Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Roenoke
R
Roenoke
Community Contributor
Quizzes Created: 1 | Total Attempts: 139
| Attempts: 139 | Questions: 169
Please wait...
Question 1 / 169
0 %
0/100
Score 0/100
1. Which metric attribute specifies that data needs to be collected on a schedule?

Explanation

The metric attribute that specifies that data needs to be collected on a schedule is "Timely". This means that the data should be collected at regular intervals or within a specific timeframe to ensure that it is up-to-date and relevant. Collecting data on a schedule allows for better analysis, decision-making, and monitoring of performance over time. It also helps in identifying trends, patterns, and potential issues in a timely manner.

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

The '3D054 Volumes 1 & 2' quiz assesses key skills for Air Force personnel, focusing on responsibilities and safety standards. It covers roles like team leaders, identifies programming errors, and emphasizes the importance of operational risk management.

Personalize your quiz and earn a certificate with your name on it!
2. Persistence is

Explanation

Persistence refers to the ability of an object to continue existing and maintaining its state, behavior, and identity. This means that even after the object is no longer actively being used or accessed, it still retains its data and properties. Persistence is important in many applications, such as storing data in databases or saving progress in a video game. By maintaining its state, behavior, and identity, the object can be retrieved and used again later, ensuring continuity and consistency in the application or system.

Submit
3. The ability of two or more classes of objects to respond to the same message, each in its own way is known as

Explanation

Polymorphism refers to the ability of objects of different classes to respond to the same message, each in its own way. It allows objects to be treated as instances of their own class or as instances of their superclass, providing flexibility and reusability in object-oriented programming. This concept is essential in achieving code modularity, extensibility, and abstraction.

Submit
4. What is the DFD ordering rule?

Explanation

The DFD ordering rule states that data flow is processed as it is received, meaning that it is processed in the order it arrives. However, data in a data store can be accessed at any time and in any order, indicating that there is no specific order in which data in a data store needs to be accessed. This rule helps ensure that the flow of data within a system is efficient and follows a logical sequence.

Submit
5. The purpose of information hiding is to

Explanation

The purpose of information hiding is to make nonessential details transparent to the user. This means that the user does not need to be concerned with the inner workings or implementation details of a module. By hiding these nonessential details, it allows for easier understanding and use of the module, as the user can focus on the essential functionality without being overwhelmed by unnecessary information. Additionally, information hiding also helps to reduce the details that programmers need to worry about at any given level, allowing for more efficient and manageable development.

Submit
6. The best method to determine if the security features of a database system are working is to

Explanation

Periodically performing security audits is the best method to determine if the security features of a database system are working effectively. By conducting regular audits, any vulnerabilities or weaknesses in the system can be identified and addressed promptly. These audits involve assessing the system's security controls, permissions, user access levels, and monitoring activities to ensure that the database is protected against potential threats and unauthorized access. This proactive approach helps in maintaining the integrity and confidentiality of the data stored in the database system.

Submit
7. Which member of the PDR team can be thought of as the coach?

Explanation

The moderator can be thought of as the coach because they are responsible for guiding and facilitating the team's discussions and decision-making processes. They ensure that everyone's opinions are heard and that the team stays focused on their goals. Like a coach, the moderator helps the team members work together effectively and overcome any challenges they may face.

Submit
8. What assumes the use of a public key cryptography?

Explanation

Public Key Infrastructure (PKI) assumes the use of public key cryptography. PKI is a system that enables secure communication by using public key cryptography to authenticate and encrypt data. Public key cryptography involves the use of a pair of keys, a public key for encryption and a private key for decryption. PKI relies on this cryptographic system to ensure the confidentiality, integrity, and authenticity of data transmitted between users and components. Therefore, PKI assumes the use of public key cryptography to establish a trusted and secure communication environment.

Submit
9. What is methodology?

Explanation

not-available-via-ai

Submit
10. A characteristic or quality is known as

Explanation

An attribute refers to a characteristic or quality of something. It is a term commonly used in various fields such as programming, statistics, and database management. In programming, an attribute is a variable or property that defines the characteristics or behavior of an object. It provides additional information about an object's state or behavior. Therefore, the given correct answer, "an attribute," accurately describes a characteristic or quality.

Submit
11. The software system that is effcient when it operates using available resources optimally defines the software egineering goal of

Explanation

Efficiency is the correct answer because the question is asking for the software engineering goal that focuses on the optimal utilization of available resources. Efficiency in software engineering refers to the ability of a software system to perform its tasks using the least amount of resources, such as memory, processing power, and time. By operating efficiently, the software system can maximize its performance and minimize any wastage or unnecessary resource consumption. Therefore, efficiency aligns with the goal of utilizing available resources optimally.

Submit
12. Having only one way to interpret the metric describes which attribute?

Explanation

The correct answer is "Unambiguously defined" because when a metric has only one way to interpret it, it means that there is no ambiguity or confusion about its meaning. This attribute is important because it ensures that everyone who is using the metric understands it in the same way, leading to better communication and decision-making.

Submit
13. In Visual Basic, it is impossible to 

Explanation

In Visual Basic, dividing a number by zero is not allowed because it results in an error known as "DivideByZeroException". This error occurs because dividing any number by zero is mathematically undefined. Therefore, attempting to divide by zero in Visual Basic will always result in an error.

Submit
14. Which software engineering principle tells us that related modules should be in the same physical part of the program?

Explanation

Localization is the software engineering principle that tells us that related modules should be in the same physical part of the program. This principle emphasizes the importance of organizing and grouping related modules together, making it easier to understand and maintain the codebase. By localizing related modules, it enhances code readability, reduces complexity, and promotes better code organization and structure.

Submit
15. Approximately what percentage of all accidents is due to human error?

Explanation

The correct answer is 95%. This suggests that a large majority of accidents are caused by human error. This implies that human factors such as negligence, distraction, or lack of skill play a significant role in accidents, while other factors like mechanical failure or environmental conditions have a lesser impact. This statistic emphasizes the importance of improving human behavior, training, and awareness to reduce the occurrence of accidents.

Submit
16. Which reference can only be used inside a DO/Loop statement?

Explanation

The reference "Exit Do" can only be used inside a DO/Loop statement. This statement is used to prematurely exit the loop and continue with the next line of code after the loop. It allows the program to skip the remaining iterations of the loop and move on to the next section of code. The other options, "Exit For", "Exit Sub", and "Exit Function", are used to exit a For loop, a Subroutine, and a Function respectively.

Submit
17. What are reserved words?

Explanation

Reserved words are words that have a special meaning in a specific programming language. These words are reserved by the language and cannot be used for any other purpose, such as variable names or function names. They are typically used to define the syntax and structure of the language, and using them for any other purpose would result in a syntax error. Examples of reserved words in programming languages include "if", "while", "for", "int", "float", etc. These words are essential for writing code that follows the rules and conventions of the language.

Submit
18. How is the data flow represented on a DFD?

Explanation

On a Data Flow Diagram (DFD), the data flow is represented by arrows. These arrows indicate the direction in which data is moving between different processes, entities, and data stores. The arrows show the flow from a source (such as an entity or a process) to a destination (such as a process or a data store). This representation helps to visualize the movement of data within a system and understand how different components interact with each other.

Submit
19. What are the two types of Assembly language statements?

Explanation

Assembly language statements can be categorized into two types: executable and directive. Executable statements are instructions that are executed by the computer's processor, such as arithmetic operations or control flow instructions. On the other hand, directive statements provide instructions to the assembler itself, rather than being executed by the processor. These directives are used to define data, allocate memory, or control the assembly process. Therefore, the correct answer is "Executable and Directive".

Submit
20. What still needs to be the Air Force's major goal toe improve flexibility over the life of the system and comply with standards?

Explanation

Open architecture is the correct answer because it refers to a system design approach that allows for interoperability and flexibility. By adopting open architecture, the Air Force can ensure that their systems can easily integrate with other systems and technologies, making it easier to adapt and upgrade them over time. This approach also helps the Air Force comply with industry standards, as open architecture systems are often designed to be compatible with established protocols and interfaces. Therefore, open architecture is crucial for improving flexibility and ensuring long-term viability of the Air Force's systems.

Submit
21. A related collection of records is a

Explanation

A related collection of records is referred to as a file. A file is a container that holds related data records, which can be accessed and manipulated by computer programs. It is a common way to organize and store data in a structured manner. Files can be stored on various storage devices such as hard drives, solid-state drives, or cloud storage. They allow efficient storage, retrieval, and management of data, making it easier for applications to access and process the information they need.

Submit
22. In which step of the OOD is an object list created?

Explanation

In the step of identifying the objects in the OOD (Object-Oriented Design) process, an object list is created. This step involves analyzing the problem domain and determining the relevant objects or entities that will be part of the solution. The object list helps in understanding the structure and behavior of the system, and serves as a foundation for further design and implementation steps.

Submit
23. Which E-R can have one entity occurrence of the first type relating to zero, one, or multiple occurrences of the second type, as well as one occurrence of the second type relating to zero, one, or multiple occurrences of the first type?

Explanation

A many-to-many relationship in an entity-relationship (E-R) model allows for one entity occurrence of the first type to be related to zero, one, or multiple occurrences of the second type, and vice versa. This means that multiple instances of the first type can be associated with multiple instances of the second type, creating a many-to-many relationship between the two.

Submit
24. What is commonly used during the sturctured code development process to give details of a funtional primitive?

Explanation

Structured English is commonly used during the structured code development process to give details of a functional primitive. Structured English is a form of pseudocode that uses a combination of natural language and programming constructs to describe the logic and flow of a program. It helps in breaking down complex algorithms into smaller, more manageable steps, making it easier to understand and implement. Using structured English allows developers to communicate the intended functionality of a program in a clear and concise manner, facilitating the development process.

Submit
25. Secure Socket Layer (SSL) uses strong cryptography to ensure

Explanation

SSL (Secure Socket Layer) is a protocol that uses strong cryptography to provide secure communication over the internet. It ensures authentication by verifying the identity of the server and sometimes the client. It also provides confidentiality by encrypting the data transmitted between the client and the server, making it unreadable to anyone who intercepts it. Additionally, SSL ensures integrity by using digital signatures to verify that the data has not been tampered with during transmission. Therefore, the correct answer is authentication, confidentiality, and integrity.

Submit
26. Which configuration management goal is based on "time is money"?

Explanation

The goal of "Maximize productivity by minimizing mistakes" in configuration management is based on the principle that time is money. By minimizing mistakes and promoting productivity, organizations can save time and resources, ultimately leading to cost savings. This goal emphasizes the importance of efficient and error-free processes in order to maximize productivity and achieve cost-effectiveness.

Submit
27. Why is a file system considered expensive?

Explanation

A file system is considered expensive because a single change in the system may require multiple changes to be made. This means that even a small modification can have a significant impact and require a lot of resources to implement. This can result in increased costs in terms of time, effort, and potentially additional hardware or software requirements.

Submit
28. Which type of software maintenance requires fixing defective software or errors in a program?

Explanation

Corrective software maintenance refers to the process of fixing defective software or errors in a program. This type of maintenance is focused on identifying and resolving issues that have been identified in the software, ensuring that it functions as intended and meets the desired requirements. It involves debugging, troubleshooting, and making necessary modifications to eliminate any defects or errors in the software. Corrective maintenance is crucial for ensuring the reliability, stability, and performance of the software.

Submit
29. A person, place, thing, or a physical or conceptual entity is known as

Explanation

An object refers to a person, place, thing, or a physical or conceptual entity. It is a fundamental concept in object-oriented programming and represents a specific instance of a class. Objects have their own unique properties and behaviors, which are defined by the class they belong to. They can interact with other objects and perform actions based on their defined functionalities.

Submit
30. When conducting a system study, which statement best describes something you look for?

Explanation

During a system study, the main focus is to identify the areas where the current system is not meeting its objectives. This involves analyzing the shortcomings and deficiencies of the system in order to determine what needs to be improved or changed. By understanding where and how the current system fails to meet the present objective, it becomes possible to develop a more effective and efficient system that aligns with the desired goals.

Submit
31. Why do programmer prefer using Assembly language over machine language?

Explanation

Programmers prefer using Assembly language over machine language because it is much easier to write. Machine language consists of binary code that is difficult for humans to understand and manipulate directly. Assembly language, on the other hand, uses mnemonic codes and symbolic representations that are easier for programmers to work with. This allows them to write and debug code more efficiently, resulting in faster development and fewer errors.

Submit
32. Regarding stack management and programming, how many bytes of data are PUSHed onto the stack at a time?

Explanation

In stack management and programming, 2 bytes of data are PUSHed onto the stack at a time. This means that when a value is pushed onto the stack, it occupies 2 bytes of memory. The stack is a data structure that follows the Last-In-First-Out (LIFO) principle, and it is commonly used for storing local variables, function calls, and return addresses in a program. By pushing data onto the stack, it allows for efficient memory management and organization within the program.

Submit
33. How do subroutines make Assembly language programming easier?

Explanation

Subroutines make Assembly language programming easier by eliminating repetitive code. Subroutines allow programmers to define a block of code that can be reused multiple times throughout the program. Instead of writing the same code over and over again, the programmer can simply call the subroutine whenever it is needed. This not only reduces the amount of code that needs to be written but also makes the program more modular and easier to understand and maintain.

Submit
34. What is the overall goal when you are selecting a DD?

Explanation

The overall goal when selecting a DD is to choose the dictionary that fulfills the most requirements. This means considering all the necessary criteria and selecting the option that meets as many of these requirements as possible. By doing so, you can ensure that the chosen DD will be able to fulfill the desired objectives and functions effectively.

Submit
35. Operational risk management is a

Explanation

Operational risk management is a decision-making process that involves systematically evaluating possible courses of action. It helps organizations identify potential risks and develop strategies to mitigate them. By considering various options and their potential outcomes, operational risk management enables organizations to make informed decisions that can minimize the likelihood of occupational injuries and illnesses, enhance readiness, and accomplish their mission effectively.

Submit
36. What graphical file format is considered as a de facto standard form of image on the Internet?

Explanation

The correct answer is Graphics Interchange Format (GIF). GIF is considered as a de facto standard form of image on the Internet because it supports animation and has a small file size, making it ideal for web graphics. It uses lossless compression, which means that the image quality is not compromised even after compression. Additionally, GIF also supports transparency, allowing images to have a transparent background.

Submit
37. Which Visual Basic variable type is used to declare new variables?

Explanation

The Dim statement is used in Visual Basic to declare new variables. It allows the programmer to specify the name and data type of the variable. By using the Dim statement, the programmer can create variables of different types such as integers, strings, or objects. This statement is essential for defining and initializing variables before they are used in the program.

Submit
38. Which Visual Basic component tests for a specific condition, range of conditions, or lack of certain conditions based on a truth value?

Explanation

The If Statement in Visual Basic is used to test for a specific condition or range of conditions based on a truth value. It allows the program to execute a certain set of code if the condition is true, and a different set of code if the condition is false. This statement is commonly used for decision-making and controlling the flow of the program based on different conditions.

Submit
39. What is a commonly used protocol for managing the security of a message transmission on the Internet?

Explanation

SSL is a commonly used protocol for managing the security of a message transmission on the Internet. It provides encryption and authentication mechanisms to ensure that data transmitted between a client and a server remains secure and private. SSL uses digital certificates to verify the identity of the server and establish a secure connection. It is widely used for securing sensitive information such as credit card details, login credentials, and other personal data transmitted over the internet.

Submit
40. What part of the DBMS contains the data structures found in a database?

Explanation

The data library in a DBMS contains the data structures found in a database. This refers to the collection of data files and related metadata that store and organize the actual data in a structured manner. The data library is responsible for managing and accessing the data stored in the database, allowing users to perform operations such as querying, updating, and deleting data. It provides the necessary infrastructure for efficient storage and retrieval of data, ensuring data integrity and security.

Submit
41. What provides flexible and simple-to-use information retrieval capability to any functional area that requires information contained in a database?

Explanation

Retrieval packages provide flexible and simple-to-use information retrieval capability to any functional area that requires information contained in a database. These packages are designed to efficiently retrieve specific data from a database based on user requirements. They offer a user-friendly interface and various search and filter options to easily access the required information. Retrieval packages enable users to retrieve data without the need for complex coding or technical expertise, making them a valuable tool for accessing database information in different functional areas.

Submit
42. What can programmers do to prevent wasting time looking for the right version of a program?

Explanation

To prevent wasting time looking for the right version of a program, programmers should avoid having multiple copies of the program. By keeping only one copy of the program, it becomes easier to locate and access the correct version when needed. This helps in streamlining the software development process and reduces the chances of confusion or errors caused by working with outdated or incorrect versions of the program.

Submit
43. Data items arranged in the order in which they were stored and the same manner that they will be addressed describes the use of a/an

Explanation

An ordered list is a data structure in which the data items are arranged in the order they were stored and will be addressed. This means that the elements are stored sequentially and accessed in a specific order. Unlike a linked list, an ordered list does not require any pointers or references to connect the elements. It provides efficient searching and retrieval of elements based on their position in the list. Therefore, an ordered list is the most suitable choice for the given description.

Submit
44. What do the participants of a PDR do with the design documentation?

Explanation

Participants of a PDR (Preliminary Design Review) use the design documentation to obtain a clear understanding of the program design, its intent, and its logic. This helps them to assess the feasibility of the system and make informed decisions. It also allows them to identify any areas of improvement in the test process and ensure that the program is error-free. By understanding the design, participants can effectively evaluate the overall functionality and effectiveness of the program.

Submit
45. Which quality metric includes measuring the likelihood of unexpected behavior?

Explanation

Reliability is the quality metric that includes measuring the likelihood of unexpected behavior. Reliability refers to the ability of a system or component to perform its required functions under stated conditions for a specified period of time. In the context of measuring the likelihood of unexpected behavior, reliability focuses on assessing the system's ability to consistently deliver the intended results without any unexpected failures or errors. Therefore, reliability is the most appropriate quality metric for measuring the likelihood of unexpected behavior.

Submit
46. In situations where the possbility of a visual basic run-time error cannot be eliminated, develop

Explanation

In situations where the possibility of a visual basic run-time error cannot be eliminated, effective exception handlers are developed. Exception handlers are used to catch and handle any errors that may occur during the execution of a program. They allow the program to gracefully handle errors and prevent them from crashing or causing unexpected behavior. By implementing effective exception handlers, the program can handle errors in a controlled manner, providing appropriate feedback to the user and ensuring the program continues to run smoothly.

Submit
47. When developing exception handlers and using multiple Catch blocks, which one should be put first?

Explanation

When developing exception handlers and using multiple Catch blocks, the most specific exception should be put first. This is because when an exception occurs, the program will check each Catch block in order until it finds a match. If a more general exception is placed before a specific one, the specific exception will never be reached because the general exception will catch it first. Therefore, to ensure that the correct Catch block is executed for a specific exception, it should be placed before any more general exceptions.

Submit
48. A composite of subsystems, assemblies, skills, and techniques capable of performing or supporting an operational role best defines a

Explanation

A system is a composite of subsystems, assemblies, skills, and techniques that work together to perform or support a specific operational role. It encompasses various components and elements that are integrated to achieve a common goal or function. This definition aligns with the given answer choice "system."

Submit
49. What is the term used to identify how data is stored on the stack?

Explanation

The term used to identify how data is stored on the stack is "First-in, Last-out" (FILO). This means that the first item pushed onto the stack will be the last one to be popped off. It follows the principle of last in, first out, where the most recently added item is the first one to be removed. This is commonly used in stack data structures, where elements are added and removed in a specific order.

Submit
50. What must be considered when evaluating DD software applications?

Explanation

When evaluating DD software applications, the purpose of the software must be considered. This is important because different software applications serve different purposes and have different functionalities. Evaluating the purpose of the software helps determine if it aligns with the specific needs and requirements of the user or organization. It ensures that the software will be able to fulfill the intended tasks and provide the desired outcomes.

Submit
51. Which is not one of the advantages of implementing an open system?

Explanation

Implementing an open system does not reduce the need for standards. In fact, open systems often rely on standardized protocols and interfaces to ensure compatibility and interoperability between different components and systems. Standards are crucial for enabling communication and collaboration within an open system environment. Therefore, reducing the need for standards is not an advantage of implementing an open system.

Submit
52. Which E-R can have one entity occurrence of the first type that can relate to, at most, one entity occurrence of the second type and vice versa?

Explanation

A one-to-one relationship in an entity-relationship (E-R) model means that one entity occurrence of the first type can only relate to, at most, one entity occurrence of the second type, and vice versa. This type of relationship ensures a unique and direct connection between the two entities, where each entity has a single counterpart in the other entity type. It is often used when there is a strict one-to-one correspondence between the entities being modeled.

Submit
53. Which Visual Basic window is used to control an object's characteristics?

Explanation

The Properties window in Visual Basic is used to control an object's characteristics. It allows the programmer to view and modify various properties of an object, such as its size, color, font, and behavior. By selecting an object and accessing its properties through the Properties window, the programmer can customize the appearance and functionality of the object in their application.

Submit
54. What is also referred to as the subscript of a Visual Basic array?

Explanation

The subscript of a Visual Basic array is also referred to as the index. It is used to access individual elements within the array by specifying their position.

Submit
55. What is a key concept that can help you save significant amounts of time and money in future programming projects?

Explanation

The key concept that can help save significant amounts of time and money in future programming projects is "reuse". Reusing code or components that have already been developed and tested can save time by eliminating the need to write new code from scratch. It also saves money as it reduces the development effort and resources required. By reusing existing code, developers can leverage the knowledge and experience gained from previous projects, resulting in more efficient and cost-effective development processes.

Submit
56. Which of the following contains the initial system requirements or internal and external interfaces?

Explanation

The design document contains the initial system requirements or internal and external interfaces. This document outlines the overall structure and architecture of the software system being developed. It includes information about the system requirements, such as hardware and software specifications, as well as any interfaces that the system needs to interact with. The design document serves as a blueprint for the development team and helps ensure that all stakeholders have a clear understanding of the system's design and functionality.

Submit
57. The effort required to transfer a program from one hardware configuration to another is the definition of which software quality attribute?

Explanation

Portability is the software quality attribute that defines the effort required to transfer a program from one hardware configuration to another. This means that a portable program can be easily moved or transferred to different systems or platforms without significant modifications or adaptations. It ensures that the program can run efficiently and effectively on different hardware environments, allowing for flexibility and ease of use across various devices or systems.

Submit
58. What inpact does open systems architecture have on a re-engineering effort, if any?

Explanation

Open systems architecture refers to a system that is built using standardized, interoperable components and interfaces. This allows for easier integration and interchangeability of hardware and software components. In the context of a re-engineering effort, implementing an open systems architecture can lead to cost savings. It reduces the dependence on proprietary systems and vendors, thereby increasing competition and driving down prices. Additionally, open systems architecture simplifies hardware maintenance and support, making it more cost-effective. Therefore, choosing an open systems architecture can result in a cheaper re-engineering effort, including reduced hardware maintenance and support costs.

Submit
59. Which Visual Basic components are complete units of code, use expressions to describe an action, make a declaration, or identify an object?

Explanation

The correct answer is "Statement" because statements in Visual Basic are complete units of code that perform a specific action or operation. They can be used to make decisions using the If statement, add comments using the Rem statement, or perform different actions based on different conditions using the Select Case statement. Statements are essential in programming as they allow the programmer to control the flow of the program and perform various tasks.

Submit
60. How many months of OJT must a member have before being upgraded to the 7 skill level?

Explanation

To be upgraded to the 7 skill level, a member must have 12 months of OJT. This means that they need to complete a full year of on-the-job training before they can progress to the 7 skill level. This duration allows the member to gain sufficient experience and knowledge in their field to reach the required skill level for the upgrade.

Submit
61. In which database design funtion is the general level organization of the database prepared?

Explanation

The general level organization of the database is prepared in the database structure. This refers to the overall architecture and layout of the database, including the tables, relationships between tables, and the fields within each table. The database structure determines how data is stored, organized, and accessed within the database system. It provides a framework for efficient storage and retrieval of data, ensuring data integrity and consistency.

Submit
62. What Visual Basic statement allows you to build class objects and implement features?

Explanation

The Visual Basic statement "Implement" allows you to build class objects and implement features. This statement is used to define and implement the members of a class, such as methods, properties, and events. By using the "Implement" statement, you can specify the functionality of the class and define how it interacts with other objects in the program.

Submit
63. Which skill level may be assigned to job positions such as team leaders or shift supervisors?

Explanation

Journeyman may be assigned to job positions such as team leaders or shift supervisors because they have acquired a high level of skill and expertise in their trade through years of experience and training. They have demonstrated proficiency in their field and are capable of leading a team or supervising others. The term "journeyman" typically refers to someone who has completed an apprenticeship and is now considered a skilled worker in their trade.

Submit
64. The user defines the physical characteristics of the file to be accessed by the retrieval package through the use of

Explanation

The user defines the physical characteristics of the file to be accessed by the retrieval package through the use of parameters. Parameters are variables that are used to pass information to a program or function. In this context, the user can specify specific parameters that define the physical characteristics of the file, such as its location, size, format, or other relevant attributes. These parameters help the retrieval package to accurately locate and access the desired file based on the user's specifications.

Submit
65. What question would a quality metric ask?

Explanation

A quality metric would ask "How good is the product?" because a quality metric is used to measure the overall quality or performance of a product. This question encompasses various aspects such as reliability, functionality, usability, and customer satisfaction. It evaluates the product's ability to meet the desired standards and expectations, making it a suitable question for a quality metric.

Submit
66. Which quality metric is enhanced with simplified design, simpler data structures, and comments?

Explanation

Maintainability is enhanced with a simplified design, simpler data structures, and comments. Simplifying the design makes it easier to understand and modify the code, while simpler data structures make the code more efficient and easier to maintain. Comments provide additional information and explanations, making it easier for developers to understand and work with the code. All of these factors contribute to the overall maintainability of the codebase.

Submit
67. The ability to learn, operate, prepare input, and interpret output is the definition of which software quality attribute?

Explanation

Usability refers to the ease of use and learnability of a software system. It includes the ability to learn and operate the software, as well as prepare input and interpret output. This means that a software system with good usability allows users to easily understand and interact with it, making it efficient and effective to use. Therefore, the given correct answer, Usability, aligns with the definition provided in the question.

Submit
68. Another structure name for a network is

Explanation

not-available-via-ai

Submit
69. What do we call the method of communication between the microprocessor and other system devices?

Explanation

The method of communication between the microprocessor and other system devices is called the interrupt system. This system allows the microprocessor to pause its current task and handle a higher-priority task or request from a device. Interrupts are used to signal events or conditions that require immediate attention, such as an input from a keyboard or a request from a peripheral device. By using the interrupt system, the microprocessor can efficiently handle multiple tasks and ensure timely responses to external events.

Submit
70. Data stores are

Explanation

Data stores are time-delayed repositories of data, meaning that they are locations where data is stored for a certain period of time before being accessed or used. This suggests that data stores are not real-time sources of data, but rather hold information that may have been collected or generated at an earlier point in time. The term "repositories" implies that data stores serve as centralized locations for storing and organizing data. Therefore, the correct answer is that data stores are time-delayed repositories of data.

Submit
71. What consists of Visual Basic menu bars, toolbars, and form windows?

Explanation

The Visual Basic menu bars, toolbars, and form windows make up the Graphical User Interface (GUI). GUI refers to the visual elements of a software application that allow users to interact with the program. In Visual Basic, the menu bars provide access to various commands and options, the toolbars contain shortcuts to frequently used tools, and the form windows display the user interface components such as buttons, text boxes, and labels. Therefore, the correct answer is Graphical User Interface.

Submit
72. Which Visual Basic variable type is used to assign values to variables?

Explanation

The Let statement is used in Visual Basic to assign values to variables. It allows you to explicitly state the variable name and the value you want to assign to it. This statement is commonly used when you want to assign a specific value to a variable or when you need to update the value of a variable. The Dim statement, on the other hand, is used to declare variables and allocate memory for them, but it does not assign values to variables. Logical operators and comparison operators are used for performing logical and comparison operations, respectively, and are not directly related to assigning values to variables.

Submit
73. What is a colleciton of data that has a logical interrelationship and is organized in a specific manner?

Explanation

A database is a collection of data that is organized in a specific manner and has a logical interrelationship. It allows for the efficient storage, retrieval, and manipulation of data. Unlike a file control system or a database maintenance system, a database management system provides tools and functionalities to manage and control the database efficiently. Therefore, the correct answer is a database management system.

Submit
74. What is a toolkit?

Explanation

A toolkit refers to a loosely integrated collection of products that can be easily extended by combining various tools. This means that a toolkit is not a single tool or software, but rather a combination of multiple tools that work together to provide a comprehensive solution. These tools can be added or removed as needed, allowing for flexibility and customization. The term "loosely integrated" suggests that the tools may not be tightly connected or dependent on each other, but can still work together effectively. This type of toolkit enables users to have a wide range of options and adaptability in their workflow.

Submit
75. Which file system problem has the same data item stored in many different places?

Explanation

Redundancy refers to the problem of having the same data item stored in multiple different places within a file system. This can lead to inefficiency and increased storage requirements. It is considered a problem because it can make it more difficult to manage and update data, as changes need to be made in multiple locations. Additionally, redundancy can increase the risk of data inconsistency and errors, as updates made in one location may not be reflected in others. Therefore, redundancy is a file system problem that should be avoided or minimized.

Submit
76. In the random access method, calculating the address by adding one or more record key positions to an already extracted position of the key is called

Explanation

In the random access method, calculating the address by adding one or more record key positions to an already extracted position of the key is called folding. Folding involves taking the key value and dividing it into smaller parts, which are then added together to determine the address. This method allows for efficient access to specific records within a large dataset.

Submit
77. Which software engineering goal acts like a bridge between the problem and its solution?

Explanation

Understandability is the software engineering goal that acts as a bridge between the problem and its solution. It refers to the ability of the software to be easily comprehended by humans, including the users, developers, and maintainers. When software is understandable, it enables effective communication and collaboration between stakeholders, facilitates problem-solving, and reduces the chances of errors and misunderstandings. It ensures that the solution is clear and can be easily interpreted and modified if needed.

Submit
78. What do you examine your program for during desk checking?

Explanation

During desk checking, you examine your program for logic, clerical errors, and clarity. This means that you review the program's logical flow and ensure that it follows the intended logic and produces the expected results. Additionally, you check for any clerical errors, such as typos or syntax mistakes, that may affect the program's functionality. Lastly, you assess the clarity of the program, making sure that it is easily understandable and well-documented for future reference.

Submit
79. What does a DFD change of organization mean?

Explanation

A DFD change of organization means that the output data remains the same as the input data, but the way the data is organized or arranged is different. This could involve reordering the data, grouping it differently, or presenting it in a different format. The actual data values themselves do not change, only their arrangement.

Submit
80. What are the four general purpose registers in the central processing unit (CPU)?

Explanation

The four general purpose registers in the central processing unit (CPU) are AX, BX, CX, and DX. These registers are used to store data and perform arithmetic and logical operations. Each register has a specific purpose, such as AX being used for arithmetic operations, BX for memory addressing, CX for loops and shifts, and DX for input/output operations. These registers are essential for the CPU to execute instructions and process data efficiently.

Submit
81. An open system architecture means the software is

Explanation

An open system architecture refers to software that can be easily transferred and used on different hardware platforms or operating systems without being reliant on them. This means that the software is not tied closely to a specific operating system and can be easily ported to different memory configurations. It is designed to be flexible and adaptable, allowing for seamless use across various platforms without being restricted or dependent on any specific hardware or operating system.

Submit
82. Which statement is correct of applying quality assurance to the software life cycle?

Explanation

During the software life cycle, quality assurance is applied to ensure that the coding phase aligns with the specifications set during the design phase. This means that the work done in the coding phase is checked to ensure that it meets the requirements and objectives outlined in the design phase. By doing so, any discrepancies or errors can be identified and corrected, ensuring that the final product meets the desired quality standards.

Submit
83. When applying software quality assurance practices, in which phase do you verify that the implemented system achieves the goals specified during the design phase?

Explanation

During the testing phase of software quality assurance practices, the implemented system is verified to ensure that it achieves the goals specified during the design phase. This phase involves executing various test cases and scenarios to identify any defects or issues in the system. By conducting thorough testing, the quality assurance team can ensure that the system meets the desired requirements and functions correctly.

Submit
84. What function of interrupt 10h is the routine that reads the attribute and character from the current position of the cursor?

Explanation

Interrupt 10h is a BIOS interrupt that provides various video services. The function 08 is responsible for reading the attribute and character from the current position of the cursor. This means that when this function is called, it retrieves the color attribute and the ASCII value of the character at the current cursor position on the screen.

Submit
85. The warfare and warfare support systems technical reference model (WWSS TRM) is

Explanation

The correct answer is "a living document that will be periodically updated". This means that the warfare and warfare support systems technical reference model (WWSS TRM) is not a static document, but rather one that will be continuously revised and updated over time. This allows for the incorporation of new technologies, changes in standards, and advancements in warfare and warfare support systems. By periodically updating the document, it ensures that it remains relevant and up to date with the current state of technology and requirements in the field.

Submit
86. During document flow analysis, what can you use to show particular items in a system that personal interviews cannot achieve?

Explanation

Graphical representation can be used during document flow analysis to show particular items in a system that personal interviews cannot achieve. Graphical representation provides a visual representation of the system and its flow, making it easier to understand and analyze complex processes. It allows for a clear and concise representation of the relationships between different components and activities within the system, which may not be effectively conveyed through personal interviews alone. This visual representation helps in identifying bottlenecks, inefficiencies, and potential improvements in the system, providing valuable insights during the analysis process.

Submit
87. Which testing technique validates the basic software unit?

Explanation

Unit testing is a testing technique that focuses on validating the basic software unit. It involves testing individual components or modules of the software to ensure that they are functioning correctly. This technique helps identify any defects or errors in the unit and allows for early detection and resolution. Unit testing is typically performed by developers and is an essential part of the software development process to ensure the quality and reliability of the software.

Submit
88. The focus of the tri-service open systems architecture working group is to

Explanation

The correct answer is "adopt a paradigm for the development for all warfare and warfare support systems among the services". This means that the focus of the tri-service open systems architecture working group is to establish a common framework or model for the development of warfare and warfare support systems that can be used by all the different services. This would ensure that all services are on the same page and follow the same standards and guidelines when developing these systems, promoting interoperability and collaboration among the services.

Submit
89. Which of the following is not a responsibility of Air Force Occupational Safety and Health Standards?

Explanation

The responsibility of Air Force Occupational Safety and Health Standards does not include analyzing risk control measures. This means that it is not their responsibility to assess or evaluate the effectiveness of measures put in place to mitigate risks. Their responsibilities, as stated in the other options, include using risk management to identify and reduce risks, notifying supervisors about job-related injuries or health issues, and reporting any job-related injuries or exposure to hazardous materials.

Submit
90. What should be ignored on a DFD?

Explanation

On a Data Flow Diagram (DFD), initialization and termination details should be ignored. These details refer to the specific steps involved in starting and ending a process or system, such as initializing variables or closing database connections. While important for implementation, these details are not relevant to the high-level representation of data flows and processes in a DFD. Instead, a DFD focuses on illustrating the flow of data between processes, entities, and data stores, as well as the transformations that occur.

Submit
91. What is a software system that controls the access, modification, and organization of a database?

Explanation

A database management system is a software system that controls the access, modification, and organization of a database. It provides tools and functions to manage and manipulate data, ensuring data integrity, security, and efficient storage and retrieval. This system allows users to create, update, and retrieve data from the database, as well as define and enforce data relationships and constraints. It also includes features like data backup and recovery, data concurrency control, and user access control. Overall, a database management system is essential for managing and maintaining the integrity and security of a database.

Submit
92. Which function best provides early indications of potential software development problems?

Explanation

Software metrics provide quantitative measurements of various aspects of the software development process, such as code complexity, code coverage, and defect density. By analyzing these metrics, developers can identify potential problems early on, allowing them to take corrective actions before they escalate into major issues. This helps in improving the overall quality of the software and ensures that it meets the desired standards and requirements. Therefore, software metrics are the best option for providing early indications of potential software development problems.

Submit
93. When entering your Assembly program into the computer, consistency enhances program

Explanation

Consistency enhances program readability because it ensures that the program follows a uniform structure and style. This makes it easier for other programmers to understand and follow the logic of the program. Consistent formatting, naming conventions, and commenting practices improve the readability of the code, making it more accessible and easier to maintain in the long run.

Submit
94. What is the first step in OOD?

Explanation

The first step in Object-Oriented Design (OOD) is to define the problem. This involves understanding the requirements and constraints of the problem at hand. By clearly defining the problem, it becomes easier to identify the objects, operations, and develop a problem solution statement. Without a clear problem definition, it would be challenging to proceed with the rest of the OOD process effectively.

Submit
95. What are the two main types of data in the DD?

Explanation

The correct answer is "Elementary and Composite." In the context of the given question, the two main types of data in the DD (possibly referring to Data Dictionary) are elementary and composite. Elementary data refers to basic data elements that cannot be further divided, such as characters or numbers. On the other hand, composite data refers to data elements that are made up of multiple elementary data elements, such as records or structures.

Submit
96. What are the two types of software interrupts?

Explanation

The two types of software interrupts are DOS and BIOS. DOS (Disk Operating System) is an operating system that manages disk files and provides a command line interface. BIOS (Basic Input/Output System) is firmware that initializes hardware components and provides low-level services to the operating system. Both DOS and BIOS play crucial roles in the functioning of a computer system.

Submit
97. Which purpose is not a function of software configuration management?

Explanation

The purpose of software configuration management is to identify the functional and physical characteristics of selected system components, record/report change processing and implementation status, and control changes to those characteristics. However, soliciting bids for contracts under configuration control is not a function of software configuration management.

Submit
98. Which open system standard does the Air Force use for network protocol?

Explanation

The Air Force uses the Government Open Systems Interconnect Profile (GOSIP) as an open system standard for network protocol. GOSIP is a set of protocols and standards that ensure interoperability and compatibility between different computer systems and networks. It allows the Air Force to communicate and exchange data with other government agencies and organizations that also adhere to the GOSIP standard.

Submit
99. Regarding interpreting formulas and identifying data variables, which is not one of the variable naming rules?

Explanation

The given answer states that one of the variable naming rules is that dashes cannot be used. This means that when interpreting formulas and identifying data variables, it is not allowed to include dashes in the variable names. The other options mentioned in the question are all correct variable naming rules, such as allowing alphabetic letters, numbers, and underscores, starting with an alphabetic letter, and ensuring that the variable names are meaningful.

Submit
100. When considering errors made on DFDs, one that is not a common error is the

Explanation

One common error in DFDs is when the process creates output from data that is not input. This means that the process is generating information without receiving any input data. Another common error is when the DFD has ambiguous data flow names, which can lead to confusion and misinterpretation of the data flows. Additionally, having "dead end" data flows that are input but never used is also a common error. However, the DFD excluding initialization and termination details is not considered a common error as these details are often not included in the DFD as they are not directly related to the data flow.

Submit
101. What are you validating when you hand calculate the results of given input data and compare it to computer generated results?

Explanation

When you hand calculate the results of given input data and compare it to computer generated results, you are validating the accuracy of arithmetic computations performed by the computer. This process helps ensure that the computer is correctly executing mathematical operations and producing the expected output. By comparing the hand calculated results with the computer generated results, any discrepancies or errors in the arithmetic computations can be identified and corrected.

Submit
102. What is the system detailed design based on?

Explanation

The system detailed design is based on structured specification documentation. This documentation provides a detailed outline of the system's design, including its components, modules, and their interactions. It serves as a blueprint for the development team to follow during the implementation phase. The structured specification documentation ensures that the system is designed and developed according to the specified requirements and standards, making it easier to understand, maintain, and modify in the future.

Submit
103. The purpose of CASE tools is to

Explanation

CASE tools, which stands for Computer-Aided Software Engineering tools, are designed to assist in the development and maintenance of software systems. They provide various functionalities to help enforce standards and improve productivity throughout a project. These tools can include features such as code generation, documentation generation, version control, and automated testing, among others. By using CASE tools, developers can ensure that consistent standards are followed, leading to better quality and maintainability of the software being developed.

Submit
104. How is a source/sink represented on a DFD?

Explanation

A source/sink is represented on a Data Flow Diagram (DFD) using a rectangle. A rectangle is commonly used to depict external entities or processes that are the origin or destination of data flows. It represents a system or entity that produces or consumes data within the context of the DFD. The rectangle symbolizes the boundary of the source/sink and helps to visually distinguish it from other components of the diagram.

Submit
105. The progress form will normally raise how many events?

Explanation

The progress form will normally raise two events.

Submit
106. Which programming related duty is responsible to isolate and identify programming errors?

Explanation

A software developer is responsible for isolating and identifying programming errors. They have the knowledge and expertise to debug and troubleshoot code, identify the root cause of errors, and implement fixes or improvements to ensure the software functions correctly. They use various tools and techniques to analyze and diagnose issues, such as debugging tools, logging, and testing frameworks. By identifying and resolving programming errors, software developers ensure the reliability and functionality of the software they are working on.

Submit
107. When evaluating user requirements separately, which statement do you consider when determining how each requirement will fit into the overall system?

Explanation

When evaluating user requirements separately, the statement to consider when determining how each requirement will fit into the overall system is how well each requirement interacts with each other. This means assessing how the different requirements complement and integrate with one another to ensure a cohesive and functional system. It involves analyzing the dependencies and interactions between the requirements to ensure that they work together harmoniously and meet the overall objectives of the system.

Submit
108. Which segment register in the microprocessor holds the address of the first byte of memory?

Explanation

The correct answer is Code segment (CS). The code segment register holds the address of the first byte of memory where the program instructions are stored. It is used by the microprocessor to fetch instructions from the memory during the execution of a program. The code segment contains the program code and any constants or literals used by the program.

Submit
109. What is a systematic way of ensuring that a database structure is suitable for general-purpose querying?

Explanation

Normalization is a systematic way of organizing and structuring a database to eliminate data redundancy and ensure data integrity. It involves breaking down the database into smaller tables and applying a set of rules to ensure that each table contains unique and relevant information. By normalizing a database, it becomes more suitable for general-purpose querying as it allows for efficient storage, retrieval, and manipulation of data.

Submit
110. What debugging function lets you display data as it appears in memory?

Explanation

The correct answer is "Dumping". The term "dumping" in the context of debugging refers to the process of displaying the data as it appears in memory. This allows developers to examine the values stored in variables and memory locations, helping them to identify any issues or inconsistencies in the program. By "dumping" the data, developers can gain insights into the state of the program at a particular point in time, aiding in the debugging process.

Submit
111. In the acquisition process, what is the first step in conducting a market investigation?

Explanation

The first step in conducting a market investigation in the acquisition process is to conduct a general survey of the marketplace to determine the availability of potential sources. This step involves gathering information about the market, such as identifying potential suppliers and understanding their capabilities and offerings. By conducting this survey, the organization can assess the overall market landscape and determine the potential sources that can meet their requirements. This step is crucial in the acquisition process as it helps in identifying potential suppliers and gathering initial information to inform the subsequent steps in the process.

Submit
112. A 1NF database may have

Explanation

A 1NF database refers to a database that is in the first normal form. In this form, there are no duplicate rows, meaning that each row in the database is unique. Additionally, there are no repeating groups, which means that each attribute or field in the database only contains a single value. Therefore, the correct answer is that a 1NF database has no duplicate rows and no repeating groups.

Submit
113. Which Capability Maturity Model level is defined as repeatable?

Explanation

Level 2 in the Capability Maturity Model is defined as repeatable. This means that the organization has established basic project management processes that are repeatable and consistent. At this level, the organization has defined procedures for project management, and these procedures are followed consistently across projects. This allows for a more predictable and controlled project execution, improving the overall quality and efficiency of the organization's processes.

Submit
114. What is the DFD persistence rule?

Explanation

The DFD persistence rule states that a process is always running. This means that once a process starts, it continues to execute until it is explicitly terminated. This rule ensures that processes in a Data Flow Diagram (DFD) model are continuously active and able to perform their intended functions. It emphasizes the importance of maintaining the flow of data and the continuous processing of information within the system.

Submit
115. Which type of software maintenance does not change the functionality of a system, but changes the code in a manner to ease future software maintenance?

Explanation

Preventive software maintenance refers to making changes to the code in order to prevent future issues or problems. It focuses on improving the code's structure, readability, and maintainability, without altering the system's functionality. By proactively identifying and addressing potential issues, preventive maintenance aims to make future software maintenance easier and more efficient. This type of maintenance helps to avoid future bugs, errors, and performance issues, ultimately reducing the need for corrective maintenance.

Submit
116. A tree sturcutre is best used to display database records that have what type of fields?

Explanation

A tree structure is best used to display database records that have repetitive fields. This is because a tree structure allows for efficient organization and retrieval of data that has repetitive patterns. Each node in the tree represents a record, and the branches represent the repetitive fields within that record. This allows for easy navigation and searching of the database, especially when there are multiple occurrences of the same field value.

Submit
117. What is the final check you should make on any data processing program called?

Explanation

Pilot operation is the final check that should be made on any data processing program. This involves running the program on a small scale or in a controlled environment to ensure that it functions correctly and produces the desired results. It allows for any potential issues or errors to be identified and resolved before the program is fully implemented. This step helps to minimize the risk of errors or failures when the program is used on a larger scale or in a live production environment.

Submit
118. What is the technology combination used to construct web pages and to transmit information over the internet?

Explanation

The technology combination used to construct web pages and transmit information over the internet is HTML, CGI, JavaScript, and XML. HTML is the markup language used to structure the content on web pages. CGI (Common Gateway Interface) is a protocol that allows web servers to interact with other programs. JavaScript is a scripting language used to add interactivity and dynamic elements to web pages. XML (eXtensible Markup Language) is a markup language used for storing and transporting data.

Submit
119. How many dimensions can a Visual Basic multidimensional array have?

Explanation

A Visual Basic multidimensional array can have up to 60 dimensions. This means that it can have multiple levels of nested arrays, allowing for more complex data structures and organization of data. Having a large number of dimensions can be useful in certain scenarios where data needs to be organized in a highly structured and hierarchical manner.

Submit
120. Object components are built using a special Visual Basic module type called a/an

Explanation

A class module is a special Visual Basic module type used to build object components. Class modules are used to define the properties, methods, and events of an object. They allow for encapsulation and organization of code, making it easier to create and manage complex objects. This module type is specifically designed for creating and defining classes, which are the building blocks of object-oriented programming.

Submit
121. When using forms as reusable components, which is not a likely candidate as an auxiliary form?

Explanation

When using forms as reusable components, tabs are not a likely candidate as an auxiliary form. Tabs are typically used to organize and display different sections or categories of information within a single form or interface, rather than as a separate form itself. Therefore, tabs are not commonly used as auxiliary forms in the context of reusable components.

Submit
122. What phase of the planning and designing process can expose areas of the development process that might present problems during the design and implementation phase?

Explanation

Feasibility studies are conducted in the planning and designing process to assess the practicality and viability of a proposed project. These studies evaluate various factors such as technical, economic, legal, and operational aspects to determine if the project can be successfully implemented. By conducting feasibility studies, potential problems or challenges that may arise during the design and implementation phase can be identified and addressed beforehand. Therefore, feasibility studies can expose areas of the development process that might present problems, making it the correct answer.

Submit
123. Which component is a distinct part of a Computer Software Configuration Item (CSCI) and may be further broken down?

Explanation

A Computer Software Configuration Item (CSCI) is a distinct part of a software configuration. Within a CSCI, there are smaller components called Computer Software Components (CSC) that can be further broken down. These CSCs are individual elements that make up the overall software configuration and can be analyzed and modified independently. Therefore, the correct answer is Computer software component (CSC).

Submit
124. What is considered to be the heart of the Visual Basic langugage?

Explanation

The Integrated Development Environment (IDE) is considered to be the heart of the Visual Basic language. It provides a comprehensive set of tools and features that allow developers to create, edit, debug, and test their Visual Basic programs. The IDE includes a code editor, a compiler, a debugger, and other tools that streamline the development process and enhance productivity. It also provides a graphical user interface (GUI) for designing the user interface of the application. Therefore, the IDE plays a crucial role in the development of Visual Basic programs.

Submit
125. What are Visual Basic forms and controls called?

Explanation

Visual Basic forms and controls are referred to as "objects" in programming. In Visual Basic, objects are the fundamental building blocks that represent elements such as forms, buttons, textboxes, and other user interface components. These objects have properties, methods, and events that can be manipulated and interacted with to create functional and interactive applications. By referring to forms and controls as objects, it emphasizes their object-oriented nature and their ability to be customized and programmed to perform specific tasks.

Submit
126. Which software security practice ensures that once the individual is identified, they are restricted from accessing any service or information not required for that particular user's official duties?

Explanation

Authentication is the correct answer because it is the software security practice that ensures that once an individual is identified, they are restricted from accessing any service or information not required for their official duties. Authentication verifies the identity of a user and allows access only to authorized resources based on their role or privileges. It helps prevent unauthorized access and protects sensitive information from being accessed by unauthorized individuals.

Submit
127. Which of these is not one of the four data flow diagram elements?

Explanation

The correct answer is "Specification" because a data flow diagram (DFD) is a graphical representation of the flow of data within a system, and it consists of four main elements: processes, data stores, sources, and sinks. The specification is not considered one of the elements in a DFD. The specification typically refers to the detailed documentation or requirements for the system, rather than being a component within the diagram itself.

Submit
128. A decision tree is characterized by

Explanation

A decision tree is a graphical representation that depicts a hierarchy of independent conditions and the corresponding activities that occur based on the valid combination of these conditions. It allows for the visualization of different possible outcomes and paths based on the evaluation of certain conditions. Each condition acts as a branch in the tree, leading to different activities or actions depending on whether the condition is true or false. This hierarchical structure helps in understanding the flow of decisions and actions in a systematic and organized manner.

Submit
129. In which phase should the integration of maintaining security of a software system begin?

Explanation

The integration of maintaining security of a software system should begin in the Design phase. This is because during the design phase, the overall architecture and structure of the software system is planned and defined. By considering security requirements and incorporating security measures at this early stage, potential vulnerabilities and risks can be identified and addressed before the actual development and coding process begins. This helps in building a more secure and robust software system from the outset.

Submit
130. What type of description ensures that all input and output data flows and all procedures related to the process are defined?

Explanation

Complete description ensures that all input and output data flows and all procedures related to the process are defined. It means that the description includes all the necessary information and leaves no room for ambiguity or confusion. A complete description provides a comprehensive understanding of the process and ensures that all aspects are covered, leaving no gaps or missing details. This type of description is crucial for ensuring clarity and accuracy in the execution of the process.

Submit
131. Which Visual Basic component tests for a specific condition and provides logical choices that are determined by the value of a selector?

Explanation

The Select Case statement in Visual Basic is used to test for a specific condition and provides logical choices based on the value of a selector. It allows for multiple conditions to be evaluated and different actions to be taken based on the outcome. This statement is commonly used when there are multiple possible values for a variable and different actions need to be performed for each value.

Submit
132. Which Visual Basic loop works well when your solutions cannot determine the exact number of repetitions to execute?

Explanation

The Do Loop is the most appropriate choice when the exact number of repetitions cannot be determined in advance. This loop allows the code to execute at least once, and then continue looping until a specific condition is met. It is useful when the number of iterations depends on user input or dynamic data. The other loop options, such as Loop While and Do While Loop, also involve conditions, but they may not be suitable in cases where the loop must execute at least once. The For/Next Loop is not the best choice when the number of repetitions is uncertain.

Submit
133. It is important to use guidelines when developing DFDs to

Explanation

When developing Data Flow Diagrams (DFDs), it is important to use guidelines to clarify the design approach and ensure a quality design product. Guidelines help in providing a structured and consistent methodology for creating DFDs, which aids in understanding the system's functionality, data flow, and processes. By following guidelines, designers can ensure that the DFD accurately represents the system and its requirements, leading to a well-designed solution. Additionally, guidelines help in identifying any potential flaws or gaps in the design, allowing for improvements and adjustments to be made before implementation.

Submit
134. In which software maintenance step will a programmer conduct regression testing?

Explanation

In the software maintenance step of re-validating the system, a programmer will conduct regression testing. This type of testing is performed to ensure that any modifications or changes made to the software have not introduced new bugs or issues and have not affected the existing functionality of the system. Regression testing helps to identify any potential conflicts or regressions that may have occurred due to the modifications made during the software maintenance process.

Submit
135. An advantage of a standard module is that they

Explanation

Standard modules refer to pre-existing modules or libraries that are readily available for use in programming. One advantage of standard modules is that they do not need to be created from scratch. This means that developers can save time and effort by utilizing these pre-built modules instead of writing code from scratch. However, standard modules cannot have multiple instances, meaning that they can only be used as a single entity within a program.

Submit
136. What are the two types of central processing unit (CPU) interrupts?

Explanation

The two types of central processing unit (CPU) interrupts are hardware and software. Hardware interrupts are generated by external devices to request the attention of the CPU, such as keyboard input or disk drive activity. Software interrupts, on the other hand, are generated by software programs to request specific services from the CPU, such as system calls or interrupt handlers. These two types of interrupts allow for efficient multitasking and handling of various events and tasks by the CPU.

Submit
137. A descritpion or characteristic that is applicable to some number of objects is

Explanation

A class is a description or characteristic that is applicable to some number of objects. It represents a blueprint or template for creating objects that share similar properties and behaviors. By defining a class, we can create multiple instances or objects that possess the same attributes and methods defined in the class. Therefore, a class is the correct answer in this context.

Submit
138. Regarding designing automated data systems, in which phase do we analyze the current system in order to understand its deficiencies?

Explanation

In the process of designing automated data systems, conducting system studies is the phase where we analyze the current system to understand its deficiencies. This involves studying the existing system's structure, processes, and functionality to identify any shortcomings or areas for improvement. By conducting system studies, we can gain insights into the weaknesses of the current system and determine how to address them in the design of the automated data system.

Submit
139. What function in the software lifecycle development is recognized by more advanced software producing organizations?

Explanation

Software quality assurance is recognized by more advanced software producing organizations in the software lifecycle development. This function ensures that the software meets the specified quality standards and requirements. It involves activities such as planning, designing, implementing, and executing quality control processes to identify and resolve defects or issues in the software. By implementing software quality assurance, organizations can improve the overall quality of their software products and enhance customer satisfaction.

Submit
140. Regarding acquisition processes and procedures the definition "uses parts and design practice solid enough to withstand typical civilian duty, but probably would not stand up on the battlefield" is the best example of

Explanation

The given definition states that the parts and design practice are solid enough for civilian duty but may not be suitable for the battlefield. This implies that the definition represents a practice that is considered the best in the commercial industry but may not meet the specific requirements and standards of the military. Therefore, the best explanation for the given correct answer is "best commercial practice."

Submit
141. Which quality assurance software engineering principle recommends modeling or prototyping?

Explanation

The principle of exploring alternative concepts in quality assurance software engineering suggests that modeling or prototyping can be used to evaluate different ideas or approaches before implementing them. By creating models or prototypes, software engineers can test different designs, functionalities, or solutions to identify the most effective and efficient one. This helps in mitigating risks, improving the quality of the final product, and ensuring that the chosen approach aligns with the project requirements and constraints.

Submit
142. In which Capability Maturity Model level are processes and products quantitatively measured, understood, and controlled?

Explanation

In Capability Maturity Model (CMM), Level 4 is the level where processes and products are quantitatively measured, understood, and controlled. At this level, organizations have established a quantitative understanding of their processes and use statistical techniques to manage and control them. This enables them to make informed decisions based on data and metrics, leading to better quality and predictability in their products and services.

Submit
143. What open system standard does the Air Force specify for user interfaces?

Explanation

X-Windows is the correct answer because it is an open system standard specified by the Air Force for user interfaces. X-Windows is a network protocol that allows graphical user interfaces to be displayed on remote systems. It provides a way for applications to create windows, handle user input, and communicate with other applications. X-Windows is widely used in the Unix and Linux operating systems and is known for its network transparency, allowing applications to run on one system and display their user interface on another.

Submit
144. What is an iterative primitive solution?

Explanation

An iterative primitive solution refers to a code structure that is designed for repetitive execution. It involves using loops or iterations to perform a certain set of instructions repeatedly until a specific condition is met. This approach allows for efficient processing of tasks that require repetitive actions, as it eliminates the need for writing the same code multiple times. By structuring the code in this way, it becomes easier to manage and maintain, leading to more efficient and scalable solutions.

Submit
145. What system output should be checked for compliance to specifications after all other specifications have been satisfied?

Explanation

After all other specifications have been satisfied, the system output should be checked for compliance to specifications. This includes checking the Output Reports, Disk Files, and Databases to ensure that they meet the required specifications. These are the final deliverables of the system and need to be thoroughly reviewed to ensure they are accurate and meet the desired criteria. Checking the Test Databases and Test Analysis Reports, Program Listings and Memory Dumps, and Source, Object and Executable Files are not relevant in this context as they are not the final output of the system.

Submit
146. Encapsulation supports which software engineering principle?

Explanation

Encapsulation supports the software engineering principle of modularity. Modularity is the concept of breaking down a complex system into smaller, self-contained modules that can be developed and tested independently. Encapsulation allows the data and methods within a module to be encapsulated or hidden from other modules, ensuring that each module can operate independently without affecting or being affected by other modules. This promotes code reusability, maintainability, and scalability in software development.

Submit
147. Which statement is not considered useful for a standards-based software architecture?

Explanation

This statement is not considered useful for a standards-based software architecture because it implies that enhancements can only be made at predetermined phases in the life cycle. In a standards-based software architecture, flexibility and adaptability are important, and enhancements should be able to be made at any point in the life cycle, not just at predetermined phases.

Submit
148. Assembler executable operations are those that produce machine code. What are interpreted Assembler operations that do not generate machine code called?

Explanation

Directives in assembler are instructions that provide guidance to the assembler on how to process the source code. These instructions do not generate machine code but instead control the assembly process. They are used to define data, allocate memory, specify the start of a program, and perform other tasks related to the assembly process. Examples of directives include "ORG" (origin), "EQU" (equivalent), and "END" (end of program). Unlike executable operations, directives do not produce machine code but are essential for the proper assembly and execution of a program.

Submit
149. Which configuration management function is defined as both the selection of the documents which identify and define the configuration baseline characteristics of an item, and as the documents themselves?

Explanation

Configuration identification is the correct answer because it refers to the process of selecting the documents that identify and define the configuration baseline characteristics of an item. These documents themselves are also part of the configuration identification function. This function is important in ensuring that the configuration of an item is properly documented and understood throughout its lifecycle.

Submit
150. What database maintenance responsibility addresses disk fragmentation?

Explanation

Managing the DBMS involves various responsibilities, one of which is addressing disk fragmentation. Disk fragmentation occurs when data is stored in non-contiguous blocks on a disk, leading to slower performance. Managing the DBMS includes tasks such as optimizing disk space, rearranging data blocks, and defragmenting the disk to improve efficiency and performance. Therefore, managing the DBMS is the responsibility that addresses disk fragmentation.

Submit
151. What is an algorithm used for?

Explanation

An algorithm is used to outline the final solutions that need to be translated into a specific programming language with syntactical structures. It provides a step-by-step plan or set of instructions for solving a problem or completing a task. The algorithm acts as a blueprint for the implementation of the solution in a programming language, ensuring that the solution is accurately and efficiently executed.

Submit
152. What process is used to convert an Assembler-generated object program into an executable program?

Explanation

Linking is the process used to convert an Assembler-generated object program into an executable program. During linking, the object program is combined with other necessary object files and libraries to create a complete and executable program. This process resolves any external references and ensures that all the required components are present for the program to run successfully. Linking is an essential step in the software development process as it brings together different modules and libraries to create a functional and executable program.

Submit
153. What is the purpose of configuration management during acquisition?

Explanation

Configuration management during acquisition helps program managers in achieving the required system performance. This is because configuration management ensures that the functional and physical characteristics of the system are controlled and accounted for. By managing the configuration of the system, program managers can ensure that it meets the necessary performance requirements. This includes documenting alternative designs that meet operational requirements and auditing the established baselines to ensure compliance.

Submit
154. What is the DFD conservation rule?

Explanation

The DFD conservation rule states that the only outputs from a process are those that can be generated using its inputs. This means that a process should not produce any outputs that are not derived from its inputs. This rule ensures that the data flow within a system is logical and consistent, as the outputs are directly related to the inputs. It helps to maintain the integrity and accuracy of the information being processed in the system.

Submit
155. Which testing technique is the execution of independent tests designed to demonstrate a specific operational capability of a program or software system?

Explanation

Functional testing is the execution of independent tests designed to demonstrate a specific operational capability of a program or software system. It focuses on testing the functionality of the system and ensures that it meets the specified requirements. This type of testing verifies if the system performs as expected and meets the user's needs. It involves testing the system's features, user interface, input/output, and integration with other components. Functional testing helps identify any defects or issues in the functionality of the software and ensures that it is working correctly.

Submit
156. Regarding software management, which phrase best defines software life cycle methodology?

Explanation

The phrase "Standards and procedures affecting the design, implementation and disposal of software" best defines software life cycle methodology. This answer choice encompasses all the stages of the software development process, from design to implementation to disposal. It emphasizes the importance of following established standards and procedures throughout the entire life cycle of the software.

Submit
157. In which step of the OOD are the objects grouped with the operations?

Explanation

In the step of "Establish interfaces" in Object-Oriented Design (OOD), the objects are grouped with the operations. This step involves defining the interfaces or contracts that specify the methods and properties of each object. By establishing interfaces, the interactions between objects are defined, allowing for better organization and communication between them. This step is crucial in designing a system that is modular, extensible, and promotes code reusability.

Submit
158. What happens to input data during a DFD change of nature?

Explanation

During a DFD change of nature, some type of editing or computation is done on the input data flow. This means that the input data is modified or processed in some way before being used further in the system. This could involve editing the data to remove errors or inconsistencies, performing calculations or transformations on the data, or applying business rules or algorithms to manipulate the data. The purpose of this editing or computation is to ensure that the input data is in the desired format or state for the subsequent stages of processing in the system.

Submit
159. Which baseline is the initially approved allocated configuration identification, describing functional characteristics allocated to a configuration item?

Explanation

The term "allocated" in the context of configuration identification refers to the process of assigning functional characteristics to a specific configuration item. This baseline, which is initially approved, describes these allocated functional characteristics. Therefore, the correct answer is "Allocated."

Submit
160. Which procedure involves looking at an existing software process and breaking it down into steps or areas?

Explanation

Software process improvements involve looking at an existing software process and breaking it down into steps or areas in order to identify areas for improvement. This may include analyzing the current process, identifying bottlenecks or inefficiencies, and suggesting changes or enhancements to optimize the process. By breaking down the process into steps or areas, it becomes easier to identify specific areas that need improvement and develop strategies to enhance the overall software development process.

Submit
161. What advanced programming application process would use a calculative algorithm to produce an outcome?

Explanation

Formula interpretation is the advanced programming application process that uses a calculative algorithm to produce an outcome. It involves analyzing and understanding mathematical formulas and equations, and then implementing them in a programming language to perform calculations and generate results. This process requires a deep understanding of mathematical concepts and the ability to translate them into code. By interpreting formulas, programmers can automate complex calculations and solve mathematical problems efficiently.

Submit
162. In which configuration management function will you find Engineering Change Proposals (ECP)?

Explanation

In the configuration control function, Engineering Change Proposals (ECP) can be found. Configuration control involves managing and controlling changes to the configuration items of a system or product. ECPs are used to propose and document changes to the configuration, including changes to design, specifications, or other aspects. It is an essential part of ensuring that changes are properly evaluated, approved, and implemented while maintaining the integrity and consistency of the configuration.

Submit
163. What is the purpose of configuration management during deployment and operation?

Explanation

During deployment and operation, configuration management serves the purpose of controlling and accounting for the functional and physical characteristics of a system. This involves keeping track of the various components and versions of software, hardware, and documentation that make up the system. By maintaining control over these characteristics, configuration management ensures that the system remains stable, reliable, and consistent throughout its lifecycle. It also allows for effective troubleshooting, maintenance, and updates by providing a clear understanding of the system's configuration.

Submit
164. A PDR is an approach to which testing technique?

Explanation

A PDR (Preliminary Design Review) is a formal evaluation process conducted to assess the completeness and correctness of a design before proceeding to the next phase. Design verification, one of the key testing techniques, involves checking whether the design meets the specified requirements and functions as intended. It ensures that the design has been correctly implemented and is free from errors or defects. Therefore, the correct answer is Design verification.

Submit
165. When designing Automated Data Systems, at what point do you evaluate the user requirements?

Explanation

After the document flow analysis, the user requirements are evaluated. This is because the document flow analysis helps in understanding the current workflow and identifying the documents and information flow within the system. Once this analysis is done, it becomes easier to assess the user requirements and determine how the automated data system should be designed to meet those requirements effectively. Evaluating the user requirements after the document flow analysis ensures that the system is tailored to the specific needs and workflows of the users.

Submit
166. Which quality assurance software engineering principle requires the developer to understand the scope of the development effort?

Explanation

The correct answer is "Use capable software processes." This principle requires the developer to understand the scope of the development effort because using capable software processes ensures that the development effort is carried out effectively and efficiently. By understanding the scope, the developer can determine the appropriate processes and methodologies to be used, ensuring that the software development meets the required quality standards.

Submit
167. When planning and designing automated data systems, what is the next step after evaluating user requirements?

Explanation

After evaluating user requirements, the next step is to conduct system studies. This involves analyzing the existing systems and processes to identify any gaps or inefficiencies. System studies help in understanding the current state of the system and provide insights into potential improvements or modifications that need to be made. It also helps in determining the scope and objectives of the new automated data system. A system studies brief is a document that summarizes the findings and recommendations from the system studies, providing a roadmap for the development and implementation of the automated data system.

Submit
168. In the acquisition process, when is the market analysis started?

Explanation

During the Concept Exploration phase, the market analysis is started. This phase involves identifying and understanding the needs and requirements of the market, as well as evaluating the potential demand and competition. It is during this phase that the acquisition team conducts research and gathers information about the market trends, customer preferences, and potential suppliers. This analysis helps in formulating a clear understanding of the market dynamics and assists in making informed decisions regarding the acquisition process.

Submit
169. What database maintenance responsibility must include standardized processing and formats?

Explanation

Managing data activity is the correct answer because it involves ensuring that all data processing and formats within the database are standardized. This responsibility includes tasks such as monitoring data input and output, enforcing data integrity rules, optimizing data access and retrieval, and managing data security. By standardizing data processing and formats, the database maintenance ensures consistency and reliability of the data stored in the database, making it easier to manage and analyze.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 10, 2014
    Quiz Created by
    Roenoke
Cancel
  • All
    All (169)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which metric attribute specifies that data needs to be collected on a...
Persistence is
The ability of two or more classes of objects to respond to the same...
What is the DFD ordering rule?
The purpose of information hiding is to
The best method to determine if the security features of a database...
Which member of the PDR team can be thought of as the coach?
What assumes the use of a public key cryptography?
What is methodology?
A characteristic or quality is known as
The software system that is effcient when it operates using available...
Having only one way to interpret the metric describes which attribute?
In Visual Basic, it is impossible to 
Which software engineering principle tells us that related modules...
Approximately what percentage of all accidents is due to human error?
Which reference can only be used inside a DO/Loop statement?
What are reserved words?
How is the data flow represented on a DFD?
What are the two types of Assembly language statements?
What still needs to be the Air Force's major goal toe improve...
A related collection of records is a
In which step of the OOD is an object list created?
Which E-R can have one entity occurrence of the first type relating to...
What is commonly used during the sturctured code development process...
Secure Socket Layer (SSL) uses strong cryptography to ensure
Which configuration management goal is based on "time is...
Why is a file system considered expensive?
Which type of software maintenance requires fixing defective software...
A person, place, thing, or a physical or conceptual entity is known as
When conducting a system study, which statement best describes...
Why do programmer prefer using Assembly language over machine...
Regarding stack management and programming, how many bytes of data are...
How do subroutines make Assembly language programming easier?
What is the overall goal when you are selecting a DD?
Operational risk management is a
What graphical file format is considered as a de facto standard form...
Which Visual Basic variable type is used to declare new variables?
Which Visual Basic component tests for a specific condition, range of...
What is a commonly used protocol for managing the security of a...
What part of the DBMS contains the data structures found in a...
What provides flexible and simple-to-use information retrieval...
What can programmers do to prevent wasting time looking for the right...
Data items arranged in the order in which they were stored and the...
What do the participants of a PDR do with the design documentation?
Which quality metric includes measuring the likelihood of unexpected...
In situations where the possbility of a visual basic run-time error...
When developing exception handlers and using multiple Catch blocks,...
A composite of subsystems, assemblies, skills, and techniques capable...
What is the term used to identify how data is stored on the stack?
What must be considered when evaluating DD software applications?
Which is not one of the advantages of implementing an open system?
Which E-R can have one entity occurrence of the first type that can...
Which Visual Basic window is used to control an object's...
What is also referred to as the subscript of a Visual Basic array?
What is a key concept that can help you save significant amounts of...
Which of the following contains the initial system requirements or...
The effort required to transfer a program from one...
What inpact does open systems architecture have on a re-engineering...
Which Visual Basic components are complete units of code, use...
How many months of OJT must a member have before being upgraded to the...
In which database design funtion is the general level organization of...
What Visual Basic statement allows you to build class objects and...
Which skill level may be assigned to job positions such as team...
The user defines the physical characteristics of the file to be...
What question would a quality metric ask?
Which quality metric is enhanced with simplified design, simpler data...
The ability to learn, operate, prepare input, and interpret output is...
Another structure name for a network is
What do we call the method of communication between the microprocessor...
Data stores are
What consists of Visual Basic menu bars, toolbars, and form windows?
Which Visual Basic variable type is used to assign values to...
What is a colleciton of data that has a logical interrelationship and...
What is a toolkit?
Which file system problem has the same data item stored in many...
In the random access method, calculating the address by adding one or...
Which software engineering goal acts like a bridge between the problem...
What do you examine your program for during desk checking?
What does a DFD change of organization mean?
What are the four general purpose registers in the central processing...
An open system architecture means the software is
Which statement is correct of applying quality assurance to the...
When applying software quality assurance practices, in which phase do...
What function of interrupt 10h is the routine that reads the attribute...
The warfare and warfare support systems technical reference model...
During document flow analysis, what can you use to show particular...
Which testing technique validates the basic software unit?
The focus of the tri-service open systems architecture working group...
Which of the following is not a responsibility of Air Force...
What should be ignored on a DFD?
What is a software system that controls the access, modification, and...
Which function best provides early indications of potential software...
When entering your Assembly program into the computer, consistency...
What is the first step in OOD?
What are the two main types of data in the DD?
What are the two types of software interrupts?
Which purpose is not a function of software configuration management?
Which open system standard does the Air Force use for network...
Regarding interpreting formulas and identifying data variables, which...
When considering errors made on DFDs, one that is not a common error...
What are you validating when you hand calculate the results of given...
What is the system detailed design based on?
The purpose of CASE tools is to
How is a source/sink represented on a DFD?
The progress form will normally raise how many events?
Which programming related duty is responsible to isolate and identify...
When evaluating user requirements separately, which statement do you...
Which segment register in the microprocessor holds the address of the...
What is a systematic way of ensuring that a database structure is...
What debugging function lets you display data as it appears in memory?
In the acquisition process, what is the first step in conducting a...
A 1NF database may have
Which Capability Maturity Model level is defined as repeatable?
What is the DFD persistence rule?
Which type of software maintenance does not change the functionality...
A tree sturcutre is best used to display database records that have...
What is the final check you should make on any data processing program...
What is the technology combination used to construct web pages and to...
How many dimensions can a Visual Basic multidimensional array have?
Object components are built using a special Visual Basic module type...
When using forms as reusable components, which is not a likely...
What phase of the planning and designing process can expose areas of...
Which component is a distinct part of a Computer Software...
What is considered to be the heart of the Visual Basic langugage?
What are Visual Basic forms and controls called?
Which software security practice ensures that once the individual is...
Which of these is not one of the four data flow diagram elements?
A decision tree is characterized by
In which phase should the integration of maintaining security of a...
What type of description ensures that all input and output data flows...
Which Visual Basic component tests for a specific condition and...
Which Visual Basic loop works well when your solutions cannot...
It is important to use guidelines when developing DFDs to
In which software maintenance step will a programmer conduct...
An advantage of a standard module is that they
What are the two types of central processing unit (CPU) interrupts?
A descritpion or characteristic that is applicable to some number of...
Regarding designing automated data systems, in which phase do we...
What function in the software lifecycle development is recognized by...
Regarding acquisition processes and procedures the definition...
Which quality assurance software engineering principle recommends...
In which Capability Maturity Model level are processes and products...
What open system standard does the Air Force specify for user...
What is an iterative primitive solution?
What system output should be checked for compliance to specifications...
Encapsulation supports which software engineering principle?
Which statement is not considered useful for a standards-based...
Assembler executable operations are those that produce machine code....
Which configuration management function is defined as both the...
What database maintenance responsibility addresses disk fragmentation?
What is an algorithm used for?
What process is used to convert an Assembler-generated object program...
What is the purpose of configuration management during acquisition?
What is the DFD conservation rule?
Which testing technique is the execution of independent tests designed...
Regarding software management, which phrase best defines software life...
In which step of the OOD are the objects grouped with the operations?
What happens to input data during a DFD change of nature?
Which baseline is the initially approved allocated configuration...
Which procedure involves looking at an existing software process and...
What advanced programming application process would use a calculative...
In which configuration management function will you find Engineering...
What is the purpose of configuration management during deployment and...
A PDR is an approach to which testing technique?
When designing Automated Data Systems, at what point do you evaluate...
Which quality assurance software engineering principle requires the...
When planning and designing automated data systems, what is the next...
In the acquisition process, when is the market analysis started?
What database maintenance responsibility must include standardized...
Alert!

Advertisement