Software Engineering MCQ Chapter 09

Posted by

Software Engineering MCQ, with 100% FREE PDF Download.

161. Ethnography is
(A) It describes the basic entities in the design and relation between them.
(B) Observational techniques used to understand social and organizational requirements.
(C) It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed.
(D) Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed.

162. In Data migration
(A) Here data-flow diagram show, how data is processed at different stages in the system.
(B) It registers all/ selected activities of a computer system.
(C) Technique used to transform raw data into a more useful form
(D) Data is shifted to modern data base management system

163. In Data flow (Activity model)
(A) It shows the software process as a set of activities each of which carries out data transformation.
(B) Data and associated programs are reengineered to remove limits on the data processing.
(C) It is responsible for the definition, operation, protection, performance, and recovery of a database.
(D) Development of a database to meet a user’s requirements.

164. In Data tension
(A) It shows the software process as a set of activities each of which carries out data transformation.
(B) Data and associated programs are reengineered to remove limits on the data processing
(C) It is responsible for the definition, operation, protection, performance, and recovery of a database.
(D) Development of a database to meet a user’s requirements

165. Database administration
(A) It shows the software process as a set of activities each of which carries out data transformation.
(B) Data and associated programs are reengineered to remove limits on the data processing.
(C) It is responsible for the definition, operation, protection, performance, and recovery of a database.
(D) Development of a database to meet a user’s requirements

166. Database design
(A) This model shows the software process as a set of activities each of which carries out data transformation.
(B) Data and associated programs are reengineered to remove limits on the data processing.
(C) It is responsible for the definition, operation, protection, performance, and recovery of a database.
(D) Development of a database to meet a user’s requirements

167. Exploratory development is
(A) Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
(B) An error of some kind or an unexpected event occurs during the execution of a program
(C) Here the objective of the process is to work with uses to explore their requirement and deliver a final system.
(D) Possible loss or harm in computing system.

168. Collection of logically related data stored together in one or more computerized files.
(A) Database
(B) Debugging
(C) Defect testing
(D) Defensive programming

169. Exception is
(A) Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
(B) An error of some kind or an unexpected event occurs during the execution of a program
(C) Here the objective of the process is to work with uses to explore their requirement and deliver a final system.
(D) Possible loss or harm in computing system.

170. When the program is developed, it is to be tested and defects are to be removed from the program.
(A) Database
(B) Debugging
(C) Defect testing
(D) Defensive programming

171. Evolutionary Development
(A) It describes the basic entities in the design and relation between them.
(B) Observational techniques used to understand social and organizational requirements.
(C) It is based on the idea of developing an initial implementation, exposing it uses on requirement and refining it through many versions until an adequate system has been developed
(D) Based on an idea of developing an initial implementation, exposing this to uses comment and retiring it until and adequate system has been developed.

172. Exposure is
(A) Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
(B) An error of some kind or an unexpected event occurs during the execution of a program
(C) Here the objective of the process is to work with uses to explore their requirement and deliver a final system.
(D) Possible loss or harm in computing system.

173. Fault tolerance is
(A) It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state.
(B) Capacity of a system or component to continue normal operation despite the presence of hardware or software faults.
(C) It is the widely used hazard technique
(D) Incorrect step, process, or data definition in a computer program

174. It is intended to find inconsistencies between a program and its specification. These inconsistencies are usually due to program faults or defects.
(A) Database
(B) Debugging
(C) Defect testing
(D) Defensive programming

175. It is a property of the system that equates to its trustworthiness. It is the degree of user’s confidence that the system will operate as one expect, that the system would not fail in normal use.
(A) Dependability
(B) Availability
(C) Maintainability
(D) None of these

176. Fail safe is
(A) Trustworthiness with which a system or component can be modified to increase its storage or functional capacity
(B) Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure.
(C) Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures.
(D) None of these

177. Represents the number of discrete levers in the inheritance tree where subclasses inherit attributes and operations from super classes.
(A) Depth of inheritance tree
(B) Breath of inheritance tree
(C) Radius of inheritance tree
(D) None of these

178. Fan- out is referred to
(A) It is a measure of number of function that calls some other function.
(B) It is measure of number of functions that are called by a function.
(C) In it server is only responsible for data management.
(D) None of these

179. Fail soft is
(A) Trustworthiness with which a system or component can be modified to increase its storage or functional capacity
(B) Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure.
(C) Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures
(D) None of these

180. Embedded systems are
(A) These system runs on a single processor or an integrated group of processors
(B) A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system.
(C) A system continues in operation after some system faults have manifested themselves.
(D) A system whose operation is incorrect, if results are not produced according to the timing specifications


161. (B) 162. (D) 163. (A) 164. (B) 165. (C)
166. (D) 167. (C) 168. (A) 169. (B) 170. (B)
171. (B) 172. (C) 173. (B) 174. (C) 175. (A)
176. (D) 177. (A) 178. (B) 179. (B) 180. (A)