CS504 – Software Engineering
- I
Recent Papers MCQ’s
Solved by Abdul Fahd MCS-3rd and Saif BSCS-4th |
Writing test cases and generating test
data are processes that demand __________ building
capabilities.
Code
Domain
System
Scenario scenario-building (correct)
What types of errors are missed by
black-box testing and can be uncovered by whitebox
testing?
Runtime errors
Logic errors (correct)
Performance errors
Input errors
The cyclomatic complexity metric
provides the designer with information regarding the
number of ___________.
Statements in the program
Cycles in the program
Errors in the program
Independent logic paths in
the program 207 (correct)
The best reason for using Independent
software test teams is that
Software developers do not
need to do any testing (correct)
Strangers will test the software
mercilessly
Testers do not get involved with the
project until testing begins
The conflicts of interest between
developers and testers is reduced
__________ is intended to define a many
to many relationship between objects so that when
one object changes state all its
dependants are notified and updated automatically.
Observer Pattren (correct)
Facade Pattren
Singleton Pattren
Joint Pattren
________ ensures that a class only has
one instance and provides a global point of access to
it.
Behavioral Pattern
Joint Pattern
Singleton Pattern 145 (correct)
Observer Pattern
Inspections cannot check __________
characteristics.
Non-Functioanl 213 (correct)
Business
User
Functional
Secondary private classes can be
declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes 158 (correct)
Outer classes
Synchronous classes
The construction should appear at the
__________ of the header file.
Top (correct)
Bottom
Left
Right
In the switch statement, cases should
always end with ________.
Return
Semi colon
Break 170 (correct)
Full stop
Modularity is a tool that can help us in
________ the size of individual functions.
Stabilizing
Reducing 173 (correct)
Increasing
Strengthening
Abstraction and encapsulation are two
important tools that can help in managing and
mastering the _________ of a program.
Usability
Complexity 173 (correct)
Understandability
Reliability
One of the guidelines to avoid common
mistakes is to never use ________ except for
declaration.
, comma , (correct)
;
=
||
Which of the following is/are NOT one of
the umbrella activities?
Requirement analysis
Architecture design
Test case development
All of the given options (correct)
In a …………., each program module is
represented by a rectangular box.
Use case diagram 33 (correct)
Class diagram
Document flow diagram
Data flow diagram
……………… is a diagramming technique used
to identify the types of objects in the system
and the static relationships that exist
among them.
Class Diagram (correct)
Document flow diagrams
Data flow diagrams
Flow charts
Which one is NOT a type of messages
which Sequence Diagrams Depict _______
Asynchronous
Synchronous
Create
Update 108 (correct)
Identifying Whole-Part structures
(Aggregations) means, what are my ---------------
Components 95 (correct)
Structures
Modules
Interaction Protocols
The design process for identifying the
sub-systems making up a system and the
framework for sub-system control and
communication is:
Architectural Design 115 (correct)
Interface Design
Component Design
Data Design
A complex System evolves from a
Smaller system
Simpler system 69 (correct)
Bigger system
Medium system
A context diagram ______
Describes the context dependencies of a
system
Is a DFD which gives an
overview of the system (correct)
Is a detailed description of a system
Is not used in drawing a detailed DFD
When measure of independence of a module
or component is low to the other,
How would changes in one component have
effect on other component?
No
Low
High (correct)
Equal
What is meant by the term ‘software
crisis’?
Ability to deliver software on time with
good quality
A situation in which experienced
developers leave the company
Inability of new software to
inter-operate with existing software
(correct)
A situation in which large
scale software projects took more time and budget than
was planned
Which is not included in test criteria
applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programming Logic (correct)
For inspections, --------------- are
prepared that contain information regarding defects.
Tables
Checklists 210 (correct)
Lists
Frames
Static analyzers are software tools for
--------------- processing.
Analysis text
Source text 211 (correct)
Design text
Maintainence Text
Holistic medicine, concerns itself with
the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease 224 (correct)
Source
What factor has no precipitation in more
sophisticated and complex computer-based
systems?
Vast use of personal
computers. (correct)
Vast increases in computer memory and
storage capacity.
Greater variety of exotic input/output
options.
Profound changes in computer
architectures.
Software Bugs have multiple names. Which
one of the below is not the name of Software
Bugs?
Bugs
Defects
Errors
Mistakes 213 (correct)
Unit testing is roughly equivalent to
__________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level 207 (correct)
Component level
System level
Equivalence __________ help you in
designing test cases to test the system effectively and
efficiently.
Functions
Classes 202 (correct)
Objects
Interfaces
___________ are used to describe flow of
data or control in an application.
Code structures
String matching.
Paths
Flow graphs 203 (correct)
Writing test cases and generating test
data are processes that demand __________ building
capabilities.
Domain
System
Scenario 198 (correct)
Code
The raising of the imaginary error flag
is simply called raising or _________ an error.
Throwing 187 (correct)
Sending
Casting
Handling
_________ requirements are often called
product features.
Functional
Business 22 (correct)
User
Non-functional
Many compilers limit the maximum number
of bits in the bit field to the size of a(n)
_________.
Integer 183 (correct)
Float
Character
Double
In Java, ">>" is used
for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical 181 (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be
shared, repository model is used. This model has
been extensively used in the _______
based application.
Mainframe 130 (correct)
Super Computers
Personal Computers
Real time
There are four basic coding structures:
sequence, if statement, case statement, and
___________.
For loop
While loop 203 (correct)
Switch statement
Logical operations
___________ is only a reference for
defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture 137 (correct)
Layered architecture
N-tier architecture
The pattern movement became very quiet
until __________ when patterns appeared again
at OOPSLA conference.
1987 141 (correct)
1988
1962
1995
STL Stands for ______________.
Standard Temporary Line
Standard Temporary Library
Standard Template Library 141 (correct)
Standard Type Link
MVC stands for ____________.
Modern View Center
Model View Controller 143 (correct)
Modern View Controller
Model View Center
________ ensures that a class only has
one instance and provides a global point of access to
it.
Singleton Pattern 145 (correct)
Observer Pattern
Behavioral Pattern
Joint Pattern
Which design pattern provides a unified
interface to a set of interfaces in a sub-system?
Façade 146 (correct)
Singleton
Observer
Joint
Testing activities require destructive
instincts in __________ for the purpose of breaking
system to discover loopholes into its
functionality.
Bug Fixers
Tester 198 (correct)
Developer
Requirement Engineer
Camel Case is now the official
convention for file names and identifiers in the ________
programming language.
C#
C++
Java 152 (correct)
Visual Basic.Net
In presence of _________ bug in a
program, the results are the opposite of what is
expected.
Memory Leak
Memory Over-runs
Syntax Error
Logical Error 221 (correct)
Split lines occur when a statement
exceed the _______ column limit.
80 158 (correct)
90
95
85
Identifier names play a significant role
in enhancing the ____________ of a program.
Writability
Readability 151 (correct)
Reliability
Usability
"is" prefix should be used
for__________ variables and methods.
Static
General
Boolean 155 (correct)
Constant
Comments should be indented relative to
their position in the _______.
Code 165 (correct)
Design
Analysis
Requirements
Modularity is a tool that can help us in
________ the size of individual functions.
Stabilizing
Reducing 173 (correct)
Increasing
Strengthening
When planning for performance, one should
always remember the _______ rule.
80/20 180 (correct)
70/20
60/20
100/20
Which of the items listed below is NOT
one of the software engineering layers?
Tools
Process
Manufacturing (correct)
Methods
Which of the following is a
non-functional requirement of a website which sells
songs?
A catalogue of the stock needs to be
available for the users to choose from
Customer information should be retained
to allow future transactions easier
Users should be able to choose from a
set of different languages for the interface
Time taken to download songs
in the catalogue should not irritate users (correct)
The state transition diagram ______
Depicts relationships between data
objects
Depicts functions that transform the
data flow
Indicates how data are
transformed by the system (correct)
Indicates system reactions to external
events
Control flow diagrams are:
Needed to model event driven systems
Required for all systems
Used in place of data flow
diagrams (correct)
Useful for modeling user interfaces
Prototyping _____
Ensures getting the design right the first
time
Is the execution of the standard systems
development cycle using CASE tools.
Is used to verify if a key
process is feasible (correct)
Involves an iterative development
process with minimum end use involvement.
Identifying Whole-Part structures
(Aggregations) means, what are my -------------
Components
Structures 98 (correct)
Modules
Interaction Protocols
Software architecture is "The
_______ of the components of a program/system,
their interrelationships, and principles
and guidelines governing their design and evolution
over time".
Combination
Collection
Structure 120 (correct)
Unification
The object-behavior model indicates how
the system ________
Functions in the operating environment
Objects collaborate with one
another (correct)
Responds to external stimuli
Responds to internal stimuli
Perry and Wolfe proposed the following
formula for software architecture:
Software architecture = {Forms,
Rationale}
Software architecture =
{Elements, Forms, Rationale} 125 (correct)
Software architecture = {Parts,
Rationale}
Software architecture = {Parts, Elements}
Repository model also provides the
---------------------- view of the system.
Global 130 (correct)
Local
General
Private
In the case of zero-install, the network
environment is used to ______ server side
processing by adding a number of servers
which share processing load.
Distribute 133 (correct)
Centeralize
Shift
De-Synchronize
Requirement Statement and Requirement
Specification are also called
Requirement Definition and ________
Functional Specification 28 (correct)
Mathematical specification
System Specification
Cost Specification
Which of the following is not a
fundamental structured programming construct?
Recursion (correct)
Condition
Repetition
Sequence
For equivalence partitions, we divide
the problem in ----------- obvious categories of
equal strings
4
3
2 202 (correct)
5
Which is not included in test criteria
applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programing Logic (correct)
Static analyzers are software tools for
--------------- processing.
Analysis text
Source text 214 (correct)
Design text
Maintainence Text
The first “bug” was actually a moth,
which flew through an open window and into one of
the Mark --------- 's relays.
II 216 (correct)
I
III
IV
Holistic medicine, concerns itself with
the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease (correct)
Source
Bugs Fixing is done by which of the
teams in Software Development lifecycle?
Development Team (correct)
Testing Team not sure
Analysis & Design Team
Process Team
Which of the following testing involve
purely black box testing?
Unit testing, Beta testing
Acceptance testing, Interface testing
Beta testing, Acceptance
testing (correct)
Integration testing, Interface testing
A
memory leak bug is one in which memory is somehow allocated from either the
operating system or an ----------
"pool", but never deallocated when the memory is finished
being used.
External memory
Mixed memory
Internal Memory 219 (correct)
Mutually exculive memory
Equivalence __________ help you in
designing test cases to test the system
effectively and efficiently.
Functions
Classes 202 (correct)
Objects
Interfaces
___________ are used to describe flow of
data or control in an application.
Code structures
String matchings
Paths
Flow graphs 203 (correct)
_________ requirements are often called
product features.
Functional
Business (correct)
User
Non-functional
In Java, ">>" is used
for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
When large amount of data is to be
shared, repository model is used. This model has
been extensively used in the _______
based application.
Mainframe 130 (correct)
Super Computers
Personal Computers
Real time
Idea of zero install architecture is to
develop a system where no installation on the _____
is needed.
Client side 133 (correct)
Server Side
Client & Server Side
Network
___________ is only a reference for
defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture 137 (correct)
Layered architecture
N-tier architecture
Description of communicating objects and
classes that are customized to solve a general
design in a particular context is called
__________.
Design Pattren 140 (correct)
System Pattren
System Design
Design System
Which of the following is the correct
formula for calculating cyclomatic complexity of a
program ?
V - N + 2
E - V + 2
E - N + 2 208 (correct)
E + N – 2
In unit testing, developers test
___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own 210 (correct)
Mixed code of people
Hidden
Performance & Usability are examples
of _________ requirements.
Business
Functional
Non-Functional 213 (correct)
User
33.Which of the following is the correct
definition for software testing ?
The process of demonstrating that errors
are not present
The process of establishing confidence
that a program does what it is supposed to do
The process of executing a program to
show it is working as per specifications
The process of executing a
program with the intent of finding errors (correct)
The code is misbehaving in a way that
cannot be easily explained.
The above statement is the symptom of
___________.
Runtime Error
Logical Error 221
Memory Leak
Exception
Secondary private classes can be
declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes 158 (correct)
Outer classes
Synchronous classes
Split lines occur when a statement
exceed the _______ column limit.
80 158 (correct)
90
95
85
Identifier names play a significant role
in enhancing the ____________ of a program.
Writability
Readability 151 (correct)
Reliability
Usability
Names representing methods and functions
should be ________ and written in mixed case
starting with ________ case.
Noun, Lower
Noun, Upper
Verb, Upper
Verb, Lower (correct)
"is" prefix should be used
for__________ variables and methods.
Static
General
Boolean 155 (correct)
Constant
If you are initializing a variable at
the time of declaration, do not declare another
_______in the same statement.
Variable 179 (correct)
Object
Class
Module
A
change becomes ------------- because of close presence of data and fucntions
Localized (correct)
Private
Global
Accessible
Which of the following is NOT an
objective for building an analysis model?
Develop an abbreviated
solution for the problem (correct)
Establish basis for software design
Define set of software requirements
Describe customer requirements
Data flow diagrams are used to handle
processes involved in ________
Business Process Transformation
Flow of data 53 (correct)
Flow of information
Cost estimation
The first most important study in
developing any system is to indentify
Purpose of the system (correct)
Implementation of the system
Design of the system
Architecture of the system not sure _
Software Architecture is all about
________
Requirements gathering
Design (correct)
Coding
Testing
Dynamic components of an OOA model are
____________________
Not reusable
Sensitive to timing and event
processing (correct)
Stable throughout the operational life
of an application
Structural in nature
UML (unified modeling language) analysis
modeling focuses on the _________________ .
Behavioral model and
environment model. (correct)
Behavioral model and implementation
model.
User model and environmental model
User model and structural model
Perry and Wolfe proposed the following
formula for software architecture:
Software architecture = {Forms,
Rationale}
Software architecture =
{Elements, Forms, Rationale} (correct)
Software architecture = {Parts,
Rationale}
Software architecture = {Parts,
Elements}
Repository model also provides the
---------------------- view of the system
Global 130 (correct)
Local
General
Private
Which of the below is NOT a part of
Architectural styles?
Data Center architecture
Client Server Architecture
Hirerical Architercture 129 (correct)
Layered Architecture
Consider the following scenario:
“Student logins the system and checks
his/her lecture schedule”
Keeping in mind the use case diagram,
and above scenario the one of the post conditions
might be:
Student should have a login
System should be available
Student should log-off after
checking schedule (correct)
Lecture schedule should be displayed
date wise
When measure of independence of a module
or component is low to the other,
How would changes in one component have
effect on other component?
No
Low
High (correct)
Equal
One of the most powerful features of
exception handling is that an error can be ----------
over function boundaries.
Thrown 187 (correct)
Called back
Caught
Sent
What is the normal order of activities
in which software testing is organized?
Unit, integration, system,
validation (correct)
System, integration, unit, validation
Unit, integration, validation, system
Integration, unit, system, validation
Two tests are considered to be
equivalent if it is believed that: if one discovers a defect,
the other probably will too, and if one
does not discover a defect, ---------------------------------.
The other probably may
The other probably can
The other probably won’t
either 202 (correct)
The other probably will
For equivalence partitions, we divide
the problem in ----------- obvious categories of
equal strings
4
3
2 (correct)
5
In -------------- testing we test the
structure of the program.
White Box 201 (correct)
Black Box
System
Regression
Static analyzers are software tools for
--------------- processing.
Analysis text
Source text 214 (correct)
Design text
Maintainence Text
Unit testing is roughly equivalent to
__________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level 210 (correct)
Component level
System level
20.A SRS is said to be __________ if and
only if, every requirement stated therein has only one
interpretation.
Compact
Unambiguous (correct)
Consistant
Detailed
In Java, ">>" is used for
_______ shift and ">>>" for _________ shift
Arithmetic, Logical (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic
A(n) ________ is a variance from a
desired product attribute
Error
Exception
Defect 195 (correct)
Mistake
st cases should be generated for unit
testing and system testing during _________.
Testing and maintenance
respectively (correct)
Requirement analysis
Design and requirement analysis
respectively
Coding and design respectively
a of zero install architecture is to
develop a system where no installation on the _____ is
needed.
Client side 133 (correct)
Server Side
Client & Server Side
Network
________ is NOT a layer of operating
system.
Core layer
Application layer
Presentation layer 136 (correct)
UI layer
26.patterns are devices that allow
programs to share knowledge about their ___________.
Design 140 (correct)
Code
Analysis
Testing
Which design pattern provides a unified
interface to a set of interfaces in a sub-system?
Façade 146 (correct)
Singleton
Observer
Joint
In unit testing, developers test
___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own 210 (correct)
Mixed code of people
Hidden
Inspections cannot check __________
characteristics.
Non-Functioanl. 213 (correct)
Business
User
Functional
Performance & Usability are examples
of _________ requirements.
Business
Functional
Non-Functional 213 (correct)
User
Inspections may be applied to any
representation of the system which may include all
except __________.
Requirements
Design
Testing
Analysis 213 (correct)
Debuggers can be used to display values
of _________ .
local variables only
global variables only
static variables only
both local and global
variables 229 (correct)
The code is misbehaving in a way that
cannot be easily explained.
The above statement is the symptom of
___________.
Runtime Error
Logical Error 221 (correct)
Memory Leak
Exception
Ideally speaking, a function should not
be larger than _________lines of code and in any
case should not exceed one page in
length.
20 150 (correct)
15
30
25
CamelCase is now the official convention
for file names and identifiers in the ________
programming language.
C#
C++
Java 152 (correct)
Visual Basic.Net
Split lines occur when a statement
exceed the _______ column limit.
80 (correct)
90
95
85
37.The construction should appear at the
__________ of the header file
Top 160 (correct)
Bottom
Left
Right
Identifier names play a significant role
in enhancing the ____________ of a program.
Writability
Readability (correct)
Usability
Maintainability
One of the guidelines to avoid common
mistakes is to never use ________ except for declar
, (correct)
;
=
||
When planning for performance, one
should always remember the _______ rule.
80/20 (correct)
70/20
60/20
100/20
Following are some statements associated with
data flow diagrams. Identify the correct
statement from among them.
DFDs are used to model complex
interfaces.
DFDs are used to represent only
functional processing, data stores and data movements
between functions.
DFDs depict only processes
which can be decomposed. (correct)
DFDs do not show external data sources
and external data sinks.
A project is considered successful if:
The system was delivered in
time and within budget. (correct)
The system meets at least some of the
customer’s requirements.
The system development process has a
maximum impact on the ongoing business process.
Minimum time was spent for requirement
gathering and designing.
A process which does not take input is
called ______
Miracle process (correct)
Core process
Secondary process
Zombie process
Data Flow Diagrams _______
Replace the job of systems analysts
Do not allow every function to work at
the same time.
Can be automatically generated by
computer aided software engineering tools
Describes how data flows from
one logical processing unit to another (correct)
In a …………., each program module is
represented by a rectangular box.
Use case diagram (correct)
Document flow diagram
Class diagram
Data flow diagram
Identify the correct description.
The collection of use cases for a system
constitutes all the defined ways the system may be
used.
UML stands for Unified Markup Language
State transition diagrams are drawn for
objects with no significant dynamic behavior.
Object Model depicts the
dynamic behavior of system (correct)
Dynamic components of an OOA model are
____________________
Not reusable
Sensitive to timing and event
processing (correct)
Stable throughout the operational life
of an application
Structural in nature
To determine the architectural style or
combination of styles that best fits the proposed
system, requirements engineering is used
to uncover:
Algorithmic complexity
Characteristics and
constraints (correct)
Control and data
Design patterns
Krutchen’s 4+1 architectural view model
proposes the development of ______ main views
5
4 There are 4 main views (correct)
3
2
Repository model also provides the
---------------------- view of the system.
Global (correct)
Local
General
Private
Client server model tries to _______
data and processing.
Distribute 130 (correct)
Centralize
Process in parallel
Combine
We can divide the whole Software
Engineering process in 4 distinct phases namely
vision, definition, development, and
maintenance.
Which of the following is not among
“Definition related” activities of software development?
Requirement verification
Change Control (correct)
Requirement Engineering
Software Requirements
What is meant by the term ‘software
crisis’?
Ability to deliver software on time with
good quality
A situation in which experienced
developers leave the company
Inability of new software to
inter-operate with existing software (correct)
A situation in which large scale
software projects took more time and budget than
was planned
Which of the following are external
qualities of a software product?
Maintainability, reusability,
portability, efficiency, correctness
Correctness, reliability, robustness,
efficiency, usability
Portability,
interoperability, maintainability, reusability (correct)
Robustness, efficiency, reliability,
maintainability, reusability
Which writing style is best regarding
identifier role in enhancing the readability of a
program?
If (Flag = = 0)
If (Flag = = START_NUMBER)
If (Z = = START_NUMBER) (correct)
If (Z= =0)
A useful technique for evaluating the
overall complexity of a proposed architecture is to
look at the component
Number and size of components
Flow dependencies and sharing
dependencies (correct)
Size and cost
Algorithms used
For equivalence partitions, we divide
the problem in ----------- obvious categories of
equal strings
4
3
2 (correct)
5
In -------------- testing we test the
structure of the program.
White Box (correct)
Black Box
System
Regression
Which is not included in test criteria
applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programming Logic (correct)
Inspections can check conformance with a
specification but not conformance with the ---
----------requirements.
Customer's real 213 (correct)
Developer
Tester
Manger
Static analyzers are software tools for
--------------- processing.
Analysis text
Source text (correct)
Design text
Maintenance Text
Holistic medicine, concerns itself with
the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease (correct)
Source
Software deteriorates rather than wears
out because
Software suffers from exposure to
hostile environments
Defects are more likely to
arise after software has been used often (correct)
Multiple change requests introduce
errors in component interactions
Software spare parts become harder to
order
Testing is an intellectually demanding
activity and has a lifecycle ---------- to software
development.
Equal
Parallel 198 (correct)
Sequential
In contrast
A memory leak bug is one in which memory
is somehow allocated from either the
operating system or an ----------
"pool", but never deallocated when the memory is finished
being used.
Mixed memory
External memory
Internal Memory 219 (correct)
Mutually exculive memory
___________ are used to describe flow of
data or control in an application.
Code structures
String matchings
Paths
Flow graphs 203 (correct)
CS504 Software Engineering Quizzes
ReplyDeletehttp://vukwl.blogspot.com/2018/07/cs504-software-engineering-quizzes-file_15.html
thnxx for sharing
ReplyDeleteThanks
ReplyDeleteThankyou it help me alot to find the correct quiz
ReplyDeleteAlso check the this forum it help alot
vustudentspk.com
Thanks. It's very helpful for exam
ReplyDelete