Software Metrics Mcqs

Q.  How many Information Domain Values are used for Function Point Computation ?

a. three
b. four
c. five
d. six


ANSWER: See Answer
 
The five values are: External Inputs, External Outputs, External Inquiries, Internal Logical Files and External Interface Files.
TasDia Network - Mcqs | Signature | Lyrics
MCQs:  Which of the following is not an information domain required for determining function point in FPA ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Static Analysis involves executing a program ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Which of the following is a technique covered in Static Analysis ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Which of the following is incorrect with respect to Model Checking ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  The records of each patient that is receiving or has received treatment resembles which security concept ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Select the disadvantage of using Formal methods ___________________?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Which level of Static Analysis allows specific rules that apply to a program to be checked ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Static analysis is now routinely used in the development of many safety and security critical systems?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  An impersonation of an authorised user is an example of a security threat ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Circumstances that have potential to cause loss or harm is known as___________________?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  A system resource that has a value and has to be protected is known as ________________________?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  What is Life cycle risk assessment ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  What are security controls ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts
MCQs:  Which of the following is a layer of protection for Security ?
Category: Software Engineering Mcqs,   Published by: T-Code Scripts