CS504-Midterm
1 / 50
A complex System evolves from a
2 / 50
A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished being used.
3 / 50
___________ are used to describe flow of data or control in an application.
4 / 50
Writing test cases and generating test data are processes that demand __________ building
capabilities.
5 / 50
Which is not included in test criteria applied in a phase of testing?
6 / 50
___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
7 / 50
A change becomes ------------- because of close presence of data and functions
8 / 50
Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
9 / 50
Bugs Fixing is done by which of the teams in Software Development lifecycle?
10 / 50
Which of these characteristics are true of a data warehouse, but not a typical database?
11 / 50
Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
12 / 50
Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?
13 / 50
A process which does not take input is called
14 / 50
The scope description establishes the ---------- between the system we are developing and everything else in the universe. Project planning
15 / 50
The Data dictionary contain description of each software.
16 / 50
What is the most crucial non-functional requirement of a system to control radiation dosages that are emitted as treatment for cancer?
17 / 50
For equivalence partitions, we divide the problem in ----------- obvious categories of equal strings
18 / 50
Static analyzers are software tools for --------------- processing.
19 / 50
Control flow diagrams are.
20 / 50
System Architecture is important to consider because it helps in making -------------
21 / 50
Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
22 / 50
Interaction Diagrams depict the ------------- Behavior of the system
23 / 50
The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
24 / 50
Testing activities require destructive instincts in __________ for the purpose of breaking system to discover loopholes into its functionality.
25 / 50
In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
26 / 50
A cohesion class is one which emphasize -------unit of----.
27 / 50
The process of defining attributes is called
28 / 50
An state transition can only occur when triggered by a(n)________________
29 / 50
Asynchronous massages are denoted
30 / 50
Collaboration diagrams have basically two types of components: objects and ----------
31 / 50
Data design actually begins during the creation of the analysis model, not the architectural model.
32 / 50
Modularity is a tool that can help us in ________ the size of individual functions.
33 / 50
34 / 50
Events occur whenever a(n)_________________
35 / 50
By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control
36 / 50
For inspections, --------------- are prepared that contain information regarding defects.
37 / 50
38 / 50
Following are some statements associated with data flow diagrams. Identify the correct statement from among them.
39 / 50
Software architecture is "The _______ of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time".
40 / 50
Identifying Whole-Part structures (Aggregations) means, what are my -------------
41 / 50
Insufficient user involvement leads to ------------- products.
42 / 50
Which design pattern provides a unified interface to a set of interfaces in a sub-system?
43 / 50
Which of the following is not an objective for building an analysis model?
44 / 50
STL Stands for ______________.
45 / 50
46 / 50
47 / 50
The scope description establishes the ----------between the system we are developing and everything else in the universe
48 / 50
The raising of the imaginary error flag is simply called raising or _________ an error.
49 / 50
Comments should be indented relative to their position in the _______.
50 / 50
Camel Case is now the official convention for file names and identifiers in the ________ programming language.
Your score is
The average score is 0%
Restart quiz