Which one of the following is not a key process area in CMM level 5 ? (A) Defect prevention (B) Process change management (C) Software product engineering (D) Technology change management

1 Answer

Answer :

(C) Software product engineering

Related questions

Description : Explain a. the activities of software maintenance. b. key process areas of CMM.

Last Answer : Ans: a) Software maintenance is a broad activity that includes error correction, enhancement of capabilities, deletion of obsolete capabilities and optimization. b) Key process areas of CMM ... management which establishes and maintains the integrity of the products throughout the life cycle.

Description : Software safety is a ................... activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire ... monitoring and management (B) Software quality assurance (C) Software cost estimation (D) Defect removal efficiency

Last Answer : (B) Software quality assurance

Description : Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity? (A) Initial, Defined, Repeatable, Managed, Optimized. (B) Initial, ... Initial, Defined, Managed, Repeatable, Optimized. (D) Initial, Repeatable, Managed, Defined, Optimized.

Last Answer : (B) Initial, Repeatable, Defined, Managed, Optimized.

Description : Which one of the following is not a definition of error ? (A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value. (B) It ... to fail. (D) It refers to human action that results in software containing a defect or fault. 

Last Answer : The input, or clock pulse.

Description : ............... is a process model that removes defects before they can precipitate serious hazards. (A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model

Last Answer : (C) Cleanroom software engineering

Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.

Last Answer : Answer: 3

Description : The definition and use of configuration management standards is  essential for quality certification in a) ISO 9000 b) CMM c) CMMI d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : A direct method of deadlock prevention is to prevent the occurrence of ………….. A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : Which of the following is not the approach to dealing with deadlock? A) Prevention B) Avoidance C) Detection D) Deletion

Last Answer : D) Deletion

Description : A direct method of deadlock prevention is to prevent the occurrences of ................... A) Mutual exclusion B) Hold and wait C) Circular waits D) No preemption

Last Answer : C) Circular waits

Description : Which of the following is not the function of Microkernel? A) File management B) Low-level memory management C) Inter-process communication D) I/O interrupts management

Last Answer : A) File management

Description : Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level (A) Performed (B) Managed (C) Defined (D) Optimized

Last Answer : (C) Defined

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : Which of the following is not one of three software product aspects addressed by McCall's software quality factors? (1) Ability to undergo change. (2) Adaptability to new environments. (3) Operational characteristics (4) Production costs and scheduling

Last Answer : Answer: 4

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Each time a defect gets detected and fixed, the reliability of a software product (A) increases. (B) decreases. (C) remains constant. (D) cannot say anything.

Last Answer : (A) increases.

Description : What is the advantage of CMM relay over normal Inv. O/C current relay?

Last Answer : Inv. O/C relay under protects at low current and over protects at high currents. CMM: accounts for both +ve and -ve sequence currents i.e. Single phasing / unbalance supply conditions ... closely matched to motor heating characteristic. So it is better than thermal overload relay also. 

Description : Describe Capability Maturity Model (cmm)?

Last Answer : Every organization has some process to develop the software. Software Engineering Institute (SEI) has developed a model that provides the different levels of process maturity. In this model, in every level there are ... Repeatable. 3. Level 3: Defined. 4. Level 4: Managed. 5. Level 5: Optimizing.

Description : cause of translational errors occurred in CMM a. Twisting error b. Error in scale division c. Roll error d. Error in straightness

Last Answer : Ans:- d. Error in straightness

Description : What is CMM? Describe its levels & compare it with ISO 9001?

Last Answer : Ans. CAPABILITY MATURITY MODEL (CMM): CMM is a strategy for improving the software process, irrespective of the actual life cycle model used. Software Engineering Institute (SEI) of Carnegie- ... in the CMM are called out in the auditing practices of the verifying implementation common feature.

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : This process management initiative reduces R&D cycle time, a. Concurrent Engineering (CCE) b. Benchmarking c. Continuous Product Improvement systems (CPI) d. Channel Support systems e. Quality Initiative Training (QIT)

Last Answer : a. Concurrent Engineering (CCE)

Description : This process management initiative reduces material cost and, to a lesser degree, labor costs. a. Concurrent Engineering (CCE)/Six Sigma b. Benchmarking c. Continuous Product Improvement systems (CPI) d. Channel Support systems e. Quality Initiative Training (QIT)

Last Answer : c. Continuous Product Improvement systems (CPI)

Description : Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) the changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes (D) all of the above

Last Answer : (D) all of the above

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : The following is NOT a benefit of Strategic Management A. Resistance to change is reduced B. Reduces gaps/overlaps in activities among employees C. All of these options are correct D. Formulates a clear defect reduction plan in the quality department

Last Answer : Formulates a clear defect reduction plan in the quality department

Description : ………………………….. level supply information to strategic tier for the use of top management. A) Operational B) Environmental C) Competitive D) Tactical

Last Answer : D) Tactical

Description : Which are the following is / are the level(s) of documentation? A) Documentation for management B) Documentation for user C) Documentation for data processing department D) All of the above

Last Answer : D) All of the above

Description : As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage : (A) It has high level of flexibility (B) It doesn’t require cash up-front (C) It is a business investment (D) Little risk of obsolescence

Last Answer : (C) It is a business investment

Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation

Last Answer : (C) Requirement design

Description : The Software Maturity Index (SMI) is defined as SMI = [Mf - (Fa + Fc + Fd)] / Mf Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have ... (A) SMI approaches 1 (B) SMI approaches 0 (C) SMI approaches -1 (D) None of the above

Last Answer : (A) SMI approaches 1 

Description : Verification: (A) refers to the set of activities that ensure that software correctly implements a specific function. (B) gives answer to the question - Are we building the product right ? (C) requires execution of software (D) both (A) and (B)

Last Answer : (D) both (A) and (B)

Description : Software safety is quality assurance activity that focuses on hazards that (A) affect the reliability of a software component (B) may cause an entire system to fail. (C) may result from user input errors. (D) prevent profitable marketing of the final product

Last Answer : (B) may cause an entire system to fail.

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : The Prototyping model of software development is: (1) a reasonable approach when requirements are well-defined. (2) a useful approach when a customer cannot define requirements clearly. (3) the ... projects with large development teams. (4) a risky model that rarely produces a meaningful product.

Last Answer : 1

Description : State true of false. i) With paging, each process is divided into relatively small, fixed-size pages. ii) Segmentation provides for the use of pieces of varying size. A) Partition management B) Memory management C) Disk management D) All of the above

Last Answer : B) Memory management

Description : Process Management function of an operating system kernel includes. A) Process creation and termination. B) Process scheduling and dispatching C) Process switching D) All of the above

Last Answer : D) All of the above

Description : ………………………. is an important factor of management information system. A) System B) Data C) Process D) All

Last Answer : A) System

Description : A virtual memory based memory management algorithm partially swaps out a process. This is an example of (A) short term scheduling (B) long term scheduling (C) medium term scheduling (D) mutual exclusion

Last Answer : (C) medium term scheduling

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on Project  Management . 1. Which of the following is not project management goal? a) Keeping overall ... agreed time c) Maintaining a happy and well-functioning development team d) Avoiding customer complaints

Last Answer : d) Avoiding customer complaints

Description : Quality Management in software engineering is also known as a) SQA b) SQM c) SQI d) SQA and SQM

Last Answer : Ans: a

Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ?  (A) 5 (B) 10 (C) 15 (D) 50

Last Answer : (A) 5 

Description : State true or false for the following statements in Java. i) Java beans slow down software development process. ii) Java Servlets do not have built in multithreading feature. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : A) i-false, ii-false

Description : Software testing is (A) the process of establishing that errors are not present. (B) the process of establishing confidence that a program does what it is supposed to do. (C) the process of ... as per specifications. (D) the process of executing a program with the intent of finding errors. 

Last Answer : (D) the process of executing a program with the intent of finding errors.

Description : The software ................. of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them. (A) Design (B) Architecture (C) Process (D) Requirement

Last Answer : (B) Architecture

Description : ................... are applied throughout the software process. (A) Framework activities (B) Umbrella activities (C) Planning activities (D) Construction activities 

Last Answer : (B) Umbrella activities