Software configuration audit report scar




















Masters Summit Learn about the upcoming industry event. Free Resources. SCAR Videos Hundreds of companies around the world use MasterControl to automate core business processes and document management activities to promote collaboration, improve decision making, and accelerate time to market. Manage all supplier quality information in one place.

Free Resources to Improve Your Supplier Management Efforts Explore a variety of useful materials that can improve the way you manage your suppliers and vendors.

Master your supplier corrective action request processes. Get Your Free White Paper. Read More. Change set c. Composition d. Long Transaction Show Answer Answer : Composition 21 A set of patches applied to system releases like mainframe operating systems updates is an example of model.

Change set d. Design Document b. Installation Manual c. Contract document d. Requirement changes by the customer b.

Inconsistencies detected during development c. Defects found during Testing d. Composition b. System Model c. Check-in, Check-out d. Changes can only be made with write access b. True person can work simultaneously using the branching and merging tools if possible c. Only users in the access control list can make changes d. Branch b. Branch and Label c. Label d. It maximizes productivity by minimizing mistakes. IEEE b. SEI c. Roger Pressmen d. Managing change and improved quality of software assets b.

Requirement analysis and test planning c. Design Modeling and Documentations d. SCM Plan b. SCM Audit c. Control of Documents d.

Identification of CI s b. Accurate release control c. Proper resource allocation d. Use SCM Tool b. Make a small and manageable team c. Maintain the project plan d. Keywords c. Labeling d. It creates delta of binary files as part of versioning, which in turn saves disk space b. A label or tag application is saved as meta data in tools database c. While sharing the files a physical copy is created at respective locations d.

When the check out action is performed on the file, its properties does not change Show Answer Answer : A label or tag application is saved as meta data in tools database 34 Which of the following are basic feature of SCM tools: a. Repository security c. Web Interface d. Development environment and features c. Configuration status accounting d. The organization of the components of a software system so that they fit together in a working order b. It helps minimize risks and manage change in software development c.

Check-out b. Check-in d. Release Management is better organized b. Information about all revisions to a file is available c. Builds can be built and upgraded efficiently d. Activities of SCM b. Features of SCM c. Tool evaluation parameters of SCM d. Change Requests CR c. Multi-Development b. Multi-release c. Concurrent development d. Weekly Report b. Big report c. Status Accounting d. Baselining b. Accounting c. Auditing d. VSS b.

Clear Case c. CVS d. License Cost b. Availability of upgrades c. After sales support d. All of the above Show Answer Answer : All of the above 46 Controlling the retrieval of modifiable copies of files from the repository is a.

Concurrency Control b. SCM c. Merging d. Merging online help b. Merging manual c. Merging Semantics d. Planning, versioning, branching, merging, reports b. Planning, check-in, branching, merging, tools c. Planning, check-in, check-out, version d. Planning, control, status accounting, audit Show Answer Answer : Planning, control, status accounting, audit 49 The Criteria for selecting the right SCM tool is based upon a. Features of the tool ,development environment, complexity, Cost d.

Look and Feel, must be windows based, less cost Show Answer Answer : Features of the tool ,development environment, complexity, Cost 50 The advantages of having naming conventions for a CI are it helps to : a. Identify the functionality of a CI b. Identify the project code c. Identify the Type of a CI d. All the above Show Answer Answer : All the above. Keywords b. Label c. Versions d. System Model b. Change set Show Answer Answer : Long Transaction 53 In a scenario when different developers work in separate stable workspaces and the collection of their changes evolve a system, which concurrency control will you adopt?

Concurrency within one workspace b. Concurrency between workspace requiring co-ordination c. Concurrent Independent Development d. Access Control c. Content d. Workspace b. Concurrent development c. Sharing d. Rollback b. Merging c. Baseline d. Approve b. Review, Approve and Incorporate Changes c. Review d. Audits b. TedWeb Request c. PIP d. Which feature of SCM tool can be used to track the programmer and the version from which it is implemented?

Rollback d. Branching b. Supply Chain Management b. Software Change Management c. Software Configuration Management d. Concurrent Development b. Multiple Releases c.

SCM Tool d. Templates b. Policies c. Procedures d. Release Review Report b. Process Improvement Proposal c. Project Plan d. Check out, make modification on server side and check in b.

Check in, make modification on your local copy and check out c. Check out, make modification on your local copy and check in d. Check in, make modification on server side and check out Show Answer Answer : Check out, make modification on your local copy and check in 66 Defining rights of individuals for accessing the project repository is defined at which of the following stage of SCM: a. SCM Audit b. SCM Planning c. SCM Control d. Fill in the blank from respective comma separated words a. Project, Pinning b.

Keyword, Pinning c. Baseline, Label d. Branch, Trigger Show Answer Answer : Baseline, Label 68 In check-in, check-out model, version branching and merging are represented by a structure known as a. Structure Chart b. Version Graph c. History Graph d. Experimental development b.

Concurrent changes c. Independent path of development d. Labelling b. Baselining d. None of the above Show Answer Answer : Baselining 73 Your project is in the User Acceptance Testing phase and the customer comes back with a new requirement.

What is correct sequence of activities in handling this change request: a. A workspace can originate from a preserved configuration of another workspace b. A workspace can originate from a repository c. A workspace originates from a bound configuration in the repository d. Maintaining a file system as work area is more space efficient than using a workspace Show Answer Answer : Maintaining a file system as work area is more space efficient than using a workspace 75 SCM does not help in meeting which of the following ISO requirement a.

Identification and Traceability b. Control of records c. Design and Development outputs d. Audit Report b. Configuration report c. Build customized versions of project for different clients b. Merging two versions of the same file c. None of the above Show Answer Answer : Build customized versions of project for different clients 78 If a SCM break downs, which of the following is of the most help: a.

The last complete backup of SCM repository b. Which of the following activity is not involved in it: a. Baselining CI s b. Identification of CI s c. Analysis of historic Information d.

What is the primary information maintained within history? Audit status of version b. Name and versions of artifacts c. Label associated with versions d. Difference between two versions of binary files b. Difference between two versions of files irrespective of their file types c. Ansible : It is an open source Software configuration management tool. Skip to content. What is Software Configuration Management? Report a Bug. Previous Prev. Next Continue. Home Testing Expand child menu Expand.

SAP Expand child menu Expand. Web Expand child menu Expand. Must Learn Expand child menu Expand. A configuration management process that confirms the integrity of a systems product prior to delivery. There are two types of configuration audits:. Functional audit. The objective of the functional audit is to provide an independent evaluation of a software product, verifying that its configuration items' actual functionality and performance is consistent with the relevant requirement specification.

This audit is held prior to software delivery to verify that all requirements specified in the Software Requirements Specification have been met.



0コメント

  • 1000 / 1000