Software Engineering Quiz 16

0%
0

Software Engineering Quiz 16

1 / 50

Which of the following is used to send email message from my ASP.NET page?

2 / 50

Spam is related to___________________?

3 / 50

The command used to remove the directory is_______________?

4 / 50

The requirements that result from requirements analysis are typically expressed from one of three perspectives or views.WhaT is that perspective or view ?

5 / 50

DNS database contains__________________?

6 / 50

What is jdb_________________?

7 / 50

Which type of inheritance is not supported by java_____________?

8 / 50

Which architecture is used when there is a high volume of transactions to be processed by the server ?

9 / 50

Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition ?

10 / 50

A Web site address is a unique name that identifies a specific ____________________ on the Web?

11 / 50

Which device uses a handheld operation system ?

12 / 50

Which of the following is part of a static view of information ?

13 / 50

Which of the following is the storage area within the computer itself which holds data only temporarily as the computer processes instruction ?

14 / 50

Defects removal efficiency (DRE)depends on ______________________?

15 / 50

Which one of the following can make it easier to play games ?

16 / 50

?Understandability? answers which of the following description ?

17 / 50

Which command is used to count just the number of characters in a file?

18 / 50

Structured Analysis is based on the principles of___________________?

19 / 50

The object of ________________within an OO system is to design tests that have a high likelihood of uncovering plausible bugs ?

20 / 50

In which of the following language the frameworks will not work ?

21 / 50

The term MIPS refers to ____________________ ?

22 / 50

Dynamic web page____________________?

23 / 50

Which of these classes maps to the tag ?

24 / 50

Usability in metric analysis is defined as the degree to which the software_________________?

25 / 50

Which of the following is not a binary number ?

26 / 50

In what file can you specify which users are not allowed to access a system via FTP ?

27 / 50

Which command is used to make all files and sub-directories in the directory (progs) executable by all users ?

28 / 50

To arrive at a form which is suitable for implementation in some programming language is the purpose of_______________?

29 / 50

In asynchronous serial communication the physical layer provides__________________?

30 / 50

Which class can be used to create an XML document from scratch ?

31 / 50

A number of independent investigators have developed a team-oriented approach to requirements gathering that can be applied to establish the scope of a project called ?

32 / 50

Which of the following term is best defined by the statement:?The operations on each side of the interface have the same name but their parameter types or the number of parameters are different.? ?

33 / 50

A micro processor chip used in a PC system_______________________?

34 / 50

Which of the following option is not provided by formal methods ?

35 / 50

Which is not a typical business function ?

36 / 50

What types of installations require a special boot disk ?

37 / 50

Which language is used to create an ASP.NET code file ?

38 / 50

How is brainstorming different from JAD ? Brainstorming sessions ?

39 / 50

Choose the form in which Postback occur_________________?

40 / 50

What is a major advantage of using a 4GT Model for producing small scale products, applications or programs ?

41 / 50

Which of the following command is used to compile the Java program ?

42 / 50

How do you trace the application_End event on runtime ?

43 / 50

CDs are of which shape ?

44 / 50

Why is the Caps lock key referred to as a toggle key ?

45 / 50

What is a function of a keyboard in computer ?

46 / 50

In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code ?

47 / 50

In Design phase, which is the primary area of concern ?

48 / 50

Which command will be used with vi editor to replace single character under cursor with any number of characters ?

49 / 50

What sign is used to erase or kill an entire line you have typed and start you are on a new line (but not display a new prompt) ?

50 / 50

The back bone of any organization is________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi