-
Notifications
You must be signed in to change notification settings - Fork 208
/
Copy pathSWR302.txt
4737 lines (4736 loc) · 577 KB
/
SWR302.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
What is NOT true about Fundamentals of software process improvement | Software process improvement is not necessary because it makes software development cost more
Which could requirements be reused in the scope of cross an enterprise | Security requirements , Constraints , Business rules
Which is the CORRECT statements that descnbe about background section in the template of Vision and scope document? | The background summanzes the important business
With statements are true | should start by brainstorming as many user classes as you can tt sponsor who he expects to use the system
Requirements are missed during elicitation that does not relate the software projects shooklril be finished on time | False
Software requirements specification template a be long to | Requirements Development Process Assets
Which is NOT a basic element of Plan when you do repuiremenls elicitation on your project? | Keep everyone engaged
What is true about Sources of trace link intonation | All above answers are true
Mach could requirements be reused in the scope across on an enterprise | Security requirements , Constraints , Business rules
Which techniques should not to be used for the Embedded software project when you do requirements elicitation | System interlace analysis
To understand user tasks and goals and the business objectives with which those tasks align the BA should discuss vv. users at which | Elicitation
the use of traceability lades helps to | identify, control, and track requirements changes
Proposed requirements changes are before being commrtled to. | thoughtfully evaluated
Requirement attributes include: | 1, 2, 3, 4
Which statement CORRECT describe the term user story? | A format to capture user requirements on agile projects in the form of one or two
What Is considered the traditional means or requirements elicitation? | Interviews
Impact analysis procedure and template are not necessary for change impact analysis | False
is the process of examining a project to identify potential threats | Risk assessment
Which is the most appropriate way when you want to resolve the disagreement requirement | Product owner or product champion for the user class decides
Which is(are) the characteristics of product backlog? | Multiple teams can work on a single product backlog.
Choose true sentence about links in the requirements chain | Requirements are related to each other
Wien analysis mcdel you should use when the customers present their requirements using Noun? | Entities or thou attributes (ERD)
Which tip is NOT belong to Interviews technique when you do requirements elicitation? | Fill all of the team roles
Which is the CORRECT statements that describe about business objectives section in the template of Vision and scope document? | the important business benefits the product will
According to Halle and Goldberg 2010 in Software Requirements, third edition; which is NOT a basic types of business rule? | References
According to Karl Wiegers and Joy Beatty in the book Software Requirements, | System requirement
The change control board charter includes: | 1, 2
What sentence is not true about requirements changes? | Requirements changes do not affect requirement effort
A throwaway prototype is most appropriate when: | Users , Have ,The gaps ,the team
Which of the following is not a type of software requirement? | Complexity
A listed acceptance criteria to fulfil certain requirements of a user and normally written from the perspective of an end-user. This is a | user story
Which is NOT the main audience of the software requirements specification document? | The competitor. who want to steal the data of the software system
Which is the generic template for a requirement written from the system's perspective? | [optional precondition] [optional trigger event]
Customers have the responsibility to: | 1, 2, 4
Which of the following is most true about a non-functional requirement? | is highly sensitive to the system architecture
Which analysis model you should use when the customers present their requirements using Conditional? | Which analysis model you should use when the customers present their requirements using Conditional?
Which is not a reuse success factor? | National culture
Which is the most appropriate way when you want to resolve the disagreement requirement | Segment with greatest impact on business success gets preference
Which of the following property is least critical to the interaction between process actors and the requirements process? | the education of the actor
Which is the correct definition of the term business rule based on the information system perspective? | It is intended to assert business
What types of process assets are correct about requirements engineering process assets? | Template, Cost Evaluating
The following statements are true or false? Anywhere there are functions. there is data. Software functionality is specified to create | False
What sentence is correct? A Both others are true | Both others are true
Which template fit with the example requirement written based on the user's perspective? | The [user class or actor name] shall be able to
When to use notation TBD (to be determined) in software requirements specification? | When you dealing with incompleteness requirements
If requirements are easily understandable and defined then which model is best suited? | Waterfall model
What is NOT true about motivations for tracing requirements? | Managing Project
Which of the following is the CORRECT definition of the term Feature? | One or more logically related system capabilities that provide value to a user and are
What Is not included in Requirement Statuses? | Not Need
Which is NOT a basic skill of a Business Analyst? | . Document requirements
Product requirement validation occurs primarily after | Elicitation
Which is a good place to start specifying data requirements in the new software system you want to develop? | with the input and output flows on the systems context diagram
Major requirements management activities include | 1.2.4.5
Without customer contact the expectation gap __ during software development time | increases
Which of the following is the CORRECT definition of the term User Requirement? | A goal or task that specific classes of users must
Which ts the most appropriate way to improve the ambiguous terms | Specify the minimum acceptable time in which the
Which of the following is not a good characteristic well written of a software requirements specification? | Redundant
Which dimension of requirement classification is critical for consideration of tolerant design? | Whether the requirement is volatile or stable.
Giving an example of quality requirements: 'After performing a file backup, the system shall verify | Integrity requirement
Which of the following is NOT a type of software requirement? | Complexity
What is a software requirements specification (SRS) document? | A document detailing software requirements and specifications
Which technique overlaps for use in requirements elicitation and requirements validation? | Prototypes
What presents the information and preconditions necessary for a business analysis task to begin? | Input
What is considered the traditional means or requirements elicitation? | Interviews
The use of traceability tables helps to: | Minimize miscommunication and unnecessary rework
Portability is an internal quality attribute which could be described: | How easily the system can be made to work in other operating environments
Giving a business rule" All website images must include alternative text to be used by electronic | constraint
Giving a business rule " If the customer ordered a book by an author who has written multiple | action enabler
When does the business analyst ensure the feasibility of the proposed requirements to | During Requirements Analysis
Which document is used to derive the software requirements specification? | System Requirements Specification
Process quality and improvement relies most on which of the following? | Requirements process measures
Which requirements should NOT be reused in the scope of cross an enterprise? | Constraints
You are a business analyst measuring alternatives against objectives and identifying trade offs to | Problem solving
What should the software requirements specification (SRS) writer avoid placing in the SRS environment of the SRS? | Either design or project requirements
A key tool for software designer, developer and their test team is to carry out their respective tasks | Requirement documentation
The work products produced during requirement elicitation will vary depending on the _ | size of the product being built
To express the user task descriptions. which representation technique is NOT suitable? | Storyboards
What is the most common type of scenario elicitation technique? | The use case
What is a software engineer most likely to resolve by making a unilateral decision? | Differences between developer perception
Which of the following is not embedded design that would be written in the SRS? | Specify logical requirements for the software
Identify key roles and selecting requirements activities is done as part of which knowledge area? | Business Analysis Planning and Monitoring
Requirement elicitation is communication intensive and should be aligned with: | The stakeholders needs and constraints
Why is base-lining project? | To get an agreement for each set of requirements after the team implements them
If requirements are easily understandable and defined then which software process model is best suited? | Waterfall model
Which is NOT the type of internal quality? | Availability
Which is (are) the skills of business analyst on Agile project? | All of the mentioned
Which of the following is NOT a good characteristic well written of a software requirements specification? | Redundant
Giving a statement in an Airport check-in kiosk application: "As a traveler. I want to check in for a | user story
Which is NOT the reuse barrier? | Organizational culture
According to the SWEBOK Guide, what are the four major activities of the requirements engineering process? | Elicitation, analysis, specification, and validation
Which is NOT the type of requirements development tools? | Requirement Management tools
Why is Requirements Management important? It is due to the changes | All of the mentioned
which of the following you should be based on when you estimate the project size and effort | All of the mentioned answers
Which are the processes in requirements engineering? | All of the mentioned
Which is NOT the most important characteristics of product backlog | Lowest ranking items are decomposed into smaller stories during release
Which is NOT the advantage of Agile methods? | puts considerable effort into trying to get the full
In the IEEE Std 1362 Concept of Operations (ConOps) Document, which of the following is | Proposed design method of system
If a requirements status is proposed then it | Has been requested by an authorized source
A throwaway prototype is most appropriate when: | . All of the mentioned
What is the most important attribute of a requirement? | Identifier
The requirements engineering process is _ | Initiated at the beginning of a project and continues to be
Which adverbs are the causes of requirements ambiguity in documenting Software Requirement Specification? | all of the mentioned
Which of these steps in the planned change process provides the objective or expectation of how a change will respond to whatever | develop change goals
Which of these steps in the planned change process provides a roadmap for how the change will be implemented? | develop the change plan
Due to the iterative nature of the requirements process, change has to be managed through the review and approval process. | System definition
Which of the following phrases most closely approaches verifiable language? | "According to Standard X"
Requirements reviews: Can not be done before completion of the | Systems definition document
Requirement Baselines are | .Requirements committed to be implemented
Which of the following requirement properties would be considered an emergent property of a software program? | The reliability of the software
Which is not describe the correct purpose of requirements elicitation? | Collect, discover, extract, and define exactly what are the outputs of project
What does allocation try to satisfy in the assigning of responsibility to components? | Requirements
What defines the business analysis team roles, deliverable to be produced, and tasks to be performed? | Business analysis approach
Software requirements validation should be viewed by whom and how often? | Stakeholders, often
Product requirement validation occurs primarily after | Specification
The BEST way to conduct a requirements validation review is to | use a checklist of questions to examine each requirement
Which of the following property is least critical to the interaction between process actors and the requirements process? | The education of the actor
Which is NOT a technique to find missing requirements? | Check a list of tasks corresponding with end users
Requirements gathering activities are also known as requirements: | Elicitation
In order to determine solution to business problems, the business analyst applies a set of: | Tasks and techniques
The software requirements specification should NOT be called | user requirements
Giving a business rule "A discount is calculated based on the size of the current order, as defined in Table BR-060.' | computation
Which of the following is the technical manager not responsible for? | Re-estimating the cost and schedule of the project when the requirements change.
The voice of the customers may be derived from | Customer complaints
To understand user tasks and goals and the business objectives with which those tasks align, | Elicitation
To depict the complex logic, which representation technique should be used? | Decision tree , Decision table
The requirement passed its tests after integration into the product. this is status | verified
Which requirements should NOT be reused within an operating environment or platform? | Stakeholder profiles
Which is NOT the helpful of product backlog? | It helps in managing the demands of stakeholders
The business analyst team has put together the elicitation results documenting their understanding of the user need. | Stated and Unconfirmed
Which is the benefit of the reuse requirements techniques? | All the mentioned answers
Which is not the purpose of software prototype technique? | Specific technologies, tools, languages, and databases that must be used or avoided (constraints)
Which is NOT belong to the case of use case traps? | Depicts detail the use case story
Classifying users should not base on: | The knowledge user have
Software Requirement Specification (SRS) is also known as specification of | Black box testing
In the V model, the user requirements are detected by | Acceptance testing (User/Business requirement)
Which of the following is most true about a non-functional requirement? | . Acts to constrain the software solution
The system users have stated their needs for revised online order entry system capabilities | Functional requirements
As requirements are elicited. what source is most likely to impose previously unidentified user processes? | The organizational environment
A concept of operations document (ConOps) should not be written | Primarily in the developers technical language
Giving a condition example in specification of withdrawn money use case: "the ATM has dispensed money and printed a receipt'. | postcondition
Which activities are NOT belong to requirements status tracking? | Tracking individual requirements versions
A listed acceptance criteria to fulfil certain requirements of a user and normally written from the perspective of an end-user. | user story
Which of these steps in the planned change process puts the change plan into action? | implement the change
During which of these steps in the planned change process is used to determine how ready | select the change agent
Which of these steps in the planned change process requires managers at all levels to be | recognize the need for change
What is a best practice for change control? | Hold change meetings
Requirements tracing is most likely concerned with the following: Recovering the source of requirements from: | Software requirement back to the system
Which of the following would most likely be considered a product requirement? | The student name shall be entered before the student grade.
Which is (are) the type of Agile method? | Feature-Driven Development
Which is (are) the type of Agile method? | Kanban , Extreme Programming
Which is (are) the type of Agile method? | Lean Software Development , Scrum
The iterations in Agile method should be | one month , one week
What is not the essential aspects of an agile approach to requirements? | Budget change
is a comparison of functionality between an existing system and a desired new system. | Gap analysis
Which are the most common challenges with packaged solutions? | Vendor misrepresents package capabilities Users reject the solution
Which are the most common challenges with packaged solutions? | Language and cultural barriers
Which are the most common challenges with packaged solutions? | Incorrect solution expectations
Which are the most common challenges with packaged solutions? | Too many candidates
Which are the challenges that outsourced projects have to face: | . Language and cultural barriers
Which are the challenges that outsourced projects have to face: | Remote developers lack the organizational and business knowledge
Which are the challenges that outsourced projects have to face: | Large time zone differences
Which are the challenges that outsourced projects have to face: | It's harder to get developer input on requirements and to pass along user feedback on delivered software to developers.
Updating sets of requirements is an activity of | . change control
The requirement will be implemented in a future release, this is _______status | deferred
Managing requirements changes is difficult because | document-centric process
Managing requirements changes is difficult because | difficult to understand the impact
Managing requirements changes is difficult because | lack of visibility
Managing requirements changes is difficult because | high reliance on a single person
The requirements change management determines | who does not need to be involved
The requirements change management determines | process for requirements change
The requirements change management determines | who will be consulted or informed of change
The requirements change management determines | which stakeholders need to approve change
The change management board has a scope of authority that indicates | . approve or deny
What happens to a rejected change request? | It stops
The Change Control Board will have a | chairperson
Defining links between individual functional and nonfunctional | forward from requirements
Customer needs are traced | . backward to requirements
Requirements tracing is most likely concerned with the following | Software requirement back to the system requirement it supports
Which is(are) the limitations of a document-based approach in developing | It's hard to define links between requirements and other system elements
Which is(are) the limitations of a document-based approach in developing | . It's not easy to store supplementary information—attributes—about each
Which is(are) the limitations of a document-based approach in developing | Communicating changes to all affected team members is a manual
Which is(are) the limitations of a document-based approach in developing | . It's difficult to keep the documents current and synchronized.
Which is (are) the essential Agile techniques to improve traditional requirements | compliment user stories with supporting artifacts
Which is (are) the essential Agile techniques to improve traditional requirements | groom your User Stories often
Which is (are) the essential Agile techniques to improve traditional requirements | create requirements that slice the cake
Which is (are) the essential Agile techniques to improve traditional requirements | invest in your User Stories
all of the following actions, the review board need to do when reviewing changes of requirement except | maintains a wishlist of possible changes
there are the following backwards of prototypes and mock-up technique, except for | can not understand implications
what should we do in the stakeholder analysis stage of re | determine..based their role, interest..
a systematic process of managing conflicts has the stages.. | identify,detect conflict,generate,evaluate
which one of the following statements about package is false | the name of elements defined in a package are local to the
the domain understanding and requirements elicitation stage involves a great deal of knowledge acquisition, except | knowledge about programming language
which of the following is not a criterion of stake holder selection | exposure to perceived technical issues
all of the following statements about advantages of free documentation in unrestricted natural language are correct, except | there is no notable ambiguities, noise
which of the following is a standard technique for structuring complex if-then condition | using decision table
at higher levels, there are coarser-grained goals stating | strategic objectives
when we are unfamiliar with the system-as-is, we may need.. except | studying document and reports of system-to-be
is a prescriptive statement to be enforced by the software-to-be, possibly in cooperation with other system components, and formulated in terms of environment phenomena | system requirement
all of the following statements about local rules on writing statements in requirements document are correct except | make sure that every concept is defined after its use
all of the following statements about outputs of requirement specification and documentation phase are correct except | all general objectives, system requirements, software requirement...
all of the following activities should not be done in "change initiation" stage of change control process except | maintain a wishlist of possible changes...
all of the following statements about background study techniques are correct except | an obvious strength of the technique is that..
Requirement engineering is the first phase in software lifecycle? | TRUE
Software quality assurance is a key concern for Requirement quality assurance | FALSE
RE deliverable is requirements document for system-to-be | TRUE
RE is concerned with world and machine phenomena | TRUE
Why do we need models for RE? | Provides structure ...,Support for ..., explanation to ...,Basis for ...,Focus on ...
Which of following belong to System requirement statements? | Prescriptive statement referring to environment phenomena
What is requirement engineering? | Set of activities producing the requirements on a software-intensive system
Which of the followings belong Assumption statements? | Statements to be satisfied by the environment of the software-to-be
To make sure a software solution “correctly” solves some real-world problem, we must first fully understand and define | The context in which the problem arises, What problem needs to be solved in the real world
Which of the followings statements belong to WHO dimension? | Assign responsibilities for the objective, services, and constraints among system-to-be components
Which of the following statements belong to WHAT dimension | Identify& define the system-to-be’s functional services
Which of the following statements belong to WHY dimension? | Identify, analyze, refine the system-to-be’s objectives
Which of the following belong to scope of RE? | WHO,WHY,WHAT dimension
What are the activities producing the requirements on a software-intensive system? | Elicitation, Specification, Evaluation, Evolution management
The prototype process is iterative | TRUE
In active mode of storyboard, stakeholders contribute to the story. The storyboard is used for joint exploration | TRUE
In passive mode of storyboard, stakeholders contribute to the story. The storyboard is used for explanation validation | TRUE
Artifact-driven techniques rely more on specific types of interaction with stakeholders | FALSE
All of the following actions belong to Domain understanding and Requirement elicitation expect | Understand the system-to-be and its context
Which of the following techniques belongs to stakeholder-driven elicitation techniques? | Observation and ethnographic studies, Group sessions, Interviews
According to performance requirements classes in a reusable catalogue, which of following belong to Time? | Response time, Throughput
According to performance requirements classes in a reusable catalogue, which of following belong to Space? | Main memory, Secondary storage
Which of the following statements about weighing questions is true? | A weighting question provides a list of statements that need to be weighted by the respondent to express the perceived importance, preference or risk of the corresponding statement.
What is the first phase of RE process? | Domain understanding and elicitation
What is the goal of Prototypes & mock-up? | Check requirement adequacy from direct user feedback, by showing reduced sketch of software-to-be in action
Which of the following statements about Software Prototypes are true? | (1)Its aim ...,(2)It is a quick implementation ...,(3)/There are different kind ...
What is the goal of Card sorts & repertory grids? | Acquire further into about concepts already elicited
We need to acquire the contextual knowledge under which the system-to-be will be elaborated. This … | Knowledge about the system-as-is, Knowledge about the organization,Knowledge about the domain
Poor risk management is a major cause of software failure | TRUE
A risk is an uncertain factor whose occurrence may result in loss of satisfaction of a corresponding objective | TRUE
The Weak, Strong conflicts are more difficult to handle than… | TRUE
Process-related risks are negative impacts on functional or non-functional objectives of the systems | FALSE
Inconsistencies are highly rare in RE | TRUE
Which of following are types of inconsistency in RE? | Terminology clash, Structure clash, Designation clash
List types of RE risk? | Product-related risks, Process-related risks
What are the phrases of managing conflicts process? | Identify overlapping..., Detect ..., document these, Generate ..., Evaluate..., select ...
What are the goals of risk assessment? | Assess likehood of risks, Assess severity of risks, Assess likehood of risk consequences (h?u qu?)
What is last stage of managing conflicts process? | Evaluate resolution, select preferred
What are the phrases of RE risk management? | Risk identification, Risk assessment, Risk control
What is last phase of RE risk management? | Risk control
Which of the following tactics belong to risk reduction tactics? | Avoid risk, Reduce consequence like hood, Reduce risk like hood, Mitigate risk consequence
Which of the followings belong to Designation clash? | Same name for different concepts in different statements | e.g. “user” for “library user” vs. “library software user”
Which of the followings belong to Structure clash? | Same concept structured differently in different statements | e.g. “latest return date” as time point (e.g. Fri 5pm) vs. time interval (e.g. Friday)
Which of the followings belong to Terminology clash? | Same concept named differently in different statements | e.g. library management: “borrower” vs. “patron”
A context diagram is a simple graph where nodes represent system components and edges represent connections through shared phenomena declared by the labels | TRUE
Free documentation in unrestricted natural language has no limitation in term of expressive and communicability | TRUE
Use case diagrams are used to complement such a view through interaction scenarios | FALSE
SADT diagrams capture activities and data in the system | TRUE
What is the third phase of RE process? | Requirement specification and documentation
Which of the following statements belong to Sequence diagram? | It complements such a view throughinteractionscenarios
Which of the following statements belong to Class diagram? | It provide a structural, entity-relationship view of the system
Which of the following statements belong to Use case diagram? | It is used for outlining an operational view
What does SADT stands for? | Structured Analysis and Design Technique
According to IEEE standard template for organizing the RD, which of the followings belong to General Description? | Product perspective, Product functions, User characteristics, General constraints, Assumptions & Dependencies, Apportioning of requirements
Which of the following belongs to Inter-view consistency rules? | (4)Every component...Every state in a...Every data...Every shared...
According to IEEE standard template for organizing the RD, which of the followings belong to Specific Requirements? | Functional requirements, External interface reqs, Performance reqs, Design constraints, Software quality attributes, Other requirements
The structure of RD should make it easy to | Trade items back to their rationale, Understand it, Following dependency links, Retrieve and analyze its items,
Requirements quality assurance is not a major concern in view of the diversity of potential defects in the requirements document | FALSE
Language-based checklist specialize the defect-based ones to the specific construct of the structured, semi-formal or formal specification language used in the requirements document | TRUE
Formal Verification should not be used to reveal ambiguous and immeasurable RD items during specification formalization | FALSE
The main purpose of requirements validation is to check the adequacy of requirements and assumptions | TRUE
What is the first stage of the requirements inspection process? | Inspection planning
What is the last stage of the requirements inspection process? | RD consolidation
Which of the following statements belong to Free Mode of Individual Reviewing? | The inspector receives no directive on what part of the RD to consider specially or what type of defect to look for
Which of the following statements belong to Requirements Validation by Specification Animation | (All) Its main purpose is to check the adequacy of requirements and assumptions, Its purpose to see whether the system-to-be as specified meets the actual expectations of stakeholder
Which of the following statements belong to Checklist Based Mode of Individual Reviewing? | The inspector is given a list of questions and issues to guide the defect search process
Which of the following belong to Defect-base checklists? | There are lists of questions structured according to the various types of defects that we can find a requirements document
Which of the following belong to Quality-specific checklists? | Such checklists specialize generic and quality-specific checklists to the specific concepts and standard operations found in the domain
All of the followings are techniques used for Requirements Quality Assurance except? | Interviews
Which of the following belong to phase of requirement inspection process? | Individual reviewing, RD consolidation, Inspection planning, Defect evaluation at review meetings
Which of the following are techniques used for Requirements Quality Assurance? | Queries on a requirement database, Formal Verification, Inspections and Reviews, Animation-base validation
Revisions and variants define a two-dimensional space for defining product evolutions, rather than two separate tracks | TRUE
Requirement changes tend to be forgotten during the evolution | TRUE
Variants result from evolution over time, whereas revisions result from evolution across product families | FALSE
Which of the following statements belong to variants? | Variants result from changes made to adapt, restrict or extend a master version to multiple classes of users or usage conditions
Which of the following statements belong to revisions | A revision results from changes generally made to correct or improve the current version of a single product.
Which is the first stage of change control process? | Changeinitiation
Which is the last stage of change control process? | Change consolidation
The cost - benefit analysis should control output parameters from those input parameters, according to the | (3) The people,The technique,The scope,granularity,accuracy,semantic richness ...
What are the phases of change control process? | Change initiation, Change consolidation, Change evaluation and prioritization
Which of the followings belong to the techniques for traceability management? | Cross referencing,Feature diagrams,Traceability matrices,
Which of the following is not a phase of traceability management? | (None)
Which of the following is a phase of traceability management? | Define traceability policy, Establish traceability links, Exploit traceability links, Maintain traceability links
What is the version type of the following casual factor “Environment change: new class of users or new usage condition“ | Variant
What is the version type of the following casual factor "Improved quality feature"? | Revision
Which of the following statement about Change Control is not true? | The necessity, feasibility, benefits, impact and cost of the requested changes are evaluated by development team.
The finer-grained a goal, the fewer agents required for its satisfaction | TRUE
Goals are prescriptive statements of intent the system should satisfy through cooperation of its agent | TRUE
Goal satisfaction requires agent cooperation? | TRUE
What is the goal? | Prescriptive statement of intent the system should satisfy through cooperation of its agents
What are types of goals? | (2 types) Behavioral goals, Soft goals,
What are goal categories? | Functional goals, Non- functional goals
What is a system agent? | It is an active system component that is responsible for goal satisfaction
What are types of Agents? | (3 types) Software,Device,Human
Which of the following statements about system agent are true? | We must restrict its behavior to meet its assigned goals, It must be able to monitor/control phenomena involved in assigned goals
Which of the following statements belong to Higher-level goals? | Effective access to state of the art, 50% increase of transportation capacity
Which of the following statements belong to Lower-level goals? | Reminder issued by end of loan period if no return, Acceleration command sent every 3 seconds
Which of the following statements about behavioral goals are true? | (3)Cannot be... (yes or no),Prescribe intended...,Used for building...Which of the following statements about the distinction between goals & domain properties is not true? | Only domain properties are required in requirements documentation
AND-refinements should also be consistent and maximal | FALSE
The view that covers the WHY dimension of RE is provided by a goal model? | TRUE
A goal model shows contribution links and leaf goal assignments | TRUE
Getting complete refinements of behavioral goals is essential for requirements completeness | TRUE
Which of the following statements belong to soft goals are true? | (3) Used for comparing ...,Often take the forms:...,Capture preferences...
A goal model includes: | AND – refinement, OR– refinement
What are the leaf nodes? | Goals assignable to single system agents
Which of the following statements about goal model are true? | (2) Refinement trees visualize ...., Goals are recursively refine-able
Which of the following statements about refinements are true? | (2) Getting complete refinements of..., Domain properties are often ...
All of the followings are heuristic rules of building goal models except? | Merge responsibilities
Which of the following statement about Goal Model are true? | (3) Getting complete refinements of..., Alternative goal ...,We can capture...
What “does AND-refinements should be consistent” mean? | Sub goals G1, ..., Gn and domain properties in Domains may not contradict each other
What “does AND-refinements should be minimal” mean? | If one sub goal Gj is missing, the parent goal is no longer necessarily satisfied
Which of the following statements do not belong to heuristic rules of building goal models? | (2)Merge responsibilities, Analyze the current objectives and problems in the system-to-be
Which of the following belong to heuristic rules of building goal models? | (3)Instantiate goal categories, Search for goal-related..., Ask how and why question
Risk is the uncertain factor whose occurrence may result in loss of satisfaction of corresponding objective | TRUE
Obstacle is the condition on system for violation of corresponding assertion | TRUE
The Poor risk management is a major cause of software failure | TRUE
Risk analysis cannot be anchored on goal models | FALSE
What is a risk? | Uncertain factor whose occurrence may result in loss of satisfaction of corresponding objective
Which of the following statements belong to Week mitigations countermeasure? | New goal ensures weaker version of goal when obstructed
What does Agent substitution mean | Consider alternative responsibilities for obstructed goal so as to make obstacle unfeasible
What does Goal restoration mean? | Enforce target condition as obstacle occurs
What does Goal weakening mean? | Weaken the obstructed goal’s formulation so that it no longer gets obstructed.
What does Obstacle prevention mean? | Introduce new goal Avoid [obstacle]
AND-refinement of obstacle O should be | Consistent,Complete,Minimal
What are obstacles? | The conditions on system for violation of corresponding assertion
Which is a strong mitigation? | A new goal ensures parent of goal when obstructed
Which is a weak mitigation? | A new goal ensures weaker version of goal when obstructed
According to tautology-based refinement, not (A and B) amounts to | Not A or not B
According to tautology-based refinement, not (A if B) amounts to | (A and not B) or (not A and B)
Which is the last stage of Risk Management process? | Risk Control
Conceptual object can be enumerated in only one system state | FALSE
RE is concerned with the problem world only | TRUE
Invariant seeming to constrain one object onlyAnswer | FALSE
Set of instances of a system-specific concept cannot share similar features | FALSE
Which of the following are good class diagrams | (2-4) diagrams (Initating and Scheduling | On Guard
Which of the followings is a good context diagram? | (Diagram1 Meeting date.range & Meeting.Date
Which of the following statements about the diagram below are true? (Train [is On] ----On---- [Holdtrain]Block) | (2)At any given time, a block may hold at most one | At any given time, a train is on at least one and at most two
What are types of conceptual object? | Event | Agent | Entity | Association
What are benefits of generalization-based structuring? | (3)Common features... | Increased mo... | Generalized objects & their ...
Which of the following statements about object models are true? | Represented by UML class diagram | Roughly, shows how relevant system concepts are structured and interrelated | Structural view of the system being modeled (as-is or to-be)
Which of the following statement about Object instantiation are true | An instance may migrate........A set of object ...Every conceptual object has a built-in semantic relation telling which instances are currently members of the object
Class diagrams at conceptual level should include | Attributes only
What is an Attribute Multiplicity? | Min/max number of values the attribute may take
What is a state of an instance of conceptual object? | Tuple of functional pairs xi | --> vi
Abstract agents can be refined? | TRUE
Agent’s instances cannot control behavior of other objects | TRUE
Responsibility assignments should not take agent capabilities into account | FALSE
Which of the followings are good heuristics for responsibility assignment? | (4)Identify finer-...Select ass... | Favor human...Make ass...
Which are true statements about agent capabilities? | (2) | They are defined... | When an individual...
Which of the following statements about Agents are true? | They are assigned to the leaf goals | They can run concurrently with others
Which of the following statement about the Meeting Scheduling system are true? | Meetings should be scheduled after the scheduler gets all participants constrain
A goal turns to be unrealizable by an agent if and only if one of the following criteria holds? | The agent is unable to monitor a variable in the goal specification that needs to be evaluated for goal satisfaction
Which of the following diagrams can be used to represent Agent Model? | Dependency diagram | Agent diagram | Context diagram
We can use only Use case diagram to show operational view of the system | FALSE
Goal refinement followed by operationalization is preferable to operation refinement, as it preserves goal traceability and supports simpler satisfaction arguments | TRUE
Which of the followings about Context diagrams are true? | (2)The nodes in Context.... | We can use a variant of these ...
Which of the following statements about Agent model are true? | (3)It is used to show the di...It shows who....It shows the Resp...
Which of the following heuristics can be used to identify operations from interaction scenarios? | (2)For each interaction event in a scenario...For each interaction event in a scenario...
Which of the following statements about domain conditions are true? | (2)The domain post-condition of an operation.... | The domain pre-condition of an operation characterizes the class of input sates when the operation is applied, regardless of any restriction required for goal satisfaction
Which of the following statements is true | A leaf goal is generally operationalized by multiple operations
Which of the following statements about UML use case diagrams is true? | (2)Generation of use cases from...A use case should operation...
Which are true statements about Agent non-determinism? | (2)eager: agent instance applies....lazy: agent instance ...
Which of the following statements about use cases are true? | A use case outlines the operations an agent... | A use case should operationalize the leaf goals underlying the operations in it
Which of the following statements about basic features of operations are true? | Any system operation has a unique name
Which of the following statements belong to Extra consistency rules between operation and agent models? | (2)The agent responsible for G must perform...If these operations operationalize...
State machines provide visual abstractions of explicit behaviors of any agent instance on a class. | TRUE
Scenarios do not support an informal, narrative and concrete style of expression | FALSE
Which of the following statements about Modeling instance behaviors is not true? | (None 4)
Two concepts Function and non-function requirement are | Full separate
Two concepts User requirement and System requirement are | Other
Which of the following statements about Modeling instance behaviors are true? | (3)The scenario...The interacting ...In the case of ...
Which of the following statements is true? | A guard captures a nec...A global system behavior is obtained...Which of the following statements about UML sequence diagrams are true? | (3)Timelines are represe...The interaction is synchronously....The basic UML syntax for ...
Which of the following statements about Actions of State machines are true? | (2)It is applied when the transition fires | Auxiliary means that ...
State machines complement the fragmentary information provided by scenarios in multiple ways: | (3)They capture...They make...They are aimed...
List the appropriate ways to refine scenario? | Introduce Episodes | Agent decomposition
Which of the following statements about State machines are NOT true? | (None 3)
To support Structural consistency of the goal and object models, for every object in the object model, there must be at least one goal in goal model concerning it | TRUE
To support Structural consistency of the goal and agent models, every goal under the responsibility of an agent in the agent model must appear as a leaf goal in the goal model | TRUE
Which of the followings belong to Structural consistency of the goal and agent models? | Every goal ...Every agent ...Every requirement...One of the candidate agents in an OR-assignment to a leaf goal in the goal model must appear as the selected agent responsible for this goal in the agent model.
What are the meta models that can be used for view integration? | The agent meta-model
Which of the followings belong to Structural consistency of the object and behavior models? | (2)Every state of a state ..Every event attribute or event specialization...
Which of the followings belong to Structural consistency of the goal and operation models? | (2)Every operation in the operation...Every requirement in the goal...
Which of the followings belong to Structural consistency of the goal, agent and operation models? | (2)If an agent performs...If an agent is responsible for a goal, it must perform all operations operational zing that goal.
Which of the followings belong to Structural consistency of the goal, agent and behavior models? | Every parallel state machine capturing the behavior of an agent in the behavior model must show a set of paths prescribed by goals from the goal model that are assigned to this agent in the agent model.
Which of the followings belong to Structural consistency of the goal, object and agent models? | If an object is referred to by a goal under the responsibility of an agent, one or more attributes of it must be monitored or controlled by this agent.
Which of the followings belong to Structural consistency of the object and agent models? | (3) An attribute or object....Every variable... | Every agent in the agent ...
Domain requirement may include | Both above
System requirement may include | All about
User requirement may include | All about
Who should be involved in a requirements review? | Both of above
What is the key factor of Requirement Elicitation? | Stakeholder involve
How many notations have been introduced in Data-flow model | 3
What is not an activity of requirement engineering Processes? | Requirement implement
Entity-relationship models have been widely used in database design. How many relation types between entities in this model? | 3
In system models concept, have been introduced many difference model can be apply for SR study. These models may be used separately or together? | Together
Many types of interface had been defined. Show us what are interface type have been introduced in the list below | All above
Normally, how many kinds of information should be included when a standard form is used for specifying functional requirements? | 7
How many parts of requirements document had been suggested in standard IEEE/ANSI 830-1998 (IEEE,1998)? | 5
Under of 3 main type of non-functional requirement: Product, Organizational and External. How many types of non-functional requirements (level 2 in describe chart of types of non-functional requirements) that may be placed on a computer-bases system has been introduced in text book? | 10
Requirements discovery including how many technique are introduced | 4
On steps of requirements validation process need: Some checking needs to carry out on the requirements in the requirement document. How many types of check are introduced? | 5
What is not a method to discovery requirement? | Ethnography
Interviewing is one of technique introduced. This technique inside of what process | Elicitation and Analysis
Is this true? If said: “The requirements management process includes planning and change management” | Yes
Is this true? If said: “Ethnography is particularly effective at discovering of requirements” | Yes
How many types are introduced in term of classification of volatile requirements? | 4
How many main processes are introduced in term of requirements engineering process? | 4
How many main problems need to be checked during feasibility study? | 3
Many problems can arise when requirements are written in natural language sentences. In list below, show us what not problem of natural language for this case is | To much technical special notations
To feasibility study, we need to asked and get answers from many people on such this organization. In practices, how many questions need to be answered by them during feasibility study? | 6
Many components of a CASE tool for structured method support introduced in text book. Show us in list bellow, what is not components had been introduced in text book. | No one comply
Study object models for one system, each object has been named and showed the relation between them (by inheritance, aggregation,… ). What is forced rule had to follow in terms bellow | The object name have been different each other
How many principal stages to a change management process had been introduced in text book | 3
Is this true if said: Ethnography is one technique including in requirements elicitation and analysis process. | Yes
Which is NOT a description in requirement definition? | The system’s stakeholders
Which is the item that a requirement does NOT describe? | How to maintain the system
What are stakeholders? | The organizations that will influence directly/indirectly on the system requirements
In below requirement statements, which is the user requirement? | The software must provide a mean of representing and assessing external files created by other toolsThe software must provide a mean of representing and assessing external files created by other tools
Who is NOT reader of system requirements? | Client managers
Who is the reader of user requirements? | System end users
Which is non-functional requirement? | Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc
Which is system requirement? | A structured document setting out detailed descriptions of the system’s functions, services and operational constraints
Which is correct definition of requirements consistency? | There should be no contradictions in the descriptions of the system facilities
In the requirement statements for a library management system below, which is NOT a non-functional requirement? | The system shall allow the users to search for an item by title, author, or ISBN
In below statements, which is NOT a correct definition for requirement measures? | Ease of use means training time or number of help frames
Given following activities in the requirement engineering process: | (1) Feasibility- (3) Elicitation- (4) Require speci - (2) Require valid
Which is the output of almost requirement engineering activities? | Requirements document
Which is NOT an input of the requirement engineering process? | Requirement documents
Which are outputs of the requirement engineering process? | Agreed requirements
Among outputs of the requirement engineering process, which output visualizes the system from different perspective? | System models
Which is the correct statement about the process models? | Fine-grain activity models show details of a specific process
What is the role of requirement engineer? | Eliciting and specifying the system requirements
Which is the soonest output of the requirement engineering process? | Business requirements specification
Why is it necessary to have requirement feasibility study phase? | To decide whether or not the proposed system is worthwhile
Which is NOT a factor for almost feasibility study to base on for its decision? | New technology in the world
Which is NOT an input of the requirement elicitation phase | Specification of similar system
What is NOT a purpose of the requirement analysing? | Gather information about the proposed and existing systems and distilling the user and system requirements from this information
Given that you are at the “Requirements classification and organization” step during the elicitation and analysis phase, what is next step? | Requirements prioritization and negotiationinformation
The target of requirement realism checking is to answer which of following questions? | Can the requirements be implemented given available budget and technology?
Which is NOT a technique of the requirement validation? | Requirements interview
Which is not an activity during the requirements review? | Prepare the requirements documentation
What don’t you have to prepare in requirement management planning? | Feasibility study
Which is NOT an activity during requirement change management process? | Problem identifying: identify what change is needed for the requirements
What is the purpose of the requirement source traceability? | Links between dependent requirements
What are contents including on critical systems specification? | All above
How many stage introduced on iterative process of risk analysis? | 4
What item below is including on iterative process of risk analysis? | Risk decomposition
They predicted that, by the 21st century, a large proportion of software would be developed using formal methods. This prediction has not come true. How many main reasons introduced in text book for this conclution | 4
Indicate in items below what is one of fundamental approaches to formal specification have been used to write detailed specifications for industrial software systems | All above
What is not a part of body of an object specification? | Syntax definition
Software reliability specification includingAnswer: | All above
For each risk, the outcome of the risk analysis and classification process is a statement of acceptability. How many way risk can be categories? | 3
What are contents including on critical systems specification? | None above
What is not strategy had been introduced in text book for risk reduction assessment? | Risk definition and separate them with system.
Risk can be categorized too much way. What bellow is way applying for categorized the risk? | All above
How many activities in process of developing a formal specification of a sub-system interface had been introduced in text book? | 6
Operations on an abstract data type usually fall into how many classes? | 2
Some examples of different types of failure are introduced. How many classes shown in Failure classification text book? | 6
Which perspective don’t we base on to present system in different models? | Layering
Structural perspective will show ….? | The system or data architecture
Which model type will show how entities have common characteristics? | Classification model
Data processing model will show ….? | How the data is processed at different stagesWhat is NOT true with context model? | Context models show what lies inside the system boundaries
The data flow model will show …? | The processes and the flow of information from one process to another
What is NOT a type of behavioural model? | Data flow diagram
What is NOT the purpose of data flow diagrams? | Show data structure of the system
What is the purpose of state machine model? | Model the behaviour of the system in response to external and internal events
Which is NOT an object model? | Structure models
Which is not a stage in risk-based analysis? | Risk planning
Which is output of the Risk analysis and classification stage? | Risk assessment
What is NOT true with the safety specification? | It is applied to the system as individual sub-systems
Which is a functional safety requirement? | Definitions of the safety functions of the protection system.
What is NOT security requirement type | Non-functional reliability requirements.
What is NOT a stage in the security specification? | Resource analysis
What is the purpose of the “Threat assignment” stage during the security specification? | Assign a list of associated threats for each identified asset
Please choose the correct explanation for the reliability metric “Probability of failure on demand” | The likelihood that the system will fail when a service request is made
Which is NOT critical attribute(s)? | Usability
Choose incorrect definition of the critical systems | Critical systems are system whose failure can threaten human life
Which is NOT included in formal methods? | Program development
Which is NOT true with the Use of formal methods? | Formal methods are applied mainly in critical systems engineering
Please choose an incorrect statement related to the Use of FS (Formal Specification) | FS involves investing more effort in the validating stage of software development
______, the system as it should be when the machine will be built and operated in it | System-to-be
______, the system need to be developed when some change requirements required to be implemented in system-to-be: | System-to-be
______ is the requirement document item, which cannot be realistically implemented within assigned budget, schedule, or development platform | Unfeasibility
______ addresses the assignment of responsibilities for achieving the objectives, services, and constrains among the components of the system-to-be | The WHO dimension
Components pertaining to the machines surrounding world will form | Environment of software-to-be
The machine’s software to be developed or modified is just one component of the system-to-be that refers to | Software-to-be
_________ statements state desirable properties about the system that may hold or not depending on how system behaves | Prescriptive
_________, the system as it exists before the machine is built in to it | System-as-is
________ statements state properties about the system that hold regardless of how the system behaves. Such properties hold typically because of some natural law or physical constaint | Descriptive
Which is not a stage of requirement engineering process? | Requirement Traceability
Overlapping statements refer to some common or inter-related _______ | Phenomena
Product-related risks may result in delayed product delivery, cost overruns, deterioration of project team morale and so forth | False
A risk is an uncertain factor whose occurrence may result in a loss of satisfaction of a corresponding objective. The risk is said to ______ on this objective | Negatively impact
Weak conflict: There are statements that are not satisfiable together under some condition called _____ | Boundary condition
Strong conflict: there are statements that their logical conjunction evaluates to _____ in all circurmstances | False
The “cut-set” of the risk tree is the set of _________ | All minimal AND combinations of leaf events or conditions, each of ….
Sometimes, requirements or assumptions might take risks. Therefore, we must identify new ______ as countermeasures to these risks | Requirements
oals are _____ statements of intent the system | Prescritive
According to tautology-based refinement, not(A and B) amounts to | Not A or Not B
Behavior of component instance is | The sequence of state transitions for the items it controls
Which of the followings belong to the free mode of individual review and meeting? | The inspector receives no directive on what part of the requirement document to consider or what type of defect to look for
We use Prototypes & mock-ups to | Check requirement adequacy from direct user feedback, by showing reduced sketch of software-to-be in action
The nodes in Context diagrams represent ____ system components | Active
List the statements that belong to Structural consistency of the goal and object models | One of the candidate agents in an OR-assignment to a leaf goal in the....
List the statements that belong to Structural consistency of the goal, agent and behavior models | Every parallel state machine capturing the behavior of an agent in the behavior model must show a set of paths prescribed by goals from the goal model that are assigned to this
Goals AND-refinements should be_____ | Minimal, Consistent
Which of the following statements are true? | Agent is an active system component that is responsible for goal satis faction, Goal satisfaction requires agent cooperation
What is state of an instance of conceptual object? | Tuple of functional pairs xi | ->vi
What are phases of risk management in requirement engineering? | Risk identification, Risk assessment, Risk control
What of the following statements about goal model are true? | All of the others
What are the phases of change control process? | Change initiation, change evaluation and prioritization, change consolidation
What are not the advantages of Quantitative assessment? | not subjective estimation, Coarser-grained than qualitative assessment
1. When a patients come to the clinic, they register administrative information and their profression if they are new patients. In the database of the clinic, each patient can have some health records. Each health record must have a prescription. Which relation is (are) the composition? | Health records and prescription
2. What is requirement engineering? | Set of activities producing the documents on a software-ontensive system
3. ___ models are represented by UML class diagram | Meta/none/object
4. Which of the following belong to behavior goals | None
5. List the way that Sate machines complement the fragmentary information provided by scenarios | They are aimed at capturing all admissible sequences of state transtitions, not just some specific ones.
7. Which of the following statements about Train Control system belong to the why dimension? | all
9. An a gent ___ an operation if the applications of this operation are activated by instances of this agent | performs
10. When should we do requirements inspections and reviews? | After author.. befor design
11. Consider the following situation A patient gets the prescription to buy medicine. but they did not have enough money. So pharmacy just only sell half of his prescription. What is type of the scenario for this situation? | abnormal scenario
12. Select correct statements about State machine model | A state machine model can be built from a set of scenarios by generalizing these to refer to any agent instance and to cover all behaviors captured by the scenarios
13. correct statements about Mine Safety Control system | ko chon A software-based..
14. What is the version type of the following casual factor "Evironment chnage: new class of users or new usage condition"? | variant
15. In the following sentences, which ones are descriptive statements | k chon The meeting...
16. __ result from changes made to adapt restrict or extend a master version to multiple classes of users usage conditions | revisions
17. Which diagrams in the following describe scope of the system | context & problem & frame
18. What kind of diagram descrise the behavior of asystem? | state machine & sequence
20. Choose the incorrect statements in goal model | We can.. & the finer .. & AND...
21. Class diagrams at conceptual level should include: | Attributes only
22. Which of the following belong Structural consistency of the goal and behaviour models | Every operation in the operation model must operationalize at least one leaf goal from the goal model
23. Which of the followings belong to the ambiguity defect in requirement document (RD)? | RD item allowing a problem world features to be interpreted in different ways
24. Risks are uncertain factors whose occurence may result in __ of satisfaction of corresponding objective | loss
24. Which of the following statements about basic features of operations are true | none of the others
26. Which is the tyoe if the new version when we create it by adding new functionalities to the sytem? | revision
28. What is an attribute mutiplicity | Min/max number of values the attribute may take
29. Which of the following statements about UML sequence diagrams are true? | All
30. Which of the following requirements is the least stable reqquirement Meeting scheduling system | Determine meeting date
31. Which of the following examples belong to "Restore conflicting statements" tatic in conflict resolution tactic? | copy returned within X weeks and then borrowed again
32. Why we use of diagrammatic notation in requirement documents? | All
33. What do we need to focus in prioritization requirement? | All
34. Which of the following statements are true? | ko phai AND...
35. In behavior model, a scenario captures | Implicit states, explicit event
39. Which of the following statements about the diagram below are true? | Closedoors is an Operation & Use case & doorsactuator is an agent
40. Agent models show __ view of the system being modeled | responsibility
41. The link between goal and agent in the following diagram is so-called a/an: | responsibility link
43. Which is the Dompost of operation opendoors in train control system? | the doors of train tr are open
44. A goal model includes: | AND & OR
45. __ risk management is a major cause of software failure | poor
46. The personnel turnovers is a risk that negatively impacts on objectives of the software development process. it belongs to: | process-related risk
48. Which of the following statements about Train control system belong to domain hypotheses? | all
49. What are the thress most critical errors of requirement engineering? | Inadequacy & Omission & contradiction
50. List the artifact-driven techniques | background study
51. Which of the following statements are true? | The main purpose & Language-based
52. Fill in blank.. | System requirement, Domain properties, Definition
53. A ____ scenario illustrates some inadmissible behavior | negative
54. Requirements inspections and reviews should be done when | After authors & before design
55. Which of the following diagrams is used to show system operations | use case diagrams
56. Which relation is (are) the aggregation? | patient and profession & patient and health records
57. A scenario is represented in UNL by a ___ diagram | sequence
59. Which of the following statements about a bank ATM system belong to expectations | cash is taken by the cardholder when returned by the ATM
60. To have an effective interview we should avoid the certain types of questions | affirmative & opiniated or biassed & obvious or impossible answer for the interviewee
Requirements engineering is | the processes involved in developing system requirements
_______, the system as it should be when the machine will be built and operated in it. | system-to-be
the system need to be developed when some change requirements required to be implemented in system-to-be | software-to-be
__________is the requirement document item, which cannot be realistically implemented within assigned budget, schedule, or development platform. | Unfeasibility
_______ addresses the assignment of responsibilities for achieving the objectives, services, and constraints among the components of the system-to-be | the WHO dimension
Components pertaining to the machine's surrounding world will form | Environment of software-to-be
The machine's software to be developed or modified is just one component of the system-to-be that refers to | software-to-be
__________statements state desirable properties about the system that may hold or not depending on how system behaves | Prescriptive
the system as it exists before the machine is built into it | System-as-is
________ Statements state properties about the system that hold regardless of how the system behaves. Such properties hold typically because of some natural law or physical constraint. | Descriptive
The following statement is an example of ____ statement: - The same book copy can not be borrowed by two different people at the same time. | Descriptive
Which is not an obstacle to effective knowledge acquisition? | Stable conditions
The following criteria are used for stakeholder analysis, except for | Create prototypes for system-to-be
Which is not a artefact-driven elicitation technique? | Group sessions
shows static and dynamic aspects of user-software interaction. | A user interface prototypes
The following are obstacles to effective knowledge acquisition, except for | Interacting with stakeholders
Which is not a stakeholder-driven elicitation technique? | Stakeholder analysis
can be helpful for eliciting non-functional requirements related to usability, performance, and costs | Data Collection
Which skill is required for interacting with stakeholders? | Knowledge reformulation
techniques reply more on specific types of artefact to support the elicitation process | Artefact-driven
Which is not a artefact-driven elicitation technique? | Unstructured group sessions
Which is not a concept-driven acquisition technique? | Interview
shows aspects related to software functionalities | A functional prototypes
Actigrams (Datagrams) declare activities (data) by their input/output data (producing/consuming activities) and interconnect them through data( ) dependency links. | control
ER diagram is made from three core constructs; entities, and relationships | Attributes
State machine diagram is made by two core constructs | States, Transitions
In state machine diagram, the event occurrence is a condition fortransition firing, whereas a guard is a condition forfiring | sufficient/necessary
Requirements Inspection process uses guidelines to make it more effective in Ending defects. | WHAT-WHO~WHEN~WHERE
“Queries on a requirements database” technique for “Requirements quality assurance” work on parts of the Requirements Document that are specified in terms of the | Diagrammatic notations
For a binary decision table with N entry conditions, there must be _______ columns for the table to list all possible combinations of conditions exhaustively. | 2^N
Which one ofthe following modes ofindividual reviewing rely on lists ofspecilic issues to address while searching for defects? | Checklist~based mode
form an effective technique for quality assurance. it is the widest in scope and applicability. | Requirements inspection and reviews
Because the requirements errors are the most expensive. numerous and persistent software errors. so 'requirements inspection 8. review process' should be applied as soon as possible | FALSE
The phase Individual reviewing inspectors reads the Requirement Documentfor defects. They can operate this phase in which ofthe following modes? | Free mode. process-based mode. checklist~based mode
Which one ofthe following activities should not be done in the phase 'Defect evaluation at review meetings' of’Requirements inspection 8. review process | Each inspector reads the RD or part of it individually to lookfor defects.
In requirements validation by specification animation, the _______ is an execution of the software model, and an animation is a visualization of the simulated model in its environment. | Simulation
Domain-specific checklists specialize the defect-based ones to the specific constructs ofthe structured, semi-format or formal specification language used in the requirement document. | FALSE
Which one of the following links is not a traceability type? | Anticipation link
ln "Traceability management process", which one of the following phases is concerned with four issues: the link granularity, link semantic richness, link accuracy and link overhead? | Establish traceability links
requires us to identify likely changes, assess their likelihood and document them in the Requirement Document. | Change anticipation
In a Change Control process, the necessity, feasibility, benefits, impact and cost of the requested changes are evaluated by a | Review board
Traceability relies on the existence of between items that we can follow backwards, towards source items, and forwards,towards target items. | None ofthe others
Which one of the following activities should be done in "Change evaluation & prioritization" phase of "Change Control" process | The review board is responsible to assess the merits, feasibility and cost of the proposed changes in the change request. Some proposed changes are approved, others are rejected and others are deferred.
Dependency is the most general type of traceability link that can be specialized into and links within a single version. | Variant/ Revision
Traceability management refers to the process of establishing, recording, exploiting and maintaining traceability in a traceability | Links/ Graph
Behavioural goals are used for building specifications ofthe system. | Operational
A goal refinement graph showthe refinement and contribution links among goals. | Requirements
An expectation is a goal assigned to a single agent of the . | system-to-be
Which one ofthe following statements is a"soft goal"'? | The meeting scheduler software should be easyto use by administrative staff
are used as criteria for selecting system options among multiple alternatives | Soft goals
Goals provide a basic abstraction for addressing the dimension of requirements engineering. | WHY
Goals provide a precise ________ for requirements completeness and pertinence. | Role
Unlike domain properties and goals may be refined. negotiated, assigned as responsibilities to agents and transformed in case of conflict or overexposure to risks | hypotheses
Goals are generallyfound bytop-down of higher-le\/el concerns and by bottom-up _from lower-le\/el material such as scenario examples and operational descriptions | Egfinement/ abstraction
n the goal model. the finer-grained a goal is, the are required to satisfy it. | Feweragents
To start building a goal model, we may obtain ________ goals. Once these goals are obtained, we may build refinement and abstraction paths in a goal diagram | Preliminary
A goal model makes it possible to capture _______ alternative options | Two kinds of (Alternative goal refinement, Alternative responsibility assignments)
We can build refinements and abstraction paths in a goal diagram by recursively asking ___and___ questions about available goals, respectively | HOW / WHY
An AND-refinement of a goal G into sub-goas G1,G2… ,Gn should be | Complete, consistent and minimal
An AND-refinement states that the parent goal can be sastified by sastifying ___sub-goals in the refinement. | All
The goals G1, G2, …, Gn are divergent in a domain Dom if we can find a feasible boundary condition B under which the goals cannot satisfied the arguments | {G1,G2..,Gn,Dom} | = false
Which one of the following statements about the leaf nodes in goals refinements trees is false? | They can not be domain properties or hypotheses.
In obstacle diagram, leaf obstacles are connected to countermeasure goals through __________. | Resolution links
Like in any risk management process, obstacle analysis is an iteration of _______ cycles. | Identify - Assess - Control
Goals and obstacles are dual notions. Therefore, we can derive obstacle categories from _____. | Goal categories
Obstacle analysis is a ______ of risk analysis aimed at identifying, assessing and resolving the possibilities of breaking assertions in the system’s goal mod | goal-based form
Which one is the “domain completeness” condition for OR-refinement of obstacle O into alternative sub-obstacles Oi: | {not O1, not O2, ..., not On, Dom} | = not O
An obstacle is a pre-condition for ______ of some goal, hypothesis or questionable domain property used in the goal model. | non-satisfaction
Goal obstruction propagates _______ along goal AND-refinement trees | bottom-up
not (if A then B) amounts to: | A and not B
An entity is | None ofthe others
A/an _________ is a discrete set of instances of a domain-specific concept that are manipulated by the modelled system | Conceptual object
The multiplicity on one side of an association specifies the minimum and maximum number of object instances on _______ that may be associated. | this side
Each linked object in an association plays specific _____ in the association | Role
In specialization, the object SubOb plays the role ______ whereas the object SuperOb plays the inverse role ______. | Specializes /Generalizes
An attribute is | An intrinsic feature of an object regardless of other objects in the model
An object model provides a _________ of the system-as-is and system-to-be. | structural view
The association is also called under synonymous term | relationship
The features shared by object instances include | object’s definition, type, individual attributes, associations, domain invariants
An agent model captures the ____-dimension of requirements engineering | WHO
Which one of the following statements is the definition of “capability instance declaration” (ClD) | lt annotating a monitoring or control link makes precise which agent instance is monitoring or controlling the attribute/association of which object instance
A goal under the responsibility ol an agent must be realizable by the agent in view ol its | Capabilities
In the agent model, an agent ag1 is said to depend on another agent ag2 for a goal G under the responsibility of ag2, if ___’s failure to get G satisfied can result in ___’s failure to get one of its assigned goals satisfied | ag2 / ag1
Which of the following statements about agent capabilities is wrong? | An agent monitors an association if its instances can control this association holds between object instances
An agent is an ______ system component play a role in goal satisfaction. | Active
Agent capabilities are defined in terms ol the system variables that the agent can and | Monitor/ control
What is an agent-goal co-refinement process? | A process in which an agent and its assigned goals are refined in parallel into finer-grained agents, sub-goals and responsibility assignments
An operationalization diagram is an annotated graph showing the system operations, their ______ to goals in the goal model and input/output links to objects in the object model. | operationalization links
Which one of the following statements is false? | Multiple agents perlorm an operation.
The specification of an operation therefore includes a set of prescriptive conditions on operation applications. These conditions are aimed at ensuring that ______. | the goals underlying the operation are satisfied
In _______ scheme, the agent instance applies the operation when it is really obliged to do so; that is, when one of the operation’s required trigger conditions becomes true. | a lazy behavior
The operation is not applied if a trigger condition becomes true in a state where the operation’s domain pre-condition is not true. | False
Which one of the following statements about required condition is true? | none of the others
A particular application ofthe operation yields a state from a state in lnputState to a state in OutputState. | Transition
A/An ________ designates an object instance to which the operation applies. The state of this instance affects the application of the operation | Input variable
A/An ________ designates an object instance to which the operation acts. The state of this instance affects the application of the operation | Output variable
A use case diagram provides an outline view of an operation model by showing the operations that an agent performs together with ________ with other agents. | interaction links
Domain pre- and post-conditions are prescriptive. | False
The instance level is made of concepts that are instances of meta-level abstractions | False
A meta-model is a conceptual model for the meta-level, the highest level, thus consisting of concepts, relationships, attributes and constraints defined in all levels (meta-, domain- and instance-level). | F
System model is made up of five views. Which one of the following view captured | None of the others
The name of the elements defined in a package are | Local to the package and its descendants
Two meta-attributes are mandatory for any meta-concept whatever view it refers to: | “Name” and “Def”
To facilitate model configuration and evolution, we should specify _________ among packages. | Inheritance links
Product-related risks may result in delayed product delivery, cost overruns, deterioration of project team morale and so forth | true
Which one of the following statements is the definition of "required trigger condition" | A required trigger condition for a goal is a sufficient condition on the operation's input states for satisfaction of this goal by any application of the operation.
Which one of the following statements about the leaf nodes in goals refinement trees is false? | They can not be domain properties or hypotheses
Which one in the following techniques is not belong to Stakeholder-driven techniques | Repertory grids
Which variable is not one of the following four variables of the four-variable model | Accepted variables
For stepwise refinement of a state diagram, we may decompose a state into sequential or concurrent sub-states. ln both cases, the finer-grained sub-states are called nested states, whereas the super-state is called a | True , Composite state
The phase "lndividual reviewing", inspectors reads the Requirement Document for defects. They can operate this phase in which of the following modes? | Free mode, process-based mode, checklist-based mode
An operation model addresses the of requirements engineering by capturing the functional services that the target system should provide in order to meet its goals | WHAT-dimension
How many kinds of node does risk tree have? | 2 (failure nodes and logical nodes)
Which one of the following statements about behavior model is false? | State machines capture sequences of state transitions for the variables controlled by any agent instance within a class
Which one of the following statements is the definition of attribute? | An attribute is an intrinsic feature of an object regardless of other objects in the model.
A state machine is represented in UML by a variant of a called a state diagram. | State-chart
Software requirements is a prescriptive statement to be enforced by the software-tobe and formulated in terms of phenomena | shared by the software and the environment
Which elicitation technique allow us to prepare before meeting stakeholders: | Background study
How many kinds of alternative options can a goal model capture? | two kinds of alternative options (Alternative goal refinements, Alternative responsibility assignments)
Which one of the following statements about package is false? | The names of elements defined in a package are local to the package but are not visible to its descendants.
Functional requirements: prescribe what the software-to-be should provide. | services
Which features does Multi-view modeling framework enforce the system views satisfied? | Consistency, completeness and feasibility
Which one of the following statements is the definition of entity? | None ofthe others
Sometimes, requirements or assumptions might take risks. Therefore, we must identify new as countermeasures to these risks. | Requirements
ln an operation model, an operation is annotated by individua l features such as its and its domain pre- and post-conditions. | Signature
The data-activity duality principle requires actigram items to have some in a datagram, and vice versa. | Counterparts
A goal under the responsibility of an agent must be realizable by the agent in view of its ________. | capabilities
System-as-is: system as it should be when the machine will be built and operated in it. | False
Which of the following statements about risk is false? | Risk may have a positive impact on corresponding objectives.
Conflict management process comprises: | (1)»(4)»(3)»(2)
in stakeholder-driven elicitation techniques, how many kinds of Interview are traditionally distinguished | two
In figure 14.6 which one of the following word is the name of (B) | Operationlization
The instance level is made of concepts that are instances of meta-level abstractions | F
A meta model is a conceptual model for the meta-level the highest level , this consitting of concept | T
System model is made up of the five views . Which one of the following view captured by goal model | None of other
The name of elements defined in a package are __________. | Local to the package and is descendants
In figure 14.4. Which one of the following word is the name of (A) | Association
Two meta-attributes are mandastory for any meta-concept whatever view it refer to | “Name” and “ Del”
In figure 14.4. Which one of the following word is the name of (C) | Behaviour Model
Which one of the following object is the root meta-concept | System model
System requirement may include: | All about
User requirement may include: | All about
Requirements discovery including how many technique are introduced. | 4
Interviewing is one of technique introduced. This technique inside of what process: | Elicitation and Analysis
Is this true? If said: “The requirements management process includes planning and change management”. | Y
Is this true? If said: “Ethnography is particularly effective at discovering of requirements”. | Y
What's the key factor of Requirement Elicitation? | Stakeholder involve
How many notations have been introduced in Data-flow model? | 3
Many types of interface had been defined. Show us what are interface type have been introduced in the list below | All
How many main problems need to be checked during feasibility study | 3
Study object models for one system, each object has been named and showed the relation between them (by inheritance, aggregation,… ). What is forced rule had to follow in terms bellow. | The object name have been different each other
How many principal stages to a change management process had been introduced in text book. | 3
Is this true if said: Ethnography is one technique including in requirements elicitation and analysis process. | Y
In below requirement statements, which is the user requirement? | The software must provide a mean of representing and assessing external files created by other tools
Who is the reader of user requirements | System end users
Which is non-functional requirement | Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.
In the requirement statements for a library management system below, which is NOT a non-functional requirement? | The system shall allow the users to search for an item by title, author, or ISBN.
In below statements, which is NOT a correct definition for requirement measures | Ease of use means training time or number of help frames
Given following activities in the requirement engineering process: | (1) => (3) => (4) => (2)
Which is NOT an input of the requirement engineering process | Requirement documents
Which are outputs of the requirement engineering process | Agreed requirements
Which is NOT a factor for almost feasibility study to base on for its decision | New technology in the world
What is NOT a purpose of the requirement analysing | Gather information about the proposed and existing systems and distilling the user
Given that you are at the “Requirements classification and organization” step during the elicitation and analysis phase, what is next step? | Requirements prioritization and negotiation
The target of requirement realism checking is to answer which of following questions? | Can the requirements be implemented given available budget and technology
Which is not an activity during the requirements review? | Which is not an activity during the requirements review?
On security specification section had recommend many types of security requirement. How many types of security requirements are introduced? | 10
What are contents including on critical systems specification? | All
They predicted that, by the 21st century, a large proportion of software would be developed using formal methods. This prediction has not come true. How many main reasons introduced in text book for this conclution? | 4
Indicate in items below what is one of fundamental approaches to formal specification have been used to write detailed specifications for industrial software systems. | All
Software reliability specification including: | all
What is not type of system models that we may create during the analysis process | None
What is not strategy had been introduced in text book for risk reduction assessment? | Risk definition and separate them with system
Risk can be categorized too much way. What bellow is way applying for categorized the risk? | all
Some examples of different types of failure are introduced. How many classes shown in Failure classification text book | 6
Structural perspective will show | The system or data architecture
Which model type will show how entities have common characteristics | Classification model
Data processing model will show | How the data is processed at different stages
What is NOT true with context model | Context models show what lies inside the system boundaries
The data flow model will show | The processes and the flow of information from one process to another
What is NOT a type of behavioural model | Data flow diagram
What is NOT the purpose of data flow diagrams | Show data structure of the system
What is the purpose of state machine model | Model the behaviour of the system in response to external and internal events
Which is NOT an object model | Structure models
Which is not a stage in risk-based analysis | Risk planning
Which is output of the Risk analysis and classification stage | Risk assessment
What is NOT true with the safety specification | It is applied to the system as individual sub-systems
Which is a functional safety requirement | Definitions of the safety functions of the protection system
What is the purpose of the “Threat assignment” stage during the security specification | Assign a list of associated threats for each identified asset
Which is NOT critical attribute(s) | Usability
Which of the following techniques has the process as below? | Knowledge reuse
Which of the following is an elicitation technique that provides a concrete flavor of what the software will look like | Prototypes and mock-ups
can be helpful for eliciting non-functional requirements related to usability, performance, and costs. | Data Collection
Which of the following is not an objective of domain understanding and requirements elicitation stage? | Select the preferred proposal system
The target of ________ is a set of low-risks, conflict-free requirements and assumptions that stakeholders agree on. | Requirements Evaluation
Which of the following items is not a type of inconsistency of requirements? | Inconsistency management
These are statements that can not be satisfied when taken together; their logical conjunction evaluates to false in all circumstances. | Strong conflict
The following sample statement is a ________ statement | Weak conflict or divergence
Risk management process contains the following stages, except for | Risk resolution
The goals of risk assessment is to assess likelihood of risks, _________, likelihood of consequences, to control high-priority risks | risk severity
Assume that risk (r) only cause one consequence (c). Give Likelihood (c) = 0.7, Severity (c) = 5, cost(cm) = 0.5. Exposure(r) = | 3.5
The goals of _______ is to reduce high-exposure risks through countermeasures | Risk control
Which of the following items are not exploring risk countermeasures techniques? | Using design methodologies
Which of the following items is not a step in the process of risk management with DDP for RE? | Quantitative reasoning for evaluating options
Give Evaluation Criteria (NFRs) of scheduling Meeting program to quantitative reasoning for evaluation options as below: | 0.55
Which of the following items is a range of estimated score percentage of option (opt) on criterion (crit): Score (opt, crit) ? | 0-1
Which of the following items is not a step of Value-cost prioritization process? | Build comparison matrix
ER diagram is made from three core constructs: entities, __________ and relationships. | Attributes
In Figure 4.9 | ResolveConflicts is a ‘sub-operation’ of DetermineSchedule ,DenyRequest is an alternative operation of AskConstraints, when the condition named Unauthorized holds.
Figure 4.10 shows an Event Trace Diagram specifying a meeting scheduling scenario. The first event is meetingRequest, ________ by an Initiator instance and _________ by a Scheduler instance. | controlled/monitored
In state machine diagram, the event occurrence is a ________ condition for transition firing, whereas a guard is a ________ condition for firing. | sufficient/necessary
In figure 4.11, the “Planning” state (source state) changes to “MeetingScheduled” state (target state) if __________ (the event) occurs and only if _________ (the guard condition) is true. | scheduleDetermination/[No conflicts]
In figure 4.15, the ER diagram is a confusing requirement. | T
A_________ is captured by a sequence of state transitions for the system items that the component control | Behavior
Which of the following are differences of problem diagram comparing with context diagram? | (sai)Shared phenomena are controlled/monitored by components
Which one of the following activities should not be done in the phase “Defect evaluation at review meetings” of “Requirements inspection & review process”: | Each inspector reads the RD or part of it individually to look for defects.
Requirements Inspection process uses __________ guidelines to make it more effective in finding defects. | WHAT-WHO-WHEN-WHERE
Because the requirements errors are the most expensive, numerous and persistent software errors, so “requirements inspection & review process” should be applied as soon as possible. | F
Which one of the following modes of individual reviewing rely on lists of specific issues to address while searching for defects? | Checklist-based and Process-based modes
Domain-specific checklists specialize the defect-based ones to the specific constructs of the structured, semi-format or formal specification language used in the requirement document. | F
Which of the following questions are in the checklist used for verifying "Poor structuring" defect type (choose three)? | (sai) Would there , Does this statement entail
Which of the following questions are in the checklist used for verifying "Over specification" defect type (choose two)? | Would there be , Does this statement entail
Which of the following questions are in the checklist used for verifying "Ambiguity" defect type (choose two)? | Can this statement be , Are there other
Traceability relies on the existence of ___________ between items that we can follow backwards, towards source items, and forwards, towards target items. | Dependency links
To document assumption and requirement changes, we may assign qualitative levels of ________ to the statements, or levels of ________ in the case of multiple variants. | Stability / Commonality
Dependency is the most general type of traceability link that can be specialized into _____ and _____ links within a single version. | Use / Derivation
Traceability management process composes of 4 phases: | d, b, a, c (4,2,1,3)
Traceability management refers to the process of establishing, recording, exploiting and maintaining traceability _____ in a traceability _____. | Links / Graph
Which of the following actions does the review board need to do when reviewing changes of requirements (Choose three)? | Understand , Assess the benefits , Estimate the
Which of the following are activities to be done in "Change Consolidation" stage of change control process (choose three)? | (sai) Prioritize the , Detect potential
Which of the following are activities to be done in "Change Evaluation and prioritization" stage of change control process (choose two)? | Prioritize , Detect potential
Behavioral goals are used for building _________ specifications of the system. | Operational
Goals are generally found by top-down ________ of higher-level concerns and by bottom-up ______ from lower-level material such as scenario examples and operational descriptions. | Refinement / abstraction
In the goal model, the finer-grained a goal is, the _______ are required to satisfy it. | fewer agents
A goal refinement graph show the refinement and contribution links among goals. ________ appear as leaf nodes in this graph. | Requirements
Which of the following items are not non-functional goals (Choose two)? | Information , Satisfaction
prescribe different types of protection of agent assets against unintended behaviors | Security goals
refers to the use of goals for requirements elicitation, evaluation, negotiation, elaboration, structuring, documentation, analysis and evolution. | Goal-oriented RE
An AND-refinement of a goal G into sub-goals G1, G2, …, Gn should be | Complete, consistent, minimal
The goal model captures ______ and_______ | responsibility, reference links
We can build refinement and abstraction paths in a goal diagram by recursively asking ___ and ___ questions about available goals, respectively | HOW / WHY
Figure 9 shows the __________________ | Divide-and-conquer refinement pattern.
Given figure 8-11 below. Which of the followings is a pattern used in the figure? | Guard-introduction pattern
Which refinement pattern is applied for the goal refinement in the figure 8-12? | Case-driven refinement pattern
Peter is responsible for goals discovery in RE. He uses some words like "in order to, so as to, so that,.. etc." to search goals in documents. Which of the followings is a Heuristic rules that Peter is using? | Search for goal-related keywords
An AND-refinement of obstacle O into sub-obstacles O1, O2,…, On should meet the following conditions: | 1 & 2
(A) / (B) should be. | ReverseThrustEnabled And Not WheelsTurning / WheelsTurning And Not ReverseThrustEnabled
Obstacles completeness can show about ______ and_______ (Choose two) | what we know about , obstacle analysis may
Which conditions does a statement about an obstacle to an assertion need to meet? | (sai) {O, Dom } | = not G
OR-refinement of obstacle O should be … | (sai) {subO1,..., subOj-1, subOj+1 , ..., subOn, Dom } | = O
A specialization link may be introduced in a model between an object SubOb and an object SuperOb if every current instance of _____ is a current instance of _____ as well. | SubOb / SuperOb
An______ link may be introduced between an object Ob and objects PartOb1,… PartObn if every current instance of Ob is a tuple of current instances of PartOb1, …., PartObn. | aggregation
_______ is a particular case of aggregation whether the composite object Ob and its parts PartObi appear and disappear together in the system. | composition
Agent capabilities are defined in terms of the system variables that the agent can _____ and _____ | Monitor / control
In figure 11.4, what is the name of the annotation attached to the link between the agent and the operation in the agent model? | Performance instance declaration
Which one of the following statements is the definition of “capability instance declaration” (CID)?. | It annotating a monitoring or control link makes precise which agent instance is monitoring or controlling the attribute/association of which object instance
In figure 11.6, “Train” and “TrainInfo” are classified as | Entities
A particular application of the operation yields a state _______ from a state in InputState to a state in OutputState. | transition
In scenario diagram, an interaction is a/an _________. | Instantaneous object
In positive scenario, the sequence of interactions illustrates a possible way of satisfying an obstacle to a goal. | F
External events: the agent associated with the State Machine does not controls. | T
In an SM diagram, a transition is labelled by _____ from a source state to a target state. | an event
Which one of the following statements about required condition is true? In a state machine diagram, a guard condition captures a _______ condition for state transition. | necessary
The initial states of the instance correspond to the states where it disappears from the system | F
In figure 13.6, the pair of object instances [PatrID, self] is called: | the attributes of event checkOut
Which part of Figure 13.4 is called “episode”?. | (A)
A scenario is a temporal sequence of interaction events among agent. | F
Which of the followings are not strengths of goal model? | concrete examples,acceptance test data
Which of the followings are strengths of state machines model | visual abstraction , code generation
Which of the following are semantic rules used to define sequential state decomposition? | The instance modelled by the diagram is in the super-state if and only if it is in one (and only one) of the sequential sub-states/An incoming transition to the super-state is by default inherited by every sequential sub-states as an incoming transition to it.
In figure 14.4, which one of the following word is the name of (A): | Association
In figure 14.6, which one of the following word is the name of (B): | Operationalization
In figure 14.7, which one of the following word is the name of (C): | BehaviourModel
All of the following statements about structural consistency of the goal and object models are correct, EXCEPT? | Every goal in the goal model must be existent in the object model
All of the following statements about structural consistency of the goal and behavior models are incorrect, EXCEPT? | Every scenario in the behavior model must be covered by at least one goal in the goal model
________ is the requirement document item, which stating a problem world feature in a way that can not be precisely compared with alternative options, or can not be tested or verified in machine solution. | Inadequacy
In a _________ project, a brand new software solution is built from scratch to address problems with the system-as-is and exploit new opportunities from technology evolution or market conditions. | Greenfield
____________refer to "the contextual reasons for a new version of a system must be made explicit in terms of objectives" to be satisfied by | the WHY dimension
Which of the following is not a stage of requirement engineering process? | Requirement Traceability
We should do the imtems in interview guidelines as below | centre
Which of following techniques focuses on task elicitation in the system-as-is to acquire contextualization of information | Ob & eht
Which of the following is NOT a rick-reduction tactics | Using
main evaluation criteria for selecting preferred countermeasures | Cost
project a software solution is developed to address the actual needs of one specific customer in the context of one specific organiation | cus
is NOT a disadvantage of Prototypes & Mock-up technique | Quick
NOT a strength of group sessions technique | can be used to contextualization
type of risks can we use component inspection technique to identify | Dev
All of the following describe the central role of goals in the requirements engineering process | mechanism for struc
when doing goals refinement, we refine goals until | single
Figure 10 shows | milestone
usages of goal categories | refining and abstracting
captures the activities and data in the system | SADT
A context diagram that can be further detailed by indicanting explicitly which component controls a shared prenomena, which component constitutes the machine needs to be built, and which components are affected by which requirements | Problem
in the figure 8.28 | Refinement towards goal realizability
The goal model captures _____ and responsibility links from goals to system agents | operationzation
In the figure 8.29 | by case
is a helpful technique that is used for eliciting non-functional requirements e.g. perfomance requirements | DAta
precribes intended behaviours where a target condition must sooner or later hold whenever some other condition holds in the current system state | achive
An(a) ______ is a statement to be satisfied by the environment and formulated in terms of environmental phenomena | ass
There are the following backwards of prototypes and mock-up technique | cann't
In a __________ project, the system-as-is already offers software solutions; the software-to-be needs to intergrate, improve, adapt or extend such solutions | brown
questions should be used while writing a requirements document | way
What should we do in the stakeholder analysis stage of RE | dai nhat
A systematic process of managing conficts has the tages: Identify overlapping stament, Generate conflict resulutions . Which of the following item is a correct order of the process | I D G E
The domain understanding and requirements elicitation stage involves a great deal of knowledge acquisition | dai nhat
is not a criterion of stakeholder selection | issues
questions is in the checklist used for verifying "Unfeasibility" | is this RD
advantages of free documentation in unrestricted natural language are correct | e.g
is a standard technique for structuring complex if-then condition | table
At higher levels, there are coarser-grained goals stating_______related to the business or organisation | strategic
When we are unfamiliar with system-as-is, we may need to acquire knowledge through the following ways | dai nhat
is a prscriptive statement to be enforced by software-to-be, possibly in cooperation with other system components, and formulated in terms of environment phenomena | system
about local rules on writing statements in requirements document | make
activities should NOT be done in "Change Initiation" | maintains
not a reason for goals being so important in the RE process | analysis
are correct inputs of the specification and documentation | system-to-be
Which the following is NOT a strength of group sessions technique? | Group sessions can be used to get contextualization of information
_____techniques reply more on specific types of artifact to support the elicitation process | Artefact-driven
Which of the following is the systen as it should be when the machine will be built and operated in it | system-to-be
______is the requirement document item,which cannot be realistically implemented within assigned budget,schedule,or development platform | Unfeasibiily
Which of the following is NOT stage of requirement engineering process | Requirement Traceability
which of the following is the system that exists before the machine is built into it | system-as-is
the following are obstacles to effective knowledge acquisition from stakeholders,EXCEPT | Interacting whith stakeholders
Requirement engineering is | the processes involed in developing system requirement
Which of the follwing is NOT a stakehoder-driven elicitation techniques | Interview
Components pertaining to the machine's surrounding world will form | Evironment of software-to-be
The larget of______is a set of low-risks,conflict-free requirements and asssumptions that stakeholders agree on | Requirements Validation
Which of the following items is NOT a step of Value-cost prioritization process | Build comparison matrix
the following criteria are used for selecting sample stakeholders,EXCEPT ? | Ability of creating prototypes for system-to-be
In a___project,a software solution is developed to address the actual needs of one specifict customer in the context of one specific organization | customer-driven
which of the following items is NOT a step in the process of risk management with DDP for RE | Quantitative reasoning for evaluating options
Which of the following canbe helful eliciting non-functional requirements related to usability,performance,and costs | Data Collection
_____addresses the assigment of responsibilities for archieving the objectives,services,and constraints among the components of the system-to-be | the WHO dimension
Which of the following is a skill required for interacting with stakeholders | knowledge reformulation
Which of the following are NOT exploring risk countermeasures technique | Reusing know countermeasures
Which of the following is NOT a concept-driven acquisition technique | Interview
Which of the following items is NOT a type of inconsistency of requirements | inconsistency management
_____refer to"the contextual reasons for a new version of a system must be made explicit in terms of objecttives" to be satisfied by" | the WHY demension
which of the following is used to explore how the sysem-as-is is running | card sort & repertory grid
Assumed that risk(r) only cause one consequence(c).Give Likelihood(c)=0.7,Severity(c)=5,cost(cm)=0.6.Exposure(r)=? | 3.5
Fast responds:(Significanse weighting:0.30;Option 1 score:0.40) | 0.55
_____state properties about the system that hold regardless of how the system behaves.Such properties hold typically because | Descriptive statements
____These are statement that cannot be satisfied when together, their logical conjunction evaluates to flase in all circumtances | Strong conflic
_____state desirable properties abot the system that may hold or not depending on how system behaves | Prescriptive statements
____show static and dynamic aspects of user-software interaction | A suser interface prototypes
The goals of ___ is to reduce high-exposure risks through coutermeasures | Risk control
The goals of risk assessment it to assess likehood of risk,___,likehood of consequence,to control high-priority risk | risk severity
the following statement is an example of ____ The same book copy cannot be borrowed by two different people at the same time | Presccriptive statement
Which of the following is an INCORRECT statements about the leaf nodes | They cannot be
Which of the followings captures the activities and data | SADT diagrams
form an effective technique | "Requirements inspection and reviews"
Because the requirements errors | FALSE
Which of the following modes of individual | Checklist-based and process-based
prescribe different types of | security goals
We can build refinement | HOW/WHY
Figure 4.10 show an event trace | controlled/monitored
Unlike domain properties | hypotheses
Figure 9 shows the | Divide-and-conquer refinement
The goal model captures | operationalization links
all the following questions should be in the checklist | Would there be alternative
Figure 10 shows the | milestone-driven
is captured by a sequence | Behavior
Which of the following statements is a "soft goal" | The meeting scheduler
Actigrams (Datagrams) declare | Control
The goals G1, G2 | {G1,G2,...,Gn, B , Dom}=false
ER diagram is made | Attributes
Which of the following activities should NOT be done | Each inspector
The multiplicity on one side of an association specifies the minimum and maximum number of object | this side
The association is also called under synonymous term | 'relationship'
A use case diagram provides an outline view of an operation model by showing the operations that an agent performs together with | operationalization links
An entity is | An instantaneous object
Goal obstruction propagates ______ along goal AND-refinement trees | bottom-up
In obstacle diagram, leaf obstacles are connected to countermeasure goals through | responsibility links
An agent is an ______ system component play a role in goal satisfaction | Active
Like in any risk management process, obstacle analysis is an iterarion of | Indentify - Assess - Control
A/an _______ is a discrete set of instances of a domain-specific concept that are manipulated by the modelled system | Object class
Goals and obstacles are dual | Goals
Which of the following can we base on to | Behavioral model
OR-refinement of obstacle O | {subO1,..., subOj+1,..., subOn, Dom}=O
A goal under the responsibility | Capabilities
Agent instances have individual behaviors captured by sequence of state transitions for the___that they control. | object attribute
In figure 11.4, what is the name of the annotation attached to the link between the aganet | Performance instance declaration
A goal G is correctly operationlized in to Op1, ...,Opn if and only if the specification Spec(Op1) | G/={Spec(Op1),..,Spec(Opn)}
The operation is not applied if a trigger condition becomes true in a state where the operation's domain pre-condition is not true | True
Which of the following conditions is NOT a statement about an obstacle to an assertion need to meet | O can be satisfied by some system behavior
Obstacles completeness can show about____and obstacle analysis may help elitcit and validate relevant domain properties | what we know about the domain and how adequate our knowledge is
In specialization, the object SubOb plays the role___whereas the object SuperOb plays the inverse role___ | Specializes/ Generalizes
The features shared by object instances include | object's definition,type,invidual attributes,associations,domain invariants
All of the following statements about local rules on writing statements in | Make sure that every concept
An obstacle is a pre-condition for | non-satisfation
The following questions should be in the checklist used for verifying | Poor structuring
Agent capabilities are defined in terms of the system variables | Monitor/control
Which of the following items are not exploring risk countermeasures techniques | Using design methodologies
All of the following statements about outputs of requirement | All general objectives, system requirement,software requirement
All of the following activities should NOT be done in "Change Initiation" | Maintains a wishlist of possible changes
All of the following activities should NOT be done in "Change Evaluation and prioritization" | Prioritize the accepted
____ addresses the assignment of responsibilities for | the WHO dimension
An operation model addresses the | WHAT-dimension
In "Traceability management process", which one of the following phases is | Establish traceability links
All of the following statements about background study techniques are correct EXCEPT? | An obvious strength of the technique is that it
All of the following activities should be done in "Change Consolidation" stage | Prioritize the accepted changes
A_____ is captured by a sequence of state transitions for | Behavior
The following questions should be in the checklist used for verifying | Over specification
Which of the following is not a reason for goals being so important | Goal do not provide anchors for risk
A state machine is represented in UML by a variant | State-chart
All of the following are correct inputs of the specification and | System-to-be- design documents
Which of the following statements about agent capabilities is wrong? | An agent monitor an association
An agent model captures the ___ dimension of requirements engineering | WHO
Which one of the following statements is the definition of "capability instance declaration" | Capability..... monitoring or control
which of the following í a helpful technique that is used for elicting non-functional requirements e.g. performance requirements | Data colection
All of the following actions,the review board need to do when reviewing changes of requirements EXCEPT | Maintains a wishlist of posible...
____prescibles intended behaviours where a target condition must sooner or later hold whenever some other condition holds in the | An achieve goal
The multiplicity on one side of an association specifies the minium and maximum number of object on___that may be associated | this side
All of the following questions should NOT be in the cheklist used for verifying"Over specification"defect type EXCEPT | Would there be alternative...
An(a)___ is a statement to be satisfied by the environment and formulated in tems of environmental | assumption
In obstacle diagram,leaf obstacles are connected to countermeasure goals through___ | Resolution links
There are following backwards of prototypes and mock-up technique,exceptfor | Can not understand implications
Which of the following statements is the definition of entity | None of the other
Which one of the following statements is the definition of "required trigger condition" | A required condition for a goal is a suffcient condition on the operation's
In a___project,the system-as-is already offers sofware solution;the software -to-be needsintegate, | Brownfield
The goal of rick assessment is to assess likehood of ricks,___,likelihood of consequences,to control high-priority ricks | risk severity
The following questions should be used while writing a requirements document EXCEPT | Can it be expressed in a comlex way
Which features dows Multi-view modeling framwork enforce system views satisfied | Consistency, completeness and complemenarity
What should we do in the stakeholder analysis stage of RE | Determine a representative sample of stakeholders based in their
A systematic process of managing conflicts has the stages;Identify overrlapping statements,generate | Identify,Detect,Generate,Evaluate
Which one of the following statements about package is false | The same of elements
A goal under the responsibility of an agent must be realizable by the agent in view of its___ | Capabulities
Which of the following statements about behavior model is false | Agent behaviors are made through scenarios or through state machines
Which one of the following statements is the definition of attribute | An attribute is an intrinsic feature of an object regardless of other objects in the model
Which of the following is not a criterion of stakeholder selection | Exposure to perceived
All of the following questions should be in the checklist used for verifying'Poor structuring"defect type EXCEPT | Would there ve alternative sensible choices
Which of the following question is in the checklist used for verifying"Unfeasibility" | Is this RD item
For stepwise refinement of state diagram,we may decompose a state into sequential or concurrent sub-states,In both cases,thefiner | Composite state
All of the following statements about advantages of free documentation in unrsestriced natural | There is no notable ambiguites
All of the following question should NOT be in the hecklist used for verifying"Ambiguity" | Can this statement be interpreted differently