Software Engineering Quiz 21

0%
0

Software Engineering Quiz 21

1 / 50

In which test design each input is tested at both ends of its valid range and just outside its valid range ?

2 / 50

Main storage is also called__________________?

3 / 50

Which of these benefits can be achieved when software is restructured ?

4 / 50

Size of int in Java is_________________?

5 / 50

What sign is used to back up over typing errors in vi ?

6 / 50

Which of the following is a dynamic model that shows how the system interacts with its environment as it is used ?

7 / 50

Which one of the following is not a software process quality ?

8 / 50

Which of the following is not an objective of reverse engineering ?

9 / 50

The first mechanical calculating machine was made by ________________________?

10 / 50

SMI stands for_______________?

11 / 50

Cost and schedule are a part of_________________________?

12 / 50

How is throwaway prototype different from evolutionary prototype ?

13 / 50

CASE stands for___________________?

14 / 50

Which command will be used with vi editor to append text at end of line ?

15 / 50

Which of the following is not a class of information system applications ?

16 / 50

All of the following are examples of requirements problems, except ?

17 / 50

IMC Networks is a leading __________________ certified manufacturer of optical networking and LAN/WAN connectivity solutions for enterprise, telecommunications and service provider applications ?

18 / 50

Which one is not a software quality model ?

19 / 50

All of the following storage media have read and write capabilities except _____________________?

20 / 50

Which of the following is true ?

21 / 50

____________ is an organized portfolio of formal systems for obtaining processing and delivering information in support of the business operations and management of an organization?

22 / 50

Which of the following terms applies to communication between separate computer systems ?

23 / 50

The comprehensive software system that builds, maintains and provides acess to a database is_________________?

24 / 50

Which of the following risk is the failure of a purchased component to perform as expected ?

25 / 50

Which of the following property of SRS is depicted by the statement : ?Conformity to a standard is maintained? ?

26 / 50

How many phases are there in Scrum ?

27 / 50

Which of the following statements explains portability in non-functional requirements ?

28 / 50

Choose an internal software quality from given below________________________?

29 / 50

A device that provides emergency power to your computer, conditions the voltage, and protects against powers surges is called a __________________?

30 / 50

Which of the following is not a Protection system ?

31 / 50

In which directory can you store system user default files used for creating user directories ?

32 / 50

Cleanroom software engineering complies with the operational analysis principles by using a method called known as________________?

33 / 50

The physical layer is responsible for__________________?

34 / 50

How many diagrams are here in Unified Modelling Language ?

35 / 50

To build a modularized kernel, the kernel-headers and kernel-source packages must first be installed. Where will you find the kernel-headers and kernel-source ?

36 / 50

____________ is a space behind satellite navigation system that provides location anywhere on earth where there is an unobstructed line of site for four or more of its satellites ?

37 / 50

To create an installation boot floppy disk from Linux (or another Unix) machine, what command could you use ?

38 / 50

A key that will erase information from the computer?s memory and characters on the screen ______________________?

39 / 50

What are the appropriate Hex codes for setting Linux swap and Linux native partition types in fdisk ?

40 / 50

RAM is_________________ and _________________?

41 / 50

What is often undefined and is left to the ingenuity of the project managers and engineers ?

42 / 50

All the deleted files go to____________________?

43 / 50

Which of the following is the way to monitor the web application ?

44 / 50

In the Analysis phase, the development of the ______________ occurs, which is a clear statement of the goals and objectives of the project ?

45 / 50

A _______________ is often used to select or highlight?

46 / 50

Transformation of a system from one representational form to another is known as________________?

47 / 50

What defines the circumstances in which a particular operation is valid ?

48 / 50

How many feasibility studies is conducted in Requirement Analysis ?

49 / 50

Which of the following statements about arrays is syntactically wrong ?

50 / 50

What should not be part of an acceptable use policy ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi