Software Engineering Quiz 13
1 / 50
Which one of the following is a functional requirement ?
2 / 50
All of the logic and mathematical calculations done by the computer happen in/on the ___________________?
3 / 50
Open database connectivity (OBDC) tools are an example of_______________?
4 / 50
Risk management is one of the most important jobs for a__________________?
5 / 50
When does Garbage collector run ?
6 / 50
The field separator in cut command is specified with________________?
7 / 50
_____________ is any part of computer that can be touched?
8 / 50
Which of the following steps is applied to develop a decision table ?
9 / 50
A DNS client is called____________________?
10 / 50
We can manage states in asp.net application using_______________?
11 / 50
Which of the following term is best defined by the statement: ?Derive traceability information to maximize information hiding in the design.? ?
12 / 50
Which of the following manuals is a user documentation ?
13 / 50
Which of the following is not a part of Execution Flow during debugging ?
14 / 50
Quality planning is the process of developing a quality plan for__________________?
15 / 50
The UNIX file system stores a data in physical blocks of_______________?
16 / 50
Which of the following is the main Apache configuration file ?
17 / 50
The key that must be pressed each time a new command or information is entered____________________?
18 / 50
An error in computer data is called________________?
19 / 50
A software package to implement a data base is_____________________?
20 / 50
SPICE stands for __________________?
21 / 50
Which of the following commands is used to get directory one level up ?
22 / 50
The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?
23 / 50
Why is software difficult to build ?
24 / 50
____________is/are the resources are used for DSS to explore decision alternatives?
25 / 50
Which of the following is not a classification of the web engineering metric, Web Page Similarity ?
26 / 50
Which key is used in combination with another key to perform a specific task ?
27 / 50
Which of the following is not a build system feature ?
28 / 50
What stores all changes and info related to the project from development through maintenance in CASE tools ?
29 / 50
Which of the following refers to the expenses that a customer incurs in lost time and expenditure of resources when changing from one seller to a competing seller ?
30 / 50
Which of the following is incorrect activity for the configuration management of a software system ?
31 / 50
Software engineers should not use their technical skills to misuse other people?s computers.?Here the term misuse refers to ___________________?
32 / 50
Which commands is used to assign executable permission to all of the files named ?letter? ?
33 / 50
A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is___________________?
34 / 50
The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is_______________?
35 / 50
Which of the following provides a concise, unambiguous, and consistent method for documenting system requirements ?
36 / 50
Word processing, spread sheet, and photo editing are examples of___________________?
37 / 50
Which of the following authentication is best suited for a corporate network ?
38 / 50
The chmod ugo+rw note command can be represented in octal notation as_____________?
39 / 50
Which of the following issues must be addressed if a successful software testing strategy is to be implemented ?
40 / 50
Computers use the_____________ language to process data ?
41 / 50
Which command is used to display the end of the file ?
42 / 50
In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME directory ?
43 / 50
How many classes can a single .NET DLL contain ?
44 / 50
__________ development of DSS relies on the creation of a prototype and its progressive refinement?
45 / 50
___________________ is the process of dividing the disk into tracks and sectors ?
46 / 50
The primary objective of formal technical reviews is to find _________________ during the process so that they do not become defects after release of the software?
47 / 50
What command is used with vi editor to replace text from cursor to right______________?
48 / 50
The general transformation cycle for information is________________?
49 / 50
Acceptance testing is also known as____________________?
50 / 50
DSL is an example of _______________ connection ?
Provide Your Information
Your score is
The average score is 0%
Restart quiz