182
106.5k

960+ Software Engineering Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration in Computer Applications (BBA [CA]) .

Chapters

More MCQs
401.

Which of these benefits can be achieved when software is restructured?

A. higher quality programs
B. reduced maintenance effort
C. software easier to test
D. all of the mentioned
Answer» D. all of the mentioned
402.

Data re-engineering may be part of the process of migrating from a file-based system to a DBMS-based system or changing from one DBMS to another.

A. true
B. false
Answer» A. true
403.

BPR stands for

A. business process re-engineering
B. business product re-engineering
C. business process requirements
D. none of the mentioned
Answer» A. business process re-engineering
404.

Source code translation is a part of which re-engineering technique?

A. data re-engineering
B. refactoring
C. restructuring
D. none of the mentioned
Answer» C. restructuring
405.

In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code?

A. interactivity
B. completeness
C. abstraction level
D. direction level
Answer» C. abstraction level
406.

In reverse engineering, what refers to the level of detail that is provided at an abstraction level?

A. interactivity
B. completeness
C. abstraction level
D. directionality
Answer» B. completeness
407.

The core of reverse engineering is an activity called

A. restructure code
B. directionality
C. extract abstractions
D. interactivity
Answer» C. extract abstractions
408.

What have become de rigueur for computer-based products and systems of every type?

A. guis
B. candidate keys
C. object model
D. all of the mentioned
Answer» A. guis
409.

Forward engineering is also known as

A. extract abstractions
B. renovation
C. reclamation
D. both renovation and reclamation
Answer» D. both renovation and reclamation
410.

Reverse engineering is the process of deriving the system design and specification from its

A. gui
B. database
C. source code
D. all of the mentioned
Answer» C. source code
411.

Reverse engineering techniques for internal program data focus on the definition of classes of objects.

A. true
B. false
Answer» A. true
412.

Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:

A. build an initial object model
B. determine candidate keys
C. refine the tentative classes
D. discover user interfaces
Answer» D. discover user interfaces
413.

Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing

A. candidate keys
B. interface
C. database structure
D. none of the mentioned
Answer» B. interface
414.

Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called

A. data analysis
B. directionality
C. data extraction
D. client applications
Answer» A. data analysis
415.

Transformation of a system from one representational form to another is known as

A. re-factoring
B. restructuring
C. forward engineering
D. both re-factoring and restructuring
Answer» D. both re-factoring and restructuring
416.

Which of the following is not an objective of reverse engineering?

A. to reduce maintenance effort
B. to cope with complexity
C. to avoid side effects
D. to assist migration to a case environment
Answer» D. to assist migration to a case environment
417.

Why is decomposition technique required?

A. software project estimation is a form of problem solving
B. developing a cost and effort estimate for a software project is too complex
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
418.

Cost and effort estimation of a software uses only one forms of decomposition, either decomposition of the problem or decomposition of the process.

A. true
B. false
Answer» B. false
419.

If a Direct approach to software project sizing is taken, size can be measured in

A. loc
B. fp
C. loc and fp
D. none of the mentioned
Answer» A. loc
420.

Which software project sizing approach develop estimates of the information domain characteristics?

A. function point sizing
B. change sizing
C. standard component sizing
D. fuzzy logic sizing
Answer» A. function point sizing
421.

How many forms exists of Barry Boehm’s COCOMO Model?

A. two
B. three
C. four
D. no form exists
Answer» B. three
422.

Who suggested the four different approaches to the sizing problem?

A. putnam
B. myers
C. boehm
D. putnam and myers
Answer» D. putnam and myers
423.

In many cases, it is often more cost- effective to acquire, rather than develop, computer software.

A. true
B. false
Answer» A. true
424.

A make-buy decision is based on whether

A. the software may be purchased off-the- shelf
B. “full-experience” or “partial-experience” software components should be used
C. customer-built software should be developed
D. all of the mentioned
Answer» D. all of the mentioned
425.

Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition?

A. external inputs
B. external outputs
C. external process
D. external inquiries
Answer» C. external process
426.

The project planner must reconcile the estimates based on decomposition techniques to produce a single estimate of effort.

A. true
B. false
Answer» B. false
427.

Programming language experience is a part of which factor of COCOMO cost drivers?

A. personnel factor
B. product factor
C. platform factor
D. project factor
Answer» A. personnel factor
428.

If an Indirect approach is taken, then the sizing approach is represented as

A. loc
B. fp
C. fuzzy logic
D. loc and fp
Answer» B. fp
429.

Which of the following is the reason that software is delivered late?

A. changing customer requirements that are not reflected in schedule changes
B. technical difficulties that could not have been foreseen in advance
C. human difficulties that could not have been foreseen in advance
D. all of the mentioned
Answer» D. all of the mentioned
430.

Which of the following is an activity that distributes estimated effort across the planned project duration by allocating the effort to specific software engineering tasks?

A. software macroscopic schedule
B. software project scheduling
C. software detailed schedule
D. none of the mentioned
Answer» B. software project scheduling
431.

Every task that is scheduled should be assigned to a specific team member is termed as

A. compartmentalization
B. defined milestones
C. defined responsibilities
D. defined outcomes
Answer» C. defined responsibilities
432.

What is a collection of software engineering work tasks, milestones, and deliverables that must be accomplished to complete a particular project?

A. task set
B. degree of milestone
C. adaptation criteria
D. all of the mentioned
Answer» A. task set
433.

Ensuring that no more than the allocated number of people are allocated at any given time in Software Scheduling is known as

A. time allocation
B. effort validation
C. defined milestone
D. effort distribution
Answer» B. effort validation
434.

What is used to determine the recommended degree of rigor with which the software process should be applied on a project?

A. degree of rigor
B. adaptation criteria
C. task set
D. both degree of rigor and adaptation criteria
Answer» B. adaptation criteria
435.

What evaluates the risk associated with the technology to be implemented as part of project scope?

A. concept scoping
B. preliminary concept planning
C. technology risk assessment
D. customer reaction to the concept
Answer» B. preliminary concept planning
436.

Which of the following is not an adaptation criteria for software projects?

A. size of the project
B. customers complaints
C. project staff
D. mission criticality
Answer» B. customers complaints
437.

Which of the following is a project scheduling method that can be applied to software development?

A. pert
B. cpm
C. cmm
D. both pert and cpm
Answer» D. both pert and cpm
438.

A technique for performing quantitative analysis of progress is known as

A. bcws
B. eva
C. bac
D. cbse
Answer» B. eva
439.

What is the recommended distribution of effort for a project?

A. 40-20-40
B. 50-20-30
C. 30-40-30
D. 50-30-20
Answer» A. 40-20-40
440.

A project usually has a timeline chart which was developed by

A. henry gantt
B. barry boehm
C. ivar jacabson
D. none of the mentioned
Answer» A. henry gantt
441.

Risk management is one of the most important jobs for a

A. client
B. investor
C. production team
D. project manager
Answer» D. project manager
442.

Which of the following risk is the failure of a purchased component to perform as expected?

A. product risk
B. project risk
C. business risk
D. programming risk
Answer» A. product risk
443.

Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”?

A. technology change
B. product competition
C. requirements change
D. none of the mentioned
Answer» A. technology change
444.

What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?

A. risk monitoring
B. risk planning
C. risk analysis
D. risk identification
Answer» A. risk monitoring
445.

Which of the following risks are derived from the organizational environment where the software is being developed?

A. people risks
B. technology risks
C. estimation risks
D. organizational risks
Answer» D. organizational risks
446.

Which of the following risks are derived from the software or hardware technologies that are used to develop the system?

A. managerial risks
B. technology risks
C. estimation risks
D. organizational risks
Answer» B. technology risks
447.

Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.”?

A. underestimated development time
B. organizational restructuring
C. requirements changes
D. none of the mentioned
Answer» C. requirements changes
448.

Which of the following strategies means that the impact of the risk will be reduced?

A. avoidance strategies
B. minimization strategies
C. contingency plans
D. all of the mentioned
Answer» B. minimization strategies
449.

Risk management is now recognized as one of the most important project management tasks.

A. true
B. false
Answer» A. true
450.

6 IDENTIFICATION- RMMM PLAN-CASE TOOLS

A. threats
B. vulnerabilities
C. consequences
D. all of the mentioned
Answer» D. all of the mentioned

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.