Software Engineering MCQ's
Software Engineering MCQ's
Software Engineering MCQ's
Information management model involves four steps -------- , --------- , --------- & -------- ?
A. Diagnosis evaluation, design, implementation (Answer)
B. Diagnosis, design, software, hardware
C. Hardware, software, DBMS, Data communication
D. None of these
The ----------- calls for trimming and chopping of these designs so that the cost is reduced,
service is improved and the customer gets higher value at a higher speed?
A. Business process
B. Radical redesign (Answer)
C. The fundamental rethinking
D. None of these
In a typical ------------ network, application processing is shared between clients and one more
servers?
A. client server computing (Answer)
B. data computing
C. mobile computing
D. cloud computing
Which of the following is NOT a guideline for successfully conducting a Joint Requirements
Planning (JRP) session ?
A. stay on schedule
B. allow for ample breaks
C. brainstorm technical alternatives to problems identified in a JRP session (Answer)
D. None of these
Who are the people that actually use the system to perform or support the work to be
completed ?
A. system analysts
B. system designers
C. system owners
D.None of the above (Answer)
Management is the process of achieving organizational goal by --------- , ---------- , ---------- and
---------- organizational resources?
A. Organizing, dealing, planning, controlling
B. Planning, scheduling, controlling, organizing
C. Planning, organizing, leading, controlling (Answer)
D. None of these
A ----------- process in any area of the business organization performs basic steps such as,
receive input, measure, analyze, document, perform, process, record / store, access, produce
and communicate?
A. Value
B. Decision making
C. Business (Answer)
D. Re-engineering
---------- processing, involves duplicating, sorting and filling data. -------- processing with
electronic scanners involves transforming and entering the data into an electronic form?
A. Manual, electronic (Answer)
B. Electronic, manual
C. Transforming
D. None of the above
------------is/are the resources are used for DSS to explore decision alternatives?
A. Data
B. Software
C. Hardware
D.People (Answer)
------------- type of testing ensures the system is free of errors and is ready to be placed into
operation?
A. Audit (Answer)
B. General
C. Technical
D. Data
Which of the following is(are) the inputs to the Systems Construction phase ?
A. design prototypes
B. redesigned business processes
C. physical design specifications
D.all of the above (Answer)
The person generally responsible for the program design strategy, standards, and
construction is called a(n) ?
A. program librarian
B. backup chief programmer
C. network designer
D.chief programmer (Answer)
Which of the following analysis techniques derive system models from existing system or
discovery prototypes ?
A. rapid architected analysis (Answer)
B. object-oriented analysis
C. data modeling
D. discovery prototyping
Which of the following is a deliverable of the system implementation phase in a formal system
development process ?
A. technical hardware and software solution for the business problem (Answer)
B. business problem statement
C. statement of the system users’ business requirements
D. techni
The person who ensures that systems are developed on time, within budget, and with
acceptable quality is a--------------?
A. systems designer
B. project manager (Answer)
C. systems owner
D. external system user
Which of the following is not a type of navigation system for a web site ?
A. National
B. Global
C. Contextual
D.Regional (Answer)
---------- development of DSS relies on the creation of a prototype and its progressive
refinement?
A. Iterative (Answer)
B. Traditional
C. Quick hit
D. None of these
Which one of the following is not a business driver for an information system ?
A. business process redesign
B. knowledge asset management
C. proliferation of networks and the Internet (Answer)
D. security and privacy
Which of the following steps is/are the implementation plans involved in MIS ?
A. Preparing organizational plans
B. Planning of work flow
C. Training of personnel
D.All of the above (Answer)
If you need to collect employee status information (e.g., full-time vs. part-time) on a computer
screen, your best choice for a GUI control would be ?
A. drop-down list
B. masked edit control
C. radio buttons (Answer)
D. spin box
Contemporary Information Systems are interfacing with customers and suppliers using ?
A. SCM
B. CRM
C. Both A and B (Answer)
D. BPR
When a bank uses business performance management software to monitor its performance in
differences regions this ?
A. reduces costs
B. manages risks (Answer)
C. adds value
D. creates a new opportunity
----------- systems help to a analyze historical and current data either on demand or
periodically?
A. Data access system
B. Data analysis system (Answer)
C. Fore cast-oriented data analysis system
D. System based on accounting models
The first CMM level at which measurable goals for quality and productivity are established
is--------------?
A. Level 1
B. Level 2
C. Level 3
D.Level 4 (Answer)
Which of the following is the last phase of the Systems Construction phase ?
A. build and test databases
B. write and test new programs (Answer)
C. prepare conversion plan
D. build and test networks
MIS normally found in a manufacturing organization will not be suitable in the -----------------
?
A. Service sector (Answer)
B. Banking sector
C. Agriculture sector
D. All of the above
A list of the names of all customers who purchased only one product within a six-month
period would be an example of a(n)--------------?
A. detailed report
B. summary report
C. exception report (Answer)
D. external report
When a bank uses information to launch a personalised credit card product this-------------?
A. manages risks
B. creates a new opportunity
C. adds value (Answer)
D. reduces costs
Language-based, machine-readable representations of what a software process is supposed to
do, or how a software process is supposed to accomplish its task is known as-----------------?
A. prototyping
B. software specifications
C. application programs (Answer)
D. human engineering
Which one of the following fact-finding techniques is an inexpensive means of gathering data
from a large number of individuals ?
A. observations
B. work sampling
C. interviews
D.None of the above (Answer)
A specification of how the user moves from window to window, interacting with the
application programs to perform useful work is called---------------?
A. interface specifications
B. software specifications
C. user dialog (Answer)
D. prototyping specifications
Which of the tests is a final system test performed by end users using real data over an
extended period of time ?
A. final test
B. complete test
C. systems acceptance test (Answer)
D. parallel test
------------ tests make sure that new code does not break existing code?
A. Integration tests (Answer)
B. Regression tests
C. Load test
D. Unit tests
How do you get information from a form that is submitted using the “post” method ?
A. Request.QueryString
B. Response.writeln
C. Response.write
D.Request.Form (Answer)
In ASP.NET application the Global.asax file lie in which directory-----------------?
A. System
B. ROOT (Answer)
C. Application
D. None of the Above
Which of the following is one of the steps in the integration testing of OO software ?
A. cluster testing (Answer)
B. thread-based testing
C. use-based testing
D. None of the mentioned
Which testing is an integration testing approach that is commonly used when “shrink-
wrapped” software products are being developed ?
A. Regression Testing
B. Integration testing
C. Smoke testing (Answer)
D. Validation testing
Which of the following errors should not be tested when error handling is evaluated ?
A. Error description is unintelligible (Answer)
B. Error noted does not correspond to error encountered
C. Error condition causes system intervention prior to error handling
D.
Which of the following is not used in measuring the size of the software---------------------?
A. KLOC
B. Function Points
C. Size of module (Answer)
D. None of the mentioned
In ISO 9126, time behavior and resource utilization are a part of-------------------?
A. maintainability
B. portability
C. efficiency (Answer)
D. usability
Which of the following Error Detection checks is not a part of Application detection ?
A. Hardware checks (Answer)
B. Timing checks
C. Reversal checks
D. Coding checks
A system maintaining its integrity while accepting a temporary halt in its operation is said to
be in a state of-------------------?
A. Full Fault Tolerance
B. Graceful Degradation
C. Fail Soft
D.Fail Safe (Answer)
What type of fault remains in the system for some period and then disappears ?
A. Permanent
B. Transient (Answer)
C. Intermittent
D. All of the mentioned
Suitability, Accuracy, Interoperability, and security are what type quality attribute of ISO
9126 ?
A. Reliability
B. Efficiency
C. Functionality (Answer)
D. Usability
What is MTTF ?
A. Maximum time to failure
B. Mean time to failure (Answer)
C. Minimum time to failure
D. None of the mentioned
How many product quality factors are proposed in McCall quality model ?
A. 2
B. 3 (Answer)
C. 11
D. 8
Which of the following term is best define by the statement:”Each object is stored only once,
but is accessible by all CASE tools that need it.”?
A. Non-redundant data storage (Answer)
B. Data independence
C. Transaction control
D. Ad Hoc data queries and reports
Which web app attribute is defined by the statement:”The quality and aesthetic nature of
content remains an important determinant of the quality of a WebApp” ?
A. Availability
B. Data driven
C. Content sensitive (Answer)
D. Continuous evolution
Which of the following is a risk associated with using hypertext in web applications?
A. Loss of sense of locality and direction
B. Cognitive overload for users
C. All of the mentioned (Answer)
D. None of the mentioned
If the user queries a collection of large databases and extracts information from the webapp,
the webapp is categorized under--------------------?
A. Service oriented app
B. Database access app
C. Portal app
D.Data warehousing app (Answer)
Which analysis is a part of Analysis model of the web engineering process framework ?
A. Content Analysis
B. Interaction Analysis
C. Functional Analysis
D.All of the mentioned (Answer)
Which web app attribute is defined by the statement:”A large number of users may access
the WebApp at one time”?
A. Unpredictable load
B. Performance
C. Concurrency (Answer)
D. Network intensiveness
Which process model should be used in virtually all situations of web engineering ?
A. Incremental Model (Answer)
B. Waterfall Model
C. Spiral Model
D. None of the mentioned
The times by which stimuli must be processed and some response produced by the system is
known as--------------------?
A. Compile time
B. Frequency
C. Deadlines (Answer)
D. Execution time
Which of the following is represented as an aspect that requests a login name and password ?
A. Class
B. Object
C. User authentication (Answer)
D. All of the mentioned
The average execution time of the power monitor process should be less than------------------?
A. 1ms (Answer)
B. 10ms
C. 100ms
D. None of the mentioned
Which of the following concerns best suits the following statement:”Internet banking system
includes new customer requirements, account Requirements, customer management
requirements, security requirements, recovery requirements etc.” ?
A. Functional concerns
B. Quality of service concerns
C. System concerns
D.Cross-cutting concerns (Answer)
An event in an executing program where the advice associated with an aspect may be
executed is known as-------------------?
A. aspect
B. join point (Answer)
C. join point model
D. pointcut
Which of the following term is best defined by the statement:”The client sends structured
query language (SQL) requests to the server which are transmitted as messages across the
net” ?
A. File servers
B. Database servers (Answer)
C. Client servers
D. None of the mentioned
Which test do you infer from the following statement: “The coordination and data
management functions of the server are tested.” ?
A. Server tests (Answer)
B. Application function tests
C. Transaction tests
D. Network communication tests
“A client is assigned all user presentation tasks and the processes associated with data
entry”.Which option supports the client‟s situation ?
A. Distributed logic (Answer)
B. Distributed presentation
C. Remote presentation
D. All of the mentioned
Which of the following term is best defined by the statement:”When one object invokes
another independent object, a message is passed between the two objects.” ?
A. Control couple
B. Application object
C. Data couple (Answer)
D. Database object
What is used to pass SQL requests and associated data from one component to another ?
A. Client/server SQL interaction (Answer)
B. Remote procedure calls
C. SQL Injection
D. All of the mentioned
Which architecture describes the various elements that support the implementation of
services?
A. The Application Architecture
B. The Service Architecture
C. The Component Architecture (Answer)
D. None of the mentioned
The transition functions that are implied by the state box are defined in------------------?
A. Yellow box
B. Clear box (Answer)
C. White box
D. Black box
What encapsulates state data and services in a manner that is analogous to objects ?
A. State box (Answer)
B. Clean box
C. White box
D. Black box
Which of the following is required for Certification for clean room software engineering ?
A. Sampling model
B. Component model
C. Certification model
D.All of the mentioned (Answer)
Cleanroom software engineering complies with the operational analysis principles by using a
method called known as----------------?
A. box structure specification (Answer)
B. referential transparency
C. degenerative error correction
D. None of the mentioned
Which of the following Cleanroom process teams develops set of statistical test to exercise
software after development ?
A. Specification team
B. Development team (Answer)
C. Certification team
D. All of the mentioned
Which architecture is used when there is a high volume of transactions to be processed by the
server ?
A. Multi-tier client–server architecture (Answer)
B. Master-slave architecture
C. Distributed component architecture
D. Peer-to-peer architecture
--------------- is a way of providing functionality on a remote server with client access through
a web browser?
A. SaaS (Answer)
B. SOA
C. Configurability
D. Both SaaS and Configurability
Which of the following is a way of making a statement about the elements of a set that is true
for every member of the set ?
A. Set
B. Sequence
C. Universal quantification (Answer)
D. Both Set and Sequence
The --------------- of a formal specification language is often based on a syntax that is derived
from standard set theory notation and predicate calculus ?
A. semantic domain
B. syntactic domain (Answer)
C. sequence
D. set
Which of the following is essential for success, when formal methods are used for the first
time ?
A. Expert training
B. Consulting
C. Prerequisite knowledge
D.Both Expert training and Consulting (Answer)
The ---------------- of a specification language indicates how the language represents system
requirements?
A. semantic domain (Answer)
B. syntactic domain
C. sequence
D. set
Which of the following provides a concise, unambiguous, and consistent method for
documenting system requirements ?
A. CMM
B. ISO-9001
C. CASE tools
D.Formal methods (Answer)
Which of the following occurs often due to the bulkiness of a system specification document ?
A. Contradictions
B. Ambiguities
C. Vagueness (Answer)
D. Incompleteness
Frameworks are an effective approach to reuse, but are ------------- to introduce into software
development processes.
A. difficult
B. expensive
C. unreliable
D.difficult and expensive (Answer)
Which option supports the statement:”Most web frameworks now provide AJAX support” ?
A. Session Management
B. Security
C. User interaction (Answer)
D. Database support
Which category the following statement belongs,”Classes to create and manage sessions are
usually part of a WAF”?
A. Session management (Answer)
B. Security
C. User interaction
D. Database support
The MVC pattern was originally proposed in the 1980s as an approach to----------------?
A. Web application frameworks
B. Middleware integration frameworks
C. Web application frameworks
D.GUI design (Answer)
What are generic application systems that may be designed to support a particular business
type, activity, or sometimes a complete enterprise ?
A. COTS-solution systems (Answer)
B. COTS-integrated systems
C. ERP systems
D. Both COTS-solution and COTS-integrated systems
Which framework class include standards and classes that support component
communication and information exchange?
A. System infrastructure frameworks
B. Middleware integration frameworks (Answer)
C. Enterprise application frameworks
D. MVC
An ordering system may be adapted to cope with a centralized ordering process in one
company and a distributed process in another.” Which category the example belong to ?
A. Process specialization (Answer)
B. Platform specialization
C. Environment specialization
D. Functional specialization
The open source movement has meant that there is a huge reusable code base available at -----
-------------?
A. free of cost
B. low cost (Answer)
C. high cost
D. short period of time
Which of the following is a dynamic model that shows how the system interacts with its
environment as it is used ?
A. system context model
B. interaction model (Answer)
C. environmental model
D. both system context and interaction
Which of the following is a structural model that demonstrates the other systems in the
environment of the system being developed ?
A. system context model (Answer)
B. interaction model
C. environmental model
D. both system context and interaction
Which of the following is not needed to develop a system design from concept to detailed
object-oriented design ?
A. Designing system architecture
B. Developing design models
C. Specifying interfaces
D.Developing a debugging system (Answer)
We use --------------- where various parts of system use are identified and analyzed in turn?
A. tangible entities
B. scenario-based analysis (Answer)
C. design-based analysis
D. None of the mentioned
If the system state is Shutdown then it can respond to which of the following message?
A. restart()
B. reconfigure()
C. powerSave()
D.all of the mentioned (Answer)
Which model describes the static structure of the system using object classes and their
relationships ?
A. Sequence model
B. Subsystem model
C. Dynamic model
D.Structural model (Answer)
Which message is received so that the system moves to the Testing state, then the
Transmitting state, before returning to the Running state ?
A. signalStatus()
B. remoteControl()
C. reconfigure()
D.reportStatus() (Answer)
Which diagram indicates the behaviour of the system as a consequence of external events ?
A. data flow diagram
B. state transition diagram (Answer)
C. control specification diagram
D. workflow diagram
----------------------- defines the properties of a data object and take on one of the three
different characteristics ?
A. data object
B. attributes (Answer)
C. relationships
D. data object and attributes
The -------------- of a relationship is 0 if there is no explicit need for the relationship to occur or
the relationship is optional ?
A. modality (Answer)
B. cardinality
C. entity
D. structured analysis
A -------------- is a graphical representation that depicts information flow and the transforms
that are applied as data moves from input to output?
A. data flow diagram
B. state transition diagram (Answer)
C. control specification
D. workflow diagram
The ------------------- enables the software engineer to develop models of the information
domain and functional domain at the same time-------------------?
A. data flow diagram (Answer)
B. state transition diagram
C. control specification
D. activity diagram
Which of the following term is best defined by the statement:”The ability to represent local
and global data is an essential element of component-level design.” ?
A. Data representation (Answer)
B. Logic verification
C. “Code-to” ability
D. Automatic processing
Which diagram evolved from a desire to develop a procedural design representation that
would not allow violation of the structured constructs ?
A. State transition diagram
B. Box diagram (Answer)
C. ER diagram
D. None of the mentioned
A --------------- executes the loop task first, then tests a condition and repeats the task until the
condition fails ?
A. repeat until (Answer)
B. condition
C. do while tests
D. if then-else
Which of the following is not a design principle that allow the user to maintain control ?
A. Provide for flexible interaction
B. Allow user interaction to be interrupt-able and undo-able
C. Show technical internals from the casual user (Answer)
D. Design for direc
Which of the following term is best defined by the statement “Notation that can be input
directly into a computer-based development system offers significant benefits.” ?
A. Machine readability (Answer)
B. Maintainability
C. Structure enforcement
D. Overall simplicity
When users are involved in complex tasks, the demand on --------------- can be significant?
A. short-term memory (Answer)
B. shortcuts
C. objects that appear on the screen
D. all of the mentioned
What combines the outward manifestation of the computer-based system , coupled with all
supporting information that describe system syntax and semantics ?
A. mental image
B. interface design
C. system image (Answer)
D. interface validation
Which of the following is a black box testing strategy ?
A. All Statements Coverage
B. Control Structure Coverage
C. Cause-Effect Graphs (Answer)
D. All Paths Coverage
Which test refers to the retesting of a unit, integration and system after modification, in order
to ascertain that the change has not introduced new faults ?
A. Regression Test (Answer)
B. Smoke Test
C. Alpha Test
D. Beta Test
In which test design each input is tested at both ends of its valid range and just outside its
valid range ?
A. Boundary value testing
B. Equivalence class partitioning (Answer)
C. Boundary value testing AND Equivalence class partitioning
D. Decision tables
Specifying a set of test cases or test paths for each item to be tested at that level is known as---
---------------?
A. Test case generation
B. Test case design
C. ALL of the mentioned (Answer)
D. None of the mentioned
You want to avoid multiple inheritance. Which design pattern would you choose ?
A. Abstraction-Occurrence Pattern
B. Player-Role Pattern (Answer)
C. General Hierarchy Pattern
D. Singleton Pattern
Which pattern prevents one from creating more than one instance of a variable ?
A. Factory Method
B. Singleton (Answer)
C. Observer
D. None of the mentioned
You want to minimize development cost by reusing methods? Which design pattern would
you choose ?
A. Adapter Pattern
B. Singleton Pattern
C. Delegation pattern (Answer)
D. Immutable Pattern
The use of design patterns for the development of object-oriented software has important
implications for--------------------?
A. Component-based
B. Reusability in general
C. All of the mentioned (Answer)
D. None of the mentioned
Which diagram in UML shows a complete or partial view of the structure of a modeled
system at a specific time ?
A. Sequence Diagram
B. Collaboration Diagram
C. Class Diagram
D.Object Diagram (Answer)
Which of the following term is best defined by the statement:”a structural relationship that
specifies that objects of one thing are connected to objects of another” ?
A. Association (Answer)
B. Aggregation
C. Realization
D. Generalization
What can be requested from any object of the class to affect behavior ?
A. object
B. attribute
C. operation (Answer)
D. instance
If you are working on real-time process control applications or systems that involve
concurrent processing, you would use a-------------------?
A. Activity diagram
B. Sequence diagram
C. Statechart diagram (Answer)
D. Object diagram
What refers to the value associated with a specific attribute of an object and to any actions or
side ?
A. Object
B. State (Answer)
C. Interface
D. None of the mentioned
What is an object----------------?
A. An object is an instance of a class (Answer)
B. An object includes encapsulation of data
C. An object is not an instance of a class
D. All of the mentioned
Which of the following are the valid relationships in Use Case Diagrams----------------------?
A. Generalization
B. Include
C. Extend
D.All of the mentioned (Answer)
All the operations in a transaction need to be completed before the database changes are
made -----------------?
A. functional
B. available to the users (Answer)
C. permanent
D. None of the mentioned
Control systems may make use of the Environmental Control pattern, which is a general
control pattern that includes --------------processes?
A. sensor
B. actuator
C. pipeline
D.both sensor and actuator (Answer)
-------------------- can be associated with a separate processor or core, so that the processing
steps can be carried out in parallel ?
A. Process Pipeline (Answer)
B. Environmental Control
C. Observe and React
D. None of the mentioned
Which of the following is not real-time architectural patterns that are commonly used ?
A. Asynchronous communication (Answer)
B. Observe and React
C. Environmental Control
D. Process Pipeline
Which of the following view shows that the system is composed of interacting processes at run
time ?
A. physical
B. development
C. logical
D.process (Answer)
Which of the following pattern is the basis of interaction management in many web-based
systems ?
A. architecture
B. repository pattern
C. model-view-controller (Answer)
D. different operating system
Which view in architectural design shows the key abstractions in the system as objects or
object classes ?
A. physical
B. development
C. logical (Answer)
D. process
----------------- view shows the system hardware and how software components are distributed
across the processors in the system ?
A. physical (Answer)
B. logical
C. process
D. all of the mentioned
What is a collection of software engineering work tasks, milestones, and deliverables that
must be accomplished to complete a particular project ?
A. Task set (Answer)
B. Degree of milestone
C. Adaptation criteria
D. All of the mentioned
Every task that is scheduled should be assigned to a specific team member is termed as---------
--------?
A. Compartmentalization
B. Defined milestones
C. Defined responsibilities (Answer)
D. Defined outcomes
Ensuring that no more than the allocated number of people are allocated at any given time in
Software Scheduling is known as ----------------?
A. Time Allocation
B. Effort Validation (Answer)
C. Defined Milestone
D. Effort Distribution
What evaluates the risk associated with the technology to be implemented as part of project
scope ?
A. Concept scoping
B. Preliminary concept planning (Answer)
C. Technology risk assessment
D. Customer reaction to the concept
Which of the following is a project scheduling method that can be applied to software
development ?
A. PERT
B. CPM
C. CMM
D.Both PERT and CPM (Answer)
What is used to determine the recommended degree of rigor with which the software process
should be applied on a project ?
A. Degree of Rigor
B. Adaptation criteria (Answer)
C. Task Set
D. Both degree of Rigor and adaptation criteria
Software Configuration Management can be administered in several ways. These include -----
-------------?
A. A single software configuration management team for the whole organization (Answer)
B. A separate configuration management team for each project
C. Software Configuration Manage
D.
What combines procedures and tools to manage different versions of configuration objects
that are created during the software process ?
A. Change control
B. Version control (Answer)
C. SCIs
D. None of the mentioned
Which of the following is the process of assembling program components, data, and libraries,
and then compiling and linking these to create an executable system ?
A. System building (Answer)
B. Release management
C. Change management
D. Version management
What complements the formal technical review by assessing a configuration object for
characteristics that are generally not considered during review ?
A. Software configuration audit (Answer)
B. Software configuration management
C. Baseline
D. None of the mentioned
The definition and use of configuration management standards is essential for quality
certification in------------------?
A. ISO 9000
B. CMM
C. CMMI
D.All of the mentioned (Answer)
Which of the following process ensures that versions of systems and components are recorded
and maintained?
A. Codeline
B. Configuration control (Answer)
C. Version
D. Workspace
What involves preparing software for external release and keeping track of the system
versions that have been released for customer use ?
A. System building
B. Release management (Answer)
C. Change management
D. Version management
Which of the following process is concerned with analyzing the costs and benefits of proposed
changes ?
A. Change management (Answer)
B. Version management
C. System building
D. Release management
Which method recommends that very frequent system builds should be carried out with
automated testing to discover software problems ?
A. Agile method (Answer)
B. Parallel compilation method
C. Large systems method
D. All of the mentioned
Which of the following term is best defined by the statement “The creation of a new codeline
from a version in an existing codeline” ?
A. Branching (Answer)
B. Merging
C. Codeline
D. Mainline
What assess the risk and your plans for risk mitigation and revise these when you learn more
about the risk ?
A. Risk monitoring (Answer)
B. Risk planning
C. Risk analysis
D. Risk identification
Which of the following risks are derived from the organizational environment where the
software is being developed ?
A. People risks
B. Technology risks
C. Estimation risks
D.Organizational risks (Answer)
Which of the following term is best defined by the statement: “Derive traceability
information to maximize information hiding in the design.” ?
A. Underestimated development time
B. Organizational restructuring
C. Requirements changes (Answer)
D. None of the mentioned
Which of the following is not one of the five information domain characteristics of Function
Point (FP) decomposition ?
A. External inputs
B. External outputs
C. External process (Answer)
D. External inquiries
Which of the following is not a sign that indicates that an information systems project is in
jeopardy?
A. Software people don’t understand their customers needs
B. Changes are managed poorly
C. Sponsorship is gained (Answer)
D. Users are resistant
Who delivers the technical skills that are necessary to engineer a product or an application ?
A. Practitioners (Answer)
B. Project managers
C. Senior managers
D. None of the mentioned
Which of the following uses empirically derived formulas to predict effort as a function of
LOC or FP ?
A. FP-Based Estimation
B. Process-Based Estimation
C. COCOMO
D.Both FP-Based Estimation and COCOMO (Answer)
Which version of COCOMO states that once requirements have been stabilized, the basic
software architecture has been established ?
A. Early design stage model (Answer)
B. Post-architecture-stage model
C. Application composition model
D. All of the mentioned
Which model was used during the early stages of software engineering, when prototyping of
user interfaces, consideration of software and system interaction, assessment of performance,
and evaluation of technology maturity were paramount ?
A. Early design stage model
B. Post-architecture-stage model
C. Application composition model (Answer)
D. All of the mentioned
Which model assumes that systems are created from reusable components, scripting or
database programming ?
A. An application-composition model (Answer)
B. A post-architecture model
C. A reuse model
D. An early design model
Which model is used during early stages of the system design after the requirements have
been established ?
A. An application-composition model
B. A post-architecture model
C. A reuse model
D.An early design model (Answer)
Which model is used to compute the effort required to integrate reusable components or
program code that is automatically generated by design or program translation tools ?
A. An application-composition model
B. A post-architecture model
C. A reuse model (Answer)
D. An early design model
Which of the following states that work expands to fill the time available ?
A. CASE tools
B. Pricing to win
C. Parkinson’s Law (Answer)
D. Expert judgement
Which technique is applicable when other projects in the same analogy application domain
have been completed ?
A. Algorithmic cost modelling
B. Expert judgement
C. Estimation by analogy (Answer)
D. Parkinson’s Law
Which of the following costs is not part of the total effort cost ?
A. Costs of networking and communications
B. Costs of providing heating and lighting office space
C. Costs of lunch time food (Answer)
D. Costs of support staff
A --------------- is developed using historical cost information that relates some software metric
to the project cost ?
A. Algorithmic cost modelling (Answer)
B. Expert judgement
C. Estimation by analogy
D. Parkinson’s Law
Which of the following are parameters involved in computing the total cost of a software
development project ?
A. Hardware and software costs
B. Effort costs
C. Travel and training costs
D.All of the mentioned (Answer)
What can be used to complement decomposition techniques and offer a potentially valuable
estimation approach in their own right ?
A. Automated estimation tools
B. Empirical estimation models (Answer)
C. Decomposition techniques
D. Both Automated estimation tools and Empirical estimation models
The project planner examines the statement of scope and extracts all important software
functions which is known as-------------------?
A. Association
B. Decomposition (Answer)
C. Planning process
D. All of the mentioned
Which of the following is/are main parameters that you should use when computing the costs
of a software development project ?
A. travel and training costs
B. hardware and software costs
C. effort costs (the costs of paying software engineers and managers)
D.all of the mentioned (Answer)
Which of the following is an important factor that can affect the accuracy and efficacy of
estimates ?
A. Project size (Answer)
B. Planning process
C. Project complexity
D. Degree of structural uncertainty
The process each manager follows during the life of a project is known as -------------------?
A. Project Management
B. Manager life cycle
C. Project Management Life Cycle (Answer)
D. All of the mentioned
Which of the following is incorrect activity for the configuration management of a software
system ?
A. Internship management (Answer)
B. Change management
C. Version management
D. System management
Cost and schedule are a part of-------------------------?
A. Product Metrics
B. Process Metrics
C. Project Metrics (Answer)
D. All of the mentioned
Which of the following is not categorized under Product Operation of McCall‟s Software
Quality Factors ?
A. Flexibility (Answer)
B. Reliability
C. Usability
D. Integrity
The arc-to-node ratio is given as r = a/n. What does „a‟ represent in the ratio ?
A. maximum number of nodes at any level
B. longest path from the root to a leaf
C. number of modules
D.lines of control (Answer)
Choose the option that does not define Function Oriented Software Design ?
A. It consists of module definitions
B. Modules represent data abstraction (Answer)
C. Modules support functional abstraction
D. None of the mentioned
If all tasks must be executed in the same time-span, what type of cohesion is being exhibited ?
A. Functional Cohesion
B. Temporal Cohesion (Answer)
C. Functional Cohesion
D. Sequential Cohesion
In what type of coupling, the complete data structure is passed from one module to another ?
A. Control Coupling
B. Stamp Coupling (Answer)
C. External Coupling
D. Content Coupling
The importance of software design can be summarized in a single word which is-----------------
--?
A. Efficiency
B. Accuracy
C. Quality (Answer)
D. Complexity
Debugging is-----------------?
A. creating program code
B. finding and correcting errors in the program code (Answer)
C. identifying the task to be computerized
D. creating the algorithm
--------------- is the process of translating a task into a series of commands that a computer will
use to perform that task ?
A. Project design
B. Installation
C. Systems analysis
D.Programming (Answer)
Actual programming of software code is done during the ------------------ step in the SDLC?
A. Maintenance and Evaluation
B. Design
C. Analysis
D.Development and Documentation (Answer)
In the Analysis phase, the development of the -------------- occurs, which is a clear statement of
the goals and objectives of the project ?
A. documentation
B. flowchart
C. program specification (Answer)
D. design
The records of each patient that is receiving or has received treatment resembles which
security concept ?
A. Asset (Answer)
B. Threat
C. Vulnerability
D. Control
Choose the fault class in which the following automated static analysis check would
fall:”Variables declared but never used”?
A. Control Faults
B. Data Faults (Answer)
C. Input/Output Faults
D. Interface faults
Choose the fault class in which the following automated static analysis check would fall:”Non-
usage of the results of functions”?
A. Storage management faults
B. Data Faults
C. Input/Output Faults
D.Interface faults (Answer)
Which level of Static Analysis allows specific rules that apply to a program to be checked ?
A. Characteristic error checking
B. User-defined error checking (Answer)
C. Assertion checking
D. All of the mentioned
Choose the fault class in which the following automated static analysis check would fall:
“Unreachable code”?
A. Control Faults (Answer)
B. Data Faults
C. Input/Output Faults
D. Interface faults
Static analysis is now routinely used in the development of many safety and security critical
systems?
A. True (Answer)
B. False
C.
D.
Choose the fault class in which the following automated static analysis check would
fall:”Pointer Arithmetic” ?
A. Storage management faults (Answer)
B. Data Faults
C. Input/Output Faults
D. Interface faults
An impersonation of an authorised user is an example of a security threat ?
A. True
B. False (Answer)
C.
D.
A system resource that has a value and has to be protected is known as ------------------------?
A. Asset (Answer)
B. Control
C. Vulnerability
D. None of the mentioned
Security engineering is only concerned with maintenance of systems such that they can resist
malicious attacks ?
A. True
B. False (Answer)
C.
D.
Controls that are intended to ensure that attacks are unsuccessful is analogous to --------------
in dependability engineering?
A. Fault avoidance (Answer)
B. Fault tolerance
C. Fault detection
D. Fault Recovery
What is the term for a system that is designed such that the faults in the delivered software do
not result in system failure ?
A. Fault Avoidance
B. Fault detection
C. Fault tolerance (Answer)
D. None of the mentioned
What is the term for development process organised such that faults in the system are
detected and repaired before delivery to the customer ?
A. Fault Avoidance (Answer)
B. Fault detection
C. Fault tolerance
D. None of the mentioned
Which of the following is a Strategy to achieve Software diversity ?
A. Different programming languages
B. Different design methods and tools
C. Explicit specification of different algorithms
D.All of the mentioned (Answer)
Consider a case where the failure of the system causes damage to the system itself or it data.
What type of failure is being described here ?
A. Loss of service
B. Incorrect service delivery
C. System/data corruption (Answer)
D. None of the mentioned
Consider a case where the system is unavailable and cannot deliver its services to users. What
type of failure is being described here ?
A. Loss of service (Answer)
B. Incorrect service delivery
C. System/data corruption
D. None of the mentioned
At which stage of risk analysis specification, the additional security requirements take
account of the technologies used in building the system and system design and
implementation decisions ?
A. Preliminary risk analysis
B. Life-cycle risk analysis (Answer)
C. Operational risk analysis
D. All of the mentioned
Which reliability metric sets out the probable number of system failures that are likely to be
observed relative to a certain time period ?
A. POFOD
B. ROCOF (Answer)
C. AVAIL
D. None of the mentioned
To specify security requirements, one should identify the risks that are to be dealt with ?
A. True
B. False (Answer)
C.
D.
Which reliability requirements are concerned with maintaining copies of the system ?
A. Checking requirements
B. Recovery requirements (Answer)
C. Redundancy requirements
D. Ambiguous requirements
An event that occurs at some point in time when the system does not deliver a service as
expected by its users is called ------------------?
A. Human error or mistake
B. System fault
C. System error
D.System failure (Answer)
A weakness in a computer-based system that may be exploited to cause loss or harm is known
as ?
A. Vulnerability (Answer)
B. Attack
C. Threat
D. Exposure
A password checking system that disallows user passwords that are proper names or words
that are normally included in a dictionary is an example of ---------------- with respect to
security systems?
A. risk
B. control (Answer)
C. attack
D. asset
An assessment of the worst possible damage that could result from a particular hazard is
known as -----------------?
A. Risk
B. Hazard probability
C. Hazard severity (Answer)
D. Mishap
An erroneous system state that can lead to system behavior that is unexpected by system
users is known as----------------?
A. Human error or mistake
B. System fault
C. System error (Answer)
D. System failure
The safety of a system is a system attribute that reflects the system‟s ability to operate,
normally or abnormally, without injury to people or damage to the environment ?
A. True (Answer)
B. False
C.
D.
A chemical plant system may detect excessive pressure and open a relief valve to reduce these
pressures before an explosion occurs. What kind of dependability and security issue the
example states ?
A. Hazard avoidance
B. Damage limitation
C. Hazard detection
D.Hazard detection and removal (Answer)
A characteristic of a software system that can lead to a system error is known as ----------------
----- ?
A. Human error or mistake
B. System fault (Answer)
C. System error
D. System failure
Which of the following terms is a measure of the probability that the system will cause an
accident ?
A. Risk (Answer)
B. Hazard probability
C. Accident
D. Damage
What does ACT stands for in In Boehm model for software maintenance ?
A. Actual change track
B. Annual change track
C. Annual change traffic (Answer)
D. Actual change traffic
--------------- measures the ability of a regression test selection technique to handle realistic
applications ?
A. Efficiency
B. Precision
C. Generality (Answer)
D. Inclusiveness
Selective retest techniques may be more economical than the “retest-all”technique.How many
selective retest techniques are there?
A. two
B. three (Answer)
C. four
D. five
The modification of the software to match changes in the ever changing environment, falls
under which category of software maintenance ?
A. Corrective
B. Adaptive (Answer)
C. Perfective
D. Preventive
What are the two ways to view the human error of a sociotechnical system ?
A. hardware and software approach
B. management and users approach
C. person and systems approach (Answer)
D. all of the mentioned
Human and organizational factors such as organizational structure and politics have a
significant effect on the operation of sociotechnical systems ?
A. True (Answer)
B. False
C.
D.
There are --------------- overlapping stages in the lifetime of large and complex sociotechnical
systems?
A. two
B. three (Answer)
C. four
D. five
Which property of a sociotechnical system depends on the technical system components, its
operators, and its operating environment ?
A. security
B. usability (Answer)
C. volume
D. reliability
Consider an example of a system which has a police command and control system that may
include a geographical information system to provide of the location of incidents. What kind
of system the example represents ?
A. Complex System
B. Technical computer-based system
C. Sociotechnical System
D.Both Complex and Sociotechnical System (Answer)
Program modularization and Source code translation are the activities of --------------------?
A. Forward engineering
B. Reverse Engineering
C. Reengineering (Answer)
D. Reverse Engineering and Reengineering
---------------- classes are used to create the interface that the user sees and interacts with as
the software is used ?
A. Controller
B. Entity
C. Boundary (Answer)
D. Business
One creates Behavioral models of a system when you are discussing and designing the system
architecture?
A. True
B. False (Answer)
C.
D.
Which of the following diagram is not supported by UML considering Data-driven modeling
?
A. Activity
B. Data Flow Diagram (DFD) (Answer)
C. State Chart
D. Component
Which model in system modelling depicts the dynamic behaviour of the system ?
A. Context Model
B. Behavioral Model (Answer)
C. Data Model
D. Object Model
The Unified Modeling Language (UML) has become an effective standard for software
modelling.How many different notations does it have ?
A. Three
B. Four
C. Six
D.Nine (Answer)
Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?
A. Level 1
B. Level 2 (Answer)
C. Level 3
D. Level 4
Which model in system modelling depicts the static nature of the system ?
A. Behavioral Model
B. Context Model
C. Data Model
D.Structural Model (Answer)
------------------ allows us to infer that different members of classes have some common
characteristics ?
A. Realization
B. Aggregation
C. Generalization (Answer)
D. dependency
-------------- and -------------- are the two view points discussed in Controlled Requirements
Expression (CORE) ?
A. Functional, Non-Functional (Answer)
B. User, Developer
C. Known, Unknown
D. All of the mentioned
Which of the following Requirement Elicitation Techniques removes the poor understanding
of application domain and lack of common terminology between the users and the analysts ?
A. FODA (Answer)
B. CORE
C. IBIS
D. Prototyping
Which two requirements are given priority during Requirement Management of a product ?
A. User and Developer
B. Functional and Non-functional
C. Enduring and Volatile (Answer)
D. All of the mentioned
Requirements Management has a high initial start-up cost but does not need ongoing funding
throughout a project ?
A. True
B. False (Answer)
C.
D.
According to a statistical report: “over 30% of all software projects are cancelled before
completion and over 70% of the remainder fail to deliver expected features”. What must be
the reason for such a situation ?
A. Poor change management
B. Poor requirements management (Answer)
C. Poor quality control
D. All of the mentioned
How many steps are involved in Feature Oriented Domain Analysis (FODA) ?
A. Two
B. Three (Answer)
C. Four
D. Five
Consider the following Statement: “The data set will contain an end of file character.”What
characteristic of SRS is being depicted here ?
A. Consistent
B. Non-verifiable (Answer)
C. Correct
D. Ambiguous
Which of the following is included in SRS ?
A. Cost
B. Design Constraints (Answer)
C. Staffing
D. Delivery Schedule
Consider the following Statement: “The product should have a good human interface.”What
characteristic of SRS is being depicted here ?
A. Consistent
B. Non-Verifiable (Answer)
C. Correct
D. Ambiguous
Consider the following Statement: “The output of a program shall be given within 10 secs of
event X 10% of the time.”What characteristic of SRS is being depicted here ?
A. Consistent
B. Verifiable (Answer)
C. Non-verifiable
D. Correct
Which of the following property does not correspond to a good Software Requirements
Specification (SRS) ?
A. Verifiable
B. Ambiguous (Answer)
C. Complete
D. Traceable
What requirement gathering method developed at IBM in 1970s is used for managing
requirement elicitation ?
A. JAD
B. Traceability
C. FAST
D.Both JAD and Traceability (Answer)
What kind of approach was introduced for elicitation and modelling to give a functional view
of the system ?
A. Object Oriented Design (by Booch)
B. Use Cases (by Jacobson) (Answer)
C. Fusion (by Coleman)
D. Object Modeling Technique (by Rumbaugh)
“Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing ?
A. Functional (Answer)
B. Non-Functional
C. Known Requirement
D. None of the mentioned
Functional requirements capture the intended behavior of the system?
A. True (Answer)
B. False
C.
D.
The requirements that result from requirements analysis are typically expressed from one of
three perspectives or views.WhaT is that perspective or view ?
A. Developer
B. User
C. Non-Functional
D.Physical (Answer)
Coad and Yourdon suggested --------------- selection characteristics that should be used as an
analyst considers each potential object for inclusion in the requirement analysis model ?
A. Three
B. Four
C. Five
D.Six (Answer)
Keeping the requirements of QFD in mind which of the following is not an example of an
Expected Requirement ?
A. Ease of software installation
B. Overall operational correctness and reliability
C. Specific system functions (Answer)
D. Quality graphical display
To ensure that a given root definition is rigorous and comprehensive, The Lancaster team
proposed several criteria that are summarized in the mnemonic CATWOE in Soft Systems
Methodology (SSM).Which of the following alphabet is representing an entirely different
meaning to SSM ?
A. C – Customer
B. A – Actor
C. T – Transformation
D.E – ER Model (Answer)
A Use-case actor is always a person having a role that different people may play?
A. True
B. False (Answer)
C.
D.
A stakeholder is anyone who will purchase the completed software system under development
?
A. True
B. False (Answer)
C.
D.
Programmers prefer programming to testing and sometimes they take shortcuts when
writing tests. For example, they may write incomplete tests that do not check for all possible
exceptions that may occur ?
A. True (Answer)
B. False
C.
D.
In XP an automated unit test framework is used to write tests for a new piece of functionality
before that functionality itself is implemented --------------------?
A. True (Answer)
B. False
C.
D.
The work associated with software engineering can be categorized into three generic
phases,regardless of application area, project size, or complexity namely the------------- phase
which focuses on what, the-------------- phase which focuses on how and the------------- phase
which focuses on change ? i. support ii. development iii. definition
A. 1, 2, 3
B. 2, 1, 3
C. 3, 2, 1 (Answer)
D. 3, 1, 2
Which one of the following is not an Umbrella Activity that complements the five process
framework activities and help team manage and control progress, quality, change, and risk ?
A. Reusability management
B. Risk management
C. Measurement
D.User Reviews (Answer)
Which of the following activities of a Generic Process framework provides a feedback report
?
A. Communication
B. Planning
C. Modeling & Construction
D.Deployment (Answer)
Four types of change are encountered during the support phase . Which one of the following
is not one that falls into such category ?
A. Translation (Answer)
B. Correction
C. Adaptation
D. Prevention
Select the option that suits the Manifesto for Agile Software Development----------------?
A. Individuals and interactions
B. Working software
C. Customer collaboration
D.All of the mentioned (Answer)
What is a major advantage of using a 4GT Model for producing small scale products,
applications or programs ?
A. Improved productivity of software engineers
B. Reduction in software development time (Answer)
C. 4GT helped by CASE tools and code generators offers a credible solution to many
D.
If you were to create client/server applications, which model would you go for ?
A. WINWIN Spiral Model
B. Spiral Model
C. Concurrent Model (Answer)
D. Incremental Model
The spiral model has two dimensions namely --------------- and ---------------?
A. diagonal, angular
B. radial, perpendicular
C. radial, angular (Answer)
D. diagonal, perpendicular
The Incremental Model is a result of combination of elements of which two models?
A. Build & FIX Model & Waterfall Model
B. Linear Model & RAD Model
C. Linear Model & Prototyping Model (Answer)
D. Waterfall Model & RAD Model
Which two models doesn‟t allow defining requirements early in the cycle?
A. Waterfall & RAD
B. Prototyping & Spiral (Answer)
C. Prototyping & RAD
D. Waterfall & Spiral
Which of the following 4GLs invented at IBM and subsequently adopted by ANSI and ISO as
the standard language for managing structured data?
A. SQL (Answer)
B. PROLOG
C. C
D. JAVA
Arrange the following activities for making a software product using 4GT. i. Design strategy
ii. Transformation into product iii. Implementation iv. Requirement gathering ?
A. 1, 4, 3, 2
B. 4, 3, 1, 2
C. 4, 1, 3, 2 (Answer)
D. 1, 3, 4, 2
If you were a lead developer of a software company and you are asked to submit a
project/product within a stipulated time-frame with no cost barriers, which model would you
select ?
A. Waterfall
B. Spiral
C. RAD (Answer)
D. Incremental
Which two of the following models will not be able to give the desired outcome if user‟s
participation is not involved?
A. Waterfall & Spiral
B. RAD & Spiral
C. RAD & Waterfall
D.RAD & Prototyping (Answer)
Which of the following life cycle model can be chosen if the development team has less
experience on similar projects ?
A. Spiral (Answer)
B. Waterfall
C. RAD
D. Iterative Enhancement Model
Which one of the following is not a fundamental activity for software processes in software
engineering ?
A. Software Verification (Answer)
B. Software Validation
C. Software design and implementation
D. Software evolution
Which phase of the RUP is used to establish a business case for the system ?
A. Transition
B. Elaboration
C. Construction
D.Inception (Answer)
The RUP is normally described from three perspectives-dynamic, static & practice.What
does static perspective do ?
A. It shows the process activities that are enacted (Answer)
B. It suggests good practices to be used during the process
C. It shows the phases of the model over time
D. All
Which model can be selected if user is involved in all the phases of SDLC ?
A. Waterfall Model
B. Prototyping Model
C. RAD Model (Answer)
D. both Prototyping Model & RAD Model
Build & Fix Model is suitable for programming exercises of -------------- LOC (Line of Code)?
A. 100-200 (Answer)
B. 200-400
C. 400-1000
D. above 1000
Which one of the following models is not suitable for accommodating any change ?
A. Build & Fix Model
B. Prototyping Model
C. RAD Model
D.Waterfall Model (Answer)
Which of these software engineering activities are not a part of software processes ?
A. Software dependence (Answer)
B. Software development
C. Software validation
D. Software specification
Which of these does not account for software failure ?
A. Increasing Demand
B. Low expectation
C. Increasing Supply (Answer)
D. Less reliable and expensive
As per an IBM report, “31%of the project get cancelled before they are completed, 53%
overrun their cost estimates by an average of 189% and for every 100 projects, there are 94
restarts”.What is the reason for these statistics ?
A. Lack of adequate training in software engineering (Answer)
B. Lack of software ethics and understanding
C. Management issues in the company
D. All of the mentioned
Explain what is meant by PRODUCT with reference to one of the eight principles as per the
ACM/IEEE Code of Ethics ?
A. The product should be easy to use
B. Software engineers shall ensure that their products and related modifications meet the highest
prof
C. S
D.
Software engineers should not use their technical skills to misuse other people‟s
computers.”Here the term misuse refers to -------------------?
A. Unauthorized access to computer material
B. Unauthorized modification of computer material
C. Dissemination of viruses or other malware
D.All of the mentioned (Answer)
Which of these are not among the eight principles followed by Software Engineering Code of
Ethics and Professional Practice ?
A. PUBLIC
B. PROFESSION
C. PRODUCT
D.ENVIRONMENT (Answer)
Which command is used to change directory to the name beginning with a „p‟ ?
A. cd p
B. cd p?
C. cd p* (Answer)
D. cd [p]
The chmod ugo+rw note command can be represented in octal notation as-----------------?
A. chmod 555 note
B. chmod 666 note (Answer)
C. chmod 444 note
D. chmod 333 note
The first set of the three permissions (rw) pertains to the owner of the file, indicating that the
owner has---------------?
A. executable permission only
B. write and executable permissions
C. both read and executable permissions.
D.both read and write permissions (Answer)
Which of the following special shell variables is used to process number of the current shell ?
A. $!
B. $$ (Answer)
C. 0
D. $*
Which of the following shell‟s wildcards are used to match any number of characters
including None ?
A. [ijk]
B. [!ijk]
C. ?
D.* (Answer)
Which command is used to terminate all processes in your own system except the login shell ?
A. kill 1
B. kill 0 (Answer)
C. cancel all
D. cancel 1
Which of the following command is used to see the services running in NFS server ?
A. rpcinfo (Answer)
B. serverinfo
C. NFSinfo
D. infserv
What command is used to assign executable permission to all of the files named “report” ?
A. chmod ugo + x report (Answer)
B. chmod u + x report
C. chmod ugo + rw report
D. chmod ugo + r report
What allows different projects to use the same source files at the same time ?
A. Version Control (Answer)
B. Access control
C. CM Process
D. Version Control and Access control
According to Pareto‟s principle, x% of defects can be traced to y% of all causes. What are the
values of x and y ?
A. 60, 40
B. 70, 30
C. 80, 20 (Answer)
D. No such principle exists
What kind of quality cost is incurred when an error is detected in a product prior to
shipment ?
A. Prevention
B. Internal Failure (Answer)
C. External Failure
D. Appraisal
The degree to which the design specifications are followed during manufacturing is known as-
---------------?
A. Quality of design
B. Quality of conformance (Answer)
C. Quality of testing
D. None of the mentioned
According to ISO 9001, inspection and testing comes under which management responsibility
?
A. Process control (Answer)
B. Document control
C. Control of nonconforming products
D. Servicing
Which of the following is not a main phase in Configuration Management (CM) Process ?
A. CM Planning
B. Executing the CM process
C. CM audits
D.None of the mentioned (Answer)
What is a collection of software elements treated as a unit for the purposes of SCM ?
A. Software Configuration Item (Answer)
B. Baseline
C. Configuration
D. Configuration Control Board
What is one or more software configuration items that have been formally reviewed and
agreed upon and serve as a basis for further development ?
A. Configuration
B. Baseline (Answer)
C. Software
D. All of the mentioned
What is group with the responsibility for reviewing and approving changes to baselines ?
A. Software Configuration Item
B. Baseline
C. Configuration
D.Configuration Control Board (Answer)
Which of the following testing tools examine program systematically & automatically ?
A. Code Inspector
B. Static Analyzer (Answer)
C. Standard Enforcer
D. Coverage Analyzer
Which testing tool does a simple job of enforcing standards in a uniform way of many
programs ?
A. Static Analyzer
B. Code Inspector
C. Standard Enforcer
D.Both Code Inspector & Standard Enforcer (Answer)
Which of the following is the way of ensuring that the tests are actually testing code ?
A. Control structure testing
B. Complex path testing
C. Code coverage (Answer)
D. Quality assurance of software
What stores all changes and info related to the project from development through
maintenance in CASE tools ?
A. Database
B. Repository (Answer)
C. Registers
D. None of the mentioned
CASE tools are mainly used while developing which of the following methodologies?
A. RAD
B. JAD
C. OO Approach
D.All of the mentioned (Answer)
Which of the following term is best defined by the statement: “CASE tools and the target
applications are isolated from physical storage so they are not affected when the hardware
configuration is changed.” ?
A. Non-redundant data storage
B. Data independence (Answer)
C. Data dependence
D. Ad Hhoc data queries and reports
Which is the definition of objects in the database that leads directly to a standard approach
for the creation of software engineering documents ?
A. Document standardization (Answer)
B. Data integrity
C. Information sharing
D. Data/data integration
Which environment demands specialized testing tools that exercise the graphical user
interface and the network communications requirements for client and server ?
A. Dynamic analysis
B. Client/Server (Answer)
C. Re-engineering
D. Test management
Database management software serves as a foundation for the establishment of a CASE
database (repository) that we call------------------?
A. project database (Answer)
B. system database
C. analysis and design tools
D. prototyping tools
What enables a software engineer to defined screen layout rapidly for interactive applications
?
A. Analysis and design tools
B. Tool kit
C. Screen painters (Answer)
D. PRO/SIM tools
Extracting data items and objects, to get information on data flow, and to understand the
existing data structures that have been implemented is sometimes called------------------?
A. data analysis (Answer)
B. directionality
C. data extraction
D. client applications
Reverse engineering is the process of deriving the system design and specification from its-----
---------------?
A. GUI
B. Database
C. Source code (Answer)
D. All of the mentioned
Much of the information necessary to create a behavioral model can be obtained by observing
the external manifestation of the existing ------------------------?
A. candidate keys
B. interface (Answer)
C. database structure
D. None of the mentioned
Which of the following steps may not be used to define the existing data model as a precursor
to re-engineering a new database model ?
A. Build an initial object model
B. Determine candidate keys
C. Refine the tentative classes
D.Discover user interfaces (Answer)
What have become de rigueur for computer-based products and systems of every type ?
A. GUIs (Answer)
B. Candidate keys
C. Object model
D. All of the mentioned
In reverse engineering process, what refers to the sophistication of the design information
that can be extracted from the source code ?
A. interactivity
B. completeness
C. abstraction level (Answer)
D. direction level
The amount of time that the software is available for use is known as-----------------?
A. Reliability (Answer)
B. Usability
C. Efficiency
D. Functionality
How many Information Domain Values are used for Function Point Computation ?
A. three
B. four
C. five (Answer)
D. six
Structural complexity of a module i is given as S(i) = f*f (i). What does f symbolizes here ?
A. “fan check-out” of module i
B. “fan check-in” of module i
C. “fan in” of module i
D.“fan out” of module i (Answer)
Which of the following is not a classification of the web engineering metric, Web Page
Similarity ?
A. Content based
B. Link based
C. Usage based
D.Traffic based (Answer)
Which metric gives the idea about the contents on a web page ?
A. Word Token
B. Word Count (Answer)
C. Word Size
D. Word Length
Number of dynamic web pages provides an idea about------------ for a web page that is to be
built?
A. size
B. complexity
C. effort
D.all of the mentioned (Answer)
Link based measures rely on ------------- structure of a web graph to obtain related pages?
A. Embedded
B. Hyperlink (Answer)
C. Dynamic
D. All of the mentioned
Which of the following web engineering metric measures the extent of relatedness between
two or more web pages ?
A. Number of Static Content Objects
B. Number of Dynamic Content Objects
C. Web Page Similarity (Answer)
D. Number of Internal Page Links
Which of the following does not affect the software quality and organizational performance ?
A. Market (Answer)
B. Product
C. Technology
D. People
A graphical technique for finding if changes and variation in metrics data are meaningful is
known as-----------------?
A. DRE (Defect Removal Efficiency)
B. Function points analysis
C. Control Chart (Answer)
D. All of the mentioned
Which of the following is not an information domain required for determining function point
in FPA ?
A. Number of user Input
B. Number of user Inquiries
C. Number of external Interfaces
D.Number of errors (Answer)
Object that collects data on request rather than autonomously is known as-----------------?
A. Active Object
B. Passive Object (Answer)
C. Multiple instance
D. None of the mentioned
Which of the following is a mechanism that allows several objects in an class hierarchy to
have different methods with the same name ?
A. Aggregation
B. Polymorphism (Answer)
C. Inheritance
D. All of the mentioned
Grady Booch, James Rumbaugh, and Ivar Jacobson combined the best features of their
individual object-oriented analysis into a new method for object oriented design known as ----
-----------------?
A. HTML
B. XML
C. UML (Answer)
D. SGML
Which of the following early OOD methods incorporates both a “micro development process”
and a “macro development process.” ?
A. Booch method (Answer)
B. Rumbaugh method
C. Wirfs-Brock method
D. Coad and Yourdon method
Which of the following is not an operation as per OOD algorithms and data structures ?
A. operations that manipulate data in some way
B. operations that perform a computation
C. operations that check for syntax errors (Answer)
D. operations that monitor an obje
Which selective retest technique selects every test case that causes a modified program to
produce a different output than its original version?
A. Coverage
B. Minimization
C. Safe (Answer)
D. Maximization
The primary objective of formal technical reviews is to find ----------------- during the process
so that they do not become defects after release of the software?
A. errors (Answer)
B. equivalent faults
C. failure cause
D. None of the mentioned
In CMM, the life cycle activities of requirements analysis, design, code, and test are described
in-------------------------?
A. Software Product Engineering (Answer)
B. Software Quality Assurance
C. Software Subcontract Management
D. Software Quality Management
Degree to which design specifications are followed in manufacturing the product is called------
-----------?
A. Quality Control
B. Quality of conformance (Answer)
C. Quality Assurance
D. None of the mentioned
The ISO 9000 series of standards is a program that can be used for external quality assurance
purposes ?
A. True
B. False (Answer)
C.
D.
Which of the following requires design control measures, such as holding and recording
design reviews and qualification tests ?
A. CMM
B. ISO 9001
C. ISO 9000-3 (Answer)
D. None of the mentioned
------------ states that, where appropriate, adequate statistical techniques are identified and
used to verify the acceptability of process capability and product characteristics?
A. ISO 9001 (Answer)
B. ISO 9000-4
C. CMM
D. All of the mentioned
Process improvement is the set of activities, methods, and transformations that developers use
to develop and maintain information systems ?
A. True
B. False (Answer)
C.
D.
Prototypes and 4GL business systems are categorized under which process ?
A. Informal (Answer)
B. Managed
C. Methodical
D. Supported
What is often undefined and is left to the ingenuity of the project managers and engineers ?
A. Role
B. Exception (Answer)
C. Activity
D. Process
The documentation of a process which records the tasks, the roles and the entities used is
called------------------?
A. Process metric
B. Process analysis
C. Process modelling (Answer)
D. None of the mentioned
Which of the following companies provide certifications for their own products ?
A. CISCO
B. ORACLE
C. Microsoft
D.All of the mentioned (Answer)
How many levels, does the DO-178B certification targeted by RTCADO-178B has ?
A. two
B. three
C. four
D.five (Answer)
How many stages are there in Iterative-enhancement model used during software
maintenance ?
A. two
B. three (Answer)
C. four
D. five