CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

The Data dictionary contain description of each software.

2 / 50

Asynchronous massages are denoted

3 / 50

"is" prefix should be used for__________ variables and methods.

4 / 50

A complex System evolves from a

5 / 50

Camel Case is now the official convention for file names and identifiers in the ________ programming language.

6 / 50

Which of the following is a fact finding method?

7 / 50

There are four basic coding structures: sequence, if statement, case statement, and

___________.

8 / 50

________ ensures that a class only has one instance and provides a global point of access to it.

9 / 50

Collaboration diagrams have basically two types of components: objects and ----------

10 / 50

The scope description establishes the ----------between the system we are developing and everything else in the universe

11 / 50

Which of the items listed below is NOT one of the software engineering layers?

12 / 50

Data Store notation in DFDs presents.

13 / 50

what is the most important software quality of a web based transaction

14 / 50

___________ are used to describe flow of data or control in an application.

15 / 50

When planning for performance, one should always remember the _______ rule.

16 / 50

Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.

17 / 50

In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.

18 / 50

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.

19 / 50

Identifying Whole-Part structures (Aggregations) means, what are my ----------------

20 / 50

Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.

21 / 50

The first “bug” was actually a moth, which flew through an open window and into one of

the Mark --------- 's relays.

22 / 50

Equivalence __________ help you in designing test cases to test the system effectively and

efficiently.

23 / 50

A complex System evolves from a

24 / 50

Interaction Diagrams depict the ------------- Behavior of the system

25 / 50

Following are some statements associated with data flow diagrams. Identify the correct statement from among them.

26 / 50

What is the most crucial non-functional requirement of a system to control radiation dosages that are emitted as treatment for cancer?

27 / 50

By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control

28 / 50

Data design actually begins during the creation of the analysis model, not the architectural model.

29 / 50

Static analyzers are software tools for --------------- processing.

30 / 50

The output of this design process is a description of the

31 / 50

Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.

32 / 50

___________ are used to describe flow of data or control in an application.

33 / 50

Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include

34 / 50

For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings

35 / 50

In a …………., each program module is represented by a rectangular box.

36 / 50

Control flow diagrams are

37 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

38 / 50

The design process for identifying the sub-systems making up a system and the

framework for sub-system control and communication is:

39 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

40 / 50

cohesion is about making sure each component does---------- thing and does it well

41 / 50

Identifying Whole-Part structures (Aggregations) means, what are my -------------

42 / 50

A memory leak bug is one in which memory is somehow allocated from either the

operating system or an ---------- "pool", but never deallocated when the memory is finished being used.

43 / 50

Requirement Statement and Requirement Specification are also called Requirement

Definition and ________

44 / 50

A change becomes ------------- because of close presence of data and functions

45 / 50

Which of the items listed below is not one of the software engineering layers?

46 / 50

Writing test cases and generating test data are processes that demand __________ building

capabilities.

47 / 50

For inspections, --------------- are prepared that contain information regarding defects.

48 / 50

MVC stands for ____________.

49 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

50 / 50

Which is not included in test criteria applied in a phase of testing?

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi