Software Engineering Quiz 39

0%
0

Software Engineering Quiz 39

1 / 50

When you save to this, your data will remain intact even when the computer is turned off____________________?

2 / 50

The display size of a monitor is measured ___________________?

3 / 50

What command is used to assign executable permission to the owner of the file named ?letter? ?

4 / 50

Why is Requirements Management Important ? It is due to the changes___________________?

5 / 50

Systems software is a program that directs the overall operation of the computer, facilitates its use and interacts with the users. What are the different types of this software?

6 / 50

A ___________ process in any area of the business organization performs basic steps such as, receive input, measure, analyze, document, perform, process, record / store, access, produce and communicate?

7 / 50

Which of the following is not a Version management feature ?

8 / 50

The Scrambling of DATA is known as___________________?

9 / 50

The file transfer protocol is built on ____________________?

10 / 50

The transition functions that are implied by the state box are defined in__________________?

11 / 50

MTTF stands for__________________?

12 / 50

Whats is the significance of Response.ClearHeaders( ) ?

13 / 50

Which is the limitation of high level language?

14 / 50

In analog computer_______________________?

15 / 50

To improve the performance of a business process, which of the following is most relevant ?

16 / 50

Which of these is not true ?

17 / 50

How is CORE different from IBIS ?

18 / 50

Which method executes only once ?

19 / 50

Which of the following term is best defined by the statement:?For a component to be composable, all external interactions must take place through publicly defined interfaces??

20 / 50

Build & Fix Model is suitable for programming exercises of ______________ LOC (Line of Code)?

21 / 50

The times by which stimuli must be processed and some response produced by the system is known as____________________?

22 / 50

The first event to be triggered in an aspx page is?

23 / 50

The ___________________ enables the software engineer to develop models of the information domain and functional domain at the same time___________________?

24 / 50

Which of the tests is a final system test performed by end users using real data over an extended period of time ?

25 / 50

Which shell?s wild-cards is used to match a single character ?

26 / 50

Which process model should be used in virtually all situations of web engineering ?

27 / 50

Which Kind Of data we can store in viewstate ?

28 / 50

When a computer is first turned on or restarted, a special type of absolute loader, called a ___________ is executed?

29 / 50

Indicate whether the statement LDA B is a statement, in_________________?

30 / 50

We have defined one page_load event in aspx page and same page_load event in code behind who will run first ?

31 / 50

A _____________ is a device that forwards packets between networks by processing the routing information included in the packet?

32 / 50

Which of the following commands is used to remove files ?

33 / 50

Which command is used to display all the lines with the string ?sales? from the file empl.lst ?

34 / 50

Data gathering in computer means, they allow to use _______________data?

35 / 50

Which one of the following is not a step of requirement engineering ?

36 / 50

Which of the following steps is/are the implementation plans involved in MIS ?

37 / 50

Reverse engineering of data focuses on_____________________?

38 / 50

What can be used to complement decomposition techniques and offer a potentially valuable estimation approach in their own right ?

39 / 50

You want to avoid multiple inheritance. Which design pattern would you choose ?

40 / 50

White Box techniques are also classified as_________________?

41 / 50

Which of the following is not the primary objectives in the analysis model ?

42 / 50

What command is used to save the standard output in a file, as well as display it on the terminal ?

43 / 50

Which of the following is a deliverable of the system implementation phase in a formal system development process ?

44 / 50

Which of the following commands is used to assign executable permission to the owner of the file named ?note? ?

45 / 50

Control systems may make use of the Environmental Control pattern, which is a general control pattern that includes ______________processes?

46 / 50

A acronym for the organisation that publishes programming language standard is________________?

47 / 50

Which command is used for interpretation of java program_______________?

48 / 50

What is a Range check ?

49 / 50

Which of the following is not a software testing generic characteristics ?

50 / 50

__________________ is a space behind satellite navigation system that provides location anywhere on earth where there is an unobstructed line of site for four or more of its satellites?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi