Home » Software Engineering Quiz » Software Engineering Quiz 13

Software Engineering Quiz 13

0%
0

Software Engineering Quiz 13

1 / 50

Open database connectivity (OBDC) tools are an example of_______________?

2 / 50

In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME directory ?

3 / 50

Which of the following is not a build system feature ?

4 / 50

Which of the following is not a classification of the web engineering metric, Web Page Similarity ?

5 / 50

Why is software difficult to build ?

6 / 50

Which commands is used to assign executable permission to all of the files named ?letter? ?

7 / 50

The general transformation cycle for information is________________?

8 / 50

The primary objective of formal technical reviews is to find _________________ during the process so that they do not become defects after release of the software?

9 / 50

____________is/are the resources are used for DSS to explore decision alternatives?

10 / 50

Which of the following provides a concise, unambiguous, and consistent method for documenting system requirements ?

11 / 50

The chmod ugo+rw note command can be represented in octal notation as_____________?

12 / 50

When does Garbage collector run ?

13 / 50

Risk management is one of the most important jobs for a__________________?

14 / 50

The UNIX file system stores a data in physical blocks of_______________?

15 / 50

What command is used with vi editor to replace text from cursor to right______________?

16 / 50

DSL is an example of _______________ connection ?

17 / 50

Software engineers should not use their technical skills to misuse other people?s computers.?Here the term misuse refers to ___________________?

18 / 50

The key that must be pressed each time a new command or information is entered____________________?

19 / 50

Which of the following issues must be addressed if a successful software testing strategy is to be implemented ?

20 / 50

__________ development of DSS relies on the creation of a prototype and its progressive refinement?

21 / 50

Which of the following authentication is best suited for a corporate network ?

22 / 50

Acceptance testing is also known as____________________?

23 / 50

Which key is used in combination with another key to perform a specific task ?

24 / 50

We can manage states in asp.net application using_______________?

25 / 50

A DNS client is called____________________?

26 / 50

Which of the following manuals is a user documentation ?

27 / 50

Which of the following steps is applied to develop a decision table ?

28 / 50

The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?

29 / 50

_____________ is any part of computer that can be touched?

30 / 50

How many classes can a single .NET DLL contain ?

31 / 50

Which command is used to display the end of the file ?

32 / 50

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is___________________?

33 / 50

SPICE stands for __________________?

34 / 50

Which one of the following is a functional requirement ?

35 / 50

Which of the following is not a part of Execution Flow during debugging ?

36 / 50

Which of the following commands is used to get directory one level up ?

37 / 50

The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is_______________?

38 / 50

All of the logic and mathematical calculations done by the computer happen in/on the ___________________?

39 / 50

Computers use the_____________ language to process data ?

40 / 50

A software package to implement a data base is_____________________?

41 / 50

Which of the following refers to the expenses that a customer incurs in lost time and expenditure of resources when changing from one seller to a competing seller ?

42 / 50

Which of the following is the main Apache configuration file ?

43 / 50

Quality planning is the process of developing a quality plan for__________________?

44 / 50

Which of the following is incorrect activity for the configuration management of a software system ?

45 / 50

The field separator in cut command is specified with________________?

46 / 50

What stores all changes and info related to the project from development through maintenance in CASE tools ?

47 / 50

An error in computer data is called________________?

48 / 50

___________________ is the process of dividing the disk into tracks and sectors ?

49 / 50

Which of the following term is best defined by the statement: ?Derive traceability information to maximize information hiding in the design.? ?

50 / 50

Word processing, spread sheet, and photo editing are examples of___________________?

Provide Your Information

Your score is

The average score is 0%

0%

Share on facebook
Facebook
Share on twitter
Twitter
Share on whatsapp
WhatsApp
Software Engineering Quiz 40
Software Engineering Quiz 1
Software Engineering Quiz 2
Software Engineering Quiz 3
Software Engineering Quiz 4
Software Engineering Quiz 5
Software Engineering Quiz 6
Software Engineering Quiz 7
Software Engineering Quiz 8
Software Engineering Quiz 9

Help Concept 360 Please. We need 500 Youtube Subscriber. Please Subscribe our Youtube Channel. Click below link to subscribe Please

آپ سے گزارش ہے کہ ہمارے یوٹیوب چینل کوسبسکرائب کر کے ہماری مدد کریں جیسا کہ یہ ویب سائٹ آپکی مدد کر رہی ہے۔ شکریہ