In the name of ALLAH, the most beneficient, the most merciful

Software Engineering - I (CS504)

Multiple Choice Questions (MCQs)

Objective Questions

  1. In ________ the analyst determines all the sources of requirements and where do theses requirements consume

    1. Source and Sink Analysis
    2. Down Parsing
    3. Data Flow Analysis
    4. Up Parsing
  2. ________ and ________ are two important tools that helps in managing the program complexity.

    1. Composition, Inheritance
    2. Abstraction, Encapsulation
    3. Aggregation, Inheritance
    4. Modularity, Composition
  3. A use case represents:

    1. a class, its attributes and operations.
    2. an operation’s interface and signature.
    3. the role a user plays when interacting with the system.
    4. the system’s functionality for a particular purpose.
  4. ________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.

    1. Analysis
    2. Negotiation
    3. Prototyping
    4. GUI
  5. The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.

    1. Electrical Engineering
    2. Product Engineering
    3. Mechanical Engineering
    4. Hardware Engineering
  6. Be very careful when you use functions with side effects - functions that change the values of the ________.

    1. Structures
    2. Variables
    3. Classes
    4. Objects
  7. While establishing the services for an object, the following fundamental questions should be asked

    1. Why does the system need this object any way?
    2. What useful questions can it answer?
    3. What useful action can it perform?
    4. All of the given.
  8. In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:

    1. DURC operations
    2. CDUR operation
    3. RUDC operations
    4. CRUD operations
  9. Strong cohesion implies that:

    1. All parts of a component have a close logical relationship with each other.
    2. All parts of a component do not have a close logical relationship with each other.
    3. Component is dynamic in nature
    4. Component is static in nature
  10. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  11. ________ requirements cause frequent modifications in user interface.

    1. Functional
    2. Non-functional
    3. Unstable
    4. User
  12. The C/C++ language does not define the alignment of items within

    1. structures
    2. classes
    3. unions
    4. All of the given options
  13. Defining the services of an object means:

    1. Whome it knows?
    2. What it does?
    3. What it knows?
    4. Who knows it?
  14. After integrating subsystems into a system, and then testing this system as a whole is called

    1. Unit testing
    2. Component testing
    3. System testing
    4. Subsystem testing
  15. Use cases construction is a technique used for:

    1. requirements determination
    2. requirements structuring
    3. user interface design
    4. database design
  16. A context diagram is used

    1. as an aid to system design
    2. as the first step in developing a detailed DFD of a system
    3. in systems analysis of very complex systems
    4. as an aid to programmers
  17. The raising of the imaginary error flag is simply called raising or ________ an error.

    1. Catching
    2. Repress
    3. Casting
    4. Throwing
  18. ________ Testing of system is not possible

    1. Black Box
    2. White Box
    3. Exhaustive
    4. None of the given options
  19. The form for (;;) should be used for

    1. nested loop
    2. empty loop
    3. more than 1000 iterations
    4. less than 1000 iterations
  20. ________ is an extremely powerful technique for dealing with complexity.

    1. Aggregation
    2. Abstraction
    3. Inheritance
    4. Association
  21. The criteria used to assess the quality of an architectural design should be based on system

    1. functionality
    2. accessibility and reliability
    3. implementation details
    4. data and control
  22. Which one is used to describe flow of data or control in an application

    1. Class diagram
    2. Use case diagram
    3. Flow Chart
    4. None of the given option
  23. Which indent size eliminates the chance of code lines splitting?

    1. 2
    2. 4
    3. 3
    4. 6
  24. x = 0; // x is floating pt
    Which written form of above line of code is more in line with the self-documentation philosophythan the code above.

    1. x= false
    2. x = NULL
    3. x = 0.0;
    4. x = '\0'
  25. Return values in synchronous messages are:

    1. Compulsory
    2. represented by solid lines
    3. Not used at all
    4. May not used when response is obvious
  26. Which type of testing is not concerned with how the inputs are transformed into outputs?

    1. White Box
    2. Gray Box
    3. Black Box
    4. All of the given options
  27. The three most important characteristics of an object are:

    1. Identity
    2. State
    3. Behavior
    4. All of the given.
  28. A DFD is normally levelled (adding more levels of abstraction) as

    1. it is a good idea in design
    2. it is recommended by many experts
    3. it is easyto do it
    4. it is easier to read and understand a number of smaller DFDs than one large DFD
  29. Class variables should never be declared public. Public variables violate which of the following:

    1. Information hiding
    2. Encapsulation
    3. Information hiding and Encapsulation
    4. None of the given
  30. If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:

    1. Cat will not ba able to access any class
    2. Cat will inherit Animal's fubctions and data
    3. Cat will not inherit Animal's fubctions and data
    4. Cat is allowed to access only the Mamal's Class
  31. Exception handling provides:

    1. Portability mechanism
    2. Code Usability mechanism
    3. Error Handling mechanism
    4. Both Portability & Code Usability mechanism
  32. The focus of sequence diagrams is:

    1. On object constraints
    2. On static Model of system
    3. On objects/classes and messages exchanged among them
    4. on the flow of Control
  33. The method of dividing and assigning different portions of a large system to different groups for construction is called ________.

    1. Work Basic Structure
    2. Working Boundary Structure
    3. Work Breakdown Structure
    4. Work Breakdown System
  34. When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.

    1. Ignoring
    2. Casting
    3. Catching
    4. All of the given options
  35. Function testing falls under ________ testing technique.

    1. Unit
    2. White Box
    3. Black Box
    4. System
  36. The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.

    1. Dataflow diagram
    2. Activity Diagram
    3. State Transition Diagram
    4. USe Case Diagram
  37. A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.

    1. Generalization
    2. Specialization
    3. Inheritance
    4. Whole-part
  38. Software Engineering is the combination of tools, techniques and ________.

    1. Testing
    2. Processes
    3. Design
    4. Maintenance
  39. An external entity that interacts with a system is called a(n):

    1. association
    2. stakeholder
    3. use case
    4. actor
  40. A change becomes ________ because of close presence of data and functions.

    1. Accessible
    2. Global
    3. Private
    4. Localized
  41. The modules that interact with each other through message passing have ________.

    1. High Cohesion
    2. Low Cohesion
    3. High Coupling
    4. Low Coupling
  42. The size of ________ plays a significant role in making the program easy or difficult to understand.

    1. function
    2. object
    3. data type
    4. None of the given option
  43. For equivalence partitions, we divide the problem in ________ obvious categories.

    1. Two
    2. Six
    3. Five
    4. Four
  44. The system specification describes the

    1. function and behavior of a computer-based system
    2. implementation of each allocated system element
    3. algorithmic detail and data structures
    4. time required for system simulation
  45. Code should not be:

    1. commented
    2. indented
    3. cryptic
    4. aligned
  46. GOTO statements violate the idea of

    1. object oriented code
    2. structured code
    3. control structure
    4. repitition structure
  47. Objective of ________ is to show that the program does not work.

    1. Requirements
    2. Design
    3. coding
    4. testing
  48. Software ________ is the process of examining the software product against its requirements.

    1. Fixing
    2. Debugging
    3. Testing
    4. Exception handling
  49. Software Design discusses ________ aspect of software development.

    1. What
    2. How
    3. When
    4. Who
  50. In the case of action-oriented approach, data is decomposed according to:

    1. Object requirements
    2. Functionality requirements
    3. Corresponding domain model
    4. Compatibility with object interface
  51. "is" prefix should be used for ________ variables and methods.

    1. General
    2. Boolean
    3. Constant
    4. None of the given option
  52. Which of the following is not a possible server in client server environment?

    1. Database Server
    2. Transaction Server
    3. File Server
    4. Time Server
  53. ________ structure represents the internal organization of the various data and control items.

    1. Value
    2. Data
    3. Information
    4. Conceptual
  54. System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.

    1. Requirements
    2. Documents
    3. Models
    4. Test Cases
  55. When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:

    1. use a better algorithm OR re-write the code
    2. debug the code OR place assertions in code
    3. remove the functions OR add more functions
    4. changed programming language OR compiler at least
  56. The intent of Object Oriented Analysis (OOA) is to define:

    1. All classes
    2. Relationships among classes
    3. Behavior of classes
    4. All of the given.
  57. A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.

    1. Dotted Lines
    2. Solid Lines
    3. Curved Lines
    4. Full Arrow
  58. Complex expressions:

    1. Make the code easy to modify
    2. Make the code difficult to modify
    3. Make the code easy to understand
    4. Does not effect understandablity
  59. Global variables in C++ should always be referred to by using the

    1. :: operator
    2. : operator
    3. Without an operator
    4. None of the given
  60. The Use case diagram does not show which actors interact with each use case

    1. True
    2. False
  61. An arrow in Data Flow Diagram (DFD) represents

    1. Direction of flow of data
    2. Processing of data
    3. External agent
    4. Internal agent
  62. Data cannot flow from one external entity to other external entity because:

    1. It will get corrupted
    2. It is not allowed in DFD
    3. An external entity has no mechanism to read or write
    4. Both are outside the context of the system
  63. The architecture components for product engineering are

    1. data, hardware, software, procedures
    2. data, documentation, hardware, software
    3. data, hardware, software, people
    4. documentation, hardware, people, procedures
  64. Comma ( , ) is very dangerous because ________.

    1. It causes side effects
    2. Compiler does not recognize this symbol
    3. It does not cause side effects
    4. It creates linkage problem
  65. ________ is one of the techniques to document domain knowledge.

    1. State transition diagram
    2. Feasibility matrix
    3. System matrix
    4. None of the given
  66. A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.

    1. Flowcharts
    2. UML diagrams
    3. Process-flow state diagrams
    4. All of the given
  67. Coupling is a measure of ________ of a module or component.

    1. Independence
    2. Dependence
    3. Aggregation
    4. Composition
  68. A good program must contain ________ infeasible paths.

    1. 1
    2. 2
    3. 0
    4. infinite
  69. Prototyping is used when there is ________ regarding requirements.

    1. Confirmation
    2. Consensus
    3. Uncertainty
    4. Conflict
  70. ________ diagram does not capture control flow information, it just shows the flow of the data in a system.

    1. Sequence
    2. Data Flow
    3. Activity
    4. Class
  71. The greatest advantage of exception handling is its ability to handle:

    1. Asynchronous errors
    2. Syntax errors
    3. Memory errors
    4. Control Structure errors
  72. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  73. Some bit field members are stored: I) left to right II) right to left III) in circular array

    1. only (I) is true
    2. Only (II) is true
    3. Both (I) and (II) are true
    4. Only (III) is true
  74. Testing individual components independent of other components is called:

    1. Unit testing
    2. Module testing
    3. System testing
    4. Subsystem testing
  75. Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it

    1. statements, expectations
    2. specifications, expectations
    3. specifications , arguments
    4. statements, arguments
  76. The order in which bytes of one word are stored is ________ dependent.

    1. hardware
    2. syntax
    3. language
    4. software
  77. Which of the following sentence is true regarding user interface design?

    1. The simpler the interface, the efficient is the system.
    2. The higher the response time, the better is the interface.
    3. GUI interfaces are good for all tasks which a user needs to perform at an interface.
    4. Commabd-line interfaces are faster for some tasks which the user needs to perform.
  78. Different messages in sequence diagrams includes:

    1. Notify
    2. Both Simple and Asynchronous
    3. Asynchronous
    4. Simple
  79. Exception handling is a powerful technique that separates error-handling code from ________ code.

    1. Normal
    2. Faulty
    3. Buggy
    4. Complex
  80. System models include:

    1. User business processes
    2. User activities for conducting the business processes
    3. Processes that need to be automated
    4. All of the given
  81. ________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.

    1. Inheritance
    2. Polymorphism
    3. Aggregation
    4. Abstraction
  82. In Data Flow Diagram (DFD), data flow can:

    1. Only originate from an external entity
    2. Only terminate in an external entity
    3. Originate and terminate in an external entity
    4. Either originate or terminate in an external entity but not both
  83. A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.

    1. Software
    2. Test Case
    3. Program
    4. Prototype
  84. The three basic principles that guide maintainability are:
    (a) clarity
    (b) enhancement
    (c) flexibility
    (d) simplicity

    1. (a), (b) and (c)
    2. (a), (c) and (d)
    3. (b), (c) and (d)
    4. All of the given.
  85. In Collaboration diagrams, sequence of messaging is shown by ________.

    1. Numbering each message in an increasing order of numeric value
    2. Ordering of the messages in time
    3. Vertical ordering of the messages
    4. Horizontal ordering of the messages
  86. In the classical thin-client architecture, the entire processing is carried-out by ________.

    1. Single server
    2. multiple servers
    3. multiple servers
    4. None of the given option
  87. Chip level testing for hardware is equivalent to ________.

    1. System testing
    2. Black Box
    3. White Box
    4. Unit testing
  88. A ________ is a variance from a desired product attribute.

    1. Exception
    2. Error
    3. Mistake
    4. Defect
  89. The idea behind exception handling is to raise some error flag every time ________.

    1. The code links
    2. The code compiles
    3. Memory is allocated
    4. Something goes wrong
  90. In use case diagram, an ellipse signifies a(n):

    1. actor
    2. class
    3. use case
    4. system boundary
  91. Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid

    1. The subsystem layer
    2. The message layer
    3. The class and object layer
    4. The Abstract layer
  92. In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.

    1. STL
    2. CMMI
    3. ISO
    4. ANSI
  93. The formula for calculating the Cyclomatic Complexity of a program is:

    1. E + N + 2
    2. E- N - 2
    3. E - N + 2
    4. N - E + 2
  94. In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.

    1. A filled diamond
    2. A dot
    3. An unfilled diamond
    4. A half arrowhead
  95. Consider the following statement:
    int a,b=10;
    Which of the following is correct:

    1. Variable "b" is initialized to 10
    2. variables can not be initialized this way
    3. Variable "a" is initialized to 10
    4. Both variables "a" and "b" are initialized to 10
  96. The expressions with logical operators can be evaluated only from ________.

    1. Right to left
    2. Left to right
    3. Top to bottom
    4. Bottom to top
  97. Transactions are the ________ that must be remembered through time.

    1. Triggers
    2. Events
    3. Methods
    4. Actions
  98. In Data Flow Diagram, the entity or system, outside the boundary of this system is called

    1. Process
    2. Data Flow
    3. External Agent
    4. Data Store
  99. In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.

    1. Composition and Aggregation
    2. Aggregation and Association
    3. Inheritance and Association
    4. Composition, Aggregation and Association
  100. The number ________ is the most abused symbol in programs written in C or C++.

    1. 1
    2. 0
    3. 2
    4. 3
  101. More powerful hardware resulted into the development of ________ powerful and ________ software.

    1. more, complex
    2. less, complex
    3. more, simple
    4. less, simple
  102. The complexity of a program may ________ if there are exceptional paths in it.

    1. Remains same
    2. Decrease
    3. Increase
    4. Cutback
  103. There are some types of requirements that can not be documented in the use cases.

    1. True
    2. False