Exam 2: Coding in the Sdlc: Not a Solitary Practice
Exam 1: Why You Need to Learn Secure Programming45 Questions
Exam 2: Coding in the Sdlc: Not a Solitary Practice49 Questions
Exam 3: Principles of Security and Quality44 Questions
Exam 4: Getting Organized: What to Do on Day One41 Questions
Exam 5: Software Requirements: Hear What They Say, Know What They Mean, Protect What They Own43 Questions
Exam 6: Designing for Quality: the Big Picture47 Questions
Exam 7: Designing for Security45 Questions
Exam 8: Development Tools: Choose Wisely42 Questions
Exam 9: Coding in the Cube: Developing Good Habit50 Questions
Exam 10: Testing for Quality and Security45 Questions
Exam 11: Maintain Your Software, Maintain Your Career43 Questions
Select questions type
This methodology allows a very fluid communication stream with end users and uses the produced software as a measure of progress.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
C
Created by Barry Boehm, the Spiral Methodology was created for projects considered to be of low to moderate risk.
Free
(True/False)
4.8/5
(40)
Correct Answer:
False
Team Software Process (TSP) is an example of an advanced methodology.
Free
(True/False)
4.9/5
(42)
Correct Answer:
True
Touchpoints are activities that the development team needs to do during a particular phase of the SDLC.
(True/False)
4.8/5
(26)
What are various activities, or phases, that software goes through from concept to retirement?
(Multiple Choice)
4.8/5
(35)
This person is responsible for understanding the system's requirements and how the system was designed and developed, and knows how to break the software.
(Multiple Choice)
4.7/5
(30)
Why is active listening such an important part in the job of software development?
(Multiple Choice)
4.8/5
(32)
It is not the job of the PM to define roles and responsibilities.
(True/False)
4.9/5
(35)
What is the key ingredient of teamwork in software development?
(Multiple Choice)
4.8/5
(35)
This person is responsible for knowing the business rules and customer requirements.
(Multiple Choice)
4.8/5
(34)
Sharing sensitive information between applications has made writing code more of an orchestrated event than a ____ practice.
(Multiple Choice)
4.9/5
(31)
CMMI defines how effective organizations are at following a formal development process by classifying the organization into maturity levels.
(True/False)
4.8/5
(33)
This methodology allows the users and developers to proceed to build the requirement only if the level of risk is acceptable.
(Multiple Choice)
4.8/5
(31)
This standard is part of Carnegie Mellon University, defines standards with government organizations, businesses, and academia to improve the software development process.
(Multiple Choice)
4.8/5
(32)
An effective Project Manager has good people skills, communication skills, and interpersonal skills.
(True/False)
4.7/5
(44)
This person is responsible for knowing the security needs of the application, types of software attacks, and how to break the software.
(Multiple Choice)
4.9/5
(28)
Traditional methodologies include the following: Waterfall Iterative Spiral
(True/False)
4.9/5
(29)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)