A. Risk
B. Hazard probability
C. Accident
D. Damage
Explanation: The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.
Advertisement
Related Mcqs:
- A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
- A. Vulnerability B. Attack C. Threat D. Exposure...
- Circumstances that have potential to cause loss or harm is known as___________________?
- A. Attack B. Threat C. Vulnerability D. Control...
- Which of the following is not a functional reliability requirement for a system ?
- A. Checking requirements B. Recovery requirements C. Redundancy requirements D. Ambiguous requirements...
- Which of the following examples does not involve dependability engineering ?
- A. Medical Systems B. Power Systems C. Library Management D. Telecommunications...
- Which of the following is a Strategy to achieve Software diversity ?
- A. Different programming languages B. Different design methods and tools C. Explicit specification of different algorithms D. All of the mentioned...
- Which of the following is not a Protection system ?
- A. System to stop a train if it passes a red light B. System to indicate not returning of the library book C. System to shut down a reactor if temperature/pressure are too high D. None of the mentioned...
- Which of the following is a bad practice of Dependable programming ?
- A. Limit the visibility of information in a program B. Check array bounds C. Check all inputs for validity D. None of the mentioned...
- Which of the following is a layer of protection for Security ?
- A. Platform-level protection B. Application-level protection C. Record-level protection D. All of the mentioned...
- Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
- A. Control Faults B. Data Faults C. Input/Output Faults D. Interface faults...
- Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
- A. Storage management faults B. Data Faults C. Input/Output Faults D. Interface faults...
Advertisement