Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

February 2019

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ?

A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned

Explanation: It means that process standards are being followed and make suggestions for process improvement.

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants” ? Read More »

Dependability and Security

Which of the following examples does not involve dependability engineering ?

Which of the following examples does not involve dependability engineering ?

A. Medical Systems
B. Power Systems
C. Library Management
D. Telecommunications

Explanation: Software customers expect all software to be dependable. However, for non-critical applications such as certain management systems, they may be willing to accept some system failures.

Which of the following examples does not involve dependability engineering ? Read More »

Dependability and Security

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

A. Loss of service
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ? Read More »

Dependability and Security

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ?

A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned

Explanation: This risk assessment takes place during the system development life cycle after design choices have been made..

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions ? Read More »

Dependability and Security

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ?

A. POFOD
B. ROCOF
C. AVAIL
D. None of the mentioned

Explanation: Rate of occurrence of failures (ROCOF) sets out the probable number of system failures that are likely to be observed relative to the number of system executions.

Which reliability metric sets out the probable number of system failures that are likely to be observed relative to a certain time period ? Read More »

Dependability and Security

Which reliability requirements are concerned with maintaining copies of the system ?

Which reliability requirements are concerned with maintaining copies of the system ?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements

Explanation: These requirements are geared to helg the system recover after a failure has occurred.

Which reliability requirements are concerned with maintaining copies of the system ? Read More »

Dependability and Security