A. Integrity = [Sigma(1 – threat)] * (1 – security)
B. Integrity = [1 – Sigma(threat)] * (1 – security)
C. Integrity = [1 – threat * Sigma(1 – security)]
D. Integrity = Sigma[1 – threat * (1 – security)]
Advertisement
Related Mcqs:
- In size oriented metrics, metrics are developed based on the _____________________?
- A. number of Functions B. number of user inputs C. number of lines of code D. amount of memory usage...
- Which of the following does not affect the software quality and organizational performance ?
- A. Market B. Product C. Technology D. People...
- Which of the following is not categorized under Product Operation of McCall’s Software Quality Factors ?
- A. Flexibility B. Reliability C. Usability D. Integrity...
- The intent of project metrics is_____________________?
- A. minimization of development schedule B. for strategic purposes C. assessing project quality on ongoing basis D. minimization of development schedule and assessing project quality on ongoing basis...
- A graphical technique for finding if changes and variation in metrics data are meaningful is known as_________________?
- A. DRE (Defect Removal Efficiency) B. Function points analysis C. Control Chart D. All of the mentioned...
- Statement and branch coverage metrics are part of______________________?
- A. Analysis Model B. Testing C. Design Model D. Source Code...
- Architectural Design Metrics are ______________ in nature ?
- A. Black Box B. White Box C. Gray Box D. Green Box...
- Which of the following is not categorized under Component-Level Design Metrics ?
- A. Complexity Metrics B. Cohesion Metrics C. Morphology Metrics D. Coupling Metrics...
- Function Points in software engineering was first proposed by_______________?
- A. Booch B. Boehm C. Albrecht D. Jacobson...
- The amount of time that the software is available for use is known as_________________?
- A. Reliability B. Usability C. Efficiency D. Functionality...
Advertisement