CS504-Midterm
1 / 50
Insufficient user involvement leads to ------------- products.
2 / 50
A complex System evolves from a
3 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
4 / 50
5 / 50
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
6 / 50
For inspections, --------------- are prepared that contain information regarding defects.
7 / 50
Interaction Diagrams depict the ------------- Behavior of the system
8 / 50
Control flow diagrams are
9 / 50
Most software continues to be custom built because
10 / 50
An state transition can only occur when triggered by a(n)________________
11 / 50
Static analyzers are software tools for --------------- processing.
12 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
13 / 50
By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control
14 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
15 / 50
The Object Oriented approach
16 / 50
Which of the items listed below is NOT one of the software engineering layers?
17 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
18 / 50
what is the most important software quality of a web based transaction
19 / 50
Split lines occur when a statement exceed the _______ column limit.
20 / 50
Identifying Whole-Part structures (Aggregations) means, what are my ----------------
21 / 50
22 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
23 / 50
The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.
24 / 50
_________ requirements are often called product features.
25 / 50
Once these requirements have been finalized, the ---------------- process starts.
26 / 50
Requirement Statement and Requirement Specification are also called Requirement
Definition and ________
27 / 50
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
28 / 50
Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include
29 / 50
30 / 50
Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.
31 / 50
32 / 50
Coupling is a measure of ----------------of a module or component.
33 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
34 / 50
Which one is NOT a type of messages which Sequence Diagrams Depict _______
35 / 50
Perry and Wolfe proposed the following formula for software architecture:
36 / 50
Following are some statements associated with data flow diagrams. Identify the correct statement from among them.
37 / 50
Establishing responsibilities for objects includes
38 / 50
In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------
39 / 50
Requirement engineering mainly deals with the -------------- of the system
40 / 50
Dynamic components of an OOA model are ____________________
41 / 50
The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------
42 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
43 / 50
A change becomes ------------- because of close presence of data and functions
44 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
45 / 50
Which of the following is not an objective for building an analysis model?
46 / 50
A poorly designed interface can cause a user to make catastrophic errors is one of the motivations for GUI.
47 / 50
Data design actually begins during the creation of the analysis model, not the architectural model.
48 / 50
The output of this design process is a description of the
49 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
50 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
Your score is
The average score is 0%
Restart quiz