Software Engineering Quiz 9

0%
0

Software Engineering Quiz 9

1 / 50

Which of the following ASP.NET object encapsulates the state of the client ?

2 / 50

Standard Enforcer is a___________________?

3 / 50

Which method is used to perform DML statements in JDBC ?

4 / 50

Identify a fourth generation language(4GL) from the given below_________________?

5 / 50

Which of the following reports presents information with little or no filtering or restrictions ?

6 / 50

Bits can be send over guided and unguided media as analog signal by___________________?

7 / 50

Which of the following is used to make a programs run when the computer is switched on____________________?

8 / 50

What is group with the responsibility for reviewing and approving changes to baselines ?

9 / 50

Which of the following could be digital input devices for computers ?

10 / 50

In satellite based communication,VSAT stands for ______________________ ?

11 / 50

A data warehouse is which of the following ?

12 / 50

Which of the following is not a real-time architectural pattern _______________________ ?

13 / 50

Which of the following is not project management goal ?

14 / 50

_______________ is a way of providing functionality on a remote server with client access through a web browser?

15 / 50

Which view in architectural design shows the key abstractions in the system as objects or object classes ?

16 / 50

Which of the following is not a change management process ?

17 / 50

A development stategy whereby the executive control modules of a system are coded and tested first, is known as________________?

18 / 50

The channel capacity or a maximum throughput of a logical or physical communication path in a digital communication system is called_________________?

19 / 50

Which of the following is needed by Maintenance staff?

20 / 50

Which of these does not account for software failure ?

21 / 50

Which command is used to display the top of the file ?

22 / 50

Which of the following is not a module type ?

23 / 50

A _______________ executes the loop task first, then tests a condition and repeats the task until the condition fails ?

24 / 50

What describes how a set of interacting components can share data ?

25 / 50

Explain what is meant by PRODUCT with reference to one of the eight principles as per the ACM/IEEE Code of Ethics ?

26 / 50

Which of the following is not regression test case ?

27 / 50

In which tcp_wrappers file can you specify to allow all connections from all hosts ?

28 / 50

What information is required to process a change to a baseline ?

29 / 50

Cyclomatic Complexity method comes under which testing method ?

30 / 50

Circumstances that have potential to cause loss or harm is known as___________________?

31 / 50

The _______________ of a formal specification language is often based on a syntax that is derived from standard set theory notation and predicate calculus ?

32 / 50

HTTP client requests by establishing a ____________ connection to a particular port on the server?

33 / 50

Execution Verifier is a dynamic tool that is also known as_____________________?

34 / 50

A computer falls into the __________________ category if it is, at the time of construction, one of the fastest computers in the world?

35 / 50

Which of the following is not an adaptation criteria for software projects ?

36 / 50

Any letter, number, or symbol found on the keyboard taht you can type into the computer___________________?

37 / 50

Which of the following is incorrect with respect to Model Checking ?

38 / 50

Which of the following occurs often due to the bulkiness of a system specification document ?

39 / 50

Which of the following terms is a measure of the probability that the system will cause an accident ?

40 / 50

Surgeons can perform delicate operations by manipulating devices through computer instead of manually. This technology is known as___________________?

41 / 50

Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the change has not introduced new faults ?

42 / 50

Mouse technique used for access in properties of any object is ______________________?

43 / 50

who invented the difference engine and analytical engine?

44 / 50

Which of these does not affect different types of software as a whole ?

45 / 50

A description of each function presented in the DFD is contained in a _________________________?

46 / 50

The two dimensions of spiral model are ______________________?

47 / 50

Which of the following risks are derived from the organizational environment where the software is being developed ?

48 / 50

Which option will be used with sort command to start sorting ofter the nth column of the (m+l)th field ?

49 / 50

What port does squid listen, by default ?

50 / 50

The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as______________?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi