0% found this document useful (0 votes)
83 views40 pages

Quiz 3 SWE102 Quizlet

Uploaded by

Begad Habib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views40 pages

Quiz 3 SWE102 Quizlet

Uploaded by

Begad Habib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Name: Score:

60 Multiple choice questions

Term 1 of 60
What are the three important classes of interface errors?
Select one or more:
a. Interface misunderstanding
b. Interface misuse
c. Timing errors.
d. Function error

a, c, e

a, b, c

a, c, d

a, b, d

Term 2 of 60
List some important factors that effect in maintenance cost
Select one or more:
a.Contractual responsibility
b.Staff skills
c.Team stability
d. Test data

a, c, d

b, c

a, b, c

a, b, d

1 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 3 of 60
What is infrastructure security?
Select one:

Infrastructure security is a systems management problem where the infrastructure is


configured to resist attacks.

Infrastructure security is a software engineering problem where the system is designed


to resist attacks.

2 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 4 of 60
Match the key service standards with their description

WSDL

WS-BPEL

SOAP

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

This standard allows a service interface and its bindings to be defined

A standard for workflow languages used to define service composition

A message exchange standard that supports service communication

which shows how, at run-time, the system is composed of interacting processes.

which shows how the software is decomposed for development.

which shows the key abstractions in the system as objects or object classes.

which shows the system hardware and how software components are distributed across
the processors in the system.

speed

Portability

Reliability

3 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

size

Ease of use

Robustness

4 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 5 of 60
Match the following measurements with their corresponding software properties

Processed transactions/second

Number of target systems

Probability of unavailability

Number of ROM chips

Training time

Time to restart after failure

Incremental development

Incremental development

Waterfall

Waterfall

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

a, d, e

speed

Portability

5 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Reliability

size

Ease of use

Robustness

Term 6 of 60
Select the incorrect statements about program testing goals
Select one:

To discover situations in which the behavior of the software is incorrect, undesirable or


does not conform to its specification.

None of the others

For generic software products, this means that there should be at least one test for
every requirement in the requirements document.

Defect testing is concerned with rooting out undesirable system behavior such as
system crashes, unwanted interactions with other systems, incorrect computations and
data corruption.

To demonstrate to the developer and the customer that the software meets its
requirements.

Term 7 of 60
Why might it sometimes be necessary to bypass the normal change management system and
make urgent changes to a system?
Select one:

Repair fault

Resist change

None of the others

6 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 8 of 60
New versions of software systems are created as they change
Select one or more:
a. Tailored for particular user requirements
b. Development team
c. For different machines/OS
d. Offering different functionality

a, b, c

a, c, d

a, b, d

a, d, e

Term 9 of 60
List 4 design guidelines for secure systems engineering?
Select one or more:
a. Validate all inputs
b. Avoid a single point of failure.
c. Use redundancy and diversity to reduce risk.
d. Base security decisions on an explicit security policy.
e. Avoid using redundancy and diversity to reduce risk

a, c, e

a, b, c

a, b, c, d

a, c, d

7 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 10 of 60
Software systems are subject to continual change requests
Select one or more:
a. From developers
b. From market forces
c. From testers
d. From users

a, d, e

a, c, d

a, b, d

a, b, c

Term 11 of 60
What are Lehmanʼs Laws and how were they derived?
Select one:

small software systems

None of the others

medium software systems

large software systems

8 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 12 of 60
Define the security terms 'threats'
Select one:

Circumstances that have potential to cause loss or harm. You can think of these as a
system vulnerability that is subjected to an attack.

An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage

The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.

Term 13 of 60
What are the three levels of protection that might be used in an information system?
Select one or more:
a. Application-level protection
b. Environment-level protection
c. Record-level protection
d. Platform-level protection

a, d, e

a, c, d

a, c, e

a, b, d

9 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 14 of 60
What are the strategic options for legacy system evolution?
Select one or more:
a. Show
b. Reengineer
c. Scrap
d. Preserve

b, c

a, c, e

a, b, c

a, c

Term 15 of 60
What may be included in a system release?
Select one or more:
a. Data files
b. Electronic and paper documentation, packaging and publicity
c. Analysis report of CCB
d. Configuration files
e. Change request form

a, b, c

a, d, e

a, b, d

b, c, e

10 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 16 of 60
What are the types of signature that may be used to relate source code files and their
equivalent object code in a build system?
Select one or more:
a. If the modification time of the object code is later than the modification time of the source
code file of the same name then these are related
b. a checksum is calculated from the source code text and explicitly associated with the
corresponding object code file
c. a checksum is calculated from the modification time of the source code file of the same
name then these are related
d. the modification time of the object code is calculated from the source code text and
explicitly associated with the corresponding object code file

a, b

b, c

a, d

a, c, d

Term 17 of 60
What are the three complementary strategies to achieve survivability?
Select one or more:
a. Resistance
b. Recognition
c. Conversion
d. Recovery

a, b, d

a, c, d

a, b, c

b, c

11 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 18 of 60
What are the principal stages of systems engineering?
Select one or more:
a. Operation
b. Validation
c. Procurement
d. Development
e. Specification

a, d, e

a, c, e

a, b, d

a, c, d

Term 19 of 60
What is the first stage in survivability analysis
Select one:

Identify attacks and compromisable components.

Review system requirements and architecture.

Identify softspots and survivability strategies.

Identify critical services and components.

12 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 20 of 60
Briefly describe the different platforms that may be involved in a system building process?
Select one or more:
a. Build server, where source code is compiled and managed
b. Change history recording
c. Development system, where source code is created and edited
d. Assess the impact of proposed changes
e. Target environment, where the built system is executed

a, d, e

a, c, d

a, c, e

b, c, e

Term 21 of 60
Acceptance tests are normally conducted by the _________
Select one:

Test team

Developers

System engineers

End users

13 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 22 of 60
Which benefits of software engineering are?
Select one or more:
a. Speculative generality
b. Data clumping
c. Reduced cost
d. Reduced risk

a, b, d

b, c

c, d

Term 23 of 60
How to prevent maintenance by refactoring?
Select one:

Refactoring is the process of making improvements to a program to slow down


degradation through change.

Refactoring involves modifying a program to improve its structure, reduce its complexity
or make it easier to understand.

All of the others

When you refactor a program, you should not add functionality but rather concentrate
on program improvement.

You can think of refactoring as 'preventative maintenance' that reduces the problems of
future change.

14 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 24 of 60
What three approaches may be used when designing test cases?
Select one or more:
a. Structural testing
b. Requirements-based testing
c. Partition testing
d. Functional testing

a, c, d

a, b, d

a, c, e

a, b, c

Term 25 of 60
Define the security terms 'vulnerability'
Select one:

An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage

The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.

A weakness in a computer-based system that may be exploited to cause loss or harm.

15 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 26 of 60
What is the difference between a technical and a sociotechnical system?
Select one or more:
a. Technical systems are self-aware and include defined operational processes and
procedures. Sociotechnical systems include hardware and software components but not
procedures and processes
b. People are an inherent part of sociotechnical systems. The technical systems do not
c. Technical systems include hardware and software components but not procedures and
processes. Sociotechnical systems are self-aware and include defined operational processes
and procedures
d. People are an inherent part of technical systems. The sociotechnical systems do not

a, b, c

b, c

a, c, e

a, c

Term 27 of 60
What are the main drivers for system procurement decisions?
Select one or more:
a. External competition
b. Operator reliability
c. Hardware reliability
d. Business re-organization
e. The need to comply with external regulations

a, b, c

a, c, e

a, d, e

a, c, d

16 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 28 of 60
What are the correct statements about system changes?
Select one:

For custom systems, the costs of software maintenance usually exceed the software
development costs.

Lehman's laws, such as the notion that change is continuous, describe a number of
insights derived from long-term studies of system evolution.

The process of software evolution is driven by requests for changes and includes
change impact analysis, release planning and change implementation.

All of the others

Software development and evolution can be thought of as an integrated, iterative


process that can be represented using a spiral model.

Term 29 of 60
Which cost factors are affected in software maintenance?
Select one or more:
a. Contractual responsibility
b. Number of requests for corrective maintenance
c. Number of outstanding change requests
d. Staff skills

a, b

a, b, d

b, c

a, d

17 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 30 of 60
Match the following statement with their corresponding requirement types

Constraints on the system from the field of operation

Statements of services the system should provide, how the system should react to particular
inputs and how the system should behave in particular situations.

Often apply to the system as a whole rather than individual features or services.

May state what the system should not do.

Constraints on the services or functions offered by the system such as timing constraints,
constraints on the development process, standards, etc.

Incremental development

Incremental development

Waterfall

Waterfall

Domain requirements

Functional requirements

Non-functional requirements

Functional requirements

Non-functional requirements

Analyse the program to understand it

Reorganise the program structure

18 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Clean-up and restructure system data

Restructure automatically for understandability

Convert code to a new language

19 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 31 of 60
Match the following disadvantage with their corresponding development methods

System structure tends to degrade as new increments are added.

The process is not visible.

The difficulty of accommodating change after the process is underway.

Difficult to respond to changing customer requirements.

Incremental development

Incremental development

Waterfall

Waterfall

Domain requirements

Functional requirements

Non-functional requirements

Functional requirements

Non-functional requirements

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

20 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

speed

Portability

Reliability

size

Ease of use

Robustness

Term 32 of 60
What are the stages in the system evolution process and what triggers that process?
Select one or more:
a. Change implementation
b. Reverse engineering
c. Maintenance fault
d. Release planning
e. Impact analysis

a, d, e

a, b, c

a, b, d

a, c

21 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 33 of 60
The best reason for using Independent software test teams is that
Select one:

Testers do not get involved with the project until testing begins

A test team will test the software more thoroughly

Arguments between developers and testers are reduced

Software developers do not need to do any testing

22 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 34 of 60
Complete the Agile manifesto bellow

Working software over

Customer collaboration over

Responding to change over

Individuals and interactions over

Incremental development

Incremental development

Waterfall

Waterfall

comprehensive documentation

contract negotiation

following a plan

processes and tools

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

23 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 35 of 60
What are the different types of software maintenance?
Select one or more:
a. Maintenance to add to people into current system
b. Maintenance to adapt the software to a different environment
c. Maintenance to repair software faults
d. Maintenance to adapt the software to a different software development
e. Maintenance to add to or modify the systemʼs functionality

a, c, d

a, c, e

b, c, e

a, b, c

Term 36 of 60
Why is software evolution important?
Select one:

They were derived from studies of the growth and evolution of a number of large
software systems

The systems remain useful and maintain their value

The system can cope with unexpected business change

All of the others

24 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 37 of 60
Define the security terms 'attack'
Select one:

An exploitation of a system's vulnerability. Generally, this is from outside the system and
is a deliberate attempt to cause some damage

A weakness in a computer-based system that may be exploited to cause loss or harm

The possible loss or harm that could result from a successful attack. This can be loss or
damage to data or can be a loss of time and effort if recovery is necessary after a
security breach.

Term 38 of 60
Why are sociotechnical systems non-deterministic?
Select one or more:
a. The true nature of the problem only emerges when the solution is developed
b. they include people whose behaviour may change from
c. changes to the hardware, software and data in these systems is so frequent
d. different parts of the system are developed by different groups at the same time and plans
are needed to coordinate their activities

a, b

a, d

b, c

a, b, c

25 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 39 of 60
What are the two complementary goals of the testing process?
Select one or more:
a. To discover faults or defects in the software.
b. To fix faults or defects in the software
c. To demonstrate that the software meets its requirements

a, b, c

a, c, e

b, c

a, c

Term 40 of 60
What is the purpose of defect testing?
Select one:

To ensure about the performance of the software

To test individual program components

To verify that the software meet its requirements

To discover faults that make software's behaviour incorrect

Term 41 of 60
What is a release?
Select one:

An instance of a system which is distributed to users outside of the development team

An instance of a system which is functionally identical but non-functionally distinct from


other instances of a system

An instance of a system which is functionally distinct in some way from other system
instances

26 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 42 of 60
What are the objectives of change management procedures?
Select one or more:
a. Analyzing the costs and benefits of proposed changes
b. Approving changes that are worthwhile
c. Tracking which components of the system have been changed
d. To prevent customer requirement change

b, c, e

a, b, d

a, d, e

a, b, c

Term 43 of 60
What is the normal order of activities in which software testing process is organized?
1. Prepare test data
2. Design test cases
3. Run program with test data
4. Compare results to test cases
Select one:

3, 1, 4, 2

2, 1, 3, 4

4, 2, 3, 1

1, 4, 3, 2

27 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 44 of 60
Who review and approve the change requests?
Select one:

General director

All of the others

Change control board

Project director

Project manager

Term 45 of 60
What is the common limitation of automated testing?
Select one:

It is very difficult for automated scripts to verify a wide range of application responses

They cannot be used for requirement validation

They are not useful for performance testing

They are not useful when requirements are changing frequently

Term 46 of 60
Why are plan-driven processes used in systems engineering?
Select one:

None of the others

they include people whose behaviour may change from day to day

different parts of the system are developed by different groups at

changes to the hardware, software and data in these systems is so frequent

28 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 47 of 60
Select the incorrect statements about Inspections and testing
Select one:

Inspections can check conformance with a specification but not conformance with the
customer's real requirements.

All of the others

Inspections and testing are complementary and not opposing verification techniques.

Only testing should be used during the V & V process.

Inspections cannot check non-functional characteristics such as performance, usability,


etc.

29 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 48 of 60
Match the following properties with their corresponding development methods

More rapid delivery and deployment of useful software to the customer is possible.

This model is mostly used for large systems engineering projects where a system is developed
at several sites.

The process is not visible.

It is easier to get customer feedback on the development work that has been done.

Inflexible partitioning of the project into distinct stages makes it difficult to respond to
changing customer requirements.

Hardware devices, some of which may be computers. Most devices will include an
embedded system of some kind.

A set of processes involving people and computer systems that support the activities of
the business.

Higher level strategic business activities that affect the operation of the system.

Middleware that provides access to remote systems and databases.

Specific functionality to meet some organization requirements.

Provides a set of common facilities for higher levels in the system.

Domain requirements

Functional requirements

Non-functional requirements

Functional requirements

Non-functional requirements

30 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

speed

Portability

Reliability

size

Ease of use

Robustness

Term 49 of 60
What is application security?
Select one:

Application security is a systems management problem where the infrastructure is


configured to resist attacks.

Application security is a software engineering problem where the system is designed to


resist attacks.

31 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 50 of 60
What are the principal systems re-engineering activities?
Select one or more:
a. Program modularisation
b. System release
c. Data re-engineering
d. Release planning
e. Reverse engineering

a, c, d

a, b, c

a, c, e

a, d, e

Term 51 of 60
How are deltas used in a storage management system that is part of a version management
system?
Select one:

None of the others

Store the differences between the most recent version and the created component

Store the differences between the first version and the created component

Store the differences between the first version and the last version component

32 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 52 of 60
Which type of test would you perform to accept a build?
Select one:

Beta test

Functional test

Automated test

User acceptant test

Term 53 of 60
What tests should be included in object class testing?
Select one or more:
a. Tests that set and access all object attributes
b. Tests that force the object into all possible states
c. Tests for all operations in isolation
d. Test the associations of the objects with the others

a, c, e

a, b, c, d

a, b, c

a, c, d

Term 54 of 60
When software configuration management is a formal activity, the software configuration audit
is conducted by the
Select one:

Development team

Testing specialists

Senior managers

Quality assurance group

33 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 55 of 60
What does security risk management involve?
Select one or more:
a. Operational Risks assessment
b. Life cycle risk assessment
c. Preliminary risk assessment

a, d

c, d

b, c

a, c

34 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 56 of 60
Match the following Reengineering process activities with their corresponding description

Reverse engineering

Program modularisation

Data reengineering

Program structure improvement

Source code translation

This standard allows a service interface and its bindings to be defined

A standard for workflow languages used to define service composition

A message exchange standard that supports service communication

Analyse the program to understand it

Reorganise the program structure

Clean-up and restructure system data

Restructure automatically for understandability

Convert code to a new language

speed

Portability

Reliability

size

Ease of use

35 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Robustness

Incremental development

Waterfall

Incremental development

Incremental development

Waterfall

Term 57 of 60
What is a version?
Select one:

An instance of a system which is functionally identical but non-functionally distinct from


other instances of a system

An instance of a system which is distributed to users outside of the development team

An instance of a system which is functionally distinct in some way from other system
instances

36 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 58 of 60
What are influences on the reliability of a system?
Select one or more:
a. Social reliability
b. Operator reliability
c. Software reliability
d. Business reliability
e. Hardware reliability

a, c, d

a, d, e

a, c, e

b, c, e

37 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 59 of 60
What are 4 view model of software architecture?

A process view

A development view

A logical view

A physical view

b, c

which shows how, at run-time, the system is composed of interacting processes.

which shows how the software is decomposed for development.

which shows the key abstractions in the system as objects or object classes.

which shows the system hardware and how software components are distributed across
the processors in the system.

a, b, d

a, c, d

38 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Term 60 of 60
Match the following Layers in the STS stack with their corresponding descriptions

Equipment

Business processes

Organizations

Communications and data management

Application systems

Operating system

Incremental development

Incremental development

Waterfall

Waterfall

speed

Portability

Reliability

size

Ease of use

Robustness

Incremental development

Waterfall

39 of 40 5/23/2024, 11:35 PM
Quiz 3 SWE102 | Quizlet https://quizlet.com/502637817/test?answerTermSides=4&promptTermS...

Incremental development

Incremental development

Waterfall

Hardware devices, some of which may be computers. Most devices will include an
embedded system of some kind.

A set of processes involving people and computer systems that support the activities of
the business.

Higher level strategic business activities that affect the operation of the system.

Middleware that provides access to remote systems and databases.

Specific functionality to meet some organization requirements.

Provides a set of common facilities for higher levels in the system.

Privacy Terms English (USA)

40 of 40 5/23/2024, 11:35 PM

You might also like