0.Lehmanâ€™s First Law (Lehman and Belady 1985) is
Options: (A)Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. (B) Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 21
. If you need to double underline a word, how willÂ you do that?
Options: a. Go to Format menu and then Font option. Open Underline Style and choose Double Underline
b. From Format menu choose Font option and then from Font tab open Underline Style and select Double Underline
c. Select the text then choose Format >> Font and on Font tab, open Underline Style and choose Double Underline
d. Click double underline tool on formatting toolbar
Which of the following are the members of SAARC (South Asian Association for Regional Cooperation)?
Options: Bhutan, Bangladesh, India and Pakistan, Bhutan, Bangladesh, the Maldives, Nepal, India, Pakistan, Afghanistan and Sri Lanka, Afghanistan, Pakistan, Thailand, Indonesia, Nepal and Sri Lanka, None of the above
Options: A)for relatively permanent collections of data
b.for the size of the structure and the data in the structure are constantly changing
c.for both of above situation
d.for none of above situation
Options: a. by holding Ctrl key, click on existing Guide Line and drag b. by holding Alt key, click on existing Guide Line and drag c. by holding Ctrl + Alt key, click on existing Guide Line and drag d. Additional Guide Lines cannot be created
Options: (A)Time-period that begins when a software product is conceived and ends when the software is no longer available for use. (B) Adaptive maintenance, performed to make a computer program usable in a changed environment. (C) A simplified description of a software process that is presented from a particular perspective. (D) None of these 24
Options: The use of Internet protocols with limited access to company data by the company's customers and suppliers., The use of Internet protocols with unlimited access to company data by the company's customers and suppliers., The use of Internet protocols with limited access to company data by people within an organization., The use of Internet protocols with unlimited access to company data by people within an organization.