______ is an orderly grouping of independent components linked together according to a plan to achieve a specific objective or goal. | |
A. | System |
B. | Software |
C. | Subsystem |
D. | Physical system |
Answer» A. System |
2. | A —————is a set or group of component that interact to accomplish some purpose. |
A. | System |
B. | Software |
C. | Subsystem |
D. | Physical system |
Answer» A. System |
3. | System consists of—————- |
A. | Standards |
B. | Measurement |
C. | Compare |
D. | All of above |
Answer» D. All of above |
4. | Elements of system. |
A. | Output/Input |
B. | Control |
C. | Feedback |
D. | All of above |
Answer» D. All of above |
5. | We can define information system as a set of devices, procedures, rules but most of the work performs manually |
A. | Formal Information system |
B. | Manmade Information system |
C. | Informal information system |
D. | All of above |
Answer» B. Manmade Information system |
6. | What are the characteristics of software? |
A. | Software is developed or engineered; it is not manufactured in the classical sense. |
B. | Software doesn’t “ wear out ”. |
C. | Software can be custom built or custom build. |
D. | All mentioned above |
Answer» D. All mentioned above |
7. | Compilers, Editors software come under which type of software? |
A. | System software |
B. | Application software |
C. | Scientific software |
D. | None of the above |
Answer» B. Application software |
8. | ——– refers to the process of examining a business situation with the intent of improving it through better procedures and methods. |
A. | Software Anticipation |
B. | Software Investigation |
C. | Software Requirement |
D. | System analysis |
Answer» D. System analysis |
9. | The process of generating analysis and design documents is known as |
A. | Software engineering |
B. | Software re-engineering |
C. | Reverse engineering |
D. | Re-engineering |
Answer» C. Reverse engineering |
10. | Which is the first step in the software development life cycle ? |
A. | Analysis |
B. | Design |
C. | Problem/Opportunity Identification |
D. | Development and Documentation |
Answer» C. Problem/Opportunity Identification |
11. | Decision makers who are concerned with tactical (short-term) operational problems and decision making are |
A. | middle managers |
B. | executive managers |
C. | supervisors |
D. | mobile managers |
Answer» A. middle managers |
12. | A turnaround output is an example of |
A. | internal output |
B. | external output |
C. | summary output |
D. | exception output |
Answer» B. external output |
13. | Critical information for top management is provided by ……. information system. |
A. | expert |
B. | managerial |
C. | executive |
D. | decision |
Answer» C. executive |
14. | ________ expressly designed for the support of individual and collective decision making. |
A. | MIS |
B. | DSS |
C. | TPS |
D. | OIS |
Answer» B. DSS |
15. | ———–The system which are represented conceptually non Physical systems are called |
A. | Abstract system |
B. | System model |
C. | Open system |
D. | Closed system |
Answer» A. Abstract system |
16. | ————it shows a two dimensional depicting system elements and their linkages. |
A. | Schematic Models |
B. | Flow system models |
C. | Static system models |
D. | Dynamic system models |
Answer» A. Schematic Models |
17. | —————It shows the flow of material ,energy and information that hold system together. |
A. | Schematic Models |
B. | Flow system models |
C. | Static system models |
D. | Dynamic system models |
Answer» B. Flow system models |
18. | ————- This type of model exhibits are pair of relationship such as activity time or cost quantity. |
A. | Schematic Models |
B. | Flow system models |
C. | Static system models |
D. | Dynamic system models |
Answer» C. Static system models |
19. | —————- It depict constantly an ongoing constantly changing the system |
A. | Schematic Models |
B. | Flow system models |
C. | Static system models |
D. | Dynamic system models |
Answer» D. Dynamic system models |
20. | An ———–system is a one which does not provide for its own control or modification. |
A. | Open System |
B. | Closed system |
C. | MIS |
D. | DIS |
Answer» A. Open System |
21. | ———-system in one which automatically controls or modifies its own operation by responding to data generated by the system itself. |
A. | Open System |
B. | Closed system |
C. | MIS |
D. | DIS |
Answer» B. Closed system |
22. | ——————-is represented by organization chart. |
A. | Formal Information system |
B. | Closed system |
C. | MIS |
D. | DIS |
Answer» A. Formal Information system |
23. | ————-systems used organizational data as well as external data collected from environment of the organization. |
A. | Formal Information system |
B. | Closed system |
C. | MIS |
D. | DSS |
Answer» D. DSS |
24. | Effectiveness is a major goal of these types of systems. |
A. | Expert systems |
B. | Closed system |
C. | MIS |
D. | DSS |
Answer» A. Expert systems |
26. | —————-consists of individual computers may be workstations or multiple systems. |
A. | Execution Information system(EIS) |
B. | Integrated system |
C. | Subsystem |
D. | Transaction processing system |
Answer» B. Integrated system |
27. | ————-is a unit that is part of a larger system that means a larger system divided into subparts the subpart is known as ————– |
A. | Execution Information system(EIS) |
B. | Integrated system |
C. | Subsystem |
D. | Transaction processing system |
Answer» C. Subsystem |
28. | ———–system collect,store,modify and retrieve the transaction of an organization. |
A. | Execution Information system(EIS) |
B. | Integrated system |
C. | Subsystem |
D. | Transaction processing system |
Answer» D. Transaction processing system |
29. | —————–is concerned with how a systems tied together in order to achieve common goal thus forming integration. |
A. | Interaction |
B. | Interdependence |
C. | Integration |
D. | Central Objective |
Answer» C. Integration |
30. | ——–means that parts of the organization depend on one another |
A. | Interaction |
B. | Interdependence |
C. | Integration |
D. | Central Objective |
Answer» B. Interdependence |
31. | Which one of the following is not a step of requirement engineering? |
A. | elicitation |
B. | design |
C. | analysis |
D. | documentation |
Answer» C. analysis |
32. | ———–is a first technical step in software process. |
A. | Software Anticipation |
B. | Software Investigation |
C. | Software Requirement |
D. | None of Above |
Answer» D. None of Above |
33. | ——– refers to the process of examining a business situation with the intent of improving it through better procedures and methods. |
A. | Software Anticipation |
B. | Software Investigation |
C. | Software Requirement |
D. | System analysis |
Answer» A. Software Anticipation |
34. | What are the four dimensions of Dependability? |
A. | Usability, Reliability, Security, Flexibility |
B. | Availability, Reliability, Maintainability, Security |
C. | Availability, Reliability, Security, Safety |
D. | Security, Safety, Testability, Usability |
Answer» B. Availability, Reliability, Maintainability, Security |
35. | System analyst consist of following tasks: |
A. | Problem identification |
B. | Problem understanding |
C. | Analysis Problem |
D. | All of the above |
Answer» A. Problem identification |
36. | ——— it include the study like can the work for the project is done with current equipment existing software technology and with available manpower. |
A. | Technical feasibility |
B. | Economic feasibility |
C. | Operational feasibility |
D. | None of above |
Answer» B. Economic feasibility |
37. | ——- it include of study of cost of system. |
A. | Technical feasibility |
B. | Economic feasibility |
C. | Operational feasibility |
D. | None of above |
Answer» C. Operational feasibility |
38. | ——— it include system be used if it developed and implemented. |
A. | Technical feasibility |
B. | Economic feasibility |
C. | Operational feasibility |
D. | None of above |
Answer» A. Technical feasibility |
39. | Analyst used ——- method to collect information from individual or from group. |
A. | Interviews |
B. | Questionnaires. |
C. | Record inspection or view |
D. | Observations |
Answer» A. Interviews |
40. | Analyst used ——— method to collect information from person by asking standard question to person or group of person. |
A. | Interviews |
B. | Questionnaires. |
C. | Record inspection or view |
D. | Observations |
Answer» A. Interviews |
41. | ——– interviews use of standardized question in either an open response or close response format. |
A. | Unstructured Interviews. |
B. | Structured Interviews |
C. | Questionnaires. |
D. | Record inspection or view |
Answer» B. Structured Interviews |
42. | ———– may be inefficient use of both respondent and interviewer time. |
A. | Unstructured Interviews. |
B. | Structured Interviews |
C. | Questionnaires. |
D. | Record inspection or view |
Answer» A. Unstructured Interviews. |
43. | Analyst use ———-to learn about feelings, opinions and general experiences or to explore a process or problems. |
A. | open ended questionnaires |
B. | Close ended questionnaires |
C. | Record Inspection |
D. | Observation |
Answer» A. open ended questionnaires |
44. | In ———– analyst examines information that has been recorded about system and about the users. |
A. | Record Review |
B. | Interviews |
C. | Questionnaires |
D. | Observation |
Answer» B. Interviews |
45. | The ———— is produced at the culmination of the analysis task. |
A. | Software requirement specification |
B. | Questionnaires |
C. | Record Inspection |
D. | None of these |
Answer» A. Software requirement specification |
46. | Software is defined as ____ |
A. | Instructions |
B. | Data Structures |
C. | Documents |
D. | All of the above |
Answer» D. All of the above |
47. | The objective of software engineering is to produce ———- |
A. | Software Product |
B. | Output |
C. | Input |
D. | Processing |
Answer» A. Software Product |
48. | ———– are software systems delivered to customer with the documentation which describes how to install and use the system. |
A. | Software Product |
B. | Output |
C. | Input |
D. | Processing |
Answer» A. Software Product |
49. | ——— These are stand-alone systems which are produced by a development organization and sold on the open market to any customer who is able to buy them. |
A. | Generic Product |
B. | Customized product |
C. | Product |
D. | None of these |
Answer» A. Generic Product |
Chapter: Requirement Analysis
51. | ————- component should be designed and implemented so that it can be reused in many different programs. |
A. | Reusability |
B. | Effectiveness |
C. | Flexibility |
D. | None of these |
Answer» A. Reusability |
52. | A primary goal of software engineering is to improve the ————-and to increase the productivity and job satisfaction of software engineers. |
A. | Quality of software product |
B. | Satisfaction of product |
C. | Flexibility |
D. | None of these |
Answer» A. Quality of software product |
53. | A fundamental Principal of software engineering is to design software products that minimize the intellectual distance between ———– and solution. |
A. | Method |
B. | Process |
C. | Product |
D. | Problem |
Answer» A. Method |
54. | ———— is outgrowth of hardware and system engineering. |
A. | Software engineering |
B. | Requirement engineering |
C. | System engineering |
D. | None of these |
Answer» B. Requirement engineering |
55. | ———— provide automated or semi-automated support for methods. |
A. | Software engineering tools |
B. | Software engineering Procedures |
C. | Software engineering Methods |
D. | None of these |
Answer» A. Software engineering tools |
56. | ————- encompass a broad array of tasks that include project planning and estimation system analysis, design of data structure, program architecture, coding, testing and maintenance. |
A. | Software engineering tools |
B. | Software engineering Procedures |
C. | Software engineering Methods |
D. | None of these |
Answer» A. Software engineering tools |
57. | ————- are the glue that holds the methods and tools together and they enable rational and timely development of computer software. |
A. | Software engineering tools |
B. | Software engineering Procedures |
C. | Software engineering Methods |
D. | None of these |
Answer» D. None of these |
58. | Software engineering needed for building ———–systems in a timely manner with high quality. |
A. | Software |
B. | Hardware |
C. | Process |
D. | All of above |
Answer» A. Software |
59. | software engineering is a —————- |
A. | Graphical technology |
B. | Layered technology |
C. | Paired technology |
D. | Electrical technology |
Answer» A. Graphical technology |
60. | ——— provides the technical how to building software. |
A. | Software engineering tools |
B. | Software engineering Procedures |
C. | Software engineering Methods |
D. | None of these |
Answer» C. Software engineering Methods |
61. | Software is —— |
A. | Developed |
B. | Manufactured |
C. | Non manufactured |
D. | None of these |
Answer» B. Manufactured |
62. | Software does not———– |
A. | Engineered |
B. | Developed |
C. | Maintained |
D. | Wear out |
Answer» A. Engineered |
63. | ———— consists of a means of monitoring the software engineering processes and methods used to ensure quality. |
A. | Software quality assurance |
B. | Software quality product |
C. | Software requirement |
D. | Software specification |
Answer» B. Software quality product |
64. | In McCall’s software quality factors, Product operation phase —-not contains. |
A. | Correctness |
B. | Reliability |
C. | Usability |
D. | Flexibility |
Answer» C. Usability |
65. | In McCall’s software quality factors, Product revision phase —-not contains. |
A. | Maintainability |
B. | Flexibility |
C. | Testability |
D. | Portability |
Answer» A. Maintainability |
66. | In McCall’s software quality factors, Product transition phase —-not conta |
A. | Portability |
B. | Reusability |
C. | Interoperability |
D. | Testability |
Answer» D. Testability |
67. | ———- it includes the steps of maintenance phase of software. |
A. | Maintainability |
B. | Flexibility |
C. | Testability |
D. | Portability |
Answer» A. Maintainability |
68. | The property of software in which software product may be adapted to changes of specifications. |
A. | Maintainability |
B. | Flexibility |
C. | Testability |
D. | Portability |
Answer» D. Portability |
69. | It is the ability of software system to product their various components against unauthorized access and modification. |
A. | Correctness |
B. | Reliability |
C. | Usability |
D. | Integrity |
Answer» D. Integrity |
70. | ———— is the probability that the software will operate correctly over specified time interval. |
A. | Correctness |
B. | Reliability |
C. | Usability |
D. | Flexibility |
Answer» D. Flexibility |
71. | ————–will be able to interface it with another system. |
A. | Correctness |
B. | Interoperability |
C. | Usability |
D. | Flexibility |
Answer» A. Correctness |
72. | ———– the ease with which conformance to standards can be checked. |
A. | Correctness |
B. | Auditability |
C. | Usability |
D. | Flexibility |
Answer» B. Auditability |
73. | ——— The degree to which standard interfaces protocols and bandwidth are used. |
A. | Correctness |
B. | Communication commonality |
C. | Usability |
D. | Flexibility |
Answer» D. Flexibility |
74. | ——- The compactness of the program in terms of lines of code. |
A. | Conciseness |
B. | Consistency |
C. | Data commonality |
D. | Error tolerance |
Answer» A. Conciseness |
76. | ———– the degree to which the software assists in enabling new users to apply the system. |
A. | Training |
B. | Traceability |
C. | Simplicity |
D. | Security |
Answer» A. Training |
77. | ——— The degree to which the source code provides meaningful documentation. |
A. | Self-documentation |
B. | Training |
C. | Traceability |
D. | Simplicity |
Answer» A. Self-documentation |
78. | ———- The damage that occurs when the program encounters an error. |
A. | Error tolerance |
B. | Training |
C. | Traceability |
D. | simplicity |
Answer» A. Error tolerance |
79. | ————– The functional independence of program componets. |
A. | Error tolerance |
B. | Training |
C. | Modularity |
D. | Simplicity |
Answer» C. Modularity |
80. | ———- The degree to which full implementation of required function has been achieved. |
A. | Error tolerance |
B. | Training |
C. | Completeness |
D. | Simplicity |
Answer» C. Completeness |
81. | Pick up the odd one out of the following process m |
A. | Component assembly model |
B. | Prototyping Model |
C. | Spiral model |
D. | Waterfall Model |
Answer» D. Waterfall Model |
82. | The Linear Sequential or Classic Life Cycle is also ca |
A. | Waterfall Model |
B. | Incremental Model |
C. | Spiral model |
D. | Prototyping Model |
Answer» A. Waterfall Model |
83. | The waterfall model of the software process considers each process activity as a _______ pha |
A. | separate |
B. | discrete |
C. | Both a and b options |
D. | None of the above |
Answer» C. Both a and b options |
84. | In Boehm’s spiral model, each loop in the spiral represents _____ of the softwa |
A. | phase |
B. | design |
C. | documentation |
D. | none of the above |
Answer» A. phase |
85. | In incremental process model, some high end function are desig |
A. | Construction framework |
B. | Modeling framework |
C. | Planning framework |
D. | Deployment framework |
Answer» B. Modeling framework |
86. | RAD stands f |
A. | Relative Application Development |
B. | Rapid Application Development |
C. | Rapid Application Document |
D. | None of the mentioned |
Answer» B. Rapid Application Development |
87. | RAD Model ha |
A. | 2 phases |
B. | 3 phase |
C. | 5 phases |
D. | 6 phases |
Answer» C. 5 phases |
88. | SDLC stands f |
A. | Software Development Life Cycle |
B. | System Development Life cycle |
C. | Software Design Life Cycle |
D. | System Design Life Cycle |
Answer» A. Software Development Life Cycle |
89. | Which one of the following is not an Evolutionary Process Model? |
A. | WINWIN Spiral Model |
B. | Incremental Model |
C. | Concurrent Development Model |
D. | All of the mentioned |
Answer» D. All of the mentioned |
90. | The Incremental Model is a result of combination of elements of which two models? |
A. | Build & FIX Model & Waterfall Model |
B. | Linear Model & RAD Model |
C. | Linear Model & Prototyping Model |
D. | Waterfall Model & RAD Model |
Answer» C. Linear Model & Prototyping Model |
Chapter: Introduction to Software Engineering
91. | What is the major advantage of using Incremental Model? |
A. | Customer can respond to each increment |
B. | Easier to test and debug |
C. | It is used when there is a need to get a product to the market early |
D. | Easier to test and debug & It is used when there is a need to get a product to the market early |
Answer» A. Customer can respond to each increment |
92. | The spiral model was originally proposed by |
A. | IBM |
B. | Barry Boehm |
C. | Pressman |
D. | Royce |
Answer» B. Barry Boehm |
93. | The spiral model has two dimensions namely _____________ and ____________ |
A. | diagonal, angular |
B. | radial, perpendicular |
C. | radial, angular |
D. | diagonal, perpendicular |
Answer» C. radial, angular |
94. | How is WINWIN Spiral Model different from Spiral Model? |
A. | It defines tasks required to define resources, timelines, and other project related information |
B. | It defines a set of negotiation activities at the beginning of each pass around the spiral |
C. | It defines tasks required to assess both technical and management risks |
D. | It defines tasks required to construct, test, install, and provide user support |
Answer» B. It defines a set of negotiation activities at the beginning of each pass around the spiral |
95. | Identify the disadvantage of Spiral Model. |
A. | Doesn’t work well for smaller projects |
B. | High amount of risk analysis |
C. | Strong approval and documentation control |
D. | Additional Functionality can be added at a later date |
Answer» A. Doesn’t work well for smaller projects |
96. | Spiral Model has user involvement in all its phases. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» B. False |
97. | How is Incremental Model different from Spiral Model? |
A. | Progress can be measured for Incremental Model |
B. | Changing requirements can be accommodated in Incremental Model |
C. | Users can see the system early in Incremental Model |
D. | All of the mentioned |
Answer» A. Progress can be measured for Incremental Model |
98. | If you were to create client/server applications, which model would you go for? |
A. | WINWIN Spiral Model |
B. | Spiral Model |
C. | Concurrent Model |
D. | Incremental Model |
Answer» C. Concurrent Model |
99. | A company is developing an advance version of their current software available in the market, what model approach would they prefer ? |
A. | RAD |
B. | Iterative Enhancement |
C. | Both RAD & Iterative Enhancement |
D. | Spiral |
Answer» C. Both RAD & Iterative Enhancement |
101. | Spiral Model has high reliability requirements. | |
A. | True | |
B. | False | |
C. | all | |
D. | none | |
Answer» A. True | ||
102. | RAD Model has high reliability requirements. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» B. False |
103. | If you were a lead developer of a software company and you are asked to submit a project/product within a stipulated time-frame with no cost barriers, which model would you select? |
A. | Waterfall |
B. | Spiral |
C. | RAD |
D. | Incremental |
Answer» C. RAD |
104. | Which of the following life cycle model can be chosen if the development team has less experience on similar projects? |
A. | Spiral |
B. | Waterfall |
C. | RAD |
D. | Iterative Enhancement Model |
Answer» A. Spiral |
105. | Selection of a model is based on |
A. | Requirements |
B. | Development team & Users |
C. | Project type and associated risk |
D. | All of the mentioned |
Answer» D. All of the mentioned |
106. | Which of the following life cycle model can be chosen if the development team has less experience on similar projects? |
A. | Spiral |
B. | Waterfall |
C. | RAD |
D. | Iterative Enhancement Model |
Answer» A. Spiral |
107. | Which two models doesn’t allow defining requirements early in the cycle? |
A. | Waterfall & RAD |
B. | Prototyping & Spiral |
C. | Prototyping & RAD |
D. | Waterfall & Spiral |
Answer» B. Prototyping & Spiral |
108. | A model that is the demo implementation of the system. |
A. | waterfall |
B. | prototype |
C. | incremental |
D. | agile |
Answer» B. prototype |
109. | Maintenance is the final phase in waterfall model. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» A. True |
110. | A stage in which individual components are integrated and ensured that they are error-free to meet customer requirements. |
A. | Coding |
B. | Testing |
C. | Design |
D. | Implementation |
Answer» B. Testing |
111. | Methodology in which project management processes were step-by step. |
A. | Incremental |
B. | Waterfall |
C. | Spiral |
D. | Prototyping |
Answer» B. Waterfall |
112. | ER diagram is a ————t |
A. | Design |
B. | Coding |
C. | Testing |
D. | None of above |
Answer» A. Design |
113. | ER diagram is a ________of the database system which provides high level conceptual data model and supports the users perception of the data. |
A. | Graphical representation |
B. | Hierarchical representation |
C. | Both of these |
D. | None above these |
Answer» A. Graphical representation |
114. | ________ is an object in to real world that is distinguishable from all other objects |
A. | Entity |
B. | Attribute |
C. | Both |
D. | None |
Answer» A. Entity |
115. | _______ is set of entities of the same type that share the same properties attributes. |
A. | Entity |
B. | Attribute |
C. | Both |
D. | None |
Answer» A. Entity |
116. | Each entity has a set of _____________ |
A. | Entity |
B. | Attribute |
C. | Row |
D. | None |
Answer» B. Attribute |
117. | ______ attributes cannot be divided into subparts |
A. | Simple |
B. | Composite |
C. | Single valued |
D. | Multivalued |
Answer» A. Simple |
118. | _________ attributes can be divided into subparts. |
A. | Simple |
B. | Composite |
C. | Single valued |
D. | Multivalued |
Answer» B. Composite |
119. | __________entity does not have a value for an attribute. |
A. | Null |
B. | Composite |
C. | Single valued |
D. | multivalued |
Answer» A. Null |
120. | ________ represent entity set. |
A. | Ellipses |
B. | Rectangles |
C. | Diamonds |
D. | Lines |
Answer» B. Rectangles |
121. | ___________ represent attributes |
A. | Ellipses |
B. | Rectangles |
C. | Diamonds |
D. | Lines |
Answer» A. Ellipses |
122. | ___________represent relationship set. |
A. | Ellipses |
B. | Rectangles |
C. | Diamonds |
D. | Lines |
Answer» C. Diamonds |
123. | ___________represent multi-valued attribute. |
A. | Double ellipse |
B. | Dashed ellipse |
C. | Diamonds |
D. | Lines |
Answer» A. Double ellipse |
124. | _________ represent derived attribute. |
A. | Double ellipse |
B. | Dashed ellipse |
C. | Diamonds |
D. | Lines |
Answer» B. Dashed ellipse |
126. | A _________ is a decision support tool that uses a tree-like graph or model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility. |
A. | Decision tree |
B. | Graphs |
C. | Trees |
D. | Neural Networks |
Answer» A. Decision tree |
127. | What is Decision Tree? |
A. | Flow-Chart |
B. | Structure in which internal node represents test on an attribute, each branch represents outcome of test and each leaf node represents class label |
C. | Flow-Chart & Structure in which internal node represents test on an attribute, each branch represents outcome of test and each leaf node represents class label |
D. | None of the mentioned |
Answer» C. Flow-Chart & Structure in which internal node represents test on an attribute, each branch represents outcome of test and each leaf node represents class label |
128. | Decision Tree is a display of an algorithm. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» A. True |
129. | Choose from the following that are Decision Tree nodes? |
A. | Decision Nodes |
B. | End Nodes |
C. | Chance Nodes |
D. | All of the mentioned |
Answer» B. End Nodes |
130. | Decision Nodes are represented by ____________ |
A. | Disks |
B. | Squares |
C. | Circles |
D. | Triangles |
Answer» B. Squares |
131. | Chance Nodes are represented by __________ |
A. | Disks |
B. | Squares |
C. | Circles |
D. | Triangles |
Answer» C. Circles |
132. | End Nodes are represented by __________ |
A. | Disks |
B. | Squares |
C. | Circles |
D. | Triangles |
Answer» D. Triangles |
133. | Which of the following are the advantage/s of Decision Trees? |
A. | Possible Scenarios can be added |
B. | Use a white box model, If given result is provided by a model |
C. | Worst, best and expected values can be determined for different scenarios |
D. | All of the mentioned |
Answer» D. All of the mentioned |
134. | Decision table made up of section. |
A. | Condition statement |
B. | Condition statements |
C. | Action statements |
D. | All of these |
Answer» D. All of these |
135. | __________ is a graphic representation of system that shows data flows to from and within system, processing functions that change the data in some manner and storage of tis data. |
A. | DFD |
B. | ER model |
C. | Decision table |
D. | Decision Tree |
Answer» A. DFD |
136. | DFD shows how things happen or the physical component is called ———— |
A. | Logical DFD |
B. | Physical DFD |
C. | Data dictionary |
D. | None of these |
Answer» A. Logical DFD |
137. | A relational database system needs to maintain data about the relations, such as the schema of the relations. This is called |
A. | Metadata |
B. | Catalog |
C. | Log |
D. | Dictionary |
Answer» A. Metadata |
Chapter: Analysis and Design Tools
138. | Which of these states the goal of engineering design analysis? |
A. | To understand an engineering design problem |
B. | To provide an solution for a given problem |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» A. To understand an engineering design problem |
139. | What methods can be followed if designers are out of good SRS or engineering design? |
A. | They must do whatever part of product design which remains undone |
B. | Various approaches and techniques are to be followed to complete |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned |
140. | Why is Modelling one of the best way to carry out analysis? |
A. | During analysis, It serves as a good test for understanding |
B. | Provides further documentation for input to design resolution |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned |
141. | Engineering design activities consists of which of the following? |
A. | Studying the SRS |
B. | Producing new models of the problem |
C. | Product design models |
D. | All of the mentioned |
Answer» D. All of the mentioned |
142. | A generic software engineering design follows which of the activities? |
A. | Analysis |
B. | Architectural Design |
C. | Finalize Design |
D. | Analysis & Architectural Design |
Answer» D. Analysis & Architectural Design |
143. | Architectural design stage include which of the following activity? |
A. | Generate/Improve detailed design alternatives |
B. | Select architecture |
C. | Finalize Design |
D. | All of the mentioned |
Answer» B. Select architecture |
144. | Detailed design stage include which of the following activity? |
A. | Generate / Improve candidate architectures |
B. | Evaluate candidate architecture |
C. | Finalize Design |
D. | None of the mentioned |
Answer» C. Finalize Design |
145. | What is Analysis model? |
A. | Understanding of design problem |
B. | Representation of design problem solution |
C. | Representation of design problem |
D. | All of the mentioned |
Answer» C. Representation of design problem |
146. | Which of the following statement is true? |
A. | A class model is representation of objects in a problem or a software solution |
B. | A object model is representation of classes in a problem or a software solution |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned |
147. | Which of the following statement is true? |
A. | Class Diagram are graphical form of class models |
B. | Object Diagram are graphical forms of object models |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned |
148. | Which of these are types of class model used in object oriented analysis? |
A. | Analysis Class models/ Conceptual Models |
B. | Design Class Models |
C. | Implementation Class Models |
D. | All of the mentioned |
Answer» D. All of the mentioned |
149. | Which of the following represents the use of Conceptual models during product design? |
A. | Understanding the problem design |
B. | Setting Data Requirements |
C. | Validating Requirements |
D. | All of the mentioned |
Answer» D. All of the mentioned |
151. | What are Design Class Models? |
A. | They show classes in a software system |
B. | They represents attributes,operations, association in abstraction from language |
C. | They show implementation details |
D. | All of the mentioned |
Answer» D. All of the mentioned |
152. | Conceptual models are useful for which of the following reasons? |
A. | Understanding problem design |
B. | Data Requirements and Product design |
C. | Validating requirements |
D. | All of the mentioned |
Answer» D. All of the mentioned |
153. | Why there is a need for Software management? |
A. | Software development is complex and expensive |
B. | It is done with few people with fixed skills and abilities |
C. | It is not time consuming |
D. | None of the mentioned |
Answer» A. Software development is complex and expensive |
154. | Which of these is wrong in terms of definition? |
A. | Planing is formulating scheme for doing project |
B. | Organizing is directing people doing project work |
C. | Project is one time effort to achieve a particular goal for organization |
D. | Staffing is filing the positions in an organizational structure |
Answer» B. Organizing is directing people doing project work |
155. | Which of these is not project development activity? |
A. | Planning |
B. | Organizing |
C. | Operating |
D. | Tracking |
Answer» C. Operating |
156. | Which of these comes under business activities? |
A. | Project |
B. | Operations |
C. | Planning |
D. | Project & Operations |
Answer» D. Project & Operations |
157. | Which of these terms have its role in project planning? |
A. | Schedule |
B. | Milestone |
C. | Estimation |
D. | All of the mentioned |
Answer» D. All of the mentioned |
158. | What fails a project? |
A. | Lack of anticipation of resources to accomplish tasks |
B. | Problems faced by rules governing project |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned |
159. | Why are Patterns important? |
A. | They capture expert design knowledge |
B. | They make captured design accessible to both novices and other experts |
C. | All of the mentioned |
D. | None of the mentioned) |
Answer» C. All of the mentioned |
160. | What benefits does patterns provide? |
A. | Novice designers can benefit from learning solution patterns that experts use, without needing design experience |
B. | Expert designers can benefit from studying patterns too: They can broaden their repertoire of patterns and deepen their understanding of the patterns they already know |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned |
161. | What benefits does patterns provide? |
A. | Promoting Communication |
B. | Streamlining Documentation |
C. | Increasing Development Efficiency |
D. | All of the mentioned |
Answer» D. All of the mentioned |
162. | Which of the following Choices and standardizes patterns for a problem domain promotes software reuse and, hence, quality and productivity? |
A. | Promoting Communication |
B. | Streamlining Documentation |
C. | Increasing Development Efficiency |
D. | Supporting Software Reuse |
Answer» D. Supporting Software Reuse |
Chapter: Software Development Methodologies
163. | Relational schemas and other metadata about relations are stored in a structure called the ____________ |
A. | Metadata |
B. | Catalog |
C. | Log |
D. | Data Dictionary |
Answer» D. Data Dictionary |
164. | .A data dictionary is created when a __________ created. |
A. | Instance |
B. | Segment |
C. | Database |
D. | Dictionary |
Answer» C. Database |
165. | Keep the statement language ______________ while writing a pseudo code. |
A. | Dependent |
B. | Independent |
C. | Case sensitive |
D. | Capitalized |
Answer» B. Independent |
166. | Capitalize initial keyword – This is a rule while writing a pseudo code. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» A. True |
167. | ______________ is used to show hierarchy in a pseudo code. |
A. | Indentation |
B. | Curly Braces |
C. | Round Brackets |
D. | Semicolon |
Answer» A. Indentation |
168. | structured design was developed by —– and ——————–. |
A. | ED Yourdon and Larry constatine |
B. | By codd |
C. | All of these |
D. | None of these |
Answer» A. ED Yourdon and Larry constatine |
169. | In specific design process activites a |
A. | Architectural design. |
B. | Abstract specification |
C. | Interface design |
D. | All of these |
Answer» D. All of these |
170. | _______________is the separation of a function contained as code in one module into a new module of its own. |
A. | Factoring |
B. | Fan-in |
C. | Fan-out |
D. | System shape |
Answer» A. Factoring |
171. | _______ it is a module where the number of immediate bosses it has. |
A. | Factoring |
B. | Fan-in |
C. | Fan-out |
D. | System shape |
Answer» B. Fan-in |
172. | Modules with _______ must have good cohesion. |
A. | Factoring |
B. | Fan-in |
C. | Fan-out |
D. | System shape |
Answer» B. Fan-in |
173. | Which of the property of software modularity is incorrect with respect to benefits software modularity? |
A. | Modules are robust |
B. | Module can use other modules |
C. | Modules Can be separately compiled and stored in a library |
D. | Modules are mostly dependent |
Answer» D. Modules are mostly dependent |
174. | _______________ is a measure of the degree of interdependence between modules. |
A. | Cohesion |
B. | Coupling |
C. | None of the mentioned |
D. | All of the mentioned |
Answer» B. Coupling |
176. | Which of the following is the worst type of module coupling? | |
A. | Control Coupling | |
B. | Stamp Coupling | |
C. | External Coupling | |
D. | Content Coupling | |
Answer» C. External Coupling | ||
177. | Which of the following is the worst type of module cohesion? |
A. | Logical Cohesion |
B. | Temporal Cohesion |
C. | Functional Cohesion |
D. | Coincidental Cohesion |
Answer» D. Coincidental Cohesion |
178. | Which of the following is the best type of module cohesion? |
A. | Functional Cohesion |
B. | Temporal Cohesion |
C. | Functional Cohesion |
D. | Sequential Cohesion |
Answer» A. Functional Cohesion |
179. | A software engineer must design the modules with the goal of high cohesion and low coupling. |
A. | True |
B. | False |
C. | all |
D. | none |
Answer» A. True |
180. | In what type of coupling, the complete data structure is passed from one module to another? |
A. | Control Coupling |
B. | Stamp Coupling |
C. | External Coupling |
D. | Content Coupling |
Answer» B. Stamp Coupling |
181. | If all tasks must be executed in the same time-span, what type of cohesion is being exhibited? |
A. | Functional Cohesion |
B. | Temporal Cohesion |
C. | Functional Cohesion |
D. | Sequential Cohesion |
Answer» B. Temporal Cohesion |
182. | _________ defined as a collection of program statements with four basic attribute i.e. input and output, function, mechanics and internal data |
A. | Module |
B. | Factoring |
C. | Fan in |
D. | Fan Out |
Answer» A. Module |
183. | __________ is the intellectual tool that allows us to deal with concepts apart from particular instances of those concepts. |
A. | Module |
B. | Abstraction |
C. | Fan-in |
D. | Fan-out |
Answer» B. Abstraction |
184. | The ———–involves the use of parameterized subprograms. |
A. | Functional Abstraction |
B. | Control Abstraction |
C. | Cohesion |
D. | Coupling |
Answer» A. Functional Abstraction |
185. | The ________ is used to state a desired effect without stating the exact mechanism of control. |
A. | Functional Abstraction |
B. | Control Abstraction |
C. | Cohesion |
D. | Coupling |
Answer» B. Control Abstraction |
186. | __________in this each module and its dub module corresponding to a processing step in the execution sequence. |
A. | Information hiding criteria |
B. | Conventional criteria |
C. | Data abstraction criteria |
D. | None of these |
Answer» B. Conventional criteria |
187. | __________ In this each module hides a difficult or changeable design decision from the other module. |
A. | Information hiding criteria |
B. | Conventional criteria |
C. | Data abstraction criteria |
D. | None of these |
Answer» A. Information hiding criteria |
188. | _______ In this each module hides the representation details of a major data structure behind functions that access and modify the data structure. |
A. | Information hiding criteria |
B. | Conventional criteria |
C. | Data abstraction criteria |
D. | None of these |
Answer» C. Data abstraction criteria |
189. | A module has _______if there is some logical relationship in the elements of a module. |
A. | Logical cohesion |
B. | Temporal cohesion |
C. | Both A And B |
D. | None of these |
Answer» A. Logical cohesion |
190. | ___________ This module gets data from sub-ordinates and forward it to superordinate(boss) modules. |
A. | Afferent modules |
B. | Efferent modules |
C. | Co-ordinate modules |
D. | Transform modules. |
Answer» A. Afferent modules |
191. | ___________ This module gets data from super-ordinate and forward it to sub-ordinates. |
A. | Afferent modules |
B. | Efferent modules |
C. | Co-ordinate modules |
D. | Transform modules. |
Answer» B. Efferent modules |
192. | _______ This module manages the flow of data between different sub-ordinates. They are used for selection purpose and in decision making. |
A. | Afferent modules |
B. | Efferent modules |
C. | Co-ordinate modules |
D. | Transform modules. |
Answer» C. Co-ordinate modules |
193. | This module gets data from super-ordinates, process that data and again forward It to super-ordinate modules, These modules are used for processing purpose. |
A. | Afferent modules |
B. | Efferent modules |
C. | Co-ordinate modules |
D. | Transform modules. |
Answer» D. Transform modules. |
194. | White Box techniques are also classified a |
A. | Design based testing |
B. | Structural testing |
C. | Error guessing technique |
D. | None of the mentioned |
Answer» B. Structural testing |
195. | Exhaustive testing |
A. | always possible |
B. | practically possible |
C. | impractical but possible |
D. | impractical and impossible |
Answer» C. impractical but possible |
196. | Alpha testing is done a |
A. | Developer’s end |
B. | User’s end |
C. | Developer’s & User’s end |
D. | None of the mentioned |
Answer» A. Developer’s end |
197. | The testing in which code is check |
A. | Black box testing |
B. | White box testing |
C. | Red box testing |
D. | Green box testing |
Answer» B. White box testing |
198. | Testing done without planning and Documentation is ca |
A. | Unit testing |
B. | Regression testing |
C. | Adhoc testing |
D. | None of the mentioned |
Answer» C. Adhoc testing |
199. | Acceptance testing is also known a |
A. | Grey box testing |
B. | White box testing |
C. | Alpha Testing |
D. | Beta testing |
Answer» D. Beta testing |
201. | Beta testing is done a |
A. | User’s end |
B. | Developer’s end |
C. | User’s & Developer’s end |
D. | None of the mentioned |
Answer» A. User’s end |
202. | Unit testing is done by |
A. | Users |
B. | Developers |
C. | Customers |
D. | None of the mentioned |
Answer» B. Developers |
203. | Behavioral testing |
A. | White box testing |
B. | Black box testing |
C. | Grey box testing |
D. | None of the mentioned |
Answer» B. Black box testing |
204. | Which of the following is black box testing |
A. | Basic path testing |
B. | Boundary value analysis |
C. | Code path analysis |
D. | None of the mentioned |
Answer» B. Boundary value analysis |
205. | Which of the following is not used in measuring the size of the softwa |
A. | KLOC |
B. | Function Points |
C. | Size of module |
D. | None of the mentioned |
Answer» C. Size of module |
More MCQs
206. | Software Engineering: |
A. | is a set of rules about developing software products |
B. | has been around as a discipline since the early 50’s |
C. | started as a response to the so-called ‘software crisis’ of the late 90’s |
D. | is an engineering discipline concerned with all the aspects of software production |
Answer» D. is an engineering discipline concerned with all the aspects of software production | |
Explanation: software crisis of the late 60’s . |
207. | While orientating yourselves to the company’s work practices, you observe that they in fact do not conduct a few tests that they should in order to comply with the relevant safety standard. When you inquire about this from the project manager, he dismisses it saying that those tests are really unnecessary (and takes an unreasonably long time to conduct, as well as being superfluous) and that they have managed with the other tests for so long, without any problems.” |
A. | you should immediately resign from the company and file a complaint with the relevant standard institution |
B. | you should do nothing and let the matter slide |
C. | although you are new to the company, and you hardly know anything about the internal processes and politics, you should insist on the company changing its work practices immediately; failing which you threaten to report the matter |
D. | since you are new to the company, and you are unfamiliar with the internal processes and politics, you should first find-out more about the issue and its background |
Answer» D. since you are new to the company, and you are unfamiliar with the internal processes and politics, you should first find-out more about the issue and its background | |
Explanation: d is the appropriate choice. |
208. | With regard to Evolutionary development, identify the correct statement. |
A. | evolutionary development usually comes in two flavors; exploratory development, and throw-away prototyping |
B. | very large projects are natural candidates for an evolutionary development based approach |
C. | exploratory development is used in situations where most of the requirements are well understood in advance |
D. | one of the strong points of evolutionary development is that it facilitates easy project management, through the high volume of documentation it generates |
Answer» A. evolutionary development usually comes in two flavors; exploratory development, and throw-away prototyping | |
Explanation: evolutionary development usually comes in two flavors; exploratory development, and throw-away prototyping is the correct statement with respect to evolutionary development. |
209. | The software life cycle can be said to consist of a series of phases. The classical model is referred to as the waterfall model. Which phase may be defined as “The concept is explored and refined, and the client’s requirements are elicited?” |
A. | requirements |
B. | specification |
C. | design |
D. | implementation |
Answer» A. requirements | |
Explanation: in the requirements phase the concept is explored and refined and the clients requirements are elicited. |
210. | Which property of the rapid prototype is not important? |
A. | the speed with which it can be developed |
B. | the speed with which it can be modified |
C. | its ability to determine the client’s real needs |
D. | the insights that the design team can gain from it, even if they are of the ‘how not to do it’ variety |
Answer» C. its ability to determine the client’s real needs | |
Explanation: the sole use of the rapid prototype is to determine what the client’s real needs are as rapidly as possible. the rapid prototype is then effectively discarded so its internal structure is not relevant. |
211. | The degree of interaction between two modules is known as |
A. | cohesion |
B. | strength |
C. | inheritance |
D. | coupling |
Answer» D. coupling | |
Explanation: the degree of interaction between two modules is known as coupling. |
212. | The relationship between a derived class (or subclass) and base class is referred to as |
A. | association |
B. | inheritance |
C. | polymorphism |
D. | instantiation |
Answer» B. inheritance | |
Explanation: a derived class inherits all the attributes of a base class. |
213. | Myers (1978) identifies seven levels of cohesion. Which level of cohesion may be defined as followed; “the output from one element in the component serves as input for some other element”? |
A. | communicational cohesion |
B. | functional cohesion |
C. | communicational cohesion |
D. | temporal cohesion |
Answer» A. communicational cohesion | |
Explanation: in communicational cohesion the output from one element in the component serves as input for some other element. |
214. | If a control switch is passed as an argument this is an example of _______ coupling. |
A. | content |
B. | common |
C. | control |
D. | stamp |
Answer» C. control | |
Explanation: two modules are control coupled if one passes an element of control to another. |
215. | Which of the following is a type of abstraction? |
A. | data |
B. | procedural |
C. | iteration |
D. | all of the above |
Answer» D. all of the above | |
Explanation: the three types of abstraction (data, procedural and iteration) are all instances of the more general concept of information hiding. |
216. | In the classical chief programmer team approach, the team member responsible for maintaining the detailed design and coding is |
A. | the chief programmer |
B. | the programming secretary |
C. | a specialized function that exists outside ‘the team’ |
D. | the individual coder (i.e. programmer) |
Answer» D. the individual coder (i.e. programmer) | |
Explanation: in the classical chief programmer team approach, the team member responsible for maintaining the detailed design and coding is the individual coder (i.e. programmer). |
217. | Internal costs include |
A. | developers salaries |
B. | managers and support personnel salaries |
C. | the cost of overheads such as utilities, rent and senior managers |
D. | materials (such as manuals) and services such as travel |
Answer» A. developers salaries | |
Explanation: internal costs comprise all the costs to the developers. |
218. | Software Science bases its estimation of the size of a product on |
A. | files (fi), flows (fl) and processes (pr) |
B. | lines of code (kloc) |
C. | function points (fp) |
D. | operands and operators |
Answer» D. operands and operators | |
Explanation: software science bases its estimation of the size of a product on the number of operands and operators. |
219. | In Intermediate COCOMO the mode that represents complex products is referred to as |
A. | embedded |
B. | semidetached |
C. | organic |
D. | multiplicative |
Answer» A. embedded | |
Explanation: organic, semidetached and imbedded. |
220. | Work that continues throughout the project and does not relate to any specific phase of software development is termed a(n) |
A. | milestone |
B. | project function |
C. | activity |
D. | task |
Answer» B. project function | |
Explanation: work that continues throughout the project and does not relate to any specific phase of software development is termed a project function. |
221. | The best way to test the Software Project Management Plan (SPMP) is by |
A. | prototyping |
B. | inspection |
C. | simulation |
D. | compilation |
Answer» B. inspection | |
Explanation: the best way to test the software project management plan (spmp) is by a plan inspection by the sqa team. in order to further reduce risk the duration and cost estimates should further be independently computed by people other than the original project team. |
222. | Brooks’ view of the essence of software included |
A. | people, quality, process and productivity |
B. | performance, robustness, maintainability and reusability |
C. | complexity, conformity, changeability and invisibility |
D. | efficiency, reliability, usability and robustness |
Answer» C. complexity, conformity, changeability and invisibility | |
Explanation: brooks’ view of the essence of software included complexity, conformity, changeability &invisibility. |
223. | What is the essence of software engineering? |
A. | requirements definition, design representation, knowledge capture and quality factors |
B. | maintaining configurations, organizing teams, channeling creativity and planning resource use |
C. | time/space tradeoffs, optimizing process, minimizing communication and problem decomposition |
D. | managing complexity, managing personnel resources, managing time and money and producing useful products |
Answer» D. managing complexity, managing personnel resources, managing time and money and producing useful products | |
Explanation: the essence of software engineering is managing complexity, personnel resources, time and money and producing useful products. |
224. | Which of the following is a life-cycle concern? |
A. | testing |
B. | portability |
C. | programming |
D. | planning |
Answer» D. planning | |
Explanation: planning is life-cycle concern. |
226. | What are the major activities of the spiral model of software engineering? | |
A. | planning, risk analysis, engineering, customer evaluation | |
B. | defining, prototyping, testing, delivery | |
C. | requirements | |
D. | quick design, build prototype, evaluate prototype, refine prototype | |
Answer» A. planning, risk analysis, engineering, customer evaluation | ||
Explanation: planning , risk analysis ,engineering and customer evaluation are the important four major activities of the spiral model. | ||
227. | In choosing a development life-cycle model, one would consider the |
A. | development group expertise, problem characteristics, user expectations |
B. | languages, development schedule, competition |
C. | system context, user population, platforms |
D. | organizational structure, user tasks, performance criteria |
Answer» A. development group expertise, problem characteristics, user expectations | |
Explanation: choice a is the apt among all the answers for choosing a development life cycle model. |
228. | What are the factors to be considered when planning a software development effort? |
A. | performance, problem, product, planning |
B. | people, problem, product, process |
C. | people, problem, productivity, performance |
D. | people, problem, product, portability |
Answer» B. people, problem, product, process | |
Explanation: people, problem, product& process factors are considered when planning a software development effort. |
229. | Views of quality software would not include |
A. | optimizing price and performance |
B. | minimizing the execution errors |
C. | conformance to specification |
D. | establishing valid requirements |
Answer» B. minimizing the execution errors | |
Explanation: minimizing the execution errors would not included in views of quality software. |
230. | Software configuration activities would not include |
A. | identify change |
B. | control change |
C. | ensure improper implementation of change |
D. | report change to interested parties |
Answer» C. ensure improper implementation of change | |
Explanation: software configuration activities would include proper implementation of change. |
231. | In planning a software project one would |
A. | find ways to produce results using limited resources |
B. | pad the schedule to accommodate errors |
C. | overestimate the budget |
D. | structure the team to prevent administrative interference |
Answer» A. find ways to produce results using limited resources | |
Explanation: in planning a software project i would find ways to produce results using limited resources |
232. | A systematic approach to software development, as epitomized by the various life-cycle models, is useful in |
A. | helping us understand the nature of the software product |
B. | convincing the customer that we know what we are doing |
C. | filling texts on software engineering |
D. | managing the various activities necessary to get the job done |
Answer» D. managing the various activities necessary to get the job done | |
Explanation: a systematic approach to software development, as epitomized by the various life-cycle models, is useful in managing the various activities necessary to get the job done. |
233. | A process view in software engineering would consider which of the following |
A. | product performance |
B. | staffing |
C. | functionality |
D. | reliability |
Answer» B. staffing | |
Explanation: staffing is the apt choice among the given |
234. | What would be investigated during Requirements analysis? |
A. | system performance , test scheduling, organizational structure |
B. | languages , platforms, competition |
C. | system context , user populations, user tasks |
D. | verification, formal methods, accuracy |
Answer» C. system context , user populations, user tasks | |
Explanation: c is the right choice. |
235. | Which of the following is not a description of planning? |
A. | planning is used to find credible ways to produce results with limited resources and limited schedule flexibility |
B. | planning is finding new personnel resources to support labor intensive development |
C. | planning is identifying and accommodating the unforeseen |
D. | planning is blending the efforts of many people to produce a product that satisfies the customer’s need |
Answer» B. planning is finding new personnel resources to support labor intensive development | |
Explanation: planning is finding new personnel resources to support labor intensive development is not descriptive of planning |
236. | The information we need to capture during requirements analysis not include |
A. | hiring authority |
B. | communication paths |
C. | synchronization |
D. | temporal dependencies |
Answer» A. hiring authority | |
Explanation: the information we need to capture during requirements analysis would probably not include hiring authority . |
237. | Which among the following measures how strongly the elements within a module are related? |
A. | coupling |
B. | cohesion |
C. | aggregation |
D. | inheritance |
Answer» B. cohesion | |
Explanation: cohesion measures how strongly the elements within a module are related. |
238. | What do you call, when the elements of a module, all operate on the same data? |
A. | functional cohesion |
B. | temporal cohesion |
C. | procedural cohesion |
D. | communicational cohesion |
Answer» D. communicational cohesion | |
Explanation: when the elements of a module all operate on the same data we call it as a communicational cohesion. |
239. | Which tests are designed to confront the program with abnormal situations? |
A. | recovery testing |
B. | security testing |
C. | stress testing |
D. | performance testing |
Answer» C. stress testing | |
Explanation: stress testing is to confront the program with abnormal situations. |
240. | Which is not involved in software development process? |
A. | people |
B. | problem |
C. | practice |
D. | process |
Answer» C. practice | |
Explanation: practice is not involved in software development process. |
241. | How does a software project manager need to act to minimize the risk of software failure? |
A. | double the project team size |
B. | request a large budget |
C. | form a small software team |
D. | track progress |
Answer» D. track progress | |
Explanation: a software project manager need to act to minimize the risk of software failure by tracking the progress of software |
242. | To be an effective aid in process improvement the baseline metrics used must be |
A. | based on reasonable estimates from failed projects |
B. | measured consistently across projects |
C. | drawn from large projects only |
D. | based only on successful projects |
Answer» B. measured consistently across projects | |
Explanation: to be an effective aid in process improvement the baseline metrics used must be measured consistently across projects |
243. | Empirical estimation models are typically based on |
A. | expert judgment based on past project experiences |
B. | refinement of current project estimation |
C. | regression models derived from historical project data |
D. | trial and error determination of the parameters and coefficients |
Answer» C. regression models derived from historical project data | |
Explanation: empirical estimation models are typically based on regression models derived from historical project data. |
244. | Which of the following is not the guiding principle of software project scheduling? |
A. | compartmentalization |
B. | market assessment |
C. | time allocation |
D. | effort validation |
Answer» B. market assessment |
245. | PERT. |
A. | both (i) and (iii) above |
B. | both (i) and (iv) above |
C. | both (ii) and (iv) above |
D. | both (ii) and (iii) above |
Answer» B. both (i) and (iv) above | |
Explanation: two tools for computing critical path and project completion times from activity networks are cpm &pert |
246. | The purpose of earned value analysis is to |
A. | determine how to compensate developers based on their productivity |
B. | provide a quantitative means of assessing software project progress |
C. | provide a qualitative means of assessing software project progress |
D. | set the price point for a software product based on development effort |
Answer» B. provide a quantitative means of assessing software project progress | |
Explanation: the purpose of earned value analysis is to provide a quantitative means of assessing software project progress |
247. | The rapid application development model is |
A. | same as component-based development |
B. | a useful approach when a customer cannot define requirements clearly |
C. | a high-speed adaptation of the linear sequential model |
D. | same as incremental model |
Answer» C. a high-speed adaptation of the linear sequential model | |
Explanation: the rapid application development model is a high-speed adaptation of the linear sequential model. |
248. | Which of the following is not an objective for building analysis models? |
A. | define set of software requirements that can be validated |
B. | describe customer requirements |
C. | develop a solution for the problem |
D. | establish basis for software design |
Answer» C. develop a solution for the problem | |
Explanation: develop a solution for the problem is not an objective for building analysis models? |
249. | The entity relationship diagram |
A. | depicts relationships between data objects |
B. | depicts functions that transform the data flow |
C. | indicates how data are transformed by the system |
D. | indicates system reactions to external events |
Answer» A. depicts relationships between data objects | |
Explanation: the entity relationship diagram depicts relationships between data objects |
251. | Coupling is a qualitative indication of the degree to which a module |
A. | can be written more compactly |
B. | focuses on just one thing |
C. | is able to complete its function in a timely manner |
D. | is connected to other modules |
Answer» D. is connected to other modules | |
Explanation: coupling is a qualitative indication of the degree to which a module is connected to other modules. |
252. | Provide an on-line tutorial |
A. | only (i) above |
B. | only (ii) above |
C. | only (iii) above |
D. | (i), (ii) and (iii) above |
Answer» D. (i), (ii) and (iii) above | |
Explanation: the following define intuitive shortcuts ,disclose information in a progressive fashion, establish meaningful defaults interface design principles reduces the user’s memory load |
253. | Black box testing is also called |
A. | specification-based testing |
B. | structural testing |
C. | verification |
D. | unit testing |
Answer» A. specification-based testing | |
Explanation: black box testing is another name for specification-based testing. |
254. | Which configuration objects would not typically be found in the project database? |
A. | design specification |
B. | marketing data |
C. | executable code |
D. | test plans |
Answer» B. marketing data | |
Explanation: marketing data configuration objects would not typically be found in the project database |
255. | Statistical quality control. |
A. | only (i) above |
B. | only (ii) above |
C. | only (iii) above |
D. | both (i) and (ii) above |
Answer» C. only (iii) above | |
Explanation: the following task statistical quality control is not part of software configuration management |
256. | Which box specification is not associated with cleanroom approach? |
A. | black box |
B. | clear box |
C. | state box |
D. | white box |
Answer» D. white box | |
Explanation: white box specification is not associated with cleanroom approach |
257. | Which of the following is not a logical layer of the application in client server system? |
A. | presentation layer |
B. | application layer |
C. | data management layer |
D. | programming layer |
Answer» D. programming layer | |
Explanation: programming is not a logical layer of the application in client server |
258. | Which of the following is true for a thin-client? |
A. | processes application logic |
B. | performs data management task |
C. | places heavy processing load on the server |
D. | makes use of processing power of the client |
Answer» C. places heavy processing load on the server | |
Explanation: places heavy processing load on the server |
259. | Traditionally, the phase of software development where a formal approach used is |
A. | programming |
B. | design |
C. | requirements |
D. | planning |
Answer» A. programming | |
Explanation: traditionally, the only phase of software development where a formal approach is used is programming. |
260. | Choose the correct option in terms of Issues related to professional responsibility |
A. | confidentiality |
B. | intellectual property rights |
C. | both confidentiality & intellectual property rights |
D. | managing client relationships |
Answer» C. both confidentiality & intellectual property rights |
261. | “Software engineers should not use their technical skills to misuse other people’s computers.”Here the term misuse refers to: |
A. | unauthorized access to computer material |
B. | unauthorized modification of computer material |
C. | dissemination of viruses or other malware |
D. | all of the mentioned |
Answer» D. all of the mentioned |
262. | Select the incorrect statement: “Software engineers should |
A. | not knowingly accept work that is outside your competence.” |
B. | not use your technical skills to misuse other people’s computers.” |
C. | be dependent on their colleagues.” |
D. | maintain integrity and independence in their professional judgment.” |
Answer» C. be dependent on their colleagues.” |
263. | Efficiency in a software product does not include |
A. | responsiveness |
B. | licensing |
C. | memory utilization |
D. | processing time |
Answer» B. licensing |
264. | The reason for software bugs and failures is due to |
A. | software companies |
B. | software developers |
C. | both software companies and developers |
D. | all of the mentioned |
Answer» C. both software companies and developers |
265. | Company has latest computers and state- of the- art software tools, so we shouldn’t worry about the quality of the product. |
A. | true |
B. | false |
Answer» B. false |
266. | Build & Fix Model is suitable for programming exercises of LOC (Line of Code). |
A. | 100-200 |
B. | 200-400 |
C. | 400-1000 |
D. | above 1000 |
Answer» A. 100-200 |
267. | RAD stands for |
A. | relative application development |
B. | rapid application development |
C. | rapid application document |
D. | none of the mentioned |
Answer» B. rapid application development |
268. | Which one of the following models is not suitable for accommodating any change? |
A. | build & fix model |
B. | prototyping model |
C. | rad model |
D. | waterfall model |
Answer» D. waterfall model |
269. | Which is not one of the types of prototype of Prototyping Model? |
A. | horizontal prototype |
B. | vertical prototype |
C. | diagonal prototype |
D. | domain prototype |
Answer» C. diagonal prototype |
270. | Which one of the following is not a phase of Prototyping Model? |
A. | quick design |
B. | coding |
C. | prototype refinement |
D. | engineer product |
Answer» B. coding |
271. | Which of the following statements regarding Build & Fix Model is wrong? |
A. | no room for structured design |
B. | code soon becomes unfixable & unchangeable |
C. | maintenance is practically not possible |
D. | it scales up well to large projects |
Answer» D. it scales up well to large projects |
272. | RAD Model has |
A. | 2 phases |
B. | 3 phase |
C. | 5 phases |
D. | 6 phases |
Answer» C. 5 phases |
273. | What is the major drawback of using RAD Model? |
A. | highly specialized & skilled developers/designers are required |
B. | increases reusability of components |
C. | encourages customer/client feedback |
D. | increases reusability of components, highly specialized & skilled developers/designers are required |
Answer» D. increases reusability of components, highly specialized & skilled developers/designers are required |
274. | SDLC stands for |
A. | software development life cycle |
B. | system development life cycle |
C. | software design life cycle |
D. | system design life cycle |
Answer» A. software development life cycle |
276. | Agile Software Development is based on | |
A. | incremental development | |
B. | iterative development | |
C. | linear development | |
D. | both incremental and iterative development | |
Answer» D. both incremental and iterative development | ||
277. | Which on of the following is not an agile method? |
A. | xp |
B. | 4gt |
C. | aup |
D. | all of the mentioned |
Answer» B. 4gt |
278. | Agility is defined as the ability of a project team to respond rapidly to a change. |
A. | true |
B. | false |
Answer» B. false |
279. | How is plan driven development different from agile development ? |
A. | outputs are decided through a process of negotiation during the software development process |
B. | specification, design, implementation and testing are interleaved |
C. | iteration occurs within activities |
D. | all of the mentioned |
Answer» C. iteration occurs within activities |
280. | How many phases are there in Scrum ? |
A. | two |
B. | three |
C. | four |
D. | scrum is an agile method which means it does not have phases |
Answer» B. three |
281. | Which of the following does not apply to agility to a software process? |
A. | uses incremental product delivery strategy |
B. | only essential work products are produced |
C. | eliminate the use of project planning and testing |
D. | all of the mentioned |
Answer» C. eliminate the use of project planning and testing |
282. | Incremental development in Extreme Programming (XP) is supported through a system release once every month. |
A. | true |
B. | false |
Answer» B. false |
283. | In XP, as soon as the work on a task is complete, it is integrated into the whole system. |
A. | true |
B. | false |
Answer» A. true |
284. | In XP Increments are delivered to customers every weeks. |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» B. two |
285. | Is a customer involved test development and validation in XP ? |
A. | yes |
B. | no |
C. | it may vary from customer to customer |
D. | none of the mentioned |
Answer» C. it may vary from customer to customer |
286. | Programmers prefer programming to testing and sometimes they take shortcuts when writing tests. For example, they may write incomplete tests that do not check for all possible exceptions that may occur. |
A. | true |
B. | false |
Answer» A. true |
287. | Tests are automated in Extreme Programming. |
A. | true |
B. | false |
Answer» A. true |
288. | In XP an automated unit test framework is used to write tests for a new piece of functionality before that functionality itself is implemented. |
A. | true |
B. | false |
Answer» A. true |
289. | Developers work individually on a release and they compare their results with other developers before forwarding that release to customers. |
A. | true |
B. | false |
Answer» B. false |
290. | Which four framework activities are found in the Extreme Programming(XP) ? |
A. | analysis, design, coding, testing |
B. | planning, analysis, design, coding |
C. | planning, design, coding, testing |
D. | planning, analysis, coding, testing |
Answer» C. planning, design, coding, testing |
291. | Which one of the following is a functional requirement ? |
A. | maintainability |
B. | portability |
C. | robustness |
D. | none of the mentioned |
Answer» D. none of the mentioned |
292. | “Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What kind of a requirement the system is providing ? |
A. | functional |
B. | non-functional |
C. | known requirement |
D. | none of the mentioned |
Answer» A. functional |
293. | Which of the following statements explains portability in non-functional requirements? |
A. | it is a degree to which software running on one platform can easily be converted to run on another platform |
B. | it cannot be enhanced by using languages, os’ and tools that are universally available and standardized |
C. | the ability of the system to behave consistently in a user-acceptable manner when operating within the environment for which the system was intended |
D. | none of the mentioned |
Answer» A. it is a degree to which software running on one platform can easily be converted to run on another platform |
294. | Functional requirements capture the intended behavior of the system. |
A. | true |
B. | false |
Answer» A. true |
295. | Choose the incorrect statement with respect to Non-Functional Requirement(NFR). |
A. | product-oriented approach – focus on system (or software) quality |
B. | process-oriented approach – focus on how nfrs can be used in the design process |
C. | quantitative approach – find measurable scales for the functionality attributes |
D. | qualitative approach – study various relationships between quality goals |
Answer» C. quantitative approach – find measurable scales for the functionality attributes |
296. | How many classification schemes have been developed for NFRs ? |
A. | two |
B. | three |
C. | four |
D. | five |
Answer» D. five |
297. | According to components of FURPS+, which of the following does not belong to S ? |
A. | testability |
B. | speed efficiency |
C. | serviceability |
D. | installability |
Answer» B. speed efficiency |
298. | Does software wear & tear by decomposition ? |
A. | yes |
B. | no |
Answer» B. no |
299. | Choose the correct statement on how NFRs integrates with Rational Unified Process ? |
A. | system responds within 4 seconds on average to local user requests and changes in the environment |
B. | system responds within 4 seconds on average to remote user requests and changes in the environment |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» B. system responds within 4 seconds on average to remote user requests and changes in the environment |
301. | How many feasibility studies is conducted in Requirement Analysis ? |
A. | two |
B. | three |
C. | four |
D. | none of the mentioned |
Answer» B. three |
302. | 2 REQUIREMENT ENGINEERING PROCESS: FEASIBILITY STUDIES, |
A. | three |
B. | four |
C. | five |
D. | six |
Answer» C. five |
303. | Traceability is not considered in Requirement Analysis. |
A. | true |
B. | false |
Answer» B. false |
304. | Requirements analysis is critical to the success of a development project. |
A. | true |
B. | false |
C. | depends upon the size of project |
D. | none of the mentioned |
Answer» A. true |
305. | and are the two issues of Requirement Analysis. |
A. | performance, design |
B. | stakeholder, developer |
C. | functional, non-functional |
D. | none of the mentioned |
Answer» B. stakeholder, developer |
306. | The requirements that result from requirements analysis are typically expressed from one of three perspectives or views.WhaT is that perspective or view ? |
A. | developer |
B. | user |
C. | non-functional |
D. | physical |
Answer» D. physical |
307. | Requirements Analysis is an Iterative Process. |
A. | true |
B. | false |
Answer» A. true |
308. | Coad and Yourdon suggested selection characteristics that should be used as an analyst considers each potential object for inclusion in the requirement analysis model. |
A. | three |
B. | four |
C. | five |
D. | six |
Answer» D. six |
309. | Requirements should specify ‘what’ but not ‘how’. |
A. | true |
B. | false |
Answer» A. true |
310. | What are the types of requirements ? |
A. | availability |
B. | reliability |
C. | usability |
D. | all of the mentioned |
Answer» D. all of the mentioned |
311. | Select the developer-specific requirement ? |
A. | portability |
B. | maintainability |
C. | availability |
D. | both portability and maintainability |
Answer» D. both portability and maintainability |
312. | Which one of the following is not a step of requirement engineering? |
A. | elicitation |
B. | design |
C. | analysis |
D. | documentation |
Answer» B. design |
313. | FAST stands for |
A. | functional application specification technique |
B. | fast application specification technique |
C. | facilitated application specification technique |
D. | none of the mentioned |
Answer» C. facilitated application specification technique |
314. | QFD stands for |
A. | quality function design |
B. | quality function development |
C. | quality function deployment |
D. | none of the mentioned |
Answer» C. quality function deployment |
315. | A Use-case actor is always a person having a role that different people may play. |
A. | true |
B. | false |
Answer» B. false |
316. | The user system requirements are the parts of which document ? |
A. | sdd |
B. | srs |
C. | ddd |
D. | srd |
Answer» B. srs |
317. | A stakeholder is anyone who will purchase the completed software system under development. |
A. | true |
B. | false |
Answer» B. false |
318. | Conflicting requirements are common in Requirement Engineering, with each client proposing his or her version is the right one. |
A. | true |
B. | false |
Answer» A. true |
319. | Which is one of the most important stakeholder from the following ? |
A. | entry level personnel |
B. | middle level stakeholder |
C. | managers |
D. | users of the software |
Answer» D. users of the software |
320. | SA/SD features are obtained from which of the methodologies? |
A. | constantine and yourdon methodology |
B. | demarco and yourdon methodology |
C. | gane and sarson methodology |
D. | all of the mentioned |
Answer» D. all of the mentioned |
321. | Which of the following is not an activity of Structured Analysis (SA) ? |
A. | functional decomposition |
B. | transformation of a textual problem description into a graphic model |
C. | all the functions represented in the dfd are mapped to a module structure |
D. | all of the mentioned |
Answer» C. all the functions represented in the dfd are mapped to a module structure |
322. | To arrive at a form which is suitable for implementation in some programming language is the purpose of |
A. | none of the below |
B. | structured design (sd) |
C. | detailed design (dd) |
D. | none of the mentioned |
Answer» B. structured design (sd) |
323. | The results of structured analysis can be easily understood by ordinary customers. |
A. | true |
B. | false |
Answer» A. true |
324. | Structured Analysis is based on the principle of Bottom-Up Approach. |
A. | true |
B. | false |
Answer» B. false |
326. | A directed arc or line in DFD represents | |
A. | data store | |
B. | data process | |
C. | data flow | |
D. | all of the mentioned | |
Answer» C. data flow | ||
327. | A DFD is always accompanied by a data dictionary. |
A. | true |
B. | false |
Answer» A. true |
328. | Data Store Symbol in DFD represents a |
A. | physical file |
B. | data structure |
C. | logical file |
D. | all of the mentioned |
Answer» D. all of the mentioned |
329. | Why does architectural design occurs during product design? |
A. | stakeholders must convinced that their needs will be met, which may be difficult without demonstrating how the engineers plan to build the product |
B. | product designers must judge the feasibility of their designs |
C. | project planners must have some idea about what software must be built to create schedules and allocate resources |
D. | all of the mentioned |
Answer» D. all of the mentioned |
330. | What kind of investments does organization have in order to make most of by the software architects in their design? |
A. | libraries |
B. | standards and guidelines |
C. | software tools |
D. | all of the mentioned |
Answer» D. all of the mentioned |
331. | Which of the following is true? |
A. | the input of architectural design process is sad |
B. | the output of architectural design process is srs |
C. | the input of architectural design process is srs |
D. | none of the mentioned |
Answer» C. the input of architectural design process is srs |
332. | Which of these steps are followed in architectural design process? |
A. | analyze srs |
B. | evaluate candidate architectures |
C. | select architecture and finalize architecture |
D. | all of the mentioned |
Answer» D. all of the mentioned |
333. | Which of these are the content for SAD? |
A. | product overview |
B. | architectural models |
C. | architectural design rationale |
D. | all of the mentioned |
Answer» D. all of the mentioned |
334. | Which of these are included in the product overview for SAD? |
A. | product vision, assumptions, constraints |
B. | product scope |
C. | target markets, business requirements |
D. | product vision, assumptions, constraints, target markets & business requirements |
Answer» D. product vision, assumptions, constraints, target markets & business requirements |
335. | Which amount the following is correct? |
A. | architectural models explains the main design decisions made in arriving the architecture |
B. | architectural design rationale presents architecture, using variety of models to represent different aspects or views |
C. | mapping between models says sometimes it is difficult to connect different architectural models |
D. | all of the mentioned |
Answer» C. mapping between models says sometimes it is difficult to connect different architectural models |
336. | What are the categories in which quality attributes are divided in? |
A. | development attributes |
B. | operational attributes |
C. | functional attributes |
D. | development & operational attributes |
Answer» D. development & operational attributes |
337. | Which of these comes under development attribute? |
A. | maintainability |
B. | reusability |
C. | performance |
D. | maintainability & reusability |
Answer» D. maintainability & reusability |
338. | Which of these comes under operational attributes? |
A. | performance |
B. | availability |
C. | reliability |
D. | all of the mentioned |
Answer» D. all of the mentioned |
339. | What makes a good architecture? |
A. | the architecture may not be the product of a single architect or a small group |
B. | the architect should have the technical requirements for the system and an articulated and prioritized list of qualitative properties |
C. | the architecture may not be well documented |
D. | all of the mentioned |
Answer» B. the architect should have the technical requirements for the system and an articulated and prioritized list of qualitative properties |
340. | What does a typical top level architecture consists of? |
A. | prop loss model(mopd) |
B. | reverb model(modr) |
C. | control process |
D. | all of the mentioned |
Answer» D. all of the mentioned |
341. | Which among the following are valid questions raised for the top level architectural model? |
A. | what is the nature of components? |
B. | what is the significance of the links? |
C. | what is the significance of the layout? |
D. | all of the mentioned |
Answer» D. all of the mentioned |
342. | Which of the following are correct statements? |
A. | an architecture may or may not defines components |
B. | an architecture is not dependable on requirements |
C. | an architecture is foremost an abstraction of a system that suppresses details of the components that do not affect how they are used |
D. | all of the mentioned |
Answer» C. an architecture is foremost an abstraction of a system that suppresses details of the components that do not affect how they are used |
343. | What does “Every software system has an architecture” implies? |
A. | system itself is a component |
B. | architecture an exist independently of its description or specification |
C. | all the system to be stable should posses an architecture |
D. | none of the mentioned |
Answer» C. all the system to be stable should posses an architecture |
344. | What is architectural style? |
A. | architectural style is a description of component types |
B. | it is a pattern of run-time control |
C. | it is set of constraints on architecture |
D. | all of the mentioned |
Answer» D. all of the mentioned |
345. | What is a Reference Model? |
A. | it is a division of functionality together with data flow between the pieces |
B. | it is a description of component types |
C. | it is standard decomposition of a known problem into parts that cooperatively solve a problem |
D. | it is a division of functionality together with data flow between the pieces, it is standard decomposition of a known problem into parts that cooperatively solve a problem |
Answer» D. it is a division of functionality together with data flow between the pieces, it is standard decomposition of a known problem into parts that cooperatively solve a problem |
346. | What is Reference architecture? |
A. | it is a reference model mapped onto software components |
B. | it provided data flow with comments |
C. | it provides data flow with pieces |
D. | it is a reference model mapped onto software components & data flow with comments |
Answer» D. it is a reference model mapped onto software components & data flow with comments |
347. | Which of the following is incorrect for Reference model, architectural styles and reference architecture? |
A. | they are not architectures |
B. | they are useful steps towards an architecture |
C. | they are set of early design decisions |
D. | none of the mentioned |
Answer» D. none of the mentioned |
348. | Which of the following can be considered regarding client and server? |
A. | client and server is an architectural style |
B. | client and server may be considered as an architectural style |
C. | client and server is not an architectural style |
D. | none of the mentioned |
Answer» A. client and server is an architectural style |
349. | Which of the statements truly concludes client and server relation with architectural styles? |
A. | they are component types and their coordination is described in terms of protocols that server uses to communicate with each of its clients |
B. | multiple client cannot exist at an instance |
C. | architecture are countless for client and server but their architectural styles are different |
D. | all of the mentioned |
Answer» A. they are component types and their coordination is described in terms of protocols that server uses to communicate with each of its clients |
351. | Which of the following is true? | |
A. | architecture is low level design | |
B. | architecture is mid level design | |
C. | architecture is high level design | |
D. | none of the mentioned | |
Answer» C. architecture is high level design | ||
352. | What is Architecture? |
A. | architecture is components |
B. | architecture is connectors |
C. | architecture is constraints |
D. | all of the mentioned |
Answer» D. all of the mentioned |
353. | Which of the following is golden rule for interface design? |
A. | place the user in control |
B. | reduce the user’s memory load |
C. | make the interface consistent |
D. | all of the mentioned |
Answer» D. all of the mentioned |
354. | Which of the following is not a design principle that allow the user to maintain control? |
A. | provide for flexible interaction |
B. | allow user interaction to be interrupt-able and undo-able |
C. | show technical internals from the casual user |
D. | design for direct interaction with objects that appear on the screen |
Answer» C. show technical internals from the casual user |
355. | Which of the following is not a user interface design process? |
A. | user, task, and environment analysis and modeling |
B. | interface design |
C. | knowledgeable, frequent users |
D. | interface validation |
Answer» C. knowledgeable, frequent users |
356. | 3 USER INTERFACE DESIGN: INTERFACE |
A. | short-term memory |
B. | shortcuts |
C. | objects that appear on the screen |
D. | all of the mentioned |
Answer» A. short-term memory |
357. | Which of the following option is not considered by the Interface design? |
A. | the design of interfaces between software components |
B. | the design of interfaces between the software and human producers and consumers of information |
C. | the design of the interface between two computers |
D. | all of the mentioned |
Answer» C. the design of the interface between two computers |
358. | A software might allow a user to interact via |
A. | keyboard commands |
B. | mouse movement |
C. | voice recognition commands |
D. | all of the mentioned |
Answer» D. all of the mentioned |
359. | A software engineer designs the user interface by applying an iterative process that draws on predefined design principles. |
A. | true |
B. | false |
Answer» A. true |
360. | What incorporates data, architectural, interface, and procedural representations of the software? |
A. | design model |
B. | user’s model |
C. | mental image |
D. | system image |
Answer» A. design model |
361. | What establishes the profile of end-users of the system? |
A. | design model |
B. | user’s model |
C. | mental image |
D. | system image |
Answer» B. user’s model |
362. | What combines the outward manifestation of the computer-based system , coupled with all supporting information that describe system syntax and semantics? |
A. | mental image |
B. | interface design |
C. | system image |
D. | interface validation |
Answer» C. system image |
363. | Which of the following steps is applied to develop a decision table? |
A. | list all actions that can be associated with a specific procedure |
B. | list all conditions during execution of the procedure |
C. | define rules by indicating what action(s) occurs for a set of conditions |
D. | all of the mentioned |
Answer» D. all of the mentioned |
364. | is a pidgin(simplified version of a language that develops as a means of communication between two or more groups that do not have a language in common) |
A. | program design language |
B. | structured english |
C. | pseudocode |
D. | all of the mentioned |
Answer» D. all of the mentioned |
365. | Which of the following term is best defined by the statement:”The ability to represent local and global data is an essential element of component-level design.”? |
A. | data representation |
B. | logic verification |
C. | “code-to” ability |
D. | automatic processing |
Answer» A. data representation |
366. | A software component |
A. | implements some functionality |
B. | has explicit dependencies through provides and required interfaces |
C. | communicates through its interfaces only |
D. | all of the mentioned |
Answer» D. all of the mentioned |
367. | Which diagram evolved from a desire to develop a procedural design representation that would not allow violation of the structured constructs? |
A. | state transition diagram |
B. | box diagram |
C. | er diagram |
D. | none of the mentioned |
Answer» B. box diagram |
368. | A executes the loop task first, then tests a condition and repeats the task until the condition fails. |
A. | repeat until |
B. | condition |
C. | do while tests |
D. | if then-else |
Answer» A. repeat until |
369. | Which of the following is not a characteristics of box diagram? |
A. | functional domain |
B. | arbitrary transfer of control is impossible |
C. | recursion is easy to represent |
D. | providing a notation that translates actions and conditions |
Answer» D. providing a notation that translates actions and conditions |
370. | The is represented as two processing boxes connected by an line (arrow) of control. |
A. | repetition |
B. | sequence |
C. | condition |
D. | none of the mentioned |
Answer» B. sequence |
371. | Which of the following term is best defined by the statement “Notation that can be input directly into a computer-based development system offers significant benefits.”? |
A. | machine readability |
B. | maintainability |
C. | structure enforcement |
D. | overall simplicity |
Answer» A. machine readability |
372. | Which of the following term describes testing? |
A. | finding broken code |
B. | evaluating deliverable to find errors |
C. | a stage of all projects |
D. | none of the mentioned |
Answer» B. evaluating deliverable to find errors |
373. | What is Cyclomatic complexity? |
A. | black box testing |
B. | white box testing |
C. | yellow box testing |
D. | green box testing |
Answer» B. white box testing |
374. | Lower and upper limits are present in which chart? |
A. | run chart |
B. | bar chart |
C. | control chart |
D. | none of the mentioned |
Answer» A. run chart |
376. | White Box techniques are also classified as | |
A. | design based testing | |
B. | structural testing | |
C. | error guessing technique | |
D. | none of the mentioned | |
Answer» B. structural testing | ||
377. | Exhaustive testing is |
A. | always possible |
B. | practically possible |
C. | impractical but possible |
D. | impractical and impossible |
Answer» C. impractical but possible |
378. | Which of the following is/are White box technique? |
A. | statement testing |
B. | decision testing |
C. | condition coverage |
D. | all of the mentioned |
Answer» D. all of the mentioned |
379. | What are the various Testing Levels? |
A. | unit testing |
B. | system testing |
C. | integration testing |
D. | all of the mentioned |
Answer» D. all of the mentioned |
380. | Boundary value analysis belong to? |
A. | white box testing |
B. | black box testing |
C. | white box & black box testing |
D. | none of the mentioned |
Answer» B. black box testing |
381. | Alpha testing is done at |
A. | developer’s end |
B. | user’s end |
C. | developer’s & user’s end |
D. | none of the mentioned |
Answer» A. developer’s end |
382. | Software Debugging is a set of activities that can be planned in advance and conducted systematically. |
A. | true |
B. | false |
Answer» B. false |
383. | Which of the following is not a software testing generic characteristics? |
A. | different testing techniques are appropriate at different points in time |
B. | testing is conducted by the developer of the software or an independent test group |
C. | testing and debugging are different activities, but debugging must be accommodated in any testing strategy |
D. | none of the mentioned |
Answer» A. different testing techniques are appropriate at different points in time |
384. | ITG stands for |
A. | instantaneous test group |
B. | integration testing group |
C. | individual testing group |
D. | independent test group |
Answer» D. independent test group |
385. | By collecting during software testing, it is possible to develop meaningful guidelines to halt the testing process. |
A. | failure intensity |
B. | testing time |
C. | metrics |
D. | all of the mentioned |
Answer» C. metrics |
386. | Test cases should uncover errors like |
A. | nonexistent loop termination |
B. | comparison of different data types |
C. | incorrect logical operators or precedence |
D. | all of the mentioned |
Answer» A. nonexistent loop termination |
387. | Which of the following errors should not be tested when error handling is evaluated? |
A. | error description is unintelligible |
B. | error noted does not correspond to error encountered |
C. | error condition causes system intervention prior to error handling |
D. | error description provide enough information to assist in the location of the cause of the error |
Answer» A. error description is unintelligible |
388. | What is normally considered as an adjunct to the coding step |
A. | integration testing |
B. | unit testing |
C. | completion of testing |
D. | regression testing |
Answer» B. unit testing |
389. | Which of the following is not regression test case? |
A. | a representative sample of tests that will exercise all software functions |
B. | additional tests that focus on software functions that are likely to be affected by the change |
C. | tests that focus on the software components that have been changed |
D. | low-level components are combined into clusters that perform a specific software sub- function |
Answer» D. low-level components are combined into clusters that perform a specific software sub- function |
390. | Which testing is an integration testing approach that is commonly used when “shrink-wrapped” software products are being developed? |
A. | regression testing |
B. | integration testing |
C. | smoke testing |
D. | validation testing |
Answer» C. smoke testing |
391. | In which testing level the focus is on customer usage? |
A. | alpha testing |
B. | beta testing |
C. | validation testing |
D. | both alpha and beta |
Answer» D. both alpha and beta |
392. | Validation refers to the set of tasks that ensure that software correctly implements a specific function. |
A. | true |
B. | false |
Answer» B. false |
393. | What are the problems with re-structuring? |
A. | loss of comments |
B. | loss of documentation |
C. | heavy computational demands |
D. | all of the mentioned |
Answer» B. loss of documentation |
394. | Which of the following is not a module type? |
A. | object modules |
B. | hardware modules |
C. | functional modules |
D. | process support modules |
Answer» A. object modules |
395. | Reverse engineering of data focuses on |
A. | internal data structures |
B. | database structures |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» C. all of the mentioned |
396. | Forward engineering is not necessary if an existing software product is producing the correct output. |
A. | true |
B. | false |
Answer» B. false |
397. | Which of the following is not an example of a business process? |
A. | designing a new product |
B. | hiring an employee |
C. | purchasing services |
D. | testing software |
Answer» D. testing software |
398. | Which of the following is a data problem? |
A. | hardware problem |
B. | record organisation problems |
C. | heavy computational demands |
D. | loss of comments |
Answer» B. record organisation problems |
399. | When does one decides to re-engineer a product? |
A. | when tools to support restructuring are disabled |
B. | when system crashes frequently |
C. | when hardware or software support becomes obsolete |
D. | subsystems of a larger system require few maintenance |
Answer» C. when hardware or software support becomes obsolete |
401. | Which of these benefits can be achieved when software is restructured? |
A. | higher quality programs |
B. | reduced maintenance effort |
C. | software easier to test |
D. | all of the mentioned |
Answer» D. all of the mentioned |
402. | Data re-engineering may be part of the process of migrating from a file-based system to a DBMS-based system or changing from one DBMS to another. |
A. | true |
B. | false |
Answer» A. true |
403. | BPR stands for |
A. | business process re-engineering |
B. | business product re-engineering |
C. | business process requirements |
D. | none of the mentioned |
Answer» A. business process re-engineering |
404. | Source code translation is a part of which re-engineering technique? |
A. | data re-engineering |
B. | refactoring |
C. | restructuring |
D. | none of the mentioned |
Answer» C. restructuring |
405. | In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code? |
A. | interactivity |
B. | completeness |
C. | abstraction level |
D. | direction level |
Answer» C. abstraction level |
406. | In reverse engineering, what refers to the level of detail that is provided at an abstraction level? |
A. | interactivity |
B. | completeness |
C. | abstraction level |
D. | directionality |
Answer» B. completeness |
407. | The core of reverse engineering is an activity called |
A. | restructure code |
B. | directionality |
C. | extract abstractions |
D. | interactivity |
Answer» C. extract abstractions |
408. | What have become de rigueur for computer-based products and systems of every type? |
A. | guis |
B. | candidate keys |
C. | object model |
D. | all of the mentioned |
Answer» A. guis |
409. | Forward engineering is also known as |
A. | extract abstractions |
B. | renovation |
C. | reclamation |
D. | both renovation and reclamation |
Answer» D. both renovation and reclamation |
410. | Reverse engineering is the process of deriving the system design and specification from its |
A. | gui |
B. | database |
C. | source code |
D. | all of the mentioned |
Answer» C. source code |
411. | Reverse engineering techniques for internal program data focus on the definition of classes of objects. |
A. | true |
B. | false |
Answer» A. true |
412. | Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model: |
A. | build an initial object model |
B. | determine candidate keys |
C. | refine the tentative classes |
D. | discover user interfaces |
Answer» D. discover user interfaces |
413. | Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing |
A. | candidate keys |
B. | interface |
C. | database structure |
D. | none of the mentioned |
Answer» B. interface |
414. | Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called |
A. | data analysis |
B. | directionality |
C. | data extraction |
D. | client applications |
Answer» A. data analysis |
415. | Transformation of a system from one representational form to another is known as |
A. | re-factoring |
B. | restructuring |
C. | forward engineering |
D. | both re-factoring and restructuring |
Answer» D. both re-factoring and restructuring |
416. | Which of the following is not an objective of reverse engineering? |
A. | to reduce maintenance effort |
B. | to cope with complexity |
C. | to avoid side effects |
D. | to assist migration to a case environment |
Answer» D. to assist migration to a case environment |
417. | Why is decomposition technique required? |
A. | software project estimation is a form of problem solving |
B. | developing a cost and effort estimate for a software project is too complex |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» C. all of the mentioned |
418. | Cost and effort estimation of a software uses only one forms of decomposition, either decomposition of the problem or decomposition of the process. |
A. | true |
B. | false |
Answer» B. false |
419. | If a Direct approach to software project sizing is taken, size can be measured in |
A. | loc |
B. | fp |
C. | loc and fp |
D. | none of the mentioned |
Answer» A. loc |
420. | Which software project sizing approach develop estimates of the information domain characteristics? |
A. | function point sizing |
B. | change sizing |
C. | standard component sizing |
D. | fuzzy logic sizing |
Answer» A. function point sizing |
421. | How many forms exists of Barry Boehm’s COCOMO Model? |
A. | two |
B. | three |
C. | four |
D. | no form exists |
Answer» B. three |
422. | Who suggested the four different approaches to the sizing problem? |
A. | putnam |
B. | myers |
C. | boehm |
D. | putnam and myers |
Answer» D. putnam and myers |
423. | In many cases, it is often more cost- effective to acquire, rather than develop, computer software. |
A. | true |
B. | false |
Answer» A. true |
424. | A make-buy decision is based on whether |
A. | the software may be purchased off-the- shelf |
B. | “full-experience” or “partial-experience” software components should be used |
C. | customer-built software should be developed |
D. | all of the mentioned |
Answer» D. all of the mentioned |
426. | The project planner must reconcile the estimates based on decomposition techniques to produce a single estimate of effort. | |
A. | true | |
B. | false | |
Answer» B. false | ||
427. | Programming language experience is a part of which factor of COCOMO cost drivers? |
A. | personnel factor |
B. | product factor |
C. | platform factor |
D. | project factor |
Answer» A. personnel factor |
428. | If an Indirect approach is taken, then the sizing approach is represented as |
A. | loc |
B. | fp |
C. | fuzzy logic |
D. | loc and fp |
Answer» B. fp |
429. | Which of the following is the reason that software is delivered late? |
A. | changing customer requirements that are not reflected in schedule changes |
B. | technical difficulties that could not have been foreseen in advance |
C. | human difficulties that could not have been foreseen in advance |
D. | all of the mentioned |
Answer» D. all of the mentioned |
430. | Which of the following is an activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks? |
A. | software macroscopic schedule |
B. | software project scheduling |
C. | software detailed schedule |
D. | none of the mentioned |
Answer» B. software project scheduling |
431. | Every task that is scheduled should be assigned to a specific team member is termed as |
A. | compartmentalization |
B. | defined milestones |
C. | defined responsibilities |
D. | defined outcomes |
Answer» C. defined responsibilities |
432. | What is a collection of software engineering work tasks, milestones, and deliverables that must be accomplished to complete a particular project? |
A. | task set |
B. | degree of milestone |
C. | adaptation criteria |
D. | all of the mentioned |
Answer» A. task set |
433. | Ensuring that no more than the allocated number of people are allocated at any given time in Software Scheduling is known as |
A. | time allocation |
B. | effort validation |
C. | defined milestone |
D. | effort distribution |
Answer» B. effort validation |
434. | What is used to determine the recommended degree of rigor with which the software process should be applied on a project? |
A. | degree of rigor |
B. | adaptation criteria |
C. | task set |
D. | both degree of rigor and adaptation criteria |
Answer» B. adaptation criteria |
435. | What evaluates the risk associated with the technology to be implemented as part of project scope? |
A. | concept scoping |
B. | preliminary concept planning |
C. | technology risk assessment |
D. | customer reaction to the concept |
Answer» B. preliminary concept planning |
436. | Which of the following is not an adaptation criteria for software projects? |
A. | size of the project |
B. | customers complaints |
C. | project staff |
D. | mission criticality |
Answer» B. customers complaints |
437. | Which of the following is a project scheduling method that can be applied to software development? |
A. | pert |
B. | cpm |
C. | cmm |
D. | both pert and cpm |
Answer» D. both pert and cpm |
438. | A technique for performing quantitative analysis of progress is known as |
A. | bcws |
B. | eva |
C. | bac |
D. | cbse |
Answer» B. eva |
439. | What is the recommended distribution of effort for a project? |
A. | 40-20-40 |
B. | 50-20-30 |
C. | 30-40-30 |
D. | 50-30-20 |
Answer» A. 40-20-40 |
440. | A project usually has a timeline chart which was developed by |
A. | henry gantt |
B. | barry boehm |
C. | ivar jacabson |
D. | none of the mentioned |
Answer» A. henry gantt |
441. | Risk management is one of the most important jobs for a |
A. | client |
B. | investor |
C. | production team |
D. | project manager |
Answer» D. project manager |
442. | Which of the following risk is the failure of a purchased component to perform as expected? |
A. | product risk |
B. | project risk |
C. | business risk |
D. | programming risk |
Answer» A. product risk |
443. | Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”? |
A. | technology change |
B. | product competition |
C. | requirements change |
D. | none of the mentioned |
Answer» A. technology change |
444. | What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk? |
A. | risk monitoring |
B. | risk planning |
C. | risk analysis |
D. | risk identification |
Answer» A. risk monitoring |
445. | Which of the following risks are derived from the organizational environment where the software is being developed? |
A. | people risks |
B. | technology risks |
C. | estimation risks |
D. | organizational risks |
Answer» D. organizational risks |
446. | Which of the following risks are derived from the software or hardware technologies that are used to develop the system? |
A. | managerial risks |
B. | technology risks |
C. | estimation risks |
D. | organizational risks |
Answer» B. technology risks |
447. | Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.”? |
A. | underestimated development time |
B. | organizational restructuring |
C. | requirements changes |
D. | none of the mentioned |
Answer» C. requirements changes |
448. | Which of the following strategies means that the impact of the risk will be reduced? |
A. | avoidance strategies |
B. | minimization strategies |
C. | contingency plans |
D. | all of the mentioned |
Answer» B. minimization strategies |
449. | Risk management is now recognized as one of the most important project management tasks. |
A. | true |
B. | false |
Answer» A. true |
451. | Which one is not a risk management activity? | |
A. | risk assessment | |
B. | risk generation | |
C. | risk control | |
D. | none of the mentioned | |
Answer» B. risk generation | ||
452. | What is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss? |
A. | risk exposure |
B. | risk prioritization |
C. | risk analysis |
D. | all of the mentioned |
Answer» A. risk exposure |
453. | What threatens the quality and timeliness of the software to be produced? |
A. | known risks |
B. | business risks |
C. | project risks |
D. | technical risks |
Answer» D. technical risks |
454. | What threatens the viability of the software to be built? |
A. | known risks |
B. | business risks |
C. | project risks |
D. | technical risks |
Answer» B. business risks |
455. | Which of the following is not a business risk? |
A. | building an excellent product or system that no one really wants |
B. | losing the support of senior management due to a change in focus or change in people |
C. | lack of documented requirements or software scope |
D. | losing budgetary or personnel commitment |
Answer» C. lack of documented requirements or software scope |
456. | Which of the following is a systematic attempt to specify threats to the project plan? |
A. | risk identification |
B. | performance risk |
C. | support risk |
D. | risk projection |
Answer» D. risk projection |
457. | Which risks are associated with the overall size of the software to be built or modified? |
A. | business impact risks |
B. | process definition risks |
C. | product size risks |
D. | development environment risks |
Answer» C. product size risks |
458. | Which risks are associated with constraints imposed by management or the marketplace? |
A. | business impact risks |
B. | process definition risks |
C. | product size risks |
D. | development environment risks |
Answer» A. business impact risks |
459. | Computer system is a |
A. | Hardware |
B. | Software |
C. | Bioware |
D. | Virtual ware |
Answer» A. Hardware |
460. | Object model is a |
A. | Rule |
B. | Process guidance |
C. | System model |
D. | Entity |
Answer» C. System model |
461. | Software engineering is an engineering discipline concerned with |
A. | Software development |
B. | Software production |
C. | Software implementation |
D. | All the above |
Answer» D. All the above |
462. | A workflow model represents |
A. | Sequence of activities |
B. | Role of users involved |
C. | Set of activities |
D. | None of these |
Answer» A. Sequence of activities |
463. | Sensor component |
A. | Causes changes in system environment |
B. | Communicate with other components |
C. | Collects information from system environment |
D. | Coordinate the operation of other components. |
Answer» C. Collects information from system environment |
464. | Which is the correct order ? |
A. | System development ? system installation ? system operation |
B. | System installation ? system operation? system development |
C. | System decomposition? system installation ? system design |
D. | None of these. |
Answer» A. System development ? system installation ? system operation |
465. | Sensor component is a |
A. | Functional component |
B. | Non-functional component |
C. | Reliability component |
D. | None of these |
Answer» A. Functional component |
466. | Which one is not the non-functional activity ? |
A. | Reliability |
B. | Performance |
C. | Coordination |
D. | Maintainability |
Answer» C. Coordination |
467. | Sub system is |
A. | Dependent system |
B. | Independent system |
C. | Component |
D. | None of these |
Answer» B. Independent system |
468. | System architecture model identifies |
A. | Hardware components |
B. | Software components |
C. | Virtual components and software components |
D. | Hardware and software components both |
Answer» D. Hardware and software components both |
469. | Which one is functional component ? |
A. | Reliability |
B. | Maintainability |
C. | Computation |
D. | Performance |
Answer» C. Computation |
470. | A class room in a school is a |
A. | System |
B. | Sub-system |
C. | Module |
D. | None of these |
Answer» B. Sub-system |
471. | Floating point process is a |
A. | Communication component |
B. | Computation component |
C. | Coordination component |
D. | Sensor component |
Answer» B. Computation component |
472. | Digital-analog converter that converter digital input into analog output is a |
A. | Communication component |
B. | Computation component |
C. | Sensor component |
D. | Interface component |
Answer» D. Interface component |
473. | In software system requirements, the functional requirement for the system describes |
A. | Services the system is expected to provide |
B. | Factors of system development |
C. | Reliability, response time or system capacity |
D. | None of these |
Answer» B. Factors of system development |
474. | In software system requirements, the interface requirements are |
A. | Requirements that are derived from the interface of existing system |
B. | Requirements that are derived from the interface of proposed system |
C. | Requirements that are derived from the interface of existing and proposed systems |
D. | None of these |
Answer» C. Requirements that are derived from the interface of existing and proposed systems |
476. | Software requirement specification is | |
A. | The official statement of what is required of the system developers | |
B. | The non official statement of system interface | |
C. | Non specified format of system working | |
D. | None of these | |
Answer» A. The official statement of what is required of the system developers | ||
477. | What is Ethnography |
A. | A graphic tool |
B. | Observational technique used to understand social and organizational requirements |
C. | A graph with nodes |
D. | None of these |
Answer» B. Observational technique used to understand social and organizational requirements |
478. | In Data Processing model |
A. | Here data-flow diagram show, how data is processed at different stages in the system. These are behavioral models |
B. | It registers all/ selected activities of a computer system. |
C. | Technique used to transform raw data into a more useful form. |
D. | Data is shifted to modern data base management system. |
Answer» A. Here data-flow diagram show, how data is processed at different stages in the system. These are behavioral models |
479. | In Data recording |
A. | Here data-flow diagram show, how data is processed at different stages in the system. |
B. | It registers all/ selected activities of a computer system. |
C. | Technique used to transform raw data into a more useful form. |
D. | Data is shifted to modern data base management system. |
Answer» B. It registers all/ selected activities of a computer system. |
480. | Thermo couple in furnace is a |
A. | Communication component |
B. | Computation component |
C. | Sensor component |
D. | Interface component |
Answer» C. Sensor component |
481. | In block diagrams, relationship between components is shown by |
A. | Boxes |
B. | Ovals |
C. | Circular |
D. | Lines/Arrows |
Answer» D. Lines/Arrows |
482. | Cities, states and country can be defined as |
A. | Subsystem – Cities, states: System – country |
B. | Subsystem – state :System– country, cities |
C. | Subsystem – Country: System– cities, state |
D. | Subsystem– Country, state: System– Cities |
Answer» A. Subsystem – Cities, states: System – country |
483. | Which of the following is correct system design process ? |
A. | Identify system requirement – define system – develop system |
B. | Define system – develop system – identify system |
C. | Identify system – develop system – operate system |
D. | None of these |
Answer» C. Identify system – develop system – operate system |
484. | Making different sub-system to work together is |
A. | System definition |
B. | System operation |
C. | System integration |
D. | System decomposition |
Answer» C. System integration |
485. | System procurement process involves |
A. | Specifying system requirement |
B. | Choosing suppliers |
C. | A and B both |
D. | None of these |
Answer» C. A and B both |
486. | System decommissioning normally takes place |
A. | At the beginning of the development process |
B. | At the middle of the development process |
C. | After the end of useful operational time |
D. | At the beginning of the useful operational time |
Answer» C. After the end of useful operational time |
487. | System operation takes place after |
A. | System specification |
B. | System design |
C. | System installation |
D. | System decomposition |
Answer» C. System installation |
488. | Software processes are |
A. | Activities involved in producing software system |
B. | Activities involved in selling software systems |
C. | Activities involved in system design |
D. | Activities involved in managing systems |
Answer» A. Activities involved in producing software system |
489. | Iterative model includes |
A. | Waterfall model |
B. | Sequential model |
C. | Incremental development |
D. | Random model |
Answer» D. Random model |
490. | In iterative process model, software process represents |
A. | Sequential activities |
B. | Cycle of activities |
C. | Random activities |
D. | None of these |
Answer» B. Cycle of activities |
491. | In spiral development the software process form |
A. | Sequences |
B. | Loops |
C. | Zigzag |
D. | None of these |
Answer» B. Loops |
492. | Spiral development involves |
A. | Risk assessment |
B. | Reduction of risk |
C. | A and B both |
D. | None of these |
Answer» C. A and B both |
493. | Requirement Engineering involves |
A. | Feasibility studies |
B. | Requirement analysis |
C. | Requirement validation |
D. | All the above |
Answer» D. All the above |
494. | Analysis and design workbench |
A. | It supports system modeling during the analysis and design stages of the software process |
B. | Organization responsible for approving U.S. standards |
C. | Stimuli that occurs irregularly |
D. | Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services |
Answer» A. It supports system modeling during the analysis and design stages of the software process |
495. | ANSI (American National Standards Institute) is |
A. | It supports system modeling during the analysis and design stages of the software process |
B. | Organization responsible for approving U.S. standards |
C. | Stimuli that occurs irregularly |
D. | Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services |
Answer» B. Organization responsible for approving U.S. standards |
496. | Aperiodic stimuli is |
A. | It supports system modeling during the analysis and design stages of the software process |
B. | Organization responsible for approving U.S. standards |
C. | Stimuli that occurs irregularly |
D. | Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services |
Answer» C. Stimuli that occurs irregularly |
497. | Which is not the part of software process ? |
A. | Software specification |
B. | Software design |
C. | Software evolution |
D. | Software selling |
Answer» D. Software selling |
498. | Which one is not the generic process model ? |
A. | Waterfall model |
B. | Evolutionary development |
C. | Re-use oriented development |
D. | Marketing model |
Answer» D. Marketing model |
499. | Spiral model is |
A. | Iterative model |
B. | Non-iterative model |
C. | Random model |
D. | None of these |
Answer» A. Iterative model |
501. | Software implementation converts system specifications into |
A. | Development system |
B. | System decomposition |
C. | Executable system |
D. | None of these |
Answer» C. Executable system |
502. | Which one is not be structured design model ? |
A. | Data flow model |
B. | Entity relation model |
C. | Object-oriented model |
D. | Debugging |
Answer» D. Debugging |
503. | Software process models are |
A. | Abstract representation of software process |
B. | Software running the systems |
C. | Software managing the systems |
D. | Software implementation |
Answer» A. Abstract representation of software process |
504. | Debugging is a process of |
A. | Developing faults |
B. | Removing faults |
C. | Ignoring faults |
D. | None of these |
Answer» B. Removing faults |
505. | Software validation is |
A. | Checking system conformations to its specifications |
B. | Developing system conformations to its specifications |
C. | Operating system |
D. | None of these |
Answer» A. Checking system conformations to its specifications |
506. | Unit testing process is |
A. | Software designing process |
B. | Software operating process |
C. | Software validation process |
D. | Software decomposition process |
Answer» C. Software validation process |
507. | CASE environment supports |
A. | Individual process tasks |
B. | Individual process phases |
C. | Most process tasks and process phases |
D. | None of these |
Answer» D. None of these |
508. | CASE work benches support |
A. | Individual process tasks |
B. | Process phases and activities |
C. | Development software |
D. | Operation software |
Answer» B. Process phases and activities |
509. | Error location and repair is |
A. | System modeling process |
B. | System design process |
C. | System verification process |
D. | System decomposition process |
Answer» C. System verification process |
510. | Quality plan describes |
A. | Quality procedure and standards |
B. | Approaches, resources and schedules |
C. | Configuration management and structure |
D. | None of these |
Answer» A. Quality procedure and standards |
511. | Which one is not true for risk analysis ? |
A. | It estimate risks |
B. | It removes risks |
C. | It reduces risks |
D. | It develops risks |
Answer» D. It develops risks |
512. | Project schedule can be illustrated in |
A. | Bar-charts |
B. | Activity-networks |
C. | Figures |
D. | None of these |
Answer» D. None of these |
513. | Change in technology is a |
A. | Technology risk |
B. | People risk |
C. | Tool risk |
D. | Implementation risk |
Answer» A. Technology risk |
514. | Under estimate of cost is |
A. | Technology risk |
B. | People risk |
C. | Estimation risk |
D. | Organizational risk |
Answer» C. Estimation risk |
515. | Maintenance plan describes |
A. | Quality procedure |
B. | Schedule procedure |
C. | Maintenance procedure |
D. | Configuration procedure |
Answer» C. Maintenance procedure |
516. | Failure of schedule is |
A. | People risk |
B. | Organizational risk |
C. | Estimation risk |
D. | Requirement risk |
Answer» C. Estimation risk |
517. | Risk planning involves |
A. | Avoidance strategies |
B. | Minimization strategies |
C. | Contingency plan |
D. | All the above |
Answer» D. All the above |
518. | Which is not the part of scheduling process? |
A. | Creating project chart |
B. | Defining roles/activities |
C. | Estimating failures |
D. | Selling product |
Answer» D. Selling product |
519. | Use of Email instead of post & telegraph is due to |
A. | Technology changes |
B. | Requirement changes |
C. | Users access |
D. | All the above |
Answer» D. All the above |
520. | Using P-IV instead of P-I is due to |
A. | Requirement change |
B. | Faster access |
C. | Technology improvement |
D. | All the above |
Answer» D. All the above |
521. | The term user requirements |
A. | Are statements, made in natural language and diagrams of services that system is expected to provide and the constrains on the system |
B. | The system services and details, can serve as contract between buyer and software developers |
C. | An abstract description of software design |
D. | None of these |
Answer» A. Are statements, made in natural language and diagrams of services that system is expected to provide and the constrains on the system |
522. | Software design specification |
A. | Are statements, made in natural language to specify the system specification and constraints |
B. | An abstract description of software design, which is an extension of system requirement specification |
C. | es the market policy of the system |
D. | None of these |
Answer» B. An abstract description of software design, which is an extension of system requirement specification |
523. | Software consists of |
A. | Computer program only |
B. | Computer program and associated documentations |
C. | Documentation only |
D. | Hardware |
Answer» B. Computer program and associated documentations |
524. | Software engineering deals with |
A. | Software development |
B. | Hardware development |
C. | System development |
D. | Network development |
Answer» A. Software development |
526. | Work flow model includes | |
A. | Inputs | |
B. | Out puts | |
C. | Dependencies | |
D. | All the above | |
Answer» D. All the above | ||
527. | Rules are |
A. | Constraints define for system models |
B. | Input data |
C. | Out put data |
D. | Activities in involved in the system |
Answer» A. Constraints define for system models |
528. | Hardware represents |
A. | Documentations |
B. | Programs |
C. | Computer systems |
D. | Rules |
Answer» C. Computer systems |
529. | The system failure due to power failure is considered under |
A. | Hardware reliability |
B. | Software reliability |
C. | Operation reliability |
D. | None of these |
Answer» A. Hardware reliability |
530. | Components such as wheel, chain, handle etc are assembled to produce bicycle. The use of bicycle as transportation device is considered to be |
A. | Functional property |
B. | Non-functional property |
C. | Software system |
D. | None of these |
Answer» A. Functional property |
531. | A computer program is a |
A. | Software |
B. | Hardware |
C. | System |
D. | None of these |
Answer» A. Software |
532. | Software system consists of |
A. | Programs |
B. | Configuration files |
C. | Documentation |
D. | All of the above |
Answer» D. All of the above |
533. | User documentation defines |
A. | Computer program |
B. | Computer system |
C. | Use of computer systems |
D. | Structure of computer system |
Answer» C. Use of computer systems |
534. | System documentation defines |
A. | Computer programs |
B. | Computer systems |
C. | Use of computer systems |
D. | Structure of computer system |
Answer» D. Structure of computer system |
535. | System engineering is concerned with |
A. | Hardware development |
B. | System development |
C. | Software engineering |
D. | All of the above |
Answer» D. All of the above |
536. | Software process involves |
A. | Software specification and developments |
B. | Software validation and evolution |
C. | A and B both |
D. | None of these |
Answer» C. A and B both |
537. | Mutable requirements are |
A. | Requirements that change due to the environment in which the organization is operating |
B. | Emerges due to user’s understanding of system |
C. | Dependent on particular system |
D. | None of these |
Answer» A. Requirements that change due to the environment in which the organization is operating |
538. | Requirement Engineering process does not involves |
A. | Feasibility study |
B. | Requirement elicitation and an analysis |
C. | Requirement validation and management |
D. | Data processing |
Answer» D. Data processing |
539. | User requirements are written in |
A. | Natural language |
B. | FORTRAN |
C. | Assembly language |
D. | None of these |
Answer» A. Natural language |
540. | The system modeling is normally referred to |
A. | An abstract viewing of a system |
B. | The system running |
C. | Programming language |
D. | None of these |
Answer» A. An abstract viewing of a system |
541. | Operability is |
A. | Extent to which a system or component complies with standards |
B. | Trustworthiness of operating the software. |
C. | Measures that estimates system cost to operate and maintain. |
D. | None of these |
Answer» B. Trustworthiness of operating the software. |
542. | In system modeling: A-Architectural model: B-Stimulus-response model: C-Behavioral models: 1-Used to describe the overall behavior of the system: 2-State transition diagram show how the system reacts to internal and external events: 3-Shows principal sub-systems which makes the system |
A. | A-1, B-2, C-3 |
B. | A-2, B-3, C-1 |
C. | A-3, B-2, C-1 |
D. | C-2, B-1, A-3 |
Answer» C. A-3, B-2, C-1 |
543. | In system modeling : A-Classification model; B-Stimulus-response model; C-Data processing model: 1-Here data-flow diagram show how data is processed at different stages; 2-Here object class/inheritance diagram show, how entities have the common characteristics;3-Here state transition diagram shows the how the system reader to internal and external events |
A. | A-2, B-3, C-1 |
B. | A-3, B-1, C-2 |
C. | A-1, B-2, C-3 |
D. | A-1, B-3, C-2 |
Answer» A. A-2, B-3, C-1 |
544. | In system modeling Statement-1: State-machine model is used to model the behavior of a system in response to internal and external events. Statement-2: Stimulus response model represents state transition diagram that show how system reacts to internal and external events. |
A. | Statement-1 and 2 both correct |
B. | Statement-1 and 2 both false |
C. | Statement-1 is true and Statement-2 is false |
D. | Statement-1 is false and Statement-2 is true |
Answer» A. Statement-1 and 2 both correct |
545. | Taxonomy is |
A. | Classification scheme, which shows who object class is related to other class through common attributes and services |
B. | Standard modeling language, used for object oriented modeling |
C. | Set of tools to support software process |
D. | None of these |
Answer» A. Classification scheme, which shows who object class is related to other class through common attributes and services |
546. | In system modeling : A-Model; B-Prototype;; 1- it’s an abstract view of a system that ignores system details; 2-It’s an initial version of system software which givers end-users a concrete impression of the system capacities |
A. | A-1, B-2 |
B. | A-1, B-1 |
C. | B-1, A-2 |
D. | A-2, B-2 |
Answer» A. A-1, B-2 |
547. | Sub-systems in a system are |
A. | Independent systems that compro- mises the system |
B. | Dependent systems that compromises the system |
C. | A and B both true |
D. | None of these |
Answer» A. Independent systems that compro- mises the system |
548. | The following is not true for client-server model |
A. | It contains the set of stand alone servers |
B. | A set of clients that can use services offered by servers |
C. | A network which allows the clients to access these services |
D. | An intersection between clients by passing the server |
Answer» D. An intersection between clients by passing the server |
549. | Computer Aided Software Engineering (CASE) is |
A. | Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed. |
B. | Testing of individual hardware/software components |
C. | An Entity-relation (E-R) diagram show how entities in the system are composed of other entities |
D. | It consists of wide range of different types of computer programs, which be used to support software process activities such as a requirement analysis, system modeling, debugging and testing. |
Answer» C. An Entity-relation (E-R) diagram show how entities in the system are composed of other entities |
551. | A sequential control model where control starts at the top of a subroutine hierarchy and through sub-routine calls, passes to lower levels is referred as |
A. | Manager control model |
B. | Call-return control model |
C. | Object oriented model |
D. | None of these |
Answer» B. Call-return control model |
552. | A control model where one system component is designed as system manager which controls the starting, stopping and coordination other system processes can be referred as |
A. | Manager control model |
B. | Object oriented model |
C. | Event driven control model |
D. | None of these |
Answer» A. Manager control model |
553. | When is a system where each sub-system can respond to generated event are referred as ? |
A. | Event driven control system |
B. | Object oriented model |
C. | Manager control model |
D. | None of these |
Answer» A. Event driven control system |
554. | An event driven control system, when an event is transmitted to each sub-system and each sub-system that handles that event responds to it is referred as |
A. | Broadcast model |
B. | Manager control model |
C. | Call-return control model |
D. | None of these |
Answer» A. Broadcast model |
555. | Embedded system |
A. | Run on single processor |
B. | Run on integrated group of process linked by network |
C. | Network models |
D. | None of these |
Answer» A. Run on single processor |
556. | If all the application processing and data management is carried out on the server and client is only responsible for running the system then this is referred as |
A. | Client-server model |
B. | Thin client server model |
C. | Thick client server model |
D. | None of these |
Answer» B. Thin client server model |
557. | If the server is only responsible for data management and software on the client implements the application logic, then one can referrer this model as |
A. | Client server model |
B. | Fat client server model |
C. | Thin client server model |
D. | None of these |
Answer» B. Fat client server model |
558. | In system models, object is |
A. | An entity that has a state and defined set of operations that operates on that state |
B. | Software program |
C. | Programming language, that develops any given program |
D. | None of these |
Answer» A. An entity that has a state and defined set of operations that operates on that state |
559. | When the state of object changes by internal operations, executing within the object it self, then these objects are referred as |
A. | Active object |
B. | Inactive object |
C. | Silent object |
D. | None of these |
Answer» A. Active object |
560. | The objects that are realized on call as parallel process with method corresponding to defined object operations can be referred as |
A. | Active object |
B. | Servers |
C. | Modules |
D. | None of these |
Answer» B. Servers |
561. | For real time system following is not true |
A. | Correct functioning of the system depends on the result produced by the system |
B. | Correct functioning of the system depends on the time at which the results are produced |
C. | The time of processing affects the system output |
D. | The time of processing does not affects the system out-put |
Answer» D. The time of processing does not affects the system out-put |
562. | If in a software system, the operation is degraded if results are not produced according to the specified timing require- ments then the software system is referred as |
A. | Soft real time system |
B. | hard real time system |
C. | Real time system |
D. | None of these |
Answer» A. Soft real time system |
563. | If in a software system, the operation is incorrect if results are not produced accor- ding to the specified timing requirements then the software system is referred as |
A. | Soft real time system |
B. | Hard real time system |
C. | Real time system |
D. | None of these |
Answer» A. Soft real time system |
564. | Degree to which a system or component performs only the necessary functions relevant to a particular purpose |
A. | Abstractness |
B. | Acceptable risk |
C. | Acceptance testing |
D. | None of these |
Answer» A. Abstractness |
565. | Subject to probability of hazard, arising will not raise cost factors is referred as |
A. | Abstractness |
B. | Acceptable risk |
C. | Acceptance testing |
D. | None of these |
Answer» B. Acceptable risk |
566. | Formal testing conducted to determine whether a system satisfies its acceptance criteria and to enable the customer to determine whether to accept the system |
A. | Abstractness |
B. | Acceptable risk |
C. | Acceptance testing |
D. | None of these |
Answer» C. Acceptance testing |
567. | Truthfulness with which software satisfies differing system constraints and user needs is |
A. | Active objects |
B. | Activity |
C. | Adaptability |
D. | None of these |
Answer» C. Adaptability |
568. | Adaptive measures are |
A. | Quality measures that address how easily a system can evolve or migrate |
B. | Piece of software that acts to accomplish tasks on behalf of its user |
C. | A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis |
D. | Extent to which a software system or component allows for or supports anonymous transactions |
Answer» A. Quality measures that address how easily a system can evolve or migrate |
569. | An Acquisition cycle time is |
A. | Unplanned events, which results in injury, damage to property, or to the environment |
B. | Quantitative measure of the magnitude of error |
C. | Period that starts when a system is considered and ends when the product meets its initial operational capability |
D. | All the above |
Answer» C. Period that starts when a system is considered and ends when the product meets its initial operational capability |
570. | An accuracy is |
A. | Unplanned events, which results in injury, damage to property, or to the environment |
B. | Quantitative measure of the magnitude of error |
C. | Period that starts when a system is considered and ends when the product meets its initial operational capability |
D. | All the above |
Answer» B. Quantitative measure of the magnitude of error |
571. | Here the state of the object changes by internal operations executing within the object itself. And also object continually executes and operations never suspend itself is referred as |
A. | Active objects |
B. | Activity |
C. | Adaptability |
D. | None of these |
Answer» A. Active objects |
572. | A clearly defined objective, entry and exit conditions which is normally is atomic is referred as |
A. | Active objects |
B. | Activity |
C. | Adaptability |
D. | None of these |
Answer» B. Activity |
573. | Agents are |
A. | Quality measures that address how easily a system can evolve or migrate |
B. | Piece of software that acts to accomplish tasks on behalf of its user |
C. | A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis |
D. | Extent to which a software system or component allows for or supports anonymous transactions |
Answer» B. Piece of software that acts to accomplish tasks on behalf of its user |
574. | Algorithmic cost modeling is |
A. | Quality measures that address how easily a system can evolve or migrate |
B. | Piece of software that acts to accomplish tasks on behalf of its user |
C. | A quantitative option analysis that allows the cost of various options to be computed, and options can be compared on objective basis |
D. | Extent to which a software system or component allows for or supports anonymous transactions |
Answer» A. Quality measures that address how easily a system can evolve or migrate |
576. | Probability of an accident arising because of hazard is minimum subject of other costs |
A. | As low as reasonably practical (ALARP) risk |
B. | Architectural design |
C. | Attack |
D. | None of these |
Answer» A. As low as reasonably practical (ALARP) risk |
577. | Fault tolerance system are |
A. | These system runs on a single proce- ssor or an integrated group of processors |
B. | A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system. |
C. | A system continues in operation after some system faults have manifested themselves. |
D. | A system whose operation is incorrect, if results are not produced according to the timing specifications |
Answer» C. A system continues in operation after some system faults have manifested themselves. |
578. | The misuse of system vulnerability is |
A. | As low as reasonably practical (ALARP) risk |
B. | Architectural design |
C. | Attack |
D. | None of these |
Answer» C. Attack |
579. | Attribute-based identification is |
A. | Here each component has a unique name and an associated set of attribute, which differs for each version of component |
B. | Extent to which a software system records information concerning transactions performed against the system. |
C. | Extent to which a system or component is operational and accessible when required for use |
D. | They are used to describe the over all behavior of the system. Auditable is |
Answer» A. Here each component has a unique name and an associated set of attribute, which differs for each version of component |
580. | Availability is |
A. | Here each component has a unique name and an associated set of attribute, which differs for each version of component |
B. | Extent to which a software system records information concerning transac- tions performed against the system. |
C. | Extent to which a system or component is operational and accessible when required for use |
D. | They are used to describe the over all behavior of the system. |
Answer» C. Extent to which a system or component is operational and accessible when required for use |
581. | Behavioral models is |
A. | Here each component has a unique name and an associated set of attribute, which differs for each version of component |
B. | Extent to which a software system records information concerning transac- tions performed against the system. |
C. | Extent to which a system or component is operational and accessible when required for use |
D. | Used to describe the over all behavior of the system |
Answer» D. Used to describe the over all behavior of the system |
582. | In Bottom-up integration |
A. | The low-level components of a system are integrated and tested before the higher-level components have been developed |
B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested. |
C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. |
Answer» A. The low-level components of a system are integrated and tested before the higher-level components have been developed |
583. | In Broadcast models |
A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. |
B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested |
C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. |
Answer» C. An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
584. | Bottom-up testing |
A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. |
B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested. |
C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. |
Answer» B. The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested. |
585. | In Call-return control model |
A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. |
B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested. |
C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels |
Answer» D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels |
586. | Capacity is |
A. | A measure of the amount of work a system can perform |
B. | It provides automated support for software process. |
C. | Support individual process tasks |
D. | Set of tools to support a particular phase of software process such as design, implementation or testing. |
Answer» A. A measure of the amount of work a system can perform |
587. | CASE (Computer Aided Software Engineering) is |
A. | A measure of the amount of work a system can perform |
B. | It provides automated support for software process. |
C. | Support individual process tasks |
D. | Set of tools to support a particular phase of software process such as design, implementation or testing: |
Answer» B. It provides automated support for software process. |
588. | CASE Tools |
A. | A measure of the amount of work a system can perform |
B. | It provides automated support for software process. |
C. | Support individual process tasks |
D. | Set of tools to support a particular phase of software process such as design, implementation or testing |
Answer» C. Support individual process tasks |
589. | CASE Workbench |
A. | A measure of the amount of work a system can perform |
B. | It provides automated support for software process. |
C. | Support individual process tasks |
D. | Set of tools to support a particular phase of software process such as design, implementation or testing |
Answer» A. A measure of the amount of work a system can perform |
590. | Centralized control models |
A. | Here one system is designed as the system controller and has responsibility for managing the execution of other subsystems. |
B. | Each system is named as in attribute- based identification and associated with one or more change requests. |
C. | An object class inheritance diagram, how entities have common characteristics. |
D. | The objective of this software development is zero-defect software. |
Answer» A. Here one system is designed as the system controller and has responsibility for managing the execution of other subsystems. |
591. | Change-oriented identification |
A. | One system is designed as the system controller and has responsibility for managing the execution of other subsystems. |
B. | Each system is named as in attribute- based identification and associated with one or more change requests. |
C. | An object class inheritance diagram, how entities have common characteristics. |
D. | The objective of this software development is zero-defect software. |
Answer» B. Each system is named as in attribute- based identification and associated with one or more change requests. |
592. | Hard real time systems are |
A. | These system runs on a single processor or an integrated group of processors |
B. | A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system. |
C. | A system continues in operation after some system faults have manifested themselves. |
D. | A system whose operation is incorrect, if results are not produced according to the timing specifications |
Answer» D. A system whose operation is incorrect, if results are not produced according to the timing specifications |
593. | Classification model |
A. | One system is designed as the system controller and has responsibility for managing the execution of other subsystems. |
B. | Each system is named as in attribute- based identification and associated with one or more change requests. |
C. | An object class inheritance diagram, how entities have common characteristics. |
D. | The objective of this software develop- ment is zero-defect software. |
Answer» C. An object class inheritance diagram, how entities have common characteristics. |
594. | Clean room software development |
A. | One system is designed as the system controller and has responsibility for managing the execution of other subsystems. |
B. | Each system is named as in attribute- based identification and associated with one or more change requests. |
C. | An object class inheritance diagram, how entities have common characteristics. |
D. | The objective is to develop zero-defect software. |
Answer» D. The objective is to develop zero-defect software. |
595. | COCOMO cost model |
A. | It takes project, product hardware and personnel attributes into account when formulating a cost estimate. |
B. | In it server provides set of services and set of clients uses these services. |
C. | Extent to which standards are used to achieve interoperability. |
D. | None of these |
Answer» A. It takes project, product hardware and personnel attributes into account when formulating a cost estimate. |
596. | Client server architecture |
A. | It takes project, product hardware and personnel attributes into account when formulating a cost estimate. |
B. | In it server provides set of services and set of clients uses these services. |
C. | Extent to which standards are used to achieve interoperability. |
D. | None of these |
Answer» B. In it server provides set of services and set of clients uses these services. |
597. | Commonality |
A. | It takes project, product hardware and personnel attributes into account when formulating a cost estimate. |
B. | In it server provides set of services and set of clients uses these services. |
C. | Extent to which standards are used to achieve interoperability |
D. | None of these |
Answer» C. Extent to which standards are used to achieve interoperability |
598. | Transforming of logic and data from design specifications (design descriptions) into a programming language |
A. | Compatibility |
B. | Compactness |
C. | Coding |
D. | Communication |
Answer» C. Coding |
599. | An inter change of information between computer systems and peoples or between people. |
A. | Compatibility |
B. | Compactness |
C. | Coding |
D. | Communication |
Answer» D. Communication |
601. | Entity-relation model is | |
A. | It describes the basic entities in the design and relation between them. | |
B. | Observational techniques used to understand social and organizational requirements. | |
C. | It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed. | |
D. | Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed. | |
Answer» A. It describes the basic entities in the design and relation between them. | ||
602. | Ability of two or more systems or components to perform their required functions while sharing the same hardware or software environment |
A. | Compatibility |
B. | Compactness |
C. | Code |
D. | Communication |
Answer» A. Compatibility |
603. | Completeness in software system is referred as |
A. | Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed. |
B. | Testing of individual hardware/software components |
C. | An Entity-relation (E-R) diagram show how entities in the system are composed of other entities. |
D. | It consists of wide range of different types of computer programs, which be used to support software process activities such as a requirement analysis, system modeling, debugging and testing. |
Answer» A. Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed. |
604. | Composition model is |
A. | Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed. |
B. | Testing of individual hardware/software components |
C. | An Entity-relation (E-R) diagram show how entities in the system are composed of other entities |
D. | It consists of wide range of different types of computer programs, which be used to support software process activities such as a requirement analysis, system modeling, debugging and testing. |
Answer» C. An Entity-relation (E-R) diagram show how entities in the system are composed of other entities |
605. | Match the following : A-Control metrics : B- Process metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation |
A. | A-1, B-2,C-3,D-4 |
B. | A-4,B-3,C-2,D-1 |
C. | A-3, B-2,C-1,D-4 |
D. | None is true |
Answer» A. A-1, B-2,C-3,D-4 |
606. | Corrective maintenance is |
A. | Maintenance performed to correct faults in hardware or software |
B. | A failure of software-controlled systems in convenience, but there are source systems where system failure is resulted in significant critical losses. |
C. | Failure that corrupts system state or data |
D. | None is true |
Answer» A. Maintenance performed to correct faults in hardware or software |
607. | Corrupting failure is |
A. | Maintenance performed to correct faults in hardware or software |
B. | A failure of software-controlled systems in convenience, but there are source systems where system failure is resulted in significant critical losses. |
C. | Failure that corrupts system state or data |
D. | None is true |
Answer» C. Failure that corrupts system state or data |
608. | Cost estimation is |
A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
B. | Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. |
C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
Answer» A. Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
609. | Cost of ownership is |
A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
B. | Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. |
C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
Answer» D. Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
610. | Cost of maintenance |
A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
B. | Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. |
C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
Answer» B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. |
611. | Event-driven control systems are |
A. | These system runs on a single proce- ssor or an integrated group of processors |
B. | A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system. |
C. | A system continues in operation after some system faults have manifested themselves. |
D. | A system whose operation is incorrect, if results are not produced according to the timing specifications |
Answer» B. A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system. |
612. | Cost of operation is |
A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
B. | Overall cost of maintaining a computer system that includes the costs associated with personnel / training/ maintenance of hardware and software/ requirements growth. |
C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
Answer» C. Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
613. | In Data reduction |
A. | Here data-flow diagram show, how data is processed at different stages in the system. |
B. | It registers all/ selected activities of a computer system. |
C. | Technique used to transform raw data into a more useful form. |
D. | Data is shifted to modern data base management system. |
Answer» C. Technique used to transform raw data into a more useful form. |
614. | Ethnography is |
A. | It describes the basic entities in the design and relation between them. |
B. | Observational techniques used to understand social and organizational requirements. |
C. | It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed. |
D. | Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed. |
Answer» B. Observational techniques used to understand social and organizational requirements. |
615. | In Data flow (Activity model) |
A. | It shows the software process as a set of activities each of which carries out data transformation. |
B. | Data and associated programs are re- engineered to remove limits on the data processing. |
C. | It is responsible for the definition, operation, protection, performance, and recovery of a database. |
D. | Development of a database to meet a user’s requirements. |
Answer» A. It shows the software process as a set of activities each of which carries out data transformation. |
616. | In Data tension |
A. | It shows the software process as a set of activities each of which carries out data transformation. |
B. | Data and associated programs are re- engineered to remove limits on the data processing |
C. | It is responsible for the definition, operation, protection, performance, and recovery of a database. |
D. | Development of a database to meet a user’s requirements |
Answer» B. Data and associated programs are re- engineered to remove limits on the data processing |
617. | Database administration |
A. | It shows the software process as a set of activities each of which carries out data transformation. |
B. | Data and associated programs are re- engineered to remove limits on the data processing. |
C. | It is responsible for the definition, operation, protection, performance, and recovery of a database. |
D. | Development of a database to meet a user’s requirements |
Answer» C. It is responsible for the definition, operation, protection, performance, and recovery of a database. |
618. | Database design |
A. | This model shows the software process as a set of activities each of which carries out data transformation. |
B. | Data and associated programs are re- engineered to remove limits on the data processing. |
C. | It is responsible for the definition,operation, protection, performance, and recovery of a database. |
D. | Development of a database to meet a user’s requirements Exploratory development is |
Answer» D. Development of a database to meet a user’s requirements Exploratory development is |
619. | Collection of logically related data stored together in one or more computerized files. |
A. | Database |
B. | Debugging |
C. | Defect testing |
D. | Defensive programming |
Answer» A. Database |
620. | Exception is |
A. | Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. |
B. | An error of some kind or an unexpected event occurs during the execution of a program |
C. | Here the objective of the process is to work with uses to explore their requirement and deliver a final system. |
D. | Possible loss or harm in computing system. |
Answer» B. An error of some kind or an unexpected event occurs during the execution of a program |
621. | When the program is developed, it is to be tested and defects are to be removed from the program. |
A. | Database |
B. | Debugging |
C. | Defect testing |
D. | Defensive programming |
Answer» B. Debugging |
622. | It is intended to find inconsistencies between a program and its specification. These inconsistencies are usually due to program faults or defects. |
A. | Database |
B. | Debugging |
C. | Defect testing |
D. | Defensive programming |
Answer» B. Debugging |
623. | It is a property of the system that equates to its trustworthiness. It is the degree of user’s confidence that the system will operate as one expect, that the system would not fail in normal use. |
A. | Dependability |
B. | Availability |
C. | Maintainability |
D. | None of these |
Answer» A. Dependability |
624. | Fail safe is |
A. | Trustworthiness with which a system or component can be modified to increase its storage or functional capacity |
B. | Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure. |
C. | Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures. |
D. | None of these |
Answer» D. None of these |
626. | Embedded systems are |
A. | These system runs on a single processor or an integrated group of processors |
B. | A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system. |
C. | A system continues in operation after some system faults have manifested themselves. |
D. | A system whose operation is incorrect, if results are not produced according to the timing specifications |
Answer» A. These system runs on a single processor or an integrated group of processors |
627. | Emergent requirements |
A. | Emerges due to user’s understanding of system develops, during system development |
B. | Requirements derived from the core activity of the organization and directly related to the domain of the system. |
C. | Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. |
D. | None of these. |
Answer» A. Emerges due to user’s understanding of system develops, during system development |
628. | Fat-client model is |
A. | It is a measure of number of function that calls some other function. |
B. | It is measure of number of functions that are called by a function. |
C. | In it server is only responsible for data management. |
D. | None of these |
Answer» C. In it server is only responsible for data management. |
629. | Fault recovery is |
A. | It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state |
B. | Capacity of a system or component to continue normal operation despite the presence of hardware or software faults. |
C. | It is the widely used hazard technique |
D. | Incorrect step, process, or data definition in a computer program |
Answer» A. It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state |
630. | Enduring requirements |
A. | Emerges due to user’s understanding of system develops, during system development |
B. | Requirements derived from the core activity of the organization and directly related to the domain of the system* |
C. | Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. |
D. | None of these. |
Answer» B. Requirements derived from the core activity of the organization and directly related to the domain of the system* |
631. | Hazard avoidance |
A. | Hazard cannot arise due system design. |
B. | The probability of the event occurring which create a hazard. |
C. | An assessment of the worst possible damage, which could result from a particular hazard. |
D. | A condition with the potential for causing or contributing to an accident. |
Answer» A. Hazard cannot arise due system design. |
632. | Evolutionary prototyping is |
A. | It describes the basic entities in the design and relation between them. |
B. | Observational techniques used to understand social and organizational requirements. |
C. | It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed. |
D. | Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed. |
Answer» D. Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed. |
633. | Match the following : A- Managed device : B-Managed object: C- Managed processes: 1- Type of node residing on a network, such as a computer, printer or routers that contain a management agent. 2- Characteristic of a managed device that can be monitored, modified or controlled. 3- It is a defined process model. Procedures used are defined and scheduling and relationship between them is defined. |
A. | A-1, B-3,C-2 |
B. | A-1,B-2,C-3 |
C. | A-2,B-3,C-1 |
D. | A-3,B-2,C-1 |
Answer» B. A-1,B-2,C-3 |
634. | Goal is |
A. | Extent to which a system or component performs a broad range of functions. |
B. | The objective of an organization to achieve. |
C. | Methods and techniques for converting data to or from graphic display via computers. |
D. | None of these |
Answer» B. The objective of an organization to achieve. |
635. | Implementation phase is |
A. | Period in the software life cycle in which a software product is created from design documentation and debugged.* |
B. | Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required. |
C. | Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base. |
D. | None of these |
Answer» A. Period in the software life cycle in which a software product is created from design documentation and debugged.* |
636. | Evolvability is |
A. | Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. |
B. | An error of some kind or an unexpected event occurs during the execution of a program |
C. | Here the objective of the process is to work with uses to explore their requirement and deliver a final system. |
D. | Possible loss or harm in computing system. |
Answer» A. Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. |
637. | Match the following A- Functional requirements: B- Functional scope : C- Function-point count: D- Function-related measures: 1- It describe the functionality or services that system is expected to provide. 2- Range to which a system component is capable of being applied. 3- These are language independent productive measure.. 4- It is related to the overall functionality of the delivered software. |
A. | A-4,B-2,C-3,D-1 |
B. | A-2,B-1,C-3,D-4 |
C. | A-1,B-3,C-2,D-4 |
D. | A-1,B-2,C-3,D-4 |
Answer» D. A-1,B-2,C-3,D-4 |
638. | Lehman’s Second Law (Lehman and Belady 1985) is |
A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
639. | Hazard probability |
A. | Hazard cannot arise due system design. |
B. | The probability of the event occurring which create a hazard. |
C. | An assessment of the worst possible damage, which could result from a particular hazard. |
D. | A condition with the potential for causing or contributing to an accident. |
Answer» B. The probability of the event occurring which create a hazard. |
640. | Flexibility |
A. | The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and fault- tolerance controller that detects problems and supports fault recovery |
B. | It is an initial step for requirements engineering process, includes the outline description of system, its use in an organization and recommending the system feasibility. |
C. | Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. |
D. | None of these |
Answer» C. Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. |
641. | Extendibility is |
A. | Trustworthiness with which a system or component can be modified to increase its storage or functional capacity |
B. | Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure. |
C. | Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures. |
D. | None of these |
Answer» A. Trustworthiness with which a system or component can be modified to increase its storage or functional capacity |
642. | Generality is |
A. | It is a measure of number of function that calls some other function. |
B. | It is measure of number of functions, which are called by a function. |
C. | In it server is only responsible for data management. |
D. | None of these |
Answer» A. It is a measure of number of function that calls some other function. |
643. | Manufacturing phase is |
A. | Period in the software life cycle in which a software product is created from design documentation and debugged. |
B. | Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required. |
C. | Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base. |
D. | None of these Human engineering is |
Answer» C. Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base. |
644. | Lehman’s Fourth Law (Lehman and Belady 1985) is |
A. | Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. |
B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» A. Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. |
645. | Human error is |
A. | It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. |
B. | Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale. |
C. | Human behavior that results in the introduction of faults into a system. |
D. | None of these |
Answer» C. Human behavior that results in the introduction of faults into a system. |
646. | Fault-tolerant architectures is |
A. | The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and fault- tolerance controller that detects problems and supports fault recovery* |
B. | It is an initial step for requirements engineering process, includes the outline description of system, its use in an organization and recommending the system feasibility. |
C. | Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. |
D. | None of these |
Answer» A. The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and fault- tolerance controller that detects problems and supports fault recovery* |
647. | Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications: D-Formal System development: 1- Here the formal mathema- tical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program. |
A. | A-1,B-2,C-3,D-4 |
B. | A-4,B-2,C-3,D-1 |
C. | A-2,B-1,C-3,D-4 |
D. | A-1,B-3,C-2,D-4 |
Answer» A. A-1,B-2,C-3,D-4 |
648. | Lehman’s First Law (Lehman and Belady 1985) is |
A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» A. Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
649. | Graphics |
A. | Extent to which a system or component performs a broad range of functions. |
B. | The objective of an organization to achieve. |
C. | Methods and techniques for converting data to or from graphic display via computers. |
D. | None of these |
Answer» C. Methods and techniques for converting data to or from graphic display via computers. |
651. | Hazard | |
A. | Hazard cannot arise due system design. | |
B. | The probability of the event occurring which create a hazard. | |
C. | An assessment of the worst possible damage, which could result from a particular hazard. | |
D. | A condition with the potential for causing or contributing to an accident. | |
Answer» D. A condition with the potential for causing or contributing to an accident. | ||
652. | Human Computer Interaction is |
A. | It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. |
B. | Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale. |
C. | Human behavior that results in the introduction of faults into a system. |
D. | None of these |
Answer» A. It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. |
653. | Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers. |
A. | A-1, B-3,C-2 |
B. | A-1,B-2,C-3 |
C. | A-2,B-3,C-1 |
D. | A-3,B-2,C-1 |
Answer» B. A-1,B-2,C-3 |
654. | Installation and checkout phase |
A. | Period in the software life cycle in which a software product is created from design documentation and debugged. |
B. | Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required. |
C. | Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base. |
D. | None of these |
Answer» B. Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required. |
655. | Software implementation is |
A. | It is concern with modification of existing system to meet changing requirements. |
B. | It is a process of converting system specifications into an executable system. |
C. | It analyzes and checks system representation such as the requirements document, design diagrams and program source code. |
D. | None of these |
Answer» B. It is a process of converting system specifications into an executable system. |
656. | An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces. |
A. | Object design models |
B. | Object interface design |
C. | Object oriented models |
D. | None of these |
Answer» C. Object oriented models |
657. | Interoperability is |
A. | Ability of two or more systems, to exchange information and to use the information that has been exchanged. |
B. | Time taken to respond to an event. |
C. | Either the hazard not arises, if arise; it will not result in an accident. |
D. | None of these |
Answer» A. Ability of two or more systems, to exchange information and to use the information that has been exchanged. |
658. | Parkinson’s Law is |
A. | The cost is determined by available resources rather than by objective assessment. |
B. | A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
C. | As an evolving program change, its strictures tend to become more complex. |
D. | Program evolution is a self-regulating process. |
Answer» A. The cost is determined by available resources rather than by objective assessment. |
659. | Retirement phase is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. |
D. | None of these |
Answer» B. Period of time in the software life cycle during which support for a software product is terminated. |
660. | Retrospective Fault detection is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred* |
D. | None of these |
Answer» C. The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred* |
661. | Risk planning process |
A. | Extent to which a software module can be used in more than one computing program |
B. | It involves regular monitoring of the risks identified and of new risks that develops. |
C. | It considers each of the key risks that are identified and identifies strategies to manage the risk. |
D. | None of these |
Answer» C. It considers each of the key risks that are identified and identifies strategies to manage the risk. |
662. | Software engineering method is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» B. Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
663. | Restart is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. |
D. | None of these |
Answer» A. Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
664. | Risk Management is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» C. The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
665. | ROCOF (Rate of failure occurrence) is |
A. | The probability that the system will cause an accident |
B. | Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions. |
C. | The frequency of occurrence with which unexpected behavior is likely to occur |
D. | None of these |
Answer» C. The frequency of occurrence with which unexpected behavior is likely to occur |
666. | Software system is |
A. | Associated with functionality of software and constraints of operations defined. |
B. | It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. |
C. | It involves executing an implementation of the software with test data and examines the outputs of the software and its operational behavior to check that it is performing as required |
D. | None of these |
Answer» B. It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. |
667. | Scalability is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility. |
D. | None of these |
Answer» B. Ease with which a system or component are modified to fit the problem area. |
668. | Risk analysis process is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» A. Here each identified risk is analyzed and prioritized |
669. | Reusability is |
A. | Extent to which a software module can be used in more than one computing program. |
B. | It involves regular monitoring of the risks identified and of new risks that develops. |
C. | It considers each of the key risks that are identified and also identifies strategies to manage the risk. |
D. | None of these |
Answer» A. Extent to which a software module can be used in more than one computing program. |
670. | Safety argument is |
A. | Associated with the role of people involved in software process and the activities for which they are responsible. |
B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. |
C. | It is concerned with establishing a confidence level in the system that might vary from low to high |
D. | None of these |
Answer» B. The most effective technique for demonstrating the safety of a system is proof by contradiction. |
671. | Risk assessment is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
672. | Risk is |
A. | The probability that the system will cause an accident |
B. | Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions. |
C. | The frequency of occurrence with which unexpected behavior is likely to occur. |
D. | None of these |
Answer» A. The probability that the system will cause an accident |
673. | Safety is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility. |
D. | None of these |
Answer» A. Avoiding catastrophic moment |
674. | Role is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility |
D. | None of these |
Answer» C. It is a bounded area of responsibility |
676. | Risk monitoring process | |
A. | Extent to which a software module can be used in more than one computing program | |
B. | It involves regular monitoring of the risks identified and of new risks that develops. | |
C. | It considers each of the key risks that are identified and identifies strategies to manage the risk. | |
D. | None of these | |
Answer» B. It involves regular monitoring of the risks identified and of new risks that develops. | ||
677. | These objects can be realized as parallel process with method corresponding to defined object operations. |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» B. Servers |
678. | Safety validation is |
A. | Associated with the role of people involved in software process and the activities for which they are responsible. |
B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. |
C. | It is concerned with establishing a confidence level in the system that might vary from low to high |
D. | None of these |
Answer» C. It is concerned with establishing a confidence level in the system that might vary from low to high |
679. | Software process model |
A. | Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
B. | Adaptive maintenance, performed to make a computer program usable in a changed environment. |
C. | A simplified description of a software process that is presented from a particular perspective. |
D. | None of these |
Answer» C. A simplified description of a software process that is presented from a particular perspective. |
680. | Extent to which a system or component contains enough information to explain its objectives and properties is referred as |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» A. Self-descriptiveness |
681. | Degree to which a system or component has a design and implementation that is straightforward and easy to understand is referred as |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» C. Simplicity |
682. | Software attributes are |
A. | Maintainability |
B. | Reliability |
C. | Portability |
D. | All the above |
Answer» D. All the above |
683. | Software measurement is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these |
Answer» B. It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
684. | Software development is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» A. Associated with production of software as per specification |
685. | Software evolution is |
A. | It is concern with modification of existing system to meet changing requirements. |
B. | It is a process of converting system specifications into an executable system. |
C. | It analyzes and checks system representation such as the require- ments document, design diagrams and program source code. |
D. | None of these |
Answer» A. It is concern with modification of existing system to meet changing requirements. |
686. | Software maintenance is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these |
Answer» A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
687. | Software Engineering is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» C. An engineering discipline, concern with software development. |
688. | Software inspection is |
A. | It is concern with modification of existing system to meet changing requirements. |
B. | It is a process of converting system specifications into an executable system. |
C. | It analyzes and checks system representation such as the require- ments document, design diagrams and program source code. |
D. | None of these |
Answer» A. It is concern with modification of existing system to meet changing requirements. |
689. | Software life cycle is |
A. | Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
B. | Adaptive maintenance, performed to make a computer program usable in a changed environment. |
C. | A simplified description of a software process that is presented from a particular perspective. |
D. | None of these |
Answer» A. Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
690. | Software requirements specification are |
A. | A set of activities and associated results that produce a software product. |
B. | It is concerned with re-implementing legacy system to make them more maintainable. |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» C. It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
691. | Software process is |
A. | A set of activities and associated results that produce a software product |
B. | It is concerned with re-implementing legacy system to make them more maintainable. |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» A. A set of activities and associated results that produce a software product |
692. | Software re-engineering is |
A. | A set of activities and associated results that produce a software product. |
B. | It is concerned with re-implementing legacy system to make them more maintainable |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» B. It is concerned with re-implementing legacy system to make them more maintainable |
693. | Procedural interface |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» B. Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
694. | Software metric is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these Software specification is |
Answer» A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
695. | System is |
A. | The set of system services and constraints in details |
B. | System functions that restricts the use of objects to certain users. |
C. | Purposeful collection of interrelated components that work together to achieve some objective. |
D. | None of these |
Answer» C. Purposeful collection of interrelated components that work together to achieve some objective. |
696. | It is concerned with making decision about the best way for an organization that acquire a system and deciding on the best suppliers of that system. |
A. | System procurement |
B. | System quality assessment |
C. | System release management |
D. | System reliability |
Answer» A. System procurement |
697. | It is responsible for deciding when the system can be released to customers, managing the process of creating the release and distribution media and documen- ting the release. |
A. | System procurement |
B. | System quality assessment |
C. | System release management |
D. | System reliability |
Answer» C. System release management |
698. | Process analysis |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» C. It is concerned with studying existing process to understand the relationship between different parts of the process. |
699. | System requirements are |
A. | The set of system services and constraints in details |
B. | System functions that restricts the use of objects to certain users. |
C. | Purposeful collection of interrelated components that work together to achieve some objective. |
D. | None of these |
Answer» A. The set of system services and constraints in details |
701. | Portability |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» A. Trustworthiness with which a system are transferred from one hardware environment to another |
702. | Lehman’s Third Law (Lehman and Belady 1985) is |
A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» C. Large program evolution: Program evolution is a self-regulating process. |
703. | Model is |
A. | These measurements need to be collected to help answers to the questions and to confirm whether process improvements have achieved the desired goal. |
B. | Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process |
C. | Extent to which a system or component facilitates the incorporation of changes, once the nature of the desired change has been determined. |
D. | None of these |
Answer» B. Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process |
704. | Lehman’s Fifth Law (Lehman and Belady 1985) is |
A. | Organizational stability: Over a pro- gram’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. |
B. | Conservation of familiarity: Over the lifetime of a system, the incremental change in each release is approxima- tely constant. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» B. Conservation of familiarity: Over the lifetime of a system, the incremental change in each release is approxima- tely constant. |
705. | Match the following : A- Maintenance control: B-Maintenance measures: C-Maintenance personnel : 1-Cost of planning and scheduling hardware preventive main- tenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Measures that address how easily a system can be repaired or changed. 3-Number of personnel needed to maintain all aspects of a computer system, including the support personnel and facilities needed to support that activity. |
A. | A-1, B-3,C-2 |
B. | A-1,B-2,C-3 |
C. | A-2,B-3,C-1 |
D. | A-3,B-2,C-1 |
Answer» B. A-1,B-2,C-3 |
706. | Organizational measures |
A. | Extent to which a system or component complies with standards |
B. | Trustworthiness of operating the software. |
C. | Measures that estimates system cost to operate and maintain |
D. | None of these |
Answer» C. Measures that estimates system cost to operate and maintain |
707. | Metric is |
A. | These measurements need to be collected to help answers to the questions and to confirm whether process improvements have achieved the desired goal. |
B. | Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process |
C. | Extent to which a system or component facilitates the incorporation of changes, once the nature of the desired change has been determined. |
D. | None of these |
Answer» A. These measurements need to be collected to help answers to the questions and to confirm whether process improvements have achieved the desired goal. |
708. | It shows the objects and object classes in a system and the relationship between these entities. |
A. | Object design models |
B. | Object interface design |
C. | Object oriented models |
D. | None of these |
Answer» A. Object design models |
709. | It is concerned with specifying the details of interface to an object or to a group of objects |
A. | Object design models |
B. | Object interface design |
C. | Object oriented models |
D. | None of these |
Answer» B. Object interface design |
710. | Modifiability is |
A. | These measurements need to be collected to help answers to the questions and to confirm whether process improvements have achieved the desired goal. |
B. | Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process* |
C. | Extent to which a system or component facilitates the incorporation of changes, once the nature of the desired change has been determined. |
D. | None of these |
Answer» C. Extent to which a system or component facilitates the incorporation of changes, once the nature of the desired change has been determined. |
711. | Software is |
A. | Superset of programs |
B. | subset of programs |
C. | Set of programs |
D. | none of the above |
Answer» A. Superset of programs |
712. | Which is NOT the part of operating procedure manuals? |
A. | User manuals |
B. | Operational manuals |
C. | Documentation manuals |
D. | Installation manuals |
Answer» C. Documentation manuals |
713. | Which is NOT a software characteristic? |
A. | Software does not wear out |
B. | Software is flexible |
C. | Software is not manufactured |
D. | Software is always correct |
Answer» D. Software is always correct |
714. | Product is |
A. | Deliverables |
B. | User expectations |
C. | Organization’s effort in development |
D. | none of the above |
Answer» A. Deliverables |
715. | To produce a good quality product, process should be |
A. | Complex |
B. | Efficient |
C. | Rigorous |
D. | none of the above |
Answer» B. Efficient |
716. | Which is not a product metric? |
A. | Size |
B. | Reliability |
C. | Productivity |
D. | Functionality |
Answer» C. Productivity |
717. | Which is NOT a process metric? |
A. | Productivity |
B. | Functionality |
C. | Quality |
D. | Efficiency |
Answer» B. Functionality |
718. | Effort is measured in terms of: |
A. | Person-months |
B. | Rupees |
C. | Persons |
D. | Months |
Answer» A. Person-months |
719. | UML stands for |
A. | Uniform modeling language |
B. | Unified modeling language |
C. | Unit modeling language |
D. | Universal modeling language |
Answer» B. Unified modeling language |
720. | An independently deliverable piece of functionality providing access to its services through interface is called |
A. | Software measurement |
B. | Software composition |
C. | Software measure |
D. | Software component |
Answer» D. Software component |
721. | Infrastructure software are covered under |
A. | Generic products |
B. | Customized products |
C. | Generic and Customized products |
D. | none of the above |
Answer» A. Generic products |
722. | Management of software development is dependent on |
A. | People |
B. | product |
C. | Process |
D. | all of the above |
Answer» D. all of the above |
723. | During software development, which factor is most crucial? |
A. | People |
B. | Product |
C. | Process |
D. | Project |
Answer» A. People |
724. | Program is |
A. | Subset of software |
B. | super set of software |
C. | Software |
D. | none of the above |
Answer» A. Subset of software |
726. | The term module used during design phase refers to | |
A. | Function | |
B. | Procedure | |
C. | Sub program | |
D. | All of the above | |
Answer» D. All of the above | ||
727. | Software consists of |
A. | Set of instructions + operating system |
B. | Programs + documentation + operating procedures |
C. | Programs + hardware manuals |
D. | Set of programs |
Answer» B. Programs + documentation + operating procedures |
728. | Software engineering approach is used to achieve: |
A. | Better performance of hardware |
B. | Error free software |
C. | Reusable software |
D. | Quality software product |
Answer» D. Quality software product |
729. | Concept of software engineering is applicable to |
A. | FORTRAN language only |
B. | Pascal language only |
C. | ‘C’ language only |
D. | All of the above |
Answer» D. All of the above |
730. | CASE Tool is |
A. | Computer Aided Software Engineering |
B. | Component Aided Software Engineering |
C. | Constructive Aided Software Engineering |
D. | Computer Analysis Software Engineering |
Answer» A. Computer Aided Software Engineering |
731. | Spiral Model was developed by |
A. | Bev Little wood |
B. | Berry Boehm |
C. | Roger Pressman |
D. | Victor Basili |
Answer» B. Berry Boehm |
732. | Which model is most popular for student’s small projects? |
A. | Waterfall model |
B. | Spiral model |
C. | Quick and fix model |
D. | Prototyping model |
Answer» C. Quick and fix model |
733. | Which is not a software life cycle model? |
A. | Waterfall model |
B. | Spiral model |
C. | Prototyping model |
D. | Capability maturity model |
Answer» D. Capability maturity model |
734. | Project risk factor is considered in |
A. | Waterfall model |
B. | Prototyping model |
C. | Spiral model |
D. | Iterative enhancement model |
Answer» C. Spiral model |
735. | SDLC stands for |
A. | Software design life cycle |
B. | Software development life cycle |
C. | System development life cycle |
D. | System design life cycle |
Answer» B. Software development life cycle |
736. | Build and fix model has |
A. | 3 phases |
B. | 1 phase |
C. | 2 phases |
D. | 4 phases |
Answer» C. 2 phases |
737. | Which of the following is a type of software? |
A. | System Software |
B. | Embedded Software |
C. | Application |
D. | all of the above |
Answer» A. System Software |
738. | Waterfall model is not suitable for |
A. | small projects |
B. | accommodating change |
C. | complex projects |
D. | none of the above |
Answer» B. accommodating change |
739. | RAD stands for |
A. | Rapid application development |
B. | Relative application development |
C. | Ready application development |
D. | Repeated application development |
Answer» A. Rapid application development |
740. | RAD model was proposed by |
A. | Lucent Technologies |
B. | Motorola |
C. | IBM |
D. | Microsoft |
Answer» C. IBM |
741. | If requirements are easily understandable and defined, which model is best suited? |
A. | Waterfall model |
B. | Prototyping model |
C. | Spiral model |
D. | None of the above |
Answer» A. Waterfall model |
742. | If requirements are frequently changing, which model is to be selected? |
A. | Waterfall model |
B. | Prototyping model |
C. | RAD model |
D. | Iterative enhancement model |
Answer» B. Prototyping model |
743. | If user participation is available, which model is to be chosen? |
A. | Waterfall model |
B. | Iterative enhancement model |
C. | Spiral model |
D. | RAD model |
Answer» D. RAD model |
744. | If limited user participation is available, which model is to be selected? |
A. | Waterfall model |
B. | Spiral model |
C. | Iterative enhancement model |
D. | any of the above |
Answer» D. any of the above |
745. | If project is the enhancement of existing system, which model is best suited? |
A. | Waterfall model |
B. | Prototyping model |
C. | Iterative enhancement model |
D. | Spiral model |
Answer» C. Iterative enhancement model |
746. | Which one is the most important feature of spiral model? |
A. | Quality management |
B. | Risk management |
C. | Performance management |
D. | Efficiency management |
Answer» B. Risk management |
747. | Most suitable model for new technology that is not well understood is: |
A. | Waterfall model |
B. | RAD model |
C. | Iterative enhancement model |
D. | Evolutionary development model |
Answer» D. Evolutionary development model |
748. | Statistically, the maximum percentage of errors belong to the following phase of SDLC |
A. | Coding |
B. | Design |
C. | Specifications |
D. | Installation and maintenance |
Answer» C. Specifications |
749. | Which phase is not available in software life cycle? |
A. | Coding |
B. | Testing |
C. | Maintenance |
D. | Abstraction |
Answer» D. Abstraction |
751. | The outcome of construction phased can be treated as: |
A. | Product release |
B. | Beta release |
C. | Alpha release |
D. | All of the above |
Answer» B. Beta release |
752. | Which one is not a step of requirement engineering? |
A. | Requirements elicitation |
B. | Requirements analysis |
C. | Requirements design |
D. | Requirements documentation |
Answer» C. Requirements design |
753. | Requirements elicitation means |
A. | Gathering of requirements |
B. | Capturing of requirements |
C. | Understanding of requirements |
D. | All of the above |
Answer» D. All of the above |
754. | SRS stands for |
A. | Software requirements specification |
B. | System requirements specification |
C. | Systematic requirements specifications |
D. | None of the above |
Answer» A. Software requirements specification |
755. | SRS document is for |
A. | “What” of a system? |
B. | How to design the system? |
C. | Costing and scheduling of a system |
D. | System’s requirement. |
Answer» A. “What” of a system? |
756. | Requirements review process is carried out to |
A. | Spend time in requirements gathering |
B. | Improve the quality of SRS |
C. | Document the requirements |
D. | None of the above |
Answer» B. Improve the quality of SRS |
757. | Which one of the statements is not correct during requirements engineering? |
A. | Requirements are difficult to uncover |
B. | Requirements are subject to change |
C. | Requirements should be consistent |
D. | Requirements are always precisely known. |
Answer» D. Requirements are always precisely known. |
758. | Which one is not a type of requirements? |
A. | Known requirements |
B. | Unknown requirements |
C. | Undreamt requirements |
D. | Complex requirements |
Answer» D. Complex requirements |
759. | Which one is not a requirements elicitation technique? |
A. | Interviews |
B. | The use case approach |
C. | FAST |
D. | Data flow diagram. |
Answer» D. Data flow diagram. |
760. | FAST stands for |
A. | Functional Application Specification Technique |
B. | Fast Application Specification Technique |
C. | Facilitated Application Specification Technique |
D. | None of the above |
Answer» C. Facilitated Application Specification Technique |
761. | QFD in requirement engineering stands for |
A. | Quality function design |
B. | Quality factor design |
C. | Quality function development |
D. | Quality function deployment |
Answer» D. Quality function deployment |
762. | Which is not a type of requirements under quality function deployment? |
A. | Normal requirements |
B. | Abnormal requirements |
C. | Expected requirements |
D. | Exciting requirements |
Answer» B. Abnormal requirements |
763. | Use case approach was developed by |
A. | I. Jacobson and others |
B. | J.D. Musa and others |
C. | B. Little wood |
D. | None of the above |
Answer» A. I. Jacobson and others |
764. | Context diagram explains |
A. | The overview of the system |
B. | The internal view of the system |
C. | The entities of the system |
D. | None of the above |
Answer» A. The overview of the system |
765. | DFD stands for |
A. | Data Flow design |
B. | Descriptive functional design |
C. | Data flow diagram |
D. | None of the above |
Answer» C. Data flow diagram |
766. | ERD stands for |
A. | Entity relationship diagram |
B. | Exit related diagram |
C. | Entity relationship design |
D. | Exit related design |
Answer» A. Entity relationship diagram |
767. | Which is not a characteristic of a good SRS? |
A. | Correct |
B. | Complete |
C. | Consistent |
D. | Brief |
Answer» D. Brief |
768. | Outcome of requirements specification phase is |
A. | Design Document |
B. | SRS Document |
C. | Test Document |
D. | None of the above |
Answer» B. SRS Document |
769. | The basic concepts of ER model are: |
A. | Entity and relationship |
B. | Relationships and keys |
C. | Entity, effects and relationship |
D. | Entity, relationship and attribute |
Answer» D. Entity, relationship and attribute |
770. | The DFD depicts |
A. | Flow of data |
B. | Flow of control |
C. | Both (a) & (b) |
D. | None of the above |
Answer» A. Flow of data |
771. | Product features are related to: |
A. | Functional requirements |
B. | Non functional requirements |
C. | Interface requirement |
D. | None of the above |
Answer» A. Functional requirements |
772. | Which one is a quality attribute? |
A. | Reliability |
B. | Availability |
C. | Security |
D. | All of the above |
Answer» D. All of the above |
773. | IEEE standard for SRS is: |
A. | IEEE Standard 837-1998 |
B. | IEEE Standard 830-1998 |
C. | IEEE Standard 832-1998 |
D. | IEEE Standard 839-1998 |
Answer» B. IEEE Standard 830-1998 |
774. | Which one is not a functional requirement? |
A. | Efficiency |
B. | Reliability |
C. | Product features |
D. | Stability |
Answer» C. Product features |
776. | After the finalization of SRS, we may like to estimate | |
A. | Size | |
B. | Cost | |
C. | Development time | |
D. | All of the above. | |
Answer» D. All of the above. | ||
777. | Which one is not a size measure for software |
A. | LOC |
B. | Function Count |
C. | Cyclomatic Complexity |
D. | Halstead’s program length |
Answer» C. Cyclomatic Complexity |
778. | Function count method was developed by |
A. | B.Beizer |
B. | B.Boehm |
C. | M.halstead |
D. | Alan Albrecht |
Answer» D. Alan Albrecht |
779. | Function point analysis (FPA) method decomposes the system into functional units. The total numbers of functional units are |
A. | 2 |
B. | 5 |
C. | 4 |
D. | 1 |
Answer» B. 5 |
780. | COCOMO was developed initially by |
A. | B.W.Bohem |
B. | Gregg Rothermal |
C. | B.Beizer |
D. | Rajiv Gupta |
Answer» A. B.W.Bohem |
781. | A COCOMO model is |
A. | Common Cost estimation model |
B. | Constructive cost Estimation model |
C. | Complete cost estimation model |
D. | Comprehensive Cost estimation model |
Answer» B. Constructive cost Estimation model |
782. | Estimation of software development effort for organic software is COCOMO is |
A. | E=2.4(KLOC)1.05PM |
B. | E=3.4(KLOC)1.06PM |
C. | E=2.0(KLOC)1.05PM |
D. | E-2.4(KLOC)1.07PM |
Answer» A. E=2.4(KLOC)1.05PM |
783. | Estimation of size for a project is dependent on |
A. | Cost |
B. | Schedule |
C. | Time |
D. | None of the above |
Answer» D. None of the above |
784. | In function point analysis, number of Complexity adjustment factor is |
A. | 10 |
B. | 20 |
C. | 14 |
D. | 12 |
Answer» C. 14 |
785. | COCOMO-II estimation model is based on |
A. | Complex approach |
B. | Algorithm approach |
C. | Bottom up approach |
D. | Top down approach |
Answer» B. Algorithm approach |
786. | Cost estimation for a project may include |
A. | Software Cost |
B. | Hardware Cost |
C. | Personnel Costs |
D. | All of the above |
Answer» D. All of the above |
787. | In COCOMO model, if project size is typically 2-50 KLOC, then which mode is to be selected? |
A. | Organic |
B. | Semidetached |
C. | Embedded |
D. | None of the above |
Answer» A. Organic |
788. | COCOMO-II was developed at |
A. | University of Maryland |
B. | University of Southern California |
C. | IBM |
D. | AT & T Bell labs |
Answer» B. University of Southern California |
789. | Which one is not a Category of COCOMO-II? |
A. | End User Programming |
B. | Infrastructure Sector |
C. | Requirement Sector |
D. | System Integration |
Answer» C. Requirement Sector |
790. | Which one is not infrastructure software? |
A. | Operating system |
B. | Database management system |
C. | Compilers |
D. | Result management system |
Answer» D. Result management system |
791. | How many stages are in COCOMO-II? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
792. | Which one is not a stage of COCOMO-II? |
A. | Application Composition estimation model |
B. | Early design estimation model |
C. | Post architecture estimation model |
D. | Comprehensive cost estimation model |
Answer» D. Comprehensive cost estimation model |
793. | The most desirable form of coupling is |
A. | Control |
B. | Data |
C. | Common |
D. | Content |
Answer» B. Data |
794. | The worst type of coupling is |
A. | Content |
B. | Common |
C. | External |
D. | Data coupling |
Answer» A. Content |
795. | The most desirable form of cohesion is |
A. | Logical cohesion |
B. | Procedural cohesion |
C. | Functional cohesion |
D. | Temporal cohesion |
Answer» C. Functional cohesion |
796. | The worst type of cohesion is |
A. | Temporal cohesion |
B. | Coincidental cohesion |
C. | Logical cohesion |
D. | Sequential cohesion |
Answer» B. Coincidental cohesion |
797. | Which one is not a strategy for design? |
A. | Bottom up design |
B. | Top down design |
C. | Embedded design |
D. | Hybrid design |
Answer» C. Embedded design |
798. | Software testing is: |
A. | The process of demonstrating that errors are not present |
B. | The process of establishing confidence that a program does what it is supposed to do |
C. | The process of executing a program to show it is working as per specifications |
D. | The process of executing a program with the intent of finding errors |
Answer» D. The process of executing a program with the intent of finding errors |
799. | Software mistakes during coding are known as: |
A. | failures |
B. | defects |
C. | bugs |
D. | errors |
Answer» C. bugs |
801. | Regression testing is primarily related to: | |
A. | Functional testing | |
B. | Data flow testing | |
C. | Development testing | |
D. | Maintenance testing | |
Answer» D. Maintenance testing | ||
802. | The relationship of data elements in a module is called |
A. | Coupling |
B. | Cohesion |
C. | Modularity |
D. | None of the above |
Answer» B. Cohesion |
803. | The extent to which different modules are dependent upon each other is called |
A. | Coupling |
B. | Cohesion |
C. | Modularity |
D. | Stability |
Answer» A. Coupling |
804. | A system that does not interact with external environment is called |
A. | Closed system |
B. | Logical system |
C. | Open system |
D. | Hierarchal system |
Answer» A. Closed system |
805. | Which one is not a phase of “bath tub curve” of hardware reliability |
A. | Burn-in |
B. | Useful life |
C. | Wear-out |
D. | Test-out |
Answer» D. Test-out |
806. | Software reliability i |
A. | The probability of failure free operation of a program for a specified time in a specified environment |
B. | The probability of failure of a program for a specified time in a specified environment |
C. | The probability of success of a program for a specified time in any environment |
D. | None of the above |
Answer» A. The probability of failure free operation of a program for a specified time in a specified environment |
807. | Fault is |
A. | Defect in the program |
B. | Mistake in the program |
C. | Error in the program |
D. | All of the above |
Answer» D. All of the above |
808. | One fault may lead to |
A. | one failure |
B. | two failures |
C. | many failures |
D. | all of the above |
Answer» D. all of the above |
809. | Which ‘time’ unit is not used in reliability studies? |
A. | Execution time |
B. | Machine time |
C. | Clock time |
D. | Calendar time |
Answer» B. Machine time |
810. | Failure occurrences can be represented as |
A. | time to failure |
B. | time interval between failures |
C. | failures experienced in a time interval |
D. | All of the above |
Answer» D. All of the above |
811. | As the reliability increases, failure intensity |
A. | decreases |
B. | increases |
C. | no effect |
D. | None of the above |
Answer» A. decreases |
812. | Maximum possible value of reliability is |
A. | 100 |
B. | 10 |
C. | 1 |
D. | 0 |
Answer» C. 1 |
813. | Minimum possible value of reliability is |
A. | 100 |
B. | 10 |
C. | 1 |
D. | 0 |
Answer» D. 0 |
814. | Software Quality is |
A. | Conformance to requirements |
B. | Fitness for the purpose |
C. | Level of satisfaction |
D. | All of the above |
Answer» D. All of the above |
815. | Defect rate is |
A. | Number of defects per million lines of source code |
B. | Number of defects per function point |
C. | Number of defects per unit of size of software |
D. | All of the above |
Answer» D. All of the above |
816. | How many product quality factors have been proposed in McCall quality model? |
A. | 2 |
B. | 3 |
C. | 11 |
D. | 6 |
Answer» D. 6 |
817. | Which one is not a product quality factor of McCall quality model? |
A. | Product revision |
B. | Product operation |
C. | Product specification |
D. | Product transition |
Answer» C. Product specification |
818. | The second level of quality attributes in McCall quality model are termed as |
A. | quality criteria |
B. | quality factors |
C. | quality guidelines |
D. | quality specifications |
Answer» A. quality criteria |
819. | Which one is not a level in Boehm software quality model? |
A. | Primary uses |
B. | Intermediate constructs |
C. | Primitive constructs |
D. | Final constructs |
Answer» D. Final constructs |
820. | Which one is not a software quality model? |
A. | McCall model |
B. | Boehm model |
C. | ISO 9000 |
D. | ISO 9126 |
Answer» C. ISO 9000 |
821. | Basic execution time model was developed by |
A. | Bev.Littlewood |
B. | J.D.Musa |
C. | R.Pressman |
D. | Victor Baisili |
Answer» D. Victor Baisili |
822. | NHPP stands for |
A. | Non Homogeneous Poisson Process |
B. | Non Heterogeneous Poisson Process |
C. | Non Homogeneous Poisson Product |
D. | Non Heterogeneous Poisson Product |
Answer» A. Non Homogeneous Poisson Process |
823. | In Basic execution time model, failure intensity is given by |
A. | λ(µ)=λ0(1-µ2 / V0) |
B. | λ(µ)=λ0(1-µ / V0) |
C. | λ(µ)=λ0(1-V0/ µ2) |
D. | λ(µ)=λ0(1- V0/ µ) |
Answer» B. λ(µ)=λ0(1-µ / V0) |
824. | In Basic execution time model, additional number of failures required to achieve a failure intensity objective is expressed as |
A. | 0/λ0(λP – λF) |
B. | ) 0/λ0(λF – λP) |
C. | λ0 0(λF – λP) |
D. | λ0/ 0 (λP – λF) |
Answer» A. 0/λ0(λP – λF) |
826. | Failure intensity function of Logarithmic Poisson execution model is given as | |
A. | λ(µ)= λ0LN(-θµ) | |
B. | λ(µ)= λ0exp(θµ) | |
C. | λ(µ)= λ0exp(-θµ) | |
D. | λ(µ)= λ0log(-θµ | |
Answer» C. λ(µ)= λ0exp(-θµ) | ||
827. | CMM level 1 has |
A. | 6 KPAs |
B. | 2 KPAs |
C. | 0 KPAs |
D. | None of the above |
Answer» C. 0 KPAs |
828. | MTBF stands for |
A. | Mean time between failure |
B. | Maximum time between failures |
C. | Minimum time between failures |
D. | Many time between failures |
Answer» A. Mean time between failure |
829. | CMM model is a technique to |
A. | Improve the software process |
B. | Automatically develop the software |
C. | Test the software |
D. | All of the above |
Answer» A. Improve the software process |
830. | Total numbers of maturing levels in CMM are |
A. | 1 |
B. | 3 |
C. | 5 |
D. | 7 |
Answer» C. 5 |
831. | Reliability of software is dependent on number of errors |
A. | removed |
B. | remaining |
C. | both (a) & (b) |
D. | None of the above |
Answer» B. remaining |
832. | Reliability of software is usually estimated at |
A. | Analysis phase |
B. | Design phase |
C. | Coding phase |
D. | Testing phase |
Answer» D. Testing phase |
833. | CMM stands for |
A. | Capacity maturity model |
B. | Capability maturity model |
C. | Cost management model |
D. | Comprehensive maintenance model |
Answer» B. Capability maturity model |
834. | Which level of CMM is for basic project management? |
A. | Initial |
B. | Repeatable |
C. | Defined |
D. | Managed |
Answer» B. Repeatable |
835. | Which level of CMM is for process management? |
A. | Initial |
B. | Repeatable |
C. | Defined |
D. | Optimizing |
Answer» D. Optimizing |
836. | CMM was developed at |
A. | Harvard University |
B. | Cambridge University |
C. | Carnegie Mellon University |
D. | Maryland University |
Answer» C. Carnegie Mellon University |
837. | The number of clauses used in ISO 9001 are |
A. | 15 |
B. | 25 |
C. | 20 |
D. | 10 |
Answer» C. 20 |
838. | In reliability models, our emphasis is on |
A. | errors |
B. | fault |
C. | failures |
D. | bugs |
Answer» C. failures |
839. | McCall has developed a |
A. | Quality model |
B. | Process improvement model |
C. | Requirement model |
D. | Design model |
Answer» A. Quality model |
840. | The model to measure the software process improvement is called |
A. | ISO 9000 |
B. | ISO 9126 |
C. | CMM |
D. | Spiral model |
Answer» C. CMM |
841. | In ISO 9126, each characteristic is related to |
A. | one attributes |
B. | two attributes |
C. | three attributes |
D. | four attributes |
Answer» A. one attributes |
842. | Each maturity model is CMM has |
A. | One KPA |
B. | Equal KPAs |
C. | Several KPAs |
D. | no KPA |
Answer» C. Several KPAs |
843. | ISO 9126 contains definitions of |
A. | quality characteristics |
B. | quality factors |
C. | quality attributes |
D. | All of the above |
Answer» D. All of the above |
844. | Which is not a software reliability model ? |
A. | The Jelinski-Moranda Model |
B. | Basic execution time model |
C. | Spiral model |
D. | None of the above |
Answer» C. Spiral model |
845. | In McCall quality model; product revision quality factor consist of |
A. | Maintainability |
B. | Flexibility |
C. | Testability |
D. | None of the above |
Answer» D. None of the above |
846. | In reliability models, our emphasis is on |
A. | errors |
B. | faults |
C. | failures |
D. | bugs |
Answer» C. failures |
847. | MTTF stands for |
A. | Mean time to failure |
B. | Maximum time to failure |
C. | Minimum time to failure |
D. | None of the above |
Answer» A. Mean time to failure |
848. | Software does not break or wear out like hardware. What is your opinion? |
A. | True |
B. | False |
C. | Cannot say |
D. | not fixed |
Answer» A. True |
849. | Software reliability is defined with respect to |
A. | time |
B. | speed |
C. | quality |
D. | None of the above |
Answer» A. time |
851. | For a function of n variables, boundary value analysis yields: |
A. | 4n+3 test cases |
B. | 4n+1 test cases |
C. | n+4 test cases |
D. | None of the above |
Answer» B. 4n+1 test cases |
852. | For a function of two variables, how many cases will be generated by robustness testing? |
A. | 9 |
B. | 13 |
C. | 25 |
D. | 42 |
Answer» B. 13 |
853. | For a function of n variables robustness testing of boundary value analysis yields: |
A. | 4n+1 |
B. | 4n+3 |
C. | 6n+1 |
D. | None of the above |
Answer» C. 6n+1 |
854. | A node with indegree=0 and outdegree ≠ 0 is called |
A. | Source node |
B. | Destination node |
C. | Transfer node |
D. | None of the above |
Answer» A. Source node |
855. | A node with indegree ≠ 0 and out degree=0 is called |
A. | Source node |
B. | Predicate node |
C. | Destination node |
D. | None of the above |
Answer» C. Destination node |
856. | A decision table has |
A. | Four portions |
B. | Three portions |
C. | Five portions |
D. | Two portions |
Answer» A. Four portions |
857. | Beta testing is carried out by |
A. | Users |
B. | Developers |
C. | Testers |
D. | All of the above |
Answer» A. Users |
858. | Equivalence class partitioning is related to |
A. | Structural testing |
B. | Black box testing |
C. | Mutation testing |
D. | All of the above |
Answer» B. Black box testing |
859. | Cause effect graphing techniques is one form of |
A. | Maintenance testing |
B. | Structural testing |
C. | Function testing |
D. | Regression testing |
Answer» C. Function testing |
860. | During validation |
A. | Process is checked |
B. | Product is checked |
C. | Developer’s performance is evaluated |
D. | The customer checks the product |
Answer» D. The customer checks the product |
861. | Verification is |
A. | Checking the product with respect to customer’s expectation |
B. | Checking the product with respect to specification |
C. | Checking the product with respect to the constraints of the project |
D. | All of the above |
Answer» B. Checking the product with respect to specification |
862. | Validation is |
A. | Checking the product with respect to customer’s expectation |
B. | Checking the product with respect to specifications |
C. | Checking the product with respect to the constraints of the project |
D. | All of the above |
Answer» A. Checking the product with respect to customer’s expectation |
863. | Alpha testing is done by |
A. | Customer |
B. | Tester |
C. | Developer |
D. | All of the above |
Answer» A. Customer |
864. | Site for Alpha testing is |
A. | Software company |
B. | Installation place |
C. | Anywhere |
D. | None of the above |
Answer» A. Software company |
865. | Site for Beta testing is |
A. | Software company |
B. | User’s site |
C. | Anywhere |
D. | All of the above |
Answer» B. User’s site |
866. | Acceptance testing is done by |
A. | Developers |
B. | Customers |
C. | Testers |
D. | All of the above |
Answer» B. Customers |
867. | One fault may lead to |
A. | One failure |
B. | No failure |
C. | Many failure |
D. | All of the above |
Answer» D. All of the above |
868. | Test suite is |
A. | Set of test cases |
B. | Set of inputs |
C. | Set of outputs |
D. | None of the above |
Answer» A. Set of test cases |
869. | Behavioral specification is required for: |
A. | Modeling |
B. | Verification |
C. | Validation |
D. | None of the above |
Answer» B. Verification |
870. | During the development phase, the following testing approach is not adopted |
A. | Unit testing |
B. | Bottom up testing |
C. | Integration testing |
D. | Acceptance testing |
Answer» D. Acceptance testing |
871. | Which is not a functional testing technique? |
A. | Boundary value analysis |
B. | Decision table |
C. | Regression testing |
D. | None of the above |
Answer» C. Regression testing |
872. | Decision table are useful for describing situations in which: |
A. | An action is taken under varying sets of conditions. |
B. | Number of combinations of actions is taken under varying sets of conditions |
C. | No action is taken under varying sets of conditions |
D. | None of the above |
Answer» D. None of the above |
873. | One weakness of boundary value analysis and equivalence partitioning is |
A. | They are not effective |
B. | They do not explore combinations of input circumstances |
C. | They explore combinations of input circumstances |
D. | None of the above |
Answer» B. They do not explore combinations of input circumstances |
874. | In cause effect graphing technique, cause & effect are related to |
A. | Input and output |
B. | Output and input |
C. | Destination and source |
D. | None of the above |
Answer» A. Input and output |
876. | Cyclomatic complexity is developed by |
A. | B.W.Boehm |
B. | T.J.McCabe |
C. | B.W.Lettlewood |
D. | Victor Basili |
Answer» D. Victor Basili |
877. | An independent path is |
A. | Any path through the DD path graph that introduce at least one new set of processing statements or new conditions |
B. | Any path through the DD path graph that introduce at most one new set of processing statements or new conditions |
C. | Any path through the DD path graph that introduce at one and only one new set of processing statements or new conditions |
D. | None of the above |
Answer» A. Any path through the DD path graph that introduce at least one new set of processing statements or new conditions |
878. | What is a Software? |
A. | Software is set of programs |
B. | Software is documentation and configuration of data |
C. | Software is set of programs, documentation & configuration of data |
D. | None of the mentioned |
Answer» C. Software is set of programs, documentation & configuration of data |
879. | Which of these software engineering activities are not a part of software processes? |
A. | Software dependence |
B. | Software development |
C. | Software validation |
D. | Software specification |
Answer» A. Software dependence |
880. | Which of these does not affect different types of software as a whole? |
A. | Heterogeneity |
B. | Flexibility |
C. | Business and social change |
D. | Security |
Answer» B. Flexibility |
881. | The fundamental notions of software engineering does not account for? |
A. | Software processes |
B. | Software Security |
C. | Software reuse |
D. | Software Validation |
Answer» D. Software Validation |
882. | Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code). |
A. | 100-200 |
B. | 200-400 |
C. | 400-1000 |
D. | above 1000 |
Answer» A. 100-200 |
883. | Which two models doesn’t allow defining requirements early in the cycle? |
A. | Waterfall & RAD |
B. | Prototyping & Spiral |
C. | Prototyping & RA |
D. | D Waterfall & Spiral |
Answer» B. Prototyping & Spiral |
884. | A company is developing an advance version of their current software available in the market, what model approach would they prefer? |
A. | RAD |
B. | Iterative Enhancement |
C. | Both RAD & Iterative Enhancement |
D. | Spiral |
Answer» C. Both RAD & Iterative Enhancement |
885. | Identify a fourth generation language (4GL) from the given below. |
A. | FORTRAN |
B. | COBOL |
C. | Unix shell |
D. | C++ |
Answer» C. Unix shell |
886. | Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model? |
A. | Spiral Model |
B. | Waterfall Model |
C. | Rad Model |
D. | 4GT Model |
Answer» D. 4GT Model |
887. | The work associated with software engineering can be categorized into three generic phases, regardless of application area, project size, or complexity namely the__________ phase which focuses on what, the_________ phase which focuses on how and the_________ phase which focuses on change. |
A. | support |
B. | development |
C. | definition |
D. | none |
Answer» C. definition |
888. | How many phases are there in Scrum? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | Scrum is an agile method which me |
Answer» D. Scrum is an agile method which me |
889. | User requirements are expressed as __________ in Extreme Programming. |
A. | implementation tasks |
B. | functionalities |
C. | scenarios |
D. | none of the mentioned |
Answer» C. scenarios |
890. | FAST stands for |
A. | Functional Application Specification Technique |
B. | Fast Application Specification Technique |
C. | Facilitated Application Specification Technique |
D. | None of the mentioned |
Answer» D. None of the mentioned |
891. | The user system requirements are the parts of which document? |
A. | SDD |
B. | SRS |
C. | DD |
D. | D SRD |
Answer» B. SRS |
892. | What is the first step of requirement elicitation? |
A. | Identifying Stakeholder |
B. | Listing out Requirements |
C. | Requirements Gathering |
D. | All of the mentioned |
Answer» A. Identifying Stakeholder |
893. | Why is Requirements Elicitation a difficult task? |
A. | Problem of scope |
B. | Problem of understanding |
C. | Problem of volatility |
D. | All of the mentioned |
Answer» D. All of the mentioned |
894. | ___________ and ____________ are the two viewpoints ed in Controlled Requirements Expression (CORE) |
A. | Functional, Non-Functional |
B. | User, Developer |
C. | Known, Unknown |
D. | All of the mentioned |
Answer» A. Functional, Non-Functional |
895. | Which of the following Requirement Elicitation Techniques is applicable to messy, changing and ill-defined problem situations? |
A. | Quality Function Deployment (QFD) |
B. | Prototyping |
C. | Soft Systems Methodology (SSM) |
D. | Controlled Requirements Expression (CORE) |
Answer» C. Soft Systems Methodology (SSM) |
896. | Which of the following is not a diagram studied in Requirement Analysis? |
A. | Use Cases |
B. | Entity Relationship Diagram |
C. | State Transition Diagram |
D. | Activity Diagram |
Answer» D. Activity Diagram |
897. | How many feasibility studies is conducted in Requirement Analysis? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
898. | The SRS is said to be consistent if and only if |
A. | its structure and style are such that any changes to the requirements can be made easily while retaining the style and structure |
B. | every requirement stated therein is one that the software shall meet |
C. | every requirement stated therein is verifiable |
D. | no subset of individual requirements described in it conflict with each other |
Answer» D. no subset of individual requirements described in it conflict with each other |
899. | Which of the following is a requirement management activity? |
A. | Investigation |
B. | Design |
C. | Construction and Test |
D. | All of the mentioned |
Answer» D. All of the mentioned |
901. | Which model in system modelling depicts the dynamic behavior of the system? |
A. | Context Model |
B. | Behavioral Model |
C. | Data Model |
D. | Object Model |
Answer» B. Behavioral Model |
902. | Which model in system modelling depicts the static nature of the system? |
A. | Behavioral Model |
B. | Context Model |
C. | Data Model |
D. | Structural Model |
Answer» D. Structural Model |
903. | Which perspective in system modelling shows the system or data architecture? |
A. | Structural perspective |
B. | Behavioral perspective |
C. | External perspective |
D. | All of the mentioned |
Answer» A. Structural perspective |
904. | The UML supports event-based modeling using ____________ diagrams. |
A. | Deployment |
B. | Collaboration |
C. | State chart |
D. | All of the mentioned |
Answer» C. State chart |
905. | Which of the following diagram is not supported by UML considering Data-driven modeling? |
A. | Activity |
B. | Data Flow Diagram (DFD) |
C. | State Chart |
D. | Component |
Answer» B. Data Flow Diagram (DFD) |
906. | _________________ allows us to infer that different members of classes have some common characteristics. |
A. | Realization |
B. | Aggregation |
C. | Generalization |
D. | dependency |
Answer» C. Generalization |
907. | ______________ & ______________ diagrams of UML represent Interaction modeling. |
A. | Use Case, Sequence |
B. | Class, Object |
C. | Activity, State Chart |
D. | All of the mentioned |
Answer» A. Use Case, Sequence |
908. | ___________ Classes are used to create the interface that the user sees and interacts with as the software is used. |
A. | Controller |
B. | Entity |
C. | Boundary |
D. | Business |
Answer» C. Boundary |
909. | Which of the following statement is incorrect regarding the Class-responsibility-collaborator (CRC) modeling? |
A. | All use-case scenarios (and corresponding use-case diagrams) are organized into categories in CRC modelling |
B. | The review leader reads the use-case deliberately |
C. | Only developers in the review (of the CRC model) are given a subset of the CRC model index cards |
D. | All of the mentioned |
Answer» C. Only developers in the review (of the CRC model) are given a subset of the CRC model index cards |
910. | Which is the first step in the software development life cycle? |
A. | Analysis |
B. | Design |
C. | Problem/Opportunity Identification |
D. | Development and Documentation |
Answer» C. Problem/Opportunity Identification |
911. | Which tool is use for structured designing? |
A. | Program flowchart |
B. | Structure chart |
C. | Data-flow diagram |
D. | Module |
Answer» B. Structure chart |
912. | A step by step instruction used to solve a problem is known as |
A. | Sequential structure |
B. | A List |
C. | A plan |
D. | An Algorithm |
Answer» D. An Algorithm |
913. | In the Analysis phase, the development of the ____________ occurs, which is a clear statement of the goals and objectives of the project. |
A. | documentation |
B. | flowchart |
C. | program specification |
D. | design |
Answer» C. program specification |
914. | Actual programming of software code is done during the ____________ step in the SDLC. |
A. | Maintenance and Evaluation |
B. | Design |
C. | Analysis |
D. | Development and Documentation |
Answer» D. Development and Documentation |
915. | Which of the property of software modularity is incorrect with respect to benefits software modularity? |
A. | Modules are robust |
B. | Module can use other modules |
C. | Classes |
D. | Sub procedures |
Answer» B. Module can use other modules |
916. | Which of the property of software modularity is incorrect with respect to benefits software modularity? |
A. | Modules are robust |
B. | Module can use other modules |
C. | Modules Can be separately compiled and stored in a library |
D. | Modules are mostly dependent |
Answer» D. Modules are mostly dependent |
917. | _______________ is a measure of the degree of interdependence between modules. |
A. | Cohesion |
B. | Coupling |
C. | None of the mentione |
D. | D All of the mentioned |
Answer» B. Coupling |
918. | This set of Basic Software Engineering Questions and Answers focuses on “Function Oriented Software Design”. 1. Choose the option that does not define Function Oriented Software Design. |
A. | It consists of module definitions |
B. | Modules represent data abstraction |
C. | Modules support functional abstraction |
D. | None of the mentioned |
Answer» B. Modules represent data abstraction |
919. | Which of the following is a complementary approach to function-oriented approach? |
A. | Object oriented analysis |
B. | Object oriented design |
C. | Structured approach |
D. | Both Object oriented analysis and design |
Answer» D. Both Object oriented analysis and design |
920. | Debugging is: |
A. | creating program code |
B. | finding and correcting errors in the program code |
C. | identifying the task to be computerize |
D. | D creating the algorithm |
Answer» B. finding and correcting errors in the program code |
921. | Cohesion is a qualitative indication of the degree to which a module |
A. | can be written more compactly |
B. | focuses on just one thing |
C. | is able to complete its function in a timely manner |
D. | is connected to other modules and the outside world |
Answer» B. focuses on just one thing |
922. | Which of the following is a disadvantage of OOD? |
A. | Easier maintenance |
B. | Objects are potentially reusable components |
C. | A , B |
D. | None |
Answer» D. None |
923. | Which of the following describes”Is-a-Relationship”? |
A. | Aggregation |
B. | Inheritance |
C. | Dependency |
D. | All of the mentioned |
Answer» B. Inheritance |
924. | Object that collects data on request rather than autonomously is known as |
A. | Active Object |
B. | Passive Object |
C. | Multiple instance |
D. | None of the mentioned |
Answer» B. Passive Object |
926. | Function-oriented design techniques starts with functional requirements specified in |
A. | SDD |
B. | SRS |
C. | All of the mentione |
D. | D None |
Answer» B. SRS |
927. | In DFDs, user interactions with the system is denoted by |
A. | Circle |
B. | Arrow |
C. | Rectangle |
D. | Triangle |
Answer» A. Circle |
928. | What is Cyclomatic complexity |
A. | Black Box Testing |
B. | White Box Testing |
C. | Green Box Testing |
D. | Yellow Box Testing |
Answer» B. White Box Testing |
929. | What are the various Testing Levels? |
A. | All of the mentioned |
B. | Unit Testing |
C. | System Testing |
D. | Integration Testing |
Answer» A. All of the mentioned |
930. | Boundary value analysis belong to? |
A. | White Box Testing |
B. | Black Box Testing |
C. | A,B |
D. | None |
Answer» B. Black Box Testing |
931. | Alpha testing is done at |
A. | Developer’s end |
B. | User’s end |
C. | Developer’s & User’s en |
D. | D None of the mentioned |
Answer» A. Developer’s end |
932. | The testing in which code is checked |
A. | Black box testing |
B. | White box testing |
C. | Red box testing |
D. | Green box testing |
Answer» B. White box testing |
933. | Testing done without planning and Documentation is called |
A. | Unit testing |
B. | Regression testing |
C. | Adhoc testing |
D. | None of the mentioned |
Answer» C. Adhoc testing |
934. | Acceptance testing is also known as |
A. | Grey box testing |
B. | White Box Testing |
C. | Alpha Testing |
D. | Beta Testing |
Answer» D. Beta Testing |
935. | Which of the following is not used in measuring the size of the software |
A. | KLOC |
B. | Function Points |
C. | Size of module |
D. | None of the mentioned |
Answer» C. Size of module |
936. | Software Debugging is a set of activities that can be planned in advance and conducted systematically. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False |
937. | In which testing level the focus is on customer usage? |
A. | Alpha Test |
B. | Beta Test |
C. | Validation Test |
D. | A,B |
Answer» D. A,B |
938. | Which of the following is not a part of Software Configuration Management Basics? |
A. | Identification |
B. | Version |
C. | Auditing and Reviewing |
D. | Status Accounting |
Answer» B. Version |
939. | The architecture of object-oriented software results in a series of layered subsystems that encapsulate collaborating classes. |
A. | False |
B. | True |
C. | none |
D. | all |
Answer» B. True |
940. | What is a collection of software elements treated as a unit for the purposes of SCM? |
A. | Software Configuration Item |
B. | Baseline |
C. | Configuration |
D. | Configuration Control Board |
Answer» A. Software Configuration Item |
941. | Which of the following is a example of Configuration Items? |
A. | SCM procedures |
B. | Source code |
C. | Software design descriptions |
D. | All of the mentioned |
Answer» D. All of the mentioned |
942. | Quality Management in software engineering is also known as |
A. | SQA |
B. | SQM |
C. | SQI |
D. | SQA, SQM |
Answer» A. SQA |
943. | What is Six Sigma? |
A. | It is the most widely used strategy for statistical quality assurance |
B. | The “Six Sigma” refers to six standard deviations |
C. | It is the most widely used strategy for statistical quality assurance AND The “Six Sigma” refers to six standard deviations |
D. | A Formal Technical Review(FTR) guideline for quality walkthrough or inspection |
Answer» C. It is the most widely used strategy for statistical quality assurance AND The “Six Sigma” refers to six standard deviations |
944. | Which of the following is not a core step of Six Sigma? |
A. | Define |
B. | Control |
C. | Measure |
D. | Analysis |
Answer» B. Control |
945. | Software safety is equivalent to software reliability. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False |
946. | Which one of the following is not a software quality model? |
A. | ISO 9000 |
B. | McCall model |
C. | Boehm model |
D. | ISO 9126 |
Answer» A. ISO 9000 |
947. | What is MTTF? |
A. | Maximum time to failure |
B. | Mean time to failure |
C. | Minimum time to failure |
D. | None of the mentioned |
Answer» B. Mean time to failure |
948. | In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code? |
A. | interactivity |
B. | completeness |
C. | abstraction level |
D. | Directional level |
Answer» C. abstraction level |
949. | Which of the following is not a business goal of re-engineering? |
A. | Cost reduction |
B. | Time reduction |
C. | Maintainability |
D. | None of the mentioned |
Answer» D. None of the mentioned |
951. | What stores all changes and info related to the project from development through maintenance in CASE tools? | |
A. | Database | |
B. | Repository | |
C. | Registers | |
D. | None of the mentioned | |
Answer» B. Repository | ||
952. | Software Maintenance includes |
A. | Error corrections |
B. | Enhancements of capabilities |
C. | Deletion of obsolete capabilities |
D. | All of the mentioned |
Answer» D. All of the mentioned |
953. | What type of software testing is generally used in Software Maintenance? |
A. | Regression Testing |
B. | System Testing |
C. | Integration Testing |
D. | Unit Testing |
Answer» A. Regression Testing |
954. | Which regression test selection technique exposes faults caused by modifications? |
A. | Efficiency |
B. | Precision |
C. | Generality |
D. | Inclusiveness |
Answer» D. Inclusiveness |
955. | “Robustness” answers which of the following description? |
A. | CASE tools be used to support the process activities |
B. | Process errors are avoided or trapped before they result in product errors |
C. | Defined process is acceptable and usable by the engineers responsible for producing the software |
D. | Process continues in spite of unexpected problems |
Answer» D. Process continues in spite of unexpected problems |
956. | Process improvement is the set of activities, methods, and transformations that developers use to develop and maintain information systems. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False |
957. | Which of the following is not a SQA plan for a project? |
A. | evaluations to be performed |
B. | amount of technical work |
C. | audits and reviews to be performe |
D. | D documents to be produced by the SQA group |
Answer» B. amount of technical work |
958. | It is always best to start process analysis with a new test model. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False |
959. | CMM stands for |
A. | Capability Management Module |
B. | Conservative Maturity Model |
C. | Capability Maturity Module |
D. | Capability Maturity Model |
Answer» D. Capability Maturity Model |
960. | A ________ view shows the system hardware and how software components are distributed across the processors in the system. |
A. | Physical |
B. | Logical |
C. | Process |
D. | All |
Answer» A. Physical |
961. | Architectural design is a creative process satisfying only functional-requirements of a system. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False |
962. | Which of the following is a type of Architectural Model? |
A. | Static structural model |
B. | Dynamic process model |
C. | Distribution model |
D. | All of the mentioned |
Answer» D. All of the mentioned |
963. | What describes how a set of interacting components can share data? |
A. | model-view-controller |
B. | architecture pattern |
C. | repository pattern |
D. | none of the mentioned |
Answer» C. repository pattern |
Tags
Question and answers in Software Engineering,Software Engineering multiple choice questions and answers,Software Engineering Important MCQs,Solved MCQs for Software Engineering,Software Engineering MCQs with answers PDF download