Multiple Choice Questions (MCQs)
The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.
System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.
Comma ( , ) is very dangerous because ________.
Some bit field members are stored: I) left to right II) right to left III) in circular array
In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.
The form for (;;) should be used for
________ is an extremely powerful technique for dealing with complexity.
The criteria used to assess the quality of an architectural design should be based on system
Be very careful when you use functions with side effects - functions that change the values of the ________.
In the classical thin-client architecture, the entire processing is carried-out by ________.
Exception handling is a powerful technique that separates error-handling code from ________ code.
________ requirements cause frequent modifications in user interface.
Coupling is a measure of ________ of a module or component.
An external entity that interacts with a system is called a(n):
The order in which bytes of one word are stored is ________ dependent.
While establishing the services for an object, the following fundamental questions should be asked
More powerful hardware resulted into the development of ________ powerful and ________ software.
In ________ the analyst determines all the sources of requirements and where do theses requirements consume
A ________ is a variance from a desired product attribute.
Performance, Security and maintainability are the types of ________ requirements.
Transactions are the ________ that must be remembered through time.
A good program must contain ________ infeasible paths.
In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:
Complex expressions:
A use case represents:
In use case diagram, an ellipse signifies a(n):
In the case of action-oriented approach, data is decomposed according to:
Exception handling provides:
________ is one of the techniques to document domain knowledge.
The three basic principles that guide maintainability are: (a) clarity (b) enhancement (c) flexibility (d) simplicity
The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.
Code should not be:
Prototyping is used when there is ________ regarding requirements.
________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.
x = 0; // x is floating pt Which written form of above line of code is more in line with the self-documentation philosophythan the code above.
If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:
Which of the following sentence is true regarding user interface design?
Return values in synchronous messages are:
The size of ________ plays a significant role in making the program easy or difficult to understand.
System models include:
When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:
The complexity of a program may ________ if there are exceptional paths in it.
In Data Flow Diagram (DFD), data flow can:
The modules that interact with each other through message passing have ________.
The intent of Object Oriented Analysis (OOA) is to define:
A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.
________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.
The greatest advantage of exception handling is its ability to handle:
Strong cohesion implies that:
A change becomes ________ because of close presence of data and functions.
The system specification describes the
Software Design discusses ________ aspect of software development.
Consider the following statement: int a,b=10; Which of the following is correct:
A context diagram is used
The expressions with logical operators can be evaluated only from ________.
Different messages in sequence diagrams includes:
After integrating subsystems into a system, and then testing this system as a whole is called
The three most important characteristics of an object are:
The architecture components for product engineering are
An arrow in Data Flow Diagram (DFD) represents
In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.
For equivalence partitions, we divide the problem in ________ obvious categories.
Function testing falls under ________ testing technique.
Objective of ________ is to show that the program does not work.
A DFD is normally levelled (adding more levels of abstraction) as
The number ________ is the most abused symbol in programs written in C or C++.
A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.
Class variables should never be declared public. Public variables violate which of the following:
The Use case diagram does not show which actors interact with each use case
Defining the services of an object means:
In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.
Software Engineering is the combination of tools, techniques and ________.
Use cases construction is a technique used for:
There are some types of requirements that can not be documented in the use cases.
Which type of testing is not concerned with how the inputs are transformed into outputs?
Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid
The focus of sequence diagrams is:
________ diagram does not capture control flow information, it just shows the flow of the data in a system.
Which of the following is not a possible server in client server environment?
________ and ________ are two important tools that helps in managing the program complexity.
Software ________ is the process of examining the software product against its requirements.
The formula for calculating the Cyclomatic Complexity of a program is:
The method of dividing and assigning different portions of a large system to different groups for construction is called ________.
A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.
The C/C++ language does not define the alignment of items within
"is" prefix should be used for ________ variables and methods.
When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.
Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it
Which one is used to describe flow of data or control in an application
Which indent size eliminates the chance of code lines splitting?
Data cannot flow from one external entity to other external entity because:
Chip level testing for hardware is equivalent to ________.
In Data Flow Diagram, the entity or system, outside the boundary of this system is called
Testing individual components independent of other components is called:
The raising of the imaginary error flag is simply called raising or ________ an error.
________ structure represents the internal organization of the various data and control items.
Global variables in C++ should always be referred to by using the
A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.
________ Testing of system is not possible
In Collaboration diagrams, sequence of messaging is shown by ________.
The idea behind exception handling is to raise some error flag every time ________.
GOTO statements violate the idea of
Select a course code for Objective Questions:
Select a course code for Subjective Questions: