Software Engineering Quiz 18

0%
0

Software Engineering Quiz 18

1 / 50

Which of the following commands can be used to get information about all users who are currently logged into the system ?

2 / 50

Which of the following option is not considered by the Interface design ?

3 / 50

Which software project sizing approach develop estimates of the information domain characteristics ?

4 / 50

Custom Controls are derived from which of the classes_________________?

5 / 50

Which of the following command is used to see the services running in NFS server ?

6 / 50

Automatic type conversion in Java takes place when________________?

7 / 50

What can be requested from any object of the class to affect behavior ?

8 / 50

Which of the following is not a part of bug report ?

9 / 50

PARAM was developed by_____________________?

10 / 50

The primary memory of a personal computer consists of _____________________?

11 / 50

Commitments to unrealistic time and resource estimates may result in____________________?

12 / 50

A task of developing a technical blueprint and specifications for a solution that fulfills the business requirements is undertaken in the following phase of the system development process ?

13 / 50

The importance of software design can be summarized in a single word which is___________________?

14 / 50

The MVC pattern was originally proposed in the 1980s as an approach to________________?

15 / 50

Which command is used to copy all files having the string chap and any two characters after that to the progs directory ?

16 / 50

What complements the formal technical review by assessing a configuration object for characteristics that are generally not considered during review ?

17 / 50

Which of the following are the valid relationships in Use Case Diagrams______________________?

18 / 50

Which model is used to compute the effort required to integrate reusable components or program code that is automatically generated by design or program translation tools ?

19 / 50

What command is used to compare the files ?

20 / 50

Layer one of the OSI model is_______________________?

21 / 50

Soft copy is an intangible output, so then what is a hard copy ?

22 / 50

Which three framework activities are present in Adaptive Software Development(ASD) ?

23 / 50

Which of the following web engineering metric measures the extent of relatedness between two or more web pages ?

24 / 50

While working with mail command, which command is used to save mail in a separate file ?

25 / 50

A flat metallic disk that contains a large amount of permanently stored information read optically is called a ____________________?

26 / 50

Which of the following is a Strategy to achieve Software diversity ?

27 / 50

Where can system and mail logs be found in Ret Hat Linux ?

28 / 50

Which of the following keys is used to replace a single character with new text ?

29 / 50

If in an ASP.NET application one want to create http handlers which of the interface is used________________?

30 / 50

Which of the following places the common data elements in order from smallest to largest ?

31 / 50

The macro processor must perform________________?

32 / 50

Which command is used to display a file contents in octal form ?

33 / 50

What do you mean by javap?

34 / 50

_____________ type of budgeting is based on estimation of total project cost by the top management?

35 / 50

There are _______________ overlapping stages in the lifetime of large and complex sociotechnical systems?

36 / 50

C++ is a____________________?

37 / 50

Which one is NOT a phase of the systems development life cycle ?

38 / 50

Which one of the following is a requirement that fits in a developer?s module ?

39 / 50

You organise files by storing them in____________________?

40 / 50

Which of the following languages can be used to write server side scripting in ASP.NET ?

41 / 50

The ls -l command tells_________________?

42 / 50

Which of the following is not a Probabilistic Model ?

43 / 50

A specification of how the user moves from window to window, interacting with the application programs to perform useful work is called_______________?

44 / 50

Which of the following is the first phase of the Systems Implementation phase ?

45 / 50

The ___________ calls for trimming and chopping of these designs so that the cost is reduced, service is improved and the customer gets higher value at a higher speed?

46 / 50

Which one of the following models is not suitable for accommodating any change ?

47 / 50

The JDBC-ODBC bridge is_________________?

48 / 50

Which of the following term is best defined by the statement:?When one object invokes another independent object, a message is passed between the two objects.? ?

49 / 50

In my .NET Framework I have threads. Which of the following denote the possible priority level for the threads ?

50 / 50

Which of the following is NOT an advanced input control ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi