A. Stated needs
B. Is easy to use
C. Makes optimal use of system resources
D. None of the mentioned
A. Integrity = [sigma(1 – threat)] * (1 – security)
B. Integrity = [1 – sigma(threat)] * (1 – security)
C. Integrity = [1 – threat * sigma(1 – security)]
D. Integrity = sigma[1 – threat * (1 – security)]
A. Product metrics
B. Process metrics
C. Project metrics
D. All of the mentioned
A. Maximum number of nodes at any level
B. Longest path from the root to a leaf
C. Number of modules
D. Lines of control
A. Correctness
B. Integrity
C. Maintainability
D. All of the mentioned
A. Complexity metrics
B. Cohesion metrics
C. Morphology metrics
D. Coupling metrics
A. Flexibility
B. Reliability
C. Usability
D. Integrity
A. Product metrics
B. Process metrics
C. Project metrics
D. All of the mentioned
A. Measurement
B. Measure
C. Metric
D. All of the mentioned
A. Product metrics
B. Process metrics
C. Project metrics
D. All of the mentioned