Software Engineering - Software Engineering Section 2

Avatto > > UGC NET COMPUTER SCIENCE > > PRACTICE QUESTIONS > > Software Engineering > > Software Engineering Section 2

41. Using computers to steal money, service software or data is called

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


42. Designing computer hardware, software, and work stations that are safe,comfortable and easy to use is called

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


43. Which among the following outline a business vision, business/IT strategies, and technical architecture for the information systems functions

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


44. A management steering committee is an example of

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


45. Managing systems analysis and design, computer programme and systems maintenance activities are called

Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *