Software Engineering Quiz 35

0%
0

Software Engineering Quiz 35

1 / 50

Which of the following can only have sequential access ?

2 / 50

A cross life-cycle activity of system development is____________________?

3 / 50

To navigate to a new Web page for which you know the URL, type that URL in the browser __________________ and press Enter?

4 / 50

How many steps are involved in Feature Oriented Domain Analysis (FODA) ?

5 / 50

What are the goals to gain Laboratory Accreditation ?

6 / 50

When a bank uses information to launch a personalised credit card product this_____________?

7 / 50

A base register table___________________?

8 / 50

You can append to a file instead of overwriting by using the________________?

9 / 50

Which of the following is not a filter command ?

10 / 50

___________________is the process of dividing the disk into tracks and sectors?

11 / 50

The ______________ translates internet domain and host names to IP address?

12 / 50

Which of the following commands is used to save the output of the who command in a file named user.lst, as well as display it ?

13 / 50

The CPU, also called the ___________ when talking about PCs, does the vast majority of the processing for a computer?

14 / 50

What command is used with vi editor to move the cursor to the left ?

15 / 50

The ASCII encoding of binary data is called______________________?

16 / 50

Smallest individual unit in java program is known as____________________?

17 / 50

Which version of COCOMO states that once requirements have been stabilized, the basic software architecture has been established ?

18 / 50

Which of the following object is not an ASP component ?

19 / 50

Which of the following is not a type of network ?

20 / 50

Identify an ethical dilemma from the situations mentioned below ?

21 / 50

Which of the following states that work expands to fill the time available ?

22 / 50

Which of the following is not a Software Configuration Management Activity ?

23 / 50

Which of the following is a example of Configuration Items ?

24 / 50

A language-processing systems may translate an XML data description into__________________?

25 / 50

A _______________ defines a set of standards for components, including interface standards, usage standards, and deployment standards?

26 / 50

Which of are following internal commands is used in mail to forward mail to user in user-list ?

27 / 50

Advantage(s) of using assembly language rather than machine language is/are____________________?

28 / 50

What is a physical element that exists at runtime in UML ?

29 / 50

A data model contains___________________?

30 / 50

Which namespace allows us to formauthentication ?

31 / 50

An _____________ is a set of processes and procedures that transform data into information and knowledge?

32 / 50

Which of the following come under system control ?

33 / 50

Which one of the following fact-finding techniques is an inexpensive means of gathering data from a large number of individuals ?

34 / 50

Which of the following is not an effective project manager trait ?

35 / 50

Transport layer protocols deals with__________________?

36 / 50

Which command is used to terminate all processes in your own system except the login shell ?

37 / 50

HTTP is _____________ protocol?

38 / 50

How is plan driven development different from agile development ?

39 / 50

_________________is the maximum amount of data that can be stored on a storage medium ?

40 / 50

A translator which reads an entire programme written in a high level language and converts it into machine language code is_________________?

41 / 50

Which of the following is a software process ?

42 / 50

Use-case analysis focuses upon_______________?

43 / 50

Tracking employee training, skills, and performance appraisals is an example of a human resource information system operating at the________________?

44 / 50

Which of the following commands is used to copy a file wb from the programs directory into a file called wbx in the misc directory ?

45 / 50

By default, ASP.NET store SessionIDs in ___________________?

46 / 50

In size oriented metrics, metrics are developed based on the _____________________?

47 / 50

URL stands for____________________?

48 / 50

Which command is used to sort the lines of data in a file in alphabetical order ?

49 / 50

Which of the following protects the system from hackers ?

50 / 50

What command do you use to create Linux file systems ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi