List the steps required for certification in cleanroom software engineering.
What will be an ideal response?
• Usage scenarios are created
• A usage profile is specified
• Test cases are generated from the usage profile
• Tests are executed, failure data is recorded and analyzed
• Reliability is computed and recorded
You might also like to view...
Answer the following statements true (T) or false (F)
1. In C++ polymorphism is very difficult to achieve unless you also use inheritance. 2. Static binding occurs when the compiler binds a function call at compile time. 3. Pointers to a base class may be assigned the address of a derived class object. 4. The C++ mechanism for exception handling encloses code that might throw an exception in a try block and puts exception handling code in catch blocks attached to the try block. 5. If an exception is not caught, it is stored for later use.
Clicking a file from the ____________________ list starts the application and opens the file.
Fill in the blank(s) with the appropriate word(s).
One appropriate action when invalid input data has been detected is to assign a(n) ____value and proceed.
A. error B. random C. decrement D. default
Most attacks can be recognized as one of the following three broad categories: intrusion, denial of service, and malware
Indicate whether the statement is true or false.