CS504 Mcqs
CS504 Mcqs
33. In "Railway ticket reservation system" the roles such as inquiry, reservation, ticketing
and cancellation are to be performed by the user called:-
a. Passenger
b. System analyst
c. System developer
d. System designer
34. A useful technique for evaluating the overall complexity of a proposedarchitecture is to
look at the component's _.
a. number and size of components
b. flow dependencies and sharing dependencies
c. size and cost
d. function points
35. _ relationship is concerned with classes not with the class instantiates.
a. Association
b. Inheritance
c. Aggregation
d. Composition
35.
Software development is a step-by-step process, and in phase of software
37.
Consider the following piece of code:
public class Square extends Shape {
// some code
}
The above code is an example of:
a. Part-Whole relationship
b. Generalization/Specialization
c. Data Sharing
d. Data encapsulation
38.
Requirement engineering mainly deals with the _ of
the system
a. Vision Phase
b. Definition Phase page 16
c. Development Phase
d. Maintenance Phase
39.
A relationship indicates that one entity is composed of one or more parts which
42.
In Data Flow Diagram, the entity or system, outside the boundary of this system is
called
a. Process
b. Data Flow
c. External Agent
d. Data Store
43.
A cohesive Class is one which emphasizes on unit of functionality
a. Single
b. Multiple page 76
c. Static
d. Both Single and Multiple
44.
The goal of is to translate the customer's desire for a set of defined
d. An arrowhead page 92
50.
Which statement is not according to the software engineering principles? Software
engineering is a(n) .
a. Balancing act
b. Disciplined approach
eventually delivered.
a. Software
b. Program
c. Prototype(page 68)
d. Test Case
52.
The best way to conduct a requirements validation review is to
a. examine the system model for errors
b. have the customer look over the requirements
c. send them to the design team and see if they have any concerns
d. use a checklist of questions to examine each requirement
53.
More powerful hardware resulted into the development of powerful and
software.
a. less, complex
b. more, complex page 4
c. more, simple
d. less, simple
54.
From the following which is/are not the example(s) of illegal data flow in
Data Flow Diagram (DFD)
a. External Agents directly communicating with each other
b. External Agent updating information in a DataStore
c. External Agent accessing information from a Data Store
d. There must be an intermediate process which should transform data
received from one external entity and then send the transformed data to
the other external entity
55.
Which of the given component of software engineering framework provides
different techniques that can be used to perform a particular task?
a. Processes
b. Tools
c. Methods page 12
d. Quality Focus
56.
Prototyping is used when there is regarding requirements.
a. Uncertainty(page 68)
b. Confirmation
c. Conflict
d. Consensus
57.
The process of utilizing our knowledge of computer science in effective
production of software systems is called
a. Chemical Engineering
b. Electrical Engineering
c. Computer Engineering
d. Software Engineering page 2
58.
In Abbot's Textual Analysis technique, different parts of speech are
identified within the text of the specification and these parts are modeled
using different
a. Event
b. Process
c. Operations
d. Components page 90
59.
To help separate an object's external behavior from its implementation, the
technique used is called
a. Generalization
b. Association
c. Composition
d. Abstraction page 86
60.
A Process in Data Flow Diagram (DFD) represents
a. Flow of data
b. Transformation of data (page 49)
c. Storage of data
d. An external agent
61.
In data flow diagram (DFD). Create, Update, Delete and Read
operations are normally called:
a. CRUD operations page 53
b. DURC operations
c. RUDC operations
62.
Which of the following is not part of software architecture?
a. Databases
b. data design
c. program
structure d.
algorithm
details
63.
Selecting objects in a domain)
include: a. Actors.
Participants and Places
b. Only Participants
c. Only Actors
d. Only Actors and Places
64.
.Defining the
services of an object
means:
a. What it does? Page 96
b. What it knows?
c. Who knows it?
d. Whom it knows?
64. requirements cause frequent modifications in user interface
a. Functional
b. Non-functional
c. Unstable page 62
d. User
Input/output
3. A context diagram:
Definition
Models….confirm
6. diagram does not capture control flow information, it just shows the flow of
the data in a system
7. In data flow diagram (DFD), Create, Update, delete and read operations are
normally called.
CRUD operation…..confirm
More,complex…..confirm
10. The use case diagram shows that which interact with each use case.
Actor…..confirm
11. A prototype is not the real product but just a real looking of what would
be eventually delivered and might not do anything useful
Mock-up……confirm
12. A is not the real product but just a real looking mock-up of what would
be eventually delivered.
Prototype……confirm
13. In data flow diagram the entity or system outside the boundary of this system is
called
External Agent….confirm
Requirement….confirm
16. Data cannot flow from one external entity to other external entity
17. A is not the real product but just a real looking mock up of what would be
eventually delivered.
Prototype…..confirm
Prototyping ,,,,confirm
21. An external entity that interacts with the system is called a(n):
Actor…..confirm
Status quo…..confirm
Definition phase…..confirm
Non-functional……confirm
26. All the documents related to the software are also considered as part of the .
Software….confirm
29. From the following which is/are not the example(s) of illegal data flow in data flow
diagram.
31. To construct a system model the engineer should consider one of the following
restraining factors?
Analyst……confirm
33. In data flow diagram (DFD) one data store cannot directly copy the data from
another .
Data store…..confirm
Two third….confirm
Quality…..confirm
Project Vision….confirm
Transmission of data…..confirm
Method…..confirm
Quality focus….confirm
Tabular ….confirm
43. The data on which the program operates is also considered as part of the .
Software…..confirm
Requirement gathering……confirm
Tools…..confirm
Requirements structuring…..confirm
48. The context diagram is used as the top level abstraction in a _ developed according
to principles of structured analysis.
Dataflow diagram…..confirm
correctness…..confirm
50. A software requirement document describes all the provided by the system
along with the constraints under which it must operate.
Services….confirm
51. If you try to make software more user-friendly then the may suffer.
Effiency……confirm
52. According to caper jones analysis of project activities coding only has affect
part in software development
13-14%.........confirm
development..........confirm
Unsystematic approach…..confirm
56. structure represents the internal organization of the various data and
control items.
Data….confirm
57. The process of utilizing our knowledge of computer science in effective production
of software system is called.
Software Engineering…confirm
58. are kind of umbrella activities that are used to smoothly and successfully
perform the connection activities.
Management activites…..confirm
Processes…..confirm
System boundary…..confirm
Extends….confirm
62. Data cannot flow from one external entity to other external entity
/*Comment*/….confirm
Participant…..confirm
68. Modules with high cohesion and low coupling can be treated and analyzed
Quality….confirm
71. According to Caper Jones analysis of project activities, coding only has affect
part in system development.
13-14%...confrim
Asynchronous messages…..confirm
73. Which of the following is not among the four layers of the object-oriented pyramid?
The abstract layer……confirm
All options….confirm
All options…confirm
System structuring…..confirm
78. When two components of a system are using the same global data area, they are
related as.
Content coupling….confirm
Product engineering….confirm
80. The condition that must be met before the use case can be invoked, is called
Precondition…..confirm
Quality ……confirm
Three….confirm
Unstable….confirm
Uncertainty…confirm
What….confirm
89. In object Oriented design layer contains the details that enable each object to
communicate with its collaborators.
Message….confrim
Subsystem….confirm
91. In object oriented design layer contains the class hierarchies that enable the
system to be created using generalization and increasingly more targeted
specializations.
92. In object oriented design layer contains the data structures and algorithmic
design for all attributes and operations for each object.
Responsibility …..confrim
93. Normally a system will be more easy to modify if its modulus have:
How….confirm
Unstable…..confirm
98. In abbot’s Textual analysis technique, different parts of speech are identified within
the text of the specification and these parts are modeled using different .
Components…..confrim
99. Which statement is not according to the software engineering principles? Software
engineering is a(n) .
Unsystematic approach…..confrim
Modularity…..confrim
Low coupling……confirm
Mock-up…..confirm
component.
Independence……
confirm
Reusability…..confrim
Boolean…..confrim
Attribute……confirm
Commented…..confirm
Modularity…..confrim
Middle ground……confirm
Constant…..confrim
logical errors.
Parenthesize….confrim
Break….confirm
One decimal….confrim
Compilation……confirm
Verbs, lower….confrim
Upper case….confrim
Lower case….confrim
Separate….confrim
Single uppercase…..confirm
___________________________________
black boxes
ii.
A participant
ii)
A function
iii)
Schedulin
ii.
g iii. Quality
iv. Performance
5) Return values in synchronous massages are:
i) Compulsory
ii) May not used when response is obvious
iii) Not used at all
iv) Represented by solid lines
6) According to Caper Jhones analysis of project activities, coding only has-------affect part in
system
development. i.
13-14%
ii. 36-40%
iii. 50-60%
iv. 70-80%
Orange Monkey Team
7) Normally a system is more easy to modify if its modules have Page 50
High coupling and high cohesion
i.
Mo view
ii.
iii.Process view
iv. All of the given
12)is concerned with decomposing the system into interacting sub-systems.
a) System structuring
b) Control Modelling
c) Molecular Decomposition
d) None of the given
13) A use case represents:
A class, its attributes and operations
i.
iii.Destination of results
iv. Repository of data
15) The process of utilizing our knowledge of computer science in effective production of
- -.
Chemical Engineering
i.
Electrical Engineering
ii.
Computer Engineering
iii.
Dependence
ii.
Aggregation
iii.
Composition
Orange Monkey Team
iv.
C++
ii.
Data Flow
ii.
iii. Activity
iv. Class
20) In-------------the analyst determines the source of requirements and where do these
requirements consume:
a) Data flow analysis
b) Source and sink analysis
c) Down parsing
d) Up parsing
21) Data cannot flow from one external entity to other external entity because:
a) It will get corrupted
b) It is not allowed in DFD
c) An external entity has no mechanism to read or write
d) Both are outside the context of the system
22) In the functional design, the structure of the system resolves around:
a) Objects
b) Properties
c) Functions
d) All of the given options
23)is one of the techniques to document domain knowledge
a) State transition diagram
b) Feasibility matrix
c) System matrix
d) None of the given options
24) In case of----------------approach , decomposition of a problem revolves around data.
a) Object-Oriented
b) Action-Oriented
c) Event-Oriented
d) Process-Oriented
25) The-----------------relationship is a kind of a generalization specialization relationship:
a) Bit-Byte
b) Uses
Orange Monkey Team
c) Binary
d) Extends
Page 53
Product engineering
ii.
Hardware engineering
iii.
iv.Mechanical engineering
33) In case of a-------message, the called routine that handles the message is completed before the
Orange Monkey
caller resumes execution. Team Page 54
a) Synchronous
b) Asynchronous
c) Bidirectional
i. A only
ii. B only
Synchronous messages
ii.
Inheritance ii.
Specialization iii.
Generalization iv.
36) To help separate an object’s external behaviour from its implementation, the technique used is
called -------
Generalization
i.
Association
ii.
iii. Composition
iv. Abstraction
37) Sequences of messages can be present in:
(a) Use case diagram
(b) Sequence diagram
(c) Collaboration diagram
1) a only
2) b only
3) c only
4) b and c
38) Which of the following strategies lead to good software design:
Separation of concerns
i.
Modularity ii.
Divide-and-conquer
iii.
Non-functional ii.
Developer
iii.
User iv.
41) In the functional design, the structure of the system revolves around.
Orange Monkey Team
Objects i.
Page 56
Properties ii.
iii. Functions
iv. All of the given option
42) The first step in any OOA process model is
to i. Build an object-relationship model.
ii. Define collaborations between objects.
iii. Elicit customer requirements
iv. Select a representation language
43) The------relationship is kind of a generalization specialization relationship.
Bit-byte
i.
Uses
ii.
iii. Binary
iv. Extends
44) Regarding data flow model, which of the following statement(s) is true:
It captures the transformation of data between processes/functions of a system ii.
i.
n ii. Abstraction
iii. Inheritance
iv. Association
46) In “point of sale system”. the term “payment” represents
Actori.
Participant
ii.
iii. Transaction
iv. Container
47) The architecture components for product engineering are
i. Data, hardware, software, people
ii. Data, documentation, hardware, software
iii. Data, hardware, software, procedures
iv. Documentation, hardware, people, procedures
48) An object model encompasses the principle(s) of
Abstraction
i.
Encapsulation
ii.
Confirmation
ii.
iii. Conflict
iv. Consensus
50) In-------phase of software development, requirement analyst focuses on possible design of the
proposed solution.
i. Maintenance
Orange
iii.
Monkey Team
ii. Development
Definition
Page 57
iv. Vision
51) At which stage of software development loop, results are delivered?
Problem definition
i.
Solution integration
ii.
iii. If most of the methods do not use most of the data members most of the time
iv. If most of the methods use most of the data members most of the time.
53) A DFD is normally levelled (adding more levels of abstraction) as
It is a good idea in design
i.
iii. It is easy to do it
iv. It is easier to read and understand a number of smaller DFDs than one large DFD
54) Identify the true statement(s)
An attribute that may have a number of values should be replaced by a new class and an
i.
object connection
An attribute that varies over time, e.g. price of an item, should be replaced by an
ii.
Polymorphism
ii.
iii. Aggregatio
n iv. Abstraction
56) A structure is a manner of an organization which expresses a-------strong organization within the
problem domain.
Semantically
i.
Syntactically
ii.
iii. Graphically
iv. None of the given
57) An object model of a system captures the-------structure of a system.
Statici.
Dynamic
ii.
iii. Iterative
iv. Hierarchical
58) To determine the architectural style or combination of styles that best fits the proposed system,
requirements engineering is used to uncover
Algorithmic complexity
i.
Page 58
59) Which statement is not according to the software engineering principles? Software engineering
is a(n)
Balancing act
i.
Disciplined approach
ii.
Process
ii.
iii. Operations
iv. Components
61) Quantitative methods for assessing the quality of proposed architectural designs are readily
available.
True i.
False
ii.
62) In order to determine the role and responsibilities of the identified objects, we need to consider
which of the following step(s):
a) Who I am?
b) What I know?
c) Who I know?
d) What I do?
A onlyi.
A and b
ii.
iii. B ,c and D
iv. All of the given
63) In object oriented design layer contains the details that enable each object to
communicates with its collaborators.
Subsystem
i.
Responsibility
ii.
iii. Message
iv. Object
64) In sequence diagram, the boxes denote:
Objects (or classes)
i.
Definition phase
ii.
A filled diamond
ii.
Use case
ii.
Low coupling
ii.
Set of components
ii.
Scheduling
ii.
iii. Quality
iv. Performance
73) Identify the true statement:
Normally object oriented design is more maintainable than functional oriented.
i.
Software with functional oriented design does not fulfil non functional requirements.
ii.
iii. Object oriented design can not implement “separation of concerns” strategy
iv. Function oriented design does not lead to an efficient product
74) A process in data flow diagram (DFD) represents
Flow of data
i.
Transformation of data
ii.
Page 60
Debugging
ii.
ii. Aggregation
iii. Specialization
iv. Association
77) are kind of umbrella activities that are used to smoothly and successfully perform the
construction activities.
Design activities
i.
Management activities
ii.
False
ii.
Non-functional
ii.
Multiple
ii.
iii. Static
iv. None
82) The best way to conduct a requirement validation review is to
Examine the system model for errors
i.
iii. Send them to the design team and see if they have any concerns
iv. Use a checklist of the questions to examine each requirement
83) Defining the services of an object means:
What it does?
i.
iii.Cohesion Page 61
iv. Low coupling
85) In Data Flow Diagram, the entity or system, outside the boundary of this system is called:
Process
i.
Data flow
ii.
Class
ii.
Development
ii.
iii. Definitio
n iv. Vision
90) If you try to make software more user-friendly then the----------may suffer.
Reliability
i.
Software
ii.
iii.
Efficiency
iv. Cost
91) In object-oriented design, the structure of the system revolves around.
i. Objects
ii. Properties
iii. Methods
iv. All of the given option
92) In--------relationship, a class shares the structure and behaviour defined in another class:
Aggregation
i.
Composition
ii.
iii. Inheritance
iv. Uses
93) In Object Oriented Design, combining the services offered by an object with the attributes they
Orange Monkey Team
work on, results in:
(a) Lower coupling and strong cohesion
Page 62
(b) Lower cohesion and strong coupling
(c) Increased likelihood of reuse
(d) Decrease the modularity of the system
i. A only
ii. B and c
only iii. A and
c only
94) A change becomes-----------because of close presence of data and functions.
Accessible
i.
Global
ii.
iii. Private
iv. Localized
95) Software engineering is a--------------approach.
Systematic
i.
Disciplined
ii.
iii. Scheduled
iv. All of the given options
96) An external entity that interacts with the system is called a(n):
Use case
i.
Actor
ii.
iii. Stakeholder
iv. Association
97) More powerful hardware resulted into the development of ------------powerful and ---------
software.
Less, complex
i.
More , complex
ii.
Non-functional requirement
ii.
Pseudo requirement
iii.
iv.None of these
100) The architectural model provides the software engineer with the view of the system as a
whole:
True i.
False
ii.
101) As per Peter Coad’s methodology , which of the following may not be a perfect candidate for
being an object?
i. Zone
ii. Recipient
Garage
Orange
iv. Monkey Team
iii.
Password Page 63
102) In the case of-------------approach , data is decomposed according to functionality
requirements.
Object-oriented
i.
ii. Action-oriented
iii. Event-oriented
iv. Process-oriented
103) In UML based Object Oriented Model of a system, the diamond sign is used to depict ---------
--- relations between two objects/classes.
Aggregation and Association
i.
ii. How
iii. Who
iv. When
107) ------------ requirements cause frequent modifications in user interface.
Functionali.
Non-functional
ii.
iii. Unstable
iv. User
108) By levelling a DFD ( adding more levels of abstraction) we mean:
Splitting it into different levels
i.
iii. Expanding a process into one with more sub-processes giving more detail
iv. Summarizing a DFD to specify only these essentials
109) A “register” in “Point of Sale system” is an example of:
Actor i.
Participant
ii.
iii. Software
iv. None of the given
111) The-----------on which program operates is also considered as part of the software.
Data i.
Information
ii.
iii.Program
iv. None of the given
112)diagram provides a time-based view and collaboration diagrams which provide an
organization based view of the system’s dynamics.
Data flow diagram
i.
Half arrow
ii.
iii. <<create>>
iv. <<destroy>>
114) Which of the following are the components of system engineering software?
Processi.
Methods
ii.
iii. Tools
iv. All of the given
115) Identifying system features include -----------
Log important information
i.
Conduct business
ii.
Site visits
ii.
Prototyping
iii.
Data output
ii.
User requirements
ii.
iii.Functional requirements
iv. All of the above
121) Given below are some statements associated with data flow diagrams. Identify the correct
statement among them.
Data flow is made used of to model what systems do
i.
iii.Class diagram
iv. Use case diagram
123) is real looking mock_up of what would be eventually delivered and might not do
anything useful.
Study of similar system
i.
Site visits
ii.
iii. Prototyping
iv. All of the above
124) is blueprint for software construction.
i. Object oriented design
ii. Sequence design
iii. Software design
iv. All of the above
125) requirements lead to ill-spent time and rework.
Unacceptable
i.
ii. Ambiguous
iii. Dissatisfaction of customer
iv. None of the above
126) Which type of diagram is used to depict the dynamic behaviour of a system.
ERD diagram
i.
DFD diagram
ii.
Reliability
ii.
iii. Easy
usability iv.
Accuracy
128) A better design has an objective achieve
Orange Monkey Team
High cohesion
i.
Page 66
Low cohesion
ii.
iii. Low coupling
iv. High cohesion and low coupling
129) Which of the following are trhe components of software engineering framework is combine
the three remaining components?
Process
i.
Method
ii.
iii. Tools
iv. All of the above
130) In sequence diagrams the time required by the receiver object to process the message is
denoted by an
Activation box
i.
Message line
ii.
Two
ii.
iii. Three
iv. Four
132) Which notation is used to represent the process of the system in DFD model.
i. Process
ii. External agent
iii. Data flow
iv. Data store
133) Requirement engineering mainly deals with the of the system
Process i.
Maintenance
ii.
Method
ii.
iii. Classes
iv. None of the above
136) In object-oriented analysis how many number of tasks must occurs .
1 i.
2 ii.
iii. 3
iv. None of the above
137) State transition diagram is helpful in determining .
Data store
Orange Monkey Team
i.
Process flow
ii.
Page 67
iii. Business understanding
iv. None of the above
138) In sequence diagram events are organized in a time life
line. i. Vertical
ii. Horizontal
iii. Both A and B
iv. All of the above
139) Asynchronous messages are “signals,” denoted by .
Full arrow
i.
Half arrow
ii.
iii. <<create>>
iv. <<destroy>>
140) When we write a program for computer and then we named it as .
Data i.
Information
ii.
iii. Software
iv. None of the given
141) Context level diagram present in which of the following document.
i. SRS-software requirement specification
ii. Design document
iii. Test phase
iv. All of the above
142) is diagram in which objects are interact with each other and these are arranged in a
sequence.
ERD diagrams
i.
Inheritance diagrams
ii.
External agent
ii.
External agent
ii.
half arrow
ii.
iii. <<create>>
iv. <<destroy>>
150) How many levels of software requirements are ?
One i.
Two
ii.
iii. Three
iv. Four
151) Which of the following diagram has iterative activities?
Data flow diagram
i.
Manufacturing
ii.
iii. Process
iv. Methods
153) Coupling is a measure of a module or component.
Independent
i.
Dependent
ii.
iii. Closeness
iv. All of the given
154) Software maintenance phase involves
Debugging
i.
ii. What
iii. Why
iv. All of the given
Orange Monkey Team
156) Interaction diagrams depict the behaviour of the system. Page 69
i. Static
ii. Active iii.
Dynamic
iv. None of the given
157) A
can be used to describe the dynamic behaviour of an object-oriented system.
ERD diagrams
i.
Inheritance diagrams
ii.
iii.Class diagrams
iv. Series diagrams
158) The Use case diagram shows that which interact with each use case.
Use case i.
Actor
ii.
iii.Component
iv. Relation
159) Transactions are the that must be remembered through time.
Events i.
Action
ii.
iii.Triggers
iv. Methods
160) A necessary supplement to transform or transaction mapping needed to create a complete
architectural design is
Entity relationship diagrams
i.
2. It ensures that a class only has one instance and provides a global point
of access to it.
a. Singleton Pattern
b. Observer Pattern
c. Real Pattern
d. None of the given above
8. Floating point constants should always be written with decimal point and at
least
a. One decimal
b. Two decimal
c. Three decimal
17.Patterns are devices that allows program to share knowledge about their
.
a. Code
b. Design
c. Analysis
d. Implementation
22.A self-documenting code is a code that explain its self without the need of
comments extraneous documentation like
a. flow chart
b. UML diagrams
c. process flow state diagram d.
all of the given choices
a. Smalltalk
b. PASCAL
c. JAVA
d. C++
He was of
a. Microsoft
b. IBM
c. Dell
d. Cisco
The construction should appear in the top of the file (before the file header).
a. compilation
b. run time
c. logical
d. all of the given
36. C++ header files should have the extension----------Source files can
have the extension ----
a. .c and .h
::operator
b. :operator
c. Without an operator
d. None of the given
a. Leaks
b. Components
c. Activities
d. Objectives
Page 1
Email: [email protected] VU Campus Sahiwal
Select correct option:
always needed by
never needed by
sometimes needed by
None of the given options
Page 2
Email: [email protected] VU Campus Sahiwal
data objects and operations
schedule and milestones
Page 3
Email: [email protected] VU Campus Sahiwal
Question # 4 of 10 ( Start time: 10:26:24 PM ) Total Marks: 1
Data cannot flow from one external entity to other external entity because:
Select correct option:
It will get corrupted
It is not allowed in DFD ok
An external entity has no mechanism to read or write
Both are outside the context of the system
Page 4
Email: [email protected] VU Campus Sahiwal
CS504 SOLVED MCQs
Modules with high cohesion and low coupling can be treated and
analysed as
White boxes
black boxes
grey boxes
none of these
While establishing the services for an object, the following fundamental
questions should be asked:
An act
A participant
A function
None of the given
Any Engineering approach must be founded on organizational
commitment to —————.
Cost
Scheduling
Quality
Performance
Return values in synchronous massages are:
Compulsory
May not used when response is obvious
Not used at all
Represented by solid lines
Page 5
Email: [email protected] VU Campus Sahiwal
According to Caper Jhones analysis of project activities, coding only has
——- affect part in system development.
13-14%
36-40%
50-60%
70-80%
Normally a system is more easy to modify if its modules have
Interrupt calls
Synchronous messages
Asynchronous messages
System Calls
Which of the following is not among the four layers of the object-
oriented pyramid?
Page 6
Email: [email protected] VU Campus Sahiwal
Data flow view
Module view
Process view
All of the given
—————- is concerned with decomposing the system into interacting
sub-systems.
1. System structuring
Control Modelling
Molecular Decomposition
None of the given
A use case represents:
———————–.
1. Chemical Engineering
1. Electrical Engineering
1. Computer Engineering
1. System Engineering
Coupling is a measure of ————- of a component.
Independence
Dependence
Aggregation
Page 7
Email: [email protected] VU Campus Sahiwal
Composition
—————— has become a standard notation for object-oriented system
modelling:
UML
C++
OCL(Object Constraint Language)
None of the given option
An arrow in data flow diagram represents:
Sequence
Data Flow
Activity
Class
In ————- the analyst determines the source of requirements and
where do these requirements consume:
Page 8
Email: [email protected] VU Campus Sahiwal
Objects
Properties
Functions
All of the given options
————— is one of the techniques to document domain knowledge
Object-Oriented
Action-Oriented
Event-Oriented
Process-Oriented
The —————– relationship is a kind of a generalization specialization
relationship:
Bit-Byte
Uses
Binary
Extends
Which statement is not true about system software?
Page 9
Email: [email protected] VU Campus Sahiwal
Component is static in nature
The intent of Object-Oriented Analysis(OOA) is to define:
All classes
Relationships among classes
Behaviour of classes
All of the given options
Requirement engineering focuses on —————– aspect of the software
development process.
Association
Inheritance
Aggregation
Composition
Which of the following statements are true in context of the object model
deviation through the Coad methodology?
Electrical engineering
Product engineering
Hardware engineering
Page 10
Email: [email protected] VU Campus Sahiwal
Mechanical engineering
In case of a ——- message, the called routine that handles the message
is completed before the caller resumes execution.
Synchronous
Asynchronous
Bidirectional
A only
1. B only
1. C only
1. All of the given
In multiprocessing applications, different execution threads may pass
information to one another by sending ——- to each other.
Interrupt calls
Synchronous messages
Asynchronous messages
System calls
A car is made up of a body, three or four wheels, a steering mechanism,
a breaking mechanism, and a power engine”
Whole-part relationship
Inheritance
Specialization
Generalization
To help separate an object’s external behaviour from its implementation,
the technique used is called ——-
Generalization
Association
Composition
Abstraction
Sequences of messages can be present in:
Page 11
Email: [email protected] VU Campus Sahiwal
Sequence diagram
Collaboration diagram
a only
b only
c only
b and c
Which of the following strategies lead to good software design:
Separation of concerns
Modularity
Divide-and-conquer
All of the given options
Data flow model:
Functional
Non-functional
Developer
User
In the functional design, the structure of the system revolves around.
Objects
Properties
Functions
All of the given option
The first step in any OOA process model is to
Page 12
Email: [email protected] VU Campus Sahiwal
Select a representation language
The —— relationship is kind of a generalization specialization
relationship.
Bit-byte
Uses
Binary
Extends
Regarding data flow model, which of the following statement(s) is true:
Aggregation
Abstraction
Inheritance
Association
In “point of sale system”. the term “payment” represents
Actor
Participant
Transaction
Container
The architecture components for product engineering are
Page 13
Email: [email protected] VU Campus Sahiwal
Abstraction
Encapsulation
Hierarchy or inheritance
All of the given option
Prototyping is used when there is ———– regarding requirements.
Uncertainty
Confirmation
Conflict
Consensus
In ——- phase of software development, requirement analyst focuses on
possible design of the proposed solution.
Maintenance
Development
Definition
Vision
At which stage of software development loop, results are delivered?
Problem definition
Solution integration
Technical development
Status quo
A class will be cohesive if:
Page 14
Email: [email protected] VU Campus Sahiwal
It is easier to read and understand a number of smaller
DFDs than one large DFD
Identify the true statement(s)
Inheritance
Polymorphism
Aggregation
Abstraction
A structure is a manner of an organization which expresses a —— strong
organization within the problem domain.
Semantically
Syntactically
Graphically
None of the given
An object model of a system captures the —— structure of a system.
Static
Dynamic
Iterative
Hierarchical
To determine the architectural style or combination of styles that best
fits the proposed system, requirements engineering is used to uncover
Algorithmic complexity
Characteristics and constraints
Page 15
Email: [email protected] VU Campus Sahiwal
Control and data
Design patterns
Which statement is not according to the software engineering principles?
Software engineering is a(n) _________
Balancing act
Disciplined approach
Unsystematic approach
Quantifiable approach
In abbot’s textual analysis technique, different part of speech is identified
within the text of the specification and these part are modelled using
different ______
Event
Process
Operations
Components
Quantitative methods for assessing the quality of proposed architectural
designs are readily available.
True
False
In order to determine the role and responsibilities of the identified
objects, we need to consider which of the following step(s):
1. Who I am?
What I know?
Who I know?
What I do?
A only
A and b
B ,c and D
All of the given
In object oriented design _____ layer contains the details that enable each
object to communicates with its collaborators.
Subsystem
Page 16
Email: [email protected] VU Campus Sahiwal
Responsibility
Message
Object
In sequence diagram, the boxes denote:
Passenger
System analyst
System developer
System designer
Class responsibilities are defined by _______
Vision phase
Definition phase
Development phase
Maintenance phase
In UML based object oriented model of a system, a composition relation
between two objects is shown by a ______ sign on the whole side of a
relation line.
An unfilled diamond
A filled diamond
A half diamond
A dot
Page 17
Email: [email protected] VU Campus Sahiwal
_______ analysis educates the analyst on business domain complexity and
shows a way to deal with it.
Domain
Use case
Object collaboration
None of the given options
In this case of _____ intra component linkages are stronger while inter
component linkages are weak.
High cohesion
Low coupling
Low cohesion
High coupling
An architectural style encompasses which of the following elements?
Constraints
Set of components
Semantic models
All of the given
In software engineering paradigm, any engineering approach must be
founded on organizational commitment to _____
Cost
Scheduling
Quality
Performance
Identify the true statement:
Page 18
Email: [email protected] VU Campus Sahiwal
A process in data flow diagram (DFD) represents
Flow of data
Transformation of data
Storage of data
An external agent
A maintainable design is a design , which supports
Change
Debugging
Adding new features
All of the given
Whole part structure is also called _______
Generalization
Aggregation
Specialization
Association
_______ are kind of umbrella activities that are used to smoothly and
successfully perform the construction activities.
Design activities
Management activities
Testing activities
Maintenance activities
When you encounter both transform flow in the same DFD the flow is
partitioned and the appropriate mapping technique is used on each part
of the DFD.
True
False
Software architecture must address ————– requirements of a
software system.
Functional
Non-functional
User Interface Requirements
Page 19
Email: [email protected] VU Campus Sahiwal
Both functional and non-functional.
To construct a system model the engineer should consider one of the
following restraining factors.
Single
Multiple
Static
None
The best way to conduct a requirement validation review is to
What it does?
What it knows?
Who knows it?
Which one of the following is the external quality of a software product?
Correctness
Concision
Cohesion
Low coupling
In Data Flow Diagram, the entity or system, outside the boundary of this
system is called:
Page 20
Email: [email protected] VU Campus Sahiwal
Process
Data flow
External agent
Data store
GUI stands for:
Actor
Class
Use case
System boundary
Software development is a step-by-step process, and in ——— phase of
software development Business objective of an organization get cleared
Maintenance
Development
Definition
Vision
If you try to make software more user-friendly then the ——— may
suffer.
Reliability
Software
Efficiency
Cost
In object-oriented design, the structure of the system revolves around.
Page 21
Email: [email protected] VU Campus Sahiwal
Objects
Properties
Methods
All of the given option
In ——– relationship, a class shares the structure and behaviour defined
in another class:
Aggregation
Composition
Inheritance
Uses
In Object Oriented Design, combining the services offered by an object
with the attributes they work on, results in:
Accessible
Global
Private
Localized
Software engineering is a ————– approach.
Systematic
Disciplined
Scheduled
All of the given options
An external entity that interacts with the system is called a(n):
Use case
Page 22
Email: [email protected] VU Campus Sahiwal
Actor
Stakeholder
Association
More powerful hardware resulted into the development of ————
powerful and ———
software.
Less, complex
More , complex
More, simple
Less, simple
A context diagram is used:
Functional requirement
Non-functional requirement
Pseudo requirement
None of these
The architectural model provides the software engineer with the view of
the system as a whole:
True
False
As per Peter Coad’s methodology , which of the following may not be a
perfect candidate for being an object?
Zone
Recipient
Garage
Page 23
Email: [email protected] VU Campus Sahiwal
Password
In the case of ————- approach , data is decomposed according to
functionality requirements.
Object-oriented
Action-oriented
Event-oriented
Process-oriented
In UML based Object Oriented Model of a system, the diamond sign is
used to depict ———
Actors
Places
Participants
Software Design discusses ———- aspect of software development.
What
How
Who
When
———— requirements cause frequent modifications in user interface.
Functional
Page 24
Email: [email protected] VU Campus Sahiwal
Non-functional
Unstable
User
By levelling a DFD ( adding more levels of abstraction) we mean:
Actor
Participant
Tangible thing
Transaction
———— is a set of processes and tools to develop software.
Software engineering
Information
Software
None of the given
The ———– on which program operates is also considered as part of the
software.
Data
Information
Program
None of the given
———- diagram provides a time-based view and collaboration diagrams
which provide an organization based view of the system’s dynamics.
Page 25
Email: [email protected] VU Campus Sahiwal
Full arrow
Half arrow
<<create>>
<<destroy>>
Which of the following are the components of system engineering
software?
Process
Methods
Tools
All of the given
Identifying system features include ———–
Data input
Data output
Data input and data output
None of the above
The process of defining attributes is called ———–
Page 26
Email: [email protected] VU Campus Sahiwal
Software architecture
Software Code
Software
All of the above
Which of the following are the levels of software requirements?
Business requirements
User requirements
Functional requirements
All of the above
Given below are some statements associated with data flow diagrams.
Identify the correct statement among them.
Page 27
Email: [email protected] VU Campus Sahiwal
______ requirements lead to ill-spent time and rework.
Unacceptable
Ambiguous
Dissatisfaction of customer
None of the above
Which type of diagram is used to depict the dynamic behaviour of a
system.
ERD diagram
DFD diagram
Class diagram
Collaborations diagram
What is the most crucial non-functional requirement of a system to
control radiation dosages that are emitted as treatment for cancer?
Security
Reliability
Easy usability
Accuracy
A better design has an objective achieve
High cohesion
Low cohesion
Low coupling
High cohesion and low coupling
Which of the following are trhe components of software engineering
framework is combine the three remaining components?
Process
Method
Tools
All of the above
In sequence diagrams the time required by the receiver object to process
the message is denoted by an _____
Activation box
Page 28
Email: [email protected] VU Campus Sahiwal
Message line
Life line
All of the above
How many types of OOD modes have _____.
One
Two
Three
Four
Which notation is used to represent the process of the system in DFD
model.
Process
External agent
Data flow
Data store
Requirement engineering mainly deals with the _______ of the system
Process
Maintenance
Development phase
Definition phase
Insufficient user involvement leads to _____ products.
Unacceptable
Ambiguous
Dissatisfaction of customer
None of the above
Collaboration diagrams have basically two types of components: objects
and _____
Messages
Method
Classes
None of the above
In object-oriented analysis how many number of tasks must occurs _____.
Page 29
Email: [email protected] VU Campus Sahiwal
1
2
3
None of the above
State transition diagram is helpful in determining ______.
Data store
Process flow
Business understanding
None of the above
In sequence diagram events are organized in a _____ time life line.
Vertical
Horizontal
Both A and B
All of the above
Asynchronous messages are “signals,” denoted by ______.
Full arrow
Half arrow
<<create>>
<<destroy>>
When we write a program for computer and then we named it as _____ .
Data
Information
Software
None of the given
Context level diagram present in which of the following document.
Page 30
Email: [email protected] VU Campus Sahiwal
ERD diagrams
Inheritance diagrams
Class diagrams
Sequence diagrams
Which of the following layers are include in object-oriented design?
Process
External agent
Data flow
Data store
Identifying whole-part structures (aggregations) means what are my
_____.
Components
Structures
Class
Object
An object or class may further be classified on the basis of ______ .
Process
External agent
Data flow
All of the above
The doted lines in sequence diagram are called ____ .
Page 31
Email: [email protected] VU Campus Sahiwal
Life line
Message line
Entities line
All of the above
An object may create another object via a _____ message .
Full arrow
half arrow
<<create>>
<<destroy>>
How many levels of software requirements are _____?
One
Two
Three
Four
Which of the following diagram has iterative activities?
Tools
Manufacturing
Process
Methods
Coupling is a measure of _____ a module or component.
Independent
Dependent
Closeness
All of the given
Software maintenance phase involves
Page 32
Email: [email protected] VU Campus Sahiwal
Debugging
Adding new features
Making changes
All of the given
The hardest single part of building a software system is deciding
precisely _____ to build.
When
What
Why
All of the given
Interaction diagrams depict the ____ behaviour of the system.
Static
Active
Dynamic
None of the given
A _____ can be used to describe the dynamic behaviour of an object-
oriented system.
ERD diagrams
Inheritance diagrams
Class diagrams
Series diagrams
The Use case diagram shows that which ____ interact with each use case.
Use case
Actor
Component
Relation
Transactions are the _____ that must be remembered through time.
Events
Action
Triggers
Methods
Page 33
Email: [email protected] VU Campus Sahiwal
A necessary supplement to transform or transaction mapping needed to
create a complete architectural design is
Objective Questions
1. Performance, Security and maintainability are the
types of ________ requirements.
1. Business
2. Non-Functional
3. Domain
4. Functional
1. more, complex
2. less, complex
3. more, simple
4. less, simple
Page 34
Email: [email protected] VU Campus Sahiwal
2. Ordering of the messages in time
1. Value
2. Data
3. Information
4. Conceptual
1. High Cohesion
2. Low Cohesion
3. High Coupling
4. Low Coupling
Page 35
Email: [email protected] VU Campus Sahiwal
7. Performance, Security and maintainability are the
types of ________ requirements.
1. Business
2. Non-Functional
3. Domain
4. Functional
1. Testing
2. Processes
3. Design
4. Maintenance
1. Confirmation
2. Consensus
3. Uncertainty
4. Conflict
1. On object constraints
Page 36
Email: [email protected] VU Campus Sahiwal
4. on the flow of Control
1. Electrical Engineering
2. Product Engineering
3. Mechanical Engineering
4. Hardware Engineering
1. Software
2. Test Case
3. Program
4. Prototype
1. Whome it knows?
2. What it does?
3. What it knows?
1. functionality
Page 37
Email: [email protected] VU Campus Sahiwal
2. accessibility and reliability
3. implementation details
1. Generalization
2. Specialization
3. Inheritance
4. Whole-part
1. DURC operations
2. CDUR operation
3. RUDC operations
4. CRUD operations
Page 38
Email: [email protected] VU Campus Sahiwal
18. A life line represents the object's life during the
interaction in a sequence diagram while its notation
is depicted by ________.
1. Dotted Lines
2. Solid Lines
3. Curved Lines
4. Full Arrow
1. A filled diamond
2. A dot
3. An unfilled diamond
4. A half arrowhead
2. stakeholder
3. use case
4. actor
1. Compulsory
4. as an aid to programmers
Page 40
Email: [email protected] VU Campus Sahiwal
25. Different messages in sequence diagrams
includes:
1. Notify
3. Asynchronous
4. Simple
1. Sequence
2. Data Flow
3. Activity
4. Class
Page 41
Email: [email protected] VU Campus Sahiwal
3. data, hardware, software, people
2. Down Parsing
4. Up Parsing
1. Triggers
2. Events
3. Methods
4. Actions
Page 42
Email: [email protected] VU Campus Sahiwal
1. Dataflow diagram
2. Activity Diagram
1. actor
2. class
3. use case
4. system boundary
1. Requirements
2. Documents
3. Models
4. Test Cases
Page 43
Email: [email protected] VU Campus Sahiwal
36. In Data Flow Diagram, the entity or system,
outside the boundary of this system is called
1. Process
2. Data Flow
3. External Agent
4. Data Store
2. Processing of data
3. External agent
4. Internal agent
1. Analysis
2. Negotiation
Page 44
Email: [email protected] VU Campus Sahiwal
3. Prototyping
4. GUI
1. Functional
2. Non-functional
3. Unstable
4. User
1. What
2. How
3. When
4. Who
1. Object requirements
2. Functionality requirements
1. Independence
Page 45
Email: [email protected] VU Campus Sahiwal
2. Dependence
3. Aggregation
4. Composition
1. Inheritance
2. Polymorphism
3. Aggregation
4. Abstraction
1. Accessible
2. Global
3. Private
4. Localized
Page 46
Email: [email protected] VU Campus Sahiwal
47. ________ and ________ are two important
tools that helps in managing the program
complexity.
1. Composition, Inheritance
2. Abstraction, Encapsulation
3. Aggregation, Inheritance
4. Modularity, Composition
1. Identity
2. State
3. Behavior
1. Aggregation
2. Abstraction
3. Inheritance
4. Association
1. All classes
Page 47
Email: [email protected] VU Campus Sahiwal
3. Behavior of classes
Writing test cases and generating test data are processes that demand __________ building
capabilities.
Code
Domain
System
Scenario scenario-building (correct)
What types of errors are missed by black-box testing and can be uncovered by whitebox
testing?
Runtime errors
Logic errors (correct)
Performance errors
Input errors
The cyclomatic complexity metric provides the designer with information regarding the
number of ___________.
Statements in the program
Cycles in the program
Errors in the program
Independent logic paths in the program 207 (correct)
The best reason for using Independent software test teams is that
Software developers do not need to do any testing (correct)
Strangers will test the software mercilessly
Testers do not get involved with the project until testing begins
The conflicts of interest between developers and testers is reduced
________ ensures that a class only has one instance and provides a global point of access to
it.
Behavioral Pattern
Joint Pattern
Singleton Pattern 145 (correct)
Observer Pattern
Secondary private classes can be declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes 158 (correct)
Outer classes
Synchronous classes
Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Reducing 173 (correct)
Increasing
Strengthening
Abstraction and encapsulation are two important tools that can help in managing and
mastering the _________ of a program.
Usability
Complexity 173 (correct)
Page 49
Email: [email protected] VU Campus Sahiwal
Understandability
Reliability
One of the guidelines to avoid common mistakes is to never use ________ except for
declaration.
, comma , (correct)
;
=
||
Which one is NOT a type of messages which Sequence Diagrams Depict _______
Asynchronous
Synchronous
Create
Update 108 (correct)
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
Architectural Design 115 (correct)
Interface Design
Component Design
Data Design
Page 50
Email: [email protected] VU Campus Sahiwal
A complex System evolves from a
Smaller system
Simpler system 69 (correct)
Bigger system
Medium system
For inspections, --------------- are prepared that contain information regarding defects.
Tables
Checklists 210 (correct)
Lists
Frames
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Page 51
Email: [email protected] VU Campus Sahiwal
Disease 224 (correct)
Source
Software Bugs have multiple names. Which one of the below is not the name of Software
Bugs?
Bugs
Defects
Errors
Mistakes 213 (correct)
Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level 207 (correct)
Component level
System level
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
Functions
Classes 202 (correct)
Objects
Interfaces
Writing test cases and generating test data are processes that demand __________ building
capabilities.
Domain
System
Scenario 198 (correct)
Code
The raising of the imaginary error flag is simply called raising or _________ an error.
Throwing 187 (correct)
Sending
Casting
Page 52
Email: [email protected] VU Campus Sahiwal
Handling
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
Integer 183 (correct)
Float
Character
Double
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical 181 (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
Mainframe 130 (correct)
Super Computers
Personal Computers
Real time
There are four basic coding structures: sequence, if statement, case statement, and
___________.
For loop
While loop 203 (correct)
Switch statement
Logical operations
___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture 137 (correct)
Layered architecture
N-tier architecture
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
1987 141 (correct)
1988
1962
1995
Page 53
Email: [email protected] VU Campus Sahiwal
STL Stands for ______________.
Standard Temporary Line
Standard Temporary Library
Standard Template Library 141 (correct)
Standard Type Link
________ ensures that a class only has one instance and provides a global point of access to
it.
Singleton Pattern 145 (correct)
Observer Pattern
Behavioral Pattern
Joint Pattern
Testing activities require destructive instincts in __________ for the purpose of breaking
system to discover loopholes into its functionality.
Bug Fixers
Tester 198 (correct)
Developer
Requirement Engineer
Camel Case is now the official convention for file names and identifiers in the ________
programming language.
C#
C++
Java 152 (correct)
Visual Basic.Net
In presence of _________ bug in a program, the results are the opposite of what is
expected.
Memory Leak
Memory Over-runs
Syntax Error
Logical Error 221 (correct)
Split lines occur when a statement exceed the _______ column limit.
Page 54
Email: [email protected] VU Campus Sahiwal
80 158 (correct)
90
95
85
Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Reducing 173 (correct)
Increasing
Strengthening
When planning for performance, one should always remember the _______ rule.
80/20 180 (correct)
70/20
60/20
100/20
Which of the items listed below is NOT one of the software engineering layers?
Tools
Process
Manufacturing (correct)
Methods
Page 55
Email: [email protected] VU Campus Sahiwal
The state transition diagram ______
Depicts relationships between data objects
Depicts functions that transform the data flow
Indicates how data are transformed by the system not (correct)
Indicates system reactions to external events
Prototyping _____
Ensures getting the design right the first time
Is the execution of the standard systems development cycle using CASE tools.
Is used to verify if a key process is feasible (correct)
Involves an iterative development process with minimum end use involvement.
Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms, Rationale} 125
(correct)
Software architecture = {Parts, Rationale}
Software architecture = {Parts, Elements}
Page 56
Email: [email protected] VU Campus Sahiwal
Local
General
Private
In the case of zero-install, the network environment is used to ______ server side
processing by adding a number of servers which share processing load.
Distribute 133 (correct)
Centeralize
Shift
De-Synchronize
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
II 216 (correct)
I
III
Page 57
Email: [email protected] VU Campus Sahiwal
IV
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease (correct)
Source
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
External memory
Mixed memory
Internal Memory 219 (correct)
Mutually exculive memory
Equivalence __________ help you in designing test cases to test the system
effectively and efficiently.
Functions
Classes 202 (correct)
Objects
Interfaces
Page 58
Email: [email protected] VU Campus Sahiwal
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
Mainframe 130 (correct)
Super Computers
Personal Computers
Real time
Idea of zero install architecture is to develop a system where no installation on the _____
is needed.
Client side 133 (correct)
Server Side
Client & Server Side
Network
___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture 137 (correct)
Layered architecture
N-tier architecture
Description of communicating objects and classes that are customized to solve a general
design in a particular context is called __________.
Design Pattren 140 (correct)
System Pattren
System Design
Design System
Which of the following is the correct formula for calculating cyclomatic complexity of a
program ?
V-N+2
E-V+2
E - N + 2 208 (correct)
E+N–2
In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own 210 (correct)
Mixed code of people
Hidden
Page 59
Email: [email protected] VU Campus Sahiwal
Performance & Usability are examples of _________ requirements.
Business
Functional
Non-Functional 213 (correct)
User
Secondary private classes can be declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes 158 (correct)
Outer classes
Synchronous classes
Split lines occur when a statement exceed the _______ column limit.
80 158 (correct)
90
95
85
Names representing methods and functions should be ________ and written in mixed case
starting with ________ case.
Noun, Lower
Noun, Upper
Verb, Upper
Verb, Lower (correct)
Page 60
Email: [email protected] VU Campus Sahiwal
General
Boolean 155 (correct)
Constant
If you are initializing a variable at the time of declaration, do not declare another
_______in the same statement.
Variable 179 (correct)
Object
Class
Module
Page 61
Email: [email protected] VU Campus Sahiwal
Behavioral model and environment model. (correct)
Behavioral model and implementation model.
User model and environmental model
User model and structural model
Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms, Rationale} (correct)
Software architecture = {Parts, Rationale}
Software architecture = {Parts, Elements}
One of the most powerful features of exception handling is that an error can be ----------
over function boundaries.
Thrown 187 (correct)
Called back
Caught
Sent
Page 62
Email: [email protected] VU Campus Sahiwal
System, integration, unit, validation
Unit, integration, validation, system
Integration, unit, system, validation
Two tests are considered to be equivalent if it is believed that: if one discovers a defect,
the other probably will too, and if one does not discover a defect,
---------------------------------.
The other probably may
The other probably can
The other probably won’t either 202 (correct)
The other probably will
Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level 210 (correct)
Component level
System level
20.A SRS is said to be __________ if and only if, every requirement stated therein has only
one
interpretation.
Compact
Unambiguous (correct)
Consistant
Detailed
In Java, ">>" is used for _______ shift and ">>>" for _________ shift
Arithmetic, Logical (correct)
Page 63
Email: [email protected] VU Campus Sahiwal
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
st cases should be generated for unit testing and system testing during _________.
Testing and maintenance respectively (correct)
Requirement analysis
Design and requirement analysis respectively
Coding and design respectively
26.patterns are devices that allow programs to share knowledge about their ___________.
Design 140 (correct)
Code
Analysis
Testing
In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own 210 (correct)
Mixed code of people
Hidden
Page 64
Email: [email protected] VU Campus Sahiwal
Inspections cannot check __________ characteristics.
Non-Functioanl. 213 (correct)
Business
User
Functional
Inspections may be applied to any representation of the system which may include all
except __________.
Requirements
Design
Testing
Analysis 213 (correct)
Ideally speaking, a function should not be larger than _________lines of code and in any
case should not exceed one page in length.
20 150 (correct)
15
30
25
CamelCase is now the official convention for file names and identifiers in the ________
programming language.
C#
C++
Java 152 (correct)
Visual Basic.Net
Split lines occur when a statement exceed the _______ column limit.
80 (correct)
Page 65
Email: [email protected] VU Campus Sahiwal
90
95
85
One of the guidelines to avoid common mistakes is to never use ________ except for declar
, (correct)
;
=
||
When planning for performance, one should always remember the _______ rule.
80/20 (correct)
70/20
60/20
100/20
Following are some statements associated with data flow diagrams. Identify the correct
statement from among them.
DFDs are used to model complex interfaces.
DFDs are used to represent only functional processing, data stores and data movements
between functions.
DFDs depict only processes which can be decomposed. (correct)
DFDs do not show external data sources and external data sinks.
Page 66
Email: [email protected] VU Campus Sahiwal
Data Flow Diagrams _______
Replace the job of systems analysts
Do not allow every function to work at the same time.
Can be automatically generated by computer aided software engineering tools
Describes how data flows from one logical processing unit to another
(correct)
To determine the architectural style or combination of styles that best fits the proposed
system, requirements engineering is used to uncover:
Algorithmic complexity
Characteristics and constraints (correct)
Control and data
Design patterns
Krutchen’s 4+1 architectural view model proposes the development of ______ main views
5
4 There are 4 main views (correct)
3
2
Page 67
Email: [email protected] VU Campus Sahiwal
Process in parallel
Combine
We can divide the whole Software Engineering process in 4 distinct phases namely
vision, definition, development, and maintenance.
Which writing style is best regarding identifier role in enhancing the readability of a
program?
If (Flag = = 0)
If (Flag = = START_NUMBER)
If (Z = = START_NUMBER) (correct)
If (Z= =0)
Page 68
Email: [email protected] VU Campus Sahiwal
Black Box
System
Regression
Inspections can check conformance with a specification but not conformance with the ---
----------requirements.
Customer's real 213 (correct)
Developer
Tester
Manger
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease (correct)
Source
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
Mixed memory
Page 69
Email: [email protected] VU Campus Sahiwal
External memory
Internal Memory 219 (correct)
Mutually exculive memory
requirements determination.
requirements structuring.
database design.
3:26 PM2
The <<extend>> relationship between use cases would be used when behavior in the extending
use case is __________ the extended use case
always needed by
never needed by
sometimes needed by
Page 70
Email: [email protected] VU Campus Sahiwal
None of the given options
actor
class
use case
system boundary
3:29 PM 3
3:30 PM: system models are built to allow the system engineer to evaluate the system components
in relationship to one another
Select correct option:
True
False
Process in Data Flow Diagram (DFD) represents
Select correct option:
Flow of data
Transformation of data
Storage of data
An external agent
The Use case diagram does not show which actors interact with each use case
Select correct option:
TRUE
FALSE
The condition that must be met before the use case can be invoked, is called:
Select correct option:
Pre-Condition
Post-Condition
Pre-Assertion
Post-Assertion
3:3
Data cannot flow from one external entity to other external entity because:
Page 71
Email: [email protected] VU Campus Sahiwal
Select correct option:
TRUE
FALSE
3:37 P
requirements determination.
requirements structuring.
user interface design.
database design.
The "extends" relationship is kind of a generalization specialization relationship.
Select correct option:
TRUE
FALSE
3:40
Page 72
Email: [email protected] VU Campus Sahiwal
: A Process in Data Flow Diagram (DFD) represents
Select correct option:
Flow of data
Transformation of data
Storage of data
An external agent
A context diagram is used
Select correct option:
TRUE
FALSE
3:53 PM
The system model template contains which of the following elements
Select correct option:
input
output
output
all of the given
To construct a system model the engineer should consider one of the following restraining factors?
Select correct option:
CRUD operations
DURC operations
RUDC operations
CDUR operation
The "extends" relationship is kind of a generalization specialization relationship.
Select correct option:
TRUE
FALSE
Question # 1 of 10 ( Start time: 04:00:12 PM ) Total Marks: 1
The Use case diagram does not show which actors interact with each use case
Select correct option:
TRUE
FALSE
Page 73
Email: [email protected] VU Campus Sahiwal
Question # 2 of 10 ( Start time: 04:00:39 PM ) Total Marks: 1
There are some types of requirements that can not be documented in the use cases.
Select correct option:
TRUE
FALSE
Question # 3 of 10 ( Start time: 04:01:01 PM ) Total Marks: 1
Arranging information in tabular form makes it easy to read, understand and comprehend as
compared to streams of text.
Select correct option:
TRUE
FALSE
Page 74
Email: [email protected] VU Campus Sahiwal
True
False
Objective Questions
1. Global variables in C++ should always be referred to
by using the
1. :: operator
2. : operator
3. Without an operator
Page 75
Email: [email protected] VU Campus Sahiwal
2. A life line represents the object's life during the
interaction in a sequence diagram while its notation
is depicted by ________.
1. Dotted Lines
2. Solid Lines
3. Curved Lines
4. Full Arrow
1. Single server
2. multiple servers
3. multiple servers
3. Memory is allocated
1. Catching
2. Repress
Page 76
Email: [email protected] VU Campus Sahiwal
3. Casting
4. Throwing
1. System testing
2. Black Box
3. White Box
4. Unit testing
2. Processing of data
3. External agent
4. Internal agent
Page 77
Email: [email protected] VU Campus Sahiwal
2. What useful questions can it answer?
1. General
2. Boolean
3. Constant
1. Normal
2. Faulty
3. Buggy
4. Complex
1. Testing
2. Processes
3. Design
4. Maintenance
Page 78
Email: [email protected] VU Campus Sahiwal
1. Cat will not ba able to access any class
1. Fixing
2. Debugging
3. Testing
4. Exception handling
1. Whome it knows?
2. What it does?
3. What it knows?
1. Unit
2. White Box
3. Black Box
4. System
Page 79
Email: [email protected] VU Campus Sahiwal
17. A ________ relationship indicates that one
entity is composed of one or more parts which are
themselves instances of that or another entity.
1. Generalization
2. Specialization
3. Inheritance
4. Whole-part
1. Accessible
2. Global
3. Private
4. Localized
Page 80
Email: [email protected] VU Campus Sahiwal
3. The class and object layer
1. Two
2. Six
3. Five
4. Four
1. Flowcharts
2. UML diagrams
2. Down Parsing
4. Up Parsing
Page 81
Email: [email protected] VU Campus Sahiwal
1. Right to left
2. Left to right
3. Top to bottom
4. Bottom to top
1. Unit testing
2. Component testing
3. System testing
4. Subsystem testing
1. structures
2. classes
3. unions
1. 1
2. 0
3. 2
4. 3
Page 82
Email: [email protected] VU Campus Sahiwal
28. A ________ is a variance from a desired product
attribute.
1. Exception
2. Error
3. Mistake
4. Defect
1. requirements determination
2. requirements structuring
4. database design
1. Structures
2. Variables
3. Classes
Page 83
Email: [email protected] VU Campus Sahiwal
4. Objects
1. Dataflow diagram
2. Activity Diagram
1. Ignoring
2. Casting
3. Catching
Page 84
Email: [email protected] VU Campus Sahiwal
1. Business
2. Non-Functional
3. Domain
4. Functional
4. as an aid to programmers
1. Electrical Engineering
2. Product Engineering
3. Mechanical Engineering
4. Hardware Engineering
1. Independence
2. Dependence
3. Aggregation
4. Composition
Page 85
Email: [email protected] VU Campus Sahiwal
39. A good program must contain ________
infeasible paths.
1. 1
2. 2
3. 0
4. infinite
1. Remains same
2. Decrease
3. Increase
4. Cutback
1. 2
2. 4
3. 3
4. 6
Page 86
Email: [email protected] VU Campus Sahiwal
4. Both are outside the context of the system
1. more, complex
2. less, complex
3. more, simple
4. less, simple
Page 87
Email: [email protected] VU Campus Sahiwal
1. Identity
2. State
3. Behavior
1. Compulsory
2. structured code
3. control structure
4. repitition structure
Page 88
Email: [email protected] VU Campus Sahiwal
1. Database Server
2. Transaction Server
3. File Server
4. Time Server
1. nested loop
2. empty loop
1. Class diagram
3. Flow Chart
1. actor
2. class
3. use case
4. system boundary
Page 89
Email: [email protected] VU Campus Sahiwal
1. E + N + 2
2. E- N - 2
3. E - N + 2
4. N - E + 2
1. Functional
2. Non-functional
3. Unstable
4. User
1. association
2. stakeholder
3. use case
4. actor
1. Unit testing
2. Module testing
3. System testing
4. Subsystem testing
Page 90
Email: [email protected] VU Campus Sahiwal
58. The size of ________ plays a significant role in
making the program easy or difficult to understand.
1. function
2. object
3. data type
1. Software
2. Test Case
3. Program
4. Prototype
1. Notify
3. Asynchronous
4. Simple
1. True
2. False
Page 91
Email: [email protected] VU Campus Sahiwal
62. ________ diagram does not capture control
flow information, it just shows the flow of the data in
a system.
1. Sequence
2. Data Flow
3. Activity
4. Class
1. Asynchronous errors
2. Syntax errors
3. Memory errors
Page 92
Email: [email protected] VU Campus Sahiwal
2. Make the code difficult to modify
1. Object requirements
2. Functionality requirements
1. Analysis
2. Negotiation
3. Prototyping
4. GUI
1. Inheritance
2. Polymorphism
3. Aggregation
4. Abstraction
Page 93
Email: [email protected] VU Campus Sahiwal
69. Class variables should never be declared public.
Public variables violate which of the following:
1. Information hiding
2. Encapsulation
1. STL
2. CMMI
3. ISO
4. ANSI
Page 94
Email: [email protected] VU Campus Sahiwal
1. it is a good idea in design
3. it is easyto do it
1. Requirements
2. Documents
3. Models
4. Test Cases
1. hardware
2. syntax
3. language
4. software
Page 95
Email: [email protected] VU Campus Sahiwal
4. It creates linkage problem
1. On object constraints
1. functionality
3. implementation details
1. What
Page 96
Email: [email protected] VU Campus Sahiwal
2. How
3. When
4. Who
1. True
2. False
1. High Cohesion
2. Low Cohesion
3. High Coupling
4. Low Coupling
1. White Box
2. Gray Box
Page 97
Email: [email protected] VU Campus Sahiwal
3. Black Box
1. Composition, Inheritance
2. Abstraction, Encapsulation
3. Aggregation, Inheritance
4. Modularity, Composition
85. x = 0; // x is floating pt
Which written form of above line of code is more in
line with the self-documentation philosophythan the
code above.
1. x= false
2. x = NULL
3. x = 0.0;
4. x = '\0'
Page 98
Email: [email protected] VU Campus Sahiwal
87. In data flow diagram (DFD), Create, Update,
Delete and Read operations are normally called:
1. DURC operations
2. CDUR operation
3. RUDC operations
4. CRUD operations
1. Confirmation
2. Consensus
3. Uncertainty
4. Conflict
1. Requirements
2. Design
3. coding
4. testing
1. commented
2. indented
3. cryptic
Page 99
Email: [email protected] VU Campus Sahiwal
4. aligned
1. Business
2. Non-Functional
3. Domain
4. Functional
1. Process
2. Data Flow
3. External Agent
4. Data Store
1. Triggers
2. Events
3. Methods
4. Actions
Page 100
Email: [email protected] VU Campus Sahiwal
2. debug the code OR place assertions in code
1. statements, expectations
2. specifications, expectations
3. specifications , arguments
4. statements, arguments
1. Portability mechanism
Page 101
Email: [email protected] VU Campus Sahiwal
1. Black Box
2. White Box
3. Exhaustive
2. Feasibility matrix
3. System matrix
1. Value
2. Data
3. Information
4. Conceptual
1. Aggregation
2. Abstraction
3. Inheritance
4. Association
Page 102
Email: [email protected] VU Campus Sahiwal
102. In UML based Object Oriented model of a
system, a composition relation between two objects
is shown by a ________ sign on the Whole side of a
relation line.
1. A filled diamond
2. A dot
3. An unfilled diamond
4. A half arrowhead
1. All classes
3. Behavior of classes
Page 103
Email: [email protected] VU Campus Sahiwal
Components 95
Structures
Modules
Interaction Protocols
5. The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
Architectural Design 115
Interface Design
Component Design
Data Design
6. A complex System evolves from a
Smaller system
Simpler system 69
Bigger system
Medium system
7. A context diagram
Describes the context dependencies of a system
Page 104
Email: [email protected] VU Campus Sahiwal
Is a DFD which gives an overview of the system
31 Is a detailed description of a system?
Is not used in drawing a detailed DFD
8. When measure of independence of a module or component is low to the other,
How would changes in one component have effect on other component?
No Low
71
High
Equal
9. What is meant by the term ‘software crisis’? Ability
to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing
software
A situation in which large scale software projects took more time and budget than
was planned
10. Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programing
Logic
11. For inspections,-----------------are prepared that contain information regarding defects.
Tables
Checklists 210
Lists
Frames
12. Static analyzers are software tools for-------------------processing.
Analysis text Source
text 211 Design
text Maintenance
Text
13. Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason Disease
224 Source
14. What factor has no precipitation in more sophisticated and complex computer-based
systems?
Vast use of personal computers.
Vast increases in computer memory and storage
capacity. Greater variety of exotic input/output
options.
Profound changes in computer architectures.
15. Software Bugs have multiple names. Which one of the below is not the name of Software
Bugs?
Page 105
Email: [email protected] VU Campus Sahiwal
Bugs
Defects
Errors
Mistakes 213
16. Unit testing is roughly equivalent to testing for hardware in which each chip is
tested thoroughly after manufacturing.
Page 106
Email: [email protected] VU Campus Sahiwal
Circuit level
Chip Level
207 Component
level System
level
17. Equivalence help you in designing test cases to test the system effectively and
efficiently.
Functions
Classes 202
Objects
Interfaces
18-are used to describe flow of data or control in an application. Code
structures
String matching.
Paths
Flow graphs 203
19. Writing test cases and generating test data are processes that demand building
capabilities.
Domain
System
Scenario 198
Code
20. The raising of the imaginary error flag is simply called raising or an error.
Throwing 187
Sending
Casting
Handling
21. requirements are often called product features.
Functional
Business 22
User
Non-functional
22. Many compilers limit the maximum number of bits in the bit field to the size of a(n)
.
Integer 183
Float
Character
Double
23. In Java, ">>" is used for shift and ">>>" for shift.
Arithmetic, Logical 181
Mathematical, Logical
Incremental,
Arithmetic Logical,
Page 107
Email: [email protected] VU Campus Sahiwal
Arithmetic
24. When large amount of data is to be shared, repository model is used. This model has been
extensively used in the based application.
Mainframe 130
Super Computers
Personal
Computers Real
time
Page 108
Email: [email protected] VU Campus Sahiwal
25. There are four basic coding structures: sequence, if statement, case statement, and
. For loop
While loop 203
Switch statement
Logical
operations
26. is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture
Page 109
Email: [email protected] VU Campus Sahiwal
programming language.
C#
C++
Java 152
Page 110
Email: [email protected] VU Campus Sahiwal
Visual Basic.Net
34. In presence of bug in a program, the results are the opposite of what is
expected.
Memory Leak
Memory Over-
runs Syntax Error
Logical Error 221
35. Split lines occur when a statement exceed the column limit.
80 158
90
95
85
36. Identifier names play a significant role in enhancing the of a program.
Writability
Readability 151
Reliability
Usability
37. "is" prefix should be used for variables and methods.
Static
General
Boolean 155
Constant
38. Comments should be indented relative to their position in the .
Code 165
Design Analysis
Requirements
39. Modularity is a tool that can help us in the size of individual functions.
Stabilizing
Reducing 173
Increasing
Strengthening
40. When planning for performance, one should always remember the rule.
80/20 180
70/20
60/20
100/20
41. Suppose you are working as a software engineer involved in the development of an e-
commerce website.
What are the 2 most important characteristics your software must have? 2 marks
42. Name any two standards which are being used by C/C++ for writing programs. 2 marks
43. Which other technique along with testing should we use for increasing the effectiveness of
defect removal efficiency in a project ? 2marks
44. What do you understand by term "self-documenting code"?2 marks
45. Briefly describe a business process diagram (at least 3 lines): 3marks
46. How does software differ from the artifacts produced by other engineering disciplines ? 3
marks
47. What is Exception handling? 3marks
48. In which scenario, short circuiting is used? 3marks
49. Rewrite the following code by following General naming conventions for C++
Page 111
Email: [email protected] VU Campus Sahiwal
1) int fileprefix;
2) const int max_iterations;
3) int getmaxiterations() { ... }
4) template<class t>
5) private int length; 05 marks
50. “A manufacturing company assembles the fans. For this purpose it purchases the raw
material containing wires, motors, wings, and magnets. It then assembles the fans from these
products”.
From above case study, identify different objects that, you think, should be present in
final implementation of system.
Note: you can use any methodology to identify the objects. 5marks
51. Discuss the importance of software debugging. 5marks
52. Exceptions do increase the code complexity. Explain this with the help of an example.
5marks
1. Which of the items listed below is NOT one of the software engineering
layers? Tools
Process
Manufacturin
g Methods
02. Which of the following is a non-functional requirement of a website which sells songs? A
catalogue of the stock needs to be available for the users to choose from
Customer information should be retained to allow future transactions easier
Users should be able to choose from a set of different languages for the
interface Time taken to download songs in the catalogue should not
irritate users
03. The state transition diagram Depicts
relationships between data objects Depicts
functions that transform the data flow
Indicates how data are transformed by the system
Indicates system reactions to external events
04. Control flow diagrams are:
Needed to model event driven systems
Required for all systems
Used in place of data flow diagrams
Useful for modeling user
interfaces
05. Prototyping
Ensures getting the design right the first time
Is the execution of the standard systems development cycle using CASE
tools. Is used to verify if a key process is feasible
Involves an iterative development process with minimum end use involvement.
06. Identifying Whole-Part structures (Aggregations) means, what are my -------------
Components
Structures
98
Page 112
Email: [email protected] VU Campus Sahiwal
Modules
Interaction Protocols
07. Software architecture is "The of the components of a program/system, their
interrelationships, and principles and guidelines governing their design and evolution over
time".
Combination
Collection
Page 113
Email: [email protected] VU Campus Sahiwal
Structure 120
Unification
08. The object-behavior model indicates how the system
Functions in the operating environment
Objects collaborate with one another
Responds to external stimuli
Responds to internal stimuli
09. Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms, Rationale}
125 Software architecture = {Parts, Rationale}
Software architecture = {Parts, Elements}
10. Repository model also provides the-------------------------view of the system.
Global 130
Local
General
Private
11. In the case of zero-install, the network environment is used to server side
processing by adding a number of servers which share processing load.
Distribute 133
Centeralize
Shift
De-Synchronize
12. Requirement Statement and Requirement Specification are also called Requirement
Definition and
Functional Specification 28
Mathematical specification
System Specification
Cost Specification
13. Which of the following is not a fundamental structured programming construct?
Recursion
Condition
Repetition
Sequence
14. For equivalence partitions, we divide the problem in----------------obvious categories of
equal strings 4
3
2 202
5
15.Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programing
Logic
16. Static analyzers are software tools for-------------------processing.
Analysis text
Page 114
Email: [email protected] VU Campus Sahiwal
Source text 214
Design text
Maintainence
Text
Page 115
Email: [email protected] VU Campus Sahiwal
17. The first “bug” was actually a moth, which flew through an open window and into one of the
Mark---------------'s relays.
II 216
I III
IV
18. Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease
Source
19. Bugs Fixing is done by which of the teams in Software Development lifecycle?
Development Team
Testing Team not
sure Analysis & Design Team
Process Team
20. Which of the following testing involve purely black box testing?
Unit testing, Beta testing
Acceptance testing, Interface testing
Beta testing, Acceptance testing
Integration testing, Interface
testing
21. A memory leak bug is one in which memory is somehow allocated from either the operating
system or an--------------------------"pool", but never deallocated when the memory is finished
being used. External
memory Mixed
memory
Internal Memory 219
Mutually exculive memory
22. Equivalence help you in designing test cases to test the system effectively and
efficiently.
Functions
Classes 202
Objects
Interfaces
23 are used to describe flow of data or control in an application. Code
structures
String matchings
Paths
Flow graphs 203
24. requirements are often called product features.
Functional
Business
User
Non-functional
25. In Java, ">>" is used for shift and ">>>" for shift.
Arithmetic, Logical
Page 116
Email: [email protected] VU Campus Sahiwal
Mathematical, Logical
Incremental,
Arithmetic Logical,
Arithmetic
Page 117
Email: [email protected] VU Campus Sahiwal
26. When large amount of data is to be shared, repository model is used. This model has been
extensively used in the based application.
Mainframe 130
Super Computers
Personal
Computers Real
time
27. Idea of zero install architecture is to develop a system where no installation on the
is needed.
Client side 133
Server Side
Client & Server Side
Network
28. is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture 137
Layered architecture
N-tier architecture
29. Description of communicating objects and classes that are customized to solve a general
design in a particular context is called .
Design Pattren 140
System Pattren
System Design
Design System
30. Which of the following is the correct formula for calculating cyclomatic complexity of a
program ?
V-N+2E
-V+2
E-N+2 208
E+N–2
31. In unit testing, developers test code units (modules, classes, etc.) during
implementation.
Other's
Their own 210
Mixed code of people
Hidden
32. Performance & Usability are examples of requirements.
Business
Functional
Non-Functional 213
User
33. Which of the following is the correct definition for software testing ?
The process of demonstrating that errors are not present
The process of establishing confidence that a program does what it is supposed
to do The process of executing a program to show it is working as per
specifications
The process of executing a program with the intent of finding errors
Page 118
Email: [email protected] VU Campus Sahiwal
34. The code is misbehaving in a way that cannot be easily explained.
The above statement is the symptom of .
Runtime Error
Page 119
Email: [email protected] VU Campus Sahiwal
Logical Error 221
Memory Leak
Exception
35. Secondary private classes can be declared as and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes
158
Outer classes
Synchronous
classes
36. Split lines occur when a statement exceed the column limit.
80 158
90
95
85
37. Identifier names play a significant role in enhancing the of a program.
Writability
Readability 151
Reliability
Usability
38. Names representing methods and functions should be and written in mixed case
starting with case.
Noun, Lower
Noun, Upper 153
Verb, Upper
Verb,
Lower
39. "is" prefix should be used for variables and methods.
Static
General
Boolean 155
Constant
40. If you are initializing a variable at the time of declaration, do not declare another
in the same statement.
Variable 179
Object
Class
Module
41. Consider the following statement:
“A basket contains 2 Apples and 3 bananas”.
What is the relationship between basket and fruits (apples and bananas) 02marks
42. What issue can arise if code is written without keeping the portability factor in mind ?02
43. Which four techniques should be applied in parallel to attain maximum defect removal
effeciency ? 02
Page 120
Email: [email protected] VU Campus Sahiwal
44. How names representing abbreviations and acronyms should be described in coding style
guide? 02
45. What is Textual Analysis? Explain it.03
46. Discus the symptoms of Memory and Resource Leak bug class. 03
47. Write any two guidelines for developing equivalence partitioning. 03
Page 121
Email: [email protected] VU Campus Sahiwal
48. When a small set (a couple of functions) of functions which use each other is so
overwhelmingly the bottleneck, there are two alternatives. Write down at least one of
them.03
49. Using the architecture of a house or building as a metaphor, draw a comparison with
software architecture.
50. Discus the symptoms and an example of Loop errors bug class. 5
51. In Intel architecture, the lowest byte is the most significant byte while in Motorola
architecture the highest byte of a word is the most significant one.
Discuss how the above mentioned factor affects portability of program 05
Page 122
Email: [email protected] VU Campus Sahiwal
application Structural in nature
7. UML (unified modeling language) analysis modeling focuses on the .
Behavioral model and environment model.
Behavioral model and implementation
model. User model and environmental
model
Page 123
Email: [email protected] VU Campus Sahiwal
User model and structural model
8. Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms,
Rationale} Software architecture = {Parts,
Rationale}
Software architecture = {Parts, Elements}
9.Repository model also provides the-------------------------view of the system
Global 130
Local
General
Private
10. Which of the below is NOT a part of Architectural styles?
Data Center architecture
Client Server Architecture
Hirerical Architercture 129
Layered Architecture
11. Consider the following scenario:
“Student logins the system and checks his/her lecture schedule”
Keeping in mind the use case diagram, and above scenario the one of the post
conditions might be:
Student should have a login
System should be
available
Student should log-off after checking schedule
Lecture schedule should be displayed date
wise
12. When measure of independence of a module or component is low to the other,
How would changes in one component have effect on other component?
No Low
High
Equal
13. One of the most powerful features of exception handling is that an error can be ----------
over function boundaries.
Thrown 187
Called back
Caught
Sent
14. What is the normal order of activities in which software testing is organized?
Unit, integration, system, validation
System, integration, unit, validation
Unit, integration, validation,
system Integration, unit, system,
validation
15. Two tests are considered to be equivalent if it is believed that: if one discovers a defect, the
Page 124
Email: [email protected] VU Campus Sahiwal
other probably will too, and if one does not discover a defect,
--.
The other probably may
The other probably
can
The other probably won’t either 202
The other probably will
16. For equivalence partitions, we divide the problem in----------------obvious categories of
equal strings
Page 125
Email: [email protected] VU Campus Sahiwal
4
3
2
5
17. In---------------testing we test the structure of the program.
White Box 201
Black Box
System
Regression
18. Static analyzers are software tools for-------------------processing.
Analysis text Source
text
214
Design text
Maintainence
Text
19. Unit testing is roughly equivalent to testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level 210
Component level
System level
20.A SRS is said to be if and only if, every requirement stated therein has
only one interpretation.
Compact
Unambiguou
s Consistant
Detailed
21. In Java, ">>" is used for shift and ">>>" for shift
Arithmetic, Logical
Mathematical, Logical
Incremental,
Arithmetic Logical,
Arithmetic
22. A(n) is a variance from a desired product attribute
Error
Exception Defect
195
Mistake
23. st cases should be generated for unit testing and system testing during .
Testing and maintenance respectively
Requirement analysis
Design and requirement analysis respectively
Coding and design respectively
Page 126
Email: [email protected] VU Campus Sahiwal
24. a of zero install architecture is to develop a system where no installation on the is
needed.
Client side 133
Server Side
Client & Server Side
Network
25. is NOT a layer of operating system.
Core layer
Application layer
Page 127
Email: [email protected] VU Campus Sahiwal
Presentation layer
136 UI layer
26.patterns are devices that allow programs to share knowledge about their
. Design 140
Code
Analysis
Testing
27. Which design pattern provides a unified interface to a set of interfaces in a sub-system?
Façade 146
Singleton
Observer
Joint
28. In unit testing, developers test code units (modules, classes, etc.) during
implementation.
Other's
Their own 210
Mixed code of people
Hidden
29Inspections cannot check
characteristics. Non-
Functioanl. 213
Business User
Functional
30. Performance & Usability are examples of requirements.
Business
Functional
Non-Functional 213
User
31. Inspections may be applied to any representation of the system which may include all
except .
Requirements
Design
Testing
Analysis 213
32. Debuggers can be used to display values of .
local variables only
global variables
only static variables
only
both local and global variables 229
33. The code is misbehaving in a way that cannot be easily explained.
The above statement is the symptom of .
Runtime Error
Logical Error 221
Memory Leak
Exception
Page 128
Email: [email protected] VU Campus Sahiwal
34. Ideally speaking, a function should not be larger than lines of code and in any
case should not exceed one page in length.
20 150
15
30
Page 129
Email: [email protected] VU Campus Sahiwal
25
35. CamelCase is now the official convention for file names and identifiers in the
programming language.
C#
C++
Java 152
Visual Basic.Net
36. Split lines occur when a statement exceed the column limit.
80
90
95
85
37.The construction should appear at the of the header file
Top 160
Bottom
Left
Right
38. Identifier names play a significant role in enhancing the of a program.
Writability
Readability
Reliability
Usability
39. One of the guidelines to avoid common mistakes is to never use except for declar
, lectr 33or 34
;
=
||
40. When planning for performance, one should always remember the rule.
80/20
70/20
60/20
100/20
41. E = Number of Edges = 8
N = Number of Nodes = 6
Using the above measures, calculate the cyclomatic complexity, V(G) of Graph G. 02
42. What do you understand by the term System Downtime ? 02
43. If a class uses most of the methods and most of the data members most of the time
defined in that class. Then class is having high cohesion or high coupling ?2
44. Conditional expression with negation is always difficult to understand while writing
code. Give an example.2
45. Define (Be specific) the following following terms:
1) Program
2) Data
3) Documentation 03
46. Describe three coverage schemes related to white box testing. 3
47. Why Special characters like TAB and Page Break must be avoided.? Explain3
48. Do you agree or not that the use of do - while loops should be avoided. Give solid
reason?3
49. Consider the following examples:
Page 130
Email: [email protected] VU Campus Sahiwal
After playing games/watching shows/engaging in your hobby for X number of hours,
your enjoyment level decreases.
After eating X amount of food, your satisfaction of the additional food becomes
lesser. Every additional unit of fertilizer generates a different increase in yield.
The first few units probably gives a burst in yield compared to without fertilizer.
After that, adding more fertilizer will still give more yield, but at a decreasing
rate.
FINALTERM EXAMINATION
CS-504-Software Engineering
1. Following are some statements associated with data flow diagrams. Identify the correct
statement from among them.
DFDs are used to model complex interfaces.
DFDs are used to represent only functional processing, data stores and data
movements between functions.
DFDs depict only processes which can be decomposed.
DFDs do not show external data sources and external data sinks.
2. A project is considered successful if:
The system was delivered in time and within budget.
The system meets at least some of the customer’s requirements.
The system development process has a maximum impact on the ongoing business
process. Minimum time was spent for requirement gathering and designing.
3. A process which does not take input is called
Miracle process Core
process
Secondary
process Zombie
process
4. Data Flow Diagrams
Replace the job of systems analysts
Do not allow every function to work at the same time.
Can be automatically generated by computer aided software engineering
tools Describes how data flows from one logical processing unit to
another
5. In a............., each program module is represented by a rectangular box.
Page 131
Email: [email protected] VU Campus Sahiwal
Use case diagram
Document flow
diagram Class diagram
Data flow diagram
6. Identify the correct description.
The collection of use cases for a system constitutes all the defined ways the system
may be used.
UML stands for Unified Markup Language
Page 132
Email: [email protected] VU Campus Sahiwal
State transition diagrams are drawn for objects with no significant dynamic
behavior. Object Model depicts the dynamic behavior of system
7. Dynamic components of an OOA model are
Not reusable
Sensitive to timing and event processing
Stable throughout the operational life of an
application Structural in nature
8. To determine the architectural style or combination of styles that best fits the proposed
system, requirements engineering is used to uncover:
Algorithmic complexity
Characteristics and
constraints Control and data
Design patterns
9. Krutchen’s 4+1 architectural view model proposes the development of main views
5 125
4
3
2
10. Repository model also provides the-------------------------view of the system.
Global
Local
General
Private
11. Client server model tries to data and processing.
Distribute 130
Centralize Process in
parallel Combine
12. We can divide the whole Software Engineering process in 4 distinct phases namely
vision, definition, development, and maintenance.
Which of the following is not among “Definition related” activities of software
development? Requirement verification
Change Control not sure
☺ Requirement Engineering
Software Requirements
13. What is meant by the term ‘software crisis’?
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing
software
A situation in which large scale software projects took more time and budget than
was planned
14. Which of the following are external qualities of a software product?
Maintainability, reusability, portability, efficiency, correctness
Correctness, reliability, robustness, efficiency, usability
Portability, interoperability, maintainability, reusability
Robustness, efficiency, reliability, maintainability,
reusability
Page 133
Email: [email protected] VU Campus Sahiwal
15. Which writing style is best regarding identifier role in enhancing the readability of a
program?
If (Flag = = 0)
If (Flag = = START_NUMBER)
Page 134
Email: [email protected] VU Campus Sahiwal
If (Z = =
START_NUMBER) If
(Z= =0)
16. A useful technique for evaluating the overall complexity of a proposed architecture is to look
at the component
Number and size of components
Flow dependencies and sharing dependencies
Size and cost
Algorithms used
17. For equivalence partitions, we divide the problem in----------------obvious categories of
equal strings 4
3
2
5
18. In---------------testing we test the structure of the program.
White Box
Black Box
System
Regression
19. Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programing
Logic
20. Inspections can check conformance with a specification but not conformance with the ---
----------requirements.
Customer's real
213
Developer
Tester
Manger
21. Static analyzers are software tools for-------------------processing.
Analysis text Source
text Design text
Maintenance
Text
22. Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease
Source
23. Software deteriorates rather than wears out because
Software suffers from exposure to hostile environments
Page 135
Email: [email protected] VU Campus Sahiwal
Defects are more likely to arise after software has been used often
Multiple change requests introduce errors in component
interactions Software spare parts become harder to order
24. Testing is an intellectually demanding activity and has a lifecycle--------------to software
development.
Equal
Parallel 198
Page 136
Email: [email protected] VU Campus Sahiwal
Sequential In
contrast
25. A memory leak bug is one in which memory is somehow allocated from either the operating
system or an--------------------------"pool", but never deallocated when the memory is finished
being used. Mixed
memory
External
memory
Internal Memory 219
Mutually exculive
memory
26. are used to describe flow of data or control in an application.
Code structures
String matchings
Paths
Flow graphs 203
27. Writing test cases and generating test data are processes that demand building
capabilities.
Code
Domain
System
Scenario
28. What types of errors are missed by black-box testing and can be uncovered by white- box
testing?
Runtime errors Logic
errors
Performance
errors Input errors
29. The cyclomatic complexity metric provides the designer with information regarding the
number of .
Statements in the program
Cycles in the program
Errors in the program
Independent logic paths in the program 207
30. The best reason for using Independent software test teams is that
Software developers do not need to do any testing
Strangers will test the software mercilessly
Testers do not get involved with the project until testing begins
The conflicts of interest between developers and testers is
reduced
31. is intended to define a many to many relationship between objects so that when one
object changes state all its dependants are notified and updated automatically.
Observer Pattren
Facade Pattren
Singleton
Pattren Joint
Page 137
Email: [email protected] VU Campus Sahiwal
Pattren
32. ensures that a class only has one instance and provides a global point of access to it.
Behavioral Pattern Joint
Pattern Singleton
Pattern 145 Observer
Pattern
33. Inspections cannot check characteristics.
Page 138
Email: [email protected] VU Campus Sahiwal
Non-Functioanl 213
Business User
Functional
34. Secondary private classes can be declared as and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes 158
Outer classes
Synchronous
classes
35. The construction should appear at the of the header file.
Top
Bottom
Left
Right
36. In the switch statement, cases should always end with .
Return Semi
colon
Break 170
Full stop
37. Modularity is a tool that can help us in the size of individual functions.
Stabilizing
Reducing 173
Increasing
Strengthening
38. Abstraction and encapsulation are two important tools that can help in managing and
mastering the of a program.
Usability
Complexity 173
Understandability
Reliability
39. One of the guidelines to avoid common mistakes is to never use except for
declaration.
,
;
=
||
40. Which of the following is/are NOT one of the umbrella activities?
Requirement analysis
Architecture design Test
case development
All of the given options 14
41. Early design decision can vary in software development. Do you agree or not ? Justify
your choice 2.
42. Name any two standards which are being used by C/C++ for writing programs. 2
43. Write qualitative benefits of unit testing. 2
44. Do you agree that multilevel commenting is not supported in C++ and Java? 2
45. Briefly describe a business process diagram (at least 3 lines): 3
Page 139
Email: [email protected] VU Campus Sahiwal
46. What are static analyzers? 3
47. Write one advantage and one disadvantage of using bit fields in writing the code.3
Page 140
Email: [email protected] VU Campus Sahiwal
48. Why the use of do_while loops should be avoided ? 3
49. Suppose you were analyzing a Requirement statement, How will you determine that an object belongs to a certain
class? 05
50. Discus the symptoms and an example of Loop errors bug class. 5
51. In Intel architecture, the lowest byte is the most significant byte while in Motorola architecture the highest byte of
a word is the most significant one.
Discuss how the above mentioned factor affects portability of program. 05
52. Which of the following are correct with reference to the abbreviation rules of naming convention?
We should always write: command instead of
cmd copy instead of cp initialize instead of
init
html instead of HypertextMarkupLanguage cpu instead of Central
Processing Unit 05
Page 141
Email: [email protected] VU Campus Sahiwal
Page 142
Email: [email protected] VU Campus Sahiwal
MIDTERM EXAMINATION 2010
Question No: 1 ( Marks: 1 ) - Please choose one
By following modern system engineering practices simulation of reactive systems is no longer necessary
► True
► False click here for detail
Page 143
Email: [email protected] VU Campus Sahiwal
Question No: 6 ( Marks: 1 ) - Please choose one
Coupling is a measure of------------------of a module or component.
► Independent (Page 71)
► Dependent
► Closeness
► All of the given
Page 144
Email: [email protected] VU Campus Sahiwal
Question No: 12 ( Marks: 1 ) - Please choose one
Identifying System Features include ------
The object-oriented approach improves the maintainability, reusability, and extensibility of the software Click here for Detail
Page 145
Email: [email protected] VU Campus Sahiwal
MIDTERM EXAMINATION 2010
Question No: 1 ( Marks: 1 ) - Please choose
one Most software continues to be custom built
because
► Software is easier to build without using someone else's components.
► Off the shelf software components are not commonly available Click here for detail
► Component reuse is common in the software world
► Reusable components are too expensive to use
► Tools
► Process
► Manufacturing Click here for detal
► Methods
Page 146
Email: [email protected] VU Campus Sahiwal
Question No: 6 ( Marks: 1 ) - Please choose
one A process which does not take input is called
► miracle process Miracle": Process has output, but no input Click here for detail
► core process
► secondary process
► all of the above
Page 147
Email: [email protected] VU Campus Sahiwal
Question No: 12 ( Marks: 1 ) - Please choose one
Data design actually begins during the creation of the analysis model, not the architectural model.
► True Click here for detail
► False
► three
► two
► infinite
► one Click here for detail
Page 148
Email: [email protected] VU Campus Sahiwal
MIDTERM EXAMINATION
2010
► Communication
► Accessibility Click here for detail
► Reaching
► All of the above
Page 149
Email: [email protected] VU Campus Sahiwal
Question No: 7 ( Marks: 1 ) - Please choose
one A complex System evolves from a
► smaller system (Page 69)
► medium sysetem
► bigger system
► non of the given
Page 150
Email: [email protected] VU Campus Sahiwal
Question No: 13 ( Marks: 1 ) - Please choose one
Which one is not a type of messages which Sequence Diagrams Depict
► Synchronous
► Asynchronous
► Create
► Update (Page 108)
Page 151
Email: [email protected] VU Campus Sahiwal
Question No: 2 ( Marks: 1 ) - Please choose one
Dynamic components of an OOA model are
► not reusable
► sensitive to timing and event processing
► stable throughout the operational life of an application
► structural in nature
Dynamic components:
Focus on control and are sensitive to timing and event processing.
Dynamic view of Communication,
Dynamic view of Control and Time.
Page 152
Email: [email protected] VU Campus Sahiwal
Question No: 8 ( Marks: 1 ) - Please choose
one A better Design has an objective achieve
► High Cohesion
► Low Cohesion
► Low Coupling
► High cohesion and Low coupling A P R A C T I T I O N E R ’ S A P P R O A C H (Page 316
Page 153
Email: [email protected] VU Campus Sahiwal
Question No: 14 ( Marks: 1 ) - Please choose one
The two main documents produced during this phase are Requirement Statement and Requirement
pecification. They are also called Requirement Definition and ---------------
Page 154
Email: [email protected] VU Campus Sahiwal
Question No: 3( Marks: 1 ) - Please choose one
A cohesion class is one which emphasize--------unit of----.
► Single and multiple.
► Multiple and functionality
► Functional and single
► Single and functional (Page 72)
Page 155
Email: [email protected] VU Campus Sahiwal
► Software
► Non of above
Page 156
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
MIDTERM
EXAMINATION
CS504- Software Engineering - I (Session - 6)
► False
Page 157
Email: [email protected] VU Campus Sahiwal
► Localized
► Private
► Global
► Accessible
Page 158
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A complex System evolves from a
► smaller system
► medium sysetem
► bigger system
► non of the given
► Independent
► Dependent
► Closeness
► All of the given
► Debugging
► Adding new features
► making changes
► all of the given
► what
► How
► When
► Why
► Dynamic
► Active
► Non of the above
Page 159
Email: [email protected] VU Campus Sahiwal
Question No: 10 ( Marks: 1 ) - Please choose one
In Sequence Diagrams the time required by the receiver object to process the
message is denoted by an---------------
► Activation Box
► Simple Box
► Arrow
Page 160
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
► Non of the above
► True
► False
► conduct business
► Site visits
► Prototyping
► Study of similar systems
► All of given
Page 162
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
► improves the reusability of codes.
► makes objects less independent.
► increases testing time.
► complicates mapping of a system model to an implementation model.
Question No: 17 (
Marks: 2 )
Define abstraction ?
What are the 2 most important characteristics your software must have?
Page 163
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No: 23 ( Marks: 5 )
Page 164
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
How the objects are identified in Peter codd’s technique?
Page 165
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:5 (Marks:1) Vu-Topper RM
The focus of sequence diagrams is:
A. On static Model of system
Page 166
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. On object constraints
C. On the flow of Control
D. On objects/classes and messages exchanged among them Page 106
Page 167
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. Operation
D. Modularity
Page 169
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Inheritance
C. Generalization
D. Specialization
Page 170
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. David Parnas
C. Edsger Dijkstra Page 115
D. Shaw and Garlan
Page 172
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. Adding new features
D. Higher maintenance cost Google
Page 173
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 174
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:26 (Marks:1) Vu-Topper RM
Which of the following is not among the four layers of the object-
oriented pyramid?
A. The subsystem layers
B. The class and object layer
C. The abstract layer Page 89
D. The message layers
Page 176
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A. Source of input data only
B. Source of input data and destination of results
C. Destination of results
D. Repository of data
A. Independence
B. Dependence
C. Aggregation
D. Composition
A. UML
B. C++
C. OCL(Object Constraint Language)
D. None of the given option
Page 178
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
D. Internal Agent
Page 179
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 180
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:39 (Marks:1) Vu-Topper RM
————— is one of the techniques to document domain knowledge
Page 181
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:43 (Marks:1) Vu-Topper RM
The intent of Object-Oriented Analysis(OOA) is to define:
A. All classes
B. Relationships among classes
C. Behaviour of classes
D. All of the given options
Page 182
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:47 (Marks:1) Vu-Topper RM
The goal of ———- is to translate the customer’s desire for a set of
defined capabilities into a working product.
A. Electrical engineering
B. Product engineering
C. Hardware engineering
D. Mechanical engineering
A. Whole-part relationship
B. Inheritance
C. Specialization
D. Generalization
Page 183
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. Composition
D. Abstraction Page 86
A. Functional
B. Non-functional
C. Developer
Page 184
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
D. User
Page 185
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 186
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:59 (Marks:1) Vu-Topper RM
The architecture components for product engineering are
A. Uncertainty
B. Confirmation
C. Conflict
D. Consensus
Page 187
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 188
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. Technical development
D. Status quo
Page 189
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A. Inheritance
B. Polymorphism
C. Aggregation
D. Abstraction
Page 190
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 191
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
What I know? Who
I know? What I
do?
A. A only
B. A and b
C. B ,c and D Page 102
Page 192
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 193
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A. Vision phase
B. Definition phase Page 16
C. Development phase
D. Maintenance phase
A. Domain
B. Use case
C. Object collaboration
D. None of the given options
Page 194
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 195
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Software with functional oriented design does not fulfil non
functional requirements.
C. Object oriented design can not implement “separation of concerns”
strategy
D. Function oriented design does not lead to an efficient product
Page 197
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:84 (Marks:1) Vu-Topper RM
According to Caper Jhones analysis of project activities, coding only has
——- affect part in system development.
A. 13-14%
B. 36-40%
C. 50-60%
D. 70-80%
Page 198
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:88 (Marks:1) Vu-Topper RM
In object-oriented design, layer contains the data structures
and algorithmic design for all attributes and operations for each object.
A. Subsystem
B. Responsibility Google
C. Message
D. Object
Page 199
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 200
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:92 (Marks:1) Vu-Topper RM
When you encounter both transform flow in the same DFD the flow is
partitioned and the appropriate mapping technique is used on each part
of the DFD.
A. True
B. False
Page 202
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. have the customer look over the requirements
C. Send them to the design team and see if they have any concerns
D. Use a checklist of the questions to examine each requirement
Page 203
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 204
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:101 (Marks:1) Vu-Topper RM
Specialization means:
A. Calling the same method with the object of child object
B. Hiding the data
C. Creating new subclasses for an existing class Page 86
D. None of the given options
Page 206
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Properties
C. Methods
D. All of the given option
Page 207
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A. Systematic
B. Disciplined
C. Scheduled
D. All of the given options
Page 209
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:114 (Marks:1) Vu-Topper RM
The system specification describes the:
A. Function and behavior of a computer-based system
B. Implementation of each allocated system element
C. Algorithmic detail and data structures
D. Time required for system simulation
Page 210
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 211
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. Expanding a process into one with more sub-processes giving
more detail
D. Summarizing a DFD to specify only these essentials
A. Software engineering
B. Information
C. Software
D. None of the given
Page 213
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:123 (Marks:1) Vu-Topper RM
Synchronous messages are “call events” and are denoted by ———-
A. Full arrow
B. Half arrow
C. <<create>>
D. <<destroy>>
Page 214
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Data output
C. Data input and data output
D. None of the above
A. Software architecture
B. Software Code
C. Software
D. All of the above
Page 216
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:132 (Marks:1) Vu-Topper RM
In which of the following diagram the actors and attributes are represented
with system boundary?
A. Data flow diagram
B. Entity relationship diagram
C. Class diagram
D. Use case diagram
Page 218
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. DFD diagram
C. Class diagram
D. Collaborations diagram
Page 219
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 220
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
D. All of the above
A. Unacceptable Page 19
B. Ambiguous
C. Dissatisfaction of customer
D. None of the above
Page 221
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 222
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:145 (Marks:1) Vu-Topper RM
In object-oriented analysis how many number of tasks must occurs .
A. 1
B. 2
C. 3
D. None of the above
A. Full arrow
B. Half arrow
C. <<create>>
D. <<destroy>>
Page 224
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
D. None of the given
Page 225
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:154 (Marks:1) Vu-Topper RM
Identifying whole-part structures (aggregations) means what are my
.
A. Components Page 94
B. Structures
C. Class
D. Object
A. Life line
B. Message line
C. Entities line
D. All of the above
Page 226
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 227
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
C. <<create>>
D. <<destroy>>
Page 228
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 229
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:163 (Marks:1) Vu-Topper RM
Interaction diagrams depict the behaviour of the system.
A. Static
B. Active
C. Dynamic Page 106
D. None of the given
A. EventsPage 93
B. Action
C. Triggers
D. Methods
Page 231
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Recipient
C. Garage
D. Password Page 93
Page 233
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. required for all systems
C. used in place of data flow diagrams
D. useful for modelling user interfaces
Page 235
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
following category pair(s) best describe(s) it?
A. Mutual communication.
B. Early design decisions.
C. Reusable abstraction of a system.
Page 236
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
D. All of the above Page 118
Page 237
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:182 (Marks:1) Vu-Topper RM
Software architecture is "the--------------------------of the components of a
program/system, their interrelationships,
and principles and guidelines governing their design and evolution over time."
A. combination
B. collection
C. structure Page 117
D. unification
Page 238
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:186 (Marks:1) Vu-Topper RM
The scope description establishes the ----------between the system we are
developing and everything else in the universe
A. Boundary Page 31
B. Balance
C. Constraint
D. None of the given
Page 240
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. Process Flow
C. Data store
D. Non of the given
A. Scope Page 30
B. Agreement
C. Plan
D. None of the given
A. Sequence Page 50
B. Random
C. Parallel
D. Non of above
Page 241
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 242
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:195 (Marks:1) Vu-Topper RM
----- gives OO the ability to handle essential
A. Decentralization Page 80
B. Centralization
C. Decentralization and Centralization
D. Non of above
Page 243
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 244
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:200 (Marks:1) Vu-Topper RM
The condition that must be met before the use case can be invoked, is
called:
Precondition Google
Development Page 11
Page 245
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 246
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:206 (Marks:1) Vu-Topper RM
Many of the problems encountered in Software development are
attributed to shortcoming in .
Requirement gathering Page 17
Page 247
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:211 (Marks:1) Vu-Topper RM
System are built to allow the System Engineer to evaluate the
system components in relationship to one another.
A. Models Page 42
B. Test cases
C. Documents
D. Requirements
A. Software Page 1
B. Logical Data
C. Important Data
D. Utility Software
Page 248
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 249
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:215 (Marks:1) Vu-Topper RM
Which of the given component of software engineering framework
provides different techniques that can be used to perform a particular task?
A. Tools
B. Methods Page 12
C. Processes
D. Quality Focus
A. Software
B. Logical Document
C. Physical Document
D. Relational Database
A. Tools
B. Methods
C. Processes
D. Quality Focus
Page 251
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
A. Database design.
B. User interface design.
C. Requirements structuring.
D. Requirements determination.
F. System Boundary
A. Data
B. Value
C. Conceptual
D. Information
Page 252
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
B. CRUD operations Page 53
C. RUDC operations
D. CDUR operations
A. Exposure Page 86
B. Abstraction
C. Encapsulation
D. Hierarchy or inheritance
Page 253
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
coupling and cohesion.
Page 254
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:228 (Marks:1) Vu-Topper RM
of the total cost of the software development is spent on maintenance.
A. Six third
B. Two third
C. Four third
D. Eight third
Page 255
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Page 256
Email: [email protected] VU Campus Sahiwal
WWW.VIRTUALINSPIRE.COM
Question No:232 (Marks:1) Vu-Topper RM
In UML Object Model Notation
A. Mathematical problems are visualized
B. C++ language-specific programs are constructed
C. Relationships among classes and sub-classes are
expressed Page 92
D. Graphs and tables are used to explain Software
Engineering principles
Page 257
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
1. Whole part structure is also called
a. Generalization
b. Aggregation
c. Specialization
d. Association
2. A prototype is not the real product. It is rather just a real looking of what
would be eventually delivered and might not do anything useful.
a. Mock-up page 68
b. Ad-hoc
c. Design
d. Structure
3. In "Railway ticket reservation system" the roles such as inquiry, reservation, ticketing
and cancellation are to be performed by the user called:-
a. Passenger
b. System analyst
c. System developer
d. System designer
4. A useful technique for evaluating the overall complexity of a proposedarchitecture is to
look at the component's _.
a. number and size of components
b. flow dependencies and sharing dependencies
c. size and cost
d. function points
5. _ relationship is concerned with classes not with the class instantiates.
a. Association
b. Inheritance
c. Aggregation
d. Composition
6. Software development is a step-by-step process, and in phase of software
development Business Objective of an organization gets cleared.
a. Maintenance
b. Development
c. Definition
d. Vision
7. The data on which the program operates is also considered as part of the .
a. Important Data
b. Software page 01
c. Logical Data
d. Utility Software
Page 258
0304-1659294
Email: [email protected] VU Campus Sahiwal 1
AL-JUNAID INSTITUE OF GROUP
8. From the following which is/are not the example(s) of illegal data flow in Data Flow
Diagram (DFD)
a. External Agents directly communicating with each other
b. External Agent updating information in a DataStore
c. External Agent accessing information from a Data Store
d. There must be an intermediate process which should transform data received
from one external entity and then send the transformed data to the other external
entity
9. In sequence diagram, the objects are organized in a line and the events in a
time line.
a. Horizontal, straight
b. Vertical, straight
c. Horizontal, vertical
d. Vertical, horizontal
10.Consider the following piece of code:
public class Square extends Shape {
// some code
}
The above code is an example of:
a. Part-Whole relationship
b. Generalization/Specialization
c. Data Sharing
d. Data encapsulation
11.Requirement engineering mainly deals with the _ of the system
a. Vision Phase
b. Definition Phase page 16
c. Development Phase
d. Maintenance Phase
12.A relationship indicates that one entity is composed of one or more parts which
are themselves instances of that or another entity.
a. Inheritance
b. Whole-part
c. Generalization
d. Specialization
13.In UML Object Model Notation
a. C++ language-specific programs are constructed
b. mathematical problems are visualised
c. relationships among classes and sub-classes are expressed page 92
d. Graphs and tables are used to explain Software Engineering principles
14.In the case of , intra component linkages are stronger while inter component
linkages are
weak.
a. high cohesion
Page 259
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 2
Page 260
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
b. low coupling _ thpaatgme u7s3t be remembered through time.
c. low cohesion
d. high coupling
15. Transactions are the
a. Events page 93
b. Actions
c. Triggers
d. Methods
16.The modules interacting with each other through message passing have
between them.
a. low cohesion
b. high cohesion
c. low coupling page 74
d. high coupling
17.In UML based Object Oriented model of a system, the inheritance relation between
two classes is shown by a sign towards the super-class side on the association
line between the two.
a. A filled diamond
b. An unfilled diamond
c. A half arrowhead
d. An arrowhead page 92
18.Which statement is not according to the software engineering principles? Software
engineering is a(n) .
a. Balancing act
b. Disciplined approach
c. Unsystematic approach page 5
d. Quantifiable approach
19.A is not the real product but just a real looking mock-up of what would be
eventually delivered.
a. Software
b. Program
c. Prototype(page 68)
d. Test Case
20.The best way to conduct a requirements validation review is to
a. examine the system model for errors
b. have the customer look over the requirements
c. send them to the design team and see if they have any concerns
d. use a checklist of questions to examine each requirement
21.More powerful hardware resulted into the development of powerful and
software.
a. less, complex
b. more, complex page 4
c. more, simple
Page 261
Email: [email protected] VU Campus Sahiwal
0304-1659294 3
AL-JUNAID INSTITUE OF GROUP
d. less, simple
Page 262
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 4
Page 263
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
22._ pointed out the elegant conceptual integrity exhibited by layered
organization of software systems, with the resulting gains in development and
maintenance ease.
a. David Parnas
b. Shaw and Garlan
c. Barry Boehm
d. EdsgerDijkstra page 115
23.The architecture components for product engineering are
a. data, hardware, software, people
b. data, documentation, hardware, software
c. data, hardware, software, procedures
d. documentation, hardware, people, procedures
24.In Object oriented design, combining the services offered by an object with the
attributes they work on, results in:
a) Lower coupling and stronger cohesion
b) Lower cohesion and stronger coupling
c) Increased likelihood of reuse
d) Decreases the modularity of the system
a. a only
b. band c
c. a and c
d. b and d
25.Architectural design process involves performing a number of activities which includes
system structuring, control modeling and .
a. System Analysis
b. Modular Decomposition page 120
c. Testing
d. Graphical User Interface
26.In use case diagram, the scope of the system is defined by:
a. Actor
b. Entity
c. System Boundary
d. "Extends"
relationship 27.Specialization
means
a. Calling the same method with object of child object
b. Hiding the data
c. Creating new subclasses from an existing class page 34 , 86
d. Abstraction
28.Which of the following sentence is true regarding user interface design?
a. GUI interfaces are good for all tasks which a user needs to perform at an
interface.
b. The higher the response time, the better is the
interface c. The simpler the interface, the efficient is the
system Page 264
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 5
Page 265
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
d. Command-line interfaces are faster for some tasks which the user needs to
perform
Page 266
Email: [email protected] VU Campus Sahiwal
0304-1659294 6
AL-JUNAID INSTITUE OF GROUP
29.In the architecture trade-off analysis method the architectural style should be described
using the
a. data Flow view and process view
b. data Flow view and module view
c. module view and process view
d. data Flow view, module view and process view page 136
30.In Data Flow Diagram, the entity or system, outside the boundary of this system is
called
a. Process
b. Data Flow
c. External Agent
d. Data Store
31.A cohesive Class is one which emphasizes on unit of functionality
a. Single
b. Multiple page 76
c. Static
d. Both Single and Multiple
32.The goal of is to translate the customer's desire for a set of defined
capabilities into a working product.
a. Electrical Engineering
b. Product Engineering
c. Hardware Engineering
d. Mechanical Engineering
33.In Object Oriented Design. layer contains the details that enable each object
to communicate with its collaborators
a. Subsystem
b. Responsibility
c. Message page 89
d. Object
34.A DFD is normally leveled (adding more levels of abstraction) as
a. it is a good idea in design
b. it is recommended by many experts
c. it is easy to do it
d. it is easier to read and understand a number of smaller DFDs than one large
DFD
35.As per Peter Coad's methodology, which of the following may NOT be a perfect
candidate for being an object?
a. Zone
b. Recipient
c. Garage
d. Password page 93 94
Page 267
0304-1659294
Email: [email protected] VU Campus Sahiwal 7
AL-JUNAID INSTITUE OF GROUP
36.Which of the given component of software engineering framework provides different
techniques that can be used to perform a particular task?
a. Processes
b. Tools
c. Methods page 12
d. Quality Focus
37.To determine the architectural style or combination of styles that best fits the Proposed
system requirements engineering is used to uncover
a. algorithmic complexity
b. characteristics and constraints page 126
c. control and data
d. design patterns
38.In _relationship, a class shares the structure and behavior defined in another
class.
a. Aggregation
b. Composition
c. Inheritance page 86
d. Uses
39.Prototyping is used when there is regarding requirements.
a. Uncertainty(page 68)
b. Confirmation
c. Conflict
d. Consensus
40.The process of utilizing our knowledge of computer science in effective production of
software systems is called
a. Chemical Engineering
b. Electrical Engineering
c. Computer Engineering
d. Software Engineering page 2
41.In Abbot's Textual Analysis technique, different parts of speech are identified
within the text of the specification and these parts are modeled using different
a. Event
b. Process
c. Operations
d. Components page 90
42.To help separate an object's external behavior from its implementation, the technique
used is called
a. Generalization
b. Association
c. Composition
d. Abstraction page 86
Page 268
0304-1659294
Email: [email protected] VU Campus Sahiwal 8
AL-JUNAID INSTITUE OF GROUP
43.A Process in Data Flow Diagram (DFD) represents
a. Flow of data
b. Transformation of data (page 49)
c. Storage of data
d. An external agent
44.In data flow diagram (DFD). Create, Update, Delete and Read operations are normally
called:
a. CRUD operations page 53
b. DURC operations
c. RUDC operations
d. CDUR operation
45.Collaboration diagram can show
a) Binary messages
b) Asynchronous messages
c) Synchronous messages
a. a only
b. b only
c. c only
d. both b and c page 111
46.Data cannot flow from one external entity to other external entity because
a. It will get corrupted
b. It is not allowed in DFD page 59
c. An external entity has no mechanism to read or write
d. Both are outside the context of the system
47.In Phase of software development, Requirement Engineer focuses on realizing
the Business Object of an under developed product.
a. Maintenance
b. Development page 16
c. Definition
d. Vision
48.Which of the following is not part of software architecture?
a. Databases
b. data design
c. program
structure d.
algorithm details
49.Selecting objects in a domain) include:
a. Actors. Participants and Places
b. Only Participants
c. Only Actors
d. Only Actors and Places
50.Defining the services of an object means:
a. What it does? Page 96
b. What it knows?
Page 269
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 9
Page 270
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
c. Who knows it?
d. Whom it knows?
Page 271
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 10
Page 272
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
51.In sequence diagram, the solid lines depict:
a. Objects (or classes)
b. Messages being sent from one object to the other page 107
c. Life-time of an object
d. state of the
object 52.Sequence
diagrams:
a. Provide the static behavior
b. Provide Data Flow
c. Provide a time-based view 106
d. Provide parallel data flow
53. requirements cause frequent modifications in user interface
a. Functional
b. Non-functional
c. Unstable page 62
d. User
54., security and maintainability are the types of requirements.
a. Non-functional page 120
b. Domain
c. Functional
d. Business
55. A change because of close presence of data and functions
becomes
a. Accessible
b. Global
c. Private
d. Localized page 81
56.System are built to allow the system engineer to evaluate the
system components in relationship to one another.
a. Requirements
b. Documents
c. Models page 42
d. Test cases
57.In phase of software development, requirement analyst focuses on possible
design of the proposed solution.
a. Maintenance
b. Development (page 16)
c. Definition
d. Vision
58.The focus of sequence diagrams is:
a. On objects/classes and messages exchanged among them (page 106)
b. On static Model of system
c. On object constraints
d. On the flow of Control
Page 273
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 11
Page 274
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
59.In Data Flow Diagram (DFD), data flow can:
a. Only originate from an external entity
b. Only terminate in an external entity
c. Originate and terminate in an external entity
d. Either originate or terminate in an externalentity but not both
60.In the analyst determines all the sources of requirements and where do
theserequirements consume
a. Data Flow Analysis
b. Source and Sink Analysis (page 40)
c. Down Parsing
d. Up Parsing
61.In a top-down system analysis, a/an required to develop high level view of
thesystem at first.
a. Analyst page 54
b. Designer
c. Tester
d. Developer
62.The Use case diagram shows that which _ interact with each use case.
a. Use case
b. Actor page 32
c. Component
d. Relation
63.The context diagram is used as the top levelabstraction in a developed
according toprinciples of structured analysis.
a. Dataflow diagram (page 31)
b. Activity Diagram
c. State Transition Diagram
d. Use Case Diagram
64.Different messages in sequence diagrams includes:
a. Simple
b. Asynchronous
c. Notify
d. Both Simple and Asynchronous page 108
65.A software requirement document describes all the provided by the system
along with the constraints under which it must operate.
a. Conditions
b. Services page 23
c. Events
d. Processes
66.In case of a message, the called routine that handles the message iscompleted
before the caller resumes execution.
a) Synchronous
b) Asynchronous
c) Bidirectional
a. a only page 108
Page 275
Email: [email protected] VU Campus Sahiwal
0304-1659294 12
AL-JUNAID INSTITUE OF GROUP
b. b only
c. c only
d. both b and c
Page 276
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 13
Page 277
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
67.In object oriented design, layer contains the data structures and
algorithmic design for all attributes and operations for each object.
a. Subsystem
b. Class and Object
c. Message
d. Responsibility page 89
68.Asynchronous messages:
a. are implemented as operation call
b. These block caller before response
c. occurs in multi-threaded applications (page 109)
d. are shown by dotted line
69.In UML based object oriented model of a system, a composition relation between two
objects is shown by a sign on the whole side of a relation line.
a. An unfilled diamond
b. A filled diamond
c. A half diamond
d. A dot
70.In UML based Object Oriented Model of a system, the diamond sign is used to depict
relations between two objects/classes.
a. Aggregation and Association
b. Inheritance and Association
c. Composition and Aggregation
d. Composition, Aggregation and Association
71.A “register” in “Point of sale system” is an example of:
a. Actor
b. Participant
c. Tangible thing page 100
d. Transaction
72.A use case represents
a. A class, it attributes and operation
b. An operation’s inter faces and signature
c. The role a user plays when interaction with the system page 32
d. The system’s functionality for a particular purpose
73.In the case of approach, data is decomposed according to functionality
requirements.
a. Object-oriented
b. Action-oriented page 80
c. Event-oriented
d. Process-oriented
74.To construct a system model the engineer should consider one of the following
restraining factors?
a. Assumptions and constraints
b. Budget and expenses
c. Data object and operation
Page 278
0304-1659294
Email: [email protected] VU Campus Sahiwal 14
AL-JUNAID INSTITUE OF GROUP
d. Schedule and milestone
Page 279
Email: [email protected] VU Campus Sahiwal
0304-1659294 15
AL-JUNAID INSTITUE OF GROUP
75.When two components of a system are using the same global data area, they are related
as
a. Data coupling
b. Content coupling
c. Common coupling google
d. External coupling
76.Structure represents the internal organization of the various data and control items.
a. Data
b. Value
c. Information
d. Conceptual
77.The method of dividing and assigning different portions of a large system to
different groups for construction is called _
a. Work Breakdown Structure (page 119)
b. Working Boundary Structure
c. Work Basic Structure
d. Work Breakdown System
78."A car is made up of a body, three or four wheels, a steering mechanism. a breaking
mechanism and a power-engine"
The above statement is example of :
a. Whole-Part relationship page 95
b. Inheritance
c. Specialization
d. Generalization
79.In software engineering paradigm, any engineering approach must be founded on
organizational commitment to .
a. Cost
b. Scheduling
c. Quality (page 15)
d. Performance
80.is a technique that can be used to reduce customer dissatisfaction at
requirement stage.
a. Analysis
b. Negotiation
c. Prototyping (page 71)
d. GUI
81.Which of the following activities are included in the design process of a software
architecture _?
a. System Development and Deployment
b. Architectural Analysis and Testing
c. Requirement Specifications of the system
d. System Structuring and Modular Decomposition
Page 280
0304-1659294 16
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
82.In UML based Object Oriented model of a system, the association relation between
two objects is depicted by .
a. A straight line
b. A filled diamond sign on the whole side of the line
c. An unfilled diamond sign on the whole side of the line
d. Any arrowhead sign on one side of the line
83.are kind of umbrella activities that are used to smoothly and successfully perform
the construction activities
a. Designee activities
b. Management activities (page 14)
c. Testing activities
d. Maintenance activities
84.Software Design discusses aspect of software development
a. What
b. How
c. Who
d. When
85.Include and extend relationship is used in UML notation of a/an .
a. Activity Diagram
b. Data Flow Diagram
c. Entity Relationship Diagram
d. Use Case Model
86.External Entity may be
a. source of input data only
b. source of input data or destination of results
c. destination of results only
d. repository of data
87.An object model of a system captures the structure of a system.
a. Static page 93
b. dynamic
c. iterative
d. Hierarchical
88.The criteria used to assess the quality of an architectural design should be based on
system
a. accessibility and
reliability b. data and control
c. functionality
d. implementation details
89.In case of approach, decomposition of a problem revolves around data
a. Object-oriented
b. Action-oriented page 80
c. Event-oriented
Page 281
0304-1659294
Email: [email protected] VU Campus Sahiwal 17
AL-JUNAID INSTITUE OF GROUP
d. Process-oriented
Page 282
Email: [email protected] VU Campus Sahiwal
0304-1659294 18
AL-JUNAID INSTITUE OF GROUP
90.How can we implement generalization in Object Oriented programming languages?
a. Polymorphism
b. Encapsulation
c. Abstraction
d. Inheritance
91.Which of the following is NOT among one of the four layers of the Object Oriented
(OO) design pyramid
a. The subsystem layer
b. The class and object layer
c. The Abstract layer page 89
d. The message layer
92.is a technique in which we construct a model of an entity based upon its essential
characteristics and ignore the inessential details.
a. Inheritance
b. Polymorphism
c. Aggregation
d. Abstraction page 79
93.The project manager would need document to monitor and track the progress
of the project.
a. Design
b. Project
c. Requirement page 18
d. Planning
94.In the case of action-oriented approach data is decomposed according to:
a. Object requirements
b. Functionality requirements
c. Corresponding domain model
d. Compatibility with object interface
95.An architectural style encompasses which of the following elements?
a. Constraints, Set of Components and Semantic Models page 126
b. Set of Components and Semantic Models
c. Semantic Models and Constraints
d. Set of Components and Constraints
96.In order to determine the role and responsibilities of the identified objects, we need
to consider which of the following step(s):
a) Who I am?
b) What I know?
c) Who I know?
d) What I do?
a. a only
b. a and b
c. b, cand d page 102
d. cand d
Page 283
Email: [email protected] VU Campus Sahiwal
0304-1659294 19
AL-JUNAID INSTITUE OF GROUP
97.In sequence diagram, the boxes denote:
a. Objects (or classes) page 106
b. Messages, sent from one object to other
c. Life-time of Objects
d. Relationships
98.is a system component that provides services to other components but would not
normally be considered as a separate system.
a. Method
b. Module page 121
c. Message
d. Relationship
99. A tangible entity in the real life is called .
a. Functions
b. Object page 85
c. Class
d. Sub-Class
100. Sequence of messages can be present in:
a) Use case diagram
b) Sequence diagram
c) Collaboration diagram
a. a only
b. b only
c. c only
d. b and c
101. The system model template contains which of the following elements
a. Input
b. Output
c. System Out
d. Input/Output
102. Identify the TRUE statement:
a. Normally Object Oriented design is more maintainable than functional oriented.
b. Software with Functional oriented design does not fulfill non functional
requirements.
c. Object Oriented design cannot implement "Separation of concerns" strategy
d. Function Oriented design does not lead to an efficient product
103. An external entity that interacts with a system is called a(n):
a. Use case
b. Actor
c. Stakeholder
d. Association
104. By levelling a DFD (adding more levels of abstraction) we mean
a. Splitting it into different levels
b. Make its structure uniform
Page 284
0304-1659294
Email: [email protected] VU Campus Sahiwal 20
AL-JUNAID INSTITUE OF GROUP
c. Expanding a process into one with more sub-processes giving more detail
d. Summarizing a DFD to specify only the essentials
Page 285
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 21
Page 286
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
105. Software Engineering is the combination of tools, techniques and .
a. Testing
b. Processes page 6
c. Maintenance
d. Design
106. _ is concerned with decomposing a system into interacting sub-
systems.
a. System Structuring
b. Control Modeling
c. Modular Decomposition page 121
d. Work Breakdown Structure
107. There are most important characteristics of an object.
a. Six
b. Four
c. Two
d. Three
108. “System should maintain transaction log of every transaction”
The above statement is an example of
a. Functional requirement
b. Non-functional requirement
c. Pseudo requirement
d. Both Non-functional and Pseudo requirements
109. In object oriented approach, are the people and organizations that
take part in the system under consideration.
a. Actors
b. Places
c. Participants
d. Tangible things
110. The modules that interact with each other through message passing have
.
a. Low coupling page 73
b. High coupling
c. Low cohesion
d. High cohesion
111. Identifying Whole-part structures (Aggregations) means what are my
a.
Components page 94
b.
Attributes
c.
Methods
d.
Messages
112. In “point of sale system “ the term payment represents
a. Actor
b. Participant
Page 287
0304-1659294
Email: [email protected] VU Campus Sahiwal 22
AL-JUNAID INSTITUE OF GROUP
c. Transaction (page 99)
d. Container
Page 288
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
0304-1659294 23
Page 289
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
113. Return values in synchronous messages are:
a. Compulsory
b. May not used when response is obvious (page 109)
c. Not used at all
d. Represented by solid lines
114. GUI stand for
a. Generic user interface
b. Graphic user interface
c. Generic user interaction
d. Graphical user interaction
115. Which of the following is not the object model principle?
a. Abstraction
b. Encapsulation
c. Hierarchy or inheritance
d. Exposure page 86
116. The system specification describes the
a. function and behavior of a computer-based system
b. implementation of each allocated system element
c. algorithmic detail and data structures
d. time required for system simulation
117. The provides the software engineer with a viewof the system as a
whole.
a. Process Model
b. Architectural Model
c. Business model
d. Requirements Model
118. Requirement engineering focuses on aspect of the software
development process.
a. Both what and how
b. What
c. How
d. why and how
119. An arrow in Data Flow Diagram (DFD) represents
a. Direction of flow of data
b. Processing of data
c. External agent
d. Internal agent
120. The relationship is kind of a generalization specialization
relationship.
a. Bit-Byte
b. Uses
c. Binary
d. Extends
Page 290
0304-1659294
Email: [email protected] VU Campus Sahiwal 24
AL-JUNAID INSTITUE OF GROUP
121. In the case of _ in a system, module boundaries are not well defined.
a. low cohesion
b. high coupling
c. low coupling
d. high cohesion
122. Component of software engineering framework provides automated
or semi-automated support in a software development.
a. Processes
b. Methods
c. Quality
Focus d. Tools
123. In Data Flow Diagram (DFD), one data store cannot directly copy the data from
another .
a. Agent
b. Process
c. Data store
d. Flow
124. All the documents related to the software are alsoconsidered as partof the
.
a. Physical Document
b. Logical Document
c. Relational
Database d. Software
125. Which elements of business processing engineering are the responsibilities of
the software engineer?
a. business area analysis
b. business system design
c. product planning
d. information strategy planning
126. A class will be cohesive if:
a. Class does not implement Complex interfaces
b. Class does not have complex methods
c. If most of the methods do not use most of the data members most of the time
d. If most of the methods use most of the data members most of the time
127. A context diagram is used
a. As the first step in developing a detailed DFD of a system
b. In systems analysis of very complex systems
c. As an aid to system design
d. As an aid to programmers
d. Association
a. Aggregation b.
Abstraction
c. Inheritance
Page 291
Email: [email protected] VU Campus Sahiwal
0304-1659294 25
AL-JUNAID INSTITUE OF GROUP
_ is an extremely powerful
technique for dealing with
complexity.
Page 292
Email: [email protected] VU Campus Sahiwal
0304-1659294 26
AL-JUNAID INSTITUE OF GROUP
129. In multiprocessing applications, different execution threads may pass
information to one another by sending to each other.
a. Interrupt calls
b. Synchronous messages
c. Asynchronous messages
d. System calls
130. Normally a system is more easy to modify if its modules have
a. High coupling and high cohesion
b. High coupling and low cohesion
c. Low coupling and high cohesion
d. Low coupling and Low cohesion
131. UML is a language for
a. High-level Programming
b. Low-level Programming
c. Modeling and Design
d. Creating diagrams only
132. is not the part of Peter Coad methodology
a. Select actors
b. Select participants
c. Select places
d. Select actions
133. Which of the following is the external quality of software product?
a. Correctness
b. Concision
c. cohesion
d. Low coupling
134. While establishing the services for an object, the goal is to keep data and
action together for coupling and cohesion
a. Lower, Higher
b. Higher, Lower
c. Lower, Lower
d. Higher, Higher
135. A necessary supplement to transform or transaction mapping needed
to create a complete architectural design is
a. entity relationship diagrams
b. the data dictionary
c. processing narratives for each module
d. test cases for each module
136. Construction activities are directly related to software .
a. Management
b. Planning
c. Quality Assurance
d. Development
Page 293
Email: [email protected] VU Campus Sahiwal
0304-1659294 27
AL-JUNAID INSTITUE OF GROUP
137. OOD results in a design that achieves a number of different levels of
.
a. Operation
b. Event page 89
c. Modularity
d. Process
138. At which stage of software development loop, results are delivered?
a. Problem definition
b. Solution integration
c. Technical development
d. Status quo
Requirements are often called product features.
a. Functional
b. Non-functional
c. Developer
d. User
140. Strong cohesion implies that
a. All parts of component have a class logical relationship with each other
b. All part of component do not have a close logical relationship with each other
c. Component is dynamic in nature
d. Component is static in nature
141. Diagram does not capture control flow information; it just
shows the flow of the data in a system.
a. Sequence
b. Data Flow
c. Activity
d. Class
142. A life line represents the object's life during the interaction in a
sequence diagram while its notation is depicted by
a. Solid Lines
b. Dotted Lines
c. Full Arrow
d. Curved Lines
143. An attribute that varies over time, e.g. price of an item, should be
replaced by a/an _ with an effective date and value
a. Additional Class
b. Additional Method/Function
c. Interface
d. Structure
144. Which of the given component of software engineering framework
demands rational and Timely development of a software?
a. Tools
b. Methods
c. Quality Focus
Page 294
0304-1659294
Email: [email protected] VU Campus Sahiwal 28
AL-JUNAID INSTITUE OF GROUP
d. Processes
Page 295
Email: [email protected] VU Campus Sahiwal
0304-1659294 29
AL-JUNAID INSTITUE OF GROUP
145. A context diagram
a. describes detailed design of a system
b. is a DFD which gives an overview of the system
c. is a detailed description of a system
d. is not used in drawing a detailed DFD
146. Which one is not a part of Software Development phase?
a. Construction
b. Scope My Point of View
c. Project Vision
d. Definition
147. Software architecture must address requirement of a software
system
a. Functional
b. Non Functional
c. User interface Requirements
d. Both Functional and Non Functional
Page 296
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
148. If Cat is derived from Mammal Class, and Mammal is derived
from Animal Class, then:
a. Cat will inherit Animal's functions and data
b. Cat will not inherit Animal's functions and data
c. Cat will not be able to access any class
d. Cat is allowed to access only the Mammal's Class
149. Which of the following is not supported by a maintainable design?
a. Change
b. debugging
c. Adding new features
d. Higher maintenance cost
150. The condition that must be met before the use case can be invoked,
is called:
a. Pre-Condition
b. Post-Condition
c. Pre-Assertion
d. Post-Assertion
The vision statement should reflect a balanced view that will satisfy the need of diverse
customers.
Use cases describe the system as a ___________________ and hide the internal details from the user.
Black box
White box
Key box
Inbox
Page 297
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
_______________ design decisions should be ones that remain constant in software development
cycle.
Early
Late
Heterogeneous
Both a and b
The data model consists of three pieces of interrelated information. Which of the following is not
a piece of interrelated information?
Attribute
Data objects
Relationships
Controls
SEARCH
Pages
Home
All (Mid + Final) Past Papers
All Recent Papers
Page 298
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Lecture Handouts
VU Lectures
More…
Writing test cases and generating test data are processes that demand __________ building
capabilities.
Code
Page 299
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Domain
System
What types of errors are missed by black-box testing and can be uncovered by whitebox
testing?
Runtime errors
Performance errors
Input errors
The cyclomatic complexity metric provides the designer with information regarding the
number of ___________.
The best reason for using Independent software test teams is that
Testers do not get involved with the project until testing begins
__________ is intended to define a many to many relationship between objects so that when
Page 300
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
one object changes state all its dependants are notified and updated automatically.
Facade Pattren
Singleton Pattren
Joint Pattren
________ ensures that a class only has one instance and provides a global point of access to
it.
Behavioral Pattern
Joint Pattern
Observer Pattern
Business
User
Functional
Secondary private classes can be declared as __________ and reside in the file of the class
Asynchronous Classes
Outer classes
Synchronous classes
Page 301
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The construction should appear at the __________ of the header file.
Bottom
Left
Right
Return
Semi colon
Full stop
Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Increasing
Strengthening
Abstraction and encapsulation are two important tools that can help in managing and
Usability
Understandability
Reliability
Page 302
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
One of the guidelines to avoid common mistakes is to never use ________ except for
declaration.
||
Requirement analysis
Architecture design
Class diagram
……………… is a diagramming technique used to identify the types of objects in the system
Which one is NOT a type of messages which Sequence Diagrams Depict _______
Asynchronous
Synchronous
Create
Structures
Modules
Interaction Protocols
The design process for identifying the sub-systems making up a system and the
Interface Design
Component Design
Data Design
Smaller system
Bigger system
Page 304
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Medium system
No
Low
Equal
A situation in which large scale software projects took more time and budget than
was planned
Functional validity
Page 305
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Interface integrity
Correctness
For inspections, --------------- are prepared that contain information regarding defects.
Tables
Lists
Frames
Analysis text
Design text
Maintainence Text
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
Target
Reason
Source
systems?
Page 306
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Vast use of personal computers. (correct)
Software Bugs have multiple names. Which one of the below is not the name of Software
Bugs?
Bugs
Defects
Errors
Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
Circuit level
Component level
System level
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
Functions
Objects
Interfaces
Page 307
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
___________ are used to describe flow of data or control in an application.
Code structures
String matching.
Paths
Writing test cases and generating test data are processes that demand __________ building
capabilities.
Domain
System
Code
The raising of the imaginary error flag is simply called raising or _________ an error.
Sending
Casting
Handling
Functional
User
Non-functional
Page 308
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
Float
Character
Double
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be shared, repository model is used. This model has
Super Computers
Personal Computers
Real time
There are four basic coding structures: sequence, if statement, case statement, and
___________.
For loop
Logical operations
___________ is only a reference for defining protocols and designing and implementing
OSI model
Layered architecture
N-tier architecture
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
1988
1962
1995
________ ensures that a class only has one instance and provides a global point of access to
it.
Observer Pattern
Behavioral Pattern
Joint Pattern
Singleton
Observer
Joint
Testing activities require destructive instincts in __________ for the purpose of breaking
Bug Fixers
Developer
Requirement Engineer
Camel Case is now the official convention for file names and identifiers in the ________
Page 311
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
programming language.
C#
C++
Visual Basic.Net
In presence of _________ bug in a program, the results are the opposite of what is
expected.
Memory Leak
Memory Over-runs
Syntax Error
Split lines occur when a statement exceed the _______ column limit.
90
95
85
Writability
Reliability
Usability
Page 312
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
"is" prefix should be used for__________ variables and methods.
Static
General
Constant
Design
Analysis
Requirements
Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Increasing
Strengthening
When planning for performance, one should always remember the _______ rule.
70/20
60/20
100/20
Which of the items listed below is NOT one of the software engineering layers?
Page 313
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Tools
Process
Methods
songs?
A catalogue of the stock needs to be available for the users to choose from
Users should be able to choose from a set of different languages for the interface
Time taken to download songs in the catalogue should not irritate users (correct)
Prototyping _____
Page 314
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Ensures getting the design right the first time
Is the execution of the standard systems development cycle using CASE tools.
Components
Modules
Interaction Protocols
their interrelationships, and principles and guidelines governing their design and evolution
over time".
Combination
Collection
Unification
Page 315
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Perry and Wolfe proposed the following formula for software architecture:
Local
General
Private
In the case of zero-install, the network environment is used to ______ server side
Centeralize
Shift
De-Synchronize
Mathematical specification
System Specification
Cost Specification
Page 316
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Which of the following is not a fundamental structured programming construct?
Condition
Repetition
Sequence
equal strings
Functional validity
Interface integrity
Correctness
Analysis text
Design text
Maintainence Text
Page 317
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The first “bug” was actually a moth, which flew through an open window and into one of
III
IV
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
Target
Reason
Source
Process Team
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
External memory
Mixed memory
Equivalence __________ help you in designing test cases to test the system
Functions
Objects
Interfaces
Code structures
String matchings
Paths
Functional
Page 319
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Business (correct)
User
Non-functional
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be shared, repository model is used. This model has
Super Computers
Personal Computers
Real time
Idea of zero install architecture is to develop a system where no installation on the _____
is needed.
Server Side
Network
___________ is only a reference for defining protocols and designing and implementing
Page 320
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
systems developed by different parties.
OSI model
Layered architecture
N-tier architecture
Description of communicating objects and classes that are customized to solve a general
System Pattren
System Design
Design System
Which of the following is the correct formula for calculating cyclomatic complexity of a
program ?
V-N+2
E-V+2
E+N–2
In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Business
Functional
User
The process of executing a program with the intent of finding errors (correct)
Runtime Error
Memory Leak
Exception
Secondary private classes can be declared as __________ and reside in the file of the class
Asynchronous Classes
Outer classes
Page 322
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Synchronous classes
Split lines occur when a statement exceed the _______ column limit.
90
95
85
Writability
Reliability
Usability
Names representing methods and functions should be ________ and written in mixed case
Noun, Lower
Noun, Upper
Verb, Upper
Static
General
If you are initializing a variable at the time of declaration, do not declare another
Object
Class
Module
Private
Global
Accessible
Flow of information
Page 324
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Cost estimation
Requirements gathering
Coding
Testing
Not reusable
Structural in nature
Local
General
Private
Layered Architecture
Keeping in mind the use case diagram, and above scenario the one of the post conditions
might be:
No
Low
Equal
One of the most powerful features of exception handling is that an error can be ----------
Called back
Caught
Sent
Two tests are considered to be equivalent if it is believed that: if one discovers a defect,
the other probably will too, and if one does not discover a defect, ---------------------------------.
Page 327
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The other probably may
equal strings
Black Box
System
Regression
Analysis text
Design text
Maintainence Text
Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
Page 328
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
tested thoroughly after manufacturing.
Circuit level
Component level
System level
20.A SRS is said to be __________ if and only if, every requirement stated therein has only one
interpretation.
Compact
Consistant
Detailed
In Java, ">>" is used for _______ shift and ">>>" for _________ shift
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
Error
Exception
Mistake
Page 329
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
st cases should be generated for unit testing and system testing during _________.
Requirement analysis
needed.
Server Side
Network
Core layer
Application layer
UI layer
26.patterns are devices that allow programs to share knowledge about their ___________.
Code
Analysis
Testing
Page 330
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
Singleton
Observer
Joint
In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Hidden
Business
User
Functional
Business
Functional
User
Page 331
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Inspections may be applied to any representation of the system which may include all
except __________.
Requirements
Design
Testing
Runtime Error
Memory Leak
Exception
Ideally speaking, a function should not be larger than _________lines of code and in any
15
30
25 Page 332
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
CamelCase is now the official convention for file names and identifiers in the ________
programming language.
C#
C++
Visual Basic.Net
Split lines occur when a statement exceed the _______ column limit.
90
95
85
Bottom
Left
Right
Writability
Usability
Maintainability
Page 333
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
One of the guidelines to avoid common mistakes is to never use ________ except for declar
||
When planning for performance, one should always remember the _______ rule.
70/20
60/20
100/20
Following are some statements associated with data flow diagrams. Identify the correct
DFDs are used to represent only functional processing, data stores and data movements
between functions.
DFDs do not show external data sources and external data sinks.
The system was delivered in time and within budget. (correct)
The system development process has a maximum impact on the ongoing business process.
Page 334
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Minimum time was spent for requirement gathering and designing.
Core process
Secondary process
Zombie process
Describes how data flows from one logical processing unit to another (correct)
Class diagram
The collection of use cases for a system constitutes all the defined ways the system may be
used.
State transition diagrams are drawn for objects with no significant dynamic behavior.
Page 335
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Object Model depicts the dynamic behavior of system (correct)
Not reusable
Structural in nature
To determine the architectural style or combination of styles that best fits the proposed
Algorithmic complexity
Design patterns
Krutchen’s 4+1 architectural view model proposes the development of ______ main views
Local
General
Page 336
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Private
Centralize
Process in parallel
Combine
We can divide the whole Software Engineering process in 4 distinct phases namely
Which of the following is not among “Definition related” activities of software development?
Requirement verification
Requirement Engineering
Software Requirements
A situation in which large scale software projects took more time and budget than
was planned
Which writing style is best regarding identifier role in enhancing the readability of a
program?
If (Flag = = 0)
If (Flag = = START_NUMBER)
If (Z= =0)
Algorithms used
equal strings
Page 338
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
In -------------- testing we test the structure of the program.
Black Box
System
Regression
Functional validity
Interface integrity
Correctness
Inspections can check conformance with a specification but not conformance with the ---
----------requirements.
Developer
Tester
Manger
Analysis text
Design text
Maintenance Text
Page 339
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
Target
Reason
Source
Defects are more likely to arise after software has been used often (correct)
development.
Equal
Sequential
In contrast
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
Mixed memory
External memory
Code structures
String matchings
Paths
Initial
Secondary
Last
Middle
Which of the following is not among directly related construction activities of software
development?
Management
Testing
Requirement Elicitation
Design development
Page 343
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The nature of software applications can be characterized by their information
complexity
content
determinacy
Cohesion is an internal property of a module whereas coupling is its relationship with other modules.
Folder
Bin
Student
Size
True
A)
False
B)
3 CORRECT
Software is a product and can be manufactured using the same technologies
used for other engineering artifacts.
True
A)
False
B)
4
INCORRECT Software deteriorates rather than wears out because
Defects are more likely to arise after software has been used often
B)
Page 345
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
Off-the-shelf software components are unavailable in many application domains.
D)
6
INCORRECT The nature of software applications can be characterized by their information
complexity
A)
content
B)
determinacy
C)
both b and c
D)
7
INCORRECT Modern software applications are so complex that it is hard to develop mutually exclusive category
names.
True
A)
False
B)
8 CORRECT
The so called "new economy" that gripped commerce and finance during the
1990s died and no longer influences decisions made by businesses and software engineers.
True
A)
False
B)
9 CORRECT
The functionality of most computer systems does not need to be enhanced the
lifetime of the system.
True
A)
False
B)
10
CORRECT Change cannot be easily accommodated in most software systems, unless the system was designed
with change in mind.
True
A)
False
B)
11
INCORRECT Most software development projects are initiated to try to meet some business need.
True
A)
False
Page 346
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
12
CORRECT In general software only succeeds if its behavior is consistent with the objectives of its designers.
True
A)
False
B)
Lecture-02
Process
A)
Manufacturing
B)
Methods
C)
Tools
D)
Feedback:
2
INCORRECT Software engineering umbrella activities are only applied during the initial phases of
software development projects.
True
A)
False
B)
Feedback:
3 CORRECT
Which of these are the 5 generic software engineering framework activities?
4
Process models are described as agile because they
Page 347
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
INCORRECT
eliminate the need for cumbersome documentation
A)
5
INCORRECT Which of these terms are level names in the Capability Maturity Model?
Performed
A)
Repeated
B)
Reused
C)
Optimized
D)
both a and d
E)
Feedback:
6 CORRECT
Software processes can be constructed out of pre-existing software patterns to
best meet the needs of a software project.
True
A)
False
B)
Feedback:
7
INCORRECT Which of these are standards for assessing software processes?
SEI
A)
SPICE
B)
ISO 19002
C)
ISO 9001
D)
both b and d
E)
Feedback:
Page 348
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
8 CORRECT
The best software process model is one that has been created by the people who
will actually be doing the work.
True
A)
False
B)
Feedback:
9
INCORRECT Which of these is not a characteristic of Personal Software Process?
10
INCORRECT Which of these are objectives of Team Software Process?
both b and c
E)
Feedback:
11
INCORRECT Process technology tools allow software organizations to compress schedules by skipping
unimportant activities.
True
A)
False
B)
Feedback:
12
CORRECT It is generally accepted that one cannot have weak software processes and create high quality
end products.
True
Page 349
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
Lecture-03
The correct answer for each question is indicated by a .
1
INCORRECT The linear sequential model of software development is
The best approach to use for projects with large development teams.
C)
2
INCORRECT The linear sequential model of software development is also known as the
Fountain model
B)
Spiral model
C)
Waterfall model
D)
both a and d
E)
Feedback:
3 CORRECT
The incremental model of software development is
The best approach to use for projects with large development teams.
C)
Page 350
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
INCORRECT The rapid application development model is
5
INCORRECT Evolutionary software process models
6
INCORRECT The prototyping model of software development is
The best approach to use for projects with large development teams.
C)
7
INCORRECT The spiral model of software development
Page 351
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
8
INCORRECT The concurrent development model is
9
INCORRECT The component-based development model is
10
INCORRECT The formal methods model of software development makes use of mathematical methods to
11
INCORRECT Which of these is not one of the phase names defined by the Unified Process model for software
development?
Inception phase
A)
Elaboration phase
B)
Construction phase
C)
Validation phase
D)
Page 352
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Feedback:
12
CORRECT In the Unified Process model requirements are determined iteratively and may span more than one
phase of the process.
True
A)
False
B)
Lecture-04
The correct answer for each question is indicated by a.
1 CORRECT
Agility is nothing more than the ability of a project team to respond
rapidly to change.
True
A)
False
B)
2
INCORRECT Which of the following is not necessary to apply agility to a software
process?
Eliminate the use of project planning and testing
A)
Only essential work products are produced
B)
Process allows team to streamline tasks
C)
Uses incremental product delivery strategy
D)
3
INCORRECT How do you create agile processes to manage unpredictability?
Requirements gathering must be conducted very carefully
A)
Risk analysis must be conducted before planning takes place
B)
Software increments must be delivered in short time periods
C)
Software processes must adapt to changes incrementally
D)
both c and d
Page 353
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
E)
4 CORRECT
In agile software processes the highest priority is to satisfy the
customer through early and continuous delivery of valuable
software.
True
Page 354
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
5
INCORRECT It is not possible to build software that meets the customers' needs today
and exhibits the quality characteristics that will enable it to be
extended tomorrow.
True
A)
False
B)
6
INCORRECT Which of the following traits need to exist among the members of
an agile software team?
Competence
A)
Decision-making ability
B)
Mutual trust and respect
C)
All of the above
D)
7 CORRECT
All agile process models conform to a greater or lesser degree to the
principles stated in the "Manifesto for Agile Software
Development".
True
A)
False
B)
8
INCORRECT What are the four framework activities found in the Extreme
Programming (XP) process model?
analysis, design, coding, testing
A)
planning, analysis, design, coding
B)
planning, analysis, coding, testing
C)
planning, design, coding, testing
D)
Page 355
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
9
INCORRECT What are the three framework activities for the Adaptive Software
Development (ASD) process model?
analysis, design, coding
A)
feasibility study, functional model iteration, implementation
B)
requirements gathering, adaptive cycle planning, iterative development
C)
Page 356
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
speculation, collaboration, learning
D)
10
INCORRECT The Dynamic Systems Development Method (DSDM) suggests a
philosophy that is based on the Pareto principle (80% of the
application can be delivered in 20% of the time required to build the
complete application).
True
A)
False
B)
11
INCORRECT Which is not one of the key questions that is answered by each team
member at each daily Scrum meeting?
What did you do since the last meeting?
A)
What obstacles are you encountering?
B)
What is the cause of the problems you are encountering?
C)
What do you plan to accomplish at the next team meeting?
D)
12
INCORRECT In Feature Driven Development (FDD) a "feature" is a client-valued
function that can be delivered in two months or less.
True
A)
False
B)
13
INCORRECT Agile Modeling (AM) provides guidance to practitioner during which
of these software tasks?
Analysis
A)
Design
B)
Coding
C)
Testing
Page 357
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
D)
both a and b
E)
Lecture-05
The correct answer for each question is indicated by a .
1 CORRECT
The essence of software engineering practice might be described as understand
Page 358
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
the problem, plan a solution, carry out the plan, and examine the result for accuracy.
True
A)
False
B)
2
INCORRECT Which of the following is not one of Hooker's core principles of software engineering
practice?
True
A)
False
B)
4 CORRECT
The agile view of iterative customer communication and collaboration is
applicable to all software engineering practice.
True
A)
False
B)
5
INCORRECT Software engineers collaborate with customers to define which of the following?
Page 359
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
get all team members to "sign up" to the plan
C)
begin design
D)
7
INCORRECT What role(s) do user stories play in agile planning?
both a and d
E)
8
INCORRECT Which of the following activities is not one of the four things that need to be accomplished by
the generic planning task set?
True
A)
False
B)
11
INCORRECT Teams using agile software practices never create models.
Page 360
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
12
CORRECT Many of the tasks from the generic task sets for analysis modeling and design can be conducted in
parallel with one another.
True
A)
False
B)
13
INCORRECT Which of the following is not one of the principles of good coding?
True
A)
False
B)
15
INCORRECT Which of the following are tasks in the generic task set for construction?
both a and c
E)
16
CORRECT Which of the following are valid reasons for collecting customer feedback concerning
delivered software?
Page 361
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Developers can identify changes to incorporate into next increment
C)
Lecture-06
The correct answer for each question is indicated by a.
1 CORRECT
Software engineers do not need to consider hardware when
designing a computer-based system.
True
A)
False
B)
2
INCORRECT Which of the following can be elements of computer-based systems?
documentation
A)
software
B)
people
C)
hardware
D)
all of the above
E)
3
INCORRECT The system engineering process usually begins with the
detailed view
A)
domain view
B)
element view
C)
world view
D)
4
INCORRECT To construct a system model the engineer should consider which of the
following restraining factors?
assumptions Page 362
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
budget
B)
constraints
Page 363
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
schedule
D)
both a and c
E)
5 CORRECT
By following modern system engineering practices simulation of
reactive systems is no longer necessary.
True
A)
False
B)
6
INCORRECT During business process engineering, three different architectures are
examined.
applications, data, technology infrastructure
A)
communications, organization, financial infrastructure
B)
network, database, reporting structure
C)
systems, requirements, data structure
D)
7
INCORRECT Which elements of business processing engineering are the
responsibilities of the software engineer?
business area analysis
A)
business system design
B)
construction and integration
C)
information strategy planning
D)
both b and c
E)
8
INCORRECT The goal of product engineering is to translate the customer's desire for a
set of defined capabilities into a working product.
True
Page 364
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
9
INCORRECT The architecture components for product engineering are
data, hardware, software, people
A)
data, documentation, hardware, software
Page 365
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
data, hardware, software, procedures
C)
documentation, hardware, people, procedures
D)
10
INCORRECT The top level of the hierarchical model of a system is known as the
AFD
A)
DFD
B)
SCD
C)
SFD
D)
11
INCORRECT The system model template contains which of the following elements
input
A)
output
B)
user interface
C)
all of the above
D)
12
INCORRECT UML notations that can be used to model the hardware and software
elements of a system are
Activity diagrams
A)
Class diagrams
B)
Deployment diagrams
C)
Use-case diagrams
D)
The correct answer for each question is indicated by a .
1 INCORRECT a, b, and c
E)
Requirements engineering is a generic process that does not vary from one software project
to another.
Lecture-07
Page 366
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Page 367
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
2 INCORRECT
During project inception the intent of the of the tasks are to determine
a, b and c
E)
3 INCORRECT
Three things that make requirements elicitation difficult are problems of
budgeting
A)
scope
B)
understanding
C)
volatility
D)
b, c and d
E)
4 INCORRECT
The result of the requirements engineering elaboration task is an analysis model that defines
which of the following problem domain(s)?
information
A)
functional
B)
behavioral
C)
True
A)
False
B)
6 CORRECT
Page 368
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The system specification describes the
send them to the design team and see if they have any concerns
C)
True
A)
False
B)
10
UNANSWERED The job of the requirements engineer is to categorize all stakeholder information in a way that allows decision
makers to choose an internally consistent set of requirements.
True
A)
False
B)
11 CORRECT
The nature of collaboration is such that all system requirements are defined by consensus of
a committee of customers and developers.
True
Page 369
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
12
NCORRECT Which of the following is not one of the context-free questions that would be used during project inception?
cannot be a customer
B)
must be an outsider
D)
14
NCORRECT Which of the following is not one of the requirement classifications used in Quality Function Deployment (QFD)?
exciting
A)
expected
B)
mandatory
C)
normal
D)
15
NCORRECT Developers and customers create use-cases to help the software team understand how different classes of
end-users will use functions.
True
A)
False
B)
16 CORRECT
The work products produced during requirement elicitation will vary depending on the
Page 370
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
software process being used
C)
stakeholders needs
D)
17
NCORRECT Use-case actors are always people, never system devices.
True
A)
False
B)
18
NCORRECT Which of following is not a UML diagram used creating a system analysis model?
activity diagram
A)
class diagram
B)
dataflow diagram
C)
state diagram
D)
19
NCORRECT Analysis patterns facilitate the transformation of the analysis model into a design model by suggesting reliable
solutions to common problems.
True
A)
False
B)
20 CORRECT
In win-win negotiation, the customer's needs are met even though the developer's need may not be.
True
A)
False
B)
21
NCORRECT In requirements validation the requirements model is reviewed to ensure its technical feasibility.
True
A)
False
B)
Page 371
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Lecture-08
Page 372
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The correct answer for each question is indicated by a .
1
INCORRECT Which of the following is not an objective for building an analysis model?
True
A)
False
B)
3
INCORRECT The data dictionary contains descriptions of each software
control item
A)
data object
B)
diagram
C)
notation
D)
both a and b
E)
4
INCORRECT Which of these is not an element of an object-oriented analysis model?
Behavioral elements
A)
Class-based elements
B)
Data elements
C)
Scenario-based elements
D)
5
INCORRECT In analysis models the only data objects that need representation are those that will be implemented
using software classes.
True
A)
Page 373
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
False
B)
6 CORRECT
The values that are assigned to an object's attributes make that object unique.
True
A)
False
B)
7
INCORRECT The relationships shown in a data model must be classified to show their
cardinality
A)
directionality
B)
modality
C)
probability
D)
both a and c
E)
8 CORRECT
The entity relationship diagram
class
A)
instance
B)
subclass
C)
super class
D)
10
INCORRECT Operations are object procedures that are invoked when an object receives a message.
True
A)
False
Page 374
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
11
INCORRECT In many cases there is no need to create a graphical representation of a usage scenario.
True
A)
False
B)
12
INCORRECT UML activity diagrams are useful in representing which analysis model elements?
Behavioral elements
A)
Class-based elements
B)
Flow-based elements
C)
Scenario-based elements
D)
13
INCORRECT The data flow diagram
both b and c
E)
14
INCORRECT Control flow diagrams are
both a and d
E)
15
CORRECT The data flow diagram must be augmented by descriptive text in order to describe the
functional requirements for a software product.
True
Page 375
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
16
INCORRECT Which of the following should be considered as candidate objects in a
problem space?
events
A)
people
B)
structures
C)
all of the above
D)
17
INCORRECT Attributes cannot be defined for a class until design has been completed.
True
A)
False
B)
18
INCORRECT Which of the following is not one of the broad categories used to
classify operations?
computation
A)
data manipulation
B)
event monitors
C)
transformers
D)
19
INCORRECT Which of the following items does not appear on a CRC card?
class collaborators
A)
class name
B)
class reliability
C)
class responsibilities
D) Page 376
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
20
INCORRECT Class responsibilities are defined by
its attributes only
A)
its collaborators
Page 377
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
True
A)
False
B)
22
INCORRECT Events occur whenever a(n)
Lecture-09
Page 378
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
The correct answer for each question is indicated by a .
1
INCORRECT Which of the following are areas of concern in the design model?
architecture
A)
data
B)
interfaces
C)
project scope
D)
a, b and c
E)
2
INCORRECT The importance of software design can be summarized in a single word
accuracy
A)
complexity
B)
efficiency
C)
quality
D)
3
INCORRECT Which of these are characteristics of a good design?
both b and d
E)
4
INCORRECT Which of the following is not a characteristic common to all design methods?
configuration management
A)
functional component
B)
Page 379
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
5
INCORRECT Software design is an iterative generic process that may be applied without modification to any
software project.
True
A)
False
B)
6
INCORRECT What types of abstraction are used in software design?
control
A)
data
B)
environmental
C)
procedural
D)
a, b and d
E)
7
INCORRECT Which of the following models can be used to represent the architectural design of a piece of
software.
Dynamic models
A)
Functional models
B)
Structural models
C)
True
A)
False
B)
9 CORRECT
Since modularity is an important design goal it is not possible to have too many
modules in a proposed design.
True
A)
False
B)
10
INCORRECT Information hiding makes program maintenance easier by hiding data and procedure from
unaffected parts of the program.
True
Page 380
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
False
B)
11
CORRECT Cohesion is a qualitative indication of the degree to which a module
True
A)
False
B)
14
CORRECT Software designs are refactored to allow the creation of software that is easier to integrate, easier to
test, and easier to maintain.
True
A)
False
B)
15
INCORRECT Inheritance provides a mechanism by which changes to lower level classes can be propagated to all
super classes quickly.
True
A)
False
B)
16
CORRECT Polymorphism reduces the effort required to extend an object system by
coupling objects together more tightly.
Page 381
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
Entity classes
B)
Process classes
C)
Architectural design
A)
Component-level design
B)
Data design
C)
Interface design
D)
20
INCORRECT Which design model is analogous to the detailed drawings of the access points and external
utilities for a house?
Architectural design
A)
Component-level design
B)
Data design
Page 382
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
Interface design
D)
21
INCORRECT Which design model is analogous to a set of detailed drawings for each room in a house?
Architectural design
A)
Component-level design
B)
Data design
C)
Interface design
D)
22
INCORRECT The deployment design elements specify the build order for the software components.
True
A)
False
B)
23
CORRECT One of the key problems in software reuse is the inability to find existing reusable design
patterns when hundreds of candidates exist.
True
A)
False
B)
24
INCORRECT Design patterns are best thought of as coding patterns.
True
A)
False
B)
25
INCORRECT Frameworks and design patterns are the same thing as far as designers are concerned.
True
A)
False
B)
Lecture-10
Page 383
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
1 CORRECT
The best representation of system architecture is an operational
software prototype.
True
A)
False
B)
Feedback:
2 CORRECT
The architectural representations can be an enabler for communication
among project stakeholders.
True
A)
False
B)
Feedback:
3
INCORRECT Which of these characteristics are true of a data warehouse, but not a
typical data base?
business level orientation
A)
currency of information
B)
integration
C)
nonvolatility
D)
both c and d
E)
Feedback:
4 CORRECT
Data design actually begins during the creation of the analysis model,
not the architectural model.
True
A)
False
B)
Feedback:
5
INCORRECT An architectural style encompasses which of the following elements?
Page 384
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
constraints
A)
set of components
B)
semantic models
Page 385
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
syntactic models
D)
a, b and c
E)
Feedback:
6
INCORRECT To determine the architectural style or combination of styles that best
fits the proposed system, requirements engineering is used to
uncover
algorithmic complexity
A)
characteristics and constraints
B)
control and data
C)
design patterns
D)
Feedback:
7
INCORRECT Before an architectural pattern can be chosen for use in a specific
system it must have a code implementation to facilitate its reuse.
True
A)
False
B)
Feedback:
8
INCORRECT The criteria used to assess the quality of an architectural design should be
based on system
accessibility
A)
control
B)
data
C)
implementation
D)
both b and c
E)
Feedback:
Page 386
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
9
INCORRECT During the process of modeling the system in context, systems that
interact with the target system are represented as
Peer-level systems
A)
Page 387
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Subordinate systems
B)
Superordinate systems
C)
Working systems
D)
a, b and c
E)
Feedback:
10
CORRECT Once selected, archetypes always need to be refined further as
architectural design proceeds.
True
A)
False
B)
Feedback:
11
CORRECT Which of the following is not an example of infrastructure components
that may need to be integrated into the software architecture?
Communications components
A)
Database components
B)
Interface components
C)
Memory management components
D)
Feedback:
12
INCORRECT In the architecture trade-off analysis method the architectural style
should be described using the
data flow view
A)
module view
B)
process view
C)
user view Page 388
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
D)
a, b and c
E)
Feedback:
13
Quantitative methods for assessing the quality of proposed architectural
designs
Page 389
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
INCORRECT are readily available.
True
A)
False
B)
Feedback:
14
INCORRECT A useful technique for evaluating the overall complexity of a
proposed architecture is to look at the component
cohesion flow
A)
dependencies
B)
sharing dependencies
C)
size
D)
both b and c
E)
Feedback:
15
INCORRECT When the overall flow in a segment of a data flow diagram is largely
sequential and follows straight-line paths, is present.
low coupling
A)
good modularity
B)
transaction flow
C)
transform flow
D)
Feedback:
16
INCORRECT When a single item that triggers other data flow along one of many
paths of a data flow diagram,characterizes the information flow.
high coupling
A)
poor modularity
B)
transaction flow
Page 390
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
transform flow
D)
Feedback:
Page 391
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
17
CORRECT When you encounter both transform flow and transaction flow in the
same DFD the flow is partitioned and the appropriate mapping
technique is used on each part of the DFD.
True
A)
False
B)
Feedback:
18
INCORRECT In transaction mapping the first level factoring results in the
creation of a CFD
A)
derivation of the control hierarchy
B)
distribution of worker modules
C)
refinement of the module view
D)
Feedback:
19
INCORRECT A successful application of transform or transaction mapping to create
an architectural design is supplemented by
entity relationship diagrams
A)
module interface descriptions
B)
processing narratives for each module
C)
test cases for each module
D)
both b and c
E)
Lecture-11
The correct answer for each question is indicated by a .
1 INCORRECT
In the most general sense a component is a modular building block for
computer software.
Page 392
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
Feedback:
Page 393
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
2 INCORRECT
In the context of object-oriented software engineering a component
contains
attributes and operations
A)
instances
B)
of each class
D)
Feedback:
user) a set of collaborating
classes
3 INCORRECT
In traditional software engineering, modules must serve in which
of the following roles?
Control component
A)
Infrastructure
B)
component
C) Problem domain
D)
Feedback: component All of the
above
4 CORRECT
Software engineers always need to create components from scratch in
order to meet customer expectations fully.
True
A
)False
B)
Feedback:
5 INCORRECT
Which of the following is not one of the four principles used
to guide component-level design?
Page 394
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Dependency Inversion Principle
A)
Interface
B)
Segregation Principle
C) Open-Closed Principle
D)
Feedback: Parsimonious Complexity
Principle
6 INCORRECT
During component-level design it is customary to ignore organization
issues
Page 395
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
like subsystem membership or packaging.
True
A)
False
B)
Feedback:
7
UNANSWERED The use of stereotypes can help identify the nature of components at the detailed design level.
True
A)
False
B)
8 INCORRECT
Classes and components that exhibit functional, layer, or communicational
cohesion are relatively easy to implement, test, and maintain.
True
A)
False
B)
Feedback:
9 CORRECT
Software coupling is a sign of poor architectural design and can always be
avoided in every system.
True
A)
False
B)
Feedback:
10
INCORRECT In component design, elaboration requires which of the following elements to be described in
detail?
Source code
A)
Attributes
B)
Interfaces
C)
Operations
D)
b, c and d
E)
Feedback:
11
INCORRECT In component-level design "persistent data sources" refer to
Page 396
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Component libraries
A)
Databases
B)
Files
C)
both b and c
E)
Feedback:
12
The object constraint language (OCL) complements UML by allowing a software
INCORRECT
engineer to use a formal grammar to construct unambiguous statements about design
model elements.
True
A)
False
B)
Feedback:
13 CORRECT
OCL is not strong enough to be used to describe pre- or post conditions for
design actions.
True
A)
False
B)
Feedback:
14
INCORRECT Which of these constructs is used in structured programming?
branching
A)
condition
B)
repetition
C)
sequence
D)
b, c, and d
E)
Feedback:
15
INCORRECT Which of these is a graphical notation for depicting procedural detail?
process diagram
Page 397
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
decision table
B)
ER diagram
C)
flowchart
D)
Feedback:
16
INCORRECT A decision table should be used
17
INCORRECT A program design language (PDL) is often a
18
INCORRECT Which of these criteria are useful in assessing the effectiveness of a particular design
notation?
maintainability
A)
modularity
B)
simplicity
C)
size
D)
a, b, and c
E)
Page 398
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Lecture-12
The correct answer for each question is indicated by a .
1 INCORRECT
Which of the following interface design principles does not allow the user to
remain in control of the interaction with a computer?
2 INCORRECT
Which of the following interface design principles reduces the user's memory
load?
answers a, b and c
E)
Feedback:
3 CORRECT
The reason for reducing the user's memory load is make his or her
interaction with the computer quicker to complete.
True
A)
False
B)
Feedback:
4 CORRECT
Interface consistency implies that
each application should have its own distinctive look and feel
A)
Page 399
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
visual information is organized according to a design standard
D)
both b and d
E)
Feedback:
5 CORRECT
If past interactive models have created certain user expectations it is not
generally good to make changes to the model.
True
A)
False
B)
Feedback:
6 INCORRECT
Which model depicts the profile of the end users of a computer system?
design model
A)
implementation model
B)
user model
C)
user's model
D)
Feedback:
7 INCORRECT
Which model depicts the image of a system that an end user creates in his or
her head?
design model
A)
user model
B)
system model
C)
system perception
D)
Feedback:
8 CORRECT
Which model depicts the look and feel of the user interface along with all
supporting information?
Implementation model
A)
user model
B)
user's model
C)
Page 400
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
system perception
D)
Feedback:
9 INCORRECT
Which of these framework activities is not normally associated with the user
interface design processes?
cost estimation
A)
interface construction
B)
interface validation
C)
10
INCORRECT Which approach(es) to user task analysis can be useful in user interface design?
both c and d
E)
Feedback:
11
INCORRECT Object-oriented analysis techniques can be used to identify and refine user task objects and
actions without any need to refer to the user voice.
True
A)
False
B)
Feedback:
12 CORRECT
The computer's display capabilities are the primary determinant of the order
in which user interface design activities are completed.
True
A)
False
B)
Feedback:
Page 401
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
13
UNANSWERED It is sometimes possible that the interface designer is constrained by environmental factors
that mitigate against ease of use for many users.
True
A)
False
B)
14
INCORRECT One means of defining user interface objects and actions is to conduct a grammatical parse
of the user scenario.
True
A)
False
B)
Feedback:
15 CORRECT
Interface design patterns typically include a complete component-level
design (design classes, attributes, operations, and interfaces).
True
A)
False
B)
Feedback:
16
INCORRECT Several common design issues surface for almost every user interface including
displays system
C)
response time
D)
both b and d
E)
Feedback:
17 CORRECT
Add-on help facilities are almost always better received by users than
integrated help facilities.
True
A)
False
B)
Feedback:
Page 402
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
18
INCORRECT User interface development systems typically provide several mechanisms for building
interface prototypes including
code generation
A)
drawing tools
B)
input validation
C)
windows handlers
D)
both c and d
E)
Feedback:
19
INCORRECT Usability questionnaires are most meaningful to the interface designers when completed by
customers
A)
experienced programmers
B)
product users
C)
project managers
D)
Feedback:
20
INCORRECT Several usability measures can be collected while observing users interacting with a computer
system including
software reliability
C)
both b and d
E)
Lecture-13
Page 403
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
verification and software validation.
True
A)
False
B)
2 CORRECT
The best reason for using Independent software test teams is that
testers do not get involved with the project until testing begins
C)
a, d, c, b
A)
b, d, a, c
B)
c, a, d, b
C)
d, b, c, a
D)
4
INCORRECT Class testing of object-oriented software is equivalent to unit testing for traditional
software.
True
A)
False
B)
5 CORRECT
By collecting software metrics and making use of existing software reliability
models it is possible to develop meaningful guidelines for determining when software testing is
finished.
True
A)
False
B)
6
INCORRECT Which of the following strategic issues needs to be addressed in a successful software testing
process?
Page 404
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
conduct formal technical reviews prior to testing
A)
both a and b
E)
7
INCORRECT Which of the following need to be assessed during unit testing?
algorithmic performance
A)
code stability
B)
error handling
C)
execution paths
D)
both c and d
E)
8 CORRECT
Drivers and stubs are not needed for unit testing because the modules are
tested independently of one another.
True
A)
False
B)
9
INCORRECT Top-down integration testing has as it's major advantage(s) that
both b and c
E)
10
INCORRECT Bottom-up integration testing has as it's major advantage(s) that
Page 405
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
no drivers need to be written
B)
both a and b
E)
12
INCORRECT Smoke testing might best be described as
True
A)
False
B)
14
INCORRECT The OO testing integration strategy involves testing
Page 406
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
15
CORRECT The focus of validation testing is to uncover places that a user will be able to observe failure of
the software to conform to its requirements.
True
A)
False
B)
16
INCORRECT Software validation is achieved through a series of tests performed by the user once the software is
deployed in his or her work environment.
True
A)
False
B)
17
CORRECT Configuration reviews are not needed if regression testing has been rigorously applied during
software integration.
True
A)
False
B)
18
INCORRECT Acceptance tests are normally conducted by the
developer
A)
end users
B)
test team
C)
systems engineers
D)
19
INCORRECT Recovery testing is a system test that forces the software to fail in a variety of
ways and verifies that software is able to continue execution without interruption.
True
A)
False
B)
20
CORRECT Security testing attempts to verify that protection mechanisms built into a system protect it
from improper penetration.
True
A)
False
B)
21
INCORRECT Stress testing examines the pressures placed on the user during system use in extreme
environments.
Page 407
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
22
INCORRECT Performance testing is only important for real-time or embedded systems.
True
A)
False
B)
23
CORRECT Debugging is not testing, but always occurs as a consequence of testing.
True
A)
False
B)
24
INCORRECT Which of the following is an approach to debugging?
backtracking
A)
brute force
B)
cause elimination
C)
code restructuring
D)
a, b, and c
E)
Lecture-14
The correct answer for each question is indicated by a .
1 INCORRECT
With thorough testing it is possible to remove all defects from a program
prior to delivery to the customer.
True
A)
False
B)
Feedback:
2 INCORRECT
Which of the following are characteristics of testable software?
observability
A)
simplicity
Page 408
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
stability
C)
3 CORRECT
The testing technique that requires devising test cases to demonstrate that
each program function is operational is called
black-box testing
A)
glass-box testing
B)
grey-box testing
C)
white-box testing
D)
Feedback:
4 INCORRECT
The testing technique that requires devising test cases to exercise the
internal logic of a software module is called
behavioral testing
A)
black-box testing
B)
grey-box testing
C)
white-box testing
D)
Feedback:
5 INCORRECT
What types of errors are missed by black-box testing and can be uncovered
by white-box testing?
behavioral errors
A)
logic errors
B)
performance errors
C)
typographical errors
D)
both b and d
E)
Feedback:
6 INCORRECT
Page 409
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Program flow graphs are identical to program flowcharts.
True
A)
False
B)
Feedback:
7 INCORRECT
The cyclomatic complexity metric provides the designer with information
regarding the number of
8 CORRECT
The cyclomatic complexity of a program can be computed directly from a PDL
representation of an algorithm without drawing a program flow graph.
True
A)
False
B)
Feedback:
9 INCORRECT
Condition testing is a control structure testing technique where the criteria
used to design test cases is that they
10
INCORRECT Data flow testing is a control structure testing technique where the criteria used to design test
cases is that they
Page 410
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
select test paths based on the locations and uses of variables
C)
11
INCORRECT Loop testing is a control structure testing technique where the criteria used to design test cases
is that they
12
INCORRECT Black-box testing attempts to find errors in which of the following categories
interface errors
B)
performance errors
C)
13
INCORRECT Graph-based testing methods can only be used for object-oriented systems
True
A)
False
B)
Feedback:
14 CORRECT
Equivalence testing divides the input domain into classes of data from which
test cases can be derived to reduce the total number of test cases that must be developed.
True
A)
False
Page 411
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
Feedback:
15
INCORRECT Boundary value analysis can only be used to do white-box testing.
True
A)
False
B)
Feedback:
16
INCORRECT Comparison testing is typically done to test two competing products as part of customer market
analysis prior to product release.
True
A)
False
B)
Feedback:
17 CORRECT
Orthogonal array testing enables the test designer to maximize the coverage
of the test cases devised for relatively small input domains.
True
A)
False
B)
Feedback:
18
UNANSWERED Test case design "in the small" for OO software is driven by the algorithmic detail of the
individual operations.
True
A)
False
B)
19
INCORRECT Encapsulation of attributes and operations inside objects makes it easy to obtain object state
information during testing.
True
A)
False
B)
Feedback:
20 CORRECT
Use-cases can provide useful input into the design of black-box and state-
based tests of OO software.
True
A)
Page 412
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
False
B)
Feedback:
21
INCORRECT Fault-based testing is best reserved for
use-case validation
C)
22
INCORRECT Testing OO class operations is made more difficult by
encapsulation
A)
inheritance
B)
polymorphism
C)
both b and c
D)
Feedback:
23 CORRECT
Scenario-based testing
both a and b
D)
Feedback:
24
INCORRECT Deep structure testing is not designed to
Page 413
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
25
INCORRECT Random order tests are conducted to exercise different class instance life histories.
True
A)
False
B)
Feedback:
26
INCORRECT Which of these techniques is not useful for partition testing at the class level
attribute-based partitioning
A)
category-based partitioning
B)
state-based partitioning
D)
Feedback:
27
INCORRECT Multiple class testing is too complex to be tested using random test cases.
True
A)
False
B)
Feedback:
28
INCORRECT Tests derived from behavioral class models should be based on the
object-relation diagram
B)
state diagram
C)
use-case diagram
D)
Feedback:
29
INCORRECT Client/server architectures cannot be properly tested because network load is highly variable.
Page 414
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
Feedback:
30
INCORRECT Real-time applications add a new and potentially difficult element to the testing mix
performance
A)
reliability
B)
security
C)
time
D)
Lecture-15
Page 416
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
measures of software attributes that are useful in the quantitative
assessment of software quality.
True
A)
False
B)
5
INCORRECT Which of these are reasons for using technical product measures during
software development?
large body of scientific evidence supports their use
A)
provides software engineers with an objective mechanism for assessing
B) software quality
they allow all software quality information to be expressed
unambiguously
C) as a single number
design
A)
feedback
B)
measurement
C)
quantification
D)
7
INCORRECT The Goal/Question/Metric (GQM) paradigm was developed as a
technique for assigning blame for software failures.
True
A)
False
B)
8 CORRECT
One of the most important attributes for a software product metric is
Page 417
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
that it should be
easy to compute
A)
qualitative in nature
B)
reliable over time
C)
Page 418
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
widely applicable
D)
9 CORRECT
In many cases metrics for one model may be used in later software
engineering activities (e.g., design metrics may be used in test
planning).
True
A)
False
B)
10
INCORRECT The function point metric is an example of metric that can be used to
assist with technical decision-making based on the analysis model
information, without making use of historical project data.
True
A)
False
B)
11
INCORRECT The specification metrics proposed by Davis address which two
characteristics of the software requirements?
functionality and performance
A)
performance and completeness
B)
specificity and completeness
C)
specificity and functionality
D)
12
INCORRECT Architectural design metrics focus on
architectural structure
A)
data structural relationships
B)
internal module complexity
C)
module effectiveness
D)
both a and d
Page 419
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
E)
13
INCORRECT Which of the following is not a measurable characteristic of an object-
oriented design?
completeness
A)
efficiency
B)
Page 420
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
size
C)
volatility
D)
14
INCORRECT The depth of inheritance tree (DIT) metric can give an OO software
designer a reading on the
attributes required for each class
A)
completion time required for system implementation
B)
complexity of the class hierarchy
C)
level of object reusability achieved
D)
15
INCORRECT Because the class is the dominant unit in OO systems, there is no call
for the definition of class-oriented metrics.
True
A)
False
B)
16
INCORRECT If you encounter a class with a large responsibility (large class size or CS
value) you should consider
making it a base class
A)
making it a subclass
B)
partitioning the class
C)
starting a new class hierarchy
D)
17
INCORRECT Component-level metrics include measures of
complexity
A)
coupling
B)
module cohesion
Page 421
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
C)
performance
D)
a, b, and c
E)
18
CORRECT Because the class is the dominant unit in OO systems, relatively few
metrics
Page 422
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
have been proposed for operations that reside within a class.
True
A)
False
B)
19
INCORRECT Interface metrics are used to assess the complexity of the module's
input and output relationships with external devices.
True
A)
False
B)
20
INCORRECT Halstead's source code metrics are based on the number of
modules in the program
A)
operands in the program
B)
operators in the program
C)
volume elements in the program
D)
both b and c
E)
21
INCORRECT Most testing metrics actually focus on the process of testing rather
than the technical characteristics of the tests themselves.
True
A)
False
B)
22
INCORRECT Testing effort can also be estimated using metrics derived from
cylcomatic complexity.
True
A)
False
B)
Page 423
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
23
INCORRECT Software testing metrics fall into two broad categories
metrics that focus on defect removal effectiveness
A)
metrics that focus on test coverage
B)
metrics that estimate the duration of the testing process
C)
metrics that predict the number of test cases required
Page 424
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
D)
both b and d
E)
24
INCORRECT The IEEE software maturity index is used to provide a measure of the
maintainability of a software product based on its availability
A)
relative age of a software product being considered for retirement
B)
reliability of a software product following regression testing
C)
stability of a software product as it is modified during maintenance
D)
Lecture-16
The correct answer for each question is indicated by a .
1
INCORRECT Which of the following is not a characteristic of a WebApp?
content driven
A)
continuously evolving
B)
easily measurable
C)
network intensive
D)
Feedback:
2
INCORRECT Which of these application categories are commonly encountered in WebE work?
informational
A)
transaction-oriented
B)
portal
C)
3
INCORRECT WebApps must be developed and deployed quickly, making the application of software
engineering processes impossible.
True
A)
Page 425
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
False
B)
Feedback:
4
INCORRECT Which process model best describes WebE?
Linear model
A)
Incremental model
B)
Formal model
C)
5
INCORRECT The mechanics of software engineering analysis, design, and testing must be adapted to
accommodate the special characteristics of WebApps.
True
A)
False
B)
Feedback:
6
INCORRECT Which of the following technologies is important to Web engineers?
component-based development
A)
internet standards
B)
security
C)
7 CORRECT
An evolutionary process model would never be chosen over an agile process
model to build a WebApp.
True
A)
False
B)
Feedback:
8
INCORRECT Which of the following is not one of the characteristics that we need to take into account when a
process framework for WebE is formulated.
Page 426
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Changes occur frequently
A)
9
INCORRECT During the analysis/formulation step of the WebE process two types of goals need to be defined
10
CORRECT With extremely short time-lines it is impossible to develop plans for WebApp development
projects.
True
A)
False
B)
Feedback:
11
INCORRECT Which activities are conducted during the WebE modeling process?
content analysis
A)
design architecture
C)
12
INCORRECT Which test(s) are not performed during WebE construction?
configuration
A)
Page 427
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
navigation
B)
reliability
C)
usability
D)
Feedback:
13
INCORRECT WebE are usually delivered to users untested and then debugged as user complaints are
registered.
True
A)
False
B)
Feedback:
14
INCORRECT Since WebApps are fairly standard it is not important for developers to understand the
customer's business needs and objectives.
True
A)
False
B)
Feedback:
15
CORRECT Scenario-based approaches to describing user interaction are good to use in WebE.
True
A)
False
B)
Feedback:
16
INCORRECT Since WebApps are usually developed using agile processes, modeling can safely be ignored or
skipped altogether.
True
A)
False
B)
Lecture-17
Page 428
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
B)
Feedback:
2
INCORRECT Which of these is not one of the formulation questions asked
during Web engineering?
What are the objectives for the WebApp?
A)
What is the business need for the WebApp?
B)
Who will use the WebApp?
C)
Will you need to outsource development of the WebApp?
D)
Feedback:
3
INCORRECT Which of these are goals for WebE requirements gathering?
Define user interaction scenarios
A)
Determine performance constraints
B)
Identify content requirements
C)
Identify WebApp development tools
D)
a, b, and c
E)
Feedback:
4 CORRECT
During requirements gathering Web engineers should attempt to
define the smallest reasonable number of user classes.
True
A)
False
B)
Feedback:
5
INCORRECT Which type of analysis is not conducted during the WebE process?
Page 429
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
content analysis
A)
functional analysis
B)
Page 430
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
user interaction analysis
C)
market analysis
D)
Feedback:
6 CORRECT
One of the things that distinguish the development of WebApps from
other software products is the need to combine the work products
from both technical and non-technical tasks into a single product.
True
A)
False
B)
Feedback:
7 CORRECT
Which of these roles is not usually assigned to members of the WebE
team?
content developer
A)
marketing specialist
B)
Web master
C)
Web publisher
D)
Feedback:
8 CORRECT
In building a WebE team strong team leadership is essential.
True
A)
False
B)
Feedback:
9
INCORRECT Once formulation is complete Web engineering
is complete.
A)
may be performed in-house. Page 431
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
may be outsourced.
C)
both b or c
D)
Feedback:
10
Page 432
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
CORRECT Outsourcing WebApps is common practice, it is important to perform
thorough analysis of the application and even create a rough design
internally before selecting a vendor.
True
A)
False
B)
Feedback:
11
INCORRECT Developing WebApps in-house is no different than developing any other
piece of software.
True
A)
False
B)
Feedback:
12
CORRECT Which of these is not a goal for using metrics in WebE?
to provide basis for effort estimation
A)
to provide basis for making personnel decisions
B)
to provide indication of business success
C)
to provide indication of technical quality
D)
Feedback:
13
INCORRECT Which of these is not a category for WebE effort metrics?
application authoring
A)
media authoring
B)
page authoring
C)
scenario authoring
D)
Feedback:
Page 433
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
14
INCORRECT Business people lag considerably behind Web engineers in
developing, collecting, and using metrics for WebApps.
True
A)
False
B)
Page 434
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Feedback:
15
CORRECT WebApps need to be built with such urgency that planning is not possible.
True
A)
False
B)
Feedback:
16
CORRECT WebApps are extremely volatile, but this does not eliminate the
need to understand the WebApp requirements.
True
A)
False
B)
Feedback:
17
INCORRECT Any team of experienced software engineers can develop WebApps.
True
A)
False
B)
Feedback:
18
INCORRECT WebApps involve so little programming that formal testing is not needed
before releasing the product to the users.
True
A)
False
B)
Lecture-18
The correct answer for each question is indicated by a .
1 INCORRECT
Which of the following is not one of the WebApp requirements analysis tasks?
Analysis modeling
A)
Formulation
B)
Page 435
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Requirements gathering
C)
Page 436
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
2 INCORRECT
User hierarchies are used to replace UML user representations for
WebApps having large numbers of user categories?
True
A)
False
B)
3 INCORRECT
WebApp use-cases might be described as bundles of functionality.
True
A)
False
B)
4 INCORRECT
As use-cases are organized into functional packages, each functional
package is assessed to ensure that it is
Comprehensive
A)
Highly cohesive
B)
Loosely coupled
C)
All of the above
D)
5 INCORRECT
Dynamic elements of WebApp analysis models describe how users
interaction with the system.
True
A)
False
B)
6 INCORRECT
Which is not one of the analysis activities that is used to create a
complete analysis model?
Configuration analysis
A)
Content analysis
B)
Functional analysis
C)
Data analysis
D) Page 437
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
7 INCORRECT
The content model contains dynamic elements that encompass the
WebApp content objects.
True
A)
False
Page 438
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
8 CORRECT
Content objects are extracted from use cases by examining the
scenarios description for direct or indirect content references.
True
A)
False
B)
9
UNANSWERED In building a content hierarchy is sufficient to examine a list of
content objects and a brief description of each object.
True
A)
False
B)
10
INCORRECT By examining each use-case and building a class model for 1 or 2
representative users it is possible to derive the needed analysis
classes.
True
A)
False
B)
11
INCORRECT What are the most useful UML diagrams and related information that
can be used to represent a WebApp interaction model?
activity diagrams, class diagrams, state diagrams, interface
prototype
A)
activity diagrams, collaboration diagrams, sequence diagrams, state
B) diagrams
use-cases, sequence diagrams, state diagrams, interface prototype
C)
use-cases, sequence diagrams, state diagrams, sequence diagrams
D)
12
INCORRECT A user interface prototype should not be created during WebApp
analysis because doing so involves programming.
True
A)
False
B)
13 CORRECT
UML activity diagrams can be used to represent the user observable
Page 439
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
functionality delivered by the WebApp as well as the operations
contained in each analysis class.
True
A)
False
B)
14
Page 440
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
UNANSWERED The construction details indicating how the user will invoke an operation are deferred until the
WebApp design phase.
True
A)
False
B)
15 CORRECT
UML deployment diagrams can be used to create the configuration model for
a complex WebApp.
True
A)
False
B)
16
Configuration analysis focuses on the architecture of the user's Web browsing environment.
INCORRECT
True
A)
False
B)
17
INCORRECT Which of these are not steps of relationship-navigation analysis?
Element analysis
A)
Evaluation analysis
B)
Functional analysis
C)
Stakeholder analysis
D)
18 CORRECT
The answers to the relationship analysis questions help the Web engineer
position a content element within the WebApp.
True
A)
False
B)
19
INCORRECT Once the WebApp architecture is modeled the Web engineer must consider requirements that
dictate how users will navigate from one content element
to another.
True
A)
False
B)
Lecture-19
The correct answer for each question is indicated by a .
Page 441
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
1
INCORRECT Which of the following characteristics should not be used to assess the quality of a WebApp?
aesthetics
A)
reliability
B)
maintainability
C)
usability
D)
2
INCORRECT Which of the following are design goals for every WebApp?
Simplicity
A)
Consistency
B)
Navigability
C)
Visual appeal
D)
Architectural design
A)
Content design
C)
Navigation design
D)
4 CORRECT
Every WebApp user interface should be easy to use, easy to navigate, error-free
and functional.
True
A)
False
B)
5
With WebApps content is everything, a poorly defined user interface will be quickly
INCORRECT
overlooked by frequent users.
True
A)
False
B)
Page 442
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
6
INCORRECT Which of these are WebApp interaction mechanisms?
Graphic icons
A)
Graphic images
B)
Navigation menus
C)
True
A)
False
B)
8
INCORRECT Screen layout design has several widely accepted standards based on human factors research.
True
A)
False
B)
9
INCORRECT Graphic design considers every aspect of the look and feel of a WebApp.
True
A)
False
B)
10
INCORRECT Content design is conducted by
Web engineers
B)
both a and b
C)
True
A)
False
B)
Page 443
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
12
INCORRECT Content objects are not normally chunked into Web pages until the implementation
activities begin.
True
A)
False
B)
13
INCORRECT Which of the following is not one of the browsing primitives normally found in WebApp
interfaces.
Conditional browsing
A)
Nested browsing
B)
Recursive browsing
C)
Sequential browsing
D)
14
CORRECT Content architecture and WebApp architecture are pretty much the same thing for many WebApps?
True
A)
False
B)
15
INCORRECT Which of the following is not one of the content architectural structures used by web engineers?
linear
A)
grid
B)
hierarchical
C)
parallel
D)
16
INCORRECT MVC is a three layer architecture that contains a
Page 444
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
CORRECT goal associated with each defined user role.
True
A)
False
B)
18
To allow the user to feel in control of a WebApp, it is a good idea to mix both horizontal and vertical
INCORRECT
navigation mechanisms on the same page.
True
A)
False
B)
19
Component level design for WebApps is very similar to component level design for other software
INCORRECT
delivery environments.
True
A)
False
B)
20
INCORRECT Which of the following is a navigation pattern used during web-based design?
cycle
A)
counterpoint
B)
sieve
C)
conceptual design
B)
content design
C)
navigational design
D)
22
INCORRECT Most WebApps can be easily characterized by judicious use of widely recognized suites of software
metrics?
True
A)
Fals
B)
Page 445
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Lecture-20
The correct answer for each question is indicated by a .
1
INCORRECT Since content is central to users of WebApps testing is less important than for conventional
software products.
True
A)
False
B)
2 CORRECT
Which of the following is not one of the dimensions of quality used to assess a
WebApp.
Content
A)
Maintainability
B)
Navigability
C)
Usability
D)
3 CORRECT
WebApps require special testing methodologies because WebApp errors have
several unique characteristics.
True
A)
False
B)
4
INCORRECT Since WebApps evolve continuously, the testing process is an on-going activity, conducted by the
Web support staff using regression tests.
True
A)
False
B)
5
INCORRECT Test planning is not used in WebApp testing.
True
A)
False
B)
6
INCORRECT As the WebApp architecture is constructed which types of testing are used as integration tests?
Component testing
A)
Page 446
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Content testing
B)
Navigation testing
C)
Usability testing
D)
both a and c
E)
7 CORRECT
Which of the following is not one of the objectives of WebApp content testing?
True
A)
False
B)
9
INCORRECT The overall strategy for interface testing is to uncover errors
in navigation semantics
A)
in overall usabililty
B)
both a and c
D)
10
INCORRECT Which of the following is not a WebApp interface mechanism?
Browser
A)
Cookies
B)
Forms
C)
Links
D)
11
When testing WebApp interface semantics, each use-case is used as input for
Page 447
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
CORRECT the design of a testing sequence.
True
A)
False
B)
12
INCORRECT Usability tests should be designed and executed by intended users for a given WebApp.
True
A)
False
B)
13
INCORRECT WebApp compatibility testing is conducted to be sure that the user model for usage scenario
matched the user category assigned to a given user.
True
A)
False
B)
14
INCORRECT Which test case design technique(s) are appropriate for WebApp component- level testing?
Equivalence partitioning
B)
Path testing
C)
True
A)
False
B)
16
CORRECT Both Web engineers and non-technical users conduct navigation semantics testing for
WebApps.
True
A)
False
B)
17
INCORRECT Which of following is not one of the elements that needs to be considered when constructing WebApp
server-side configuration tests?
Browser compatibility
Page 448
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
A)
True
A)
False
B)
19
INCORRECT Which of the following is not a testable WebApp security element.
Authentication
A)
Encryption
B)
Firewalls
C)
Penetration
D)
20
INCORRECT WebApp performance tests are designed to
N, T, D
A)
N, T, P
B)
T, D, P
C)
N, D, P
D)
22
CORRECT WebApp stress testing is a continuation load testing.
Page 449
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
True
A)
False
Lecture-21
The correct answer for each question is indicated by a.
1 CORRECT
Effective software project management focuses on four P's which are
people, performance, payoff, product
A)
people, product, performance, process
B)
people, product, process, project
C)
people, process, payoff, product
D)
2 CORRECT
Organizations that achieve high levels of maturity in people management
have a higher likelihood of implementing effective software
engineering processes.
True
A)
False
B)
3
INCORRECT The first step in project planning is to
determine the budget.
A)
select a team organizational model.
B)
determine the project constraints.
C)
establish the objectives and scope.
D)
4
INCORRECT Process framework activities are populated with
milestones
A)
work products Page 450
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
QA points
C)
All of the above
D)
Page 451
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
5
INCORRECT Project management is less important for modern software development
since most projects are successful and completed on time.
True
A)
False
B)
6
INCORRECT Which of the following is not generally considered a player in the
software process?
customers
A)
end-users
B)
project managers
C)
sales people
D)
7
INCORRECT The best person to hire as a project team leader is the most competent
software engineering practitioner available.
True
A)
False
B)
8 CORRECT
The best project team organizational model to use when tackling
extremely complex problems is the
closed paradigm
A)
open paradigm
B)
random paradigm
C)
synchronous paradigm
D)
9
INCORRECT Which factors should be considered in choosing the organizational
structure for a software team? (Select all that apply)
degree of communication desired
A)
predicted size of the resulting program Page 452
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
rigidity of the delivery date
C)
size of the project budget
D)
Page 453
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
a, b, and c
E)
10
CORRECT One of the best ways to avoid frustration during the software
development process is to
give team members more control over process and technical decisions.
A)
give team members less control over process and technical decisions.
B)
hide bad news from the project team members until things improve.
C)
reward programmers based on their productivity.
D)
11
INCORRECT Small agile teams have no place in modern software development.
True
A)
False
B)
12
INCORRECT Which of these software characteristics is not a factor contributing to
project coordination difficulties?
interoperability
A)
performance
B)
scale
C)
uncertainty
D)
13
INCORRECT Which of these software characteristics are used to determine the
scope of a software project?
context, lines of code, function
A)
context, function, communication requirements
B)
information objectives, function, performance
C)
communications requirements, performance, information objectives
D)
Page 454
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
14
INCORRECT The major areas of problem decomposition during the project scoping
activity are the
customer workflow
A)
functionality to be delivered
Page 455
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
B)
process used to deliver functionality
C)
software process model
D)
both b and c
E)
15
CORRECT Product and process decomposition often occurs simultaneously as the
project plan evolves.
True
A)
False
B)
16
INCORRECT When can selected common process framework activities be omitted
during process decomposition?
when the project is extremely small in size
A)
any time the software is mission critical
B)
rapid prototyping does not require their use
C)
never—the activities should always occur
D)
17
INCORRECT How does a software project manager need to act to minimize the
risk of software failure?
double the project team size
A)
request a large budget
B)
start on the right foot
C)
track progress
D)
both c and d
E)
18
INCORRECT The W5HH principle contains which of the following questions?
Page 456
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Why is the system being developed?
A)
What will be done by whom?
B)
Where are they organizationally located?
C)
How much of each resource is required?
Page 457
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
D)
a, c, and d
E)
19
INCORRECT Which of these are critical practices for performance-based
project management?
assessing product usability
A)
defect tracking against quality targets
B)
empirical cost estimation
C)
formal risk management
D)
b, c, and d
E)
Lecture-22
The correct answer for each question is indicated by a .
1
INCORRECT Which of these are valid reasons for measuring software processes, products, and resources?
to characterize them
A)
to evaluate them
B)
to price them
C)
to improve them
D)
a, b, and d
E)
2
INCORRECT The terms measure, measurement, and metric all share the same definition according to the
IEEE Standard Glossary of Software Engineering Terms.
True
A)
False
B)
3
INCORRECT Process indicators enable a software project manager to
Page 459
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
adjust work flow or tasks
C)
both c and d
E)
5 CORRECT
Which of the following items are not measured by software project metrics?
inputs
A)
markets
B)
outputs
C)
results
D)
6
INCORRECT Software quality and functionality must be measured indirectly.
True
A)
False
B)
7
INCORRECT Which of following are advantages of using LOC (lines of code) as a size-oriented metric?
Page 460
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
FP is easily computed.
A)
both c and d
E)
9
INCORRECT There is no need to reconcile LOC and FP measures since each is meaningful in its own right as a
project measure.
True
A)
False
B)
10
CORRECT Object-oriented project measures may be combined with historical project data to provide metrics
that aid in project estimation.
True
A)
False
B)
11
CORRECT Use-case oriented metrics are computed directly from UML diagrams and they are often used as
normalization measures.
True
A)
False
B)
12
INCORRECT Which of the following is not a measure that can be collected from a Web application
project?
Customization index
A)
operation
A)
Page 461
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
transition
B)
revision
C)
True
A)
False
B)
16
INCORRECT Why is it important to measure the process of software engineering and software it
produces?
both b and c
E)
Page 462
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
18
INCORRECT Baseline data must be collected in an on-going manner and cannot be computed by formal study of
historical project data.
True
A)
False
B)
19
INCORRECT Small software organizations are not likely to see any economic return from establishing
software metrics program.
True
A)
False
B)
20
CORRECT The software metrics chosen by an organization are driven by the business or technical goals an
organization wishes to accomplish.
True
A)
False
B)
Early 60s
State
Prohibited
Two
Page 463
Email: [email protected] VU Campus Sahiwal
AL-JUNAID INSTITUE OF GROUP
Diagrams used to capture dynamic behaviour are called ____________ diagrams.
Interaction
Page 464
Email: [email protected] VU Campus Sahiwal