CS504-Midterm
1 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
2 / 50
In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.
3 / 50
___________ are used to describe flow of data or control in an application.
4 / 50
In sequence Diagram events are organized in a-----time line
5 / 50
Coupling is a measure of ----------------of a module or component.
6 / 50
A complex System evolves from a
7 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
8 / 50
Asynchronous massages are denoted
9 / 50
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
10 / 50
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
11 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
12 / 50
Static analyzers are software tools for --------------- processing.
13 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
14 / 50
15 / 50
The process of defining attributes is called
16 / 50
Requirement engineering mainly deals with the -------------- of the system
17 / 50
Bugs Fixing is done by which of the teams in Software Development lifecycle?
18 / 50
19 / 50
20 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
21 / 50
The output of this design process is a description of the
22 / 50
Which of the items listed below is not one of the software engineering layers?
23 / 50
Interaction Diagrams depict the ------------- Behavior of the system
24 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
25 / 50
Equivalence __________ help you in designing test cases to test the system effectively and efficiently.
26 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
27 / 50
System Architecture is important to consider because it helps in making -------------
28 / 50
The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------
29 / 50
The scope description establishes the ---------- between the system we are developing and everything else in the universe. Project planning
30 / 50
A process which does not take input is called
31 / 50
Identifying Whole-Part structures (Aggregations) means what are my ----------------
32 / 50
The Data dictionary contain description of each software.
33 / 50
Identifying Whole-Part structures (Aggregations) means, what are my ----------------
34 / 50
Software architecture is "The _______ of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time".
35 / 50
MVC stands for ____________.
36 / 50
The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
37 / 50
38 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
39 / 50
By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control
40 / 50
The first step in any OOA process model is to__________
41 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
42 / 50
"is" prefix should be used for__________ variables and methods.
43 / 50
Insufficient user involvement leads to ------------- products.
44 / 50
Repository model also provides the ---------------------- view of the system.
45 / 50
There are four basic coding structures: sequence, if statement, case statement, and
___________.
46 / 50
Establishing responsibilities for objects includes
47 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
48 / 50
Once these requirements have been finalized, the ---------------- process starts.
49 / 50
Split lines occur when a statement exceed the _______ column limit.
50 / 50
In a …………., each program module is represented by a rectangular box.
Your score is
The average score is 0%
Restart quiz