CS504-Midterm
1 / 50
The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.
2 / 50
Interaction Diagrams depict the ------------- Behavior of the system
3 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
4 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
5 / 50
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
6 / 50
Coupling is a measure of ----------------of a module or component.
7 / 50
Static analyzers are software tools for --------------- processing.
8 / 50
Perry and Wolfe proposed the following formula for software architecture:
9 / 50
When planning for performance, one should always remember the _______ rule.
10 / 50
A complex System evolves from a
11 / 50
Which of the following is not an objective for building an analysis model?
12 / 50
Software crisis came in 1960 what is the main reason to for the crisis
13 / 50
Once these requirements have been finalized, the ---------------- process starts.
14 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
15 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
16 / 50
MVC stands for ____________.
17 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
18 / 50
________ ensures that a class only has one instance and provides a global point of access to it.
19 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
20 / 50
The Object Oriented approach
21 / 50
_________ requirements are often called product features.
22 / 50
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
23 / 50
A cohesion class is one which emphasize -------unit of----.
24 / 50
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
25 / 50
The Data dictionary contain description of each software.
26 / 50
The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------
27 / 50
A change becomes ------------- because of close presence of data and functions
28 / 50
Which of the following is a fact finding method?
29 / 50
Collaboration diagrams have basically two types of components: objects and ----------
30 / 50
The first step in any OOA process model is to__________
31 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
32 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
33 / 50
State Transition Diagram is helpful in determining
34 / 50
Which of the items listed below is not one of the software engineering layers?
35 / 50
An object or class may further be classified on the basis of
36 / 50
There are four basic coding structures: sequence, if statement, case statement, and
___________.
37 / 50
Establishing responsibilities for objects includes
38 / 50
Requirement Statement and Requirement Specification are also called Requirement
Definition and ________
39 / 50
Software architecture is "The _______ of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time".
40 / 50
41 / 50
___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
42 / 50
A process which does not take input is called
43 / 50
For inspections, --------------- are prepared that contain information regarding defects.
44 / 50
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
45 / 50
Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include
46 / 50
___________ are used to describe flow of data or control in an application.
47 / 50
In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------
48 / 50
Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.
49 / 50
Events occur whenever a(n)_________________
50 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
Your score is
The average score is 0%
Restart quiz