In software prototype, partial working model is classified into ________.

A)vertical and horizontal.
B)vertical and straight.
C)bended and horizontal.
D)elevated and horizontal.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
. The scope of the deliverables for an increment is rigidly constrained by an agreed deadline called as ____________.

A)sand boxing.
B)time boxing.
C)time delaying.
D)local delaying.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
. SSADM means ___________.

A)straight systems analysis design method.
B)structured systems analysis design method.
C)software systems analysis design method.
D)solutions systems analysis design method.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
Sometimes redesigns of the code is often called as ________.

A)refactoring.
B)redesigning.
C)recoding.
D)rearranging.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
Find the two levels of development suggested by Booch ?

A)micro and macro processes.
B)inter and intra processes.
C)internal and external processes.
D)small and large processes.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
________ is refined by Barry Boehm and his co-workers.

A)cocomo iii.
B)cocomo iv.
C)cocomo ii.
D)cocomo i.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
CPM can be expanded as _______.

A)control path method.
B)critical path method.
C)cohesion path method.
D)control path model.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
he Cost Benefit Analysis is done for ___________ feasibility.

A)social
B)technical.
C)programm
D)economical.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
One can_______ is classified into Functional and Non-functional.

A)project.
B)requirements.
C)start date. .
D)risk
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
Security (backups, firewall) will be a ________ requirement.

A)functional.
B)non-functional.
C)normal.
D)security.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
Time behaviour is the sub-characteristics of _______.

A)maintainability.
B)efficiency.
C)usability.
D)reliability.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
________ a set of attributes (data items) and that will be manipulated within the software (system).

A)instance.
B)class.
C)object.
D)data.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
_________ indicates the connectedness of the system that can be derived mechanically.

A)dependency.
B)re-occurrence.
C)inheritance
D)relationship.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
Diagrammatic form for Flow oriented Modelling………

A)functional diagrams.
B)er diagrams.
C)data flow diagrams.
D)system flow diagrams.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
The sub-characteristics of efficiency is …..

A)understandability.
B)learnability.
C)resource utilization.
D)accuracy.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 22 flashcards in this deck.