2023 - Midterm 2 Solution - Spring - SE
2023 - Midterm 2 Solution - Spring - SE
3) Software design is a:
a. Creative Process
b. Linear Process
c. Iterative Process
d. a and c only
e. All of the above
4) When an already existing design and code is used with minor adjustments according to the problem, it
is referred to as
a. Design Pattern
b. Reference Model
c. Cloning
d. Design Convention
5) Ability to prevent an attempted attack is called:
a. Resilience
b. Encryption
c. Immunity
Department of Computer Science Page 1 of 5
d. Fault Tolerance
6) Which of the following is/are useful (and can be used) at the time of requirements analysis for better
elaboration of functional requirements?
a. Client-Server architecture style
b. Layering architecture style
c. Peer-to-Peer architecture style
d. None of the above
7) Consider the following terms:
i. Pipe-Filter
ii. Publish-Subscribe
iii. Call-Return
iv. Repositories
These terms are referred as _____________ in software engineering.
Question 2 (Marks = 8)
Chose which of the 3 golden rules of UI design is related to each of the following statements/screenshot.
The options mention the golden rule along with the information if the rule is followed or violated. Circle the
most appropriate single option. Unclear answers will not be given any credit.
1) All the applications in MS Office use the cross button to close the windows.
a. Place the user in control - Followed
b. Reduce User’s Memory Load - Violated
c. Make the interface consistent - Followed
d. Place the user in control - Violated
2) When you are about to close an application with some unsaved data, the system responds, “Do you
want to save your work?”
a. Place the user in control - Followed
b. Reduce User’s Memory Load - Violated
c. Place the user in control - Violated
d. Make the interface consistent - Followed
3) You have developed a game in which the right cursor key makes the player jump, while the up and left
cursor keys make the player go right and left respectively.
a. Place the user in control - Followed
b. Reduce User’s Memory Load - Followed
c. Place the user in control - Violated
4) For a banking application, you have provided 10 menus with each menu containing ten to twelve
options.
a. Reduce User’s Memory Load - Followed
b. Place the user in control - Followed
c. Reduce User’s Memory Load - Violated
d. Make the interface consistent - Violated
5) Assume a user is trying to move a file to a particular location. Also assume, a file with the same name
already exists at that location. A pop-up is displayed with multiple options (e.g., replace, skip, cancel,
compare, etc.), out of which any one can be selected.
a. Place the user in control - Followed
b. Reduce User’s Memory Load - Violated
c. Make the interface consistent - Followed
d. Place the user in control - Violated
6) When a critical problem occurs on Windows, such as an unexpected crash, it automatically displays the
blue screen of death and restarts the computer.
a. Make the interface consistent - Followed
b. Reduce User’s Memory Load - Followed
c. Place the user in control - Violated
d. Make the interface consistent - Violated
7) In a newly developed application, the keyboard shortcut for saving work is Ctrl + P.
a. Place the user in control - Violated
b. Make the interface consistent - Violated
c. Make the interface consistent - Followed
d. Reduce User’s Memory Load - Followed
8) Consider the following message dialogue box shown after successful upload of a user file:
To do: Identify components of the NBP system and draw component diagram for the NBP application discussed
above. Use ball and socket notation. Appropriately label the ‘Requires’ and ‘Provides’ interfaces of the interacting
components.