

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration in Computer Applications (BBA [CA]) .
Chapters
401. |
Which of these benefits can be achieved when software is restructured? |
A. | higher quality programs |
B. | reduced maintenance effort |
C. | software easier to test |
D. | all of the mentioned |
Answer» D. all of the mentioned |
402. |
Data re-engineering may be part of the process of migrating from a file-based system to a DBMS-based system or changing from one DBMS to another. |
A. | true |
B. | false |
Answer» A. true |
403. |
BPR stands for |
A. | business process re-engineering |
B. | business product re-engineering |
C. | business process requirements |
D. | none of the mentioned |
Answer» A. business process re-engineering |
404. |
Source code translation is a part of which re-engineering technique? |
A. | data re-engineering |
B. | refactoring |
C. | restructuring |
D. | none of the mentioned |
Answer» C. restructuring |
405. |
In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code? |
A. | interactivity |
B. | completeness |
C. | abstraction level |
D. | direction level |
Answer» C. abstraction level |
406. |
In reverse engineering, what refers to the level of detail that is provided at an abstraction level? |
A. | interactivity |
B. | completeness |
C. | abstraction level |
D. | directionality |
Answer» B. completeness |
407. |
The core of reverse engineering is an activity called |
A. | restructure code |
B. | directionality |
C. | extract abstractions |
D. | interactivity |
Answer» C. extract abstractions |
408. |
What have become de rigueur for computer-based products and systems of every type? |
A. | guis |
B. | candidate keys |
C. | object model |
D. | all of the mentioned |
Answer» A. guis |
409. |
Forward engineering is also known as |
A. | extract abstractions |
B. | renovation |
C. | reclamation |
D. | both renovation and reclamation |
Answer» D. both renovation and reclamation |
410. |
Reverse engineering is the process of deriving the system design and specification from its |
A. | gui |
B. | database |
C. | source code |
D. | all of the mentioned |
Answer» C. source code |
411. |
Reverse engineering techniques for internal program data focus on the definition of classes of objects. |
A. | true |
B. | false |
Answer» A. true |
412. |
Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model: |
A. | build an initial object model |
B. | determine candidate keys |
C. | refine the tentative classes |
D. | discover user interfaces |
Answer» D. discover user interfaces |
413. |
Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing |
A. | candidate keys |
B. | interface |
C. | database structure |
D. | none of the mentioned |
Answer» B. interface |
414. |
Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called |
A. | data analysis |
B. | directionality |
C. | data extraction |
D. | client applications |
Answer» A. data analysis |
415. |
Transformation of a system from one representational form to another is known as |
A. | re-factoring |
B. | restructuring |
C. | forward engineering |
D. | both re-factoring and restructuring |
Answer» D. both re-factoring and restructuring |
416. |
Which of the following is not an objective of reverse engineering? |
A. | to reduce maintenance effort |
B. | to cope with complexity |
C. | to avoid side effects |
D. | to assist migration to a case environment |
Answer» D. to assist migration to a case environment |
417. |
Why is decomposition technique required? |
A. | software project estimation is a form of problem solving |
B. | developing a cost and effort estimate for a software project is too complex |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» C. all of the mentioned |
418. |
Cost and effort estimation of a software uses only one forms of decomposition, either decomposition of the problem or decomposition of the process. |
A. | true |
B. | false |
Answer» B. false |
419. |
If a Direct approach to software project sizing is taken, size can be measured in |
A. | loc |
B. | fp |
C. | loc and fp |
D. | none of the mentioned |
Answer» A. loc |
420. |
Which software project sizing approach develop estimates of the information domain characteristics? |
A. | function point sizing |
B. | change sizing |
C. | standard component sizing |
D. | fuzzy logic sizing |
Answer» A. function point sizing |
421. |
How many forms exists of Barry Boehm’s COCOMO Model? |
A. | two |
B. | three |
C. | four |
D. | no form exists |
Answer» B. three |
422. |
Who suggested the four different approaches to the sizing problem? |
A. | putnam |
B. | myers |
C. | boehm |
D. | putnam and myers |
Answer» D. putnam and myers |
423. |
In many cases, it is often more cost- effective to acquire, rather than develop, computer software. |
A. | true |
B. | false |
Answer» A. true |
424. |
A make-buy decision is based on whether |
A. | the software may be purchased off-the- shelf |
B. | “full-experience” or “partial-experience” software components should be used |
C. | customer-built software should be developed |
D. | all of the mentioned |
Answer» D. all of the mentioned |
425. |
Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition? |
A. | external inputs |
B. | external outputs |
C. | external process |
D. | external inquiries |
Answer» C. external process |
426. |
The project planner must reconcile the estimates based on decomposition techniques to produce a single estimate of effort. |
A. | true |
B. | false |
Answer» B. false |
427. |
Programming language experience is a part of which factor of COCOMO cost drivers? |
A. | personnel factor |
B. | product factor |
C. | platform factor |
D. | project factor |
Answer» A. personnel factor |
428. |
If an Indirect approach is taken, then the sizing approach is represented as |
A. | loc |
B. | fp |
C. | fuzzy logic |
D. | loc and fp |
Answer» B. fp |
429. |
Which of the following is the reason that software is delivered late? |
A. | changing customer requirements that are not reflected in schedule changes |
B. | technical difficulties that could not have been foreseen in advance |
C. | human difficulties that could not have been foreseen in advance |
D. | all of the mentioned |
Answer» D. all of the mentioned |
430. |
Which of the following is an activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks? |
A. | software macroscopic schedule |
B. | software project scheduling |
C. | software detailed schedule |
D. | none of the mentioned |
Answer» B. software project scheduling |
431. |
Every task that is scheduled should be assigned to a specific team member is termed as |
A. | compartmentalization |
B. | defined milestones |
C. | defined responsibilities |
D. | defined outcomes |
Answer» C. defined responsibilities |
432. |
What is a collection of software engineering work tasks, milestones, and deliverables that must be accomplished to complete a particular project? |
A. | task set |
B. | degree of milestone |
C. | adaptation criteria |
D. | all of the mentioned |
Answer» A. task set |
433. |
Ensuring that no more than the allocated number of people are allocated at any given time in Software Scheduling is known as |
A. | time allocation |
B. | effort validation |
C. | defined milestone |
D. | effort distribution |
Answer» B. effort validation |
434. |
What is used to determine the recommended degree of rigor with which the software process should be applied on a project? |
A. | degree of rigor |
B. | adaptation criteria |
C. | task set |
D. | both degree of rigor and adaptation criteria |
Answer» B. adaptation criteria |
435. |
What evaluates the risk associated with the technology to be implemented as part of project scope? |
A. | concept scoping |
B. | preliminary concept planning |
C. | technology risk assessment |
D. | customer reaction to the concept |
Answer» B. preliminary concept planning |
436. |
Which of the following is not an adaptation criteria for software projects? |
A. | size of the project |
B. | customers complaints |
C. | project staff |
D. | mission criticality |
Answer» B. customers complaints |
437. |
Which of the following is a project scheduling method that can be applied to software development? |
A. | pert |
B. | cpm |
C. | cmm |
D. | both pert and cpm |
Answer» D. both pert and cpm |
438. |
A technique for performing quantitative analysis of progress is known as |
A. | bcws |
B. | eva |
C. | bac |
D. | cbse |
Answer» B. eva |
439. |
What is the recommended distribution of effort for a project? |
A. | 40-20-40 |
B. | 50-20-30 |
C. | 30-40-30 |
D. | 50-30-20 |
Answer» A. 40-20-40 |
440. |
A project usually has a timeline chart which was developed by |
A. | henry gantt |
B. | barry boehm |
C. | ivar jacabson |
D. | none of the mentioned |
Answer» A. henry gantt |
441. |
Risk management is one of the most important jobs for a |
A. | client |
B. | investor |
C. | production team |
D. | project manager |
Answer» D. project manager |
442. |
Which of the following risk is the failure of a purchased component to perform as expected? |
A. | product risk |
B. | project risk |
C. | business risk |
D. | programming risk |
Answer» A. product risk |
443. |
Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”? |
A. | technology change |
B. | product competition |
C. | requirements change |
D. | none of the mentioned |
Answer» A. technology change |
444. |
What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk? |
A. | risk monitoring |
B. | risk planning |
C. | risk analysis |
D. | risk identification |
Answer» A. risk monitoring |
445. |
Which of the following risks are derived from the organizational environment where the software is being developed? |
A. | people risks |
B. | technology risks |
C. | estimation risks |
D. | organizational risks |
Answer» D. organizational risks |
446. |
Which of the following risks are derived from the software or hardware technologies that are used to develop the system? |
A. | managerial risks |
B. | technology risks |
C. | estimation risks |
D. | organizational risks |
Answer» B. technology risks |
447. |
Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.”? |
A. | underestimated development time |
B. | organizational restructuring |
C. | requirements changes |
D. | none of the mentioned |
Answer» C. requirements changes |
448. |
Which of the following strategies means that the impact of the risk will be reduced? |
A. | avoidance strategies |
B. | minimization strategies |
C. | contingency plans |
D. | all of the mentioned |
Answer» B. minimization strategies |
449. |
Risk management is now recognized as one of the most important project management tasks. |
A. | true |
B. | false |
Answer» A. true |
450. |
6 IDENTIFICATION- RMMM PLAN-CASE TOOLS |
A. | threats |
B. | vulnerabilities |
C. | consequences |
D. | all of the mentioned |
Answer» D. all of the mentioned |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.