Software Engineering (SWE) FPT Full
C
A configuration management system would NOT normally provide: [A]Restricted access to the source code library. [B]The precise differences in versions of software component source code. [C]Facilities to compare test results with expected results. [D]Linkage of customer requirements to version numbers.
C
A program validates a numeric field as follows: values less than 10 are rejected, values between 10 and 21 are accepted, values greater than or equal to 22 are rejected [A]10,11,21 [B]3,20,21 [C]3,10,22 [D]10,21,22
B
A successful defect test is a test which causes a program to behave in an normal way [A]True [B]False
C
Acceptance testing will be done by [A]Developer [B]Project manager [C]User [D]Tester
B
All of the fallowings are main benefits of software reuse EXCEPT [A]Accelerated development [B]Reduce maintenance costs [C]Increased dependability [D]Reduced process risk [E]Effective use of specialists
A
All of the fallowings are the ways that a software prototype may be used EXCEPT [A]To test all functions of the completed system [B]To run back-to-back tests with the implemented system [C]To explore software design solutions and support user interface design [D]To help with the elicitation and validation of requirements
C
All of the following are stages in an object-oriented development process EXCEPT? [A]Object-oriented analysis [B]Object-oriented design [C]Object-oriented evolution [D]Object-oriented programming
A
All of the following are the complementary strategies to achieve survivability EXCEPT [A]Conversion [B]Resistance [C]Recognition [D]Recovery
E
All of the following are the main benefits of software reuse EXCEPT [A]Increased dependability [B]Effective use of specialists, standards compliance [C]Accelerated development [D]Reduce maintain cost [E]Reduced process risk
A
All of the following are types of program generator EXCEPT [A]Component generators [B]Parser and lexical analyser generators [C]Application generators [D]Code generators
A
All of the following statement about design pattern are true EXCEPT ( tat ca deu dung) [A]A pattern description should include a pattern name, a problem and solution description, and a statement of the results and trade-offs of using the pattern [B]They are fundamental to design reuse in object-oriented development [C]Design patterns are detail-level abstractions that document successful design solutions.
A
Before doing integration testing this testing must have been done [A]Unit testing [B]System testing [C]Stress testing
B
Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model. [A]False [B]True
D
Change request is proposal due to ______ [A]Market forces [B]Customers [C]Developers [D]All of the others
B
Domain requirements may be functional or non-functional requirements [A]False [B]True
A
Unit testing is a __ [A]White box testing [B]Black box testing [C]Stress testing
D
Software systems are subject to continual change requests from ___ [A]Users, Project managers, Chief Executive Officer [B]Developers, Project managers, Chief Executive Officer [C]Project managers, Project Director, Chief Executive Officer [D]Developers, Users, Market forces
A
Suggest a most appropriate software process model that might be used as a basic for managing the developing of the software system that support categorizing goods based on consumption pattern, tracking payments from the customers. [A]The waterfall model [B]All of the others [C]Component-based software engineering model [D]Incremental delivery model
A
Suggest the most appropriate generic software process model that might be used as a basic for managing the development of the following system: A university accounting system that replaces an existing system [A]Waterfall model [B]Throw-away prototyping [C]Exploratory development [D]None of the others
A
We split testing into distinct stages primarily because: [A]Each test stage has a different purpose. [B]It is easier to manage testing in stages. [C]We can run different tests in different environments. [D]The more stages we have, the better the testing.
B
What are advantages of pipeline model? [A]Intuitive organization for stakeholder communication [B]All of the others [C]Easy to add new transformations [D]Supports transformation reuse
C
What are included in a quality plan? [A]The resources and schedule used for system validation [B]All of the others [C]The quality procedures and standards that should be used in a project
B
What are stages of service interface design? [A]Logical interface design, Java object interface design, WSDL description [B]Logical interface design, Message design, WSDL description [C]Logical interface design, Message design, Java object interface design
C
What are system requirements? [A]None of the others [B]Requirements that come from the application domain of the system and that reflect characteristics of that domain [C]A structured document setting out detailed descriptions of the system's functions, services and operational constraints. [D]Statements in natural language plus diagrams of the services the system provides and its operational constraints. Written for customers
B
What are the advantages of explicitly designing and documenting software architecture? [A]It improves stakeholder communications [B]All of the others [C]It encourages a detailed analysis of the system
B
What are the benefits of software re-using? [A]To have better software in shorter duration, fewer software resource involve in software development, easy deployment [B]To have faster delivery of system, lower cost, increased software quality [C]To have better software at lower cost, shorter duration, fewer software resource involve in software development [D]To have fewer software resource involve in software development, easy deployment
A
What are the components of an object class definition in the UML? [A]All of the others [B]The name of the object class [C]The operations or methods associated with the class [D]The attributes of the class
C
What are the purposes of system modelling? (Choose one) [A]To validate user requirement, define the boundaries of the system [B]To define the boundaries of the system, validate system requirement [C]To help the analyst to understand more about the functionalities of the system, and help communicating with customer
D
What can be represented by a workflow model? [A]The process as a set of activities, each of which carries out some data transformation. [B]The roles of the people involved in the software process and the activities for which they are responsible [C]All of the others [D]The sequence of activities in the process along with their inputs, outputs and dependencies.
A
What does computer science concern with? [A]Computer science is concerned with theories and methods that underlie computers and software systems [B]Computer science is concerned with the practicalities of developing and delivering useful software [C]All of the others
C
What is SOAP standard? [A]Defines the components of a service specification that may be used to discover the existence of a service [B]This standard allows a service interface and its bindings to be defined [C]A message exchange standard that supports service communication [D]A standard for workflow languages used to define service composition
B
What is WSDL standard? [A]A standard for workflow languages used to define service composition [B]This standard allows a service interface and its bindings to be defined [C]A message exchange standard that supports service communication [D]Defines the components of a service specification that may be used to discover the existence of a service
B
What is a release? [A]An instance of a system which is functionally distinct in some way from other system instances [B]An instance of a system which is distributed to users outside of the development team. [C]An instance of a system which is functionally identical but non-functionally distinct from other instances of a system
C
What is application security? [A]Application security is a systems management problem where the infrastructure is configured to resist attacks. [B]All of the others [C]Application security is a software engineering problem where the system is designed to resist attacks
C
What is meant by configuration management? [A]All of the others [B]Configuration management is concerned with ensuring that software has a low number of defects and that it reaches the required standards of maintainability, reliability, and portability and so on [C]The development and use of standards and procedures for managing an evolving software system
C
What is the basis of schedule and cost estimates in the extreme programming? [A]The way that the team would develop the test-first [B]The overall requirements that customer provide to the team [C]The tasks that are broken down by the team from the scenarios or user stories written cards [D]The way that the team would perform code refactoring
B
What is the first stage in survivability analysis [A]Identity softspots and survivability strategies. [B]Review system requirements and architecture. [C]Identify attacks and compromisable components. [D]Identify critical services and components.
C
What is the last stage in survivability analysis [A]Identity attacks and compromisable components. [B]Review system requirements and architecture. [C]Identify softspots and survivability strategies. [D]Identify critical services and components.
C
What is the normal order of activities in which software testing is organized? [A]System test, integration test, unit test, validation test [B]Unit test, integration test, system test, validation test [C]Unit test, integration test, validation test, system test
D
What is the problem that cannot arise when requirements are written in natural language? [A]Lack of clarity [B]Requirement confusion [C]Requirement amalgamation [D]Lack of user's understandability
C
What is the purpose of defect testing? [A]To verify that the software meet its requirements [B]To test individual program components [C]To discover faults that make software‟s behavior incorrect [D]To ensure about the performance of the software
C
What is the second stage of risk management process? [A]Risk planning [B]Risk monitoring [C]Risk analysis [D]Risk identification
B
What key factors should be Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects. [A]False [B]True
A
What key factors should be considered when planning reuse? [A]All of the others [B]The development schedule for the software [C]The background, skills and experience of the development team [D]The expected software lifetime
B
What's the difference between functional and non-functional requirements? [A]The functional requirement is described in details, the other is described in high-level abstract [B]None of the others [C]The functional requirement describes system properties and constraints, the other describes system services
B
Which are levels of protection in application security engineering? (Choose one) [A]Unix-level. Application-level. Database-level [B]Platform-level. Application-level. Record-level| [C]Windows-level. Application-level. Database-level [D]Linux-level. Application-level. Record-level
C
Which document identifies and describes the testing that will be implemented and executed? [A]Test report [B]Test plan [C]Test case [D]Test script
C
Which is NOT a key factor that you should consider when planning reuse? [A]The criticality of the software and it‟s non-functional requirements [B]The background, skill and experience of the development team [C]The name of the application or component reuse [D]The development schedule of the software; The application domain [E]The expected software lifetime; The platform in which the system will run
D
Which is the change management concerned with? [A]Keeping track the change [B]System rebuilding, releasing [C]Ensuring that the change is made [D]All of the other choices
D
Which is the correct statement about integrity? [A]Extent to which a program satisfies its specifications and fulfils the user's mission and goals [B]Effort required for learning, operating, preparing input interpreting output of a program [C]Effort required to couple one system with another [D]Extent to which access to software or data by an unauthorized persons can be controlled
B
Which is the first stage in an object-oriented design process? [A]Specify object interfaces. [B]Develop an understanding of the relationships between the software being designed and its external environment [C]Identify the principal system objects; [D]Design the system architecture
B
Which is the right sequence in the risk management process? (1) Risk analysis (2) Risk identification (3) Risk monitoring (4) Risk planning [A]1=>4=>2=>3 [B]2=>1=>4=>3 [C]1=>2=>4=>3 [D]2=>1=>3=>4
C
Which is the right sequence in the software testing process? (1) Prepare test data (2) Create test case (3) Perform test (4) Create test report [A]2 => 1 => 4 => 3 [B]2 => 4 => 3 => 1 [C]2 => 1 => 3 => 4 [D]1 => 2 => 4 => 3
A
Which is the right sequence of the change management process? (1) Analyze change request (2) Request change by completing a change request form (3) Make changes to software (4) Submit request to change control board (5) Create new system version [A]2 => 1 => 4 => 3=>5 [B]1 => 5 => 4 => 3=>2 [C]2 => 1 => 3 => 4=>5 [D]2 => 1 => 5 => 3=>4
D
Which of the fallowings does NOT belong to the important differences between software project management and other types of project management? [A]There are no standard for software processes [B]Large software projects are often one-off projects [C]The product (software) is intangible [D]Cost of software project maintenance is higher than other type of projects
C
Which of the following are the testing process goals? [A]Discover faults or defects in the software [B]The check that the software meets its requirements [C]All of the others
D
Which of the following design guidelines for secure systems engineering is NOT true? [A]Validate all inputs [B]Use redundancy and diversity to reduce risk. [C]Avoid a single point of failure. [D]Avoid using redundancy and diversity to reduce risk [E]Base security decisions on an explicit security policy.
B
Which of the following does NOT belong to important principles of agile methods? [A]Embrace change [B]Process not people [C]Incremental delivery [D]Customer involvement [E]Maintain simplicity
B
Which of the following is NOT object model that may be developed? [A]Object aggregation models [B]Workflow model [C]Object behavior model [D]Inheritance models
C
Which of the following is NOT part of configuration management? [A]controlled library access [B]status accounting of configuration items [C]The people in the project team [D]identification of software versions
B
Which of the following is a type of software process model that represents the roles of the people involved in the software process and the activities for which they are responsible? [A]An actor model [B]An role/action model [C]None of the others [D]An activity model
A
Which of the following is the source for software version up? [A]All of the other choices [B]For different machines/OS6 [C]Offering different functionality [D]Tailored for particular user requirements
D
Which of the following items would not come under Configuration Management? [A]user requirement documents [B]Design documentation [C]Operating systems [D]Live data
C
Which of the following requirement statements belongs to functional requirements? [A]The system is implemented by using Java, Oracle database [B]The response time for each screen is must be less than 2 seconds [C]An article information shall include Author, Title, Description and other related information [D]The user interface shall be implemented as simple HTML without frames
E
Which of the following statement about the two distinct phases of system testing is NOT true? [A]The release testing team treat the system as a black-boxwhile testing [B]None of the others [C]Release testing where the version of the system to be released to users is tested. [D]Integration testing where the components and subsystems making up the system are integrated and tested [E]The integration team does NOT have access to the source code of the system.
B
Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true? [A]Specific ERP systems are created by configuring a generic system at development time with information about the customer's business [B]Enterprise Resource Planning systems are very widely used [C]All of the others
D
Which of the following statements about Equivalence partitioning are NOT true? [A]Equivalence partitioning is a way of deriving test cases [B]Often, the value that is most likely to lead to a successful testis a value at the boundary of a partition. [C]It depends on finding partitions in the input and output data sets and exercising the program with values from these partitions [D]None of the others
A
Which of the following statements about Service-oriented software engineering is true? [A]Service-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality [B]Services are language dependent and their implementation is based on widely adopted XML-based standards [C]All of the others
C
Which of the following statements about security is NOT true? [A]None of the others [B]Security engineering focuses on how to develop and maintain software systems that can resist malicious attacks that are intended to damage a computer-based system or its data [C]Security threats can be threats to the only confidentiality and integrity of a system or its data. [D]Security risk management involves assessing the losses that might ensue from attacks on a system and deriving security requirements that are aimed at eliminating or reducing these losses.
A
Which of the following statements about service interfaces is true? [A]All of the others [B]Service interfaces are defined in an XML-based language called WSDL [C]A WSDL specification includes a definition of the interface types and operations, the binding protocol used by the service and the service location
A
Which of the following statements about test first development are true? [A]All of the others [B]When a system feature is identified, the tests of the code implementing that feature are written before the code [C]Tests are automated and all tests are run when a new increment is added to the system.
B
Which of the following statements about testing is NOT true? [A]Testing can only show the presence of errors in a program [B]Its goal is to fix errors of the software system [C]None of the others [D]It cannot demonstrate that there are no remaining faults
A
Which of the following statements about the differences between integrating testing and component testing are true? [A]The integrating testing test the result of the component while the component testing test its internal structure [B]All of the others [C]The integrating testing tests the result of the component interaction [D]The component testing tests the system's goals that will be applied to integrating system
A
Which of the followings belong to Server type of concurrent object implementation? [A]The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests [B]The state of the object is changed by internal operations within the object itself. The process executing these operations runs continuously. [C]All of the others
D
Which of these statements about extreme programming are true? [A]All tests should only be run in the last time [B]All of the others [C]Increments are delivered to customers at the end of process [D]New versions may be built several times per day
D
Which one of the following statements about system testing is NOT true? [A]System tests are often performed by independent teams. [B]Functional testing is used more than structural testing. [C]Faults found during system tests can be very expensive to fix. [D]End-users should be involved in system tests.
A
Which system model is described in the following graphic? [A]Data-flow models [B]State machine models [C]Context models [D]Object models
A
Who review and approves the change request? [A]Change control board [B]Project manager [C]Chief executive officer [D]Project director
D
Why do we need consider security for project? (Choose one) [A]To allow administrators manage user [B]To have good architecture design [C]Security is a part of Software process [D]To protect the system against external attack
D
Workbenches are also called ___ [A]Phases [B]Steps [C]Tasks [D]All of the other choices
A
is concerned with developing an oriented system model to implement requirements [A]Object-oriented Analysis [B]Object-oriented Design [C]Object-oriented Paradigm [D]None of the others
A
The Waterfall approach is the BEST approach to development software when [A]The requirements are well-understood and changes will be fairly limited during the design process [B]Adding some new features to a system [C]Un-stable requirement systems [D]Software system is small, unclear requirements
B
The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective [A]False [B]True
D
The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: [A]effect of the change on the project baselines [B]effect of the change on scope planning [C]effect of the change on the project scope [D]effect of the change on the project schedule, cost, quality, and risks
B
The decision where the programmers can reuse a pattern or need to develop a special-purpose solution always easy [A]True [B]False
D
The effort required for locating and fixing an error in an operational program is: [A]Usability [B]Testability [C]Effeciency [D]Maintainability
D
The main focus of acceptance testing is: [A]finding faults in the system [B]ensuring that the system is acceptable to all users [C]testing the system with other systems [D]testing from a business perspective
B
The term 'CASE' is the acronym of [A]Computer Aided System Engineer [B]Computer-Aided Software Engineering [C]Computing Automation System Extension
A
The testing intended to show that previously correct software has not been adversely affected by changes is call: [A]Regression testing [B]Black box testing [C]White box testing
B
There are only one approach to reuse software applications or components that can be used. [A]True [B]False
A
Given the project activities chart as below, please define the critical path (the values mention in each arrow are activity name and activity duration) [A]AFDEI [B]ABCIE [C]AFGHI [D]ABCI
B
Consider security design for username and password protection, what is the good design? (Choose one) [A]Username and Password cannot be blank. Username can be any characters [B]System users are authenticated using a login name/password combination. Requires user change password after 2 months [C]Requires user change password after 2 months. Username can be any characters [D]Username can be any characters. Password can be blank
B
Define the security terms 'attack' [A]The possible loss or harm that could result from a successful attack. This can be loss or damage to data or can be a loss of time and effort if recovery is necessary after a security breach. [B]An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage [C]A weakness in a computer based system that may be exploited to cause loss or harm
C
How is the system organized in a client-server model? [A]A set of services is provided by clients and servers access and use these services [B]All of the others [C]None of the others [D]A set of services is provided by servers and clients access and use these services
D
In Waterfall approach, which phase takes the least cost? [A]Design [B]Integration and testing [C]Development [D]Specification
B
Object identification is a(n)_process [A]Waterfall [B]Iterative [C]Recursive
D
Password should be changed [A]On regular basis [B]When you suspect that password is compromised [C]When you leave the place [D]All of the other choices
A
Probability of a software failure is the [A]Reliability [B]Defect rate [C]Correctness [D]Testability
A
Requirements are usually presented at_ and _ levels of detail in requirements document [A]a high level statement/ a detailed system specification [B]a high level statement/ a user specification [C]All of the others [D]a high level statement/ a low system specification
A
Select the BEST model when you want to design a software system that very fast responses to events is a critical requirement? [A]Interrupt-driven model [B]Manager model [C]Call-return model [D]Broadcast model