CS504-Midterm
1 / 50
Which is not included in test criteria applied in a phase of testing?
2 / 50
By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control
3 / 50
Perry and Wolfe proposed the following formula for software architecture:
4 / 50
Software crisis came in 1960 what is the main reason to for the crisis
5 / 50
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
6 / 50
Which of these characteristics are true of a data warehouse, but not a typical database?
7 / 50
System Architecture is important to consider because it helps in making -------------
8 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
9 / 50
Most software continues to be custom built because
10 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
11 / 50
Which of the following is not an objective for building an analysis model?
12 / 50
___________ are used to describe flow of data or control in an application.
13 / 50
Split lines occur when a statement exceed the _______ column limit.
14 / 50
Repository model also provides the ---------------------- view of the system.
15 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
16 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.
17 / 50
Control flow diagrams are.
18 / 50
Data design actually begins during the creation of the analysis model, not the architectural model.
19 / 50
A change becomes ------------- because of close presence of data and functions
20 / 50
Requirement Statement and Requirement Specification are also called Requirement
Definition and ________
21 / 50
The hardest single part of building a software system is deciding precisely ----------- to build.
22 / 50
Static analyzers are software tools for --------------- processing.
23 / 50
A poorly designed interface can cause a user to make catastrophic errors is one of the motivations for GUI.
24 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
25 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
26 / 50
Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.
27 / 50
----- gives OO the ability to handle essential
28 / 50
what is the most important software quality of a web based transaction
29 / 50
In a …………., each program module is represented by a rectangular box.
30 / 50
What is the most crucial non-functional requirement of a system to control radiation dosages that are emitted as treatment for cancer?
31 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
32 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
33 / 50
Camel Case is now the official convention for file names and identifiers in the ________ programming language.
34 / 50
Coupling is a measure of ----------------of a module or component.
35 / 50
When planning for performance, one should always remember the _______ rule.
36 / 50
Interaction Diagrams depict the ------------- Behavior of the system
37 / 50
Asynchronous massages are denoted
38 / 50
Requirement engineering mainly deals with the -------------- of the system
39 / 50
The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------
40 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
41 / 50
State Transition Diagram is helpful in determining
42 / 50
Control flow diagrams are
43 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
44 / 50
Once these requirements have been finalized, the ---------------- process starts.
45 / 50
Writing test cases and generating test data are processes that demand __________ building
capabilities.
46 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
47 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
48 / 50
49 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
50 / 50
Your score is
The average score is 0%
Restart quiz