function point specialist

81
1 When counting DETs which of the following rules apply? Count a DET for each recursive field on the ILF or EIF Count a DET for each piece of data in an ILF or EIF required by the user to establish a relationship with another ILF or EIF Count a DET for each repeating field that is identical in format Count a DET for each field that appears more than once in an ILF or EIF b 2 Which of the following is an attribute used to represent relationships of one entity to another? Primary key Secondary key Foreign key Domestic key c 3 Which category (ies) of data entities is (are) usually identified to satisfy the Functional User Requirements? Business data Reference data Code data Both A and B d 4 What is a (are) valid example(s) of code data? Substitution data Static data

Upload: avinashkakarla

Post on 15-Sep-2015

231 views

Category:

Documents


1 download

DESCRIPTION

GOOD

TRANSCRIPT

1 When counting DETs which of the following rules apply?Count a DET for each recursive field on the ILF or EIF Count a DET for each piece of data in an ILF or EIF required by the user to establish a relationship with another ILF or EIF Count a DET for each repeating field that is identical in format Count a DET for each field that appears more than once in an ILF or EIFb2 Which of the following is an attribute used to represent relationships of one entity to another?Primary key Secondary key Foreign key Domestic keyc3 Which category (ies) of data entities is (are) usually identified to satisfy the Functional User Requirements?Business data Reference data Code data Both A and Bd4 What is a (are) valid example(s) of code data?Substitution data Static data Valid values All of the aboved5 What is a user identifiable group of logically related data or control information referenced by the application, but maintained within the boundary of another application?An ILF An IIF An EIF An ELFc6 Which of the following is NOT an example of the purpose of a function point count?To enable comparison of functionality delivered by two applications To determine maintenance support cost per function point To understand the percentage of lines of code that is being reused across three different applications To determine the effort and duration of a development projectc7 Which of the following statements regarding the counting scope is true?It defines the set of Functional User Requirements to be included in the FP count It always includes more than one application It determines the purpose of the applications being counted It defines a (sub) set of the modules being sizeda8 Which of the following is NOT true of a boundary?It encloses the logical data maintained by the application It is the physical interface between the software under study and its users It is dependent on the user's external business view of the application and is independent oftechnical and/or implementation considerations It defines what is external to the applicationb9 An example of the purpose of an FP count is to provide:input to the estimation process needed to determine the level of effort to develop the first release of an applicationa comparison of functionality delivered by two different suppliers' packagesdetermine the size of an application as part of the organization's effort to determine the size of its software portfolioAll of the aboved10 Which of the following defines the purpose of a count?Provides an answer to a business question, and it is the business question that determines the purposeInfluences the positioning of the application between the software under review and the surrounding softwareInfluences the type of FP count to answer the business problem under investigationProvides an input to the estimation process needed to determine the level of effort required to develop the first release of an applicationa11 Which of the following statements about an External Input is true?Has the primary intent to maintain one or more ILFsAn elementary process to hold data or control information from outside the boundaryHas the primary intent to alter the behavior of a transactionHas the primary intent to reference one or more EIFsa12 An EI is defined as:an elementary process that processes data sent from outside the application boundarycontrol information sent from outside the user viewan elementary process that processes data or control information sent from outside the application's boundary All of the abovec13 Control information is defined as data that:defines an elementary process of the application being counted influences an elementary process of the application being counted controls an elementary process of the application being counted does not influence an elementary process of the application being countedb14 What is an elementary process?The smallest unit of activity that is meaningful to the developer The largest unit of activity that is meaningful to the user The smallest unit of activity that is meaningful to the user The largest unit of activity that is meaningful to the developerc15 The primary intent of an EI is to maintain:One or more ILFs or alter the behavior of the application One or more ILFs One or more EIFs or alter the behavior of the application One or more EIFsa16 "Requirements specifically requested by the user to complete an elementary process" defines which of the following terms?Control information Processing logic Maintain User identifiableb17 Which of the following statements regarding functional size measurement is true?Early functional size measurements can never change during design and coding phase It is quite normal to identify additional functionality that was not specified in the original requirements in the form of scope creep It is not necessary to update the application functional size upon completion of an enhancement. Both B and Cb18 An application FP count is defined as:a measure of the current functions the application provides the user the initial development project FP count an enhancement project that alters the applications functions the activity of applying this International Standard to measure the functional size of an applicationd19 Which of the following statements is (are) true regarding an application functional size (FS)?It provides a measure of the functionalities that an application provides to the user It is never updated after the initial application installation It is associated with an application's lifecycle Both A and Cd20 What is true about conversion functionality?Transactional or data functions provided to convert data and /or provide other user specified conversion requirements Exists only during the development or enhancement of an application Conversion functionality is outside the scope of FP counting Both A and Bd21 Which of the following functions is (are) counted for a development project FP count?Added functions Conversion functions Changed functions Both A and Bd22 The application functional size after an enhancement project does NOT include the size of the:conversion functionality functions being added by the enhancement project functions being changed by the enhancement project - as they are / will be after implementation functions being deleted by the enhancement projecta23 Which is the correct formula for calculating the AFP after an enhancement project?AFPA = ADD-DEL AFPA = (AFPB + ADD + CHGA) - (CHGB + DEL) AFPA = ADD + CHGA + CFP + DEL AFPA = AFP + CFPb24 The Measurement Process includes which of the following?Gather available documentation Measure data functions Calculate the functional size All of the aboved25 In the formula DFP = ADD + CFP, CFP denotes?Code functionality Conversion functionality Complex functionality Changed functionalityb26 Which term used in FP calculations reflects the size of the functions being changed by the enhancement project - as they are / will be after implementation?CHGA CHGB DEL VAFa27 Complete the statement. Developers translate the__________ into software in order to provide a solution.Control input Technical view User view Application boundaryc28 Which of the following does not represent the user view, and should not be used for FP counting purposes?User handbook Catalog of transactions Detailed specifications Application source coded29 What is a "user"?Any person that specifies functional user requirements Any person that influences the integrated diagram procedures Any person or thing that communicates or interacts with the software at any time Both A and Cd30 What does approximating FPs permit you to do in order to accomplish a function point analysis?Use a developer view Identify all the functions and their complexity Make assumptions about functions and/or their complexity All the abovec31 Which of the following statements regarding Function Point Analysis (FPA) is true?FPA measures software by quantifying the tasks and services (i.e. functionality) that the software provides to the user based primarily on logical design FPA measures software by quantifying software functionality based on architectural attributes FPA is a standardized method for measuring software development from the developer's point of view FPA is a standardized method for measuring software maintenance based on the technology used for implementationa32 Which GSC describes the degree to which the application communicates directly with the processor?Data communications Distributed data processing Transaction rate Online updatea33 Which of the following statements is a characteristic of the GSC - complex processing?Development of the application is influenced by how the development was carried out Development of the application is influenced by the complexity of data communication Development of the application is influenced by the complexity of the processing logic None of the abovec34 Which transactional function(s) has (have) the primary intent of presenting information to the user and must reference a data function to retrieve data or control information?EI EO EQ Both B and Cc35 The primary intent of an EQ is to:alter the behavior of the application maintain one or more ILFs present information to a user Both A and Cc36 An External Inquiry is defined as an elementary process that:Sends data outside the boundary Sends Control Information outside the boundary Has a primary intent to present information to a user through retrieval of data or control information All of the aboved37 Which statement(s) is (are) true regarding mandatory processing logic for an EQ?Data or control information is maintained Conditions are analyzed to determine which are applicable At least one ILF or EIF is referenced Data or control information entering the boundary of the application is acceptedc38 Which processing logic can be performed by an EQ?Equivalent values are converted Behavior of the application is altered Derived data is created Both A and Ba39 The functional complexity of an EQ is based upon the number of:RETs FTRs DETs Both B and Cd40 Which of the following forms of processing logic is mandatory that an EO perform at least one (m*)?Behavior of the application is altered Equivalent values are converted At least one ILF or EIF is referenced Information is prepared and then presented outside the boundarya41 Which of the following statements is true regarding EOs?An EO is an elementary process that sends data or control information outside the boundary. An EO includes additional processing logic beyond that of an EQ. An EO always maintains a data function. Both A and Bd42 Processing logic is defined as any of the requirements specifically requested by the user to complete an elementary process. Those requirements include which of the following actions?Validations Algorithms or calculations Reading or maintaining a data function All of the aboved43 An External Output is defined as an elementary process that:Includes addition processing beyond an external inquiry Sends data outside the boundary Has a primary intent to present information to a user though processing logic or in addition toretrieval of data or control information. All of the aboved44 Which of the following statements about an External Output are true?Processing logic must contain multiple mathematical formulas Processing logic must perform at least one mathematical formula Processing logic creates derived data Processing logic contains derived datac45 An FTR is be defined as a:data function maintained by a base functional component data function read and/or maintained by a transactional function base functional component maintained by a transactional function base functional component read and/or maintained by a transactional functionb46 What is the primary intent of an ILF?Hold data maintained through system tools for use by the application being measured Hold code data for use by the application being measured Hold data maintained through one or more elementary processes of the application being measured Both A and Cc47 Data Element Type is defined as?Functionality provided to the user to meet internal or external data storage requirements An attribute that further describes one or more attributes of another entity Two types of the base functional components identified in the IFPUG International Standard Unique, user recognizable, non-repeated attributed48 Which of the following statements regarding ILFs is true?The primary intent of an ILF is to hold data maintained through one or more elementary processes of the application being counted The primary intent of an ILF is to release data maintained through one or more elementary processes of the application being counted An ILF contains a group of bounded data or control information An ILF contains logically related data maintained within the boundary of another applicationa49 Mandatory subgroup is defined as:one of many types of subgroups for RETs one of two types of subgroups for RETs that the user must use during an elementary process one of many types of subgroups for RETs that the user may or may not use during an elementary process a subgroup of logically related data that is created by a process within the application boundaryb50 The two types of subgroups of an ILF are:optional and required optional and mandatory discretionary and mandatory discretionary and requiredb51 An EFP is defined as a measure of the:modifications added to an existing application modifications to an existing application that add, change, deletes transactional functions delivered when the project is complete functionality added, changed or deleted at the completion of an enhancement project, as measured by the enhancement project function point count functions provided to the users with the first installation of the software when the project is completec52 Conversion functionality is defined as:transactional or data functions provided to convert data and/or provide other user specified conversion requirements conversion functionality required by the developer a measure of the conversion functionality delivered to the user when the project is complete a measure of the data that is converted for the user when the project is completea53 In FP count calculations, the term DEL is the size of the function being:delivered by the enhancement project described by the enhancement project deleted by the enhancement project developed by the enhancement projectc54 Which of the following equations is the correct equation to calculate the VAF?VAF =(TDI 0.10) + 0.65 VAF=(TDI * 0.10)+ 0.35 VAF =(TDI * 0.01)+ 0.65 VAF = (TDI* 0.01)+ 0.35c55 The boundary for the function point count:encloses the physical data maintained by the application is based on the user view, not on technical considerations is the conceptual interface between the internal user world and external application world is dependent on implementation and/or technical considerationsb56 What indicates the conceptual interface between the software under study and its users?The boundary membrane The application interface The boundary interface The boundaryd57 Which type of functional size (FS) measures the functionality added, changed, or deleted at the completion of an enhancement project?Application FS Baseline FS Enhancement project FS Development project FSc58 An application's functional size is also referred to as the installed functional size. When is the application functional size updated?Never, the application functional size is the baseline or installed functional sizeB. Once a year if there were enhancement projects that altered the application functionsC. Every time completion of an enhancement project alters the application's functionsD. The application is re-counted once a year regardless of the number of enhancement projectsC

59Which is the first step of the Measurement process?Gather the available documentationB. Determine the counting scope and application boundaryC. Measure data functionsD. Measure transactional functionsA

60An External Input is an elementary process that:Processes data or control information sent from outside the boundaryB. Has the primary intent to maintain one or more ILFsC. has the primary intent to alter the behavior of the systemD. All of the aboveD

61Which of the following statements is (are) true regarding the definition of maintain? Maintain isdefined as:21Ability to add, change or delete transactions through an elementary processB. Ability to add, change or delete data through an elementary processC. Ability to add, change or delete data through a functional user requirementD. None of the aboveB

62When counting an EI, which of the following statements is true of the term maintain?It is the ability to create or modify an elementary processB. It is the ability to create data in another applicationC. It is the ability to add, change or delete data through the elementary processD. None of the aboveC

63Which of the following is the definition of derived data?data created as a result of processing that involves steps, other than or in addition to, directretrieval and validation of information from data functionsB. data created as a result of concatenating attributes from multiple data functionsC. data that is calculated base upon attributes directly retrieved from data functions and presentedto the user satisfying a Functional User RequirementD. None of the aboveA

64Which of the following statements is false?22Technical requirements do not contribute to the functional sizeB. CPM is transformed into an ISO standard for size with inclusion of GSCC. Functional size can be estimated in the proposal phaseD. Prior to FP counting, we need to determine the purpose of the countB

65Business data is defined as:information needed to be stored and retrieved by the functional area addressed by theapplicationB. information needed by the core users for translationC. the business objects that represent valid values of entities external to the applicationD. data that reflects static information that is stored and retrieved by the applicationA

66Control information is data that:influences an elementary processB. specifies what data is to be processedC. specifies when and how data is to be processedD. All of the aboveD

67Which of the following types of processing logic is (are) mandatory for an elementary process tobe classified as an EQ?23At least one ILF or EIF is referencedB. Information is prepared and then presented outside the boundaryC. Data or control information is retrievedD. All of the aboveD

68Which statement(s) is (are) true for an elementary process?It is the smallest init of activity that is meaningful to the userB. It is the smallest unit of activity that that leaves the application in a dynamic stateC. It is the smallest unit of activity that constitutes a complete transactionD. Both A and CD

69Which of the following would apply when counting FTRs for an EQ?Count an FTR for each ILF or EIF readB. Count one FTR for each ILF maintainedC. Count only one FTR for each ILF that is both maintained and readD. All of the aboveA

70Which of the following types of processing logic is mandatory for an elementary process to beclassified as an EO?Equivalent values are converted24B. Information is prepared and then presented outside the boundaryC. At least one ILF or EIF is referencedD. All of the aboveB

71The functional complexity of an EO is based upon which of the following?The number of RETsB. The number of FTRsC. The number of DETsD. Both B and CD

72Which of the following statements best describes transactional functions?They represent the functionality provided to the user to meet internal data requirementsB. They represent the functionality provided to the user to process the dataC. They indicate the general functionality provided to the user of the applicationD. They are measured primarily for project FPsB

73An EIF referenced by mere then one application counts as:an EIF for the application under studyB. an EIF for the application under study and an ILF for the other applicationsC. an EIF for each application that references the file25D. None of the aboveC

74Which of the following statements is (are) true of business data?It may also be referred to as core user data or business objectsB. It is mandatory for the operation of the users' functional areaC. It is user identifiable (usually by a business user)D. All of the aboveD75Which of the following statements is (are) true?An EIF can only be counted as an EIF for one applicationB. An EIF must be an ILF in another applicationC. An EIF is only counted by the application that uses all of its DETsD. All of the aboveB76The TDI is:computed using the VAFB. a value ranging between 0 and 5C. the sum of the degree of influenceD. /-35%26C

77Which GSC describes the degree to which processing logic influenced the development of theapplication?Transaction rateB. Complex processingC. PerformanceD. ReusabilityB

78Which functional size (FS) is associated with the measurement at any time dring the application'slifecycle?Application FSB. Adjusted FSC. Enhancement project FSD. Development project FSA

79Documentation of a function point count can include:Identification of missing source documentationB. Each data function and the number of DETs and RETsC. Each transactional function and the number of DETs and RETsD. B and C27D

80In which life cycle phase can size NOT be measured?ProposalB. RequirementsC. DesignD. ConstructionA

81Which of the following defines the user view?Translation of the technical solution into the user's languageB. Functional User Requirements as perceived by the userC. Architectural representation of the user's business solutionD. None of the aboveB

82Which of the following statements regarding an application is (are) true?An application is a cohesive collection of automated procedures and data supporting abusiness objective.B. An application consists of one or more components, modules, or subsystems.C. An application is defined by the software developers based upon the platform, operatingsystem, and database.D. A and B28D

83Which of the following best describes the FP counting boundary?The boundary indicates the border between data and transaction function typesB. The boundary indicates the presence of external users and application domainsC. The boundary indicates the conceptual interface between the software under study and itsusersD. The boundary indicates the presence of internal users and application domainsC

84The counting scope is defined as:The boundary that indicates the functionality which is included in all FP counts.B. A set of Functional User Requirements to be included in the function point count.C. A FP count boundary that indicates all the user identifiable functionality.D. All of the above.B

85What is the term for data that specifies what, when or how data is to be processed by anelementary process?Controlling dataB. Calculating informationC. Control informationD. Manipulating data29C

86Which is the primary difference between an 1LF and an EIF?An EIF is referenced by the application being counted, while an 1LF is not referencedB. An EIF is referenced by the application being counted, while an ILF is maintained and notreferencedC. An ILF is not maintained by the application being counted, while an EIF isD. An EIF is not maintained by the application being counted, while an ILF isD

87Which of the following statements regarding EIF counting is true?If an EIF is used in multiple processes, count the EIF as many times as the number ofprocessesB. Every physical file referenced by an application is to be counted as an EIF for the applicationC. If a group of data was not counted as an ILF, then it should be counted as an EIFD. None of the aboveD

88What is the primary intent of an EIF?Hold data maintained through one or more elementary processes of the application beingcountedB. Maintain one or more groups of data and/or to alter the behavior of the systemC. Hold data referenced trough one or more elementary process of the application being countedD. Present information to a user through processing logic other than, or in addition to, the retrieval30of data or control informationC

89Which transactional function cannot alter the behavior of the application?EIB. EOC. EQD. Both A and CC90Which statement ALWAYS applies to both EOs and EQs?The elementary process has the primary intent of presenting information to the userB. The elementary process references a data function to retrieve data or control informationC. The elementary process includes multiple forms of processing logicD. The elementary process may alter the behavior of the applicationA91The development project functional size is defined as:DFP = ADDB. DFP =ADD + CFPC. DFP =AFP-CFPD. DFP = AFP * CFP31B

92Which is the correct formula for calculating an EFP?EFP = AFP + CHGA + CFP + DELB. EFP = ADD + CHGA + CFP + DELC. EFP = AFPB + ADD + CHGA - CHGB - DELD. EFP = AFP + CHGA + CFP + DELB

93What is the purpose of a FP count?To provide an answer to a software questionB. To provide an answer to a business questionC. To provide an answer to a network questionD. To provide an answer to an application questionB

94Which of the following statements is true?The development project functional size is a measure of baseline functionality onlyB. The development project functional size is a measure of installed functionalityC. The enhancement project functional size is a measure of baseline functionalityD. The application functional size is a measure of the functionality that an application provides tothe userD32

95What is the definition of "consistent state?"point at which the requirements have been determined and approved by the userB. point at which processing has been fully executed; the Functional User Requirement has beensatisfied and there is no more to be doneC. development of all functionality is complete and the testing can begin; the Functional UserRequirement have been metD. conversion processes have been completed and all historical data convertedB

96Which of the following statements about an External Inquiry are true?An elementary process that processes data that is sent from outside the boundaryB. Has a primary intent to alter the behavior of data or control informationC. Has a primary intent to present information to a user through retrieval of dataAll of the aboveC

97Which of the following statements regarding DET counting is (are) true?Attributes referenced by the application being measured are not countedB. Do not count a DET for attribute required by the user to establish a relationship with anotherdata functionC. Count a DET for each attribute required by the user to establish a relationship with another datafunctionD. Both A and C33C

98Which elementary process processes data or control information sent from outside theapplication's boundary?An external interface fileB. An external inquiryC. An external outputD. An external inputD

99Which GSC describes the degree to which the application and the code in the application havebeen specifically designed, developed and supported to be reusable in other applications?End-user efficiencyB. ReusabilityC. Facilitate changeD. Distributed data processingA

100An EO is defined as an elementary process that:includes additional processing logic beyond that of an EQB. processes data or control information sent from outside the boundaryC. sends data or control information outside the boundaryD. Both A and C34C

101The functional complexity of an EI is based on the number of:Data Element TypesB. Record Element TypesC. File Types ReferencedD. Both A and CD

102An application's functional size is calculated after the development project using the formula:AFP = ADDB. AFP =ADD + CFPC. DFP =ADD + CFPD. None of the aboveD

103Which type of functional size (F5) measures the functions provided to the users with the firstinstallation of the software?Application FSB. Baseline FSC. Enhancement project FSD. Development project FSD35

104Which rule applies to identifying a data function?Include entities referred to as code dataB. Accepts data or control information that enters the application boundaryC. Identify all logically related and user recognizable data or control information within the countingscopeD. Maintains logical filesC

105What is the purpose of the VAF?Adjust the FP by +/- 35%B. Adjust the FP by 0.65C. Increase the reference data by 0.65D. Increase the aFP by 35%A

Topic 2, Implementations106A Banking Deposit application (BDS) has three subsystems; each subsystem serves oneparticular location. All three subsystems share the core functionalities of the application, whileeach has its own unique functions. Databases are physically split and maintained separately bylocations as well. What is the application size of BDS?36575B. 215C. 195D. 35B

107A Trading application introduces a new subsystem. The enhancement includes 6 new EIs, 3modified EIs, 2 new EQs, 1 modified EO. 1 existing EO is eliminated from this application by thisenhancement. There are 3 conversion EIs to convert existing data. All the transactional functionsare average complexity. What is the functional size of the transactional functions for theenhancement?54B. 66C. 56D. 68B

108All debit payments are stopped when the user issues a stop payment for a given debit cardnumber. A message gets sent to the Debit Card application once the stop payment is successful.How would the stop payment be measured?1 EQ and 1 EIB. 1 EI37C. 1 EOD. 1 EQB

109At the end of each month, Application A sends a transaction file to Application B. The transactionfile contains a listing of item information including item number, item description and item price. Allthree attributes in the transaction file are contained in the Item ILF in Application For ApplicationA, how would the elementary process be measured?EIB. EOC. EQD. EIFC

110Which would be measured as multiple EQs?Queries with identical processing logic, displayed on different screensB. Graphical displays with no calculations and different processing logicC. Multiple methods of invoking the same inquiry logicD. Both A & BB

111Software is developed to convert the data from the Account application to the RelationshipManagement application. The Account Master ILF and four other ILFs in the Account applicationare referenced to create the Client Master file in the Relationship Management application. How is(are) the conversion function(s) counted for the Application Function Point measure?381 EIB. 1 EQ, I EIC. 5 EQs, 1 EID. Not countedD

112A report is created that displays all of the high net worth clients. The report calculates the networth of a client by totaling the balances from all of their accounts with the firm includingunrealized gains and losses. If the net worth of the client exceeds $5 million the client is includedon the report. The report retrieves the name, address and phone number from the master accountfile and generates a list. How would this be counted?1 EIB. 1 EOC. 1 EQD. Not countedB

113The data retrieved from the state drop down list is obtained by reading the State file that containsonly state code and state description. The State file is not updated frequently as states are notadded on a frequent basis. How would the drop down list be measured?1 EQ with 1 FTRB. 1 EO with 1FTRC. 1 EQ with OFTRD. Not countedD

39114Which of the following rules apply when counting DETs for both EOs and EQs?Count one DET for each unique user recognizable, non-repeated attribute that crosses theboundaryB. Count one DET for each literal such as report titles or screen identifiersC. Count one DET for each attribute generated within the boundary and saved to an ILF withoutexiting the boundaryD. Count one DET for each navigation aid used to navigate within a listA

115Which of the following rules would apply when counting FTRs for an EI?Count one FTR for each unique data function that is accessedB. Count one FTR for each transactional function read during the processing of the EIC. Count two FTRs for each unique data function that is both maintained and readD. None of the aboveA

116The user can request the same data to be displayed in four languages. The data in the differentlanguages are stored in user-maintained tables. How would this display of data be measured?1 EQB. 4 EQsC. 1 EOD. 4 EOsA

40117At the end of the month, Application X sends a transaction file to Application Y. The transaction filecontains a listing of employees that includes employee id, department, department description,and the total number of employees. Three of these attributes are contained in the Employee ILF inApplication X, with the exception of the total number of employees which Is a computed attribute.Which statement is true for Application X?The elementary process is measured as an EOB. The elementary process is measured as an EQC. Three DETs are measured for the transaction sent to Application YD. None of the aboveA

118An EO maintains 1ILF and references 3 ILFs. What is the minimum number of DETs necessary forit to be valued at 7 LFP?1B. 6C. 20D. It can never be valued at 7 LFPB

119What would be the correct sequence of activities for measuring transactional functions? 1. Classifyeach transactional function as an EI, EO or EQ 2. Identify each elementary process required bythe user 3. Determine the functional complexity for each transactional function 4. Determine thefunctional size for each transactional function 5. Count FTRs for each transactional function 6.Count DETs for each transactional function1-3-2-1-4-5B. 2-3-1-6-5-4C. 4-2-1-5-6-3D. 2-1-5-6-3-441D

120A transaction file contains records to maintain the Master file. A flag is included on each incomingrecord to indicate if the Master file record is to be added, changed or deleted. A batch job isdeveloped to process the transaction file. How many transactional functions would be counted?1B. 2C. 3D. 4C

121The Compliance application sends an electronic transaction of summary compliance data to theLaboratory Management application, which then updates an ILF. How would this (these)transactional function be measured?1 EI for the Compliance application, 1 EI for the Laboratory Management applicationB. 1 EO for the Compliance application, 1 EI for the Laboratory Management applicationC. 1 EI for the Compliance applicationD. 1 EIF and 1 EI for the Laboratory Management applicationB

122An application retrieves records from a data store and displays the retrieved data on an HTMLpage. The HTML page contains a scroll bar to view all of the attributes. A user must scroll downthrough 4 screens of information to see all of the attributes contained on the HTML page. How isthis counted?421 EOsB. 4EOsC. 1 EQD. 4 EQsC

123Which requirement(s) would be accounted for using only the GSCs?Design the screen so that all transactions would be done in less than three keystrokesB. Provide support for four spoken languagesC. Provide conversion and installation guidesD. All the aboveD124What is the typical score for a batch application for the GSC Data Communications?0 to 3B. 4C. 4to5D. Does not apply to batch applicationsA125Which may be counted as ILFs?Help messages maintained by the userB. Temporary sort files43C. Output reports saved to a fileD. A and CD

126A transaction file that adds new employees to the Human Resources Management application isimported through a batch process from the Recruitment Management application. How many datafunctions are counted for the new employees transaction file in the Human Resource Managementapplication?1 ILFB. 1 EIFC. 1 ILF and 1 EIFD. Not countedD

127A Purchasing application contains a Customer Purchase Order file and an Inventory file. The 2files are pined by a foreign key, order inventory. How many data functions would be counted?1B. 2C. 3D. NoneB

128A Financial application has a file that contains currency exchange rate information. This data isused to convert currency from U.S. dollars to local country currency. This file is considered to be:44Code dataB. Tabular dataC. Reference dataD. None of the aboveC

129A file of user maintained help messages is kept current using the business administratorfunctionality of the system. How would this help message file be counted?1 ILFB. 1 EOC. EID. Not countedA130A logical data store is maintained by the application being counted. It has tax code as the keyattribute and tax rate as the only other attribute. How would this data store be counted?1 ILFB. 1 RET of an ILFC. 1 EIFD. Not countedA131Phase 1 of an application enhancement adds 2 business function attributes to each of 3 files. Nochanges were made to reference the new attributes. Prior to the enhancement each of these fileswas valued at 3 RETs and 12 DETs. What is the CHGA of these files?4521 UFPB. 45 UFPC. 30 UFPD. 0 UFPB

132Application Y reads the contents of a file maintained in Application X and uses the data in theprocessing of a transactional function. How would this data function be counted for Application Y?EIFB. EOC. EQD. ILFA133From the business user perspective, the Purchasing application's customer purchase order is agroup of data. It is made up of the Order Header (customer, address, date, etc.) and the OrderDetail (Item Number, Quantity and Price) about each item ordered. How many RETs would becounted for this group of data?0 RETsB. 1 RETC. 2 RETsD. 3 RETsC134Within the Human Resources Application, information for an employee is added by entering46general information. In addition to the general information, the employee is either a salariedemployee or hourly employee. Each type of employee has unique attributes. Either type ofemployee can have information about dependents. How many RETs are described in thisscenario?0B. 1C. 2D. 3D

135Phase 1 of an application enhancement adds 2 business function attributes to each of 3 files. Nochanges were made to reference the new attributes. Prior to the enhancement each of these fileswas valued at 3 RETs and 12 DETs. What is the CHGA of these files?21 UFPB. 45 UFPC. 30 UFPD. 0 UFPD

136A group of data is referenced and updated by application A and application B. This data is onlyreferenced by application C. For which of these applications is this group of data counted?Applications A and B onlyB. All three applicationsC. Counted as an EIF for all applications and an ILF for Applications A and BD. Counted only for the application that updates the largest number of DETsB

47---137A database table is maintained by the application being counted. It has state code as the keyattribute and state name as the only other attribute. How would this table be counted?1 ILFB. 1 RET of an ILFC. 1 EIFD. Not countedD138The Job Management application includes the following:Three files of business data: Employee, Job, and InvoiceJob Rates file contains data that is stored in order to process the business rules against thebusiness data.The Payment Type file is identified by the developer In response to the technical requirements ofthe users.Which of these files are candidates for counting as logical files (ILF or EIF)?Employee, Job, Invoice, Job Rates, and Payment TypeB. Employee, Job, Invoice, and Job RatesC. Employee, Job, and InvoiceD. NoneB139Which is (are) method(s) of sharing data?Screen scrapingB. Static image copy48C. Image copy/loadD. All of the aboveD

140A database table is maintained by the application being counted. It is an associative entity that has5 foreign key attributes and no additional attributes. How would this associative entity be counted?1 ILFB. 1 RET of an ILFC. 1 EIFD. Not countedD

141The Report Generation application receives data from outside the boundary, and saves the data inthe Reporting Data logical file, with additional processing logic involved. The user Information ismaintained in the Report Generation application in the User Account logical file. How would thedata functions be counted?49One ILF and one EIFB. Two ILFsC. One ILFD. One ILF, one EIF and one EQB

142How would you count the pie chart below?1 EO with 1 DETB. 1 EO with 2 DETsC. 3 EOsD. None of the aboveB

143The human resources department has 2 applications that use the Candidate Information file.Candidate Information contains 86 logical pieces of data.50-------The Candidate application maintains and/or references 86 pieces of data from CandidateInformation. The Candidate application groups the data into candidate personal and candidatework history.The Hiring application references 53 pieces of data from Candidate Information. The Hiringapplication groups the data into Candidate Record.How would you count the Candidate Information file for each Application?Candidate application 1 high ILF, Hiring application 1 average ILFB. Candidate application 1 high EIF, Hiring application 1 high EIFC. Candidate application 1 high ILF, Hiring application 1 average EIFD. Candidate Information is reference data onlyC

144A Purchasing application prior to the enhancement had 204 FP. An enhancement projectcontributed the following:Added FP = 12Change Before FP = 30Deleted FP = 0Change After FP = 31Conversion FP = 0What is the EFP?13B. 42C. 43D. 236C

145A Human Resources application screen allows the user to control three aspects of reportprocessing: sort sequence, printer port, and the choice of generating a DVD. The options within51the three aspects are mutually exclusive. A confirmation message Is sent back to the user afterthe control information has been saved in the Parameter ILF. How many DETs are counted?10B. 9C. 5D. 4C

146An enhancement project involves changing validations in the interest calculation module, addingusers to the access permissions, and changing the operating system (and all related system callsin the system) from version 1.0 to the higher version 2.0 to improve system performance. Whichfunctions would be sized from a FP perspective?Interest calculation, adding permission, changing the operating systemB. Interest calculation, adding permissionsC. Interest calculationD. Adding permissionsC147In an enhancement project an EI is counted as changed because an additional attribute is sentacross the boundary. Before the enhancement the EI referenced 2 FTRs and 15 attributes crossedthe boundary. How many FPs are measured for the enhancement project?524 FPB. 6 FPC. 3 FPD. 7 FPB

148An application originally valued at 327 FP was enhanced. The enhancement added 3 low EQs, 2low EIs and 2 high EOs. What is the AFPA?29B. 32C. 356D. 359C149An enhancement project adds one new attribute to each of 10 ILFs. The 10 EIs that maintainthese ILFs also include the new attribute. Before the enhancement, the ILFs each had 1 RET and15 DETs, and the EIs each had 1 FTR and 15 DETs. What is the EFP for the enhancementproject?100B. 110C. 130D. 140B150An application originally valued at 327 FP was enhanced. The enhancement added 3 low EQs, 253low EIs, 2 high EOs, and changed 3 low ILFs. What is the enhancement project functional size?29B. 50C. 356D. 377B151For the scenario above calculate the FP.21B. 26C. 32D. 36C152During the requirements phase for a new application, the user identified 3 logical groups of data.54During the construction phase, our database technicians combined the 3 logical groups of datainto 1 physical table. How many ILFs would be counted?3 ILFs during requirements phase, 3 ILFs during construction phaseB. 3 ILFs during requirements phase, 1 ILFs during construction phaseC. 1ILF during requirements phase, 1 ILFs during construction phaseD. 1 ILF during requirements phase, 0 ILFs during construction phaseA

153The team has been asked to size the software associated with porting the Order Managementsystem from one operating system to a different operating system. The project includes a one-timedata conversion activity. Which of the following is true?FP approach can be used to size both the operating system upgrade and the data conversionactivityB. FP approach can be used to size the operating system upgrade. The data conversion activitycannot be sized using FP approachC. FP approach can be used for sizing the data conversion activity. FP approach is not suitable forsizing the operating system upgradeD. FP approach cannot be applied to size either the operating system upgrade or the one-timedata conversion activityC

154Conversion software is developed to convert data from the Account application to the newRelationship Management application. Five logical files in the Account application are referencedby the conversion software to create the new Client Master File in the Relationship Managementapplication. How is the data conversion counted for the development project?1 ElB. 1 EQ, 1 EIC. 5 EQs, 1EID. 5 EQs, 5 EIs55A

155For the scenario above calculate the FP.3B. 4C. 5D. 6A156Consider the following diagram.56The business requirement states that an employee must have at least one cubicle, but may havean unlimited number of cubicles assigned. A cubicle can also be occupied by more than oneemployee at a time. How many total DETs are depicted?4B. 6C. 8D. 10B

157The Great Escape movie theater chain has theaters in multiple cities. The Great Escape Salessystem needs to send sales tax collected to the correct government offices. The Sales systemcalculates the tax due by multiplying the theater's sales by the tax rate for the city where thetheater is located. The Tax Rate table has Tax Rate ID, Location, Tax Rate, Effective Date,Expiration Date columns. Tax Rate records are added, changed and deleted by the developersusing third party utilities with the information that is submitted by the Sales system users inChange Requests approved by the Change Control Board (CCB). How many function pointswould be counted for the Tax Rate table?NoneB. 5C. 7D. Not enough informationA

158An enhancement project adds 3 business function attributes to each of 3 data functions. Beforethe enhancement each of these data functions was valued at 2 RETs and 19 DETs. Each of thesedata functions is maintained by the same screen in the application. What is the CHGA of thesedata functions?21 UFPB. 45 UFP57C. 30 UFPD. 0 UFPC

159An enhancement introduces a new module, which includes 3 new logical files and modifies 2existing logical files all maintained by this application. Additionally, the reference to a logical filemaintained by another application is eliminated. Assuming all the logical files have a complexity ofaverage, what is the functional size of the data functions for the enhancement?43B. 47C. 57D. 60C

160The Order Entry system uses the Currency Conversion file maintained by Global Currency Mastersystem for conversion from USD currency to EUR currency. The user has identified the need for aCurrency Discrepancy file maintained on a daily basis by the Oder Entry system to adjust thecurrency variances in the Currency Conversion file. The Order Entry system uses both theCurrency Conversion file and the Currency Discrepancy file. How are these files counted for theOrder Entry system?1 EIF for the Currency Conversion file and 1 ILF for the Currency Discrepancy fileB. 2 EIFs for the Currency Conversion file and Currency Discrepancy fileC. 1 ILF for Currency Conversion file with an additional RET for Currency Discrepancy fileD. 2 ILFs for the Currency Conversion file and Currency Discrepancy fileA

58161The CCY application maintains the Currency Exchange file. The Currency Exchange file is copiedinto the Customer application on a daily basis to improve timely access to the data. The Customerapplication references the Currency Exchange file for all its transactions. How would the CurrencyExchange file be counted in the Customer application?ILFB. EIFC. EID. Not countedD

162A development project has created 450 FP in application functionality and created 45 FP inconversion functionality. What is the DFP?45B. 405C. 450D. 495D

163A study has been made of flowers in the world. The following graphic displays the top threeflowers in the world. How many DETs are represented on this graph?59-----2B. 3C. 4D. 6A

164Identify the number of EIs among the following activities:Navigate the different pages of a reportRequest confirmation from the user on whether to proceed furtherInput and save data for a purchase order screenGenerate a report of incomplete purchase orders for each quarterMessage that the purchase order cannot be modified at this time4B. 2C. lD. 3C60

165In the process of creating a user record, the application generates a unique user ID and stores it.The user ID is generated by concatenating the first three letters of the user's last name, the firstthree letters of the user's first name, and the user's four digit birth year. Another function displaysthe user ID on a screen that retrieves and displays detailed user information. The user IDdisplayed is measured as:1 DET on an EQB. 3 DETs on an EQC. 1 DET on an EOD. 3 DETs on an EOA166The Order Entry Modification screen populates all order details into the Order logical file. Themodification process also populates the Advance Shipment Notification logical file and referencesthe Available Inventory logical file. The user required before and after images to be captured for 3attributes in the Oder logical file. The technical team has decided to store this data in the OrderAudit file for ease of access. How many transactional functions and logical files are counted in themodification process?2 EI and 4 FTRs for each EIB. 1 EI and 4 FTRs for the EIC. 1 El and 3 FTRs for the EID. 2 EI and 3 FTRs for each EIC167Which can NOT be en EQ?61Retrieval of data, selection of which is based on data inputB. Drop list box displaying hard-coded informationC. Logon screen which displays security informationD. List of employee namesB

168The user requirements call for a model stock portfolio list to be created. The user will be able toenter selection criteria for the equities to be included in the model stock portfolio list. There isanother requirement for the user to be able to save the selection criteria. How many elementaryprocesses would be counted?Not countedB. 1C. 21D. 3C

169An enhancement adds 3 update screens to the application. Each of these screens updates 2 filesand displays 17 data attributes. What is the functional size of the transactional functions after theenhancement?9B. 12C. 18D. 21C

17062A report is created that displays all clients who had more than five transactions in the last month.The account number and transaction date are retrieved from the Client Transaction file and usedto calculate the total transactions in the previous month. The report displays account number,account holder's name, and phone number retrieved from the Master Account file. How manyDETs and FTRs would be counted?3 DETs, 1 FTRB. 3 DETs, 2 FTRsC. 5 DETs, 1FTRD. 5 DETs, 2 FTRsB

171Which transaction can be an EQ?A report containing weekly, monthly and yearly summary sales totalsB. Drop list box containing hard-coded informationC. Logon screen with security functionalityD. Confirmation message that the transaction cannot proceed owing to an internal errorC

17263For this scenario, calculate the EFP using an unchanged VAF of 1.2 and original application countof 61 FP.8.40B. 15.60C. 69.40D. 76.60B

173The add, change, delete and retrieve job information functionalities are modified as part of anenhancement. A new summary report totaling job information is added. What transactions arecounted for the enhancement project?3 EIs, 1EO, and 1 EQB. 3 EIs, 2EOC. 3 EIs, 2EQD. 4 EIs, 1 EQA

174Which statement is true?An enhancement always leads to a change in value of the existing application function pointcountB. The added, changed and deleted functionality, in addition to the conversion functionality, iscounted in an enhancement function point countC. Removing fields of an existing report is considered under deleted functionalityD. Upgrading a system from a lower version of the operating system to a higher version isconsidered under conversion functionalityB

64175An enhancement project does not change the functional sizing of the application, but just theGSCs. The application's aAFP was 101 FPs, with a VAF of 1.01. The following generic systemcharacteristics are changed as described: a) Flexible query and report facility was provided thatcan handle simple requests; now this facility can handle complex requests b) Business controldata was kept in tables that are maintained by the user with on-line interactive processes, butchanges take effect only on the next business cycle; now changes can take effect immediatelyWhat is the aAFPA?100B. 101C. 104D. 106C

176A new development project contains 3 GSC valued at 3 DI, 4 valued at 4 DI, 4 valued at 0 DI and3 valued at 2 DI. What is the TDI?.96B. .98C. .31D. .33C

177An enhancement project added 3 high complexity EIs, changed 1 EI from average to lowcomplexity and deleted 3 low complexity EIs. What is the EI contribution to enhancement functionpoint measure?3065B. 28C. 21D. 19A

178An enhancement involves changing an EQ with 12 fields to include 3 extra fields. The EQreferenced 3 files before the change, and one extra file needs to be referred to as part of thechange. How would the enhanced EQ be counted?12 DETS,3 FTRsB. 15 DETS, 3 FTRsC. 15 DETS, 1 FTRD. 15 DETS, 4 FTRSD

179An ILF contains data for a company's 12 monthly budget amount fields, as well as the monthlyname field. How many DETs are counted for this ILF?1B. 2C. 12D. 13B

180The application allows the user to maintain 4 error files and 4 confirmation message files to meet 4multi-language requirements. How would these files be counted?66Not countedB. 8 ILFsC. 2 ILFsD. 4 ILFsC

181There are 10 ILFs in an Equity Trading application. There is an enhancement project that ismodifying 10 screens and 5 reports. All screens and reports reference 6 ILFs of the Equity Tradingapplication. No modifications are made to the ILFs. How many data functions would be counted?15 ILFsB. 10 ILFsC. 6 ILFsD. NoneD

182The Insurance Claim application has a file for Claim Information which is used to capture 127pieces of data about each claim that is submitted. The Claim Information file stores the data in fourgroups: insurance policy holder, claimant, nature of the claim, and scanned images of alldocuments related to the claim such as receipts and photos. How would the Claim Information filebe counted?1 ILF with 4 RETs/127 DETsB. 1 ILF with 3 RETs/126 DETs (scanning is technical so the images arent counted)C. 1 Claim ILF with 3 RETs/126 DETs and 1 Image ILF with 1 RET/1DETD. 1 Claim ILF with 1 RET/125 DETs and 1 Image ILF with 2 RETs/2 DETsA

67183How would you count the Easy Credit Card monthly billing statement shown below? No totals arestored in the Billing ILF.1 low EOB. 1 low EQC. 1 averse EOD. 1 average EQC

184A screen that adds an order record to the Order file is being enhanced to capture 10 additionalattributes. These new attributes do not fit onto the existing screen, so a new screen is beingcreated to collect the 10 new attributes before creating the Order record. How is the screencounted for the enhancement project?1 changed EIB. 1 changed EI, 1 added EIC. 1 deleted EI, 1 added EID. 1 deleted EI, 2 added EIsA68185A Human Resources application has online field help for the add, change and delete transactions.The help facility is maintained by a separate application. How would the field help be measured forthe Human Resources application?1 EQB. 3 EQsC. 4 EQSD. Not countedA

186An application provides the users with screen help, field sensitive help, and system help. The helpinformation is maintained within another application. How many EQs are counted?1 for each unique screenB. 2 for each unique screenC. For system help, count 1 for the application, and for screen and field help count 2 for everyscreenD. 3 for the applicationD

187Identify the potential EI from the following activities:Authorization for purchase order screenB. Generating a report of unauthorized transactionsC. Sending a transaction to another application that updates the ILF in that other applicationD. Confirmation message that the transaction carrot proceed due to data integrity issuesA

69188The Human Resources Tracking application (HRT) is used to follow the status of all applicants tothe company. When an applicant resume is received, the user immediately scans the applicant'sresume using the HRT scan new applicant function. HRT assigns an applicant number to theresume image, saves the number and resume image to the Applicant ILF, and sends an emailnotification to the hiring manager. What transaction(s) would be counted for the new applicantfunction?1 EIB. 1 EOC. 1 EI and 1 EOD. 1 EI and 1 EQA189 An application enhancement adds 3 business functional attributes to each of 3 files. Each of these files had been valued at 2 RETs and 19 DETs. All of the DETs for each of these files are maintained using the same screen in the application. What is the functional size of the transactional function after the enhancement?3B. 4C. 6D. Not countedChttp://www.pass4king.com/i40-420.html