SWE102
What is test-first development?
When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system
a. Assessing the possible losses that might ensue from attacks on the system
b. Balancing the possible losses against the costs of security procedures that may reduce these losses
a. Raise awaremess of the security issues
b. Consider as basic of a review checklist that is applied during the system validation process
a. No responsibility on the proposal preparation
b. Consider budget and schedule constraints
a. Algorithmic complexity
b. Control and data
a. Refine workflow
b. Create workflow program
a. Testing
b. Deployment
a. System infrastructure framework
b. Enterprise application framework
a. Code stability
b. Error handling
a. Give team members more control over process and technical decisions
b. Hide bad news from the project team members until things improve
a. Function, performance and constraints of a computer-based system
b. Implementation of each allocated system
a. Stress testing
b. Interface testing
a. Monitor the risks throughout the project
b. Make contingency plans
a. Reusable components and libraries
b. Middleware
a. Major decision points are tested early
b. No stubs need to be written
a. Service testing is difficult as external services are 'black-boxes'
b. Non-functional behaviour of the service is unpredictable
a. Not cost effective by known quantifiable software metrics
b. Not able to support the development of reusable components
a. Author of the component and creation date
b. Pre-conditions and post conditions
a. Validation elements
b. Process elements
a. Services may execute on different computers
b. Protocols have been developed to support service communication and information exchange
a. Non-functional requirements are requested by customer
b. Requirements which programmers can develop right after understanding them
a. Several different requirements may be expressed together as a single requirement
b. Requirements, system goals and design information may not be clearly distinguished
a. Operation system
b. Reusable components and libraries
a. Degree of communication desired
b. Rigidity of the delivery date
a. Set level of vulnerabilities of each asset
b. Set the level of exposure of each asset
a. Software specification, software development, software validation, software evolution
b. Software specification, software development, software testing, software evolution
a. Timing constraints
b. Statements of services should react to particular inputs
a. Make the product development more quality
b. Support to evolve software product
a. Testing is done by an independent testing team
b. Testing is done by component developers
a. Meet requirements quickly because users have to be involved in the development
b. The processes of specification, design and implementation are concurrent
a. Waterfall
b. Transition
a. Set of components
b. syntactic models
b. State diagram
c. Activity diagram
b. Association
c. Aggregation
b. One sub-system has responsibility for starts and stops other sub-systems
c. An object model where the system is designed into interacting objects
b. Eporting
c. Change control
b. Mutual trust and respect
c. Competence
b. Selecting from a library of existing components
c. Component and system configuration
b. Environmental
c. Control
b. Base on tangible things in the application domain
c. Depend on the skill, experience and domain knowledge of system designers
b. Data object
c. Diagram
b. Data-flow model where the system is designed into functional modules which transform inputs to outputs
c. Each sub-system can respond to externally generated events from other sub-systems
b. Send them to the design team and see if they have any concerns
c. Have the customer look over the requirements
b. It provides developers appropriate tools and techniques
c. It is concerned with the practicalities of delivering useful software
b. How the sub-system is decomposed into modules
c. Non-functional requirements are requested by customer
b. Interaction relationships
c. Object classes
b. Eliminate the use of project planning and testing
c. Only essential work products are produced
b. Re-use to develop non-functionalities
c. Re-use difference settings of the abstract knowledge
b. They show what lies outside the system boundaries
c. Relationship with other systems
b. Specification, development and validation are interleaved
c. Should start with poorly understood requirements
b. The costs of software on a PC are often greater than the hardware cost
c. Software costs often dominate computer system costs
b. Data flow diagrams are used in performing the data exchange between a system and other systems
c. State diagrams show states when the systems response to events
b. Testing on integrating sub-systems to create a system
c. Testing is done by an independent testing team
b. Software engineers shall be fair to and supportive of their colleagues
c. The technical skills are set to highest priority
b. Service specification
c. Workflow design
b. Functional component
c. configuration management
What is not an advantage of object model
complex entities are easy to represent as objects
What should be included in a configuration management plan?
configuration,people,configuration,CMtool,schema
In contrast, the RUP (Rational Unified Process) is normally described from which types of perspectives?
-Dynamic -Static -Practice
What are advantages of pipeline model?
-Easy to add new transformations -Supports transformation reuse -Intuitive organization for stakeholder communication
What are the stages in the software inspection process?
-Planning -Overview -Individual preparation -Inspection meetingRework -Follow-up
Which are levels of protection in application security engineering?
-Platform -Application -Record
What are the three levels of protection that might be used in an information system?
-Platform-level protection -Application-level protection -Record-level protection
What are three types of interface that may have to be defined in a requirements document?
-Procedural interfaces -Data structures -Representations of data
What are the principal components of a software engineering method?
-Process guidance -Recommendations -System model descriptions -Rules
List 3 types of non-functional requirement
-Product -External -Organizational
Which are types of non-functional requirement?
-Product -Organizational -External
What are the stages in an object-oriented development process?
-Programming -Analysis -Design
What are three related categories of risk?
-Project -Product -Business
Three categories of risks are ___
-Project -Technical -Business
What fundamental issues have to be considered when designing system architecture for security?
-Protection: How should the system be organised so that critical assets can be protected against an external attack -Distribution: How should system assets be distributed so that the effects of a successful attack are minimized
What is included in a quality plan and a validation plan?
-Quality plan: The quality procedures and standards that should be used in a project. -Validation plan: The approach, resources and schedule used for system validation.
What are the three complementary strategies to achieve survivability?
-Recognition -Recovery -Resistance
Which of the following styles belong to System organization?
-Repository -Client-server -Abstract machine
Which of these statements about architectural design are true?
-Represents the link between specification and design processes -Often carried out in parallel with some specification activities -It involves identifying major system components and their communications
What are the principal requirements engineering activities?
-Requirements elicitation and analysis -Feasibility study -Requirement specification -Requirement validation
What are the principal sections included in a test plan? The testing process.
-Requirements traceability -Tested items -Testing schedule -Test recording procedures -Constraints -Hardware and software requirements
What three approaches may be used when designing test cases?
-Requirements-based -Partition -Structural
What problems can arise when requirements are written in natural language?
-Reuqirement confusion -Requirement amalgamation -Lack of clarity
List three design models that are part of the UML
-Sequence -Subsystem -State
What are the advantages of pair programming
-Serves as an inform code review process -Supports the idea of common ownership and responsibility for the code -Helps support refactoring
What is the distinction between validation and verification?
-Validation: Are we building the right product? -Verification: Are we building the product right?
What are three basic techniques for component identification?
-Version -Change-oriented -Attribute-based
List the three fundamental software process frameworks that are used to create specific software processes.
-Waterfall -Evolutionary -Component-based
What are generic software process models?
-Waterfall -Iterative -Component-based
What are the three general paradigms of software development?
-Waterfall -Iterative -Component-based
Which of the following statements about test first development are true?
-When a system feature is identified, the tests of the code implementing that feature are written before the code -Tests are automated and all tests are run when a new increment is added to the system
What is test-first development
-When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system.
What design choices have to be made when reusing COTS products?
-Which COTS products offer the most appropriate functionality -What features of a product will actually be used -How will data be exchanged between different products
Suggest two possible vulnerabilities when login/password
-authentication is used.Users set guessable passwords -Authorised users reveal their passwords to unauthorised users, perhaps through some social engineering process
List the classes of faults that should be considered in an
-inspection checklist. -Data faults -Control faults -Input/output faults -Interface faults -Storage management faults -Exception management faults
What tests should be included in object class testing?
-that set and access all object attributes -for all operations in isolation -that force the object into all possible states
What is an equivalence partition? Give an example.
A class of inputs or outputs where it is reasonable to expect that the system will behave the same way for all members of the class. For example, all strings with less than 256 characters.
What is not an essential element of design patterns?
A concrete design description
What is a baseline?
A controlled system where changes to the system have to be agreed and recorded before they are implemented.
What is a design pattern and why are patterns important for reuse?
A design pattern is a description of a problem and the essence of its solution. This solution is expressed in a generic way and can be instantiated and reused in different settings.
A critical distinction between a service and a component as defined in CBSE is that services are independent and:
All of the others
Change request is proposal due to
All of the others
What are the main advantages of using a standard format to specify requirements?
All requirements have the same format so are easier to read.The definition of form fields mean that writers are less likely to forget to include information.Some automated processing is possible.
What is the fundamental characteristic of a repository model?
All shared data is held in a central database that can be accessed by all sub-systems.
What is a reference architecture?
An abstract model of a system class that can be used to inform designers about the general structure of that type of system.
What is visual programming?
An approach to development where a programmer manipulates graphical icons representing functions, data or user interface components and associates processing scripts with these icons.
What is generator-based reuse?
An approach to reuse where reusable knowledge is embedded in a generator system which is programmed by domain experts to create the system. An executable system is then generated.
Define the security terms 'attack'
An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage
What is a release?
An instance of a system which is distributed to users outside of the development team.
What is a version?
An instance of a system which is functionally distinct in some way from other system instances
What is the distinction between an object and an object class?
An object is created at run-time by instantiating an object class. The object includes state variables and operations on that state as defined in the object class definition.
Which of the following is a type of software process model that represents the roles of the people involved in the software process and the activities for which they are responsible?
An role/action model
__is concerned with developing an object-oriented model of the application domain.The objects in that model reflect the entities and operations associated with the problem to be solved
Analysis
List five common project management activities.
Any five from the following: proposal writing, project planning and scheduling, project costing, project monitoring and reviewing, personnel selection and evaluation, report writing and presentations
What is application security?
Application security is a software engineering problem where the system is designed to resist attacks
Which of the follwing is Not a type of behavioral model?
Architectual mode
What is the correct statement about software architectural design decisions?
Architectural design is a creative process, the activities in the process differs depending on the type of system being developed
Which is the correct statement about Product line architectures?
Architectures must be structured in such a way to separate different sub-systems and to allow them to be modified
What was the software crisis?
As more powerful hardware was introduced in the 1960s, larger software systems were developed. These were usually late, unreliable, did not meet user needs and cost more than expected. The problems of producing software was the software crisis.
To construct a system model the engineer should consider one of the following restraining factors?
Assumptions and constraints
List four design guidelines for secure systems engineering.Base security decisions on an explicit security policy
Avoid a single point of failure/Use redundancy and div ersity to reduce risk/Validate all inputs
Which of the following design guidelines for secure systems engineering is NOT true?
Avoid using redundancy and diversity to reduce risk
What is the difference between BPMN and WS-BPEL?
BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language.
Which is NOT a primary goal in the design of the UML?
Be dependent on particular programming language
Why is maintainability an important attribute of software?
Because all software is subject to change after it goes into use and the costs of software maintenance often exceeds the development costs of the software.
Why is it important to design for deployment
Because many security vulnerabilities are introduced when the system is configured for use in its deployment environment
Why many software projects are 'one-off' projects?
Because the requirements of software projects are not the same
Who chooses the stories for inclusion in the next release based on their priorities and the schedule estimates?
Customer
List five important principles of agile methods.
Customer,Incremental,Peoplenot,Embrace,Mainain
When should you use data flow diagrams (DFD)?
DFD is used to showing the data exchange between a system and other systems in its environment
Which of these model types does not represent software architecture?
Data model
What types of system model may be developed?
Data,Composition,Architectural,Classification,Stimulus/response
Which system model is described in the following graphic
Data-flow models
What activity does a software project manager need to perform to minimize the risk of software failure?
Define milestones and track progress
Which is the correct sequence of the following activities in the process of System evolution?
Define-Assess-Propses-Modify
What are deliverables?
Deliverables are project results delivered to customers
What is Not a characteristic of extreme programming?
Delivery-first development
Which is the purpose of data model?
Describle the logical structure of data processed by the system
Which is NOT the main activity in design process?
Designing the test case
What information is maintained in a UDDI description?
Details of, informaldescription, Informationon, Subscription information
Which is the first stage in an object-oriented design process?
Develop an understanding of the relationships between the software being designed and its external environment
What are the six fundamental best practices in the RUP?
Develop software iteratively. Manage requirements. Use component-based architectures. Visually model software. Verify software quality. Control changes to software.
Who is mainly responsible for the component (unit) testing?
Developer
Software systems are subject to continual change requests from
Developer,User
Software systems are subject to continual change requests from ___
Developers, Users, Market forces
List four fundamental questions that should be addressed in architectural design.Is there a generic application architecture that can be used?
How will, What architectural, How should, Whatcontrol, Etc.
List the requirements document sections suggested by the IEEE standard.
Introduction-General-Specific-Appendices-Index.
What is a user story in extreme programming? [A]It is a history of user [B]It is a requirement expressed as scenario [C]It is a small card [D]It is a small table
It is a requirement expressed as scenario
Which is NOT related to a characteristic of rapid application development processes?
It is always possible to arrive at a stable, consistent set of system requirements
What is the correct statement about software architectural styles?
Most large systems are heterogeneous architectur al styles
Which of these statements about extreme programming are true?
New versions may be built several times per day
What is Not a main problem with software reuse?
Not-invented-here syndrome
answer:a. System infrastructure framework b. Enterprise application framework c. Middleware integration framework
Question 39
answer:a. Adding new components to the system b. Selecting from a library of existing components c. Component and system configuration d. Modifying components to meet new requirements
Question 41
answer:b. Testing is done by component developers c. Testing on individual program components to create a sub-system
Question 43
answer:a. Stress testing b. Interface testing d. Release testing
Question 44
answer:b. Error handling d. Execution paths
Question 45
answer:a. Major decision points are tested early c. No drivers need to be written
Question 46
answer:a. Make the product development more quality b. Support to evolve software product c. Aim to control the costs and effort involved in making changes to a system
Question 47
answer:a. Testing c. Design d. Implementation
Question 48
answer:a. Author of the component and creation date c. Project name d. Version number and what were changed
Question 49
answer: d. Human elements
Question 50
answer:a. Assessing the possible losses that might ensue from attacks on the system b. Balancing the possible losses against the costs of security procedures that may reduce these losses
Question 52
answer:b. Set the level of exposure of each asset c. Identify system resources that have a value and have to be protected d. Set level of value of each asset
Question 53
answer:a. Raise awaremess of the security issues b. Consider as basic of a review checklist that is applied during the system validation process
Question 54
answer:c. Application
Question 55
answer:c. Operation system
Question 56
answer:a. Services may execute on different computers b. Protocols have been developed to support service communication and information exchange d. A system where the components are stand-alone services
Question 57
answer:a. Service testing is difficult as external services are 'black-boxes' b. Non-functional behaviour of the service is unpredictable c. External services may be modified by the service provider thus invalidating tests which have been completed
Question 58
answer: c. Workflow design
Question 60
answer: a. Software specification, software development, software validation, software evolution
Question 7
answer: c. Iteration
Question 8
answer:a. Are iterative in nature d. Can easily accommodate product requirements changes
Question 9
When should you use sequence diagram?
Should use sequence diagram to illustrate the sequence of steps that must be performed in order to complete a task
When should you use use-case diagram?
Should use use-case diagram to represent all of the people who might use the functionalities of the system
What is Not a type in Reuse-based software engineering?:
Software development process reuse
What is software engineering?
Software engineering is an engineering discipline that is concerned with all aspects of software production from specification to system evolution.
answer:False
Software process model is a simplified representation of a software process, presented from a specific perspective.
What are the fundamental activities that are common to all software processes?
Software specification, software design and implementation, software validation, software evolution.
What are the two complementary approaches used for checking and analysis?
Software testing Software inspections or peer reviews.
d. Modifying components to meet new requirements
e. Modifying system design to meet new requirements
d. Deployable service
e. Service list
The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the:
effect of the change on the project schedule, cost, quality, and risks
What may be included in a system release?
executable,Configuration,Data,installation,Electronic
Why do we need to consider security for project?
to protect the system against external attack
Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects
true
Marks: 1
What is the first layer of system layers?
Marks: 1
What is the last layer of system layers?
answer:a. Function, performance and constraints of a computer-based system
Question 19
answer:a. Set of components c. Semantic models d. Constraints
Question 29
answer:c. Characteristics and constraints
Question 30
Marks: 1
The system specification describes the
Marks: 1
What is the last stage in service construction by composition?
Marks: 1
What should include in the project plan?
Marks: 1
What should we do to manage risk?
Which of the following are the testing process goals
-Discover faults or defects in the software -The check that the software meets its requirements
Workbenches are also called ___ [A]Phases [B]Steps [C]Tasks [D]All of the other choices
All of the other choices
Marks: 1
How are the system testing?
Marks: 1
How are the user requirements?
What is describled in a state machine model?
How the system responds to external event
What is described in a state machine model?
How the system responds to external events.
Which of the following are the 2 most fundamental types of software product?
-Customized products -Generic products
What are types of behavioral models?
-Data-Flow -State machine
What are the two complementary goals of the testing process?
-Demonstrate that the software meets its requirements -Discover faults or defects in the software
What facilities might be provided in system building CASE tools?
-Dependency -Tool selection -Distributed -Derived object
When should you use state machine model?
-Describe how a system -It shows system states and events that cause transition from one state to another
What is the normal order of activities in which software testing process is organized
-Design -Prepare -Run -Compare
What are the 4 sectors in each loop in Boehm's Spiral model?
-Development and validation -Planning -Object setting -Risk assessment and reduction
What is the distinction between the terms.'shall' and 'should' in a user requirements document?
'Shall' normally indicates a mandatory requirement 'Should' indicates a desirable but not essential requirement
Which is the right sequence in project scheduling?
(2)=>(1)=>(4)=>(3)
What is a domain requirement? Give an example.
-A requirements that is derived from the application domain of the system rather than from the specific needs of system users. -For example, in a train control system, the requirement for the train braking system depends on characteristics of the train and the track.
Define the security terms 'vulnerability' and 'asset' Vulnerability
-A weakness in a computer system that MAY be exploited to cause loss or harm -Asset: A system resource that has a value and so should be protected
What are the advantages of using an incremental approach to software development?
-Accelerated delivery of customer services, user engagement with the system.
What are the characteristics of Interrupt-driven systems
-Allows fast response -Used in real-time systems
Which are object-oriented strategies?
-Analysis -Design -Programming
What are the three levels of protection that might be used in an information system?
-Application -Record -Platform
What is the distinction between application and infrastructure security?
-Application security - the application is designed to resist attacks -Infrastructure security - the software is configured to resist attacks
What are the objectives of change management procedures?
-Approving -Tracking -Analyzing
What are the stages of preliminary risk assessment?
-Asset identification -Asset value assessment -Exposure assessment -Threat identification -Threat probability assessment -Control identification -Feasibility assessment -Security requirements definition
Which of the following models belong to Event-driven systems?
-Broadcast -Interrupt-driven
Which of the following models belong to Centralised control?
-Call-return -Manager
Which of the following styles belong to Control styles?
-Centralised -Event-based
What are three types of program generator
-Code -Parser and lexical analyser -Application
What are three reuse types in Reuse-based software engineering
-Component -Object and function -Application system
What are the development stages in CBSE?
-Component -Requirements -System -Development
List the 3 fundamental software process frameworks that are used to create specific software process?
-Component-based software engineering -The Waterfall model -Evolutionary development
Which of the following BEST describes the major difficulties with incremental development?
-Contractual -Validation -Management -Maintenance
What are common principles of agile methods?
-Customer -Incremental -People not -Embrace -Maintain
Which of the following are considered a player in the software process?
-Customers -Project Manager -End-users
What are the advantages of repository model
-Efficient way to share large amounts of data -Sharing model is published as the repository schema -Sub-systems need not be concerned with how data is produced Centralised management e.g. backup, security, ect
What are advantage of explicitly designing and documenting a software architecture?
-Encourages a detailed analysis of the system -Improves the stakeholder communication -Helps with large-scale reuse
List 4 types of speciallsation of software product lines?
-Environment -Functional -Process -Platform
Suggest three ways that a software prototype may be used?
-Explore software design -Help with elicitation -Run back-to-back tests
What are the five key strategies used in cleanroom development?
-Formal specification -Incremental development -Structured programming -Static verification -Statistical testing
What is the distinction between functional and non-functional requirements?
-Functional requirements define what the system should do. -Non-functional requirements are not directly concerned with specific system functions but specify required system properties or place constraints on the system or its development process.
List the requirements document sections suggested by the IEEE standard?
-General description -Introduction -Specific requirements -Appendices -Index
What are the two main approaches to concept reuse?
-Generative programming -Design patterns
What are the three most important key challenges facing software engineering?
-Heterogeneity -Delivery -Trust
Check 4 fundamental questions that should be addressed in architectural design?
-How will the system be distributed -How should the system be structured -Is there a generic application architecture that can be used -What architectural style or styles are appropriate
List the stages in survivability analysis.Review system requirements and architecture
-Identify critical services and components -Identify attacks and compromisable components -Identify softspots and survivability strategies
What were the key benefits of prototyping found in Gordon and Bieman'sstudey?
-Improved system usability, a closer match to user's needs -Improved system quality, improved maintainability -Reduced development effort
What are the four phases of the Rational Unified Process?
-Inception -Elaboration -Construction -Transition.
What of these statements about the differences between incremental development and prototyping are true?
-Incremental development starts-best understood -Prototyping starts-not well-understood
What are the advantages of inspections over testing?
-Inspections can discover many errors. In testing, one error may mask another -Incomplete versions of a system can be inspected -Inspections can consider broader quality attributes as well as program defects
In the architectural model of the weather station system, what are the three layers in the software?
-Interface -Instruments -Data collection
What tools are normally included in a RAD environment?
-Interface generator -Database programming language -Report generator -Links to office applications
What are the three important classes of interface errors?
-Interface misuse -Interface misunderstanding -Timing errors
Which of the following belong to external requirements?
-Interoperability -Legislative -Ethical
What are advantages of pipeline model
-Intuitive organization -Supports transformation -Easy to add new transformations
What are the advantages of explicitly designing and documenting software architecture?
-It improves stakeholder communications -It encourages a detailed analysis of the system
List the main problems with software reuse.
-Lack of tool support -Increased maintenance costs| Increased,Lack,Not-invented-here,Creating,Finding
What are the four advantages of using incremental development and delivery?
-Lower risk of overall project failure -Early increments serve as prototypes to explore requirements -Early delivery of critical functionality to the customer -More extensive testing of critical customer functionality
What are essential attributes of good software?
-Maintainan -Dependan -Acceptan -Efficiency
What are three possible classes of application framework?
-Middleware integration -Enterprise application -System infrastructure
What are the components of an object class definition in the UML?
-Name of the object class -Attributes of the class -Operations or methods associated with the class
Which models give a static view of a system?
-Object -Data -Architectural
What models might be developed when applying a structured method?
-Object -Sequence -State transition -Structural -Data-flow
What different object models may be developed?
-Object aggregation models -Object behaviour model -Inheritance models
What are the two principle styles used for modular decomposition?
-Object-oriented decomposition -Function-oriented pipelining
New versions of software systems are created as they change
-Offering -Tailored -For different
What are the two types of CM workbench?
-Open -Integrated
Effective software project management focuses on
-Performance -Process -Product -People
Which non-functional system requirements that the software system architecture may depend on?
-Performance -Security -Safety -Availability -Maintainability
Which of the following statements about service interfaces is true
-Service interfaces are defined in an XML-based language called WSDL -A WSDL specification includes a definition of the interface types and operations, the binding protocol used by the service and the service location
What is the fundamental characteristic of a repository model
-Shared data is may be accessed by all sub-systems -Shared data is held in a central database or repository
What are the four most fundamental activities that are common to all software processes?
-Software validation -Software specification -Software evolution -Software design and implementation
What do Gamma etal.suggest are the four essential elements of a design pattern?
-Solution description -Statement of the consequences of applying the pattern -Description of the problem and when the pattern can be applied -Meaningful name
What are the fundamental activities in software processes?
-Specifiation -Development -Validation -Evolution
What are the most fundamental activities in software processes?
-Specification -Development -Validation -Evolution
In Waterfall approach, which phase takes the most cost?
-Specification -Integration and testing
List the 5 key stages in an object-oriented design process?
-Specify -Design the system -Identify -Develop -Understand and define
Which of the following strategic issues needs to be addressed in a successful software testing process?
-Specify requirements in a quantiflablemaner -Conduct formal technical reviews prior to testing
What are advantages of explicitly designing and documenting software architecture?
-Stakeholder -System analysis -Large-scale reuse
What are the models in architecture design?
-Static -Dynamic -Interface -Relationship -Distribution
What perspectives may be used for system modelling?
-Structural -External -Behavioral
What deployment support may be included in a system?
-Support for viewing and analysing configurations -Default privilege minimisation -Configuration setting localisation -Easy ways to fix security vulnerabilities
What are the four development stages in CBSE? Component-based software engineering
-System design with reuse -Requirements modification -Development and integration -Component analysis
What are three general architectural styles?
-System organisation -Decomposition styles -Control styles
What are three important characteristics of extreme programming?
-Test-first development -Pair programming -Requirements expressed as scenarios
What are good attributes of requirements?
-Testable -Complete -Clear -Consistent -Unambiguous
What are the components of an object class definition in the UML
-The attributes of the class -The operations or methods associated with the class -The name of the object class
What key factors should be considered when planning reuse?
-The development schedule for the software -The expected software lifetime -The background, skills and experience of the development team
What's the difference between functional and non-functional requirements?
-The functional requirement is described in details, the other is described in high-level abstract -The functional requirement describes system properties and constraints, the other describes system services
List the advantages of inheritance
-The inheritance graph is a source of organisational knowledge about domains and systems -It is a reuse mechanism at both the design and the programming level -It is an abstraction mechanism which may be used to classify entities
What do you understand by the system context and model of use?
-The model of use-dynamic model -System context-static model
What are the distinctions between an object and an object class?
-The object includes state variables and operations on that state as defined in the object class definition -An object is created at run-time by instantiating an object class
What are advantages of object model
-The objects may reflect real-world entities -Objects are lossely coupled so their implementation can be modified without affecting other objects -OO implementation languages are widely used
The project plan sets out
-The resources available to the project -The work breakdown -A schedule for the work
Give two examples of technology risks that may arise in a software project.
-The system database cannot process as many transactions as expected. -Reused software components are defective.
What are important differences between software project management and other types of project management?
-There is no standard for software processes -Large software projects are often one-off projects -The product(software) is intangible
List four weaknesses of structured methods.
-They do not support non-functional, -They rarely include, -They tend to produce, -The models produced are detailed and often hard to understand.
List two types of evolutionary development?
-Throw-away prototyping -Exploratory development
One of the key problems in software reuse is the inability to find existing reusable design patterns when hundreds of candidates exist
-True
List 4 design guidelines for secure systems engineering?
-Use redundancy -Base security -Avoid single point -Validate all inputs
List 4 approaches that may be used to identify object classes
-Use scenario-based analysis -Grammatical -Use an approach -Identify
Software system are subject to continual change requests
-User -Developers -Market forces
What is the correct sequence of the following activities in the Component-based software engineering?
1,3,2,4
A program validates a numeric field as follows: values less than 10 are rejected, values between 10 and 21 are accepted, values greater than or equal to 22 are rejected
3,10,22
answer:
44. Which of the following design guidelines for secure systems engineering is NOT true?
answer: Avoid using redundancy and diversity to reduce risk
45. What is the normal order of activities in which software testing process is organized?
answer: (2)=>(1)=>(3)=>(4)
46. Which of the following is NOT a sector in each loop in Boehm's spiral model?
answer: System design
47. What is the first stage in service construction by composition?
answer: Formulate outline workflow
48. What is NOT the advantage of repository model
answer: Sub-system need not be concerned with how data
49. Which of the following is NOT an advantage of using incremental development and dilivery?
answer: Systems are often have good structures
50. What is NOT an objective of change management procedures?
answer: Approving changes that are worthwhite.
51. What are the advantage of explicitly designing and documenting softwore architecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with the same data, product information, the system should be performed difference presentations for correspondent departments such as Product department, Quallty department and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behaviouralmodel
answer: Semantic data models
55. The student management system was completed with two functions, managing student information and organizing quizes for review, after that the customer added one more function, organizing online examination. Finaly all of them are put into the configuration management and are built for system testing, so what is the build called?
answer: Release
56. What is the output of Feasibility Study stage in the Requirement Engineering Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which method is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boolean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testing?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development processes?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requimentama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
67. What is the firt stage in service construction by composition?
answer: Formulate outline workflow
68. List three types of program generator
answer: Application*** code*** parser and lexical
69. Which question no longer concerns the modern software engineer?
answer: Why does computer
70. What is the type of following requirement,"the result should be returned in the real time"?
answer: Non-functional requirements
71. All of the following are advantages of pair programming EXCEPT
answer: It helps to increase
72. What is the last stage in survivabilityanalysis?
answer: Identify softspots and sur
73. How to build security for the CMS system?
answer: Building system authemtication
74. Which of these statements about defect testing is NOT true?
answer: A successful test
75. Which one is program type of the Java compite,Javac?
answer: Parser and lexical analyser generators
76. Which of following statements about software engineering is NOT true?
What is the distinction between a CASE tool and a CASE workbench?
A CASE tool supports an individual process task such as checking the consistency of a design. A CASE workbench supports sets of related activities such as specification or design.
What is the definition of a (web) service?
A loosely coupled reusable software component that encapsulates discrete functionality which may be distributed and programmatically accessed. A web service is a service that is accessed using standard Internet and XML-based protocols.
What is the difference between a milestone and a deliverable?
A milestone is a recognised endpoint of some activity that represents a decision point for a project. A deliverable is a project output that is delivered to the customer.
What is a semantic data model?
A model that describes the logical structure of the data processed by a system or managed by a database.
What is automated static analysis
A process where an analysis program examines the source code looking for possible anomalies. These are drawn to the inspector's attention as they may represent faults in the program
Which is the principle of prototype model?
A prototype is to build quickly demonstrate to the customer what the product looks like. The only minimal functionality of the actual product is provided during the prototyping phase
What is a workflow?
A sequence of activities, ordered in time, that make up a coherent business processes with each activity carrying out some part of the work of that process.
What is a software process?
A set of activities whose goal is the development or evolution of software
What is a software engineering code of ethics?
A set of principles that set out, in a general way, standards of expected behavior for professional software engineers.
How is the system organized in a client-server model?
A set of services is provided by servers and clients access and use these services
How is the system organised in a client-server model?
A set of services is provided by servers and clients access and use these services.
What is a software process model?
A simplified representation of a software process, presented from a specific perspective
answer:False
A software process is a simplified representation of a software process model, presented from a specific perspective.
What is WSDL standard?
A standard for workflow languages used to define service composition.
What is path testing?
A structural testing strategy whose objective is to exercise every independent path through a program.
What are system requirements
A structured document setting out detailed descriptions of the system's functions, services and operational constraints
What are system requirements?
A structured document setting out detailed descriptions of the system's functions, services and operational constraints
What is the difference between a system version and a system release?
A system version is an instance of a system that differs, in some ways, from other instances. A system release is a version that is released to customers.
What is a structured method?
A systematic way of producing models of an existing system or of a system that is to be built.
The best reason for using Independent software test teams is that
A test team will test the software more thoroughly
The prototyping model of software development is
A useful approach when a customer cannot define requirements clearly
Which of the following statements about service interfaces is true?
AWSDL
Explain how bar charts and activity networks give different views of a project schedule.
Activity networks show the time required to complete an activity and the dependence on activities. Bar charts show the activity timeline illustrating the relative length of activities and the dates when they take place.
Password should be changed [A]On regular basis [B]When you suspect that password is compromised [C]When you leave the place [D]All of the other choices
All of the other choices
Which is the change management concerned with?
All of the other choices
Which of the following is the source for software version up?
All of the other choices
Why is it necessary to define a configuration item identification scheme?
Because there may be thousands of source code modules, test scripts, design documents, etc. in a large project. You have to be able to uniquely identify and locate any specific item and so a unique naming scheme is required.
What is not an Upper-CASE tool?
Borland C
What are the two main types of event-driven control models?
Broadcast models where an event is broadcast to all sub-systems Interrupt-driven models where external events are detected and processed by an interrupt handler
Who review and approves the change request? [A]Change control board [B]Project manager [C]Chief executive officer [D]Project director
Change control board
What guidelines does Whittaker suggest for defect testing?
Chose inputs,Design,Repeat,Force,Force
Define the security terms 'threats
Circumstances that have the potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack
What's the BEST way to start creating a class diagram?
Class diagram-on the attributions, operations
All of the following are types of program generator EXCEPT
Component generators
What are the three important stages in the testing process?
Component(or unit) testing, integration testing, acceptant testing
Which is the correct sequence of the following activities in the Component-based software engineering?
Component-Requirement-Design-Development
another name for *...has a...+ relationship is ___
Composition
What does the acronym CASE stand for?
Computer Aided Software Engineering.
What does computer science concern with?
Computer science is concerned with theories and methods that underlie computers and software systems
What are non-functional requirements?
Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc
What are non-functional requirements?
Constraints on the serviecs or functions offered bt the system such as timing constraints, constraints on the development process, standard, etc
All of the following are the complementary strategies to achieve survivability EXCEPT
Conversion
Which of the followings does NOT belong to the important differences between software project management and other types of project management?
Cost of software project maintenance is higher than other type of projects
Which is the correct statement about coupling?
Coupling deals with interactions between objects or software components
What do you mean by coupling in software design?
Coupling is a measure of the strength of association established by a connection from one object or software component to another.
Which is the right sequence in the software testing process?
Create test case-Prepare-Perform-Create
Which is NOT the main benefit of software reuse?
Creating and maintaining a component library
We split testing into distinct stages primarily because:
Each test stage has a different purpose
What are the advantages of using incremental development and delivery?
Early delivery of critical functionality to the customer.Early increments serve as prototypes to explore requirements.Lower risk of overall project failure.More extensive testing of critical customer functionality.
Which of the following is not an advantage of pipeline model
Easy to support event-based interaction
The practices regular system release, test -first development and continuous integration in Extreme Programming fit into which principle of agile methods?
Embrace change
Acceptance tests are normally conducted by the
End users
Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true?
Enterprise Resource Planning systems are very widely used
Which is the right sequence in the process of prototype development?
Establish-Define-Develop-Evaluate
Marks: 1
Evolutionary software process models
Briefly describe two types of evolutionary development.
Exploratory development where the objective of the process is to work with customers to explore their requirements and deliver a final-system. Throw-away prototyping where the objective is to develop a better understanding of the customer's requirements and deliver a better requirements specification.
Marks: 1
Extending the framework involves
Which is the correct statement about integrity?
Extent to which access to software or data by an unauthorized persons can be controlled
A configuration management system would NOT normally provide:
Facilities to compare test results with expected results.
A successful defect test is a test which causes a program to behave in an normal way
False
If the applications or components are developed in difference programming language from the programming language you are using then you can not reuse that
False
Object oriented approach does not facilitate design evolution
False
The distribution of the costs of software engineering NOT depends on the process model that is used
False
All of the following are the design choices have to be made when reusing COTS products EXCEPT
How will data be exchanged between different modules
You can not to combine multiple patterns in the complex software system
False
What is the output of the first milestone in software requirement engineering process?
Feasibility study report document
Why is it increasingly irrelevant to distinguish between software development and evolution?
Few software systems are now completely new and a more realistic model of software development is of an iterative process that lasts for the life time of the software.
answer: SOftware costs more to develop than it does to maintain
Final Exam - Ngaythi: 18.12.2009
What are the main argument for the use of formal specification and verification?
Formal specification forces a detailed analysis of the requirements so reveals errors and anomalies. Formal verification demonstrates that the program meets its specification so implementation errors do not compromise dependability
What are the stages in service construction by composition?
Formulate,Discover services,Select,Refine,Create,Test
What is not a technique for component identification?
Function-based identification
Another name for *... is a...+ relationship is ___
Generalization
Another name for inheritance is ___
Generalization
The two main approaches to concept reuse are:
Generative,Design
What are the two fundamental types of software product?
Generic products that are designed to meet the needs of many different customers. Customised products designed to meet the specific needs of a single customer.
List four approaches that may be used to identify object classes.
Grammatical,Identify,Use,Use scenario-based analysis.
Give five examples of activities that can be automated using CASE.
Graphical system modelling. Maintaining a data dictionary. Generating user interfaces. Program debugging. Translating programs from one language to another.
What are the key issues in system building?
Have all,Are the right,Are all,Are,Is the
Marks: 1
How are analyse assets of the system?
Marks: 1
How are the non-functional requirements?
Marks: 1
How are the software project management?
What is infrastructure security?
Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks
Briefly describe the two distinct phases of system testing.
Integration,Release
What is the last stage in survivability analysis
Identify softspots and survivability strategies
Which of these is a characteristic of a good design?
Implements all requirements in the analysis model
What were the key benefits of prototyping found in Gordon and Bieman's study?
Improved system usability,Improved system quality,Reduced development effort.
answer:a. Meet requirements quickly because users have to be involved in the development b. The processes of specification, design and implementation are concurrent d. Rapid to delivery the highest priority functionalities to the customer
In the UML, a (an) ______ is represented as a named rectangle with two sections. The object attributes are listed in the top section. The operations that are associated with the object are set out in the bottom section.
What's the BEST way to start creating a data-flow diagram?
In the data-flow diagram, you should start by analyzing the overall procurement process and then move on to the analysis of sub-processes
What is the correct sequence of the following iterations in the RUP(Rational Unified Process) model?
Incept-Elaborate-Construct-Transit
List the main benefits of software reuse.
Increased,Reduced Process Risk,Effective,Standards,Accelerated
The practices small, frequent releases of the system, the approach to requirements description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods?
Incremental delivery
What is the key difference between incremental development and prototyping?
Incremental development starts with the requirements that are best understood and that have the highest priority.Prototyping is intended to help understand the requirements so starts with requirements that are not well understood.
What information may be included in a configuration database?
Information about configuration items such as data of creation, creator, etc. Information about users of components, system customers, execution platforms, and proposed changes to the system.
Briefly describe the advantage of pair programming.
It supports the idea. It serves.It helps support
Which of the following statements about testing is NOT true?
Its goal is to fix errors of the software system
What is not a Lower_CASE tool?
Junit
What problems can arise when requirements are written in natural language?
Lack of clarity-Requirements confusion-Requirements amalgamation.
What is the problem that cannot arise when requirements are written in natural language?
Lack of user's understandability
Which is NOT a problem that an arise when requirements are written in natural language?
Lack of user's understandability
Which of the following items would not come under Configuration Management?
Live data
What are the three stages in service interface design?
Logical interface,Messagedesign,WSDL development
The effort required for locating and fixing an error in an operational program is:
Maintainability
What are the four essential attributes of the good software?
Maintainability,dependability,efficiency,usability
The primary purpose of configuration status reporting is to
Make sure that change information is communicated to all affected parties
Change request is proposal due to ___
Market forces/Customers/Developers
Question 1
Marks: 1
Question 2
Marks: 1
Question 20
Marks: 1
Question 21
Marks: 1
Question 22
Marks: 1
Question 23
Marks: 1
Question 24
Marks: 1
Question 25
Marks: 1
Question 26
Marks: 1
Question 27
Marks: 1
Question 28
Marks: 1
Question 3
Marks: 1
Question 32
Marks: 1
Question 33
Marks: 1
Question 34
Marks: 1
Question 35
Marks: 1
Question 36
Marks: 1
Question 37
Marks: 1
Question 38
Marks: 1
Question 4
Marks: 1
Question 40
Marks: 1
Question 42
Marks: 1
Question 5
Marks: 1
Question 51
Marks: 1
Question 59
Marks: 1
Question 6
Marks: 1
The trend of Reuse-based software engineering is an approach to development that tries to ___
Maximize the reuse of existing software
Which is the evidence when said that "pair programming is as efficient as the same number of programmers working individually"?
Measurements suggest that development productivity with pair programming is similar to that of two people working independently
What are milestones?
Milestones are end-point of a project phase
What is a milestone?
Milestones are the end-point of a process activity
Which is the BEST principle of project scheduling?
Minimize task dependencies to avoid delays caused by one task waiting for another to complete
Which is not an advantage of inheritance?
Object classes are self-contained. They can be understood without reference to their super-classes
Which is the correct statement about object identification?
Object identification is an iterative process; it relies on the skill, experience and domain knowledge of system designers
--is concerned with developing an oriented system model to implement requirements
Object-oriented Analysis
Which is Not an object-oriented strategy?
Object-oriented deployment
All of the following are stages in an object-oriented development process EXCEPT?
Object-oriented evolution
Which of the following is not a stage in an object-oriented development process?
Object-oriented programming
Which of the following is not one of the issues that form a basis for design for reuse?
Object-oriented programming
answer:Object class
Object-oriented systems are easier to change than systems developed using other approaches because the objects are independent.
Marks: 1
One of the best ways to avoid frustration during the software development process is to
Which is NOT an advantage of rapid software development?
Only senior programmer are capable of taking the kind of decisions required during the development process
The practices pair programming, collective ownership of the system code, and sustainable pace in Extreme Programming fit into which principle of agile methods?
People not process
What non-functional requirements may be influenced by the choice of system architecture?
Performance, security, safety, availability, maintainability.
What is the main difference between the RUP (Rational Unified Process) and other software processes models?
Phase are more closely related to business rather than technical concerns
List four types of specialisation of software product lines.
Platform,Environment,Functional,Process
Which of the followings does not belong to external requirements?
Portability requiements
Which is Not a principal component of a software engineering method?
Process activities
Which of the following does NOT belong to important principles of agile methods?
Process not people
List three types of non-functional requirement?
Product-Organisational-External
Select the BEST statement about critical path
Project manager should allocate experienced people to do the tasks on the critical path
Which of the following is not an area of concern in design model
Project scope
Which of the following is not an area of concern in the design model?
Project scope
What is the first activity of project management
Proposal writing
When software configuration management is a formal activity, the software configuration audit is conducted by the
Quality assurance group
answer:c. Works best when object technologies are available for support
Question 10
answer:b. Consider budget and schedule constraints c. Consider software development process is not standardised d. Software engineering discipline is not the same as other domains
Question 11
answer: a. Work breakdown structure c. Project schedule d. Risk report
Question 12
answer:a. Monitor the risks throughout the project b. Make contingency plans c. Risk assessment
Question 13
answer: a. Degree of communication desired b. Rigidity of the delivery date c. Predicted size of the resulting program
Question 14
answer:a. Give team members more control over process and technical decisions
Question 15
answer:a. Timing constraints d. Define system properties and constraints
Question 16
answer:a. Non-functional requirements are requested by customer c. Functional requirements are described by system users d. They are tables and diagrams which can be understood by all users
Question 17
answer:a. Several different requirements may be expressed together as a single requirement b. Requirements, system goals and design information may not be clearly distinguished c. Easy to misunderstand between reader and writer
Question 18
Which of following paradigms is not a general paradigm of software development?
Rapid software development
All of the following are the main benefits of software reuse EXCEPT
Reduce maintain cost
All of the fallowings are main benefits of software reuse EXCEPT
Reduce maintenance costs
The testing intended to show that previously correct software has not been adversely affected by changes is call:
Regression testing
What is involved in risk monitoring?
Regularly assessing the project risks to decide whether or not that the risk is becoming more or less probable and whether the effects of the risk have changed.
Probability of a software failure is the
Reliability
What is the output of Feasibility study phase in the requirements engineering process?
Report that recommends whether or not to continue development project
Which of these statements about architectural design is not true?
Represents the link between specification and design processes
Which is the right sequence of the change management process?
Request-Analyze-Submit-Make-Create
Which is the correct sequence of the following activities in the Waterfall model?
Requirement-Design-Implementation-Integration-Operation
What are domain requirements?
Requirements that come from the application domain of the system and that reflect characteristics of that domain
What are the three complementary strategies to achieve survivability
Resistance/Recognition/Recovery
The trend of the design process in most software engineering disciplines is base on ___
Reuse of existing system or component
What is the first stage in survivability analysis
Review system requirements and architecture
What is the first stage in survivability analysis?
Review system requirements and architecture
What is the first stage in survivability analysis
Review system requirements and architecture.
What is the second stage of risk management process?
Risk analysis
What is the output of Risk Planning stage?
Risk avoidance and contingency plans
What is the first step in risk management process?
Risk identification
What are the key standards for web service-oriented architectures?
SOAP,WSDL,UDDI,WS-BPEL
Which one is not a web service standard?
SODP
What is security risk management?
Security risk management is concerned with assessing the possible losses that might ensue from attacks on assets in the system and balancing these losses against the costs of security procedures that may reduce the losses.
Which of the following statements about security is NOT true?
Security threats can be threats to the only confidentiality and integrity of a system or its data
What is involved in project scheduling?
Separating the total planned work in the project into separate activities and judging the time required to complete these activities.
Briefly describe two types of concurrent object implementation.
Servers: The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests.Active objects: The state of the object is changed by internal operations within the object itself. The process executing these operations runs continuously.
Which of the following statements about Service-oriented software engineering is true?
Service-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality
List five problems in testing service-oriented systems.
Services,Dynamic,non-functional,Testing,Compensating
What is the BEST way to do work breakdown structure?
Sets out the breakdown of the project into activities and identifies the milestones and deliverables associated with each activity
What is the BEST way to write requirement document?
Should include both a definition of user requirements and a specification of the system requirements
In Iterative development approach, which phase takes the least cost?
Specification
Suggest four risks that may threaten the success of a software project.
Staff turnover, management change, hardware unavailability,requirements change, specification delays, size underestimate, CASEtool underperformance, technology change, product competition.
What's the BEST way to start creating a state diagram?
State diagram-on the transition
What are user requirements?
Statements in natural language plus diaframs of the services the system provides and its operational constraints. Written for customers
What are functional requirements?
Statements of services the system should provide how the system should react to particilar inputs and how the system should behave in particular situations
What are software engineering methods?
Structured approaches to software development which include system models, notations, rules, design advice, and process guidance.
Briefly describe three design models that are part of the UML.
Subsystem,Sequence,State machine
Which of the following is not a stage in component - Base Software engineering
System design with reuse
What are the principal components of a software engineering method?
System model descriptions, rules, recommendations, process guidance.
What is the outputs of Requirements elicitation and analysis?
System models
Consider security design for username and password protection, what is the good design?
System users are authenticated using a login name/password combination. Requires user change password after 2 months
What are the characteristics of RAD processes?
System,The system
Which of the following is NOT an advantage of using incremental development and delivery?
Systems are often have good structures
Which document identifies and describes the testing that will be implemented and executed?
Test case
What is the correct statement about software architectural design?
The architectural design is normally expressed as a block diagram presenting an overview of the system structure
Select the BEST solution for architectural design of a software system that performance is a critical requirement
The architectural should be designed to localise critical operations and minimise communications, use large-grain rather thanfine-grain components
Marks: 1
The best way to conduct a requirements validation review is to
Marks: 1
The component-based development model is
What is the main difference between RUP (Raditional Unified Process and other processes?
The construction phase is essentially concerned with system design, programming and testing
Define software development with services
The creation of programs by composing and configuring services to create new composite services.
What is the critical path?
The critical path is the sequence of dependent activities that
The project schedule shows ___
The dependencies between activities, the estimated time required to reach each milestone and the allocation of people to activities
What is meant by configuration management
The development and use of standards and procedures for managing an evolving software system
What is meant by configuration management?
The development and use of standards and procedures for managing an evolving software system.
answer: [3]: [1]Software engineering is concerned with theories, methods and tools for professional software development [2]The economies of ALL developed nations are dependent on software [3] More and more systems are software controlled
The economies of all undeveloped nations are dependent on software
What is the main difference between the Spiral model and other software processes models?
The explicit recognition of risk in the Spiral model
Which of the following requirement statements belongs to non-functional requirements?
The user interface shall be implemented as simple HTML without frames
a. Adding methods that are called in response to events that are recognised by the framework
b. Adding data objects that are used in the framework
What is described in a context model?
The immediate external environment of the system defining the system's context and the dependencies that a system has on its environment
What is described in a context model?
The immediate external environment of the system defining the system's context and the dependencies that a system has on its environment.
Which is NOT an advantage of inheritance?
The inheritance graphs of analysis, design and implementation have different functions and should be separately maintained.
Which of the following statements about project management is true?
The intangibility of software systems poses special problems for software project management
Which of the following statements about the differences between integrating testing and component testing are true?
The integrating testing test the result of the component while the component testing test its internal structure
Which of the following statement about the two distinct phases of system testing is NOT true?
The integration team does NOT have access to the source code of the system.
Briefly explain why an OO approach facilitates design evolution.
The internal details of an object are hidden from other objects so changing these details is unlikely to have knock-on effects on other objects.
How can web services be used to facilitate the use of legacy systems?
The legacy system functionality is hidden by 'wrapping' it in a web service which is accessed by external applications. These applications therefore do not need to know the protocols and data structures used by the legacy system.
What described in a semantic data model?
The local structure of the data processed by a system or managed by a database.
What is Not a component of a WSDL specification?
The location part
What is the purpose of analysis?
The main objective of the analysis is to capture a complete, unambiguous, and consistent picture of the requirements of the system and what the system must do to satisfy the users' requirement and needs
Which is NOT a key factor that you should consider when planning reuse?
The name of the application or component reuse
Which of the followings belong to Server type of concurrent object implementation
The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests
What is the software requirements document?
The official document that defines the requirements that should be implemented by the system developers
Which of the following is NOT part of configuration management?
The people in the project team
What major software problem is addressed by aspect-oriented software development?
The problem of separation of concerns so that a software unit is designed to do one thing and one thing only.
What is service engineering?
The process of dev eloping services for reuse in service-oriented applications.
What are included in a quality plan?
The quality procedures and standards that should be used in a project
What is shown in an UML sequence model?
The sequence of interactions between objects and actors in the system associated with a single defined use-case
The Waterfall approach is the BEST approach to development software when ___
The software system is large and that is need developed at several sites
What is correct phase related to the term "CASE" in software engineering?
The software systems that provide automated support for software process activities
Why do formal specification and verification not guarantee reliability?
The specification may not reflect the real requirements of users -The proof may contain errors -The proof may assume a usage pattern which is incorrect.
What are the user requirements? [A]The statements in a natural language plus diagrams that describe the services' system and their constraints [B]The high-level abstract requirement [C]The requirements are written for contractor managers [D]All of the others
The statements in a natural language plus diagrams that describe the services' system and their constraints
Why is it impossible to completely separate system requirements and design?
The system architecture may have to be designed to structur e the requirements specification. Existing systems constrain the design and these constraints are requirements. The use of a specific architecture may be a requirement for business or regulatory reasons.
Suggest a most appropriate software process model that migh t be used as a basic for managing the developing of the software system that support categorizing goods based on consumption pattern, tracking payments from the customers
The waterfall model
Why are iterations usually limited when the waterfall model is used?
The waterfall model is a document-driven model with documents produced at the end of each phase. Because of the cost of producing and approving documents, iterations and costly and involve significant rework. Hence they are limited.
Which of the following is NOT a disadvantage of structured methods?
There are not many CASE tools that support structured methods
Which of the following requirement statements belongs to domain requirements?
There shall be a standard user interface to all database that shall be base on the Z39.50 standard
What is the common limitation of auto mated testing?
They are not useful when requirement are changing frequently
What is the common limitation of automated testing?
They are not usefull when requirements are changing frequently
What is the role of a change control board?
To assess the impact of proposed changes from a strategic and organisational perspective rather than a technical perspective. They should decide if changes are worthwhile and should prioritise changes to be implemented.
What is the purpose of interface design in an OO design process?
To define the signatures and semantics of the interfaces that are provided by an object or group of objects.
Which of the followings belong to validation testing?
To demonstrate,Asuccessful test shows
Marks: 1
To determine the architectural style or combination of styles that best fits the proposed system, requirements engineering is used to uncover
What is the purpose of defect testing?
To discover faults that make software's behaviour incorrect
In the extreme programming, what is the role of customer?
To help develop stories that defines the requirements
Why do we need consider security for project?
To protect the system against external attack
Marks: 1
Top-down integration testing has as it's major advantage(s) that
Active object typically include an infinite loop so that they are always carrying out the computation
True
Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model.
True
In reality, the distinction between different types of requirements is not clear-cut
True
The current trends suggest that the economies of ALL developed and developing nations are dependent on software
True
The economies of all developed nations are dependent on software
True
List the five key stages in an object-oriented design process.
Understand and define,Design,Identify,Develop,Specify object interfaces.
What is the normal order of activities in which software testing is organized?
Unit-Integration-Validation-System
Which of the following is NOT an approach that may be used to identify object classes?
Use Event-based analysis
Which type of test would you perform to accpect a build
User acceptant test
UML(unified modeling language) analysis modeling focuses on the
User model and structural model
What are user requirements and system requirements?
User requirements are statements in a language that is understandable to a user of what services the system should provide and the constraints under which it operates.System requirements are more detailed descriptions of the system services and constraint, written for developers of the system.
What are the three fundamental types of service that may be identified?
Utility services,Businessservices,Coordination services
Suggest the most appropriate generic software process model that might be used as a basic for managing the development of the following system: A university accounting system that replaces an existing system
Waterfall model
Define the security terms 'vulnerability'
Weakness in a computer-based system that may be exploited to cause loss or harm
answer:True
What are advantages of object oriented model
Marks: 1
What are the design guidelines to make the secure system?
Marks: 1
What are the service testing problems?
Marks: 1
What happen when using natural language to describe requirements?
What are the advantages of attribute-based version identification?
When selecting components, you do not need to specify the version number (an error-prone process if there are many components) but simply list the required component attributes.
Marks: 1
Which benefits of the incremental development?
Marks: 1
Which development phases are included in the configuration management plan?
Marks: 1
Which factors should be considered in choosing the organizational structure for a software team?
Marks: 1
Which information are included in the component header?
answer: [3]:[1]The objects may reflect real-world entities [2]OO implementation languages are widely used [3]Objects are loosely coupled so their implementation can be modified without affecting other objects
Which of following paradigms are the three most general paradigms of software development?
answer: [3]:[1]Component-based software engineering [2] Waterfall approach [3]Iterative development
Which of following statements about software engineering is true?
Marks: 1
Which of the following is not considered one of the four important elements that should exist when a configuration management system is developed?
Marks: 1
Which of the following need to be assessed during unit testing?
Marks: 1
Which of the following tasks is not part of software configuration management?
Marks: 1
Which ones are related to the service-oriented architectures?
answer:a. Inheritance b. Association c. Aggregation
Which ones are used in the dynamic models?
Marks: 1
Which process model is used in the Rational Unified Process?
Marks: 1
Which relationships are used in the object-oriented design process?
Marks: 1
Which types of testing are done by development team?
Unit testing is a __ [A]White box testing [B]Black box testing [C]Stress testing
White box testing
Which question no longer concerns the modern software engineer?
Why does computer hardware cost so much?
Marks: 1
Why is the configuration management applied?
Can two objects associate with one another in more than one way?
Yes
Requirements are usually presented at_ and _ levels of detail in requirements document
a high level statement/ a detailed system specification
d. An object model where the system is designed into interacting objects
answer:a. One sub-system has responsibility for starts and stops other sub-systems c. Each sub-system can respond to externally generated events from other sub-systems
a. Work breakdown structure
b. Architecture design
Adaptation in software product lines may involve
a. Adding new components to the system
How to identify objects within the system?
a. Base on the static and dynamic models
Which of following is not a UML diagram used creating a system analysis model
a. Class diagram
What is the difference between software engineering and computer science?
a. Computer science is concerned with theory and fundamentals;Software engineering is concerned with the practicalities of developing and delivering useful software
What types of abstraction are used in software design?
a. Data
Which ones mention to the decomposition style?
a. Data-flow model where the system is designed into functional modules which transform inputs to outputs
What is the output of "Refine workflow" in Construction by composition?
a. Executable workflow
Which relationships are used in the data model?
a. Interaction
How is the software engineering?
a. It provides developers discipline to develop a software product
Which of the following traits need to exist among the members of an agile software team?
a. None of the above
The data dictionary contains descriptions of each software
a. Notation
Which of the following is not a characteristic common to all design methods?
a. Notation quality assessment
Which ones mention to the control style?
a. One sub-system has responsibility for starts and stops other sub-systems
When is the design pattern applied to?
a. Re-use experiences of the specialists who developed reusable software
How are the prototyping development?
a. Should start with well-understood requirements
Which ones relate to the behavioural model?
a. Show the processing steps as data flows through a system
How are the context model?
a. Social and organisational concerns may affect the decision on where to position system boundaries
Which of these statements about Software costs are true?
a. Software costs more to maintain than it does to develop
What are the ethical responsibilities of the software engineers?
a. Software engineers should not misrepresent their level of competence
Which of the following is not necessary to apply agility to a software process?
a. Uses incremental product delivery strategy
Which information arerefered to make architectural design?
a. Which components are distributed in the system
b. Software engineering is concerned with theory and fundamentals;Computer science is concerned with the practicalities of developing and delivering useful software
answer : a. Computer science is concerned with theory and fundamentals;Software engineering is concerned with the practicalities of developing and delivering useful software
d. Object lifelines
answer: a. Active or passive objects b. Interaction relationships d. Object lifelines
d. They show what lies inside the system boundaries
answer: a. Social and organisational concerns may affect the decision on where to position system boundaries b. They show what lies outside the system boundaries c. Relationship with other systems
d. Version control
answer: a. Statistical quality control
d. Inheritance
answer: b. Association c. Aggregation d. Inheritance
d. Control item
answer: b. Data object d. Control item
c. Adding concrete classes that inherit operations from abstract classes in the framework
answer:a. Adding methods that are called in response to events that are recognised by the framework c. Adding concrete classes that inherit operations from abstract classes in the framework
d. Procedural
answer:a. Data c. Control d. Procedural
d. Each sub-system can respond to externally generated events from other sub-systems
answer:a. Data-flow model where the system is designed into functional modules which transform inputs to outputs c. An object model where the system is designed into interacting objects
d. It is concerned with theory and fundamentals how to develop a software product
answer:a. It provides developers discipline to develop a software product
d. Re-use abstract knowledge about a problem and its solution
answer:a. Re-use experiences of the specialists who developed reusable software c. Re-use difference settings of the abstract knowledge d. Re-use abstract knowledge about a problem and its solution
d. Semantic data describe the logical structure of data processed by the system
answer:a. Show the processing steps as data flows through a system b. Data flow diagrams are used in performing the data exchange between a system and other systems c. State diagrams show states when the systems response to events
d. Software costs more to develop than it does to maintain
answer:a. Software costs more to maintain than it does to develop b. The costs of software on a PC are often greater than the hardware cost c. Software costs often dominate computer system costs
d. Software engineers shall maintain integrity and independence in their professional judgment
answer:a. Software engineers should not misrepresent their level of competence b. Software engineers shall be fair to and supportive of their colleagues d. Software engineers shall maintain integrity and independence in their professional judgment
d. Testing on individual program components to create a sub-system
answer:a. Testing on integrating components to create a system or sub-system b. Testing on integrating sub-systems to create a system c. Testing is done by an independent testing team
d. Examine the system model for errors
answer:a. Use a checklist of questions to examine each requirement
d. A generic application architecture can be used
answer:a. Which components are distributed in the system b. How the sub-system is decomposed into modules d. A generic application architecture can be used
d. Base on iterative scenarios
answer:b. Base on tangible things in the application domain c. Depend on the skill, experience and domain knowledge of system designers d. Base on iterative scenarios
d. Decision-making ability
answer:b. Mutual trust and respect c. Competence d. Decision-making ability
d. Objective is to understand the system requirements and clarify what is really needed
answer:b. Specification, development and validation are interleaved c. Should start with poorly understood requirements d. Objective is to understand the system requirements and clarify what is really needed
d. Process allows team to streamline tasks
answer:c. Only essential work products are produced
d. Guidelines refinement heuristics
answer:c. configuration management
d. Dataflow diagram
answer:d. Dataflow diagram
e. Formulate outline workflow
answer:d. Test service
a. Are iterative in nature
b. A risky model that rarely produces a meaningful product
a. Inheritance
b. Association
c. Model-View-Controller
d. A system where the components are stand-alone services
c. Assessing the life cycle of risks
d. Analyse assets of the system
c. Operation system
d. Application
c. The best approach to use for projects with large development teams
d. Can easily accommodate product requirements changes
c. Process guidance to develop the system more secure
d. Coding techniques to make the system more secure
c. Semantic models
d. Constraints
c. Iteration
d. Construction
c. They come from the application domain of the system and reflect characteristics of that domain
d. Define system properties and constraints
c. Characteristics and constraints
d. Design patterns
c. Time required for system simulation
d. Element software architecture
c. Algorithmic performance
d. Execution paths
c. External services may be modified by the service provider thus invalidating tests which have been completed
d. Find defects and demonstrate that a system meets its functional and non-functional requirements
c. Reward programmers based on their productivity.
d. Give team members more control over process and technical decisions
c. Component elements
d. Human elements
c. Design
d. Implementation
c. Aggregation
d. Interaction
c. Easy to misunderstand between reader and writer
d. It provides the most complete information for developers
c. No drivers need to be written
d. Low level modules never need testing
c. Aim to control the costs and effort involved in making changes to a system
d. Make necessary configurations for preparing software development environment
c. Application
d. Middleware
c. Works best when object technologies are available for support
d. Only appropriate for computer hardware design
c. Middleware integration framework
d. Parser and lexical analysing framework
c. The system are often well structured.
d. Rapid to delivery the highest priority functionalities to the customer
c. Acceptance testing
d. Release testing
c. Project schedule
d. Risk report
c. Identify system resources that have a value and have to be protected
d. Set level of value of each asset
c. Predicted size of the resulting program
d. Size of the project budget
c. Consider software development process is not standardised
d. Software engineering discipline is not the same as other domains
c. Software specification, software development, software validation, software maintenance
d. Software requirement, software development, software validation, software evolution
c. Discover services
d. Test service
c. Testing on individual program components to create a sub-system
d. Testing on interactive among components
c. Functional requirements are described by system users
d. They are tables and diagrams which can be understood by all users
c. Project name
d. Version number and what were changed
c. Risk assessment
d. When risks happen, the suitable solutions are just generated
What are the benefits of software re-using?
faster -lower cost -increased software quality
Suggest three ways that a software prototype may be used.
help with,exploresoftware,run back-to-back
What is a variant?
identical but non-functionally distinct from other instances of a system
What are the advantage of explicitly designing and documenting a software architecture?
improves,encourages,helps
Which is the benefit of Service-oriented architectures?
inter-organizational
What are the components of a WSDL specification?
interface specification,binding,location part
In the architectural model of the weather station system, what are the three layers in the software?
interface,datacollection,instruments
If performance is a critical requirement the architecture should be designed to
localize critical operations and minimize communications; use large rather than fine-grain components
What do Gamma et al. suggest are the four essential elements of a design pattern?
meaningful,solution,statement.
Which of the following statements about Equivalence partitioning are NOT true?
none
What architectural models may be developed?
static structural,dynamic process, interface, Relationship, distribution
What is a successful defect test?
successful defect test is one where the system's operation does not conform to its specification, i.e. one that exposes a defect in the system.
What is the function of stress testing?
test,stress
The main focus of acceptance testing is: [A]finding faults in the system [B]ensuring that the system is acceptable to all users [C]testing the system with other systems [D]testing from a business perspective
testing from a business perspective