Software Engineering Quiz 22

0%
0

Software Engineering Quiz 22

1 / 50

Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system ?

2 / 50

The first generation computer used __________________ for circuitry ?

3 / 50

How is it possible that both programs and data can be stored on the same floppy disk ?

4 / 50

If one uses ASP.NET configuration system to restrict access which of the following is TRUE ?

5 / 50

In terms of Issues related to professional responsibility____________________?

6 / 50

When 2 or more bits in a data unit has been changed during the transmission, the error is called___________________?

7 / 50

Which one of the following is not an Umbrella Activity that complements the five process framework activities and help team manage and control progress, quality, change, and risk ?

8 / 50

A sizeable geographical area with communication based on the telephone system is though as_____________________?

9 / 50

In analyzing the compilation of PL/I program, the term ?Syntax analysis? is associated with________________?

10 / 50

Hard disks are formatted in the same manner as floppy disks. However, before a hard disk can be formatted, it must first be _____________________?

11 / 50

Test cases should uncover errors like_____________________?

12 / 50

MIS normally found in a manufacturing organization will not be suitable in the _________________?

13 / 50

Which of the following is a requirement when merging modified data into a DataSet ?

14 / 50

Which one of the following is not an actor in JAD sessions ?

15 / 50

Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immedia________________?

16 / 50

What threatens the viability of the software to be built ?

17 / 50

The File that contains a set of instructions which are performed when a user logs in, is_____________?

18 / 50

By collecting __________________ during software testing, it is possible to develop meaningful guidelines to halt the testing process?

19 / 50

Common type system is built into which of the following?

20 / 50

Any data or instructions naturel into memory of a computer is considered as ____________________?

21 / 50

How is WINWIN Spiral Model different from Spiral Model ?

22 / 50

Which of following commands is used for an automatic reminder service ?

23 / 50

Which of the following relates to enterprise interoperability ?

24 / 50

What translates a natural or an artificial language into another representation of that language and, for programming languages also execute the resulting code ?

25 / 50

The components that process data are located in the_________________________?

26 / 50

?Consider a system where, a heat sensor detects an intrusion and alerts the security company.? What kind of a requirement the system is providing ?

27 / 50

In HTTP pipelining__________________?

28 / 50

Specifying a set of test cases or test paths for each item to be tested at that level is known as__________________?

29 / 50

Which of the following points related to Object-oriented development (OOA is true ?

30 / 50

Which of command is used to copy a file ?

31 / 50

If you were a lead developer of a software company and you are asked to submit a project/product within a stipulated time-frame with no cost barriers, which model would you select ?

32 / 50

Which of the following is NOT a feasibility analysis criterion ?

33 / 50

Minimum threads in a program are________________?

34 / 50

Which of the following is not an information domain required for determining function point in FPA ?

35 / 50

Which of these is incorrect ?

36 / 50

When you save to ________________ your data will remain intact even when the computer is turned off.

37 / 50

?A client is assigned all user presentation tasks and the processes associated with data entry?.Which option supports the client?s situation ?

38 / 50

Name the keyword that makes a variable belong to a class, rather than being defined for each instance of the class?

39 / 50

A decision support system has a more customized orientation than a _________. _______ is a collection of capabilities that support the decision making process of a individual or a small group of a ind ?

40 / 50

Which protocol does ping the computer network administration software utility use ?

41 / 50

The physical layer of a network________________?

42 / 50

Which diagram evolved from a desire to develop a procedural design representation that would not allow violation of the structured constructs ?

43 / 50

The ___________ key and the __________ key can be used in combination with other keys to perform shortcuts and special tasks?

44 / 50

An example of a system that may use a process pipeline is a _________________________?

45 / 50

The most widely used code that represents each character as a unique 8-bit code is____________________?

46 / 50

Which of the following is NOT an Input device ?

47 / 50

Which of the following is required for Certification for clean room software engineering ?

48 / 50

What kind of quality cost is incurred when an error is detected in a product prior to shipment ?

49 / 50

Which one is NOT a common fact-finding technique ?

50 / 50

Which of the following command is used to access an SMB share on a Linux system ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi