homeworkstudyhelp

Our Services

Get 15% Discount on your First Order

1)Requirement clarity index for a project is computed based on the…

1)Requirement clarity index for a project is computed based on the understanding of requirements by:

A)Development Team

B) Testing team

C)Business Analysts

D)Development and testing teams

2)Techniques used by static code analysis tool is:

A)Control Analysis

B)Fault/Failure Analysis

C)Interface Analysis

D)All the above

3)If a application is a most critical application that perform high value transaction,contain sensitive medical data,or any application that requires the highest level of trust (defence,Navy,govt secret missions etc) comes under which level of security?

A)Level 1 security

B)Level 2 Security

C)Level 3 Security

D) None of the above

4)Which of the following is not  a security principle?

A)Confidentiality

B)Integrity

C)Availability

D) Authority

5)What should be included in every service level agreement?

A)Details of Systems based metrics used

B)A technical Description of service components

C)Clearly defined service outcomes

D)LEgal language

6)What is meant by team velocity in Scrum projects?

A)Team works less when it rains

B)keeping metrics of earlier amounts of work completed to help with future predictions on how much work can be completed in a certain time frame

C)Reterospectives should use less important topics such as weather ,as ice-breakers

D)Estimating team efforts for completing the projects.

7)Which of the following is the best practices adopted by scrum teams to ensure to have a sprint ready backlog items ready by the sprint planning meeting?

A)Spiking

B)Backlog refinement

C)Refactoring

D)Process tailoring

8)As per GIP MDD Stands for

A)Managing definition of done

B)Metrics description Document

C)Metric for defect density

D)Maintiain document descrptions

9)Reusability,Extensibility,portability,scalability,performance are examples of 

A)Project types

B)Review types

C)Archtectural goals

D)All of the above

10)______ type of attack is carried out when untrusted data is sent to an interpreter as a part of command or query?

A)Sensitive data exposure

B)Broken authentication

C)SQL injection 

D)Cross site scripting

11)which is owned code review tool as per the Devsecops periodic table available in GIP under Devsecops

A)Insight live

B) JAcoco

C)Crucible

D)Mocha

12)If the application handles personal data also known as personal information or sensitive information it is said to be

A)LEvel 1 Security

B)Level 2 security

C)Level 3 Security

D) None of the above

13)Define high level migration road map in cloud transformation is the primary responsibility of 

A)Business Analyst

B)CLoud Architect

C)Both A and B

D)None of the roles

14)As per GIP models that are used to forecast quality and performence outcomes related to one or more sub process involved in the development ,maintainance and service process is refered as?

A)Statistical Modeling

B)GIP

C)CMMI

D)Prediction models

15)What does TCO give in cloud discovery?

A)Projected savings over a 3 or 5 yr period by moving to the cloud

B)Actual savings over a 3 or 5 yr period by moving to the cloud

C)Actual Loss over a 3 or 5 yr period by moving to the cloud

D)Projected loss over a 3 or 5 yr period by moving to the cloud

16)which of the following is not a functional testing?

A)Eqvivalence Test

B)Decision based tests

C)Boundary value tests

D)None of the above

17)which role in agile scrum is self organised and owns most of the activities included in sprint planning ,execution and reterospection 

A)Scrum master

B)Product owner

C) Development team

D)Agile coach

18)Which of the following is the purpose of monitoring and event management practice?

A)To ensure that accurate and reliable information about the configuration of services is available when and where is needed

B)To systematically observe the services and service components record and report the selected changes of state

C)To protect the information needed by the organisation to conduct its business

D)to minimize the negative impact of incidents by restoring the normal service operation as quickly as possible

19)which of the following states the fundamental tent of scrum approach?

A)Get something simple released As quckly as possible

B)Get something business vale delivered  As quckly as possible,consistent with the right level of quantity

C)Get something delivered once its fully documented and the documentation is signed off complete.

D)Get something “quick and dirty”  delivered  to save time.

20)Which of the following is benefit of using an IT service management tool to support incident managemt?

A)It can ensure that the incidents are resolved within agreed times

B)It can provide automated matching of incidents to problems or known errors

C)It can ensure the supplier contracts are aligned to the requirements

D)It can provide automated resolution of complex incidents

21)A process that is used to identify what is working well ,not working well and needs some modifications in the project is called:

A)Release Audit

B)Reterospection

C)Configuration Audit

D)Unit testing

22)As per GIP Lo team would maintian all std operating procedures /Known Error Database:

A)True

B)False

23)Upon rolling out large web and mobile enabled application portal ,if end users complain that they are unable to find the information they are looking for and needs  multiple actions to retrieve simple information which of the following testing would have been ineffective for the application?

A)UAT Testing

B)Securtiy Testing

C)USability

D)Functional testing 
 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Explain to your friends what the System Development Life Cycle is….

Explain to your friends what the System Development Life Cycle is. Then motivate the importance of each core process of the System Development Life Cycle (SDLC). Substantiate your arguments with well researched examples illustrating the consequences of engaging in these processes negligently.

Good afternoon   My MATLAB optimization code for a turbojet engine…

Good afternoon   My MATLAB optimization code for a turbojet engine in order to maximize and minimize the following functions with various constraints is not working and even when plotting in 3D it appears some errors:Could someone help me get it working please?   function [f, g] = turbojet_objective(x) %

4.9 LAB: Sorting TV Shows (dictionaries and lists)   Write a…

4.9 LAB: Sorting TV Shows (dictionaries and lists)   Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. The input file contains an unsorted list of number of seasons followed by the corresponding TV show. Your

Overview Object modeling is an important part of system analysis…

Overview Object modeling is an important part of system analysis and design. Since object-oriented languages such as Java and C++ have become more common, systems analysts also need to be able to design a system from an object-oriented perspective. Object modeling involves thinking about the objects and classes that will