Software Engineering MCQ Chapter 12

Posted by

Software Engineering MCQ, with 100% FREE PDF Download.

221. Parkinson’s Law is
(A) The cost is determined by available resources rather than by objective assessment.
(B) A program used in real-world environment must change necessarily or become progressively less useful in that environment.
(C) As an evolving program change, its strictures tend to become more complex.
(D) Program evolution is a self-regulating process.

222. An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces.
(A) Object design models
(B) Object interface design
(C) Object oriented models
(D) None of these

223. Retirement phase is
(A) Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint.
(B) Period of time in the software life cycle during which support for a software product is terminated.
(C) The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred.
(D) None of these

224. Retrospective Fault detection is
(A) Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint.
(B) Period of time in the software life cycle during which support for a software product is terminated.
(C) The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred*
(D) None of these

225. Risk planning process
(A) Extent to which a software module can be used in more than one computing program
(B) It involves regular monitoring of the risks identified and of new risks that develops.
(C) It considers each of the key risks that are identified and identifies strategiesto manage the risk.
(D) None of these

226. Software engineering method is
(A) Associated with production of software as per specification
(B) Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way.
(C) An engineering discipline, concern with software development.
(D) None of these

227. Restart is
(A) Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint.
(B) Period of time in the software life cycle during which support for a software product is terminated.
(C) The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred.
(D) None of these

228. Risk Management is
(A) Here each identified risk is analyzed and prioritized
(B) It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
(C) The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
(D) None of these

229. ROCOF (Rate of failure occurrence) is
(A) The probability that the system will cause an accident
(B) Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions.
(C) The frequency of occurrence with which unexpected behavior is likely to occur
(D) None of these

230. Software system is
(A) Associated with functionality of software and constraints of operations defined.
(B) It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system.
(C) It involves executing an implementation of the software with test data and examines the outputs of the software and its operational behavior to check that it is performing as required
(D) None of these

231. Scalability is
(A) Avoiding catastrophic moment
(B) Ease with which a system or component are modified to fit the problem area.
(C) It is a bounded area of responsibility.
(D) None of these

232. Risk analysis process is
(A) Here each identified risk is analyzed and prioritized
(B) It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
(C) The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
(D) None of these

233. Reusability is
(A) Extent to which a software module can be used in more than one computing program.
(B) It involves regular monitoring of the risks identified and of new risks that develops.
(C) It considers each of the key risks that are identified and also identifies strategies to manage the risk.
(D) None of these

234. Safety argument is
(A) Associated with the role of people involved in software process and the activities for which they are responsible.
(B) The most effective technique for demonstrating the safety of a system is proof by contradiction.
(C) It is concerned with establishing a confidence level in the system that might vary from low to high
(D) None of these

235. Risk assessment is
(A) Here each identified risk is analyzed and prioritized
(B) It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
(C) The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
(D) None of these

236. Risk is
(A) The probability that the system will cause an accident
(B) Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions.
(C) The frequency of occurrence with which unexpected behavior is likely to occur.
(D) None of these

237. Safety is
(A) Avoiding catastrophic moment
(B) Ease with which a system or component are modified to fit the problem area.
(C) It is a bounded area of responsibility.
(D) None of these

238. Role/action model is
(A) Associated with the role of people involved in software process and the activities for which they are responsible
(B) The most effective technique for demonstrating the safety of a system is proof by contradiction.
(C) It is concerned with establishing a confidence level in the system that might vary from low to high
(D) None of these

239. Role is
(A) Avoiding catastrophic moment
(B) Ease with which a system or component are modified to fit the problem area.
(C) It is a bounded area of responsibility
(D) None of these

240. Robustness is
(A) The probability that the system will cause an accident
(B) Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions
(C) The frequency of occurrence with which unexpected behavior is likely to occur.
(D) None of these


221. (A) 222. (C) 223. (B) 224. (C) 225. (C)
226. (B) 227. (A) 228. (C) 229. (C) 230. (B)
231. (B) 232. (A) 233. (A) 234. (B) 235. (B)
236. (A) 237. (A) 238. (A) 239. (C) 240. (B)