A. Effective Reuse Planning
B. Enterprise Resource Planning
C. Effective Research Planning
D. None of the mentioned
Explanation: Enterprise Resource Planning systems are examples of large-scale COTS reuse.
Related Mcqs:
- A component model defines standards for_________________?
A. properties
B. methods
C. mechanisms
D. all of the mentioned - COTS stands for___________________?
A. Commercial Off-The-Shelf systems
B. Commercial Off-The-Shelf states
C. Commercial Off-The-System state
D. None of the mentioned - QoS stands for___________________?
A. Quality of security
B. Quality of system
C. Quality of service
D. None of the mentioned - CORBA stands for _____________________?
A. Common Object Request Build Architecture
B. Common Object Request Broker Architecture
C. Common Object Request Break Architecture
D. All of the mentioned - RTOS stands for_____________________?
A. real-life operating system
B. real-time operating system
C. real-time operating software
D. real-life operating software - MTTF stands for__________________?
A. mean-time-to-function
B. mean-time-to-failure
C. manufacture-time-to-function
D. none of the mentioned - Which category the following statement belongs,”Frameworks don’t usually include a database but rather assume that a separate database such as MySQl”?
A. Session management
B. Security
C. User interaction
D. Database support - ________________ depend on there being a clear separation between the presentation of information and the computations that create and process that information?
A. Master-slave architectures
B. Client–server systems
C. Two-tier client–server architecture
D. Both Master-slave architectures AND Client–server systems - How is SOA different from OO Architecture ?
A. Strong coupling among objects
B. Communications are prescriptive rather than being descriptive
C. Data is separated from a service or behavior
D. Data and methods are integrated into a single object - What is used to pass SQL requests and associated data from one component to another ?
A. Client/server SQL interaction
B. Remote procedure calls
C. SQL Injection
D. All of the mentioned