CFPS Exam: Test On Certified Fire Protection Specialist! Trivia Questions Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Anamiccolis
A
Anamiccolis
Community Contributor
Quizzes Created: 1 | Total Attempts: 465
Questions: 50 | Attempts: 466

SettingsSettingsSettings
CFPS Exam: Test On Certified Fire Protection Specialist! Trivia Questions Quiz - Quiz

Are you preparing for the CFPS Exam? Below is a Test on Certified Fire Protection Specialist that is designed to help you pass the exams. It not only tests out what you know, but will also help you remember some of the things you may have forgotten. Do give it a shot and keep a look out for other quizzes like it!


Questions and Answers
  • 1. 

    The objectives of function point are to

    • A.

      Measure functionality that the user requests and receives

    • B.

      Measure technology used for implementation

    • C.

      Measure resources used for implementation

    • D.

      All of the above

    Correct Answer
    A. Measure functionality that the user requests and receives
    Explanation
    The objectives of function point are to measure the functionality that the user requests and receives. Function points are a unit of measurement used to quantify the functionality provided by a software system. They focus on measuring the features and capabilities that the user expects from the system, regardless of the technology or resources used for implementation. By measuring the functionality, organizations can better estimate project scope, track productivity, and assess the value delivered to the user.

    Rate this question:

  • 2. 

    An application function point count

    • A.

      Is also referred to as the baseline or installed function point count

    • B.

      Includes the functionality provided by data conversion and associated conversion-reporting requirements

    • C.

      Is altered every time an enhancement alters the application's functions

    • D.

      A and c

    Correct Answer
    A. Is also referred to as the baseline or installed function point count
    Explanation
    The application function point count is also referred to as the baseline or installed function point count. This means that it represents the initial measurement of the functionality provided by the application. It includes the functionality provided by data conversion and associated conversion-reporting requirements. Additionally, the application function point count is altered every time an enhancement alters the application's functions. Therefore, both statements a and c are correct.

    Rate this question:

  • 3. 

    Internal logical files (ILFs) are

    • A.

      Stored external to the application's boundary

    • B.

      Maintained within the application

    • C.

      Identified as a requirements of the application by the users

    • D.

      B and c

    Correct Answer
    D. B and c
    Explanation
    ILFs, or Internal Logical Files, are data files that are maintained within the application and are identified as requirements by the users. These files are stored internally and are used by the application to store and retrieve data. This means that both options b and c are correct, as ILFs are both maintained within the application and identified as requirements by the users.

    Rate this question:

  • 4. 

    An external interface file (EIF) can be

    • A.

      A user-identifiable group of logically related data utilized by the application but maintained by another application

    • B.

      A user-identifiable group of logically related control information maintained by the application

    • C.

      A user-identifiable group of logically related data maintained by the application but referenced in another part of the application

    • D.

      A and c

    Correct Answer
    A. A user-identifiable group of logically related data utilized by the application but maintained by another application
    Explanation
    The correct answer is "a and c". An external interface file (EIF) refers to a user-identifiable group of logically related data that is utilized by the application but is maintained by another application. It can also refer to a user-identifiable group of logically related data that is maintained by the application but is referenced in another part of the application. In both cases, the data is identifiable by the user and is utilized by the application, either through maintenance by another application or through referencing within the same application.

    Rate this question:

  • 5. 

    An external input is considered unique if

    • A.

      Data is maintained in different internal logical file(s)

    • B.

      The input data fields are unique

    • C.

      The processing logic is unique

    • D.

      All of the above

    Correct Answer
    A. Data is maintained in different internal logical file(s)
    Explanation
    The correct answer is "Data is maintained in different internal logical file(s)". This means that the external input is considered unique if the data is stored in separate internal logical files. This ensures that each input has its own distinct storage location, preventing duplication and ensuring uniqueness. The other options, such as the uniqueness of input data fields or processing logic, are not directly related to the uniqueness of the external input.

    Rate this question:

  • 6. 

    External outputs can include

    • A.

      Data calculated and sent external to the application's boundary

    • B.

      Control information solely retrieved and sent external to the application's boundary

    • C.

      Help text retrieved and returned to the user

    • D.

      A and b

    Correct Answer
    A. Data calculated and sent external to the application's boundary
    Explanation
    External outputs refer to the data or control information that is generated by the application and sent outside of its boundary. This can include data that is calculated by the application and then transmitted to external systems or devices. It can also include control information that is solely retrieved from the application and sent to external systems for further processing. Therefore, the correct answer is "Data calculated and sent external to the application's boundary".

    Rate this question:

  • 7. 

    Which of the following could be external inquires?

    • A.

      Help text

    • B.

      Menu screens that provide only navigation

    • C.

      Derived data

    • D.

      Calculated data

    Correct Answer
    A. Help text
    Explanation
    External inquiries refer to requests for information from external entities or users outside of the system. In this context, help text can be considered as an external inquiry because it is a form of information that is provided to users outside of the system to assist them in understanding how to use the system or perform certain tasks. Help text is typically accessed by users when they need guidance or clarification on how to use a specific feature or functionality within the system. Therefore, help text can be considered as an external inquiry as it involves retrieving information from the system by external users.

    Rate this question:

  • 8. 

    Examples of general system characteristics do not include

    • A.

      Installation ease

    • B.

      Language

    • C.

      End user efficiency

    • D.

      Data communications

    Correct Answer
    A. Installation ease
    Explanation
    The given answer, "Installation ease," is not an example of a general system characteristic. General system characteristics typically refer to broader aspects of a system, such as its language, end user efficiency, and data communications. Installation ease, on the other hand, is more specific to the process of installing a system and does not fall under the category of general characteristics.

    Rate this question:

  • 9. 

    Flexible query/report capability is accounted for in which of the following GSCs?

    • A.

      Installation ease

    • B.

      Facilitate change

    • C.

      Performance

    • D.

      End user efficiency

    Correct Answer
    A. Installation ease
    Explanation
    Flexible query/report capability is not accounted for in installation ease. Installation ease refers to the ease of installing a system or software. It does not directly relate to the ability to generate flexible queries or reports.

    Rate this question:

  • 10. 

    Which of the following should be counted as a DET on an external input (EI)?

    • A.

      Command line(s) or function/action (PF) key(s) that provide the capability to specify the action to be taken by the external input

    • B.

      Error messages as a result of the EI transaction

    • C.

      Fields relating to the EI transaction

    • D.

      All of the above

    Correct Answer
    A. Command line(s) or function/action (PF) key(s) that provide the capability to specify the action to be taken by the external input
    Explanation
    The correct answer is "Command line(s) or function/action (PF) key(s) that provide the capability to specify the action to be taken by the external input." This is because these command lines or function/action keys are directly related to the external input and provide the means to specify the action to be performed. Error messages and fields relating to the external input transaction are not considered as DETs, as they are not directly involved in specifying the action to be taken.

    Rate this question:

  • 11. 

    Help within an application includes full-screen help, field-sensitive help, and system help. How many EQs are contend?

    • A.

      One for the application

    • B.

      One for each screen

    • C.

      Three for the application

    • D.

      One for each occurrence

    Correct Answer
    A. One for the application
    Explanation
    The explanation for the given correct answer is that help within an application includes full-screen help, field-sensitive help, and system help. Therefore, there is only one EQ (Embedded Question) for the entire application, as it encompasses all types of help provided within the application.

    Rate this question:

  • 12. 

    TDI is

    • A.

      The sum of the 1 degrees of influence

    • B.

      A score between 0 and 70

    • C.

      +- 35%

    • D.

      A and b

    Correct Answer
    A. The sum of the 1 degrees of influence
    Explanation
    TDI stands for Total Degree of Influence. It is a measure that calculates the sum of the 1 degrees of influence. In other words, it quantifies the total impact or influence that a particular factor or variable has on a system or outcome. TDI is represented as a score between 0 and 70, with a range of ±35%. Therefore, the correct answer is "The sum of the 1 degrees of influence."

    Rate this question:

  • 13. 

    Internal logical files or external interface files can

    • A.

      Be counted in more than one application

    • B.

      Contain multiple RETs

    • C.

      Be hard-coded

    • D.

      A and b

    Correct Answer
    A. Be counted in more than one application
    Explanation
    Internal logical files or external interface files can be counted in more than one application because these files may be shared or accessed by multiple applications within a system. This allows for data reuse and promotes consistency across different applications. By counting these files in more than one application, it ensures that their importance and impact on the overall system are properly accounted for.

    Rate this question:

  • 14. 

    An application count includes

    • A.

      What is delivered by the application

    • B.

      How something is delivered by the application

    • C.

      User-requested data conversion to populate the application

    • D.

      A and c

    Correct Answer
    A. What is delivered by the application
    Explanation
    The application count includes what is delivered by the application. This means that when counting the application, we consider the functionality and features that the application provides to the users. It does not include how something is delivered or the process of converting user-requested data to populate the application. Only the end result or output of the application is taken into account when determining the application count.

    Rate this question:

  • 15. 

    Boundaries

    • A.

      Identify the border between the software being measured and the user

    • B.

      Define the functionality that will be included in a function point count

    • C.

      Consider the application from a technical point of view

    • D.

      A and b

    Correct Answer
    A. Identify the border between the software being measured and the user
    Explanation
    The correct answer is "Identify the border between the software being measured and the user." This answer is correct because in order to accurately measure the function points of a software, it is important to clearly define the boundaries between the software and the user. This helps in determining what functionalities should be included in the function point count and what should be excluded. Additionally, considering the application from a technical point of view is also important, but it is not the main focus of this question.

    Rate this question:

  • 16. 

    Which of the following can be counted as one or more ILFs in a project?

    • A.

      Application data

    • B.

      Application security data

    • C.

      Control data

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the options listed can be counted as one or more Internal Logical Files (ILFs) in a project. ILFs are a type of functional user data that is maintained and used by the application being developed. Application data refers to the data that is processed and stored by the application. Application security data includes information related to user authentication, access control, and encryption. Control data is the data used to control the operation and behavior of the application. Therefore, all three options can be considered as ILFs in a project.

    Rate this question:

  • 17. 

    Which of the following can equate to one or more EIFs?

    • A.

      Reference data utilized by the application but maintained elsewhere

    • B.

      Error messages hard-coded into the application

    • C.

      Control data that is not maintained but is utilized by the application

    • D.

      A and c

    Correct Answer
    A. Reference data utilized by the application but maintained elsewhere
    Explanation
    The correct answer is "Reference data utilized by the application but maintained elsewhere." This is because EIFs (External Interface Files) are logical files that are used by the application but are maintained and updated by external entities. In this case, the reference data is used by the application but is maintained elsewhere, making it an example of an EIF. The other options, such as error messages hard-coded into the application and control data that is not maintained but utilized by the application, do not fit the definition of an EIF.

    Rate this question:

  • 18. 

    Unique processing logic for EIs includes

    • A.

      Edits

    • B.

      Calculations

    • C.

      Different FTRs

    • D.

      All of the above

    Correct Answer
    A. Edits
    Explanation
    The unique processing logic for EIs includes edits. This means that when processing EIs, there are specific edits or validations that need to be performed to ensure the accuracy and integrity of the data. These edits could involve checking for missing or invalid information, verifying data consistency, or applying specific rules or calculations to the data. This processing logic is specific to EIs and may differ from the processing logic for other types of data.

    Rate this question:

  • 19. 

    Which of the following are external outputs?

    • A.

      Data residing in an ILF that is retrieved, processed, and sent for use by an external application

    • B.

      Error or confirmation message reports associated with EIs

    • C.

      Data retrieved, calculated, and displayed to a user

    • D.

      All of the above

    Correct Answer
    A. Data residing in an ILF that is retrieved, processed, and sent for use by an external application
    Explanation
    The correct answer is "Data residing in an ILF that is retrieved, processed, and sent for use by an external application." External outputs refer to data that is generated by the system and sent to external entities, such as other applications or users. In this case, the data residing in an Internal Logical File (ILF) is retrieved, processed, and sent to an external application, making it an external output. The other options mentioned in the question, error or confirmation message reports associated with EIs and data retrieved, calculated, and displayed to a user, do not involve sending data to an external application, so they are not considered external outputs.

    Rate this question:

  • 20. 

    Which of the following cannot be counted as external inquiries?

    • A.

      Selection of data retrieval based on data input

    • B.

      Data retrieval capabilities prior to change or delete functionality, provided that the inquiry capability can be and is used as a stand-alone function

    • C.

      Data retrieved and displayed to a user, which result in a simultaneous update to an ILF

    • D.

      Full screen help

    Correct Answer
    A. Selection of data retrieval based on data input
    Explanation
    The selection of data retrieval based on data input can be counted as an external inquiry. External inquiries involve requesting information from the system and receiving a response. In this case, the user is inputting data to retrieve specific information, which qualifies as an external inquiry.

    Rate this question:

  • 21. 

    Degrees of influence (DIs) are evaluated

    • A.

      On a scale of 0 to 5

    • B.

      For each transaction

    • C.

      On a scale of +-35%

    • D.

      All of the above

    Correct Answer
    A. On a scale of 0 to 5
    Explanation
    The explanation for the given correct answer is that degrees of influence (DIs) are evaluated on a scale of 0 to 5. This means that for each transaction, the level of influence is assessed and assigned a value between 0 and 5, indicating the extent of influence. The scale allows for a range of evaluation, providing a more nuanced understanding of the influence exerted in each transaction.

    Rate this question:

  • 22. 

    Security or timing considerations are accounted for in which of the following GSCs?

    • A.

      Distributed data processing

    • B.

      Heavily used configuration

    • C.

      End user efficiency

    • D.

      Online data entry

    Correct Answer
    A. Distributed data processing
    Explanation
    Distributed data processing involves the use of multiple computers or servers to process and store data. In this type of system, security and timing considerations are crucial. Security measures such as encryption, access controls, and authentication protocols need to be implemented to protect the data from unauthorized access. Timing considerations involve ensuring that the distributed processing tasks are synchronized and coordinated effectively to avoid delays or conflicts. Therefore, security or timing considerations are accounted for in distributed data processing.

    Rate this question:

  • 23. 

    Which of the following fields on an internal logical file are counted as multiple DETs?

    • A.

      An account number or date that is physically stored in multiplies fields

    • B.

      Fields that appear more than once in an internal logical file where they serve as secondary keys

    • C.

      Summary fields at the monthly, quarterly, and annuals leves

    • D.

      All of the above

    Correct Answer
    C. Summary fields at the monthly, quarterly, and annuals leves
    Explanation
    Summary fields at the monthly, quarterly, and annual levels are counted as multiple DETs because they are calculated and stored in multiple fields. These fields contain aggregated data and are used to summarize information at different levels of time intervals. Therefore, they contribute to the count of Data Element Types (DETs) in an internal logical file.

    Rate this question:

  • 24. 

    When applied, the value adjustment factor adjusts the unadjusted function point count by 

    • A.

      +-5%

    • B.

      +-35%

    • C.

      65%

    • D.

      None of the above

    Correct Answer
    A. +-5%
    Explanation
    The value adjustment factor is used to adjust the unadjusted function point count by +-5%. This adjustment takes into account any additional complexity or value provided by the software being measured. It allows for a more accurate representation of the software's size and complexity, taking into account factors that may not be captured in the initial unadjusted count.

    Rate this question:

  • 25. 

    Which of the following is not an EI?

    • A.

      Unique data used to maintain an ILF

    • B.

      A unique file referenced from another application

    • C.

      A unique batch process that maintains an ILF

    • D.

      A unique screen function that maintains an ILF

    Correct Answer
    A. Unique data used to maintain an ILF
    Explanation
    The given answer, "Unique data used to maintain an ILF," is not an EI (External Input). An External Input refers to data or control information that enters the system from an external source. In this case, the other options mentioned are all examples of External Inputs as they involve interactions with other applications, batch processes, or screen functions. However, "Unique data used to maintain an ILF" does not involve any external input; it is simply referring to data used internally within the system to maintain an Internal Logical File (ILF).

    Rate this question:

  • 26. 

    A file referenced (FTR) is counted for

    • A.

      Each internal logical file maintained or referenced during the processing of an external input

    • B.

      Each internal logical file maintained or referenced during the processing of an external output

    • C.

      A and b

    • D.

      None of the above

    Correct Answer
    A. Each internal logical file maintained or referenced during the processing of an external input
    Explanation
    The correct answer is "Each internal logical file maintained or referenced during the processing of an external input." This means that any internal logical file that is either maintained or referenced while processing an external input is counted as a file referenced (FTR). It does not include internal logical files used in the processing of an external output or any other options mentioned.

    Rate this question:

  • 27. 

    A development project function point count

    • A.

      Is associated with the initial installation of new software

    • B.

      Measures the function provided to the end users by the project

    • C.

      Includes the functionality provided by data conversion and associated conversion-reporting requirements

    • D.

      All of the above

    Correct Answer
    A. Is associated with the initial installation of new software
    Explanation
    The correct answer is "Is associated with the initial installation of new software." This is because a development project function point count is a measure of the size and complexity of a software development project. It is typically done during the initial installation phase to estimate the effort required for development and to determine the project's scope. The function point count helps in evaluating the functionality provided by the project and can also include the functionality provided by data conversion and associated conversion-reporting requirements.

    Rate this question:

  • 28. 

    Which of the following can equate to one or more ILFs?

    • A.

      Work files

    • B.

      Edit data

    • C.

      Sort files

    • D.

      All of the above

    Correct Answer
    B. Edit data
  • 29. 

    Which of the following can equate to one or more ILFs?

    • A.

      Data received from another application that adds, changes, or deletes data on an ILF

    • B.

      Edit data used by the application to validate inputs

    • C.

      Data maintained by the application being counted, but accessed and utilized by another application

    • D.

      Data formatted and processed for use by another application

    Correct Answer
    A. Data received from another application that adds, changes, or deletes data on an ILF
    Explanation
    The data received from another application that adds, changes, or deletes data on an Internal Logical File (ILF) can equate to one or more ILFs. This is because ILFs represent logical groups of data that are maintained and used by the application being counted. When data is received from another application and is used to add, change, or delete data on an ILF, it implies that the ILF is being utilized and updated by the application, making it equivalent to an ILF.

    Rate this question:

  • 30. 

    Which of the following is an incorrect statement?

    • A.

      An EI processes data or control information that enters the application's external boundary

    • B.

      Control information must directly maintain an internal logical file

    • C.

      Control information is data used by a process within an application boundary to assure compliance with business function requirements specified by the user

    • D.

      Processed data must maintain an internal logical file

    Correct Answer
    A. An EI processes data or control information that enters the application's external boundary
  • 31. 

    Multiple external outputs are counted for

    • A.

      Identical reports that have the same format and processing logic but send unique data values to multiple users

    • B.

      Summary fields on a detail report

    • C.

      Identically formatted and calculated reports at the detail and summary levels

    • D.

      A and c

    Correct Answer
    A. Identical reports that have the same format and processing logic but send unique data values to multiple users
    Explanation
    Multiple external outputs are counted for identical reports that have the same format and processing logic but send unique data values to multiple users. This means that if there are multiple reports that have the same structure and processing steps, but deliver different data to different users, each report is counted as a separate external output. This is because each report serves a unique purpose for a different user or group of users, even though the underlying format and logic are the same. Additionally, summary fields on a detail report are also counted as external outputs because they provide additional information beyond the raw data. Therefore, the correct answer is "Identical reports that have the same format and processing logic but send unique data values to multiple users" (a and c).

    Rate this question:

  • 32. 

    An external inquiry (EQ)

    • A.

      Could be a unique input/output combination that results in the calculation of data

    • B.

      Could be a report generated monthly with retrieved data

    • C.

      Does not update an internal logical file

    • D.

      B and c

    Correct Answer
    A. Could be a unique input/output combination that results in the calculation of data
    Explanation
    The correct answer is "Could be a unique input/output combination that results in the calculation of data". An external inquiry refers to a specific input/output combination that involves performing calculations on data. It could be a unique request or query that retrieves specific information and generates a result based on that input. This type of inquiry does not update any internal logical files, meaning it does not modify or change the data stored within the system.

    Rate this question:

  • 33. 

    Multilingual support counts as to how many items under end-user efficiency?

    • A.

      None

    • B.

      Six

    • C.

      Two

    • D.

      One

    Correct Answer
    A. None
    Explanation
    The question asks about the number of items under end-user efficiency that multilingual support counts as. The correct answer is "None" because multilingual support does not contribute to end-user efficiency. End-user efficiency refers to the ability of users to perform tasks quickly and effectively, and multilingual support, while important for global accessibility, does not directly impact the efficiency of end-users in completing tasks. Therefore, it does not count as an item under end-user efficiency.

    Rate this question:

  • 34. 

    Which of the following are counted as DETs on EOs?

    • A.

      Each user-recognizable, nonrepeating field that appears on the external output

    • B.

      Each unique summary total on a report

    • C.

      Each type of label and each type of numerical equivalent in a graphical output

    • D.

      All of the above

    Correct Answer
    A. Each user-recognizable, nonrepeating field that appears on the external output
    Explanation
    DETs (Data Element Types) on EOs (External Outputs) are user-recognizable, nonrepeating fields that appear on the external output. This means that any field on the external output that can be recognized by the user and does not repeat within the output is counted as a DET. The other options, such as unique summary totals on a report and types of labels and numerical equivalents in graphical output, may be counted as FTRs (File Type Referenced) or RETs (Record Element Types), but not as DETs on EOs.

    Rate this question:

  • 35. 

    The unadjusted function point count is

    • A.

      The sum of the weighted function type values of the application being measured

    • B.

      Multiplied by the value adjustment factor to arrive at the adjusted function point count

    • C.

      The sum of the general application processing complexities based on the 14 general system characteristics

    • D.

      A and b

    Correct Answer
    A. The sum of the weighted function type values of the application being measured
    Explanation
    The unadjusted function point count is the sum of the weighted function type values of the application being measured. This means that each function type in the application is assigned a weight based on its complexity and importance. The sum of these weighted values gives us the unadjusted function point count. This count is then multiplied by the value adjustment factor to arrive at the adjusted function point count, which takes into account the general application processing complexities based on the 14 general system characteristics.

    Rate this question:

  • 36. 

    An enhancement function point count

    • A.

      Measures the modifications to an existing application that add, change, or delete user function within the scope of a project

    • B.

      Does not include the functionality provided by data conversion and associated conversion-reporting requirements

    • C.

      Represents the count of the installed application when completed

    • D.

      A and b

    Correct Answer
    A. Measures the modifications to an existing application that add, change, or delete user function within the scope of a project
    Explanation
    The correct answer explains that an enhancement function point count measures the modifications made to an existing application within the scope of a project. This includes adding, changing, or deleting user functions. It specifically excludes the functionality provided by data conversion and associated conversion-reporting requirements. The count represents the installed application when it is completed. Therefore, the answer accurately describes the purpose and scope of an enhancement function point count.

    Rate this question:

  • 37. 

    System file are counted as ILFs if they are

    • A.

      Hard-coded as requested by the user to meet legal requirements

    • B.

      Required for normal backup and recovery procedures

    • C.

      Introduced only because of technology used

    • D.

      None of the above

    Correct Answer
    A. Hard-coded as requested by the user to meet legal requirements
    Explanation
    System files are counted as Internal Logical Files (ILFs) if they are hard-coded as requested by the user to meet legal requirements. This means that the files are specifically programmed into the system to fulfill legal obligations set by the user or regulatory authorities. ILFs are a type of data maintained within the system and are used by the system to perform its functions. In this case, the system files serve a specific purpose related to legal compliance, making them eligible to be classified as ILFs.

    Rate this question:

  • 38. 

    Which of the following are EIs?

    • A.

      External data that maintains internal logical files

    • B.

      Data input used to drive selection for data retrieval

    • C.

      User updates associated with the elementary process of an EO

    • D.

      All of the above

    Correct Answer
    A. External data that maintains internal logical files
    Explanation
    The correct answer is "External data that maintains internal logical files." This is because external data that maintains internal logical files is considered an External Input (EI) in the context of software development. EIs are inputs that come from external sources and are used to maintain or update the internal logical files of a system. In this case, the external data is responsible for maintaining the internal logical files, making it an example of an EI.

    Rate this question:

  • 39. 

    An EI can be invoked if a user enters "A" or "Add" on a command line or users a PF key. How many DETs should be counted for the three command keys on the EI?

    • A.

      Zero

    • B.

      One

    • C.

      Two

    • D.

      Three

    Correct Answer
    A. Zero
    Explanation
    In this scenario, the question is asking how many Data Element Types (DETs) should be counted for the three command keys on the EI (External Input). The correct answer is zero because command keys do not capture any data elements. Command keys are used for navigation or executing specific actions within a system, but they do not involve the input or processing of data. Therefore, no DETs should be counted for the command keys on the EI.

    Rate this question:

  • 40. 

    If one elementary process - to issue an item from inventory - writes to two separate ILFs (Inventory and Department Billing) within the same application, count

    • A.

      One external input

    • B.

      Two external outputs

    • C.

      Two external inputs

    • D.

      B and c

    Correct Answer
    A. One external input
    Explanation
    When one elementary process writes to two separate ILFs (Inventory and Department Billing) within the same application, it is considered as one external input. An external input refers to the data that enters the system from an external source and is used to update the internal logical files. In this case, the process of issuing an item from inventory involves updating both the Inventory and Department Billing ILFs, but it is still considered as a single external input.

    Rate this question:

  • 41. 

    Which of the following could be counted as multiple EQs?

    • A.

      Identical queries produced on different windows with identical processing logic

    • B.

      Different graphical displays with different processing logic

    • C.

      Multiple methods od invoking the same inquiry logic

    • D.

      A and b

    Correct Answer
    A. Identical queries produced on different windows with identical processing logic
    Explanation
    Identical queries produced on different windows with identical processing logic can be counted as multiple EQs because they involve the same inquiry logic and produce the same results, even though they are executed on different windows. This means that the same query is being run multiple times with the same processing logic, which can be considered as multiple instances of the same EQ.

    Rate this question:

  • 42. 

    Extensive logical processing is accounted for in which of the following GSCs?

    • A.

      Transaction rate

    • B.

      Online data entry

    • C.

      Complex processing

    • D.

      Performance

    Correct Answer
    A. Transaction rate
    Explanation
    Transaction rate is the correct answer because extensive logical processing is typically required when handling a high volume of transactions. This involves processing and analyzing large amounts of data, performing calculations, and making decisions based on the transaction information. Therefore, transaction rate is the GSC that accounts for extensive logical processing.

    Rate this question:

  • 43. 

    Which of the following are counted as DETs on EOs?

    • A.

      Literals on reports

    • B.

      Paging variables or system-generated time/date stamps

    • C.

      Each distinct error or confirmation message available for display on an external input

    • D.

      None of the above

    Correct Answer
    A. Literals on reports
    Explanation
    The literals on reports are counted as DETs on EOs because they represent specific data elements that are being displayed on the reports. DETs, or Data Element Types, are used to measure the complexity of an External Output (EO) in function point analysis. In this case, the literals on reports are considered as distinct data elements that contribute to the overall complexity of the EO.

    Rate this question:

  • 44. 

    An average-complexity EIF has an unadjusted function point value of

    • A.

      5

    • B.

      7

    • C.

      10

    • D.

      15

    Correct Answer
    A. 5
    Explanation
    An average-complexity EIF is expected to have an unadjusted function point value of 5. This means that it is a relatively simple External Interface File, which is a type of data input or output that passes data from or to an external source. The low value suggests that it has a small number of data elements and a simple processing logic.

    Rate this question:

  • 45. 

    To assign an unadjusted function point value to each external inquiry,

    • A.

      Calculate the functional complexity on the basis of only the output side of the external inquiry

    • B.

      Calculate the functional complexity on the basis of the total nonrepeated DETs from both the input and output sides of the external inquiry

    • C.

      Select the higher of the two functional complexities on the basis of both the input side and the output side

    • D.

      None of the above

    Correct Answer
    A. Calculate the functional complexity on the basis of only the output side of the external inquiry
    Explanation
    The correct answer is to calculate the functional complexity on the basis of only the output side of the external inquiry. This means that only the output data elements are considered when determining the complexity of the external inquiry. The input data elements are not taken into account. This approach simplifies the calculation and focuses on the impact of the external inquiry on the system's output.

    Rate this question:

  • 46. 

    An external input may

    • A.

      Display data

    • B.

      Maintain an ILF

    • C.

      Perform calculations

    • D.

      All of the above

    Correct Answer
    A. Display data
    Explanation
    An external input may display data because it can receive information from a source outside the system and present it to the user. This can be done through various means such as a user interface or a display screen. By displaying data, the external input allows users to view and interact with the information provided by the system.

    Rate this question:

  • 47. 

    An external output may

    • A.

      Process data on the basis of user requests

    • B.

      Maintain an ILF

    • C.

      Perform calculations for display

    • D.

      All of the above

    Correct Answer
    A. Process data on the basis of user requests
    Explanation
    An external output refers to the functionality of a system that processes data based on user requests. This means that it takes input from the user, performs necessary calculations or operations on the data, and provides the desired output or result. This can include generating reports, displaying information, or any other action that is performed in response to user requests. Therefore, the correct answer is "Process data on the basis of user requests."

    Rate this question:

  • 48. 

    An external inquiry may

    • A.

      Send data to another application

    • B.

      Display data on the basis of user requests

    • C.

      Result in creation of a diskette

    • D.

      All of the above

    Correct Answer
    A. Send data to another application
    Explanation
    An external inquiry refers to a process where data is requested from an external source or application. This data can then be sent to another application for further processing or analysis. Therefore, the correct answer is "Send data to another application" as it accurately describes one of the possible outcomes of an external inquiry.

    Rate this question:

  • 49. 

    A user view

    • A.

      Is a description of the business functions

    • B.

      Can be used to count function points

    • C.

      Can vary in physical form

    • D.

      All of the above

    Correct Answer
    A. Is a description of the business functions
    Explanation
    The correct answer is "All of the above." A user view is a description of the business functions, which means it provides an understanding of what the system should do from a user's perspective. It can also be used to count function points, which is a metric used to measure the functionality of a software application. Additionally, a user view can vary in physical form, meaning it can be represented in different ways such as diagrams, prototypes, or written documentation.

    Rate this question:

  • 50. 

    Function point size can be approximated, but not measured, during

    • A.

      Proposal

    • B.

      Requirements

    • C.

      Design

    • D.

      All of the above

    Correct Answer
    A. Proposal
    Explanation
    Function point size can be approximated during the proposal phase. During this phase, the high-level requirements and scope of the project are discussed and documented. While the exact size of the function points cannot be measured accurately at this stage, an approximation can be made based on the preliminary understanding of the project's requirements and design. This approximation helps in estimating the effort, cost, and resources required for the project.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 25, 2011
    Quiz Created by
    Anamiccolis
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.