461. Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition ?
A. External inputs
B. External outputs
C. External process
D. External inquiries

Explanation: External inputs, external outputs, external inquiries, internal logical files, external interface files are the five domains.
advertisement

462. Who suggested the four different approaches to the sizing problem ?
A. Putnam
B. Myers
C. Boehm
D. Putnam and Myers

463. A make-buy decision is based on whether________________?
A. The software may be purchased off-the-shelf
B. “Full-experience” or “Partial-experience” software components should be used
C. Customer-built software should be developed
D. All of the mentioned

464. Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.” ?
A. Underestimated development time
B. Organizational restructuring
C. Requirements changes
D. None of the mentioned

Explanation: Tracing the requirements can help us understand the risk

465. Which of the following risks are derived from the organizational environment where the software is being developed ?
A. People risks
B. Technology risks
C. Estimation risks
D. Organizational risks

Explanation: These risks are at management level.

466. Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.” ?
A. Technology change
B. Product competition
C. Requirements change
D. None of the mentioned

467. Risk management is one of the most important jobs for a__________________?
A. Client
B. Investor
C. Production team
D. Project manager

Explanation: Risk management involves anticipating risks that might affect the project schedule or the quality of the software being developed, and then taking action to avoid these risks.

468. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk ?
A. Risk monitoring
B. Risk planning
C. Risk analysis
D. Risk identification

469. Which activity sits at the core of software requirements analysis ?
A. Problem decomposition
B. Partitioning
C. Problem elaboration
D. All of the mentioned

Explanation: During the scoping activity decomposition is applied in two major areas: the functionality that must be delivered and the process that will be used to deliver it

470. Which of the following term is best defined by the statement “The creation of a new code line from a version in an existing code line” ?
A. Branching
B. Merging
C. Code line
D. Mainline

Explanation: The code may then be developed independently.

NOTE
IF YOU THINK ANY OF THE MCQ ABOVE IS WRONG.
PLEASE COMMENT WITH CORRECT ANSWER AND ITS DETAIL EXPLANATION IN COMMENT BOX.
THANK YOU

This Post Has One Comment

Leave a Reply