0% found this document useful (0 votes)
429 views28 pages

Software Engineering - Mock Exit Exam 2023l24

Uploaded by

henokgmariam7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
429 views28 pages

Software Engineering - Mock Exit Exam 2023l24

Uploaded by

henokgmariam7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Program: BSc in Software Engineering

Exam Type: Mock Exit Exam


Exam Item: Multiple Choice
Number of Questions: 100
Time Allowed: 3:00hrs

St.Name: _____________________________________

IDNo: _______________________________________

May 31, 2024


Jimma University
Instruction: Choose the best answer from the given alternative

1. Which type of AI agent can improve its performance over time by learning from experience?
A. Simple reflex Agent
B. Utility-based Agent
C. Model-based Agent
D. Learning Agent
ANSWER: D

2. Which of the following searching algorithm guarantees to finding the optimal solution (lowest
cost path) if it exists.
A. Depth-First Search (DFS)
B. Breadth-First Search (BFS)
C. Uniform Cost Search (UCS)
D. Iterative Deepening Search (IDS)
ANSWER: C
3. Compared to Breadth-First Search (BFS), Depth-First Search (DFS) is generally-----
A. More likely to find the shortest path to the goal.
B. More space-efficient for large search spaces.
C. Less likely to get stuck in dead ends.
D. Guaranteed to find a solution if one exists, even in infinite search spaces.
ANSWER: B
4. Suppose we are taking an entity, Abel. Abel is a Software Developer as a profession, and his
age is 26, his weight is 70KG, his height is 1.75 cm, he lives in city Jimma, and the country is
Ethiopia. Which knowledge representation technique would be most appropriate for this
scenario?
A. Logical Representation.
B. Semantic Network.
C. Frame Representation.
D. Production Rules.
ANSWER: C
5. Suppose you are applying for a competitive job on Apple Company. The company uses an AI
system to evaluate applications and select candidates for interviews. How do you feel about
this?
A. AI cannot objectively assess skills and qualifications.
B. AI might overlook unique strengths or experiences for candidates
C. The impersonal nature of AI removes the human touch from the process.
D. AI could eliminate unconscious bias in the selection process.
Answer: B
6. Which of the following is an EXAMPLE of supervised learning?
A. A robot learning to walk
B. Finding the most important features in a dataset
C. Predicting the price of a house
D. Learning to play a game of chess
ANSWER: C
7. What is the name of the technique used to deal with overfitting in machine learning
models?
A. Underfitting
B. Regularization
C. Feature Engineering
D. Cross-validation
ANSWER: B
8. Which supervised learning algorithm is particularly well-suited for dealing with textual
data and is based on probability theory?
A. Regression
B. k-Nearest Neighbors (k-NN)
C. Naive Bayes
D. Support Vector Machines (SVM)
ANSWER: C
9. ABC Company has website traffic data and wants to identify groups of users with similar
browsing behavior. Which unsupervised learning technique would be best suited for this task?
A. K-Means Clustering
B. Decision Trees
C. Naive Bayes
D. Random Forest
ANSWER: A
10. Suppose you are trained a machine learning model and achieved good performance on the
training dataset. But, you are not sure how well it will perform on unseen data. What evaluation
technique can help you check how well the model generalizes to unseen data?
A. K-Fold Cross-Validation
B. Confusion Matrix
C. Hyperparameter Tuning
D. Bootstrapping
ANSWER: A
11. Which of the following network device used for managing a network security?
A. Firewall
B. Router
C. Switch
D. Transparent Bridge
ANSWER: A
12. Which of the following transmission media is best suited for high-speed, long-distance
communication?
A. Coaxial Cable
B. Twisted Pair Cable
C. Satellite
D. Fiber Optic
ANSWER: D
13. What benefit does DHCP provides for a given network?
A. Hosts always have the same IP address and are therefore always reachable.
B. DHCP allows users to refer to locations by a name rather than an IP address.
C. Hosts can connect to the network and get an IP address without manual configuration.
D. Duplicate addresses cannot occur on a network that issues dynamic addresses using
DHCP and has static assignments.
ANSWER: C
14. What method can be used by two computers to ensure that packets are not dropped because
too much data is being sent too quickly?
A. Encapsulation
B. Flow control
C. Access method
D. Response timeout

ANSWER: B
15. Which two flags in the TCP header are used in a TCP three-way handshake to establish
connectivity between two network devices?
A. ACK and FIN
B. PSH and RST
C. SYN and ACK
D. SYN and URG
ANSWER: C
16. When is UDP preferred to TCP?
A. When a client sends a segment to a server
B. When all the data must be fully received before any part of it is considered useful
C. When an application can tolerate some loss of data during transmission
D. When segments must arrive in a very specific sequence to be processed successfully
ANSWER: C
17. Which of the following key is the first key used to identify one and only one instance of an
entity uniquely?
A. Candidate Key
B. Primary key
C. Super Key
D. Foreign key
ANSWER: B
18. Which of the following principles of database design ensures that changes made to one aspect
of the database do not impact other aspects of the database?
A. Data Normalization
B. Data Independence
C. Entity-Relationship Model
D. Data Consistency
ANSWER: B
19. An entity set that does not have sufficient attributes to form a primary key is a____
A. A. Strong entity set.
B. Simple entity set.
C. Weak entity set
D. Primary entity set
ANSWER: C
20. Which of the following is the most efficient way to update a specific customer's email address
in the "customers" table?
A. Update all records and then change the desired one again.
B. Use the UPDATE statement with a WHERE clause to filter the specific customer.
C. Delete the customer record and insert a new one with the updated email.
D. Manually edit the data file where the table is stored
ANSWER: B
21. Suppose you want to insert a new record into the Orders table with the following values:
OrderID (110), CustomerID (01), OrderDate (2024-06-01), and TotalAmount (200.00). Which
SQL statement would achieve this?
A. SELECT * FROM Orders WHERE OrderID = 110;
B. ALTER TABLE Orders ADD COLUMN ProductID INT;
C. INSERT INTO Orders (OrderID, CustomerID, OrderDate, TotalAmount)
VALUES (110, 01, '2024-06-01', 200.00);
D. INSERT INTO Orders = OrderID, CustomerID, OrderDate, TotalAmount
VALUES (110, 01, '2024-06-01', 200.00);
ANSWER: C
22. A company experiences a data breach where customer information is leaked. The first priority
for the Software security team should be to:
A. Update all company passwords.
B. Notify customers about the breach immediately.
C. Implement new data encryption protocols.
D. Identify the source of the breach and contain the threat.
ANSWER: D
23. One of the following is not the challenge which programmers face due to Multicore or
multiprocessor systems while designing system or application programs.
A. Dividing activities
B. Balance
C. Data splitting
D. Data independency
ANSWER: D
24. What are the necessary conditions that must be present for a deadlock to occur in a system?
A. Mutual exclusion, hold and wait, no preemption, circular wait
B. No mutual exclusion, hold and wait, preemption, circular wait
C. Mutual exclusion, no hold and wait, no preemption, no circular wait
D. Mutual exclusion, hold and wait, preemption, circular wait
ANSWER: A

Software Engineering Program: Mock Exam P a g e 7 | 28


25. Imagine you have a real-time system with strict deadlines for tasks. When choosing a CPU
scheduling algorithm, which of the following would be MOST suitable for guaranteeing timely
task completion?
A. First Come First Served (FCFS)
B. Shortest Job First (SJF)
C. Priority Scheduling
D. Round Robin
ANSWER: C
26. How can file management issues such as file corruption impact system reliability?
A. File corruption can lead to data loss and system crashes
B. File corruption has no impact on system reliability
C. File corruption can improve system performance
D. File corruption only affects memory management, not file management
ANSWER: A
27. What is the purpose of disk scheduling algorithms in managing I/O operations in a modern
operating system?
A. To prevent deadlock situations
B. To optimize disk access and reduce latency
C. To allocate memory resources efficiently
D. To manage file permissions and access control
ANSWER: B
28. What role does access control play in maintaining the security of an operating system?
A. It ensures that only authorized users can access system resources
B. It prevents memory leaks and buffer overflows
C. It optimizes disk access and reduces latency
D. It manages file permissions and directory structures
ANSWER: A

Software Engineering Program: Mock Exam P a g e 8 | 28


29. What is a key characteristic of ransomware?
A. It spreads through email attachments
B. It encrypts files and demands payment for decryption
C. It deletes system files to cause disruption
D. It hides within legitimate software to avoid detection
ANSWER: B
30. Which term refers to a software security mechanism that blocks unauthorized access to a
network?
A. Router
B. Switch
C. Hub
D. Firewall
ANSWER: D
31. Which of the following is a common method of cryptographic attack?
A. Ciphertext-only attack
B. Known-plaintext attack
C. Chosen-plaintext attack
D. Brute force attack

ANSWER: D
32. Which cryptographic technique is used to transform plaintext into unreadable ciphertext?
A. Hashing
B. Symmetric encryption
C. Asymmetric encryption
D. Digital signatures
ANSWER: B
33. In a public-key system using RSA, you intercept the ciphertext C = 9 sent to a user whose
public key is e = 7, n = 55. What is the plaintext M?
A. 40
B. 23
C. 44
D. 55

ANSWER: C
Software Engineering Program: Mock Exam P a g e 9 | 28
34. What is the first step in the program development process?
A. Coding
B. Problem definition
C. Testing
D. Deployment
ANSWER: B

35. What is the value of ‘e’? Assume that all variables are properly declared.

A. 10
B. 4
C. 7
D. 0
ANSWER: C
36. Which control statement is suitable for situations where a block of code needs to be executed
at least once?
A. While loop
B. for loop
C. do-while loop
D. switch statement
ANSWER: C
37. Which of the following is a valid IDENTIFIER in c++?
A. Abc7_4
B. ABC_4!fa
C. A$C_45fa
D. 6AbCD
ANSWER: A

Software Engineering Program: Mock Exam P a g e 10 | 28


38. Which of the following is the correct syntax to read the single character to console in the
C++ language?
A. get(ch)
B. Scanf(ch)
C. Read ch()
D. Getline vh()
ANSWER: A
39. What will be the output of the following C++ code?

A. Run-time Error
B. Valid
C. Invalid
D. No output
ANSWER: C
40. How many times does the following loop execute?

A. 20
B. 17
C. 6
D. 7
ANSWER: D

Software Engineering Program: Mock Exam P a g e 11 | 28


41. An e-commerce website needs a program to manage shopping carts. Users can add items with
quantities to their cart, update quantities, remove items, and calculate the total cost. Which
concept is most important for managing items in the cart?
A. Functions
B. Loops
C. Objects
D. Inheritance
ANSWER: C
42. A Software company needs to create secure passwords for users. The password should be a
random combination of letters, numbers, and symbols with a specified length. Which function
would be most helpful for generating random characters?
A. A sorting function.
B. A string concatenation function.
C. A random number generator function.
D. A file I/O function.
ANSWER: C
43. During testing, you encounter an error where images are not loading correctly on user profiles.
What debugging technique would be most helpful in isolating the cause?
A. Rewriting the entire image loading code section.
B. Consulting online forums for similar errors without any specific analysis.
C. Ignoring the error and hoping it resolves itself in the future.
D. Using print statements to track variable values at different stages of the image
loading process.
ANSWER: D
44. Assume that a lot of self-learning platforms are available at your company and you are facing
with a programming challenge to finishing the task in time due to programming constraints.
What action should you take first?
A. Ask a colleague for help immediately.
B. Search online forums and documentation for solutions to similar problems.
C. Wait for someone else to fix the problem for you.
D. Give up and move on to a different task.
ANSWER: B

Software Engineering Program: Mock Exam P a g e 12 | 28


45. Which data structure is best suited for representing a SOCIAL NETWORK where users can
follow each other?
A. Array
B. Stack LIFO
C. Graph
D. Linked List
ANSWER: C
46. What is the time complexity of the following code below?

A. O(n2)
B. O(n)
C. O(log2 n)
D. O(1)
ANSWER: A
47. Which of the following data structures allows for efficient insertion and deletion at any position
within the structure?
A. Stack LIFO
B. Queue FIFO
C. Array
D. Linked List
ANSWER: D

Software Engineering Program: Mock Exam P a g e 13 | 28


48. What is the main difference between time complexity and space complexity of an algorithm?
A. Time complexity is related to errors, while space complexity is related to performance.
B. Time complexity measures execution time, while space complexity measures memory
usage.
C. Time complexity deals with user input, while space complexity deals with output.
D. Time complexity is always higher than space complexity.

ANSWER: B
49. What is the theoretical time complexity of searching for an element in a sorted array using
binary search?
A. Constant time (O(1))
B. Logarithmic time (O(log n))
C. Linear time (O(n))
D. Quadratic time (O(n^2))
ANSWER: B
50. Imagine you are creating a program to simulate a traffic light intersection. Cars arrive from
different directions and need to wait for their turn to proceed. The program should manage
light cycles and car movement. Which data structure would be most appropriate to model the
waiting cars?

A. Stack LIFO
B. Queue
C. Binary Search Tree
D. Hash Table
ANSWER: B
51. Which of the following concepts in object-oriented programming allows a class to define
behaviors that are shared by all objects of the same class?
A. Method
B. Constructor
C. Instance variable
D. Static variable
ANSWER: A
Software Engineering Program: Mock Exam P a g e 14 | 28
52. What is the concept of ENCAPSULATION in OOP designed to achieve?
A. Protect an object's internal data from unauthorized access.
B. Allow objects to communicate freely with any other object
C. Simplify the user interface for the program.
D. Completely rewrite the behavior of a parent class.
ANSWER: A
53. Your program encounters an error while trying to read data from a file containing animal
information. What concept can help manage this error?
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Exception Handling
ANSWER: D
54. In the following below code snippet. What is the benefit of subclass Square inheriting from
superclass Rectangle?

A. Faster program execution


B. Improved memory management
C. Simplify the user interface for the code.
D. Code reusability
ANSWER: D

Software Engineering Program: Mock Exam P a g e 15 | 28


55. Which of the following GUI components is primarily used to display non-editable text on the
screen?
A. JButton
B. JTextField
C. JLabel
D. Menu
ANSWER: C

56. Which of the following best describes the role of a software project manager in stakeholder
management?
A. Ensuring that all stakeholders have equal influence over project decisions
B. Identifying stakeholder needs and expectations and managing their involvement to
ensure project success
C. Limiting stakeholder involvement to reduce project complexity
D. Delegating stakeholder communication to team members to focus on technical
tasks
Answer: B
57. Which project management tool is specifically designed to track project progress and identify
potential delays through a visual representation of tasks over time?
A. Gantt Chart
B. Work Breakdown Structure (WBS)
C. Risk Register
D. Project Charter
Answer: A.

Software Engineering Program: Mock Exam P a g e 16 | 28


58. Consider the table below.What is the critical path for the following Work Breakdown Structure
(WBS)?

A. ABEGH B. ACFHG C. ABDHG D. ACDHG


Answer: A.
59. Which of the following techniques is most effective for managing and controlling changes in
software project requirements?
A. Regular team meetings
B. Strict adherence to the initial project plan
C. Integrated Change Control Process
D. Informal communication with stakeholders
Answer: C.
60. What is the primary purpose of using Earned Value Management (EVM) in project
management?
A. To manage project risks
B. To control project scope changes
C. To measure project performance and progress using an integrated schedule and
budget
D. To allocate resources efficiently
Answer: C.

Software Engineering Program: Mock Exam P a g e 17 | 28


61. Which of the following is a key benefit of implementing Behavior-Driven Development
(BDD) in modern software testing processes?
A. It reduces the need for user acceptance testing (UAT)
B. It ensures that the software's functionality is tested against business requirements
using plain language scenarios
C. It eliminates the need for integration testing
D. It allows testing to be performed without any requirements documentation

Answer: B.
62. In modern software testing, which approach is characterized by short development cycles,
frequent releases, and automated testing to ensure that new code does not break existing
functionality?
A. Waterfall Testing
B. Regression Testing
C. Agile Testing
D. Smoke Testing
Answer: C.
63. When designing test cases, which approach ensures that all possible paths through a given part
of the software are tested at least once?
A. Boundary Value Analysis
B. Equivalence Partitioning
C. Path Testing
D. Random Testing
Answer: C.
64. Which of the following techniques is most effective in identifying potential risks during the
early phases of a software project?
A. SWOT Analysis
B. Delphi Technique
C. Brainstorming
D. Monte Carlo Simulation
Answer: B. Delphi Technique

Software Engineering Program: Mock Exam P a g e 18 | 28


65. Which risk response strategy involves transferring the impact of a risk to a third party, such as
through insurance or outsourcing?
A. Risk Mitigation
B. Risk Acceptance
C. Risk Transference
D. Risk Avoidance
Answer: C.
66. What is the PRIMARY purpose of software architecture in a software development project?
A. To define the specific programming language and coding techniques used.
B. To define the high-level structure, components, and interactions within a software system.
C. To write detailed instructions for each line of code developers need to write.
D. To create the user interface design and layout for the software.
Answer: B
67. In which of the architecture pattern multiple components access data through a common data store?
A. Layered architecture pattern
B. Shared data pattern
C. Client-server pattern
D. Multi-tier pattern
Answer: B
68. Which category of client-server architecture contains all kinds of settings?
A. 3-tier architecture
B. 2 tier architecture
C. 1-tier architecture
D. N-tier architecture
Answer: C.

Software Engineering Program: Mock Exam P a g e 19 | 28


69. When identifying stakeholders for a large-scale software system, which of the following should
NOT be considered?
A. End-users who will interact with the system.
B. Developers who will build and maintain the system
C. Investors who are financially backing the project.
D. Regulatory bodies that may have compliance requirements.
Answer: B.
70. Among the phases given below of the waterfall model which phase takes the longest time?
A. Integrating phase
B. Analysis and requirement phase
C. Testing phase
D. Maintenance
Answer: B

71. Which of the following is NOT a typical activity performed during requirement engineering?
A. Gathering requirements from stakeholders
B. Designing the user interface
C. Analyzing and documenting requirements
D. Prioritizing requirements
Answer: D
72. What is a common challenge faced during requirement engineering?
A. Writing code in a specific programming language
B. Difficulty in understanding user needs
C. Choosing the right development tools
D. Integrating the software with existing systems
Answer: B

Software Engineering Program: Mock Exam P a g e 20 | 28


73. How can you improve the clarity and conciseness of a requirements document?
A. Use technical jargon and complex sentence structures.
B. Clearly define acronyms and avoid unnecessary repetition.
C. Include lengthy background information on the project.
D. Organize requirements in a random and unstructured manner.
Answer: B
74. Which of the following is NOT typically included in a Non-Functional Requirements Document
(NFRD)?
A. Security requirements (e.g., data encryption)
B. User interface (UI) design specifications
C. Performance requirements (e.g., response time)
D. Availability requirements (e.g., uptime)
Answer: B
75. When managing changes to software requirements, what should be the primary focus?
A. Minimizing the number of changes requested by stakeholders
B. Ensuring a smooth development process even if it means compromising on requirements.
C. Balancing the need for change with maintaining project scope, budget, and timeline.
D. Prioritizing developer preferences over stakeholder needs when evaluating changes.
Answer: C
76. How do you communicate between two Activities in Android?
A. Using a message queue
B. Using an AsyncTask
C. Using a ContentProvider
D. Using an Intent
Answer: D

77. What is the purpose of an IntentFilter in Android?


A. To specify the exact component to be executed
B. To launch a new task
C. To declare the permissions required to use a component
D. To define the types of actions or data that a component can handle .
Answer: D
Software Engineering Program: Mock Exam P a g e 21 | 28
78. When does the onResume() method get called in an Android Activity?
A. When the Activity is destroyed
B. When the Activity is first created
C. When the Activity is stopped and then restarted
D. When the Activity is paused and then resumed
Answer: D

79. How many manifest files one can find in an android application?
A. 2
B. 3
C. 1
D. as per the application
Answer: C

80. Which of the following is true about the following line of code:

A. It only saves changes in a text field.


B. It sets the number of clicks the user presses to run the application.
C. The system executes the code you write in setOnClickListener({ }) after the user
presses the button.
D. It sets the time and date of run process.
Answer: C

Software Engineering Program: Mock Exam P a g e 22 | 28


81. Consider the following JavaScript statements.

In order to check if the pattern matches with the string represented by a variable sentence, the
statement is ____________
A. sentence==pattern
B. pattern.test(text)
C. sentence.test(pattern)
D. pattern.test(sentence)

ANSWER: D.

82. Which of the following CSS style properties are inherited, meaning they are transmitted from
parent to child elements?

A. Borders style
B. Colors style
C. Margins style
D. Height style

ANSWER: B

83. What is the purpose of using relative and absolute paths in hyperlinking?
A. To specify the location of the linked page
B. To control the size and position of the linked element
C. To define the background color of the linked element
D. To add interactivity to the linked element

ANSWER: A

Software Engineering Program: Mock Exam P a g e 23 | 28


84. What is the purpose of using the box-sizing property in CSS?
A. To control the layout of table elements
B. To specify the position of an element
C. To control the size of an element including padding and border
D. To create rounded corners on elements

ANSWER: C
85. What does the ID selector do?
A. Apply the style to a specific element
B. Apply the style to all the elements
C. Apply the style to a group of elements
D. Apply the style to elements of the same type

ANSWER: C

Software Engineering Program: Mock Exam P a g e 24 | 28


86. Given the following PHP code, when does the cookie expire?

A. After 3600 minutes


B. After 3 days
C. Expired 60 minutes ago already
D. After 1 hour

ANSWER: D

87. Among the given statements, which statement is correct?


A. JavaScript enables the segregation of a web page's layout and styles.
B. HTML attributes enable the incorporation of interactivity into your website.
C. HTML enables you to organize the contents of a webpage.
D. JavaScript cannot alter the content or attributes of HTML elements.

ANSWER: C

88. What is the correct HTML for inserting an image?


A. <img src="image.gif" alt="MyImage">
B. <img alt="MyImage" image.gif /img>
C. <image src="image.gif" alt="MyImage">
D. <img href="image.gif" alt="MyImage">

ANSWER: A

89. What is the purpose of hyperlinking to an email address in HTML?


A. To display the email address as a clickable link
B. To open the default email client with a new message
C. To redirect the user to a different web page
D. To send an email directly from the web page

ANSWER: B

Software Engineering Program: Mock Exam P a g e 25 | 28


90. Which of the following most widely used software mistakes that occurred during the coding
phase?
A. Defects
B. Failures
C. Errors
D. Bugs
Answer: D
91. How is the fix backlog defined in terms of workload for software maintenance?
A. A count of reported problems at the end of each week
B. The rate at which fixes become available
C. A count of reported problems remaining at the end of each month
D. A trend chart of defect arrivals
ANSWER: B
92. What is the purpose of Maintenance Metrics in software development?
A. To increase the number of reported issues
B. To evaluate the performance of development teams
C. To track, analyze, and improve maintenance processes
D. To ignore the impact of maintenance activities
ANSWER: B
93. What is a challenge related to the legal factor in software reuse?
A. Technical complexity
B. Economic viability
C. Proprietary and copyright issues
D. Managerial resistance
ANSWER: C
94. Which activity is NOT typically part of the re-engineering process?
A. Source code translation
B. Reverse engineering
C. Program modularization
D. Data re-engineering
ANSWER: A

Software Engineering Program: Mock Exam P a g e 26 | 28


95. Which software model helps in analyzing the risk?
A. Waterfall model
B. Prototype Model
C. Incremental Model
D. Spiral Model
ANSWER: D
96. Which of the following is NOT a core principle of good software design?
A. Modularization
B. Reusability
C. Redundancy
D. Cohesion
ANSWER: C
97. Which software engineering practice focuses on identifying and mitigating potential risks
during the development process?
A. Version control
B. Risk management
C. User interface design
D. Deployment planning
ANSWER: B
98. Which one of the following activity like planning, resource allocation, and risk assessment are
crucial throughout the SDLC but not exclusive to any one stage.
A. Coding
B. Testing
C. Project management
D. Design
ANSWER: C

Software Engineering Program: Mock Exam P a g e 27 | 28


99. A software developer has completed coding a new feature for a project. Before integrating it
with the main codebase, what is the MOST important step to ensure quality?

A. Deploying the code directly to the production environment for testing.


B. Reviewing the code for potential errors and adherence to coding standards.
C. Writing extensive user documentation for the new feature.
D. Updating marketing materials to showcase the new feature.

ANSWER: B
100. Which of the following is NOT a benefit of a well-defined software process?
A. Reduced communication among team members
B. Improved risk management
C. Minimized errors and defects
D. Increased predictability of project outcomes
ANSWER: A

Software Engineering Program: Mock Exam P a g e 28 | 28

You might also like