Non-occurrence of improper alteration of information is known as___________________?
(A) Available Dependability
(B) Confidential Dependability
(C) Maintainable Dependability
(D) Integral Dependability
All fault-tolerant techniques rely on__________________?
(A) Integrity
(B) Dependability
(C) Redundancy
(D) None of the mentioned
Which of the following Error Detection checks is not a part of Application detection ?
(A) Hardware checks
(B) Timing checks
(C) Reversal checks
(D) Coding checks
Which of the following approaches are used to achieve reliable systems?
(A) Fault prevention
(B) Fault removal
(C) Fault tolerance
(D) All of the mentioned
In N-version programming which is the independent generation of N, the value of N is___________________?
(A) greater than 1
(B) less than 1
(C) greater than 2
(D) less than 2
It is imperative for a communicating processes to reach consistent recovery points to avoid the __________________ effect, with backward error recovery mechanism ?
(A) Static
(B) Dynamic
(C) Domino
(D) Whirlpool
A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of___________________?
(A) Full Fault Tolerance
(B) Graceful Degradation
(C) Fail Soft
(D) Fail Safe
What is Cyclomatic complexity ?
(A) Black box testing
(B) White box testing
(C) Yellow box testing
(D) Green box testing
Lower and upper limits are present in which chart ?
(A) Run chart
(B) Bar chart
(C) Control chart
(D) None of the mentioned
Exhaustive testing is___________________?
(A) always possible
(B) practically possible
(C) impractical but possible
(D) impractical and impossible