Software Engineering Mid - II, November - 2014
1.A Decision Table is divided into ________ quadrants
-
One
-
Two
-
three
-
Four
-
Answer: D
2._______ costs are associated with defects found after the product prior has been shipment to the customer
-
Prevention
-
Appraisal
-
External failure
-
Internal failure
-
Answer: C
3._______ test is conducted at the developer’s site by end users
-
alpha
-
beta
-
class
-
none of these
-
Answer: A
4.In flowchart ________ is used to indicate a processing step
-
box
-
diamond
-
arrow
-
line
-
Answer: A
5.______ is the probability that an attack of a specific type will repelled
-
security
-
usability
-
threat
-
none
-
Answer: A
6.________ is a template, pattern, or blueprint that describes a collection of similar objects.
-
Class
-
Object
-
Component
-
None
-
Answer: A
7.An object is an instance of
-
Object
-
Class
-
Component
-
None
-
Answer: B
8.The _______ model establishes the profile of end-users of the system.
-
System
-
Domain
-
User
-
Above All
-
Answer: C
9.__________Cost include activities like, in-process and inter process inspection, equipment calibration and maintenance, testing.
-
Failure
-
Protection
-
Appraisal
-
None
-
Answer: C
10.________is the probability of failure-free operation of a computer program in a specified environment for a specified time.
-
Software Security
-
Software Performance
-
Software Reliability
-
None
-
Answer: C
11.________ occurs as a consequences of successful testing
Answer: Debugging
12.________ metrics provide an indication of the size of the software.
Answer: Length
13.____________ is the degree to which the design specifications are followed during manufacturing.
Answer: Quality of Conformance
14._________ is a software quality control activity performed by software engineers
Answer: Formal Technical Review
15.____________ based metrics can be used as predictor for overall testing efforts.
Answer: Function
16.____________ describe the static structure of the system in terms of object classes and relationships.
Answer: Static Models
17.__________ Design will define a set of interface objects and actions that enable a user to perform all defined tasks.
Answer: Interface
18.Use case is written in _____________
Answer: Informal Style
19._______________ is the probability that an attack of a specific type will occur within a given time.
Answer: Threat
20.______________ involves the series of inspections, reviews, and tests used throughout the software process to ensure each work product meets the requirements.
Answer: Quality Control