Multiple Choice Questions (MCQs)
More powerful hardware resulted into the development of ________ powerful and ________ software.
A use case represents:
Return values in synchronous messages are:
Complex expressions:
The size of ________ plays a significant role in making the program easy or difficult to understand.
x = 0; // x is floating pt Which written form of above line of code is more in line with the self-documentation philosophythan the code above.
Objective of ________ is to show that the program does not work.
Chip level testing for hardware is equivalent to ________.
The form for (;;) should be used for
The complexity of a program may ________ if there are exceptional paths in it.
The intent of Object Oriented Analysis (OOA) is to define:
________ is a technique that can be used to reduce customer dissatisfaction at requirement stage.
Software ________ is the process of examining the software product against its requirements.
The formula for calculating the Cyclomatic Complexity of a program is:
________ is a technique in which we construct a model of an entity based upon its essential characteristics and ignore the inessential details.
For equivalence partitions, we divide the problem in ________ obvious categories.
When an error is thrown the overall system (on the lookout for this error flag) responds by ______ the error.
A good program must contain ________ infeasible paths.
Prototyping is used when there is ________ regarding requirements.
________ and ________ are two important tools that helps in managing the program complexity.
Which of the following is not a possible server in client server environment?
Software Engineering is the combination of tools, techniques and ________.
________ requirements cause frequent modifications in user interface.
The architecture components for product engineering are
A DFD is normally levelled (adding more levels of abstraction) as
In the case of action-oriented approach, data is decomposed according to:
Defining the services of an object means:
"is" prefix should be used for ________ variables and methods.
The goal of ________ is to translate the customer's desire for a set of defined capabilities into a working product.
Which one is used to describe flow of data or control in an application
Be very careful when you use functions with side effects - functions that change the values of the ________.
Exception handling provides:
In Data Flow Diagram (DFD), data flow can:
Exception handling is a powerful technique that separates error-handling code from ________ code.
There are some types of requirements that can not be documented in the use cases.
Transactions are the ________ that must be remembered through time.
Which type of testing is not concerned with how the inputs are transformed into outputs?
While establishing the services for an object, the following fundamental questions should be asked
The order in which bytes of one word are stored is ________ dependent.
The system specification describes the
Software Design discusses ________ aspect of software development.
In ________ the analyst determines all the sources of requirements and where do theses requirements consume
The C/C++ language does not define the alignment of items within
Different messages in sequence diagrams includes:
Which indent size eliminates the chance of code lines splitting?
Some bit field members are stored: I) left to right II) right to left III) in circular array
The three most important characteristics of an object are:
In use case diagram, an ellipse signifies a(n):
A ________ relationship indicates that one entity is composed of one or more parts which are themselves instances of that or another entity.
System ________ are built to allow the System Engineer to evaluate the system components in relationship to one another.
The greatest advantage of exception handling is its ability to handle:
A ________ is a variance from a desired product attribute.
Performance, Security and maintainability are the types of ________ requirements.
________ is one of the techniques to document domain knowledge.
An external entity that interacts with a system is called a(n):
System models include:
Which of the following is NOT among one of the four layers of the Object Oriented (OO) design pyramid
The method of dividing and assigning different portions of a large system to different groups for construction is called ________.
In UML based Object Oriented model of a system, a composition relation between two objects is shown by a ________ sign on the Whole side of a relation line.
Consider the following statement: int a,b=10; Which of the following is correct:
________ is an extremely powerful technique for dealing with complexity.
The modules that interact with each other through message passing have ________.
In data flow diagram (DFD), Create, Update, Delete and Read operations are normally called:
The criteria used to assess the quality of an architectural design should be based on system
Code should not be:
The three basic principles that guide maintainability are: (a) clarity (b) enhancement (c) flexibility (d) simplicity
Strong cohesion implies that:
Use cases construction is a technique used for:
A life line represents the object's life during the interaction in a sequence diagram while its notation is depicted by ________.
An arrow in Data Flow Diagram (DFD) represents
Global variables in C++ should always be referred to by using the
The number ________ is the most abused symbol in programs written in C or C++.
In UML based Object Oriented model of a system, the diamond sign is used to depict ________ relations between two objects/classes.
Coupling is a measure of ________ of a module or component.
The context diagram is used as the top level abstraction in a ________ developed according to principles of structured analysis.
Testing individual components independent of other components is called:
________ structure represents the internal organization of the various data and control items.
When a small set of functions (which use each other) is so overwhelmingly the bottleneck, there are two alternatives:
The idea behind exception handling is to raise some error flag every time ________.
Data cannot flow from one external entity to other external entity because:
After integrating subsystems into a system, and then testing this system as a whole is called
The expressions with logical operators can be evaluated only from ________.
A ________ is not the real product but just a real looking mock-up of what would be eventually delivered.
________ Testing of system is not possible
Verification and validation are the processes in which we check a product against its ________ and the ________ of the users who will be using it
________ diagram does not capture control flow information, it just shows the flow of the data in a system.
Comma ( , ) is very dangerous because ________.
The Use case diagram does not show which actors interact with each use case
The raising of the imaginary error flag is simply called raising or ________ an error.
A context diagram is used
Which of the following sentence is true regarding user interface design?
Function testing falls under ________ testing technique.
In Data Flow Diagram, the entity or system, outside the boundary of this system is called
In the classical thin-client architecture, the entire processing is carried-out by ________.
A self documenting code is a code that explains itself without the need of comments and extraneous documentation, like ________.
The focus of sequence diagrams is:
In order to make a code more portable, Instead of using vendor specific language extensions, use ________ as much as possible.
Class variables should never be declared public. Public variables violate which of the following:
If Cat is derived from Mamal Class, and Mamal is derived from Animal Class, then:
GOTO statements violate the idea of
In Collaboration diagrams, sequence of messaging is shown by ________.
A change becomes ________ because of close presence of data and functions.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: