CS504-Midterm
1 / 50
Software crisis came in 1960 what is the main reason to for the crisis
2 / 50
Repository model also provides the ---------------------- view of the system.
3 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
4 / 50
what is the most important software quality of a web based transaction
5 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
6 / 50
7 / 50
Identifying Whole-Part structures (Aggregations) means, what are my ----------------
8 / 50
The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.
9 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
10 / 50
___________ are used to describe flow of data or control in an application.
11 / 50
12 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
13 / 50
________ ensures that a class only has one instance and provides a global point of access to it.
14 / 50
Equivalence __________ help you in designing test cases to test the system effectively and efficiently.
15 / 50
Which of the following is a fact finding method?
16 / 50
Bugs Fixing is done by which of the teams in Software Development lifecycle?
17 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.
18 / 50
The output of this design process is a description of the
19 / 50
In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.
20 / 50
A process which does not take input is called
21 / 50
In sequence Diagram events are organized in a-----time line
22 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
23 / 50
The Data dictionary contain description of each software.
24 / 50
Most software continues to be custom built because
25 / 50
Split lines occur when a statement exceed the _______ column limit.
26 / 50
A complex System evolves from a
27 / 50
Data Store notation in DFDs presents.
28 / 50
Requirement engineering mainly deals with the -------------- of the system
29 / 50
Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.
30 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
31 / 50
In a …………., each program module is represented by a rectangular box.
32 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
33 / 50
STL Stands for ______________.
34 / 50
Dynamic components of an OOA model are ____________________
35 / 50
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
36 / 50
Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.
37 / 50
A change becomes ------------- because of close presence of data and functions
38 / 50
Control flow diagrams are
39 / 50
Following are some statements associated with data flow diagrams. Identify the correct statement from among them.
40 / 50
Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include
41 / 50
Which one is NOT a type of messages which Sequence Diagrams Depict _______
42 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
43 / 50
The Object Oriented approach
44 / 50
45 / 50
Software architecture is "The _______ of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time".
46 / 50
Asynchronous massages are denoted
47 / 50
cohesion is about making sure each component does---------- thing and does it well
48 / 50
Which is not included in test criteria applied in a phase of testing?
49 / 50
Once these requirements have been finalized, the ---------------- process starts.
50 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
Your score is
The average score is 0%
Restart quiz