Explain defect, Software Engineering

Assignment Help:

Explain Defect?

Ans) 1) From the producer's viewpoint: a product needs that has not been met or a product attribute possessed by a product or a function perform by a product that is not in the statement of needs that define the product.

2) From the end user's viewpoint: anything that causes end client dissatisfaction, whether in the statement of needs or not.

 


Related Discussions:- Explain defect

Assignment, is there anyone can help with the assignment

is there anyone can help with the assignment

What are the various categories of software, What are the various categorie...

What are the various categories of software? Application software System software Engineering/Scientific software Web Applications Embedded software Artificial I

State the strategies of software testing, State the strategies of Software ...

State the strategies of Software testing Two testing strategies are present. i) Code Testing: Code testing strategy examines the logic of the system.  In this, analyst deve

Reverse engineering, explain the effect of reverse engineering of software ...

explain the effect of reverse engineering of software development #

What is data dictionary, Q. What is Data Dictionary? Ans Data dicti...

Q. What is Data Dictionary? Ans Data dictionary is a stockroom of data giving information about data. It is a list of terms as well as their definition for all data items a

Explain regression testing, Question 1 Explain Iterative Development Model...

Question 1 Explain Iterative Development Model in detail Question 2 What is statistical testing? What are the steps involved in statistical Testing Question 3 Explain wh

What do you understand by black box testing, Q. What do you understand by b...

Q. What do you understand by black box testing? Black Box Testing:-Black Box Testing is as well called behavioural testing focuses on the functional requirements of the softwar

What are the three activities of risk assessment, What are the three activi...

What are the three activities of risk assessment? The three activities are identifying, examining and giving priorities . Risks can be identified by a check list or looking at

What is dma data transfer, DMA data transfer The position of the DMA co...

DMA data transfer The position of the DMA controller between the other components in a computer system. The CPU communicates with the DMA by the  address and data buses as with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd