CS504-Midterm
1 / 50
An state transition can only occur when triggered by a(n)________________
2 / 50
Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.
3 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
4 / 50
Data design actually begins during the creation of the analysis model, not the architectural model.
5 / 50
Identifying Whole-Part structures (Aggregations) means what are my ----------------
6 / 50
Most software continues to be custom built because
7 / 50
The scope description establishes the ----------between the system we are developing and everything else in the universe
8 / 50
Which of the items listed below is not one of the software engineering layers?
9 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
10 / 50
The Object Oriented approach
11 / 50
By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control
12 / 50
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
13 / 50
Which of the items listed below is NOT one of the software engineering layers?
14 / 50
___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
15 / 50
The process of defining attributes is called
16 / 50
Following are some statements associated with data flow diagrams. Identify the correct statement from among them.
17 / 50
The hardest single part of building a software system is deciding precisely ----------- to build.
18 / 50
A complex System evolves from a
19 / 50
STL Stands for ______________.
20 / 50
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
21 / 50
________ ensures that a class only has one instance and provides a global point of access to it.
22 / 50
In sequence Diagram events are organized in a-----time line
23 / 50
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
24 / 50
Control flow diagrams are
25 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
26 / 50
27 / 50
The Data dictionary contain description of each software.
28 / 50
Requirement Statement and Requirement Specification are also called Requirement
Definition and ________
29 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
30 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
31 / 50
Software crisis came in 1960 what is the main reason to for the crisis
32 / 50
Perry and Wolfe proposed the following formula for software architecture:
33 / 50
Identifying Whole-Part structures (Aggregations) means, what are my ----------------
34 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
35 / 50
Which of these characteristics are true of a data warehouse, but not a typical database?
36 / 50
Writing test cases and generating test data are processes that demand __________ building
capabilities.
37 / 50
Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include
38 / 50
The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.
39 / 50
Asynchronous massages are denoted
40 / 50
Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.
41 / 50
Requirement engineering mainly deals with the -------------- of the system
42 / 50
----- gives OO the ability to handle essential
43 / 50
The first step in any OOA process model is to__________
44 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
45 / 50
what is the most important software quality of a web based transaction
46 / 50
A change becomes ------------- because of close presence of data and functions
47 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
48 / 50
In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.
49 / 50
Coupling is a measure of ----------------of a module or component.
50 / 50
___________ are used to describe flow of data or control in an application.
Your score is
The average score is 0%
Restart quiz