SWE102

Ace your homework & exams now with Quizwiz!

What is test-first development?

When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system

a. Assessing the possible losses that might ensue from attacks on the system

b. Balancing the possible losses against the costs of security procedures that may reduce these losses

a. Raise awaremess of the security issues

b. Consider as basic of a review checklist that is applied during the system validation process

a. No responsibility on the proposal preparation

b. Consider budget and schedule constraints

a. Algorithmic complexity

b. Control and data

a. Refine workflow

b. Create workflow program

a. Testing

b. Deployment

a. System infrastructure framework

b. Enterprise application framework

a. Code stability

b. Error handling

a. Give team members more control over process and technical decisions

b. Hide bad news from the project team members until things improve

a. Function, performance and constraints of a computer-based system

b. Implementation of each allocated system

a. Stress testing

b. Interface testing

a. Monitor the risks throughout the project

b. Make contingency plans

a. Reusable components and libraries

b. Middleware

a. Major decision points are tested early

b. No stubs need to be written

a. Service testing is difficult as external services are 'black-boxes'

b. Non-functional behaviour of the service is unpredictable

a. Not cost effective by known quantifiable software metrics

b. Not able to support the development of reusable components

a. Author of the component and creation date

b. Pre-conditions and post conditions

a. Validation elements

b. Process elements

a. Services may execute on different computers

b. Protocols have been developed to support service communication and information exchange

a. Non-functional requirements are requested by customer

b. Requirements which programmers can develop right after understanding them

a. Several different requirements may be expressed together as a single requirement

b. Requirements, system goals and design information may not be clearly distinguished

a. Operation system

b. Reusable components and libraries

a. Degree of communication desired

b. Rigidity of the delivery date

a. Set level of vulnerabilities of each asset

b. Set the level of exposure of each asset

a. Software specification, software development, software validation, software evolution

b. Software specification, software development, software testing, software evolution

a. Timing constraints

b. Statements of services should react to particular inputs

a. Make the product development more quality

b. Support to evolve software product

a. Testing is done by an independent testing team

b. Testing is done by component developers

a. Meet requirements quickly because users have to be involved in the development

b. The processes of specification, design and implementation are concurrent

a. Waterfall

b. Transition

a. Set of components

b. syntactic models

b. State diagram

c. Activity diagram

b. Association

c. Aggregation

b. One sub-system has responsibility for starts and stops other sub-systems

c. An object model where the system is designed into interacting objects

b. Eporting

c. Change control

b. Mutual trust and respect

c. Competence

b. Selecting from a library of existing components

c. Component and system configuration

b. Environmental

c. Control

b. Base on tangible things in the application domain

c. Depend on the skill, experience and domain knowledge of system designers

b. Data object

c. Diagram

b. Data-flow model where the system is designed into functional modules which transform inputs to outputs

c. Each sub-system can respond to externally generated events from other sub-systems

b. Send them to the design team and see if they have any concerns

c. Have the customer look over the requirements

b. It provides developers appropriate tools and techniques

c. It is concerned with the practicalities of delivering useful software

b. How the sub-system is decomposed into modules

c. Non-functional requirements are requested by customer

b. Interaction relationships

c. Object classes

b. Eliminate the use of project planning and testing

c. Only essential work products are produced

b. Re-use to develop non-functionalities

c. Re-use difference settings of the abstract knowledge

b. They show what lies outside the system boundaries

c. Relationship with other systems

b. Specification, development and validation are interleaved

c. Should start with poorly understood requirements

b. The costs of software on a PC are often greater than the hardware cost

c. Software costs often dominate computer system costs

b. Data flow diagrams are used in performing the data exchange between a system and other systems

c. State diagrams show states when the systems response to events

b. Testing on integrating sub-systems to create a system

c. Testing is done by an independent testing team

b. Software engineers shall be fair to and supportive of their colleagues

c. The technical skills are set to highest priority

b. Service specification

c. Workflow design

b. Functional component

c. configuration management

What is not an advantage of object model

complex entities are easy to represent as objects

What should be included in a configuration management plan?

configuration,people,configuration,CMtool,schema

In contrast, the RUP (Rational Unified Process) is normally described from which types of perspectives?

-Dynamic -Static -Practice

What are advantages of pipeline model?

-Easy to add new transformations -Supports transformation reuse -Intuitive organization for stakeholder communication

What are the stages in the software inspection process?

-Planning -Overview -Individual preparation -Inspection meetingRework -Follow-up

Which are levels of protection in application security engineering?

-Platform -Application -Record

What are the three levels of protection that might be used in an information system?

-Platform-level protection -Application-level protection -Record-level protection

What are three types of interface that may have to be defined in a requirements document?

-Procedural interfaces -Data structures -Representations of data

What are the principal components of a software engineering method?

-Process guidance -Recommendations -System model descriptions -Rules

List 3 types of non-functional requirement

-Product -External -Organizational

Which are types of non-functional requirement?

-Product -Organizational -External

What are the stages in an object-oriented development process?

-Programming -Analysis -Design

What are three related categories of risk?

-Project -Product -Business

Three categories of risks are ___

-Project -Technical -Business

What fundamental issues have to be considered when designing system architecture for security?

-Protection: How should the system be organised so that critical assets can be protected against an external attack -Distribution: How should system assets be distributed so that the effects of a successful attack are minimized

What is included in a quality plan and a validation plan?

-Quality plan: The quality procedures and standards that should be used in a project. -Validation plan: The approach, resources and schedule used for system validation.

What are the three complementary strategies to achieve survivability?

-Recognition -Recovery -Resistance

Which of the following styles belong to System organization?

-Repository -Client-server -Abstract machine

Which of these statements about architectural design are true?

-Represents the link between specification and design processes -Often carried out in parallel with some specification activities -It involves identifying major system components and their communications

What are the principal requirements engineering activities?

-Requirements elicitation and analysis -Feasibility study -Requirement specification -Requirement validation

What are the principal sections included in a test plan? The testing process.

-Requirements traceability -Tested items -Testing schedule -Test recording procedures -Constraints -Hardware and software requirements

What three approaches may be used when designing test cases?

-Requirements-based -Partition -Structural

What problems can arise when requirements are written in natural language?

-Reuqirement confusion -Requirement amalgamation -Lack of clarity

List three design models that are part of the UML

-Sequence -Subsystem -State

What are the advantages of pair programming

-Serves as an inform code review process -Supports the idea of common ownership and responsibility for the code -Helps support refactoring

What is the distinction between validation and verification?

-Validation: Are we building the right product? -Verification: Are we building the product right?

What are three basic techniques for component identification?

-Version -Change-oriented -Attribute-based

List the three fundamental software process frameworks that are used to create specific software processes.

-Waterfall -Evolutionary -Component-based

What are generic software process models?

-Waterfall -Iterative -Component-based

What are the three general paradigms of software development?

-Waterfall -Iterative -Component-based

Which of the following statements about test first development are true?

-When a system feature is identified, the tests of the code implementing that feature are written before the code -Tests are automated and all tests are run when a new increment is added to the system

What is test-first development

-When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system.

What design choices have to be made when reusing COTS products?

-Which COTS products offer the most appropriate functionality -What features of a product will actually be used -How will data be exchanged between different products

Suggest two possible vulnerabilities when login/password

-authentication is used.Users set guessable passwords -Authorised users reveal their passwords to unauthorised users, perhaps through some social engineering process

List the classes of faults that should be considered in an

-inspection checklist. -Data faults -Control faults -Input/output faults -Interface faults -Storage management faults -Exception management faults

What tests should be included in object class testing?

-that set and access all object attributes -for all operations in isolation -that force the object into all possible states

What is an equivalence partition? Give an example.

A class of inputs or outputs where it is reasonable to expect that the system will behave the same way for all members of the class. For example, all strings with less than 256 characters.

What is not an essential element of design patterns?

A concrete design description

What is a baseline?

A controlled system where changes to the system have to be agreed and recorded before they are implemented.

What is a design pattern and why are patterns important for reuse?

A design pattern is a description of a problem and the essence of its solution. This solution is expressed in a generic way and can be instantiated and reused in different settings.

A critical distinction between a service and a component as defined in CBSE is that services are independent and:

All of the others

Change request is proposal due to

All of the others

What are the main advantages of using a standard format to specify requirements?

All requirements have the same format so are easier to read.The definition of form fields mean that writers are less likely to forget to include information.Some automated processing is possible.

What is the fundamental characteristic of a repository model?

All shared data is held in a central database that can be accessed by all sub-systems.

What is a reference architecture?

An abstract model of a system class that can be used to inform designers about the general structure of that type of system.

What is visual programming?

An approach to development where a programmer manipulates graphical icons representing functions, data or user interface components and associates processing scripts with these icons.

What is generator-based reuse?

An approach to reuse where reusable knowledge is embedded in a generator system which is programmed by domain experts to create the system. An executable system is then generated.

Define the security terms 'attack'

An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage

What is a release?

An instance of a system which is distributed to users outside of the development team.

What is a version?

An instance of a system which is functionally distinct in some way from other system instances

What is the distinction between an object and an object class?

An object is created at run-time by instantiating an object class. The object includes state variables and operations on that state as defined in the object class definition.

Which of the following is a type of software process model that represents the roles of the people involved in the software process and the activities for which they are responsible?

An role/action model

__is concerned with developing an object-oriented model of the application domain.The objects in that model reflect the entities and operations associated with the problem to be solved

Analysis

List five common project management activities.

Any five from the following: proposal writing, project planning and scheduling, project costing, project monitoring and reviewing, personnel selection and evaluation, report writing and presentations

What is application security?

Application security is a software engineering problem where the system is designed to resist attacks

Which of the follwing is Not a type of behavioral model?

Architectual mode

What is the correct statement about software architectural design decisions?

Architectural design is a creative process, the activities in the process differs depending on the type of system being developed

Which is the correct statement about Product line architectures?

Architectures must be structured in such a way to separate different sub-systems and to allow them to be modified

What was the software crisis?

As more powerful hardware was introduced in the 1960s, larger software systems were developed. These were usually late, unreliable, did not meet user needs and cost more than expected. The problems of producing software was the software crisis.

To construct a system model the engineer should consider one of the following restraining factors?

Assumptions and constraints

List four design guidelines for secure systems engineering.Base security decisions on an explicit security policy

Avoid a single point of failure/Use redundancy and div ersity to reduce risk/Validate all inputs

Which of the following design guidelines for secure systems engineering is NOT true?

Avoid using redundancy and diversity to reduce risk

What is the difference between BPMN and WS-BPEL?

BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language.

Which is NOT a primary goal in the design of the UML?

Be dependent on particular programming language

Why is maintainability an important attribute of software?

Because all software is subject to change after it goes into use and the costs of software maintenance often exceeds the development costs of the software.

Why is it important to design for deployment

Because many security vulnerabilities are introduced when the system is configured for use in its deployment environment

Why many software projects are 'one-off' projects?

Because the requirements of software projects are not the same

Who chooses the stories for inclusion in the next release based on their priorities and the schedule estimates?

Customer

List five important principles of agile methods.

Customer,Incremental,Peoplenot,Embrace,Mainain

When should you use data flow diagrams (DFD)?

DFD is used to showing the data exchange between a system and other systems in its environment

Which of these model types does not represent software architecture?

Data model

What types of system model may be developed?

Data,Composition,Architectural,Classification,Stimulus/response

Which system model is described in the following graphic

Data-flow models

What activity does a software project manager need to perform to minimize the risk of software failure?

Define milestones and track progress

Which is the correct sequence of the following activities in the process of System evolution?

Define-Assess-Propses-Modify

What are deliverables?

Deliverables are project results delivered to customers

What is Not a characteristic of extreme programming?

Delivery-first development

Which is the purpose of data model?

Describle the logical structure of data processed by the system

Which is NOT the main activity in design process?

Designing the test case

What information is maintained in a UDDI description?

Details of, informaldescription, Informationon, Subscription information

Which is the first stage in an object-oriented design process?

Develop an understanding of the relationships between the software being designed and its external environment

What are the six fundamental best practices in the RUP?

Develop software iteratively. Manage requirements. Use component-based architectures. Visually model software. Verify software quality. Control changes to software.

Who is mainly responsible for the component (unit) testing?

Developer

Software systems are subject to continual change requests from

Developer,User

Software systems are subject to continual change requests from ___

Developers, Users, Market forces

List four fundamental questions that should be addressed in architectural design.Is there a generic application architecture that can be used?

How will, What architectural, How should, Whatcontrol, Etc.

List the requirements document sections suggested by the IEEE standard.

Introduction-General-Specific-Appendices-Index.

What is a user story in extreme programming? [A]It is a history of user [B]It is a requirement expressed as scenario [C]It is a small card [D]It is a small table

It is a requirement expressed as scenario

Which is NOT related to a characteristic of rapid application development processes?

It is always possible to arrive at a stable, consistent set of system requirements

What is the correct statement about software architectural styles?

Most large systems are heterogeneous architectur al styles

Which of these statements about extreme programming are true?

New versions may be built several times per day

What is Not a main problem with software reuse?

Not-invented-here syndrome

answer:a. System infrastructure framework b. Enterprise application framework c. Middleware integration framework

Question 39

answer:a. Adding new components to the system b. Selecting from a library of existing components c. Component and system configuration d. Modifying components to meet new requirements

Question 41

answer:b. Testing is done by component developers c. Testing on individual program components to create a sub-system

Question 43

answer:a. Stress testing b. Interface testing d. Release testing

Question 44

answer:b. Error handling d. Execution paths

Question 45

answer:a. Major decision points are tested early c. No drivers need to be written

Question 46

answer:a. Make the product development more quality b. Support to evolve software product c. Aim to control the costs and effort involved in making changes to a system

Question 47

answer:a. Testing c. Design d. Implementation

Question 48

answer:a. Author of the component and creation date c. Project name d. Version number and what were changed

Question 49

answer: d. Human elements

Question 50

answer:a. Assessing the possible losses that might ensue from attacks on the system b. Balancing the possible losses against the costs of security procedures that may reduce these losses

Question 52

answer:b. Set the level of exposure of each asset c. Identify system resources that have a value and have to be protected d. Set level of value of each asset

Question 53

answer:a. Raise awaremess of the security issues b. Consider as basic of a review checklist that is applied during the system validation process

Question 54

answer:c. Application

Question 55

answer:c. Operation system

Question 56

answer:a. Services may execute on different computers b. Protocols have been developed to support service communication and information exchange d. A system where the components are stand-alone services

Question 57

answer:a. Service testing is difficult as external services are 'black-boxes' b. Non-functional behaviour of the service is unpredictable c. External services may be modified by the service provider thus invalidating tests which have been completed

Question 58

answer: c. Workflow design

Question 60

answer: a. Software specification, software development, software validation, software evolution

Question 7

answer: c. Iteration

Question 8

answer:a. Are iterative in nature d. Can easily accommodate product requirements changes

Question 9

When should you use sequence diagram?

Should use sequence diagram to illustrate the sequence of steps that must be performed in order to complete a task

When should you use use-case diagram?

Should use use-case diagram to represent all of the people who might use the functionalities of the system

What is Not a type in Reuse-based software engineering?:

Software development process reuse

What is software engineering?

Software engineering is an engineering discipline that is concerned with all aspects of software production from specification to system evolution.

answer:False

Software process model is a simplified representation of a software process, presented from a specific perspective.

What are the fundamental activities that are common to all software processes?

Software specification, software design and implementation, software validation, software evolution.

What are the two complementary approaches used for checking and analysis?

Software testing Software inspections or peer reviews.

d. Modifying components to meet new requirements

e. Modifying system design to meet new requirements

d. Deployable service

e. Service list

The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the:

effect of the change on the project schedule, cost, quality, and risks

What may be included in a system release?

executable,Configuration,Data,installation,Electronic

Why do we need to consider security for project?

to protect the system against external attack

Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects

true

Marks: 1

What is the first layer of system layers?

Marks: 1

What is the last layer of system layers?

answer:a. Function, performance and constraints of a computer-based system

Question 19

answer:a. Set of components c. Semantic models d. Constraints

Question 29

answer:c. Characteristics and constraints

Question 30

Marks: 1

The system specification describes the

Marks: 1

What is the last stage in service construction by composition?

Marks: 1

What should include in the project plan?

Marks: 1

What should we do to manage risk?

Which of the following are the testing process goals

-Discover faults or defects in the software -The check that the software meets its requirements

Workbenches are also called ___ [A]Phases [B]Steps [C]Tasks [D]All of the other choices

All of the other choices

Marks: 1

How are the system testing?

Marks: 1

How are the user requirements?

What is describled in a state machine model?

How the system responds to external event

What is described in a state machine model?

How the system responds to external events.

Which of the following are the 2 most fundamental types of software product?

-Customized products -Generic products

What are types of behavioral models?

-Data-Flow -State machine

What are the two complementary goals of the testing process?

-Demonstrate that the software meets its requirements -Discover faults or defects in the software

What facilities might be provided in system building CASE tools?

-Dependency -Tool selection -Distributed -Derived object

When should you use state machine model?

-Describe how a system -It shows system states and events that cause transition from one state to another

What is the normal order of activities in which software testing process is organized

-Design -Prepare -Run -Compare

What are the 4 sectors in each loop in Boehm's Spiral model?

-Development and validation -Planning -Object setting -Risk assessment and reduction

What is the distinction between the terms.'shall' and 'should' in a user requirements document?

'Shall' normally indicates a mandatory requirement 'Should' indicates a desirable but not essential requirement

Which is the right sequence in project scheduling?

(2)=>(1)=>(4)=>(3)

What is a domain requirement? Give an example.

-A requirements that is derived from the application domain of the system rather than from the specific needs of system users. -For example, in a train control system, the requirement for the train braking system depends on characteristics of the train and the track.

Define the security terms 'vulnerability' and 'asset' Vulnerability

-A weakness in a computer system that MAY be exploited to cause loss or harm -Asset: A system resource that has a value and so should be protected

What are the advantages of using an incremental approach to software development?

-Accelerated delivery of customer services, user engagement with the system.

What are the characteristics of Interrupt-driven systems

-Allows fast response -Used in real-time systems

Which are object-oriented strategies?

-Analysis -Design -Programming

What are the three levels of protection that might be used in an information system?

-Application -Record -Platform

What is the distinction between application and infrastructure security?

-Application security - the application is designed to resist attacks -Infrastructure security - the software is configured to resist attacks

What are the objectives of change management procedures?

-Approving -Tracking -Analyzing

What are the stages of preliminary risk assessment?

-Asset identification -Asset value assessment -Exposure assessment -Threat identification -Threat probability assessment -Control identification -Feasibility assessment -Security requirements definition

Which of the following models belong to Event-driven systems?

-Broadcast -Interrupt-driven

Which of the following models belong to Centralised control?

-Call-return -Manager

Which of the following styles belong to Control styles?

-Centralised -Event-based

What are three types of program generator

-Code -Parser and lexical analyser -Application

What are three reuse types in Reuse-based software engineering

-Component -Object and function -Application system

What are the development stages in CBSE?

-Component -Requirements -System -Development

List the 3 fundamental software process frameworks that are used to create specific software process?

-Component-based software engineering -The Waterfall model -Evolutionary development

Which of the following BEST describes the major difficulties with incremental development?

-Contractual -Validation -Management -Maintenance

What are common principles of agile methods?

-Customer -Incremental -People not -Embrace -Maintain

Which of the following are considered a player in the software process?

-Customers -Project Manager -End-users

What are the advantages of repository model

-Efficient way to share large amounts of data -Sharing model is published as the repository schema -Sub-systems need not be concerned with how data is produced Centralised management e.g. backup, security, ect

What are advantage of explicitly designing and documenting a software architecture?

-Encourages a detailed analysis of the system -Improves the stakeholder communication -Helps with large-scale reuse

List 4 types of speciallsation of software product lines?

-Environment -Functional -Process -Platform

Suggest three ways that a software prototype may be used?

-Explore software design -Help with elicitation -Run back-to-back tests

What are the five key strategies used in cleanroom development?

-Formal specification -Incremental development -Structured programming -Static verification -Statistical testing

What is the distinction between functional and non-functional requirements?

-Functional requirements define what the system should do. -Non-functional requirements are not directly concerned with specific system functions but specify required system properties or place constraints on the system or its development process.

List the requirements document sections suggested by the IEEE standard?

-General description -Introduction -Specific requirements -Appendices -Index

What are the two main approaches to concept reuse?

-Generative programming -Design patterns

What are the three most important key challenges facing software engineering?

-Heterogeneity -Delivery -Trust

Check 4 fundamental questions that should be addressed in architectural design?

-How will the system be distributed -How should the system be structured -Is there a generic application architecture that can be used -What architectural style or styles are appropriate

List the stages in survivability analysis.Review system requirements and architecture

-Identify critical services and components -Identify attacks and compromisable components -Identify softspots and survivability strategies

What were the key benefits of prototyping found in Gordon and Bieman'sstudey?

-Improved system usability, a closer match to user's needs -Improved system quality, improved maintainability -Reduced development effort

What are the four phases of the Rational Unified Process?

-Inception -Elaboration -Construction -Transition.

What of these statements about the differences between incremental development and prototyping are true?

-Incremental development starts-best understood -Prototyping starts-not well-understood

What are the advantages of inspections over testing?

-Inspections can discover many errors. In testing, one error may mask another -Incomplete versions of a system can be inspected -Inspections can consider broader quality attributes as well as program defects

In the architectural model of the weather station system, what are the three layers in the software?

-Interface -Instruments -Data collection

What tools are normally included in a RAD environment?

-Interface generator -Database programming language -Report generator -Links to office applications

What are the three important classes of interface errors?

-Interface misuse -Interface misunderstanding -Timing errors

Which of the following belong to external requirements?

-Interoperability -Legislative -Ethical

What are advantages of pipeline model

-Intuitive organization -Supports transformation -Easy to add new transformations

What are the advantages of explicitly designing and documenting software architecture?

-It improves stakeholder communications -It encourages a detailed analysis of the system

List the main problems with software reuse.

-Lack of tool support -Increased maintenance costs| Increased,Lack,Not-invented-here,Creating,Finding

What are the four advantages of using incremental development and delivery?

-Lower risk of overall project failure -Early increments serve as prototypes to explore requirements -Early delivery of critical functionality to the customer -More extensive testing of critical customer functionality

What are essential attributes of good software?

-Maintainan -Dependan -Acceptan -Efficiency

What are three possible classes of application framework?

-Middleware integration -Enterprise application -System infrastructure

What are the components of an object class definition in the UML?

-Name of the object class -Attributes of the class -Operations or methods associated with the class

Which models give a static view of a system?

-Object -Data -Architectural

What models might be developed when applying a structured method?

-Object -Sequence -State transition -Structural -Data-flow

What different object models may be developed?

-Object aggregation models -Object behaviour model -Inheritance models

What are the two principle styles used for modular decomposition?

-Object-oriented decomposition -Function-oriented pipelining

New versions of software systems are created as they change

-Offering -Tailored -For different

What are the two types of CM workbench?

-Open -Integrated

Effective software project management focuses on

-Performance -Process -Product -People

Which non-functional system requirements that the software system architecture may depend on?

-Performance -Security -Safety -Availability -Maintainability

Which of the following statements about service interfaces is true

-Service interfaces are defined in an XML-based language called WSDL -A WSDL specification includes a definition of the interface types and operations, the binding protocol used by the service and the service location

What is the fundamental characteristic of a repository model

-Shared data is may be accessed by all sub-systems -Shared data is held in a central database or repository

What are the four most fundamental activities that are common to all software processes?

-Software validation -Software specification -Software evolution -Software design and implementation

What do Gamma etal.suggest are the four essential elements of a design pattern?

-Solution description -Statement of the consequences of applying the pattern -Description of the problem and when the pattern can be applied -Meaningful name

What are the fundamental activities in software processes?

-Specifiation -Development -Validation -Evolution

What are the most fundamental activities in software processes?

-Specification -Development -Validation -Evolution

In Waterfall approach, which phase takes the most cost?

-Specification -Integration and testing

List the 5 key stages in an object-oriented design process?

-Specify -Design the system -Identify -Develop -Understand and define

Which of the following strategic issues needs to be addressed in a successful software testing process?

-Specify requirements in a quantiflablemaner -Conduct formal technical reviews prior to testing

What are advantages of explicitly designing and documenting software architecture?

-Stakeholder -System analysis -Large-scale reuse

What are the models in architecture design?

-Static -Dynamic -Interface -Relationship -Distribution

What perspectives may be used for system modelling?

-Structural -External -Behavioral

What deployment support may be included in a system?

-Support for viewing and analysing configurations -Default privilege minimisation -Configuration setting localisation -Easy ways to fix security vulnerabilities

What are the four development stages in CBSE? Component-based software engineering

-System design with reuse -Requirements modification -Development and integration -Component analysis

What are three general architectural styles?

-System organisation -Decomposition styles -Control styles

What are three important characteristics of extreme programming?

-Test-first development -Pair programming -Requirements expressed as scenarios

What are good attributes of requirements?

-Testable -Complete -Clear -Consistent -Unambiguous

What are the components of an object class definition in the UML

-The attributes of the class -The operations or methods associated with the class -The name of the object class

What key factors should be considered when planning reuse?

-The development schedule for the software -The expected software lifetime -The background, skills and experience of the development team

What's the difference between functional and non-functional requirements?

-The functional requirement is described in details, the other is described in high-level abstract -The functional requirement describes system properties and constraints, the other describes system services

List the advantages of inheritance

-The inheritance graph is a source of organisational knowledge about domains and systems -It is a reuse mechanism at both the design and the programming level -It is an abstraction mechanism which may be used to classify entities

What do you understand by the system context and model of use?

-The model of use-dynamic model -System context-static model

What are the distinctions between an object and an object class?

-The object includes state variables and operations on that state as defined in the object class definition -An object is created at run-time by instantiating an object class

What are advantages of object model

-The objects may reflect real-world entities -Objects are lossely coupled so their implementation can be modified without affecting other objects -OO implementation languages are widely used

The project plan sets out

-The resources available to the project -The work breakdown -A schedule for the work

Give two examples of technology risks that may arise in a software project.

-The system database cannot process as many transactions as expected. -Reused software components are defective.

What are important differences between software project management and other types of project management?

-There is no standard for software processes -Large software projects are often one-off projects -The product(software) is intangible

List four weaknesses of structured methods.

-They do not support non-functional, -They rarely include, -They tend to produce, -The models produced are detailed and often hard to understand.

List two types of evolutionary development?

-Throw-away prototyping -Exploratory development

One of the key problems in software reuse is the inability to find existing reusable design patterns when hundreds of candidates exist

-True

List 4 design guidelines for secure systems engineering?

-Use redundancy -Base security -Avoid single point -Validate all inputs

List 4 approaches that may be used to identify object classes

-Use scenario-based analysis -Grammatical -Use an approach -Identify

Software system are subject to continual change requests

-User -Developers -Market forces

What is the correct sequence of the following activities in the Component-based software engineering?

1,3,2,4

A program validates a numeric field as follows: values less than 10 are rejected, values between 10 and 21 are accepted, values greater than or equal to 22 are rejected

3,10,22

answer:

44. Which of the following design guidelines for secure systems engineering is NOT true?

answer: Avoid using redundancy and diversity to reduce risk

45. What is the normal order of activities in which software testing process is organized?

answer: (2)=>(1)=>(3)=>(4)

46. Which of the following is NOT a sector in each loop in Boehm's spiral model?

answer: System design

47. What is the first stage in service construction by composition?

answer: Formulate outline workflow

48. What is NOT the advantage of repository model

answer: Sub-system need not be concerned with how data

49. Which of the following is NOT an advantage of using incremental development and dilivery?

answer: Systems are often have good structures

50. What is NOT an objective of change management procedures?

answer: Approving changes that are worthwhite.

51. What are the advantage of explicitly designing and documenting softwore architecture?

answer: It improves the sta***it helps with***it encourages a detailed

52. What is the Lower-CASE tool?

answer: Netbeans

53. In the management system, the customer notices to one of requirements, with the same data, product information, the system should be performed difference presentations for correspondent departments such as Product department, Quallty department and Planning department. So which design or framework is applied for?

answer: MVC-Model view

54. Which of the following is NOT a stype of behaviouralmodel

answer: Semantic data models

55. The student management system was completed with two functions, managing student information and organizing quizes for review, after that the customer added one more function, organizing online examination. Finaly all of them are put into the configuration management and are built for system testing, so what is the build called?

answer: Release

56. What is the output of Feasibility Study stage in the Requirement Engineering Process?

answer: Feasibility report

57. The Google map is a web service to be used in the weather system, which method is used in testing the system?

answer: Integration testing

58. Using equivalence partition testing to check employee ID by format 8xxx: Boolean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testing?

answer: 7999,8000,8500,8999,9000

59. Which is NOT related to a characteristic of rapid application development processes?

answer: It is always possible to

60. List the tests that should be included in object class testing

answer: Tests that set*** tests for all***tests that force

61. What is the Upper-CASE tool?

answer: Microsoft Visio

62. Which is NOT an object-oriented strategy?

answer: Object-oriented deployment

63. What are the two types of CM workbench?

answer: Intergrated workbenches***Open workbenches

64. What problems can arise when requirements are written in natural language?

answer: Lank of clarity*** requimentama***requirement confu

65. Which of the following statements about Reference models are true?

answer: Refference models*** they are a

66. All of the followings belong to organizational requirements EXCEPT?

answer: Privacy requirements

67. What is the firt stage in service construction by composition?

answer: Formulate outline workflow

68. List three types of program generator

answer: Application*** code*** parser and lexical

69. Which question no longer concerns the modern software engineer?

answer: Why does computer

70. What is the type of following requirement,"the result should be returned in the real time"?

answer: Non-functional requirements

71. All of the following are advantages of pair programming EXCEPT

answer: It helps to increase

72. What is the last stage in survivabilityanalysis?

answer: Identify softspots and sur

73. How to build security for the CMS system?

answer: Building system authemtication

74. Which of these statements about defect testing is NOT true?

answer: A successful test

75. Which one is program type of the Java compite,Javac?

answer: Parser and lexical analyser generators

76. Which of following statements about software engineering is NOT true?

What is the distinction between a CASE tool and a CASE workbench?

A CASE tool supports an individual process task such as checking the consistency of a design. A CASE workbench supports sets of related activities such as specification or design.

What is the definition of a (web) service?

A loosely coupled reusable software component that encapsulates discrete functionality which may be distributed and programmatically accessed. A web service is a service that is accessed using standard Internet and XML-based protocols.

What is the difference between a milestone and a deliverable?

A milestone is a recognised endpoint of some activity that represents a decision point for a project. A deliverable is a project output that is delivered to the customer.

What is a semantic data model?

A model that describes the logical structure of the data processed by a system or managed by a database.

What is automated static analysis

A process where an analysis program examines the source code looking for possible anomalies. These are drawn to the inspector's attention as they may represent faults in the program

Which is the principle of prototype model?

A prototype is to build quickly demonstrate to the customer what the product looks like. The only minimal functionality of the actual product is provided during the prototyping phase

What is a workflow?

A sequence of activities, ordered in time, that make up a coherent business processes with each activity carrying out some part of the work of that process.

What is a software process?

A set of activities whose goal is the development or evolution of software

What is a software engineering code of ethics?

A set of principles that set out, in a general way, standards of expected behavior for professional software engineers.

How is the system organized in a client-server model?

A set of services is provided by servers and clients access and use these services

How is the system organised in a client-server model?

A set of services is provided by servers and clients access and use these services.

What is a software process model?

A simplified representation of a software process, presented from a specific perspective

answer:False

A software process is a simplified representation of a software process model, presented from a specific perspective.

What is WSDL standard?

A standard for workflow languages used to define service composition.

What is path testing?

A structural testing strategy whose objective is to exercise every independent path through a program.

What are system requirements

A structured document setting out detailed descriptions of the system's functions, services and operational constraints

What are system requirements?

A structured document setting out detailed descriptions of the system's functions, services and operational constraints

What is the difference between a system version and a system release?

A system version is an instance of a system that differs, in some ways, from other instances. A system release is a version that is released to customers.

What is a structured method?

A systematic way of producing models of an existing system or of a system that is to be built.

The best reason for using Independent software test teams is that

A test team will test the software more thoroughly

The prototyping model of software development is

A useful approach when a customer cannot define requirements clearly

Which of the following statements about service interfaces is true?

AWSDL

Explain how bar charts and activity networks give different views of a project schedule.

Activity networks show the time required to complete an activity and the dependence on activities. Bar charts show the activity timeline illustrating the relative length of activities and the dates when they take place.

Password should be changed [A]On regular basis [B]When you suspect that password is compromised [C]When you leave the place [D]All of the other choices

All of the other choices

Which is the change management concerned with?

All of the other choices

Which of the following is the source for software version up?

All of the other choices

Why is it necessary to define a configuration item identification scheme?

Because there may be thousands of source code modules, test scripts, design documents, etc. in a large project. You have to be able to uniquely identify and locate any specific item and so a unique naming scheme is required.

What is not an Upper-CASE tool?

Borland C

What are the two main types of event-driven control models?

Broadcast models where an event is broadcast to all sub-systems Interrupt-driven models where external events are detected and processed by an interrupt handler

Who review and approves the change request? [A]Change control board [B]Project manager [C]Chief executive officer [D]Project director

Change control board

What guidelines does Whittaker suggest for defect testing?

Chose inputs,Design,Repeat,Force,Force

Define the security terms 'threats

Circumstances that have the potential to cause loss or harm. You can think of these as a system vulnerability that is subjected to an attack

What's the BEST way to start creating a class diagram?

Class diagram-on the attributions, operations

All of the following are types of program generator EXCEPT

Component generators

What are the three important stages in the testing process?

Component(or unit) testing, integration testing, acceptant testing

Which is the correct sequence of the following activities in the Component-based software engineering?

Component-Requirement-Design-Development

another name for *...has a...+ relationship is ___

Composition

What does the acronym CASE stand for?

Computer Aided Software Engineering.

What does computer science concern with?

Computer science is concerned with theories and methods that underlie computers and software systems

What are non-functional requirements?

Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc

What are non-functional requirements?

Constraints on the serviecs or functions offered bt the system such as timing constraints, constraints on the development process, standard, etc

All of the following are the complementary strategies to achieve survivability EXCEPT

Conversion

Which of the followings does NOT belong to the important differences between software project management and other types of project management?

Cost of software project maintenance is higher than other type of projects

Which is the correct statement about coupling?

Coupling deals with interactions between objects or software components

What do you mean by coupling in software design?

Coupling is a measure of the strength of association established by a connection from one object or software component to another.

Which is the right sequence in the software testing process?

Create test case-Prepare-Perform-Create

Which is NOT the main benefit of software reuse?

Creating and maintaining a component library

We split testing into distinct stages primarily because:

Each test stage has a different purpose

What are the advantages of using incremental development and delivery?

Early delivery of critical functionality to the customer.Early increments serve as prototypes to explore requirements.Lower risk of overall project failure.More extensive testing of critical customer functionality.

Which of the following is not an advantage of pipeline model

Easy to support event-based interaction

The practices regular system release, test -first development and continuous integration in Extreme Programming fit into which principle of agile methods?

Embrace change

Acceptance tests are normally conducted by the

End users

Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true?

Enterprise Resource Planning systems are very widely used

Which is the right sequence in the process of prototype development?

Establish-Define-Develop-Evaluate

Marks: 1

Evolutionary software process models

Briefly describe two types of evolutionary development.

Exploratory development where the objective of the process is to work with customers to explore their requirements and deliver a final-system. Throw-away prototyping where the objective is to develop a better understanding of the customer's requirements and deliver a better requirements specification.

Marks: 1

Extending the framework involves

Which is the correct statement about integrity?

Extent to which access to software or data by an unauthorized persons can be controlled

A configuration management system would NOT normally provide:

Facilities to compare test results with expected results.

A successful defect test is a test which causes a program to behave in an normal way

False

If the applications or components are developed in difference programming language from the programming language you are using then you can not reuse that

False

Object oriented approach does not facilitate design evolution

False

The distribution of the costs of software engineering NOT depends on the process model that is used

False

All of the following are the design choices have to be made when reusing COTS products EXCEPT

How will data be exchanged between different modules

You can not to combine multiple patterns in the complex software system

False

What is the output of the first milestone in software requirement engineering process?

Feasibility study report document

Why is it increasingly irrelevant to distinguish between software development and evolution?

Few software systems are now completely new and a more realistic model of software development is of an iterative process that lasts for the life time of the software.

answer: SOftware costs more to develop than it does to maintain

Final Exam - Ngaythi: 18.12.2009

What are the main argument for the use of formal specification and verification?

Formal specification forces a detailed analysis of the requirements so reveals errors and anomalies. Formal verification demonstrates that the program meets its specification so implementation errors do not compromise dependability

What are the stages in service construction by composition?

Formulate,Discover services,Select,Refine,Create,Test

What is not a technique for component identification?

Function-based identification

Another name for *... is a...+ relationship is ___

Generalization

Another name for inheritance is ___

Generalization

The two main approaches to concept reuse are:

Generative,Design

What are the two fundamental types of software product?

Generic products that are designed to meet the needs of many different customers. Customised products designed to meet the specific needs of a single customer.

List four approaches that may be used to identify object classes.

Grammatical,Identify,Use,Use scenario-based analysis.

Give five examples of activities that can be automated using CASE.

Graphical system modelling. Maintaining a data dictionary. Generating user interfaces. Program debugging. Translating programs from one language to another.

What are the key issues in system building?

Have all,Are the right,Are all,Are,Is the

Marks: 1

How are analyse assets of the system?

Marks: 1

How are the non-functional requirements?

Marks: 1

How are the software project management?

What is infrastructure security?

Infrastructure security is a systems management problem where the infrastructure is configured to resist attacks

Briefly describe the two distinct phases of system testing.

Integration,Release

What is the last stage in survivability analysis

Identify softspots and survivability strategies

Which of these is a characteristic of a good design?

Implements all requirements in the analysis model

What were the key benefits of prototyping found in Gordon and Bieman's study?

Improved system usability,Improved system quality,Reduced development effort.

answer:a. Meet requirements quickly because users have to be involved in the development b. The processes of specification, design and implementation are concurrent d. Rapid to delivery the highest priority functionalities to the customer

In the UML, a (an) ______ is represented as a named rectangle with two sections. The object attributes are listed in the top section. The operations that are associated with the object are set out in the bottom section.

What's the BEST way to start creating a data-flow diagram?

In the data-flow diagram, you should start by analyzing the overall procurement process and then move on to the analysis of sub-processes

What is the correct sequence of the following iterations in the RUP(Rational Unified Process) model?

Incept-Elaborate-Construct-Transit

List the main benefits of software reuse.

Increased,Reduced Process Risk,Effective,Standards,Accelerated

The practices small, frequent releases of the system, the approach to requirements description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods?

Incremental delivery

What is the key difference between incremental development and prototyping?

Incremental development starts with the requirements that are best understood and that have the highest priority.Prototyping is intended to help understand the requirements so starts with requirements that are not well understood.

What information may be included in a configuration database?

Information about configuration items such as data of creation, creator, etc. Information about users of components, system customers, execution platforms, and proposed changes to the system.

Briefly describe the advantage of pair programming.

It supports the idea. It serves.It helps support

Which of the following statements about testing is NOT true?

Its goal is to fix errors of the software system

What is not a Lower_CASE tool?

Junit

What problems can arise when requirements are written in natural language?

Lack of clarity-Requirements confusion-Requirements amalgamation.

What is the problem that cannot arise when requirements are written in natural language?

Lack of user's understandability

Which is NOT a problem that an arise when requirements are written in natural language?

Lack of user's understandability

Which of the following items would not come under Configuration Management?

Live data

What are the three stages in service interface design?

Logical interface,Messagedesign,WSDL development

The effort required for locating and fixing an error in an operational program is:

Maintainability

What are the four essential attributes of the good software?

Maintainability,dependability,efficiency,usability

The primary purpose of configuration status reporting is to

Make sure that change information is communicated to all affected parties

Change request is proposal due to ___

Market forces/Customers/Developers

Question 1

Marks: 1

Question 2

Marks: 1

Question 20

Marks: 1

Question 21

Marks: 1

Question 22

Marks: 1

Question 23

Marks: 1

Question 24

Marks: 1

Question 25

Marks: 1

Question 26

Marks: 1

Question 27

Marks: 1

Question 28

Marks: 1

Question 3

Marks: 1

Question 32

Marks: 1

Question 33

Marks: 1

Question 34

Marks: 1

Question 35

Marks: 1

Question 36

Marks: 1

Question 37

Marks: 1

Question 38

Marks: 1

Question 4

Marks: 1

Question 40

Marks: 1

Question 42

Marks: 1

Question 5

Marks: 1

Question 51

Marks: 1

Question 59

Marks: 1

Question 6

Marks: 1

The trend of Reuse-based software engineering is an approach to development that tries to ___

Maximize the reuse of existing software

Which is the evidence when said that "pair programming is as efficient as the same number of programmers working individually"?

Measurements suggest that development productivity with pair programming is similar to that of two people working independently

What are milestones?

Milestones are end-point of a project phase

What is a milestone?

Milestones are the end-point of a process activity

Which is the BEST principle of project scheduling?

Minimize task dependencies to avoid delays caused by one task waiting for another to complete

Which is not an advantage of inheritance?

Object classes are self-contained. They can be understood without reference to their super-classes

Which is the correct statement about object identification?

Object identification is an iterative process; it relies on the skill, experience and domain knowledge of system designers

--is concerned with developing an oriented system model to implement requirements

Object-oriented Analysis

Which is Not an object-oriented strategy?

Object-oriented deployment

All of the following are stages in an object-oriented development process EXCEPT?

Object-oriented evolution

Which of the following is not a stage in an object-oriented development process?

Object-oriented programming

Which of the following is not one of the issues that form a basis for design for reuse?

Object-oriented programming

answer:Object class

Object-oriented systems are easier to change than systems developed using other approaches because the objects are independent.

Marks: 1

One of the best ways to avoid frustration during the software development process is to

Which is NOT an advantage of rapid software development?

Only senior programmer are capable of taking the kind of decisions required during the development process

The practices pair programming, collective ownership of the system code, and sustainable pace in Extreme Programming fit into which principle of agile methods?

People not process

What non-functional requirements may be influenced by the choice of system architecture?

Performance, security, safety, availability, maintainability.

What is the main difference between the RUP (Rational Unified Process) and other software processes models?

Phase are more closely related to business rather than technical concerns

List four types of specialisation of software product lines.

Platform,Environment,Functional,Process

Which of the followings does not belong to external requirements?

Portability requiements

Which is Not a principal component of a software engineering method?

Process activities

Which of the following does NOT belong to important principles of agile methods?

Process not people

List three types of non-functional requirement?

Product-Organisational-External

Select the BEST statement about critical path

Project manager should allocate experienced people to do the tasks on the critical path

Which of the following is not an area of concern in design model

Project scope

Which of the following is not an area of concern in the design model?

Project scope

What is the first activity of project management

Proposal writing

When software configuration management is a formal activity, the software configuration audit is conducted by the

Quality assurance group

answer:c. Works best when object technologies are available for support

Question 10

answer:b. Consider budget and schedule constraints c. Consider software development process is not standardised d. Software engineering discipline is not the same as other domains

Question 11

answer: a. Work breakdown structure c. Project schedule d. Risk report

Question 12

answer:a. Monitor the risks throughout the project b. Make contingency plans c. Risk assessment

Question 13

answer: a. Degree of communication desired b. Rigidity of the delivery date c. Predicted size of the resulting program

Question 14

answer:a. Give team members more control over process and technical decisions

Question 15

answer:a. Timing constraints d. Define system properties and constraints

Question 16

answer:a. Non-functional requirements are requested by customer c. Functional requirements are described by system users d. They are tables and diagrams which can be understood by all users

Question 17

answer:a. Several different requirements may be expressed together as a single requirement b. Requirements, system goals and design information may not be clearly distinguished c. Easy to misunderstand between reader and writer

Question 18

Which of following paradigms is not a general paradigm of software development?

Rapid software development

All of the following are the main benefits of software reuse EXCEPT

Reduce maintain cost

All of the fallowings are main benefits of software reuse EXCEPT

Reduce maintenance costs

The testing intended to show that previously correct software has not been adversely affected by changes is call:

Regression testing

What is involved in risk monitoring?

Regularly assessing the project risks to decide whether or not that the risk is becoming more or less probable and whether the effects of the risk have changed.

Probability of a software failure is the

Reliability

What is the output of Feasibility study phase in the requirements engineering process?

Report that recommends whether or not to continue development project

Which of these statements about architectural design is not true?

Represents the link between specification and design processes

Which is the right sequence of the change management process?

Request-Analyze-Submit-Make-Create

Which is the correct sequence of the following activities in the Waterfall model?

Requirement-Design-Implementation-Integration-Operation

What are domain requirements?

Requirements that come from the application domain of the system and that reflect characteristics of that domain

What are the three complementary strategies to achieve survivability

Resistance/Recognition/Recovery

The trend of the design process in most software engineering disciplines is base on ___

Reuse of existing system or component

What is the first stage in survivability analysis

Review system requirements and architecture

What is the first stage in survivability analysis?

Review system requirements and architecture

What is the first stage in survivability analysis

Review system requirements and architecture.

What is the second stage of risk management process?

Risk analysis

What is the output of Risk Planning stage?

Risk avoidance and contingency plans

What is the first step in risk management process?

Risk identification

What are the key standards for web service-oriented architectures?

SOAP,WSDL,UDDI,WS-BPEL

Which one is not a web service standard?

SODP

What is security risk management?

Security risk management is concerned with assessing the possible losses that might ensue from attacks on assets in the system and balancing these losses against the costs of security procedures that may reduce the losses.

Which of the following statements about security is NOT true?

Security threats can be threats to the only confidentiality and integrity of a system or its data

What is involved in project scheduling?

Separating the total planned work in the project into separate activities and judging the time required to complete these activities.

Briefly describe two types of concurrent object implementation.

Servers: The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests.Active objects: The state of the object is changed by internal operations within the object itself. The process executing these operations runs continuously.

Which of the following statements about Service-oriented software engineering is true?

Service-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality

List five problems in testing service-oriented systems.

Services,Dynamic,non-functional,Testing,Compensating

What is the BEST way to do work breakdown structure?

Sets out the breakdown of the project into activities and identifies the milestones and deliverables associated with each activity

What is the BEST way to write requirement document?

Should include both a definition of user requirements and a specification of the system requirements

In Iterative development approach, which phase takes the least cost?

Specification

Suggest four risks that may threaten the success of a software project.

Staff turnover, management change, hardware unavailability,requirements change, specification delays, size underestimate, CASEtool underperformance, technology change, product competition.

What's the BEST way to start creating a state diagram?

State diagram-on the transition

What are user requirements?

Statements in natural language plus diaframs of the services the system provides and its operational constraints. Written for customers

What are functional requirements?

Statements of services the system should provide how the system should react to particilar inputs and how the system should behave in particular situations

What are software engineering methods?

Structured approaches to software development which include system models, notations, rules, design advice, and process guidance.

Briefly describe three design models that are part of the UML.

Subsystem,Sequence,State machine

Which of the following is not a stage in component - Base Software engineering

System design with reuse

What are the principal components of a software engineering method?

System model descriptions, rules, recommendations, process guidance.

What is the outputs of Requirements elicitation and analysis?

System models

Consider security design for username and password protection, what is the good design?

System users are authenticated using a login name/password combination. Requires user change password after 2 months

What are the characteristics of RAD processes?

System,The system

Which of the following is NOT an advantage of using incremental development and delivery?

Systems are often have good structures

Which document identifies and describes the testing that will be implemented and executed?

Test case

What is the correct statement about software architectural design?

The architectural design is normally expressed as a block diagram presenting an overview of the system structure

Select the BEST solution for architectural design of a software system that performance is a critical requirement

The architectural should be designed to localise critical operations and minimise communications, use large-grain rather thanfine-grain components

Marks: 1

The best way to conduct a requirements validation review is to

Marks: 1

The component-based development model is

What is the main difference between RUP (Raditional Unified Process and other processes?

The construction phase is essentially concerned with system design, programming and testing

Define software development with services

The creation of programs by composing and configuring services to create new composite services.

What is the critical path?

The critical path is the sequence of dependent activities that

The project schedule shows ___

The dependencies between activities, the estimated time required to reach each milestone and the allocation of people to activities

What is meant by configuration management

The development and use of standards and procedures for managing an evolving software system

What is meant by configuration management?

The development and use of standards and procedures for managing an evolving software system.

answer: [3]: [1]Software engineering is concerned with theories, methods and tools for professional software development [2]The economies of ALL developed nations are dependent on software [3] More and more systems are software controlled

The economies of all undeveloped nations are dependent on software

What is the main difference between the Spiral model and other software processes models?

The explicit recognition of risk in the Spiral model

Which of the following requirement statements belongs to non-functional requirements?

The user interface shall be implemented as simple HTML without frames

a. Adding methods that are called in response to events that are recognised by the framework

b. Adding data objects that are used in the framework

What is described in a context model?

The immediate external environment of the system defining the system's context and the dependencies that a system has on its environment

What is described in a context model?

The immediate external environment of the system defining the system's context and the dependencies that a system has on its environment.

Which is NOT an advantage of inheritance?

The inheritance graphs of analysis, design and implementation have different functions and should be separately maintained.

Which of the following statements about project management is true?

The intangibility of software systems poses special problems for software project management

Which of the following statements about the differences between integrating testing and component testing are true?

The integrating testing test the result of the component while the component testing test its internal structure

Which of the following statement about the two distinct phases of system testing is NOT true?

The integration team does NOT have access to the source code of the system.

Briefly explain why an OO approach facilitates design evolution.

The internal details of an object are hidden from other objects so changing these details is unlikely to have knock-on effects on other objects.

How can web services be used to facilitate the use of legacy systems?

The legacy system functionality is hidden by 'wrapping' it in a web service which is accessed by external applications. These applications therefore do not need to know the protocols and data structures used by the legacy system.

What described in a semantic data model?

The local structure of the data processed by a system or managed by a database.

What is Not a component of a WSDL specification?

The location part

What is the purpose of analysis?

The main objective of the analysis is to capture a complete, unambiguous, and consistent picture of the requirements of the system and what the system must do to satisfy the users' requirement and needs

Which is NOT a key factor that you should consider when planning reuse?

The name of the application or component reuse

Which of the followings belong to Server type of concurrent object implementation

The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests

What is the software requirements document?

The official document that defines the requirements that should be implemented by the system developers

Which of the following is NOT part of configuration management?

The people in the project team

What major software problem is addressed by aspect-oriented software development?

The problem of separation of concerns so that a software unit is designed to do one thing and one thing only.

What is service engineering?

The process of dev eloping services for reuse in service-oriented applications.

What are included in a quality plan?

The quality procedures and standards that should be used in a project

What is shown in an UML sequence model?

The sequence of interactions between objects and actors in the system associated with a single defined use-case

The Waterfall approach is the BEST approach to development software when ___

The software system is large and that is need developed at several sites

What is correct phase related to the term "CASE" in software engineering?

The software systems that provide automated support for software process activities

Why do formal specification and verification not guarantee reliability?

The specification may not reflect the real requirements of users -The proof may contain errors -The proof may assume a usage pattern which is incorrect.

What are the user requirements? [A]The statements in a natural language plus diagrams that describe the services' system and their constraints [B]The high-level abstract requirement [C]The requirements are written for contractor managers [D]All of the others

The statements in a natural language plus diagrams that describe the services' system and their constraints

Why is it impossible to completely separate system requirements and design?

The system architecture may have to be designed to structur e the requirements specification. Existing systems constrain the design and these constraints are requirements. The use of a specific architecture may be a requirement for business or regulatory reasons.

Suggest a most appropriate software process model that migh t be used as a basic for managing the developing of the software system that support categorizing goods based on consumption pattern, tracking payments from the customers

The waterfall model

Why are iterations usually limited when the waterfall model is used?

The waterfall model is a document-driven model with documents produced at the end of each phase. Because of the cost of producing and approving documents, iterations and costly and involve significant rework. Hence they are limited.

Which of the following is NOT a disadvantage of structured methods?

There are not many CASE tools that support structured methods

Which of the following requirement statements belongs to domain requirements?

There shall be a standard user interface to all database that shall be base on the Z39.50 standard

What is the common limitation of auto mated testing?

They are not useful when requirement are changing frequently

What is the common limitation of automated testing?

They are not usefull when requirements are changing frequently

What is the role of a change control board?

To assess the impact of proposed changes from a strategic and organisational perspective rather than a technical perspective. They should decide if changes are worthwhile and should prioritise changes to be implemented.

What is the purpose of interface design in an OO design process?

To define the signatures and semantics of the interfaces that are provided by an object or group of objects.

Which of the followings belong to validation testing?

To demonstrate,Asuccessful test shows

Marks: 1

To determine the architectural style or combination of styles that best fits the proposed system, requirements engineering is used to uncover

What is the purpose of defect testing?

To discover faults that make software's behaviour incorrect

In the extreme programming, what is the role of customer?

To help develop stories that defines the requirements

Why do we need consider security for project?

To protect the system against external attack

Marks: 1

Top-down integration testing has as it's major advantage(s) that

Active object typically include an infinite loop so that they are always carrying out the computation

True

Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model.

True

In reality, the distinction between different types of requirements is not clear-cut

True

The current trends suggest that the economies of ALL developed and developing nations are dependent on software

True

The economies of all developed nations are dependent on software

True

List the five key stages in an object-oriented design process.

Understand and define,Design,Identify,Develop,Specify object interfaces.

What is the normal order of activities in which software testing is organized?

Unit-Integration-Validation-System

Which of the following is NOT an approach that may be used to identify object classes?

Use Event-based analysis

Which type of test would you perform to accpect a build

User acceptant test

UML(unified modeling language) analysis modeling focuses on the

User model and structural model

What are user requirements and system requirements?

User requirements are statements in a language that is understandable to a user of what services the system should provide and the constraints under which it operates.System requirements are more detailed descriptions of the system services and constraint, written for developers of the system.

What are the three fundamental types of service that may be identified?

Utility services,Businessservices,Coordination services

Suggest the most appropriate generic software process model that might be used as a basic for managing the development of the following system: A university accounting system that replaces an existing system

Waterfall model

Define the security terms 'vulnerability'

Weakness in a computer-based system that may be exploited to cause loss or harm

answer:True

What are advantages of object oriented model

Marks: 1

What are the design guidelines to make the secure system?

Marks: 1

What are the service testing problems?

Marks: 1

What happen when using natural language to describe requirements?

What are the advantages of attribute-based version identification?

When selecting components, you do not need to specify the version number (an error-prone process if there are many components) but simply list the required component attributes.

Marks: 1

Which benefits of the incremental development?

Marks: 1

Which development phases are included in the configuration management plan?

Marks: 1

Which factors should be considered in choosing the organizational structure for a software team?

Marks: 1

Which information are included in the component header?

answer: [3]:[1]The objects may reflect real-world entities [2]OO implementation languages are widely used [3]Objects are loosely coupled so their implementation can be modified without affecting other objects

Which of following paradigms are the three most general paradigms of software development?

answer: [3]:[1]Component-based software engineering [2] Waterfall approach [3]Iterative development

Which of following statements about software engineering is true?

Marks: 1

Which of the following is not considered one of the four important elements that should exist when a configuration management system is developed?

Marks: 1

Which of the following need to be assessed during unit testing?

Marks: 1

Which of the following tasks is not part of software configuration management?

Marks: 1

Which ones are related to the service-oriented architectures?

answer:a. Inheritance b. Association c. Aggregation

Which ones are used in the dynamic models?

Marks: 1

Which process model is used in the Rational Unified Process?

Marks: 1

Which relationships are used in the object-oriented design process?

Marks: 1

Which types of testing are done by development team?

Unit testing is a __ [A]White box testing [B]Black box testing [C]Stress testing

White box testing

Which question no longer concerns the modern software engineer?

Why does computer hardware cost so much?

Marks: 1

Why is the configuration management applied?

Can two objects associate with one another in more than one way?

Yes

Requirements are usually presented at_ and _ levels of detail in requirements document

a high level statement/ a detailed system specification

d. An object model where the system is designed into interacting objects

answer:a. One sub-system has responsibility for starts and stops other sub-systems c. Each sub-system can respond to externally generated events from other sub-systems

a. Work breakdown structure

b. Architecture design

Adaptation in software product lines may involve

a. Adding new components to the system

How to identify objects within the system?

a. Base on the static and dynamic models

Which of following is not a UML diagram used creating a system analysis model

a. Class diagram

What is the difference between software engineering and computer science?

a. Computer science is concerned with theory and fundamentals;Software engineering is concerned with the practicalities of developing and delivering useful software

What types of abstraction are used in software design?

a. Data

Which ones mention to the decomposition style?

a. Data-flow model where the system is designed into functional modules which transform inputs to outputs

What is the output of "Refine workflow" in Construction by composition?

a. Executable workflow

Which relationships are used in the data model?

a. Interaction

How is the software engineering?

a. It provides developers discipline to develop a software product

Which of the following traits need to exist among the members of an agile software team?

a. None of the above

The data dictionary contains descriptions of each software

a. Notation

Which of the following is not a characteristic common to all design methods?

a. Notation quality assessment

Which ones mention to the control style?

a. One sub-system has responsibility for starts and stops other sub-systems

When is the design pattern applied to?

a. Re-use experiences of the specialists who developed reusable software

How are the prototyping development?

a. Should start with well-understood requirements

Which ones relate to the behavioural model?

a. Show the processing steps as data flows through a system

How are the context model?

a. Social and organisational concerns may affect the decision on where to position system boundaries

Which of these statements about Software costs are true?

a. Software costs more to maintain than it does to develop

What are the ethical responsibilities of the software engineers?

a. Software engineers should not misrepresent their level of competence

Which of the following is not necessary to apply agility to a software process?

a. Uses incremental product delivery strategy

Which information arerefered to make architectural design?

a. Which components are distributed in the system

b. Software engineering is concerned with theory and fundamentals;Computer science is concerned with the practicalities of developing and delivering useful software

answer : a. Computer science is concerned with theory and fundamentals;Software engineering is concerned with the practicalities of developing and delivering useful software

d. Object lifelines

answer: a. Active or passive objects b. Interaction relationships d. Object lifelines

d. They show what lies inside the system boundaries

answer: a. Social and organisational concerns may affect the decision on where to position system boundaries b. They show what lies outside the system boundaries c. Relationship with other systems

d. Version control

answer: a. Statistical quality control

d. Inheritance

answer: b. Association c. Aggregation d. Inheritance

d. Control item

answer: b. Data object d. Control item

c. Adding concrete classes that inherit operations from abstract classes in the framework

answer:a. Adding methods that are called in response to events that are recognised by the framework c. Adding concrete classes that inherit operations from abstract classes in the framework

d. Procedural

answer:a. Data c. Control d. Procedural

d. Each sub-system can respond to externally generated events from other sub-systems

answer:a. Data-flow model where the system is designed into functional modules which transform inputs to outputs c. An object model where the system is designed into interacting objects

d. It is concerned with theory and fundamentals how to develop a software product

answer:a. It provides developers discipline to develop a software product

d. Re-use abstract knowledge about a problem and its solution

answer:a. Re-use experiences of the specialists who developed reusable software c. Re-use difference settings of the abstract knowledge d. Re-use abstract knowledge about a problem and its solution

d. Semantic data describe the logical structure of data processed by the system

answer:a. Show the processing steps as data flows through a system b. Data flow diagrams are used in performing the data exchange between a system and other systems c. State diagrams show states when the systems response to events

d. Software costs more to develop than it does to maintain

answer:a. Software costs more to maintain than it does to develop b. The costs of software on a PC are often greater than the hardware cost c. Software costs often dominate computer system costs

d. Software engineers shall maintain integrity and independence in their professional judgment

answer:a. Software engineers should not misrepresent their level of competence b. Software engineers shall be fair to and supportive of their colleagues d. Software engineers shall maintain integrity and independence in their professional judgment

d. Testing on individual program components to create a sub-system

answer:a. Testing on integrating components to create a system or sub-system b. Testing on integrating sub-systems to create a system c. Testing is done by an independent testing team

d. Examine the system model for errors

answer:a. Use a checklist of questions to examine each requirement

d. A generic application architecture can be used

answer:a. Which components are distributed in the system b. How the sub-system is decomposed into modules d. A generic application architecture can be used

d. Base on iterative scenarios

answer:b. Base on tangible things in the application domain c. Depend on the skill, experience and domain knowledge of system designers d. Base on iterative scenarios

d. Decision-making ability

answer:b. Mutual trust and respect c. Competence d. Decision-making ability

d. Objective is to understand the system requirements and clarify what is really needed

answer:b. Specification, development and validation are interleaved c. Should start with poorly understood requirements d. Objective is to understand the system requirements and clarify what is really needed

d. Process allows team to streamline tasks

answer:c. Only essential work products are produced

d. Guidelines refinement heuristics

answer:c. configuration management

d. Dataflow diagram

answer:d. Dataflow diagram

e. Formulate outline workflow

answer:d. Test service

a. Are iterative in nature

b. A risky model that rarely produces a meaningful product

a. Inheritance

b. Association

c. Model-View-Controller

d. A system where the components are stand-alone services

c. Assessing the life cycle of risks

d. Analyse assets of the system

c. Operation system

d. Application

c. The best approach to use for projects with large development teams

d. Can easily accommodate product requirements changes

c. Process guidance to develop the system more secure

d. Coding techniques to make the system more secure

c. Semantic models

d. Constraints

c. Iteration

d. Construction

c. They come from the application domain of the system and reflect characteristics of that domain

d. Define system properties and constraints

c. Characteristics and constraints

d. Design patterns

c. Time required for system simulation

d. Element software architecture

c. Algorithmic performance

d. Execution paths

c. External services may be modified by the service provider thus invalidating tests which have been completed

d. Find defects and demonstrate that a system meets its functional and non-functional requirements

c. Reward programmers based on their productivity.

d. Give team members more control over process and technical decisions

c. Component elements

d. Human elements

c. Design

d. Implementation

c. Aggregation

d. Interaction

c. Easy to misunderstand between reader and writer

d. It provides the most complete information for developers

c. No drivers need to be written

d. Low level modules never need testing

c. Aim to control the costs and effort involved in making changes to a system

d. Make necessary configurations for preparing software development environment

c. Application

d. Middleware

c. Works best when object technologies are available for support

d. Only appropriate for computer hardware design

c. Middleware integration framework

d. Parser and lexical analysing framework

c. The system are often well structured.

d. Rapid to delivery the highest priority functionalities to the customer

c. Acceptance testing

d. Release testing

c. Project schedule

d. Risk report

c. Identify system resources that have a value and have to be protected

d. Set level of value of each asset

c. Predicted size of the resulting program

d. Size of the project budget

c. Consider software development process is not standardised

d. Software engineering discipline is not the same as other domains

c. Software specification, software development, software validation, software maintenance

d. Software requirement, software development, software validation, software evolution

c. Discover services

d. Test service

c. Testing on individual program components to create a sub-system

d. Testing on interactive among components

c. Functional requirements are described by system users

d. They are tables and diagrams which can be understood by all users

c. Project name

d. Version number and what were changed

c. Risk assessment

d. When risks happen, the suitable solutions are just generated

What are the benefits of software re-using?

faster -lower cost -increased software quality

Suggest three ways that a software prototype may be used.

help with,exploresoftware,run back-to-back

What is a variant?

identical but non-functionally distinct from other instances of a system

What are the advantage of explicitly designing and documenting a software architecture?

improves,encourages,helps

Which is the benefit of Service-oriented architectures?

inter-organizational

What are the components of a WSDL specification?

interface specification,binding,location part

In the architectural model of the weather station system, what are the three layers in the software?

interface,datacollection,instruments

If performance is a critical requirement the architecture should be designed to

localize critical operations and minimize communications; use large rather than fine-grain components

What do Gamma et al. suggest are the four essential elements of a design pattern?

meaningful,solution,statement.

Which of the following statements about Equivalence partitioning are NOT true?

none

What architectural models may be developed?

static structural,dynamic process, interface, Relationship, distribution

What is a successful defect test?

successful defect test is one where the system's operation does not conform to its specification, i.e. one that exposes a defect in the system.

What is the function of stress testing?

test,stress

The main focus of acceptance testing is: [A]finding faults in the system [B]ensuring that the system is acceptable to all users [C]testing the system with other systems [D]testing from a business perspective

testing from a business perspective


Related study sets

Precalculus Chapters 2, 4, 5, 6, 7, and Final Exam

View Set

Series 7: Retirement Plans (Education And Health Savings Plans)

View Set

Sherpath: Activity and Movement: Implement and Take Action; Evaluate

View Set

MKT 3411 Ch.9 Group and Situational Effects on Consumer Behavior

View Set

Chapter 10: Digital Marketing and Social Networking

View Set

Kansas MPJE, KANSAS - Pharmacy Law Practice Exam Questions (2015), 3P Law Final

View Set

Property and casualty Insurance Terms and Related Concepts

View Set

Chapter 10 Controlling Microbial Growth in the Body: Antimicrobial Drugs

View Set