Which of the following choices is not one of the three major elements of the software lifecycle covered by Configuration management?

A. Quality control
B. Assurance
C. Maintenance
D. Development


Answer: A

Computer Science & Information Technology

You might also like to view...

Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Since each pixel in a GIF image can be one of 256 colors, ____ are needed to store the color for a pixel.

A. four bits B. eight bits C. ten bits D. 24 bits

Computer Science & Information Technology

Which type of field is a lookup field that allows more than one value to be stored in a field in each record?

A. long text B. multivalued C. date/time D. calculated

Computer Science & Information Technology

To convert a hyperlink to regular text, right-click the hyperlink and then click ____ on the shortcut menu.

A. Edit Hyperlink B. Select Hyperlink C. Convert Hyperlink D. Remove Hyperlink

Computer Science & Information Technology