Home » Software Engineering Quiz » Software Engineering Quiz 32

Software Engineering Quiz 32

0%
0

Software Engineering Quiz 32

1 / 50

During processing data, programs, and processed information are held temporality in ________________________?

2 / 50

Which of the following commands is used to absolutely assign all permissions to the owner, read and write permissions to the group and only executable permission to the others of the file note ?

3 / 50

How many primary partitions can exist on one drive ?

4 / 50

What of the following is not an output of a JAD session ?

5 / 50

Suitability, Accuracy, Interoperability, and security are what type quality attribute of ISO 9126 ?

6 / 50

Choose the suitable options with respect to regression testing ?

7 / 50

Network congestion occurs_____________________?

8 / 50

Pathways that support communication among the various electronics components on the computer system board are called________________?

9 / 50

Capital letters on a keyboard are referred to as___________________?

10 / 50

The action of parsing the source program into the proper syntactic classes is known as________________?

11 / 50

Robustness? answers which of the following description ?

12 / 50

Which command is used to copy a file wb with the same name from the programs directory to the misc directory ?

13 / 50

In which way(s) can a macro processor for assembly language be implemented ?

14 / 50

Which operator will be used with chmod command to assign absolute permission ?

15 / 50

The namespace within the Microsoft .NET framework which provides the functionality to implement transaction processing is _______________?

16 / 50

MRS stands for ____________________?

17 / 50

A hand-held device for optically reading bar codes on goods, labels & shelves is____________________?

18 / 50

Which company is the biggest player in the microprocessor industry ?

19 / 50

When a client application invokes a method contained within an object elsewhere in the system, CORBA uses dynamic invocation to____________________?

20 / 50

Computer programs are written in a high-level programming language; however, the human-readable version of a program is called _______________________?

21 / 50

Which of the following is the way of ensuring that the tests are actually testing code ?

22 / 50

Selective retest techniques may be more economical than the ?retest-all?technique.How many selective retest techniques are there?

23 / 50

Which of the following is(are) the task(s) of the Systems Conversion phase ?

24 / 50

In computer programming, assigning of an initial value or to set , variables , counters, switches etc to their starting values at the beginning of a program or subprogram is called_________________?

25 / 50

Objects are executed _____________________?

26 / 50

Which of the following NIS clients, finds and stores information about an NIS domain and server ?

27 / 50

What DFD notation is represented by the Rectangle ?

28 / 50

Which of the following is a complementary approach to function-oriented approach ?

29 / 50

Statement and branch coverage metrics are part of______________________?

30 / 50

What command is used to sort the lines of data in a file in reverse order ?

31 / 50

Which on of the following is not an agile method ?

32 / 50

Which is used to store firmware ?

33 / 50

What do you call the smallest controllable element of a picture represented on a computer screen ?

34 / 50

Who is called the ?grand father? of the computer ?

35 / 50

If a server has no clue about where to find the address for a hostname then___________________?

36 / 50

What type of software testing is generally used in Software Maintenance ?

37 / 50

Which one is not a stage of COCOMO-II ?

38 / 50

What command is used to terminate a process ?

39 / 50

If one has two different web form controls in a application and if one wanted to know whether the values in the above two different web form control match what control must be used ?

40 / 50

Which one of the following computer network is built on the top of another network ?

41 / 50

What incorporates data, architectural, interface, and procedural representations of the software ?

42 / 50

This is one of the architecture paradigm________________?

43 / 50

Which of the following is not a technology driver for an information system ?

44 / 50

Which of the following Requirement Elicitation Techniques removes the poor understanding of application domain and lack of common terminology between the users and the analysts ?

45 / 50

Which of the following phases identifies and expresses requirements, prioritizes requirements, updates project plan, and communications the requirements statement ?

46 / 50

Which of the following Cleanroom process teams develops set of statistical test to exercise software after development ?

47 / 50

Which of the following commands is used to count the total number of lines, words, and characters contained in a file ?

48 / 50

The CMMI assessment is based on a x-point scale. What is the value of x ?

49 / 50

Which model assumes that systems are created from reusable components, scripting or database programming ?

50 / 50

What is the term for how words will appear on a page ?

Provide Your Information

Your score is

The average score is 0%

0%

Share on facebook
Facebook
Share on twitter
Twitter
Share on whatsapp
WhatsApp
Software Engineering Quiz 40
Software Engineering Quiz 1
Software Engineering Quiz 2
Software Engineering Quiz 3
Software Engineering Quiz 4
Software Engineering Quiz 5
Software Engineering Quiz 6
Software Engineering Quiz 7
Software Engineering Quiz 8
Software Engineering Quiz 9

Help Concept 360 Please. We need 500 Youtube Subscriber. Please Subscribe our Youtube Channel. Click below link to subscribe Please

آپ سے گزارش ہے کہ ہمارے یوٹیوب چینل کوسبسکرائب کر کے ہماری مدد کریں جیسا کہ یہ ویب سائٹ آپکی مدد کر رہی ہے۔ شکریہ