Software Engineering Quiz 6
1 / 50
The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called ?
2 / 50
Which property is used to name a web control ?
3 / 50
Cache and main memory will lose their contents when the power is off. They are ____________________?
4 / 50
Convert the .WORD d#790 assemblylanguage pseudo-ops into hexadecimal machine language________________?
5 / 50
Transmission and presentation of text and graphics is called______________________?
6 / 50
Identify the correct option with reference to Software Quality Metrics ?
7 / 50
Which of the following term is best defined by the statement:?a structural relationship that specifies that objects of one thing are connected to objects of another? ?
8 / 50
This is a time-sensitive service_____________________?
9 / 50
If a memory chip is volatile, it will _____________________?
10 / 50
To ensure that a given root definition is rigorous and comprehensive, The Lancaster team proposed several criteria that are summarized in the mnemonic CATWOE in Soft Systems Methodology (SSM).Which of the following alphabet is representing an entirely different meaning to SSM ?
11 / 50
Which of the following command can you execute to count the number of lines in a file ?
12 / 50
Classes and interfaces are a part of____________________?
13 / 50
Software evolution does not comprises ?
14 / 50
Which kind of chart is useful for comparing series or categories of data, each in its own bar ?
15 / 50
Maintenance testing is performed using which methodology ?
16 / 50
Select the developer-specific requirement ?
17 / 50
Which of the following is a collection of component versions that make up a system ?
18 / 50
The original ASCII code used ___________________ bits of each byte, reserving that last bit for error checking ?
19 / 50
What combines procedures and tools to manage different versions of configuration objects that are created during the software process ?
20 / 50
If you open a menu and then decide you don?t want to select an option after all, click the menu title again or press the ________________ key to close the menu?
21 / 50
What command is used to halt a Linux system ?
22 / 50
Which framework class include standards and classes that support component communication and information exchange?
23 / 50
How many transaction isolation levels are defined in java.sql.Connection interface ?
24 / 50
Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?
25 / 50
Which of the following advanced input controls provides a nonnumeric means of selecting a value ?
26 / 50
Why is Requirements Elicitation a difficult task ?
27 / 50
Which of the following are not the four major data processing functions of a computer ?
28 / 50
Which of the following tool is used to partition your hard drive ?
29 / 50
Inheritance means ?
30 / 50
Selection of a model is based on_____________________?
31 / 50
Which of the following is an Output device ?
32 / 50
Alpha testing is done at________________?
33 / 50
Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ?
34 / 50
SCM stands for_________________?
35 / 50
Which one is not a risk management activity ?
36 / 50
Convert the 080D4E machine language instructions into assembly language, assuming that they were not generated by pseudo-ops_______________?
37 / 50
_____________________ provides the means to move the pointer on the screen and give information to the computer by clicking its buttons ?
38 / 50
The Following are the minimum requirement to run Asp.net pages_________________?
39 / 50
Which of the following transfer execution directly to another page ?
40 / 50
Java intermediate code is known as_________________?
41 / 50
All the operations in a transaction need to be completed before the database changes are made _________________?
42 / 50
Which transmission media has the highest transmission speed in a network ?
43 / 50
An event in an executing program where the advice associated with an aspect may be executed is known as___________________?
44 / 50
What is a strong name ?
45 / 50
The core of reverse engineering is an activity called________________?
46 / 50
Which of the following refers to the fastest, biggest and most expansive computer ?
47 / 50
The IP address are based on________________?
48 / 50
Which of the following requires design control measures, such as holding and recording design reviews and qualification tests ?
49 / 50
What is MTTF ?
50 / 50
Which of the following commands can be used to get information about yourself ?
Provide Your Information
Your score is
The average score is 0%
Restart quiz