Q: 1
Software inspection is best described as a process for
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Virtualization is a technology that
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following sets of reviews is considered an example of a project phase gate review?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
The modules in the following table were all created two years ago as part of the same software
project
Current Cyclomatic
ModuleVersion Complexity
A
12
9
B
3
21
C
9
4
D
11
20
Which module is the most likely candidate for reengineering?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
One of the objectives of a functional test is to demonstrate that the software
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Ideas and exclusive rights for novel inventions can be protected for a limited time through
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
A project team conducts a review of its latest software design The review process is well-defined and
is used by all projects within the company. As part of the review process, defect levels are compared
against acceptable limits to determine appropriate corrective action. According to the CMMI-DEV
Vl_2_. which of the following activities could the company perform to demonstrate characteristics
unique to a Maturin' Level 5 organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following measures would a project manager use to assess the team’s progress against
the project schedule?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following usage metrics is most effective for capacity planning of a data warehouse?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Software security is developed to address which of the following types of communication threats?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2