Software Engineering Quiz 13

0%
0

Software Engineering Quiz 13

1 / 50

All of the logic and mathematical calculations done by the computer happen in/on the ___________________?

2 / 50

When does Garbage collector run ?

3 / 50

Which of the following manuals is a user documentation ?

4 / 50

Computers use the_____________ language to process data ?

5 / 50

The key that must be pressed each time a new command or information is entered____________________?

6 / 50

What stores all changes and info related to the project from development through maintenance in CASE tools ?

7 / 50

Which commands is used to assign executable permission to all of the files named ?letter? ?

8 / 50

Which of the following is not a part of Execution Flow during debugging ?

9 / 50

Which of the following is the main Apache configuration file ?

10 / 50

___________________ is the process of dividing the disk into tracks and sectors ?

11 / 50

Which command is used to display the end of the file ?

12 / 50

A DNS client is called____________________?

13 / 50

__________ development of DSS relies on the creation of a prototype and its progressive refinement?

14 / 50

Which key is used in combination with another key to perform a specific task ?

15 / 50

The primary objective of formal technical reviews is to find _________________ during the process so that they do not become defects after release of the software?

16 / 50

How many classes can a single .NET DLL contain ?

17 / 50

Software engineers should not use their technical skills to misuse other people?s computers.?Here the term misuse refers to ___________________?

18 / 50

The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?

19 / 50

The field separator in cut command is specified with________________?

20 / 50

Which of the following refers to the expenses that a customer incurs in lost time and expenditure of resources when changing from one seller to a competing seller ?

21 / 50

Acceptance testing is also known as____________________?

22 / 50

Which of the following steps is applied to develop a decision table ?

23 / 50

Word processing, spread sheet, and photo editing are examples of___________________?

24 / 50

SPICE stands for __________________?

25 / 50

We can manage states in asp.net application using_______________?

26 / 50

_____________ is any part of computer that can be touched?

27 / 50

The general transformation cycle for information is________________?

28 / 50

Which of the following is incorrect activity for the configuration management of a software system ?

29 / 50

A software package to implement a data base is_____________________?

30 / 50

Risk management is one of the most important jobs for a__________________?

31 / 50

Which of the following authentication is best suited for a corporate network ?

32 / 50

Which of the following commands is used to get directory one level up ?

33 / 50

____________is/are the resources are used for DSS to explore decision alternatives?

34 / 50

DSL is an example of _______________ connection ?

35 / 50

Quality planning is the process of developing a quality plan for__________________?

36 / 50

Which of the following is not a build system feature ?

37 / 50

What command is used with vi editor to replace text from cursor to right______________?

38 / 50

Which of the following term is best defined by the statement: ?Derive traceability information to maximize information hiding in the design.? ?

39 / 50

Which of the following is not a classification of the web engineering metric, Web Page Similarity ?

40 / 50

In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME directory ?

41 / 50

The UNIX file system stores a data in physical blocks of_______________?

42 / 50

Open database connectivity (OBDC) tools are an example of_______________?

43 / 50

The chmod ugo+rw note command can be represented in octal notation as_____________?

44 / 50

The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is_______________?

45 / 50

An error in computer data is called________________?

46 / 50

Which of the following provides a concise, unambiguous, and consistent method for documenting system requirements ?

47 / 50

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is___________________?

48 / 50

Which of the following issues must be addressed if a successful software testing strategy is to be implemented ?

49 / 50

Why is software difficult to build ?

50 / 50

Which one of the following is a functional requirement ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi