Home » Software Engineering Quiz » Software Engineering Quiz 39

Software Engineering Quiz 39

0%
0

Software Engineering Quiz 39

1 / 50

You want to avoid multiple inheritance. Which design pattern would you choose ?

2 / 50

Which process model should be used in virtually all situations of web engineering ?

3 / 50

Data gathering in computer means, they allow to use _______________data?

4 / 50

Which of these is not true ?

5 / 50

Indicate whether the statement LDA B is a statement, in_________________?

6 / 50

When you save to this, your data will remain intact even when the computer is turned off____________________?

7 / 50

The display size of a monitor is measured ___________________?

8 / 50

When a computer is first turned on or restarted, a special type of absolute loader, called a ___________ is executed?

9 / 50

Which one of the following is not a step of requirement engineering ?

10 / 50

What command is used to assign executable permission to the owner of the file named ?letter? ?

11 / 50

What can be used to complement decomposition techniques and offer a potentially valuable estimation approach in their own right ?

12 / 50

Which command is used for interpretation of java program_______________?

13 / 50

A _____________ is a device that forwards packets between networks by processing the routing information included in the packet?

14 / 50

Control systems may make use of the Environmental Control pattern, which is a general control pattern that includes ______________processes?

15 / 50

Whats is the significance of Response.ClearHeaders( ) ?

16 / 50

We have defined one page_load event in aspx page and same page_load event in code behind who will run first ?

17 / 50

Which method executes only once ?

18 / 50

Build & Fix Model is suitable for programming exercises of ______________ LOC (Line of Code)?

19 / 50

Which command is used to display all the lines with the string ?sales? from the file empl.lst ?

20 / 50

The first event to be triggered in an aspx page is?

21 / 50

White Box techniques are also classified as_________________?

22 / 50

Which of the tests is a final system test performed by end users using real data over an extended period of time ?

23 / 50

Which of the following commands is used to assign executable permission to the owner of the file named ?note? ?

24 / 50

The times by which stimuli must be processed and some response produced by the system is known as____________________?

25 / 50

A acronym for the organisation that publishes programming language standard is________________?

26 / 50

The Scrambling of DATA is known as___________________?

27 / 50

Which is the limitation of high level language?

28 / 50

A ___________ process in any area of the business organization performs basic steps such as, receive input, measure, analyze, document, perform, process, record / store, access, produce and communicate?

29 / 50

Reverse engineering of data focuses on_____________________?

30 / 50

Which Kind Of data we can store in viewstate ?

31 / 50

How is CORE different from IBIS ?

32 / 50

MTTF stands for__________________?

33 / 50

Which of the following steps is/are the implementation plans involved in MIS ?

34 / 50

In analog computer_______________________?

35 / 50

Which of the following is not a software testing generic characteristics ?

36 / 50

Which of the following commands is used to remove files ?

37 / 50

The ___________________ enables the software engineer to develop models of the information domain and functional domain at the same time___________________?

38 / 50

Which shell?s wild-cards is used to match a single character ?

39 / 50

What command is used to save the standard output in a file, as well as display it on the terminal ?

40 / 50

Which of the following term is best defined by the statement:?For a component to be composable, all external interactions must take place through publicly defined interfaces??

41 / 50

What is a Range check ?

42 / 50

Systems software is a program that directs the overall operation of the computer, facilitates its use and interacts with the users. What are the different types of this software?

43 / 50

__________________ is a space behind satellite navigation system that provides location anywhere on earth where there is an unobstructed line of site for four or more of its satellites?

44 / 50

Which of the following is a deliverable of the system implementation phase in a formal system development process ?

45 / 50

The file transfer protocol is built on ____________________?

46 / 50

To improve the performance of a business process, which of the following is most relevant ?

47 / 50

Which of the following is not the primary objectives in the analysis model ?

48 / 50

Which of the following is not a Version management feature ?

49 / 50

The transition functions that are implied by the state box are defined in__________________?

50 / 50

Why is Requirements Management Important ? It is due to the changes___________________?

Provide Your Information

Your score is

The average score is 0%

0%

Share on facebook
Facebook
Share on twitter
Twitter
Share on whatsapp
WhatsApp
Software Engineering Quiz 40
Software Engineering Quiz 1
Software Engineering Quiz 2
Software Engineering Quiz 3
Software Engineering Quiz 4
Software Engineering Quiz 5
Software Engineering Quiz 6
Software Engineering Quiz 7
Software Engineering Quiz 8
Software Engineering Quiz 9

Help Concept 360 Please. We need 500 Youtube Subscriber. Please Subscribe our Youtube Channel. Click below link to subscribe Please

آپ سے گزارش ہے کہ ہمارے یوٹیوب چینل کوسبسکرائب کر کے ہماری مدد کریں جیسا کہ یہ ویب سائٹ آپکی مدد کر رہی ہے۔ شکریہ