CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

Insufficient user involvement leads to ------------- products.

2 / 50

A complex System evolves from a

3 / 50

Modularity is a tool that can help us in ________ the size of individual functions.

4 / 50

A complex System evolves from a

5 / 50

When large amount of data is to be shared, repository model is used. This model has

been extensively used in the _______ based application.

6 / 50

For inspections, --------------- are prepared that contain information regarding defects.

7 / 50

Interaction Diagrams depict the ------------- Behavior of the system

8 / 50

Control flow diagrams are

9 / 50

Most software continues to be custom built because

10 / 50

An state transition can only occur when triggered by a(n)________________

11 / 50

Static analyzers are software tools for --------------- processing.

12 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

13 / 50

By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control

14 / 50

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.

15 / 50

The Object Oriented approach

16 / 50

Which of the items listed below is NOT one of the software engineering layers?

17 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

18 / 50

what is the most important software quality of a web based transaction

19 / 50

Split lines occur when a statement exceed the _______ column limit.

20 / 50

Identifying Whole-Part structures (Aggregations) means, what are my ----------------

21 / 50

Static analyzers are software tools for --------------- processing.

22 / 50

The first “bug” was actually a moth, which flew through an open window and into one of

the Mark --------- 's relays.

23 / 50

The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.

24 / 50

_________ requirements are often called product features.

25 / 50

Once these requirements have been finalized, the ---------------- process starts.

26 / 50

Requirement Statement and Requirement Specification are also called Requirement

Definition and ________

27 / 50

The pattern movement became very quiet until __________ when patterns appeared again

at OOPSLA conference.

28 / 50

Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include

29 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

30 / 50

Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.

31 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

32 / 50

Coupling is a measure of ----------------of a module or component.

33 / 50

Many compilers limit the maximum number of bits in the bit field to the size of a(n)

_________.

34 / 50

Which one is NOT a type of messages which Sequence Diagrams Depict _______

35 / 50

Perry and Wolfe proposed the following formula for software architecture:

36 / 50

Following are some statements associated with data flow diagrams. Identify the correct statement from among them.

37 / 50

Establishing responsibilities for objects includes

38 / 50

In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------

39 / 50

Requirement engineering mainly deals with the -------------- of the system

40 / 50

Dynamic components of an OOA model are ____________________

41 / 50

The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------

42 / 50

A memory leak bug is one in which memory is somehow allocated from either the

operating system or an ---------- "pool", but never deallocated when the memory is finished being used.

43 / 50

A change becomes ------------- because of close presence of data and functions

44 / 50

Which design pattern provides a unified interface to a set of interfaces in a sub-system?

45 / 50

Which of the following is not an objective for building an analysis model?

46 / 50

A poorly designed interface can cause a user to make catastrophic errors is one of the motivations for GUI.

47 / 50

Data design actually begins during the creation of the analysis model, not the architectural model.

48 / 50

The output of this design process is a description of the

49 / 50

For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings

50 / 50

Identifier names play a significant role in enhancing the ____________ of a program.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi