Correct : A. It describes the basic entities in the design and relation between them.
2. Ability of two or more systems or components to perform their required functions while sharing the same hardware or software environment
Correct : A. Compatibility
3. Completeness in software system is referred as
Correct : A. Extent to which all the parts of a software system or component are present and each of its parts is fully specified and developed.
4. Composition model is
Correct : C. An Entity-relation (E-R) diagram show how entities in the system are composed of other entities
5. Match the following :
A-Control metrics :
B- Process metrics:
C- Control:
D-Correctness:
1- They are associated with software process.
2- They are associated with software products.
3- Protective measure that reduces system vulnerability.
4- Extent to which a system or component is free from faults in its specification, design, and implementation
Correct : A. A-1, B-2,C-3,D-4
6. Corrective maintenance is
Correct : A. Maintenance performed to correct faults in hardware or software
7. Corrupting failure is
Correct : C. Failure that corrupts system state or data
8. Cost estimation is
Correct : A. Process of estimating the costs associated with software development projects that include the effort, time, and labor required.
9. Cost of ownership is
Correct : D. Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system.
10. Cost of maintenance
Correct : B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth.
11. Event-driven control systems are
Correct : B. A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system.
12. Cost of operation is
Correct : C. Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations.
13. In Data reduction
Correct : C. Technique used to transform raw data into a more useful form.
14. Ethnography is
Correct : B. Observational techniques used to understand social and organizational requirements.
15. In Data flow (Activity model)
Correct : A. It shows the software process as a set of activities each of which carries out data transformation.
16. In Data tension
Correct : B. Data and associated programs are re- engineered to remove limits on the data processing
17. Database administration
Correct : C. It is responsible for the definition, operation, protection, performance, and recovery of a database.
18. Database design
Correct : D. Development of a database to meet a user’s requirements Exploratory development is
19. Collection of logically related data stored together in one or more computerized files.
Correct : A. Database
20. Exception is
Correct : B. An error of some kind or an unexpected event occurs during the execution of a program
21. When the program is developed, it is to be tested and defects are to be removed from the program.
Correct : B. Debugging
22. It is intended to find inconsistencies between a program and its specification. These inconsistencies are usually due to program faults or defects.
Correct : B. Debugging
23. It is a property of the system that equates to its trustworthiness. It is the degree of user’s confidence that the system will operate as one expect, that the system would not fail in normal use.
Correct : A. Dependability
24. Fail safe is
Correct : D. None of these
25. Represents the number of discrete levers in the inheritance tree where subclasses inherit attributes and operations from super classes.
Correct : A. Depth of inheritance tree
26. Embedded systems are
Correct : A. These system runs on a single processor or an integrated group of processors
27. Emergent requirements
Correct : A. Emerges due to user’s understanding of system develops, during system development
28. Fat-client model is
Correct : C. In it server is only responsible for data management.
29. Fault recovery is
Correct : A. It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state
30. Enduring requirements
Correct : B. Requirements derived from the core activity of the organization and directly related to the domain of the system*
31. Hazard avoidance
Correct : A. Hazard cannot arise due system design.
32. Evolutionary prototyping is
Correct : D. Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed.
33. Match the following :
A- Managed device :
B-Managed object:
C- Managed processes:
1- Type of node residing on a network, such as a computer, printer or routers that contain a management agent.
2- Characteristic of a managed device that can be monitored, modified or controlled.
3- It is a defined process model. Procedures used are defined and scheduling and relationship between them is defined.
Correct : B. A-1,B-2,C-3
34. Goal is
Correct : B. The objective of an organization to achieve.
35. Implementation phase is
Correct : A. Period in the software life cycle in which a software product is created from design documentation and debugged.*
36. Evolvability is
Correct : A. Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
37. Match the following A- Functional
requirements: B- Functional scope : C- Function-point count: D- Function-related measures: 1- It describe the functionality or services that system is expected to provide. 2- Range to which a system component is capable of being applied. 3- These are language independent productive measure.. 4- It is related to the overall functionality of the delivered software.
Correct : D. A-1,B-2,C-3,D-4
38. Lehman’s Second Law (Lehman and Belady 1985) is
Correct : B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
39. Hazard probability
Correct : B. The probability of the event occurring which create a hazard.
40. Flexibility
Correct : C. Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed.
41. Extendibility is
Correct : A. Trustworthiness with which a system or component can be modified to increase its storage or functional capacity
42. Generality is
Correct : A. It is a measure of number of function that calls some other function.
43. Manufacturing phase is
Correct : C. Period in the software life cycle during which the basic version of a software product is adapted to a specified set of operational environments and is distributed to a customer base.
44. Lehman’s Fourth Law (Lehman and Belady 1985) is
Correct : A. Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development.
45. Human error is
Correct : C. Human behavior that results in the introduction of faults into a system.
46. Fault-tolerant architectures is
Correct : A. The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and fault- tolerance controller that detects problems and supports fault recovery*
47. Match the following:
A- Formal mathematical transformation:
B- Formal process model:
C-Formal Specifications:
D-Formal System development:
1- Here the formal mathema- tical representation of the system takes place.
2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables.
3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined.
4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program.
Correct : A. A-1,B-2,C-3,D-4
48. Lehman’s First Law (Lehman and Belady 1985) is
Correct : A. Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment.
49. Graphics
Correct : C. Methods and techniques for converting data to or from graphic display via computers.
50. Intolerable risk is
Correct : C. Either the hazard not arises, if arise; it will not result in an accident.
51. Hazard
Correct : D. A condition with the potential for causing or contributing to an accident.
52. Human Computer Interaction is
Correct : A. It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.
53. Match the following : A- Maintenance control: B- Maintenance prediction: C- Maintenance process: 1-Cost of planning and scheduling hardware preventive maintenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Predicting the number of change requires a system understanding and the relationship between the system and external environment. 3- It is triggered by a set of change requests from system users, management or customers.
Correct : B. A-1,B-2,C-3
54. Installation and checkout phase
Correct : B. Period in the software life cycle in which a software product is integrated in its operational environment, and tested in this environment to ensure it performs as required.
55. Software implementation is
Correct : B. It is a process of converting system specifications into an executable system.
56. An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces.
Correct : C. Object oriented models
57. Interoperability is
Correct : A. Ability of two or more systems, to exchange information and to use the information that has been exchanged.
58. Parkinson’s Law is
Correct : A. The cost is determined by available resources rather than by objective assessment.
59. Retirement phase is
Correct : B. Period of time in the software life cycle during which support for a software product is terminated.
60. Retrospective Fault detection is
Correct : C. The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred*
61. Risk planning process
Correct : C. It considers each of the key risks that are identified and identifies strategies to manage the risk.
62. Software engineering method is
Correct : B. Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way.
63. Restart is
Correct : A. Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint.
64. Risk Management is
Correct : C. The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
65. ROCOF (Rate of failure occurrence) is
Correct : C. The frequency of occurrence with which unexpected behavior is likely to occur
66. Software system is
Correct : B. It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system.
67. Scalability is
Correct : B. Ease with which a system or component are modified to fit the problem area.
68. Risk analysis process is
Correct : A. Here each identified risk is analyzed and prioritized
69. Reusability is
Correct : A. Extent to which a software module can be used in more than one computing program.
70. Safety argument is
Correct : B. The most effective technique for demonstrating the safety of a system is proof by contradiction.
71. Risk assessment is
Correct : B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
72. Risk is
Correct : A. The probability that the system will cause an accident
73. Safety is
Correct : A. Avoiding catastrophic moment
74. Role is
Correct : C. It is a bounded area of responsibility
75. Robustness is
Correct : B. Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions
76. Risk monitoring process
Correct : B. It involves regular monitoring of the risks identified and of new risks that develops.
77. These objects can be realized as parallel process with method corresponding to defined object operations.
Correct : B. Servers
78. Safety validation is
Correct : C. It is concerned with establishing a confidence level in the system that might vary from low to high
79. Software process model
Correct : C. A simplified description of a software process that is presented from a particular perspective.
80. Extent to which a system or component contains enough information to explain its objectives and properties is referred as
Correct : A. Self-descriptiveness
81. Degree to which a system or component has a design and implementation that is straightforward and easy to understand is referred as
Correct : C. Simplicity
82. Software attributes are
Correct : D. All the above
83. Software measurement is
Correct : B. It is concerned with deriving a numeric value for some attribute of a software product or a software process.
84. Software development is
Correct : A. Associated with production of software as per specification
85. Software evolution is
Correct : A. It is concern with modification of existing system to meet changing requirements.
86. Software maintenance is
Correct : A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system.
87. Software Engineering is
Correct : C. An engineering discipline, concern with software development.
88. Software inspection is
Correct : A. It is concern with modification of existing system to meet changing requirements.
89. Software life cycle is
Correct : A. Time-period that begins when a software product is conceived and ends when the software is no longer available for use.
90. Software requirements specification are
Correct : C. It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements
91. Software process is
Correct : A. A set of activities and associated results that produce a software product
92. Software re-engineering is
Correct : B. It is concerned with re-implementing legacy system to make them more maintainable
93. Procedural interface
Correct : B. Here one sub system encapsulates a set of procedures, which can be called by other sub-systems.
94. Software metric is
Correct : A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system.
95. System is
Correct : C. Purposeful collection of interrelated components that work together to achieve some objective.
96. It is concerned with making decision about the best way for an organization that acquire a system and deciding on the best suppliers of that system.
Correct : A. System procurement
97. It is responsible for deciding when the system can be released to customers, managing the process of creating the release and distribution media and documen- ting the release.
Correct : C. System release management
98. Process analysis
Correct : C. It is concerned with studying existing process to understand the relationship between different parts of the process.
99. System requirements are
Correct : A. The set of system services and constraints in details
100. System security is
Correct : B. System functions that restricts the use of objects to certain users