CS504 Midterm Online Quiz

0%

CS504-Midterm

1 / 50

In the case of zero-install, the network environment is used to ______ server side processing by adding a number of servers which share processing load.

2 / 50

what is the most important software quality of a web based transaction

3 / 50

Repository model also provides the ---------------------- view of the system.

4 / 50

___________ are used to describe flow of data or control in an application.

5 / 50

Identifying Whole-Part structures (Aggregations) means what are my ----------------

6 / 50

"is" prefix should be used for__________ variables and methods.

7 / 50

Perry and Wolfe proposed the following formula for software architecture:

8 / 50

Control flow diagrams are.

9 / 50

Requirement engineering mainly deals with the -------------- of the system

10 / 50

The raising of the imaginary error flag is simply called raising or _________ an error.

11 / 50

Most software continues to be custom built because

12 / 50

A complex System evolves from a

13 / 50

The Data dictionary contain description of each software.

14 / 50

A change becomes ------------- because of close presence of data and functions

15 / 50

The process of defining attributes is called

16 / 50

Interaction Diagrams depict the ------------- Behavior of the system

17 / 50

Which of these characteristics are true of a data warehouse, but not a typical database?

18 / 50

In a …………., each program module is represented by a rectangular box.

19 / 50

Software crisis came in 1960 what is the main reason to for the crisis

20 / 50

A change becomes ------------- because of close presence of data and functions

21 / 50

In Sequence Diagrams the time required by the receiver object to process the message is denoted by an--------

22 / 50

A cohesion class is one which emphasize -------unit of----.

23 / 50

___________ is only a reference for defining protocols and designing and implementing

systems developed by different parties.

24 / 50

Project ------------- defines the concept and range of the proposed solution, and limitations identify certain capabilities that the product will not include

25 / 50

Holistic medicine, concerns itself with the state of the body as a whole, not the ----------- that is currently attacking it.

26 / 50

Bugs Fixing is done by which of the teams in Software Development lifecycle?

27 / 50

STL Stands for ______________.

28 / 50

The two main documents produced during this phase are Requirement Statement and Requirement pecification. They are also called Requirement Definition and ---------------

29 / 50

A complex System evolves from a

30 / 50

 ----- gives OO the ability to handle essential

31 / 50

Identifier names play a significant role in enhancing the ____________ of a program.

32 / 50

Insufficient user involvement leads to ------------- products.

33 / 50

Holistic medicine, concerns itself with the state of the body as a whole, not the -----------

that is currently attacking it.

34 / 50

A process which does not take input is called

35 / 50

Software architecture is "The _______ of the components of a program/system, their interrelationships, and principles and guidelines governing their design and evolution over time".

36 / 50

Identifying Whole-Part structures (Aggregations) means, what are my -------------

37 / 50

Given below are some statements associated with data flow diagrams. Identify the correct statement from among them.

38 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

39 / 50

The first “bug” was actually a moth, which flew through an open window and into one of

the Mark --------- 's relays.

40 / 50

A poorly designed interface can cause a user to make catastrophic errors is one of the motivations for GUI.

41 / 50

Once these requirements have been finalized, the ---------------- process starts.

42 / 50

An state transition can only occur when triggered by a(n)________________

43 / 50

By following modern system engineering practices simulation of reactive systems is no longer necessary Information flow represents the manner in which data and control

44 / 50

Data Store notation in DFDs presents.

45 / 50

The scope description establishes the ----------between the system we are developing and everything else in the universe

46 / 50

Which design pattern provides a unified interface to a set of interfaces in a sub-system?

47 / 50

Which of the following is not an objective for building an analysis model?

48 / 50

Windows mobile is a popular mobile operating system which seen commonly on PDAs. Which of the following category pair(s) best describe(s) it?

49 / 50

The design process for identifying the sub-systems making up a system and the

framework for sub-system control and communication is:

50 / 50

There are four basic coding structures: sequence, if statement, case statement, and

___________.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi