SE Feb 2015
SE Feb 2015
1. oval
2. box
3. circle
4. triangle
Correct Answer : 2
6. which of the following activities of SDLC involves choosing a system structure capable of satisfying
requirement specification?
1. requirement analysis
2. design
3. coding
4. testing
Correct Answer : 2
8. . ------------------- Lifecycle model describe how software system should be developed and describe
how software are actually developed.
1. Prescriptive & Descriptive
2. Prescriptive & Definitive
3. Descriptive & Prescriptive
4. Descriptive & Intuitive
Correct Answer : 1
12. Ability of a software to perform intended function with minimum consumption of computing
resources
1. Effeciency
2. Robustness
3. Reliability
4. Correctness
Correct Answer : 1
13. Ability to deal with exceptional conditions e.g. invalid input, improper handling, power failure, disk
crash etc.
1. Effeciency
2. Robustness
3. Reliability
4. Correctness
Correct Answer : 2
15. The type of testing carried out along with coding is called
1. system testing
2. unit testing
3. pretesting
4. stress testing
Correct Answer : 2
16. The type of software maintainence which is done to remove bugs or defects in the software is
called
1. Corrective Maintainence
2. Adaptive Maintainence
3. Regressive Maintainence
4. Perfective Maintainence
Correct Answer : 1
18. Which of the following is not true about Component Assembly Model
1. It is similar to the Spiral Model
2. The technical framework for this model is provided by object technologies
3. Candiate classes are extracted from class library or developed
4. Its productivity is low
Correct Answer : 4
19. Which of the following is not true about the context diagram?
1. It does not show details of the funtioning
2. It shows major inputs & outputs of the system
3. It shows the external entities of the system
4. It shows the datastores of the system
Correct Answer : 4
24. If two modules are coupled without exchange of data or control information then they exhibit
1. Normal Coupling
2. Stamp Coupling
3. Control Coupling
4. Common Coupling
Correct Answer : 1
26. What manifests in the patterns of choices made among alternatives ways of expressing an
algorithm is
1. a data flow diagram
2. coding style
3. a data dictionary
4. None of these options
Correct Answer : 2
27. Changes made to the software to correct defects uncovered after delivery is called
1. perfective maintainence
2. regressive maintainence
3. adaptive maintainence
4. corrective maintainence
Correct Answer : 4
28. Arrang the following in the correct sequence of software estimation a. Schedule Estimation b. Effort
Estimation c. Cost Estimation d. Size estimation
1. b, c, a, d
2. c, a, b, d
3. d, b, a, c
4. a, c, d, b
Correct Answer : 3
29. Final Function point count calculated for project will result in the smallest LOC if implemented in
1. Assembly
2. C
3. C++
4. Visual Basic
Correct Answer : 4
32. ________ shows the dependencies between the different activities making up a project.
1. PERT chart
2. Bar chart
3. Staffing Plan
4. Pi chart
Correct Answer : 1
34. Judging the seriousness of a risk by evaluating its probability along with its consequences is called
1. Risk analysis
2. Risk Projection
3. Risk Estimation
4. all of the above
Correct Answer : 4
40. The WM_INITDIALOG message is sent to the dialog box procedure immediately before a dialog box
is displayed.
1.true
2.false
3.not always
60. A windows program should have a message loop comprising of GetMessage(), DispatchMessage()
and TranslateMessage() to process messages from the message queue.
true
false
not always
61. GetDC() is used to retrieve the device context handle for the windows client area when processing a
WM_PAINT message.
true
false
not always
62. If a printable key is pressed then WM_CHAR message will be generated and the ASCII code of the
key will be stored in wParam.
true
false
not always
63. Whenever WM_LBUTTONDOWN,WM_MOUSEMOVE,WM_RBUTTONDOWN messages are
generated that time LOWORD(wParam) and HIWORD(wParam) consists of x and y coordinates of the
mouse pointer.
true
false
not always
64. Predefined controls send WM_COMMAND message whereas common controls send WM_NOTIFY
message.
true
false
not always
65. A Device Context is a GDI structure, which deals with text and graphics.
true
false
not always
66. A Metafile is a collection of GUI functions that are encoded in a binary format.
true
false
not always
70. WINAPI is a API function which explicitly calls Operating System to run Window Procedure.
True
False
Not Always
71. When function key(s) pressed on the keyboard that time WM_KEYDOWN message is generated.
True
False
Not Always
77. In MDI application the default window procedure for main Window is DefWindowProc ().
True
False
Not Always
78. The WM_INITDIALOG message is sent to the dialog box procedure immediately before a dialog box
is displayed.
True
False
Not Always
85. To use the windows common controls always include _______________ .h header file.
a) COMMONCTL
b) COMCTL
c) COMMDLG
d) COMMCTL
86. You can obtain the state of Shift keys by using __________________ function.
GetKeyState( )
Key_getValue( )
GetState( )
GetStatus( )
90. For drawing an Icon on client area of window ____________ function is used.
PaintIcon( )
PasteIcon ( )
DrawIcon( )
LoadIcon ( )
91. You can create a logical font by calling which of the following functions.
CreateFont( )
CreateFontdirect( )
CreateFontIndirect( )
NewFont ( )
92. Dynamic Linked Library is loaded in the memory at____
Static time
Run time
Load Time
Compile Time.
94. Which API call is used to check what type of data available in clipboard.
IsClipboardFormatAvailable ( )
IsClipboardContainData ( )
IsTypeofData ( )
SetClipboardData ( )
103. SetROP2() function is used to change the Raster Operation the Device Context.
true
false
Not Always
106. If 4 windows are running in a single application then there are 4 Message Queues.
true
false
Not Always
108. The Windows system32 directory containds files which provides function to user application to
perform certain task in the windows enviroment.
GDI32.DLL
KERNEL32.DLL
USER32.DLL
WIN32.DLL
109. The layer between the application and different types of hardware
Application Layer
GDI layer
DataLayerShellLayer
111. In order to receive Doubleckick message a window must be created with which window style?
DB_DBCLK
CS_DBLCLICK
CS_DBLCLKS
CS_DBLCLK
112. Which message helps in detacting mouse movement and finding mousecursor position
WM_MOUSEMOVE
WM_MOUSEPOS
WM_ONMOUSEMOVE
None of these
113. When child Control in a dialogbox is activated window sends which message?
WM_COMMAND
SendDlgItem
WM_NOTIFY
WM_ACTIVATE
114. Which function will test whether the message is fr the dialogbox or the window?
DlgMessage()
SendDlgMessage()
TranslateMessage()
IsDialogMessage()
119. The register() function takes a pointer to the WndClass structure as a parameter
True
False
122. The ID value for the child window is passed by lParam Parameter with the mseeage.
True
False
123. In which message it is better to initialiaze all the controls with in the dialogbox.
WM_CREATE
WM_INITDIALOG
WM_INIT
WM_COMMAND
124. The CopyMetaFile function copies the content of a window-format MetaFile to Specified File
CreateMetaFile
CopyMetaFile
CopyDataGetMetaFile
126. ScrrenCooridinates are pixels measured from the upper left corner of the window's client area.
True
False
129. Which function use to copy file from one Devicecontext to another
DeviceContextBitBltCreateCompatibleDcCopyBltCopyBlt
130. Handle to BITMAP is
HBITMAP
HBMP
HACCEL
HDC
133. The Thread Control Panel is capable of performing the following action
Setting Thread Priority
Suspending a Thread
Resuming Thread
Terminating a Thread
135. To display a modless dialog which property u have to add in its resource files?
WM_SHOW
WS_SHOW
WS_VISIBLE
WS_DISPLAY
138. Get TextMatrix() determines the physical dimention of the font currently selected in the DC.
True
False
141. The WndClass Structure must be registered with the window before it can be used to create a
window.
True
False
144. The SDLC Model most suitable for large projects with clear knowledge & priority of requirements is
1. Spiral Model
2. Incremental Model
3. Waterfall Model
4. Prototyping Model
Correct Answer : 2
145. Which of the following is not true about the Waterfall Model?
1. It is suited for small projects
2. It does not consider risk handling
3. It gives efficient staff utilization
4. It needs clarity of requirements at start.
Correct Answer : 3
147. Which of the following model may require largest deployment of manpower
1. Incremental Model
2. Waterfall Model
3. Component Assembly Model
4. RAD Model
Correct Answer : 4
148. The majority of the lifetime of a program is spent in the __________ phase
1. Maintenance
2. Analysis
3. Design
4. Testing
Correct Answer : 1
149. In Boehm’s spiral model, each loop in the spiral represents _____ of the software process
1. phase
2. design
3. documentation
4. none of the above
Correct Answer : 1
150. Which of the following is seen in the DFD but not in the Context Diagram
1. Data Sources
2. Data Flows
3. Data Stores
4. Users
Correct Answer : 3
156. _______ models describe the logical structure of the data which is imported to and exported by the
system.
1. Object
2. Semantic data
3. Data flow
4. None of the above
Correct Answer : 2
160. Which is the most undesirable form of cohesion from the following options
1. Sequential
2. Coincidental
3. Temporal
4. Communicational
Correct Answer : 2
163. In which of the following phases of a use-case driven process do you think use cases have a role?
a) Requirements capture b) Analysis c) Design d) Implementation e) Test
1. a, b and c
2. a, b, c and d
3. b and d
4. a, b, c, d and e
166. ______________ is a programming method which combines data and instructions for processing
that data into a self-sufficient block that can be used in other programs.
1. modular programming
2. top down design
3. object oriented programming
4. structured programming
Correct Answer : 3
167. A test case design technique that makes use of a knowledge of the internal program logic
1. Black Box Testing
2. White Box Testing
3. Unit Testing
4. None of these
Correct Answer : 2
170. Which of the following is true about McCabe`s Cyclomatic Complexity of a Program
1. It is an indicator of the structural complexity of a program
2. It gives the maximum no of independent paths in a program
3. It is calculated from the no. of edges & nodes in the Control Flow diagram
4. All of the above
Correct Answer : 4
171. Which of the following is generally not a part of the SPMP document?
1. Configuration Management Plan
2. Quality Assurance Plan
3. Risk Management Plan
4. Requirements Elicitation Plan
Correct Answer : 4
179. . Which one of the following is method is not used in describing complex system process
1. Decision table
2. Structure English
3. Finite automata
4. Binary tree
Correct Answer : 4
182. Pick up the odd one out of the following process models
1. Component assembly model
2. Prototyping Model
3. Spiral model
4. Waterfall Model
Correct Answer : 4
184. The waterfall model of the software process considers each process activity as a _______ phase
1. separate
2. discrete
3. Both a and b options
4. None of the above
Correct Answer : 3
186. In the Spiral model the radius of the spiral at any point represents
1. the level of risk
2. the progress made in the current phase
3. the cost incurred in the project till then
4. None of these
Correct Answer : 3
187. Planning the modular program structure & control relationships between modules is called
1. Architechtural Design
2. High Level Design
3. System Design
4. all of the above
Correct Answer : 4
188. Designers should aim to produce strongly _____ and weakly _____ designs
1. coupled, functional
2. maintainable, cohesive
3. cohesive, coupled
4. coupled, cohesive
Correct Answer : 3
Correct Answer : 4
192. The two questions "Are we building the right product?" &"Are we building the product right?"
correspond to
1. Verification only
2. Validation only
3. Validation & Verification respectively
4. Verification &Validation respectively
Correct Answer : 3
194. A stub is a dummy version of the __________ module of the module under testing
1. superordinate
2. subordinate
3. coordinate
4. All of the above
Correct Answer : 2
195. A driver is a dummy verion of the __________ module of the module under testing
1. superordinate
2. subordinate
3. coordinate
4. All of the above
Correct Answer : 1
196. _________ exercises the system beyond its maximum design load
1. Thread testing
2. Stress Testing
3. Back to back testing
4. all of the above
Correct Answer : 2
197. Presenting the same tests to different versions of the system and compare outputs is called
1. Thread testing
2. Stress Testing
3. Back to back testing
4. all of the above
Correct Answer : 3
199. Which of the following is true for two projects of same category with the same estimated LOC size
and using COCOMO for estimation A) The initial effort estimate for both projects will be same as both
have same LOC B) The Effort Adjustment Factor will always be the same for both projects C) The final
effort estimate will always be the same for both projects
1. Only A is true.
2. Only A & B are true
3. Only C is true
4. Neither A, B or C are true.
Correct Answer : 1
200. In COCOMO terminology a project with software being strongly coupled to complex hardware &
stringent regulations on operating procedures is categorised as
1. Organic
2. Semidetached
3. Embedded
4. Application
Correct Answer : 3
201. Which version of COCOMO develops estimates for large projects as sum of estimates of its various
subsystems by considering the differences in the complexities of its various subsytems
1. Basic COCOMO
2. Intermediate COCOMO
3. Complete COCOMO
4. None of the above
Correct Answer : 3
202. The minimum time required to finish the project can be estimated by considering the ______ path
in the activity graph
1. Shortest
2. Longest
3. Average
4. SPT
Correct Answer : 2
205. Arrange the following activities in Risk Assessment in the correct sequence a. Prioritization b.
Identification c. Analysis
1. b, a, c
2. b, c, a
3. a, b, c
4. c, a, b
Correct Answer : 2
206. ___________ ensures that a set procedure is followed to make any changes to the software
1. Configuration Identification
2. Configuration Control
3. Baselining
4. all of the above
Correct Answer : 2
210. Which one of the following is not considered as parameter of function point
1. Number of input
2. Number of interface
3. Number of file
4. Number of output data
Correct Answer : 4
214. Object oriented technology`s use of ___________ facilitates reuse of the code and architecture
while its ______________ feature provides systems with stability, as a small change in requirements
doesn`t require massive changes in the system.
1. Inheritance, Encapsulation
2. Inheritance, Polymorphism
3. Encapsulation, Polymorphism
4. Polymorphism, Abstraction
Correct Answer : 1
215. Which of the following steps do you think developers should take to create efficient compact
applications?
a. Clearly define initial requirements of the system
b. concentrate earlt development efforts on modeling implementation mechanisms
c. Analyze and manage risk throughout the development process
d. Leave all software testing until after system has been implemented
1. a, c
2. a, b
3. a, b, d
4. a, b, c
Correct Answer : 1
218. Towards end of the design phase, ___________ should be allocated to source code components.
1. use cases
2. relationships
3. models
4. classes
Correct Answer : 4
219. What do you think is the first step you should take in designing any project?
1. design a prototype
2. create the test cases
3. define problem domain and produce problem statement
4. draw up a plan for entire project
Correct Answer : 3
220. If you are finding hard to identify the name of class and to write definition for it. What thing you
should do?
1. ignore class completely
2. do more analysis to get a better understanding of what is invaloved in the class
3. write a definition for the class even if it is not very good
4. make it a friend class of some other main class
Correct Answer : 2
221. Which of the following statements are true of use cases and use case models?
a. functionality of a use-case has to be complete from start to finish
b. use case provide developers with classes and operations
c. use cases outline functionality of the system
d. use case models can be used to test the system
1. a, b, c
2. a, b, c, d
3. a, c, d
4. a, c
Correct Answer : 3
244. Identify the true statements about using a process for software development.
a) Processes usually divide software development into phases
b) Processes provide guidelines for what to do at each phase of development
c) Processes are used o
1. a and c
2. a and b
3. a, b and d
4. a, c and d
Correct Answer : 3
245. Process visibility is enhanced by
1. Defining clear cut phases
2. Producting documents related to each phase
3. Conducting reviews & checks
4. all of the above
Correct Answer : 4
248. The analysis phase takes a ______ approach to the system, ignoring its inner workings whereas the
design phase takes a _____ approach, making decisions on how the model will be implemented in code
1. White box & Black box
2. Black box & White box
3. Top-Down & Bottom-Up
4. Bottom-Up & Top-Down
Correct Answer : 2
250. The __________ phase of the systems life cycle contains periodic evaluations and updates of the
system
1. preliminary investigation
2. Systems analysis
3. Systems implementation
4. Systems maintenance
Correct Answer : 4
251. The type of software maintainence which is done to add new features to the product is called
1. Corrective Maintainence
2. Adaptive Maintainence
3. Regressive Maintainence
4. Perfective Maintainence
Correct Answer : 4
252. The choice of the Software Development Life Cycle Model to be followed for a project depends on
A) Initial Clarity of Requirements B) Size of the Project C) Time Frame of the Project D) Clarity on
Technical Issues
1. A, B & C only
2. A, B & D only
3. A, B, C & D
4. A & D only
Correct Answer : 3
253. Because of the cascade from one phase to another, the model of software development process is
known as
1. Evolutionary model
2. Formal model
3. Waterfall model
4. None of the above
Correct Answer : 3
257. ________ means to build a model that can be modified before the actual system is installed
1. Maintenance
2. Prototyping
3. Implementation
4. None of the above
Correct Answer : 2
260. Notations used to specify the external characteristics, architectural structure, and processing details
of a software system include I. Data Flow Diagrams II. HIPO diagrams III. Structure Charts
1. I and II Only
2. III Only
3. I, II and III
4. None of the above
Correct Answer : 3
263. Designers should aim to produce strongly _____ and weakly _____ designs
1. coupled, functional
2. maintainable, cohesive
3. cohesive, coupled
4. coupled, cohesive
Correct Answer : 3
264. . Using __________ a programmer can detail the logic of the program
1. pseudocode
2. software
3. context diagram
4. data flow diagram
Correct Answer : 1
267. . Typographical errors and/or incorrect use of the programming language is referred to as
1. logic errors
2. syntax errors
3. run time errors
4. A bug
Correct Answer : 2
269. . Changes made to the software to accommodate changes to its environment is called
1. perfective maintainence
2. regressive maintainence
3. adaptive maintainence
4. corrective maintainence
Correct Answer : 3
270. . Major changes made to software after long periods is also called software reengineering or
1. perfective maintainence
2. regressive maintainence
3. adaptive maintainence
4. corrective maintainence
Correct Answer : 2
273. In COCOMO terminology a project with mixed level of staff experience & part familiarity with the
system being developed is categorized as
1. Organic
2. Semidetached
3. Embedded
4. Application
Correct Answer : 2
274. In COCOMO terminology a project with software being strongly coupled to complex hardware &
stringent regulations on operating procedures is categorised as
1. Organic
2. Semidetached
3. Embedded
4. Application
Correct Answer : 3
275. The value of COCOMO cost driver attribute for higher than average Programmer Ability will be
1. Greater than 1
2. Equal to 1
3. Less than 1
4. None of these
Correct Answer : 3
276. ____ and ____ are graphical notations which are used to illustrate the project schedule.
1. Bar chart and DFD
2. ERD and Bar chart
3. Class diagram and activity networks
4. Bar char and activity networks
Correct Answer : 4
278. The minimum time required to finish the project can be estimated by considering the ______ path
in the activity graph
1. Shortest
2. Longest
3. Average
4. SPT
Correct Answer : 2
279. According to Putnam the staffing pattern of a software project follows the Rayleigh-Norden curve
and peaks during the _____________
1. Detailed design
2. Coding & Unit testing
3. Integration Testing
4. System Testing
Correct Answer : 2
280. Risks arising out of frequent change requests are best mitigated by
1. User characterization
2. Strong SCM
3. Multisource estimations
4. Prescheduling key personnel
Correct Answer : 2
288. Towards end of the design phase, ___________ should be allocated to source code components.
1. use cases
2. relationships
3. models
4. classes
Correct Answer : 4
289. Which of the following best describes what the problem domain is?
1. kinds of resources available to development team
2. surroundings in which system operate
3. set of all functionality required of a system
4. list of technical details needed to implement project
Correct Answer : 2
290. In which of the following phases of use-case driven process do you think use cases have a role?
a. requirement capture
b. analysis
c. design
d. implementation
e. test
1. a, b, c
2. a, b, c, d
3. b, d
4. a, b, c, e
Correct Answer : 4
294. . The ____________ phase of SDLC aims at ensuring software product is as per requirements.
1. design
2. development
3. testing
4. deployment
Correct Answer : 3
299. Which is an iterative process through which the requirements are translated to "blueprint" for
constructing software
1. testing
2. requirement analysis
3. design
4. maintenance
Correct Answer : 3
300. What manifests in the patterns of choices made among alternative ways of expressing an algorithm
is
1. a data flow diagram
2. coding style
3. a data dictionary
4. a flow chart
Correct Answer : 4
303. which of the following types of test plans is most likely to arise from requirement specification
process?
1. system integration testing plan
2. acceptance test plan
3. sub-system integration test plan
4. module test plan
Correct Answer : 2
308. Pick up one of the testing methods given below that is part of white-box testing
1. equivalence partitioning
2. boundary value analysis
3. basis and testing
4. debugging
Correct Answer : 3
317. Which of the following factors of a Software Product may not contribute much directly to its
maintainibility?
1. Understandability
2. Flexibility
3. Security
4. Testability
Correct Answer : 3
319. What is the primary purpose of the first stage of software analysis and design?
1. Determining system deployment
2. Writing code
3. Capturing requirements
4. Building GUIs
Correct Answer : 3
321. The analysis phase takes a ______ approach to the system, ignoring its inner workings whereas the
design phase takes a _____ approach, making decisions on how the model will be implemented in code
1. White box & Black box
2. Black box & White box
3. Top-Down & Bottom-Up
4. Bottom-Up & Top-Down
Correct Answer : 2
324. In the Spiral model the radius of the spiral at any point represents
1. the level of risk
2. the progress made in the current phase
3. the cost incurred in the project till then
4. None of these
Correct Answer : 3
326. During Requirements Phase recording interface requirements of a software system does not include
which of the following interfaces
1. User Interfaces
2. Software Interfaces
3. Hardware Interfaces
4. Module Interfaces
Correct Answer : 4
327. External Entities in a Context Diagram may be A) People B) Other Software Systems C) Hardware D)
Databases
1. Only A & D
2. Only B & C
3. Only A, B & D
4. A,B, C & D
Correct Answer : 4
411. A system developed to give end users a concrete impression of the system capabilities is called
a) 1. Semantics
b) 2. model
c) 3. prototype
d) 4. abstraction
Correct Answer : 3
413. Planning the solution to a programming problem using a structured technique is called program
a) 1. coding
b) 2. compiling
c) 3. moduling
d) 4. design
e) Correct Answer : 4
f)
414. The software architechture is best represented by
a) 1. Context Diagram
b) 2. Flow Chart
c) 3. Structure Chart
d) 4. Data Flow Diagram
Correct Answer : 3
415. Conception & planning out of externally observable characteristics of a software is called
a) 1. External Design
b) 2. User Interface Design
c) 3. Both a and b options
d) 4. None of the above
Correct Answer : 3
416. A way of indicating the desired effect without establishing the actual mechanism
a) 1. Procedural Abstraction
b) 2. Data Abstraction
c) 3. Control Abstraction
d) 4. None of the above
Correct Answer : 3
417. In case of Bank, what will be the relationship between "Opening of Account" use case and
"Deposit" Use case?
A. Uses
B. Extends
C. Includes
D. None of the above
418. The number & complexity of interconnections between two modules is an indicator of
a) 1. Modularity
b) 2. Cohesion
c) 3. Coupling
d) 4. Abstraction
Correct Answer : 3
420. The method of deriving the structure chart from the DFD is called
a) 1. Factoring
b) 2. Factor Analysis
c) 3. Transform Analysis
d) 4. all of the above
Correct Answer : 3
422. Which iof the following is true about structure chart notations?
a) 1. There should be only one module at the top
b) 2. There should be at the most one control arrow between two modules
c) 3. The sequence or order of tasks is not represented
d) 4. All of the above
Correct Answer : 4
423. A programmer must follow the rules for coding a particular programming language. These rules are
called:
a) 1. pseudocode
b) 2. iteration
c) 3. syntax
d) 4. documentation
e) Correct Answer : 3
f)
424. Typographical errors and/or incorrect use of the programming language is referred to as
a) 1. logic errors
b) 2. syntax errors
c) 3. run time errors
d) 4. A bug
e) Correct Answer : 2
431. Changes made to the software to accommodate changes to its environment is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 3
432. Changes made to the software to extend it beyond its original functionality is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 1
f)
433. Major changes made to software after long periods is also called software reengineering or
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 2
f)
434. COCOMO is categorizes as a ____________estimation technique
a) 1. Heuristic
b) 2. Empirical
c) 3. Analytical
d) 4. None of the above
Correct Answer : 1
435. The value of COCOMO cost driver attribute for higher than average Programmer Ability will be
a) 1. Greater than 1
b) 2. Equal to 1
c) 3. Less than 1
d) 4. None of these
Correct Answer : 3
436. . ____ and ____ are graphical notations which are used to illustrate the project schedule.
a) 1. Bar chart and DFD
b) 2. ERD and Bar chart
c) 3. Class diagram and activity networks
d) 4. Bar char and activity networks
Correct Answer : 4
Correct Answer : 4
440. Risks arising out of frequent change requests are best mitigated by
a) 1. User characterization
b) 2. Strong SCM
c) 3. Multisource estimations
d) 4. Prescheduling key personnel
Correct Answer : 2
445. As per SEI CMM oganizations which do not have any KPAs present & stable are considered at
a) 1. Level 1
b) 2. Level 2
c) 3. Level 3
d) 4. Level 4
Correct Answer : 1
447. Q2. In which of the following phases of use-case driven process do you think use cases have a role?
a. requirement capture
b. analysis
c. design
d. implementation
e. test
a) 1. a, b, c
b) 2. a, b, c, d
c) 3. b, d
d) 4. a, b, c, e
Correct Answer : 4
448. If you are finding hard to identify the name of class and to write definition for it. What thing you
should do?
a) 1. ignore class completely
b) 2. do more analysis to get a better understanding of what is invaloved in the class
c) 3. write a definition for the class even if it is not very good
d) 4. make it a friend class of some other main class
Correct Answer : 2
468. Checklists, grid charts, and decision tables are all tools used in the __________ step
a) 1. preliminary investigation
b) 2. systems analysis
c) 3. systems development
d) 4. systems implementation
e) Correct Answer : 2
f)
469. The present system is studied in depth during the __________ phase of the systems life cycle.
a) 1. preliminary investigation
b) 2. systems analysis
c) 3. systems design
d) 4. systems development
e) Correct Answer : 2
471. Arrange the following Requirements subphases in the correct order a.Documentation b. Analysis c.
Validation d. Elicitation
a) 1. a, b, c, d
b) 2. d, b, a, c
c) 3. d, c, a, b
d) 4. b,a, d c
Correct Answer : 2
472. External Entities in a Context Diagram may be A) People B) Other Software Systems C) Hardware D)
Databases
a) 1. Only A & D
b) 2. Only B & C
c) 3. Only A, B & D
d) 4. A,B, C & D
e) Correct Answer : 4
473. Example of a Semantic Data model is
a) 1. data flow diagram
b) 2. Context Diagram
c) 3. Entity Relationship Diagram
d) 4. all of the above
e) Correct Answer : 3
475. A system developed to give end users a concrete impression of the system capabilities is called
a) 1. Semantics
b) 2. model
c) 3. prototype
d) 4. abstraction
e) Correct Answer : 3
476. The requirement engineering process has the following stages, Except
a) 1. Feasibility study
b) 2. Requirement analysis
c) 3. Implementation
d) 4. Requirement definition
e) Correct Answer : 3
477. Notations used to specify the external characteristics, architectural structure, and processing details
of a software system include I. Data Flow Diagrams II. HIPO diagrams III. Structure Charts
a) 1. I and II Only
b) 2. III Only
c) 3. I, II and III
d) 4. None of the above
e) Correct Answer : 3
478. Planning the modular program structure & control relationships between modules is called
a) 1. Architechtural Design
b) 2. High Level Design
c) 3. System Design
d) 4. all of the above
e) Correct Answer : 4
479. Conception & planning out of externally observable characteristics of a software is called
a) 1. External Design
b) 2. User Interface Design
c) 3. Both a and b options
d) 4. None of the above
e) Correct Answer : 3
481. Providing a logical reference to the data object without concern for the underlying representation is
a) 1. Procedural Abstraction
b) 2. Data Abstraction
c) 3. Control Abstraction
d) 4. None of the above
e) Correct Answer : 2
483. If two modules pass a data structure across their interface they exhibit
a) 1. Stamp Coupling
b) 2. Data Coupling
c) 3. Content Coupling
d) 4. Control Coupling
e) Correct Answer : 1
485. The strength of relationship between which of the following elements of a module is examined to
evaluate module cohesion
a) 1. function declarations, function definations& calls
b) 2. variable declarations
c) 3. data definitions
d) 4. all of the above
e) Correct Answer : 4
486. The graphical tool commonly used to represent the system architechture is called
a) 1. Context Diagram
b) 2. Structure Chart
c) 3. Architechtural Plan
d) 4. Event Table
e) Correct Answer : 2
487. The method of deriving the structure chart from the DFD is called
a) 1. Factoring
b) 2. Factor Analysis
c) 3. Transform Analysis
d) 4. all of the above
e) Correct Answer : 3
488. Which iof the following is true about structure chart notations?
a) 1. There should be only one module at the top
b) 2. There should be at the most one control arrow between two modules
c) 3. The sequence or order of tasks is not represented
d) 4. All of the above
e) Correct Answer : 4
f)
489. Using __________ a programmer can detail the logic of the program
a) 1. pseudocode
b) 2. software
c) 3. context diagram
d) 4. data flow diagram
e) Correct Answer : 1
490. Typographical errors and/or incorrect use of the programming language is referred to as
a) 1. logic errors
b) 2. syntax errors
c) 3. run time errors
d) 4. A bug
e) Correct Answer : 2
492. Changes made to the software to accommodate changes to its environment is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 3
f) Your Answer :
493. Changes made to the software to extend it beyond its original functionality is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 1
f) Your Answer :
494. Major changes made to software after long periods is also called software reengineering or
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 2
f) Your Answer :
495. The value of COCOMO cost driver attribute for lower than average Reliability requirement will be
a) 1. Greater than 1
b) 2. Equal to 1
c) 3. Less than 1
d) 4. None of these
e) Correct Answer : 3
498. required to finish the project can be estimated by considering the ______ path in the activity graph
a) 1. Shortest
b) 2. Longest
c) 3. Average
d) 4. SPT
e) Correct Answer : 2
500. ___________ ensures that a set procedure is followed to make any changes to the software
a) 1. Configuration Identification
b) 2. Configuration Control
c) 3. Baselining
d) 4. all of the above
e) Correct Answer : 2
503. Your Answer : The Software Life Cycle covers activities from
a) 1. Feasibility Study to Installation
b) 2. Requirements Phase to Testing
c) 3. Requirements Phase to Maintenance
d) 4. Project Initiation to Software Retirement
e) Correct Answer : 4
506. . Any activity designed to keep programs in working condition, error free, and up-to-date, is
referred to as _______
a) 1. maintenance
b) 2. testing
c) 3. debugging
d) 4. coding
e) Correct Answer : 1
507. Checklists, grid charts, and decision tables are all tools used in the __________ step
a) 1. preliminary investigation
b) 2. systems analysis
c) 3. systems development
d) 4. systems implementation
e) Correct Answer : 2
509. Which of the followinfg is not true about Component Assembly Model
a) 1. It is similar to the Spiral Model
b) 2. The technical framework for this model is provided by object technologies
c) 3. Candiate classes are extracted from class library or developed
d) 4. Its productivity is low
e) Correct Answer : 4
510. During Requirements Phase recording interface requirements of a software system does not include
which of the following interfaces
a) 1. User Interfaces
b) 2. Software Interfaces
c) 3. Hardware Interfaces
d) 4. Module Interfaces
e) Correct Answer : 4
513. A system developed to give end users a concrete impression of the system capabilities is called
a) 1. Semantics
b) 2. model
c) 3. prototype
d) 4. abstraction
e) Correct Answer : 3
514. Notations used to specify the external characteristics, architectural structure, and processing details
of a software system include I. Data Flow Diagrams II. HIPO diagrams III. Structure Charts
a) 1. I and II Only
b) 2. III Only
c) 3. I, II and III
d) 4. None of the above
e) Correct Answer : 3
515. Formal specification techniques are based on
a) 1. set theory
b) 2. logic
c) 3. sequence
d) 4. all of the above
e) Correct Answer : 4
516. Using the name of a sequence of instructions in place of the sequence of instructions is an example
of
a) 1. Procedural Abstraction
b) 2. Data Abstraction
c) 3. Control Abstraction
d) 4. None of the above
e) Correct Answer : 1
517. Providing a logical reference to the data object without concern for the underlying representation is
a) 1. Procedural Abstraction
b) 2. Data Abstraction
c) 3. Control Abstraction
d) 4. None of the above
e) Correct Answer : 2
518. A way of indicating the desired effect without establishing the actual mechanism
a) 1. Procedural Abstraction
b) 2. Data Abstraction
c) 3. Control Abstraction
d) 4. None of the above
e) Correct Answer : 3
519. Designers should aim to produce strongly _____ and weakly _____ designs
a) 1. coupled, functional
b) 2. maintainable, cohesive
c) 3. cohesive, coupled
d) 4. coupled, cohesive
e) Correct Answer : 3
520. If two modules pass a data structure across their interface they exhibit
a) 1. Stamp Coupling
b) 2. Data Coupling
c) 3. Content Coupling
d) 4. Control Coupling
e) Correct Answer : 1
521. The strength of relationship between which of the following elements of a module is examined to
evaluate module cohesion
a) 1. function declarations, function definations& calls
b) 2. variable declarations
c) 3. data definitions
d) 4. all of the above
e) Correct Answer : 4
522. . A module whose all elements exhibit relationship which involves both data and control flow is said
to be ____________ cohesive
a) 1. Sequentially
b) 2. Communicationally
c) 3. Temporally
d) 4. Procedurally
e) Correct Answer : 1
525. I. Object-oriented software development creates better programs but is less efficient to use II.
Object-oriented software development is more efficient than traditional methods. III. OOP is a process
that organizes a program into objects that contain both data and the processing operations necessary to
perform a task
a) 1. I and II are correct
b) 2. II and III are correct
c) 3. I and III are correct
d) 4. I, II and III are correct
e) Correct Answer : 3
526. Typographical errors and/or incorrect use of the programming language is referred to as
a) 1. logic errors
b) 2. syntax errors
c) 3. run time errors
d) 4. A bug
e) Correct Answer : 2
536. _________ exercises the system beyond its maximum design load
a) 1. Thread testing
b) 2. Stress Testing
c) 3. Back to back testing
d) 4. all of the above
e) Correct Answer : 2
537. Presenting the same tests to different versions of the system and compare outputs is called
a) 1. Thread testing
b) 2. Stress Testing
c) 3. Back to back testing
d) 4. all of the above
e) Correct Answer : 3
540. Changes made to the software to accommodate changes to its environment is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 3
541. Changes made to the software to extend it beyond its original functionality is called
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 1
542. Major changes made to software after long periods is also called software reengineering or
a) 1. perfective maintainence
b) 2. regressive maintainence
c) 3. adaptive maintainence
d) 4. corrective maintainence
e) Correct Answer : 2
546. In COCOMO terminology a project with software being strongly coupled to complex hardware &
stringent regulations on operating procedures is categorised as
a) 1. Organic
b) 2. Semidetached
c) 3. Embedded
d) 4. Application
e) Correct Answer : 3
547. The value of COCOMO cost driver attribute for lower than average Reliability requirement will be
a) 1. Greater than 1
b) 2. Equal to 1
c) 3. Less than 1
d) 4. None of these
e) Correct Answer : 3
549. ____ and ____ are graphical notations which are used to illustrate the project schedule.
a) 1. Bar chart and DFD
b) 2. ERD and Bar chart
c) 3. Class diagram and activity networks
d) 4. Bar char and activity networks
e) Correct Answer : 4
550. The minimum time required to finish the project can be estimated by considering the ______ path
in the activity graph
a) 1. Shortest
b) 2. Longest
c) 3. Average
d) 4. SPT
e) Correct Answer : 2
556. The collection of computer programs, procedures ,rules and associated document and data is called
-------------------------
a) 1. Software
b) 2. Hardware
c) 3. Both
d) 4. None
e) Correct Answer : 1
A: 1:An aggregation, 2: A
composition.
B:1:An attribute, 2: An
aggregation.
C:1:An aggregation, 2: An attribute.
D:1:An attribute. 2: A composition.
567. What is “Customer must have at least a Pentium machine to access this software” in context of
Software Requirements,
A: Assumption
B: Objective
C: Business Problem
D: All of the above
568. For a Leave Application System, an "Employee" can use the system to request for leaves and a
“Manager can approve/reject the leaves. The data will be stored within a “Leave database" as part of
this system. In this scenario, identify the valid actors from the following for this system.
(i)Employee
(ii)Manager
(iii)Leave Database
(iv)Leave Application System
Choice A: None of the above
Choice B: i, ii
Choice C: iii, iv
Choice D: All of the above
661. A timing constraint placed on the system or the use of a specific language during development, is an
example of
A: Functional requirements
B: Non functional requirements
C: Requirements definition
D: None of the above
What is a Requirement definition?
A: What software provides.
B: Requirements in SRS
C: What customer wants?
D: All of the above
661. ________ provides the maximum number of test cases that will be required to guarantee that every
statement in program has been executed at least once.
A: Independent Program paths
B: Cyclomatic complexity
C: Graph Matrices
D: None of the above
673. A software engineer is measuring the quality of a software system. He is concerned with the
‘reliability’ and the "validity' of his measurements. Which of the following is true?
A: Reliability refers to the extent to which the measurement represents the actual quality of the system
and validity refers to the consistency of the quality measurements
B: Reliability refers to the consistency of her quality measurements and validity refers to the extent to
which the measurement represents the actual quality of the system.
C: Reliability refers to the accuracy of her quality measurements and validity refers to the extent to
which the measurement follows a quality standard.
D: Reliability refers to the concurrency of her quality measurements and validity refers to the extent to
which the measurements are consistent with established norms.
677. Testing is a
A: process of executing a program with intent of finding an error
B: process of removing error
678. C: process of testing software
679. D: all of the above
686. Modules X and Y operate on the same input and output data. The cohesion is said to be:
A: Sequential
B: Communicational
C: Procedural
D: Logical
695. Reliability in a software system can be achieved using the following strategies, EXCEPT
1. Fault avoidance
2. Fault tolerance
3. Fault detection
4. Fault rectification
Correct Answer : 3
699. During the ______ phase, the application is verified against the requirements
1. Analysis
2. Design
3. Testing
4. Implementation
Correct Answer : 3
701. During the __________ phase of the systems life cycle, the new hardware and software are
acquired and tested
1. design
2. development
3. implementation
4. maintenance
Correct Answer : 3
702. DFD gives idea about flow of ________ & flowchart gives idea of the flow of ____________
1. processes, decisions
2. control, data
3. logic, control
4. data, control
Correct Answer : 4
707. Conception & planning out of externally observable characteristics of a software is called
1. External Design
2. User Interface Design
3. Both a and b options
4. None of the above
Correct Answer : 3
710. Which of the following is NOT true with regard to Testing & Debugging
1. Testing includes debugging
2. Debugging includes retesting
3. Testing only establishes presence of defects
4. Debugging repairs the program defects
Correct Answer : 1
711. Which factor among the follwing has least effect on the testability of a software ?
1. Decomposibility
2. Effeciency
3. Understandability
4. Observability
Correct Answer : 2
712. Identification of inputs which cause anomalous behavior in the outputs indicating the existence of
defects is
1. Static Testing
2. White Box Testing
3. Black Box Testing
4. Interface testing
Correct Answer : 3
713. Purely black box testing would be used at which of the following levels?
1. Unit testing
2. Module testing
3. Integration Testing
4. Acceptance Testing
Correct Answer : 4
715. In unit testing which of the following is the strongest testing strategy?
1. Statement coverage
2. Branch Coverage
3. Condition Coverage
4. Path coverage
Correct Answer : 4
716. Selection of test paths according to defination& usage of diiferent variables in the program is called
1. Path coverage testing
2. Condition Coverage testing
3. Data Flow Testing
4. Branch Coverage Testing
Correct Answer : 3
717. _________ exercises the system beyond its maximum design load
1. Thread testing
2. Stress Testing
3. Back to back testing
4. all of the above
Correct Answer : 2
720. In COCOMO terminology a project with software being strongly coupled to complex hardware &
stringent regulations on operating procedures is categorised as
1. Organic
2. Semidetached
3. Embedded
4. Application
Correct Answer : 3
721. Which version of COCOMO develops estimates for large projects as sum of estimates of its various
subsystems by considering the differences in the complexities of its various subsytems
1. Basic COCOMO
2. Intermediate COCOMO
3. Complete COCOMO
4. None of the above
Correct Answer : 3
724. Risks arising out of frequent change requests are best mitigated by
1. User characterization
2. Strong SCM
3. Multisource estimations
4. Prescheduling key personnel
Correct Answer : 2
731. . Ability of a software to perform stated function under stated condition for a stated period of time
1. Effeciency
2. Robustness
3. Reliability
4. Correctness
Correct Answer : 3
734. The goal of ________ is to obtain a clear understanding of the system and its shortcomings and to
determine opportunities for improvement
1. Feasibility study
2. systems analysis
3. systems definition
4. systems study
Correct Answer : 2
735. The SDLC Model most suitable for small projects with unclear requirements is but not many
technical risks is
1. Spiral Model
2. Incremental Model
3. Waterfall Model
4. Prototyping Model
Correct Answer : 4
737. __________ uses powerful development software and small, highly trained teams of programmers.
1. Prototyping
2. RAD
3. Coding
4. Modeling
Correct Answer : 2
742. . The number & complexity of interconnections between two modules is an indicator of
1. Modularity
2. Cohesion
3. Coupling
4. Abstraction
Correct Answer : 3
743. Among the following types which is the most undesirable form of coupling
1. Stamp Coupling
2. Common Coupling
3. Content Coupling
4. Control Coupling
Correct Answer : 4
744. A module whose all elements exhibit relationship which involves both data and control flow is said
to be ____________ cohesive
1. Sequentially
2. Communicationally
3. Temporally
4. Procedurally
Correct Answer : 1
748. All of the following are control structures used in structured programming, EXCEPT
1. iteration
2. selection
3. sequence
4. goto
Correct Answer : 4
749. Proper program layout by proper usage of proper use of indentation, blank spaces, blank lines,
parentheses improves
1. Effeciency of the program
2. size of the program
3. maintainibility of the program
4. reliability of the program
Correct Answer : 3
751. In _____, the tester can analyze the code and use knowledge about the structure of a component to
derive test data
1. Black box
2. White box
3. Stress testing
4. None of the above
Correct Answer : 2
753. A driver is a dummy verion of the __________ module of the module under testing
1. superordinate
2. subordinate
3. coordinate
4. All of the above
Correct Answer : 1
754. Changes made to the software to accommodate changes to its environment is called
1. perfective maintainence
2. regressive maintainence
3. adaptive maintainence
4. corrective maintainence
Correct Answer : 3
758. What are the components of a thin client model in Client/Server architecture?
1. Client (Presentation) –Server (Data Management, Application Processing)
2. Client (Application Processing) – Server (Data Management)
3. Client (Data Management) –Server (Application Processing)
4. Client (Application Processing) – Server- Client (Data Management)
759. Risks arising out of frequent change requests are best mitigated by
1. User characterization
2. Strong SCM
3. Multisource estimations
4. Prescheduling key personnel
Correct Answer : 2
770. Enough time will be left at the end of the project to uncover errors that were made
because we rushed through the ____________ process. The moral is: Don’t rush
through it! ____________ is worth the effort. (Clue: both the blanks to be filled by
the same word)
1. coding
2. design
3. testing
4. None of the above
773. Testing
1. instills guilt
2. is punishment
3. is to find errors
4. None of the above
775. The sooner you begin ___________, the longer it will take to get done.
1. coding
2. testing
3. design
4. None of the above
776. Doing what is said one would do, is the definition for
1. reliability
2. quality
3. software plan
4. none of the above
782. Which of the following is not a factor in the failure of a systems development
Project?
1. inadequate user involvement
2. failure of systems integration
3. size of the company
4. continuation of a project that should have been cancelled
784. The four icons used in building Data Flow Diagram are
1. Flow, Source, Store, Process
2. Flow, Process, Source, Store
3. Flow, Process, Source/Destination, Store
4. Source, Process, Destination, Store
785. Which of the following is (are) not a tool for Application Prototyping?
1. Application generates
2. Third generation language
3. Screen generators
4. Report generators
786. All of the following tools are used for process description except
1. Structured English
2. Decision tables
3. Pseudo code
4. Data Dictionaries
787. Which of the following activities does not belong to the Implementation phase of
The SDLC?
1. File conversion
2. Program testing
3. User training
4. All of the above
788. Which of the following is not true of the conversion phase of the development life
Cycle?
1. the user and systems personnel must work closely together
2. steps must be taken to phase out the old system
3. documentation should be emphasized
4. the non-machine components of the system should be considered
790. Which is the first phase of the Waterfall software process model?
1. Design
2. Prototype
3. Testing
4. Requirement
1. X2, X4
2. X1, X2, X4
3. X1, X3
4. X2, X3, X4
797. The currently known containment effectiveness of faults introduced during each
Constructive phase of software development for a particular software product is
Ratio of
1. (Actual project duration) to (estimated project duration)
2. (number of pre-release Defects) to (number of pre-release Defects) to (number of pre-release
Defects + number of post release Defects)
3. (number of phase i errors) to (number of phase i errors + number of phase i defects)
4. (number of failure) to (Execution time)
801. Validate that the functions meet started requirements or not is called as
__________________________
1. Unit testing 2. System testing 3. Integration Testing 4. Acceptance Testing
803. Validation is mostly used to determine the __________________ of the final software/program.
1. Correctness 2. Consistency 3. Completeness 4. Quality
808. Resource planning, audit planning , estimation, scheduling are the some of the tasks carried out
in_________
1. Initiation phase 2. System design phase 3. Definition phase 4. Evaluation
phase
818. ______________ is used to perform structured analysis and to document the result.
1. DFD 2. UML 3. COCOMO 4. None of the above
821. As series of definable, repeatable and measurable tasks leading to useful result is called
____________
1. Program 2. Process 3. Activity 4. Controller
827. If a linear process models all steps come after finishing of a step then that model
called________________
1. Spiral 2. Prototype 3. Water fall model 4. None of the above
828. Cyclomatic Complexity method comes under which of the following testing method?
1. White box 2. Black box 3. Green box 4. Yellow box
829. Which of the following provides the foundation for team development?
1. Motivation 2. Organizational development 3. Conflict management
4. Individual development
831. Estimation for the satisfaction of the identified user needs is known as _____________
1. Feasibility study 2. Requirements evolution 3. Requirements capture 4. None of the
above
832. Translating the algorithm into a programming language occurs at the ______________ step of the
SDLC
1. Debugging 2. Coding 3. Testing and Documentation 4. Algorithm Development
834. The ___________________ determines whether the project should go forward or not
1. Feasibility assessment 2. Opportunity identification
3. System evaluation 4. Program specification
835. Actual programming of software code is done during the ________________ step in the SDLC
1. Maintenance and Evaluation 2. Design 3. Analysis 4. Development and Documentation
839. ________________ is the chain of activities that determines the duration of the project
1. object points 2. LOC 3. Lines of code 4. Critical path
844. Which of the following is not a section in the standard for SQA plans recommended by IEEE?
1. Documentation 2. Reviews and audits 3. Test 4. Budget
845. Which of the following tasks is not part of software configuration management?
1. Change control 2. Reporting 3. Statistical quality control 4. Version
control
846. How many steps are in the program development life cycle (PDLC)?
1. 4 2. 5 3. 6 4. 10
853. If a software had 5 failures in 100 tests during 10 days of testing (Assume 10 tests
Per day), what would be a good estimate of the reliability of the software over the
Next week? (Assume 5 working days in a week)
1. 0.0275 2. 0.5987 3. 0.0769 4. 0.9500
857. Assuming that the tests are representative of the operational situation, then calculate the
Reliability of a software system that has had 10 failures in 200 test cases.
1. 0.95 2. 0.9 3. 0.1 4. 1
862. Which testing methods are used by end-users who actually test software before they use it?
1. White Box testing 2. Alpha and Beta testing
3. Black box testing 4. Trial and Error testing
864. The project plan should be regularly revised during the project
1. Yes 2. No
3. It cannot be changed, it is to be followed 4. It is made only once at the start of project
866. Bar charts and activity networks are graphical notation which are used to illustrate the
1. Project Plan 2. Project dependencies 3. Project Schedule 4. Project Risk Analysis
870. Which term defines the process of project compliance with policies and procedures?
1. Quality control 2. Quality assurances
3. Quality audits 4. Quality control management
871. The data items that are exchanged between the different functions are represented as___
1. Design phase 2. DFDs 3. ER Diagram 4. Data Structures
Q.23) which of these terms apply to identify quality standards and how to satisfy them?
1. Quality projections 2. Quality management 3. Quality overview 4. Quality
planning
876. Important distinction between the spiral model and other software process model is
1. Explicit consideration of planning next phase
2. Explicit consideration of Validation
3. Explicit consideration of Risk Assessment and Reduction
4. Explicit consideration of Objective setting
879. Which lifecycle model would you use for developing a commercial web site that requires
About 8 months of effort from a team of 6 people?
1. Opportunistic 2. Waterfall 3. Incremental 4. Spiral
880. Which of the following s/w development life cycle shows high amount of risk analysis?
1. Water fall model 2. Spiral model 3. V-shaped model 4. Incremental model
881. Deliverables are usually milestones but milestones need not be deliverables
1. True 2. False 3. May be true 4. None of the above
a. Bitmap
b. Dialog box Template
c. Html document
d. None of these
Ans. D
2.Dialogbox Template
3.Html document
4.None of these
902. Which function is used to convert white to black and black to white?
1.Convert
2.Invert
3.Insert
4.None of above
950.
What do you mean by nonfunctional requirements?
1. User requirements
2. Requirements definition
3. A timing constraint placed on the system or the use of a specific language during development.
4. None of the above
952.
Cohesion is _________.
1. Measure of quality
2. Concept related to testing
3. Understandability
4. Measure of closeness of the relationships between the system’s components.
953. The data items that are exchanged between the different functions are represented as _
1. Design phase
2. DFDs
3. ER Diagram
4. Data Structures
956. Important distinction between the spiral model and other software process model is
957. Which lifecycle model would you use for developing a commercial web site that requires about 8
months of effort from a team of 6 people?
1. Opportunistic
2. Waterfall
3. Incremental
4. Spiral
958. Which of the following software development life cycle shows high amount of risk analysis?
1. Bottom-up
2. Top-down
3. Random
4. Centre fringing
960. Which is the first phase of the Waterfall software process model?
1. Design
2. Prototype
3. Testing
4. Requirement
961. Indicate what information is provided by Functional requirements?
X1: The constraints on the services or functions offered by the system such as timing constraints.
X2: How the system should behave in particular situations.
X3: The constraints on the development process, standards.
X4: How the system should react to particular inputs.
1. X2, X4
2. X1, X2, X4
3. X1, X3
4. X2, X3, X4
1. Error correction
2. Error prevention
3. Error detection
4. None of the above
1. Why
2. What
3. How
4. All of the above
968. Just as the entry point to a C program is the function main(), the entry point to a Windows program
is ________.
(WinMain() )
969. The three main Windows libraries are _______, __________ & ___________. (Kernel.32, User32,
GDI32)
974. GetMessage() function retrieves a message from the _____________. (message queue)
975. GetMessage() returns_____, when it retrieve WM_QUIT message form the message queue. (0)
978. TA program can call its own window procedure by using the _________ function. (SendMessage)
979. DispatchMessage() function passes the MSG structure back to __________. (Windows)
980. The very first message that a window procedure receives is ___________. (WM_CREATE)
983. Everything that happens to a window is relayed to the __________ in the form of message.
(Window Procedure)
984. . __________ API is used for subclassing. (SetWindowLong() )
986. Message __________ occurs when the user clicks an item on the menu bar or presses a menu key.
(WM_INITMENU)
964. . _________, _________ and ___________ are windows resources defined in a .Res file. (Any three
of these -
ICON / CURSOR / STRINGTABLE / DIALOG / MENU / BITMAP)
963. _________ API is used to set the text of an edit control. (SetWindowText() )
964. ________ and _________ are GDI objects. (Any two from Brush / Pen / Region / Font / Palette /
Bitmap)
965. When there is no message in the queue, PeekMessage() function returns ____. (FALSE or 0)
966. . System keystrokes are generated for keys typed in combination with the ____ key. (Alt)
967. System keystroke messages are _________ and ________. (WM_SYSKEYDOWN, WM_SYSKEYUP)
968. The virtual key code is stored in the _________ parameter of the WM_KEYDOWN message.
(wParam)
969. The repeat count field is stored in the _________ parameter of the keystroke messages. (lParam)
970. _________ function is used for checking the type of information available in clipboard.
(IsClipboardFormatAvailable())
965. . Just as the entry point to a C program is the function main(), the entry point to a Windows
program is ________.
(WinMain() )
963. The three main Windows libraries are _______, __________ & ___________. (Kernel.32, User32,
GDI32)
968. GetMessage() function retrieves a message from the _____________. (message queue)
969. GetMessage() returns_____, when it retrieve WM_QUIT message form the message queue. (0)
972. TA program can call its own window procedure by using the _________ function. (SendMessage)
973. DispatchMessage() function passes the MSG structure back to __________. (Windows)
974. The very first message that a window procedure receives is ___________. (WM_CREATE)
976. Window messages are defined in both windows.h and __________ header files. (winuser.h)
977. Everything that happens to a window is relayed to the __________ in the form of message.
(Window Procedure)
980. Message __________ occurs when the user clicks an item on the menu bar or presses a menu key.
(WM_INITMENU)
963. __________ API is used to kill a modal dialog box. (EndDialog() )
964. _________, _________ and ___________ are windows resources defined in a .Res file. (Any three
of these -
ICON / CURSOR / STRINGTABLE / DIALOG / MENU / BITMAP)
963. _________ API is used to set the text of an edit control. (SetWindowText() )
964. . ________ and _________ are GDI objects. (Any two from Brush / Pen / Region / Font / Palette /
Bitmap)
965. When there is no message in the queue, PeekMessage() function returns ____. (FALSE or 0)
966. System keystrokes are generated for keys typed in combination with the ____ key. (Alt)
967. System keystroke messages are _________ and ________. (WM_SYSKEYDOWN, WM_SYSKEYUP)
968. . The virtual key code is stored in the _________ parameter of the WM_KEYDOWN message.
(wParam)
969. . The repeat count field is stored in the _________ parameter of the keystroke messages. (lParam)
970. . _________ function is used for checking the type of information available in clipboard.
(IsClipboardFormatAvailable())
968. GetMessage() function retrieves a message from the _____________. (message queue)
969. GetMessage() returns_____, when it retrieve WM_QUIT message form the message queue. (0)
972. TA program can call its own window procedure by using the _________ function. (SendMessage)
973. DispatchMessage() function passes the MSG structure back to __________. (Windows)
974. The very first message that a window procedure receives is ___________. (WM_CREATE)
975. RegisterClass() associates a window procedure to the __________. (window class)
976. Window messages are defined in both windows.h and __________ header files. (winuser.h)
977. Everything that happens to a window is relayed to the __________ in the form of message.
(Window Procedure)
978. __________ API is used for subclassing. (SetWindowLong() )
980. Message __________ occurs when the user clicks an item on the menu bar or presses a menu key.
(WM_INITMENU)
963. __________ API is used to kill a modal dialog box. (EndDialog() )
964. _________, _________ and ___________ are windows resources defined in a .Res file. (Any three
of these -
ICON / CURSOR / STRINGTABLE / DIALOG / MENU / BITMAP)
963. _________ API is used to set the text of an edit control. (SetWindowText() )
964. ________ and _________ are GDI objects. (Any two from Brush / Pen / Region / Font / Palette /
Bitmap)
965. When there is no message in the queue, PeekMessage() function returns ____. (FALSE or 0)
966. System keystrokes are generated for keys typed in combination with the ____ key. (Alt)
967. System keystroke messages are _________ and ________. (WM_SYSKEYDOWN, WM_SYSKEYUP)
968. The virtual key code is stored in the _________ parameter of the WM_KEYDOWN message.
(wParam)
969. The repeat count field is stored in the _________ parameter of the keystroke messages. (lParam)
970. _________ function is used for checking the type of information available in clipboard.
(IsClipboardFormatAvailable())
Answer: B
Answer: A
968. Which one of the following is correct list of prescriptive process model?
Answer: D
969. Which process model will you adopt for a project having
- Lengthy delivery schedule
- All requirements are known upfront & well established and
- Customer needs important functionality to be implemented at earliest?
A. Waterfall
B. Prototyping
C. Incremental
D. RAD
Answer: C
970. Risk analysis and 4gl RAD prototyping is added to the waterfall model to form a -------- model
A. Spiral
B. Prototyping
C. V-shaped
D. RAD
Answer: A
971. ------ model is a variant of the Waterfall model, which also emphasizes the verification and
validation
A. Waterfall
B. Prototyping
C. Incremental
D. V-shaped
Answer: D
Answer: C
973. Stakeholders are asked to rank / prioritise requirements & discuss conflicts in priority in ------- stage
of requirement engineering.
A. Conflict resolution
B. Elaboration
C. Specification
D. Negotiation
Answer: D
A. An actor’s
B. A function’s
C. An actor and function’s
D. None of the above
Answer: A
975. Product requirements, Organizational requirements, & External requirements are example of
A. Domain requirements
B. Non-functional requirements
C. Functional requirements
D. None of the above
Answer: B
976. Which of the following models collectively form the design model?
977. Cohesion is --
A. Qualitative indication of the degree to which a module focuses on just one thing
B. Qualitative indication of the degree to which a module is connected to other modules & to outside
world
C. Both 1 & 2
D. None of the above
Answer: A
978. Which of the following is FALSE statement?
A. Abstractions allows designers to focus on solving a problem without being concerned about
irrelevant lower level details
B. Modularity is ability to understand the software by examining its components independently
C. Control hierarchy represents the procedural aspects of the software
D. None of the above
Answer: C
979. Coupling is --
A. Qualitative indication of the degree to which a module focuses on just one thing
B. Qualitative indication of the degree to which a module is connected to other modules & to outside
world
C. Both 1 & 2
D. None of the above
Answer: B
981. Smoke testing is an ----- testing approach, which is used when software is being developed
A. Unit testing
B. Regression testing
C. Integration testing
D. Acceptance testing
Answer: C
984. ---- provides the maximum number of test cases that will be required to guarantee that every
statement in program has been executed at least once.
A. Independent Program paths
B. Cyclomatic complexity
C. Graph Matrices
D. None of the above
Answer: B
987. Consider the following data for the effort spent on various tasks in project
Coding - 120
Self code walk-thru - 04
Code review - 06
Rework (Bug fixing) - 37
Training - 02
Tool Development - 10
Testing - 35
Preparing check list - 01
What is the Cost of quality, Failure cost, prevention cost, and appraisal cost?
A. 120, 35, 37
B. 37, 95, 120
C. 95, 37, 13, 45
D. 120, 13, 45
Answer: C
A. Prevention cost
B. External failure cost
C. Internal failure cost
D. All of the above
Answer: B
Answer: D
A. 5
B. 3
C. 1
D. 6
Answer: A
991. The objective of project planning is to provide
Answer: B
Answer: A
A. A phase
B. An umbrella activity
C. A milestone
D. None of the above
Answer: B
A. Gantt charts are often used for displaying the project schedule
B. Gantt chart shows both planned and actual schedule information
C. CPM is used for finding total project cost
D. Critical path is the longest path through the network diagram
Answer: C
A. WBS Estimation
B. UCP Estimation
C. FP Estimation
D. COCOMO estimation
Answer: C
998. Scheduling begins with ------
A. Risk identification
B. Process decomposition
C. FP Estimation
D. COCOMO estimation
Answer: B
999. One of the limitations of FP analysis is
Answer: D
1002. Risk score (or Risk Exposure) is a product of
Answer: A
Answer: C
1023. Which of the following types of test plans is most likely to arise form the
requirements specification process?
A) system integration test plan
B) acceptance test plan
C) sub-system integration test plan
D) module test plan
1025. The sooner you begin __________ , the longer it will take to get done.
Answers the followings in brief:
1026. Explain the concept of black box.
1027. What are the qualities of software?
1028. Give the various steps in prototyping.
1029. What are the various fact-finding Techniques?
1030. What are the types of decision tables?
1031. What are the structures of Structured English?
1032. Give a brief note on acceptance testing.
1033. Define coupling and cohesion.
1034. What is maintenance? Explain about various types of maintenance.
1035. Differentiate between Decision Tree and Decision Table.
1036. Give the coding guidelines.
1037. Give the debugging approaches.
1038. Why Software doesn’t wear out.
1039. Explain about Dos and Don’ts of good coding style.
1040. Give the contents of SRS document.
1041. Explain briefly about SEI CMM.
1042. What is feasibility study? Explain about various aspects of feasibility.
1043. Define normalization and explain about first three normal forms.
1044. What is changeover? What are the types of changeover
1045. Differentiate between Black Box and White Box testing
1046. Explain about Interview as a Fact Finding technique
1047. What are the various factors that influence software cost-estimation.
1048. Write a short note on Structured charts.
1049. Explain about the various concepts of a system.
1050. Give Salient features of CASE tools.
1051. Explain about various stages of software Development according to classical life
cycle.
Answers the followings in detail:
1052. Compare and contrast the two life cycle models viz. Waterfall and Spiral models.
(Mention at least three distinct aspects).
1053. State the importance of requirements management in a software development
1054. Discuss and compare the coupling and cohesion in software design
1055. Discuss the trade-off between error checking execution time / memory space overhead.
1057. Give some reasons for using global variables than parameters. What are the potential
problems created by the use of global variables?
1058. Develop test plan for the library management system (List at least three test cases).
1059. Explain why it is very difficult to produce a complete and consistent set of requirements.
1060. Discuss the differences between object-oriented and function-oriented design strategies
1061. Explain why maximising cohesion and minimising coupling leads to more maintainable
Systems
1062. Show using a small example, why it is practically impossible to exhaustively test a
code.
1063. List at least five distinct tests to exercise the various features of the Powerpoint
software used for slide preperation and projection.
1065. Develop a high level data flow diagram for an airline reservation system
1066. Discuss the trade-off between error checking execution time / memory space overhead.
1068. Give some reasons for using global variables than parameters. What are the potential
problems created by the use of global variables?
1069. Develop test plan for the library management system (List at least five test cases).
1070. Rewrite the following requirements so that they may be objectively validated. You may
make any reasonable assumptions about the requirements.
a) The software system should provide acceptable performance under maximum load
conditions
b) Structured programming should be used for program development
c) The software must be developed in such a way that it can be used by inexperienced
users.
1071. Model the data processing which might take place in an electronic mail system that can
send and receive messages from remote computers.
1072. Discuss the advantages of incremental model as compared to water fall model.
Can a program be correct and still not be reliable ? Explain
1073. Discuss how you would approach the top-down design of a software system.
1074. Discuss the advantages and disadvantages of using the "antibugging" technique to
provide built-in debugging assistance to uncover errors.
1075. Discuss at least three reasons that would highlight the importance of software
maintenance.
1076. Compare and contrast the white-box and black-box testing methods.
1078. Discuss the pros and cons of the COCOMO model for cost estimation
1080. Given an array of integers, arrange them in ascending order using quick sort method.
1081. Develop a software review checklist for use by the designer and the implementor.
What issues are important to each of these roles?
1082. Develop a high-level data flow diagram and a structure chart for an airline reservation
system.
1083. Develop an architecture and also flow diagrams (up to 2 levels) for the following:
“Consider the automation of the transaction at the registration counter of a post-office. A
scanner is provided to capture the "from" and "to" addresses from the envelop. The clerk
uses your software to issue receipts to the customers. This is expected to reduce the
waiting time at the counter.”
1085. A Manager decides to use the reports of code inspections as an input to the staff
appraisal process. These reports show who made and who discovered program errors. Is
this ethical managerial behaviour? Would it be ethical if the staff were informed in advance
that this would happen? What difference might it make to the inspection process?
1086. Apply a "stepwise refinement process" to develop three different levels of procedural
abstraction for developing a cheque writer that, given a numeric rupees amount, will print
the amount in words that is normally required on a cheque.
1087. Derive a set of test cases for a code which sorts arrays of integers. Draw a flow graph
for an algorithm of your choice and derive its cyclomatic complexities
1088. A university intends to procure an integrated student management system holding all
details of registered students including personal information, courses taken, and
examination marks achieved. The alternative approaches to be adopted are either
a) buy a database management system and develop an in-house system based on this
database.
b) buy a system from another university and modify it to local requirements
c) join a consortium of other universities, establish a common set of requirements and
contract a software home to develop a single system for all of the universities in the
consortium. Identify two possible risks in each of these strategies.
1089. Consider the error messages produced by MS-DOS or UNIX or WINDOWS operating
system. Suggest how they might be improved.
1090. Develop at least two levels of procedural abstraction for implementing the savings bank
transactions in a banking system.
1091. Draw a flow graph for the following and find its cyclomaticcomplexity : Given 1000numbers,
arrange them in ascending order using any one of the sorting methods.
1092. Design test cases for the following problem : Given a quadratic equation, solve it to find
the roots.
1094. The college has decided to computerize its admission procedure. The standard admission
procedure requires adhering to the norms set by concerned government agencies, the
university and the college administration. The procedure also involves disbursing admission
forms at a cost, collecting duly completed forms, preparing merit lists and admitting the
students as per norms, notifying student, collecting fees, preparing and submitting reports
to concerned authorities.
By carefully studying the case you are required to solve the following:
i. Draw a context level and first level DFD
ii. Identify the various reports required
1096. Prepare Context diagram for the saving bank deposit and withdrawal system in a
nationalized bank. Also draw the first level DFD for the same.
1097. Ratanlal College of Commerce is an undergraduate College. The college receives
sufficiently large number of applications for admission to FY, SY and TY. Bcom classes.
The college has decided to computerize its admission program. The standard admission
procedure requires adhering to the norms set by concerned government agencies, the
university and the college administration. The procedure also involves disbursing admission
forms at a cost, collecting duly completed forms, preparing merit list and admitting students
as per norms, notifying students, collecting fees, preparing and submitting reports to the
concerned authorities
You are required to identify :
(i) Entities:
Processes
Data flows
Data Stores
1105. Which of the following types of test plans is most likely to arise form the
requirements specification process?
A) system integration test plan
B) acceptance test plan
C) sub-system integration test plan
D) module test plan
1108. List at least five distinct tests to exercise the various features of the Powerpoint
software used for slide preperation and projection.
1110. Develop a high level data flow diagram for an airline reservation system
1111. Discuss the trade-off between error checking execution time / memory space overhead.
How can the overhead be reduced or eliminated?
1112. Give some reasons for using global variables than parameters. What are the potential
problems created by the use of global variables?
1113. Develop test plan for the library management system (List at least five test cases).
1114. Rewrite the following requirements so that they may be objectively validated. You may make any
reasonable assumptions about the requirements.
a) The software system should provide acceptable performance under maximum load
conditions
b) Structured programming should be used for program development
c) The software must be developed in such a way that it can be used by inexperienced
users.
1115. Model the data processing which might take place in an electronic mail system that can
send and receive messages from remote computers.
1116. Discuss the advantages of incremental model as compared to water fall model.
Can a program be correct and still not be reliable ? Explain
1117. Discuss how you would approach the top-down design of a software system.
1118. Discuss the advantages and disadvantages of using the "antibugging" technique to provide built-
in debugging assistance to uncover errors.
1119. Discuss at least three reasons that would highlight the importance of software maintenance.
1191. Compare and contrast the white-box and black-box testing methods.
1192. Develop a software review checklist for use by the designer and the implementor.
What issues are important to each of these roles?
1193. Develop a high-level data flow diagram and a structure chart for an airline reservation
system.
1194. Develop an architecture and also flow diagrams (up to 2 levels) for the following:
“Consider the automation of the transaction at the registration counter of a post-office. A
scanner is provided to capture the "from" and "to" addresses from the envelop. The clerk
uses your software to issue receipts to the customers. This is expected to reduce the
waiting time at the counter.”
1196. A Manager decides to use the reports of code inspections as an input to the staff
appraisal process. These reports show who made and who discovered program errors. Is
this ethical managerial behaviour? Would it be ethical if the staff were informed in advance
that this would happen? What difference might it make to the inspection process?
1197. Apply a "stepwise refinement process" to develop three different levels of procedural
abstraction for developing a cheque writer that, given a numeric rupees amount, will print
the amount in words that is normally required on a cheque.
1198. Derive a set of test cases for a code which sorts arrays of integers. Draw a flow graph
for an algorithm of your choice and derive its cyclomatic complexities
1199. A university intends to procure an integrated student management system holding all details of
registered students including personal information, courses taken, and examination marks achieved. The
alternative approaches to be adopted are either
a) buy a database management system and develop an in-house system based on this database.
b) buy a system from another university and modify it to local requirements
c) join a consortium of other universities, establish a common set of requirements and
contract a software home to develop a single system for all of the universities in the
consortium. Identify two possible risks in each of these strategies.
1200. Consider the error messages produced by MS-DOS or UNIX or WINDOWS operating
system. Suggest how they might be improved.
1201. Develop at least two levels of procedural abstraction for implementing the savings bank
transactions in a banking system.
1202. Draw a flow graph for the following and find its cyclomaticcomplexity : Given 1000numbers,
arrange them in ascending order using any one of the sorting methods.
1203. Design test cases for the following problem : Given a quadratic equation, solve it to find the
roots.
1193. Prepare Context diagram for the saving bank deposit and withdrawal system in a
nationalized bank. Also draw the first level DFD for the same.
1193. Which SDLC Model is best suited when only part/some of the requirements are known at the
beginning
a. Waterfall Model
b. Incremental Model
c. Prototype Model
d. Spiral Model
1194. _______is an entity that is extemal to the system & directly interacts with the system and
deriving some benefits from the interaction.
A. Actor
B. Use case
C. Class
D. Relationship
1200. Which one of the following is the process of factoring the design module?
A. Software re-engineering
B. Configuration management
C. Software maintenance
D. Software Refactoring
1201. which of the following process is not part of Project Risk Management?
A. Risk Identification
B. Effort estimation
C. Risk Anaiysis
A. Re-design
B. Re-engineering
C. Maintenance
D. Post checking
1204. Which of the following are objectives for formal technical reviews?
a. sprint planning
b. product backlog
c. sprint retrospective
d. standup meetings
a. Top-down integration
b. Bottom-up integration
c. Module integration
d. None of the above
1209. To check whether we are developing the right product according to the customer
requirements or not. This is known as static process .
Validation
a. Quality Assurance
b. Verification
c. Quality Control
$3.051’?
1211. To test a function, the programmer has to write a passes it test data.
Stub
Proxy
Driver
90?’?
1215. Which among the following gives a chronological record of relevant details about the
execution of tests?
A. Test incident report
B. Test log
C. Test summary report
D. None ofthe above
1218. Formal Reviews of an individual product. used to evaluate correctness. based on its
input criteria are .
Inspections
Checkpoint review
Testing
Walkthrough
1219. which of the below listed processes is not part of Project Planning?
Identify Constraints
Identify Algorithms
Identify Risks
Identify Milestones
1221. which of these is not one of the phase names defined by the Unified Process model for
software development?
Inception phase
Elaboration phase
Construction phase
Validation phase
1222. which of the following is not one of Hookers core principles of software engineering
practice?
All design should be as simple as possible, but no simpler
A software system exists only to provide value to its users.
Pareto principle (20% of any product requires 80% of the effort)
Remember that you produce others will consume
1223. Which of the following is valid reason(s) for collecting customer feedback concerning
delivered software?
a) Allows developers to make changes to the delivered increment
b) Delivery schedule can be revised to reflect changes
c) Developers can identify changes to incorporate into next increment
d) All of the above
1224. Which of the following is not generally considered a player in the software process?
A. Customers
B. End-users
C. Sales people
D. Project managers