CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.

2 / 50

Camel Case is now the official convention for file names and identifiers in the ________ programming language.

3 / 50

Asynchronous massages are denoted

4 / 50

________ ensures that a class only has one instance and provides a global point of access to it.

5 / 50

Control flow diagrams are.

6 / 50

The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------

7 / 50

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.

8 / 50

___________ are used to describe flow of data or control in an application.

9 / 50

An state transition can only occur when triggered by a(n)________________

10 / 50

Data design actually begins during the creation of the analysis model, not the architectural model.

11 / 50

Events occur whenever a(n)_________________

12 / 50

In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------

13 / 50

 ----- gives OO the ability to handle essential

14 / 50

Which design pattern provides a unified interface to a set of interfaces in a sub-system?

15 / 50

There are four basic coding structures: sequence, if statement, case statement, and

___________.

16 / 50

Static analyzers are software tools for --------------- processing.

17 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

18 / 50

System Architecture is important to consider because it helps in making -------------

19 / 50

Split lines occur when a statement exceed the _______ column limit.

20 / 50

Writing test cases and generating test data are processes that demand __________ building

capabilities.

21 / 50

Identifying Whole-Part structures (Aggregations) means what are my ----------------

22 / 50

Which of these characteristics are true of a data warehouse, but not a typical database?

23 / 50

STL Stands for ______________.

24 / 50

A process which does not take input is called

25 / 50

When planning for performance, one should always remember the _______ rule.

26 / 50

Which one is NOT a type of messages which Sequence Diagrams Depict _______

27 / 50

what is the most important software quality of a web based transaction

28 / 50

A change becomes ------------- because of close presence of data and functions

29 / 50

The hardest single part of building a software system is deciding precisely ----------- to build.

30 / 50

MVC stands for ____________.

31 / 50

Once these requirements have been finalized, the ---------------- process starts.

32 / 50

Repository model also provides the ---------------------- view of the system.

33 / 50

Equivalence __________ help you in designing test cases to test the system effectively and efficiently.

34 / 50

Control flow diagrams are

35 / 50

The Object Oriented approach

36 / 50

Which design pattern provides a unified interface to a set of interfaces in a sub-system?

37 / 50

Which of the following is a fact finding method?

38 / 50

When large amount of data is to be shared, repository model is used. This model has

been extensively used in the _______ based application.

39 / 50

Requirement engineering mainly deals with the -------------- of the system

40 / 50

In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.

41 / 50

Modularity is a tool that can help us in ________ the size of individual functions.

42 / 50

Which of the items listed below is NOT one of the software engineering layers?

43 / 50

Data Store notation in DFDs presents.

44 / 50

A complex System evolves from a

45 / 50

A memory leak bug is one in which memory is somehow allocated from either the

operating system or an ---------- "pool", but never deallocated when the memory is finished being used.

46 / 50

Which is not included in test criteria applied in a phase of testing?

47 / 50

Identifier names play a significant role in enhancing the ____________ of a program.

48 / 50

Which of the following is not an objective for building an analysis model?

49 / 50

In presence of _________ bug in a program, the results are the opposite of what is

expected.

50 / 50

The pattern movement became very quiet until __________ when patterns appeared again

at OOPSLA conference.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi