CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

Identifying Whole-Part structures (Aggregations) means, what are my ----------------

2 / 50

Requirement engineering mainly deals with the -------------- of the system

3 / 50

Static analyzers are software tools for --------------- processing.

4 / 50

Equivalence __________ help you in designing test cases to test the system effectively and efficiently.

5 / 50

Which is not included in test criteria applied in a phase of testing?

6 / 50

The design process for identifying the sub-systems making up a system and the

framework for sub-system control and communication is:

7 / 50

Split lines occur when a statement exceed the _______ column limit.

8 / 50

System Architecture is important to consider because it helps in making -------------

9 / 50

The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product.

10 / 50

A change becomes ------------- because of close presence of data and functions

11 / 50

In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.

12 / 50

The process of defining attributes is called

13 / 50

The Object Oriented approach

14 / 50

The scope description establishes the ----------between the system we are developing and everything else in the universe

15 / 50

A complex System evolves from a

16 / 50

Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.

17 / 50

An object or class may further be classified on the basis of

18 / 50

Bugs Fixing is done by which of the teams in Software Development lifecycle?

19 / 50

In sequence Diagram events are organized in a-----time line

20 / 50

what is the most important software quality of a web based transaction

21 / 50

A memory leak bug is one in which memory is somehow allocated from either the

operating system or an ---------- "pool", but never deallocated when the memory is finished being used.

22 / 50

Establishing responsibilities for objects includes

23 / 50

State Transition Diagram is helpful in determining

24 / 50

Comments should be indented relative to their position in the _______.

25 / 50

"is" prefix should be used for__________ variables and methods.

26 / 50

Asynchronous massages are denoted

27 / 50

Which one is NOT a type of messages which Sequence Diagrams Depict _______

28 / 50

Identifier names play a significant role in enhancing the ____________ of a program.

29 / 50

Control flow diagrams are

30 / 50

Static analyzers are software tools for --------------- processing.

31 / 50

Collaboration diagrams have basically two types of components: objects and ----------

32 / 50

The scope description establishes the ---------- between the system we are developing and everything else in the universe. Project planning

33 / 50

Interaction Diagrams depict the ------------- Behavior of the system

34 / 50

Following are some statements associated with data flow diagrams. Identify the correct statement from among them.

35 / 50

Most software continues to be custom built because

36 / 50

Many compilers limit the maximum number of bits in the bit field to the size of a(n)

_________.

37 / 50

Perry and Wolfe proposed the following formula for software architecture:

38 / 50

___________ is only a reference for defining protocols and designing and implementing

systems developed by different parties.

39 / 50

Software crisis came in 1960 what is the main reason to for the crisis

40 / 50

For inspections, --------------- are prepared that contain information regarding defects.

41 / 50

In a …………., each program module is represented by a rectangular box.

42 / 50

cohesion is about making sure each component does---------- thing and does it well

43 / 50

The pattern movement became very quiet until __________ when patterns appeared again

at OOPSLA conference.

44 / 50

_________ requirements are often called product features.

45 / 50

Data design actually begins during the creation of the analysis model, not the architectural model.

46 / 50

A change becomes ------------- because of close presence of data and functions

47 / 50

___________ are used to describe flow of data or control in an application.

48 / 50

The first “bug” was actually a moth, which flew through an open window and into one of

the Mark --------- 's relays.

49 / 50

Which design pattern provides a unified interface to a set of interfaces in a sub-system?

50 / 50

Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi