Options: (A)Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. (B) An error of some kind or an unexpected event occurs during the execution of a program (C) Here the objective of the process is to work with uses to explore their requirement and deliver a final system. (D) Possible loss or harm in computing system. 16
. When a row of data is to be converted into columns
Options: a. Â Copy the cells in row, select the same number of cells in row and paste
b. Â Copy the cells in column then choose Edit >> Paste Special, then click Transpose and OK
c. Â Copy the cells then go to Format >> Cells then on Alignment tab click Transpose check box and click OK
d. Â Select the cells then place the cell pointer on new cell and choose Edit >> Paste Special, mark Transpose check box and click OK.
1.In uni-processor scheduling, shortest process next policy is (i) A: Non-preemptive policy (ii) B: Preemptive policy (iii) C: A policy where the process with shortest expected processing time is selected next. (iv) D: A policy where the process with shortest expected processing time is not selected.
Options: (A) A and D are true (B) B and C are true (C) A and C are true (D) B and D are true. 12
Options: (A)It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. (B) It is concerned with deriving a numeric value for some attribute of a software product or a software process. (C) It is any type of measurement, which relates to software system, process and related documentation. (D) None of these 25
What was the purpose of EFTA (European Free Trade Association)?
Options: To remove all tariffs on trade of industrial goods between the member countries, To aid the creation of a single west European market to help boost world trade, both (a) and (b), None of the above
Options: (A)Here each component has a unique name and an associated set of attribute, which differs for each version of component (B) Extent to which a software system records information concerning transactions performed against the system (C) Extent to which a system or component is operational and accessible when required for use (D) They are used to describe the over all behavior of the system 12