Skip to main content

CS504 Software Engineering Finalterm MCQ's (Solved), Spring 2014


CS504 – Software Engineering - I

Recent Papers MCQ’s
 Solved by
Abdul Fahd MCS-3rd and Saif BSCS-4th

Writing test cases and generating test data are processes that demand __________ building
capabilities.
Code
Domain
System
Scenario         scenario-building                   (correct)

What types of errors are missed by black-box testing and can be uncovered by whitebox
testing?
Runtime errors
Logic errors               (correct)
Performance errors
Input errors

The cyclomatic complexity metric provides the designer with information regarding the
number of ___________.
Statements in the program
Cycles in the program
Errors in the program
Independent logic paths in the program                             207      (correct)

The best reason for using Independent software test teams is that
Software developers do not need to do any testing            (correct)
Strangers will test the software mercilessly
Testers do not get involved with the project until testing begins
The conflicts of interest between developers and testers is reduced

__________ is intended to define a many to many relationship between objects so that when
one object changes state all its dependants are notified and updated automatically.
Observer Pattren                   (correct)
Facade Pattren
Singleton Pattren
Joint Pattren

________ ensures that a class only has one instance and provides a global point of access to
it.
Behavioral Pattern
Joint Pattern
Singleton Pattern                               145      (correct)
Observer Pattern

Inspections cannot check __________ characteristics.
Non-Functioanl                                 213      (correct)
Business
User
Functional

Secondary private classes can be declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes                           158      (correct)
Outer classes
Synchronous classes

The construction should appear at the __________ of the header file.
Top                 (correct)
Bottom
Left
Right

In the switch statement, cases should always end with ________.
Return
Semi colon
Break                          170      (correct)
Full stop

Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Reducing                    173      (correct)
Increasing
Strengthening

Abstraction and encapsulation are two important tools that can help in managing and
mastering the _________ of a program.
Usability
Complexity                 173      (correct)
Understandability
Reliability

One of the guidelines to avoid common mistakes is to never use ________ except for
declaration.
,                       comma ,          (correct)
;
=
||

Which of the following is/are NOT one of the umbrella activities?
Requirement analysis
Architecture design
Test case development
All of the given options                     (correct)

In a …………., each program module is represented by a rectangular box.
Use case diagram                   33                    (correct)
Class diagram
Document flow diagram
Data flow diagram

……………… is a diagramming technique used to identify the types of objects in the system
and the static relationships that exist among them.
Class Diagram                       (correct)
Document flow diagrams
Data flow diagrams
Flow charts

Which one is NOT a type of messages which Sequence Diagrams Depict _______
Asynchronous
Synchronous
Create
Update                        108                  (correct)

Identifying Whole-Part structures (Aggregations) means, what are my ---------------
Components                           95                    (correct)
Structures
Modules
Interaction Protocols

The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is:
Architectural Design                         115                  (correct)
Interface Design
Component Design
Data Design

A complex System evolves from a
Smaller system
Simpler system                       69                    (correct)
Bigger system
Medium system

A context diagram ______
Describes the context dependencies of a system
Is a DFD which gives an overview of the system                (correct)
Is a detailed description of a system
Is not used in drawing a detailed DFD

When measure of independence of a module or component is low to the other,
How would changes in one component have effect on other component?
No
Low
High                (correct)
Equal

What is meant by the term ‘software crisis’?
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing software                (correct)
A situation in which large scale software projects took more time and budget than
was planned               

Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programming Logic              (correct)

For inspections, --------------- are prepared that contain information regarding defects.
Tables
Checklists                   210                  (correct)
Lists
Frames

Static analyzers are software tools for --------------- processing.
Analysis text
Source text                 211                  (correct)
Design text
Maintainence Text

Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease            224                  (correct)
Source

What factor has no precipitation in more sophisticated and complex computer-based
systems?
Vast use of personal computers.                  (correct)
Vast increases in computer memory and storage capacity.
Greater variety of exotic input/output options.
Profound changes in computer architectures.

Software Bugs have multiple names. Which one of the below is not the name of Software
Bugs?
Bugs
Defects
Errors
Mistakes         213                  (correct)

Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level                 207                  (correct)
Component level
System level

Equivalence __________ help you in designing test cases to test the system effectively and
efficiently.
Functions
Classes                        202                  (correct)
Objects
Interfaces

___________ are used to describe flow of data or control in an application.
Code structures
String matching.
Paths
Flow graphs                           203                  (correct)

Writing test cases and generating test data are processes that demand __________ building
capabilities.
Domain
System
Scenario                                 198                  (correct)
Code

The raising of the imaginary error flag is simply called raising or _________ an error.
Throwing                               187                  (correct)
Sending
Casting
Handling

 _________ requirements are often called product features.
Functional
Business                      22                    (correct)
User
Non-functional

Many compilers limit the maximum number of bits in the bit field to the size of a(n)
_________.
Integer                        183                  (correct)
Float
Character
Double

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical                           181                  (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic

When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
Mainframe                             130                  (correct)
Super Computers
Personal Computers
Real time

There are four basic coding structures: sequence, if statement, case statement, and
___________.
For loop
While loop                              203                  (correct)
Switch statement
Logical operations

___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture                                 137                  (correct)
Layered architecture
N-tier architecture

The pattern movement became very quiet until __________ when patterns appeared again
at OOPSLA conference.
1987                            141                  (correct)
1988
1962
1995

STL Stands for ______________.
Standard Temporary Line
Standard Temporary Library
Standard Template Library                                     141                  (correct)
Standard Type Link

MVC stands for ____________.
Modern View Center
Model View Controller                                 143                  (correct)
Modern View Controller
Model View Center

________ ensures that a class only has one instance and provides a global point of access to
it.
Singleton Pattern                               145                  (correct)
Observer Pattern
Behavioral Pattern
Joint Pattern

Which design pattern provides a unified interface to a set of interfaces in a sub-system?
Façade                                    146                  (correct)
Singleton
Observer
Joint

Testing activities require destructive instincts in __________ for the purpose of breaking
system to discover loopholes into its functionality.
Bug Fixers
Tester                                     198                  (correct)
Developer
Requirement Engineer

Camel Case is now the official convention for file names and identifiers in the ________
programming language.
C#
C++
Java                            152                  (correct)
Visual Basic.Net

In presence of _________ bug in a program, the results are the opposite of what is
expected.
Memory Leak
Memory Over-runs
Syntax Error
Logical Error                                     221                  (correct)

Split lines occur when a statement exceed the _______ column limit.
80                                158                  (correct)
90
95
85

Identifier names play a significant role in enhancing the ____________ of a program.
Writability
Readability                             151                  (correct)
Reliability
Usability

"is" prefix should be used for__________ variables and methods.
Static
General
Boolean                                  155                  (correct)
Constant

Comments should be indented relative to their position in the _______.
Code                           165                  (correct)
Design
Analysis
Requirements

Modularity is a tool that can help us in ________ the size of individual functions.
Stabilizing
Reducing                                173                  (correct)
Increasing
Strengthening

When planning for performance, one should always remember the _______ rule.
80/20                                       180                  (correct)
70/20
60/20
100/20

Which of the items listed below is NOT one of the software engineering layers?
Tools
Process
Manufacturing                      (correct)
Methods

Which of the following is a non-functional requirement of a website which sells
songs?
A catalogue of the stock needs to be available for the users to choose from
Customer information should be retained to allow future transactions easier
Users should be able to choose from a set of different languages for the interface
Time taken to download songs in the catalogue should not irritate users            (correct)

The state transition diagram ______
Depicts relationships between data objects
Depicts functions that transform the data flow
Indicates how data are transformed by the system                        (correct)
Indicates system reactions to external events

Control flow diagrams are:
Needed to model event driven systems
Required for all systems
Used in place of data flow diagrams                       (correct)
Useful for modeling user interfaces

Prototyping _____
Ensures getting the design right the first time
Is the execution of the standard systems development cycle using CASE tools.
Is used to verify if a key process is feasible             (correct)
Involves an iterative development process with minimum end use involvement.

Identifying Whole-Part structures (Aggregations) means, what are my -------------
Components
Structures                  98                    (correct)
Modules
Interaction Protocols

Software architecture is "The _______ of the components of a program/system,
their interrelationships, and principles and guidelines governing their design and evolution
over time".
Combination
Collection
Structure                    120                  (correct)
Unification

The object-behavior model indicates how the system ________
Functions in the operating environment
Objects collaborate with one another                      (correct)
Responds to external stimuli
Responds to internal stimuli

Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms, Rationale}                 125                  (correct)
Software architecture = {Parts, Rationale}
Software architecture = {Parts, Elements}

Repository model also provides the ---------------------- view of the system.
Global                         130                  (correct)
Local
General
Private

In the case of zero-install, the network environment is used to ______ server side
processing by adding a number of servers which share processing load.
Distribute                   133                  (correct)
Centeralize
Shift
De-Synchronize

Requirement Statement and Requirement Specification are also called
Requirement Definition and ________
Functional Specification                   28                    (correct)
Mathematical specification
System Specification
Cost Specification

Which of the following is not a fundamental structured programming construct?
Recursion                   (correct)
Condition
Repetition
Sequence

For equivalence partitions, we divide the problem in ----------- obvious categories of
equal strings
4
3
2                      202                  (correct)
5

Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programing Logic                 (correct)

Static analyzers are software tools for --------------- processing.
Analysis text
Source text                 214                  (correct)
Design text
Maintainence Text

The first “bug” was actually a moth, which flew through an open window and into one of
the Mark --------- 's relays.
II                     216                  (correct)
I
III
IV

Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease                        (correct)
Source

Bugs Fixing is done by which of the teams in Software Development lifecycle?
Development Team               (correct)
Testing Team not sure
Analysis & Design Team
Process Team

Which of the following testing involve purely black box testing?
Unit testing, Beta testing
Acceptance testing, Interface testing
Beta testing, Acceptance testing                   (correct)
Integration testing, Interface testing

 A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
External memory
Mixed memory
Internal Memory                   219                  (correct)
Mutually exculive memory

Equivalence __________ help you in designing test cases to test the system
effectively and efficiently.
Functions
Classes                        202                  (correct)
Objects
Interfaces

___________ are used to describe flow of data or control in an application.
Code structures
String matchings
Paths
Flow graphs               203                  (correct)

_________ requirements are often called product features.
Functional
Business                      (correct)
User
Non-functional

In Java, ">>" is used for _______ shift and ">>>" for _________ shift.
Arithmetic, Logical               (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic

When large amount of data is to be shared, repository model is used. This model has
been extensively used in the _______ based application.
Mainframe                 130                  (correct)
Super Computers
Personal Computers
Real time

Idea of zero install architecture is to develop a system where no installation on the _____
is needed.
Client side                  133                  (correct)
Server Side
Client & Server Side
Network

___________ is only a reference for defining protocols and designing and implementing
systems developed by different parties.
OSI model
Reference architecture                     137                  (correct)
Layered architecture
N-tier architecture

Description of communicating objects and classes that are customized to solve a general
design in a particular context is called __________.
Design Pattren                       140                  (correct)
System Pattren
System Design
Design System

Which of the following is the correct formula for calculating cyclomatic complexity of a
program ?
V - N + 2
E - V + 2
E - N + 2 208              (correct)
E + N – 2

In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own                  210                  (correct)
Mixed code of people
Hidden

Performance & Usability are examples of _________ requirements.
Business
Functional
Non-Functional                     213                  (correct)
User

33.Which of the following is the correct definition for software testing ?
The process of demonstrating that errors are not present
The process of establishing confidence that a program does what it is supposed to do
The process of executing a program to show it is working as per specifications
The process of executing a program with the intent of finding errors                 (correct)

The code is misbehaving in a way that cannot be easily explained.
The above statement is the symptom of ___________.
Runtime Error
Logical Error                         221
Memory Leak
Exception

Secondary private classes can be declared as __________ and reside in the file of the class
they belong to.
Asynchronous Classes
Inner classes               158                  (correct)
Outer classes
Synchronous classes

Split lines occur when a statement exceed the _______ column limit.
80                    158                  (correct)
90
95
85

Identifier names play a significant role in enhancing the ____________ of a program.
Writability
Readability                 151                  (correct)
Reliability
Usability

Names representing methods and functions should be ________ and written in mixed case
starting with ________ case.
Noun, Lower
Noun, Upper
Verb, Upper
Verb, Lower              (correct)

"is" prefix should be used for__________ variables and methods.
Static
General
Boolean                      155                  (correct)
Constant

If you are initializing a variable at the time of declaration, do not declare another
_______in the same statement.
Variable                     179                  (correct)
Object
Class
Module

 A change becomes ------------- because of close presence of data and fucntions
Localized                    (correct)
Private
Global
Accessible

Which of the following is NOT an objective for building an analysis model?
Develop an abbreviated solution for the problem              (correct)
Establish basis for software design
Define set of software requirements
Describe customer requirements

Data flow diagrams are used to handle processes involved in ________
Business Process Transformation
Flow of data               53                    (correct)
Flow of information
Cost estimation

The first most important study in developing any system is to indentify
Purpose of the system                       (correct)
Implementation of the system
Design of the system
Architecture of the system not sure _

Software Architecture is all about ________
Requirements gathering
Design                         (correct)
Coding
Testing

Dynamic components of an OOA model are ____________________
Not reusable
Sensitive to timing and event processing                 (correct)
Stable throughout the operational life of an application
Structural in nature

UML (unified modeling language) analysis modeling focuses on the _________________ .
Behavioral model and environment model.                        (correct)
Behavioral model and implementation model.
User model and environmental model
User model and structural model

Perry and Wolfe proposed the following formula for software architecture:
Software architecture = {Forms, Rationale}
Software architecture = {Elements, Forms, Rationale}                 (correct)
Software architecture = {Parts, Rationale}
Software architecture = {Parts, Elements}

Repository model also provides the ---------------------- view of the system
Global                         130                  (correct)
Local
General
Private

Which of the below is NOT a part of Architectural styles?
Data Center architecture
Client Server Architecture
Hirerical Architercture                     129                  (correct)
Layered Architecture

Consider the following scenario:
“Student logins the system and checks his/her lecture schedule”
Keeping in mind the use case diagram, and above scenario the one of the post conditions
might be:
Student should have a login
System should be available
Student should log-off after checking schedule                  (correct)
Lecture schedule should be displayed date wise

When measure of independence of a module or component is low to the other,
How would changes in one component have effect on other component?
No
Low
High                (correct)
Equal

One of the most powerful features of exception handling is that an error can be ----------
over function boundaries.
Thrown                      187                  (correct)
Called back
Caught
Sent

What is the normal order of activities in which software testing is organized?
Unit, integration, system, validation                        (correct)
System, integration, unit, validation
Unit, integration, validation, system
Integration, unit, system, validation

Two tests are considered to be equivalent if it is believed that: if one discovers a defect,
the other probably will too, and if one does not discover a defect, ---------------------------------.
The other probably may
The other probably can
The other probably won’t either                 202                  (correct)
The other probably will

For equivalence partitions, we divide the problem in ----------- obvious categories of
equal strings
4
3
2                      (correct)
5

In -------------- testing we test the structure of the program.
White Box                  201                  (correct)
Black Box
System
Regression

Static analyzers are software tools for --------------- processing.
Analysis text
Source text                 214                  (correct)
Design text
Maintainence Text

Unit testing is roughly equivalent to __________ testing for hardware in which each chip is
tested thoroughly after manufacturing.
Circuit level
Chip Level                 210                  (correct)
Component level
System level

20.A SRS is said to be __________ if and only if, every requirement stated therein has only one
interpretation.
Compact
Unambiguous                        (correct)
Consistant
Detailed

 In Java, ">>" is used for _______ shift and ">>>" for _________ shift
Arithmetic, Logical               (correct)
Mathematical, Logical
Incremental, Arithmetic
Logical, Arithmetic

A(n) ________ is a variance from a desired product attribute
Error
Exception
Defect                         195                  (correct)
Mistake

st cases should be generated for unit testing and system testing during _________.
Testing and maintenance respectively                     (correct)
Requirement analysis
Design and requirement analysis respectively
Coding and design respectively

a of zero install architecture is to develop a system where no installation on the _____ is
needed.
Client side                  133                  (correct)
Server Side
Client & Server Side
Network

________ is NOT a layer of operating system.
Core layer
Application layer
Presentation layer                 136                  (correct)
UI layer

26.patterns are devices that allow programs to share knowledge about their ___________.
Design                         140                  (correct)
Code
Analysis
Testing

Which design pattern provides a unified interface to a set of interfaces in a sub-system?
Façade                        146                  (correct)
Singleton
Observer
Joint

In unit testing, developers test ___________ code units (modules, classes, etc.) during
implementation.
Other's
Their own                  210                  (correct)
Mixed code of people
Hidden

Inspections cannot check __________ characteristics.
Non-Functioanl.                    213                  (correct)
Business
User
Functional

Performance & Usability are examples of _________ requirements.
Business
Functional
Non-Functional                     213                  (correct)
User

Inspections may be applied to any representation of the system which may include all
except __________.
Requirements
Design
Testing
Analysis                      213                  (correct)

Debuggers can be used to display values of _________ .
local variables only
global variables only
static variables only
both local and global variables                     229                  (correct)

The code is misbehaving in a way that cannot be easily explained.
The above statement is the symptom of ___________.
Runtime Error
Logical Error                         221                  (correct)
Memory Leak
Exception

Ideally speaking, a function should not be larger than _________lines of code and in any
case should not exceed one page in length.
20                    150                  (correct)
15
30
25

CamelCase is now the official convention for file names and identifiers in the ________
programming language.
C#
C++
Java                152                  (correct)
Visual Basic.Net

Split lines occur when a statement exceed the _______ column limit.
80                    (correct)
90
95
85

37.The construction should appear at the __________ of the header file
Top                 160                  (correct)
Bottom
Left
Right

Identifier names play a significant role in enhancing the ____________ of a program.
Writability
Readability                 (correct)
Usability
Maintainability

One of the guidelines to avoid common mistakes is to never use ________ except for declar
,                       (correct)
;
=
||

When planning for performance, one should always remember the _______ rule.
80/20               (correct)
70/20
60/20
100/20

 Following are some statements associated with data flow diagrams. Identify the correct
statement from among them.
DFDs are used to model complex interfaces.
DFDs are used to represent only functional processing, data stores and data movements
between functions.
DFDs depict only processes which can be decomposed.                (correct)
DFDs do not show external data sources and external data sinks.

A project is considered successful if:
The system was delivered in time and within budget.                    (correct)
The system meets at least some of the customer’s requirements.
The system development process has a maximum impact on the ongoing business process.
Minimum time was spent for requirement gathering and designing.

A process which does not take input is called ______
Miracle process                      (correct)
Core process
Secondary process
Zombie process

Data Flow Diagrams _______
Replace the job of systems analysts
Do not allow every function to work at the same time.
Can be automatically generated by computer aided software engineering tools
Describes how data flows from one logical processing unit to another                (correct)

In a …………., each program module is represented by a rectangular box.
Use case diagram                   (correct)
Document flow diagram
Class diagram
Data flow diagram

Identify the correct description.
The collection of use cases for a system constitutes all the defined ways the system may be
used.
UML stands for Unified Markup Language
State transition diagrams are drawn for objects with no significant dynamic behavior.
Object Model depicts the dynamic behavior of system                  (correct)

Dynamic components of an OOA model are ____________________
Not reusable
Sensitive to timing and event processing                 (correct)
Stable throughout the operational life of an application
Structural in nature

To determine the architectural style or combination of styles that best fits the proposed
system, requirements engineering is used to uncover:
Algorithmic complexity
Characteristics and constraints                    (correct)
Control and data
Design patterns

Krutchen’s 4+1 architectural view model proposes the development of ______ main views
5
4          There are 4 main views                     (correct)
3
2

Repository model also provides the ---------------------- view of the system.
Global             (correct)
Local
General
Private

Client server model tries to _______ data and processing.
Distribute                   130                  (correct)
Centralize
Process in parallel
Combine
We can divide the whole Software Engineering process in 4 distinct phases namely
vision, definition, development, and maintenance.

Which of the following is not among “Definition related” activities of software development?
Requirement verification
Change Control                     (correct)
Requirement Engineering
Software Requirements

What is meant by the term ‘software crisis’?
Ability to deliver software on time with good quality
A situation in which experienced developers leave the company
Inability of new software to inter-operate with existing software                        (correct)
A situation in which large scale software projects took more time and budget than
was planned

Which of the following are external qualities of a software product?
Maintainability, reusability, portability, efficiency, correctness
Correctness, reliability, robustness, efficiency, usability
Portability, interoperability, maintainability, reusability               (correct)
Robustness, efficiency, reliability, maintainability, reusability

Which writing style is best regarding identifier role in enhancing the readability of a
program?
If (Flag = = 0)
If (Flag = = START_NUMBER)
If (Z = = START_NUMBER)                      (correct)
If (Z= =0)

A useful technique for evaluating the overall complexity of a proposed architecture is to
look at the component
Number and size of components
Flow dependencies and sharing dependencies                   (correct)
Size and cost
Algorithms used

For equivalence partitions, we divide the problem in ----------- obvious categories of
equal strings
4
3
2                      (correct)
5

In -------------- testing we test the structure of the program.
White Box                  (correct)
Black Box
System
Regression

Which is not included in test criteria applied in a phase of testing?
Functional validity
Interface integrity
Correctness
Programming Logic              (correct)

Inspections can check conformance with a specification but not conformance with the ---
----------requirements.
Customer's real                     213                  (correct)
Developer
Tester
Manger

 Static analyzers are software tools for --------------- processing.
Analysis text
Source text                 (correct)
Design text
Maintenance Text

Holistic medicine, concerns itself with the state of the body as a whole, not the -----------
that is currently attacking it.
Target
Reason
Disease                        (correct)
Source

Software deteriorates rather than wears out because
Software suffers from exposure to hostile environments
Defects are more likely to arise after software has been used often                     (correct)
Multiple change requests introduce errors in component interactions
Software spare parts become harder to order

Testing is an intellectually demanding activity and has a lifecycle ---------- to software
development.
Equal
Parallel                       198                  (correct)
Sequential
In contrast

A memory leak bug is one in which memory is somehow allocated from either the
operating system or an ---------- "pool", but never deallocated when the memory is finished
being used.
Mixed memory
External memory
Internal Memory                               219                  (correct)
Mutually exculive memory

___________ are used to describe flow of data or control in an application.
Code structures
String matchings
Paths
Flow graphs                           203                  (correct)


Comments

  1. CS504 Software Engineering Quizzes
    http://vukwl.blogspot.com/2018/07/cs504-software-engineering-quizzes-file_15.html

    ReplyDelete
  2. Thankyou it help me alot to find the correct quiz

    Also check the this forum it help alot

    vustudentspk.com

    ReplyDelete
  3. Thanks. It's very helpful for exam

    ReplyDelete

Post a Comment

Please give us your feedback & help us to improve this site.

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end ...

CS614 Quiz No.4 Shared by MT Khan (Solved)

Question # 1 of 10 ( Start time: 09:04:39 PM ) Total Marks: 1 A typical cycle of implementing the change in DWH comprises of the sequence: Select correct option: Production -> QA -> Development Development-> QA -> Production(CORRECT) Development -> Production -> QA Production -> Development -> QA Question # 2 of 10 ( Start time: 09:05:16 PM ) Total Marks: 1 Vertically wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records(CORRECT) Dataset has attribute skews Dataset has partitioning skews Question # 3 of 10 ( Start time: 09:05:43 PM ) Total Marks: 1 In ___________ phase of kimballs approach, we identify the components needed now and in future. Select correct option: Requirement definition Architectural design Product development Analytical application development Question # 4 of 10 ( Start time: 09:06:56 PM ) Total Marks: 1 Technical architecture design supports the communicat...

CS401 Quiz No.3 (Solved) Shared by Usman

Question # 1 of 10 ( Start time: 04:04:57 PM ) Total Marks: 1 The area where all the registers of a process are stored, is known as __________. Select correct option:  Process Containing Block Process Control Block Process Code Block Process Compilation Block Question # 2 of 10 ( Start time: 04:05:22 PM ) Total Marks: 1 In interrupt masking, We use ________ to get control from the program without letting the program know about it. Select correct option: IRQ 0 IRQ 1 IRQ 2 IRQ 3 Question # 3 of 10 ( Start time: 04:06:04 PM ) Total Marks: 1 While using INT 10 for writing graphic pixel on screen, which of the following registers hold the information about pixel color ? Select correct option: DH DL AH AL Question # 4 of 10 ( Start time: 04:06:54 PM ) Total Marks: 1 Which of the following is the highest priority interrupt Select correct o...