Which of the following statements best describes why an evaluator must validate the results of an evaluation performed using analytical models?

a) Systems are often too complex to model accurately, so the results of analytical models are often erroneous.
b) The evaluator needs the results of other performance evaluations to build the model in the first place.
c) Analytical models are useful in the development process, but many consumers distrust or do not understand analytical models. A vendor must validate the results of an analytical model before presenting the results to potential customers.
d) In general, it is a good idea to use multiple techniques to test a system. Additionally, because an evaluator often must make simplifying assumptions to model complex systems, other evaluations should be done to verify that these assumptions are valid.


d) In general, it is a good idea to use multiple techniques to test a system. Additionally, because an evaluator often must make simplifying assumptions to model complex systems, other evaluations should be done to verify that these assumptions are valid.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The shell standard variables are called metacharacters. 2. Preceding a metacharacter with a backslash (\) removes its special meaning. 3. The echo command is used to echo the input from keyboard. 4. The shell contains several build in commands. 5. The HOME standard variable is set to the root directory pathname.

Computer Science & Information Technology

To insert a text box on a slide, click the Insert tab, and then click the Text box button in the ____ group.

A. Size B. Text C. Adjust D. Arrange

Computer Science & Information Technology

Which of the following is a standard that offers authentication, authorization, and accounting? (Select all that apply.)

A. Terminal Access Control Access Control System Plus (TACACS+) B. Remote Authentication Dial-in User Service (RADIUS) C. Network Access Servers (NASs) D. MS-CHAP E. Both A and B

Computer Science & Information Technology

The parent node is also known as the _________ node.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology