Home » Software Engineering Quiz » Software Engineering Quiz 13

Software Engineering Quiz 13

0%
0

Software Engineering Quiz 13

1 / 50

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is___________________?

2 / 50

SPICE stands for __________________?

3 / 50

Which of the following is incorrect activity for the configuration management of a software system ?

4 / 50

Which of the following is the main Apache configuration file ?

5 / 50

Open database connectivity (OBDC) tools are an example of_______________?

6 / 50

The primary objective of formal technical reviews is to find _________________ during the process so that they do not become defects after release of the software?

7 / 50

Which of the following refers to the expenses that a customer incurs in lost time and expenditure of resources when changing from one seller to a competing seller ?

8 / 50

The feature in ASP.NET 2.0 that is used to fire a normal postback to a different page in the application is called ?

9 / 50

_____________ is any part of computer that can be touched?

10 / 50

Which key is used in combination with another key to perform a specific task ?

11 / 50

The general transformation cycle for information is________________?

12 / 50

Risk management is one of the most important jobs for a__________________?

13 / 50

The UNIX file system stores a data in physical blocks of_______________?

14 / 50

DSL is an example of _______________ connection ?

15 / 50

Why is software difficult to build ?

16 / 50

Which of the following commands is used to get directory one level up ?

17 / 50

Word processing, spread sheet, and photo editing are examples of___________________?

18 / 50

We can manage states in asp.net application using_______________?

19 / 50

__________ development of DSS relies on the creation of a prototype and its progressive refinement?

20 / 50

What stores all changes and info related to the project from development through maintenance in CASE tools ?

21 / 50

Computers use the_____________ language to process data ?

22 / 50

Which of the following is not a build system feature ?

23 / 50

The term used to describe those people whose jobs involve sponsoring and funding the project to develop, operate, and maintain the information system is_______________?

24 / 50

How many classes can a single .NET DLL contain ?

25 / 50

An error in computer data is called________________?

26 / 50

Which of the following provides a concise, unambiguous, and consistent method for documenting system requirements ?

27 / 50

All of the logic and mathematical calculations done by the computer happen in/on the ___________________?

28 / 50

Quality planning is the process of developing a quality plan for__________________?

29 / 50

Which of the following is not a part of Execution Flow during debugging ?

30 / 50

Acceptance testing is also known as____________________?

31 / 50

In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME directory ?

32 / 50

When does Garbage collector run ?

33 / 50

Which commands is used to assign executable permission to all of the files named ?letter? ?

34 / 50

A DNS client is called____________________?

35 / 50

Which one of the following is a functional requirement ?

36 / 50

Which of the following term is best defined by the statement: ?Derive traceability information to maximize information hiding in the design.? ?

37 / 50

Which of the following is not a classification of the web engineering metric, Web Page Similarity ?

38 / 50

What command is used with vi editor to replace text from cursor to right______________?

39 / 50

A software package to implement a data base is_____________________?

40 / 50

Which of the following manuals is a user documentation ?

41 / 50

Software engineers should not use their technical skills to misuse other people?s computers.?Here the term misuse refers to ___________________?

42 / 50

Which command is used to display the end of the file ?

43 / 50

Which of the following steps is applied to develop a decision table ?

44 / 50

____________is/are the resources are used for DSS to explore decision alternatives?

45 / 50

The key that must be pressed each time a new command or information is entered____________________?

46 / 50

The field separator in cut command is specified with________________?

47 / 50

Which of the following issues must be addressed if a successful software testing strategy is to be implemented ?

48 / 50

The chmod ugo+rw note command can be represented in octal notation as_____________?

49 / 50

___________________ is the process of dividing the disk into tracks and sectors ?

50 / 50

Which of the following authentication is best suited for a corporate network ?

Provide Your Information

Your score is

The average score is 0%

0%

Share on facebook
Facebook
Share on twitter
Twitter
Share on whatsapp
WhatsApp
Software Engineering Quiz 40
Software Engineering Quiz 1
Software Engineering Quiz 2
Software Engineering Quiz 3
Software Engineering Quiz 4
Software Engineering Quiz 5
Software Engineering Quiz 6
Software Engineering Quiz 7
Software Engineering Quiz 8
Software Engineering Quiz 9

Help Concept 360 Please. We need 500 Youtube Subscriber. Please Subscribe our Youtube Channel. Click below link to subscribe Please

آپ سے گزارش ہے کہ ہمارے یوٹیوب چینل کوسبسکرائب کر کے ہماری مدد کریں جیسا کہ یہ ویب سائٹ آپکی مدد کر رہی ہے۔ شکریہ