Software Engineering Quiz 34

0%
0

Software Engineering Quiz 34

1 / 50

Which risks are associated with constraints imposed by management or the marketplace ?

2 / 50

At Conceptual level Class diagrams should include_____________________?

3 / 50

Which of the following is a black box testing strategy ?

4 / 50

Which category the following statement belongs,?Frameworks don?t usually include a database but rather assume that a separate database such as MySQl??

5 / 50

To add a custom control to a Web form we have to register with?

6 / 50

The business re-engineering requires a major change in the ____________________?

7 / 50

What command is used with vi editor to delete a single character ?

8 / 50

Communication channel is shared by all the machines on the network in_____________________?

9 / 50

The advantage(s) of incorporating the macro processor into pass 1 is/ are_______________?

10 / 50

PRD stands for____________________?

11 / 50

Where is data saved permanently ?

12 / 50

Information that comes from an external source and is fed into computer software is called ________________________?

13 / 50

If an Indirect approach is taken, then the sizing approach is represented as_______________?

14 / 50

A __________ is a measure, an intangible measure, which is difficult to count in clear terms?

15 / 50

Which symbol is used to separate more than one command in the same command line ?

16 / 50

An erroneous system state that can lead to system behavior that is unexpected by system users is known as________________?

17 / 50

Grady Booch, James Rumbaugh, and Ivar Jacobson combined the best features of their individual object-oriented analysis into a new method for object oriented design known as _____________________?

18 / 50

In what module, multiple instances of execution will yield the same result even if one instancy has not terminated before the next one has begun ?

19 / 50

The ___________ information required by the functional head in conducting the administration and management of the function?

20 / 50

Which of the following life cycle model can be chosen if the development team has less experience on similar projects ?

21 / 50

_____________________ is a reuse-based approach to defining, implementing, and composing loosely coupled independent components into systems?

22 / 50

Suppose a .NET programmer wants to convert an object into a stream of bytes then the process is called ________________?

23 / 50

MIS is both an area of _________ and a ________ of scholarly inquiry?

24 / 50

Which selective retest technique selects every test case that causes a modified program to produce a different output than its original version?

25 / 50

Suppose a class has public visibility. In this class we define a protected method. Which of the following statements is correct ?

26 / 50

What does FSF stand for ?

27 / 50

Which of the following commands is used to have a two-way communication with any person who is currently logged in ?

28 / 50

Multiprogramming was made possible by____________________?

29 / 50

The most powerful computer is_____________________?

30 / 50

The _______________ may also be called the screen or monitor?

31 / 50

In a typical ____________ network, application processing is shared between clients and one more servers?

32 / 50

What is one or more software configuration items that have been formally reviewed and agreed upon and serve as a basis for further development ?

33 / 50

Which of the following languages can be used to write server side scripting in ASP.NET?

34 / 50

Who delivers the technical skills that are necessary to engineer a product or an application ?

35 / 50

What command is used with vi editor to append text at end of line ?

36 / 50

The SRS is said to be consistent if and only if____________________?

37 / 50

Servers handle requests for other domains___________________?

38 / 50

The entire hostname has a maximum of___________________?

39 / 50

The use of design patterns for the development of object-oriented software has important implications for____________________?

40 / 50

What is the transport protocol used to call a webservice ?

41 / 50

What command is used to print a file ?

42 / 50

Decision makers who are concerned with tactical (short-term) operational problems and decision making are_____________?

43 / 50

Which one of the following computer memory is a temporary and volatile ?

44 / 50

The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is _______________?

45 / 50

Convert the .BYTE h#F8 assembly language pseudo-ops into hexadecimal machine language________________?

46 / 50

What enables a software engineer to defined screen layout rapidly for interactive applications ?

47 / 50

A(n)_________________ uses laser technology to store large amount of information?

48 / 50

Which of the following term is best defined by the statement: ?CASE tools and the target applications are isolated from physical storage so they are not affected when the hardware configuration is changed.? ?

49 / 50

The primary device that a computer uses to store information ____________________?

50 / 50

If the user queries a collection of large databases and extracts information from the webapp, the webapp is categorized under____________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi