A. Unauthorized access to computer material
B. Unauthorized modification of computer material
C. Dissemination of viruses or other malware
D. All of the mentioned
Related Mcqs:
- Select the incorrect statement: “Software engineers should:
A. not knowingly accept work that is outside your competence.”
B. not use your technical skills to misuse other people’s computers.”
C. be dependent on their colleagues.”
D. maintain integrity and independence in their professional judgment.” - Identify the correct statement: Software engineers shall _____________________?
A. act in a manner that is in the best interests of his expertise and favour.”
B. act consistently with the public interest.”
C. ensure that their products only meet the SRS.”
D. all of the mentioned - Which of these software engineering activities are not a part of software processes ?
A. Software dependence
B. Software development
C. Software validation
D. Software specification - Efficiency in a software product does not include ____________________?
A. responsiveness
B. licensing
C. memory utilization
D. processing time - What are attributes of good software ?
A. Software maintainability
B. Software functionality
C. Software development
D. Software maintainability & functionality - What is a Software ____________________ ?
A. Software is set of programs
B. Software is documentation and configuration of data
C. Software is set of programs, documentation & configuration of data
D. None of the mentioned - The reason for software bugs and failures is due to _____________________?
A. Software companies
B. Software Developers
C. Both Software companies and Developers
D. All of the mentioned - Which of these does not account for software failure ?
A. Increasing Demand
B. Low expectation
C. Increasing Supply
D. Less reliable and expensive - Which of these does not affect different types of software as a whole ?
A. Heterogeneity
B. Flexibility
C. Business and social change
D. Security - The fundamental notions of software engineering does not account for ?
A. Software processes
B. Software Security
C. Software reuse
D. Software Validation