Software Engineering Quiz 39

0%
0

Software Engineering Quiz 39

1 / 50

The times by which stimuli must be processed and some response produced by the system is known as____________________?

2 / 50

What is a Range check ?

3 / 50

Which of the following is not a software testing generic characteristics ?

4 / 50

Systems software is a program that directs the overall operation of the computer, facilitates its use and interacts with the users. What are the different types of this software?

5 / 50

Which command is used to display all the lines with the string ?sales? from the file empl.lst ?

6 / 50

The file transfer protocol is built on ____________________?

7 / 50

Data gathering in computer means, they allow to use _______________data?

8 / 50

When you save to this, your data will remain intact even when the computer is turned off____________________?

9 / 50

What can be used to complement decomposition techniques and offer a potentially valuable estimation approach in their own right ?

10 / 50

Which shell?s wild-cards is used to match a single character ?

11 / 50

Which of the following commands is used to remove files ?

12 / 50

What command is used to save the standard output in a file, as well as display it on the terminal ?

13 / 50

Why is Requirements Management Important ? It is due to the changes___________________?

14 / 50

Which of the tests is a final system test performed by end users using real data over an extended period of time ?

15 / 50

The first event to be triggered in an aspx page is?

16 / 50

The ___________________ enables the software engineer to develop models of the information domain and functional domain at the same time___________________?

17 / 50

White Box techniques are also classified as_________________?

18 / 50

We have defined one page_load event in aspx page and same page_load event in code behind who will run first ?

19 / 50

Which of the following is not the primary objectives in the analysis model ?

20 / 50

Which command is used for interpretation of java program_______________?

21 / 50

Whats is the significance of Response.ClearHeaders( ) ?

22 / 50

Which of the following is a deliverable of the system implementation phase in a formal system development process ?

23 / 50

How is CORE different from IBIS ?

24 / 50

What command is used to assign executable permission to the owner of the file named ?letter? ?

25 / 50

Control systems may make use of the Environmental Control pattern, which is a general control pattern that includes ______________processes?

26 / 50

Which of the following term is best defined by the statement:?For a component to be composable, all external interactions must take place through publicly defined interfaces??

27 / 50

MTTF stands for__________________?

28 / 50

Which method executes only once ?

29 / 50

Which process model should be used in virtually all situations of web engineering ?

30 / 50

Reverse engineering of data focuses on_____________________?

31 / 50

Which of the following steps is/are the implementation plans involved in MIS ?

32 / 50

A _____________ is a device that forwards packets between networks by processing the routing information included in the packet?

33 / 50

The display size of a monitor is measured ___________________?

34 / 50

The transition functions that are implied by the state box are defined in__________________?

35 / 50

Which is the limitation of high level language?

36 / 50

To improve the performance of a business process, which of the following is most relevant ?

37 / 50

Which of the following commands is used to assign executable permission to the owner of the file named ?note? ?

38 / 50

Indicate whether the statement LDA B is a statement, in_________________?

39 / 50

A acronym for the organisation that publishes programming language standard is________________?

40 / 50

In analog computer_______________________?

41 / 50

When a computer is first turned on or restarted, a special type of absolute loader, called a ___________ is executed?

42 / 50

You want to avoid multiple inheritance. Which design pattern would you choose ?

43 / 50

The Scrambling of DATA is known as___________________?

44 / 50

Build & Fix Model is suitable for programming exercises of ______________ LOC (Line of Code)?

45 / 50

Which Kind Of data we can store in viewstate ?

46 / 50

Which of these is not true ?

47 / 50

Which of the following is not a Version management feature ?

48 / 50

A ___________ process in any area of the business organization performs basic steps such as, receive input, measure, analyze, document, perform, process, record / store, access, produce and communicate?

49 / 50

Which one of the following is not a step of requirement engineering ?

50 / 50

__________________ is a space behind satellite navigation system that provides location anywhere on earth where there is an unobstructed line of site for four or more of its satellites?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi