Beruflich Dokumente
Kultur Dokumente
Functional requirements:
Answer: Statements of services the system should provide how the system should r
eact to particular inputs and how the system should behave in particular situati
ons
Domain requirements:
Answer: Requirements that come from the application domain of the system and th
at reflect characteristics of that domain
Non
functional requirements:
Answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standard, etc
3 types of non
functional requirement
Answer: Product requirements External requirements Organization requirements
5 requirements document sections suggested by the IEEE standard:
Answer: General description.Specific requirements.Introduction.Appendices.Index
The followings belong to external requirements
Answer: Interoperability requirements. Legislative requirements. Ethical require
ments
Problems can arise when requirements are written in natural language
Answer: Requirement confusion. Requirement amalgamation. Lack of clarity
User requirement
Answer: Statements in natural language plus diagrams of the services the system
provides and its operational constraints. Written for customers
System requirements
Answer: A structured documents setting out detailed descriptions of the system s
function, services and operational constrains
The software requirements document
Answer: The official document that defines the requirements that should be imple
mented by the system developers
Construct a system model, the engineer should consider one of the following rest
raining factors
Answer: Assumptions and constrains
Described in a semantic data model
Answer: The logical structure of the data processed by a system or managed by a
database
Described in a context model
Answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment
Described in a state machine model
Answer: How the system responds to external events
The model types does NOT represent software architecture
Answer: Data model
The following is NOT an area of concern in the design model
2 types of CM workbench
Answer: Integrated workbenches. Open workbenches
3 basic techniques for component identification
Answer: Version numbering. Change-oriented identification. Attribute-based ident
ification
New versions of software system are created as they change
Answer: Offering different .. Tailored for particular user .. For different mach
ines/OS
Facilities might be provided in system building CASE tools
Answer: A dependency specification..Tool selection and..Distributed compilation.
Derived object management
The objectives of change management procedures
Answer: Approving changes .. Tracking which components.. Analyzing the costs and
benefits of proposed changes
The primary purpose of configuration status reporting is to
Answer: Make sure that change information is communicated to all affected partie
s
Software systems are subject to continual change requests
Answer: From developers. From users. From market forces
Which formal activity, the software configuration audit is conducted by the
Answer: Quality assurance group
Release is
Answer: An instance of a system which is distributed to users outside of the dev
elopment team
Variant is
Answer: An instance of a system which is functionally identical but non-function
ally distinct from other instances of a system
Version is
Answer: An instance of a system which is functionally distinct in some way from
other system instances
Vulnerability is
Answer: A weakness in a computer-based system that may be exploited to cause los
s or harm
Attack is
Answer: An exploitation of a system s vulnerability. Generally, this is from outsi
de the system and is a deliberate attempt to cause some damage
Threats is
Answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
Application security
Answer: Application security is a software engineering problem where the system
is designed to resist attacks
Infrastructure security
Answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
First stage in survivability analysis
Answer: Review system requirements and architecture
Security risk management involve
Answer: Preliminary risk assessment. Life cycle risk assessment
What is visual programming
Answer: An approach to development where a programmer manipulates graphical icon
s representing
Which of the followings belong to Server type of concurrent object implementatio
n
Answer: All of the others(the object is a parallel + the state of the obj ..)
Are the end-point of a a process activity
Answer: Milestones
What does the rapid application development concern with
Answer: An iterative approach to software development leads to faster delivery o
f software
Select the most suitable software process model for a project that are developed
at different sites
Answer: Throw-away prototyping
Are ery abstract. They do not show the nature of component relationships nor the
externally visible properties of the sub-systems. However, they useful for comm
unication with stakeholders and for project planning.
Answer: Box and line diagrams
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces and existing system
Answer: Waterfall model
Select the type of following requirement: The system shall provide appropriate vi
ewers for the user to read documents in the document store
Answer: Functional requirement
Consider security design for username and password protection, what is the good
design?
Answer: System users are authenticated using a login
Which process model is most appropriate for a large software project with stable
requirements?
Answer: Waterfall
Different models present the system from different perspective: perspective show
ing the system s context or environment; perspective showing the behavior of the s
ystem; perspective showing the system or data architecture.
Answer: External, Behavioural, Structural
What are the advantages of explicitly designing and documenting software archite
cture?
Answer: All of the others (improve stakeholder, encourages a detailed ..)
What can be represented by a workflow model?
Answer: The sequence of activities in the process along with ..
What do gamma et al.suggest are the four essential elements
Answer: A statement of .. A meaningful .. A solution.. A description of the prob
lem
What is not an Upper-CASE tool?
Answer: Borland C
A successful defect test is a test which causes a program to behave in normal wa
y
Answer: False
What are the advantages of pair programming
Answer: It serves as an informal .. It supports the idea of common ..
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
Answer: None of the others
Which one is not a web service standard?
Answer: WSDL
What are system requirements?
Answer: A structured document setting out detailed ..
When should you use data flow diagrams (DFD)?
Answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and opereations associated with
the problem to be solved
Answer: Object-oriented analysis.
What are characteristics of RAD processes?
Answer: System user interface .. The system is developed in a series ..
What is not a Lower-CASE tool
Answer: Junit
y
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
What is the software requirements document?
answer: The official document that defines the requirements that should be imple
mented by the system developers
To construct a system model the engineer should consider one of the following re
straining factors?
answer: Assumptions and constraints
What described in a semantic data model?
answer: The local structure of the data processed by a system or managed by a da
tabase.
Which of these model types does not represent software architecture?
answer: Data model
Which of the following is not an area of concern in the design model?
answer: Project scope
What different object models may be developed?
answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance
models
What are the components of an object class definition in the UML?
answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o
r methods associated with the class
What perspectives may be used for system modelling?
answer: [3]:[1]Structural[2]External[3]Behavioral
What is described in a context model?
answer: The immediate external environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
What are the two principle styles used for modular decomposition?
answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining
What are advantages of object model
answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely
coupled so their implementation can be modified without affecting other objects
[3]OO implementation languages are widely uesd
What is the fundamental characteristic of a repository model
answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i
s held in a central database or repository
How is the system organized in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
Check 4 fundamental questions that should be addressed in architectural design?
answer: [4]:[1]How will the system be distributed[2]How should the system be str
uctured[3]Is there a generic application architecture that can be used[4]What ar
chitectural style or styles are appropriate
ntify
List three design models that are part of the UML
answer: [3]:[1]Sequence[2]Subsystem[3]State
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
What tools are normally included in a RAD environment?
answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene
rator[4]Links to office applications
The prototyping model of software development is
answer: A useful approach when a customer cannot define requirements clearly
What were the key benefits of prototyping found in Gordon and Bieman's studey?
answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro
ved system quality, improved maintainability[3]Reduced development effort
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
What is test-first development
When a system feature is identified, the tests of the code implementing that fea
ture are written before the code. Tests are automated and all tests are run when
a new increment is added to the system.
What are three important characteristics of extreme programming?
answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse
d as scenarios
What are the advantages of pair programming
answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c
ommon ownership and resonsibility for the code[3]Helps support refactoring
What of these statements about the differences between incremental development a
nd prototyping are true?
answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star
ts-not well-understood
Suggest three ways that a software prototype may be used?
answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac
k tests
What are the four development stages in CBSE?
answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen
t and integration[4]Component analysis
What are the 4 sectors in each loop in Boehm's Spiral model?
answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass
essment and reduction
What are three possible classes of application framework?
answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr
ucture
The best reason for using Independent software test teams is that
answer: A test team will test the software more thoroughly
What is common limitation of automated testing?
answer: They are not useful when requirements are changing frequently
What are the three important classes of interface errors?
answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors
What is the normal order of activities in which software testing process is orga
nized
answer: [1]Design[2]Prepare[3]Run[4]Compare
What are three basic techniques for component identification?
answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based
New versions of software systems are created as they change
answer: [3]:[1]Offering[2]Tailored[3]For different
What facilities might be provided in system building CASE tools?
answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object
What are the objectives of change management procedures?
answer: [3]:[1]Approving[2]Tracking[3]Analyzing
When software configuration management is a formal activity, the software config
uration audit is conducted by the
answer: Quality assurance group
What is a variant?
answer: identical but non-functionally distinct from other instances of a system
The primary purpose of configuration status reporting is to
answer: Make sure that change information is communicated to all affected partie
s
What are the two types of CM workbench?
answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats
answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system
answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem
ents?
answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?
delivery?
answer: Systems are often have good structures
The practices regular system release, test -first development and continuous int
egration in Extreme Programming fit into which principle of agile methods?
answer: Embrace change
Which is NOT an advantage of rapid software development?
answer: Only senior programmer are capable of taking the kind of decisions requi
red during the development process
Which is the evidence when said that pair programming is as efficient as the same
number of programmers working individually ?
answer: Measurements suggest that development productivity with pair programming
is similar to that of two people working independently
What is a user story in extreme programming?
answer: It is a requirement expressed as scenario
The practices pair programming, collective ownership of the system code, and sus
tainable pace in Extreme Programming fit into which principle of agile methods?
answer: People not process
Who chooses the stories for inclusion in the next release based on their priorit
ies and the schedule estimates?
answer: Customer
In the extreme programming, what is the role of customer?
answer: To help develop stories that defines the requirements
Which part of the system can be reuse?
answer: [3]:[1]Application[2]Component reuse[3]Object and function
The trend of design process in most software engineering disciplines is base on
___
answer: Reuse of existing system or component
If the applications or components are developed in difference programming langua
ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?
answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition.
What are the six fundamental best practices in the RUP?
answer: Develop software iteratively.Manage requirements.Use component-based arc
hitectures.Visually model software.Verify software quality.Control changes to so
ftware.
Give five examples of activities that can be automated using CASE.
answer: Graphical system modelling.Maintaining a data dictionary.Generating user
interfaces.Program debugging.Translating programs from one language to another.
What is the distinction between a CASE tool and a CASE workbench?
answer: A CASE tool supports an individual process task such as checking the con
sistency of a design. A CASE workbench supports sets of related activities such
as specification or design.
List five common project management activities.
answer: Any five from the following: proposal writing, project planning and sche
duling, project costing, project monitoring and reviewing, personnel selection a
nd evaluation, report writing and presentations.
What is included in a quality plan and a validation plan?
answer: Quality plan: The quality procedures and standards that should be used i
n a project.Validation plan: The approach, resources and schedule used for syste
m validation.
What is the difference between a milestone and a deliverable?
answer: A milestone is a recognised endpoint of some activity that represents a
decision point for a project. A deliverable is a project output that is delivere
d to the customer.
What is involved in project scheduling?
answer: Separating the total planned work in the project into separate activitie
s and judging the time required to complete these activities.
Explain how bar charts and activity networks give different views of a project s
chedule.
answer: Activity networks show the time required to complete an activity and the
dependence on activities. Bar charts show the activity timeline illustrating th
e relative length of activities and the dates when they take place.
What are three related categories of risk?
answer: [3]:[1]Project[2]Product[3]Business
Suggest
answer:
change,
hnology
Give two examples of technology risks that may arise in a software project.
answer: The system database cannot process as many transactions as expected.Reus
ed software components are defective.
What is involved in risk monitoring?
answer: Regularly assessing the project risks to decide whether or not that the
risk is becoming more or less probable and whether the effects of the risk have
changed.
What are user requirements and system requirements?
answer: User requirements are statements in a language that is understandable to
a user of what services the system should provide and the constraints under whi
ch it operates.System requirements are more detailed descriptions of the system
services and constraint, written for developers of the system.
What is the distinction between functional and non-functional requirements?
answer: Functional requirements define what the system should do. Non-functional
requirements are not directly concerned with specific system functions but spec
ify required system properties or place constraints on the system or its develop
ment process.
List three types of non-functional requirement?
answer: Product-Organisational-External
What is a domain requirement? Give an example.
answer: A requirements that is derived from the application domain of the system
rather than from the specific needs of system users. For example, in a train co
ntrol system, the requirement for the train braking system depends on characteri
stics of the train and the track.
What problems can arise when requirements are written in natural language?
answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation.
What is the distinction between the terms.'shall' and 'should' in a user require
ments document?
answer: Shall normally indicates a mandatory requirement Should indicates a desirabl
e but not essential requirement
Why is it impossible to completely separate system requirements and design?
answer: The system architecture may have to be designed to structur e the requir
ements specification. Existing systems constrain the design and these constr ain
ts are requirements. The use of a specific architecture may be a requirement for
business or regulatory reasons.
What are the main advantages of using a standard format to specify requirements?
answer: All requirements have the same format so are easier to read.The definiti
on of form fields mean that writers are less likely to forget to include informa
tion.Some automated processing is possible.
What are three types of interface that may have to be defined in a requirements
document?
answer: [1]Procedural interfaces[2]Data structures[3]Representations of data
What are the two main types of event-driven control models?
answer: Broadcast models where an event is broadcast to all sub-systems Interrup
t-driven models where external events are detected and processed by an interrupt
handler
What is a reference architecture?
answer: An abstract model of a system class that can be used to inform designers
about the general structure of that type of system.
What is the distinction between validation and verification?
answer: Validation: Are we building the right product?/Verification: Are we buil
ding the product right?
What are the two complementary approaches used for checking and analysis?
answer: Software testing/Software inspections or peer reviews.
What are the principal sections included in a test plan?The testing process.
answer: Requirements traceability/Tested items/Testing schedule/Test recording p
answer: The intangibility of software systems poses special problems for softwar
e project management
What are the distinctions between an object and an object class?
answer: all: The object includes state variables and operations on that state as
defined in the object class definition/An object is created at run-time by inst
antiating an object class
Which of the following is NOT a disadvantage of structured methods?
answer: There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software
answer: True
If performance is a critical requirement the architecture should be designed to
answer: localize critical operations and minimize communications; use large rath
er than fine-grain components
Which of the following does NOT belong to important principles of agile methods?
answer: Process not people
What are the advantages of explicitly designing and documenting software archite
cture?
answer: all: It improves stakeholder communications/It encourages a detailed ana
lysis of the system
Which of the following statements about test first dev elopment are true?
answer: all:When a system feature is identified, the tests of the code implement
ing that feature are written before the code/Tests are automated and all tests a
re run when a new increment is added to the system
What is the problem that cannot arise when requirements are written in natural l
anguage?
answer: Lack of user's understandability
All of the fallowings are main benefits of software reuse EXCEPT
answer: Reduce maintenance costs
Which of the following statements about testing is NOT true?
answer: Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing
is NOT true?
answer: The integration team does NOT have access to the source code of the syst
em.
Which of the following statements about Enterprise Resource Planning (ERP) syste
ms is NOT true?
answer: Enterprise Resource Planning systems are very widely used
What is the second stage of risk management process?
answer: Risk analysis
Both the waterfall model of the software process and the prototyping model can b
e accommodated in the spiral process model.
answer: True
Which of the following is a type of software process model that represents the r
oles of the people involved in the software process and the activities for which
they are responsible?
s, the binding protocol used by the service and the service location
Which of the following statements about security is NOT true?
answer: Security threats can be threats to the only confidentiality and integrit
y of a system or its data
All of the following are stages in an object-oriented dev elopment process EXCEP
T?
answer: Object-oriented evolution
What are the components of an object class definition in the UML
answer: all:The attributes of the class/The operations or methods associated wit
h the class/The name of the object class
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces an existing system
answer: Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements do
cument
answer: a high level statement/ a detailed system specification
What are advantages of pipeline model?
answer: all: Easy to add new transformations/Supports transformation reuse/Intui
tive organization for stakeholder communication
List the requirements document sections suggested by the IEEE standard.
answer: Introduction-General-Specific-Appendices-Index.
Which of the following statements about service interfaces is true?
answer: AWSDL
What is not an Upper-CASE tool?
answer: Borland C
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?
answer: The sequence of interactions between objects and actors in the system as
sociated with a single defined use-case.
What is a structured method?
answer: A systematic way of producing models of an existing system or of a syste
m that is to be built.
List four weaknesses of structured methods.
answer: They do not support non-functional,They rarely include,They tend to prod
uce,The models produced are detailed and often hard to understand.
What are the stages in an object-oriented development process?
answer: analysis,design,programming.
What is the distinction between an object and an object class?
answer: An object is created at run-time by instantiating an object class. The o
bject includes state variables and operations on that state as defined in the ob
ject class definition.
Briefly describe two types of concurrent object implementation.
answer: Servers: The object is a parallel process with methods corresponding to
the object operations. Methods execute in response to external requests.Active o
bjects: The state of the object is changed by internal operations within the obj
ect itself. The process executing these operations runs continuously.
List the five key stages in an object-oriented design process.
answer: Understand and define,Design,Identify,Develop,Specify object interfaces.
What do you understand by the system context and model of use?
answer: The system context is a static model of the other systems in the environ
ment of the system being designed. The model of use is a dynamic model that desc
ribes how the system being designed interacts with its environment.
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: interface,data collection,instruments
List four approaches that may be used to identify object classes.
answer: Grammatical,Identify,Use,Use scenario-based analysis.
Briefly describe three design models that are part of the UML.
answer: Subsystem,Sequence,State machine
What is the purpose of interface design in an OO design process?
answer: To define the signatures and semantics of the interfaces that are provid
ed by an object or group of objects.
Briefly explain why an OO approach facilitates design evolution.
answer: The internal details of an object are hidden from other objects so chang
ing these details is unlikely to have knock-on effects on other objects.
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services.User engagement with the syste
m.
What is the key difference between incremental development and prototyping?
answer: Incremental development starts with the requirements that are best under
stood and that have the highest priority.Prototyping is intended to help underst
and the requirements so starts with requirements that are not well understood.
What is a workflow?
answer: A sequence of activities, ordered in time, that make up a coherent busin
ess processes with each activity carrying out some part of the work of that proc
ess.
What are the stages in service construction by composition?
answer: Formulate,Discover services,Select,Refine,Create,Test
What is the difference between BPMN and WS-BPEL?
answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a
lower-level XML-based language.
List five problems in testing service-oriented systems.
answer: Services,Dynamic,non-functional,Testing,Compensating
What are the advantage of explicitly designing and documenting a software archit
ecture?
answer: improves,encourages,helps
What non-functional requirements may be influenced by the choice of system archi
tecture?
answer: Performance, security, safety, availability, maintainability.
List four fundamental questions that should be addressed in architectural design
.Is there a generic application architecture that can be used?
answer: How will,What architectural,How should,What control,Etc.
What architectural models may be developed?
answer: static structural,dynamic process,interface,Relationship,distribution
What is the fundamental characteristic of a repository model?
answer: All shared data is held in a central database that can be accessed by al
l sub-systems.
How is the system organised in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services.
What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes
56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
67. What is the firt stage in service construction by composition?
answer: Formulate outline workflow
68. List three types of program generator
answer: Application*** code*** parser and lexical
69. Which question no longer concerns the modern software engineer?
answer: Why does computer
70. What is the type of following requirement,"the result should be returned in
the real time"?
answer: Non-functional requirements
71. All of the following are advantages of pair programming EXCEPT
answer: It helps to increase
72. What is the last stage in survivabilityanalysis?
answer: Identify softspots and sur
73. How to build security for the CMS system?
answer: Building system authemtication
Question 4
Marks: 1
Which of these statements about Software costs are true?
a. Software costs more to maintain than it does to develop
b. The costs of software on a PC are often greater than the hardware cos
t
c. Software costs often dominate computer system costs
d. Software costs more to develop than it does to maintain
answer:
a. Software costs more to maintain than it does to develop b. The costs of softw
are on a PC are often greater than the hardware cost c. Software costs often dom
inate computer system costs
Question 5
Marks: 1
How are the prototyping development?
a. Should start with well-understood requirements
b. Specification, development and validation are interleaved
c. Should start with poorly understood requirements
d. Objective is to understand the system requirements and clarify what i
s really needed
answer:
b. Specification, development and validation are interleaved
c. Should start with poorly understood requirements
d. Objective is to understand the system requirements and clarify what is really
needed
Question 6
Marks: 1
What are the most fundamental activities in software processes?
a. Software specification, software development, software validation, so
ftware evolution
b. Software specification, software development, software testing, softw
are evolution
c. Software specification, software development, software validation, so
ftware maintenance
d. Software requirement, software development, software validation, soft
ware evolution
answer:
a. Software specification, software development, software validation, software e
volution
Question 7
Marks: 1
Which process model is used in the Rational Unified Process (RAD)?
a. Waterfall
b. Transition
c. Iteration
d. Construction
answer:
c. Iteration
Question 8
Marks: 1
answer:
a. Are iterative in nature
d. Can easily accommodate product requirements changes
Question 9
Marks: 1
The component-based development model is
a.
b.
c.
d.
answer:
c. Works best when object technologies are available for support
Question 10
Marks: 1
How are the software project management?
a.
b.
c.
d.
answer:
b. Consider budget and schedule constraints
c. Consider software development process is not standardised
d. Software engineering discipline is not the same as other domains
Question 11
Marks: 1
What should include in the project plan?
a.
b.
c.
d.
answer:
a. Work breakdown structure
c. Project schedule
d. Risk report
Question 12
Marks: 1
What should we do to manage risk?
a.
b.
c.
d.
answer:
Give team members more control over process and technical decisions
Hide bad news from the project team members until things improve
Reward programmers based on their productivity.
Give team members more control over process and technical decisions
answer:
a. Give team members more control over process and technical decisions
Question 15
Marks: 1
How are the non-functional requirements?
a. Timing constraints
b. Statements of services should react to particular inputs
c. They come from the application domain of the system and reflect chara
cteristics of that domain
d. Define system properties and constraints
answer:
a. Timing constraints
d. Define system properties and constraints
Question 16
Marks: 1
How are the user requirements?
a. Non-functional requirements are requested by customer
b. Requirements which programmers can develop right after understanding
them
c. Functional requirements are described by system users
d. They are tables and diagrams which can be understood by all users
answer:
a. Non-functional requirements are requested by customer
c. Functional requirements are described by system users
d. They are tables and diagrams which can be understood by all users
Question 17
Marks: 1
What happen when using natural language to describe requirements?
a. Several different requirements may be expressed together as a single
requirement
b. Requirements, system goals and design information may not be clearly
distinguished
c. Easy to misunderstand between reader and writer
d. It provides the most complete information for developers
answer:a. Several different requirements may be expressed together as a single r
equirement b. Requirements, system goals and design information may not be clea
rly distinguished
c. Easy to misunderstand between reader and writer
Question 18
Marks: 1
The system specification describes the
a. Function, performance and constraints of a computer-based system
b. Implementation of each allocated system
c. Time required for system simulation
d. Element software architecture
answer:a. Function, performance and constraints of a computer-based system
Question 19
Marks: 1
The best way to conduct a requirements validation review is to
a. Use a checklist of questions to examine each requirement
b. Send them to the design team and see if they have any concerns
c. Have the customer look over the requirements
d. Examine the system model for errors
answer:a. Use a checklist of questions to examine each requirement
Question 20
Marks: 1
How are the context model?
a.
o position
b.
c.
d.
answer: a.
o position
ries
c.
Question 21
Marks: 1
Which ones relate to the behavioural model?
a. Show the processing steps as data flows through a system
b. Data flow diagrams are used in performing the data exchange between a
system and other systems
Interaction
Association
Aggregation
Inheritance
Class diagram
State diagram
Activity diagram
Dataflow diagram
Notation
Data object
Diagram
Control item
Data object d. Control item
Question 25
Marks: 1
Which information are refered to make architectural design?
a.
b.
c.
d.
answer:a. Which components are distributed in the system b. How the sub-system
is decomposed into modules d. A generic application architecture can be used
Question 26
Marks: 1
Which ones mention to the decomposition style?
a. Data-flow model where the system is designed into functional modules which tr
ansform inputs to outputs
b. One sub-system has responsibility for starts and stops other sub-syst
ems
c. An object model where the system is designed into interacting objects
d. Each sub-system can respond to externally generated events from other
sub-systems
answer:a. Data-flow model where the system is designed into functional modules w
hich transform inputs to outputs c. An object model where the system is designed
into interacting objects
Question 27
Marks: 1
Which ones mention to the control style?
a. One sub-system has responsibility for starts and stops other sub-syst
ems
b. Data-flow model where the system is designed into functional modules
which transform inputs to outputs
c. Each sub-system can respond to externally generated events from other
sub-systems
d. An object model where the system is designed into interacting objects
answer:a. One sub-system has responsibility for starts and stops other sub-syste
ms c. Each sub-system can respond to externally generated events from other subsystems
Question 28
Marks: 1
An architectural style encompasses which of the following elements?
a. Set of components
b. syntactic models
c. Semantic models
d. Constraints
answer:a. Set of components c. Semantic models d. Constraints
Question 29
Marks: 1
To determine the architectural style or combination of styles that best fits th
e proposed system, requirements engineering is used to uncover
a.
b.
c.
d.
Algorithmic complexity
Control and data
Characteristics and constraints
Design patterns
answer:a. Inheritance
b. Association c. Aggregation
b. Interaction relationships
d. Objec
Question 32
Marks: 1
How to identify objects within the system?
a. Base on the static and dynamic models
b. Base on tangible things in the application domain
c. Depend on the skill, experience and domain knowledge of system design
ers
d. Base on iterative scenarios
answer:
b. Base on tangible things in the application domain
c. Depend on the skill, experience and domain knowledge of system designers
d. Base on iterative scenarios
Question 33
Marks: 1
Which of the following is not a characteristic common to all design methods?
a. Notation quality assessment
b. Functional component
c. configuration management
d. Guidelines refinement heuristics
answer:
c. configuration management
Question 34
Marks: 1
What types of abstraction are used in software design?
a.
b.
c.
d.
Data
Environmental
Control
Procedural
answer:
a. Data
c. Control
d. Procedural
Question 35
Marks: 1
Which of the following traits need to exist among the members of an agile softw
are team?
a.
b.
c.
d.
answer:
b. Mutual trust and respect
c. Competence
d. Decision-making ability
Question 36
Marks: 1
Which of the following is not necessary to apply agility to a software process?
a. Uses incremental product delivery strategy
b. Eliminate the use of project planning and testing
c. Only essential work products are produced
d. Process allows team to streamline tasks
answer:c. Only essential work products are produced
Question 37
Marks: 1
When is the design pattern applied to?
a. Re-use experiences of the specialists who developed reusable software
b. Re-use to develop non-functionalities
c. Re-use difference settings of the abstract knowledge
d. Re-use abstract knowledge about a problem and its solution
answer:
a. Re-use experiences of the specialists who developed reusable software
c. Re-use difference settings of the abstract knowledge
d. Re-use abstract knowledge about a problem and its solution
Question 38
Marks: 1
Which ones are framework classes?
.
a. System infrastructure framework
b. Enterprise application framework
c. Middleware integration framework
d. Parser and lexical analysing framework
answer:
a. System infrastructure framework
b. Enterprise application framework
c. Middleware integration framework
Question 39
Marks: 1
Extending the framework involves
a. Adding methods that are called in response to events that are recogni
sed by the framework
b. Adding data objects that are used in the framework
c. Adding concrete classes that inherit operations from abstract classes
in the framework
answer:a. Adding methods that are called in response to events that are recognis
ed by the framework
c. Adding concrete classes that inherit operations from
abstract classes in the framework
Question 40
Marks: 1
Adaptation in software product lines may involve
a.
b.
c.
d.
e.
b. Interface testing
d. Release testing
Question 44
Marks: 1
Which of the following need to be assessed during unit testing?
a. Code stability
b. Error handling
c. Algorithmic performance
d. Execution paths
answer:b. Error handling d. Execution paths
Question 45
Marks: 1
Top-down integration testing has as it's major advantage(s) that
a.
b.
c.
d.
answer:a. Major decision points are tested early c. No drivers need to be writte
n
Question 46
Marks: 1
Why is the configuration management applied?
a. Make the product development more quality
b. Support to evolve software product
c. Aim to control the costs and effort involved in making changes to a s
ystem
d. Make necessary configurations for preparing software development envi
ronment
answer:
a. Make the product development more quality
b. Support to evolve software product
c. Aim to control the costs and effort involved in making changes to a system
Question 47
Marks: 1
Which development phases are included in the configuration management plan?
a.
b.
c.
d.
Testing
Deployment
Design
Implementation
answer:
a. Testing
c. Design
d. Implementation
Question 48
Marks: 1
Which information are included in the component header?
a.
b.
c.
d.
answer:
a. Author of the component and creation date
c. Project name
d. Version number and what were changed
Question 49
Marks: 1
Which of the following is not considered one of the four important elements tha
t should exist when a configuration management system is developed?
a. Validation elements
b. Process elements
c. Component elements
d. Human elements
answer:
d. Human elements
Question 50
Marks: 1
Which of the following tasks is not part of software configuration management?
a.
b.
c.
d.
answer:
a. Statistical quality control
Question 51
Marks: 1
What are the security risk management concerned?
a. Assessing the possible losses that might ensue from attacks on the sy
stem
b. Balancing the possible losses against the costs of security procedure
s that may reduce these losses
c. Assessing the life cycle of risks
d. Analyse assets of the system
answer:
a. Assessing the possible losses that might ensue from attacks on the system
b. Balancing the possible losses against the costs of security procedures that m
ay reduce these losses
Question 52
Marks: 1
How are analyse assets of the system?
a. Set level of vulnerabilities of each asset
b. Set the level of exposure of each asset
c. Identify system resources that have a value and have to be protected
d. Set level of value of each asset
answer:
b. Set the level of exposure of each asset
c. Identify system resources that have a value and have to be protected
d. Set level of value of each asset
Question 53
Marks: 1
What are the design guidelines to make the secure system?
answer:
a. Meet requirements quickly because users have to be involved in the developmen
t
b. The processes of specification, design and implementation are concurrent
d. Rapid to delivery the highest priority functionalities to the customer
the pattern[3]Description of the problem and when the pattern can be applied[4]M
eaningful name
What three approaches may be used when designing test cases?
answer: [3]:[1]Requirements-based[2]Partition[3]Structural
What are the two complementary goals of the testing process?
answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f
aults or defects in the software
Which type of test would you perform to accpect a build
answer: User acceptant test
Acceptance tests are normally conducted by the
answer: End users
What tests should be included in object class testing?
answer: [3]:[1]that set and access all object attributes[2]for all operations in
isolation[3]that force the object into all possible states
What is the common limitation of automated testing?
answer: They are not usefull when requirements are changing frequently
Which of the following strategic issues needs to be addressed in a successful so
ftware testing process?
answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec
hnical reviews prior to testing
What is the purpose of defect testing?
answer: To discover faults that make software's behaviour incorrect
The best reason for using Independent software test teams is that
answer: A test team will test the software more thoroughly
What is common limitation of automated testing?
answer: They are not useful when requirements are changing frequently
What are the three important classes of interface errors?
answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors
What is the normal order of activities in which software testing process is orga
nized
answer: [1]Design[2]Prepare[3]Run[4]Compare
What are three basic techniques for component identification?
answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based
New versions of software systems are created as they change
answer: [3]:[1]Offering[2]Tailored[3]For different
What facilities might be provided in system building CASE tools?
answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object
What are the objectives of change management procedures?
answer: [3]:[1]Approving[2]Tracking[3]Analyzing
When software configuration management is a formal activity, the software config
uration audit is conducted by the
answer: Quality assurance group
What is a variant?
answer: identical but non-functionally distinct from other instances of a system
The primary purpose of configuration status reporting is to
answer: Make sure that change information is communicated to all affected partie
s
What are the two types of CM workbench?
answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats
answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system
is designed to resist attacks
What are the three complementary strategies to achieve survivability?
answer: [3]:[1]Recognition[2]Recovery[3]Resistance
What is the first stage in survivability analysis
answer: Review system requirements and architecture
List 4 design guidelines for secure systems engineering?
answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al
l inputs
What are the three levels of protection that might be used in an information sys
tem?
answer: [3]:[1]Application[2]Record[3]Platform
What is infrastructure security?
answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
In Iterative development approach, which phase takes the least cost?
answer: Specification
What are generic software process models?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What is a software process model?
answer: A simplified representation of a software process, presented from a spec
ific perspective
The current trends suggest that the economies of ALL developed and developing na
tions are dependent on software
answer: True
In Waterfall approach, which phase takes the most cost?
answer: [2]:[1]Specification[2]Integration and testing
What is a software process?
answer: A set of activ ities whose goal is the development or evolution of softw
are
The distribution of the costs of software engineering NOT depends on the process
model that is used
answer: False
What are essential attributes of good software?
answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency
In Component-based software engineering approach, which phase takes the least co
st?
answer: Specification
Which is the correct sequence of the following activities in the process of Syst
em evolution?
answer: Define-Assess-Propses-Modify
What is the main difference between the Spiral model and other software processe
s models?
answer: The explicit recognition of risk in the Spiral model
What is the outputs of Requirements elicitation and analysis?
answer: System models
What is the correct sequence of the following iterations in the RUP(Rational Uni
fied Process) model?
answer: Incept-Elaborat-Construct-Transit
What is the output of Feasibility study phase in the requirements engineering pr
ocess?
answer: Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which
types of perspectives?
answer: [3]:[1]Dynamic[2]Static[3]Practice
What is the main difference between the RUP (Rational Unified Pr ocess) and othe
r software processes models?
answer: Phase are more closely related to business rather than technical concern
s
Which is the correct sequence of the following activities in the Waterfall model
?
answer: Requirement-Design-Implementation-Integration-Operation
Which is the correct sequence of the following activities in the Component-based
software engineering?
answer: Component-Requirement-Design-Development
The Waterfall approach is the BEST approach to development software when ___
answer: The software system is large and that is need developed at several sites
Three categories of risks are ___
answer: [3]:[1]Project[2]Technical[3]Business
Why many software projects are 'one-off' projects?
answer: Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure?
answer: Sets out the breakdown of the project into activ ities and identifies th
e milestones and deliverables associated with each activity
What are milestones in project planning?
answer: Milestones are the end-point of a process activity
What is the critical path?
answer: The critical path is the sequence of dependent activities that
Select the BEST statement about critical path
answer: Project manager should allocate experienced people to do the tasks on th
e critical path
What is the output of the first milestone in software requirement engineering pr
ocess?
answer: Feasibility study report document
Which is the BEST principle of project scheduling?
answer: Minimize task dependencies to avoid delays caused by one task waiting fo
r another to complete
The project schedule shows ___
answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem
ents?
answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?
answer: Class diagram-on the attributions, operations
Another name for inheritance is ___
answer: Generalization
When should you use sequence diagram?
answer: Should use sequence diagram to illustrate the sequence of steps that mus
t be performed in order to complete a task
Which models give a static view of a system?
answer: [3]:[1]Object[2]Data[3]Architectural
When should you use use-case diagram?
answer: Should use use-case diagram to represent all of the people who might use
the functionalities of the system
What are types of behavioral models?
answer: [2]:[1]Data-Flow[2]State machine
Which non-functional system requirements that the software system architecture m
ay depend on?
answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability
Select the BEST solution for architectural design of a software system that perf
ormance is a critical requirement
answer: The architectural should be designed to localise critical operations and
minimise communications, use large-grain rather thanfine-grain components
Which of the following models belong to Event-driven systems?
answer: [2]:[1]Broadcast[2]Interrupt-driven
What is the correct statement about software architectural design decisions?
answer: Architectural design is a creative process, the activities in the proces
s differs depending on the type of system being developed
Which of the following styles belong to Control styles?
answer: [2]:[1]Centralised[2]Event-based
Which of the following styles belong to System organization?
answer: [3]:[1]Repository[2]Client-server[3]Abstract machine
What is the correct statement about software architectural styles?
answer: Most large systems are heterogeneous architectur al styles
What is the correct statement about software architectural design?
answer: The architectural design is normally expressed as a block diagram presen
ting an overview of the system structure
Which of the following models belong to Centralised control?
answer: [2]:[1]Call-return[2]Manager
What are advantages of explicitly designing and documenting software architectur
e?
answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse
What are the models in architecture design?
answer: [5]Static-Dynamic-Interface-Relationship-Distribution
What are three general architectural styles?
answer: [1]System organisation[2]Decomposition styles[3]Control styles
Another name for * is a + relationship is ___
answer: Generalization
answer: Customer
In the extreme programming, what is the role of customer?
answer: To help develop stories that defines the requirements
Which part of the system can be reuse?
answer: [3]:[1]Application[2]Component reuse[3]Object and function
The trend of design process in most software engineering disciplines is base on
___
answer: Reuse of existing system or component
If the applications or components are developed in difference programming langua
ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?
answer: [3]:[1]faster[2]lower cost[3]increased software quality
Which is NOT a key factor that you should consider when planning reuse?
answer: The name of the application or component reuse
All of the following are types of program generator EXCEPT
answer: Component generators
What is the normal order of activities in which software testing is organized?
answer: [4]:[1]Unit[2]Integration[3]Validation[4]System
The main focus of acceptance testing is:
answer: testing from a business perspective
Unit testing is a __
answer: White box testing
The effort required for locating and fixing an error in an operational program i
s:
answer: Maintainability
Workbenches are also called ___
answer: All of the other choices
A program validates a numeric field as follows: values less than 10 are rejected
, values between 10 and 21 are accepted, values greater than or equal to 22 are
rejected
answer: 3,10,22
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
Which document identifies and describes the testing that will be implemented and
executed?
answer: Test case
The testing intended to show that previously correct software has not been adver
sely affected by changes is call:
answer: Regression testing
We split testing into distinct stages primarily because:
answer: Each test stage has a different purpose.
Which is the right sequence in the software testing process?
answer: Create test case-Prepare-Perform-Create
Which of the following is NOT part of configuration management?
answer: The people in the project team
answer: true
All of the following are the main benefits of software reuse EXCEPT
answer: Reduce maintain cost
Which of the following statements about Equivalence partitioning are NOT true?
answer: none
Which of these statements about extreme programming are true?
answer: New versions may be built several times per day
Which of the following are the testing process goals
answer: all:Discover faults or defects in the software/The check that the softwa
re meets its requirements
Which of the following statements about service interfaces is true
answer: all: Service interfaces are defined in an XML-based language called WSDL
/A WSDL specification includes a definition of the interface types and operation
s, the binding protocol used by the service and the service location
Which of the following statements about security is NOT true?
answer: Security threats can be threats to the only confidentiality and integrit
y of a system or its data
All of the following are stages in an object-oriented dev elopment process EXCEP
T?
answer: Object-oriented evolution
What are the components of an object class definition in the UML
answer: all:The attributes of the class/The operations or methods associated wit
h the class/The name of the object class
Suggest the most appropriate generic software process model that might be used a
s a basic for managing the development of the following system: A university acc
ounting system that replaces an existing system
answer: Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements do
cument
answer: a high level statement/ a detailed system specification
What are advantages of pipeline model?
answer: all: Easy to add new transformations/Supports transformation reuse/Intui
tive organization for stakeholder communication
List the requirements document sections suggested by the IEEE standard.
answer: Introduction-General-Specific-Appendices-Index.
Which of the following statements about service interfaces is true?
answer: AWSDL
What is not an Upper-CASE tool?
answer: Borland C
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?
answer: The system context is a static,themodel is a dynamic
When should you use data flow diagrams (DFD)?
answer: showing dai nhat
Which is the benefit of Service-oriented architectures?
answer: inter-organizational
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and operations associated with th
e problem to be solved
answer: Analysis
Software systems are subject to continual change requests from
answer: Developer,User
What are the characteristics of RAD processes?
answer: System,The system
What is not a Lower_CASE tool?
answer: Junit
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: dai nhat quat vao
Which of the followings belong to validation testing?
answer: To demonstrate,Asuccessful test shows
Change request is proposal due to
answer: All of the others
What is the correct sequence of the following activities in the Component-based
software engineering?
answer: 1,3,2,4
Which of the following statements about Equivalence partitioning are NOT true?
answer: None of the others
What types of system model may be developed?
answer: Data,Composition,Architectural,Classification,Stimulus/response
What is described in a context model?
answer: The immediate external environment of the system defining the system s con
text and the dependencies that a system has on its environment.
What is described in a state machine model?
answer: How the system responds to external events.
What is a semantic data model?
answer: A model that describes the logical structure of the data processed by a
system or managed by a database.
What are the components of an object class definition in the UML?
answer: name,attributes,operations or methods associated
What different object models may be developed?
answer: Inheritance,Object aggregation,Object behaviour
What is shown in an UML sequence model?
answer: The sequence of interactions between objects and actors in the system as
sociated with a single defined use-case.
What is a structured method?
answer: A systematic way of producing models of an existing system or of a syste
m that is to be built.
List four weaknesses of structured methods.
answer: They do not support non-functional,They rarely include,They tend to prod
uce,The models produced are detailed and often hard to understand.
What are the stages in an object-oriented development process?
answer: analysis,design,programming.
What is the distinction between an object and an object class?
answer: An object is created at run-time by instantiating an object class. The o
bject includes state variables and operations on that state as defined in the ob
ject class definition.
Briefly describe two types of concurrent object implementation.
answer: Servers: The object is a parallel process with methods corresponding to
the object operations. Methods execute in response to external requests.Active o
bjects: The state of the object is changed by internal operations within the obj
ect itself. The process executing these operations runs continuously.
List the five key stages in an object-oriented design process.
answer: Understand and define,Design,Identify,Develop,Specify object interfaces.
What do you understand by the system context and model of use?
answer: The system context is a static model of the other systems in the environ
ment of the system being designed. The model of use is a dynamic model that desc
ribes how the system being designed interacts with its environment.
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: interface,data collection,instruments
List four approaches that may be used to identify object classes.
answer: Grammatical,Identify,Use,Use scenario-based analysis.
Briefly describe three design models that are part of the UML.
answer: Subsystem,Sequence,State machine
What is the purpose of interface design in an OO design process?
answer: To define the signatures and semantics of the interfaces that are provid
ed by an object or group of objects.
Briefly explain why an OO approach facilitates design evolution.
answer: The internal details of an object are hidden from other objects so chang
ing these details is unlikely to have knock-on effects on other objects.
What are the advantages of using an incremental approach to software development
?
answer: Accelerated delivery of customer services.User engagement with the syste
m.
What is the key difference between incremental development and prototyping?
answer: Incremental development starts with the requirements that are best under
stood and that have the highest priority.Prototyping is intended to help underst
and the requirements so starts with requirements that are not well understood.
List five important principles of agile methods.
answer: Customer,Incremental,People not,Embrace,Maintain
What are three important characteristics of extreme programming?
answer: Requirements,Pair programming.Test-first
What is test-first dev elopment?
answer: When a system feature is identified, the tests of the code implementing
that feature are written before the code. Tests are automated and all tests are
run when a new increment is added to the system.
Briefly describe the advantage of pair programming.
answer: It supports the idea. It serves.It helps support
What tools are normally included in a RAD environment?
answer: database programming,interface generator,Links,report
What is visual programming?
answer: An approach to development where a programmer manipulates graphical icon
s representing functions, data or user interface components and associates proce
ssing scripts with these icons.
Suggest three ways that a software prototype may be used.
answer: help with,explore software,run back-to-back
What were the key benefits of prototyping found in Gordon and Bieman s study?
answer: Improved system usability,Improved system quality,Reduced development ef
fort.
List the main benefits of software reuse.
answer: Increased,Reduced,Effective,Standards,Accelerated
List the main problems with software reuse.
answer: Increased,Lack,Not-invented-here,Creating,Finding
What key factors should be considered when planning reuse?
answer: development,expected,background,criticality,application,system
What is a design pattern and why are patterns important for reuse?
answer: A design pattern is a description of a problem and the essence of its so
lution. This solution is expressed in a generic way and can be instantiated and
reused in different settings.
What do Gamma et al. suggest are the four essential elements of a design pattern
?
answer: meaningful,solution,statement.
What is generator-based reuse?
answer: An approach to reuse where reusable knowledge is embedded in a generator
answer: All shared data is held in a central database that can be accessed by al
l sub-systems.
How is the system organised in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services.
What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes
6. What is Not a type in Reuse-based software engineering?
answer: Software development process reuse
7. What is described in a context model?
answer: The immediate ecternal environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
8. Which of the follwing is Not a type of behavioral model?
answer: Architectual mode
9. What is correct phase related to the term "CASE" in software engineering?
answer: The software systems that provide automated support for software process
activities
10. Which of the followings does not belong to external requirements?
answer: Portability requiements
11. Which of the following is not a stage in componet - Base Software enginnerin
g
answer: System design with reuse
12. What activity does a software project manager need to perform to minimize th
e risk of software failure?
answer:Define milestones and track progress
13. What is describled in a state machine model?
answer: How the system responds to external event
14. The prototyping model of software development is
answer: A risky model that rarely produces a meaningful product
15. What is not a technique for component identification?
answer: Function-based identification
16. What is not an essential element of design patterns?
answer: A concrete design description
17. Which is NOT a problem that an arise when requirements are written in natura
l language?
answer: Lack of user's understandability
18. What is not an advantage of object model
answer: complex entities are easy to represent as objects
19. When software configuration management is a formal activity, the software co
nfiguration audit is conducted by the
answer: Senior managers
20. Who is mainly responsible for the component (unit) testing?
answer: Developer
21. Which is the purpose of data model?
answer: Describle the logical structure of data processed by the system
22. Why do we need to consider security for project?
answer: to protect the sestem against external attack
23. What is the main difference between RUP (Raditional Unified Process and othe
r processes?
answer: The construction phase is essentially concerned with system design, prog
ramming and testing
24. What are non-functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
25. Which of the following is not an advantage of pipeline model
answer: Easy to support event-based interaction
26. Which is Not an object-oriented strategy?
answer: Object-oriented deployment
27. What is a version?
answer: An instance of a system which is distributed to users outside of the dev
elopment team
28. Which of the following is not a stage in an object-oriented development proc
ess?
answer: Object-oriented programming
29. What is Not a main problem with software reuse?
answer: Not-invented-here syndrome
30. What are milestones?
answer: Milestones are end-point of a project phase
31. Which is the right sequence in project scheduling?
answer: (2)=>(1)=>(4)=>(3)
32. Which is Not a principal component of a software engineering method?
answer: Process activities
33. What is the common limitation of auto mated testing?
answer: They are not useful when rewuiement are changing frequently
34. What is the purpose of defect testing?
answer: To discover faults that make software's behavior incorrect
35. What is Not a characteristic of extreme programming?
answer: Delivery-first development
36. What is Not a component of a WSDL specification?
answer: The location part
37. What are the four essential attributes of the good software?
answer: Maintainability,dependability,efficiency,usability
38. What are the advantages of using an incremental approach to software develop
ment?
answer: Accelerated delivery of customer services, user engagement with the syst
em.
39. One of the key problems in software reuse is the inability to find existing
reusable design patterns when hundreds of candidates exist
answer: True
40. What are functional requirements?
answer: Statement of services the system should provide how the system should re
act to particular inputs and how the system should behave in particular situatio
ns
41. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to arrive at a stable, consistent set of system re
quirements
42. Which of following paradigms is not a general paradigm of software developme
nt?
answer: Rapid software development
43. What is WSDL standard?
answer: A standard for workflow languages used to define service composition.
44. Which of the following design guidelines for secure systems engineering is N
OT true?
answer: Avoid using redundancy and diversity to reduce risk
45. What is the normal order of activities in which software testing process is
organized?
answer: (2)=>(1)=>(3)=>(4)
46. Which of the following is NOT a sector in each loop in Boehm's spiral model?
answer: System design
47. What is the first stage in service construction by composition?
answer: Formulate outline workflow
48. What is NOT the advantage of repository model
answer: Sub-system need not be concerned with how data
49. Which of the following is NOT an advantage of using incremental development
and dilivery?
answer: Systems are offten have good structures
50. What is NOT an objective of change management procedures?
answer: Approving changes that are worthwhite.
51. What are the advantage of explicitly designing and documenting softwore arch
itecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with
the same data, product information, the system should be performed difference pr
esentations for correspondent departments such as Product department, Quallty de
partment and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behavioural model
answer: Semantic data models
55. The student management system was completed with two functions, managing stu
dent information and organizing quizes for review, after that the customer added
one more function, organizing online examination. Finaly all of them are put in
to the configuration management and are built for system testing, so what is the
build called?
answer: Release
56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
67. What is the firt stage in service construction by composition?
Max length
Answer: qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjk
l
2 most fundamental types of software product:
Answer: Generic products. Customized products.
3 most general paradigms of software development:
Answer: Iterative development. Waterfall approach. Component-based software eng
ineering
3 most important key challenges facing software engineering:
Answer: Heterogeneity challenges. Delivery challenges. Trust challenges
4 essential attributes of good software:
Answer: Maintainability. Dependability. Efficiency. Usability
The principal components of a software engineering method:
Answer: Process guidance. Recommendations. System model descriptions. Rules
The question no longer concerns the modern software engineer:
Answer: Why does computer hardware cost so much?
The most fundamental activities in software processes:
Answer: Software specification, software development, software validation, soft
ware evolution
Software engineering methods:
Answer: System models, notations, rules, design advice and process guidance.
Software engineering is:
Answer: Concerned with all aspects of software production from specification to
system maintenance
Computer science concern with:
Answer: Theories and methods that underlie computers and software systems
Meaning of CASE:
Answer: Computer Aided Software Engineering
The economies of all undeveloped nations are dependent on software:
Answer: False
Software process is a simplified representation of a software process model, pre
sented from a specific perspective:
Answer: False
2 types of evolutionary development:
Answer: Throw-away prototyping. Exploratory development
3 important stages in the testing process:
Answer: Component ( or unit ) testing.Integration testing.Acceptant testing
3 fundamental software process frameworks that are used to create specific softw
are processes:
Answer: Evolutionary development.Component-based software engineering.The waterf
all model
4 development stages in CBSE:
Answer: Systemdesignwithreuse.Dev and integration.Require modification. Componen
t analysis
4 sectors in each loop in Boehm s spiral model
Answer: Development and validation. Planning. Objective setting. Risk assessment
and reduction
4 advantages of using incremental development and delivery
Answer: More extensive testing.. Early incre serve .. Early delivery of critica
l..Lower risk of overall project failure
4 most fundamental activities that are common to all software processes
Answer: SW evolution. SW specification. SW validation. SW design and implementat
ion
The principal requirements engineering activities:
Answer: Require elicitation&analysis. Require specification. Require validation.
Feasibility study
The prototyping model of software development is:
Answer: A useful approach when a customer cannot define requirements clearly
The spiral model of software development:
Answer: Includes project risks evaluation during each iteration
First step in risk management process:
Answer: Risk identification
First activity of project management:
Answer: Proposal writing
3 most important differences between software project management and other types
of project management
Answer: There re no standard for SW.. Large SW proj are often one-off ..The softwa
re is intangible
2 types of CM workbench
Answer: Integrated workbenches. Open workbenches
3 basic techniques for component identification
Answer: Version numbering. Change-oriented identification. Attribute-based ident
ification
New versions of software system are created as they change
Answer: Offering different .. Tailored for particular user .. For different mach
ines/OS
Facilities might be provided in system building CASE tools
Answer: A dependency specification..Tool selection and..Distributed compilation.
Derived object management
The objectives of change management procedures
Answer: Approving changes .. Tracking which components.. Analyzing the costs and
benefits of proposed changes
The primary purpose of configuration status reporting is to
Answer: Make sure that change information is communicated to all affected partie
s
Software systems are subject to continual change requests
Answer: From developers. From users. From market forces
Which formal activity, the software configuration audit is conducted by the
Answer: Quality assurance group
Release is
Answer: An instance of a system which is distributed to users outside of the dev
elopment team
Variant is
Answer: An instance of a system which is functionally identical but non-function
ally distinct from other instances of a system
Version is
Answer: An instance of a system which is functionally distinct in some way from
other system instances
e values mention in each arrow are activity name and activity duration)
Answer: AFDEI
Select correct statements about software management
Answer: Software project management is .. Good project management can totally ..
Which are THREE essential elements of design patterns?
Answer: A name that is ... A statement of the consequences .. A description of t
he problem ..
What are two phases of system testing?
Answer: Integration testing, release testing
Which of these statements about extreme programming are true?
Answer: New versions maybe built several times per day
A is a way of reusing abstract knowledge about a problem and its solution.
Answer: Design pattern
Context models are used to illustrate the operational context of a system they s
how what lies outside the system
Answer: behaviors
Consider security design for username and password protection, what is the good
design?
Answer: System users are authenticated using a login
Which process model is most appropriate for a large software project with stable
requirements?
Answer: Waterfall
Different models present the system from different perspective: perspective show
ing the system s context or environment; perspective showing the behavior of the s
ystem; perspective showing the system or data architecture.
Answer: External, Behavioural, Structural
What are the advantages of explicitly designing and documenting software archite
cture?
Answer: All of the others (improve stakeholder, encourages a detailed ..)
What can be represented by a workflow model?
Answer: The sequence of activities in the process along with ..
What do gamma et al.suggest are the four essential elements
Answer: A statement of .. A meaningful .. A solution.. A description of the prob
lem
What is not an Upper-CASE tool?
Answer: Borland C
A successful defect test is a test which causes a program to behave in normal wa
y
Answer: False
What are the advantages of pair programming
Answer: It serves as an informal .. It supports the idea of common ..
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
Answer: None of the others
ons
List the requirements document sections suggested by the IEEE standard?
answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe
ndices[5]Index
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
List 3 types of non-functional requirement
answer: [3]:[1]Product[2]External[3]Organizational
which of the following belong to external requirements?
answer:[3]:[1]Interoperability[2]Legislative[3]Ethical
What are user requirements?
answer: Statements in natural language plus diaframs of the services the system
provides and its operational constraints. Written for customers
What problems can arise when requirements are written in natural language?
answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit
y
What are domain requirements?
answer: Requirements that come from the application domain of the system and tha
t reflect characteristics of that domain
What is the software requirements document?
answer: The official document that defines the requirements that should be imple
mented by the system developers
To construct a system model the engineer should consider one of the following re
straining factors?
answer: Assumptions and constraints
What described in a semantic data model?
answer: The local structure of the data processed by a system or managed by a da
tabase.
Which of these model types does not represent software architecture?
answer: Data model
Which of the following is not an area of concern in the design model?
answer: Project scope
What different object models may be developed?
answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance
models
What are the components of an object class definition in the UML?
answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o
r methods associated with the class
What perspectives may be used for system modelling?
answer: [3]:[1]Structural[2]External[3]Behavioral
What is described in a context model?
answer: The immediate external environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
What are the two principle styles used for modular decomposition?
answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining
What are advantages of object model
answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely
coupled so their implementation can be modified without affecting other objects
[3]OO implementation languages are widely uesd
What is the fundamental characteristic of a repository model
answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i
s held in a central database or repository
How is the system organized in a client-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
Check 4 fundamental questions that should be addressed in architectural design?
answer: [4]:[1]How will the system be distributed[2]How should the system be str
uctured[3]Is there a generic application architecture that can be used[4]What ar
chitectural style or styles are appropriate
What are advantages of pipeline model
answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne
w transformations
What are advantage of explicitly designing and documenting a software architectu
re?
answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake
holder communication[3]Helps with large-scale reuse
Which of these statements about architectural design are true?
answer: [3]:[1]Represents the link between specification and design processes[2]
Often carried out in parallel with some specification activities[3]It involves i
dentifying major system components and their communications
What are the characteristics of Interrupt-driven systems
answer: [2]:[1]Allows fast response[2]Used in real-time systems
What are the advantages of repository model
answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p
ublished as the repository schema[3]Sub-systems need not be concerned with how d
ata is produced Centralised management e.g. backup, security, ect
Which of these is a characteristic of a good design?
answer: Implements all requirements in the analysis model
List the advantages of inheritance
answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo
ut domains and systems[2]It is a reuse mechanism at both the design and the prog
ramming level[3]It is an abstraction mechanism which may be used to classify ent
ities
In the architectural model of the weather station system, what are the three lay
ers in the software?
answer: [3]:[1]Interface[2]Instruments[3]Data collection
Object oriented approach does not facilitate design evolution
answer: Flase
answer: [2]:[1]Open[2]Integrated
What is a version?
answer: distinct in some way from other system instances
Software system are subject to continual change requests
answer: [3]:[1]User[2]Developers[3]Market forces
Define the security terms 'vulnerability'
answer: Weakness in a computer-based system that may be exploited to cause loss
or harm
Define the security terms 'attack'
answer: An exploitation of a system's vulnerability. Generally, this is from out
side the system and is a deliberate attempt to cause some damage
Define the security terms 'threats
answer: Circumstances that have potential to cause loss or harm. You can think o
f these as a system vulnerability that is subjected to an attack
What is application security?
answer: Application security is a software engineering problem where the system
is designed to resist attacks
What are the three complementary strategies to achieve survivability?
answer: [3]:[1]Recognition[2]Recovery[3]Resistance
What is the first stage in survivability analysis
answer: Review system requirements and architecture
List 4 design guidelines for secure systems engineering?
answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al
l inputs
What are the three levels of protection that might be used in an information sys
tem?
answer: [3]:[1]Application[2]Record[3]Platform
What is infrastructure security?
answer: Infrastructure security is a systems management problem where the infras
tructure is configured to resist attacks
In Iterative development approach, which phase takes the least cost?
answer: Specification
What are generic software process models?
answer: [3]:[1]Waterfall[2]Iterative[3]Component-based
What is a software process model?
answer: A simplified representation of a software process, presented from a spec
ific perspective
The current trends suggest that the economies of ALL developed and developing na
tions are dependent on software
answer: True
In Waterfall approach, which phase takes the most cost?
answer: [2]:[1]Specification[2]Integration and testing
What is a software process?
answer: A set of activ ities whose goal is the development or evolution of softw
are
The distribution of the costs of software engineering NOT depends on the process
model that is used
answer: False
What are essential attributes of good software?
answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency
In Component-based software engineering approach, which phase takes the least co
st?
answer: Specification
Which is the correct sequence of the following activities in the process of Syst
em evolution?
answer: Define-Assess-Propses-Modify
What is the main difference between the Spiral model and other software processe
s models?
answer: The explicit recognition of risk in the Spiral model
What is the outputs of Requirements elicitation and analysis?
answer: System models
What is the correct sequence of the following iterations in the RUP(Rational Uni
fied Process) model?
answer: Incept-Elaborat-Construct-Transit
What is the output of Feasibility study phase in the requirements engineering pr
ocess?
answer: Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which
types of perspectives?
answer: [3]:[1]Dynamic[2]Static[3]Practice
What is the main difference between the RUP (Rational Unified Pr ocess) and othe
r software processes models?
answer: Phase are more closely related to business rather than technical concern
s
Which is the correct sequence of the following activities in the Waterfall model
?
answer: Requirement-Design-Implementation-Integration-Operation
Which is the correct sequence of the following activities in the Component-based
software engineering?
answer: Component-Requirement-Design-Development
The Waterfall approach is the BEST approach to development software when ___
answer: The software system is large and that is need developed at several sites
Three categories of risks are ___
answer: [3]:[1]Project[2]Technical[3]Business
Why many software projects are 'one-off' projects?
answer: Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure?
answer: Sets out the breakdown of the project into activ ities and identifies th
e milestones and deliverables associated with each activity
What are milestones in project planning?
answer: Milestones are the end-point of a process activity
What is the critical path?
answer: The critical path is the sequence of dependent activities that
Select the BEST statement about critical path
answer: Project manager should allocate experienced people to do the tasks on th
e critical path
What is the output of the first milestone in software requirement engineering pr
ocess?
answer: Feasibility study report document
Which is the BEST principle of project scheduling?
answer: Minimize task dependencies to avoid delays caused by one task waiting fo
r another to complete
The project schedule shows ___
answer: The dependencies between activities, the estimated time required to reac
h each milestone and the allocation of people to activities
What are deliverables?
answer: Deliverables are project results delivered to customers
Which is the principle of prototype model?
answer: A prototype is to build quickly demonstrate to the customer what the pro
duct look like. Only minimal functionality of the actual product is provided dur
ing prototyping phase
What are non functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
What are good attributes of requirements?
answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous
What are system requirements?
answer: A structured document setting out detailed descriptions of the system s fu
nctions, services and operational constraints
Which are types of non-functional requirement?
answer: [3]:[1]Product[2]Organizational[3]External
What is the BEST way to write requirement document?
answer: Should include both a definition of user requirements and a specificatio
n of the system requirements
Which of the following requirement statements belongs to domain requirements?
answer: There shall be a standard user interface to all database that shall be b
ase on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear
-cut
answer: True
Which of the following requirement statements belongs to non-functional requirem
ents?
answer: The user interface shall be implemented as simple HTML without frames
What s the BEST way to start creating a data-flow diagram?
answer: In the data-flow diagram, you should start by analyzing the overall proc
urement process and then move on to the analysis of sub-processes
When should you use state machine model?
answer: [2]:[1]Describe how a system [2]It shows system states and events that c
ause transition from one state to another
When should you use data flow diagrams (DFD)?
answer: DFD is used to showing the data exchange between a system and other syst
ems in its environment
Can two objects associate with one another in more than one way?
answer: Yes
What s the BEST way to start creating a state diagram?
answer: State diagram-on the transition
What s the BEST way to start creating a class diagram?
answer: Class diagram-on the attributions, operations
Another name for inheritance is ___
answer: Generalization
When should you use sequence diagram?
answer: Should use sequence diagram to illustrate the sequence of steps that mus
t be performed in order to complete a task
Which models give a static view of a system?
answer: [3]:[1]Object[2]Data[3]Architectural
When should you use use-case diagram?
answer: Should use use-case diagram to represent all of the people who might use
the functionalities of the system
What are types of behavioral models?
answer: [2]:[1]Data-Flow[2]State machine
Which non-functional system requirements that the software system architecture m
ay depend on?
answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability
Select the BEST solution for architectural design of a software system that perf
ormance is a critical requirement
answer: The architectural should be designed to localise critical operations and
minimise communications, use large-grain rather thanfine-grain components
Which of the following models belong to Event-driven systems?
answer: [2]:[1]Broadcast[2]Interrupt-driven
What is the correct statement about software architectural design decisions?
answer: Architectural design is a creative process, the activities in the proces
s differs depending on the type of system being developed
Which of the following styles belong to Control styles?
answer: [2]:[1]Centralised[2]Event-based
ge from the programming language you are using then you can not reuse that
answer: False
Which is NOT the main benefit of software reuse?
answer: Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system
answer: False
Which is the correct statement about Product line architectures?
answer: Architectures must be structured in such a way to separate different sub
-systems and to allow them to be modified
All of the following are the design choices have to be made when reusing COTS pr
oducts EXCEPT
answer: How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that
tries to ___
answer: Maximize the reuse of existing software
What are the benefits of software re-using?
answer: [3]:[1]faster[2]lower cost[3]increased software quality
Which is NOT a key factor that you should consider when planning reuse?
answer: The name of the application or component reuse
All of the following are types of program generator EXCEPT
answer: Component generators
What is the normal order of activities in which software testing is organized?
answer: [4]:[1]Unit[2]Integration[3]Validation[4]System
The main focus of acceptance testing is:
answer: testing from a business perspective
Unit testing is a __
answer: White box testing
The effort required for locating and fixing an error in an operational program i
s:
answer: Maintainability
Workbenches are also called ___
answer: All of the other choices
A program validates a numeric field as follows: values less than 10 are rejected
, values between 10 and 21 are accepted, values greater than or equal to 22 are
rejected
answer: 3,10,22
A successful defect test is a test which causes a program to behave in an normal
way
answer: False
Which document identifies and describes the testing that will be implemented and
executed?
answer: Test case
The testing intended to show that previously correct software has not been adver
Give two examples of technology risks that may arise in a software project.
answer: The system database cannot process as many transactions as expected.Reus
ed software components are defective.
What is involved in risk monitoring?
answer: Regularly assessing the project risks to decide whether or not that the
risk is becoming more or less probable and whether the effects of the risk have
changed.
What are user requirements and system requirements?
answer: User requirements are statements in a language that is understandable to
a user of what services the system should provide and the constraints under whi
ch it operates.System requirements are more detailed descriptions of the system
services and constraint, written for developers of the system.
What is the distinction between functional and non-functional requirements?
answer: Functional requirements define what the system should do. Non-functional
requirements are not directly concerned with specific system functions but spec
ify required system properties or place constraints on the system or its develop
ment process.
List three types of non-functional requirement?
answer: Product-Organisational-External
What is a domain requirement? Give an example.
answer: A requirements that is derived from the application domain of the system
rather than from the specific needs of system users. For example, in a train co
ntrol system, the requirement for the train braking system depends on characteri
stics of the train and the track.
What problems can arise when requirements are written in natural language?
answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation.
What is the distinction between the terms.'shall' and 'should' in a user require
ments document?
answer: Shall normally indicates a mandatory requirement Should indicates a desirabl
e but not essential requirement
Why is it impossible to completely separate system requirements and design?
answer: The system architecture may have to be designed to structur e the requir
ements specification. Existing systems constrain the design and these constr ain
ts are requirements. The use of a specific architecture may be a requirement for
business or regulatory reasons.
What are the main advantages of using a standard format to specify requirements?
answer: All requirements have the same format so are easier to read.The definiti
on of form fields mean that writers are less likely to forget to include informa
tion.Some automated processing is possible.
What are three types of interface that may have to be defined in a requirements
document?
answer: [1]Procedural interfaces[2]Data structures[3]Representations of data
What are the two main types of event-driven control models?
answer: Broadcast models where an event is broadcast to all sub-systems Interrup
t-driven models where external events are detected and processed by an interrupt
handler
What is a reference architecture?
answer: An abstract model of a system class that can be used to inform designers
about the general structure of that type of system.
What is the distinction between validation and verification?
answer: Validation: Are we building the right product?/Verification: Are we buil
ding the product right?
What are the two complementary approaches used for checking and analysis?
answer: Software testing/Software inspections or peer reviews.
What are the principal sections included in a test plan?The testing process.
answer: Requirements traceability/Tested items/Testing schedule/Test recording p
rocedures/Constraints/Hardware and software requirements/
What are the advantages of inspections over testing?
answer: 3/Inspections can discover many errors. In testing, one error may mask a
nother/Incomplete versions of a system can be inspected/Inspections can consider
broader quality attributes as well as program defects
What are the stages in the software inspection process?
answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow
-up
List the classes of faults that should be considered in an
answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte
rface faults/Storage management faults/Exception management faults
What is automated static analysis
answer: A process where an analysis program examines the source code looking for
possible anomalies. These are drawn to the inspector s attention as they may repr
esent faults in the program
What are the main argument for the use of formal specification and verification?
answer: Formal specification forces a detailed analysis of the requirements so r
eveals errors and anomalies. Formal verification demonstrates that the program m
eets its specification so implementation errors do not compromise dependability
Why do formal specification and verification not guarantee reliability?
answer: 3/The specification may not reflect the real requirements of users/The p
roof may contain errors/The proof may assume a usage pattern which is incorrect.
What are the five key strategies used in cleanroom development?
answer: Formal specification/Incremental development/Structured programming/Stat
ic verification/Statistical testing
What is the distinction between application and infrastructure security?
answer: 2/Application security the application is designed to resist attacks/Inf
rastructure security the software is configured to r esist attacks
Define the security terms
vulnerability
and
asset
Vulnerability
answer: False
What are the advantages of pair programming
answer: It serves,It supports
A critical distinction between a service and a component as defined in CBSE is t
hat services are independent and:
answer: All of the others
Which one is not a web service standard?
answer: SODP
What are system requirements
answer: A structured
The two main approaches to concept reuse are:
answer: Generative,Design
Which of these statements about architectural design are true?
answer: It involves,Represents,Often
What do you understand by the system context and model of use?
answer: The system context is a static,themodel is a dynamic
When should you use data flow diagrams (DFD)?
answer: showing dai nhat
Which is the benefit of Service-oriented architectures?
answer: inter-organizational
is concerned with developing an object-oriented model of the application domain.
The objects in that model reflect the entities and operations associated with th
e problem to be solved
answer: Analysis
Software systems are subject to continual change requests from
answer: Developer,User
What are the characteristics of RAD processes?
answer: System,The system
What is not a Lower_CASE tool?
answer: Junit
The customer wants to make a change to the project scope. The best thing for the
project team to evaluate is the:
answer: dai nhat quat vao
Which of the followings belong to validation testing?
answer: To demonstrate,Asuccessful test shows
Change request is proposal due to
answer: All of the others
What is the correct sequence of the following activities in the Component-based
software engineering?
answer: 1,3,2,4
Which of the following statements about Equivalence partitioning are NOT true?
answer: None of the others
What is a design pattern and why are patterns important for reuse?
answer: A design pattern is a description of a problem and the essence of its so
lution. This solution is expressed in a generic way and can be instantiated and
reused in different settings.
What do Gamma et al. suggest are the four essential elements of a design pattern
?
answer: meaningful,solution,statement.
What is generator-based reuse?
answer: An approach to reuse where reusable knowledge is embedded in a generator
system which is programmed by domain experts to create the system. An executabl
e system is then generated.
What major software problem is addressed by aspect-oriented software development
?
answer: The problem of separation of concerns so that a software unit is designe
d to do one thing and one thing only.
What are three possible classes of application framework?
answer: System infrastructure,Middleware,Enterprise
What design choices have to be made when reusing COTS products?
answer: Which COTS products.How data.What features
List four types of specialisation of software product lines.
answer: Platform,Environment,Functional,Process
What are the two complementary goals of the testing process?
answer: demonstrate,discover
What is a successful defect test?
answer: successful defect test is one where the system s operation does not confor
m to its specification, i.e. one that exposes a defect in the system.
Briefly describe the two distinct phases of system testing.
answer: Integration,Release
What guidelines does Whittaker suggest for defect testing?
answer: Chose inputs,Design,Repeat,Force,Force
What is the function of stress testing?
answer: test,stress
What tests should be included in object class testing?
answer: Tests for all,Tests that set,Tests that force
What are the three important classes of interface errors?
answer: Interface misuse.Interface misunderstanding.Timing errors.
What three approaches may be used when designing test cases?
answer: Requirements-based,Partition,Structural
What is an equivalence partition? Give an example.
answer: A class of inputs or outputs where it is reasonable to expect that the s
ystem will behave the same way for all members of the class. For example, all st
rings with less than 256 characters.
What is path testing?
answer: A structural testing strategy whose objective is to exercise every indep
What are the two principle styles used for modular decomposition?
answer: Object-oriented decomposition, Function-oriented pipelining.
1. What is the output of Risk Planning stage?
answer: Risk avoidance and contingency plans
2. How is the system organized in aclient-server model?
answer: A set of services is provided by servers and clients access and use thes
e services
3. What is the first stage in survivability analysis?
answer: Review system requirements and architecture
4. Which of these statements about architectural design is not true?
answer: Represents the link between specification and design processes
5. Which is not an advantage of inheritance?
answer: Object classes are self-contained. They can be understood without refere
nce to their super-classes
6. What is Not a type in Reuse-based software engineering?
answer: Software development process reuse
7. What is described in a context model?
answer: The immediate ecternal environment of the system defining the system's c
ontext and the dependencies that a system has on its environment
8. Which of the follwing is Not a type of behavioral model?
answer: Architectual mode
9. What is correct phase related to the term "CASE" in software engineering?
answer: The software systems that provide automated support for software process
activities
10. Which of the followings does not belong to external requirements?
answer: Portability requiements
11. Which of the following is not a stage in componet - Base Software enginnerin
g
answer: System design with reuse
12. What activity does a software project manager need to perform to minimize th
e risk of software failure?
answer:Define milestones and track progress
13. What is describled in a state machine model?
answer: How the system responds to external event
14. The prototyping model of software development is
answer: A risky model that rarely produces a meaningful product
15. What is not a technique for component identification?
answer: Function-based identification
16. What is not an essential element of design patterns?
answer: A concrete design description
17. Which is NOT a problem that an arise when requirements are written in natura
l language?
answer: Lack of user's understandability
18. What is not an advantage of object model
answer: complex entities are easy to represent as objects
19. When software configuration management is a formal activity, the software co
nfiguration audit is conducted by the
answer: Senior managers
20. Who is mainly responsible for the component (unit) testing?
answer: Developer
21. Which is the purpose of data model?
answer: Describle the logical structure of data processed by the system
22. Why do we need to consider security for project?
answer: to protect the sestem against external attack
23. What is the main difference between RUP (Raditional Unified Process and othe
r processes?
answer: The construction phase is essentially concerned with system design, prog
ramming and testing
24. What are non-functional requirements?
answer: Constraints on the services or functions offered by the system such as t
iming constraints, constraints on the development process, standards, etc
25. Which of the following is not an advantage of pipeline model
answer: Easy to support event-based interaction
26. Which is Not an object-oriented strategy?
answer: Object-oriented deployment
27. What is a version?
answer: An instance of a system which is distributed to users outside of the dev
elopment team
28. Which of the following is not a stage in an object-oriented development proc
ess?
answer: Object-oriented programming
29. What is Not a main problem with software reuse?
answer: Not-invented-here syndrome
30. What are milestones?
answer: Milestones are end-point of a project phase
31. Which is the right sequence in project scheduling?
answer: (2)=>(1)=>(4)=>(3)
32. Which is Not a principal component of a software engineering method?
answer: Process activities
33. What is the common limitation of auto mated testing?
answer: They are not useful when rewuiement are changing frequently
34. What is the purpose of defect testing?
answer: To discover faults that make software's behavior incorrect
51. What are the advantage of explicitly designing and documenting softwore arch
itecture?
answer: It improves the sta***it helps with***it encourages a detailed
52. What is the Lower-CASE tool?
answer: Netbeans
53. In the management system, the customer notices to one of requirements, with
the same data, product information, the system should be performed difference pr
esentations for correspondent departments such as Product department, Quallty de
partment and Planning department. So which design or framework is applied for?
answer: MVC-Model view
54. Which of the following is NOT a stype of behavioural model
answer: Semantic data models
55. The student management system was completed with two functions, managing stu
dent information and organizing quizes for review, after that the customer added
one more function, organizing online examination. Finaly all of them are put in
to the configuration management and are built for system testing, so what is the
build called?
answer: Release
56. What is the output of Feasibility Study stage in the Requirement Engineering
Process?
answer: Feasibility report
57. The Google map is a web service to be used in the weather system, which meth
od is used in testing the system?
answer: Integration testing
58. Using equivalence partition testing to check employee ID by format 8xxx: Boo
lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin
g?
answer: 7999,8000,8500,8999,9000
59. Which is NOT related to a characteristic of rapid application development pr
ocesses?
answer: It is always possible to
60. List the tests that should be included in object class testing
answer: Tests that set*** tests for all***tests that force
61. What is the Upper-CASE tool?
answer: Microsoft Visio
62. Which is NOT an object-oriented strategy?
answer: Object-oriented deployment
63. What are the two types of CM workbench?
answer: Intergrated workbenches***Open workbenches
64. What problems can arise when requirements are written in natural language?
answer: Lank of clarity*** requiment ama***requirement confu
65. Which of the following statements about Reference models are true?
answer: Refference models*** they are a
66. All of the followings belong to organizational requirements EXCEPT?
answer: Privacy requirements
answer: Base on tangible things in the .. Depend on the skill, ..Base on iterati
ve scenarios
Which of the following is not a characteristic common to all design methods?
answer: c. configuration management
What types of abstraction are used in software design?
answer: a. Data c. Control d. Procedural
Which of the following traits need to exist among the members of an agile softwa
re team?
answer: b. Mutual trust and respect c. Competence d. Decision-making ability
Which of the following is not necessary to apply agility to a software process?
answer: c. Only essential work products are produced
When is the design pattern applied to?
answer: Re-use experiences .. Re-use difference settings .. Re-use abstract kno
wledge about a problem and its solution
Which ones are framework classes?
answer: System infrastructure ..Enterprise application framework Middleware in
tegration framework
Extending the framework involves
answer: Adding methods that are called in response to ..Adding concrete classes
that inherit operations from abstract classes in the framework
Adaptation in software product lines may involve
answer: Adding new .. Selecting from a ..Component and system ..Modifying compon
ents to meet new requirements
How are the system testing?
answer: Testing on integrating components..Testing on integrating ..Testing is d
one by an independent testing team
How are the component testing?
answer: b. Testing is done by component..Testing on individual program component
s to create a sub-system
Which types of testing are done by development team?
answer: a. Stress testing b. Interface testing d. Release testing
Which of the following need to be assessed during unit testing?
answer :b. Error handling d. Execution paths
Top-down integration testing has as it's major advantage(s) that
answer: a. Major decision points are tested early c. No drivers need to be writt
en
Why is the configuration management applied?
answer: Make the product development.. to evolve software product.. Aim to contr
ol the costs and effort involved in making changes to a system
Which development phases are included in the configuration management plan?
answer: a. Testing c. Design d. Implementation
Which information are included in the component header?
answer: a. Author of the component and c. Project name d. Version number and w
hat were changed
Which of the following is not considered one of the four important elements that
should exist when a configuration management system is developed?
answer: d. Human elements
Which of the following tasks is not part of software configuration management?
answer: Statistical quality control
What are the security risk management concerned?
answer: Assessing the possible losses that .. Balancing the possible losses aga
inst the costs of security procedures that may reduce these losses
How are analyse assets of the system?
answer: Set the level of exposure of .. Identify system resources..Set level of