In the name of ALLAH, the most beneficient, the most merciful

Software Engineering - II (CS605)

Multiple Choice Questions (MCQs)

 

Objective Questions

Question

Quality assurance helps management in providing the necessary data about:

  1. Product quality
  2. Errors/bugs left
  3. Errors/bugs highlighted
  4. Defect reports

Answer: 1 Chapter No. 27 

Question

If an error related to requirements is identified in testing phase, this error will be considered as an error of ___________ phase.

  1. Requirement
  2. Design
  3. Code
  4. Testing

Answer: 1 Chapter No. 27 

Question

Quality cost may be divided into costs associated with:

  1. Prevention, appraisal and failure
  2. Customers, developers and maintenance
  3. Builds, releases and products
  4. Bugs, errors and Reports

Answer: 1 Chapter No. 27 

Question

_________ is one of the techniques used during severe deadline pressure.

  1. PERT
  2. CPM
  3. Time Boxing
  4. Macroscopic scheduling

Answer: 3 Chapter No. 26 

Question

Which of the following is not TRUE about "Error Tracking"?

  1. Error tracking can be used to estimate the progress of the project.
  2. We track errors in work products to assess the status of a project.
  3. During "Error Tracking", we may also need the historical data from similar projects.
  4. All of the given

Answer: 3 Chapter No. 26 

Question

BCWS for a task i will be equal to:

  1. Risks appeared in task i
  2. Effort (person-days etc) for task i
  3. Resource deficiency for task i
  4. None of the given

Answer: 2 Chapter No. 25 

Question

Schedule Performance Index (SPI) is equal to

  1. BCWP / BCWS
  2. BCWP * BCWS
  3. BCWP + BCWS
  4. BCWP - BCWS

Answer: 1 Chapter No. 25 

Question

BCWS stands for:

  1. Beginning Cost of Whole System
  2. Budgeted Cost of Whole System
  3. Budgeted Cost of Work Schedule
  4. None of the given

Answer: 3 Chapter No. 25 

Question

BCWP refers to:

  1. Normalized value of budgeted cost
  2. Overall expected cost of the project (anticipated cost)
  3. Budgeted cost of work performed so far
  4. Overall cost of the project (calculated after completion of project)

Answer: 3 Chapter No. 25 

Question

Earned Value Analysis (EVA) is a ______ technique for assessing the progress of a project.

  1. Qualitative
  2. Quantitative
  3. Subjective
  4. None of the given

Answer: 2 Chapter No. 25 

Question

Critical path defines:

  1. The list of the resources that may be needed for future activities.
  2. The chain of tasks that determines the duration of the project.
  3. The list of the deficient resources, project is suffering from.
  4. None of the given

Answer: 2 Chapter No. 24 

Question

CPM stands for:

  1. Critical Project Measure
  2. Critical Path Method
  3. Common Project Measure
  4. Critical Planning Model

Answer: 2 Chapter No. 24 

Question

The boundary time defines the following parameter(s) for a project:

  1. The latest time for task initiation before the minimum project completion time is delayed
  2. The earliest finish
  3. The latest finish
  4. All of the given

Answer: 4 Chapter No. 24 

Question

_________ is one of the techniques to prepare project schedule once we have defined "task network"

  1. Program evaluation and review techniques (PERT)
  2. Critical Communication path method (CCPM)
  3. System resource negotiation method (SRNM)
  4. Strategic Schedule Development technique (SSDT)

Answer: 1 Chapter No. 24 

Question

________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.

  1. Upper Control Line
  2. Contorl chart
  3. CMP
  4. Quality

Answer: 2 Chapter No. 15 

Question

Control charts are of following two types:

  1. Moving range control charts and Individual control charts
  2. Moving range control charts and statical control charts
  3. Individual control charts and statical control charts
  4. None of the given options

Answer: 1 Chapter No. 15 

Question

In context of "Individual control chart", if a single metrics value lies outside UNPL, it means that:

  1. The process has been matured
  2. The process is not mature yet
  3. Process is out of control
  4. Process is within control

Answer: 3 Chapter No. 15 

Question

In context of moving range and individual control charts, UNPL stands for:

  1. Universal Natural Process Line
  2. Universal Natural Process Limit
  3. Upper Natural Process Limit
  4. Upper Natural Process Line

Answer: 3 Chapter No. 15 

Question

When more than one users interpret the same requirement in different ways then we can say that the requirement is:

  1. None of the given
  2. Incomplete
  3. Ambiguous
  4. Incorrect

Answer: 3 Chapter No. 14 

Question

Identify the most appropriate statement:

  1. The quality of the software specification is of extreme importance.
  2. The non functional requirements can be skipped.
  3. The non functional requirements does not impact the quality of product.
  4. None of the given options.

Answer: 1 Chapter No. 14 

Question

We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.

  1. Graphically
  2. Automatically
  3. Manually
  4. Personally

Answer: 1 Chapter No. 14 

Question

For a software the total number of requirements are equal to ________.

  1. Functional requirements
  2. Non functional requirements
  3. Functional requirements + non functional requirements
  4. None of the given options

Answer: 3 Chapter No. 14 

Question

_______ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.

  1. Removal Deficiency
  2. Defect removal efficiency
  3. Bug Report
  4. Bug Tracking Algorithm

Answer: 2 Chapter No. 13 

Question

Extent to which access to software or data by unauthorized persons can be controlled, is called _______.

  1. None of given
  2. Efficiency
  3. Reliability
  4. Integrity

Answer: 4 Chapter No. 13 

Question

The extent to which a program can be reused in other applications is called ________.

  1. Reliability
  2. Performance
  3. Usability
  4. Reusability

Answer: 4 Chapter No. 13 

Question

Quality can be measured if we measure the _____ of the product.

  1. correctness
  2. maintainability
  3. integrity and usability
  4. All of the given options

Answer: 4 Chapter No. 13 

Question

The amount of "computing resources", required by a program to perform its function is __________.

  1. Efficiency
  2. Integrity
  3. Reliability
  4. None of given

Answer: 1 Chapter No. 13 

Question

Effort required to test a program to ensure that it performs its intended function ________.

  1. Testability
  2. Bug fixing
  3. Debugging
  4. Security

Answer: 1 Chapter No. 13 

Question

Extent to which access to software or data by unauthorized persons can be controlled, is called ________.

  1. None of given
  2. Efficiency
  3. Reliability
  4. Integrity

Answer: 4 Chapter No. 13 

Question

Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)

  1. DRE = E/(E+D)
  2. DRE = E + D
  3. DRE = E + D/E
  4. DRE = E/D - E

Answer: 1 Chapter No. 13 

Question

Defects per function points is a ________.

  1. Measure
  2. Metric
  3. Quality attribute
  4. Process

Answer: 2 Chapter No. 12 

Question

A _____ provides a quantitative value of some attribute of a process or a product.

  1. Metric
  2. Measure
  3. Function point
  4. Plan

Answer: 2 Chapter No. 12