Software Engineering Quiz 11

0%
0

Software Engineering Quiz 11

1 / 50

Identify the correct statement: Software engineers shall _____________________?

2 / 50

Which program is used to automatically install Red Mat Linux on identical hardware ?

3 / 50

Which command is used to remove a directory ?

4 / 50

What is the output for the below code ? public class Test{public static void main(String[] args){int i = 010; int j = 07;System.out.println(i); System.out.println(j); } } ?

5 / 50

Storage device found inside the computer___________________?

6 / 50

The most frequently used piece of hardware for inputting data is ___________________?

7 / 50

According to a statistical report: ?over 30% of all software projects are cancelled before completion and over 70% of the remainder fail to deliver expected features?. What must be the reason for such a situation ?

8 / 50

Which of the following is a project scheduling method that can be applied to software development ?

9 / 50

User requirements are expressed as _______________ in Extreme Programming?

10 / 50

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ________________ with respect to security systems?

11 / 50

Which of the following is NOT an objective of MIS ?

12 / 50

What establishes the profile of end-users of the system ?

13 / 50

Which of the following concerns best suits the following statement:?Internet banking system includes new customer requirements, account Requirements, customer management requirements, security requirements, recovery requirements etc.? ?

14 / 50

A count of the number of students who earned A, B, C, D, and F grades in a given course would be an example of a(n) ?

15 / 50

Instructions and memory addresses are represented by___________________?

16 / 50

How many layers are present in the OO design pyramid ?

17 / 50

What is a diffgram ?

18 / 50

How can you add Amit, a new user, to your system ?

19 / 50

In your ASP.NET web application you want to display a list of clients on a Web page. The client list displays 10 clients at a time, and you require the ability to edit the clients. Which Web control- ?

20 / 50

In computer network nodes are__________________?

21 / 50

Which of the following commands is not the vi Input mode command ?

22 / 50

Which of the following approaches are used to achieve reliable systems?

23 / 50

Which device is used asthe standard pointing device in a Graphical User Environment ?

24 / 50

You just added a new user, kara, to the system. What group is kara added to by default ?

25 / 50

Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing ________________________?

26 / 50

Default scripting language in ASP?

27 / 50

Which of the following presentation is explained in the following statement:?An extension of the distributed presentation approach, primary database and application logic remain on the server, and data sent by the server is used by the client to prepare the user presentation ? ?

28 / 50

Which table is a permanent databases that has an entry for each terminal symbol ?

29 / 50

_________ systems are interactive information systems that assist a decision maker in approaching ill-structured problems by offering analytical models and access to database ?

30 / 50

An example of a system that may use a process pipeline is a high-speed_________________?

31 / 50

What is the difference between HTTP handlers & HTTP modules_________________?

32 / 50

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

33 / 50

In ASP.NET application the Global.asax file lie in which directory_________________?

34 / 50

Java is a _______________language?

35 / 50

Which command is used to assign only read permission to all three categories of the file ?note? ?

36 / 50

What command is used to display and create files ?

37 / 50

What command is used to assign only read permission to all three categories of the file?letter? ?

38 / 50

Which command is used to terminate all processes in your own system except the login shell ?

39 / 50

Runnable is_______________?

40 / 50

Beta Testing is done by____________________?

41 / 50

The area of coverage of satellite radio beam is known as_____________________?

42 / 50

Typical acronym of reuseable optical storage will be ____________________?

43 / 50

Which are the components of an organizational information system ?

44 / 50

How many classification schemes have been developed for NFRs ?

45 / 50

Spiral model was developed by ___________________?

46 / 50

What characterstics of read-only memory (ROM) makes it useful ?

47 / 50

Examples of keyless interfaces include_______________?

48 / 50

Percentage of modules that were inspected is a part of__________________?

49 / 50

Which of the following shell?s wildcards are used to match any number of characters including none ?

50 / 50

Which of the following companies provide certifications for their own products ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi