Your browser does not support JavaScript!

Software Engineering 1

Showing 301-316 of 316 answers

Which one of the following is not a phase of Prototyping Model?
  • Coding Correct
Which one of the following is not an Evolutionary Process Model?
  • All of the mentioned Correct
Which one of the following is not an Evolutionary Process Model? a) WINWIN Spiral Model
  • All of the mentioned Correct
Which one of the following models is not suitable for accommodating any change?
  • Waterfall Model Correct
Which regression test selection technique exposes faults caused by modifications?
  • Inclusiveness Correct
Which selective retest technique selects every test case that causes a modified program to produce a different output than its original version?
  • Safe Correct
Which technique is applied to ensure the continued evolution of legacy systems ?
  • Reverse Engineering and Reengineering Correct
Which two models doesn’t allow defining requirements early in the cycle?
  • Prototyping & Spiral Correct
Which two of the following models will not be able to give the desired outcome if user’s participation is not involved?
  • RAD & Prototyping Correct
Whileprogramming, the code is broken downintosmaller group of instructions. These groups are known as modules, subprograms,or subroutines.
  • Modular Programming Correct
White Box techniques are also classified as
  • Structural testing Correct
You should be aware of local laws governing the useof intellectual property such as patents and copyright.
  • Intellectual property rights Correct
You should be aware of local laws governing theuseof intellectual property such as patents andcopyright.
  • Intellectual property rights. Correct
You should normally respect the confidentiality of your employers or clients irrespective of whether or not a formal confidentiality agreement has been signed.
  • Confidentiality Correct
You should not misrepresent your level of competence. You shouldnot knowingly accept work that is outside your competence.
  • Competence Correct
You should not use your technical skills to misuse otherpeople’s computers.
  • Computer misuse Correct
This course is taught by the mentor:
Professor Paul Jacob Cruz

Paul Jacob Cruz

Master of Science in Computer Science.

All courses