

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) , Bachelor of Science in Computer Science SY (BSc CS) , Bachelor of Computer Applications (BCA) , Bachelor of Business Administration in Computer Applications (BBA [CA]) .
Chapters
451. |
An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces. |
A. | Object design models |
B. | Object interface design |
C. | Object oriented models |
D. | None of these |
Answer» C. Object oriented models |
452. |
Interoperability is |
A. | Ability of two or more systems, to exchange information and to use the information that has been exchanged. |
B. | Time taken to respond to an event. |
C. | Either the hazard not arises, if arise; it will not result in an accident. |
D. | None of these |
Answer» A. Ability of two or more systems, to exchange information and to use the information that has been exchanged. |
453. |
Parkinson’s Law is |
A. | The cost is determined by available resources rather than by objective assessment. |
B. | A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
C. | As an evolving program change, its strictures tend to become more complex. |
D. | Program evolution is a self-regulating process. |
Answer» A. The cost is determined by available resources rather than by objective assessment. |
454. |
Retirement phase is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. |
D. | None of these |
Answer» B. Period of time in the software life cycle during which support for a software product is terminated. |
455. |
Retrospective Fault detection is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred* |
D. | None of these |
Answer» C. The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred* |
456. |
Risk planning process |
A. | Extent to which a software module can be used in more than one computing program |
B. | It involves regular monitoring of the risks identified and of new risks that develops. |
C. | It considers each of the key risks that are identified and identifies strategies to manage the risk. |
D. | None of these |
Answer» C. It considers each of the key risks that are identified and identifies strategies to manage the risk. |
457. |
Software engineering method is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» B. Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
458. |
Restart is |
A. | Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
B. | Period of time in the software life cycle during which support for a software product is terminated. |
C. | The fault detection mechanism is initiated after the system state has been changed to check if a fault has occurred. |
D. | None of these |
Answer» A. Reason for a computer program to resume execution after a failure, using status and results recorded at a checkpoint. |
459. |
Risk Management is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» C. The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
460. |
ROCOF (Rate of failure occurrence) is |
A. | The probability that the system will cause an accident |
B. | Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions. |
C. | The frequency of occurrence with which unexpected behavior is likely to occur |
D. | None of these |
Answer» C. The frequency of occurrence with which unexpected behavior is likely to occur |
461. |
Software system is |
A. | Associated with functionality of software and constraints of operations defined. |
B. | It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. |
C. | It involves executing an implementation of the software with test data and examines the outputs of the software and its operational behavior to check that it is performing as required |
D. | None of these |
Answer» B. It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. |
462. |
Scalability is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility. |
D. | None of these |
Answer» B. Ease with which a system or component are modified to fit the problem area. |
463. |
Risk analysis process is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» A. Here each identified risk is analyzed and prioritized |
464. |
Reusability is |
A. | Extent to which a software module can be used in more than one computing program. |
B. | It involves regular monitoring of the risks identified and of new risks that develops. |
C. | It considers each of the key risks that are identified and also identifies strategies to manage the risk. |
D. | None of these |
Answer» A. Extent to which a software module can be used in more than one computing program. |
465. |
Safety argument is |
A. | Associated with the role of people involved in software process and the activities for which they are responsible. |
B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. |
C. | It is concerned with establishing a confidence level in the system that might vary from low to high |
D. | None of these |
Answer» B. The most effective technique for demonstrating the safety of a system is proof by contradiction. |
466. |
Risk assessment is |
A. | Here each identified risk is analyzed and prioritized |
B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
D. | None of these |
Answer» B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
467. |
Risk is |
A. | The probability that the system will cause an accident |
B. | Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions. |
C. | The frequency of occurrence with which unexpected behavior is likely to occur. |
D. | None of these |
Answer» A. The probability that the system will cause an accident |
468. |
Safety is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility. |
D. | None of these |
Answer» A. Avoiding catastrophic moment |
469. |
Role is |
A. | Avoiding catastrophic moment |
B. | Ease with which a system or component are modified to fit the problem area. |
C. | It is a bounded area of responsibility |
D. | None of these |
Answer» C. It is a bounded area of responsibility |
470. |
Robustness is |
A. | The probability that the system will cause an accident |
B. | Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions |
C. | The frequency of occurrence with which unexpected behavior is likely to occur. |
D. | None of these |
Answer» B. Extent to which a system or component can function correctly in the presence of invalid inputs or stressful environment conditions |
471. |
Risk monitoring process |
A. | Extent to which a software module can be used in more than one computing program |
B. | It involves regular monitoring of the risks identified and of new risks that develops. |
C. | It considers each of the key risks that are identified and identifies strategies to manage the risk. |
D. | None of these |
Answer» B. It involves regular monitoring of the risks identified and of new risks that develops. |
472. |
These objects can be realized as parallel process with method corresponding to defined object operations. |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» B. Servers |
473. |
Safety validation is |
A. | Associated with the role of people involved in software process and the activities for which they are responsible. |
B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. |
C. | It is concerned with establishing a confidence level in the system that might vary from low to high |
D. | None of these |
Answer» C. It is concerned with establishing a confidence level in the system that might vary from low to high |
474. |
Software process model |
A. | Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
B. | Adaptive maintenance, performed to make a computer program usable in a changed environment. |
C. | A simplified description of a software process that is presented from a particular perspective. |
D. | None of these |
Answer» C. A simplified description of a software process that is presented from a particular perspective. |
475. |
Extent to which a system or component contains enough information to explain its objectives and properties is referred as |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» A. Self-descriptiveness |
476. |
Degree to which a system or component has a design and implementation that is straightforward and easy to understand is referred as |
A. | Self-descriptiveness |
B. | Servers |
C. | Simplicity |
D. | None of these |
Answer» C. Simplicity |
477. |
Software attributes are |
A. | Maintainability |
B. | Reliability |
C. | Portability |
D. | All the above |
Answer» D. All the above |
478. |
Software measurement is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these |
Answer» B. It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
479. |
Software development is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» A. Associated with production of software as per specification |
480. |
Software evolution is |
A. | It is concern with modification of existing system to meet changing requirements. |
B. | It is a process of converting system specifications into an executable system. |
C. | It analyzes and checks system representation such as the require- ments document, design diagrams and program source code. |
D. | None of these |
Answer» A. It is concern with modification of existing system to meet changing requirements. |
481. |
Software maintenance is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these |
Answer» A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
482. |
Software Engineering is |
A. | Associated with production of software as per specification |
B. | Structured approach to software development, whose aim is to facilitate the production of high-quality software in a cost-effective way. |
C. | An engineering discipline, concern with software development. |
D. | None of these |
Answer» C. An engineering discipline, concern with software development. |
483. |
Software inspection is |
A. | It is concern with modification of existing system to meet changing requirements. |
B. | It is a process of converting system specifications into an executable system. |
C. | It analyzes and checks system representation such as the require- ments document, design diagrams and program source code. |
D. | None of these |
Answer» A. It is concern with modification of existing system to meet changing requirements. |
484. |
Software life cycle is |
A. | Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
B. | Adaptive maintenance, performed to make a computer program usable in a changed environment. |
C. | A simplified description of a software process that is presented from a particular perspective. |
D. | None of these |
Answer» A. Time-period that begins when a software product is conceived and ends when the software is no longer available for use. |
485. |
Software requirements specification are |
A. | A set of activities and associated results that produce a software product. |
B. | It is concerned with re-implementing legacy system to make them more maintainable. |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» C. It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
486. |
Software process is |
A. | A set of activities and associated results that produce a software product |
B. | It is concerned with re-implementing legacy system to make them more maintainable. |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» A. A set of activities and associated results that produce a software product |
487. |
Software re-engineering is |
A. | A set of activities and associated results that produce a software product. |
B. | It is concerned with re-implementing legacy system to make them more maintainable |
C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
D. | None of these. |
Answer» B. It is concerned with re-implementing legacy system to make them more maintainable |
488. |
Procedural interface |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» B. Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
489. |
Software metric is |
A. | It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
B. | It is concerned with deriving a numeric value for some attribute of a software product or a software process. |
C. | It is any type of measurement, which relates to software system, process and related documentation. |
D. | None of these Software specification is |
Answer» A. It is the general process of changing system after it has been delivered. The changes can be to correct coding error to correct design error, or adding new components to system. |
490. |
System is |
A. | The set of system services and constraints in details |
B. | System functions that restricts the use of objects to certain users. |
C. | Purposeful collection of interrelated components that work together to achieve some objective. |
D. | None of these |
Answer» C. Purposeful collection of interrelated components that work together to achieve some objective. |
491. |
It is concerned with making decision about the best way for an organization that acquire a system and deciding on the best suppliers of that system. |
A. | System procurement |
B. | System quality assessment |
C. | System release management |
D. | System reliability |
Answer» A. System procurement |
492. |
It is responsible for deciding when the system can be released to customers, managing the process of creating the release and distribution media and documen- ting the release. |
A. | System procurement |
B. | System quality assessment |
C. | System release management |
D. | System reliability |
Answer» C. System release management |
493. |
Process analysis |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» C. It is concerned with studying existing process to understand the relationship between different parts of the process. |
494. |
System requirements are |
A. | The set of system services and constraints in details |
B. | System functions that restricts the use of objects to certain users. |
C. | Purposeful collection of interrelated components that work together to achieve some objective. |
D. | None of these |
Answer» A. The set of system services and constraints in details |
495. |
System security is |
A. | The set of system services and constraints in details |
B. | System functions that restricts the use of objects to certain users |
C. | Purposeful collection of interrelated components that work together to achieve some objective. |
D. | None of these |
Answer» B. System functions that restricts the use of objects to certain users |
496. |
Portability |
A. | Trustworthiness with which a system are transferred from one hardware environment to another |
B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
D. | None of these |
Answer» A. Trustworthiness with which a system are transferred from one hardware environment to another |
497. |
Lehman’s Third Law (Lehman and Belady 1985) is |
A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» C. Large program evolution: Program evolution is a self-regulating process. |
498. |
Model is |
A. | These measurements need to be collected to help answers to the questions and to confirm whether process improvements have achieved the desired goal. |
B. | Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process |
C. | Extent to which a system or component facilitates the incorporation of changes, once the nature of the desired change has been determined. |
D. | None of these |
Answer» B. Approximation, representation, or idealization of selected aspects of the structure, behavior, operation, or other characteristics of a real-world process |
499. |
Lehman’s Fifth Law (Lehman and Belady 1985) is |
A. | Organizational stability: Over a pro- gram’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. |
B. | Conservation of familiarity: Over the lifetime of a system, the incremental change in each release is approxima- tely constant. |
C. | Large program evolution: Program evolution is a self-regulating process. |
D. | None of these |
Answer» B. Conservation of familiarity: Over the lifetime of a system, the incremental change in each release is approxima- tely constant. |
500. |
Match the following :
|
A. | A-1, B-3,C-2 |
B. | A-1,B-2,C-3 |
C. | A-2,B-3,C-1 |
D. | A-3,B-2,C-1 |
Answer» B. A-1,B-2,C-3 |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.