Sie sind auf Seite 1von 18

Software Engineering BCA-4

MC0071(A)/ MT0016/ MT0047(A)/ BT0049/ BC0049/ BT0019/ ME0011(A)


4. ___________ is a set of programs that are built by software engineers a. Software b. Hardware c. Program d. Application Ans A 5. Which of the following is not the characteristics of software e. Software is developed or engineered, it is not manufactured in the classical sense f. Software does not wear-out g. Software is manufactures, not developed h. Although the industry is moving toward compound based assembly most s/w continues to be custom built. Ans C 6. ____________ collection of programs written to service other program i. System Software j. Real Time Software k. Business Software l. Embedded Software Ans A 7. This type of software make use of non numerical algorithm to solve complex problems that are not forward analysis m. Personal Computer software n. Web Based Software o. Business Software p. AI software Ans D 8. ______________is an engineering discipline which is concerned with a ll aspects of software production q. Software Developing r. Software Engineering s. Software Manufacturing t. None of the Above Ans B

9. According to Boehm the definition of software engineering u. It is the application of science & mathematics by which the capabilities of computer equipment are made useful to humans via computer program, procedures & associated documentation v. S/w engineering is nothing but the establishment & use of sound engineering principles in order t o obtain economical s/w that is reliable & works efficiently on real machines w. It is the systematic approach to development, operations, maintenance & retirement of Software x. None of the above Ans A 10. This model suggests a systematic sequential approach to software development that begins at the system level and progresses through analysis, design, coding, testing, and support. y. Waterfall Model z. Spiral Model aa. RAD Model bb. Iterative Model Ans A 11. Which of the following is not the limitation of the linear sequential model cc. This model assumes the requirement of a system which can be frozen before the design begins. dd. This model stipulates that the requirements be completely specified before the rest of the development can proceed ee. This model is not used when technical risks are high ff. It is document driven approach that requires formal documents at the end of each phase. Ans C 12. Which of the following is not the phases for RAD Models: gg. Business Modeling hh. Data Modeling ii. Process Modeling jj. Designing Ans D 13. Using this model software is developed in a series of incremental releases. kk. RAD ll. Spiral mm. Parallel or Concurrent Development Model nn. Component based Model Ans B 14. ___________ is inserting playful bugs into programs, creating viruses, writing quick and dirty code just to meet a schedule or a market window, shipping defective software

and even shipping software that works but does not meet the agreed upon specification is unethical oo. Hacking pp. Cracking qq. Breaking rr. None of the above 15. _____________is a function of the number of failures experienced by a particular user of that software. ss. Software reusability tt. Software adaptability uu. Software Reliability vv. Software Efficiency Ans C 16. _________ is a software testing process in which the objective is to measure the reliability of the software rather than to discover software faults. ww. Software Testing xx. Hardware Testing yy. Statistical Testing zz. All of the above Ans C 17. The strategies used for achieving software reliability is aaa. Fault avoidance bbb. Fault Tolerance ccc. Fault Detection ddd. All of the above Ans D 18. _________ This strategy assumes that residual faults remain in the system eee. fff. Fault Tolerance ggg. hhh. Fault avoidance Fault Detection All of the above

Ans B 19. ___________ is the term which is to mean programming without using go to statements, programming using only while loops and statements as control constructs and designing using a top-down approach. iii. Linear Programming jjj. Iterative Programming kkk. Structured Programming lll. None of the above Ans C

20. Faults are less likely to be introduced into programs if the use of these constructs are minimized. mmm. Floating Point Numbers, Pointers, nnn. Parallelism, Recursion ooo. Dynamic Memory Allocation ppp. Interrupts, Recursion qqq. All of the above Ans E 21. ________________ is needed in situations where system failure would cause large economic losses. rrr. Fault avoidance sss. Fault Tolerance ttt. Fault Detection uuu. None of the Above Ans B 22. _________________ transforms the analysis model created using object-oriented analysis in to a design model that serves as a blue print for software construction. vvv. Object oriented design www. Function oriented Design xxx. Structured Oriented design yyy. None of the above Ans A 23. _________________ is a ways showing how data flows through a sequence of processing steps. zzz. Semantic Data Models aaaa. Data Flow Model bbbb. Classification Data Model cccc. Process Model Ans B 24. ______ represents data stores in dataflow model dddd. Circle eeee. Arrows ffff. Rectangle gggg. Square Ans C 25. Relation between entities is _______________ where several entity instances participates in a relation with several others hhhh. 1:1 iiii. 1:M jjjj. M:1 kkkk. M:N

Ans D 26. _______ is a list of names used by the systems arranged alphabetically llll. Data Mart mmmm. Meta data nnnn. Data dictionary oooo. None of the above Ans C 27. All shared data is held in a central data bases that can be accessed by all sub systems. A system model based on a shared database is sometimes called_________ pppp. System Structure qqqq. Repository Model rrrr. Client Server Model ssss. Object Oriented Model Ans B 28. An __________________is an entity that has a state and a defined state of operations, which operate on that state tttt. Object uuuu. Entity vvvv. Class wwww. None of the above Ans A 29. ___________________ is concerned with designing a sequence of functional transformations that convert system inputs into the required. xxxx. E-R diagram yyyy. Data Flow design zzzz. CASE Tools aaaaa. None of the above Ans B 30. The process of changing a system after it has been delivered and is in use is called __________ bbbbb. Software Maintenance ccccc. Software Re-Engineering ddddd. Software RE-factoring eeeee. None of the above Ans A 31. CCB stands for fffff. ggggg. hhhhh. iiiii.

Chain Command Board Correction control Board Change Control Board None of the above

Ans C 32. Which of the following is not the type of software maintenance: jjjjj. Corrective Maintenance kkkkk. Adaptive Maintenance lllll. Adoptive Maintenance mmmmm. Perfective Maintenance Ans C 33. Which of the following is technical factors, which affect maintenance are: nnnnn. Module independence ooooo. The application domain ppppp. External Environment qqqqq. Hardware Stability Ans B 34. _________ is the process of factoring the design module, each modules factored into the components which is more readable and easier to understand. rrrrr. Software reengineering sssss. Software manufacturing ttttt. Forward engineering uuuuu. Software refactoring Ans D 35. The more information we have, the more effectively we test This is the definition of . vvvvv. Stability wwwww. Understandability xxxxx. Decomposability yyyyy. Testability Ans B 36. __________- is test case design method that uses the control structure of the procedural design to derive test cases. zzzzz. White-Box Testing aaaaaa. Black Box testing bbbbbb. Red Box Testing cccccc. Green-Box Testing Ans A 37. Which Of the following is control structure testing dddddd. Condition Testing eeeeee. Data flow testing ffffff. Loop testing gggggg. All of the above

Ans D 38. ___________ testing tests the high levels of a system before testing its detailed components. hhhhhh. Bottom up Testing iiiiii. Top down testing jjjjjj. Back to back testing kkkkkk. Thread Testing Ans B 39. Which of the following is not the principle of testing llllll. All tests should be traceable to customer requirements mmmmmm. Tests should be planned long before testing begins nnnnnn. Testing should begin in the large and progress toward in the small oooooo. To be most effective, testing should be conducted by an independent third party. Ans C 40. _______________ testing is performed with the realistic data of the client to demonstrate the software working satisfactorily. pppppp. Acceptance Testing qqqqqq. Regression Testing rrrrrr. System Testing ssssss. Functional Testing Ans A 41. White Box Testing also known as -------------tttttt. Functional Testing uuuuuu. System Testing vvvvvv. Glass Box Testing wwwwww.Regression Testing Ans C 42. _____________ focuses verification effort on the smallest unit of software design the software component or module xxxxxx. Unit Testing yyyyyy. System Testing zzzzzz. Functional Testing aaaaaaa. None of the above Ans A 43. Which of the following reflects the systems relative priorities: bbbbbbb. Availability, Security ccccccc. Data integrity, Growth

ddddddd. Performance, Back up and recovery eeeeeee. All of the above Ans D

2Marks
44. The incremental model combine the property of the with _______________ the _____________ model a. linear sequential model, iterative b. RAD, iterative c. Linear sequential, RAD d. None of the above Ans A 45. State true/false 46. A fault tolerant system can continue in operation after some system failures have occurred. 47. Fault recovery is the process modifying the state space of the system so that the effects of the fault are minimized. a. b. c. d. Both are true 1 is true 2 is true Both are false

Ans A 48. The situation where forward recovery can be applied: 49. When a user initiates a database computation a transaction is initiated. 50. When coded is corrupted 51. When linked structures are corrupted 52. When code is not corrupted fffffff. ggggggg. hhhhhhh. iiiiiii. 1&2 1&3 2&4 2&3

Ans D 53. State true or false 54. In broadcast models, an event is, in principle, broadcasting to all subsystems. 55. Interrupt driven models are used in real time systems where an interrupt handler detected external interrupts. jjjjjjj. Both are true kkkkkkk. 1 is true lllllll. 2 is true

mmmmmmm.

Neither of the true

Ans A 56. There are ________ type of domain specific architectures and _____________ nnnnnnn. One; Generic Models ooooooo. Two; Generic & Reference Model ppppppp. Two; Generic & Architecture Model qqqqqqq. Three; Generic, Reference & Architecture model Ans B 57. Which of the following is not the characteristics of an objected oriented design 58. Objects are abstraction of system entities, which are responsible for managing their own private state offering services to other objects. 59. It relies on decomposing the system in to a set of interacting functions with a centralized system state shared bye these functions 60. System functionality is expressed in terms of operations or services associated with each object. 61. Shared data areas are eliminated. 62. It conceals details of an algorithm in a function but system state information is not hidden rrrrrrr. sssssss. ttttttt. uuuuuuu. 1, 2 2, 3 3, 4 2, 5

Ans D 63. State True/ False 64. Object classes are not self contained. They cannot be understand on their own without reference to any super-classes 65. Designers can not reuse the inheritance graph created during analysis. 66. The need of analysis, design and implementation are all different, while the inheritance graphs may be similar, they rarely identical. vvvvvvv. 1 & 2 are True wwwwwww. 2 & 3 are True xxxxxxx. 1 & 3 are true yyyyyyy. all are True Ans C 67. State True/ False 68. Refactoring improves the design of software 69. The cost of software maintenance usually exceeds the cost of software development. a. Both are true b. 1 is true c. 2 is true

d. Both are false Ans A 70. Which of the following are the testing objectives? 71. Testing is a process of executing a program with the intent of finding an error 72. Testing is a process in which program is executing to get the result. 73. A good test case is one that has high probability of finding an as-yet-undiscovered error. 74. A good test is one that has low probability of finding an as yet-undiscovered error. 75. A successful test is one that uncovers an as yet undiscovered error. a. 1, 2, 3 b. 1, 2, 4 c. 1, 3, 5 d. 2, 4, 5 Ans C 76. State true/ false 77. The more we control the software, the more testing can be automated and optimized. It is controllability 78. By controlling the scope of testing, we can more quickly isolate problems and perform smarter re-testing It is simplicity zzzzzzz. Both are correct statement aaaaaaaa. 1 is correct bbbbbbbb. 2 is correct cccccccc. Both are incorrect Ans B 79. Black-Box Testing attempt to find errors in the following categories 80. Incorrect or missing functions 81. Undetermined errors. 82. Interface or missing Errors 83. Errors in data structures or external data base access, 84. System Errors 85. Behavior or performance errors 86. Initialization and termination errors. dddddddd. 1, 2, 3, 4, 5 eeeeeeee. 2, 4, 5, 6, 7 ffffffff. 1, 3, 4, 6, 7 gggggggg. 1, 2, 3, 4, 6 Ans C 87. State true or false 88. Verification refers to the set of activities that ensure that software correctly implements a specific function.

89. Validation refers to the different set of activities that ensures that the software that has been built is traceable to customer requirements, a. Both are true b. Both are false c. 1 is true d. 2 is true Ans A 90. After each validation test case has been conducted, one of these possible condition exist: a. The function or performance characteristics conform to specification and which are not accepted b. The function or performance characteristics conform to specification are accepted c. A deviation from specification is uncovered and a deficiency list is created. a. 1 & 2 b. 2 & 3 c. 1& 3 d. 1, 2 & 3 Ans B 91. In terms of Equivalence partitioning which of the following guideline is not used 1. If an input condition specifies a range, one valid and two invalid equivalence classes are defined 2. If an input condition requires a specific value, one valid and two invalid equivalence classes are defined. 3. If an input condition specifies a member of a set, one valid and two invalid class are used 4. If an input condition specifies a member of a set, one valid and one invalid equivalence class are defined. 5. If an input condition is Boolean, one valid and one invalid class are defined. 6. If an input condition requires a specific value, one invalid and two valid classes are defined. hhhhhhhh. 2 & 4 iiiiiiii. 1&5 jjjjjjjj. 3&6 kkkkkkkk. 2 & 3 Ans C 92. State True/false 93. Boundary value analysis is a test case design technique that complements equivalence partitioning, rather than selecting any element of an equivalenc eclass. 94. In comparison testing each version is tested with the same data to ensure that all provide identical output.

a. b. c. d.

Both are True 1 is true 2 is true Neither of the true

Ans A 95. True or false 1. Forward engineering not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system in an effort to improve it overall quality. 2. A release, which provides major new system functionality should be, followed which is mostly concerned with fault tolerance and removal. llllllll. Both are true mmmmmmmm. 1 is true nnnnnnnn. 2 is true oooooooo. Neither is true Ans B 96. State true/ false 97. Maintenance cost varies widely from one application to domain to another. 98. Modular decomposition models include data flow and object models a. Both are True b. 1 is true c. 2 is true d. neither of true Ans A 99. True/ False 100.Object interface design is concerned with specifying the details of data 101.Function oriented design conceals the details of an algorithm in a class a. Both are True b. 1 is true c. 2 is true d. neither of true Ans D 102.To identify the objects which of the proposals are not made 103.Use grammatical analysis 104.Use tangible entities 105.Use intangible entities 106.Use a behavioral approach 107.Use a functional approach 108.Use a scenario based analysis a. 1 & 2 b. 2 & 6 c. 3 & 4

d. 3 & 5 Ans D 109.The components of client server model are 110.Stand alone servers 111.Set of clients 112.Set of Network 113.Network 114.Distributed Server pppppppp. 1, 2, 3 qqqqqqqq. 2, 4, 6 rrrrrrrr. 1, 2, 4 ssssssss. 1, 3, 5 Ans D 4 Marks 115.Match the following 116.Real Time Software 117.Engineering & Scientific S/w 118.Embedded Software 119.Web Based S/w a. b. c. d. 1-A, 2-B, 3-D, 4-C 1-C, 2-A, 3-B,4-D 1-D, 2-B, 3-C, 4-A 1-D, 2-C, 3-B, 4-A

A. The web pages retrieved by a browser are s/w that in corporate executable instructions & data B. It resides only in read only memory & is used to control products & systems fro the consumer and industrial market. C. It has been characterized by number crunching algorithms application range from automatic stress analysis D. S/w that monitors and analyses controls real world events as they occur.

Ans D 120.Order the steps involved in statistical testing tttttttt. Apply the test cases to the program, recording the amount of execution time between each observed system failure uuuuuuuu. Select or generate a set of test data corresponding to the operational profile. vvvvvvvv. Determine the operational profile of the software. This can be determined by analyzing historical data to discover the different classes of input to the program and the probability of their occurrence.

wwwwwwww. have been observed. a) b) c) d) 1-2-3-4 1-4-3-2 2-1-3-4 3-2-1-4

After a statistically significant number of failures

Ans D 121.The contract between the two components can be described in the following way 122.The client component ensures that the dictionary is not full and that the key is nonempty 123.The supplier component records the element in table 124.The client component record the element in table 125.The client component accesses the updated table where element appears 126.The supplier component accesses the updated table where element appears. 127. If the table is full or the key is empty, no action is taken. xxxxxxxx. yyyyyyyy. zzzzzzzz. aaaaaaaaa. Ans C 128.Four aspect of software reuse are 129.Software development with reuse 130.Software development for reuse 131.Sub-System Reuse 132.Generator based reuse 133.Application system reuses 134.Function reuse a. b. c. d. 1, 2, 3, 4 1, 2, 4, 5 1, 2, 4, 6 1, 3, 4, 5 1, 2, 3, 4 2, 3, 4, 6 1, 2, 4, 6 1, 3, 4, 5

Ans B 135.Which of the following is not the condition for software development with reuse: bbbbbbbbb. The cost of findings an appropriate component in this catalogue must be relatively low. ccccccccc. The document should not include any information about where components have been reused and any reuse problems, which have been found. ddddddddd. All components in an organizations catalogue should be certified to confirm that they have reached some quality standards.

eeeeeeeee. The components must have associated documentation to help the re-user understand them an adapt them to a new application. a. 1, 2, 3 b. 1, 2, 4 c. 1, 2, 4 d. 1, 3, 4 Ans D 136.Match the following 1.Process Modeling A. RAD uses third generation PL. The RAD process works to reuse the existing program Components (when possible) or create reusable components(when necessary) B. Here the Information flow which would have been defined as part of the business modeling phase is refined into asset of data objects C. The data objects defined in the data modeling phase re transformed to achieve the information flow necessary to implement a business function D. New components are tested and all interfaces are fully exercised in this.

2. Application Generation

137.Data Modeling

138.Testing and Turnover a. b. c. d. Ans B 139.Match the following 1. Configuration Management Planning 2. Change Management 3. Version & Release Management 4. Software Reengineering 1-A, 2-B, 3-D, 4-C 1-C, 2-A, 3-B,4-D 1-D, 2-B, 3-C, 4-A 1-D, 2-C, 3-B, 4-A

A. It is the process of identifying and keeping track of different versions & releases of a system. B. it is concerned with taking existing legacy systems and re implementing them to make it more maintainable C. It takes over control of systems after they have been developed. D This process come in to effects when the software or associated documentation is put under the control of the

configuration management team a. b. c. d. Ans D 140.Match the following 1. Task Testing 2. Behavioral Testing A. Once errors in individual tasks and in system behavior have been isolate, testing shifts to time-related errors B. Test data provided when a real-time system is one system is in one state will result in proper processing, while the system is in a different state may lead to error. C. These analysis activities can serve as the basis for the design of test cases that are conducted when the real-time software has been built D. This testing uncovers errors in logic and function but not timing or behavior 1-A, 2-B, 3-D, 4-C 1-C, 2-A, 3-B,4-D 1-D, 2-B, 3-C, 4-A 1-C, 2-D, 3-A, 4-B

3. Testing for Real-Time System

4. Intertask Testing a. b. c. d. 1-A, 2-B, 3-D, 4-C 1-D, 2-C, 3-B,4-A 1-D, 2-B, 3-C, 4-A 1-C, 2-D, 3-A, 4-B

Ans B 141.Arrange the steps involved in back to back testing: 142.Automatically compare the files produced by the modified and unmodified program versions. 143.Prepare a general-purpose set of test case. 144.Run one version of the program with the same test cases and save the results in more than one files. 145.Run another version of the program with the same test cases, saving the results to a different file. fffffffff. 1, 2, 3, 4 ggggggggg. 2, 1, 3, 4 hhhhhhhhh. 2, 3, 4, 1 iiiiiiiii. 2, 4, 1, 3 Ans C 146.Match The following : 147.Top down Integration A. It is the activity that helps to ensures that changes do not introduce unintended behavior 148.Bottom up Integration B. In this testing focuses on the external

149.Regression Testing 150.Acceptance Testing jjjjjjjjj. kkkkkkkkk. lllllllll. mmmmmmmmm. Ans A 151.Match the following 1. Broadcast Models 2. Interrupt Driven Models 3. Object Oriented Model 4. Data flow Models nnnnnnnnn. ooooooooo. ppppppppp. qqqqqqqqq.

behavior of the system, the internal logic of the program is not emphasized. C. It begins construction and testing with atomic modules D. It is an incremental approach to construction of program structure. 1-C, 2-D, 3- A, 4-B 1-A, 2-B, 3-D, 4-C 1-D, 2-C, 3-B, 4-A 1-C, 2-D, 3-A, 4-B

A. These ate exclusively used in real time systems where an interrupt handler detects external interrupts. B. In this system is decomposed in to functional modules, which accept, input data and transform it, in some way to output data C. The system is decomposed into a set of communicating objects. D. In these models, an event is, in principle, broadcast to all subsystem 1-C, 2-D, 3- A, 4-B 1-A, 2-B, 3-D, 4-C 1-D, 2-A, 3-C, 4-B 1-C, 2-D, 3-A, 4-B

Ans C 152. The system documents include 1. A document describing the errors only in the system. 2. For each component, a specification and design description. 3. Validation documents describing how each program are validated and how the validation information relates to the requirements. 4. A system maintenance guide that describes known problems with the system and that describes parts of the system are hardware and software dependent. 5. Errors which occurred in the system a. b. c. d. 2, 4, 5 1, 3, 5 2, 3, 4 1, 3, 4

Ans C

153.In DFDs match the following 1. Rounded Rectangle 2. Circles 3. Rectangles 4. Arrows rrrrrrrrr. sssssssss. ttttttttt. uuuuuuuuu.

A. Represent data stores B. Represent user interactions with the system which provide input or receive output C. Show the direction of data flow. D. Representation functions, which transform inputs to outputs. 1-A, 2-B, 3-D, 4-C 1-D, 2-A, 3-C, 4-B 1-C, 2-D, 3-A, 4-B 1 - D, 2 -B, 3- A, 4-C

Ans D 154.True/False In structural decomposition 155.A function is represented on a structure chart as a rounded rectangle 156.Inputs and outputs are indicated with annotated arrows. 157.Data stores are shown by rectangles 158.An arrow leaving a box implies output. a. All are true b. 1, 3, 4 are true c. 2 is true d. 3, 4 are true Ans C 159.In version management the capabilities include are and explained as 160.Version and release IdentificationA. All of the changes made to a particular system or component 161.Controlled Change B. Used reduce the storage space required by different versions which are largely the same version management system provide storage management 162.Storage Management C. In this versions of components must be checked out explicitly for change. 163.Change History Recording D. managed versions may be assigned identifiers automatically when they are submitted to the system vvvvvvvvv. 1-A, 2-B, 3-D, 4-C wwwwwwwww. 1-D, 2-A, 3-C, 4-B xxxxxxxxx. 1-C, 2-D, 3-A, 4-B yyyyyyyyy. 1 - C, 2 -D, 3- B, 4-A

Das könnte Ihnen auch gefallen