CS504-Midterm
1 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
2 / 50
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
3 / 50
A change becomes ------------- because of close presence of data and functions
4 / 50
A complex System evolves from a
5 / 50
Which is not included in test criteria applied in a phase of testing?
6 / 50
Static analyzers are software tools for --------------- processing.
7 / 50
what is the most important software quality of a web based transaction
8 / 50
Establishing responsibilities for objects includes
9 / 50
State Transition Diagram is helpful in determining
10 / 50
cohesion is about making sure each component does---------- thing and does it well
11 / 50
Perry and Wolfe proposed the following formula for software architecture:
12 / 50
13 / 50
----- gives OO the ability to handle essential
14 / 50
Which of the following is not an objective for building an analysis model?
15 / 50
The scope description establishes the ---------- between the system we are developing and everything else in the universe. Project planning
16 / 50
Equivalence __________ help you in designing test cases to test the system effectively and efficiently.
17 / 50
Following are some statements associated with data flow diagrams. Identify the correct statement from among them.
18 / 50
Identifier names play a significant role in enhancing the ____________ of a program.
19 / 50
The output of this design process is a description of the
20 / 50
Insufficient user involvement leads to ------------- products.
21 / 50
The scope description establishes the ----------between the system we are developing and everything else in the universe
22 / 50
Once these requirements have been finalized, the ---------------- process starts.
23 / 50
Control flow diagrams are.
24 / 50
In sequence Diagram events are organized in a-----time line
25 / 50
Writing test cases and generating test data are processes that demand __________ building
capabilities.
26 / 50
The Data dictionary contain description of each software.
27 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
28 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
29 / 50
MVC stands for ____________.
30 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
31 / 50
The Object Oriented approach
32 / 50
Interaction Diagrams depict the ------------- Behavior of the system
33 / 50
The process of defining attributes is called
34 / 50
Split lines occur when a statement exceed the _______ column limit.
35 / 50
In presence of _________ bug in a program, the results are the opposite of what is
expected.
36 / 50
What is the most crucial non-functional requirement of a system to control radiation dosages that are emitted as treatment for cancer?
37 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
38 / 50
Most software continues to be custom built because
39 / 50
Which of the following is a fact finding method?
40 / 50
An state transition can only occur when triggered by a(n)________________
41 / 50
Collaboration diagrams have basically two types of components: objects and ----------
42 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
43 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.
44 / 50
When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
45 / 50
System Architecture is important to consider because it helps in making -------------
46 / 50
Which of the items listed below is NOT one of the software engineering layers?
47 / 50
Control flow diagrams are
48 / 50
An object or class may further be classified on the basis of
49 / 50
Data Store notation in DFDs presents.
50 / 50
In a …………., each program module is represented by a rectangular box.
Your score is
The average score is 0%
Restart quiz