Sie sind auf Seite 1von 8

Mid Sem

Multiple Choice Questions


1. Select the option that suits the manifesto for Agile Software Development
a. Individuals and Interactions
b. Working software
c. Customer Collaboration
d. Responding to change
e. All of the mentioned

2. Agile software development is based on


a. Incremental development
b. Iterative development
c. Linear development
d. Waterfall model
e. Both a and b

3. How many phases are there in Scrum


a. Two
b. Three
c. Four
d. Scrum is an agile method which means it does not have phases

4. Which of the following does not apply to agility to a software process


a. Uses incremental product delivery strategy
b. Only essential work products are produced
c. Eliminate the use of project planning and testing

5. Agile methods seem to work best when team members have a relatively high skill
level
a. True
b. False
6. What are the types of requirements?
a. Availability
b. Reliability
c. Usability
d. Flexibility
e. All of the mentioned

7. Consider a system where a heat sensor detects an intrusion and alerts the security
company. What kind of a requirement the system is providing?
a. Functional
b. Non-functional
c. Known requirement

8. Which of the following is not project management goal?


a. Keeping overall costs within budget
b. Delivering the software to the customer at the agreed time
c. Maintaining a happy and well-functioning development team
d. Avoiding customer complaints

9. Which of the following is not considered as a risk in project management?


a. Specification details
b. Product competition
c. Testing
d. Staff turnover

10. What describes the data and control to be processed?


a. Planning process
b. Software scope
c. External hardware
d. Project complexity
11. Which of the following term is best defined by the statement “the degree of
uncertainty that the product will meet its requirements and be fit for its intended
use”?
a. Performance risk
b. Cost risk
c. Support risk
d. Schedule risk

12. Which of the following is a people-intensive activity


a. Problem solving
b. Organization
c. Motivation
d. Project management

13. What threatens the quality and timeliness of the software to be produced?
a. Known risks
b. Business risks
c. Project risks
d. Technical risks

14. What threatens the viability of the software to be built?


a. Known risks
b. Business risks
c. Project risks
d. Technical risks

15. Which risks are associated with constraints imposed by management or the market
place?
a. Business impact risks
b. Process definition risks
c. Product size risks
d. Development environment risks
16. Which web application attribute is defined by the statement “A large
number of users may access the web app at one time?
a. Unpredictable load
b. Performance
c. Concurrency
d. Network intensiveness

17. Which web application attribute is defined by the statement “The quality and
aesthetic nature of content remains an important determinant of the quality of a
web app
a. Availability
b. Data driven
c. Content sensitive
d. Continuous evolution

18. Which analysis is a part of Analysis model of the web engineering process framework
a. Content analysis
b. Interaction analysis
c. Functional analysis
d. All of these

19. What category of web based system would you assign to electronic shopping?
a. Transaction oriented
b. Work flow oriented
c. Informational
d. Interactive

20. What category of web-based system would you assign to discussion groups?
a. Collaborative work
b. Online Communities
c. Web Portals
d. Work flow oriented
21. In simplex mode of transmission
a. Data transmission is one way
b. Data can be transmitted to small distances only
c. Data format is simple
d. None of the above

22. A digital channel implies that the channel


a. Is digitized
b. Is carrying digital data
c. Adopts digital modulation techniques
d. Is without carrier

23. The ground wave eventually disappears as one moves away from the
transmitter because of
a. Interference from the sky above
b. Loss of line-of-sight condition
c. Attenuation of energy by the ground
d. Maximum single hop distance limitation

24. Sharing of transmission medium and its bandwidth is known as


a. Encoding
b. Multiplexing
c. Modulation
d. Line discipline

25. In order to transfer messages in a computer network, we use the technique called
a. Circuit switching
b. Message switching
c. Packet switching
d. None of these
26. Project 802.2 defines standards for which layers of the OSI model?
a. Application and Presentation layers
b. Data Link layers
c. Network and Data Link layers
d. Transport and Network layers

27. The Media Access Control sublayer resides in which OSI layer?
a. Transport
b. Physical
c. Network
d. Data Link

28. In which layer of the OSI model do Bridges function?


a. Physical
b. Data link
c. Network
d. Both a and c

29. A repeater takes weak and corrupt signal and


a. Amplifies it
b. Regenerates it
c. Re-samples it
d. None of these

30. Which of the following is not an internetworking device?


a. Bridge
b. Amplifier
c. Gateway
d. None of these
31. A packet travelling from a token ring network to another token ring network
uses
a. Simple bridge
b. Repeater
c. Router
d. None of these

32. Computers in a computer network are connected via:


a. Bounded media only
b. Unbounded media
c. Either a or b or both
d. None of these

33. Which of the following is a Network layer protocol?


a. IP
b. Telnet
c. FTP
d. None of these

34. Printek India wants to implement a LAN in an environment with many different
voltage devices. Which transmission medium, according to you, should they choose?
a. Twisted pair cable
b. Fiber optic cable
c. Coaxial cable
d. Either b or c

35. ATM is an acronym for


a. Asynchronous transfer mode
b. Automatic telecommunication method
c. Asynchronous transmission mode
d. None of these
36. Radio waves are
a. Omni directional
b. Bidirectional
c. Non-directional
d. None of these

37. The information to be communicated in a communication system is


a. Medium
b. Protocol
c. Message
d. None of these
38. Which out of the following topologies is the most reliable?
a. Star
b. Ring
c. Bus
d. None of these

39. In a network with 25 computers, which one of the following topologies would
require the least cabling?
a. Mesh topology
b. Star topology
c. Bus topology
d. Ring topology

40. Indicate the true statement:


Modulation is used to
a. Reduce the bandwidth
b. Separate differing transmission
c. Insure that intelligence signal may be transmitted over long distances
d. Allow the use of practicable antennas

Answers:
1 e 2e 3b 4c 5a 6e 7a 8d 9c 10b
11a 12d 13d 14b 15a 16c 17c 18d 19c 20b 21a
22b 23c 24b 25c 26b 27d 28d 29b 30b 31a
32c 33a 34b 35a 36a 37c 38b 39d 40c

Das könnte Ihnen auch gefallen