Software Engineering Quiz 18

0%
0

Software Engineering Quiz 18

1 / 50

Which of the following is a Strategy to achieve Software diversity ?

2 / 50

The primary memory of a personal computer consists of _____________________?

3 / 50

Which of the following is not a part of bug report ?

4 / 50

Which software project sizing approach develop estimates of the information domain characteristics ?

5 / 50

Which of the following option is not considered by the Interface design ?

6 / 50

Which command is used to copy all files having the string chap and any two characters after that to the progs directory ?

7 / 50

Which one of the following is a requirement that fits in a developer?s module ?

8 / 50

The ___________ calls for trimming and chopping of these designs so that the cost is reduced, service is improved and the customer gets higher value at a higher speed?

9 / 50

Which of the following are the valid relationships in Use Case Diagrams______________________?

10 / 50

Which of the following languages can be used to write server side scripting in ASP.NET ?

11 / 50

Soft copy is an intangible output, so then what is a hard copy ?

12 / 50

Which command is used to display a file contents in octal form ?

13 / 50

C++ is a____________________?

14 / 50

_____________ type of budgeting is based on estimation of total project cost by the top management?

15 / 50

What do you mean by javap?

16 / 50

Which of the following places the common data elements in order from smallest to largest ?

17 / 50

Which of the following term is best defined by the statement:?When one object invokes another independent object, a message is passed between the two objects.? ?

18 / 50

What complements the formal technical review by assessing a configuration object for characteristics that are generally not considered during review ?

19 / 50

The importance of software design can be summarized in a single word which is___________________?

20 / 50

Which model is used to compute the effort required to integrate reusable components or program code that is automatically generated by design or program translation tools ?

21 / 50

Commitments to unrealistic time and resource estimates may result in____________________?

22 / 50

Which of the following command is used to see the services running in NFS server ?

23 / 50

Which one of the following models is not suitable for accommodating any change ?

24 / 50

In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads ?

25 / 50

There are _______________ overlapping stages in the lifetime of large and complex sociotechnical systems?

26 / 50

Layer one of the OSI model is_______________________?

27 / 50

Which of the following web engineering metric measures the extent of relatedness between two or more web pages ?

28 / 50

You organise files by storing them in____________________?

29 / 50

The MVC pattern was originally proposed in the 1980s as an approach to________________?

30 / 50

Which of the following is NOT an advanced input control ?

31 / 50

A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process ?

32 / 50

A specification of how the user moves from window to window, interacting with the application programs to perform useful work is called_______________?

33 / 50

Which of the following is not a Probabilistic Model ?

34 / 50

Custom Controls are derived from which of the classes_________________?

35 / 50

While working with mail command, which command is used to save mail in a separate file ?

36 / 50

A flat metallic disk that contains a large amount of permanently stored information read optically is called a ____________________?

37 / 50

What can be requested from any object of the class to affect behavior ?

38 / 50

Which three framework activities are present in Adaptive Software Development(ASD) ?

39 / 50

Automatic type conversion in Java takes place when________________?

40 / 50

Which one is NOT a phase of the systems development life cycle ?

41 / 50

Where can system and mail logs be found in Ret Hat Linux ?

42 / 50

What command is used to compare the files ?

43 / 50

The ls -l command tells_________________?

44 / 50

The JDBC-ODBC bridge is_________________?

45 / 50

Which of the following commands can be used to get information about all users who are currently logged into the system ?

46 / 50

The macro processor must perform________________?

47 / 50

PARAM was developed by_____________________?

48 / 50

Which of the following keys is used to replace a single character with new text ?

49 / 50

Which of the following is the first phase of the Systems Implementation phase ?

50 / 50

If in an ASP.NET application one want to create http handlers which of the interface is used________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi