Quiznetik

Software Engineering | Set 7

1. Entity-relation model is

Correct : A. It describes the basic entities in the design and relation between them.

2. Ability of two or more systems or components to perform their required functions while sharing the same hardware or software environment

Correct : A. Compatibility

3. Completeness in software system is referred as

Correct : A. Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed.

4. Composition model is

Correct : C. An Entity-relation (E-R) diagram show how entities in the system are composed of other entities

5. Match the following : A-Control metrics : B- Process metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation

Correct : A. A-1, B-2,C-3,D-4

6. Corrective maintenance is

Correct : A. Maintenance performed to correct faults in hardware or software

7. Corrupting failure is

Correct : C. Failure that corrupts system state or data

8. Cost estimation is

Correct : A. Process of estimating the costs associated with software development projects that include the effort, time, and labor required.

9. Cost of ownership is

Correct : D. Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system.

10. Cost of maintenance

Correct : B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth.

11. Event-driven control systems are

Correct : B. A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system.

12. Cost of operation is

Correct : C. Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations.

13. In Data reduction

Correct : C. Technique used to transform raw data into a more useful form.

14. Ethnography is

Correct : B. Observational techniques used to understand social and organizational requirements.

15. In Data flow (Activity model)

Correct : A. It shows the software process as a set of activities each of which carries out data transformation.

16. In Data tension

Correct : B. Data and associated programs are re- engineered to remove limits on the data processing

17. Database administration

Correct : C. It is responsible for the definition, operation, protection, performance, and recovery of a database.

18. Database design

Correct : D. Development of a database to meet a user’s requirements Exploratory development is

19. Collection of logically related data stored together in one or more computerized files.

Correct : A. Database

20. Exception is

Correct : B. An error of some kind or an unexpected event occurs during the execution of a program

21. When the program is developed, it is to be tested and defects are to be removed from the program.

Correct : B. Debugging

22. It is intended to find inconsistencies between a program and its specification. These inconsistencies are usually due to program faults or defects.

Correct : B. Debugging

23. It is a property of the system that equates to its trustworthiness. It is the degree of user’s confidence that the system will operate as one expect, that the system would not fail in normal use.

Correct : A. Dependability

24. Fail safe is

Correct : D. None of these

25. Represents the number of discrete levers in the inheritance tree where subclasses inherit attributes and operations from super classes.

Correct : A. Depth of inheritance tree

26. Embedded systems are

Correct : A. These system runs on a single processor or an integrated group of processors

27. Emergent requirements

Correct : A. Emerges due to user’s understanding of system develops, during system development

28. Fat-client model is

Correct : C. In it server is only responsible for data management.

29. Fault recovery is

Correct : A. It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state

30. Enduring requirements

Correct : B. Requirements derived from the core activity of the organization and directly related to the domain of the system*

31. Hazard avoidance

Correct : A. Hazard cannot arise due system design.

32. Evolutionary prototyping is

Correct : D. Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed.

33. Match the following : A- Managed device : B-Managed object: C- Managed processes: 1- Type of node residing on a network, such as a computer, printer or routers that contain a management agent. 2- Characteristic of a managed device that can be monitored, modified or controlled. 3- It is a defined process model. Procedures used are defined and scheduling and relationship between them is defined.

Correct : B. A-1,B-2,C-3

34. Goal is

Correct : B. The objective of an organization to achieve.

35. Implementation phase is

Correct : A. Period in the software life cycle in which a software product is created from design documentation and debugged.*

36. Evolvability is

Correct : A. Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.

37. Match the following A- Functional requirements: B- Functional scope : C- Function-point count: D- Function-related measures: 1- It describe the functionality or services that system is expected to provide. 2- Range to which a system component is capable of being applied. 3- These are language independent productive measure.. 4- It is related to the overall functionality of the delivered software.

Correct : D. A-1,B-2,C-3,D-4

38. Lehman’s Second Law (Lehman and Belady 1985) is

Correct : B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.

39. Hazard probability

Correct : B. The probability of the event occurring which create a hazard.

40. Flexibility

Correct : C. Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed.

41. Extendibility is

Correct : A. Trustworthiness with which a system or component can be modified to increase its storage or functional capacity

42. Generality is

Correct : A. It is a measure of number of function that calls some other function.

43. Manufacturing phase is

Correct : C. Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base.

44. Lehman’s Fourth Law (Lehman and Belady 1985) is

Correct : A. Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development.

45. Human error is

Correct : C. Human behavior that results in the introduction of faults into a system.

46. Fault-tolerant architectures is

Correct : A. The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and fault- tolerance controller that detects problems and supports fault recovery*

47. Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications: D-Formal System development: 1- Here the formal mathema- tical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program.

Correct : A. A-1,B-2,C-3,D-4

48. Lehman’s First Law (Lehman and Belady 1985) is

Correct : A. Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment.

49. Graphics

Correct : C. Methods and techniques for converting data to or from graphic display via computers.

50. Intolerable risk is

Correct : C. Either the hazard not arises, if arise; it will not result in an accident.

51. Hazard

Correct : D. A condition with the potential for causing or contributing to an accident.

52. Human Computer Interaction is

Correct : A. It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

53. Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers.

Correct : B. A-1,B-2,C-3

54. Installation and checkout phase

Correct : B. Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required.

55. Software implementation is

Correct : B. It is a process of converting system specifications into an executable system.

56. An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces.

Correct : C. Object oriented models

57. Interoperability is

Correct : A. Ability of two or more systems, to exchange information and to use the information that has been exchanged.

58. Parkinson’s Law is

Correct : A. The cost is determined by available resources rather than by objective assessment.

59. Retirement phase is

Correct : B. Period of time in the software life cycle during which support for a software product is terminated.

60. Retrospective Fault detection is

Correct : C. The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred*

61. Risk planning process

Correct : C. It considers each of the key risks that are identified and identifies strategies to manage the risk.

62. Software engineering method is

Correct : B. Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way.

63. Restart is

Correct : A. Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint.

64. Risk Management is

Correct : C. The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.

65. ROCOF (Rate of failure occurrence) is

Correct : C. The frequency of occurrence with which unexpected behavior is likely to occur

66. Software system is

Correct : B. It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system.

67. Scalability is

Correct : B. Ease with which a system or component are modified to fit the problem area.

68. Risk analysis process is

Correct : A. Here each identified risk is analyzed and prioritized

69. Reusability is

Correct : A. Extent to which a software module can be used in more than one computing program.

70. Safety argument is

Correct : B. The most effective technique for demonstrating the safety of a system is proof by contradiction.

71. Risk assessment is

Correct : B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.

72. Risk is

Correct : A. The probability that the system will cause an accident

73. Safety is

Correct : A. Avoiding catastrophic moment

74. Role is

Correct : C. It is a bounded area of responsibility

75. Robustness is

Correct : B. Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions

76. Risk monitoring process

Correct : B. It involves regular monitoring of the risks identified and of new risks that develops.

77. These objects can be realized as parallel process with method corresponding to defined object operations.

Correct : B. Servers

78. Safety validation is

Correct : C. It is concerned with establishing a confidence level in the system that might vary from low to high

79. Software process model

Correct : C. A simplified description of a software process that is presented from a particular perspective.

80. Extent to which a system or component contains enough information to explain its objectives and properties is referred as

Correct : A. Self-descriptiveness

81. Degree to which a system or component has a design and implementation that is straightforward and easy to understand is referred as

Correct : C. Simplicity

82. Software attributes are

Correct : D. All the above

83. Software measurement is

Correct : B. It is concerned with deriving a numeric value for some attribute of a software product or a software process.

84. Software development is

Correct : A. Associated with production of software as per specification

85. Software evolution is

Correct : A. It is concern with modification of existing system to meet changing requirements.

86. Software maintenance is

Correct : A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system.

87. Software Engineering is

Correct : C. An engineering discipline, concern with software development.

88. Software inspection is

Correct : A. It is concern with modification of existing system to meet changing requirements.

89. Software life cycle is

Correct : A. Time-period that begins when a software product is conceived and ends when the software is no longer available for use.

90. Software requirements specification are

Correct : C. It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements

91. Software process is

Correct : A. A set of activities and associated results that produce a software product

92. Software re-engineering is

Correct : B. It is concerned with re-implementing legacy system to make them more maintainable

93. Procedural interface

Correct : B. Here one sub system encapsulates a set of procedures, which can be called by other sub-systems.

94. Software metric is

Correct : A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system.

95. System is

Correct : C. Purposeful collection of interrelated components that work together to achieve some objective.

96. It is concerned with making decision about the best way for an organization that acquire a system and deciding on the best suppliers of that system.

Correct : A. System procurement

97. It is responsible for deciding when the system can be released to customers, managing the process of creating the release and distribution media and documen- ting the release.

Correct : C. System release management

98. Process analysis

Correct : C. It is concerned with studying existing process to understand the relationship between different parts of the process.

99. System requirements are

Correct : A. The set of system services and constraints in details

100. System security is

Correct : B. System functions that restricts the use of objects to certain users