Software Engineering Quiz 6

0%
0

Software Engineering Quiz 6

1 / 50

The original ASCII code used ___________________ bits of each byte, reserving that last bit for error checking ?

2 / 50

Which of the following transfer execution directly to another page ?

3 / 50

The IP address are based on________________?

4 / 50

Software evolution does not comprises ?

5 / 50

Which of the following requires design control measures, such as holding and recording design reviews and qualification tests ?

6 / 50

Convert the .WORD d#790 assemblylanguage pseudo-ops into hexadecimal machine language________________?

7 / 50

Which of the following is an Output device ?

8 / 50

Maintenance testing is performed using which methodology ?

9 / 50

This is a time-sensitive service_____________________?

10 / 50

Select the developer-specific requirement ?

11 / 50

Which one is not a risk management activity ?

12 / 50

The core of reverse engineering is an activity called________________?

13 / 50

Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?

14 / 50

Which of the following command can you execute to count the number of lines in a file ?

15 / 50

Classes and interfaces are a part of____________________?

16 / 50

An event in an executing program where the advice associated with an aspect may be executed is known as___________________?

17 / 50

Which of the following advanced input controls provides a nonnumeric means of selecting a value ?

18 / 50

Which of the following is a collection of component versions that make up a system ?

19 / 50

What is MTTF ?

20 / 50

Which framework class include standards and classes that support component communication and information exchange?

21 / 50

Java intermediate code is known as_________________?

22 / 50

Alpha testing is done at________________?

23 / 50

Which property is used to name a web control ?

24 / 50

Which of the following term is best defined by the statement:?a structural relationship that specifies that objects of one thing are connected to objects of another? ?

25 / 50

Which of the following commands can be used to get information about yourself ?

26 / 50

Selection of a model is based on_____________________?

27 / 50

If you open a menu and then decide you don?t want to select an option after all, click the menu title again or press the ________________ key to close the menu?

28 / 50

Which kind of chart is useful for comparing series or categories of data, each in its own bar ?

29 / 50

How many transaction isolation levels are defined in java.sql.Connection interface ?

30 / 50

To ensure that a given root definition is rigorous and comprehensive, The Lancaster team proposed several criteria that are summarized in the mnemonic CATWOE in Soft Systems Methodology (SSM).Which of the following alphabet is representing an entirely different meaning to SSM ?

31 / 50

Transmission and presentation of text and graphics is called______________________?

32 / 50

Which of the following are not the four major data processing functions of a computer ?

33 / 50

Cache and main memory will lose their contents when the power is off. They are ____________________?

34 / 50

_____________________ provides the means to move the pointer on the screen and give information to the computer by clicking its buttons ?

35 / 50

Inheritance means ?

36 / 50

The Following are the minimum requirement to run Asp.net pages_________________?

37 / 50

What command is used to halt a Linux system ?

38 / 50

What combines procedures and tools to manage different versions of configuration objects that are created during the software process ?

39 / 50

SCM stands for_________________?

40 / 50

What is a strong name ?

41 / 50

Which transmission media has the highest transmission speed in a network ?

42 / 50

Identify the correct option with reference to Software Quality Metrics ?

43 / 50

If a memory chip is volatile, it will _____________________?

44 / 50

Why is Requirements Elicitation a difficult task ?

45 / 50

Convert the 080D4E machine language instructions into assembly language, assuming that they were not generated by pseudo-ops_______________?

46 / 50

Which of the following tool is used to partition your hard drive ?

47 / 50

Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ?

48 / 50

All the operations in a transaction need to be completed before the database changes are made _________________?

49 / 50

The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called ?

50 / 50

Which of the following refers to the fastest, biggest and most expansive computer ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi