193
110k
Chapter:

750+ more mcqs Solved MCQs

in Software Engineering

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration in Computer Applications (BBA [CA]) .

Chapters

More MCQs
201.

In reverse engineering, what refers to the level of detail that is provided at an abstraction level?

A. interactivity
B. completeness
C. abstraction level
D. directionality
Answer» B. completeness
202.

The core of reverse engineering is an activity called

A. restructure code
B. directionality
C. extract abstractions
D. interactivity
Answer» C. extract abstractions
203.

What have become de rigueur for computer-based products and systems of every type?

A. guis
B. candidate keys
C. object model
D. all of the mentioned
Answer» A. guis
204.

Forward engineering is also known as

A. extract abstractions
B. renovation
C. reclamation
D. both renovation and reclamation
Answer» D. both renovation and reclamation
205.

Reverse engineering is the process of deriving the system design and specification from its

A. gui
B. database
C. source code
D. all of the mentioned
Answer» C. source code
206.

Reverse engineering techniques for internal program data focus on the definition of classes of objects.

A. true
B. false
Answer» A. true
207.

Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:

A. build an initial object model
B. determine candidate keys
C. refine the tentative classes
D. discover user interfaces
Answer» D. discover user interfaces
208.

Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing

A. candidate keys
B. interface
C. database structure
D. none of the mentioned
Answer» B. interface
209.

Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called

A. data analysis
B. directionality
C. data extraction
D. client applications
Answer» A. data analysis
210.

Transformation of a system from one representational form to another is known as

A. re-factoring
B. restructuring
C. forward engineering
D. both re-factoring and restructuring
Answer» D. both re-factoring and restructuring
211.

Which of the following is not an objective of reverse engineering?

A. to reduce maintenance effort
B. to cope with complexity
C. to avoid side effects
D. to assist migration to a case environment
Answer» D. to assist migration to a case environment
212.

Why is decomposition technique required?

A. software project estimation is a form of problem solving
B. developing a cost and effort estimate for a software project is too complex
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
213.

Cost and effort estimation of a software uses only one forms of decomposition, either decomposition of the problem or decomposition of the process.

A. true
B. false
Answer» B. false
214.

If a Direct approach to software project sizing is taken, size can be measured in

A. loc
B. fp
C. loc and fp
D. none of the mentioned
Answer» A. loc
215.

Which software project sizing approach develop estimates of the information domain characteristics?

A. function point sizing
B. change sizing
C. standard component sizing
D. fuzzy logic sizing
Answer» A. function point sizing
216.

How many forms exists of Barry Boehm’s COCOMO Model?

A. two
B. three
C. four
D. no form exists
Answer» B. three
217.

Who suggested the four different approaches to the sizing problem?

A. putnam
B. myers
C. boehm
D. putnam and myers
Answer» D. putnam and myers
218.

In many cases, it is often more cost- effective to acquire, rather than develop, computer software.

A. true
B. false
Answer» A. true
219.

A make-buy decision is based on whether

A. the software may be purchased off-the- shelf
B. “full-experience” or “partial-experience” software components should be used
C. customer-built software should be developed
D. all of the mentioned
Answer» D. all of the mentioned
220.

Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition?

A. external inputs
B. external outputs
C. external process
D. external inquiries
Answer» C. external process
221.

The project planner must reconcile the estimates based on decomposition techniques to produce a single estimate of effort.

A. true
B. false
Answer» B. false
222.

Programming language experience is a part of which factor of COCOMO cost drivers?

A. personnel factor
B. product factor
C. platform factor
D. project factor
Answer» A. personnel factor
223.

If an Indirect approach is taken, then the sizing approach is represented as

A. loc
B. fp
C. fuzzy logic
D. loc and fp
Answer» B. fp
224.

Which of the following is the reason that software is delivered late?

A. changing customer requirements that are not reflected in schedule changes
B. technical difficulties that could not have been foreseen in advance
C. human difficulties that could not have been foreseen in advance
D. all of the mentioned
Answer» D. all of the mentioned
225.

Which of the following is an activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks?

A. software macroscopic schedule
B. software project scheduling
C. software detailed schedule
D. none of the mentioned
Answer» B. software project scheduling
226.

Every task that is scheduled should be assigned to a specific team member is termed as

A. compartmentalization
B. defined milestones
C. defined responsibilities
D. defined outcomes
Answer» C. defined responsibilities
227.

What is a collection of software engineering work tasks, milestones, and deliverables that must be accomplished to complete a particular project?

A. task set
B. degree of milestone
C. adaptation criteria
D. all of the mentioned
Answer» A. task set
228.

Ensuring that no more than the allocated number of people are allocated at any given time in Software Scheduling is known as

A. time allocation
B. effort validation
C. defined milestone
D. effort distribution
Answer» B. effort validation
229.

What is used to determine the recommended degree of rigor with which the software process should be applied on a project?

A. degree of rigor
B. adaptation criteria
C. task set
D. both degree of rigor and adaptation criteria
Answer» B. adaptation criteria
230.

What evaluates the risk associated with the technology to be implemented as part of project scope?

A. concept scoping
B. preliminary concept planning
C. technology risk assessment
D. customer reaction to the concept
Answer» B. preliminary concept planning
231.

Which of the following is not an adaptation criteria for software projects?

A. size of the project
B. customers complaints
C. project staff
D. mission criticality
Answer» B. customers complaints
232.

Which of the following is a project scheduling method that can be applied to software development?

A. pert
B. cpm
C. cmm
D. both pert and cpm
Answer» D. both pert and cpm
233.

A technique for performing quantitative analysis of progress is known as

A. bcws
B. eva
C. bac
D. cbse
Answer» B. eva
234.

What is the recommended distribution of effort for a project?

A. 40-20-40
B. 50-20-30
C. 30-40-30
D. 50-30-20
Answer» A. 40-20-40
235.

A project usually has a timeline chart which was developed by

A. henry gantt
B. barry boehm
C. ivar jacabson
D. none of the mentioned
Answer» A. henry gantt
236.

Risk management is one of the most important jobs for a

A. client
B. investor
C. production team
D. project manager
Answer» D. project manager
237.

Which of the following risk is the failure of a purchased component to perform as expected?

A. product risk
B. project risk
C. business risk
D. programming risk
Answer» A. product risk
238.

Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”?

A. technology change
B. product competition
C. requirements change
D. none of the mentioned
Answer» A. technology change
239.

What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?

A. risk monitoring
B. risk planning
C. risk analysis
D. risk identification
Answer» A. risk monitoring
240.

Which of the following risks are derived from the organizational environment where the software is being developed?

A. people risks
B. technology risks
C. estimation risks
D. organizational risks
Answer» D. organizational risks
241.

Which of the following risks are derived from the software or hardware technologies that are used to develop the system?

A. managerial risks
B. technology risks
C. estimation risks
D. organizational risks
Answer» B. technology risks
242.

Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.”?

A. underestimated development time
B. organizational restructuring
C. requirements changes
D. none of the mentioned
Answer» C. requirements changes
243.

Which of the following strategies means that the impact of the risk will be reduced?

A. avoidance strategies
B. minimization strategies
C. contingency plans
D. all of the mentioned
Answer» B. minimization strategies
244.

Risk management is now recognized as one of the most important project management tasks.

A. true
B. false
Answer» A. true
245.

6 IDENTIFICATION- RMMM PLAN-CASE TOOLS

A. threats
B. vulnerabilities
C. consequences
D. all of the mentioned
Answer» D. all of the mentioned
246.

Which one is not a risk management activity?

A. risk assessment
B. risk generation
C. risk control
D. none of the mentioned
Answer» B. risk generation
247.

What is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss?

A. risk exposure
B. risk prioritization
C. risk analysis
D. all of the mentioned
Answer» A. risk exposure
248.

What threatens the quality and timeliness of the software to be produced?

A. known risks
B. business risks
C. project risks
D. technical risks
Answer» D. technical risks
249.

What threatens the viability of the software to be built?

A. known risks
B. business risks
C. project risks
D. technical risks
Answer» B. business risks
250.

Which of the following is not a business risk?

A. building an excellent product or system that no one really wants
B. losing the support of senior management due to a change in focus or change in people
C. lack of documented requirements or software scope
D. losing budgetary or personnel commitment
Answer» C. lack of documented requirements or software scope

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.