Software Engineering Quiz 13

0%
0

Software Engineering Quiz 13

1 / 50

Open database connectivity (OBDC) tools are an example of_______________?

2 / 50

Word processing, spread sheet, and photo editing are examples of___________________?

3 / 50

____________is/are the resources are used for DSS to explore decision alternatives?

4 / 50

The field separator in cut command is specified with________________?

5 / 50

Quality planning is the process of developing a quality plan for__________________?

6 / 50

The chmod ugo+rw note command can be represented in octal notation as_____________?

7 / 50

What command is used with vi editor to replace text from cursor to right______________?

8 / 50

__________ development of DSS relies on the creation of a prototype and its progressive refinement?

9 / 50

Which of the following is incorrect activity for the configuration management of a software system ?

10 / 50

Which of the following issues must be addressed if a successful software testing strategy is to be implemented ?

11 / 50

Which of the following is not a classification of the web engineering metric, Web Page Similarity ?

12 / 50

When does Garbage collector run ?

13 / 50

_____________ is any part of computer that can be touched?

14 / 50

Computers use the_____________ language to process data ?

15 / 50

Which of the following refers to the expenses that a customer incurs in lost time and expenditure of resources when changing from one seller to a competing seller ?

16 / 50

Risk management is one of the most important jobs for a__________________?

17 / 50

Which of the following provides a concise, unambiguous, and consistent method for documenting system requirements ?

18 / 50

In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME directory ?

19 / 50

The UNIX file system stores a data in physical blocks of_______________?

20 / 50

The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is_______________?

21 / 50

We can manage states in asp.net application using_______________?

22 / 50

Acceptance testing is also known as____________________?

23 / 50

Which of the following manuals is a user documentation ?

24 / 50

Software engineers should not use their technical skills to misuse other people?s computers.?Here the term misuse refers to ___________________?

25 / 50

SPICE stands for __________________?

26 / 50

Which of the following is not a part of Execution Flow during debugging ?

27 / 50

What stores all changes and info related to the project from development through maintenance in CASE tools ?

28 / 50

A DNS client is called____________________?

29 / 50

Why is software difficult to build ?

30 / 50

Which key is used in combination with another key to perform a specific task ?

31 / 50

How many classes can a single .NET DLL contain ?

32 / 50

Which of the following commands is used to get directory one level up ?

33 / 50

Which of the following authentication is best suited for a corporate network ?

34 / 50

Which commands is used to assign executable permission to all of the files named ?letter? ?

35 / 50

Which one of the following is a functional requirement ?

36 / 50

The general transformation cycle for information is________________?

37 / 50

The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?

38 / 50

All of the logic and mathematical calculations done by the computer happen in/on the ___________________?

39 / 50

Which command is used to display the end of the file ?

40 / 50

Which of the following is the main Apache configuration file ?

41 / 50

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is___________________?

42 / 50

Which of the following is not a build system feature ?

43 / 50

Which of the following steps is applied to develop a decision table ?

44 / 50

The key that must be pressed each time a new command or information is entered____________________?

45 / 50

DSL is an example of _______________ connection ?

46 / 50

The primary objective of formal technical reviews is to find _________________ during the process so that they do not become defects after release of the software?

47 / 50

A software package to implement a data base is_____________________?

48 / 50

Which of the following term is best defined by the statement: ?Derive traceability information to maximize information hiding in the design.? ?

49 / 50

___________________ is the process of dividing the disk into tracks and sectors ?

50 / 50

An error in computer data is called________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi