CS504-Midterm
1 / 50
Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.
2 / 50
Camel Case is now the official convention for file names and identifiers in the ________ programming language.
3 / 50
Asynchronous massages are denoted
4 / 50
________ ensures that a class only has one instance and provides a global point of access to it.
5 / 50
Control flow diagrams are.
6 / 50
The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------
7 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
8 / 50
___________ are used to describe flow of data or control in an application.
9 / 50
An state transition can only occur when triggered by a(n)________________
10 / 50
Data design actually begins during the creation of the analysis model, not the architectural model.
11 / 50
Events occur whenever a(n)_________________
12 / 50
In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------
13 / 50
----- gives OO the ability to handle essential
14 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
15 / 50
There are four basic coding structures: sequence, if statement, case statement, and
___________.
16 / 50
Static analyzers are software tools for --------------- processing.
17 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
18 / 50
System Architecture is important to consider because it helps in making -------------
19 / 50
Split lines occur when a statement exceed the _______ column limit.
20 / 50
Writing test cases and generating test data are processes that demand __________ building
capabilities.
21 / 50
Identifying Whole-Part structures (Aggregations) means what are my ----------------
22 / 50
Which of these characteristics are true of a data warehouse, but not a typical database?
23 / 50
STL Stands for ______________.
24 / 50
A process which does not take input is called
25 / 50
When planning for performance, one should always remember the _______ rule.
26 / 50
Which one is NOT a type of messages which Sequence Diagrams Depict _______
27 / 50
what is the most important software quality of a web based transaction
28 / 50
A change becomes ------------- because of close presence of data and functions
29 / 50
The hardest single part of building a software system is deciding precisely ----------- to build.
30 / 50
MVC stands for ____________.
31 / 50
Once these requirements have been finalized, the ---------------- process starts.
32 / 50
Repository model also provides the ---------------------- view of the system.
33 / 50
Equivalence __________ help you in designing test cases to test the system effectively and efficiently.
34 / 50
Control flow diagrams are
35 / 50
The Object Oriented approach
36 / 50
37 / 50
Which of the following is a fact finding method?
38 / 50
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
39 / 50
Requirement engineering mainly deals with the -------------- of the system
40 / 50
In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.
41 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
42 / 50
Which of the items listed below is NOT one of the software engineering layers?
43 / 50
Data Store notation in DFDs presents.
44 / 50
A complex System evolves from a
45 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
46 / 50
Which is not included in test criteria applied in a phase of testing?
47 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
48 / 50
Which of the following is not an objective for building an analysis model?
49 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
50 / 50
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
Your score is
The average score is 0%
Restart quiz