Which of the following problem-solving tools is most appropriate for breaking down ideas into progressively greater detail?

Which of the following problem-solving tools is most appropriate for breaking down ideas into progressively greater detail?A . Tree diagramB . Matrix diagramC . Affinity diagramD . Relationship diagramView AnswerAnswer: A Explanation: A tree diagram is a tool used to break down broad categories into finer levels of detail. It...

September 1, 2024 No Comments READ MORE +

When the number of failures found during acceptance testing is compared to the number of failures found after release, the result is a measure of

When the number of failures found during acceptance testing is compared to the number of failures found after release, the result is a measure ofA . test effectivenessB . test coverageC . product maintainabilityD . measurement efficiencyView AnswerAnswer: A Explanation: Measuring Test Effectiveness: This involves comparing the number of defects...

August 31, 2024 No Comments READ MORE +

Which module is the most likely candidate for reengineering?

The modules in the following table were all created two years ago as part of the same software project Current Cyclomatic Module Version Complexity Which module is the most likely candidate for reengineering?A . Option aB . Option bC . Option cD . Option dView AnswerAnswer: B Explanation: Reengineering a...

August 31, 2024 No Comments READ MORE +

Under which of the following major Cost of Quality categories would testing a software upgrade be classified?

Under which of the following major Cost of Quality categories would testing a software upgrade be classified?A . AppraisalB . PreventionC . Internal failureD . External failureView AnswerAnswer: A Explanation: Testing a software upgrade is classified under the appraisal category of the Cost of Quality. Appraisal costs are associated with...

August 31, 2024 No Comments READ MORE +

The program manager should be most concerned about which module?

The following graph depicts errors per 1,000 lines of code (KLOC) for modules S, T, U, and V. The program manager should be most concerned about which module?A . SB . TC . UD . VView AnswerAnswer: C Explanation: Error Analysis: Module U has the highest total number of errors...

August 31, 2024 No Comments READ MORE +

Quality function deployment is defined as a

Quality function deployment is defined as aA . procedure in which code modules with low defect density are identified for reuseB . technique for measuring complex metrics by random sampling of functional unitsC . method that provides a framework for relating product features to customer needsD . process in which...

August 30, 2024 No Comments READ MORE +

Which of the following is a responsibility of a lead auditor?

Which of the following is a responsibility of a lead auditor?A . Submitting the audit reportB . Determining the scope of the auditC . Determining the corrective actions requiredD . Performing the initial review of the quality systemView AnswerAnswer: B Explanation: The lead auditor is responsible for determining the scope...

August 30, 2024 No Comments READ MORE +

Which of the following benefits is associated with using the iterative model?

Which of the following benefits is associated with using the iterative model?A . It can be tailored to the needs of the project and organization.B . It does not require knowledge of all the requirements up front.C . It correlates directly to the deliverables of software development.D . It focuses...

August 29, 2024 No Comments READ MORE +

This rating system is based on what type of measurement scale?

A company uses a feature rating system with the following values. 1 = Completely dissatisfied 2 = Somewhat dissatisfied 3 = Neither satisfied nor dissatisfied 4 = Somewhat satisfied 5 = Completely satisfied This rating system is based on what type of measurement scale?A . NominalB . OrdinalC . IntervalD...

August 28, 2024 No Comments READ MORE +

Software security is developed to address which of the following types of communication threats?

Software security is developed to address which of the following types of communication threats?A . Intentional attacksB . Unintentional attacksC . Physical attacksD . Natural disastersView AnswerAnswer: A Explanation: Software security is designed to protect systems and data from various types of communication threats. These threats can be categorized as:...

August 28, 2024 No Comments READ MORE +