List the steps required for certification in cleanroom software engineering.

What will be an ideal response?


• Usage scenarios are created
• A usage profile is specified
• Test cases are generated from the usage profile
• Tests are executed, failure data is recorded and analyzed
• Reliability is computed and recorded

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. In C++ polymorphism is very difficult to achieve unless you also use inheritance. 2. Static binding occurs when the compiler binds a function call at compile time. 3. Pointers to a base class may be assigned the address of a derived class object. 4. The C++ mechanism for exception handling encloses code that might throw an exception in a try block and puts exception handling code in catch blocks attached to the try block. 5. If an exception is not caught, it is stored for later use.

Computer Science & Information Technology

Clicking a file from the ____________________ list starts the application and opens the file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One appropriate action when invalid input data has been detected is to assign a(n) ____value and proceed.

A. error B. random C. decrement D. default

Computer Science & Information Technology

Most attacks can be recognized as one of the following three broad categories: intrusion, denial of service, and malware

Indicate whether the statement is true or false.

Computer Science & Information Technology