2. The relationship of data elements in a module is called
Correct : B. Cohesion
3. The extent to which different modules are dependent upon each other is called
Correct : A. Coupling
4. A system that does not interact with external environment is called
Correct : A. Closed system
5. Which one is not a phase of “bath tub curve” of hardware reliability
Correct : D. Test-out
6. Software reliability i
Correct : A. The probability of failure free operation of a program for a specified time in a specified environment
7. Fault is
Correct : D. All of the above
8. One fault may lead to
Correct : D. all of the above
9. Which ‘time’ unit is not used in reliability studies?
Correct : B. Machine time
10. Failure occurrences can be represented as
Correct : D. All of the above
11. As the reliability increases, failure intensity
Correct : A. decreases
12. Maximum possible value of reliability is
Correct : C. 1
13. Minimum possible value of reliability is
Correct : D. 0
14. Software Quality is
Correct : D. All of the above
15. Defect rate is
Correct : D. All of the above
16. How many product quality factors have been proposed in McCall quality model?
Correct : D. 6
17. Which one is not a product quality factor of McCall quality model?
Correct : C. Product specification
18. The second level of quality attributes in McCall quality model are termed as
Correct : A. quality criteria
19. Which one is not a level in Boehm software quality model?
Correct : D. Final constructs
20. Which one is not a software quality model?
Correct : C. ISO 9000
21. Basic execution time model was developed by
Correct : D. Victor Baisili
22. NHPP stands for
Correct : A. Non Homogeneous Poisson Process
23. In Basic execution time model, failure intensity is given by
Correct : B. λ(µ)=λ0(1-µ / V0)
24. In Basic execution time model, additional number of failures required to achieve a failure intensity objective is expressed as
Correct : A. 0/λ0(λP - λF)
25. In Logarithmic Poisson execution model, ‘θ’ is known as
Correct : B. Failure intensity decay parameter
26. Failure intensity function of Logarithmic Poisson execution model is given as
Correct : C. λ(µ)= λ0exp(-θµ)
27. CMM level 1 has
Correct : C. 0 KPAs
28. MTBF stands for
Correct : A. Mean time between failure
29. CMM model is a technique to
Correct : A. Improve the software process
30. Total numbers of maturing levels in CMM are
Correct : C. 5
31. Reliability of software is dependent on number of errors
Correct : B. remaining
32. Reliability of software is usually estimated at
Correct : D. Testing phase
33. CMM stands for
Correct : B. Capability maturity model
34. Which level of CMM is for basic project management?
Correct : B. Repeatable
35. Which level of CMM is for process management?
Correct : D. Optimizing
36. CMM was developed at
Correct : C. Carnegie Mellon University
37. The number of clauses used in ISO 9001 are
Correct : C. 20
38. In reliability models, our emphasis is on
Correct : C. failures
39. McCall has developed a
Correct : A. Quality model
40. The model to measure the software process improvement is called
Correct : C. CMM
41. In ISO 9126, each characteristic is related to
Correct : A. one attributes
42. Each maturity model is CMM has
Correct : C. Several KPAs
43. ISO 9126 contains definitions of
Correct : D. All of the above
44. Which is not a software reliability model ?
Correct : C. Spiral model
45. In McCall quality model; product revision quality factor consist of
Correct : D. None of the above
46. In reliability models, our emphasis is on
Correct : C. failures
47. MTTF stands for
Correct : A. Mean time to failure
48. Software does not break or wear out like hardware. What is your opinion?
Correct : A. True
49. Software reliability is defined with respect to
Correct : A. time
50. KPA in CMM stands for
Correct : A. Key Process Area
51. For a function of n variables, boundary value analysis yields:
Correct : B. 4n+1 test cases
52. For a function of two variables, how many cases will be generated by robustness testing?
Correct : B. 13
53. For a function of n variables robustness testing of boundary value analysis yields:
Correct : C. 6n+1
54. A node with indegree=0 and outdegree ≠ 0 is called
Correct : A. Source node
55. A node with indegree ≠ 0 and out degree=0 is called
Correct : C. Destination node
56. A decision table has
Correct : A. Four portions
57. Beta testing is carried out by
Correct : A. Users
58. Equivalence class partitioning is related to
Correct : B. Black box testing
59. Cause effect graphing techniques is one form of
Correct : C. Function testing
60. During validation
Correct : D. The customer checks the product
61. Verification is
Correct : B. Checking the product with respect to specification
62. Validation is
Correct : A. Checking the product with respect to customer’s expectation
63. Alpha testing is done by
Correct : A. Customer
64. Site for Alpha testing is
Correct : A. Software company
65. Site for Beta testing is
Correct : B. User’s site
66. Acceptance testing is done by
Correct : B. Customers
67. One fault may lead to
Correct : D. All of the above
68. Test suite is
Correct : A. Set of test cases
69. Behavioral specification is required for:
Correct : B. Verification
70. During the development phase, the following testing approach is not adopted
Correct : D. Acceptance testing
71. Which is not a functional testing technique?
Correct : C. Regression testing
72. Decision table are useful for describing situations in which:
Correct : D. None of the above
73. One weakness of boundary value analysis and equivalence partitioning is
Correct : B. They do not explore combinations of input circumstances
74. In cause effect graphing technique, cause & effect are related to
Correct : A. Input and output
75. DD path graph is called as
Correct : D. Decision to decision Path graph
76. Cyclomatic complexity is developed by
Correct : D. Victor Basili
77. An independent path is
Correct : A. Any path through the DD path graph that introduce at least one new set of processing statements or new conditions
78. What is a Software?
Correct : C. Software is set of programs, documentation & configuration of data
79. Which of these software engineering activities are not a part of software processes?
Correct : A. Software dependence
80. Which of these does not affect different types of software as a whole?
Correct : B. Flexibility
81. The fundamental notions of software engineering does not account for?
Correct : D. Software Validation
82. Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code).
Correct : A. 100-200
83. Which two models doesn’t allow defining requirements early in the cycle?
Correct : B. Prototyping & Spiral
84. A company is developing an advance version of their current software available in the
market, what model approach would they prefer?
Correct : C. Both RAD & Iterative Enhancement
85. Identify a fourth generation language (4GL) from the given below.
Correct : C. Unix shell
86. Which of the following model has a major disadvantage in terms of the coding phase of a
software life cycle model?
Correct : D. 4GT Model
87. The work associated with software engineering can be categorized into three generic phases, regardless of application area, project size, or complexity namely the__________ phase which focuses on what, the_________ phase which focuses on how and the_________ phase which focuses on change.
Correct : C. definition
88. How many phases are there in Scrum?
Correct : D. Scrum is an agile method which me
89. User requirements are expressed as __________ in Extreme Programming.
Correct : C. scenarios
90. FAST stands for
Correct : D. None of the mentioned
91. The user system requirements are the parts of which document?
Correct : B. SRS
92. What is the first step of requirement elicitation?
Correct : A. Identifying Stakeholder
93. Why is Requirements Elicitation a difficult task?
Correct : D. All of the mentioned
94. ___________ and ____________ are the two viewpoints discussed in Controlled
Requirements Expression (CORE)
Correct : A. Functional, Non-Functional
95. Which of the following Requirement Elicitation Techniques is applicable to messy, changing
and ill-defined problem situations?
Correct : C. Soft Systems Methodology (SSM)
96. Which of the following is not a diagram studied in Requirement Analysis?
Correct : D. Activity Diagram
97. How many feasibility studies is conducted in Requirement Analysis?
Correct : B. 3
98. The SRS is said to be consistent if and only if
Correct : D. no subset of individual requirements described in it conflict with each other
99. Which of the following is a requirement management activity?
Correct : D. All of the mentioned
100. The Unified Modeling Language (UML) has become an effective standard for software modelling. How many different notations does it have?