Software Engineering Quiz 8

0%
0

Software Engineering Quiz 8

1 / 50

In .NET the operation of reading metadata and using its contents is known as ________________?

2 / 50

The elements of control will consist of __________________?

3 / 50

What combines the outward manifestation of the computer-based system , coupled with all supporting information that describe system syntax and semantics ?

4 / 50

What are the four dimensions of Dependability ?

5 / 50

What is the major drawback of using RAD Model ?

6 / 50

Which model was used during the early stages of software engineering, when prototyping of user interfaces, consideration of software and system interaction, assessment of performance, and evaluation of technology maturity were paramount ?

7 / 50

Which of the following is a design pattern?

8 / 50

Which command is used with vi editor scroll half page backward ?

9 / 50

Information systems that support the business functions that reach out to suppliers are known as_____________?

10 / 50

What command is used with vi editor to move forward to the end of a word ?

11 / 50

A step by step instruction used to solve a problem is known as ___________________?

12 / 50

Which command is used to change directory to the name beginning with a ?p? ?

13 / 50

Which of the following subdirectory(ies) contains the system boot scripts?

14 / 50

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: ?The process should be understandable by people apart from process participants? ?

15 / 50

All of the following are phases of systems analysis, except ?

16 / 50

In ASP.NET if you want to allows page developers a way to specify static connections in a content page then the class used is_____________?

17 / 50

Which testing tool does a simple job of enforcing standards in a uniform way of many programs ?

18 / 50

If a file has read and write permissions for the owner, then the octal representation of the permissions will be_________________?

19 / 50

Caching type supported by ASP.Net ?

20 / 50

Which of the following is used to write error message in event Log File ?

21 / 50

Which of the following is not included in Architectural design decisions ?

22 / 50

For a browser to connect to other resources , the location or address of the resources must be specified. These addresses are called___________________?

23 / 50

What command is used to add printing jobs to the queue ?

24 / 50

A half byte is know is___________________?

25 / 50

The components of DSS ?

26 / 50

It is best to use a web instead of a windows application when the application ?

27 / 50

Which of the following activities of a Generic Process framework provides a feedback report ?

28 / 50

Which pattern prevents one from creating more than one instance of a variable ?

29 / 50

Which of the following special shell variables is used to process number of the current shell ?

30 / 50

What file specifies the order in which to use specified name services ?

31 / 50

RPM____________________?

32 / 50

The two types of output devices are____________________?

33 / 50

A ______________ is a computer connected to two networks?

34 / 50

POFOD stands for___________________?

35 / 50

Which of the following denote value that can be taken by Cache-Control of ASP.NET ?

36 / 50

Once information is input into a computer it becomes____________________?

37 / 50

CASE tools are mainly used while developing which of the following methodologies?

38 / 50

CORBA stands for _____________________?

39 / 50

The object is created with ?new? keyword ?

40 / 50

What is the number of bit patterns provided by a 7-bit code ?

41 / 50

Micro computer hardware consists of three basic categories of physical equipment______________________?

42 / 50

Which of the following is not an example of component technology ?

43 / 50

________ , _________ and society need to use a variety of systems to organize the collection, storage, processing, retrieval and communication of information?

44 / 50

Java is known as ___________ stage language?

45 / 50

How could you install the file ipchains-1.3.9-5.i386.rpm ?

46 / 50

If a developer of ASP.NET defines style information in a common location. Then that location is called as_________________?

47 / 50

Which of the following is a category of a stimuli ?

48 / 50

The main memory of a computer can also be called_________________?

49 / 50

Which of the following denote the web control associated with Table control function of ASP.NET ?

50 / 50

Agile Software Development is based on_________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi