Software Engineering Quiz 40

0%
0

Software Engineering Quiz 40

1 / 50

What does ACT stands for in In Boehm model for software maintenance ?

2 / 50

Which of the following command lists the last 10 lines of a file ?

3 / 50

You want to minimize development cost by reusing methods? Which design pattern would you choose ?

4 / 50

Which of the following is a function of CASE Tool ?

5 / 50

What service is used to translate domain names to IP addresses ?

6 / 50

What TCP/IP protocol is used for transferring electronic mail messages from one machine to another ?

7 / 50

Which requirements are the foundation from which quality is measured ?

8 / 50

Which statements are most accurate regarding the following classes? class A{private int i; protected int j; } class B extends A{ private int k; protected int m; } ?

9 / 50

Which of the following is the expansion of EBCDIC ____________________?

10 / 50

Which of the following command addresses all users who are currently hooked on ?

11 / 50

Which of the following NIS clients returns the name of the NIS server used by the NIS client ?

12 / 50

An algorithm is best described as_______________?

13 / 50

Which command is used to display and create files ?

14 / 50

Handshaking is a ?

15 / 50

Which testing tool is responsible for documenting programs ?

16 / 50

Which of the following is not a web engineering project metric ?

17 / 50

Which of the following statements about XML schemas is incorrect ?

18 / 50

How many primitive data types are there in Java ?

19 / 50

How many class A, B and C network IDs can exist ?

20 / 50

What command is used to change the working directory ?

21 / 50

Convert the 11014B machine language instructions into assembly language, assuming that they were not generated by pseudo-ops__________________?

22 / 50

How many forms exists of Barry Boehm?s COCOMO Model ?

23 / 50

The part of the CPU that accesses and decodes program instructions, and coordinates the flow of data among various system components is the___________________?

24 / 50

Which of the following is not a maturity level in CMM ?

25 / 50

Which of the following is a valid format for mounting a CD-ROM drive ?

26 / 50

What is Life cycle risk assessment ?

27 / 50

Bluetooth is an example of___________________?

28 / 50

Which of the following is not a main phase in Configuration Management (CM) Process ?

29 / 50

In the network HTTP resources are located by___________________?

30 / 50

Which of the following is not a project manager?s activity ?

31 / 50

A six ? digit card field used for postal ZIP codes is defined as___________________?

32 / 50

What is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss ?

33 / 50

The_______________ is represented as two processing boxes connected by an line (arrow) of control ?

34 / 50

The components that process data are related _______________________?

35 / 50

Which of the following is an architectural conflict ?

36 / 50

Software Configuration Management can be administered in several ways. These include __________________?

37 / 50

SA/SD features are obtained from which of the methodologies ?

38 / 50

Which of the following is a way of making a statement about the elements of a set that is true for every member of the set ?

39 / 50

Open database connectivity (OBDC) tools are an example of______________?

40 / 50

The longer a fault exists in software__________________?

41 / 50

The environment that supports the software project is called_______________________?

42 / 50

CSTE stands for ____________________?

43 / 50

A set of inter-related components that collect, process, store and distribute information to support decision making and control in an organization best defines_________________?

44 / 50

Which of the following is TRUE about Windows Authentication in ASP.NET ?

45 / 50

Which one of the following is not a business driver for an information system ?

46 / 50

A component model defines standards for_________________?

47 / 50

Use this when you want to make all letters capital without having to use the shift key for each character ___________________?

48 / 50

Select the statement true for activity diagrams ?

49 / 50

If special forms are needed for printing the output, the programmer specifies these forms through________________?

50 / 50

Which of the following phases is unique to the commercial application package implementation strategy as opposed to the rapid application development strategy ?

Provide Your Information

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi