In the name of ALLAH, the most beneficient, the most merciful

Software Engineering - I (CS504)

Multiple Choice Questions (MCQs)

Objective Questions

  1. A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.

    1. Generalization
    2. Specialization
    3. Inheritance
    4. Whole-part
  2. Coupling is a measure of ________ of a module or component.

    1. Independence
    2. Dependence
    3. Aggregation
    4. Composition
  3. A context diagram is used

    1. as an aid to system design
    2. as the first step in developing a detailed DFD of a system
    3. in systems analysis of very complex systems
    4. as an aid to programmers
  4. A good program must contain ________ infeasible paths.

    1. 1
    2. 2
    3. 0
    4. infinite
  5. Global variables in C++ should always be referred to by using the

    1. :: operator
    2. : operator
    3. Without an operator
    4. None of the given
  6. Function testing falls under ________ testing technique.

    1. Unit
    2. White Box
    3. Black Box
    4. System
  7. An arrow in Data Flow Diagram (DFD) represents

    1. Direction of flow of data
    2. Processing of data
    3. External agent
    4. Internal agent
  8. The formula for calculating the Cyclomatic Complexity of a program is:

    1. E + N + 2
    2. E- N - 2
    3. E - N + 2
    4. N - E + 2
  9. Software ________ is the process of examining the software product against its requirements.

    1. Fixing
    2. Debugging
    3. Testing
    4. Exception handling
  10. While establishing the services for an object, the following fundamental questions should be asked

    1. Why does the system need this object any way?
    2. What useful questions can it answer?
    3. What useful action can it perform?
    4. All of the given.
  11. The Use case diagram does not show which actors interact with each use case

    1. True
    2. False
  12. In Data Flow Diagram (DFD), data flow can:

    1. Only originate from an external entity
    2. Only terminate in an external entity
    3. Originate and terminate in an external entity
    4. Either originate or terminate in an external entity but not both
  13. The order in which bytes of one word are stored is ________ dependent.

    1. hardware
    2. syntax
    3. language
    4. software
  14. Which of the following sentence is true regarding user interface design?

    1. The simpler the interface, the efficient is the system.
    2. The higher the response time, the better is the interface.
    3. GUI interfaces are good for all tasks which a user needs to perform at an interface.
    4. Commabd-line interfaces are faster for some tasks which the user needs to perform.
  15. ________ diagram does not capture control flow information, it just shows the flow of the data in a system.

    1. Sequence
    2. Data Flow
    3. Activity
    4. Class
  16. x = 0; // x is floating pt
    Which written form of above line of code is more in line with the self-documentation philosophythan the code above.

    1. x= false
    2. x = NULL
    3. x = 0.0;
    4. x = '\0'
  17. Exception handling provides:

    1. Portability mechanism
    2. Code Usability mechanism
    3. Error Handling mechanism
    4. Both Portability & Code Usability mechanism
  18. An external entity that interacts with a system is called a(n):

    1. association
    2. stakeholder
    3. use case
    4. actor
  19. The number ________ is the most abused symbol in programs written in C or C++.

    1. 1
    2. 0
    3. 2
    4. 3
  20. In Data Flow Diagram, the entity or system, outside the boundary of this system is called

    1. Process
    2. Data Flow
    3. External Agent
    4. Data Store
  21. Class variables should never be declared public. Public variables violate which of the following:

    1. Information hiding
    2. Encapsulation
    3. Information hiding and Encapsulation
    4. None of the given
  22. In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.

    1. A filled diamond
    2. A dot
    3. An unfilled diamond
    4. A half arrowhead
  23. The method of dividing and assigning different portions of a large system to different groups for construction is called ________.

    1. Work Basic Structure
    2. Working Boundary Structure
    3. Work Breakdown Structure
    4. Work Breakdown System
  24. The system specification describes the

    1. function and behavior of a computer-based system
    2. implementation of each allocated system element
    3. algorithmic detail and data structures
    4. time required for system simulation
  25. For equivalence partitions, we divide the problem in ________ obvious categories.

    1. Two
    2. Six
    3. Five
    4. Four
  26. The focus of sequence diagrams is:

    1. On object constraints
    2. On static Model of system
    3. On objects/classes and messages exchanged among them
    4. on the flow of Control
  27. ________ structure represents the internal organization of the various data and control items.

    1. Value
    2. Data
    3. Information
    4. Conceptual
  28. Comma ( , ) is very dangerous because ________.

    1. It causes side effects
    2. Compiler does not recognize this symbol
    3. It does not cause side effects
    4. It creates linkage problem
  29. In Collaboration diagrams, sequence of messaging is shown by ________.

    1. Numbering each message in an increasing order of numeric value
    2. Ordering of the messages in time
    3. Vertical ordering of the messages
    4. Horizontal ordering of the messages
  30. Which one is used to describe flow of data or control in an application

    1. Class diagram
    2. Use case diagram
    3. Flow Chart
    4. None of the given option
  31. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  32. A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.

    1. Dotted Lines
    2. Solid Lines
    3. Curved Lines
    4. Full Arrow
  33. The C/C++ language does not define the alignment of items within

    1. structures
    2. classes
    3. unions
    4. All of the given options
  34. The expressions with logical operators can be evaluated only from ________.

    1. Right to left
    2. Left to right
    3. Top to bottom
    4. Bottom to top
  35. Which indent size eliminates the chance of code lines splitting?

    1. 2
    2. 4
    3. 3
    4. 6
  36. In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.

    1. Composition and Aggregation
    2. Aggregation and Association
    3. Inheritance and Association
    4. Composition, Aggregation and Association
  37. After integrating subsystems into a system, and then testing this system as a whole is called

    1. Unit testing
    2. Component testing
    3. System testing
    4. Subsystem testing
  38. "is" prefix should be used for ________ variables and methods.

    1. General
    2. Boolean
    3. Constant
    4. None of the given option
  39. The complexity of a program may ________ if there are exceptional paths in it.

    1. Remains same
    2. Decrease
    3. Increase
    4. Cutback
  40. If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:

    1. Cat will not ba able to access any class
    2. Cat will inherit Animal's fubctions and data
    3. Cat will not inherit Animal's fubctions and data
    4. Cat is allowed to access only the Mamal's Class
  41. The form for (;;) should be used for

    1. nested loop
    2. empty loop
    3. more than 1000 iterations
    4. less than 1000 iterations
  42. The three basic principles that guide maintainability are:
    (a) clarity
    (b) enhancement
    (c) flexibility
    (d) simplicity

    1. (a), (b) and (c)
    2. (a), (c) and (d)
    3. (b), (c) and (d)
    4. All of the given.
  43. ________ Testing of system is not possible

    1. Black Box
    2. White Box
    3. Exhaustive
    4. None of the given options
  44. Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid

    1. The subsystem layer
    2. The message layer
    3. The class and object layer
    4. The Abstract layer
  45. System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.

    1. Requirements
    2. Documents
    3. Models
    4. Test Cases
  46. Software Engineering is the combination of tools, techniques and ________.

    1. Testing
    2. Processes
    3. Design
    4. Maintenance
  47. There are some types of requirements that can not be documented in the use cases.

    1. True
    2. False
  48. Use cases construction is a technique used for:

    1. requirements determination
    2. requirements structuring
    3. user interface design
    4. database design
  49. Consider the following statement:
    int a,b=10;
    Which of the following is correct:

    1. Variable "b" is initialized to 10
    2. variables can not be initialized this way
    3. Variable "a" is initialized to 10
    4. Both variables "a" and "b" are initialized to 10
  50. A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.

    1. Flowcharts
    2. UML diagrams
    3. Process-flow state diagrams
    4. All of the given
  51. In the classical thin-client architecture, the entire processing is carried-out by ________.

    1. Single server
    2. multiple servers
    3. multiple servers
    4. None of the given option
  52. Be very careful when you use functions with side effects - functions that change the values of the ________.

    1. Structures
    2. Variables
    3. Classes
    4. Objects
  53. ________ and ________ are two important tools that helps in managing the program complexity.

    1. Composition, Inheritance
    2. Abstraction, Encapsulation
    3. Aggregation, Inheritance
    4. Modularity, Composition
  54. More powerful hardware resulted into the development of ________ powerful and ________ software.

    1. more, complex
    2. less, complex
    3. more, simple
    4. less, simple
  55. ________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.

    1. Analysis
    2. Negotiation
    3. Prototyping
    4. GUI
  56. A ________ is a variance from a desired product attribute.

    1. Exception
    2. Error
    3. Mistake
    4. Defect
  57. Some bit field members are stored: I) left to right II) right to left III) in circular array

    1. only (I) is true
    2. Only (II) is true
    3. Both (I) and (II) are true
    4. Only (III) is true
  58. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  59. Which type of testing is not concerned with how the inputs are transformed into outputs?

    1. White Box
    2. Gray Box
    3. Black Box
    4. All of the given options
  60. ________ requirements cause frequent modifications in user interface.

    1. Functional
    2. Non-functional
    3. Unstable
    4. User
  61. ________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.

    1. Inheritance
    2. Polymorphism
    3. Aggregation
    4. Abstraction
  62. Code should not be:

    1. commented
    2. indented
    3. cryptic
    4. aligned
  63. Exception handling is a powerful technique that separates error-handling code from ________ code.

    1. Normal
    2. Faulty
    3. Buggy
    4. Complex
  64. The intent of Object Oriented Analysis (OOA) is to define:

    1. All classes
    2. Relationships among classes
    3. Behavior of classes
    4. All of the given.
  65. Prototyping is used when there is ________ regarding requirements.

    1. Confirmation
    2. Consensus
    3. Uncertainty
    4. Conflict
  66. A change becomes ________ because of close presence of data and functions.

    1. Accessible
    2. Global
    3. Private
    4. Localized
  67. When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.

    1. Ignoring
    2. Casting
    3. Catching
    4. All of the given options
  68. System models include:

    1. User business processes
    2. User activities for conducting the business processes
    3. Processes that need to be automated
    4. All of the given
  69. The architecture components for product engineering are

    1. data, hardware, software, procedures
    2. data, documentation, hardware, software
    3. data, hardware, software, people
    4. documentation, hardware, people, procedures
  70. A use case represents:

    1. a class, its attributes and operations.
    2. an operation’s interface and signature.
    3. the role a user plays when interacting with the system.
    4. the system’s functionality for a particular purpose.
  71. GOTO statements violate the idea of

    1. object oriented code
    2. structured code
    3. control structure
    4. repitition structure
  72. ________ is one of the techniques to document domain knowledge.

    1. State transition diagram
    2. Feasibility matrix
    3. System matrix
    4. None of the given
  73. Transactions are the ________ that must be remembered through time.

    1. Triggers
    2. Events
    3. Methods
    4. Actions
  74. In the case of action-oriented approach, data is decomposed according to:

    1. Object requirements
    2. Functionality requirements
    3. Corresponding domain model
    4. Compatibility with object interface
  75. In use case diagram, an ellipse signifies a(n):

    1. actor
    2. class
    3. use case
    4. system boundary
  76. In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.

    1. STL
    2. CMMI
    3. ISO
    4. ANSI
  77. Data cannot flow from one external entity to other external entity because:

    1. It will get corrupted
    2. It is not allowed in DFD
    3. An external entity has no mechanism to read or write
    4. Both are outside the context of the system
  78. The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.

    1. Electrical Engineering
    2. Product Engineering
    3. Mechanical Engineering
    4. Hardware Engineering
  79. Testing individual components independent of other components is called:

    1. Unit testing
    2. Module testing
    3. System testing
    4. Subsystem testing
  80. The criteria used to assess the quality of an architectural design should be based on system

    1. functionality
    2. accessibility and reliability
    3. implementation details
    4. data and control
  81. Defining the services of an object means:

    1. Whome it knows?
    2. What it does?
    3. What it knows?
    4. Who knows it?
  82. ________ is an extremely powerful technique for dealing with complexity.

    1. Aggregation
    2. Abstraction
    3. Inheritance
    4. Association
  83. Chip level testing for hardware is equivalent to ________.

    1. System testing
    2. Black Box
    3. White Box
    4. Unit testing
  84. When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:

    1. use a better algorithm OR re-write the code
    2. debug the code OR place assertions in code
    3. remove the functions OR add more functions
    4. changed programming language OR compiler at least
  85. A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.

    1. Software
    2. Test Case
    3. Program
    4. Prototype
  86. Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it

    1. statements, expectations
    2. specifications, expectations
    3. specifications , arguments
    4. statements, arguments
  87. Objective of ________ is to show that the program does not work.

    1. Requirements
    2. Design
    3. coding
    4. testing
  88. Return values in synchronous messages are:

    1. Compulsory
    2. represented by solid lines
    3. Not used at all
    4. May not used when response is obvious
  89. Which of the following is not a possible server in client server environment?

    1. Database Server
    2. Transaction Server
    3. File Server
    4. Time Server
  90. The raising of the imaginary error flag is simply called raising or ________ an error.

    1. Catching
    2. Repress
    3. Casting
    4. Throwing
  91. The three most important characteristics of an object are:

    1. Identity
    2. State
    3. Behavior
    4. All of the given.
  92. The modules that interact with each other through message passing have ________.

    1. High Cohesion
    2. Low Cohesion
    3. High Coupling
    4. Low Coupling
  93. Complex expressions:

    1. Make the code easy to modify
    2. Make the code difficult to modify
    3. Make the code easy to understand
    4. Does not effect understandablity
  94. Strong cohesion implies that:

    1. All parts of a component have a close logical relationship with each other.
    2. All parts of a component do not have a close logical relationship with each other.
    3. Component is dynamic in nature
    4. Component is static in nature
  95. Software Design discusses ________ aspect of software development.

    1. What
    2. How
    3. When
    4. Who
  96. The greatest advantage of exception handling is its ability to handle:

    1. Asynchronous errors
    2. Syntax errors
    3. Memory errors
    4. Control Structure errors
  97. The idea behind exception handling is to raise some error flag every time ________.

    1. The code links
    2. The code compiles
    3. Memory is allocated
    4. Something goes wrong
  98. Different messages in sequence diagrams includes:

    1. Notify
    2. Both Simple and Asynchronous
    3. Asynchronous
    4. Simple
  99. A DFD is normally levelled (adding more levels of abstraction) as

    1. it is a good idea in design
    2. it is recommended by many experts
    3. it is easyto do it
    4. it is easier to read and understand a number of smaller DFDs than one large DFD
  100. In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:

    1. DURC operations
    2. CDUR operation
    3. RUDC operations
    4. CRUD operations
  101. The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.

    1. Dataflow diagram
    2. Activity Diagram
    3. State Transition Diagram
    4. USe Case Diagram
  102. In ________ the analyst determines all the sources of requirements and where do theses requirements consume

    1. Source and Sink Analysis
    2. Down Parsing
    3. Data Flow Analysis
    4. Up Parsing
  103. The size of ________ plays a significant role in making the program easy or difficult to understand.

    1. function
    2. object
    3. data type
    4. None of the given option