Software Engineering Quiz 27

0%
0

Software Engineering Quiz 27

1 / 50

Third generation computers__________________?

2 / 50

Information management model involves four steps ________ , _________ , _________ & ________ ?

3 / 50

Choose a framework that corresponds to Issue Based Information System (IBIS) ?

4 / 50

Convert the 48 machine language instructions into assembly language, assuming that they were not generated by pseudo-ops_______________?

5 / 50

Purpose of process is to deliver software________________?

6 / 50

What is used to pass SQL requests and associated data from one component to another ?

7 / 50

All raw data types should be read and uploaded to the database as an array of________________?

8 / 50

The information of MIS comes from the________________?

9 / 50

Size and Complexity are a part of____________________?

10 / 50

Which of the following is not a typical environment in communication facilitation ?

11 / 50

Which one of the following memory is not the primary memory of a computer ?

12 / 50

_______________ categorizes class operations based on the generic function that each performs?

13 / 50

Which of the following systems software does the job of merging the records from two flies into one ?

14 / 50

Internal information for MIS may come from any one of the following department ?

15 / 50

What file contains the list of port numbers (and associated names) monitored by inetd ?

16 / 50

QFD stands for ________________?

17 / 50

The full form of MPEG is____________________?

18 / 50

Which tool is use for structured designing ?

19 / 50

__________ information required by the middle and top management?

20 / 50

It is imperative for a communicating processes to reach consistent recovery points to avoid the __________________ effect, with backward error recovery mechanism ?

21 / 50

Mass production of computers started in ___________ , when UNIVAC 1 was delivered?

22 / 50

Function-oriented design techniques starts with functional requirements specified in_______________?

23 / 50

Boundary value analysis belong to ?

24 / 50

Thread class is available in________________?

25 / 50

Management, science, also known as ___________ , is a field of applied mathematics ?

26 / 50

Which of the following term describes testing ?

27 / 50

What project is currently developing X server support ?

28 / 50

Which statement is static and synchronized in JDBC API ?

29 / 50

If you are to use [Control-c] as the interrupt key instead of [Del], then you will have to use________________?

30 / 50

What is related to the overall functionality of the delivered software ?

31 / 50

Which of the following is not included in Issues Meetings ?

32 / 50

____________________ is a pidgin(simplified version of a language that develops as a means of communication between two or more groups that do not have a language in common)?

33 / 50

What TCP/IP protocol is used for remote terminal connection service ?

34 / 50

The ________ information as the information required by a number of personal, departments and divisions or the functions in the organization?

35 / 50

What requirement gathering method developed at IBM in 1970s is used for managing requirement elicitation ?

36 / 50

When a bank offers web self-service for customers to answer their questions, the primary outcome is ___________?

37 / 50

Which of the following files contains information related to password aging ?

38 / 50

The documentation of a process which records the tasks, the roles and the entities used is called__________________?

39 / 50

A piece of icon or image on a web page associated with another webpage is called_________________?

40 / 50

Which of the following is the last phase of the Systems Construction phase ?

41 / 50

Wireless transmission can be done via________________________?

42 / 50

What is the out put of Following code String a=?Hello?; String b=?World? String c= a+b Response.Write ( ?C ?); ?

43 / 50

Which of the following is a software process certification ?

44 / 50

Letters, numbers and symbols found on a keyboard are ________________________?

45 / 50

The light pen was developed in_________________?

46 / 50

Which mechanism is applied to use a design pattern in an OO system ?

47 / 50

Suppose one wants to modify a SOAP message in a SOAP extension then how this can be achieved. Choose the correct option from below ?

48 / 50

Program which executes applet is known as________________?

49 / 50

The RUP is normally described from three perspectives-dynamic, static & practice.What does static perspective do ?

50 / 50

Which of the following subdirectory(ies) contains the device files ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi