1) Which document is created by system analyst after the requirements are collected from Various stakeholders?

a. Software requirement specification
b. Software requirement validation
c. Feasibility study
d. Requirement Gathering

ANSWER: Software requirement specification

2) Which is focused towards the goal of the organization?

a. Feasibility study
b. Requirement gathering
c. Software requirement specification
d. Software requirement validation

ANSWER: Feasibility study

3) The architectural model is derived from which of these sources?

A) Information about the application domain for the software to be built;
B) Specific requirements model elements such as data flow diagrams or analysis classes, their relationships and collaborations for the problem at hand;
C) The availability of architectural styles and patterns.

a. Both A & B
b. Both B & C
c. Both A & C
d. All mentioned above

ANSWER: All mentioned above

4) What is the correctness, completeness, and consistency of the requirements model will have a strong influence on the quality of all work products that follow?

a. Requirement quality
b. Design quality
c. Code quality
d. Quality control effectiveness

ANSWER: Requirement quality

5) An entity in ER Model is a real world being, which has some properties called_____ .

a. Attributes
b. Relationship
c. Domain
d. None of the above

ANSWER: Attributes

6) Waht is the most common measure for correctness?

a. Defects per KLOC
b. Errors per KLOC
c. $ per KLOC
d. Pages of documentation per KLOC

ANSWER: Defects per KLOC

7) Which documentation works as a key tool for software designer, developer and their test team is to carry out their respective tasks?

a. Requirement documentation
b. User documentation
c. Software design documentation
d. Technical documentation

ANSWER: Requirement documentation

8) Which tools are used in implementation,testing and maintenance?

a. Upper case tools
b. Integrated case tools
c. Lower case tools
d. None of the above

ANSWER: Lower case tools

9) Which risk gives the degree of uncertainty and the project schedule will be maintained so that the product will be delivered in time?

a. Business risk
b. Technical risk
c. Schedule risk
d. Project risk

ANSWER: Schedule risk

10) You are working in CareerRide as a project manager. Company wants to develop a project. You are also involved in planning team. What will be your first step in project planning?

a. Establish the objectives and scope of the product.
b. Determine the project constraints.
c. Select the team.
d. None of the above.

ANSWER: Establish the objectives and scope of the product.

11) Configuration management is an essential part of the system maintenance. It is aided with version control tools to control versions, semi-version or patch management.

a. True
b. False

ANSWER: True

12) Which model is also known as Verification and validation model?

a. Waterfall model
b. Big Bang model
c. V-model
d. Spiral model

ANSWER: V-model

13) Software project management is the process of managing all activities that are involved in software development, they are _____ .

a. Time
b. Cost
c. Quality management
d. All mentioned above

ANSWER: All mentioned above

14) A small picture representing an associated application, what does it mean?

a. Icon
b. Window
c. Menu
d. Cursor

ANSWER: Icon

15) What is the meaning of requirement elicitation in software engineering?

a. Gathering of requirement.
b. Understanding of requirement.
c. Getting the requirements from client.
d. All of the above.

ANSWER: All of the above.

16) Which of the following is/are Project Estimation Technique?

a. Empirical Estimation Technique.
b. Heuristic Estimation Technique.
c. Analytical Estimation Technique.
d. All of the above.

ANSWER: All of the above.

17) The maximum number of objects that can participate in a relationship is called________ .

a. Cardinality
b. Attributes
c. Operations
d. Transformers

ANSWER: Cardinality

18) What is legacy system?

a. A legacy system refers to newer version of software.
b. A legacy system refers to outdated application software that is used instead of available upgraded versions.
c. A legacy system always devolved by advance technology.
d. None of the above.

ANSWER: A legacy system refers to outdated application software that is used instead of available upgraded versions.

19) Which of the following cannot be applied with the software according to Software Engineering Layers?

a. Process
b. Methods
c. Manufacturing
d. None of the above.

ANSWER: Manufacturing

20) Which software is used to control products and systems for the consumer and industrial markets?

a. System software
b. Artificial intelligence software
c. Embedded software
d. Engineering and scientific software

ANSWER: Embedded software

21) Which software enables the program to adequately manipulate information?

a. Instructions
b. Data Structures
c. Documents
d. All of the above

ANSWER: Data Structures

22) Which coding element is generally omitted at the end of line?

a. Naming conventions
b. Identifying
c. Whitespace
d. Operators

ANSWER: Whitespace

23) The rules of writing ‘if-then-else’, ‘case-switch’, ‘while-until’ and ‘for’ control flow statements are called _____ .

a. Comments
b. Functions
c. Line length and wrapping
d. Control Structure

ANSWER: Control Structure

24) If an application allows executing multiple instances of itself, they appear on the screen as separate windows are called ______ .

a. Window
b. Tabs
c. Menu
d. Cursor

ANSWER: Tabs

25) Match the List 1 to List 2 and choose the correct option.

1. Requirement Elicitation ——- a. Module Development and integration.
2. Design——————————b. Analysis
3. Implementation——————c. Structure and behavioral
4. Maintenance ——————— d. Performance tuning.

a. 1-c , 2-a , 3-d , 4-b
b. 1-c , 2-a , 3-b , 4-d
c. 1-a , 2-c , 3-d , 4-b
d. 1-b , 2-c , 3-a , 4-d

ANSWER: 1-b , 2-c , 3-a , 4-d