Software Engineering Quiz 26

0%
0

Software Engineering Quiz 26

1 / 50

What among the following are the primary characteristics that information must process ?

2 / 50

A relocate program form is the one which_______________?

3 / 50

The task of establishing system improvement objectives is performed in which phase of systems analysis ?

4 / 50

Who identifies, documents, and verifies that corrections have been made to the software ?

5 / 50

When speaking of computer input and output, input refers to_________________________?

6 / 50

The name ?Tim Cook? is associated with__________________?

7 / 50

A fact-finding technique that involves a large number of observations taken at random intervals is called___________________?

8 / 50

What shell?s wild-card is used to match any number of characters including none ?

9 / 50

Hot java is_______________?

10 / 50

Transaction processing systems may be organized as a ____________ architecture with system components responsible for input, processing, and output ?

11 / 50

Which one of the tests is performed on a subset of a program ?

12 / 50

In what type of coupling, the complete data structure is passed from one module to another ?

13 / 50

A digital device that processes data is known as_______________?

14 / 50

A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states ?

15 / 50

The function(s) of the Syntax phase is/ are__________________?

16 / 50

Which of the following view shows that the system is composed of interacting processes at run time ?

17 / 50

What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?

18 / 50

The data link layer takes the packets from ________________ and encapsulates them into frames for transmission?

19 / 50

___________ is the process of recording, classifying and summarizing the financial activities of an organization?

20 / 50

Choose the incorrect statement with respect to Non-Functional Requirement(NFR) ?

21 / 50

Which of the following is a layer of protection for Security ?

22 / 50

Project Management ensures that______________?

23 / 50

A single channel is shared by multiple signals by _____________________?

24 / 50

Which of the following describes?Is-a-Relationship? ?

25 / 50

Considering the example of issue/return of a book, cataloging etc. in a library management.What type of management requirement is being depicted here ?

26 / 50

Which of the following is not included in SRS ?

27 / 50

How ASP.Net Different from classic ASP ?

28 / 50

Which of the following testing tools examine program systematically & automatically ?

29 / 50

Which of the following should be represented on an information flow diagram ?

30 / 50

Which software engineering team has no permanent leader ?

31 / 50

Which one the following TV display uses a semiconductor material doped with impurities ?

32 / 50

A property or quality the system must have is called a_______________?

33 / 50

OCR stands for _________________?

34 / 50

Which of these keys is NOT on the number keypad ?

35 / 50

What command is used to count the total number of lines, words, and characters contained in a file ?

36 / 50

Which of the following statements are incorrect with reference to web-based systems? Web-based systems__________________?

37 / 50

Saving is the process of _____________________?

38 / 50

Software Maintenance includes ?

39 / 50

The UML was designed for describing _______________________?

40 / 50

Third Party Certification for software standards is based on ___________________?

41 / 50

Which command allows you to view your file 24 lines at a time ?

42 / 50

Which of the following is not a communication command ?

43 / 50

Data encryption concept is used for _______________ purposes?

44 / 50

The name of a Microsoft Office Word document is displayed in both the _______________ and the taskbar?

45 / 50

In MIS system design, the sources of information may be categorized as______________ and _______________?

46 / 50

Which of these following sensor is a useful as part of a burglar alarm system for commercial buildings ?

47 / 50

The biggest memory size in the following is____________________?

48 / 50

What are legacy systems ?

49 / 50

If a Direct approach to software project sizing is taken, size can be measured in__________________?

50 / 50

Which of the following pattern is the basis of interaction management in many web-based systems ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi