Software Engineering Quiz 20

0%
0

Software Engineering Quiz 20

1 / 50

In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register ?

2 / 50

What kind of support is provided by the Code Generation CASE tool ?

3 / 50

What term is used to describe using the mouse to move an item on the screen to a new location ?

4 / 50

Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3 ?

5 / 50

Which of the following is core concern in medical record management system ?

6 / 50

What was the computer conceived by Babbage ?

7 / 50

Which DLL translate XML to SQL in IIS ?

8 / 50

Who controls the FAST (Facilitated Application Specification Techniques) meeting ?

9 / 50

Which command is used to set the three permissions for all the three categories of users of a file ?

10 / 50

Which one of the following is not a maintenance model ?

11 / 50

Which model in system modelling depicts the dynamic behaviour of the system ?

12 / 50

What command is used to list contents of directories ?

13 / 50

Which is a black box testing technique appropriate to all levels of testing ?

14 / 50

Which of the following statement is incorrect regarding the Class-responsibility-collaborator (CRC) modeling ?

15 / 50

Which one of the following is a data link protocol ?

16 / 50

Postback occurs in which of the following forms_________________?

17 / 50

Which model in system modelling depicts the static nature of the system ?

18 / 50

Number of errors found per person hours expended is an example of a____________________?

19 / 50

OCR? stands for____________________?

20 / 50

Object which can store group of other objects is called___________________?

21 / 50

Which of the following commands is used to display the filenames in multiple columns ?

22 / 50

Which command is used to delete all files in the current directory as well as all files and sub-directories in its subdirectories ?

23 / 50

Secondary storage ____________________?

24 / 50

To select text by shadding as you drag the mouse arrow over the text is referred to as _______________________?

25 / 50

Which keys enable the input of numbers quickly ?

26 / 50

What is/are the predefined TraceListener(s) in ASP.Net?

27 / 50

A ___________________ can make it easier to play games ?

28 / 50

Which of the following is not categorized under Product Operation of McCall?s Software Quality Factors ?

29 / 50

__________________ ensuring that performance meets established standards that worker?s activities occurs as planned and that the organization process?

30 / 50

A make-buy decision is based on whether________________?

31 / 50

The incorporation of advice code at the specified join points by an aspect weaver is called?__________________?

32 / 50

Which of the following could be digital input devices for computers ?

33 / 50

The SRS document is also known as ________________ specification ?

34 / 50

A ___________________ strategy seeks to achieve competitive advantages by allowing the business unit to make more profit than its competitors?

35 / 50

Which of the following commands is used to remove files with confirmation prompt from the user file system which have neither been accessed nor modified i the last one year ?

36 / 50

Package of drawstring() method is _________________?

37 / 50

The most important attribute of information quality that a manager requires is ?

38 / 50

The permanently etched program in ROM that automatically begins executing the computer instructions is the__________________?

39 / 50

Debugging Program is a program which runs concurrently with the program under test & provide commands to_____________________?

40 / 50

Which model describes the static structure of the system using object classes and their relationships ?

41 / 50

Link based measures rely on _____________ structure of a web graph to obtain related pages?

42 / 50

Processing involves____________________?

43 / 50

The pattern of printed lines on most products are called ___________________?

44 / 50

The command that can be used to restrict incoming messages to a user is_______________?

45 / 50

CMM stands for_____________________?

46 / 50

In ASP.NET if one uses Windows authentication the current request attaches an object called as_______________?

47 / 50

Which analysis is a part of Analysis model of the web engineering process framework ?

48 / 50

Convert the ASLA assembly language instructions into hexadecimal machine language_______________?

49 / 50

Difference between Response.Write() and Response.Output.Write() ?

50 / 50

Number of dynamic web pages provides an idea about____________ for a web page that is to be built?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi