Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Presume a program will experience a total of 200 failures. Preliminary failure intensity is 16 failure/ CPU hr. It has currently experienced 50 failures. Determine the following subsequent to specifying the formula
a. Current failure intensity
b. Decrement of failure intensity
c. Failure intensity at 100 CPU hr.
Ans:
i. Current failure intensity
λ (μ) = λ 0 [1 - μ / v0] = 16 [ 1- 50 / 200] = 12 failure / CPU hr
ii. Decrement of failure intensity
d λ / dμ = - λ 0 / v0 = 16 / 200 = -0.08 CPU hr
iii. Failure intensity at 100 CPU hr
λ (_) = λ 0 exp(-λ 0 λ / v0)
= 16 exp ( -16 * 100 / 200) = 16 exp(-8)
What is Usability? Ans) "Usability" means simple of use; the simple with which a user can learn to control, prepare inputs for, and intended the outputs of a software product.
State Entity and relationship diagram. ERD depicts linkage between data objects. The ERD is the notation that is used to execute the data modelling activity. The primary
What is a vertical microinstruction? Ans) A vertical microinstruction is a microinstruction that states one of a sequence of operations required to carry out a machine language
How can we know about to divide numbers from total error from which half passed through error and half passed to amplified and how to generate defect efficiency?
Code Complete - Phase of development where functionality is executed in entirety with only bug fixes remaining. - All functions from the functional specifications are alrea
What are business process engineering tools? By modelling the strategic information requirements of an organization, business process engineering tools provide a "meta-model" f
Differentiate between testing and QA. - Quality Assurance is more a preventive thing, which ensures quality in company and hence the product instead of just testing the product
Indexing: The CDS/ISIS package indexes all fields selected for indexing into a single file. This file is known as 'inverted file'. There are indexing techniques for building i
effects of nativity in requirements specification
What are the three activities of risk assessment? Ans: The three activities are analyzing, identifying and giving priorities. Risks are able to be identified by a check list
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd