Software Engineering Quiz 10

0%
0

Software Engineering Quiz 10

1 / 50

Why is decomposition technique required ?

2 / 50

The most common method of entering text and numerical data into a computer system is through the use of a___________________?

3 / 50

Choose the correct statement on how NFRs integrates with Rational Unified Process ?

4 / 50

A web cookie is a small piece of data__________________?

5 / 50

Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?

6 / 50

Which of the following functions is/ are performed by the loader ?

7 / 50

Suspend thread can be revived by using ?

8 / 50

The chmod ugo+rw note command can be represented in octal notation as_________________?

9 / 50

Which of the following server is used with the BIND package ?

10 / 50

CRC stands for_____________________?

11 / 50

A form used to record data about a transaction is a(n) ?

12 / 50

Estimation of size for a project is dependent on___________________?

13 / 50

Programming language experience is a part of which factor of COCOMO cost drivers ?

14 / 50

To add a custom control to a Web form we have to register with?

15 / 50

Non-conformance to software requirements is known as___________________?

16 / 50

After you have compiled your kernel, what do you have to edit to boot your new kernel image ?

17 / 50

Which is the earliest and most widely used shell that came with the UNIX system ?

18 / 50

Which type of computers use the 8 bit code called EBCDIC ?

19 / 50

Which among the following do/does not belong/belongs to the GSM family of wireless technologies ?

20 / 50

In Java,______________________ are comparable with, though not identical to, RPCs?

21 / 50

Which of the following is not a core step of Six Sigma ?

22 / 50

What type of device is a computer printer ?

23 / 50

A microprocessor is the brain of the computer and is also called a(n)____________________?

24 / 50

We use _______________ where various parts of system use are identified and analyzed in turn?

25 / 50

The _____________ is defined as a set of activities performed across the organization creating as output of value to the customer?

26 / 50

The name for the way that computers manipulate data into information is called_________________?

27 / 50

The command chmod 761 letter is equivalent to__________________?

28 / 50

A place in the computer system where data and programs are temporarily stored __________________?

29 / 50

Which driver is called as thin-driver in JDBC ?

30 / 50

The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called__________________?

31 / 50

Which is the predefined package ?

32 / 50

The shifting of a program from one of the memory addresses to another is___________________?

33 / 50

What category of web-based system would you assign to discussion groups ?

34 / 50

What is Cyclomatic complexity ?

35 / 50

Which of the following examples does not involve dependability engineering ?

36 / 50

What is an object________________?

37 / 50

Which of the following is not a direct measure of SE process ?

38 / 50

Specialised programs that assist users in locating information on the web are called_______________________?

39 / 50

Which of the following is not included in failure costs ?

40 / 50

Which of the following denote New Data-bound Controls used with ASP.NET ?

41 / 50

Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host ?

42 / 50

___________ and ___________ are the two issues of Requirement Analysis?

43 / 50

The smallest integer type is _____________ and its size is____________ bits?

44 / 50

Operating systems and utility programs are in a class of software known as_________________?

45 / 50

What is the meaning of HIBERNATE in windows XP ?

46 / 50

Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?

47 / 50

Which metrhods are utilized to control the access to an object in multi threaded programming ?

48 / 50

Which one of the following extends a private network across public networks ?

49 / 50

Which level of an organization is responsible for setting medium term goals and allocating resources ?

50 / 50

How many Scenarios are there in elicitation activities ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi