Software Engineering Quiz 6

0%
0

Software Engineering Quiz 6

1 / 50

Which of the following are not the four major data processing functions of a computer ?

2 / 50

Java intermediate code is known as_________________?

3 / 50

What combines procedures and tools to manage different versions of configuration objects that are created during the software process ?

4 / 50

Which of the following tool is used to partition your hard drive ?

5 / 50

What command is used to halt a Linux system ?

6 / 50

Alpha testing is done at________________?

7 / 50

What is MTTF ?

8 / 50

Classes and interfaces are a part of____________________?

9 / 50

If you open a menu and then decide you don?t want to select an option after all, click the menu title again or press the ________________ key to close the menu?

10 / 50

Which of the following requires design control measures, such as holding and recording design reviews and qualification tests ?

11 / 50

Inheritance means ?

12 / 50

Software evolution does not comprises ?

13 / 50

Identify the correct option with reference to Software Quality Metrics ?

14 / 50

All the operations in a transaction need to be completed before the database changes are made _________________?

15 / 50

Selection of a model is based on_____________________?

16 / 50

Which of the following commands can be used to get information about yourself ?

17 / 50

Which transmission media has the highest transmission speed in a network ?

18 / 50

Which one is not a risk management activity ?

19 / 50

Which kind of chart is useful for comparing series or categories of data, each in its own bar ?

20 / 50

Which framework class include standards and classes that support component communication and information exchange?

21 / 50

An event in an executing program where the advice associated with an aspect may be executed is known as___________________?

22 / 50

Maintenance testing is performed using which methodology ?

23 / 50

The Following are the minimum requirement to run Asp.net pages_________________?

24 / 50

Convert the 080D4E machine language instructions into assembly language, assuming that they were not generated by pseudo-ops_______________?

25 / 50

Select the developer-specific requirement ?

26 / 50

Which of the following is a collection of component versions that make up a system ?

27 / 50

Which of the following command can you execute to count the number of lines in a file ?

28 / 50

The original ASCII code used ___________________ bits of each byte, reserving that last bit for error checking ?

29 / 50

What is a strong name ?

30 / 50

Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?

31 / 50

Which of the following advanced input controls provides a nonnumeric means of selecting a value ?

32 / 50

Which of the following refers to the fastest, biggest and most expansive computer ?

33 / 50

How many transaction isolation levels are defined in java.sql.Connection interface ?

34 / 50

To ensure that a given root definition is rigorous and comprehensive, The Lancaster team proposed several criteria that are summarized in the mnemonic CATWOE in Soft Systems Methodology (SSM).Which of the following alphabet is representing an entirely different meaning to SSM ?

35 / 50

Why is Requirements Elicitation a difficult task ?

36 / 50

If a memory chip is volatile, it will _____________________?

37 / 50

Which of the following term is best defined by the statement:?a structural relationship that specifies that objects of one thing are connected to objects of another? ?

38 / 50

Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ?

39 / 50

This is a time-sensitive service_____________________?

40 / 50

The core of reverse engineering is an activity called________________?

41 / 50

The flow of transactions through business processes to ensure appropriate checks and approvals are implemented is called ?

42 / 50

SCM stands for_________________?

43 / 50

Cache and main memory will lose their contents when the power is off. They are ____________________?

44 / 50

Which of the following transfer execution directly to another page ?

45 / 50

Transmission and presentation of text and graphics is called______________________?

46 / 50

Which property is used to name a web control ?

47 / 50

Which of the following is an Output device ?

48 / 50

Convert the .WORD d#790 assemblylanguage pseudo-ops into hexadecimal machine language________________?

49 / 50

The IP address are based on________________?

50 / 50

_____________________ provides the means to move the pointer on the screen and give information to the computer by clicking its buttons ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi