Sie sind auf Seite 1von 133

Max length

Answer: qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjk


l
2 most fundamental types of software product:
Answer: Generic products. Customized products.
3 most general paradigms of software development:
Answer: Iterative development. Waterfall approach. Component-based software eng
ineering
3 most important key challenges facing software engineering:
Answer: Heterogeneity challenges. Delivery challenges. Trust challenges
4 essential attributes of good software:
Answer: Maintainability. Dependability. Efficiency. Usability
The principal components of a software engineering method:
Answer: Process guidance. Recommendations. System model descriptions. Rules
The question no longer concerns the modern software engineer:
Answer: Why does computer hardware cost so much?
The most fundamental activities in software processes:
Answer: Software specification, software development, software validation, soft
ware evolution
Software engineering methods:
Answer: System models, notations, rules, design advice and process guidance.
Software engineering is:
Answer: Concerned with all aspects of software production from specification to
system maintenance
Computer science concern with:
Answer: Theories and methods that underlie computers and software systems
Meaning of CASE:
Answer: Computer Aided Software Engineering
The economies of all undeveloped nations are dependent on software:
Answer: False
Software process is a simplified representation of a software process model, pre
sented from a specific perspective:
Answer: False
2 types of evolutionary development:
Answer: Throw-away prototyping. Exploratory development
3 important stages in the testing process:
Answer: Component ( or unit ) testing.Integration testing.Acceptant testing
3 fundamental software process frameworks that are used to create specific softw
are processes:
Answer: Evolutionary development.Component-based software engineering.The waterf
all model

4 development stages in CBSE:


Answer: Systemdesignwithreuse.Dev and integration.Require modification. Componen
t analysis
4 sectors in each loop in Boehm s spiral model
Answer: Development and validation. Planning. Objective setting. Risk assessment
and reduction
4 advantages of using incremental development and delivery
Answer: More extensive testing.. Early incre serve .. Early delivery of critica
l..Lower risk of overall project failure
4 most fundamental activities that are common to all software processes
Answer: SW evolution. SW specification. SW validation. SW design and implementat
ion
The principal requirements engineering activities:
Answer: Require elicitation&analysis. Require specification. Require validation.
Feasibility study
The prototyping model of software development is:
Answer: A useful approach when a customer cannot define requirements clearly
The spiral model of software development:
Answer: Includes project risks evaluation during each iteration
First step in risk management process:
Answer: Risk identification
First activity of project management:
Answer: Proposal writing
3 most important differences between software project management and other types
of project management
Answer: There re no standard for SW.. Large SW proj are often one-off ..The softwa
re is intangible
3 related categories of risk:
Answer: Business risk. Product risk. Project risk
The following are considered a player in the software process:
Answer: Customers. Project manager. End-users
Effective software project management focuses on:
Answer: Performance. Process. Product. People
The activity does a software project manager need to perform to minimize the ris
k of software failure is:
Answer: Define milestones and track progress
The project plan sets out:
Answer: The resources available to the proj. The work breakdown. A schedule for
the work
Included in a quality plan:
Answer: The quality procedures and standards that should be used in a project
Milestone is:
Answer: The end-point of a process activity

Functional requirements:
Answer: Statements of services the system should provide how the system should r
eact to particular inputs and how the system should behave in particular situati
ons
Domain requirements:
Answer: Requirements that come from the application domain of the system and th
at reflect characteristics of that domain
Non
functional requirements:
Answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standard, etc
3 types of non
functional requirement
Answer: Product requirements External requirements Organization requirements
5 requirements document sections suggested by the IEEE standard:
Answer: General description.Specific requirements.Introduction.Appendices.Index
The followings belong to external requirements
Answer: Interoperability requirements. Legislative requirements. Ethical require
ments
Problems can arise when requirements are written in natural language
Answer: Requirement confusion. Requirement amalgamation. Lack of clarity
User requirement
Answer: Statements in natural language plus diagrams of the services the system
provides and its operational constraints. Written for customers
System requirements
Answer: A structured documents setting out detailed descriptions of the system s
function, services and operational constrains
The software requirements document
Answer: The official document that defines the requirements that should be imple
mented by the system developers
Construct a system model, the engineer should consider one of the following rest
raining factors
Answer: Assumptions and constrains
Described in a semantic data model
Answer: The logical structure of the data processed by a system or managed by a
database
Described in a context model
Answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment
Described in a state machine model
Answer: How the system responds to external events
The model types does NOT represent software architecture
Answer: Data model
The following is NOT an area of concern in the design model

Answer: Project scope


These is a characteristic of a good design
Answer: Implements all requirements in the analysis model
Different object models may be developed
Answer: Object aggregation models. Object behavior model. Inheritance models
In the UML, a (an) is represented as named rectangle with two sections. The obje
ct attributes are listed in the top section. The operations that are associated
with the object are set out in the bottom section.
Answer: Object class
The components of an object class definition in the UML
Answer: The name of the obj class.The attributes of the class.The operations or
methods associated with the class
Perspectives may be used for system modeling
Answer: A structural perspective. An external perspective. A behavioral perspect
ive
These statements about State Machine Models are NOT true
Answer: Widely used in database design. Used to describe the logical structure o
f data processed by the system
These statements about Semantic Data Model are NOT true
Answer: These model .. to external and internal events.They show the system s .. s
timuli..used for modeling real-time systems
4 weaknesses of structured methods
Answer: ..produce too much.They do not support.. The models produced..They rarel
y include guidelines to help users decide if they can be used in particular area
UML analysis modeling focuses on the
Answer: User model and structural model
2 principle styles used for modular decomposition
Answer: Object-oriented decomposition. Function-oriented pipelining
4 fundamental questions that should be addressed in architectural design
Answer: How will..How should..Is there a generic. What architectural style or st
yles are appropriate
Advantages of object model
Answer: The objects. OO implementation languages. Objects are loosely coupled so
their implementation can be modified without affecting other objects
Advantages of repository model.
Answer: Efficient way to share..Sharing model is published.. Sub-systems need..C
entralised management e.g. backup, security, etc
Advantages of pipeline model
Answer: Intuitive organization for..Supports transformation..Easy to add new tra
nsformations
Advantages of explicitly designing and documenting a software architecture
Answer: It encourages a detailed..It improves the stakeholder com..It helps with
large-scale reuse

The fundamental characteristic of a repository model


Answer: Shared data is may be accessed by all sub-systems.Shared data is held in
a central database or repository
The system organized in a client-server model
Answer: A set of services is provided by servers and clients access and use the
se services
The characteristics of Interrupt-driven systems
Answer: Allows fast response. Used in real-time systems
These statements about architectural design are true
Answer: Represents the link..Often carried out in..It involves identifying majo
r system components and their communications

Unlike structured analysis, top-down decomposition and consideration of End-to-e


nd processing sequences are not present when OOA is used
Answer: False
Object-oriented analysis is concerned with developing an object-oriented model o
f a software system to implement the identified requirements
Answer: False
Active objects typically include an infinite loop so thay they are always carryi
ng out the computation
Answer: True
Object oriented approach does not facilitate design evolution
Answer: False
3 layers in the architectural model of the weather station system
Answer: The interface layer. The instruments layer. The data collection layer
3 design models that are part of the UML
Answer: Sequence model. Subsystem model. State machine model
4 approaches that may be used to identify object classes
Answer: Use scenario-based..Grammatical analysis..Use an approach .. Identify ta
ngible things in the application domain

5 key stages in an object-oriented design process


Answer: Specify object..Design the..Identify the..Develop design..Understand and
define the context and use of the system
Advantages of inheritance
Answer: The inheritance..It is a reuse mechanism.. It is an abstraction mechanis
m which may be used to classify entities
The stages in an object-oriented development process
Answer: Object-oriented program. Object-oriented design. Object-oriented analys
is
The system context and model of use
Answer: The model of use is a dynamic ... The system context is a static model o
f the other systems in the environment of the system being designed

3 ways that a software prototype may be used


Answer: To explore..To help with the elicitation.. To run back-to-back tests wit
h the implemented system
3 important characteristics of extreme programming
Answer: Test-first development. Pair programming. Requirements expressed as scen
arios
Tool are normally included in a RAD environment
Answer: An interface generator. A database programming .. A report generator. Li
nks to office applications
The key benefits of prototyping found in Gordon and Bieman study
Answer: Improved system usability..Improved system quality..Reduced development
effort
Advantages of pair programming
Answer: It serves as an informal ..It supports the idea of..It helps support ref
actoring
Advantages of using an incremental approach to software development
Answer: Accelerated delivery of customer services, user engagement with the syst
em
Test-first development
Answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system
Visual programming
Answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons
These statement about the differences between incremental development and protot
yping
Answer: Incremental development starts with[best understood] ..Prototyping start
s with [not well-understood]
2 main approaches to concept reuse
Answer: Generative programming. Design patterns
3 types of program generator
Answer: Code generators.Parser and lexical analyses generators.Application gener
ators
3 possible classes of application framework
Answer: Middleware integration .. Enterprise application .. System infrastructur
e frameworks
3 reuse types in Reuse-based software engineering
Answer: Component reuse. Object and function reuse. Application system reuse
4 types of specialization of software product lines
Answer: Environment specia.. Functional .. Process .. Platform specialization
4 essential elements of a design pattern

Answer: A solution description.A statement of the consequences .. A description


of the problem and when the pattern can be applied. A meaningful name
The design choices have to be made when reusing COTS products
Answer: Which COTS products ... What features of a product .. How will ..product
s
The following is NOT one of the issues that form a basis for design for reuse
Answer: Object-oriented programming
The main problem software reuse
Answer: Lack of tool support. Increased maintenance costs
List the main problems with software reuse
Answer: Lack of tool support. Increased maintenance costs
The main benefits of software reuse
Answer: Effective use of specialists..Accelerated deve..Reduced process risk. In
creased dependability
One of the key problems in software reuse is the inability to find existing reus
able design patterns when hundreds of candidates exist
Answer: True

2 complementary goals of the testing process


Answer: To demonstrate that the software meets its .. To discover faults or defe
cts in the software
3 approaches may be used when designing test cases
Answer: Requirements-based testing. Partition testing. Structural testing
3 important classes of interface errors
Answer: Interface misuse. Interface misunderstanding. Timing errors
Type of test would you perform to accept a build
Answer: User acceptant test
Acceptance tests are normally conducted by the
Answer: End users
Tests should be included in object class testing
Answer: Tests that set and access .. Test for all operations .. Tests that force
the object into all possible states
The purpose of defect testing
Answer: To discover faults that make software s behavior incorrect
The best reason for using independent software test teams is
Answer: A test team will test the software more thoroughly
The common limitation of automated testing
Answer: They are not useful when requirements are changing frequently
The normal order of activities in which software testing process is
Answer: Design test cases>Prepare test dt>Run program with test dt>Compare resul
ts to test cases

The following strategic issues needs to be addressed in a successful software te


sting process
Answer: Specify requirements in a quantifiable manner. Conduct formal technical
reviews prior to testing

2 types of CM workbench
Answer: Integrated workbenches. Open workbenches
3 basic techniques for component identification
Answer: Version numbering. Change-oriented identification. Attribute-based ident
ification
New versions of software system are created as they change
Answer: Offering different .. Tailored for particular user .. For different mach
ines/OS
Facilities might be provided in system building CASE tools
Answer: A dependency specification..Tool selection and..Distributed compilation.
Derived object management
The objectives of change management procedures
Answer: Approving changes .. Tracking which components.. Analyzing the costs and
benefits of proposed changes
The primary purpose of configuration status reporting is to
Answer: Make sure that change information is communicated to all affected partie
s
Software systems are subject to continual change requests
Answer: From developers. From users. From market forces
Which formal activity, the software configuration audit is conducted by the
Answer: Quality assurance group
Release is
Answer: An instance of a system which is distributed to users outside of the dev
elopment team
Variant is
Answer: An instance of a system which is functionally identical but non-function
ally distinct from other instances of a system
Version is
Answer: An instance of a system which is functionally distinct in some way from
other system instances

3 complementary strategies to achieve survivability


Answer: Recognition. Recovery. Resistance
3 levels of protection that might be used in an information system
Answer: Application-level protection. Record-level protection. Platform-level pr
otection
4 design guidelines for secure systems engineering
Answer: Use redundancy and ... Base security decisions .. Avoid a single .. Vali
date all inputs

Vulnerability is
Answer: A weakness in a computer-based system that may be exploited to cause los
s or harm
Attack is
Answer: An exploitation of a system s vulnerability. Generally, this is from outsi
de the system and is a deliberate attempt to cause some damage
Threats is
Answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
Application security
Answer: Application security is a software engineering problem where the system
is designed to resist attacks
Infrastructure security
Answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
First stage in survivability analysis
Answer: Review system requirements and architecture
Security risk management involve
Answer: Preliminary risk assessment. Life cycle risk assessment
What is visual programming
Answer: An approach to development where a programmer manipulates graphical icon
s representing
Which of the followings belong to Server type of concurrent object implementatio
n
Answer: All of the others(the object is a parallel + the state of the obj ..)
Are the end-point of a a process activity
Answer: Milestones
What does the rapid application development concern with
Answer: An iterative approach to software development leads to faster delivery o
f software
Select the most suitable software process model for a project that are developed
at different sites
Answer: Throw-away prototyping
Are ery abstract. They do not show the nature of component relationships nor the
externally visible properties of the sub-systems. However, they useful for comm
unication with stakeholders and for project planning.
Answer: Box and line diagrams
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces and existing system
Answer: Waterfall model
Select the type of following requirement: The system shall provide appropriate vi
ewers for the user to read documents in the document store
Answer: Functional requirement

Which is the type of the following requirement:


e
Answer: User requirement

The CMS system must be easy to us

The objective of is to deliver a working system to end-users. The objective of


is to validate or derive the system requirement.
Answer: incremental development, throw-away prototyping
What should we do first when we receive a change request from out customer?
Answer: Analyse the change request
Which of the following is NOT a disadvantage of structured methods?
Answer: There are not many CASE tools that support structured methods
Another name for [ has a ] relationship is
Answer: Composition
What tests should be included in object class testing?
Answer: Tests that set and .. Tests for all operations .. Test that force the ob
ject ..
In architecture design: Using large-grain components improves system but reduces
system
Answer: Performance, maintainability
Security is a software engineering problem where the system is designed to resis
t attacks
Answer: Application
List 3 types of non-functional requirement
Answer: External requirements, Organization requirements, Product requirement
Which of the followings does NOT belong to the important differences between sof
tware project management and other types of project management?
Answer: cost of software project maintenance is higher than other type of projec
ts
Given the project activities chart as below, please define the critical path (th
e values mention in each arrow are activity name and activity duration)
Answer: AFDEI
Select correct statements about software management
Answer: Software project management is .. Good project management can totally ..
Which are THREE essential elements of design patterns?
Answer: A name that is ... A statement of the consequences .. A description of t
he problem ..
What are two phases of system testing?
Answer: Integration testing, release testing
Which of these statements about extreme programming are true?
Answer: New versions maybe built several times per day
A is a way of reusing abstract knowledge about a problem and its solution.
Answer: Design pattern
Context models are used to illustrate the operational context of a system they s
how what lies outside the system
Answer: behaviors

Consider security design for username and password protection, what is the good
design?
Answer: System users are authenticated using a login
Which process model is most appropriate for a large software project with stable
requirements?
Answer: Waterfall
Different models present the system from different perspective: perspective show
ing the system s context or environment; perspective showing the behavior of the s
ystem; perspective showing the system or data architecture.
Answer: External, Behavioural, Structural
What are the advantages of explicitly designing and documenting software archite
cture?
Answer: All of the others (improve stakeholder, encourages a detailed ..)
What can be represented by a workflow model?
Answer: The sequence of activities in the process along with ..
What do gamma et al.suggest are the four essential elements
Answer: A statement of .. A meaningful .. A solution.. A description of the prob
lem
What is not an Upper-CASE tool?
Answer: Borland C
A successful defect test is a test which causes a program to behave in normal wa
y
Answer: False
What are the advantages of pair programming
Answer: It serves as an informal .. It supports the idea of common ..
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
Answer: None of the others
Which one is not a web service standard?
Answer: WSDL
What are system requirements?
Answer: A structured document setting out detailed ..
When should you use data flow diagrams (DFD)?
Answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and opereations associated with
the problem to be solved
Answer: Object-oriented analysis.
What are characteristics of RAD processes?
Answer: System user interface .. The system is developed in a series ..
What is not a Lower-CASE tool
Answer: Junit

What perspectives may be used for system modeling?


Answer: An external perspective, A structure perspective, a behavioral perspecti
ve
What is software engineering?
answer: Software engineering is an engineering discipline that is concerned with
all aspects of software production from specification to system evolution.
What are software engineering methods?
answer: Structured approaches to software development which include system model
s, notations, rules, design advice and process guidance.
What are the three most important key challenges facing software engineering?
answer: [3]:[1]Heterogeneity[2]Delivery[3]Trust
What does the acronym CASE stand for?
answer: Computer Aided Software Engineering.
What are the most fundamental activities in software processes?
answer: [4]:[1]Specification[2]Development[3]Validation[4]Evolution
What are the principal components of a software engineering method?
answer:[4]:[1]Process guidance[2]Recommendations[3]System model descriptions[4]R
ules
Which of the following are the 2 most fundamental types of software product?
answer:[2]:[1]Customized products[2]Generic products
Which question no longer concerns the modern software engineer?
Why does computer hardware cost so much?
What are the principal requirements engineering activities?
answer:[4]:[1]Requirements elictation and analysis[2]Feasibility study[3]Require
ment specification[4]Requirement validation
What are four advantages of using incremental development and delivery?
[4]:[1]Lower risk of overall project failure[2]Early increments serve as prototy
pes to explore requirements[3]Early delivery of critical functionality to custom
er[4]More extensive testing of critical customer functionality
What are the three important stages in the testing process?
answer:Component(or unit) testing, integration testing, acceptant testing
List two types of evolutionary development?
answer:[2]:[1]Throw-away prototyping[2]Exploratory development
List the 3 fundamental software process frameworks that are used to create speci
fic software process?
answer:[3]:[1]Component-based software engineering[2]The Waterfall model[3]Evolu
tionary development
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What are the four most fundamental activities that are common to all software pr
ocesses?
answer:[4]:[1]Software validation[2]Software specification[3]Software evolution[
4]Software design and implementation

What is the first step in risk management process?


answer:Risk identification
What is a milestone?
answer: Milestones are the end-point of a process activity
What are important differences between software project management and other typ
es of project management?
answer:[3]:[1]There are no standeard for software processes[2]Large software pro
jects are often one-off projects[3]The product(software) is intangible
Which of the following are considered a player in the software process?
answer:[3]:[1]Customers[2]Project Manager[3]End-users
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Effective software project management focuses on
answer:[4]:[1]Performance[2]Process[3]Product[4]People
What activity does a software project manager need to perform to minimize the ri
sk of software failure?
answer: Define milestones and track progress
What is the first activity of project management
answer: Proposal writing
The project plan sets out
answer:[3]:[1]The resources available to the project[2]The work breakdown[3]A sc
hedule for the work
What are non-functional requirements?
answer: Constraints on the serviecs or functions offered bt the system such as t
iming constraints, constraints on the development process, standard, etc
What are functional requirements?
answer: Statements of services the system should provide how the system should r
eact to particilar inputs and how the system should behave in particular situati
ons
List the requirements document sections suggested by the IEEE standard?
answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe
ndices[5]Index
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
List 3 types of non-functional requirement
answer: [3]:[1]Product[2]External[3]Organizational
which of the following belong to external requirements?
answer:[3]:[1]Interoperability[2]Legislative[3]Ethical
What are user requirements?
answer: Statements in natural language plus diaframs of the services the system
provides and its operational constraints. Written for customers
What problems can arise when requirements are written in natural language?
answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit

y
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
What is the software requirements document?
answer: The official document that defines the requirements that should be imple
mented by the system developers
To construct a system model the engineer should consider one of the following re
straining factors?
answer: Assumptions and constraints
What described in a semantic data model?
answer: The local structure of the data processed by a system or managed by a da
tabase.
Which of these model types does not represent software architecture?
answer: Data model
Which of the following is not an area of concern in the design model?
answer: Project scope
What different object models may be developed?
answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance
models
What are the components of an object class definition in the UML?
answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o
r methods associated with the class
What perspectives may be used for system modelling?
answer: [3]:[1]Structural[2]External[3]Behavioral
What is described in a context model?
answer: The immediate external environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
What are the two principle styles used for modular decomposition?
answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining
What are advantages of object model
answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely
coupled so their implementation can be modified without affecting other objects
[3]OO implementation languages are widely uesd
What is the fundamental characteristic of a repository model
answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i
s held in a central database or repository
How is the system organized in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
Check 4 fundamental questions that should be addressed in architectural design?
answer: [4]:[1]How will the system be distributed[2]How should the system be str
uctured[3]Is there a generic application architecture that can be used[4]What ar
chitectural style or styles are appropriate

What are advantages of pipeline model


answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne
w transformations
What are advantage of explicitly designing and documenting a software architectu
re?
answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake
holder communication[3]Helps with large-scale reuse
Which of these statements about architectural design are true?
answer: [3]:[1]Represents the link between specification and design processes[2]
Often carried out in parallel with some specification activities[3]It involves i
dentifying major system components and their communications
What are the characteristics of Interrupt-driven systems
answer: [2]:[1]Allows fast response[2]Used in real-time systems
What are the advantages of repository model
answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p
ublished as the repository schema[3]Sub-systems need not be concerned with how d
ata is produced Centralised management e.g. backup, security, ect
Which of these is a characteristic of a good design?
answer: Implements all requirements in the analysis model
List the advantages of inheritance
answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo
ut domains and systems[2]It is a reuse mechanism at both the design and the prog
ramming level[3]It is an abstraction mechanism which may be used to classify ent
ities
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: [3]:[1]Interface[2]Instruments[3]Data collection
Object oriented approach does not facilitate design evolution
answer: Flase
What are the stages in an object-oriented development process?
answer: [3]:[1]Programming[2]Analysis[3]Design
What do you understand by the system context and model of use?
answer: [2]:[1]The model of use-dynamic model[2]System context-static model
Active object typically include an infinite loop so that they are always carryin
g out the computation
answer: True
Which of the following is not an area of concern in design model
answer: Project scope
List the 5 key stages in an object-oriented design process?
answer: [5]:[1]Specify[2]Design the system[3]Identify[4]Develop[5]Understand and
define
UML(unified modeling language) analysis modeling focuses on the
answer: User model and structural model
List 4 approaches that may be used to identify object classes
answer: [4]:[1]Use scenario-based analysis[2]Grammatical[3]Use an approach[4]Ide

ntify
List three design models that are part of the UML
answer: [3]:[1]Sequence[2]Subsystem[3]State
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
What tools are normally included in a RAD environment?
answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene
rator[4]Links to office applications
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What were the key benefits of prototyping found in Gordon and Bieman's studey?
answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro
ved system quality, improved maintainability[3]Reduced development effort
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
What is test-first development
When a system feature is identified, the tests of the code implementing that fea
ture are written before the code. Tests are automated and all tests are run when
a new increment is added to the system.
What are three important characteristics of extreme programming?
answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse
d as scenarios
What are the advantages of pair programming
answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c
ommon ownership and resonsibility for the code[3]Helps support refactoring
What of these statements about the differences between incremental development a
nd prototyping are true?
answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star
ts-not well-understood
Suggest three ways that a software prototype may be used?
answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac
k tests
What are the four development stages in CBSE?
answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen
t and integration[4]Component analysis
What are the 4 sectors in each loop in Boehm's Spiral model?
answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass
essment and reduction
What are three possible classes of application framework?
answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr
ucture

List the main problems with software reuse


answer: [2]:Lack of tool support[2]Increased maintenance costs
What are three reuse types in Reuse-based software engineering
answer: [3]:[1]Component[2]Object and function[3]Application system
One of the key problems in software reuse is the inability to find existing reus
able design patterns when hundreds of candidates exist
answer: True
What design choices have to be made when reusing COTS products?
answer: [3]:[1]Which COTS products offer the most appropriate functionality[2]Wh
at features of a product will actually be used[3]How will data be exchanged betw
een different products
Which of the following is not one of the issues that form a basis for design for
reuse?
answer: Object-oriented programming
What are three types of program generator
answer: [3]:[1]Code[2]Parser and lexical analyser[3]Application
List 4 types of speciallsation of software product lines?
answer: [4]:[1]Environment[2]Functional[3]Process[4]Platform
What are the two main approaches to concept reuse?
answer: [2]:[1]Generative programming[2]Design patterns
What do Gamma et al.suggest are the four essential elements of a design pattern?
answer: [4]:[1]Solution description[2]Statement of the consequences of applying
the pattern[3]Description of the problem and when the pattern can be applied[4]M
eaningful name
What three approaches may be used when designing test cases?
answer: [3]:[1]Requirements-based[2]Partition[3]Structural
What are the two complementary goals of the testing process?
answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f
aults or defects in the software
Which type of test would you perform to accpect a build
answer: User acceptant test
Acceptance tests are normally conducted by the
answer: End users
What tests should be included in object class testing?
answer: [3]:[1]that set and access all object attributes[2]for all operations in
isolation[3]that force the object into all possible states
What is the common limitation of automated testing?
answer: They are not usefull when requirements are changing frequently
Which of the following strategic issues needs to be addressed in a successful so
ftware testing process?
answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec
hnical reviews prior to testing
What is the purpose of defect testing?
answer: To discover faults that make software's behaviour incorrect

The best reason for using Independent software test teams is that
answer: A test team will test the software more thoroughly
What is common limitation of automated testing?
answer: They are not useful when requirements are changing frequently
What are the three important classes of interface errors?
answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors
What is the normal order of activities in which software testing process is orga
nized
answer: [1]Design[2]Prepare[3]Run[4]Compare
What are three basic techniques for component identification?
answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based
New versions of software systems are created as they change
answer: [3]:[1]Offering[2]Tailored[3]For different
What facilities might be provided in system building CASE tools?
answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object
What are the objectives of change management procedures?
answer: [3]:[1]Approving[2]Tracking[3]Analyzing
When software configuration management is a formal activity, the software config
uration audit is conducted by the
answer: Quality assurance group
What is a variant?
answer: identical but non-functionally distinct from other instances of a system
The primary purpose of configuration status reporting is to
answer: Make sure that change information is communicated to all affected partie
s
What are the two types of CM workbench?
answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats
answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system

is designed to resist attacks


What are the three complementary strategies to achieve survivability?
answer: [3]:[1]Recognition[2]Recovery[3]Resistance
What is the first stage in survivability analysis
answer: Review system requirements and architecture
List 4 design guidelines for secure systems engineering?
answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al
l inputs
What are the three levels of protection that might be used in an information sys
tem?
answer: [3]:[1]Application[2]Record[3]Platform
What is infrastructure security?
answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
In Iterative development approach, which phase takes the least cost?
answer: Specification
What are generic software process models?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What is a software process model?
answer: A simplified representation of a software process, presented from a spec
ific perspective
The current trends suggest that the economies of ALL developed and developing na
tions are dependent on software
answer: True
In Waterfall approach, which phase takes the most cost?
answer: [2]:[1]Specification[2]Integration and testing
What is a software process?
answer: A set of activ ities whose goal is the development or evolution of softw
are
The distribution of the costs of software engineering NOT depends on the process
model that is used
answer: False
What are essential attributes of good software?
answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency
In Component-based software engineering approach, which phase takes the least co
st?
answer: Specification
Which is the correct sequence of the following activities in the process of Syst
em evolution?
answer: Define-Assess-Propses-Modify
What is the main difference between the Spiral model and other software processe
s models?
answer: The explicit recognition of risk in the Spiral model

What is the outputs of Requirements elicitation and analysis?


answer: System models
What is the correct sequence of the following iterations in the RUP(Rational Uni
fied Process) model?
answer: Incept-Elaborat-Construct-Transit
What is the output of Feasibility study phase in the requirements engineering pr
ocess?
answer: Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which
types of perspectives?
answer: [3]:[1]Dynamic[2]Static[3]Practice
What is the main difference between the RUP (Rational Unified Pr ocess) and othe
r software processes models?
answer: Phase are more closely related to business rather than technical concern
s
Which is the correct sequence of the following activities in the Waterfall model
?
answer: Requirement-Design-Implementation-Integration-Operation
Which is the correct sequence of the following activities in the Component-based
software engineering?
answer: Component-Requirement-Design-Development
The Waterfall approach is the BEST approach to development software when ___
answer: The software system is large and that is need developed at several sites
Three categories of risks are ___
answer: [3]:[1]Project[2]Technical[3]Business
Why many software projects are 'one-off' projects?
answer: Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure?
answer: Sets out the breakdown of the project into activ ities and identifies th
e milestones and deliverables associated with each activity
What are milestones in project planning?
answer: Milestones are the end-point of a process activity
What is the critical path?
answer: The critical path is the sequence of dependent activities that
Select the BEST statement about critical path
answer: Project manager should allocate experienced people to do the tasks on th
e critical path
What is the output of the first milestone in software requirement engineering pr
ocess?
answer: Feasibility study report document
Which is the BEST principle of project scheduling?
answer: Minimize task dependencies to avoid delays caused by one task waiting fo
r another to complete
The project schedule shows ___

answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem
ents?
answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?

answer: Class diagram-on the attributions, operations


Another name for inheritance is ___
answer: Generalization
When should you use sequence diagram?
answer: Should use sequence diagram to illustrate the sequence of steps that mus
t be performed in order to complete a task
Which models give a static view of a system?
answer: [3]:[1]Object[2]Data[3]Architectural
When should you use use-case diagram?
answer: Should use use-case diagram to represent all of the people who might use
the functionalities of the system
What are types of behavioral models?
answer: [2]:[1]Data-Flow[2]State machine
Which non-functional system requirements that the software system architecture m
ay depend on?
answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability
Select the BEST solution for architectural design of a software system that perf
ormance is a critical requirement
answer: The architectural should be designed to localise critical operations and
minimise communications, use large-grain rather thanfine-grain components
Which of the following models belong to Event-driven systems?
answer: [2]:[1]Broadcast[2]Interrupt-driven
What is the correct statement about software architectural design decisions?
answer: Architectural design is a creative process, the activities in the proces
s differs depending on the type of system being developed
Which of the following styles belong to Control styles?
answer: [2]:[1]Centralised[2]Event-based
Which of the following styles belong to System organization?
answer: [3]:[1]Repository[2]Client-server[3]Abstract machine
What is the correct statement about software architectural styles?
answer: Most large systems are heterogeneous architectur al styles
What is the correct statement about software architectural design?
answer: The architectural design is normally expressed as a block diagram presen
ting an overview of the system structure
Which of the following models belong to Centralised control?
answer: [2]:[1]Call-return[2]Manager
What are advantages of explicitly designing and documenting software architectur
e?
answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse
What are the models in architecture design?
answer: [5]Static-Dynamic-Interface-Relationship-Distribution
What are three general architectural styles?
answer: [1]System organisation[2]Decomposition styles[3]Control styles

Another name for * is a + relationship is ___


answer: Generalization
Which is the correct statement about coupling?
answer: Coupling deals with interactions between objects or software components
Which is NOT a primary goal in the design of the UML?
answer: Be dependent on particular programming language
What do you mean by coupling in software design?
answer: Coupling is a measure of the strength of association established by a co
nnection from one object or software component to another.
Which of the following is NOT an approach that may be used to identify object cl
asses?
answer: Use Event-based analysis
Which are object-oriented strategies?
answer: [3]:[1]Analysis[2]Design[3]Programming
Which is NOT the main activity in design process?
answer: Designing the test case
What is the purpose of analysis?
answer: The main objective of the analysis is to capture a complete, unambiguou
s, and consistent picture of requirements of the system and what the system must
do to satisfy the users requirement and needs
nother name for * has a + relationship is ___
answer: Composition
Which is NOT an advantage of inheritance?
answer: The inheritance graphs of analysis, design and implementation have diffe
rent functions and should be separately maintained.
Which is the correct statement about object identification?
answer: Object identification is an iterative process; it relies on the skill, e
xperience and domain knowledge of system designers
Which is the first stage in an object-oriented design process?
answer: Develop an understanding of the relationships between the software being
designed and its external environment
Which is the right sequence in the process of prototype development?
answer: Establish-Define-Develop-Evaluate
The practices small, frequent releases of the system, the approach to requiremen
ts description base on customer stories or scenarios in Extreme Programming fit
into which principle of agile methods?
answer: Incremental delivery
What are common principles of agile methods?
answer: [5]:[1]Customer[2]Incremental[3]People not[4]Embrace[5]Maintain
Which of the following BEST describes the major difficulties with incremental de
velopment?
answer: [4]:[1]Contractual[2]Validation[3]Management[4]Maintenance
Which of the following is NOT an advantage of using incremental development and

delivery?
answer: Systems are often have good structures
The practices regular system release, test -first development and continuous int
egration in Extreme Programming fit into which principle of agile methods?
answer: Embrace change
Which is NOT an advantage of rapid software development?
answer: Only senior programmer are capable of taking the kind of decisions requi
red during the development process
Which is the evidence when said that pair programming is as efficient as the same
number of programmers working individually ?
answer: Measurements suggest that development productivity with pair programming
is similar to that of two people working independently
What is a user story in extreme programming?
answer: It is a requirement expressed as scenario
The practices pair programming, collective ownership of the system code, and sus
tainable pace in Extreme Programming fit into which principle of agile methods?
answer: People not process
Who chooses the stories for inclusion in the next release based on their priorit
ies and the schedule estimates?
answer: Customer
In the extreme programming, what is the role of customer?
answer: To help develop stories that defines the requirements
Which part of the system can be reuse?
answer: [3]:[1]Application[2]Component reuse[3]Object and function
The trend of design process in most software engineering disciplines is base on
___
answer: Reuse of existing system or component
If the applications or components are developed in difference programming langua
ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?

answer: [3]:[1]faster[2]lower cost[3]increased software quality


Which is NOT a key factor that you should consider when planning reuse?
answer: The name of the application or component reuse
All of the following are types of program generator EXCEPT
answer: Component generators
What is the normal order of activities in which software testing is organized?
answer: [4]:[1]Unit[2]Integration[3]Validation[4]System
The main focus of acceptance testing is:
answer: testing from a business perspective
Unit testing is a __
answer: White box testing
The effort required for locating and fixing an error in an operational program i
s:
answer: Maintainability
Workbenches are also called ___
answer: All of the other choices
A program validates a numeric field as follows: values less than 10 are rejected
, values between 10 and 21 are accepted, values greater than or equal to 22 are
rejected
answer: 3,10,22
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
Which document identifies and describes the testing that will be implemented and
executed?
answer: Test case
The testing intended to show that previously correct software has not been adver
sely affected by changes is call:
answer: Regression testing
We split testing into distinct stages primarily because:
answer: Each test stage has a different purpose.
Which is the right sequence in the software testing process?
answer: Create test case-Prepare-Perform-Create
Which of the following is NOT part of configuration management?
answer: The people in the project team
Which is the change management concerned with?
answer: All of the other choices
Software systems are subject to continual change requests from ___
answer: Developers, Users, Market forces
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: effect of the change on the project schedule, cost, quality, and risks

Which of the following is the source for software version up?


answer: All of the other choices
A configuration management system would NOT normally provide:
answer: Facilities to compare test results with expected results.
What is a release?
answer: An instance of a system which is distributed to users outside of the dev
elopment team.
Who review and approves the change request?
answer: Change control board
Which of the following items would not come under Configuration Management?
answer: Live data
Which is the right sequence of the change management process?
answer: Request-Analyze-Submit-Make-Creat
Which are levels of protection in application security engineering?
answer: [3]:[1]Platform[2]Application[3]Record
Consider security design for username and password protection, what is the good
design?
answer: System users are authenticated using a login name/password combination.
Requires user change password after 2 months
What is the first stage in survivability analysis
answer: Review system requirements and architecture.
Password should be changed
answer: All of the other choices
Why do we need consider security for project?
answer: To protect the system against external attack
Which of the following design guidelines for secure systems engineering is NOT t
rue?
answer: Avoid using redundancy and diversity to reduce risk
What is the last stage in survivability analysis
answer: Identify softspots and surv ivability strategies.
All of the following are the complementary strategies to achieve survivability E
XCEPT
answer: Conversion
Which is the correct statement about integrity?
answer: Extent to which access to software or data by an unauthorized persons ca
n be controlled
Probability of a software failure is the
answer: Reliability
What was the software crisis?
answer: As more powerful hardware was introduced in the 1960s, larger software s
ystems were developed. These were usually late, unreliable, did not meet user ne
eds and cost more than expected. The problems of producing software was the soft
ware crisis.

What are the two fundamental types of software product?


answer: Generic products that are designed to meet the needs of many different c
ustomers. Customised products designed to meet the specific needs of a single cu
stomer.
What are the fundamental activities in software processes?
answer: [4]:[1]Specifiation[2]Development[3]Validation[4]Evolution
What are the three general paradigms of software development?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What are the principal components of a software engineering method?
answer: System model descriptions, rules, recommendations, process guidance.
Why is maintainability an important attribute of software?
answer: Because all software is subject to change after it goes into use and the
costs of software maintenance often exceeds the development costs of the softwa
re.
What is a software engineering code of ethics?
answer: A set of principles that set out, in a general way, standards of expecte
d behaviour for professional software engineers.
What are the fundamental activities that are common to all software processes?
answer: Software specification, software design and implementation, software val
idation, software evolution.
List the three fundamental software process frameworks that are used to create s
pecific software processes.
answer: [3]:[1]Waterfall[2]Evolutionary[3]Component-based
Why are iterations usually limited when the waterfall model is used?
answer: The waterfall model is a document-driven model with documents produced a
t the end of each phase. Because of the cost of producing and approving document
s, iterations and costly and involve significant rework. Hence they are limited.
Briefly describe two types of evolutionary development.
answer: Exploratory development where the objective of the process is to work wi
th customers to explore their requirements and deliver a final-system. Throw-awa
y prototyping where the objective is to develop a better understanding of the cu
stomer s requirements and deliver a better requirements specification.
What are the development stages in CBSE?
answer: [4]:[1]Component[2]Requirements[3]System[4]Development
What are the advantages of using incremental development and delivery?
answer: Early delivery of critical functionality to the customer.Early increment
s serve as prototypes to explore requirements.Lower risk of overall project fail
ure.More extensive testing of critical customer functionality.
What models might be developed when applying a structured method?
answer: [5]:[1]Object[2]Sequence[3]State transition[4]Structural[5]Data-flow
Why is it increasingly irrelevant to distinguish between software development an
d evolution?
answer: Few software systems are now completely new and a more realistic model o
f software development is of an iterative process that lasts for the life time o
f the software.
What are the four phases of the Rational Unified Process?

answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition.
What are the six fundamental best practices in the RUP?
answer: Develop software iteratively.Manage requirements.Use component-based arc
hitectures.Visually model software.Verify software quality.Control changes to so
ftware.
Give five examples of activities that can be automated using CASE.
answer: Graphical system modelling.Maintaining a data dictionary.Generating user
interfaces.Program debugging.Translating programs from one language to another.
What is the distinction between a CASE tool and a CASE workbench?
answer: A CASE tool supports an individual process task such as checking the con
sistency of a design. A CASE workbench supports sets of related activities such
as specification or design.
List five common project management activities.
answer: Any five from the following: proposal writing, project planning and sche
duling, project costing, project monitoring and reviewing, personnel selection a
nd evaluation, report writing and presentations.
What is included in a quality plan and a validation plan?
answer: Quality plan: The quality procedures and standards that should be used i
n a project.Validation plan: The approach, resources and schedule used for syste
m validation.
What is the difference between a milestone and a deliverable?
answer: A milestone is a recognised endpoint of some activity that represents a
decision point for a project. A deliverable is a project output that is delivere
d to the customer.
What is involved in project scheduling?
answer: Separating the total planned work in the project into separate activitie
s and judging the time required to complete these activities.
Explain how bar charts and activity networks give different views of a project s
chedule.
answer: Activity networks show the time required to complete an activity and the
dependence on activities. Bar charts show the activity timeline illustrating th
e relative length of activities and the dates when they take place.
What are three related categories of risk?
answer: [3]:[1]Project[2]Product[3]Business
Suggest
answer:
change,
hnology

four risks that may threaten the success of a software project.


Staff turnover, management change, hardware unavailability,requirements
specification delays, size underestimate, CASEtool underperformance, tec
change, product competition.

Give two examples of technology risks that may arise in a software project.
answer: The system database cannot process as many transactions as expected.Reus
ed software components are defective.
What is involved in risk monitoring?
answer: Regularly assessing the project risks to decide whether or not that the
risk is becoming more or less probable and whether the effects of the risk have
changed.
What are user requirements and system requirements?
answer: User requirements are statements in a language that is understandable to

a user of what services the system should provide and the constraints under whi
ch it operates.System requirements are more detailed descriptions of the system
services and constraint, written for developers of the system.
What is the distinction between functional and non-functional requirements?
answer: Functional requirements define what the system should do. Non-functional
requirements are not directly concerned with specific system functions but spec
ify required system properties or place constraints on the system or its develop
ment process.
List three types of non-functional requirement?
answer: Product-Organisational-External
What is a domain requirement? Give an example.
answer: A requirements that is derived from the application domain of the system
rather than from the specific needs of system users. For example, in a train co
ntrol system, the requirement for the train braking system depends on characteri
stics of the train and the track.
What problems can arise when requirements are written in natural language?
answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation.
What is the distinction between the terms.'shall' and 'should' in a user require
ments document?
answer: Shall normally indicates a mandatory requirement Should indicates a desirabl
e but not essential requirement
Why is it impossible to completely separate system requirements and design?
answer: The system architecture may have to be designed to structur e the requir
ements specification. Existing systems constrain the design and these constr ain
ts are requirements. The use of a specific architecture may be a requirement for
business or regulatory reasons.
What are the main advantages of using a standard format to specify requirements?
answer: All requirements have the same format so are easier to read.The definiti
on of form fields mean that writers are less likely to forget to include informa
tion.Some automated processing is possible.
What are three types of interface that may have to be defined in a requirements
document?
answer: [1]Procedural interfaces[2]Data structures[3]Representations of data
What are the two main types of event-driven control models?
answer: Broadcast models where an event is broadcast to all sub-systems Interrup
t-driven models where external events are detected and processed by an interrupt
handler
What is a reference architecture?
answer: An abstract model of a system class that can be used to inform designers
about the general structure of that type of system.
What is the distinction between validation and verification?
answer: Validation: Are we building the right product?/Verification: Are we buil
ding the product right?
What are the two complementary approaches used for checking and analysis?
answer: Software testing/Software inspections or peer reviews.
What are the principal sections included in a test plan?The testing process.
answer: Requirements traceability/Tested items/Testing schedule/Test recording p

rocedures/Constraints/Hardware and software requirements/


What are the advantages of inspections over testing?
answer: 3/Inspections can discover many errors. In testing, one error may mask a
nother/Incomplete versions of a system can be inspected/Inspections can consider
broader quality attributes as well as program defects
What are the stages in the software inspection process?
answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow
-up
List the classes of faults that should be considered in an
answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte
rface faults/Storage management faults/Exception management faults
What is automated static analysis
answer: A process where an analysis program examines the source code looking for
possible anomalies. These are drawn to the inspector s attention as they may repr
esent faults in the program
What are the main argument for the use of formal specification and verification?
answer: Formal specification forces a detailed analysis of the requirements so r
eveals errors and anomalies. Formal verification demonstrates that the program m
eets its specification so implementation errors do not compromise dependability
Why do formal specification and verification not guarantee reliability?
answer: 3/The specification may not reflect the real requirements of users/The p
roof may contain errors/The proof may assume a usage pattern which is incorrect.
What are the five key strategies used in cleanroom development?
answer: Formal specification/Incremental development/Structured programming/Stat
ic verification/Statistical testing
What is the distinction between application and infrastructure security?
answer: 2/Application security the application is designed to resist attacks/Inf
rastructure security the software is configured to r esist attacks
Define the security terms vulnerability and asset Vulnerability
answer: A weakness in a computer system that MAY be exploited to cause loss or h
arm/Asset: A system resource that has a value and so should be protected
What is security risk management?
answer: Security risk management is concerned with assessing the possible losses
that might ensue from attacks on assets in the system and balancing these losse
s against the costs of security pr ocedures that may reduce the losses.
What are the stages of preliminary risk assessment?
answer: Asset identification/Asset value assessment/Exposure assessment/Threat i
dentification/Threat probability assessment/Control identification/Feasibility a
ssessment/Security requirements definition
Suggest two possible vulnerabilities when login/password
answer: authentication is used.Users set guessable passwords/Authorised users re
veal their passwords to unauthorised users, perhaps through some social engineer
ing process
What fundamental issues have to be considered when designing system architecture
for security?
answer: 2/Protection: How should the system be organised so that critical assets
can be protected against an external attack/Distribution: How should system ass

ets be distributed so that the effects of a successful attack are minimised


What are the three levels of protection that might be used in an information sys
tem?
answer: Platform-level protection/Application-level protection/Record-level prot
ection
List four design guidelines for secure systems engineering.Base security decisio
ns on an explicit security policy
answer: Avoid a single point of failure/Use redundancy and div ersity to reduce
risk/Validate all inputs
Why is it important to design for deployment
answer: Because many security vulnerabilities are introduced when the system is
configured for use in its deployment environment
What deployment support may be included in a system?
answer: Support for viewing and analysing configurations/Default privilege minim
isation/Configuration setting localisation/Easy ways to fix security vulnerabili
ties
What are the three complementary strategies to achieve survivability
answer: Resistance/Recognition/Recovery
List the stages in survivability analysis.Review system requirements and archite
cture
answer: Identify critical services and components/Identify attacks and compromis
able components/Identify softspots and survivability strategies
Which system model is described in the following graphic
answer: Data-flow models
Change request is proposal due to ___
answer: all: Market forces/Customers/Developers
What's the difference between functional and non-functional requirements?
answer: none:The functional requirement is described in details, the other is de
scribed in high-level abstract/The functional requirement describes system prope
rties and constraints, the other describes system services
What are the user requirements?
answer: The statements in a natural language plus diagrams that describe the ser
vices' system and their constraints
Suggest a most appropriate software process model that migh t be used as a basic
for managing the developing of the software system that support categorizing go
ods based on consumption pattern, tracking payments from the customers
answer: The waterfall model
How is the system organized in a client-server model?
answer: none:A set of services is provided by servers and clients access and use
these services/A set of services is provided by clients and servers access and
usethese services
Which of the following statements about the differences between integrating test
ing and component testing are true?
answer: The integrating testing test the result of the component while the compo
nent testing test its internal structure
Which of the following statements about project management is true?

answer: The intangibility of software systems poses special problems for softwar
e project management
What are the distinctions between an object and an object class?
answer: all: The object includes state variables and operations on that state as
defined in the object class definition/An object is created at run-time by inst
antiating an object class
Which of the following is NOT a disadvantage of structured methods?
answer: There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software
answer: True
If performance is a critical requirement the architecture should be designed to
answer: localize critical operations and minimize communications; use large rath
er than fine-grain components
Which of the following does NOT belong to important principles of agile methods?
answer: Process not people
What are the advantages of explicitly designing and documenting software archite
cture?
answer: all: It improves stakeholder communications/It encourages a detailed ana
lysis of the system
Which of the following statements about test first dev elopment are true?
answer: all:When a system feature is identified, the tests of the code implement
ing that feature are written before the code/Tests are automated and all tests a
re run when a new increment is added to the system
What is the problem that cannot arise when requirements are written in natural l
anguage?
answer: Lack of user's understandability
All of the fallowings are main benefits of software reuse EXCEPT
answer: Reduce maintenance costs
Which of the following statements about testing is NOT true?
answer: Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing
is NOT true?
answer: The integration team does NOT have access to the source code of the syst
em.
Which of the following statements about Enterprise Resource Planning (ERP) syste
ms is NOT true?
answer: Enterprise Resource Planning systems are very widely used
What is the second stage of risk management process?
answer: Risk analysis
Both the waterfall model of the software process and the prototyping model can b
e accommodated in the spiral process model.
answer: True
Which of the following is a type of software process model that represents the r
oles of the people involved in the software process and the activities for which
they are responsible?

answer: An role/action model


What does computer science concern with?
answer: Computer science is concerned with theories and methods that underlie co
mputers and software systems
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Which of the followings belong to Server type of concurrent object implementatio
n
answer: The object is a parallel process with methods corresponding to the objec
t operations. Methods execute in response to external requests
What is meant by configuration management
answer: The dev elopment and use of standards and procedures for managing an evo
lving software system
Which of the following statements about Service-oriented software engineering is
true?
answer: Service-oriented software engineering is based on the notion that progra
ms can be constructed by composing independent services that encapsulate reusabl
e functionality
Which of the fallowings does NOT belong to the important differences between sof
tware project management and other types of project management?
answer: Cost of software project maintenance is higher than other type of projec
ts
is concerned with developing an oriented system model to implement requirements
answer: Object-oriented Analysis
What are system requirements
answer: A structured document setting out detailed descriptions of the system's
functions, services and operational constraints
What key factors should be considered when planning reuse?
answer: all: The development schedule for the software/The expected software lif
etime/The background, skills and experience of the development team
Applications frameworks are collections of concrete and abstract objects that ar
e designed to be reused through specialization and the addition of new objects
answer: true
All of the following are the main benefits of software reuse EXCEPT
answer: Reduce maintain cost
Which of the following statements about Equivalence partitioning are NOT true?
answer: none
Which of these statements about extreme programming are true?
answer: New versions may be built several times per day
Which of the following are the testing process goals
answer: all:Discover faults or defects in the software/The check that the softwa
re meets its requirements
Which of the following statements about service interfaces is true
answer: all: Service interfaces are defined in an XML-based language called WSDL
/A WSDL specification includes a definition of the interface types and operation

s, the binding protocol used by the service and the service location
Which of the following statements about security is NOT true?
answer: Security threats can be threats to the only confidentiality and integrit
y of a system or its data
All of the following are stages in an object-oriented dev elopment process EXCEP
T?
answer: Object-oriented evolution
What are the components of an object class definition in the UML
answer: all:The attributes of the class/The operations or methods associated wit
h the class/The name of the object class
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces an existing system
answer: Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements do
cument
answer: a high level statement/ a detailed system specification
What are advantages of pipeline model?
answer: all: Easy to add new transformations/Supports transformation reuse/Intui
tive organization for stakeholder communication
List the requirements document sections suggested by the IEEE standard.
answer: Introduction-General-Specific-Appendices-Index.
Which of the following statements about service interfaces is true?
answer: AWSDL
What is not an Upper-CASE tool?
answer: Borland C
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?

answer: The system context is a static,themodel is a dynamic


When should you use data flow diagrams (DFD)?
answer: showing dai nhat
Which is the benefit of Service-oriented architectures?
answer: inter-organizational
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and operations associated with th
e problem to be solved
answer: Analysis
Software systems are subject to continual change requests from
answer: Developer,User
What are the characteristics of RAD processes?
answer: System,The system
What is not a Lower_CASE tool?
answer: Junit
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: dai nhat quat vao
Which of the followings belong to validation testing?
answer: To demonstrate,Asuccessful test shows
Change request is proposal due to
answer: All of the others
What is the correct sequence of the following activities in the Component-based
software engineering?
answer: 1,3,2,4
Which of the following statements about Equivalence partitioning are NOT true?
answer: None of the others
What types of system model may be developed?
answer: Data,Composition,Architectural,Classification,Stimulus/response
What is described in a context model?
answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment.
What is described in a state machine model?
answer: How the system responds to external events.
What is a semantic data model?
answer: A model that describes the logical structure of the data processed by a
system or managed by a database.
What are the components of an object class definition in the UML?
answer: name,attributes,operations or methods associated
What different object models may be developed?
answer: Inheritance,Object aggregation,Object behaviour
What is shown in an UML sequence model?

answer: The sequence of interactions between objects and actors in the system as
sociated with a single defined use-case.
What is a structured method?
answer: A systematic way of producing models of an existing system or of a syste
m that is to be built.
List four weaknesses of structured methods.
answer: They do not support non-functional,They rarely include,They tend to prod
uce,The models produced are detailed and often hard to understand.
What are the stages in an object-oriented development process?
answer: analysis,design,programming.
What is the distinction between an object and an object class?
answer: An object is created at run-time by instantiating an object class. The o
bject includes state variables and operations on that state as defined in the ob
ject class definition.
Briefly describe two types of concurrent object implementation.
answer: Servers: The object is a parallel process with methods corresponding to
the object operations. Methods execute in response to external requests.Active o
bjects: The state of the object is changed by internal operations within the obj
ect itself. The process executing these operations runs continuously.
List the five key stages in an object-oriented design process.
answer: Understand and define,Design,Identify,Develop,Specify object interfaces.
What do you understand by the system context and model of use?
answer: The system context is a static model of the other systems in the environ
ment of the system being designed. The model of use is a dynamic model that desc
ribes how the system being designed interacts with its environment.
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: interface,data collection,instruments
List four approaches that may be used to identify object classes.
answer: Grammatical,Identify,Use,Use scenario-based analysis.
Briefly describe three design models that are part of the UML.
answer: Subsystem,Sequence,State machine
What is the purpose of interface design in an OO design process?
answer: To define the signatures and semantics of the interfaces that are provid
ed by an object or group of objects.
Briefly explain why an OO approach facilitates design evolution.
answer: The internal details of an object are hidden from other objects so chang
ing these details is unlikely to have knock-on effects on other objects.
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services.User engagement with the syste
m.
What is the key difference between incremental development and prototyping?
answer: Incremental development starts with the requirements that are best under
stood and that have the highest priority.Prototyping is intended to help underst
and the requirements so starts with requirements that are not well understood.

List five important principles of agile methods.


answer: Customer,Incremental,People not,Embrace,Maintain
What are three important characteristics of extreme programming?
answer: Requirements,Pair programming.Test-first
What is test-first dev elopment?
answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system.
Briefly describe the advantage of pair programming.
answer: It supports the idea. It serves.It helps support
What tools are normally included in a RAD environment?
answer: database programming,interface generator,Links,report
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
Suggest three ways that a software prototype may be used.
answer: help with,explore software,run back-to-back
What were the key benefits of prototyping found in Gordon and Bieman s study?
answer: Improved system usability,Improved system quality,Reduced development ef
fort.
List the main benefits of software reuse.
answer: Increased,Reduced,Effective,Standards,Accelerated
List the main problems with software reuse.
answer: Increased,Lack,Not-invented-here,Creating,Finding
What key factors should be considered when planning reuse?
answer: development,expected,background,criticality,application,system
What is a design pattern and why are patterns important for reuse?
answer: A design pattern is a description of a problem and the essence of its so
lution. This solution is expressed in a generic way and can be instantiated and
reused in different settings.
What do Gamma et al. suggest are the four essential elements of a design pattern
?
answer: meaningful,solution,statement.
What is generator-based reuse?
answer: An approach to reuse where reusable knowledge is embedded in a generator
system which is programmed by domain experts to create the system. An executabl
e system is then generated.
What major software problem is addressed by aspect-oriented software development
?
answer: The problem of separation of concerns so that a software unit is designe
d to do one thing and one thing only.
What are three possible classes of application framework?
answer: System infrastructure,Middleware,Enterprise

What design choices have to be made when reusing COTS products?


answer: Which COTS products.How data.What features
List four types of specialisation of software product lines.
answer: Platform,Environment,Functional,Process
What are the two complementary goals of the testing process?
answer: demonstrate,discover
What is a successful defect test?
answer: successful defect test is one where the system s operation does not confor
m to its specification, i.e. one that exposes a defect in the system.
Briefly describe the two distinct phases of system testing.
answer: Integration,Release
What guidelines does Whittaker suggest for defect testing?
answer: Chose inputs,Design,Repeat,Force,Force
What is the function of stress testing?
answer: test,stress
What tests should be included in object class testing?
answer: Tests for all,Tests that set,Tests that force
What are the three important classes of interface errors?
answer: Interface misuse.Interface misunderstanding.Timing errors.
What three approaches may be used when designing test cases?
answer: Requirements-based,Partition,Structural
What is an equivalence partition? Give an example.
answer: A class of inputs or outputs where it is reasonable to expect that the s
ystem will behave the same way for all members of the class. For example, all st
rings with less than 256 characters.
What is path testing?
answer: A structural testing strategy whose objective is to exercise every indep
endent path through a program.
What is meant by configuration management?
answer: The development and use of standards and procedures for managing an evol
ving software system.
What is a baseline?
answer: A controlled system where changes to the system have to be agreed and re
corded before they are implemented.
What should be included in a configuration management plan?
answer: configuration,people,configuration,CM tool,schema
Why is it necessary to define a configuration item identification scheme?
answer: Because there may be thousands of source code modules, test scripts, des
ign documents, etc. in a large project. You have to be able to uniquely identify
and locate any specific item and so a unique naming scheme is required.
What information may be included in a configuration database?
answer: Information about configuration items such as data of creation, creator,
etc. Information about users of components, system customers, execution platfor
ms, and proposed changes to the system.

What are the objectives of change management procedures?


answer: To analyse the costs and benefits of proposed changes, approving changes
that are worthwhile, and tracking which components of the system have been chan
ged.
What is the role of a change control board?
answer: To assess the impact of proposed changes from a strategic and organisati
onal perspective rather than a technical perspective. They should decide if chan
ges are worthwhile and should prioritise changes to be implemented.
What is the difference between a system version and a system release?
answer: A system version is an instance of a system that differs, in some ways,
from other instances. A system release is a version that is released to customer
s.
What are the advantages of attribute-based version identification?
answer: When selecting components, you do not need to specify the version number
(an error-prone process if there are many components) but simply list the requi
red component attributes.
What may be included in a system release?
answer: executable,Configuration,Data,installation,Electronic
What are the key issues in system building?
answer: Have all,Are the right,Are all,Are,Is the
What are the key standards for web service-oriented architectures?
answer: SOAP,WSDL,UDDI,WS-BPEL
What is the definition of a (web) service?
answer: A loosely coupled reusable software component that encapsulates discrete
functionality which may be distributed and programmatically accessed. A web ser
vice is a service that is accessed using standard Internet and XML-based protoco
ls.
What are the components of a WSDL specification?
answer: interface specification,binding,location part
What is service engineering?
answer: The process of dev eloping services for reuse in service-oriented applic
ations.
What are the three fundamental types of service that may be identified?
answer: Utility services,Business services,Coordination services
What are the three stages in service interface design?
answer: Logical interface,Message design,WSDL development
What information is maintained in a UDDI description?
answer: Details of,informal description,Information on,Subscription information
How can web services be used to facilitate the use of legacy systems?
answer: The legacy system functionality is hidden by wrapping it in a web service
which is accessed by external applications. These applications therefore do not
need to know the protocols and data structures used by the legacy system.
Define software development with services
answer: The creation of programs by composing and configuring services to create
new composite services.

What is a workflow?
answer: A sequence of activities, ordered in time, that make up a coherent busin
ess processes with each activity carrying out some part of the work of that proc
ess.
What are the stages in service construction by composition?
answer: Formulate,Discover services,Select,Refine,Create,Test
What is the difference between BPMN and WS-BPEL?
answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a
lower-level XML-based language.
List five problems in testing service-oriented systems.
answer: Services,Dynamic,non-functional,Testing,Compensating
What are the advantage of explicitly designing and documenting a software archit
ecture?
answer: improves,encourages,helps
What non-functional requirements may be influenced by the choice of system archi
tecture?
answer: Performance, security, safety, availability, maintainability.
List four fundamental questions that should be addressed in architectural design
.Is there a generic application architecture that can be used?
answer: How will,What architectural,How should,What control,Etc.
What architectural models may be developed?
answer: static structural,dynamic process,interface,Relationship,distribution
What is the fundamental characteristic of a repository model?
answer: All shared data is held in a central database that can be accessed by al
l sub-systems.
How is the system organised in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services.
What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes

6. What is Not a type in Reuse-based software engineering?


answer: Software development process reuse
7. What is described in a context model?
answer: The immediate ecternal environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
8. Which of the follwing is Not a type of behavioral model?
answer: Architectual mode
9. What is correct phase related to the term "CASE" in software engineering?
answer: The software systems that provide automated support for software process
activities
10. Which of the followings does not belong to external requirements?
answer: Portability requiements
11. Which of the following is not a stage in componet - Base Software enginnerin
g
answer: System design with reuse
12. What activity does a software project manager need to perform to minimize th
e risk of software failure?
answer:Define milestones and track progress
13. What is describled in a state machine model?
answer: How the system responds to external event
14. The prototyping model of software development is
answer: A risky model that rarely produces a meaningful product
15. What is not a technique for component identification?
answer: Function-based identification
16. What is not an essential element of design patterns?
answer: A concrete design description
17. Which is NOT a problem that an arise when requirements are written in natura
l language?
answer: Lack of user's understandability
18. What is not an advantage of object model
answer: complex entities are easy to represent as objects
19. When software configuration management is a formal activity, the software co
nfiguration audit is conducted by the
answer: Senior managers
20. Who is mainly responsible for the component (unit) testing?
answer: Developer
21. Which is the purpose of data model?
answer: Describle the logical structure of data processed by the system
22. Why do we need to consider security for project?
answer: to protect the sestem against external attack
23. What is the main difference between RUP (Raditional Unified Process and othe
r processes?
answer: The construction phase is essentially concerned with system design, prog

ramming and testing


24. What are non-functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
25. Which of the following is not an advantage of pipeline model
answer: Easy to support event-based interaction
26. Which is Not an object-oriented strategy?
answer: Object-oriented deployment
27. What is a version?
answer: An instance of a system which is distributed to users outside of the dev
elopment team
28. Which of the following is not a stage in an object-oriented development proc
ess?
answer: Object-oriented programming
29. What is Not a main problem with software reuse?
answer: Not-invented-here syndrome
30. What are milestones?
answer: Milestones are end-point of a project phase
31. Which is the right sequence in project scheduling?
answer: (2)=>(1)=>(4)=>(3)
32. Which is Not a principal component of a software engineering method?
answer: Process activities
33. What is the common limitation of auto mated testing?
answer: They are not useful when rewuiement are changing frequently
34. What is the purpose of defect testing?
answer: To discover faults that make software's behavior incorrect
35. What is Not a characteristic of extreme programming?
answer: Delivery-first development
36. What is Not a component of a WSDL specification?
answer: The location part
37. What are the four essential attributes of the good software?
answer: Maintainability,dependability,efficiency,usability
38. What are the advantages of using an incremental approach to software develop
ment?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
39. One of the key problems in software reuse is the inability to find existing
reusable design patterns when hundreds of candidates exist
answer: True
40. What are functional requirements?
answer: Statement of services the system should provide how the system should re
act to particular inputs and how the system should behave in particular situatio
ns

41. Which is NOT related to a characteristic of rapid application development pr


ocesses?
answer: It is always possible to arrive at a stable, consistent set of system re
quirements
42. Which of following paradigms is not a general paradigm of software developme
nt?
answer: Rapid software development
43. What is WSDL standard?
answer: A standard for workflow languages used to define service composition.
44. Which of the following design guidelines for secure systems engineering is N
OT true?
answer: Avoid using redundancy and diversity to reduce risk
45. What is the normal order of activities in which software testing process is
organized?
answer: (2)=>(1)=>(3)=>(4)
46. Which of the following is NOT a sector in each loop in Boehm's spiral model?
answer: System design
47. What is the first stage in service construction by composition?
answer: Formulate outline workflow
48. What is NOT the advantage of repository model
answer: Sub-system need not be concerned with how data
49. Which of the following is NOT an advantage of using incremental development
and dilivery?
answer: Systems are offten have good structures
50. What is NOT an objective of change management procedures?
answer: Approving changes that are worthwhite.
51. What are the advantage of explicitly designing and documenting softwore arch
itecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with
the same data, product information, the system should be performed difference pr
esentations for correspondent departments such as Product department, Quallty de
partment and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behavioural model
answer: Semantic data models
55. The student management system was completed with two functions, managing stu
dent information and organizing quizes for review, after that the customer added
one more function, organizing online examination. Finaly all of them are put in
to the configuration management and are built for system testing, so what is the
build called?
answer: Release

56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
67. What is the firt stage in service construction by composition?
answer: Formulate outline workflow
68. List three types of program generator
answer: Application*** code*** parser and lexical
69. Which question no longer concerns the modern software engineer?
answer: Why does computer
70. What is the type of following requirement,"the result should be returned in
the real time"?
answer: Non-functional requirements
71. All of the following are advantages of pair programming EXCEPT
answer: It helps to increase
72. What is the last stage in survivabilityanalysis?
answer: Identify softspots and sur
73. How to build security for the CMS system?
answer: Building system authemtication

74. Which of these statements about defect testing is NOT true?


answer: A successful test
75. Which one is program type of the Java compite,Javac?
answer: Parser and lexical analyser generators
76. Which of following statements about software engineering is NOT true?
answer: SOftware costs more to develop than it does to maintain
How is the software engineering?
answer: a. It provides developers discipline to develop a software product
What are the ethical responsibilities of the software engineers?
answer: Software engineers should..Software engineers shall be ..Software engine
ers shall maintain integrity and independence in their professional judgment
What is the difference between software engineering and computer science?
answer: Computer science is concerned with theory and fundamentals;Software engi
neering is concerned with the practicalities of developing and delivering useful
software
Which of these statements about Software costs are true?
answer: Software costs more to maintain .. The costs of software ..Software cos
ts often dominate computer system costs
How are the prototyping development?
answer: Specification, development and..Should start with poorly ..Objective is
to understand the system requirements and clarify what is really needed
What are the most fundamental activities in software processes?
answer: Software specification, software development, software validation, softw
are evolution
Which process model is used in the Rational Unified Process?
answer: c. Iteration
Evolutionary software process models
answer: Are iterative in nature. Can easily accommodate product requirements ch
anges
The component-based development model is
answer: Works best when object technologies are available for support
How are the software project management?
answer: Consider budget and .. Consider software ..Software engineering discipl
ine is not the same as other domains
What should include in the project plan?
answer: a. Work breakdown structure
c. Project schedule d. Risk report
What should we do to manage risk?
answer: Monitor the risks throughout the .. Make contingency plans .. Risk ass
essment
Which factors should be considered in choosing the organizational structure for
a software team?
answer: Degree of communication .. Rigidity of the delivery date .. Predicted s
ize of the resulting program
One of the best ways to avoid frustration during the software development proces
s is to
answer: Give team members more control over process and technical decisions
How are the non-functional requirements?
answer: Timing constraints d. Define system properties and constraints
How are the user requirements?
answer: Non-functional requirements are .. They are tables and diagrams which c
an be understood by all users
What happen when using natural language to describe requirements?
answer: Several different requirements ..Requirements, system .. Easy to misunde
rstand between reader and writer
The system specification describes the

answer: a. Function, performance and constraints of a computer-based system


The best way to conduct a requirements validation review is to
answer: a. Use a checklist of questions to examine each requirement
How are the context model?
answer: Social and organisational concerns may ..They show what lies ..Relations
hip with other systems
Which ones relate to the behavioural model?
answer: Show the processing steps as .. Data flow diagrams are used in .. State
diagrams show states when the systems response to events
Which relationships are used in the data model?
answer: b. Association c. Aggregation d. Inheritance
UML diagram used creating a system analysis model
answer: d. Dataflow diagram
The data dictionary contains descriptions of each software
answer: b. Data object d. Control item
Which information are refered to make architectural design?
answer: Which components are distributed .. How the sub-system is .. A generic a
pplication architecture can be used
Which ones mention to the decomposition style?
answer: Data-flow model where the system is .. An object model where the system
is designed into interacting objects
Which ones mention to the control style?
Answer: One sub-system has responsibility for .. Each sub-system can respond to
externally generated events from other sub-systems
An architectural style encompasses which of the following elements?
answer: a. Set of components c. Semantic models
d. Constraints
To determine the architectural style or combination of styles that best fits the
proposed system, requirements engineering is used to uncover
answer: c. Characteristics and constraints
Which relationships are used in the object-oriented design process?
answer: a. Inheritance b. Association c. Aggregation
Which ones are used in the dynamic models?
answer: a. Active or passive objects b. Interaction relationships d. Object li
felines
How to identify objects within the system?
answer: Base on tangible things in the .. Depend on the skill, ..Base on iterati
ve scenarios
Which of the following is not a characteristic common to all design methods?
answer: c. configuration management
What types of abstraction are used in software design?
answer: a. Data c. Control d. Procedural
Which of the following traits need to exist among the members of an agile softwa
re team?
answer: b. Mutual trust and respect c. Competence d. Decision-making ability
Which of the following is not necessary to apply agility to a software process?
answer: c. Only essential work products are produced
When is the design pattern applied to?
answer: Re-use experiences .. Re-use difference settings .. Re-use abstract kno
wledge about a problem and its solution
Which ones are framework classes?
answer: System infrastructure ..Enterprise application framework Middleware in
tegration framework
Extending the framework involves
answer: Adding methods that are called in response to ..Adding concrete classes
that inherit operations from abstract classes in the framework

Adaptation in software product lines may involve


answer: Adding new .. Selecting from a ..Component and system ..Modifying compon
ents to meet new requirements
How are the system testing?
answer: Testing on integrating components..Testing on integrating ..Testing is d
one by an independent testing team
How are the component testing?
answer: b. Testing is done by component..Testing on individual program component
s to create a sub-system
Which types of testing are done by development team?
answer: a. Stress testing b. Interface testing d. Release testing
Which of the following need to be assessed during unit testing?
answer :b. Error handling d. Execution paths
Top-down integration testing has as it's major advantage(s) that
answer: a. Major decision points are tested early c. No drivers need to be writt
en
Why is the configuration management applied?
answer: Make the product development.. to evolve software product.. Aim to contr
ol the costs and effort involved in making changes to a system
Which development phases are included in the configuration management plan?
answer: a. Testing c. Design d. Implementation
Which information are included in the component header?
answer: a. Author of the component and c. Project name d. Version number and w
hat were changed
Which of the following is not considered one of the four important elements that
should exist when a configuration management system is developed?
answer: d. Human elements
Which of the following tasks is not part of software configuration management?
answer: Statistical quality control
What are the security risk management concerned?
answer: Assessing the possible losses that .. Balancing the possible losses aga
inst the costs of security procedures that may reduce these losses
How are analyse assets of the system?
answer: Set the level of exposure of .. Identify system resources..Set level of
value of each asset
What are the design guidelines to make the secure system?
answer: Raise awaremess of the security issues b. Consider as basic of a review
checklist that is applied during the system validation process
What is the first layer of system layers?
answer: c. Application
What is the last layer of system layers?
answer: c. Operation system
Which ones are related to the service-oriented architectures?
answer: Services may execute on..Protocols have been developed ..A system where
the components are stand-alone services
What are the service testing problems?
answer: Service testing is difficult. Non-functional behaviour ..External servic
es may be modified by the service provider thus invalidating tests which have be
en completed

What is the last stage in service construction by composition?


answer: d. Test service
What is the output of "Refine workflow" in Construction by composition?
answer: c. Workflow design
Which benefits of the incremental development?
answer: Meet requirements quickly ..The processes of specification..Rapid to del
ivery the highest priority functionalities to the customer

Final Exam - Ngay thi: 18.12.2009


Question 1
Marks: 1
How is the software engineering?
a. It provides developers discipline to develop a software product
b. It provides developers appropriate tools and techniques
c. It is concerned with the practicalities of delivering useful software
d. It is concerned with theory and fundamentals how to develop a softwar
e product
answer:
a. It provides developers discipline to develop a software product
Question 2
Marks: 1
What are the ethical responsibilities of the software engineers?
a. Software engineers should not misrepresent their level of competence
b. Software engineers shall be fair to and supportive of their colleague
s
c. The technical skills are set to highest priority
d. Software engineers shall maintain integrity and independence in their
professional judgment
answer:
a. Software engineers should not misrepresent their level of competence
b. Software engineers shall be fair to and supportive of their colleagues
d. Software engineers shall maintain integrity and independence in their profess
ional judgment
Question 3
Marks: 1
What is the difference between software engineering and computer science?
a. Computer science is concerned with theory and fundamentals;Software e
ngineering is concerned with the practicalities of developing and delivering use
ful software
b. Software engineering is concerned with theory and fundamentals;Comput
er science is concerned with the practicalities of developing and delivering use
ful software
answer :
a. Computer science is concerned with theory and fundamentals;Software engineeri
ng is concerned with the practicalities of developing and delivering useful soft
ware

Question 4
Marks: 1
Which of these statements about Software costs are true?
a. Software costs more to maintain than it does to develop
b. The costs of software on a PC are often greater than the hardware cos
t
c. Software costs often dominate computer system costs
d. Software costs more to develop than it does to maintain
answer:
a. Software costs more to maintain than it does to develop b. The costs of softw
are on a PC are often greater than the hardware cost c. Software costs often dom
inate computer system costs
Question 5
Marks: 1
How are the prototyping development?
a. Should start with well-understood requirements
b. Specification, development and validation are interleaved
c. Should start with poorly understood requirements
d. Objective is to understand the system requirements and clarify what i
s really needed
answer:
b. Specification, development and validation are interleaved
c. Should start with poorly understood requirements
d. Objective is to understand the system requirements and clarify what is really
needed
Question 6
Marks: 1
What are the most fundamental activities in software processes?
a. Software specification, software development, software validation, so
ftware evolution
b. Software specification, software development, software testing, softw
are evolution
c. Software specification, software development, software validation, so
ftware maintenance
d. Software requirement, software development, software validation, soft
ware evolution
answer:
a. Software specification, software development, software validation, software e
volution
Question 7
Marks: 1
Which process model is used in the Rational Unified Process (RAD)?
a. Waterfall
b. Transition
c. Iteration
d. Construction
answer:
c. Iteration
Question 8
Marks: 1

Evolutionary software process models


a.
b.
c.
d.

Are iterative in nature


A risky model that rarely produces a meaningful product
The best approach to use for projects with large development teams
Can easily accommodate product requirements changes

answer:
a. Are iterative in nature
d. Can easily accommodate product requirements changes
Question 9
Marks: 1
The component-based development model is
a.
b.
c.
d.

Not cost effective by known quantifiable software metrics


Not able to support the development of reusable components
Works best when object technologies are available for support
Only appropriate for computer hardware design

answer:
c. Works best when object technologies are available for support
Question 10
Marks: 1
How are the software project management?
a.
b.
c.
d.

No responsibility on the proposal preparation


Consider budget and schedule constraints
Consider software development process is not standardised
Software engineering discipline is not the same as other domains

answer:
b. Consider budget and schedule constraints
c. Consider software development process is not standardised
d. Software engineering discipline is not the same as other domains
Question 11
Marks: 1
What should include in the project plan?
a.
b.
c.
d.

Work breakdown structure


Architecture design
Project schedule
Risk report

answer:
a. Work breakdown structure
c. Project schedule
d. Risk report
Question 12
Marks: 1
What should we do to manage risk?
a.
b.
c.
d.
answer:

Monitor the risks throughout the project


Make contingency plans
Risk assessment
When risks happen, the suitable solutions are just generated

a. Monitor the risks throughout the project


b. Make contingency plans
c. Risk assessment
Question 13
Marks: 1
Which factors should be considered in choosing the organizational structure for
a software team?
a. Degree of communication desired
b. Rigidity of the delivery date
c. Predicted size of the resulting program
d. Size of the project budget
answer:
a. Degree of communication desired
b. Rigidity of the delivery date
c. Predicted size of the resulting program
Question 14
Marks: 1
One of the best ways to avoid frustration during the software development proce
ss is to
a.
b.
c.
d.

Give team members more control over process and technical decisions
Hide bad news from the project team members until things improve
Reward programmers based on their productivity.
Give team members more control over process and technical decisions

answer:
a. Give team members more control over process and technical decisions
Question 15
Marks: 1
How are the non-functional requirements?
a. Timing constraints
b. Statements of services should react to particular inputs
c. They come from the application domain of the system and reflect chara
cteristics of that domain
d. Define system properties and constraints
answer:
a. Timing constraints
d. Define system properties and constraints
Question 16
Marks: 1
How are the user requirements?
a. Non-functional requirements are requested by customer
b. Requirements which programmers can develop right after understanding
them
c. Functional requirements are described by system users
d. They are tables and diagrams which can be understood by all users
answer:
a. Non-functional requirements are requested by customer
c. Functional requirements are described by system users

d. They are tables and diagrams which can be understood by all users
Question 17
Marks: 1
What happen when using natural language to describe requirements?
a. Several different requirements may be expressed together as a single
requirement
b. Requirements, system goals and design information may not be clearly
distinguished
c. Easy to misunderstand between reader and writer
d. It provides the most complete information for developers
answer:a. Several different requirements may be expressed together as a single r
equirement b. Requirements, system goals and design information may not be clea
rly distinguished
c. Easy to misunderstand between reader and writer
Question 18
Marks: 1
The system specification describes the
a. Function, performance and constraints of a computer-based system
b. Implementation of each allocated system
c. Time required for system simulation
d. Element software architecture
answer:a. Function, performance and constraints of a computer-based system
Question 19
Marks: 1
The best way to conduct a requirements validation review is to
a. Use a checklist of questions to examine each requirement
b. Send them to the design team and see if they have any concerns
c. Have the customer look over the requirements
d. Examine the system model for errors
answer:a. Use a checklist of questions to examine each requirement
Question 20
Marks: 1
How are the context model?
a.
o position
b.
c.
d.
answer: a.
o position
ries
c.

Social and organisational concerns may affect the decision on where t


system boundaries
They show what lies outside the system boundaries
Relationship with other systems
They show what lies inside the system boundaries
Social and organisational concerns may affect the decision on where t
system boundaries
b. They show what lies outside the system bounda
Relationship with other systems

Question 21
Marks: 1
Which ones relate to the behavioural model?
a. Show the processing steps as data flows through a system
b. Data flow diagrams are used in performing the data exchange between a
system and other systems

c. State diagrams show states when the systems response to events


d. Semantic data describe the logical structure of data processed by the
system
answer:a. Show the processing steps as data flows through a system
b. Data
flow diagrams are used in performing the data exchange between a system and othe
r systems
c. State diagrams show states when the systems response to event
s
Question 22
Marks: 1
Which relationships are used in the data model?
a.
b.
c.
d.

Interaction
Association
Aggregation
Inheritance

answer: b. Association c. Aggregation d. Inheritance


Question 23
Marks: 1
Which of following is not a UML diagram used creating a system analysis model
a.
b.
c.
d.

Class diagram
State diagram
Activity diagram
Dataflow diagram

answer:d. Dataflow diagram


Question 24
Marks: 1
The data dictionary contains descriptions of each software
a.
b.
c.
d.
answer: b.

Notation
Data object
Diagram
Control item
Data object d. Control item

Question 25
Marks: 1
Which information are refered to make architectural design?
a.
b.
c.
d.

Which components are distributed in the system


How the sub-system is decomposed into modules
Non-functional requirements are requested by customer
A generic application architecture can be used

answer:a. Which components are distributed in the system b. How the sub-system
is decomposed into modules d. A generic application architecture can be used
Question 26
Marks: 1
Which ones mention to the decomposition style?
a. Data-flow model where the system is designed into functional modules which tr
ansform inputs to outputs

b. One sub-system has responsibility for starts and stops other sub-syst
ems
c. An object model where the system is designed into interacting objects
d. Each sub-system can respond to externally generated events from other
sub-systems
answer:a. Data-flow model where the system is designed into functional modules w
hich transform inputs to outputs c. An object model where the system is designed
into interacting objects
Question 27
Marks: 1
Which ones mention to the control style?
a. One sub-system has responsibility for starts and stops other sub-syst
ems
b. Data-flow model where the system is designed into functional modules
which transform inputs to outputs
c. Each sub-system can respond to externally generated events from other
sub-systems
d. An object model where the system is designed into interacting objects
answer:a. One sub-system has responsibility for starts and stops other sub-syste
ms c. Each sub-system can respond to externally generated events from other subsystems
Question 28
Marks: 1
An architectural style encompasses which of the following elements?
a. Set of components
b. syntactic models
c. Semantic models
d. Constraints
answer:a. Set of components c. Semantic models d. Constraints
Question 29
Marks: 1
To determine the architectural style or combination of styles that best fits th
e proposed system, requirements engineering is used to uncover
a.
b.
c.
d.

Algorithmic complexity
Control and data
Characteristics and constraints
Design patterns

answer:c. Characteristics and constraints


Question 30
Marks: 1
Which relationships are used in the object-oriented design process?
a. Inheritance
b. Association
c. Aggregation
d. Interaction

answer:a. Inheritance

b. Association c. Aggregation

Which ones are used in the dynamic models?


a.
b.
c.
d.

Active or passive objects


Interaction relationships
Object classes
Object lifelines

answer: a. Active or passive objects


t lifelines

b. Interaction relationships

d. Objec

Question 32
Marks: 1
How to identify objects within the system?
a. Base on the static and dynamic models
b. Base on tangible things in the application domain
c. Depend on the skill, experience and domain knowledge of system design
ers
d. Base on iterative scenarios
answer:
b. Base on tangible things in the application domain
c. Depend on the skill, experience and domain knowledge of system designers
d. Base on iterative scenarios
Question 33
Marks: 1
Which of the following is not a characteristic common to all design methods?
a. Notation quality assessment
b. Functional component
c. configuration management
d. Guidelines refinement heuristics
answer:
c. configuration management
Question 34
Marks: 1
What types of abstraction are used in software design?
a.
b.
c.
d.

Data
Environmental
Control
Procedural

answer:
a. Data
c. Control
d. Procedural
Question 35
Marks: 1
Which of the following traits need to exist among the members of an agile softw
are team?

a.
b.
c.
d.

None of the above


Mutual trust and respect
Competence
Decision-making ability

answer:
b. Mutual trust and respect
c. Competence
d. Decision-making ability
Question 36
Marks: 1
Which of the following is not necessary to apply agility to a software process?
a. Uses incremental product delivery strategy
b. Eliminate the use of project planning and testing
c. Only essential work products are produced
d. Process allows team to streamline tasks
answer:c. Only essential work products are produced
Question 37
Marks: 1
When is the design pattern applied to?
a. Re-use experiences of the specialists who developed reusable software
b. Re-use to develop non-functionalities
c. Re-use difference settings of the abstract knowledge
d. Re-use abstract knowledge about a problem and its solution
answer:
a. Re-use experiences of the specialists who developed reusable software
c. Re-use difference settings of the abstract knowledge
d. Re-use abstract knowledge about a problem and its solution
Question 38
Marks: 1
Which ones are framework classes?
.
a. System infrastructure framework
b. Enterprise application framework
c. Middleware integration framework
d. Parser and lexical analysing framework
answer:
a. System infrastructure framework
b. Enterprise application framework
c. Middleware integration framework
Question 39
Marks: 1
Extending the framework involves
a. Adding methods that are called in response to events that are recogni
sed by the framework
b. Adding data objects that are used in the framework
c. Adding concrete classes that inherit operations from abstract classes
in the framework
answer:a. Adding methods that are called in response to events that are recognis

ed by the framework
c. Adding concrete classes that inherit operations from
abstract classes in the framework
Question 40
Marks: 1
Adaptation in software product lines may involve
a.
b.
c.
d.
e.

Adding new components to the system


Selecting from a library of existing components
Component and system configuration
Modifying components to meet new requirements
Modifying system design to meet new requirements

answer:a. Adding new components to the system b. Selecting from a library of e


xisting components
c. Component and system configuration d. Modifying com
ponents to meet new requirements
Question 41
Marks: 1
How are the system testing?
a. Testing on integrating components to create a system or sub-system
b. Testing on integrating sub-systems to create a system
c. Testing is done by an independent testing team
d. Testing on individual program components to create a sub-system
answer:a. Testing on integrating components to create a system or sub-system
b. Testing on integrating sub-systems to create a system
c. Testing is do
ne by an independent testing team
Question 42
Marks: 1
How are the component testing?
a. Testing is done by an independent testing team
b. Testing is done by component developers
c. Testing on individual program components to create a sub-system
d. Testing on interactive among components
answer:b. Testing is done by component developers c. Testing on individual progr
am components to create a sub-system
Question 43
Marks: 1
Which types of testing are done by development team?
a. Stress testing
b. Interface testing
c. Acceptance testing
d. Release testing
answer:a. Stress testing

b. Interface testing

d. Release testing

Question 44
Marks: 1
Which of the following need to be assessed during unit testing?
a. Code stability
b. Error handling

c. Algorithmic performance
d. Execution paths
answer:b. Error handling d. Execution paths
Question 45
Marks: 1
Top-down integration testing has as it's major advantage(s) that
a.
b.
c.
d.

Major decision points are tested early


No stubs need to be written
No drivers need to be written
Low level modules never need testing

answer:a. Major decision points are tested early c. No drivers need to be writte
n
Question 46
Marks: 1
Why is the configuration management applied?
a. Make the product development more quality
b. Support to evolve software product
c. Aim to control the costs and effort involved in making changes to a s
ystem
d. Make necessary configurations for preparing software development envi
ronment
answer:
a. Make the product development more quality
b. Support to evolve software product
c. Aim to control the costs and effort involved in making changes to a system
Question 47
Marks: 1
Which development phases are included in the configuration management plan?
a.
b.
c.
d.

Testing
Deployment
Design
Implementation

answer:
a. Testing
c. Design
d. Implementation
Question 48
Marks: 1
Which information are included in the component header?
a.
b.
c.
d.

Author of the component and creation date


Pre-conditions and post conditions
Project name
Version number and what were changed

answer:
a. Author of the component and creation date
c. Project name
d. Version number and what were changed

Question 49
Marks: 1
Which of the following is not considered one of the four important elements tha
t should exist when a configuration management system is developed?
a. Validation elements
b. Process elements
c. Component elements
d. Human elements
answer:
d. Human elements
Question 50
Marks: 1
Which of the following tasks is not part of software configuration management?
a.
b.
c.
d.

Statistical quality control


Reporting / Eporting
Change control
Version control

answer:
a. Statistical quality control
Question 51
Marks: 1
What are the security risk management concerned?
a. Assessing the possible losses that might ensue from attacks on the sy
stem
b. Balancing the possible losses against the costs of security procedure
s that may reduce these losses
c. Assessing the life cycle of risks
d. Analyse assets of the system
answer:
a. Assessing the possible losses that might ensue from attacks on the system
b. Balancing the possible losses against the costs of security procedures that m
ay reduce these losses
Question 52
Marks: 1
How are analyse assets of the system?
a. Set level of vulnerabilities of each asset
b. Set the level of exposure of each asset
c. Identify system resources that have a value and have to be protected
d. Set level of value of each asset
answer:
b. Set the level of exposure of each asset
c. Identify system resources that have a value and have to be protected
d. Set level of value of each asset
Question 53
Marks: 1
What are the design guidelines to make the secure system?

a. Raise awaremess of the security issues


b. Consider as basic of a review checklist that is applied during the sy
stem validation process
c. Process guidance to develop the system more secure
d. Coding techniques to make the system more secure
answer:
a. Raise awaremess of the security issues
b. Consider as basic of a review checklist that is applied during the system val
idation process
Question 54
Marks: 1
What is the first layer of system layers?
a. Operation system
b. Reusable components and libraries
c. Application
d. Middleware
answer:
c. Application
Question 55
Marks: 1
What is the last layer of system layers?
a. Reusable components and libraries
b. Middleware
c. Operation system
d. Application
answer:
c. Operation system
Question 56
Marks: 1
Which ones are related to the service-oriented architectures?
a. Services may execute on different computers
b. Protocols have been developed to support service communication and in
formation exchange
c. Model-View-Controller
d. A system where the components are stand-alone services
answer:
a. Services may execute on different computers
b. Protocols have been developed to support service communication and informatio
n exchange
d. A system where the components are stand-alone services
Question 57
Marks: 1
What are the service testing problems?
a. Service testing is difficult as external services are 'black-boxes'
b. Non-functional behaviour of the service is unpredictable
c. External services may be modified by the service provider thus invali
dating tests which have been completed
d. Find defects and demonstrate that a system meets its functional and n
on-functional requirements
answer:

a. Service testing is difficult as external services are 'black-boxes'


b. Non-functional behaviour of the service is unpredictable
c. External services may be modified by the service provider thus invalidating t
ests which have been completed
Question 58
Marks: 1
What is the last stage in service construction by composition?
a. Refine workflow
b. Create workflow program
c. Discover services
d. Test service
e. Formulate outline workflow
answer:d. Test service
Question 59
Marks: 1
What is the output of "Refine workflow" in Construction by composition?
a. Executable workflow
b. Service specification
c. Workflow design
d. Deployable service
e. Service list
answer: c. Workflow design
Question 60
Marks: 1
Which benefits of the incremental development?
a.
velopment
b.
ent
c.
d.
r

Meet requirements quickly because users have to be involved in the de


The processes of specification, design and implementation are concurr
The system are often well structured.
Rapid to delivery the highest priority functionalities to the custome

answer:
a. Meet requirements quickly because users have to be involved in the developmen
t
b. The processes of specification, design and implementation are concurrent
d. Rapid to delivery the highest priority functionalities to the customer

What is software engineering?


answer: Software engineering is an engineering discipline that is concerned with
all aspects of software production from specification to system evolution.
What are software engineering methods?
answer: Structured approaches to software development which include system model
s, notations, rules, design advice and process guidance.
What are the three most important key challenges facing software engineering?
answer: [3]:[1]Heterogeneity[2]Delivery[3]Trust
What does the acronym CASE stand for?
answer: Computer Aided Software Engineering.

What are the most fundamental activities in software processes?


answer: [4]:[1]Specification[2]Development[3]Validation[4]Evolution
What are the principal components of a software engineering method?
answer:[4]:[1]Process guidance[2]Recommendations[3]System model descriptions[4]R
ules
Which of the following are the 2 most fundamental types of software product?
answer:[2]:[1]Customized products[2]Generic products
Which question no longer concerns the modern software engineer?
Why does computer hardware cost so much?
What are the principal requirements engineering activities?
answer:[4]:
[1]Requirements elictation and analysis
[2]Feasibility study
[3]Requirement specification
[4]Requirement validation
What are four advantages of using incremental development and delivery?
[4]:[1]Lower risk of overall project failure[2]Early increments serve as prototy
pes to explore requirements[3]Early delivery of critical functionality to custom
er[4]More extensive testing of critical customer functionality
What are the three important stages in the testing process?
answer:Component(or unit) testing, integration testing, acceptant testing
List two types of evolutionary development?
answer:[2]:[1]Throw-away prototyping[2]Exploratory development
List the 3 fundamental software process frameworks that are used to create speci
fic software process?
answer:[3]:[1]Component-based software engineering[2]The Waterfall model[3]Evolu
tionary development
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What are the four most fundamental activities that are common to all software pr
ocesses?
answer:[4]:[1]Software validation[2]Software specification[3]Software evolution[
4]Software design and implementation
What is the first step in risk management process?
answer:Risk identification
What is a milestone?
answer: Milestones are the end-point of a process activity
What are important differences between software project management and other typ
es of project management?
answer:[3]:[1]There are no standeard for software processes[2]Large software pro
jects are often one-off projects[3]The product(software) is intangible
Which of the following are considered a player in the software process?
answer:[3]:[1]Customers[2]Project Manager[3]End-users
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Effective software project management focuses on
answer:[4]:[1]Performance[2]Process[3]Product[4]People
What activity does a software project manager need to perform to minimize the ri
sk of software failure?
answer: Define milestones and track progress
What is the first activity of project management
answer: Proposal writing
The project plan sets out

answer:[3]:[1]The resources available to the project[2]The work breakdown[3]A sc


hedule for the work
What are non-functional requirements?
answer: Constraints on the serviecs or functions offered bt the system such as t
iming constraints, constraints on the development process, standard, etc
What are functional requirements?
answer: Statements of services the system should provide how the system should r
eact to particilar inputs and how the system should behave in particular situati
ons
List the requirements document sections suggested by the IEEE standard?
answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe
ndices[5]Index
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
List 3 types of non-functional requirement
answer: [3]:[1]Product[2]External[3]Organizational
Which of the following belong to external requirements?
answer:[3]:[1]Interoperability[2]Legislative[3]Ethical
What are user requirements?
answer: Statements in natural language plus diaframs of the services the system
provides and its operational constraints. Written for customers
What problems can arise when requirements are written in natural language?
answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit
y
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
What is the software requirements document?
answer: The official document that defines the requirements that should be imple
mented by the system developers
To construct a system model the engineer should consider one of the following re
straining factors?
answer: Assumptions and constraints
What described in a semantic data model?
answer: The local structure of the data processed by a system or managed by a da
tabase.
Which of these model types does not represent software architecture?
answer: Data model
Which of the following is not an area of concern in the design model?
answer: Project scope
What different object models may be developed?
answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance
models
What are the components of an object class definition in the UML?
answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o
r methods associated with the class
What perspectives may be used for system modelling?
answer: [3]:[1]Structural[2]External[3]Behavioral
What is described in a context model?
answer: The immediate external environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
What are the two principle styles used for modular decomposition?
answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining
What are advantages of object model
answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely
coupled so their implementation can be modified without affecting other objects
[3]OO implementation languages are widely uesd
What is the fundamental characteristic of a repository model
answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i

s held in a central database or repository


How is the system organized in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
Check 4 fundamental questions that should be addressed in architectural design?
answer: [4]:[1]How will the system be distributed[2]How should the system be str
uctured[3]Is there a generic application architecture that can be used[4]What ar
chitectural style or styles are appropriate
What are advantages of pipeline model
answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne
w transformations
What are advantage of explicitly designing and documenting a software architectu
re?
answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake
holder communication[3]Helps with large-scale reuse
Which of these statements about architectural design are true?
answer: [3]:[1]Represents the link between specification and design processes[2]
Often carried out in parallel with some specification activities[3]It involves i
dentifying major system components and their communications
What are the characteristics of Interrupt-driven systems
answer: [2]:[1]Allows fast response[2]Used in real-time systems
What are the advantages of repository model
answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p
ublished as the repository schema[3]Sub-systems need not be concerned with how d
ata is produced Centralised management e.g. backup, security, ect
Which of these is a characteristic of a good design?
answer: Implements all requirements in the analysis model
List the advantages of inheritance
answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo
ut domains and systems[2]It is a reuse mechanism at both the design and the prog
ramming level[3]It is an abstraction mechanism which may be used to classify ent
ities
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: [3]:[1]Interface[2]Instruments[3]Data collection
Object oriented approach does not facilitate design evolution
answer: Flase
What are the stages in an object-oriented development process?
answer: [3]:[1]Programming[2]Analysis[3]Design
What do you understand by the system context and model of use?
answer: [2]:[1]The model of use-dynamic model[2]System context-static model
Active object typically include an infinite loop so that they are always carryin
g out the computation
answer: True
Which of the following is not an area of concern in design model
answer: Project scope
List the 5 key stages in an object-oriented design process?
answer: [5]:[1]Specify[2]Design the system[3]Identify[4]Develop[5]Understand and
define
UML(unified modeling language) analysis modeling focuses on the
answer: User model and structural model
List 4 approaches that may be used to identify object classes
answer: [4]:[1]Use scenario-based analysis[2]Grammatical[3]Use an approach[4]Ide
ntify
List three design models that are part of the UML
answer: [3]:[1]Sequence[2]Subsystem[3]State
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.

What tools are normally included in a RAD environment?


answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene
rator[4]Links to office applications
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What were the key benefits of prototyping found in Gordon and Bieman's studey?
answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro
ved system quality, improved maintainability[3]Reduced development effort
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
What is test-first development
When a system feature is identified, the tests of the code implementing that fea
ture are written before the code. Tests are automated and all tests are run when
a new increment is added to the system.
What are three important characteristics of extreme programming?
answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse
d as scenarios
What are the advantages of pair programming
answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c
ommon ownership and resonsibility for the code[3]Helps support refactoring
What of these statements about the differences between incremental development a
nd prototyping are true?
answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star
ts-not well-understood
Suggest three ways that a software prototype may be used?
answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac
k tests
What are the four development stages in CBSE?
answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen
t and integration[4]Component analysis
What are the 4 sectors in each loop in Boehm's Spiral model?
answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass
essment and reduction
What are three possible classes of application framework?
answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr
ucture
List the main problems with software reuse
answer: [2]:Lack of tool support[2]Increased maintenance costs
What are three reuse types in Reuse-based software engineering
answer: [3]:[1]Component[2]Object and function[3]Application system
One of the key problems in software reuse is the inability to find existing reus
able design patterns when hundreds of candidates exist
answer: True
What design choices have to be made when reusing COTS products?
answer: [3]:[1]Which COTS products offer the most appropriate functionality[2]Wh
at features of a product will actually be used[3]How will data be exchanged betw
een different products
Which of the following is not one of the issues that form a basis for design for
reuse?
answer: Object-oriented programming
What are three types of program generator
answer: [3]:[1]Code[2]Parser and lexical analyser[3]Application
List 4 types of speciallsation of software product lines?
answer: [4]:[1]Environment[2]Functional[3]Process[4]Platform
What are the two main approaches to concept reuse?
answer: [2]:[1]Generative programming[2]Design patterns
What do Gamma et al.suggest are the four essential elements of a design pattern?
answer: [4]:[1]Solution description[2]Statement of the consequences of applying

the pattern[3]Description of the problem and when the pattern can be applied[4]M
eaningful name
What three approaches may be used when designing test cases?
answer: [3]:[1]Requirements-based[2]Partition[3]Structural
What are the two complementary goals of the testing process?
answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f
aults or defects in the software
Which type of test would you perform to accpect a build
answer: User acceptant test
Acceptance tests are normally conducted by the
answer: End users
What tests should be included in object class testing?
answer: [3]:[1]that set and access all object attributes[2]for all operations in
isolation[3]that force the object into all possible states
What is the common limitation of automated testing?
answer: They are not usefull when requirements are changing frequently
Which of the following strategic issues needs to be addressed in a successful so
ftware testing process?
answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec
hnical reviews prior to testing
What is the purpose of defect testing?
answer: To discover faults that make software's behaviour incorrect
The best reason for using Independent software test teams is that
answer: A test team will test the software more thoroughly
What is common limitation of automated testing?
answer: They are not useful when requirements are changing frequently
What are the three important classes of interface errors?
answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors
What is the normal order of activities in which software testing process is orga
nized
answer: [1]Design[2]Prepare[3]Run[4]Compare
What are three basic techniques for component identification?
answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based
New versions of software systems are created as they change
answer: [3]:[1]Offering[2]Tailored[3]For different
What facilities might be provided in system building CASE tools?
answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object
What are the objectives of change management procedures?
answer: [3]:[1]Approving[2]Tracking[3]Analyzing
When software configuration management is a formal activity, the software config
uration audit is conducted by the
answer: Quality assurance group
What is a variant?
answer: identical but non-functionally distinct from other instances of a system
The primary purpose of configuration status reporting is to
answer: Make sure that change information is communicated to all affected partie
s
What are the two types of CM workbench?
answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats

answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system
is designed to resist attacks
What are the three complementary strategies to achieve survivability?
answer: [3]:[1]Recognition[2]Recovery[3]Resistance
What is the first stage in survivability analysis
answer: Review system requirements and architecture
List 4 design guidelines for secure systems engineering?
answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al
l inputs
What are the three levels of protection that might be used in an information sys
tem?
answer: [3]:[1]Application[2]Record[3]Platform
What is infrastructure security?
answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
In Iterative development approach, which phase takes the least cost?
answer: Specification
What are generic software process models?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What is a software process model?
answer: A simplified representation of a software process, presented from a spec
ific perspective
The current trends suggest that the economies of ALL developed and developing na
tions are dependent on software
answer: True
In Waterfall approach, which phase takes the most cost?
answer: [2]:[1]Specification[2]Integration and testing
What is a software process?
answer: A set of activ ities whose goal is the development or evolution of softw
are
The distribution of the costs of software engineering NOT depends on the process
model that is used
answer: False
What are essential attributes of good software?
answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency
In Component-based software engineering approach, which phase takes the least co
st?
answer: Specification
Which is the correct sequence of the following activities in the process of Syst
em evolution?
answer: Define-Assess-Propses-Modify
What is the main difference between the Spiral model and other software processe
s models?
answer: The explicit recognition of risk in the Spiral model
What is the outputs of Requirements elicitation and analysis?
answer: System models
What is the correct sequence of the following iterations in the RUP(Rational Uni
fied Process) model?
answer: Incept-Elaborat-Construct-Transit
What is the output of Feasibility study phase in the requirements engineering pr
ocess?
answer: Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which
types of perspectives?
answer: [3]:[1]Dynamic[2]Static[3]Practice
What is the main difference between the RUP (Rational Unified Pr ocess) and othe
r software processes models?

answer: Phase are more closely related to business rather than technical concern
s
Which is the correct sequence of the following activities in the Waterfall model
?
answer: Requirement-Design-Implementation-Integration-Operation
Which is the correct sequence of the following activities in the Component-based
software engineering?
answer: Component-Requirement-Design-Development
The Waterfall approach is the BEST approach to development software when ___
answer: The software system is large and that is need developed at several sites
Three categories of risks are ___
answer: [3]:[1]Project[2]Technical[3]Business
Why many software projects are 'one-off' projects?
answer: Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure?
answer: Sets out the breakdown of the project into activ ities and identifies th
e milestones and deliverables associated with each activity
What are milestones in project planning?
answer: Milestones are the end-point of a process activity
What is the critical path?
answer: The critical path is the sequence of dependent activities that
Select the BEST statement about critical path
answer: Project manager should allocate experienced people to do the tasks on th
e critical path
What is the output of the first milestone in software requirement engineering pr
ocess?
answer: Feasibility study report document
Which is the BEST principle of project scheduling?
answer: Minimize task dependencies to avoid delays caused by one task waiting fo
r another to complete
The project schedule shows ___
answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem
ents?

answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?
answer: Class diagram-on the attributions, operations
Another name for inheritance is ___
answer: Generalization
When should you use sequence diagram?
answer: Should use sequence diagram to illustrate the sequence of steps that mus
t be performed in order to complete a task
Which models give a static view of a system?
answer: [3]:[1]Object[2]Data[3]Architectural
When should you use use-case diagram?
answer: Should use use-case diagram to represent all of the people who might use
the functionalities of the system
What are types of behavioral models?
answer: [2]:[1]Data-Flow[2]State machine
Which non-functional system requirements that the software system architecture m
ay depend on?
answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability
Select the BEST solution for architectural design of a software system that perf
ormance is a critical requirement
answer: The architectural should be designed to localise critical operations and
minimise communications, use large-grain rather thanfine-grain components
Which of the following models belong to Event-driven systems?
answer: [2]:[1]Broadcast[2]Interrupt-driven
What is the correct statement about software architectural design decisions?
answer: Architectural design is a creative process, the activities in the proces
s differs depending on the type of system being developed
Which of the following styles belong to Control styles?
answer: [2]:[1]Centralised[2]Event-based
Which of the following styles belong to System organization?
answer: [3]:[1]Repository[2]Client-server[3]Abstract machine
What is the correct statement about software architectural styles?
answer: Most large systems are heterogeneous architectur al styles
What is the correct statement about software architectural design?
answer: The architectural design is normally expressed as a block diagram presen
ting an overview of the system structure
Which of the following models belong to Centralised control?
answer: [2]:[1]Call-return[2]Manager
What are advantages of explicitly designing and documenting software architectur
e?
answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse
What are the models in architecture design?
answer: [5]Static-Dynamic-Interface-Relationship-Distribution
What are three general architectural styles?
answer: [1]System organisation[2]Decomposition styles[3]Control styles
Another name for * is a + relationship is ___
answer: Generalization

Which is the correct statement about coupling?


answer: Coupling deals with interactions between objects or software components
Which is NOT a primary goal in the design of the UML?
answer: Be dependent on particular programming language
What do you mean by coupling in software design?
answer: Coupling is a measure of the strength of association established by a co
nnection from one object or software component to another.
Which of the following is NOT an approach that may be used to identify object cl
asses?
answer: Use Event-based analysis
Which are object-oriented strategies?
answer: [3]:[1]Analysis[2]Design[3]Programming
Which is NOT the main activity in design process?
answer: Designing the test case
What is the purpose of analysis?
answer: The main objective of the analysis is to capture a complete, unambiguou
s, and consistent picture of requirements of the system and what the system must
do to satisfy the users requirement and needs
nother name for * has a + relationship is ___
answer: Composition
Which is NOT an advantage of inheritance?
answer: The inheritance graphs of analysis, design and implementation have diffe
rent functions and should be separately maintained.
Which is the correct statement about object identification?
answer: Object identification is an iterative process; it relies on the skill, e
xperience and domain knowledge of system designers
Which is the first stage in an object-oriented design process?
answer: Develop an understanding of the relationships between the software being
designed and its external environment
Which is the right sequence in the process of prototype development?
answer: Establish-Define-Develop-Evaluate
The practices small, frequent releases of the system, the approach to requiremen
ts description base on customer stories or scenarios in Extreme Programming fit
into which principle of agile methods?
answer: Incremental delivery
What are common principles of agile methods?
answer: [5]:[1]Customer[2]Incremental[3]People not[4]Embrace[5]Maintain
Which of the following BEST describes the major difficulties with incremental de
velopment?
answer: [4]:[1]Contractual[2]Validation[3]Management[4]Maintenance
Which of the following is NOT an advantage of using incremental development and
delivery?
answer: Systems are often have good structures
The practices regular system release, test -first development and continuous int
egration in Extreme Programming fit into which principle of agile methods?
answer: Embrace change
Which is NOT an advantage of rapid software development?
answer: Only senior programmer are capable of taking the kind of decisions requi
red during the development process
Which is the evidence when said that pair programming is as efficient as the same
number of programmers working individually ?
answer: Measurements suggest that development productivity with pair programming
is similar to that of two people working independently
What is a user story in extreme programming?
answer: It is a requirement expressed as scenario
The practices pair programming, collective ownership of the system code, and sus
tainable pace in Extreme Programming fit into which principle of agile methods?
answer: People not process
Who chooses the stories for inclusion in the next release based on their priorit
ies and the schedule estimates?

answer: Customer
In the extreme programming, what is the role of customer?
answer: To help develop stories that defines the requirements
Which part of the system can be reuse?
answer: [3]:[1]Application[2]Component reuse[3]Object and function
The trend of design process in most software engineering disciplines is base on
___
answer: Reuse of existing system or component
If the applications or components are developed in difference programming langua
ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?
answer: [3]:[1]faster[2]lower cost[3]increased software quality
Which is NOT a key factor that you should consider when planning reuse?
answer: The name of the application or component reuse
All of the following are types of program generator EXCEPT
answer: Component generators
What is the normal order of activities in which software testing is organized?
answer: [4]:[1]Unit[2]Integration[3]Validation[4]System
The main focus of acceptance testing is:
answer: testing from a business perspective
Unit testing is a __
answer: White box testing
The effort required for locating and fixing an error in an operational program i
s:
answer: Maintainability
Workbenches are also called ___
answer: All of the other choices
A program validates a numeric field as follows: values less than 10 are rejected
, values between 10 and 21 are accepted, values greater than or equal to 22 are
rejected
answer: 3,10,22
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
Which document identifies and describes the testing that will be implemented and
executed?
answer: Test case
The testing intended to show that previously correct software has not been adver
sely affected by changes is call:
answer: Regression testing
We split testing into distinct stages primarily because:
answer: Each test stage has a different purpose.
Which is the right sequence in the software testing process?
answer: Create test case-Prepare-Perform-Create
Which of the following is NOT part of configuration management?
answer: The people in the project team

Which is the change management concerned with?


answer: All of the other choices
Software systems are subject to continual change requests from ___
answer: Developers, Users, Market forces
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: effect of the change on the project schedule, cost, quality, and risks
Which of the following is the source for software version up?
answer: All of the other choices
A configuration management system would NOT normally provide:
answer: Facilities to compare test results with expected results.
What is a release?
answer: An instance of a system which is distributed to users outside of the dev
elopment team.
Who review and approves the change request?
answer: Change control board
Which of the following items would not come under Configuration Management?
answer: Live data
Which is the right sequence of the change management process?
answer: Request-Analyze-Submit-Make-Creat
Which are levels of protection in application security engineering?
answer: [3]:[1]Platform[2]Application[3]Record
Consider security design for username and password protection, what is the good
design?
answer: System users are authenticated using a login name/password combination.
Requires user change password after 2 months
What is the first stage in survivability analysis
answer: Review system requirements and architecture.
Password should be changed
answer: All of the other choices
Why do we need consider security for project?
answer: To protect the system against external attack
Which of the following design guidelines for secure systems engineering is NOT t
rue?
answer: Avoid using redundancy and diversity to reduce risk
What is the last stage in survivability analysis
answer: Identify softspots and surv ivability strategies.
All of the following are the complementary strategies to achieve survivability E
XCEPT
answer: Conversion
Which is the correct statement about integrity?
answer: Extent to which access to software or data by an unauthorized persons ca
n be controlled
Probability of a software failure is the
answer: Reliability
What was the software crisis?
answer: As more powerful hardware was introduced in the 1960s, larger software s
ystems were developed. These were usually late, unreliable, did not meet user ne
eds and cost more than expected. The problems of producing software was the soft
ware crisis.
What are the two fundamental types of software product?
answer: Generic products that are designed to meet the needs of many different c
ustomers. Customised products designed to meet the specific needs of a single cu
stomer.
What are the fundamental activities in software processes?
answer: [4]:[1]Specifiation[2]Development[3]Validation[4]Evolution
What are the three general paradigms of software development?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What are the principal components of a software engineering method?
answer: System model descriptions, rules, recommendations, process guidance.

Why is maintainability an important attribute of software?


answer: Because all software is subject to change after it goes into use and the
costs of software maintenance often exceeds the development costs of the softwa
re.
What is a software engineering code of ethics?
answer: A set of principles that set out, in a general way, standards of expecte
d behaviour for professional software engineers.
What are the fundamental activities that are common to all software processes?
answer: Software specification, software design and implementation, software val
idation, software evolution.
List the three fundamental software process frameworks that are used to create s
pecific software processes.
answer: [3]:[1]Waterfall[2]Evolutionary[3]Component-based
Why are iterations usually limited when the waterfall model is used?
answer: The waterfall model is a document-driven model with documents produced a
t the end of each phase. Because of the cost of producing and approving document
s, iterations and costly and involve significant rework. Hence they are limited.
Briefly describe two types of evolutionary development.
answer: Exploratory development where the objective of the process is to work wi
th customers to explore their requirements and deliver a final-system. Throw-awa
y prototyping where the objective is to develop a better understanding of the cu
stomer s requirements and deliver a better requirements specification.
What are the development stages in CBSE?
answer: [4]:[1]Component[2]Requirements[3]System[4]Development
What are the advantages of using incremental development and delivery?
answer: Early delivery of critical functionality to the customer.Early increment
s serve as prototypes to explore requirements.Lower risk of overall project fail
ure.More extensive testing of critical customer functionality.
What models might be developed when applying a structured method?
answer: [5]:[1]Object[2]Sequence[3]State transition[4]Structural[5]Data-flow
Why is it increasingly irrelevant to distinguish between software development an
d evolution?
answer: Few software systems are now completely new and a more realistic model o
f software development is of an iterative process that lasts for the life time o
f the software.
What are the four phases of the Rational Unified Process?
answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition.
What are the six fundamental best practices in the RUP?
answer: Develop software iteratively.Manage requirements.Use component-based arc
hitectures.Visually model software.Verify software quality.Control changes to so
ftware.
Give five examples of activities that can be automated using CASE.
answer: Graphical system modelling.Maintaining a data dictionary.Generating user
interfaces.Program debugging.Translating programs from one language to another.
What is the distinction between a CASE tool and a CASE workbench?
answer: A CASE tool supports an individual process task such as checking the con
sistency of a design. A CASE workbench supports sets of related activities such
as specification or design.
List five common project management activities.
answer: Any five from the following: proposal writing, project planning and sche
duling, project costing, project monitoring and reviewing, personnel selection a
nd evaluation, report writing and presentations.
What is included in a quality plan and a validation plan?
answer: Quality plan: The quality procedures and standards that should be used i
n a project.Validation plan: The approach, resources and schedule used for syste
m validation.
What is the difference between a milestone and a deliverable?
answer: A milestone is a recognised endpoint of some activity that represents a
decision point for a project. A deliverable is a project output that is delivere
d to the customer.

What is involved in project scheduling?


answer: Separating the total planned work in the project into separate activitie
s and judging the time required to complete these activities.
Explain how bar charts and activity networks give different views of a project s
chedule.
answer: Activity networks show the time required to complete an activity and the
dependence on activities. Bar charts show the activity timeline illustrating th
e relative length of activities and the dates when they take place.
What are three related categories of risk?
answer: [3]:[1]Project[2]Product[3]Business
Suggest four risks that may threaten the success of a software project.
answer: Staff turnover, management change, hardware unavailability,requirements
change, specification delays, size underestimate, CASEtool underperformance, tec
hnology change, product competition.
Give two examples of technology risks that may arise in a software project.
answer: The system database cannot process as many transactions as expected.Reus
ed software components are defective.
What is involved in risk monitoring?
answer: Regularly assessing the project risks to decide whether or not that the
risk is becoming more or less probable and whether the effects of the risk have
changed.
What are user requirements and system requirements?
answer: User requirements are statements in a language that is understandable to
a user of what services the system should provide and the constraints under whi
ch it operates.System requirements are more detailed descriptions of the system
services and constraint, written for developers of the system.
What is the distinction between functional and non-functional requirements?
answer: Functional requirements define what the system should do. Non-functional
requirements are not directly concerned with specific system functions but spec
ify required system properties or place constraints on the system or its develop
ment process.
List three types of non-functional requirement?
answer: Product-Organisational-External
What is a domain requirement? Give an example.
answer: A requirements that is derived from the application domain of the system
rather than from the specific needs of system users. For example, in a train co
ntrol system, the requirement for the train braking system depends on characteri
stics of the train and the track.
What problems can arise when requirements are written in natural language?
answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation.
What is the distinction between the terms.'shall' and 'should' in a user require
ments document?
answer: Shall normally indicates a mandatory requirement Should indicates a desirabl
e but not essential requirement
Why is it impossible to completely separate system requirements and design?
answer: The system architecture may have to be designed to structur e the requir
ements specification. Existing systems constrain the design and these constr ain
ts are requirements. The use of a specific architecture may be a requirement for
business or regulatory reasons.
What are the main advantages of using a standard format to specify requirements?
answer: All requirements have the same format so are easier to read.The definiti
on of form fields mean that writers are less likely to forget to include informa
tion.Some automated processing is possible.
What are three types of interface that may have to be defined in a requirements
document?
answer: [1]Procedural interfaces[2]Data structures[3]Representations of data
What are the two main types of event-driven control models?
answer: Broadcast models where an event is broadcast to all sub-systems Interrup
t-driven models where external events are detected and processed by an interrupt
handler

What is a reference architecture?


answer: An abstract model of a system class that can be used to inform designers
about the general structure of that type of system.
What is the distinction between validation and verification?
answer: Validation: Are we building the right product?/Verification: Are we buil
ding the product right?
What are the two complementary approaches used for checking and analysis?
answer: Software testing/Software inspections or peer reviews.
What are the principal sections included in a test plan?The testing process.
answer: Requirements traceability/Tested items/Testing schedule/Test recording p
rocedures/Constraints/Hardware and software requirements/
What are the advantages of inspections over testing?
answer: 3/Inspections can discover many errors. In testing, one error may mask a
nother/Incomplete versions of a system can be inspected/Inspections can consider
broader quality attributes as well as program defects
What are the stages in the software inspection process?
answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow
-up
List the classes of faults that should be considered in an
answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte
rface faults/Storage management faults/Exception management faults
What is automated static analysis
answer: A process where an analysis program examines the source code looking for
possible anomalies. These are drawn to the inspector s attention as they may repr
esent faults in the program
What are the main argument for the use of formal specification and verification?
answer: Formal specification forces a detailed analysis of the requirements so r
eveals errors and anomalies. Formal verification demonstrates that the program m
eets its specification so implementation errors do not compromise dependability
Why do formal specification and verification not guarantee reliability?
answer: 3/The specification may not reflect the real requirements of users/The p
roof may contain errors/The proof may assume a usage pattern which is incorrect.
What are the five key strategies used in cleanroom development?
answer: Formal specification/Incremental development/Structured programming/Stat
ic verification/Statistical testing
What is the distinction between application and infrastructure security?
answer: 2/Application security the application is designed to resist attacks/Inf
rastructure security the software is configured to r esist attacks
Define the security terms vulnerability and asset Vulnerability
answer: A weakness in a computer system that MAY be exploited to cause loss or h
arm/Asset: A system resource that has a value and so should be protected
What is security risk management?
answer: Security risk management is concerned with assessing the possible losses
that might ensue from attacks on assets in the system and balancing these losse
s against the costs of security pr ocedures that may reduce the losses.
What are the stages of preliminary risk assessment?
answer: Asset identification/Asset value assessment/Exposure assessment/Threat i
dentification/Threat probability assessment/Control identification/Feasibility a
ssessment/Security requirements definition
Suggest two possible vulnerabilities when login/password
answer: authentication is used.Users set guessable passwords/Authorised users re
veal their passwords to unauthorised users, perhaps through some social engineer
ing process
What fundamental issues have to be considered when designing system architecture
for security?
answer: 2/Protection: How should the system be organised so that critical assets
can be protected against an external attack/Distribution: How should system ass
ets be distributed so that the effects of a successful attack are minimised
What are the three levels of protection that might be used in an information sys
tem?

answer: Platform-level protection/Application-level protection/Record-level prot


ection
List four design guidelines for secure systems engineering.Base security decisio
ns on an explicit security policy
answer: Avoid a single point of failure/Use redundancy and div ersity to reduce
risk/Validate all inputs
Why is it important to design for deployment
answer: Because many security vulnerabilities are introduced when the system is
configured for use in its deployment environment
What deployment support may be included in a system?
answer: Support for viewing and analysing configurations/Default privilege minim
isation/Configuration setting localisation/Easy ways to fix security vulnerabili
ties
What are the three complementary strategies to achieve survivability
answer: Resistance/Recognition/Recovery
List the stages in survivability analysis.Review system requirements and archite
cture
answer: Identify critical services and components/Identify attacks and compromis
able components/Identify softspots and survivability strategies
Which system model is described in the following graphic
answer: Data-flow models
Change request is proposal due to ___
answer: all: Market forces/Customers/Developers
What's the difference between functional and non-functional requirements?
answer: none:The functional requirement is described in details, the other is de
scribed in high-level abstract/The functional requirement describes system prope
rties and constraints, the other describes system services
What are the user requirements?
answer: The statements in a natural language plus diagrams that describe the ser
vices' system and their constraints
Suggest a most appropriate software process model that migh t be used as a basic
for managing the developing of the software system that support categorizing go
ods based on consumption pattern, tracking payments from the customers
answer: The waterfall model
How is the system organized in a client-server model?
answer: none:A set of services is provided by servers and clients access and use
these services/A set of services is provided by clients and servers access and
usethese services
Which of the following statements about the differences between integrating test
ing and component testing are true?
answer: The integrating testing test the result of the component while the compo
nent testing test its internal structure
Which of the following statements about project management is true?
answer: The intangibility of software systems poses special problems for softwar
e project management
What are the distinctions between an object and an object class?
answer: all: The object includes state variables and operations on that state as
defined in the object class definition/An object is created at run-time by inst
antiating an object class
Which of the following is NOT a disadvantage of structured methods?
answer: There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software
answer: True
If performance is a critical requirement the architecture should be designed to
answer: localize critical operations and minimize communications; use large rath
er than fine-grain components
Which of the following does NOT belong to important principles of agile methods?
answer: Process not people
What are the advantages of explicitly designing and documenting software archite
cture?

answer: all: It improves stakeholder communications/It encourages a detailed ana


lysis of the system
Which of the following statements about test first dev elopment are true?
answer: all:When a system feature is identified, the tests of the code implement
ing that feature are written before the code/Tests are automated and all tests a
re run when a new increment is added to the system
What is the problem that cannot arise when requirements are written in natural l
anguage?
answer: Lack of user's understandability
All of the fallowings are main benefits of software reuse EXCEPT
answer: Reduce maintenance costs
Which of the following statements about testing is NOT true?
answer: Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing
is NOT true?
answer: The integration team does NOT have access to the source code of the syst
em.
Which of the following statements about Enterprise Resource Planning (ERP) syste
ms is NOT true?
answer: Enterprise Resource Planning systems are very widely used
What is the second stage of risk management process?
answer: Risk analysis
Both the waterfall model of the software process and the prototyping model can b
e accommodated in the spiral process model.
answer: True
Which of the following is a type of software process model that represents the r
oles of the people involved in the software process and the activities for which
they are responsible?
answer: An role/action model
What does computer science concern with?
answer: Computer science is concerned with theories and methods that underlie co
mputers and software systems
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Which of the followings belong to Server type of concurrent object implementatio
n
answer: The object is a parallel process with methods corresponding to the objec
t operations. Methods execute in response to external requests
What is meant by configuration management
answer: The dev elopment and use of standards and procedures for managing an evo
lving software system
Which of the following statements about Service-oriented software engineering is
true?
answer: Service-oriented software engineering is based on the notion that progra
ms can be constructed by composing independent services that encapsulate reusabl
e functionality
Which of the fallowings does NOT belong to the important differences between sof
tware project management and other types of project management?
answer: Cost of software project maintenance is higher than other type of projec
ts
is concerned with developing an oriented system model to implement requirements
answer: Object-oriented Analysis
What are system requirements
answer: A structured document setting out detailed descriptions of the system's
functions, services and operational constraints
What key factors should be considered when planning reuse?
answer: all: The development schedule for the software/The expected software lif
etime/The background, skills and experience of the development team
Applications frameworks are collections of concrete and abstract objects that ar
e designed to be reused through specialization and the addition of new objects

answer: true
All of the following are the main benefits of software reuse EXCEPT
answer: Reduce maintain cost
Which of the following statements about Equivalence partitioning are NOT true?
answer: none
Which of these statements about extreme programming are true?
answer: New versions may be built several times per day
Which of the following are the testing process goals
answer: all:Discover faults or defects in the software/The check that the softwa
re meets its requirements
Which of the following statements about service interfaces is true
answer: all: Service interfaces are defined in an XML-based language called WSDL
/A WSDL specification includes a definition of the interface types and operation
s, the binding protocol used by the service and the service location
Which of the following statements about security is NOT true?
answer: Security threats can be threats to the only confidentiality and integrit
y of a system or its data
All of the following are stages in an object-oriented dev elopment process EXCEP
T?
answer: Object-oriented evolution
What are the components of an object class definition in the UML
answer: all:The attributes of the class/The operations or methods associated wit
h the class/The name of the object class
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces an existing system
answer: Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements do
cument
answer: a high level statement/ a detailed system specification
What are advantages of pipeline model?
answer: all: Easy to add new transformations/Supports transformation reuse/Intui
tive organization for stakeholder communication
List the requirements document sections suggested by the IEEE standard.
answer: Introduction-General-Specific-Appendices-Index.
Which of the following statements about service interfaces is true?
answer: AWSDL
What is not an Upper-CASE tool?
answer: Borland C
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?
answer: The system context is a static,themodel is a dynamic
When should you use data flow diagrams (DFD)?
answer: showing dai nhat
Which is the benefit of Service-oriented architectures?

answer: inter-organizational
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and operations associated with th
e problem to be solved
answer: Analysis
Software systems are subject to continual change requests from
answer: Developer,User
What are the characteristics of RAD processes?
answer: System,The system
What is not a Lower_CASE tool?
answer: Junit
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: dai nhat quat vao
Which of the followings belong to validation testing?
answer: To demonstrate,Asuccessful test shows
Change request is proposal due to
answer: All of the others
What is the correct sequence of the following activities in the Component-based
software engineering?
answer: 1,3,2,4
Which of the following statements about Equivalence partitioning are NOT true?
answer: None of the others
What types of system model may be developed?
answer: Data,Composition,Architectural,Classification,Stimulus/response
What is described in a context model?
answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment.
What is described in a state machine model?
answer: How the system responds to external events.
What is a semantic data model?
answer: A model that describes the logical structure of the data processed by a
system or managed by a database.
What are the components of an object class definition in the UML?
answer: name,attributes,operations or methods associated
What different object models may be developed?
answer: Inheritance,Object aggregation,Object behaviour
What is shown in an UML sequence model?
answer: The sequence of interactions between objects and actors in the system as
sociated with a single defined use-case.
What is a structured method?
answer: A systematic way of producing models of an existing system or of a syste
m that is to be built.
List four weaknesses of structured methods.
answer: They do not support non-functional,They rarely include,They tend to prod
uce,The models produced are detailed and often hard to understand.
What are the stages in an object-oriented development process?
answer: analysis,design,programming.
What is the distinction between an object and an object class?
answer: An object is created at run-time by instantiating an object class. The o
bject includes state variables and operations on that state as defined in the ob
ject class definition.
Briefly describe two types of concurrent object implementation.
answer: Servers: The object is a parallel process with methods corresponding to
the object operations. Methods execute in response to external requests.Active o
bjects: The state of the object is changed by internal operations within the obj
ect itself. The process executing these operations runs continuously.
List the five key stages in an object-oriented design process.
answer: Understand and define,Design,Identify,Develop,Specify object interfaces.
What do you understand by the system context and model of use?

answer: The system context is a static model of the other systems in the environ
ment of the system being designed. The model of use is a dynamic model that desc
ribes how the system being designed interacts with its environment.
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: interface,data collection,instruments
List four approaches that may be used to identify object classes.
answer: Grammatical,Identify,Use,Use scenario-based analysis.
Briefly describe three design models that are part of the UML.
answer: Subsystem,Sequence,State machine
What is the purpose of interface design in an OO design process?
answer: To define the signatures and semantics of the interfaces that are provid
ed by an object or group of objects.
Briefly explain why an OO approach facilitates design evolution.
answer: The internal details of an object are hidden from other objects so chang
ing these details is unlikely to have knock-on effects on other objects.
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services.User engagement with the syste
m.
What is the key difference between incremental development and prototyping?
answer: Incremental development starts with the requirements that are best under
stood and that have the highest priority.Prototyping is intended to help underst
and the requirements so starts with requirements that are not well understood.
List five important principles of agile methods.
answer: Customer,Incremental,People not,Embrace,Maintain
What are three important characteristics of extreme programming?
answer: Requirements,Pair programming.Test-first
What is test-first dev elopment?
answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system.
Briefly describe the advantage of pair programming.
answer: It supports the idea. It serves.It helps support
What tools are normally included in a RAD environment?
answer: database programming,interface generator,Links,report
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
Suggest three ways that a software prototype may be used.
answer: help with,explore software,run back-to-back
What were the key benefits of prototyping found in Gordon and Bieman s study?
answer: Improved system usability,Improved system quality,Reduced development ef
fort.
List the main benefits of software reuse.
answer: Increased,Reduced,Effective,Standards,Accelerated
List the main problems with software reuse.
answer: Increased,Lack,Not-invented-here,Creating,Finding
What key factors should be considered when planning reuse?
answer: development,expected,background,criticality,application,system
What is a design pattern and why are patterns important for reuse?
answer: A design pattern is a description of a problem and the essence of its so
lution. This solution is expressed in a generic way and can be instantiated and
reused in different settings.
What do Gamma et al. suggest are the four essential elements of a design pattern
?
answer: meaningful,solution,statement.
What is generator-based reuse?
answer: An approach to reuse where reusable knowledge is embedded in a generator

system which is programmed by domain experts to create the system. An executabl


e system is then generated.
What major software problem is addressed by aspect-oriented software development
?
answer: The problem of separation of concerns so that a software unit is designe
d to do one thing and one thing only.
What are three possible classes of application framework?
answer: System infrastructure,Middleware,Enterprise
What design choices have to be made when reusing COTS products?
answer: Which COTS products.How data.What features
List four types of specialisation of software product lines.
answer: Platform,Environment,Functional,Process
What are the two complementary goals of the testing process?
answer: demonstrate,discover
What is a successful defect test?
answer: successful defect test is one where the system s operation does not confor
m to its specification, i.e. one that exposes a defect in the system.
Briefly describe the two distinct phases of system testing.
answer: Integration,Release
What guidelines does Whittaker suggest for defect testing?
answer: Chose inputs,Design,Repeat,Force,Force
What is the function of stress testing?
answer: test,stress
What tests should be included in object class testing?
answer: Tests for all,Tests that set,Tests that force
What are the three important classes of interface errors?
answer: Interface misuse.Interface misunderstanding.Timing errors.
What three approaches may be used when designing test cases?
answer: Requirements-based,Partition,Structural
What is an equivalence partition? Give an example.
answer: A class of inputs or outputs where it is reasonable to expect that the s
ystem will behave the same way for all members of the class. For example, all st
rings with less than 256 characters.
What is path testing?
answer: A structural testing strategy whose objective is to exercise every indep
endent path through a program.
What is meant by configuration management?
answer: The development and use of standards and procedures for managing an evol
ving software system.
What is a baseline?
answer: A controlled system where changes to the system have to be agreed and re
corded before they are implemented.
What should be included in a configuration management plan?
answer: configuration,people,configuration,CM tool,schema
Why is it necessary to define a configuration item identification scheme?
answer: Because there may be thousands of source code modules, test scripts, des
ign documents, etc. in a large project. You have to be able to uniquely identify
and locate any specific item and so a unique naming scheme is required.
What information may be included in a configuration database?
answer: Information about configuration items such as data of creation, creator,
etc. Information about users of components, system customers, execution platfor
ms, and proposed changes to the system.
What are the objectives of change management procedures?
answer: To analyse the costs and benefits of proposed changes, approving changes
that are worthwhile, and tracking which components of the system have been chan
ged.
What is the role of a change control board?
answer: To assess the impact of proposed changes from a strategic and organisati
onal perspective rather than a technical perspective. They should decide if chan
ges are worthwhile and should prioritise changes to be implemented.

What is the difference between a system version and a system release?


answer: A system version is an instance of a system that differs, in some ways,
from other instances. A system release is a version that is released to customer
s.
What are the advantages of attribute-based version identification?
answer: When selecting components, you do not need to specify the version number
(an error-prone process if there are many components) but simply list the requi
red component attributes.
What may be included in a system release?
answer: executable,Configuration,Data,installation,Electronic
What are the key issues in system building?
answer: Have all,Are the right,Are all,Are,Is the
What are the key standards for web service-oriented architectures?
answer: SOAP,WSDL,UDDI,WS-BPEL
What is the definition of a (web) service?
answer: A loosely coupled reusable software component that encapsulates discrete
functionality which may be distributed and programmatically accessed. A web ser
vice is a service that is accessed using standard Internet and XML-based protoco
ls.
What are the components of a WSDL specification?
answer: interface specification,binding,location part
What is service engineering?
answer: The process of dev eloping services for reuse in service-oriented applic
ations.
What are the three fundamental types of service that may be identified?
answer: Utility services,Business services,Coordination services
What are the three stages in service interface design?
answer: Logical interface,Message design,WSDL development
What information is maintained in a UDDI description?
answer: Details of,informal description,Information on,Subscription information
How can web services be used to facilitate the use of legacy systems?
answer: The legacy system functionality is hidden by wrapping it in a web service
which is accessed by external applications. These applications therefore do not
need to know the protocols and data structures used by the legacy system.
Define software development with services
answer: The creation of programs by composing and configuring services to create
new composite services.
What is a workflow?
answer: A sequence of activities, ordered in time, that make up a coherent busin
ess processes with each activity carrying out some part of the work of that proc
ess.
What are the stages in service construction by composition?
answer: Formulate,Discover services,Select,Refine,Create,Test
What is the difference between BPMN and WS-BPEL?
answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a
lower-level XML-based language.
List five problems in testing service-oriented systems.
answer: Services,Dynamic,non-functional,Testing,Compensating
What are the advantage of explicitly designing and documenting a software archit
ecture?
answer: improves,encourages,helps
What non-functional requirements may be influenced by the choice of system archi
tecture?
answer: Performance, security, safety, availability, maintainability.
List four fundamental questions that should be addressed in architectural design
.Is there a generic application architecture that can be used?
answer: How will,What architectural,How should,What control,Etc.
What architectural models may be developed?
answer: static structural,dynamic process,interface,Relationship,distribution
What is the fundamental characteristic of a repository model?

answer: All shared data is held in a central database that can be accessed by al
l sub-systems.
How is the system organised in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services.
What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes
6. What is Not a type in Reuse-based software engineering?
answer: Software development process reuse
7. What is described in a context model?
answer: The immediate ecternal environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
8. Which of the follwing is Not a type of behavioral model?
answer: Architectual mode
9. What is correct phase related to the term "CASE" in software engineering?
answer: The software systems that provide automated support for software process
activities
10. Which of the followings does not belong to external requirements?
answer: Portability requiements
11. Which of the following is not a stage in componet - Base Software enginnerin
g
answer: System design with reuse
12. What activity does a software project manager need to perform to minimize th
e risk of software failure?
answer:Define milestones and track progress
13. What is describled in a state machine model?
answer: How the system responds to external event
14. The prototyping model of software development is
answer: A risky model that rarely produces a meaningful product
15. What is not a technique for component identification?
answer: Function-based identification
16. What is not an essential element of design patterns?
answer: A concrete design description
17. Which is NOT a problem that an arise when requirements are written in natura
l language?
answer: Lack of user's understandability
18. What is not an advantage of object model
answer: complex entities are easy to represent as objects
19. When software configuration management is a formal activity, the software co
nfiguration audit is conducted by the
answer: Senior managers
20. Who is mainly responsible for the component (unit) testing?
answer: Developer
21. Which is the purpose of data model?
answer: Describle the logical structure of data processed by the system
22. Why do we need to consider security for project?
answer: to protect the sestem against external attack

23. What is the main difference between RUP (Raditional Unified Process and othe
r processes?
answer: The construction phase is essentially concerned with system design, prog
ramming and testing
24. What are non-functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
25. Which of the following is not an advantage of pipeline model
answer: Easy to support event-based interaction
26. Which is Not an object-oriented strategy?
answer: Object-oriented deployment
27. What is a version?
answer: An instance of a system which is distributed to users outside of the dev
elopment team
28. Which of the following is not a stage in an object-oriented development proc
ess?
answer: Object-oriented programming
29. What is Not a main problem with software reuse?
answer: Not-invented-here syndrome
30. What are milestones?
answer: Milestones are end-point of a project phase
31. Which is the right sequence in project scheduling?
answer: (2)=>(1)=>(4)=>(3)
32. Which is Not a principal component of a software engineering method?
answer: Process activities
33. What is the common limitation of auto mated testing?
answer: They are not useful when rewuiement are changing frequently
34. What is the purpose of defect testing?
answer: To discover faults that make software's behavior incorrect
35. What is Not a characteristic of extreme programming?
answer: Delivery-first development
36. What is Not a component of a WSDL specification?
answer: The location part
37. What are the four essential attributes of the good software?
answer: Maintainability,dependability,efficiency,usability
38. What are the advantages of using an incremental approach to software develop
ment?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
39. One of the key problems in software reuse is the inability to find existing
reusable design patterns when hundreds of candidates exist
answer: True
40. What are functional requirements?
answer: Statement of services the system should provide how the system should re
act to particular inputs and how the system should behave in particular situatio
ns
41. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to arrive at a stable, consistent set of system re
quirements
42. Which of following paradigms is not a general paradigm of software developme
nt?
answer: Rapid software development
43. What is WSDL standard?
answer: A standard for workflow languages used to define service composition.
44. Which of the following design guidelines for secure systems engineering is N
OT true?
answer: Avoid using redundancy and diversity to reduce risk
45. What is the normal order of activities in which software testing process is
organized?

answer: (2)=>(1)=>(3)=>(4)
46. Which of the following is NOT a sector in each loop in Boehm's spiral model?
answer: System design
47. What is the first stage in service construction by composition?
answer: Formulate outline workflow
48. What is NOT the advantage of repository model
answer: Sub-system need not be concerned with how data
49. Which of the following is NOT an advantage of using incremental development
and dilivery?
answer: Systems are offten have good structures
50. What is NOT an objective of change management procedures?
answer: Approving changes that are worthwhite.
51. What are the advantage of explicitly designing and documenting softwore arch
itecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with
the same data, product information, the system should be performed difference pr
esentations for correspondent departments such as Product department, Quallty de
partment and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behavioural model
answer: Semantic data models
55. The student management system was completed with two functions, managing stu
dent information and organizing quizes for review, after that the customer added
one more function, organizing online examination. Finaly all of them are put in
to the configuration management and are built for system testing, so what is the
build called?
answer: Release
56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
67. What is the firt stage in service construction by composition?

answer: Formulate outline workflow


68. List three types of program generator
answer: Application*** code*** parser and lexical
69. Which question no longer concerns the modern software engineer?
answer: Why does computer
70. What is the type of following requirement,"the result should be returned in
the real time"?
answer: Non-functional requirements
71. All of the following are advantages of pair programming EXCEPT
answer: It helps to increase
72. What is the last stage in survivabilityanalysis?
answer: Identify softspots and sur
73. How to build security for the CMS system?
answer: Building system authemtication
74. Which of these statements about defect testing is NOT true?
answer: A successful test
75. Which one is program type of the Java compite,Javac?
answer: Parser and lexical analyser generators
76. Which of following statements about software engineering is NOT true?
answer: SOftware costs more to develop than it does to maintain

Max length
Answer: qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjk
l
2 most fundamental types of software product:
Answer: Generic products. Customized products.
3 most general paradigms of software development:
Answer: Iterative development. Waterfall approach. Component-based software eng
ineering
3 most important key challenges facing software engineering:
Answer: Heterogeneity challenges. Delivery challenges. Trust challenges
4 essential attributes of good software:
Answer: Maintainability. Dependability. Efficiency. Usability
The principal components of a software engineering method:
Answer: Process guidance. Recommendations. System model descriptions. Rules
The question no longer concerns the modern software engineer:
Answer: Why does computer hardware cost so much?
The most fundamental activities in software processes:
Answer: Software specification, software development, software validation, soft
ware evolution
Software engineering methods:
Answer: System models, notations, rules, design advice and process guidance.
Software engineering is:
Answer: Concerned with all aspects of software production from specification to
system maintenance
Computer science concern with:
Answer: Theories and methods that underlie computers and software systems

Meaning of CASE:
Answer: Computer Aided Software Engineering
The economies of all undeveloped nations are dependent on software:
Answer: False
Software process is a simplified representation of a software process model, pre
sented from a specific perspective:
Answer: False
2 types of evolutionary development:
Answer: Throw-away prototyping. Exploratory development
3 important stages in the testing process:
Answer: Component ( or unit ) testing.Integration testing.Acceptant testing
3 fundamental software process frameworks that are used to create specific softw
are processes:
Answer: Evolutionary development.Component-based software engineering.The waterf
all model
4 development stages in CBSE:
Answer: Systemdesignwithreuse.Dev and integration.Require modification. Componen
t analysis
4 sectors in each loop in Boehm s spiral model
Answer: Development and validation. Planning. Objective setting. Risk assessment
and reduction
4 advantages of using incremental development and delivery
Answer: More extensive testing.. Early incre serve .. Early delivery of critica
l..Lower risk of overall project failure
4 most fundamental activities that are common to all software processes
Answer: SW evolution. SW specification. SW validation. SW design and implementat
ion
The principal requirements engineering activities:
Answer: Require elicitation&analysis. Require specification. Require validation.
Feasibility study
The prototyping model of software development is:
Answer: A useful approach when a customer cannot define requirements clearly
The spiral model of software development:
Answer: Includes project risks evaluation during each iteration
First step in risk management process:
Answer: Risk identification
First activity of project management:
Answer: Proposal writing
3 most important differences between software project management and other types
of project management
Answer: There re no standard for SW.. Large SW proj are often one-off ..The softwa
re is intangible

3 related categories of risk:


Answer: Business risk. Product risk. Project risk
The following are considered a player in the software process:
Answer: Customers. Project manager. End-users
Effective software project management focuses on:
Answer: Performance. Process. Product. People
The activity does a software project manager need to perform to minimize the ris
k of software failure is:
Answer: Define milestones and track progress
The project plan sets out:
Answer: The resources available to the proj. The work breakdown. A schedule for
the work
Included in a quality plan:
Answer: The quality procedures and standards that should be used in a project
Milestone is:
Answer: The end-point of a process activity
Functional requirements:
Answer: Statements of services the system should provide how the system should r
eact to particular inputs and how the system should behave in particular situati
ons
Domain requirements:
Answer: Requirements that come from the application domain of the system and th
at reflect characteristics of that domain
Non
functional requirements:
Answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standard, etc
3 types of non
functional requirement
Answer: Product requirements External requirements Organization requirements
5 requirements document sections suggested by the IEEE standard:
Answer: General description.Specific requirements.Introduction.Appendices.Index
The followings belong to external requirements
Answer: Interoperability requirements. Legislative requirements. Ethical require
ments
Problems can arise when requirements are written in natural language
Answer: Requirement confusion. Requirement amalgamation. Lack of clarity
User requirement
Answer: Statements in natural language plus diagrams of the services the system
provides and its operational constraints. Written for customers
System requirements
Answer: A structured documents setting out detailed descriptions of the system s
function, services and operational constrains
The software requirements document
Answer: The official document that defines the requirements that should be imple

mented by the system developers


Construct a system model, the engineer should consider one of the following rest
raining factors
Answer: Assumptions and constrains
Described in a semantic data model
Answer: The logical structure of the data processed by a system or managed by a
database
Described in a context model
Answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment
Described in a state machine model
Answer: How the system responds to external events
The model types does NOT represent software architecture
Answer: Data model
The following is NOT an area of concern in the design model
Answer: Project scope
These is a characteristic of a good design
Answer: Implements all requirements in the analysis model
Different object models may be developed
Answer: Object aggregation models. Object behavior model. Inheritance models
In the UML, a (an) is represented as named rectangle with two sections. The obje
ct attributes are listed in the top section. The operations that are associated
with the object are set out in the bottom section.
Answer: Object class
The components of an object class definition in the UML
Answer: The name of the obj class.The attributes of the class.The operations or
methods associated with the class
Perspectives may be used for system modeling
Answer: A structural perspective. An external perspective. A behavioral perspect
ive
These statements about State Machine Models are NOT true
Answer: Widely used in database design. Used to describe the logical structure o
f data processed by the system
These statements about Semantic Data Model are NOT true
Answer: These model .. to external and internal events.They show the system s .. s
timuli..used for modeling real-time systems
4 weaknesses of structured methods
Answer: ..produce too much.They do not support.. The models produced..They rarel
y include guidelines to help users decide if they can be used in particular area
UML analysis modeling focuses on the
Answer: User model and structural model
2 principle styles used for modular decomposition
Answer: Object-oriented decomposition. Function-oriented pipelining

4 fundamental questions that should be addressed in architectural design


Answer: How will..How should..Is there a generic. What architectural style or st
yles are appropriate
Advantages of object model
Answer: The objects. OO implementation languages. Objects are loosely coupled so
their implementation can be modified without affecting other objects
Advantages of repository model.
Answer: Efficient way to share..Sharing model is published.. Sub-systems need..C
entralised management e.g. backup, security, etc
Advantages of pipeline model
Answer: Intuitive organization for..Supports transformation..Easy to add new tra
nsformations
Advantages of explicitly designing and documenting a software architecture
Answer: It encourages a detailed..It improves the stakeholder com..It helps with
large-scale reuse
The fundamental characteristic of a repository model
Answer: Shared data is may be accessed by all sub-systems.Shared data is held in
a central database or repository
The system organized in a client-server model
Answer: A set of services is provided by servers and clients access and use the
se services
The characteristics of Interrupt-driven systems
Answer: Allows fast response. Used in real-time systems
These statements about architectural design are true
Answer: Represents the link..Often carried out in..It involves identifying majo
r system components and their communications

Unlike structured analysis, top-down decomposition and consideration of End-to-e


nd processing sequences are not present when OOA is used
Answer: False
Object-oriented analysis is concerned with developing an object-oriented model o
f a software system to implement the identified requirements
Answer: False
Active objects typically include an infinite loop so thay they are always carryi
ng out the computation
Answer: True
Object oriented approach does not facilitate design evolution
Answer: False
3 layers in the architectural model of the weather station system
Answer: The interface layer. The instruments layer. The data collection layer
3 design models that are part of the UML
Answer: Sequence model. Subsystem model. State machine model

4 approaches that may be used to identify object classes


Answer: Use scenario-based..Grammatical analysis..Use an approach .. Identify ta
ngible things in the application domain

5 key stages in an object-oriented design process


Answer: Specify object..Design the..Identify the..Develop design..Understand and
define the context and use of the system
Advantages of inheritance
Answer: The inheritance..It is a reuse mechanism.. It is an abstraction mechanis
m which may be used to classify entities
The stages in an object-oriented development process
Answer: Object-oriented program. Object-oriented design. Object-oriented analys
is
The system context and model of use
Answer: The model of use is a dynamic ... The system context is a static model o
f the other systems in the environment of the system being designed
3 ways that a software prototype may be used
Answer: To explore..To help with the elicitation.. To run back-to-back tests wit
h the implemented system
3 important characteristics of extreme programming
Answer: Test-first development. Pair programming. Requirements expressed as scen
arios
Tool are normally included in a RAD environment
Answer: An interface generator. A database programming .. A report generator. Li
nks to office applications
The key benefits of prototyping found in Gordon and Bieman study
Answer: Improved system usability..Improved system quality..Reduced development
effort
Advantages of pair programming
Answer: It serves as an informal ..It supports the idea of..It helps support ref
actoring
Advantages of using an incremental approach to software development
Answer: Accelerated delivery of customer services, user engagement with the syst
em
Test-first development
Answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system
Visual programming
Answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons
These statement about the differences between incremental development and protot
yping

Answer: Incremental development starts with[best understood] ..Prototyping start


s with [not well-understood]
2 main approaches to concept reuse
Answer: Generative programming. Design patterns
3 types of program generator
Answer: Code generators.Parser and lexical analyses generators.Application gener
ators
3 possible classes of application framework
Answer: Middleware integration .. Enterprise application .. System infrastructur
e frameworks
3 reuse types in Reuse-based software engineering
Answer: Component reuse. Object and function reuse. Application system reuse
4 types of specialization of software product lines
Answer: Environment specia.. Functional .. Process .. Platform specialization
4 essential elements of a design pattern
Answer: A solution description.A statement of the consequences .. A description
of the problem and when the pattern can be applied. A meaningful name
The design choices have to be made when reusing COTS products
Answer: Which COTS products ... What features of a product .. How will ..product
s
The following is NOT one of the issues that form a basis for design for reuse
Answer: Object-oriented programming
The main problem software reuse
Answer: Lack of tool support. Increased maintenance costs
List the main problems with software reuse
Answer: Lack of tool support. Increased maintenance costs
The main benefits of software reuse
Answer: Effective use of specialists..Accelerated deve..Reduced process risk. In
creased dependability
One of the key problems in software reuse is the inability to find existing reus
able design patterns when hundreds of candidates exist
Answer: True

2 complementary goals of the testing process


Answer: To demonstrate that the software meets its .. To discover faults or defe
cts in the software
3 approaches may be used when designing test cases
Answer: Requirements-based testing. Partition testing. Structural testing
3 important classes of interface errors
Answer: Interface misuse. Interface misunderstanding. Timing errors
Type of test would you perform to accept a build

Answer: User acceptant test


Acceptance tests are normally conducted by the
Answer: End users
Tests should be included in object class testing
Answer: Tests that set and access .. Test for all operations .. Tests that force
the object into all possible states
The purpose of defect testing
Answer: To discover faults that make software s behavior incorrect
The best reason for using independent software test teams is
Answer: A test team will test the software more thoroughly
The common limitation of automated testing
Answer: They are not useful when requirements are changing frequently
The normal order of activities in which software testing process is
Answer: Design test cases>Prepare test dt>Run program with test dt>Compare resul
ts to test cases
The following strategic issues needs to be addressed in a successful software te
sting process
Answer: Specify requirements in a quantifiable manner. Conduct formal technical
reviews prior to testing

2 types of CM workbench
Answer: Integrated workbenches. Open workbenches
3 basic techniques for component identification
Answer: Version numbering. Change-oriented identification. Attribute-based ident
ification
New versions of software system are created as they change
Answer: Offering different .. Tailored for particular user .. For different mach
ines/OS
Facilities might be provided in system building CASE tools
Answer: A dependency specification..Tool selection and..Distributed compilation.
Derived object management
The objectives of change management procedures
Answer: Approving changes .. Tracking which components.. Analyzing the costs and
benefits of proposed changes
The primary purpose of configuration status reporting is to
Answer: Make sure that change information is communicated to all affected partie
s
Software systems are subject to continual change requests
Answer: From developers. From users. From market forces
Which formal activity, the software configuration audit is conducted by the
Answer: Quality assurance group
Release is
Answer: An instance of a system which is distributed to users outside of the dev

elopment team
Variant is
Answer: An instance of a system which is functionally identical but non-function
ally distinct from other instances of a system
Version is
Answer: An instance of a system which is functionally distinct in some way from
other system instances

3 complementary strategies to achieve survivability


Answer: Recognition. Recovery. Resistance
3 levels of protection that might be used in an information system
Answer: Application-level protection. Record-level protection. Platform-level pr
otection
4 design guidelines for secure systems engineering
Answer: Use redundancy and ... Base security decisions .. Avoid a single .. Vali
date all inputs
Vulnerability is
Answer: A weakness in a computer-based system that may be exploited to cause los
s or harm
Attack is
Answer: An exploitation of a system s vulnerability. Generally, this is from outsi
de the system and is a deliberate attempt to cause some damage
Threats is
Answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
Application security
Answer: Application security is a software engineering problem where the system
is designed to resist attacks
Infrastructure security
Answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
First stage in survivability analysis
Answer: Review system requirements and architecture
Security risk management involve
Answer: Preliminary risk assessment. Life cycle risk assessment
What is visual programming
Answer: An approach to development where a programmer manipulates graphical icon
s representing
Which of the followings belong to Server type of concurrent object implementatio
n
Answer: All of the others(the object is a parallel + the state of the obj ..)
Are the end-point of a a process activity
Answer: Milestones

What does the rapid application development concern with


Answer: An iterative approach to software development leads to faster delivery o
f software
Select the most suitable software process model for a project that are developed
at different sites
Answer: Throw-away prototyping
Are ery abstract. They do not show the nature of component relationships nor the
externally visible properties of the sub-systems. However, they useful for comm
unication with stakeholders and for project planning.
Answer: Box and line diagrams
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces and existing system
Answer: Waterfall model
Select the type of following requirement: The system shall provide appropriate vi
ewers for the user to read documents in the document store
Answer: Functional requirement
Which is the type of the following requirement:
e
Answer: User requirement

The CMS system must be easy to us

The objective of is to deliver a working system to end-users. The objective of


is to validate or derive the system requirement.
Answer: incremental development, throw-away prototyping
What should we do first when we receive a change request from out customer?
Answer: Analyse the change request
Which of the following is NOT a disadvantage of structured methods?
Answer: There are not many CASE tools that support structured methods
Another name for [ has a ] relationship is
Answer: Composition
What tests should be included in object class testing?
Answer: Tests that set and .. Tests for all operations .. Test that force the ob
ject ..
In architecture design: Using large-grain components improves system but reduces
system
Answer: Performance, maintainability
Security is a software engineering problem where the system is designed to resis
t attacks
Answer: Application
List 3 types of non-functional requirement
Answer: External requirements, Organization requirements, Product requirement
Which of the followings does NOT belong to the important differences between sof
tware project management and other types of project management?
Answer: cost of software project maintenance is higher than other type of projec
ts
Given the project activities chart as below, please define the critical path (th

e values mention in each arrow are activity name and activity duration)
Answer: AFDEI
Select correct statements about software management
Answer: Software project management is .. Good project management can totally ..
Which are THREE essential elements of design patterns?
Answer: A name that is ... A statement of the consequences .. A description of t
he problem ..
What are two phases of system testing?
Answer: Integration testing, release testing
Which of these statements about extreme programming are true?
Answer: New versions maybe built several times per day
A is a way of reusing abstract knowledge about a problem and its solution.
Answer: Design pattern
Context models are used to illustrate the operational context of a system they s
how what lies outside the system
Answer: behaviors
Consider security design for username and password protection, what is the good
design?
Answer: System users are authenticated using a login
Which process model is most appropriate for a large software project with stable
requirements?
Answer: Waterfall
Different models present the system from different perspective: perspective show
ing the system s context or environment; perspective showing the behavior of the s
ystem; perspective showing the system or data architecture.
Answer: External, Behavioural, Structural
What are the advantages of explicitly designing and documenting software archite
cture?
Answer: All of the others (improve stakeholder, encourages a detailed ..)
What can be represented by a workflow model?
Answer: The sequence of activities in the process along with ..
What do gamma et al.suggest are the four essential elements
Answer: A statement of .. A meaningful .. A solution.. A description of the prob
lem
What is not an Upper-CASE tool?
Answer: Borland C
A successful defect test is a test which causes a program to behave in normal wa
y
Answer: False
What are the advantages of pair programming
Answer: It serves as an informal .. It supports the idea of common ..
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
Answer: None of the others

Which one is not a web service standard?


Answer: WSDL
What are system requirements?
Answer: A structured document setting out detailed ..
When should you use data flow diagrams (DFD)?
Answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and opereations associated with
the problem to be solved
Answer: Object-oriented analysis.
What are characteristics of RAD processes?
Answer: System user interface .. The system is developed in a series ..
What is not a Lower-CASE tool
Answer: Junit
What perspectives may be used for system modeling?
Answer: An external perspective, A structure perspective, a behavioral perspecti
ve
What is software engineering?
answer: Software engineering is an engineering discipline that is concerned with
all aspects of software production from specification to system evolution.
What are software engineering methods?
answer: Structured approaches to software development which include system model
s, notations, rules, design advice and process guidance.
What are the three most important key challenges facing software engineering?
answer: [3]:[1]Heterogeneity[2]Delivery[3]Trust
What does the acronym CASE stand for?
answer: Computer Aided Software Engineering.
What are the most fundamental activities in software processes?
answer: [4]:[1]Specification[2]Development[3]Validation[4]Evolution
What are the principal components of a software engineering method?
answer:[4]:[1]Process guidance[2]Recommendations[3]System model descriptions[4]R
ules
Which of the following are the 2 most fundamental types of software product?
answer:[2]:[1]Customized products[2]Generic products
Which question no longer concerns the modern software engineer?
Why does computer hardware cost so much?
What are the principal requirements engineering activities?
answer:[4]:[1]Requirements elictation and analysis[2]Feasibility study[3]Require
ment specification[4]Requirement validation
What are four advantages of using incremental development and delivery?
[4]:[1]Lower risk of overall project failure[2]Early increments serve as prototy

pes to explore requirements[3]Early delivery of critical functionality to custom


er[4]More extensive testing of critical customer functionality
What are the three important stages in the testing process?
answer:Component(or unit) testing, integration testing, acceptant testing
List two types of evolutionary development?
answer:[2]:[1]Throw-away prototyping[2]Exploratory development
List the 3 fundamental software process frameworks that are used to create speci
fic software process?
answer:[3]:[1]Component-based software engineering[2]The Waterfall model[3]Evolu
tionary development
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What are the four most fundamental activities that are common to all software pr
ocesses?
answer:[4]:[1]Software validation[2]Software specification[3]Software evolution[
4]Software design and implementation
What is the first step in risk management process?
answer:Risk identification
What is a milestone?
answer: Milestones are the end-point of a process activity
What are important differences between software project management and other typ
es of project management?
answer:[3]:[1]There are no standeard for software processes[2]Large software pro
jects are often one-off projects[3]The product(software) is intangible
Which of the following are considered a player in the software process?
answer:[3]:[1]Customers[2]Project Manager[3]End-users
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Effective software project management focuses on
answer:[4]:[1]Performance[2]Process[3]Product[4]People
What activity does a software project manager need to perform to minimize the ri
sk of software failure?
answer: Define milestones and track progress
What is the first activity of project management
answer: Proposal writing
The project plan sets out
answer:[3]:[1]The resources available to the project[2]The work breakdown[3]A sc
hedule for the work
What are non-functional requirements?
answer: Constraints on the serviecs or functions offered bt the system such as t
iming constraints, constraints on the development process, standard, etc
What are functional requirements?
answer: Statements of services the system should provide how the system should r
eact to particilar inputs and how the system should behave in particular situati

ons
List the requirements document sections suggested by the IEEE standard?
answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe
ndices[5]Index
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
List 3 types of non-functional requirement
answer: [3]:[1]Product[2]External[3]Organizational
which of the following belong to external requirements?
answer:[3]:[1]Interoperability[2]Legislative[3]Ethical
What are user requirements?
answer: Statements in natural language plus diaframs of the services the system
provides and its operational constraints. Written for customers
What problems can arise when requirements are written in natural language?
answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit
y
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
What is the software requirements document?
answer: The official document that defines the requirements that should be imple
mented by the system developers
To construct a system model the engineer should consider one of the following re
straining factors?
answer: Assumptions and constraints
What described in a semantic data model?
answer: The local structure of the data processed by a system or managed by a da
tabase.
Which of these model types does not represent software architecture?
answer: Data model
Which of the following is not an area of concern in the design model?
answer: Project scope
What different object models may be developed?
answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance
models
What are the components of an object class definition in the UML?
answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o
r methods associated with the class
What perspectives may be used for system modelling?
answer: [3]:[1]Structural[2]External[3]Behavioral
What is described in a context model?
answer: The immediate external environment of the system defining the system's c
ontext and the dependencies that a system has on its environment

What are the two principle styles used for modular decomposition?
answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining
What are advantages of object model
answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely
coupled so their implementation can be modified without affecting other objects
[3]OO implementation languages are widely uesd
What is the fundamental characteristic of a repository model
answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i
s held in a central database or repository
How is the system organized in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
Check 4 fundamental questions that should be addressed in architectural design?
answer: [4]:[1]How will the system be distributed[2]How should the system be str
uctured[3]Is there a generic application architecture that can be used[4]What ar
chitectural style or styles are appropriate
What are advantages of pipeline model
answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne
w transformations
What are advantage of explicitly designing and documenting a software architectu
re?
answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake
holder communication[3]Helps with large-scale reuse
Which of these statements about architectural design are true?
answer: [3]:[1]Represents the link between specification and design processes[2]
Often carried out in parallel with some specification activities[3]It involves i
dentifying major system components and their communications
What are the characteristics of Interrupt-driven systems
answer: [2]:[1]Allows fast response[2]Used in real-time systems
What are the advantages of repository model
answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p
ublished as the repository schema[3]Sub-systems need not be concerned with how d
ata is produced Centralised management e.g. backup, security, ect
Which of these is a characteristic of a good design?
answer: Implements all requirements in the analysis model
List the advantages of inheritance
answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo
ut domains and systems[2]It is a reuse mechanism at both the design and the prog
ramming level[3]It is an abstraction mechanism which may be used to classify ent
ities
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: [3]:[1]Interface[2]Instruments[3]Data collection
Object oriented approach does not facilitate design evolution
answer: Flase

What are the stages in an object-oriented development process?


answer: [3]:[1]Programming[2]Analysis[3]Design
What do you understand by the system context and model of use?
answer: [2]:[1]The model of use-dynamic model[2]System context-static model
Active object typically include an infinite loop so that they are always carryin
g out the computation
answer: True
Which of the following is not an area of concern in design model
answer: Project scope
List the 5 key stages in an object-oriented design process?
answer: [5]:[1]Specify[2]Design the system[3]Identify[4]Develop[5]Understand and
define
UML(unified modeling language) analysis modeling focuses on the
answer: User model and structural model
List 4 approaches that may be used to identify object classes
answer: [4]:[1]Use scenario-based analysis[2]Grammatical[3]Use an approach[4]Ide
ntify
List three design models that are part of the UML
answer: [3]:[1]Sequence[2]Subsystem[3]State
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
What tools are normally included in a RAD environment?
answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene
rator[4]Links to office applications
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What were the key benefits of prototyping found in Gordon and Bieman's studey?
answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro
ved system quality, improved maintainability[3]Reduced development effort
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
What is test-first development
When a system feature is identified, the tests of the code implementing that fea
ture are written before the code. Tests are automated and all tests are run when
a new increment is added to the system.
What are three important characteristics of extreme programming?
answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse
d as scenarios
What are the advantages of pair programming
answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c
ommon ownership and resonsibility for the code[3]Helps support refactoring

What of these statements about the differences between incremental development a


nd prototyping are true?
answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star
ts-not well-understood
Suggest three ways that a software prototype may be used?
answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac
k tests
What are the four development stages in CBSE?
answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen
t and integration[4]Component analysis
What are the 4 sectors in each loop in Boehm's Spiral model?
answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass
essment and reduction
What are three possible classes of application framework?
answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr
ucture
List the main problems with software reuse
answer: [2]:Lack of tool support[2]Increased maintenance costs
What are three reuse types in Reuse-based software engineering
answer: [3]:[1]Component[2]Object and function[3]Application system
One of the key problems in software reuse is the inability to find existing reus
able design patterns when hundreds of candidates exist
answer: True
What design choices have to be made when reusing COTS products?
answer: [3]:[1]Which COTS products offer the most appropriate functionality[2]Wh
at features of a product will actually be used[3]How will data be exchanged betw
een different products
Which of the following is not one of the issues that form a basis for design for
reuse?
answer: Object-oriented programming
What are three types of program generator
answer: [3]:[1]Code[2]Parser and lexical analyser[3]Application
List 4 types of speciallsation of software product lines?
answer: [4]:[1]Environment[2]Functional[3]Process[4]Platform
What are the two main approaches to concept reuse?
answer: [2]:[1]Generative programming[2]Design patterns
What do Gamma et al.suggest are the four essential elements of a design pattern?
answer: [4]:[1]Solution description[2]Statement of the consequences of applying
the pattern[3]Description of the problem and when the pattern can be applied[4]M
eaningful name
What three approaches may be used when designing test cases?
answer: [3]:[1]Requirements-based[2]Partition[3]Structural
What are the two complementary goals of the testing process?
answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f

aults or defects in the software


Which type of test would you perform to accpect a build
answer: User acceptant test
Acceptance tests are normally conducted by the
answer: End users
What tests should be included in object class testing?
answer: [3]:[1]that set and access all object attributes[2]for all operations in
isolation[3]that force the object into all possible states
What is the common limitation of automated testing?
answer: They are not usefull when requirements are changing frequently
Which of the following strategic issues needs to be addressed in a successful so
ftware testing process?
answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec
hnical reviews prior to testing
What is the purpose of defect testing?
answer: To discover faults that make software's behaviour incorrect
The best reason for using Independent software test teams is that
answer: A test team will test the software more thoroughly
What is common limitation of automated testing?
answer: They are not useful when requirements are changing frequently
What are the three important classes of interface errors?
answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors
What is the normal order of activities in which software testing process is orga
nized
answer: [1]Design[2]Prepare[3]Run[4]Compare
What are three basic techniques for component identification?
answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based
New versions of software systems are created as they change
answer: [3]:[1]Offering[2]Tailored[3]For different
What facilities might be provided in system building CASE tools?
answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object
What are the objectives of change management procedures?
answer: [3]:[1]Approving[2]Tracking[3]Analyzing
When software configuration management is a formal activity, the software config
uration audit is conducted by the
answer: Quality assurance group
What is a variant?
answer: identical but non-functionally distinct from other instances of a system
The primary purpose of configuration status reporting is to
answer: Make sure that change information is communicated to all affected partie
s
What are the two types of CM workbench?

answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats
answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system
is designed to resist attacks
What are the three complementary strategies to achieve survivability?
answer: [3]:[1]Recognition[2]Recovery[3]Resistance
What is the first stage in survivability analysis
answer: Review system requirements and architecture
List 4 design guidelines for secure systems engineering?
answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al
l inputs
What are the three levels of protection that might be used in an information sys
tem?
answer: [3]:[1]Application[2]Record[3]Platform
What is infrastructure security?
answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
In Iterative development approach, which phase takes the least cost?
answer: Specification
What are generic software process models?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What is a software process model?
answer: A simplified representation of a software process, presented from a spec
ific perspective
The current trends suggest that the economies of ALL developed and developing na
tions are dependent on software
answer: True
In Waterfall approach, which phase takes the most cost?
answer: [2]:[1]Specification[2]Integration and testing
What is a software process?

answer: A set of activ ities whose goal is the development or evolution of softw
are
The distribution of the costs of software engineering NOT depends on the process
model that is used
answer: False
What are essential attributes of good software?
answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency
In Component-based software engineering approach, which phase takes the least co
st?
answer: Specification
Which is the correct sequence of the following activities in the process of Syst
em evolution?
answer: Define-Assess-Propses-Modify
What is the main difference between the Spiral model and other software processe
s models?
answer: The explicit recognition of risk in the Spiral model
What is the outputs of Requirements elicitation and analysis?
answer: System models
What is the correct sequence of the following iterations in the RUP(Rational Uni
fied Process) model?
answer: Incept-Elaborat-Construct-Transit
What is the output of Feasibility study phase in the requirements engineering pr
ocess?
answer: Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which
types of perspectives?
answer: [3]:[1]Dynamic[2]Static[3]Practice
What is the main difference between the RUP (Rational Unified Pr ocess) and othe
r software processes models?
answer: Phase are more closely related to business rather than technical concern
s
Which is the correct sequence of the following activities in the Waterfall model
?
answer: Requirement-Design-Implementation-Integration-Operation
Which is the correct sequence of the following activities in the Component-based
software engineering?
answer: Component-Requirement-Design-Development
The Waterfall approach is the BEST approach to development software when ___
answer: The software system is large and that is need developed at several sites
Three categories of risks are ___
answer: [3]:[1]Project[2]Technical[3]Business
Why many software projects are 'one-off' projects?
answer: Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure?

answer: Sets out the breakdown of the project into activ ities and identifies th
e milestones and deliverables associated with each activity
What are milestones in project planning?
answer: Milestones are the end-point of a process activity
What is the critical path?
answer: The critical path is the sequence of dependent activities that
Select the BEST statement about critical path
answer: Project manager should allocate experienced people to do the tasks on th
e critical path
What is the output of the first milestone in software requirement engineering pr
ocess?
answer: Feasibility study report document
Which is the BEST principle of project scheduling?
answer: Minimize task dependencies to avoid delays caused by one task waiting fo
r another to complete
The project schedule shows ___
answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem

ents?
answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?
answer: Class diagram-on the attributions, operations
Another name for inheritance is ___
answer: Generalization
When should you use sequence diagram?
answer: Should use sequence diagram to illustrate the sequence of steps that mus
t be performed in order to complete a task
Which models give a static view of a system?
answer: [3]:[1]Object[2]Data[3]Architectural
When should you use use-case diagram?
answer: Should use use-case diagram to represent all of the people who might use
the functionalities of the system
What are types of behavioral models?
answer: [2]:[1]Data-Flow[2]State machine
Which non-functional system requirements that the software system architecture m
ay depend on?
answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability
Select the BEST solution for architectural design of a software system that perf
ormance is a critical requirement
answer: The architectural should be designed to localise critical operations and
minimise communications, use large-grain rather thanfine-grain components
Which of the following models belong to Event-driven systems?
answer: [2]:[1]Broadcast[2]Interrupt-driven
What is the correct statement about software architectural design decisions?
answer: Architectural design is a creative process, the activities in the proces
s differs depending on the type of system being developed
Which of the following styles belong to Control styles?
answer: [2]:[1]Centralised[2]Event-based

Which of the following styles belong to System organization?


answer: [3]:[1]Repository[2]Client-server[3]Abstract machine
What is the correct statement about software architectural styles?
answer: Most large systems are heterogeneous architectur al styles
What is the correct statement about software architectural design?
answer: The architectural design is normally expressed as a block diagram presen
ting an overview of the system structure
Which of the following models belong to Centralised control?
answer: [2]:[1]Call-return[2]Manager
What are advantages of explicitly designing and documenting software architectur
e?
answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse
What are the models in architecture design?
answer: [5]Static-Dynamic-Interface-Relationship-Distribution
What are three general architectural styles?
answer: [1]System organisation[2]Decomposition styles[3]Control styles
Another name for * is a + relationship is ___
answer: Generalization
Which is the correct statement about coupling?
answer: Coupling deals with interactions between objects or software components
Which is NOT a primary goal in the design of the UML?
answer: Be dependent on particular programming language
What do you mean by coupling in software design?
answer: Coupling is a measure of the strength of association established by a co
nnection from one object or software component to another.
Which of the following is NOT an approach that may be used to identify object cl
asses?
answer: Use Event-based analysis
Which are object-oriented strategies?
answer: [3]:[1]Analysis[2]Design[3]Programming
Which is NOT the main activity in design process?
answer: Designing the test case
What is the purpose of analysis?
answer: The main objective of the analysis is to capture a complete, unambiguou
s, and consistent picture of requirements of the system and what the system must
do to satisfy the users requirement and needs
nother name for * has a + relationship is ___
answer: Composition
Which is NOT an advantage of inheritance?
answer: The inheritance graphs of analysis, design and implementation have diffe
rent functions and should be separately maintained.
Which is the correct statement about object identification?
answer: Object identification is an iterative process; it relies on the skill, e

xperience and domain knowledge of system designers


Which is the first stage in an object-oriented design process?
answer: Develop an understanding of the relationships between the software being
designed and its external environment
Which is the right sequence in the process of prototype development?
answer: Establish-Define-Develop-Evaluate
The practices small, frequent releases of the system, the approach to requiremen
ts description base on customer stories or scenarios in Extreme Programming fit
into which principle of agile methods?
answer: Incremental delivery
What are common principles of agile methods?
answer: [5]:[1]Customer[2]Incremental[3]People not[4]Embrace[5]Maintain
Which of the following BEST describes the major difficulties with incremental de
velopment?
answer: [4]:[1]Contractual[2]Validation[3]Management[4]Maintenance
Which of the following is NOT an advantage of using incremental development and
delivery?
answer: Systems are often have good structures
The practices regular system release, test -first development and continuous int
egration in Extreme Programming fit into which principle of agile methods?
answer: Embrace change
Which is NOT an advantage of rapid software development?
answer: Only senior programmer are capable of taking the kind of decisions requi
red during the development process
Which is the evidence when said that pair programming is as efficient as the same
number of programmers working individually ?
answer: Measurements suggest that development productivity with pair programming
is similar to that of two people working independently
What is a user story in extreme programming?
answer: It is a requirement expressed as scenario
The practices pair programming, collective ownership of the system code, and sus
tainable pace in Extreme Programming fit into which principle of agile methods?
answer: People not process
Who chooses the stories for inclusion in the next release based on their priorit
ies and the schedule estimates?
answer: Customer
In the extreme programming, what is the role of customer?
answer: To help develop stories that defines the requirements
Which part of the system can be reuse?
answer: [3]:[1]Application[2]Component reuse[3]Object and function
The trend of design process in most software engineering disciplines is base on
___
answer: Reuse of existing system or component
If the applications or components are developed in difference programming langua

ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?
answer: [3]:[1]faster[2]lower cost[3]increased software quality
Which is NOT a key factor that you should consider when planning reuse?
answer: The name of the application or component reuse
All of the following are types of program generator EXCEPT
answer: Component generators
What is the normal order of activities in which software testing is organized?
answer: [4]:[1]Unit[2]Integration[3]Validation[4]System
The main focus of acceptance testing is:
answer: testing from a business perspective
Unit testing is a __
answer: White box testing
The effort required for locating and fixing an error in an operational program i
s:
answer: Maintainability
Workbenches are also called ___
answer: All of the other choices
A program validates a numeric field as follows: values less than 10 are rejected
, values between 10 and 21 are accepted, values greater than or equal to 22 are
rejected
answer: 3,10,22
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
Which document identifies and describes the testing that will be implemented and
executed?
answer: Test case
The testing intended to show that previously correct software has not been adver

sely affected by changes is call:


answer: Regression testing
We split testing into distinct stages primarily because:
answer: Each test stage has a different purpose.
Which is the right sequence in the software testing process?
answer: Create test case-Prepare-Perform-Create
Which of the following is NOT part of configuration management?
answer: The people in the project team
Which is the change management concerned with?
answer: All of the other choices
Software systems are subject to continual change requests from ___
answer: Developers, Users, Market forces
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: effect of the change on the project schedule, cost, quality, and risks
Which of the following is the source for software version up?
answer: All of the other choices
A configuration management system would NOT normally provide:
answer: Facilities to compare test results with expected results.
What is a release?
answer: An instance of a system which is distributed to users outside of the dev
elopment team.
Who review and approves the change request?
answer: Change control board
Which of the following items would not come under Configuration Management?
answer: Live data
Which is the right sequence of the change management process?
answer: Request-Analyze-Submit-Make-Creat
Which are levels of protection in application security engineering?
answer: [3]:[1]Platform[2]Application[3]Record
Consider security design for username and password protection, what is the good
design?
answer: System users are authenticated using a login name/password combination.
Requires user change password after 2 months
What is the first stage in survivability analysis
answer: Review system requirements and architecture.
Password should be changed
answer: All of the other choices
Why do we need consider security for project?
answer: To protect the system against external attack
Which of the following design guidelines for secure systems engineering is NOT t
rue?

answer: Avoid using redundancy and diversity to reduce risk


What is the last stage in survivability analysis
answer: Identify softspots and surv ivability strategies.
All of the following are the complementary strategies to achieve survivability E
XCEPT
answer: Conversion
Which is the correct statement about integrity?
answer: Extent to which access to software or data by an unauthorized persons ca
n be controlled
Probability of a software failure is the
answer: Reliability
What was the software crisis?
answer: As more powerful hardware was introduced in the 1960s, larger software s
ystems were developed. These were usually late, unreliable, did not meet user ne
eds and cost more than expected. The problems of producing software was the soft
ware crisis.
What are the two fundamental types of software product?
answer: Generic products that are designed to meet the needs of many different c
ustomers. Customised products designed to meet the specific needs of a single cu
stomer.
What are the fundamental activities in software processes?
answer: [4]:[1]Specifiation[2]Development[3]Validation[4]Evolution
What are the three general paradigms of software development?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What are the principal components of a software engineering method?
answer: System model descriptions, rules, recommendations, process guidance.
Why is maintainability an important attribute of software?
answer: Because all software is subject to change after it goes into use and the
costs of software maintenance often exceeds the development costs of the softwa
re.
What is a software engineering code of ethics?
answer: A set of principles that set out, in a general way, standards of expecte
d behaviour for professional software engineers.
What are the fundamental activities that are common to all software processes?
answer: Software specification, software design and implementation, software val
idation, software evolution.
List the three fundamental software process frameworks that are used to create s
pecific software processes.
answer: [3]:[1]Waterfall[2]Evolutionary[3]Component-based
Why are iterations usually limited when the waterfall model is used?
answer: The waterfall model is a document-driven model with documents produced a
t the end of each phase. Because of the cost of producing and approving document
s, iterations and costly and involve significant rework. Hence they are limited.
Briefly describe two types of evolutionary development.
answer: Exploratory development where the objective of the process is to work wi

th customers to explore their requirements and deliver a final-system. Throw-awa


y prototyping where the objective is to develop a better understanding of the cu
stomer s requirements and deliver a better requirements specification.
What are the development stages in CBSE?
answer: [4]:[1]Component[2]Requirements[3]System[4]Development
What are the advantages of using incremental development and delivery?
answer: Early delivery of critical functionality to the customer.Early increment
s serve as prototypes to explore requirements.Lower risk of overall project fail
ure.More extensive testing of critical customer functionality.
What models might be developed when applying a structured method?
answer: [5]:[1]Object[2]Sequence[3]State transition[4]Structural[5]Data-flow
Why is it increasingly irrelevant to distinguish between software development an
d evolution?
answer: Few software systems are now completely new and a more realistic model o
f software development is of an iterative process that lasts for the life time o
f the software.
What are the four phases of the Rational Unified Process?
answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition.
What are the six fundamental best practices in the RUP?
answer: Develop software iteratively.Manage requirements.Use component-based arc
hitectures.Visually model software.Verify software quality.Control changes to so
ftware.
Give five examples of activities that can be automated using CASE.
answer: Graphical system modelling.Maintaining a data dictionary.Generating user
interfaces.Program debugging.Translating programs from one language to another.
What is the distinction between a CASE tool and a CASE workbench?
answer: A CASE tool supports an individual process task such as checking the con
sistency of a design. A CASE workbench supports sets of related activities such
as specification or design.
List five common project management activities.
answer: Any five from the following: proposal writing, project planning and sche
duling, project costing, project monitoring and reviewing, personnel selection a
nd evaluation, report writing and presentations.
What is included in a quality plan and a validation plan?
answer: Quality plan: The quality procedures and standards that should be used i
n a project.Validation plan: The approach, resources and schedule used for syste
m validation.
What is the difference between a milestone and a deliverable?
answer: A milestone is a recognised endpoint of some activity that represents a
decision point for a project. A deliverable is a project output that is delivere
d to the customer.
What is involved in project scheduling?
answer: Separating the total planned work in the project into separate activitie
s and judging the time required to complete these activities.
Explain how bar charts and activity networks give different views of a project s
chedule.
answer: Activity networks show the time required to complete an activity and the

dependence on activities. Bar charts show the activity timeline illustrating th


e relative length of activities and the dates when they take place.
What are three related categories of risk?
answer: [3]:[1]Project[2]Product[3]Business
Suggest
answer:
change,
hnology

four risks that may threaten the success of a software project.


Staff turnover, management change, hardware unavailability,requirements
specification delays, size underestimate, CASEtool underperformance, tec
change, product competition.

Give two examples of technology risks that may arise in a software project.
answer: The system database cannot process as many transactions as expected.Reus
ed software components are defective.
What is involved in risk monitoring?
answer: Regularly assessing the project risks to decide whether or not that the
risk is becoming more or less probable and whether the effects of the risk have
changed.
What are user requirements and system requirements?
answer: User requirements are statements in a language that is understandable to
a user of what services the system should provide and the constraints under whi
ch it operates.System requirements are more detailed descriptions of the system
services and constraint, written for developers of the system.
What is the distinction between functional and non-functional requirements?
answer: Functional requirements define what the system should do. Non-functional
requirements are not directly concerned with specific system functions but spec
ify required system properties or place constraints on the system or its develop
ment process.
List three types of non-functional requirement?
answer: Product-Organisational-External
What is a domain requirement? Give an example.
answer: A requirements that is derived from the application domain of the system
rather than from the specific needs of system users. For example, in a train co
ntrol system, the requirement for the train braking system depends on characteri
stics of the train and the track.
What problems can arise when requirements are written in natural language?
answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation.
What is the distinction between the terms.'shall' and 'should' in a user require
ments document?
answer: Shall normally indicates a mandatory requirement Should indicates a desirabl
e but not essential requirement
Why is it impossible to completely separate system requirements and design?
answer: The system architecture may have to be designed to structur e the requir
ements specification. Existing systems constrain the design and these constr ain
ts are requirements. The use of a specific architecture may be a requirement for
business or regulatory reasons.
What are the main advantages of using a standard format to specify requirements?
answer: All requirements have the same format so are easier to read.The definiti
on of form fields mean that writers are less likely to forget to include informa
tion.Some automated processing is possible.

What are three types of interface that may have to be defined in a requirements
document?
answer: [1]Procedural interfaces[2]Data structures[3]Representations of data
What are the two main types of event-driven control models?
answer: Broadcast models where an event is broadcast to all sub-systems Interrup
t-driven models where external events are detected and processed by an interrupt
handler
What is a reference architecture?
answer: An abstract model of a system class that can be used to inform designers
about the general structure of that type of system.
What is the distinction between validation and verification?
answer: Validation: Are we building the right product?/Verification: Are we buil
ding the product right?
What are the two complementary approaches used for checking and analysis?
answer: Software testing/Software inspections or peer reviews.
What are the principal sections included in a test plan?The testing process.
answer: Requirements traceability/Tested items/Testing schedule/Test recording p
rocedures/Constraints/Hardware and software requirements/
What are the advantages of inspections over testing?
answer: 3/Inspections can discover many errors. In testing, one error may mask a
nother/Incomplete versions of a system can be inspected/Inspections can consider
broader quality attributes as well as program defects
What are the stages in the software inspection process?
answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow
-up
List the classes of faults that should be considered in an
answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte
rface faults/Storage management faults/Exception management faults
What is automated static analysis
answer: A process where an analysis program examines the source code looking for
possible anomalies. These are drawn to the inspector s attention as they may repr
esent faults in the program
What are the main argument for the use of formal specification and verification?
answer: Formal specification forces a detailed analysis of the requirements so r
eveals errors and anomalies. Formal verification demonstrates that the program m
eets its specification so implementation errors do not compromise dependability
Why do formal specification and verification not guarantee reliability?
answer: 3/The specification may not reflect the real requirements of users/The p
roof may contain errors/The proof may assume a usage pattern which is incorrect.
What are the five key strategies used in cleanroom development?
answer: Formal specification/Incremental development/Structured programming/Stat
ic verification/Statistical testing
What is the distinction between application and infrastructure security?
answer: 2/Application security the application is designed to resist attacks/Inf
rastructure security the software is configured to r esist attacks
Define the security terms

vulnerability

and

asset

Vulnerability

answer: A weakness in a computer system that MAY be exploited to cause loss or h


arm/Asset: A system resource that has a value and so should be protected
What is security risk management?
answer: Security risk management is concerned with assessing the possible losses
that might ensue from attacks on assets in the system and balancing these losse
s against the costs of security pr ocedures that may reduce the losses.
What are the stages of preliminary risk assessment?
answer: Asset identification/Asset value assessment/Exposure assessment/Threat i
dentification/Threat probability assessment/Control identification/Feasibility a
ssessment/Security requirements definition
Suggest two possible vulnerabilities when login/password
answer: authentication is used.Users set guessable passwords/Authorised users re
veal their passwords to unauthorised users, perhaps through some social engineer
ing process
What fundamental issues have to be considered when designing system architecture
for security?
answer: 2/Protection: How should the system be organised so that critical assets
can be protected against an external attack/Distribution: How should system ass
ets be distributed so that the effects of a successful attack are minimised
What are the three levels of protection that might be used in an information sys
tem?
answer: Platform-level protection/Application-level protection/Record-level prot
ection
List four design guidelines for secure systems engineering.Base security decisio
ns on an explicit security policy
answer: Avoid a single point of failure/Use redundancy and div ersity to reduce
risk/Validate all inputs
Why is it important to design for deployment
answer: Because many security vulnerabilities are introduced when the system is
configured for use in its deployment environment
What deployment support may be included in a system?
answer: Support for viewing and analysing configurations/Default privilege minim
isation/Configuration setting localisation/Easy ways to fix security vulnerabili
ties
What are the three complementary strategies to achieve survivability
answer: Resistance/Recognition/Recovery
List the stages in survivability analysis.Review system requirements and archite
cture
answer: Identify critical services and components/Identify attacks and compromis
able components/Identify softspots and survivability strategies
Which system model is described in the following graphic
answer: Data-flow models
Change request is proposal due to ___
answer: all: Market forces/Customers/Developers
What's the difference between functional and non-functional requirements?
answer: none:The functional requirement is described in details, the other is de
scribed in high-level abstract/The functional requirement describes system prope

rties and constraints, the other describes system services


What are the user requirements?
answer: The statements in a natural language plus diagrams that describe the ser
vices' system and their constraints
Suggest a most appropriate software process model that migh t be used as a basic
for managing the developing of the software system that support categorizing go
ods based on consumption pattern, tracking payments from the customers
answer: The waterfall model
How is the system organized in a client-server model?
answer: none:A set of services is provided by servers and clients access and use
these services/A set of services is provided by clients and servers access and
usethese services
Which of the following statements about the differences between integrating test
ing and component testing are true?
answer: The integrating testing test the result of the component while the compo
nent testing test its internal structure
Which of the following statements about project management is true?
answer: The intangibility of software systems poses special problems for softwar
e project management
What are the distinctions between an object and an object class?
answer: all: The object includes state variables and operations on that state as
defined in the object class definition/An object is created at run-time by inst
antiating an object class
Which of the following is NOT a disadvantage of structured methods?
answer: There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software
answer: True
If performance is a critical requirement the architecture should be designed to
answer: localize critical operations and minimize communications; use large rath
er than fine-grain components
Which of the following does NOT belong to important principles of agile methods?
answer: Process not people
What are the advantages of explicitly designing and documenting software archite
cture?
answer: all: It improves stakeholder communications/It encourages a detailed ana
lysis of the system
Which of the following statements about test first dev elopment are true?
answer: all:When a system feature is identified, the tests of the code implement
ing that feature are written before the code/Tests are automated and all tests a
re run when a new increment is added to the system
What is the problem that cannot arise when requirements are written in natural l
anguage?
answer: Lack of user's understandability
All of the fallowings are main benefits of software reuse EXCEPT
answer: Reduce maintenance costs

Which of the following statements about testing is NOT true?


answer: Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing
is NOT true?
answer: The integration team does NOT have access to the source code of the syst
em.
Which of the following statements about Enterprise Resource Planning (ERP) syste
ms is NOT true?
answer: Enterprise Resource Planning systems are very widely used
What is the second stage of risk management process?
answer: Risk analysis
Both the waterfall model of the software process and the prototyping model can b
e accommodated in the spiral process model.
answer: True
Which of the following is a type of software process model that represents the r
oles of the people involved in the software process and the activities for which
they are responsible?
answer: An role/action model
What does computer science concern with?
answer: Computer science is concerned with theories and methods that underlie co
mputers and software systems
What are included in a quality plan?
answer: The quality procedures and standards that should be used in a project
Which of the followings belong to Server type of concurrent object implementatio
n
answer: The object is a parallel process with methods corresponding to the objec
t operations. Methods execute in response to external requests
What is meant by configuration management
answer: The dev elopment and use of standards and procedures for managing an evo
lving software system
Which of the following statements about Service-oriented software engineering is
true?
answer: Service-oriented software engineering is based on the notion that progra
ms can be constructed by composing independent services that encapsulate reusabl
e functionality
Which of the fallowings does NOT belong to the important differences between sof
tware project management and other types of project management?
answer: Cost of software project maintenance is higher than other type of projec
ts
is concerned with developing an oriented system model to implement requirements
answer: Object-oriented Analysis
What are system requirements
answer: A structured document setting out detailed descriptions of the system's
functions, services and operational constraints
What key factors should be considered when planning reuse?
answer: all: The development schedule for the software/The expected software lif

etime/The background, skills and experience of the development team


Applications frameworks are collections of concrete and abstract objects that ar
e designed to be reused through specialization and the addition of new objects
answer: true
All of the following are the main benefits of software reuse EXCEPT
answer: Reduce maintain cost
Which of the following statements about Equivalence partitioning are NOT true?
answer: none
Which of these statements about extreme programming are true?
answer: New versions may be built several times per day
Which of the following are the testing process goals
answer: all:Discover faults or defects in the software/The check that the softwa
re meets its requirements
Which of the following statements about service interfaces is true
answer: all: Service interfaces are defined in an XML-based language called WSDL
/A WSDL specification includes a definition of the interface types and operation
s, the binding protocol used by the service and the service location
Which of the following statements about security is NOT true?
answer: Security threats can be threats to the only confidentiality and integrit
y of a system or its data
All of the following are stages in an object-oriented dev elopment process EXCEP
T?
answer: Object-oriented evolution
What are the components of an object class definition in the UML
answer: all:The attributes of the class/The operations or methods associated wit
h the class/The name of the object class
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces an existing system
answer: Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements do
cument
answer: a high level statement/ a detailed system specification
What are advantages of pipeline model?
answer: all: Easy to add new transformations/Supports transformation reuse/Intui
tive organization for stakeholder communication
List the requirements document sections suggested by the IEEE standard.
answer: Introduction-General-Specific-Appendices-Index.
Which of the following statements about service interfaces is true?
answer: AWSDL
What is not an Upper-CASE tool?
answer: Borland C
A successful defect test is a test which causes a program to behave in an normal
way

answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?
answer: The system context is a static,themodel is a dynamic
When should you use data flow diagrams (DFD)?
answer: showing dai nhat
Which is the benefit of Service-oriented architectures?
answer: inter-organizational
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and operations associated with th
e problem to be solved
answer: Analysis
Software systems are subject to continual change requests from
answer: Developer,User
What are the characteristics of RAD processes?
answer: System,The system
What is not a Lower_CASE tool?
answer: Junit
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: dai nhat quat vao
Which of the followings belong to validation testing?
answer: To demonstrate,Asuccessful test shows
Change request is proposal due to
answer: All of the others
What is the correct sequence of the following activities in the Component-based
software engineering?
answer: 1,3,2,4
Which of the following statements about Equivalence partitioning are NOT true?
answer: None of the others

What types of system model may be developed?


answer: Data,Composition,Architectural,Classification,Stimulus/response
What is described in a context model?
answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment.
What is described in a state machine model?
answer: How the system responds to external events.
What is a semantic data model?
answer: A model that describes the logical structure of the data processed by a
system or managed by a database.
What are the components of an object class definition in the UML?
answer: name,attributes,operations or methods associated
What different object models may be developed?
answer: Inheritance,Object aggregation,Object behaviour
What is shown in an UML sequence model?
answer: The sequence of interactions between objects and actors in the system as
sociated with a single defined use-case.
What is a structured method?
answer: A systematic way of producing models of an existing system or of a syste
m that is to be built.
List four weaknesses of structured methods.
answer: They do not support non-functional,They rarely include,They tend to prod
uce,The models produced are detailed and often hard to understand.
What are the stages in an object-oriented development process?
answer: analysis,design,programming.
What is the distinction between an object and an object class?
answer: An object is created at run-time by instantiating an object class. The o
bject includes state variables and operations on that state as defined in the ob
ject class definition.
Briefly describe two types of concurrent object implementation.
answer: Servers: The object is a parallel process with methods corresponding to
the object operations. Methods execute in response to external requests.Active o
bjects: The state of the object is changed by internal operations within the obj
ect itself. The process executing these operations runs continuously.
List the five key stages in an object-oriented design process.
answer: Understand and define,Design,Identify,Develop,Specify object interfaces.
What do you understand by the system context and model of use?
answer: The system context is a static model of the other systems in the environ
ment of the system being designed. The model of use is a dynamic model that desc
ribes how the system being designed interacts with its environment.
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: interface,data collection,instruments
List four approaches that may be used to identify object classes.

answer: Grammatical,Identify,Use,Use scenario-based analysis.


Briefly describe three design models that are part of the UML.
answer: Subsystem,Sequence,State machine
What is the purpose of interface design in an OO design process?
answer: To define the signatures and semantics of the interfaces that are provid
ed by an object or group of objects.
Briefly explain why an OO approach facilitates design evolution.
answer: The internal details of an object are hidden from other objects so chang
ing these details is unlikely to have knock-on effects on other objects.
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services.User engagement with the syste
m.
What is the key difference between incremental development and prototyping?
answer: Incremental development starts with the requirements that are best under
stood and that have the highest priority.Prototyping is intended to help underst
and the requirements so starts with requirements that are not well understood.
List five important principles of agile methods.
answer: Customer,Incremental,People not,Embrace,Maintain
What are three important characteristics of extreme programming?
answer: Requirements,Pair programming.Test-first
What is test-first dev elopment?
answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system.
Briefly describe the advantage of pair programming.
answer: It supports the idea. It serves.It helps support
What tools are normally included in a RAD environment?
answer: database programming,interface generator,Links,report
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
Suggest three ways that a software prototype may be used.
answer: help with,explore software,run back-to-back
What were the key benefits of prototyping found in Gordon and Bieman s study?
answer: Improved system usability,Improved system quality,Reduced development ef
fort.
List the main benefits of software reuse.
answer: Increased,Reduced,Effective,Standards,Accelerated
List the main problems with software reuse.
answer: Increased,Lack,Not-invented-here,Creating,Finding
What key factors should be considered when planning reuse?
answer: development,expected,background,criticality,application,system

What is a design pattern and why are patterns important for reuse?
answer: A design pattern is a description of a problem and the essence of its so
lution. This solution is expressed in a generic way and can be instantiated and
reused in different settings.
What do Gamma et al. suggest are the four essential elements of a design pattern
?
answer: meaningful,solution,statement.
What is generator-based reuse?
answer: An approach to reuse where reusable knowledge is embedded in a generator
system which is programmed by domain experts to create the system. An executabl
e system is then generated.
What major software problem is addressed by aspect-oriented software development
?
answer: The problem of separation of concerns so that a software unit is designe
d to do one thing and one thing only.
What are three possible classes of application framework?
answer: System infrastructure,Middleware,Enterprise
What design choices have to be made when reusing COTS products?
answer: Which COTS products.How data.What features
List four types of specialisation of software product lines.
answer: Platform,Environment,Functional,Process
What are the two complementary goals of the testing process?
answer: demonstrate,discover
What is a successful defect test?
answer: successful defect test is one where the system s operation does not confor
m to its specification, i.e. one that exposes a defect in the system.
Briefly describe the two distinct phases of system testing.
answer: Integration,Release
What guidelines does Whittaker suggest for defect testing?
answer: Chose inputs,Design,Repeat,Force,Force
What is the function of stress testing?
answer: test,stress
What tests should be included in object class testing?
answer: Tests for all,Tests that set,Tests that force
What are the three important classes of interface errors?
answer: Interface misuse.Interface misunderstanding.Timing errors.
What three approaches may be used when designing test cases?
answer: Requirements-based,Partition,Structural
What is an equivalence partition? Give an example.
answer: A class of inputs or outputs where it is reasonable to expect that the s
ystem will behave the same way for all members of the class. For example, all st
rings with less than 256 characters.
What is path testing?
answer: A structural testing strategy whose objective is to exercise every indep

endent path through a program.


What is meant by configuration management?
answer: The development and use of standards and procedures for managing an evol
ving software system.
What is a baseline?
answer: A controlled system where changes to the system have to be agreed and re
corded before they are implemented.
What should be included in a configuration management plan?
answer: configuration,people,configuration,CM tool,schema
Why is it necessary to define a configuration item identification scheme?
answer: Because there may be thousands of source code modules, test scripts, des
ign documents, etc. in a large project. You have to be able to uniquely identify
and locate any specific item and so a unique naming scheme is required.
What information may be included in a configuration database?
answer: Information about configuration items such as data of creation, creator,
etc. Information about users of components, system customers, execution platfor
ms, and proposed changes to the system.
What are the objectives of change management procedures?
answer: To analyse the costs and benefits of proposed changes, approving changes
that are worthwhile, and tracking which components of the system have been chan
ged.
What is the role of a change control board?
answer: To assess the impact of proposed changes from a strategic and organisati
onal perspective rather than a technical perspective. They should decide if chan
ges are worthwhile and should prioritise changes to be implemented.
What is the difference between a system version and a system release?
answer: A system version is an instance of a system that differs, in some ways,
from other instances. A system release is a version that is released to customer
s.
What are the advantages of attribute-based version identification?
answer: When selecting components, you do not need to specify the version number
(an error-prone process if there are many components) but simply list the requi
red component attributes.
What may be included in a system release?
answer: executable,Configuration,Data,installation,Electronic
What are the key issues in system building?
answer: Have all,Are the right,Are all,Are,Is the
What are the key standards for web service-oriented architectures?
answer: SOAP,WSDL,UDDI,WS-BPEL
What is the definition of a (web) service?
answer: A loosely coupled reusable software component that encapsulates discrete
functionality which may be distributed and programmatically accessed. A web ser
vice is a service that is accessed using standard Internet and XML-based protoco
ls.
What are the components of a WSDL specification?
answer: interface specification,binding,location part

What is service engineering?


answer: The process of dev eloping services for reuse in service-oriented applic
ations.
What are the three fundamental types of service that may be identified?
answer: Utility services,Business services,Coordination services
What are the three stages in service interface design?
answer: Logical interface,Message design,WSDL development
What information is maintained in a UDDI description?
answer: Details of,informal description,Information on,Subscription information
How can web services be used to facilitate the use of legacy systems?
answer: The legacy system functionality is hidden by wrapping it in a web service
which is accessed by external applications. These applications therefore do not
need to know the protocols and data structures used by the legacy system.
Define software development with services
answer: The creation of programs by composing and configuring services to create
new composite services.
What is a workflow?
answer: A sequence of activities, ordered in time, that make up a coherent busin
ess processes with each activity carrying out some part of the work of that proc
ess.
What are the stages in service construction by composition?
answer: Formulate,Discover services,Select,Refine,Create,Test
What is the difference between BPMN and WS-BPEL?
answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a
lower-level XML-based language.
List five problems in testing service-oriented systems.
answer: Services,Dynamic,non-functional,Testing,Compensating
What are the advantage of explicitly designing and documenting a software archit
ecture?
answer: improves,encourages,helps
What non-functional requirements may be influenced by the choice of system archi
tecture?
answer: Performance, security, safety, availability, maintainability.
List four fundamental questions that should be addressed in architectural design
.Is there a generic application architecture that can be used?
answer: How will,What architectural,How should,What control,Etc.
What architectural models may be developed?
answer: static structural,dynamic process,interface,Relationship,distribution
What is the fundamental characteristic of a repository model?
answer: All shared data is held in a central database that can be accessed by al
l sub-systems.
How is the system organised in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services.

What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes
6. What is Not a type in Reuse-based software engineering?
answer: Software development process reuse
7. What is described in a context model?
answer: The immediate ecternal environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
8. Which of the follwing is Not a type of behavioral model?
answer: Architectual mode
9. What is correct phase related to the term "CASE" in software engineering?
answer: The software systems that provide automated support for software process
activities
10. Which of the followings does not belong to external requirements?
answer: Portability requiements
11. Which of the following is not a stage in componet - Base Software enginnerin
g
answer: System design with reuse
12. What activity does a software project manager need to perform to minimize th
e risk of software failure?
answer:Define milestones and track progress
13. What is describled in a state machine model?
answer: How the system responds to external event
14. The prototyping model of software development is
answer: A risky model that rarely produces a meaningful product
15. What is not a technique for component identification?
answer: Function-based identification
16. What is not an essential element of design patterns?
answer: A concrete design description
17. Which is NOT a problem that an arise when requirements are written in natura

l language?
answer: Lack of user's understandability
18. What is not an advantage of object model
answer: complex entities are easy to represent as objects
19. When software configuration management is a formal activity, the software co
nfiguration audit is conducted by the
answer: Senior managers
20. Who is mainly responsible for the component (unit) testing?
answer: Developer
21. Which is the purpose of data model?
answer: Describle the logical structure of data processed by the system
22. Why do we need to consider security for project?
answer: to protect the sestem against external attack
23. What is the main difference between RUP (Raditional Unified Process and othe
r processes?
answer: The construction phase is essentially concerned with system design, prog
ramming and testing
24. What are non-functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
25. Which of the following is not an advantage of pipeline model
answer: Easy to support event-based interaction
26. Which is Not an object-oriented strategy?
answer: Object-oriented deployment
27. What is a version?
answer: An instance of a system which is distributed to users outside of the dev
elopment team
28. Which of the following is not a stage in an object-oriented development proc
ess?
answer: Object-oriented programming
29. What is Not a main problem with software reuse?
answer: Not-invented-here syndrome
30. What are milestones?
answer: Milestones are end-point of a project phase
31. Which is the right sequence in project scheduling?
answer: (2)=>(1)=>(4)=>(3)
32. Which is Not a principal component of a software engineering method?
answer: Process activities
33. What is the common limitation of auto mated testing?
answer: They are not useful when rewuiement are changing frequently
34. What is the purpose of defect testing?
answer: To discover faults that make software's behavior incorrect

35. What is Not a characteristic of extreme programming?


answer: Delivery-first development
36. What is Not a component of a WSDL specification?
answer: The location part
37. What are the four essential attributes of the good software?
answer: Maintainability,dependability,efficiency,usability
38. What are the advantages of using an incremental approach to software develop
ment?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
39. One of the key problems in software reuse is the inability to find existing
reusable design patterns when hundreds of candidates exist
answer: True
40. What are functional requirements?
answer: Statement of services the system should provide how the system should re
act to particular inputs and how the system should behave in particular situatio
ns
41. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to arrive at a stable, consistent set of system re
quirements
42. Which of following paradigms is not a general paradigm of software developme
nt?
answer: Rapid software development
43. What is WSDL standard?
answer: A standard for workflow languages used to define service composition.
44. Which of the following design guidelines for secure systems engineering is N
OT true?
answer: Avoid using redundancy and diversity to reduce risk
45. What is the normal order of activities in which software testing process is
organized?
answer: (2)=>(1)=>(3)=>(4)
46. Which of the following is NOT a sector in each loop in Boehm's spiral model?
answer: System design
47. What is the first stage in service construction by composition?
answer: Formulate outline workflow
48. What is NOT the advantage of repository model
answer: Sub-system need not be concerned with how data
49. Which of the following is NOT an advantage of using incremental development
and dilivery?
answer: Systems are offten have good structures
50. What is NOT an objective of change management procedures?
answer: Approving changes that are worthwhite.

51. What are the advantage of explicitly designing and documenting softwore arch
itecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with
the same data, product information, the system should be performed difference pr
esentations for correspondent departments such as Product department, Quallty de
partment and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behavioural model
answer: Semantic data models
55. The student management system was completed with two functions, managing stu
dent information and organizing quizes for review, after that the customer added
one more function, organizing online examination. Finaly all of them are put in
to the configuration management and are built for system testing, so what is the
build called?
answer: Release
56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements

67. What is the firt stage in service construction by composition?


answer: Formulate outline workflow
68. List three types of program generator
answer: Application*** code*** parser and lexical
69. Which question no longer concerns the modern software engineer?
answer: Why does computer
70. What is the type of following requirement,"the result should be returned in
the real time"?
answer: Non-functional requirements
71. All of the following are advantages of pair programming EXCEPT
answer: It helps to increase
72. What is the last stage in survivabilityanalysis?
answer: Identify softspots and sur
73. How to build security for the CMS system?
answer: Building system authemtication
74. Which of these statements about defect testing is NOT true?
answer: A successful test
75. Which one is program type of the Java compite,Javac?
answer: Parser and lexical analyser generators
76. Which of following statements about software engineering is NOT true?
answer: SOftware costs more to develop than it does to maintain
How is the software engineering?
answer: a. It provides developers discipline to develop a software product
What are the ethical responsibilities of the software engineers?
answer: Software engineers should..Software engineers shall be ..Software engine
ers shall maintain integrity and independence in their professional judgment
What is the difference between software engineering and computer science?
answer: Computer science is concerned with theory and fundamentals;Software engi
neering is concerned with the practicalities of developing and delivering useful
software
Which of these statements about Software costs are true?
answer: Software costs more to maintain .. The costs of software ..Software cos
ts often dominate computer system costs
How are the prototyping development?
answer: Specification, development and..Should start with poorly ..Objective is
to understand the system requirements and clarify what is really needed
What are the most fundamental activities in software processes?
answer: Software specification, software development, software validation, softw
are evolution
Which process model is used in the Rational Unified Process?
answer: c. Iteration
Evolutionary software process models
answer: Are iterative in nature. Can easily accommodate product requirements ch
anges
The component-based development model is
answer: Works best when object technologies are available for support
How are the software project management?
answer: Consider budget and .. Consider software ..Software engineering discipl

ine is not the same as other domains


What should include in the project plan?
answer: a. Work breakdown structure
c. Project schedule d. Risk report
What should we do to manage risk?
answer: Monitor the risks throughout the .. Make contingency plans .. Risk ass
essment
Which factors should be considered in choosing the organizational structure for
a software team?
answer: Degree of communication .. Rigidity of the delivery date .. Predicted s
ize of the resulting program
One of the best ways to avoid frustration during the software development proces
s is to
answer: Give team members more control over process and technical decisions
How are the non-functional requirements?
answer: Timing constraints d. Define system properties and constraints
How are the user requirements?
answer: Non-functional requirements are .. They are tables and diagrams which c
an be understood by all users
What happen when using natural language to describe requirements?
answer: Several different requirements ..Requirements, system .. Easy to misunde
rstand between reader and writer
The system specification describes the
answer: a. Function, performance and constraints of a computer-based system
The best way to conduct a requirements validation review is to
answer: a. Use a checklist of questions to examine each requirement
How are the context model?
answer: Social and organisational concerns may ..They show what lies ..Relations
hip with other systems
Which ones relate to the behavioural model?
answer: Show the processing steps as .. Data flow diagrams are used in .. State
diagrams show states when the systems response to events
Which relationships are used in the data model?
answer: b. Association c. Aggregation d. Inheritance
UML diagram used creating a system analysis model
answer: d. Dataflow diagram
The data dictionary contains descriptions of each software
answer: b. Data object d. Control item
Which information are refered to make architectural design?
answer: Which components are distributed .. How the sub-system is .. A generic a
pplication architecture can be used
Which ones mention to the decomposition style?
answer: Data-flow model where the system is .. An object model where the system
is designed into interacting objects
Which ones mention to the control style?
Answer: One sub-system has responsibility for .. Each sub-system can respond to
externally generated events from other sub-systems
An architectural style encompasses which of the following elements?
answer: a. Set of components c. Semantic models
d. Constraints
To determine the architectural style or combination of styles that best fits the
proposed system, requirements engineering is used to uncover
answer: c. Characteristics and constraints
Which relationships are used in the object-oriented design process?
answer: a. Inheritance b. Association c. Aggregation
Which ones are used in the dynamic models?
answer: a. Active or passive objects b. Interaction relationships d. Object li
felines
How to identify objects within the system?

answer: Base on tangible things in the .. Depend on the skill, ..Base on iterati
ve scenarios
Which of the following is not a characteristic common to all design methods?
answer: c. configuration management
What types of abstraction are used in software design?
answer: a. Data c. Control d. Procedural
Which of the following traits need to exist among the members of an agile softwa
re team?
answer: b. Mutual trust and respect c. Competence d. Decision-making ability
Which of the following is not necessary to apply agility to a software process?
answer: c. Only essential work products are produced
When is the design pattern applied to?
answer: Re-use experiences .. Re-use difference settings .. Re-use abstract kno
wledge about a problem and its solution
Which ones are framework classes?
answer: System infrastructure ..Enterprise application framework Middleware in
tegration framework
Extending the framework involves
answer: Adding methods that are called in response to ..Adding concrete classes
that inherit operations from abstract classes in the framework
Adaptation in software product lines may involve
answer: Adding new .. Selecting from a ..Component and system ..Modifying compon
ents to meet new requirements
How are the system testing?
answer: Testing on integrating components..Testing on integrating ..Testing is d
one by an independent testing team
How are the component testing?
answer: b. Testing is done by component..Testing on individual program component
s to create a sub-system
Which types of testing are done by development team?
answer: a. Stress testing b. Interface testing d. Release testing
Which of the following need to be assessed during unit testing?
answer :b. Error handling d. Execution paths
Top-down integration testing has as it's major advantage(s) that
answer: a. Major decision points are tested early c. No drivers need to be writt
en
Why is the configuration management applied?
answer: Make the product development.. to evolve software product.. Aim to contr
ol the costs and effort involved in making changes to a system
Which development phases are included in the configuration management plan?
answer: a. Testing c. Design d. Implementation
Which information are included in the component header?
answer: a. Author of the component and c. Project name d. Version number and w
hat were changed
Which of the following is not considered one of the four important elements that
should exist when a configuration management system is developed?
answer: d. Human elements
Which of the following tasks is not part of software configuration management?
answer: Statistical quality control
What are the security risk management concerned?
answer: Assessing the possible losses that .. Balancing the possible losses aga
inst the costs of security procedures that may reduce these losses
How are analyse assets of the system?
answer: Set the level of exposure of .. Identify system resources..Set level of

value of each asset


What are the design guidelines to make the secure system?
answer: Raise awaremess of the security issues b. Consider as basic of a review
checklist that is applied during the system validation process
What is the first layer of system layers?
answer: c. Application
What is the last layer of system layers?
answer: c. Operation system
Which ones are related to the service-oriented architectures?
answer: Services may execute on..Protocols have been developed ..A system where
the components are stand-alone services
What are the service testing problems?
answer: Service testing is difficult. Non-functional behaviour ..External servic
es may be modified by the service provider thus invalidating tests which have be
en completed
What is the last stage in service construction by composition?
answer: d. Test service
What is the output of "Refine workflow" in Construction by composition?
answer: c. Workflow design
Which benefits of the incremental development?
answer: Meet requirements quickly ..The processes of specification..Rapid to del
ivery the highest priority functionalities to the customer

Das könnte Ihnen auch gefallen