0% found this document useful (0 votes)
14 views9 pages

Evaluation 1 of Software Engineering

The document outlines a self-assessment questionnaire on software engineering knowledge, covering various topics such as software architecture, agile methodologies, requirements engineering, and system design. It includes multiple-choice questions that assess understanding of concepts like functional and non-functional requirements, use case diagrams, and the roles of software architects. The content emphasizes the importance of clear requirements, effective communication, and the application of appropriate methodologies in software development.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views9 pages

Evaluation 1 of Software Engineering

The document outlines a self-assessment questionnaire on software engineering knowledge, covering various topics such as software architecture, agile methodologies, requirements engineering, and system design. It includes multiple-choice questions that assess understanding of concepts like functional and non-functional requirements, use case diagrams, and the roles of software architects. The content emphasizes the importance of clear requirements, effective communication, and the application of appropriate methodologies in software development.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Self-assessment of minimum knowledge of software engineering

1. If professional web-based software were to be developed, one of the advantages would


be:
1. Reuse of multiple software components, such as code, interfaces.
2. The system may be vulnerable to third-party attacks.
3. They require fully compatible web browsers to function, and often even require the
appropriate and updated extensions to operate.
2. In which architecture the input data flows through such transformers until it becomes
output.
1. Client-server architecture.
2. Pipe and filter architecture.
3. Layered architecture.
3. When studying the agile methods Scrum and Extreme programming we could say that the
difference is that:
1. Scrum focuses on project management while Extreme Programming is about
delivering the project faster.
2. Extreme Programming focuses on project creation, whereas Scrum focuses on project
management in order to deliver the project.
3. Scrum is used for large projects while Extreme Programming is for small and medium
projects.
4. The profession of “Software Architect”: Should it be independent of the staff of a software
development company?
1. No, because the role of the software architect is not limited to system design, but
rather actively collaborates throughout the entire development process.
2. Yes, because the architectural design process of a system is the most important part of
the development process, it is for this reason that it must be carried out by a person
specialized in the subject, and once their work is finished, the respective reports must
be delivered to the development company so that it can continue with the
implementation of the application.
3. It is immaterial whether the profession is independent or not.
5. One of the main goals of working in pairs within development methodologies is that
applications can be created in less time, sharing knowledge among team members. In case
there is no consensus among the members of the group, the following should be done:
1. Before implementing IT solutions, policies must be established to which the
members of the work team must adhere to avoid future conflicts.
2. It doesn't matter if there are differences of opinion, as long as one of the team
members takes responsibility for the work.
3. If there are any disputes, it is preferable to dissolve the team or hire new members
who share the same criteria.
6. Batch processing systems allow:
1. Control the software of a mobile cell phone, for example.
2. Personal entertainment systems such as games.
3. Processing large amounts of data such as payroll systems.
7. Architecture in small format is interested in:
1. The architecture of complex enterprise systems that may include other systems.
2. The architecture of individual systems and how they are separated into components.
3. The architecture of individual and enterprise systems.
8. System modeling is used to:
1. Start developing the software.
2. Make a graphical representation of the software.
3. Complete a software engineering process.
9. For the game of chess. Which of the following examples is a use case?
1. Game started.
2. Movement of a piece.
3. Invalid username and password.
10. The rector of the National University of Loja requests that an integrated system be created
to manage all functions for the university entity. Since the project is made up of several
independent systems that will later be interrelated, and since the rector needs periodic
progress to be shown in order to make the appropriate corrections if necessary, the
optimal methodology for the project should be:
1. XP Methodology.
2. Cascade methodology.
3. Scrum methodology.
11. In the following requirement: “Each order must be assigned a unique identifier
(ORDER_ID)” Corresponds to a requirement:
1. Non-functional requirement.
2. Functional Requirement.
3. It is not a requirement.
12. A company dedicated to commerce needs to develop an application that allows it to
manage the delivery and shipping of its products in the different matrices it has at a
national level. However, the application would be subject to changes if there were any
modifications to the new agricultural law. The user is concerned about the possible
implications that this would have on the IT solution and the possible transformations that
would have to be made. The analyst should then act as follows:
1. The analyst must explain to the user that it would be very costly to make future
changes once the application has been developed.
2. The analyst should create an application that is flexible enough that, even if future
modifications arise, it is not very complicated to implement the changes.
3. The analyst must create an application that is not accessible to changes, because he
must focus on the sustainability and security of the application.
13. In generic software products. Who controls the specifications?
1. The organization that develops the software.
2. The organization that purchases the software.
3. The organization that develops and purchases the software.
14. An application is designed for the sale and playback of music on the Internet. Which of the
following architectural patterns should be implemented for such an application?
1. Layered programming.
2. Pipeline.
3. Client/Server Model.
15. Use case diagrams are:
1. It shows how objects communicate with each other over time.
2. They describe a typical interaction between an actor and the system.
3. It allows you to visualize the relationships between the classes that involve the
system.
16. Sequence diagrams and use case diagrams belong to the model:
1. Interaction models.
2. Structural models.
3. Behavioral models.
17. Architectural design consists of organizing the properties of a system. These properties
are:
1. The functions and requirements that the software must meet.
2. The language in which the system is programmed to design.
3. Software implementation and evolution.
18. For the famous game Minesweeper, please indicate the possible use cases:
1. Start game, Uncover a square, Mark a square.
2. Start game, Play game, Count mines.
3. Player, Mines, Notes.
19. When creating software, not having clear requirements runs the risk of:
1. Wasting time and money on software development.
2. Giving a company a bad reputation.
3. Failure to develop a good system for the customer.
20. An application needs to store information about companies, their employees and their
customers. Of the last two, your name and age are needed. Employees have a gross salary,
managers have a salary scale, as well as a set of subordinate employees. In addition, you
need to know the contact phone number of your clients. For this application, a class
diagram needs to be created. The classes of that diagram would be:
1. Customers and Employees.
2. Customers, employees, company.
3. Person (Client and employee: manager), Company.
21. In the Software Evolution stage the following actions are performed:
1. Software validation, meaning that it meets the requirements.
2. Modify the system to meet new requirements.
3. Requirements specification and interface design.
22. If you were asked to detail the interaction of actors and the system in a UML diagram.
Which of the following diagrams would you use?
1. Sequence diagram
2. Activity diagram.
3. Use case diagram.
23. Prototyping helps to:
1. Design and program the system to be implemented.
2. The implementation of the system and its operation is verified.
3. Test design options and better understand the problem and its solution.
24. Extreme programming consists of:
1. Methods with the function of maximizing risks by developing software over long
periods of time.
2. An agile method where requirements are expressed as scenarios.
3. Methods that allow more time to be spent designing the system.
25. In the software design and implementation process:
1. The software is designed and programmed.
2. Only the design of the software database is developed.
3. Validates and verifies that the software meets the requirements.
26. If after the presentation of an application, the user and the client of the software
development company decides not to earn the value of the same, arguing that the final
version of the program is not in accordance with the initial planning, the programmer
should:
1. The programmer must accept the client's decision and may offer the application to a
new interested party.
2. The programmer will have to re-evaluate the software development process again, to
take into account the “new” client requirements.
3. If there was good practice on the part of the programmer, there should not be any
problem with this situation. It would be enough to refer to the Vision and
Requirements Specification documents, which should have been previously
authorized for the development of the application.
27. When studying Software Engineering, one of the main objectives is:
1. Create a quality, efficient system with minimal errors.
2. Obtain the highest profits from the developed systems.
3. Develop and implement the system without worrying about its maintenance.
28. An architectural pattern can be considered as:
1. A fundamental element of architectural design.
2. An abstract description of the system that was tested with different systems and
environments.
3. A part of application architecture.
29. A software development engineer should not only worry about technical issues but also
about:
1. The study of other sciences that facilitate the development of software.
2. The ethical part in which it develops.
3. In learning how to improve systems.
30. When designing large systems, in addition to architectural patterns, what other aspects
should be taken into account?
1. Don't waste time gathering information, as this will waste time coding, developing and
implementing.
2. An important aspect is the programming language to be used.
3. Different inputs, outputs, operations, controls and procedural techniques should be
provided.
31. An educational institution wishes to hire a software development company to design an
application that allows students to register at its computing center. As background, it is a
small application and the time frame for its development may be long. Furthermore, it
should be noted that the institution has a modest budget. It would be recommended to
work with:
1. SCRUM or XP methodology.
2. Spiral or cascade methodology.
3. It is irrelevant which methodology is used in this case.
32. One of the Extreme Programming strategies is pair programming, which involves working
in pairs at the same workstation. From this we can say that:
1. Teamwork helps to socialize with all team members the inconveniences of the
development process.
2. There may be discussions about how the software will be developed and there may
be an exchange of ideas to correct errors that arise in the program.
3. These strategies do not help to reduce development time because independent work
takes a lot of time and therefore the delivery time is postponed.
33. A company requires software to be created for a specific need. However, the manager of
the company is constantly on the move and it is not in his budget to delegate a person to
be in charge of evaluating the progress of the software. Would it be advisable to apply the
SCRUM methodology in this case?
1. Yeah
2. No
3. This situation is irrelevant for using the SCRUM methodology.
34. According to Bass and his collaborators, they analyze 3 advantages of explicitly designing
and documenting software architecture. What are these 3 characteristics?
1. Communication with participants, system design and programming, and system
implementation.
2. System analysis, efficient scheduling and compliance with requirements.
3. Communication with stakeholders, system analysis and large-scale reuse.
35. Which of the following activities does the RUP approach recommend?
1. Iterative software development, requirements management, using component
architecture, visually modeling software, verifying quality and controlling software
changes.
2. Software specification, design, implementation, validation and evolution.
3. Requirements analysis and definition, system and software design and
implementation.
36. In the well-known dice game of 7: the player rolls both dice and adds the top faces.
Previously, a bet is made on what the sum of the dice will be. If you bet that the sum
would be below seven and you got it right, you win the amount you bet. The same thing
happens when you bet above 7. If you chose 7 and got it right, you win triple your bet. If
you do not guess correctly, you lose the amount bet. One of the functional requirements
could be:
1. The player can choose the following plays: over 7, under 7 and 7.
2. The system shall not record the player's initial capital.
3. The system shall not generate one-sided values when the die is rolled.
37. In the following paragraphs: Who can be actors in an online chat service system for the
UTPL service balcony?
1. User/Student, Secretary.
2. Teachers, Students, Rector.
3. Secretary, Chancellor, Database.
38. Software project managers are responsible for:
1. Program the software with all the components.
2. Lead the software development process to ensure that software is delivered on time
and within budget.
3. Design, program and implement the software.
39. In the design of a cellular telephone system, which of the following corresponds to a
functional requirement?
1. Send emoticons in an SMS.
2. The definition of the number of characters in a message.
3. Receive calls.
40. When using software process models such as the waterfall model among others, the
following must be taken into account:
1. The number of employees the company has.
2. An abstraction of customer needs.
3. The environment in which the company operates.
41. Which of the following software products are customized?
1. PostgreSQL
2. Microsoft Office
3. Medical appointment control system.
42. One of the ethical dilemmas regarding the information society refers to data privacy and
security. One of the nine factors that could endanger people's privacy is the increase in
search techniques or digging in the Internet or databases, which goes far beyond
traditional searches for information. However, today a new computing term has been
introduced, the so-called “Ethical Hacking”. How can this practice be considered?
1. The combination of these two distant words does not bring positive results, since the
word “ethical” always refers to something “good”, while “hacking” indicates the
opposite. However you look at it, ethical hacking is a double-edged sword.
2. Not every hacker practice can be considered ethical from any point of view.
3. Ethical hacking is a proactive practice that helps react to system threats and enables
the design of defenses against such dangers.

43. If you want to create an online customer service system for a mobile phone operator. It
has been determined as a requirement that the system works according to the employees'
working hours, that is, from 08:00 to 19:00. This non-functional requirement can be
classified as:
1. Product requirement.
2. Organizational requirement.
3. External requirement.
44. In requirements engineering, when identifying requirements, it must be clear:
1. To differentiate whether the requirement is functional or non-functional.
2. Knowing the client's needs very well.
3. To determine how to properly apply data collection techniques, such as interviews.
45. If we say that scaling agile methods for large systems is difficult, this is because:
1. Organizations that have their own quality standard which is mandatory for all their
projects.
2. Large systems are very complex and very difficult to develop using agile methods.
3. Agile methods are used only in small and medium-sized projects.
46. For a motorcycle game, which of the following literals can be considered as classes?
1. Motorcycle, player name, points.
2. The player requests to restart the level.
3. Motorcycle, Gamer, Racing, Tracks.
47. When using a software process model for system development the most difficult thing
you might encounter would be:
1. The complexity of the system to be developed
2. Implement the new requirement.
3. Reuse code from old systems.
48. UTPL creates a system to host admission test data for new applicants. As a matter of
university policy, the system will implement provisions for the privacy of applicants' data.
This non-functional requirement can be classified as:
1. Product requirement.
2. Organizational requirement.
3. External requirement.
49. For a use case where you want to simulate the behavior of an ATM, which of the following
would be use cases:
1. Check balance. Make transaction. Display system information.
2. Check balance. Make a deposit. Make withdrawal.
3. Check balance. Make transaction. Determine the value of a withdrawal.
50. In the architectural view of the sample process, the interaction processes of the system
are shown, which serve us to:
1. Making judgments about non-functional characteristics of the system, such as
performance.
2. Check that customer requirements are met.
3. Identify non-functional requirements.
51. When layered engineering is used, with the most critical assets stored in the innermost
layers and with a high level of trust validation of these layers, it corresponds to:
1. Protection
2. Performance
3. Security.
52. In a word processor, which of the following would be functional requirements?
1. Copy, paste, save document.
2. Check the file type.
3. Make a report of the number of characters, words, paragraphs and pages that the
document contains.
53. During the development of an application, in the prototype design stage it was
determined that there were errors and omissions within the needs and requirements
definition stage. Such errors should:
1. Not being taken into account for corrections to the requirements specification
document and simply being addressed in the remainder of the development process.
2. They should be used to correct errors in the requirements document and redefine
them correctly.
3. These errors are indifferent to the software development process, and should not be
taken into account because there was already planning prior to prototyping.
54. There are four activities in the Requirements Engineering process, whose main objective
would be:
1. Obtain any amount of information from the company to discover the requirements.
2. Identify customer needs and then transform them into requirements.
3. Determine the best coding techniques to implement the system.
55. What is the proper way to describe system architecture during the design process:
1. Architecture in small.
2. Block diagrams.
3. Architecture in large format.
56. Which of the following diagrams would indicate the structure of a software?
1. Class diagram.
2. State diagram.
3. Sequence diagram.
57. It is necessary to model the interactions between the actors and objects of a system. The
recommended diagram for this purpose would be:
1. Class Diagram.
2. Use case diagram.
3. Sequence diagram.
58. In a flight reservation system, which of the following requirements is functional?
1. The system should work correctly on any browser.
2. The system should take no more than five seconds to display search results.
3. The user must have the possibility to search by flight date, flight type, seat
availability and flight cost.
59. They are designed to process user requests using information from a database.
1. Transaction processing system.
2. Information system.
3. Language processing system.
60. The methodology that is based on developing a system as a series of versions, with each
version adding functionality to the previous version is:
1. SCRUM Methodology
2. Cascade methodology.
3. RUP methodology.

You might also like