1) Which document is created by system analyst after the requirements are collected from Various stakeholders?
a. Software requirement specification
b. Software requirement validation
c. Feasibility study
d. Requirement Gathering
ANSWER: Software requirement specification
2) Which is focused towards the goal of the organization?
a. Feasibility study
b. Requirement gathering
c. Software requirement specification
d. Software requirement validation
ANSWER: Feasibility study
3) The architectural model is derived from which of these sources?
A) Information about the application domain for the software to be built;
B) Specific requirements model elements such as data flow diagrams or analysis classes, their relationships and collaborations for the problem at hand;
C) The availability of architectural styles and patterns.
a. Both A & B
b. Both B & C
c. Both A & C
d. All mentioned above
ANSWER: All mentioned above
4) What is the correctness, completeness, and consistency of the requirements model will have a strong influence on the quality of all work products that follow?
a. Requirement quality
b. Design quality
c. Code quality
d. Quality control effectiveness
ANSWER: Requirement quality
5) An entity in ER Model is a real world being, which has some properties called_____ .
a. Attributes
b. Relationship
c. Domain
d. None of the above
ANSWER: Attributes
6) Waht is the most common measure for correctness?
a. Defects per KLOC
b. Errors per KLOC
c. $ per KLOC
d. Pages of documentation per KLOC
ANSWER: Defects per KLOC
7) Which documentation works as a key tool for software designer, developer and their test team is to carry out their respective tasks?
a. Requirement documentation
b. User documentation
c. Software design documentation
d. Technical documentation
ANSWER: Requirement documentation
8) Which tools are used in implementation,testing and maintenance?
a. Upper case tools
b. Integrated case tools
c. Lower case tools
d. None of the above
ANSWER: Lower case tools
9) Which risk gives the degree of uncertainty and the project schedule will be maintained so that the product will be delivered in time?
a. Business risk
b. Technical risk
c. Schedule risk
d. Project risk
ANSWER: Schedule risk
10) You are working in CareerRide as a project manager. Company wants to develop a project. You are also involved in planning team. What will be your first step in project planning?
a. Establish the objectives and scope of the product.
b. Determine the project constraints.
c. Select the team.
d. None of the above.
ANSWER: Establish the objectives and scope of the product.
11) Configuration management is an essential part of the system maintenance. It is aided with version control tools to control versions, semi-version or patch management.
a. True
b. False
ANSWER: True
12) Which model is also known as Verification and validation model?
a. Waterfall model
b. Big Bang model
c. V-model
d. Spiral model
ANSWER: V-model
13) Software project management is the process of managing all activities that are involved in software development, they are _____ .
a. Time
b. Cost
c. Quality management
d. All mentioned above
ANSWER: All mentioned above
14) A small picture representing an associated application, what does it mean?
a. Icon
b. Window
c. Menu
d. Cursor
ANSWER: Icon
15) What is the meaning of requirement elicitation in software engineering?
a. Gathering of requirement.
b. Understanding of requirement.
c. Getting the requirements from client.
d. All of the above.
ANSWER: All of the above.
16) Which of the following is/are Project Estimation Technique?
a. Empirical Estimation Technique.
b. Heuristic Estimation Technique.
c. Analytical Estimation Technique.
d. All of the above.
ANSWER: All of the above.
17) The maximum number of objects that can participate in a relationship is called________ .
a. Cardinality
b. Attributes
c. Operations
d. Transformers
ANSWER: Cardinality
18) What is legacy system?
a. A legacy system refers to newer version of software.
b. A legacy system refers to outdated application software that is used instead of available upgraded versions.
c. A legacy system always devolved by advance technology.
d. None of the above.
ANSWER: A legacy system refers to outdated application software that is used instead of available upgraded versions.
19) Which of the following cannot be applied with the software according to Software Engineering Layers?
a. Process
b. Methods
c. Manufacturing
d. None of the above.
ANSWER: Manufacturing
20) Which software is used to control products and systems for the consumer and industrial markets?
a. System software
b. Artificial intelligence software
c. Embedded software
d. Engineering and scientific software
ANSWER: Embedded software
21) Which software enables the program to adequately manipulate information?
a. Instructions
b. Data Structures
c. Documents
d. All of the above
ANSWER: Data Structures
22) Which coding element is generally omitted at the end of line?
a. Naming conventions
b. Identifying
c. Whitespace
d. Operators
ANSWER: Whitespace
23) The rules of writing ‘if-then-else’, ‘case-switch’, ‘while-until’ and ‘for’ control flow statements are called _____ .
a. Comments
b. Functions
c. Line length and wrapping
d. Control Structure
ANSWER: Control Structure
24) If an application allows executing multiple instances of itself, they appear on the screen as separate windows are called ______ .
a. Window
b. Tabs
c. Menu
d. Cursor
ANSWER: Tabs
25) Match the List 1 to List 2 and choose the correct option.
1. Requirement Elicitation ——- a. Module Development and integration.
2. Design——————————b. Analysis
3. Implementation——————c. Structure and behavioral
4. Maintenance ——————— d. Performance tuning.
a. 1-c , 2-a , 3-d , 4-b
b. 1-c , 2-a , 3-b , 4-d
c. 1-a , 2-c , 3-d , 4-b
d. 1-b , 2-c , 3-a , 4-d
ANSWER: 1-b , 2-c , 3-a , 4-d