5.In system modeling: A-Architectural model: B-Stimulus-response model: C-Behavioral models::1-Used to describe the overall behavior of the system: 2-State transition diagram show how the system reacts to internal and external events:3-Shows principal sub-systems which makes the system
Options: (A)Associated with the role of people involved in software process and the activities for which they are responsible. (B) The most effective technique for demonstrating the safety of a system is proof by contradiction. (C) It is concerned with establishing a confidence level in the system that might vary from low to high (D) None of these | 107 24
Options: (A)is executed when a window is becoming visible or is being hidden (B) when a window is being disabled or enabled this event is executed (C) this event is executed when the user switches to another window of the same application (D) when a window receives the keyboard focus this event is executed 2
Options: acts of gallantry in the presence of enemy, gallantry by children, outstanding contribution to literature, the most conspicuous bravery or self sacrifice on land, air or sea but not in the presence of the enemy
Options: (A)Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. (B) Period of time in the software life cycle during which support for a software product is terminated. | 105 (C) The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. (D) None of these 22
Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?