Software Engineering Quiz 6

0%
0

Software Engineering Quiz 6

1 / 50

What is a strong name ?

2 / 50

Which of the following is a collection of component versions that make up a system ?

3 / 50

Cache and main memory will lose their contents when the power is off. They are ____________________?

4 / 50

Which of the following refers to the fastest, biggest and most expansive computer ?

5 / 50

Which one is not a risk management activity ?

6 / 50

Which of the following term is best defined by the statement:?a structural relationship that specifies that objects of one thing are connected to objects of another? ?

7 / 50

To ensure that a given root definition is rigorous and comprehensive, The Lancaster team proposed several criteria that are summarized in the mnemonic CATWOE in Soft Systems Methodology (SSM).Which of the following alphabet is representing an entirely different meaning to SSM ?

8 / 50

Convert the .WORD d#790 assemblylanguage pseudo-ops into hexadecimal machine language________________?

9 / 50

Inheritance means ?

10 / 50

Transmission and presentation of text and graphics is called______________________?

11 / 50

Classes and interfaces are a part of____________________?

12 / 50

Which of the following is an Output device ?

13 / 50

The original ASCII code used ___________________ bits of each byte, reserving that last bit for error checking ?

14 / 50

If you open a menu and then decide you don?t want to select an option after all, click the menu title again or press the ________________ key to close the menu?

15 / 50

Why is Requirements Elicitation a difficult task ?

16 / 50

Maintenance testing is performed using which methodology ?

17 / 50

Which of the following command can you execute to count the number of lines in a file ?

18 / 50

Which kind of chart is useful for comparing series or categories of data, each in its own bar ?

19 / 50

SCM stands for_________________?

20 / 50

The Following are the minimum requirement to run Asp.net pages_________________?

21 / 50

How many transaction isolation levels are defined in java.sql.Connection interface ?

22 / 50

_____________________ provides the means to move the pointer on the screen and give information to the computer by clicking its buttons ?

23 / 50

What is MTTF ?

24 / 50

Which of the following advanced input controls provides a nonnumeric means of selecting a value ?

25 / 50

The IP address are based on________________?

26 / 50

The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called ?

27 / 50

Which of the following tool is used to partition your hard drive ?

28 / 50

Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?

29 / 50

Which of the following transfer execution directly to another page ?

30 / 50

An event in an executing program where the advice associated with an aspect may be executed is known as___________________?

31 / 50

All the operations in a transaction need to be completed before the database changes are made _________________?

32 / 50

Which of the following are not the four major data processing functions of a computer ?

33 / 50

Java intermediate code is known as_________________?

34 / 50

Convert the 080D4E machine language instructions into assembly language, assuming that they were not generated by pseudo-ops_______________?

35 / 50

Which of the following commands can be used to get information about yourself ?

36 / 50

What combines procedures and tools to manage different versions of configuration objects that are created during the software process ?

37 / 50

What command is used to halt a Linux system ?

38 / 50

Which of the following requires design control measures, such as holding and recording design reviews and qualification tests ?

39 / 50

Which transmission media has the highest transmission speed in a network ?

40 / 50

Software evolution does not comprises ?

41 / 50

Selection of a model is based on_____________________?

42 / 50

Alpha testing is done at________________?

43 / 50

The core of reverse engineering is an activity called________________?

44 / 50

This is a time-sensitive service_____________________?

45 / 50

Identify the correct option with reference to Software Quality Metrics ?

46 / 50

Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ?

47 / 50

Select the developer-specific requirement ?

48 / 50

If a memory chip is volatile, it will _____________________?

49 / 50

Which framework class include standards and classes that support component communication and information exchange?

50 / 50

Which property is used to name a web control ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi