Mater 02. Specialization subjects - Software Engineering
18. Project risk factor is considered in? A. Spiral Model B. Waterfall Model C. Prototyping Model D. Iterative enhancement Model
A
22. _______ is a black box testing method ? A. Boundary value analysis B. Basic path testing C. Code path analysis D. Dataflow testing
A
23. An important aspect of coding is? A. Readability B. Productivity C. To use as small memory space as possible D. Brevity
A
31. Informational cohesion is a realization of A. data abstraction B. structured programming C. modularity D. concurrency
A
39. Project managers are responsible for planning. estimating and scheduling project development and assigning people to tasks. → Project planning A. True B. False
A
4. SDLC stands for A. Software Development Life Cycle B. System Development Life cycle C. Software Design Life Cycle D. System Design Life Cycle
A
27. The importance of software design can be summarized in a single word which is A. Efficiency B. Accuracy C. Quality D. Complexity
C
28. The model remains operative until the software is retired? A. Waterfall B. Incremental C. Spiral D. Both A and B
C
3. Which is not one of the types of prototype of Prototyping Model? A. Horizontal Prototype B. Vertical Prototype C. Diagonal Prototype D. Domain Prototype
C
32. Who identifies, documents, and verifies that corrections have been made to the software? A. Project manager B. Project team C. SQA group D. All of the mentioned
C
35. Choose an internal software quality from given below A. scalability B. usability C. reusability D. reliability
C
46. In the spiral model 'risk analysis' is performed A. in the first loop B. in the first and second loop C. in every loop D. object have state and behavior
C
6. The system is designed so that the adverse consequences of a successful attack are minimised. For example, a backup policy allows damaged information to be restored A. To Assure Security B. Repairability C. Exposure limitation and recovery - Correction D. Exposure (=Loss, Cost, Harm)
C
7. A necessary supplement to transform or transaction mapping needed to create a complete architectural design is _______? A. entity relationship diagrams B. the data dictionary C. processing narratives for each module D. test cases for each module
C
10. Which test criteria should be applied in a phase of testing? A. Functional validity B. Interface integrity C. Correctness D. All of the mentioned
D
17. Which is not a software life cycle model? A. Spiral Model B. Waterfall Model C. Prototyping Model D. Capability maturity Model
D
19. Design phase includes? A. data, architectural and procedural design only B. architectural, procedural and interface design only C. data, architectural and interface design only D. data, architectural, interface and procedural design
D
20. White box testing, a software testing technique is sometimes called? A. Basic path B. Graph Testing C. Dataflow D. Glass box testing
D
25. Acceptance testing with real users is also known as A. Grey box testing B. White box testing C. Alpha Testing D. Beta testing
D
29. What is done during maintenance phase? A. System requirements are established B. Programs are tested C. System analysis is carried out D. None of the above
D
34. Purpose of process is to deliver software A. in time B. with acceptable quality C. that is cost efficient D. both A & B
D
36. Agile Software Development is based on A. Incremental Development B. Iterative Development C. Linear Development D. Both A and B
D
37. The UML was designed for describing ....... . A. object-oriented systems B. architectural design C. SRS D. Both A & B
D
41. Laws, regulation and culture that affect the operation of the system. A. Job changes B. Socio-technical systems C. Equipment D. Society
D
16. Which model is popular for student's small projects? A. Waterfall Model B. Spiral Model C. Quick and Fix model D. Prototyping Model
A
15. Like analysis models, many different kinds of _______ models are developed? A. Architectural B. System C. Design D. Logical
A
11. In sequence Diagrams objects are organized in a _______ line? A. Horizontal B. Vertical C. Stair D. Horizontal & Vertical
A
12. Organize the system so that assets are in separate areas and users only have access to the information that they need rather than all system information. A. Compartmentalize your assets B. 2 Fundamental Configuration Mistakes C. Deployment support D. Operational risk assessment
A
40. Good communications are essential for effective group working. Information must be exchanged on the status of work, design decisions and changes to previous decisions. Good communications also strengthens group cohesion as it promotes understanding. A. Group communications B. Risk planning C. Group communications factors D. Group organization
A
47. For a well understood data processing application it is best to use A. the waterfall model B. prototyping model C. the evolutionary model D. the spiral model
A
48. The tools that support different stages of software development life cycle are called: A. CASE Tools B. CAME tools C. CAQE tools D. CARE tools
A
49. If every requirement can be checked by a cost-effective process, then the SRS is A. verifiable B. traceable C. modifiable D. complete
A
50. Pseudocode can replace A. flowcharts B. structure charts C. decision tables D. cause-effect graphs
A
13. A graphical representation of the "flow" of data through an information system A. What is a type of association is a room to a building B. What is a Data Flow Diagram C. What is meant by Entity relationship Modeling D. What is a type of association is a employee to a department
B
21. Black box testing sometimes called? A. Data Flow testing B. Loop Testing C. Behavioral Testing D. Graph Based Testing
C
14. Keep multiple copies of data and use diverse infrastructure so that an infrastructure vulnerability cannot be the single point of failure. A. User and permission management B. Use redundancy and diversity to reduce risk C. 2 Fundamental Configuration Mistakes D. Layered Protection Architecture
B
2. A weakness in a computer-based system that may be exploited to cause loss or harm. A. Survivability B. Vulnerability C. Repairability D. Vulnerability avoidance - Prevention
B
24. Which of the following property does not correspond to a good Software Requirements Specification (SRS)? A. Verifiable B. Ambiguous C. Complete D. Traceable
B
26. What is normally considered as an adjunct to the coding step A. Integration testing B. Unit testing C. Completion of Testing
B
30. The largest percentage of total life cycle cost of software is A. Design cost B. Maintenance cost C. Coding cost D. Testing cost
B
33. Which one of the following is not a software process quality? A. Productivity B. Portability C. Timeliness D. Visibility
B
38. Draw up plans to avoid or minimise the effects of the risk → Risk analysis A. True B. False
B
42. A management process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design and operational information throughout its life. A. Champion B. Configuration management C. Control systems D. What champions do
B
45. Which of the following statements is true A. Abstract data types are the same as classes B. Abstract data types do not allow inheritance C. Classes cannot inherit from the same base class D. Object have state and behavior
B
5. Part of a more general usability property and reflects the extent to which user errors are avoided, detected or tolerated. User errors should, as far as possible, be detected and corrected automatically and should not be passed on to the system and cause failures. A. Thread classes B. Error tolerance C. Threats D. Importance of dependability
B
8. What types of errors are missed by black-box testing and can be uncovered by white-box testing? A. Behavioral errors B. Subtle logic errors C. Performance errors D. Input error
B
1. Who writes the Software Requirement Specifications Document (SRS) ? A. System Developer B. System Tester C. System Analyst D. Both A and B
C
43. A formal procedure to regulate the repository. Process by which to accept a change, and to assimilate it into a new baseline. A. Change is inevitable B. 3. Change Control C. 2. Change Control D. Version Control
D
44. Finalizes activities across all the project management process groups and permits a formal closure of the project A. change requests B. closure documentation C. project D. Close Project or Phase
D
9. Specific protection mechanisms built into the application itself e.g. additional password protection. Database login, database authorization, transaction management, database recovery A. Application security B. Platform-level protection C. Operational risk assessment D. Application-level protection
D