In the name of ALLAH, the most beneficient, the most merciful

Software Engineering - I (CS504)

Multiple Choice Questions (MCQs)

Objective Questions

  1. The number ________ is the most abused symbol in programs written in C or C++.

    1. 1
    2. 0
    3. 2
    4. 3
  2. ________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.

    1. Analysis
    2. Negotiation
    3. Prototyping
    4. GUI
  3. Function testing falls under ________ testing technique.

    1. Unit
    2. White Box
    3. Black Box
    4. System
  4. The order in which bytes of one word are stored is ________ dependent.

    1. hardware
    2. syntax
    3. language
    4. software
  5. A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.

    1. Generalization
    2. Specialization
    3. Inheritance
    4. Whole-part
  6. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  7. The raising of the imaginary error flag is simply called raising or ________ an error.

    1. Catching
    2. Repress
    3. Casting
    4. Throwing
  8. The method of dividing and assigning different portions of a large system to different groups for construction is called ________.

    1. Work Basic Structure
    2. Working Boundary Structure
    3. Work Breakdown Structure
    4. Work Breakdown System
  9. Be very careful when you use functions with side effects - functions that change the values of the ________.

    1. Structures
    2. Variables
    3. Classes
    4. Objects
  10. Which one is used to describe flow of data or control in an application

    1. Class diagram
    2. Use case diagram
    3. Flow Chart
    4. None of the given option
  11. Exception handling is a powerful technique that separates error-handling code from ________ code.

    1. Normal
    2. Faulty
    3. Buggy
    4. Complex
  12. In Data Flow Diagram (DFD), data flow can:

    1. Only originate from an external entity
    2. Only terminate in an external entity
    3. Originate and terminate in an external entity
    4. Either originate or terminate in an external entity but not both
  13. Objective of ________ is to show that the program does not work.

    1. Requirements
    2. Design
    3. coding
    4. testing
  14. In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.

    1. A filled diamond
    2. A dot
    3. An unfilled diamond
    4. A half arrowhead
  15. ________ structure represents the internal organization of the various data and control items.

    1. Value
    2. Data
    3. Information
    4. Conceptual
  16. Defining the services of an object means:

    1. Whome it knows?
    2. What it does?
    3. What it knows?
    4. Who knows it?
  17. For equivalence partitions, we divide the problem in ________ obvious categories.

    1. Two
    2. Six
    3. Five
    4. Four
  18. In ________ the analyst determines all the sources of requirements and where do theses requirements consume

    1. Source and Sink Analysis
    2. Down Parsing
    3. Data Flow Analysis
    4. Up Parsing
  19. Data cannot flow from one external entity to other external entity because:

    1. It will get corrupted
    2. It is not allowed in DFD
    3. An external entity has no mechanism to read or write
    4. Both are outside the context of the system
  20. Global variables in C++ should always be referred to by using the

    1. :: operator
    2. : operator
    3. Without an operator
    4. None of the given
  21. "is" prefix should be used for ________ variables and methods.

    1. General
    2. Boolean
    3. Constant
    4. None of the given option
  22. Different messages in sequence diagrams includes:

    1. Notify
    2. Both Simple and Asynchronous
    3. Asynchronous
    4. Simple
  23. Code should not be:

    1. commented
    2. indented
    3. cryptic
    4. aligned
  24. ________ is an extremely powerful technique for dealing with complexity.

    1. Aggregation
    2. Abstraction
    3. Inheritance
    4. Association
  25. Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it

    1. statements, expectations
    2. specifications, expectations
    3. specifications , arguments
    4. statements, arguments
  26. If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:

    1. Cat will not ba able to access any class
    2. Cat will inherit Animal's fubctions and data
    3. Cat will not inherit Animal's fubctions and data
    4. Cat is allowed to access only the Mamal's Class
  27. While establishing the services for an object, the following fundamental questions should be asked

    1. Why does the system need this object any way?
    2. What useful questions can it answer?
    3. What useful action can it perform?
    4. All of the given.
  28. Testing individual components independent of other components is called:

    1. Unit testing
    2. Module testing
    3. System testing
    4. Subsystem testing
  29. The focus of sequence diagrams is:

    1. On object constraints
    2. On static Model of system
    3. On objects/classes and messages exchanged among them
    4. on the flow of Control
  30. GOTO statements violate the idea of

    1. object oriented code
    2. structured code
    3. control structure
    4. repitition structure
  31. Which indent size eliminates the chance of code lines splitting?

    1. 2
    2. 4
    3. 3
    4. 6
  32. Chip level testing for hardware is equivalent to ________.

    1. System testing
    2. Black Box
    3. White Box
    4. Unit testing
  33. In use case diagram, an ellipse signifies a(n):

    1. actor
    2. class
    3. use case
    4. system boundary
  34. The formula for calculating the Cyclomatic Complexity of a program is:

    1. E + N + 2
    2. E- N - 2
    3. E - N + 2
    4. N - E + 2
  35. A ________ is a variance from a desired product attribute.

    1. Exception
    2. Error
    3. Mistake
    4. Defect
  36. The idea behind exception handling is to raise some error flag every time ________.

    1. The code links
    2. The code compiles
    3. Memory is allocated
    4. Something goes wrong
  37. ________ requirements cause frequent modifications in user interface.

    1. Functional
    2. Non-functional
    3. Unstable
    4. User
  38. The form for (;;) should be used for

    1. nested loop
    2. empty loop
    3. more than 1000 iterations
    4. less than 1000 iterations
  39. ________ and ________ are two important tools that helps in managing the program complexity.

    1. Composition, Inheritance
    2. Abstraction, Encapsulation
    3. Aggregation, Inheritance
    4. Modularity, Composition
  40. A context diagram is used

    1. as an aid to system design
    2. as the first step in developing a detailed DFD of a system
    3. in systems analysis of very complex systems
    4. as an aid to programmers
  41. Coupling is a measure of ________ of a module or component.

    1. Independence
    2. Dependence
    3. Aggregation
    4. Composition
  42. The intent of Object Oriented Analysis (OOA) is to define:

    1. All classes
    2. Relationships among classes
    3. Behavior of classes
    4. All of the given.
  43. The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.

    1. Dataflow diagram
    2. Activity Diagram
    3. State Transition Diagram
    4. USe Case Diagram
  44. System models include:

    1. User business processes
    2. User activities for conducting the business processes
    3. Processes that need to be automated
    4. All of the given
  45. Consider the following statement:
    int a,b=10;
    Which of the following is correct:

    1. Variable "b" is initialized to 10
    2. variables can not be initialized this way
    3. Variable "a" is initialized to 10
    4. Both variables "a" and "b" are initialized to 10
  46. The architecture components for product engineering are

    1. data, hardware, software, procedures
    2. data, documentation, hardware, software
    3. data, hardware, software, people
    4. documentation, hardware, people, procedures
  47. In the case of action-oriented approach, data is decomposed according to:

    1. Object requirements
    2. Functionality requirements
    3. Corresponding domain model
    4. Compatibility with object interface
  48. When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.

    1. Ignoring
    2. Casting
    3. Catching
    4. All of the given options
  49. An external entity that interacts with a system is called a(n):

    1. association
    2. stakeholder
    3. use case
    4. actor
  50. Use cases construction is a technique used for:

    1. requirements determination
    2. requirements structuring
    3. user interface design
    4. database design
  51. Which of the following is not a possible server in client server environment?

    1. Database Server
    2. Transaction Server
    3. File Server
    4. Time Server
  52. Class variables should never be declared public. Public variables violate which of the following:

    1. Information hiding
    2. Encapsulation
    3. Information hiding and Encapsulation
    4. None of the given
  53. ________ diagram does not capture control flow information, it just shows the flow of the data in a system.

    1. Sequence
    2. Data Flow
    3. Activity
    4. Class
  54. ________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.

    1. Inheritance
    2. Polymorphism
    3. Aggregation
    4. Abstraction
  55. The three basic principles that guide maintainability are:
    (a) clarity
    (b) enhancement
    (c) flexibility
    (d) simplicity

    1. (a), (b) and (c)
    2. (a), (c) and (d)
    3. (b), (c) and (d)
    4. All of the given.
  56. Exception handling provides:

    1. Portability mechanism
    2. Code Usability mechanism
    3. Error Handling mechanism
    4. Both Portability & Code Usability mechanism
  57. Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid

    1. The subsystem layer
    2. The message layer
    3. The class and object layer
    4. The Abstract layer
  58. Return values in synchronous messages are:

    1. Compulsory
    2. represented by solid lines
    3. Not used at all
    4. May not used when response is obvious
  59. A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.

    1. Dotted Lines
    2. Solid Lines
    3. Curved Lines
    4. Full Arrow
  60. When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:

    1. use a better algorithm OR re-write the code
    2. debug the code OR place assertions in code
    3. remove the functions OR add more functions
    4. changed programming language OR compiler at least
  61. The Use case diagram does not show which actors interact with each use case

    1. True
    2. False
  62. Transactions are the ________ that must be remembered through time.

    1. Triggers
    2. Events
    3. Methods
    4. Actions
  63. The size of ________ plays a significant role in making the program easy or difficult to understand.

    1. function
    2. object
    3. data type
    4. None of the given option
  64. More powerful hardware resulted into the development of ________ powerful and ________ software.

    1. more, complex
    2. less, complex
    3. more, simple
    4. less, simple
  65. Software Design discusses ________ aspect of software development.

    1. What
    2. How
    3. When
    4. Who
  66. There are some types of requirements that can not be documented in the use cases.

    1. True
    2. False
  67. In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.

    1. STL
    2. CMMI
    3. ISO
    4. ANSI
  68. The criteria used to assess the quality of an architectural design should be based on system

    1. functionality
    2. accessibility and reliability
    3. implementation details
    4. data and control
  69. Some bit field members are stored: I) left to right II) right to left III) in circular array

    1. only (I) is true
    2. Only (II) is true
    3. Both (I) and (II) are true
    4. Only (III) is true
  70. Comma ( , ) is very dangerous because ________.

    1. It causes side effects
    2. Compiler does not recognize this symbol
    3. It does not cause side effects
    4. It creates linkage problem
  71. In Collaboration diagrams, sequence of messaging is shown by ________.

    1. Numbering each message in an increasing order of numeric value
    2. Ordering of the messages in time
    3. Vertical ordering of the messages
    4. Horizontal ordering of the messages
  72. In the classical thin-client architecture, the entire processing is carried-out by ________.

    1. Single server
    2. multiple servers
    3. multiple servers
    4. None of the given option
  73. The three most important characteristics of an object are:

    1. Identity
    2. State
    3. Behavior
    4. All of the given.
  74. A use case represents:

    1. a class, its attributes and operations.
    2. an operation’s interface and signature.
    3. the role a user plays when interacting with the system.
    4. the system’s functionality for a particular purpose.
  75. The complexity of a program may ________ if there are exceptional paths in it.

    1. Remains same
    2. Decrease
    3. Increase
    4. Cutback
  76. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  77. In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:

    1. DURC operations
    2. CDUR operation
    3. RUDC operations
    4. CRUD operations
  78. An arrow in Data Flow Diagram (DFD) represents

    1. Direction of flow of data
    2. Processing of data
    3. External agent
    4. Internal agent
  79. ________ Testing of system is not possible

    1. Black Box
    2. White Box
    3. Exhaustive
    4. None of the given options
  80. ________ is one of the techniques to document domain knowledge.

    1. State transition diagram
    2. Feasibility matrix
    3. System matrix
    4. None of the given
  81. The C/C++ language does not define the alignment of items within

    1. structures
    2. classes
    3. unions
    4. All of the given options
  82. Software Engineering is the combination of tools, techniques and ________.

    1. Testing
    2. Processes
    3. Design
    4. Maintenance
  83. Which of the following sentence is true regarding user interface design?

    1. The simpler the interface, the efficient is the system.
    2. The higher the response time, the better is the interface.
    3. GUI interfaces are good for all tasks which a user needs to perform at an interface.
    4. Commabd-line interfaces are faster for some tasks which the user needs to perform.
  84. The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.

    1. Electrical Engineering
    2. Product Engineering
    3. Mechanical Engineering
    4. Hardware Engineering
  85. A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.

    1. Flowcharts
    2. UML diagrams
    3. Process-flow state diagrams
    4. All of the given
  86. In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.

    1. Composition and Aggregation
    2. Aggregation and Association
    3. Inheritance and Association
    4. Composition, Aggregation and Association
  87. A change becomes ________ because of close presence of data and functions.

    1. Accessible
    2. Global
    3. Private
    4. Localized
  88. A DFD is normally levelled (adding more levels of abstraction) as

    1. it is a good idea in design
    2. it is recommended by many experts
    3. it is easyto do it
    4. it is easier to read and understand a number of smaller DFDs than one large DFD
  89. A good program must contain ________ infeasible paths.

    1. 1
    2. 2
    3. 0
    4. infinite
  90. The system specification describes the

    1. function and behavior of a computer-based system
    2. implementation of each allocated system element
    3. algorithmic detail and data structures
    4. time required for system simulation
  91. Which type of testing is not concerned with how the inputs are transformed into outputs?

    1. White Box
    2. Gray Box
    3. Black Box
    4. All of the given options
  92. x = 0; // x is floating pt
    Which written form of above line of code is more in line with the self-documentation philosophythan the code above.

    1. x= false
    2. x = NULL
    3. x = 0.0;
    4. x = '\0'
  93. Software ________ is the process of examining the software product against its requirements.

    1. Fixing
    2. Debugging
    3. Testing
    4. Exception handling
  94. Complex expressions:

    1. Make the code easy to modify
    2. Make the code difficult to modify
    3. Make the code easy to understand
    4. Does not effect understandablity
  95. The expressions with logical operators can be evaluated only from ________.

    1. Right to left
    2. Left to right
    3. Top to bottom
    4. Bottom to top
  96. The greatest advantage of exception handling is its ability to handle:

    1. Asynchronous errors
    2. Syntax errors
    3. Memory errors
    4. Control Structure errors
  97. In Data Flow Diagram, the entity or system, outside the boundary of this system is called

    1. Process
    2. Data Flow
    3. External Agent
    4. Data Store
  98. The modules that interact with each other through message passing have ________.

    1. High Cohesion
    2. Low Cohesion
    3. High Coupling
    4. Low Coupling
  99. After integrating subsystems into a system, and then testing this system as a whole is called

    1. Unit testing
    2. Component testing
    3. System testing
    4. Subsystem testing
  100. System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.

    1. Requirements
    2. Documents
    3. Models
    4. Test Cases
  101. A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.

    1. Software
    2. Test Case
    3. Program
    4. Prototype
  102. Prototyping is used when there is ________ regarding requirements.

    1. Confirmation
    2. Consensus
    3. Uncertainty
    4. Conflict
  103. Strong cohesion implies that:

    1. All parts of a component have a close logical relationship with each other.
    2. All parts of a component do not have a close logical relationship with each other.
    3. Component is dynamic in nature
    4. Component is static in nature