Software Engineering Quiz 39

0%
0

Software Engineering Quiz 39

1 / 50

Reverse engineering of data focuses on_____________________?

2 / 50

What is a Range check ?

3 / 50

A _____________ is a device that forwards packets between networks by processing the routing information included in the packet?

4 / 50

You want to avoid multiple inheritance. Which design pattern would you choose ?

5 / 50

Which command is used to display all the lines with the string ?sales? from the file empl.lst ?

6 / 50

To improve the performance of a business process, which of the following is most relevant ?

7 / 50

Data gathering in computer means, they allow to use _______________data?

8 / 50

Which of the following is a deliverable of the system implementation phase in a formal system development process ?

9 / 50

What can be used to complement decomposition techniques and offer a potentially valuable estimation approach in their own right ?

10 / 50

Which shell?s wild-cards is used to match a single character ?

11 / 50

The ___________________ enables the software engineer to develop models of the information domain and functional domain at the same time___________________?

12 / 50

The file transfer protocol is built on ____________________?

13 / 50

Control systems may make use of the Environmental Control pattern, which is a general control pattern that includes ______________processes?

14 / 50

What command is used to save the standard output in a file, as well as display it on the terminal ?

15 / 50

Indicate whether the statement LDA B is a statement, in_________________?

16 / 50

When a computer is first turned on or restarted, a special type of absolute loader, called a ___________ is executed?

17 / 50

__________________ is a space behind satellite navigation system that provides location anywhere on earth where there is an unobstructed line of site for four or more of its satellites?

18 / 50

Which is the limitation of high level language?

19 / 50

Build & Fix Model is suitable for programming exercises of ______________ LOC (Line of Code)?

20 / 50

Which command is used for interpretation of java program_______________?

21 / 50

A ___________ process in any area of the business organization performs basic steps such as, receive input, measure, analyze, document, perform, process, record / store, access, produce and communicate?

22 / 50

When you save to this, your data will remain intact even when the computer is turned off____________________?

23 / 50

Which of the following is not a software testing generic characteristics ?

24 / 50

The display size of a monitor is measured ___________________?

25 / 50

Which of the tests is a final system test performed by end users using real data over an extended period of time ?

26 / 50

A acronym for the organisation that publishes programming language standard is________________?

27 / 50

What command is used to assign executable permission to the owner of the file named ?letter? ?

28 / 50

Which of the following commands is used to assign executable permission to the owner of the file named ?note? ?

29 / 50

Which process model should be used in virtually all situations of web engineering ?

30 / 50

The first event to be triggered in an aspx page is?

31 / 50

Which one of the following is not a step of requirement engineering ?

32 / 50

MTTF stands for__________________?

33 / 50

We have defined one page_load event in aspx page and same page_load event in code behind who will run first ?

34 / 50

Which of these is not true ?

35 / 50

The transition functions that are implied by the state box are defined in__________________?

36 / 50

Which of the following commands is used to remove files ?

37 / 50

The Scrambling of DATA is known as___________________?

38 / 50

Which of the following is not the primary objectives in the analysis model ?

39 / 50

Whats is the significance of Response.ClearHeaders( ) ?

40 / 50

How is CORE different from IBIS ?

41 / 50

In analog computer_______________________?

42 / 50

Which of the following term is best defined by the statement:?For a component to be composable, all external interactions must take place through publicly defined interfaces??

43 / 50

Systems software is a program that directs the overall operation of the computer, facilitates its use and interacts with the users. What are the different types of this software?

44 / 50

Which Kind Of data we can store in viewstate ?

45 / 50

Which method executes only once ?

46 / 50

Which of the following steps is/are the implementation plans involved in MIS ?

47 / 50

White Box techniques are also classified as_________________?

48 / 50

Which of the following is not a Version management feature ?

49 / 50

Why is Requirements Management Important ? It is due to the changes___________________?

50 / 50

The times by which stimuli must be processed and some response produced by the system is known as____________________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi