TYIT-SPM - mcq PDF

Title TYIT-SPM - mcq
Course SOFTWARE PROJECT MANAGEMENT
Institution Anna University
Pages 10
File Size 102 KB
File Type PDF
Total Downloads 3
Total Views 160

Summary

mcq...


Description

MODEL QUESTIONS for SEM 5 CLASS- TYIT SUBJECT – Software project management Different activity of a project management is A.project planning B.project monitoring C.project control D.All of the above

Which of the following activity is undertaken immediately after feasibility study and before the requirement analysis and specification phase? A.Project Planning B.Project Monitoring C.Project Control D.Project Scheduling

This activity is undertaken once the development activities start? A.Project Planning B.Project Monitoring and Control C.Project size estimation D.Project cost estimation

Which of the following activity is not the part of project planning? A.project estimation B.project scheduling C.project monitoring D.risk management

In the project planning, which of the following is considered as the most basic parameter based on which all other estimates are made? A.project size B.project effort C.project duration D.project schedule

During project estimation, project manager estimates following A.project cost B.project duration C.project effort D.all of the above

Once project planning is complete, project managers document their plan in A.SPMP document B.SRS document C.Detailed Design documet D.Excel Sheet

Which of the following serves as metrics for project size estimation? A.Lines of codes B.function point C.Number of persons D.Only A & B Lines of Code measures the size of project by counting A.the number of source instructions B.the comments in the code C.the header lines

D.All of the above

"Larger code size doesnot necessarily mean better quality or higher efficiency." A.True B.False C.NA D.NA

We can accurately estimate lines of code from the problem specification. A.True B.False C.NA D.NA

Which of the following technique overcomes drawback related to LOC? A.Project Planning Sheet B.Function Point Metric C.COCOMO D.COCOMO2

Which of the following can estimate size of project directly from problem specification? A.LOC B.Function Point Metric C.Bothg D.None

Which of the following serves as project estimation technique? A.Empirical estimation

B.Heuristic technique C.Analytical estimation D.All of the above

Heuristics estimation techniquedepends on A.educated guess B.prior experience C.Common sense D.All of the above

Which of the following is empirical estimation technique? (i) expert judgement (ii) Delphi estimation (iii) COCOMO (iv) Critical path Method A.only i, ii & iii B.only i & ii C.only i, iii & iv D.All of the above Which of the following is example of multi-variable cost estimation model? A.COCOMO B.intermediate COCOMO C.both D.None

Which of the following technique overcomes the drawbacks of expert judggement technique? A.Heuristic technique B.Delphi cost esttimation C.Basis COCOMO D.only a & b

What is the full form of COCOMO? A.Conditional Cost Estimation Model B.Complete Cost Estimation Model C.Construction Cost Estimation Model D.Collaborative Cost Estimation Model

Staffing level estimation pattern is greatly influenced by A.Norden's Work B.Putnam's Work C.Both D.None of the these

Resource allocated is done using A.PERT chart B.Gantt chart C.UML D.pi-chart

Which chart representation is suitable for project monitoring and control? A.PERT chart B.Gantt chart C.THETA chart D.All of the above

This technique decompose a given task set recursively into small activities? A.Sotware Configuration Management B.Configuration indentification C.Work breakdown Structure

D.both a & c

The ways in Which a software development organisation can be structured. A.functional formation B.project format C.both D.none

• Which of the following are different team structures used in Point Management? A. Chief programmer team B. Democratic team C. Mixed Control team D. All of the above • • Which of the following is not a characteristics of a good software engineer? A. Ability to work in different team B. Good Domian Knowledge C. Weak programming knowledge D. Good Communication Skills • • Which of the following are important activities of Risk Management? A. Risk indentification B. Risk Assessment C. Risk Containment D. All of the above • • When we rank risks in terms of their damage causing potential, we are doing A. Risk Containment B. Risk Assessment C. Risk indentification D. Risk Mapping • • Which of the following is not strategies for containment? A. Risk avoiding B. Transfer risk C. Risk indentification D. Risk reduction • • This deals with effectively tracking and controlling the configuration of a software product during its life cycle. A. Software Configuration management B. Software Risk Monitoring C. Gantt chart D. COCOMO • Which of the following are two popular configuration management tools on most UNIX system A. SCCS & RCS

B. SSCS & PCS C. PSCS & PCS D. RCCS & MPI A characteristic of a software system that can lead to a system error is known as? a) Human error or mistake b) System fault c) System error d) System failure

An erroneous system state that can lead to system behavior that is unexpected by system users is known as? a) Human error or mistake b) System fault c) System error d) System failure

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________ a) Human error or mistake b) System fault c) System error d) System failure

A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states? a) Hazard avoidance b) Damage limitation c) Hazard detection d) Hazard detection and removal

An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states? a) Hazard avoidance b) Damage limitation c) Hazard detection d) Hazard detection and removal

An assessment of the worst possible damage that could result from a particular hazard is known as a) Risk b) Hazard probability c) Hazard severity d) Mishap

which of the following terms is a measure of the probability that the system will cause an accident? a) Risk b) Hazard probability c) Accident d) Damage

A weakness in a computer-based system that may be exploited to cause loss or harm is known as? a) Vulnerability b) Attack c) Threat d) Exposure

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems. a) risk b) control c) attack b) asset

The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment. a) True b) False 1. How many stages are there in Risk-driven requirements specification? a) three b) four c) five d) six

Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here? a) Loss of service b) Incorrect service delivery c) System/data corruption d) None of the mentioned

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here? a) Loss of service b) Incorrect service delivery c) System/data corruption d) None of the mentioned

POFOD stands for a) Possibility of failure of data b) Probability of failure of data c) Possibility of failure on demand d) Probability of failure on demand

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period? a) POFOD b) ROCOF

c) AVAIL d) None of the mentioned

Which of the following is not a functional reliability requirement for a system? a) Checking requirements b) Recovery requirements c) Redundancy requirements d) Ambiguous requirements

To specify security requirements, one should identify the risks that are to be dealt with. a) True b) False

The aim of preliminary risk analysis and assessment process is to derive security requirements for the system as a whole. a) True b) False

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions? a) Preliminary risk analysis b) Life-cycle risk analysis c) Operational risk analysis d) All of the mentioned

Which reliability requirements are concerned with maintaining copies of the system? a) Checking requirements b) Recovery requirements c) Redundancy requirements d) Ambiguous requirements

Selection of a model is based on a) Requirements b) Development team & Users c) Project type and associated risk d) All of the mentioned

Which two models doesn’t allow defining requirements early in the cycle? a) Waterfall & RAD b) Prototyping & Spiral c) Prototyping & RAD d) Waterfall & Spiral

Which of the following life cycle model can be chosen if the development team has less experience on similar projects? a) Spiral b) Waterfall

c) RAD d) Iterative Enhancement Model

If you were a lead developer of a software company and you are asked to submit a project/product within a stipulated time-frame with no cost barriers, which model would you select? a) Waterfall b) Spiral c) RAD d) Incremental

Which two of the following models will not be able to give the desired outcome if user’s participation is not involved? a) Waterfall & Spiral b) RAD & Spiral c) RAD & Waterfall d) RAD & Prototyping

A company is developing an advance version of their current software available in the market, what model approach would they prefer ? a) RAD b) Iterative Enhancement c) Both RAD & Iterative Enhancement d) Spiral

One can choose Waterfall Model if the project development schedule is tight. a) True b) False

Choose the correct option from given below: a) Prototyping Model facilitates reusability of components b) RAD Model Model facilitates reusability of components c) Both RAD & Prototyping Model facilitates reusability of components d) None

Spiral Model has high reliability requirements. a) True b) False

10. RAD Model has high reliability requirements. a) True b) False...


Similar Free PDFs