Requirement Management (61)
Risk Analysis (22)
Estimation Analysis (14)
Planning & Integration (15) what are artifacts generated while planing phase
What are ‘throwaway’ prototypes and ‘evolutionary’ prototypes? How can production of a prototype be controlled and why is this important?
who are the stake holders in identifying the risk analysis of pure software product development
Why you do not refund the customer his money for the extension? It was agreed, that you pay it back!
explain the model(s) of co-ordination you experienced for effective delivery of the product
is all the test cases to be automized !!! if yes / no let explain the reason
what is the different between all software models
Q1. Write a Defect report if 99 th row of the spread sheet crashes?
you have given estimation to your customer for 15 days and later it requires more days then how will u handle this situations...
Host and Agent are the component associated with which tool?
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
how to track the requirements if all ready it is available for that product
How would you do an Estimation?
what is meant by business rules ?
Is it normal in your company, that you do not pay penalty, if that is agreed in contract?