A. Stakeholder analysis.
B. Recommendations.
C. Risk analysis.
D. Impact analysis.
A. To consider the costs of the required softwarelicenses.
B. To evaluate how the technical requirements may be met.
C. To identify the elements of the technical infrastructure to be used.
D. To define the constraints imposed by theorganization'stechnical architecture.
A. Production of a detailed requirements specification.
B. Breaking the development down into phases.
C. Constant user participation in the development process.
D. Testing throughout the life cycle.
A. A decision to purchase new hardware.
B. A new strategy.
C. A business requirement or need.
D. The Project Definition.
A. The cause and probability of each risk.
B. The cause and effect of each risk.
C. The impact and probability of each risk.
D. The impact and effect of each risk.
A. Payback.
B. Return on Investment.
C. Inflation payback.
D. Discounted Cash Flow.
A. Spy-ware.
B. Anti-virus software.
C. Firewall.
D. Operating system.
A. It takes place after system testing.
B. It dynamically tests the software.
C. It uses the requirements as a test basis.
D. It only uses white box test techniques.