Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

INCOSE

ASEP Preparation

QuestionAnswer
The processes that invoke the system analysis process to perform interface analysis include: (choose 3) A. System requirements B. Implementation D. Architecture Definition
The data generated during assessment of the creative alternatives step in the Analyze decision information activity is summarized in: A. objective measure consequence table
The Agile SE Framework includes: (choose 2) A. a predictable process enabling reconfiguration of goals and requirements. B. an agile product architecture that allows changes during development and fabrication
ISO 10303-233, that is AP 233, Application Protocol: Systems Engineering is used to exchange data between: (choose 3) A. XML C. applications in the larger life cycle E. other SE applications
A Readiness for Use assessment occurs: (choose 4) A. during analysis of validation results B. following maintenance actions D. at first article delivery E. completion of production
The life cycle of every system includes the following aspects: (choose 3) A. business B. budget F. technical
The process that is executed in parallel with the mode and simulation development that certifies a model or simulation is acceptable for use is: (choose 1) D. verification, validation, and accreditation (VV&A)
Select 3 challenges that influence the engineering of a system of systems: ( choose 3) B. Constituent systems were often developed for other purposes D. Each constituent system has its own local "owner" E. Determining leadership in the multiple organizational environment is challenging.
The "derived measures" are: (choose 2) A. TPM B. MOP C. MOE A. TPM B. MOP
Two characteristics of a reference SE model are: (choose 2) A. adheres to the CMMI B. is tailor-able C. the model includes an SE improvement process D. adopts the language of 1S0/ IEC 15288:2008) B. is tailor-able C. the model includes an SE improvement process
The defining characteristics of a decision gate are: (choose 4) A. it is a review B. it has entry and exit criteria C. it is "pro forma" D. it is included in the project schedule E. it is for the customer F. it is a milestone A. it is a review B. it has entry and exit criteria D. it is included in the project schedule F. it is a milestone
The 4 elements that define the scope of log engineering are: A. design the system for supportability B. provide cost-effective logistics support C. acquire the support D. determine logistics spt requirements E. provide effective system disposal A. design the system for support-ability B. provide cost-effective logistics support C. acquire the support D. determine logistics support requirements
Achieved availability excludes: (choose 2) A. preventive maintenance B. administrative delay time C. logistics delay time B. administrative delay time C. logistics delay time
The resilience of a system is: (choose 2) A. deterministic B. nascent C. emergent D. nondeterministic C. emergent D. nondeterministic
Risk avoidance is insufficient for high-risk technical tasks. Supplmntl approaches to risk treatment are needed. These incl: (4) A. adnl gate reviews B. extnsve analysis and tsting C. initiation of parallel dvlpmnt D. contingency plng E. erly proc't B. extensive analysis and testing C. initiation of parallel developments D. contingency planning E. early procurement
The participating system entities in a Svc or Svc offering dynamically configure 4 types of resources: (4) A. technology/ environment infrastructure B. organizations/ institutions C. people D. shared info/symbolic knowledge E. programs F. projects A. technology/ environment infrastructure B. organizations/ institutions C. people D. shared information/ symbolic knowledge
Methods useful for understanding a complicated system include (choose 3): A. iterative B. linear C. non-linear D. procedural E. holistic F. recursive break down B. linear D. procedural F. recursive break down
Two indicators the qlty policy is not wrking are (choose 2): A. the proj is not compliant to its reqm'ts, but the cust is happy. B. the proj is compliant, but the cust is unhappy. C. the proj is not compliant to its req'ts and the cust is unhappy. D. A. the project is not compliant to its requirements, but the customer is happy. B. the project is compliant, but the customer is unhappy.
The role of the systems engineer in the Agmt Processes includes:(4) A. cndct risk asmnts B. create precise ests of proj impacts for a variety of optns that might be proposed. C. condct trade studies on alts D. assess chng impacts E. sptt the proj mgr A. conduct risk assessments C. conduct trade studies on alternatives D. assess change impacts E. support the project manager
The broadened definition of risk is stated as the "effect of uncertainty on objectives". Objectives can apply at different levels such as: (choose 5) A. product B. process C. organization-wide D. tactical E. market-wide F. strategic G. project A. product B. process C. organization-wide F. strategic G. project
One objective of the Sys engineer is to minimize undesirable emergent properties by: A. reducing the number of sys element interrelationships B. eliminating circular causation C. incl and coord the contributions of a cross disciplinary team of experts C. including and coordinating the contributions of a cross disciplinary team of experts
The desired capabilities of realizing adaptive Sos using the dynamic binding of Network-Centric Systems for service systems are: (chse 2) A. speed of srvc delivery B. real-time behavior emergence C. reliability of srvc delivery D. knowledge emergence C. reliability of service delivery D. knowledge emergence
Project initiation is a formal milestone that should not occur until: A. the project plan has been signed off B. the project plan has been written C. all resources are in place as called for by the project plan C. all resources are in place as called for by the project plan
When measuring affordability, the differentiation between 2 competing systems in terms of their value to system stakeholders will most often be found in which attributes: A. nonfunctional B. architecture C. functional D. design A. nonfunctional
The 8 categories of waste include ( choose 3): A. overprocessing B. inventory depletion C. unnecessary movement D. waiting E. queueing A. overprocessing C. unnecessary movement D. waiting
When joining a project, one of the first jobs of a systems engineer is to: A. establish nomenclature and terminology to support clear, unambiguous communications B. . initiate a function based analysis to establish a foundation for defining a sys archit A. establish nomenclature and terminology to support clear, unambiguous communication
The tailoring process exists at these two levels: (choose two) A. project B. senior management C. organizational D. supervisory A. project C. organizational
KPPs are used to characterize the major drivers of: (choose 3) A. interoperability B. delivery C. maintainability D. operational performance E. support-ability A. interoperability D. operational performance E. supportability
Systems engineers participate heavily in which types of IPDTs: (choose 2) A. PIT B. PDT C. SEIT A. PIT C. SEIT
The collection of elements that do not belong to the system, but do interact with it are called: (choose 2) A. actors B. operating environment C. interfaces d. context B. operating environment D. context
The role of the acquirer requires knowledge of these processes: (choose 3) A. Technical management B. System requirements definition C. Organizational project-enabling D. Technical E. Stakeholder needs and requirements definition A. Technical management C. Organizational project-enabling D. Technical
A valid but unverifiable req't like ''The range shall be as long as possible" is a signal that: A. the req't is singular B. the req't is implementation independent C. a trade study is needed to establish a verifiable maximum range req't D. the req't C. a trade study is needed to establish a verifiable maximum range requirement.
The two integration methods specifically associated with intensive software systems are: (2) A. bottom-up B. top-down C. criterion-driven D. incremental E. with the stream A. bottom-up B. top-down
The multi-year nature of space system development means it must effectively use risk management to deal with: (choose 3) A. programmatic challenges B. inter company agreements C. new technologies D. changing requirements E. funding changes A. programmatic challenges C. new technologies D. changing requirements
Decision trees are well suited as an analysis approach when: (choose 3): A. there are multiple competing objectives that are not easily monetized B. there are few chance nodes C. there are few decision nodes D. end node consequences can be expressed w B. there are few chance nodes C. there are few decision nodes D. end node consequences can be expressed with a single number
Stakeholder concerns related to system architecture usually: A. are related to the critical qlty characteristics of a single life cycle stage B. are related to the critical quality characteristics that span one or more life cycle stages C. are the res B. are related to the critical quality characteristics that span one or more life cycle stages
Modeling languages are intended to be both: (choose 2) A. textual B. analog C. discrete D. human interpretable E. computer interpretable F. symbolic D. human interpretable E. computer interpretable
Three criteria for effective SE management are: (chse 3): A. streamline cntrls B. use a comnd-and-cntrl structure C. simplify paperwork D. build redundancy into the process E. facilitate communication F. utilize effective baseline and confg mgmt A. streamline controls C. simplify paperwork E. facilitate communication
Mass properties include: (choose three) A. weight B. inertia about the center of gravity C. density D. center of gravity location A. weight B. inertia about the center of gravity D. center of gravity location
The agreement is closed through which process: A. project planning B. project assessment and control C. portfolio management D. life cycle model management C. portfolio management
Major challenges in the definition, design, and implementation of services include: (choose 2) A. stakeholder input B. integration of loosely coupled systems C. understanding the information flows D. lack of a formal SE process B. integration of loosely coupled systems C. understanding the information flows
The characteristics of a security architecture suited to counter evolving threats include: (2) A. info hiding security functional sys elmnts B. encapsulated security functional sys elmnts C. cohesive security functional sys elmnnts D. loosely couple B. encapsulated security functional system elements D. loosely coupled security functional system elements
SysML behavior diagrams include: (choose 4) A. Use-case diagrams B. Sequence diagrams C. State Machine diagrams D. Block definition diagram E. Parametric diagrams F. Activity diagrams G. Requirements diagrams A. Use-case diagrams B. Sequence diagrams C. State Machine diagrams F. Activity diagrams
Key attributes of a Decision Management process are: (choose 3) A. analytical B. quantitative C. objective D. structured A. analytical C. objective D. structured
In Systems Engineering the term Cost-Effectiveness Analysis helps to: (2) A. measures the relative effect of component costs on the overall system effectiveness. B. derive design requirements and supports decision-making. C. derive critical system perf B. derive design requirements and supports decision-making. C. derive critical system performance parameters.
The system analysis process is used by the mission and business analysis process to: (2) A. prepare life cycle models B. characterize the solution space C. analyze candidate business models D. analyze candidate OpsCon C. analyze candidate business models D. analyze candidate OpsCon
The two main mitigation strategies that help cope with performance capability gaps that occur as a system ages are:(2) A. perf-based enhancement (PBE) B. perf-based logistics (PBL) C. technology refreshment programs (TRP) D. technolgy enhancement prog B. performance-based logistics (PBL) C. technology refreshment programs (TRP)
The completion of a product development cycle is marked by what audits: (choose 3) A. physical configuration B. functional configuration C. formal D. lnformal E. technical configuration A. physical configuration C. formal D. informal
Graphical depictions of life-cycle stages tend to hide these aspects of the underlying processes: (2) A. iterative B. linear C. incremental D. waterfall A. iterative C. incremental
The term for the fact that Verification applies onto any activity and product resulting from the activity throughout the life cycle is: (choose 1) A. spanning B. orthogonal C. transverse D. transitive C. transverse
Systems thinking occurs through: (choose 2) A. learning B. decomposition C. diagnosis D. simplification A. learning C. diagnosis
The 4 process groups from ISO/ IEC 15288 that support systems engineering include: (choose 2) A. Technical Management Processes B. Model Based Engineering C. Agreement Processes D. Life Cycle Modeling Processes A. Technical Management Processes C. Agreement Processes
Product line management can improve organizational competitiveness by: (3) A. increasing quality B. enlarging the product catalog C. entering markets with larger inherent margins D. driving the adoption of IPDT F. decreasing the development cost A. increasing quality B. enlarging the product catalog D. driving the adoption of IPDT
Obtaining data sufficient to characterize global or detailed behavior of candidate architectures with respect to stakeholder and system requirements requires certain analyses. Those analyses include: (choose 4) A. cost B. efficiency C. maintainabilit A. cost B. efficiency C. maintainability E. performance
The three concepts fundamental to understanding lean thinking are: (choose 3) A. flow B. lean principles C. waste D. perfection E. pull F. value B. lean principles C. waste F. value
The functional safety standard covering the full safety life cycle in the automotive domain is: (choose 1) A. IEC 62196 B. ISO 26262 C. ISO 16949 B. ISO 26262
Application Protocol (AP) 239, Product Life cycle Support (PLCS) is contained in what ISO document and addresses what topic? (choose 2) A. ISO 10303 B. information requirements for complex systems C. information security D. ISO 17799 B. information requirements for complex systems
The traditional definition of risk includes: (2) A. the potential for the realization of wanted, positive consequences of an event B. generally used only for negative consequences C. combination of the probablity of an event and its consequences D. B. generally used only for negative consequences C. combination of the probability of an event and its consequences
Techniques for requirements elicitation include: (choose 4) A. the Delphi method B. focus groups C. use error analysis D. interviews E. task analysis F. soft systems methodology A. the Delphi method B. focus groups D. interviews F. soft systems methodology
Standardization, measurement, and control are used within sequential methods to: (choose 1) A. drive requirements trace-ability B. increase process capability C. drive the collection of historical data D. drive the completeness of documentation B. increase process capability
The value propositions of organization-wide Life-cycle processes include: (2) A. the ability to xfer effective processes across the organization B. repeatable/predictable performance across projects C. ISO 9001 compliance D. the ability to be audited A. the ability to transfer effective processes across the organization B. repeatable/predictable performance across projects
The first step of the second activity of the concept stage is: A. identify, clarify, and document the stakeholders' conceptual operation of the system B. explore risks and opportunities C. creation of engineering models and prototypes D. integration, A. identify, clarify, and document the stakeholders' conceptual operation of the system
The four risk categories are: (choose 4) A. Cost B. Avoided C. Programmatic D. Mitigated E. Schedule F. Technical A. Cost C. Programmatic E. Schedule F. Technical
IPDTs should not: (choose 1) A. be required to justify their decisions B. be empowered with full life cycle responsibility C. be looking to higher management for key decisions D. be required to justify their actions C. be looking to higher management for key decisions
Maintenance constraints need to be fed back to: (3) A. System analysis prcs B. System req'ts definition prcs C. Stakeholder needs and req'ts definition prcs D. Design def prcs E. Business or mission analysis prcs F. Transition prcs G. Arch def prcs B. System requirements definition process D. Design definition process G. Architecture definition process
The Organization Strategic Plan is an output of: A. Quality Management Process B. Project Portfolio Management Process C. Human Resources Management Process D. Life Cycle Model Management Process B. Project Portfolio Management Process
The tailoring should occur: A. over the system life-cycle B. infrequently to avoid disrupting the flow of work C. when projects are demonstrating poor performance D. at the start of the project A. over the system life-cycle
The "derived measures" are: (choose 2) A. MOP B. TPM C. MOE A. MOP B. TPM
The term for the fact that Verification applies onto any activity and product resulting from the activity throughout the life cycle is: (choose 1) A. transitive B. spanning C. orthogonal D. transverse D. transverse
When measuring affordability, the differentiator between 2 competing systems in terms of their value to system stakeholders will most often be found in which attributes: (choose 1) A. architecture B. design C. nonfunctional D. functional C. nonfunctional
Systems science is both: (choose 2) A. systems approach to science B. isolationist in its search for simplicity C. science of systems D. reductionist A. systems approach to science C. science of systems
Inputs to the Stakeholder Needs and Requirements Definition Process include: (choose 3) A. Stakeholder Needs B. Concept Documents C. Project Constraints D. Source Documents E. Validation Criteria A. Stakeholder Needs C. Project Constraints D. Source Documents
The two benefits of modeling and simulation are:(2) A. provide a means for analyzing complex dynamic behavior of systems B. confirm the need for the sys and the sys behaviors before conducting the actual development C. provide an abstraction of a D. B. confirm the need for the system and the system behaviors before conducting the actual development D. present a clear, coherent design to maximize productivity
Obtaining data sufficient to characterize global or detailed behavior of candidate architectures with respect to stakeholder and system requirements requires certain analyses. Those analyses include (choose 4): A. maintainability B. disposability C. A. maintainability C. cost F. performance
The Incremental Commitment Spiral Model draws on aspects from these life cycle models: (choose 6) A. Rational Unified Process B. agile C. concurrent engineering D. spiral E. lean F. waterfall G. evolutionary H. vee A. Rational Unified Process B. agile C. concurrent engineering D. spiral E. lean H. vee
Inputs to the System Requirements Definition Process include: (choose2) A. Industry Standards B. Concept Documents C. Initial RVTM D. System Requirements Document B. Concept Documents C. Initial RVTM
Agility measures are enabled and constrained principally by: (2) A. the time required by the team to understand a rspnc is required B. the time required by the team to accomplish the response C. the product architecture D. the process architecture C. the product architecture D. the process architecture
One of the keys to interoperability is: A. testing B. compliance with standards C. architecture D. design B. compliance with standards
Choose the true statements about requirements: (4) A. they can be verified B. multiple requirements may be traced to a single need C. they can be validated D. stakeholder need is resolved into a requirement E. they are formal structured statements A. they can be verified B. multiple requirements may be traced to a single need C. they can be validated E. they are formal structured statements
Business aspect issues include: (choose 3) A. product B. affordability C. funding D. market demand E. cost F. realistic schedules B. affordability D. market demand F. realistic schedules
The verification process can be applied to: (2) A. only elements that contribute to the realization of the system B. any element that contributes to the realization of the system C. any element that contributed to the definition of the system D. onl B. any element that contributes to the realization of the system C. any element that contributed to the definition of the system
Even within a single stage in the system life cycle the FBSE process is: (choose 1) A. iterative B. recursive C. incremental A. iterative
The elements of behavior associated with the more typical sort of system include: (4) A. exchange of resources B. self -organization C. exchange of information D. exchange of energy E. viability maintenance F. state change G. dynamically evolving A. exchange of resources C. exchange of information D. exchange of energy F. state change
It Is recommended to start drafting the validation plan: A. during the system requirements definition process B. during the architecture definition process C. as soon as the first OpsCon, scenarios, and stakeholder requirements are known C. as soon as the first OpsCon, scenarios, and stakeholder requirements are known
Choose the correct statement: A. Corrective maintenance tasks are primarily identified using FMECA, while preventive maintenance tasks are identified using RCM. B. Corrective maintenance tasks are primarily identified using RCM, while preventive ma A. Corrective maintenance tasks are primarily identified using FMECA, while preventive maintenance tasks are identified using RCM.
The service value chain is described in terms of: A. links among the system entities connected via the NCS B. a service metamodel of system entities and their attributes C. strategic capabilities that consistently provide superior value D. a request A. links among the system entities connected via the NCS
The three types of IPDT's are: (choose 3) A. Systems Engineering and Integration Team (SEIT) B. Product Integration Team (PIT) C. Product Development Team (PDT) D. Process Development Team (PDT) A. Systems Engineering and Integration Team (SEIT) B. Product Integration Team (PIT) C. Product Development Team (PDT)
Alternatives to the N2 (N-squared) diagram include:(choose 2) A. DSM B. ibd C. SysML D. UML E. CFD A. DSM B. ibd
The goal of systems science is to identify, explore, and understand: A. cross disciplinary fields B. patterns of complexity C. areas of application D. interdisciplinary patterns B. patterns of complexity
Select the characteristics that apply to the Analysis verification technique: (3) A. checks properties best determined by observation B. no intervention on the submitted element C. uses samples to verify characteristics D. uses modeling and/ or simu B. no intervention on the submitted element D. uses modeling and/ or simulation E. shows theoretical compliance
System security scenarios are useful for: (choose 3) A. verification B. support C. validation D. integration E. system requirements definition A. verification C. validation E. system requirements definition
Organizational goal categories are: (choose 3) A. market share B. revenue C. quality D. personnel E. cost F. schedule G. price H. resources I. profit C. quality E. cost F. schedule
Characteristics associated with an IPDT environment include: (choose 3) A. improved recognition of progress B. reduced project rotation C. establishment of mentoring programs D. increased project rotation A. improved recognition of progress B. reduced project rotation C. establishment of mentoring programs
A measure in decision management must have what characteristics: (choose 5) A. comprehensible B. operational C. unambiguous D. maintainable E. direct F. restricted G. specific H. comprehensive I. understandable B. operational C. unambiguous E. direct H. comprehensive I. understandable
Everyone in the organization should know: a. the project management policy B. the knowledge management policy C. the quality policy D. the human resource policy C. the quality policy
A product line approach is recommended when:(2) A. the org has high confidence in the underlying system architecture B. different customers need similar systems with some customization C. return-on-investment (ROI) is not sufficiently high with a si B. different customers need similar systems with some customization D. different customers need the same systems
The Transition Process relies heavily on: (choose 2) A. correct integration B. quality assurance documentation C. skilled operators D. configuration management documentation B. quality assurance documentation D. configuration management documentation
Created by: bddurant
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards