A. Risk
B. Hazard probability
C. Accident
D. Damage
Explanation: The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.
Related Mcqs:
- A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
A. Vulnerability
B. Attack
C. Threat
D. Exposure - Circumstances that have potential to cause loss or harm is known as___________________?
A. Attack
B. Threat
C. Vulnerability
D. Control - Which of the following is not a functional reliability requirement for a system ?
A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements - Which of the following examples does not involve dependability engineering ?
A. Medical Systems
B. Power Systems
C. Library Management
D. Telecommunications - Which of the following is a Strategy to achieve Software diversity ?
A. Different programming languages
B. Different design methods and tools
C. Explicit specification of different algorithms
D. All of the mentioned - Which of the following is not a Protection system ?
A. System to stop a train if it passes a red light
B. System to indicate not returning of the library book
C. System to shut down a reactor if temperature/pressure are too high
D. None of the mentioned - Which of the following is a bad practice of Dependable programming ?
A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned - Which of the following is a layer of protection for Security ?
A. Platform-level protection
B. Application-level protection
C. Record-level protection
D. All of the mentioned - Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults - Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults