A. scope
B. functional requirement
C. preliminary requirement
D. nonfunctional requirement
Advertisement
Related Mcqs:
- Michael hammer defines re-engineer as ___________ and radical redesign of business process to achieve the performance such as cost, quality, service and speed?
- A. Business process B. The fundamental rethinking C. Organization restructuring D. None of the above...
- The first CMM level at which measurable goals for quality and productivity are established is______________?
- A. Level 1 B. Level 2 C. Level 3 D. Level 4...
- The person who ensures that systems are developed on time, within budget, and with acceptable quality is a______________?
- A. systems designer B. project manager C. systems owner D. external system user...
- The most important attribute of information quality that a manager requires is ?
- A. relevance B. media C. presentation D. timeliness...
- What among the following are the primary characteristics that information must process ?
- A. Relevance B. Availability C. Timeliness D. All of the above...
- The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called ?
- A. procedures B. work flow C. process flow D. process requirements...
- Telecommunications means multiple computer interconnected into networks is called __________________?
- A. Distributed database B. Distributed processing C. Central processing D. None of these...
- The person generally responsible for the program design strategy, standards, and construction is called a(n) ?
- A. program librarian B. backup chief programmer C. network designer D. chief programmer...
- Request for quotation (RFQ) is_______________?
- A. a document that compares business and technical requirements of a commercial application package against the capabilities and features of a specific commercial application package B. a document that communicates business, technical, and support requirements for an application software package to vendors that wish to compete for the sale of that application package and services...
- What should not be part of an acceptable use policy ?
- A. Allowable use of systems B. Legal obligations C. Encryption policies D. User responsibilities...
Advertisement