Sie sind auf Seite 1von 71

1

When counting DETs which of the following rules apply?

Count a DET for each recursive field on the ILF or EIF


Count a DET for each piece of data in an ILF or EIF required by the user to establish
a relationship with another ILF or EIF
Count a DET for each repeating field that is identical in format
Count a DET for each field that appears more than once in an ILF or EIF
b
2 Which of the following is an attribute used to represent relationships of one
entity to another?
Primary key
Secondary key
Foreign key
Domestic key
c
3 Which category (ies) of data entities is (are) usually identified to satisfy the
Functional User Requirements?
Business data
Reference data
Code data
Both A and B
d
4

What is a (are) valid example(s) of code data?

Substitution data
Static data
Valid values
All of the above
d

5 What is a user identifiable group of logically related data or control information


referenced by the application, but maintained within the boundary of another
application?
An ILF
An IIF
An EIF
An ELF
c
6
Which of the following is NOT an example of the purpose of a function point
count?
To enable comparison of functionality delivered by two applications
To determine maintenance support cost per function point
To understand the percentage of lines of code that is being reused across three
different applications
To determine the effort and duration of a development project
c
7

Which of the following statements regarding the counting scope is true?

It defines the set of Functional User Requirements to be included in the FP count


It always includes more than one application
It determines the purpose of the applications being counted
It defines a (sub) set of the modules being sized
a
8 Which of the following is NOT true of a boundary?
It encloses the logical data maintained by the application
It is the physical interface between the software under study and its users
It is dependent on the user's external business view of the application and is
independent of
technical and/or implementation considerations

It defines what is external to the application


b
9

An example of the purpose of an FP count is to provide:

input to the estimation process needed to determine the level of effort to develop
the first release of an application
a comparison of functionality delivered by two different suppliers' packages
determine the size of an application as part of the organization's effort to determine
the size of its software portfolio
All of the above
d
10 Which of the following defines the purpose of a count?
Provides an answer to a business question, and it is the business question that
determines the purpose
Influences the positioning of the application between the software under review and
the surrounding software
Influences the type of FP count to answer the business problem under investigation
Provides an input to the estimation process needed to determine the level of effort
required to develop the first release of an application
a
11 Which of the following statements about an External Input is true?
Has the primary intent to maintain one or more ILFs
An elementary process to hold data or control information from outside the
boundary
Has the primary intent to alter the behavior of a transaction
Has the primary intent to reference one or more EIFs
a
12 An EI is defined as:
an elementary process that processes data sent from outside the application
boundary

control information sent from outside the user view


an elementary process that processes data or control information sent from outside
the application's boundary
All of the above
c
13 Control information is defined as data that:
defines an elementary process of the application being counted
influences an elementary process of the application being counted
controls an elementary process of the application being counted
does not influence an elementary process of the application being counted
b
14 What is an elementary process?
The smallest unit of activity that is meaningful to the developer
The largest unit of activity that is meaningful to the user
The smallest unit of activity that is meaningful to the user
The largest unit of activity that is meaningful to the developer
c
15 The primary intent of an EI is to maintain:
One or more ILFs or alter the behavior of the application
One or more ILFs
One or more EIFs or alter the behavior of the application
One or more EIFs
a
16 "Requirements specifically requested by the user to complete an elementary
process" defines which of the following terms?
Control information
Processing logic

Maintain
User identifiable
b
17 Which of the following statements regarding functional size measurement is
true?
Early functional size measurements can never change during design and coding
phase
It is quite normal to identify additional functionality that was not specified in the
original requirements in the form of scope creep
It is not necessary to update the application functional size upon completion of an
enhancement.
Both B and C
b
18 An application FP count is defined as:
a measure of the current functions the application provides the user
the initial development project FP count
an enhancement project that alters the applications functions
the activity of applying this International Standard to measure the functional size of
an application
d
19 Which of the following statements is (are) true regarding an application
functional size (FS)?
It provides a measure of the functionalities that an application provides to the user
It is never updated after the initial application installation
It is associated with an application's lifecycle
Both A and C
d
20 What is true about conversion functionality?

Transactional or data functions provided to convert data and /or provide other user
specified conversion requirements
Exists only during the development or enhancement of an application
Conversion functionality is outside the scope of FP counting
Both A and B
d
21 Which of the following functions is (are) counted for a development project FP
count?
Added functions
Conversion functions
Changed functions
Both A and B
d
22 The application functional size after an enhancement project does NOT include
the size of the:
conversion functionality
functions being added by the enhancement project
functions being changed by the enhancement project - as they are / will be after
implementation
functions being deleted by the enhancement project
a
23 Which is the correct formula for calculating the AFP after an enhancement
project?
AFPA = ADD-DEL
AFPA = (AFPB + ADD + CHGA) - (CHGB + DEL)
AFPA = ADD + CHGA + CFP + DEL
AFPA = AFP + CFP
b

24 The Measurement Process includes which of the following?


Gather available documentation
Measure data functions
Calculate the functional size
All of the above
d
25 In the formula DFP = ADD + CFP, CFP denotes?
Code functionality
Conversion functionality
Complex functionality
Changed functionality
b
26 Which term used in FP calculations reflects the size of the functions being
changed by the enhancement project - as they are / will be after implementation?
CHGA
CHGB
DEL
VAF
a
27 Complete the statement. Developers translate the__________ into software in
order to provide a solution.
Control input
Technical view
User view
Application boundary
c

28 Which of the following does not represent the user view, and should not be
used for FP counting purposes?
User handbook
Catalog of transactions
Detailed specifications
Application source code
d
29 What is a "user"?
Any person that specifies functional user requirements
Any person that influences the integrated diagram procedures
Any person or thing that communicates or interacts with the software at any time
Both A and C
d
30 What does approximating FPs permit you to do in order to accomplish a
function point analysis?
Use a developer view
Identify all the functions and their complexity
Make assumptions about functions and/or their complexity
All the above
c
31 Which of the following statements regarding Function Point Analysis (FPA) is
true?
FPA measures software by quantifying the tasks and services (i.e. functionality) that
the software provides to the user based primarily on logical design
FPA measures software by quantifying software functionality based on architectural
attributes
FPA is a standardized method for measuring software development from the
developer's point of view

FPA is a standardized method for measuring software maintenance based on the


technology used for implementation
a
32 Which GSC describes the degree to which the application communicates
directly with the processor?
Data communications
Distributed data processing
Transaction rate
Online update
a
33 Which of the following statements is a characteristic of the GSC - complex
processing?
Development of the application is influenced by how the development was carried
out
Development of the application is influenced by the complexity of data
communication
Development of the application is influenced by the complexity of the processing
logic
None of the above
c
34 Which transactional function(s) has (have) the primary intent of presenting
information to the user and must reference a data function to retrieve data or
control information?
EI
EO
EQ
Both B and C
c
35 The primary intent of an EQ is to:

alter the behavior of the application


maintain one or more ILFs
present information to a user
Both A and C
c
36 An External Inquiry is defined as an elementary process that:
Sends data outside the boundary
Sends Control Information outside the boundary
Has a primary intent to present information to a user through retrieval of data or
control information
All of the above
d
37 Which statement(s) is (are) true regarding mandatory processing logic for an
EQ?
Data or control information is maintained
Conditions are analyzed to determine which are applicable
At least one ILF or EIF is referenced
Data or control information entering the boundary of the application is accepted
c
38 Which processing logic can be performed by an EQ?
Equivalent values are converted
Behavior of the application is altered
Derived data is created
Both A and B
a
39 The functional complexity of an EQ is based upon the number of:
RETs

FTRs
DETs
Both B and C
d
40 Which of the following forms of processing logic is mandatory that an EO
perform at least one (m*)?
Behavior of the application is altered
Equivalent values are converted
At least one ILF or EIF is referenced
Information is prepared and then presented outside the boundary
a
41 Which of the following statements is true regarding EOs?
An EO is an elementary process that sends data or control information outside the
boundary.
An EO includes additional processing logic beyond that of an EQ.
An EO always maintains a data function.
Both A and B
d
42 Processing logic is defined as any of the requirements specifically requested by
the user to complete an elementary process. Those requirements include which of
the following actions?
Validations
Algorithms or calculations
Reading or maintaining a data function
All of the above
d
43 An External Output is defined as an elementary process that:
Includes addition processing beyond an external inquiry

Sends data outside the boundary


Has a primary intent to present information to a user though processing logic or in
addition to
retrieval of data or control information.
All of the above
d
44 Which of the following statements about an External Output are true?
Processing logic must contain multiple mathematical formulas
Processing logic must perform at least one mathematical formula
Processing logic creates derived data
Processing logic contains derived data
c
45 An FTR is be defined as a:
data function maintained by a base functional component
data function read and/or maintained by a transactional function
base functional component maintained by a transactional function
base functional component read and/or maintained by a transactional function
b
46 What is the primary intent of an ILF?
Hold data maintained through system tools for use by the application being
measured
Hold code data for use by the application being measured
Hold data maintained through one or more elementary processes of the application
being measured
Both A and C
c
47 Data Element Type is defined as?

Functionality provided to the user to meet internal or external data storage


requirements
An attribute that further describes one or more attributes of another entity
Two types of the base functional components identified in the IFPUG International
Standard
Unique, user recognizable, non-repeated attribute
d
48 Which of the following statements regarding ILFs is true?
The primary intent of an ILF is to hold data maintained through one or more
elementary processes of the application being counted
The primary intent of an ILF is to release data maintained through one or more
elementary processes of the application being counted
An ILF contains a group of bounded data or control information
An ILF contains logically related data maintained within the boundary of another
application
a
49

Mandatory subgroup is defined as:

one of many types of subgroups for RETs


one of two types of subgroups for RETs that the user must use during an
elementary process
one of many types of subgroups for RETs that the user may or may not use during
an elementary process
a subgroup of logically related data that is created by a process within the
application boundary
b
50 The two types of subgroups of an ILF are:
optional and required
optional and mandatory
discretionary and mandatory

discretionary and required


b
51 An EFP is defined as a measure of the:
modifications added to an existing application
modifications to an existing application that add, change, deletes transactional
functions delivered when the project is complete
functionality added, changed or deleted at the completion of an enhancement
project, as measured by the enhancement project function point count
functions provided to the users with the first installation of the software when the
project is complete
c
52

Conversion functionality is defined as:

transactional or data functions provided to convert data and/or provide other user
specified conversion requirements
conversion functionality required by the developer
a measure of the conversion functionality delivered to the user when the project is
complete
a measure of the data that is converted for the user when the project is complete
a
53 In FP count calculations, the term DEL is the size of the function being:
delivered by the enhancement project
described by the enhancement project
deleted by the enhancement project
developed by the enhancement project
c
54 Which of the following equations is the correct equation to calculate the VAF?
VAF =(TDI 0.10) + 0.65
VAF=(TDI * 0.10)+ 0.35

VAF =(TDI * 0.01)+ 0.65


VAF = (TDI* 0.01)+ 0.35
c
55 The boundary for the function point count:
encloses the physical data maintained by the application
is based on the user view, not on technical considerations
is the conceptual interface between the internal user world and external application
world
is dependent on implementation and/or technical considerations
b
56 What indicates the conceptual interface between the software under study and
its users?
The boundary membrane
The application interface
The boundary interface
The boundary
d
57 Which type of functional size (FS) measures the functionality added, changed,
or deleted at the completion of an enhancement project?
Application FS
Baseline FS
Enhancement project FS
Development project FS
c
58 An application's functional size is also referred to as the installed functional
size. When is the application functional size updated?
Never, the application functional size is the baseline or installed functional size

B. Once a year if there were enhancement projects that altered the application
functions
C. Every time completion of an enhancement project alters the application's
functions
D. The application is re-counted once a year regardless of the number of
enhancement projects
C

59
Which is the first step of the Measurement process?
Gather the available documentation
B. Determine the counting scope and application boundary
C. Measure data functions
D. Measure transactional functions
A

60
An External Input is an elementary process that:
Processes data or control information sent from outside the boundary
B. Has the primary intent to maintain one or more ILFs
C. has the primary intent to alter the behavior of the system
D. All of the above
D

61
Which of the following statements is (are) true regarding the definition of maintain?
Maintain is
defined as:

21
Ability to add, change or delete transactions through an elementary process
B. Ability to add, change or delete data through an elementary process
C. Ability to add, change or delete data through a functional user requirement
D. None of the above
B

62
When counting an EI, which of the following statements is true of the term
maintain?
It is the ability to create or modify an elementary process
B. It is the ability to create data in another application
C. It is the ability to add, change or delete data through the elementary process
D. None of the above
C

63
Which of the following is the definition of derived data?
data created as a result of processing that involves steps, other than or in addition
to, direct
retrieval and validation of information from data functions
B. data created as a result of concatenating attributes from multiple data functions
C. data that is calculated base upon attributes directly retrieved from data functions
and presented
to the user satisfying a Functional User Requirement
D. None of the above
A

64
Which of the following statements is false?
22
Technical requirements do not contribute to the functional size
B. CPM is transformed into an ISO standard for size with inclusion of GSC
C. Functional size can be estimated in the proposal phase
D. Prior to FP counting, we need to determine the purpose of the count
B

65
Business data is defined as:
information needed to be stored and retrieved by the functional area addressed by
the
application
B. information needed by the core users for translation
C. the business objects that represent valid values of entities external to the
application
D. data that reflects static information that is stored and retrieved by the
application
A

66
Control information is data that:
influences an elementary process
B. specifies what data is to be processed
C. specifies when and how data is to be processed

D. All of the above


D

67
Which of the following types of processing logic is (are) mandatory for an
elementary process to
be classified as an EQ?
23
At least one ILF or EIF is referenced
B. Information is prepared and then presented outside the boundary
C. Data or control information is retrieved
D. All of the above
D

68
Which statement(s) is (are) true for an elementary process?
It is the smallest init of activity that is meaningful to the user
B. It is the smallest unit of activity that that leaves the application in a dynamic
state
C. It is the smallest unit of activity that constitutes a complete transaction
D. Both A and C
D

69
Which of the following would apply when counting FTRs for an EQ?
Count an FTR for each ILF or EIF read
B. Count one FTR for each ILF maintained

C. Count only one FTR for each ILF that is both maintained and read
D. All of the above
A

70
Which of the following types of processing logic is mandatory for an elementary
process to be
classified as an EO?
Equivalent values are converted
24
B. Information is prepared and then presented outside the boundary
C. At least one ILF or EIF is referenced
D. All of the above
B

71
The functional complexity of an EO is based upon which of the following?
The number of RETs
B. The number of FTRs
C. The number of DETs
D. Both B and C
D

72
Which of the following statements best describes transactional functions?
They represent the functionality provided to the user to meet internal data
requirements

B. They represent the functionality provided to the user to process the data
C. They indicate the general functionality provided to the user of the application
D. They are measured primarily for project FPs
B

73
An EIF referenced by mere then one application counts as:
an EIF for the application under study
B. an EIF for the application under study and an ILF for the other applications
C. an EIF for each application that references the file
25
D. None of the above
C

74
Which of the following statements is (are) true of business data?
It may also be referred to as core user data or business objects
B. It is mandatory for the operation of the users' functional area
C. It is user identifiable (usually by a business user)
D. All of the above
D
75
Which of the following statements is (are) true?
An EIF can only be counted as an EIF for one application
B. An EIF must be an ILF in another application
C. An EIF is only counted by the application that uses all of its DETs

D. All of the above


B
76
The TDI is:
computed using the VAF
B. a value ranging between 0 and 5
C. the sum of the degree of influence
D. /-35%
26
C

77
Which GSC describes the degree to which processing logic influenced the
development of the
application?
Transaction rate
B. Complex processing
C. Performance
D. Reusability
B

78
Which functional size (FS) is associated with the measurement at any time dring the
application's
lifecycle?
Application FS
B. Adjusted FS

C. Enhancement project FS
D. Development project FS
A

79
Documentation of a function point count can include:
Identification of missing source documentation
B. Each data function and the number of DETs and RETs
C. Each transactional function and the number of DETs and RETs
D. B and C
27
D

80
In which life cycle phase can size NOT be measured?
Proposal
B. Requirements
C. Design
D. Construction
A

81
Which of the following defines the user view?
Translation of the technical solution into the user's language
B. Functional User Requirements as perceived by the user
C. Architectural representation of the user's business solution

D. None of the above


B

82
Which of the following statements regarding an application is (are) true?
An application is a cohesive collection of automated procedures and data supporting
a
business objective.
B. An application consists of one or more components, modules, or subsystems.
C. An application is defined by the software developers based upon the platform,
operating
system, and database.
D. A and B
28
D

83
Which of the following best describes the FP counting boundary?
The boundary indicates the border between data and transaction function types
B. The boundary indicates the presence of external users and application domains
C. The boundary indicates the conceptual interface between the software under
study and its
users
D. The boundary indicates the presence of internal users and application domains
C

84

The counting scope is defined as:


The boundary that indicates the functionality which is included in all FP counts.
B. A set of Functional User Requirements to be included in the function point count.
C. A FP count boundary that indicates all the user identifiable functionality.
D. All of the above.
B

85
What is the term for data that specifies what, when or how data is to be processed
by an
elementary process?
Controlling data
B. Calculating information
C. Control information
D. Manipulating data
29
C

86
Which is the primary difference between an 1LF and an EIF?
An EIF is referenced by the application being counted, while an 1LF is not referenced
B. An EIF is referenced by the application being counted, while an ILF is maintained
and not
referenced
C. An ILF is not maintained by the application being counted, while an EIF is
D. An EIF is not maintained by the application being counted, while an ILF is
D

87
Which of the following statements regarding EIF counting is true?
If an EIF is used in multiple processes, count the EIF as many times as the number
of
processes
B. Every physical file referenced by an application is to be counted as an EIF for the
application
C. If a group of data was not counted as an ILF, then it should be counted as an EIF
D. None of the above
D

88
What is the primary intent of an EIF?
Hold data maintained through one or more elementary processes of the application
being
counted
B. Maintain one or more groups of data and/or to alter the behavior of the system
C. Hold data referenced trough one or more elementary process of the application
being counted
D. Present information to a user through processing logic other than, or in addition
to, the retrieval
30
of data or control information
C

89
Which transactional function cannot alter the behavior of the application?

EI
B. EO
C. EQ
D. Both A and C
C
90
Which statement ALWAYS applies to both EOs and EQs?
The elementary process has the primary intent of presenting information to the user
B. The elementary process references a data function to retrieve data or control
information
C. The elementary process includes multiple forms of processing logic
D. The elementary process may alter the behavior of the application
A
91
The development project functional size is defined as:
DFP = ADD
B. DFP =ADD + CFP
C. DFP =AFP-CFP
D. DFP = AFP * CFP
31
B

92
Which is the correct formula for calculating an EFP?
EFP = AFP + CHGA + CFP + DEL
B. EFP = ADD + CHGA + CFP + DEL
C. EFP = AFPB + ADD + CHGA - CHGB - DEL

D. EFP = AFP + CHGA + CFP + DEL


B

93
What is the purpose of a FP count?
To provide an answer to a software question
B. To provide an answer to a business question
C. To provide an answer to a network question
D. To provide an answer to an application question
B

94
Which of the following statements is true?
The development project functional size is a measure of baseline functionality only
B. The development project functional size is a measure of installed functionality
C. The enhancement project functional size is a measure of baseline functionality
D. The application functional size is a measure of the functionality that an
application provides to
the user
D
32

95
What is the definition of "consistent state?"
point at which the requirements have been determined and approved by the user
B. point at which processing has been fully executed; the Functional User
Requirement has been

satisfied and there is no more to be done


C. development of all functionality is complete and the testing can begin; the
Functional User
Requirement have been met
D. conversion processes have been completed and all historical data converted
B

96
Which of the following statements about an External Inquiry are true?
An elementary process that processes data that is sent from outside the boundary
B. Has a primary intent to alter the behavior of data or control information
C. Has a primary intent to present information to a user through retrieval of data
All of the above
C

97
Which of the following statements regarding DET counting is (are) true?
Attributes referenced by the application being measured are not counted
B. Do not count a DET for attribute required by the user to establish a relationship
with another
data function
C. Count a DET for each attribute required by the user to establish a relationship
with another data
function
D. Both A and C
33
C

98
Which elementary process processes data or control information sent from outside
the
application's boundary?
An external interface file
B. An external inquiry
C. An external output
D. An external input
D

99
Which GSC describes the degree to which the application and the code in the
application have
been specifically designed, developed and supported to be reusable in other
applications?
End-user efficiency
B. Reusability
C. Facilitate change
D. Distributed data processing
A

100
An EO is defined as an elementary process that:
includes additional processing logic beyond that of an EQ
B. processes data or control information sent from outside the boundary
C. sends data or control information outside the boundary

D. Both A and C
34
C

101
The functional complexity of an EI is based on the number of:
Data Element Types
B. Record Element Types
C. File Types Referenced
D. Both A and C
D

102
An application's functional size is calculated after the development project using the
formula:
AFP = ADD
B. AFP =ADD + CFP
C. DFP =ADD + CFP
D. None of the above
D

103
Which type of functional size (F5) measures the functions provided to the users with
the first
installation of the software?
Application FS
B. Baseline FS

C. Enhancement project FS
D. Development project FS
D
35

104
Which rule applies to identifying a data function?
Include entities referred to as code data
B. Accepts data or control information that enters the application boundary
C. Identify all logically related and user recognizable data or control information
within the counting
scope
D. Maintains logical files
C

105
What is the purpose of the VAF?
Adjust the FP by +/- 35%
B. Adjust the FP by 0.65
C. Increase the reference data by 0.65
D. Increase the aFP by 35%
A

Topic 2, Implementations
106
A Banking Deposit application (BDS) has three subsystems; each subsystem serves
one

particular location. All three subsystems share the core functionalities of the
application, while
each has its own unique functions. Databases are physically split and maintained
separately by
locations as well. What is the application size of BDS?
36
575
B. 215
C. 195
D. 35
B

107
A Trading application introduces a new subsystem. The enhancement includes 6
new EIs, 3
modified EIs, 2 new EQs, 1 modified EO. 1 existing EO is eliminated from this
application by this
enhancement. There are 3 conversion EIs to convert existing data. All the
transactional functions
are average complexity. What is the functional size of the transactional functions for
the
enhancement?
54
B. 66
C. 56
D. 68
B

108

All debit payments are stopped when the user issues a stop payment for a given
debit card
number. A message gets sent to the Debit Card application once the stop payment
is successful.
How would the stop payment be measured?
1 EQ and 1 EI
B. 1 EI
37
C. 1 EO
D. 1 EQ
B

109
At the end of each month, Application A sends a transaction file to Application B.
The transaction
file contains a listing of item information including item number, item description
and item price. All
three attributes in the transaction file are contained in the Item ILF in Application
For Application
A, how would the elementary process be measured?
EI
B. EO
C. EQ
D. EIF
C

110
Which would be measured as multiple EQs?

Queries with identical processing logic, displayed on different screens


B. Graphical displays with no calculations and different processing logic
C. Multiple methods of invoking the same inquiry logic
D. Both A & B
B

111
Software is developed to convert the data from the Account application to the
Relationship
Management application. The Account Master ILF and four other ILFs in the Account
application
are referenced to create the Client Master file in the Relationship Management
application. How is
(are) the conversion function(s) counted for the Application Function Point measure?
38
1 EI
B. 1 EQ, I EI
C. 5 EQs, 1 EI
D. Not counted
D

112
A report is created that displays all of the high net worth clients. The report
calculates the net
worth of a client by totaling the balances from all of their accounts with the firm
including
unrealized gains and losses. If the net worth of the client exceeds $5 million the
client is included

on the report. The report retrieves the name, address and phone number from the
master account
file and generates a list. How would this be counted?
1 EI
B. 1 EO
C. 1 EQ
D. Not counted
B

113
The data retrieved from the state drop down list is obtained by reading the State file
that contains
only state code and state description. The State file is not updated frequently as
states are not
added on a frequent basis. How would the drop down list be measured?
1 EQ with 1 FTR
B. 1 EO with 1FTR
C. 1 EQ with OFTR
D. Not counted
D

39
114
Which of the following rules apply when counting DETs for both EOs and EQs?
Count one DET for each unique user recognizable, non-repeated attribute that
crosses the
boundary
B. Count one DET for each literal such as report titles or screen identifiers

C. Count one DET for each attribute generated within the boundary and saved to an
ILF without
exiting the boundary
D. Count one DET for each navigation aid used to navigate within a list
A

115
Which of the following rules would apply when counting FTRs for an EI?
Count one FTR for each unique data function that is accessed
B. Count one FTR for each transactional function read during the processing of the
EI
C. Count two FTRs for each unique data function that is both maintained and read
D. None of the above
A

116
The user can request the same data to be displayed in four languages. The data in
the different
languages are stored in user-maintained tables. How would this display of data be
measured?
1 EQ
B. 4 EQs
C. 1 EO
D. 4 EOs
A

40
117

At the end of the month, Application X sends a transaction file to Application Y. The
transaction file
contains a listing of employees that includes employee id, department, department
description,
and the total number of employees. Three of these attributes are contained in the
Employee ILF in
Application X, with the exception of the total number of employees which Is a
computed attribute.
Which statement is true for Application X?
The elementary process is measured as an EO
B. The elementary process is measured as an EQ
C. Three DETs are measured for the transaction sent to Application Y
D. None of the above
A

118
An EO maintains 1ILF and references 3 ILFs. What is the minimum number of DETs
necessary for
it to be valued at 7 LFP?
1
B. 6
C. 20
D. It can never be valued at 7 LFP
B

119
What would be the correct sequence of activities for measuring transactional
functions? 1. Classify

each transactional function as an EI, EO or EQ 2. Identify each elementary process


required by
the user 3. Determine the functional complexity for each transactional function 4.
Determine the
functional size for each transactional function 5. Count FTRs for each transactional
function 6.
Count DETs for each transactional function
1-3-2-1-4-5
B. 2-3-1-6-5-4
C. 4-2-1-5-6-3
D. 2-1-5-6-3-4
41
D

120
A transaction file contains records to maintain the Master file. A flag is included on
each incoming
record to indicate if the Master file record is to be added, changed or deleted. A
batch job is
developed to process the transaction file. How many transactional functions would
be counted?
1
B. 2
C. 3
D. 4
C

121

The Compliance application sends an electronic transaction of summary compliance


data to the
Laboratory Management application, which then updates an ILF. How would this
(these)
transactional function be measured?
1 EI for the Compliance application, 1 EI for the Laboratory Management application
B. 1 EO for the Compliance application, 1 EI for the Laboratory Management
application
C. 1 EI for the Compliance application
D. 1 EIF and 1 EI for the Laboratory Management application
B

122
An application retrieves records from a data store and displays the retrieved data on
an HTML
page. The HTML page contains a scroll bar to view all of the attributes. A user must
scroll down
through 4 screens of information to see all of the attributes contained on the HTML
page. How is
this counted?
42
1 EOs
B. 4EOs
C. 1 EQ
D. 4 EQs
C

123
Which requirement(s) would be accounted for using only the GSCs?

Design the screen so that all transactions would be done in less than three
keystrokes
B. Provide support for four spoken languages
C. Provide conversion and installation guides
D. All the above
D
124
What is the typical score for a batch application for the GSC Data Communications?
0 to 3
B. 4
C. 4to5
D. Does not apply to batch applications
A
125
Which may be counted as ILFs?
Help messages maintained by the user
B. Temporary sort files
43
C. Output reports saved to a file
D. A and C
D

126
A transaction file that adds new employees to the Human Resources Management
application is
imported through a batch process from the Recruitment Management application.
How many data

functions are counted for the new employees transaction file in the Human
Resource Management
application?
1 ILF
B. 1 EIF
C. 1 ILF and 1 EIF
D. Not counted
D

127
A Purchasing application contains a Customer Purchase Order file and an Inventory
file. The 2
files are pined by a foreign key, order inventory. How many data functions would be
counted?
1
B. 2
C. 3
D. None
B

128
A Financial application has a file that contains currency exchange rate information.
This data is
used to convert currency from U.S. dollars to local country currency. This file is
considered to be:
44
Code data
B. Tabular data

C. Reference data
D. None of the above
C

129
A file of user maintained help messages is kept current using the business
administrator
functionality of the system. How would this help message file be counted?
1 ILF
B. 1 EO
C. EI
D. Not counted
A
130
A logical data store is maintained by the application being counted. It has tax code
as the key
attribute and tax rate as the only other attribute. How would this data store be
counted?
1 ILF
B. 1 RET of an ILF
C. 1 EIF
D. Not counted
A
131
Phase 1 of an application enhancement adds 2 business function attributes to each
of 3 files. No
changes were made to reference the new attributes. Prior to the enhancement each
of these files

was valued at 3 RETs and 12 DETs. What is the CHGA of these files?
45
21 UFP
B. 45 UFP
C. 30 UFP
D. 0 UFP
B

132
Application Y reads the contents of a file maintained in Application X and uses the
data in the
processing of a transactional function. How would this data function be counted for
Application Y?
EIF
B. EO
C. EQ
D. ILF
A
133
From the business user perspective, the Purchasing application's customer purchase
order is a
group of data. It is made up of the Order Header (customer, address, date, etc.) and
the Order
Detail (Item Number, Quantity and Price) about each item ordered. How many RETs
would be
counted for this group of data?
0 RETs
B. 1 RET

C. 2 RETs
D. 3 RETs
C
134
Within the Human Resources Application, information for an employee is added by
entering
46
general information. In addition to the general information, the employee is either a
salaried
employee or hourly employee. Each type of employee has unique attributes. Either
type of
employee can have information about dependents. How many RETs are described in
this
scenario?
0
B. 1
C. 2
D. 3
D

135
Phase 1 of an application enhancement adds 2 business function attributes to each
of 3 files. No
changes were made to reference the new attributes. Prior to the enhancement each
of these files
was valued at 3 RETs and 12 DETs. What is the CHGA of these files?
21 UFP
B. 45 UFP
C. 30 UFP

D. 0 UFP
D

136
A group of data is referenced and updated by application A and application B. This
data is only
referenced by application C. For which of these applications is this group of data
counted?
Applications A and B only
B. All three applications
C. Counted as an EIF for all applications and an ILF for Applications A and B
D. Counted only for the application that updates the largest number of DETs
B

47
137
A database table is maintained by the application being counted. It has state code
as the key
attribute and state name as the only other attribute. How would this table be
counted?
1 ILF
B. 1 RET of an ILF
C. 1 EIF
D. Not counted
D

138
The Job Management application includes the following:
Three files of business data: Employee, Job, and Invoice
Job Rates file contains data that is stored in order to process the business rules
against the
business data.
The Payment Type file is identified by the developer In response to the technical
requirements of
the users.
Which of these files are candidates for counting as logical files (ILF or EIF)?
Employee, Job, Invoice, Job Rates, and Payment Type
B. Employee, Job, Invoice, and Job Rates
C. Employee, Job, and Invoice
D. None
B
139
Which is (are) method(s) of sharing data?
Screen scraping
B. Static image copy
48
C. Image copy/load
D. All of the above
D

140
A database table is maintained by the application being counted. It is an associative
entity that has

5 foreign key attributes and no additional attributes. How would this associative
entity be counted?
1 ILF
B. 1 RET of an ILF
C. 1 EIF
D. Not counted
D

141
The Report Generation application receives data from outside the boundary, and
saves the data in
the Reporting Data logical file, with additional processing logic involved. The user
Information is
maintained in the Report Generation application in the User Account logical file.
How would the
data functions be counted?
49
One ILF and one EIF
B. Two ILFs
C. One ILF
D. One ILF, one EIF and one EQ
B

142
How would you count the pie chart below?
1 EO with 1 DET
B. 1 EO with 2 DETs
C. 3 EOs

D. None of the above


B

143
The human resources department has 2 applications that use the Candidate
Information file.
Candidate Information contains 86 logical pieces of data.
50
The Candidate application maintains and/or references 86 pieces of data from
Candidate
Information. The Candidate application groups the data into candidate personal and
candidate
work history.
The Hiring application references 53 pieces of data from Candidate Information. The
Hiring
application groups the data into Candidate Record.
How would you count the Candidate Information file for each Application?
Candidate application 1 high ILF, Hiring application 1 average ILF
B. Candidate application 1 high EIF, Hiring application 1 high EIF
C. Candidate application 1 high ILF, Hiring application 1 average EIF
D. Candidate Information is reference data only

144
A Purchasing application prior to the enhancement had 204 FP. An enhancement
project
contributed the following:
Added FP = 12
Change Before FP = 30
Deleted FP = 0
Change After FP = 31
Conversion FP = 0
What is the EFP?
13
B. 42
C. 43
D. 236
C

145
A Human Resources application screen allows the user to control three aspects of
report
processing: sort sequence, printer port, and the choice of generating a DVD. The
options within
51
the three aspects are mutually exclusive. A confirmation message Is sent back to
the user after
the control information has been saved in the Parameter ILF. How many DETs are
counted?

10
B. 9
C. 5
D. 4
C

146
An enhancement project involves changing validations in the interest calculation
module, adding
users to the access permissions, and changing the operating system (and all related
system calls
in the system) from version 1.0 to the higher version 2.0 to improve system
performance. Which
functions would be sized from a FP perspective?
Interest calculation, adding permission, changing the operating system
B. Interest calculation, adding permissions
C. Interest calculation
D. Adding permissions
C
147
In an enhancement project an EI is counted as changed because an additional
attribute is sent
across the boundary. Before the enhancement the EI referenced 2 FTRs and 15
attributes crossed
the boundary. How many FPs are measured for the enhancement project?
52
4 FP
B. 6 FP

C. 3 FP
D. 7 FP
B

148
An application originally valued at 327 FP was enhanced. The enhancement added 3
low EQs, 2
low EIs and 2 high EOs. What is the AFPA?
29
B. 32
C. 356
D. 359
C
149
An enhancement project adds one new attribute to each of 10 ILFs. The 10 EIs that
maintain
these ILFs also include the new attribute. Before the enhancement, the ILFs each
had 1 RET and
15 DETs, and the EIs each had 1 FTR and 15 DETs. What is the EFP for the
enhancement
project?
100
B. 110
C. 130
D. 140
B
150

An application originally valued at 327 FP was enhanced. The enhancement added 3


low EQs, 2
53
low EIs, 2 high EOs, and changed 3 low ILFs. What is the enhancement project
functional size?
29
B. 50
C. 356
D. 377
B
151
For the scenario above calculate the FP.
21
B. 26
C. 32
D. 36
C
152
During the requirements phase for a new application, the user identified 3 logical
groups of data.
54
During the construction phase, our database technicians combined the 3 logical
groups of data
into 1 physical table. How many ILFs would be counted?
3 ILFs during requirements phase, 3 ILFs during construction phase
B. 3 ILFs during requirements phase, 1 ILFs during construction phase
C. 1ILF during requirements phase, 1 ILFs during construction phase
D. 1 ILF during requirements phase, 0 ILFs during construction phase

153
The team has been asked to size the software associated with porting the Order
Management
system from one operating system to a different operating system. The project
includes a one-time
data conversion activity. Which of the following is true?
FP approach can be used to size both the operating system upgrade and the data
conversion
activity
B. FP approach can be used to size the operating system upgrade. The data
conversion activity
cannot be sized using FP approach
C. FP approach can be used for sizing the data conversion activity. FP approach is
not suitable for
sizing the operating system upgrade
D. FP approach cannot be applied to size either the operating system upgrade or
the one-time
data conversion activity
C

154
Conversion software is developed to convert data from the Account application to
the new
Relationship Management application. Five logical files in the Account application
are referenced
by the conversion software to create the new Client Master File in the Relationship
Management
application. How is the data conversion counted for the development project?

1 El
B. 1 EQ, 1 EI
C. 5 EQs, 1EI
D. 5 EQs, 5 EIs
55
A

155
For the scenario above calculate the FP.
3
B. 4
C. 5
D. 6
A
156
Consider the following diagram.
56
The business requirement states that an employee must have at least one cubicle,
but may have
an unlimited number of cubicles assigned. A cubicle can also be occupied by more
than one
employee at a time. How many total DETs are depicted?
4
B. 6
C. 8
D. 10
B

157
The Great Escape movie theater chain has theaters in multiple cities. The Great
Escape Sales
system needs to send sales tax collected to the correct government offices. The
Sales system
calculates the tax due by multiplying the theater's sales by the tax rate for the city
where the
theater is located. The Tax Rate table has Tax Rate ID, Location, Tax Rate, Effective
Date,
Expiration Date columns. Tax Rate records are added, changed and deleted by the
developers
using third party utilities with the information that is submitted by the Sales system
users in
Change Requests approved by the Change Control Board (CCB). How many function
points
would be counted for the Tax Rate table?
None
B. 5
C. 7
D. Not enough information
A

158
An enhancement project adds 3 business function attributes to each of 3 data
functions. Before
the enhancement each of these data functions was valued at 2 RETs and 19 DETs.
Each of these
data functions is maintained by the same screen in the application. What is the
CHGA of these

data functions?
21 UFP
B. 45 UFP
57
C. 30 UFP
D. 0 UFP
C

159
An enhancement introduces a new module, which includes 3 new logical files and
modifies 2
existing logical files all maintained by this application. Additionally, the reference to
a logical file
maintained by another application is eliminated. Assuming all the logical files have
a complexity of
average, what is the functional size of the data functions for the enhancement?
43
B. 47
C. 57
D. 60
C

160
The Order Entry system uses the Currency Conversion file maintained by Global
Currency Master
system for conversion from USD currency to EUR currency. The user has identified
the need for a
Currency Discrepancy file maintained on a daily basis by the Oder Entry system to
adjust the

currency variances in the Currency Conversion file. The Order Entry system uses
both the
Currency Conversion file and the Currency Discrepancy file. How are these files
counted for the
Order Entry system?
1 EIF for the Currency Conversion file and 1 ILF for the Currency Discrepancy file
B. 2 EIFs for the Currency Conversion file and Currency Discrepancy file
C. 1 ILF for Currency Conversion file with an additional RET for Currency Discrepancy
file
D. 2 ILFs for the Currency Conversion file and Currency Discrepancy file
A

58
161
The CCY application maintains the Currency Exchange file. The Currency Exchange
file is copied
into the Customer application on a daily basis to improve timely access to the data.
The Customer
application references the Currency Exchange file for all its transactions. How would
the Currency
Exchange file be counted in the Customer application?
ILF
B. EIF
C. EI
D. Not counted
D

162

A development project has created 450 FP in application functionality and created


45 FP in
conversion functionality. What is the DFP?
45
B. 405
C. 450
D. 495
D

163
A study has been made of flowers in the world. The following graphic displays the
top three
flowers in the world. How many DETs are represented on this graph?
59
2
B. 3
C. 4
D. 6
A

164
Identify the number of EIs among the following activities:

Navigate the different pages of a report


Request confirmation from the user on whether to proceed further
Input and save data for a purchase order screen
Generate a report of incomplete purchase orders for each quarter
Message that the purchase order cannot be modified at this time
4
B. 2
C. l
D. 3
C
60

165
In the process of creating a user record, the application generates a unique user ID
and stores it.
The user ID is generated by concatenating the first three letters of the user's last
name, the first
three letters of the user's first name, and the user's four digit birth year. Another
function displays
the user ID on a screen that retrieves and displays detailed user information. The
user ID
displayed is measured as:
1 DET on an EQ
B. 3 DETs on an EQ
C. 1 DET on an EO
D. 3 DETs on an EO
A
166

The Order Entry Modification screen populates all order details into the Order logical
file. The
modification process also populates the Advance Shipment Notification logical file
and references
the Available Inventory logical file. The user required before and after images to be
captured for 3
attributes in the Oder logical file. The technical team has decided to store this data
in the Order
Audit file for ease of access. How many transactional functions and logical files are
counted in the
modification process?
2 EI and 4 FTRs for each EI
B. 1 EI and 4 FTRs for the EI
C. 1 El and 3 FTRs for the EI
D. 2 EI and 3 FTRs for each EI
C
167
Which can NOT be en EQ?
61
Retrieval of data, selection of which is based on data input
B. Drop list box displaying hard-coded information
C. Logon screen which displays security information
D. List of employee names
B

168
The user requirements call for a model stock portfolio list to be created. The user
will be able to

enter selection criteria for the equities to be included in the model stock portfolio
list. There is
another requirement for the user to be able to save the selection criteria. How many
elementary
processes would be counted?
Not counted
B. 1
C. 21
D. 3
C

169
An enhancement adds 3 update screens to the application. Each of these screens
updates 2 files
and displays 17 data attributes. What is the functional size of the transactional
functions after the
enhancement?
9
B. 12
C. 18
D. 21
C

170
62
A report is created that displays all clients who had more than five transactions in
the last month.
The account number and transaction date are retrieved from the Client Transaction
file and used

to calculate the total transactions in the previous month. The report displays
account number,
account holder's name, and phone number retrieved from the Master Account file.
How many
DETs and FTRs would be counted?
3 DETs, 1 FTR
B. 3 DETs, 2 FTRs
C. 5 DETs, 1FTR
D. 5 DETs, 2 FTRs
B

171
Which transaction can be an EQ?
A report containing weekly, monthly and yearly summary sales totals
B. Drop list box containing hard-coded information
C. Logon screen with security functionality
D. Confirmation message that the transaction cannot proceed owing to an internal
error
C

172
63
For this scenario, calculate the EFP using an unchanged VAF of 1.2 and original
application count
of 61 FP.
8.40
B. 15.60
C. 69.40

D. 76.60
B

173
The add, change, delete and retrieve job information functionalities are modified as
part of an
enhancement. A new summary report totaling job information is added. What
transactions are
counted for the enhancement project?
3 EIs, 1EO, and 1 EQ
B. 3 EIs, 2EO
C. 3 EIs, 2EQ
D. 4 EIs, 1 EQ
A

174
Which statement is true?
An enhancement always leads to a change in value of the existing application
function point
count
B. The added, changed and deleted functionality, in addition to the conversion
functionality, is
counted in an enhancement function point count
C. Removing fields of an existing report is considered under deleted functionality
D. Upgrading a system from a lower version of the operating system to a higher
version is
considered under conversion functionality
B

64
175
An enhancement project does not change the functional sizing of the application,
but just the
GSCs. The application's aAFP was 101 FPs, with a VAF of 1.01. The following generic
system
characteristics are changed as described: a) Flexible query and report facility was
provided that
can handle simple requests; now this facility can handle complex requests b)
Business control
data was kept in tables that are maintained by the user with on-line interactive
processes, but
changes take effect only on the next business cycle; now changes can take effect
immediately
What is the aAFPA?
100
B. 101
C. 104
D. 106
C

176
A new development project contains 3 GSC valued at 3 DI, 4 valued at 4 DI, 4
valued at 0 DI and
3 valued at 2 DI. What is the TDI?
.96
B. .98
C. .31

D. .33
C

177
An enhancement project added 3 high complexity EIs, changed 1 EI from average to
low
complexity and deleted 3 low complexity EIs. What is the EI contribution to
enhancement function
point measure?
30
65
B. 28
C. 21
D. 19
A

178
An enhancement involves changing an EQ with 12 fields to include 3 extra fields.
The EQ
referenced 3 files before the change, and one extra file needs to be referred to as
part of the
change. How would the enhanced EQ be counted?
12 DETS,3 FTRs
B. 15 DETS, 3 FTRs
C. 15 DETS, 1 FTR
D. 15 DETS, 4 FTRS
D

179
An ILF contains data for a company's 12 monthly budget amount fields, as well as
the monthly
name field. How many DETs are counted for this ILF?
1
B. 2
C. 12
D. 13
B

180
The application allows the user to maintain 4 error files and 4 confirmation message
files to meet 4
multi-language requirements. How would these files be counted?
66
Not counted
B. 8 ILFs
C. 2 ILFs
D. 4 ILFs
C

181
There are 10 ILFs in an Equity Trading application. There is an enhancement project
that is
modifying 10 screens and 5 reports. All screens and reports reference 6 ILFs of the
Equity Trading
application. No modifications are made to the ILFs. How many data functions would
be counted?

15 ILFs
B. 10 ILFs
C. 6 ILFs
D. None
D

182
The Insurance Claim application has a file for Claim Information which is used to
capture 127
pieces of data about each claim that is submitted. The Claim Information file stores
the data in four
groups: insurance policy holder, claimant, nature of the claim, and scanned images
of all
documents related to the claim such as receipts and photos. How would the Claim
Information file
be counted?
1 ILF with 4 RETs/127 DETs
B. 1 ILF with 3 RETs/126 DETs (scanning is technical so the images arent counted)
C. 1 Claim ILF with 3 RETs/126 DETs and 1 Image ILF with 1 RET/1DET
D. 1 Claim ILF with 1 RET/125 DETs and 1 Image ILF with 2 RETs/2 DETs
A

67
183
How would you count the Easy Credit Card monthly billing statement shown below?
No totals are
stored in the Billing ILF.
1 low EO

B. 1 low EQ
C. 1 averse EO
D. 1 average EQ
C

184
A screen that adds an order record to the Order file is being enhanced to capture 10
additional
attributes. These new attributes do not fit onto the existing screen, so a new screen
is being
created to collect the 10 new attributes before creating the Order record. How is the
screen
counted for the enhancement project?
1 changed EI
B. 1 changed EI, 1 added EI
C. 1 deleted EI, 1 added EI
D. 1 deleted EI, 2 added EIs
A
68
185
A Human Resources application has online field help for the add, change and delete
transactions.
The help facility is maintained by a separate application. How would the field help
be measured for
the Human Resources application?
1 EQ
B. 3 EQs
C. 4 EQS

D. Not counted
A

186
An application provides the users with screen help, field sensitive help, and system
help. The help
information is maintained within another application. How many EQs are counted?
1 for each unique screen
B. 2 for each unique screen
C. For system help, count 1 for the application, and for screen and field help count 2
for every
screen
D. 3 for the application
D

187
Identify the potential EI from the following activities:
Authorization for purchase order screen
B. Generating a report of unauthorized transactions
C. Sending a transaction to another application that updates the ILF in that other
application
D. Confirmation message that the transaction carrot proceed due to data integrity
issues
A

69
188

The Human Resources Tracking application (HRT) is used to follow the status of all
applicants to
the company. When an applicant resume is received, the user immediately scans
the applicant's
resume using the HRT scan new applicant function. HRT assigns an applicant
number to the
resume image, saves the number and resume image to the Applicant ILF, and sends
an email
notification to the hiring manager. What transaction(s) would be counted for the
new applicant
function?
1 EI
B. 1 EO
C. 1 EI and 1 EO
D. 1 EI and 1 EQ
A
189 An application enhancement adds 3 business functional attributes to each of 3
files. Each of these files had been valued at 2 RETs and 19 DETs. All of the DETs for
each of these files are maintained using the same screen in the application. What is
the functional size of the transactional function after the enhancement?
3
B. 4
C. 6
D. Not counted
C
http://www.pass4king.com/i40-420.html

Das könnte Ihnen auch gefallen