Explain the difference between Staged Models and Continuous Models.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
During the demonstration of COTS software in operation, what does it mean to perform the "smell" test?
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Identifying, analyzing, and prioritizing risks require knowledge of the business functions and user involvement. The Project Management Institute's Project Management Body of Knowledge (PMBOK) defines four risk management processes. List and describe the four processes.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
What is independent monitoring and who can perform it?
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Explain how a Force Field Analysis is performed and used.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Determining when to perform verification and validation relates to the life cycle methodology used for building the application or system. Explain why this relationship is critical for software testing phase and team.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Selecting the right organization to develop software is critical to successfully outsourcing development. The selection process must find a competent and compatible organization to develop all or part of the software development. List five concerns that need to be addressed when selecting an outsourced organization.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
There are a number of common activities that should exist during the Quality Planning Process. For the two activities listed below, describe the purpose and what the activity should address:
1. Objectives/Goals Planning
2. Assumptions/Potential Planning
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Dr. W. Edwards Deming was a strong advocate of continuous process improvement. Describe below what you believe is meant by the term "continuous process improvement", and then list at least five steps that are necessary to implement a continuous quality improvement program.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
There are seven generally recognized problem identification/analysis tools for use in quality management programs. List four of the seven tools, give an example of each tool, and explain how to use each tool.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
The following is an argument against measurement that was raised in a team meeting, "Measurement has a high cost, requires too much investment and the return is too low." Provide a counter-argument to that statement.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
What is difference between structural and functional testing? State two advantages of both.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
You have been working for years in a company that does not embrace a continuous improvement approach. You have been promoted to QA Manager and your first order of business is to establish process improvement teams (PIT). Describe who you plan to ask to join a PIT and what their responsibilities will be.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Define measure and metric. Give two examples of a measure and two examples of a metric.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Quality Control is the check component of Dr. Deming’s Plan-Do-Check-Act quality concept. List what you believe are the three most important quality control practices in an IT organization, briefly describe those practices, and explain why you believe each practice is one of the MOST important quality control practices.
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
What does it mean to do a "baseline study"?
Type your answer in the box provided. Use options on the box toolbar to edit your response as needed before moving to the next question.
Which of the following three questions would NOT be answered by establishing a security baseline?
Though priority assigned to a defect is usually subjective, but are dependent on user input(s) or factor(s) such as:
Consensus is reached when all participants:
With the workbench concept, tools can support:
A process that is effected by an organization's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of operations, reliability and financial reporting and compliance with applicable law and regulations is called:
When auditors are engaged by the Board of Directors to audit an organization is an example of ____________.
Preventive Controls include:
Which of the following attributes of a process are associated with measurement?
A measure can be reliable, but invalid. An unreliable measure cannot be valid.
Which of the following is not one of the four major purposes of recording defects?
Conducting an inspection of source code is:
Which of the following is NOT an example of metrics used to manage and control the products?
If you use the PDCA cycle for managing processes, which activity is associated with the planning component?
Which ISO model covers the software life cycle from concept through retirement?
When developing testing tactics for a project, which of the following should be considered?
Which of the following question(s) is associated with the post-implementation review?
The objective of process improvement is to eliminate which of the following?
Objective of assuring that the software / COTS can be integrated into the business system work flow is to ensure that:
If your customer complains that you made an error, you need to do the following:
Which of the following is an important component of a complaint resolution process?
Which type of control method does not cause interpersonal problems?
One of the primary objectives of process control is to:
____________ Listening is when the listener is performing an analysis of what the speaker said.
If your IT organization does not have a measurement program, what would be a good prerequisite(s) to implementing a measurement program in your IT organization?
If a software development contract includes a clause on foreign attachments, which of the following would be considered a foreign attachment?
A standard must be measurable, attainable, and necessary. What is meant by 'attainable' in this context?
Which of the following is a level for maturing the People Management Processes?
The effort required for testing a program to insure it performs its intended function is called:
COTS software is _______ if correct results will be produced under actual business conditions.
QFD can be used to provide forward and backward traceability of value in the software development life cycle.
As per Crosby, to reduce Total Product Cost, the best approach is to:
In the context of the PDCA cycle, Work Processes represent the _____ component and the Check Processes represent the ___________component.
As per Crosby, the first step for building an effective quality program is to:
Determining which risks are likely to affect the project and documenting the characteristics of each is called ________ .
_________ includes periodically assessing project status, reassessing the documented risks, examining executed strategies that succeeded or failed, and considering new risks.
The development of the approach for process deployment is much harder than the actual deployment of the process.
Baselines should NOT be conducted:
Correlation between process maturity and an organization's willingness to embrace change can be described as:
Outsourced software can be developed by an organization within the country of use or developed in another country. Which of the following is a difference associated with software developed by an organization in another country?
As per Deming's principle 'improve supervision', which one of the following should be discouraged?
Statement Testing is included in which of the following test data categories?
Process capability determination motivates an organization towards process improvements.
Which of the following is the most difficult component of the decision making process?
Process inventories can be developed by:
Which of the following is NOT one of the five channels of communication?
Which product metric would be used to predict the probability of a software failure, or the rate at which software errors will occur?
One way to minimize risk is to:
Getting the right change installed at the right time is a responsibility of what type of software management?
Continuing process improvement techniques should be applied to which of the following IT work processes?
For contracted software, detailing the obligations of both contractual parties within the contract addresses:
During a review, both the producer and product are reviewed.
-- Exhibit –
-- Exhibit --
In the Cost of Quality diagram shown, the COQ cost labeled "A" represents:
Which of the following is / are level(s) for maturing the Deliverables Processes?
Senior management uses ________ to manage the organization and track to mission, vision, or goals.
Event identification, control activities, and risk response are included in which of the following internal control models?
Special concerns during acceptance testing of software developed by a vendor are:
If you were to read in a publication that an IT organization could build software at a rate of 4 lines of code per programmer hour, but in your organization you can only write 2 lines of code per programmer hour, what conclusion could you draw?
If you were to download a software package, which had been developed and placed on the internet for general usage, the one thing you could not control is:
Which is the best positioning of a quality manager within the IT organization?
Which of the following would be considered a verification technique?
-- Exhibit –
-- Exhibit --
The diagram is called a:
Procedures describe how methods, _________, techniques, and people are applied to perform a process?
-- Exhibit –
-- Exhibit --
In the diagram, the sections of the diagram labeled "A" and "B" represent larger portions of "DO" and "CHECK". Note that the top of the diagram represents a more creative process and lower portion a more defined process.
The guarantee provided by the contractor of software development that the deliverables will meet the specification is called:
The step which evaluates whether people possess the skills necessary to effectively use the COTS software in their day-to-day work is referred as:
One of the attributes of an effective security control is dividing responsibility for any event among two or more people. This security attribute is called:
The purpose of a Risk Analysis Process is to answer the question:
Which of the following activities occur when the software developed by an outside organization is ready for delivery?
__________ are used to determine whether the standards have been adhered to or not.
Which of the following is considered a metric?
It is generally agreed that people are the key to providing an adequate and appropriate level of security. One of the most effective methods for involving people in security is:
The acronym CMM stands for:
Which of the following activities should occur before processes are defined to ensure that the most critical processes are defined first.
Which category of control methods is the most acceptable to the individual?
A weakness in an information system, which is a point where the software systems are easiest to penetrate, is called a:
Which is generally considered the most important step in the process of contracting for software development?
The Quality Manager is in the business of selling quality.
What early quality pioneer developed the "Quality Trilogy" of Quality Planning, Quality Control, and Quality Improvement?
The objective of integrating business and quality planning in a single planning cycle is to ensure that: