CS605 Midterm Online Quiz

0%

CS605-Midterm

1 / 50

A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is known as ___________.

2 / 50

Which one is not the application area of expert system?

3 / 50

The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is said to be achieving the

4 / 50

The projects are classified into following categories except

5 / 50

The best project team organizational model to use when tackling extremely difficult problems is the

6 / 50

Quality costs may be divided into costs associated with

7 / 50

Which one of the following is involved in an ES development project:

8 / 50

The only reason for an estimate to be unreliable is lack of experience related to the application on the part of the estimator.

9 / 50

___________ is not the part of software development loop.

10 / 50

In _________________ a team is structured along a traditional hierarchy of authority

11 / 50

Capability maturity model (CMM) is used to judge the __________ model of an organization.

12 / 50

The ___________ model of software development is a good approach when core product is required quickly.

13 / 50

MMTC is the abbreviation of

14 / 50

The older approach is called LOC estimation, since it is …………. on initially estimating the number of lines of code that will need to be developed for the project.

15 / 50

Miscommunication among project staff is one of the reasons of the failure of the software project

16 / 50

If requirements are uncertain, ______ will be a suitable.

17 / 50

You can use the ---------command in UNIX to create a directory.

18 / 50

Which Cycle does the following figure show?

19 / 50

_____________ the ability to encourage people to create and feel creative.

20 / 50

------------has a hierarchical file system structure.

21 / 50

Software risk impact assessment should focus on consequences affecting

22 / 50

In Adversarial search the goals of the adversaries are usually ___________ to each other

23 / 50

We can get optimal solution given some parameters using Genetic Algorithm.

24 / 50

Integrity means that the software should

25 / 50

Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the

26 / 50

__________ is not the management part of software development activities.

27 / 50

Build and Fix model is a ___________ type of software development activity.

28 / 50

When a software is delivered to a client and then client reports the bug in it then that bug is termed as

29 / 50

Defect Removal Efficiency (DRE) can be measured by where E is Errors found delivery and D is error found after delivery (typically within the first year of operation)

30 / 50

Which one of the following describes the data and control to be processed, function, performance, constraints, interfaces, and reliability?

31 / 50

________________ model is adopted by Microsoft

32 / 50

Semantic networks are computationally expensive at __________

33 / 50

of CMM is known as

34 / 50

The creating process is called a--------------- process while the new processes are called the -------------- of that process

35 / 50

The number of people required for a software project is determined

36 / 50

In _________________ a team is structured along a traditional hierarchy of authority

37 / 50

QA is an activity performed ___________ of the software development.

38 / 50

A law affirming that to continue after a certain level of performance has been reached will result in a decline in effectiveness. This law is known as ___________.

39 / 50

Ambiguous requirements can be measured quantitatively

40 / 50

Which of these software characteristics are used to determine the scope of a software project?

41 / 50

To infer new information from semantic networks, we can ask questions from nodes.

42 / 50

Software has very close relationship with ___________

43 / 50

In function point analysis technique EO stands for

44 / 50

While managing the historical data, we should consider the following except

45 / 50

The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is said to be achieving the

46 / 50

__________is the ability to encourage technical people to produce to their best.

47 / 50

An AI system must form a meaningful and useful _____________ of the internal information.

48 / 50

COCOMO is the classic LOC cost-estimation formula and used thousand delivered source instructions (KDSI) as his _________ of size.

49 / 50

In ____________a team is structured loosely and depends on individual initiative of the team members

50 / 50

Software risk impact assessment should focus on consequences affecting

Your score is

The average score is 27%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi