Which of the following choices is not one of the three major elements of the software lifecycle covered by Configuration management?
A. Quality control
B. Assurance
C. Maintenance
D. Development
Answer: A
You might also like to view...
Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?
Fill in the blank(s) with the appropriate word(s).
Since each pixel in a GIF image can be one of 256 colors, ____ are needed to store the color for a pixel.
A. four bits B. eight bits C. ten bits D. 24 bits
Which type of field is a lookup field that allows more than one value to be stored in a field in each record?
A. long text B. multivalued C. date/time D. calculated
To convert a hyperlink to regular text, right-click the hyperlink and then click ____ on the shortcut menu.
A. Edit Hyperlink B. Select Hyperlink C. Convert Hyperlink D. Remove Hyperlink