Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Green Highlight = Correct

Yellow Highlight = Incorrect/Unsure

Requirements analysis agree on a deliverable System usability will not always require
system that is realistic for developers and conducting user acceptance tests.
customers
True
True
One use case scenario is represented by one use
For functional requirements, task deployment case diagram
examines the characteristics of the system
False
False
Login credentials are considered as user
For functional requirements, function accounts
deployment determines the value of each
False
function required of the system
Flow charts uses the same symbols as an
True
activity diagram
An activity diagram allows the modeler to
False
represent the flow of activities described by the
use-case and at the same time indicate which Requirments analysis create an analysis model
actor has responsibility for the action i by an that identifies data, function and behavioral
activity requirements
False True
Conducting interviews involve seeing the For non-functional requirements, task
problem actually happen to the customer deployment examines the behavior of the
system
False
False
Stakeholders can be included in the list of
customers In a use case diagram, actors represent people
or users of a system
True
True
Requirements model should include technical
details to ensure proper design and coding later SWOT is a planning tool used in marketing,
on. management, and other businesses
False True
System portability is often applied to mobile Potential causes are sometimes called process
apps due to backward compatibility issues with input variables
OS versions
True
True
Use case model

scenario-based model
Green Highlight = Correct
Yellow Highlight = Incorrect/Unsure

ER diagram An app is able to read QR codes as an input for


payment transactions. Which NFR is most
(di alam basta indi class)
applicable for this function?
System sequence diagram
Usability
(di alam basta indi scenario based)
An activity diagram's diamond symbol signifies a
Design of graphical user interface is considered decision. In code level, this translates to _
to be what type of non-functional requirement?
If else
System usability
SWOT stands for
Database encryption is considered to be what
strength, weakness, opportunity, threat
type of non-functional requirement
SWOT that is part of the internal environment
System security
SW
Describe situations that cause the system to
exhibit unusual behavior SWOT that is part of the external environment

Exceptions OT

Password strength (i.e. character combinations) SWOT that identifies negative traits in the
is an example of analysis

Information deployment WT

Computed total amount in a restaurant receipt Root causes are identified as


is considered as
(Di alam basta indi the end)
(Di alam basta indi info dep)
Students in a university
Determining Ul response
Man
UI usability
Scanning your student ID upon entry
Accuracy is categorized under which NFR?
Method
(Di alam basta di reliability)
UST Cloud Campus
Encyption of database
(indi alam basta di management)
Security
Correctness of formula is considered to be what
UML diagram which shows each specific actor's type of non-functional requirement?
interaction with the system based on a given
a. System usability
scenario
b. System reliability
(Di alam basta indi usecase) c. System accuracy
d. System Efficiency
Green Highlight = Correct
Yellow Highlight = Incorrect/Unsure

Non functional requirement which identifies Which non-functional requirements can be


system capability of being used in different applicable to the Login function in a system?
mobile platforms (Choose two)

Portability a. efficiency
b. security
Non functional requirement which identifies
c. reliability
errors in a system and giving the user the
d. Maintainability
capability of fixing said error on their own
without resorting to code debugging. (Partial score)

a. Efficiency A use case scenario contains the following


b. Reliability
Actor
c. Usability
d. Portabilityf Pre condition
e. Maintainability
f. security Process steps

Non functional requirement which identifies Output


password strength or complexity (Partial score)
(Security dapat kaso mali) Fishbone diagram can
In your UST cloud campus, students and faculty identify the causes of an undesirable effect of a
are considered problem
User accounts provide initial information to later problem
SDLC phase where client interviews are solving tools
conducted bring attention to the primary factors affecting
requirements gathering the quality of a product or service

Requirements analysis identifies a basic Parts of a class diagram include


understanding of the project class attribute
Scope Problem (sinagot pero partial score lang, class method
may incorrect)
class name
Requirements analysis
The aim of SWOT analysis is
indicates software's interface with other system
elements • To provide linearity to the
decision making process allowing complex ideas
creates prototypes that define the project to be presented systematically.
specifications
• To bring a clearer common
establishes constraints that software must meet purpose and understanding of factors for
(Partial score, may incorrect) success.
Green Highlight = Correct
Yellow Highlight = Incorrect/Unsure

Which of the following are considered as 'bad'


interview questions?

(Unknown basta indi Problematic employee and


How are you managing your employees?)

You might also like