CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

Camel Case is now the official convention for file names and identifiers in the ________ programming language.

2 / 50

Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.

3 / 50

Identifying Whole-Part structures (Aggregations) means, what are my -------------

4 / 50

Following are some statements associated with data flow diagrams. Identify the correct statement from among them.

5 / 50

The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.

6 / 50

In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.

7 / 50

Insufficient user involvement leads to ------------- products.

8 / 50

Which of the following is not an objective for building an analysis model?

9 / 50

The first “bug” was actually a moth, which flew through an open window and into one of

the Mark --------- 's relays.

10 / 50

STL Stands for ______________.

11 / 50

The scope description establishes the ----------between the system we are developing and everything else in the universe

12 / 50

When planning for performance, one should always remember the _______ rule.

13 / 50

cohesion is about making sure each component does---------- thing and does it well

14 / 50

The design process for identifying the sub-systems making up a system and the

framework for sub-system control and communication is:

15 / 50

Coupling is a measure of ----------------of a module or component.

16 / 50

Data design actually begins during the creation of the analysis model, not the architectural model.

17 / 50

Holistic medicine, concerns itself with the state of the body as a whole, not the -----------

that is currently attacking it.

18 / 50

The output of this design process is a description of the

19 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

20 / 50

The scope description establishes the ---------- between the system we are developing and everything else in the universe. Project planning

21 / 50

Static analyzers are software tools for --------------- processing.

22 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

23 / 50

Which is not included in test criteria applied in a phase of testing?

24 / 50

Software crisis came in 1960 what is the main reason to for the crisis

25 / 50

The pattern movement became very quiet until __________ when patterns appeared again

at OOPSLA conference.

26 / 50

___________ is only a reference for defining protocols and designing and implementing

systems developed by different parties.

27 / 50

Perry and Wolfe proposed the following formula for software architecture:

28 / 50

Once these requirements have been finalized, the ---------------- process starts.

29 / 50

A complex System evolves from a

30 / 50

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.

31 / 50

Most software continues to be custom built because

32 / 50

The Object Oriented approach

33 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

34 / 50

The first step in any OOA process model is to__________

35 / 50

The hardest single part of building a software system is deciding precisely ----------- to build.

36 / 50

A complex System evolves from a

37 / 50

A process which does not take input is called

38 / 50

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.

39 / 50

A change becomes ------------- because of close presence of data and functions

40 / 50

A complex System evolves from a

41 / 50

Equivalence __________ help you in designing test cases to test the system effectively and efficiently.

42 / 50

In presence of _________ bug in a program, the results are the opposite of what is

expected.

43 / 50

Modularity is a tool that can help us in ________ the size of individual functions.

44 / 50

Which of the items listed below is NOT one of the software engineering layers?

45 / 50

Establishing responsibilities for objects includes

46 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

47 / 50

Events occur whenever a(n)_________________

48 / 50

 ----- gives OO the ability to handle essential

49 / 50

Which of the following is a fact finding method?

50 / 50

Identifier names play a significant role in enhancing the ____________ of a program.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi