Software Engineering Quiz 10
1 / 50
Why is decomposition technique required ?
2 / 50
The most common method of entering text and numerical data into a computer system is through the use of a___________________?
3 / 50
Choose the correct statement on how NFRs integrates with Rational Unified Process ?
4 / 50
A web cookie is a small piece of data__________________?
5 / 50
Consider a case where the failure of the system causes damage to the system itself or it data. What type of failure is being described here ?
6 / 50
Which of the following functions is/ are performed by the loader ?
7 / 50
Suspend thread can be revived by using ?
8 / 50
The chmod ugo+rw note command can be represented in octal notation as_________________?
9 / 50
Which of the following server is used with the BIND package ?
10 / 50
CRC stands for_____________________?
11 / 50
A form used to record data about a transaction is a(n) ?
12 / 50
Estimation of size for a project is dependent on___________________?
13 / 50
Programming language experience is a part of which factor of COCOMO cost drivers ?
14 / 50
To add a custom control to a Web form we have to register with?
15 / 50
Non-conformance to software requirements is known as___________________?
16 / 50
After you have compiled your kernel, what do you have to edit to boot your new kernel image ?
17 / 50
Which is the earliest and most widely used shell that came with the UNIX system ?
18 / 50
Which type of computers use the 8 bit code called EBCDIC ?
19 / 50
Which among the following do/does not belong/belongs to the GSM family of wireless technologies ?
20 / 50
In Java,______________________ are comparable with, though not identical to, RPCs?
21 / 50
Which of the following is not a core step of Six Sigma ?
22 / 50
What type of device is a computer printer ?
23 / 50
A microprocessor is the brain of the computer and is also called a(n)____________________?
24 / 50
We use _______________ where various parts of system use are identified and analyzed in turn?
25 / 50
The _____________ is defined as a set of activities performed across the organization creating as output of value to the customer?
26 / 50
The name for the way that computers manipulate data into information is called_________________?
27 / 50
The command chmod 761 letter is equivalent to__________________?
28 / 50
A place in the computer system where data and programs are temporarily stored __________________?
29 / 50
Which driver is called as thin-driver in JDBC ?
30 / 50
The technique of temporarily delaying outgoing outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called__________________?
31 / 50
Which is the predefined package ?
32 / 50
The shifting of a program from one of the memory addresses to another is___________________?
33 / 50
What category of web-based system would you assign to discussion groups ?
34 / 50
What is Cyclomatic complexity ?
35 / 50
Which of the following examples does not involve dependability engineering ?
36 / 50
What is an object________________?
37 / 50
Which of the following is not a direct measure of SE process ?
38 / 50
Specialised programs that assist users in locating information on the web are called_______________________?
39 / 50
Which of the following is not included in failure costs ?
40 / 50
Which of the following denote New Data-bound Controls used with ASP.NET ?
41 / 50
Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host ?
42 / 50
___________ and ___________ are the two issues of Requirement Analysis?
43 / 50
The smallest integer type is _____________ and its size is____________ bits?
44 / 50
Operating systems and utility programs are in a class of software known as_________________?
45 / 50
What is the meaning of HIBERNATE in windows XP ?
46 / 50
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
47 / 50
Which metrhods are utilized to control the access to an object in multi threaded programming ?
48 / 50
Which one of the following extends a private network across public networks ?
49 / 50
Which level of an organization is responsible for setting medium term goals and allocating resources ?
50 / 50
How many Scenarios are there in elicitation activities ?
Provide Your Information
Your score is
The average score is 0%
Restart quiz