1) The architecture diagram for our product is an example of a software configuration item that could be managed by SCM. Group of answer choices True False 2) Project management begins before any technical activities begin. Group of answer choices True False 3) Function points are more normalized measures for code and can be used to measure all types of code. Group of answer choices True False

Fundamentals of Information Systems
8th Edition
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter8: Systems Development
Section: Chapter Questions
Problem 5SAT: Any potential changes in system requirements that are identified or suggested after the design phase...
icon
Related questions
Question

1) The architecture diagram for our product is an example of a software configuration item that could be managed by SCM.

Group of answer choices

True

False

2) Project management begins before any technical activities begin.

Group of answer choices

True

False

3) Function points are more normalized measures for code and can be used to measure all types of code.

Group of answer choices

True

False

4) What is a disadvantage of the Waterfall model?
Group of answer choices

Adhoc or little artifact creation

Complex interdependencies

Stakeholder feedback comes in at the end

None of these

5) What is a characteristic of separation of concerns?
Group of answer choices

The restriction of sharing data and information between modules only when needed

None of these

Subdividing a complex problem into smaller modules to be solved independently

The high level description of the problem followed by continuous elaboration adding more detail

6) When performing estimation, what is likely to be done first in the estimation process?

Group of answer choices

Negotiation of scope to limit what is supported for features or running platforms

Breaking work items into smaller components that can be sized

Negotiation of feasibility of the technical ability to deliver some of the components

None of these

Negotiation of business risks that would impact the application

7) Which is a valid process to vet a potential class?
Group of answer choices

Information hiding principles show that certain attributes will need to be hidden

The class will need a function to help change an attribute value within itself

Information flow can be modeled between multiple classes

Examine interdependency among attributes, higher interdependency means a strong class

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Software Development
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning