In the name of ALLAH, the most beneficient, the most merciful

Software Engineering - I (CS504)

Multiple Choice Questions (MCQs)

Objective Questions

  1. In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.

    1. Composition and Aggregation
    2. Aggregation and Association
    3. Inheritance and Association
    4. Composition, Aggregation and Association
  2. The intent of Object Oriented Analysis (OOA) is to define:

    1. All classes
    2. Relationships among classes
    3. Behavior of classes
    4. All of the given.
  3. In Data Flow Diagram, the entity or system, outside the boundary of this system is called

    1. Process
    2. Data Flow
    3. External Agent
    4. Data Store
  4. Chip level testing for hardware is equivalent to ________.

    1. System testing
    2. Black Box
    3. White Box
    4. Unit testing
  5. Different messages in sequence diagrams includes:

    1. Notify
    2. Both Simple and Asynchronous
    3. Asynchronous
    4. Simple
  6. The idea behind exception handling is to raise some error flag every time ________.

    1. The code links
    2. The code compiles
    3. Memory is allocated
    4. Something goes wrong
  7. In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.

    1. A filled diamond
    2. A dot
    3. An unfilled diamond
    4. A half arrowhead
  8. The three basic principles that guide maintainability are:
    (a) clarity
    (b) enhancement
    (c) flexibility
    (d) simplicity

    1. (a), (b) and (c)
    2. (a), (c) and (d)
    3. (b), (c) and (d)
    4. All of the given.
  9. GOTO statements violate the idea of

    1. object oriented code
    2. structured code
    3. control structure
    4. repitition structure
  10. Exception handling provides:

    1. Portability mechanism
    2. Code Usability mechanism
    3. Error Handling mechanism
    4. Both Portability & Code Usability mechanism
  11. Which one is used to describe flow of data or control in an application

    1. Class diagram
    2. Use case diagram
    3. Flow Chart
    4. None of the given option
  12. Prototyping is used when there is ________ regarding requirements.

    1. Confirmation
    2. Consensus
    3. Uncertainty
    4. Conflict
  13. ________ and ________ are two important tools that helps in managing the program complexity.

    1. Composition, Inheritance
    2. Abstraction, Encapsulation
    3. Aggregation, Inheritance
    4. Modularity, Composition
  14. Be very careful when you use functions with side effects - functions that change the values of the ________.

    1. Structures
    2. Variables
    3. Classes
    4. Objects
  15. A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.

    1. Software
    2. Test Case
    3. Program
    4. Prototype
  16. A good program must contain ________ infeasible paths.

    1. 1
    2. 2
    3. 0
    4. infinite
  17. Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it

    1. statements, expectations
    2. specifications, expectations
    3. specifications , arguments
    4. statements, arguments
  18. Which of the following sentence is true regarding user interface design?

    1. The simpler the interface, the efficient is the system.
    2. The higher the response time, the better is the interface.
    3. GUI interfaces are good for all tasks which a user needs to perform at an interface.
    4. Commabd-line interfaces are faster for some tasks which the user needs to perform.
  19. The modules that interact with each other through message passing have ________.

    1. High Cohesion
    2. Low Cohesion
    3. High Coupling
    4. Low Coupling
  20. The raising of the imaginary error flag is simply called raising or ________ an error.

    1. Catching
    2. Repress
    3. Casting
    4. Throwing
  21. The order in which bytes of one word are stored is ________ dependent.

    1. hardware
    2. syntax
    3. language
    4. software
  22. ________ Testing of system is not possible

    1. Black Box
    2. White Box
    3. Exhaustive
    4. None of the given options
  23. In the classical thin-client architecture, the entire processing is carried-out by ________.

    1. Single server
    2. multiple servers
    3. multiple servers
    4. None of the given option
  24. Use cases construction is a technique used for:

    1. requirements determination
    2. requirements structuring
    3. user interface design
    4. database design
  25. The expressions with logical operators can be evaluated only from ________.

    1. Right to left
    2. Left to right
    3. Top to bottom
    4. Bottom to top
  26. Class variables should never be declared public. Public variables violate which of the following:

    1. Information hiding
    2. Encapsulation
    3. Information hiding and Encapsulation
    4. None of the given
  27. The form for (;;) should be used for

    1. nested loop
    2. empty loop
    3. more than 1000 iterations
    4. less than 1000 iterations
  28. Software Design discusses ________ aspect of software development.

    1. What
    2. How
    3. When
    4. Who
  29. System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.

    1. Requirements
    2. Documents
    3. Models
    4. Test Cases
  30. The Use case diagram does not show which actors interact with each use case

    1. True
    2. False
  31. A change becomes ________ because of close presence of data and functions.

    1. Accessible
    2. Global
    3. Private
    4. Localized
  32. Testing individual components independent of other components is called:

    1. Unit testing
    2. Module testing
    3. System testing
    4. Subsystem testing
  33. The number ________ is the most abused symbol in programs written in C or C++.

    1. 1
    2. 0
    3. 2
    4. 3
  34. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  35. ________ is one of the techniques to document domain knowledge.

    1. State transition diagram
    2. Feasibility matrix
    3. System matrix
    4. None of the given
  36. In Data Flow Diagram (DFD), data flow can:

    1. Only originate from an external entity
    2. Only terminate in an external entity
    3. Originate and terminate in an external entity
    4. Either originate or terminate in an external entity but not both
  37. ________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.

    1. Analysis
    2. Negotiation
    3. Prototyping
    4. GUI
  38. Function testing falls under ________ testing technique.

    1. Unit
    2. White Box
    3. Black Box
    4. System
  39. A DFD is normally levelled (adding more levels of abstraction) as

    1. it is a good idea in design
    2. it is recommended by many experts
    3. it is easyto do it
    4. it is easier to read and understand a number of smaller DFDs than one large DFD
  40. Coupling is a measure of ________ of a module or component.

    1. Independence
    2. Dependence
    3. Aggregation
    4. Composition
  41. More powerful hardware resulted into the development of ________ powerful and ________ software.

    1. more, complex
    2. less, complex
    3. more, simple
    4. less, simple
  42. "is" prefix should be used for ________ variables and methods.

    1. General
    2. Boolean
    3. Constant
    4. None of the given option
  43. Transactions are the ________ that must be remembered through time.

    1. Triggers
    2. Events
    3. Methods
    4. Actions
  44. Which type of testing is not concerned with how the inputs are transformed into outputs?

    1. White Box
    2. Gray Box
    3. Black Box
    4. All of the given options
  45. A use case represents:

    1. a class, its attributes and operations.
    2. an operation’s interface and signature.
    3. the role a user plays when interacting with the system.
    4. the system’s functionality for a particular purpose.
  46. Complex expressions:

    1. Make the code easy to modify
    2. Make the code difficult to modify
    3. Make the code easy to understand
    4. Does not effect understandablity
  47. If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:

    1. Cat will not ba able to access any class
    2. Cat will inherit Animal's fubctions and data
    3. Cat will not inherit Animal's fubctions and data
    4. Cat is allowed to access only the Mamal's Class
  48. The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.

    1. Dataflow diagram
    2. Activity Diagram
    3. State Transition Diagram
    4. USe Case Diagram
  49. x = 0; // x is floating pt
    Which written form of above line of code is more in line with the self-documentation philosophythan the code above.

    1. x= false
    2. x = NULL
    3. x = 0.0;
    4. x = '\0'
  50. A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.

    1. Generalization
    2. Specialization
    3. Inheritance
    4. Whole-part
  51. ________ structure represents the internal organization of the various data and control items.

    1. Value
    2. Data
    3. Information
    4. Conceptual
  52. Code should not be:

    1. commented
    2. indented
    3. cryptic
    4. aligned
  53. For equivalence partitions, we divide the problem in ________ obvious categories.

    1. Two
    2. Six
    3. Five
    4. Four
  54. The system specification describes the

    1. function and behavior of a computer-based system
    2. implementation of each allocated system element
    3. algorithmic detail and data structures
    4. time required for system simulation
  55. Return values in synchronous messages are:

    1. Compulsory
    2. represented by solid lines
    3. Not used at all
    4. May not used when response is obvious
  56. When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:

    1. use a better algorithm OR re-write the code
    2. debug the code OR place assertions in code
    3. remove the functions OR add more functions
    4. changed programming language OR compiler at least
  57. The focus of sequence diagrams is:

    1. On object constraints
    2. On static Model of system
    3. On objects/classes and messages exchanged among them
    4. on the flow of Control
  58. The method of dividing and assigning different portions of a large system to different groups for construction is called ________.

    1. Work Basic Structure
    2. Working Boundary Structure
    3. Work Breakdown Structure
    4. Work Breakdown System
  59. Objective of ________ is to show that the program does not work.

    1. Requirements
    2. Design
    3. coding
    4. testing
  60. The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.

    1. Electrical Engineering
    2. Product Engineering
    3. Mechanical Engineering
    4. Hardware Engineering
  61. Which indent size eliminates the chance of code lines splitting?

    1. 2
    2. 4
    3. 3
    4. 6
  62. Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid

    1. The subsystem layer
    2. The message layer
    3. The class and object layer
    4. The Abstract layer
  63. When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.

    1. Ignoring
    2. Casting
    3. Catching
    4. All of the given options
  64. Global variables in C++ should always be referred to by using the

    1. :: operator
    2. : operator
    3. Without an operator
    4. None of the given
  65. Comma ( , ) is very dangerous because ________.

    1. It causes side effects
    2. Compiler does not recognize this symbol
    3. It does not cause side effects
    4. It creates linkage problem
  66. In ________ the analyst determines all the sources of requirements and where do theses requirements consume

    1. Source and Sink Analysis
    2. Down Parsing
    3. Data Flow Analysis
    4. Up Parsing
  67. System models include:

    1. User business processes
    2. User activities for conducting the business processes
    3. Processes that need to be automated
    4. All of the given
  68. The three most important characteristics of an object are:

    1. Identity
    2. State
    3. Behavior
    4. All of the given.
  69. Software Engineering is the combination of tools, techniques and ________.

    1. Testing
    2. Processes
    3. Design
    4. Maintenance
  70. The greatest advantage of exception handling is its ability to handle:

    1. Asynchronous errors
    2. Syntax errors
    3. Memory errors
    4. Control Structure errors
  71. While establishing the services for an object, the following fundamental questions should be asked

    1. Why does the system need this object any way?
    2. What useful questions can it answer?
    3. What useful action can it perform?
    4. All of the given.
  72. ________ is an extremely powerful technique for dealing with complexity.

    1. Aggregation
    2. Abstraction
    3. Inheritance
    4. Association
  73. In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:

    1. DURC operations
    2. CDUR operation
    3. RUDC operations
    4. CRUD operations
  74. A context diagram is used

    1. as an aid to system design
    2. as the first step in developing a detailed DFD of a system
    3. in systems analysis of very complex systems
    4. as an aid to programmers
  75. A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.

    1. Dotted Lines
    2. Solid Lines
    3. Curved Lines
    4. Full Arrow
  76. In the case of action-oriented approach, data is decomposed according to:

    1. Object requirements
    2. Functionality requirements
    3. Corresponding domain model
    4. Compatibility with object interface
  77. Defining the services of an object means:

    1. Whome it knows?
    2. What it does?
    3. What it knows?
    4. Who knows it?
  78. There are some types of requirements that can not be documented in the use cases.

    1. True
    2. False
  79. The complexity of a program may ________ if there are exceptional paths in it.

    1. Remains same
    2. Decrease
    3. Increase
    4. Cutback
  80. Which of the following is not a possible server in client server environment?

    1. Database Server
    2. Transaction Server
    3. File Server
    4. Time Server
  81. In use case diagram, an ellipse signifies a(n):

    1. actor
    2. class
    3. use case
    4. system boundary
  82. Strong cohesion implies that:

    1. All parts of a component have a close logical relationship with each other.
    2. All parts of a component do not have a close logical relationship with each other.
    3. Component is dynamic in nature
    4. Component is static in nature
  83. Software ________ is the process of examining the software product against its requirements.

    1. Fixing
    2. Debugging
    3. Testing
    4. Exception handling
  84. The architecture components for product engineering are

    1. data, hardware, software, procedures
    2. data, documentation, hardware, software
    3. data, hardware, software, people
    4. documentation, hardware, people, procedures
  85. The formula for calculating the Cyclomatic Complexity of a program is:

    1. E + N + 2
    2. E- N - 2
    3. E - N + 2
    4. N - E + 2
  86. An external entity that interacts with a system is called a(n):

    1. association
    2. stakeholder
    3. use case
    4. actor
  87. ________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.

    1. Inheritance
    2. Polymorphism
    3. Aggregation
    4. Abstraction
  88. After integrating subsystems into a system, and then testing this system as a whole is called

    1. Unit testing
    2. Component testing
    3. System testing
    4. Subsystem testing
  89. In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.

    1. STL
    2. CMMI
    3. ISO
    4. ANSI
  90. The criteria used to assess the quality of an architectural design should be based on system

    1. functionality
    2. accessibility and reliability
    3. implementation details
    4. data and control
  91. Performance, Security and maintainability are the types of ________ requirements.

    1. Business
    2. Non-Functional
    3. Domain
    4. Functional
  92. A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.

    1. Flowcharts
    2. UML diagrams
    3. Process-flow state diagrams
    4. All of the given
  93. Data cannot flow from one external entity to other external entity because:

    1. It will get corrupted
    2. It is not allowed in DFD
    3. An external entity has no mechanism to read or write
    4. Both are outside the context of the system
  94. The C/C++ language does not define the alignment of items within

    1. structures
    2. classes
    3. unions
    4. All of the given options
  95. Consider the following statement:
    int a,b=10;
    Which of the following is correct:

    1. Variable "b" is initialized to 10
    2. variables can not be initialized this way
    3. Variable "a" is initialized to 10
    4. Both variables "a" and "b" are initialized to 10
  96. An arrow in Data Flow Diagram (DFD) represents

    1. Direction of flow of data
    2. Processing of data
    3. External agent
    4. Internal agent
  97. ________ requirements cause frequent modifications in user interface.

    1. Functional
    2. Non-functional
    3. Unstable
    4. User
  98. Exception handling is a powerful technique that separates error-handling code from ________ code.

    1. Normal
    2. Faulty
    3. Buggy
    4. Complex
  99. Some bit field members are stored: I) left to right II) right to left III) in circular array

    1. only (I) is true
    2. Only (II) is true
    3. Both (I) and (II) are true
    4. Only (III) is true
  100. The size of ________ plays a significant role in making the program easy or difficult to understand.

    1. function
    2. object
    3. data type
    4. None of the given option
  101. A ________ is a variance from a desired product attribute.

    1. Exception
    2. Error
    3. Mistake
    4. Defect
  102. In Collaboration diagrams, sequence of messaging is shown by ________.

    1. Numbering each message in an increasing order of numeric value
    2. Ordering of the messages in time
    3. Vertical ordering of the messages
    4. Horizontal ordering of the messages
  103. ________ diagram does not capture control flow information, it just shows the flow of the data in a system.

    1. Sequence
    2. Data Flow
    3. Activity
    4. Class