Software Engineering Quiz 19

0%
0

Software Engineering Quiz 19

1 / 50

The project planner examines the statement of scope and extracts all important software functions which is known as___________________?

2 / 50

Which of the following option is not tracked by configuration management tools ?

3 / 50

The process of requirements discovery consists of the following activities, except_______________?

4 / 50

Which of the following control is used to validate that two fields are equal ?

5 / 50

Which architecture decentralized architectures in which there are no distinguished clients and servers ?

6 / 50

Which of the following is not an activity of Structured Analysis (SA) ?

7 / 50

Which symbol will be used with grep command to match the pattern pat at the beginning of a line ?

8 / 50

A sequence of instructions, in a computer language, to get the desired result, is known as______________?

9 / 50

_____________ provides access to the internet and web pages through a service provider by using graphical interface?

10 / 50

Which of the following options will be used to display number of blocks used by a file?

11 / 50

The command to count the number of files in the current directory by using pipes, is_______________?

12 / 50

Which of the following is NOT a general principle for output design ?

13 / 50

Convert the ASCII/BEAR/assembly language pseudo-ops into hexadecimal machine language________________?

14 / 50

_________________ provides access to the internet and web pages through a service provider by using graphical interface ?

15 / 50

Which of the following is an application layer service ?

16 / 50

A _______________ is developed using historical cost information that relates some software metric to the project cost ?

17 / 50

Which of the following is the worst type of module cohesion ?

18 / 50

Loaders that allow for program relocation are called__________________?

19 / 50

Which test do you infer from the following statement: ?The coordination and data management functions of the server are tested.? ?

20 / 50

Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars, and menus are known as_________________?

21 / 50

Controls of data communication deal with _________________?

22 / 50

What all has to be identified as per risk identification ?

23 / 50

If the system state is Shutdown then it can respond to which of the following message?

24 / 50

Which of the following is one of the steps in the integration testing of OO software ?

25 / 50

Which command is used to sort the lines of data in a file in reverse order__________________?

26 / 50

Which of the following is not a phase of ?bathtub curve? of hardware reliability ?

27 / 50

Convert the CHARI h#000F, s assembly language instructions into hexadecimal machine language________________?

28 / 50

The actual work process of ASP.NET is taken care by _____________?

29 / 50

How do you get information from a form that is submitted using the ?post? method ?

30 / 50

A self-relocating program is one which_________________?

31 / 50

The first event to be triggered in an aspx page is__________________?

32 / 50

Which of the following is FALSE ?

33 / 50

Socket-style API for windows is called____________________?

34 / 50

In ASP.NET the sessions can be dumped by using ?

35 / 50

In ASP.NET page framework an automatic way to associate page events and methods is______________?

36 / 50

A characteristic of a software system that can lead to a system error is known as _____________________ ?

37 / 50

Which of the following is an operating system in computing ?

38 / 50

_________ is the process of identifying a problem, developing alternative solutions and choosing and implementing ?

39 / 50

Which option will be used with disk free command to include the total amount of disk space in the file system?

40 / 50

Who designs and implement database structures ?

41 / 50

Database management software serves as a foundation for the establishment of a CASE database (repository) that we call__________________?

42 / 50

Which of the following strategies means that the impact of the risk will be reduced ?

43 / 50

Records management_________________?

44 / 50

______________ and ______________ are the two view points discussed in Controlled Requirements Expression (CORE) ?

45 / 50

Which of the following is not a user interface design process ?

46 / 50

Which of the following is not a characteristics of box diagram ?

47 / 50

Which of the following method is used to obtain details about information types of assembly ?

48 / 50

One nibble is equal to________________?

49 / 50

Printed information called _______________exists physically and is a more permanent form of output than that presented on a display device?

50 / 50

Which of these are not among the eight principles followed by Software Engineering Code of Ethics and Professional Practice ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi