BCS methodology exam questions with
correct answers
Which |stage |of |the |software |development |life |cycle |would |include |the |following |activities:
• |Consideration |of |the |potential |risks |involved |with |developing |software
• |Determing |whether |the |project |outcome |will |be |worth |the |costs |involved
A |Implementation/Deployment
B |Requirements |analysis |
C |Testing
D |Feasibility |study |- |CORRECT |ANSWER✔✔-D |
These |activities |take |place |as |Feasiblity |study.
Which |of |the |following |is |a |purpose |of |the |software |development |lifecyle?
A |To |provide |a |suitable |framework |for |a |planning |a |software |development |project
B |To |provide |a |set |of |steps |to |create |a |software |end-product
C |To |create |a |methodology |for |the |developing |software |code
D |To |provide |a |consistent |set |of |coding |standards |- |CORRECT |ANSWER✔✔-B |SDLC |is |defined |
as |a |set |of |steps |that |guide |you |from |start |to |finish |of |a |creation |of |a |piece |of |software
,Which |sequence |puts |the |following |stages |in |the |SDLC |in |the |CORRECT |chronological |order?
a) |Testing
b) |Requirement |Analysis |
c) |Maintenance |
d) |Design
A |b, |d, |a, |c
B |b, |d, |c, |a
C |d, |b, |a, |c
D |d, |b, |c, |a |- |CORRECT |ANSWER✔✔-A |this |is |the |correct |order |of |SDLC
Which |of |the |following |are |NOT |an |iterative |methodology? |
A |Waterfall |
B |UP/SUP
C |Scrum
D |Spiral |- |CORRECT |ANSWER✔✔-A |Waterfall |can |only |be |done |in |order |and |cannot |change |
previous |iteration |if |has |mistakes
Which |software |development |method |allows |software |to |be |deployed |for |client |use |after |each
|iteration?
A |Agile |
B |Unified |Process |(UP)
C |V-model
D |Waterfall |- |CORRECT |ANSWER✔✔-A
, Which |of |the |following |is |a |role |of |a |domain |expert?
A |To |provide |insight |into |business |products |and |processes |
B |To |specify |functional |requirements |on |the |behalf |of |the |customer |
C |To |identify |non-functional |requirements |
D |To |assess |project |risks |and |constraints |- |CORRECT |ANSWER✔✔-B
A |software |application |used |by |the |general |public |has |been |found |to |have |a |security |
weakness. |The |problem |has |been |diagnosed |and |a |development |project |initiated |to |correct |
the |security |weakness. |The |project |team |will |include |security |domain |experts.
At |which |stages |in |the |development |will |be |the |MOST |important |to |involve |the |domain |
experts?
A |Feasibility |study, |Code |development |
B |Design, |Testing
C |Requirements |analysis, |Maintenance |
D |Initiation, |Implementation/Deployment |- |CORRECT |ANSWER✔✔-A
During |the |design |stage |of |SDLC, |which |of |the |following |would |be |developed?
A |Software |specification |
B |Software |Code
C |Uses |cases
D |Test |plans |- |CORRECT |ANSWER✔✔-B
correct answers
Which |stage |of |the |software |development |life |cycle |would |include |the |following |activities:
• |Consideration |of |the |potential |risks |involved |with |developing |software
• |Determing |whether |the |project |outcome |will |be |worth |the |costs |involved
A |Implementation/Deployment
B |Requirements |analysis |
C |Testing
D |Feasibility |study |- |CORRECT |ANSWER✔✔-D |
These |activities |take |place |as |Feasiblity |study.
Which |of |the |following |is |a |purpose |of |the |software |development |lifecyle?
A |To |provide |a |suitable |framework |for |a |planning |a |software |development |project
B |To |provide |a |set |of |steps |to |create |a |software |end-product
C |To |create |a |methodology |for |the |developing |software |code
D |To |provide |a |consistent |set |of |coding |standards |- |CORRECT |ANSWER✔✔-B |SDLC |is |defined |
as |a |set |of |steps |that |guide |you |from |start |to |finish |of |a |creation |of |a |piece |of |software
,Which |sequence |puts |the |following |stages |in |the |SDLC |in |the |CORRECT |chronological |order?
a) |Testing
b) |Requirement |Analysis |
c) |Maintenance |
d) |Design
A |b, |d, |a, |c
B |b, |d, |c, |a
C |d, |b, |a, |c
D |d, |b, |c, |a |- |CORRECT |ANSWER✔✔-A |this |is |the |correct |order |of |SDLC
Which |of |the |following |are |NOT |an |iterative |methodology? |
A |Waterfall |
B |UP/SUP
C |Scrum
D |Spiral |- |CORRECT |ANSWER✔✔-A |Waterfall |can |only |be |done |in |order |and |cannot |change |
previous |iteration |if |has |mistakes
Which |software |development |method |allows |software |to |be |deployed |for |client |use |after |each
|iteration?
A |Agile |
B |Unified |Process |(UP)
C |V-model
D |Waterfall |- |CORRECT |ANSWER✔✔-A
, Which |of |the |following |is |a |role |of |a |domain |expert?
A |To |provide |insight |into |business |products |and |processes |
B |To |specify |functional |requirements |on |the |behalf |of |the |customer |
C |To |identify |non-functional |requirements |
D |To |assess |project |risks |and |constraints |- |CORRECT |ANSWER✔✔-B
A |software |application |used |by |the |general |public |has |been |found |to |have |a |security |
weakness. |The |problem |has |been |diagnosed |and |a |development |project |initiated |to |correct |
the |security |weakness. |The |project |team |will |include |security |domain |experts.
At |which |stages |in |the |development |will |be |the |MOST |important |to |involve |the |domain |
experts?
A |Feasibility |study, |Code |development |
B |Design, |Testing
C |Requirements |analysis, |Maintenance |
D |Initiation, |Implementation/Deployment |- |CORRECT |ANSWER✔✔-A
During |the |design |stage |of |SDLC, |which |of |the |following |would |be |developed?
A |Software |specification |
B |Software |Code
C |Uses |cases
D |Test |plans |- |CORRECT |ANSWER✔✔-B