Exam 1 Flashcards

1
Q

Generalized Quality Evaluation Models include:

a. Observation-based models
b. Dynamic Models
c. Overall Models
d. Segmented Models
e. Measurement-Driven Predictive Models

A

b
c
d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identifying common errors, which are defined to be missing or incorrect human actions, and blocking them to prevent fault injections

a. Error detection
b. Error blocking
c. Error source removal
d. Error analysis
e. Error change

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quality engineering process include:

a. Quality assessment and improvement
b. Quality Planning
c. Quality assurance activities
d. Quality feedback to stakeholders
e. Quality Deployment Method

A

a
b
c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements is TRUE?

a. The usage of measurement data in generalized models is depicted as a secondary one, because they are not used directly in these models but rather indirectly through the accumulated data as the basis for future adjustment to these models.
b. Direct quality measurements are used as primary measurements in all the product specific models.
c. All three types of indirect quality measurements that are available early in the software development process are used as primary measurements in measurements-driven models.
d. Activity measurements are used directly, thus depicted as a primary usage, to predict quality in observation-based models.
e. When some measurements are used indirectly in some models, or used occasionally but not always, the specific usage is depicted as a secondary one.

A
a
b
c
d
e
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Setting quality goals by matching customer’s quality expectations with what can be economically achieved by the software development organizations in the following sub-steps:

a. Identify quality views and attributes meaningful to target customers and users.
b. Select direct quality measures that can be used to measure the select quality attributes from customer´s perspective.
c. Map the above quality views, attributes and quantitative goals to select a specific set of QA alternatives.
d. Quantify these quality measures to set quality goals while considering the market environment and the cost of achieving different quality goals.
e. Map the above external direct quality measures into internal indirect ones via selected quality models. This step selects indirect quality measures as well as usable models for quality assessment and analysis.

A

a
b
d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which one have highest cost for the different QA alternatives?

a. Testing
b. Defect prevention
c. Formal verification
d. Inspection
e. Failure Containment

A

e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The attached image is an example of:

a. NVP
b. Fault tree Analysis
c. Top Down Analysis
d. Event-tree Analysis

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Root cause analyses can usually take following forms:

a. Semantical analysis
b. Logical analysis
c. Conceptual analysis
d. Statistical analysis
e. All of abode analysis

A

b

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software Maturity index equation is

a. CSI/KLOC
b. 1 - CSI/LOC
c. 1 - CSI/KLOC
d. 1 - KLOC/CSI
e. None of above

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the concept?
QA alternative ….. ???
Testing ……(executable) code
Defect prevention ….. (implementation) activities
Inspection …..Desing, code, and other software artifacts
Formal verification ….. Desing/code with formal specification
Faul tolerance …..(Operational software system
Failure containment …..System with potential accidents
What is the concept?
a. Development Activities
b. Objet
c. Background
d. Defect Perspective

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is generally more suitable than recovery blocks when timely decisions or performance are critical, such as in many real-time control systems, or when software faults, instead of environmental disturbances, are more likely to be the primary sources of problems.

a. N-version programming
b. Fault tolerance with recovery blocks
c. Recovery independence assumption
d. Event recovery technique
e. Failure component recovery

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QIP (quality improvement paradigm) includes the following interconnected steps

a. Understand the baseline so that improvement opportunities can be identified and clear, measurable goals can be set.
b. Introduce process changes through experiments, pilot projects, assess their impact, and fine tune these process changes.
c. Inspections often accompany the transition from one phase to, to another.
d. Identify quality views and attributes meaningful to target customers and user.
e. Package baseline data, experiment results, local experience, and updated process as the way to infuse the findings of the improvement program into the development organization.

A

a
b
e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For example, if defects are penetrative in the system, systematic inspection might be more appropriate than testing because inspection can continue after some defects are detected, unlike in the case of testing which often needs to be stopped once a failure is observed. What is?

a. Defect levels and pervasiveness
b. Problem types
c. Defect perspective
d. Constructive information and guidance for quality improvement
e. None of above

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One key difference between inspection and testing is:

a. Inspection identifies them directly by examining the software artifact, while failures are observed during testing and related faults are identified later by utilizing the recorded execution information.
b. Testing identifies them directly by examining the software artifact, while failures are observed during inspection and related faults are identified later by utilizing the recorded execution information.
c. Testing identifies them directly by examining the software artifact, while inspection is identified failure in runtime
d. Inspection identifies them directly by examining the software artifact, while testing is identified in runtime
e. None of the abode

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
What is the concept?
QA alternative ......?
Testing ..... code
Defect prevention .....Known causes
Inspection ..... S/w artifacts
Formal verification ..... formal specification
Faults tolerance ..... duplication
Failure containmentent ..... Known hazards
a.	Cost
b.	Objet
c.	Applicability
d.	Effectiveness
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process maturity levels in CMM are

a. Ad-hoc
b. Repeatable
c. Defined
d. Managed
e. Optimized

A
a
b
c
d
e
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The original Fagan inspection process (Fagan, 1976) included the following steps for actual inspection preceded inspection planning.

a. Planning
b. Overview Meeting
c. Preparation
d. Inspection
e. Rework

A
a
b
c
d
e
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What of the following sentences is FALSE?

a. The importance of preparation: Many studies pointed out the great influence on inspection effectiveness by well-prepared inspectors and their individual inspections. In fact, the majority of defects discovered during inspection were initially noted by individuals inspectors during their preparation, while the meetings are mainly used to consolidate the individual results to eliminate false alarms and confirm true defects
b. Variations whit team size, moderator role, and session coordination: Depending on the size and complexity of the artifacts to inspected team sizes may be appropriate. This has led to reduced team size for some situation, such as for small pieces of code or small increments in non-traditional (non-waterfall) development processes
c. Defect detection techniques used in inspection: Various defect detection techniques have been proposed and used in inspection. The general idea is that systematic techniques are more likely to uncover defects during inspection than ad hoc checking
d. Additional use of inspection feedback: In addition to correction and direct follow-up actions based on feedback from inspection, the inspection process itself or the overall software development process and product quality can be improved. If root cause analysis is carried out to identify some of the common sources of the defects found during inspection, preventive actions can be carried out to prevent the injection of similar defects in future projects. The performance of these additional analyses or the use of such feedback forms an integral part of some modified inspection processes, such as Gilb inspection.
e. Note of above

A

e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What technique limits defect manifestation to local area to avoid global failures, through the use of some duplication designed into the software systems or their operations?

a. Error de detection
b. Defect detection
c. Fault tolerance
d. Failure containment
e. Hazard analysis

A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Various parallel and post-QA activities are carried out to the quality engineering loop. The primary purpose of these activities is to provide quality assessment and feedback so that various management decisions, such as product release, can be made and possible quality and process improvement initiatives can be carried out. The major activities in this category include:

a. Measurement
b. Analysis and modeling
c. Providing feedback and identifying improvement potentials
d. Follow-up activities
e. None of these

A

a
b
c
d

21
Q

Typically refers to informal check or inspection of technical documents, but in this case, produced by someone else, either organized as individual effort, or as group effort in meetings, conference calls, etc. The focus of these reviews should be on logical and conceptual problems.

a. Desk Check
b. Checklist
c. Review
d. Walkthrough
e. Meeting review

A

c

22
Q

What of the following sentences is TRUE about Gilb inspection?

a. Gilb inspection process propose an additional step, called “process brainstorming”, is added right after the inspection meeting in Fagan inspection. The focus of this step is root cause analysis aimed at preventive actions and process improvement in the form of reduced defect injections for future development activities.
b. The input to the overall inspection process in the product document, rules, checklists, source documents, and kin documents. The emphasis is that any technical documentation, even diagrams, can be inspected.
c. The output from the overall inspection process is the inspected (and corrected) input documents, change requests, and suggested process improvements.
d. The inspection process forms a feedback loop, with the forward part resembling Fagan inspection but with the added step for process brainstorming, and the feedback part consisting of inspection statistics and adjustment to inspection strategies.
e. Checklists are extensively used, particularly for individual checking.

A
a
b
c
d
e
23
Q

What is (are) basic element(s) of Generic Inspection Process.

a. Debugging and fixing
b. Planning and preparation
c. Inspection or collection
d. Correction and follow-up
e. Inspection and feedback

A

b
c
d

24
Q

There are several other special features to Gilb inspection. The inner inspection steps are labeled somewhat differently than in the Fagan inspection, as follows: (mark all that apply)

a. Kickoff
b. Individual checking
c. Logging meeting
d. Rework
e. Follow-up

A

a
b
c
e

25
Q

Fagan inspection teams typically consist of ___ members to allow for the potential benefit of group process to discover defects that would otherwise escape individuals.

a. Three
b. Four
c. Seven
d. Ten
e. A few

A

b

26
Q

See image attached for Axiom A1. What is the meaning?
Axiom A1: {P}→{R}, {R}S{Q}
{P} S{Q}
a. Axiom A1 states if a program works for a given post-condition, does not works for a more restrictive (or stronger) post-condition.
b. Axiom A1 states that if a program works for given pre-condition, it also works for a more restrictive (or stronger) pre-condition
c. Axiom A1 states that a program works for a given pre-condition, it also works for a more restrictive (or stronger) post-condition.

A

b

27
Q

Is the probability of failure-free, operations for the whole system for a given time period or under a given set usage scenarios.

a. Dependability
b. Reliability
c. Fault tolerance
d. Safety
e. Failure Containment

A

b

28
Q
What is the concept?
QA alternative ..... ????
Testig ..... Executions And Failures
Defect ..... Experience
Inspection ..... Faults, already located
Formal verification ..... Faults absence Verified
Faults tolerace ..... (Unanticipated) environnments/usages
Failure containment ..... accident scenarios and hazards
a.	Defect perspective
b.	Object
c.	Information/Measurement
d.	Result interpretation
A

c

29
Q

Which are Generalized Quality Evaluation Models?

a. Overall models
b. Observation-Based models
c. Segmented models
d. Dynamic models
e. Semi-Customized models

A

a
c
d

30
Q
Given the following DRM (defect removal model) table:
Requirement =10%
Design =10%
Coding =40%
Testing =30%
Support =10%
In random inspection we found 18 testing defects. Total defects expected is:
a.	18
b.	60(18/30%)
c.	180
d.	45
e.	Cannot be calculated
A

b

31
Q

Formal review and inspections can also be supported, or substituted in some cases, by other analysis techniques for technical documents for software. Inspection belongs to the category of static analysis techniques that directly analyzes the form and structure of a product without executing the product. Other static and/or formal analysis techniques can also be used, including various formal model based analyses such as:

a. Algorithm analysis
b. Decision table analysis
c. Boundary value analysis
d. Finite-state machine analysis
e. Control flow and data dependency analysis

A
a
b
c
d
e
32
Q

As an example of overall models, defect density can be defined as:

a. Total Defects/Product Size
b. Total Defects/Time Employed
c. Total Defects/(Original LOC + New LOC)
d. Errors/LOC
e. None of the above

A

a

33
Q

As a subset of generalized models, the dynamic models provide information about quality over time or development phases. The most well-known model in this category is the Putnam model (Putnam, 1978), that generalizes empirical effort and defect profiles over time into a Rayleigh curve witch failure rate r=

a. 2Bate^(-at^2)
b. B(1-e^(at^2))
c. Total Defects/KLOC
d. N(1-e^(-bt))
e. 2LS^(-at ^2)/NS

A

a

34
Q

The Diagram attached corresponds to

a. TBRM (tree-based reliability model)
b. SGRM
c. GQM (goal-question-metric paradigm)

A

a

35
Q

When problematic areas are identified by related models, appropriate remedial actions can be applied for quality and process improvement.

a. Measurement
b. Planning process
c. Analysis and modeling
d. Providing feedback and identified improvement potentials
e. Follow-up activities

A

d

36
Q

Product-specific quality assessment models, or product-specific models for short, provide more precise quality assessments using product-specific data. The can be further divided into:

a. Overall Models
b. Semi-Customized Models
c. Observation- Based Models
d. Measurement-Driven Predictive Models
e. Segmented Models

A

b
c
d

37
Q

If a program accepts non-negative input for its input variable X, the precondition can then be described by the logical predicate P

a. P, {X ≥ 0}
b. {P ≡ X ≥ 0}
c. {P = X ≥ 0}
d. {P, ≥ 0}
e. {P = X ≤ 0}

A

a

b

38
Q

____ is the most commonly performed software quality assurance (QA) activity besides testing. Directly detects and corrects software problems without resorting to execution, therefore it can be applied to many types of software artifacts

a. Online Testing
b. Selection, Definition and conformance
c. Root cause analysis
d. Software Inspection
e. Error collection

A

d

39
Q

With formal specifications, the desirable properties for software specifications, the so-called 3Cs can be more easily and sometimes formally analyzed and assured through various formal analysis and verification techniques. What is the meaning of C´s?

a. Compliance, conformance y completeness
b. Completeness, clarity, consistency
c. Clearly, consistency and conformance
d. Compliance, clarity and commitment
e. Completeness, commitment and compliance

A

b

40
Q

See image attached Axiom A2. What is the meaning?
Axiom A2: {P}S{R}, {R}→{{Q}
{P} S{Q}
a. Axiom A2 states that if a program works for a given pre-condition it also works for a less restrictive (or relaxed) pre-condition
b. Axiom A2 states that if program works for a given pre-condition it also works for a less restrictive (or relaxed) post-condition
c. Axiom A2 states that if a program works for a given post-condition it also works for a less restrictive (or relaxed) post-condition

A

C

41
Q

With DRM Table, we found 20 design defects in the current product, we can predict that the total defects will be around 20/10%=200. Which models we use?

a. Overall Model
b. Semi-customized model
c. Mesurement-driven predictive model
d. Observation-based model
e. Segmented Model

A

b

42
Q

What observations are TRUE for formal verification approaches?

a. The difficulty of producing correctness proofs, particularly for loops, where the selection of proper loop invariant plays an important role, but there isn’t a uniform formula for doing the selection. Some heuristics based on people’s understanding prior knowledge, or insight, are typically used to select such invariants. Sometimes, a trial-and-error strategy to consider multiple candidates before a workable solution can be found.
b. In general, many steps are involved in the correctness proofs, and the proof can be fairly long and complicated even for relatively small-sized programs. As a rule of thumb, the length of the proof is typically one order of magnitude longer than the program itself.
c. The proof process can generally benefit some hierarchical structures and related abstractions as guide for different parts, in much of the same way as stepwise abstraction used as a code reading techniques. These abstraction can also help us in dealing with some of the difficulties noted above, such as deriving loop invariant based on abstraction of the loop body.
d. The model checker is a software that runs an algorithm to check the validity of the proposition. If it is checked to be true, a proof is said to be produced. Otherwise, a counterexample is given, much like a failed test case that can be analyzed further for defect fixing.
e. Note of above.

A

a
b
c
d

43
Q

Defect detection techniques include

a. Checklist-based defect detection
b. Scenario-based inspection for detect detection
c. Abstraction-based inspection for defect detection
d. End users’ interview for detect detection
e. All of above

A

a
b
c

44
Q
What is the concept?
QA Alternative ..... ???? 
Testing ..... Failures
Defect prevention ..... Errors and errors sources
Inspection ..... Faults
Formal Verification ..... (absence of) faults
Faults tolerance ..... local failures
Failure containment ..... accidents
a.	Defect Perspective (At Observation)
b.	Object
c.	Expertise Level
d.	Development Phase
A

a

45
Q

In DRM (Defect Removal Model) for defect distribution for previous releases of a product. Which phase has the highest rate

a. Requirement
b. Design
c. Coding
d. Testing
e. Support

A

d

46
Q

Descriptive specifications focus on the properties or conditions associated with software products and their components. For example:

a. Entity-relationship diagrams
b. Logical specifications
c. Algebraic specifications
d. Data flow diagrams
e. UML diagrams

A

a
b
c

47
Q

Which of the following statements is FALSE?

a. The primary purpose of the measurement and analysis activities is to provide feedback and useful information to manage software quality, the quality engineering process, and the overall software development/maintenance process and activities.
b. The feedback and information provided are based on the analysis results using various models on the data collected from the quality assurance (QA) and the general development activities.
c. We define quality assessment models as analytical models that provide quantitative assessment of selected quality characteristics or sub-characteristics based on measurement data from software projects.
d. Such models can help us obtain an objective assessment of our current product quality, in contrast to the often unreliable subjective assessment based on personal judgment or imprecise qualitative assessment.
e. When once applied these models can provide us with an accurate prediction of the future quality, which can be used to help us make project scheduling, resource allocation, and other management decisions.
i. Correct: “When applied over time, these models can …”

A

e

48
Q

Operational specifications focus on the dynamic behavior of the software systems.

a. Entity-relationship diagrams
b. Logical specifications
c. Finite-state Machines
d. Data flow diagrams
e. UML diagrams

A

c
d
e

49
Q

For heterogeneous systems involving computers and related software, the software subsystem and the physical subsystem demonstrate vastly different operational behavior and characteristics. Which tool do you use?

a. Fault tree Analysis
b. Event-tree Analysis
c. Two-frame Model
d. Decision Trees Analysis
e. Component Base Software Engineering

A

c