In software development, value adjustment factors include the following among others:
1.the criticality of the performance and reusability of the code.
2.number of lines of code in the software.
3.number of technical manpower and hardware costs.
4.time period available and the level of user friendliness.
The Function Point (FP) metric is:
1.Calculated from user requirements
2. Calculated from Lines of code
3.Calculated from software’s complexity assessment
4.None of the above
Which of the following types of maintenance takes the maximum chunk of the total Maintenance effort in a typical commercial application environment?
1.Adaptive Maintenance
2.Corrective Maintenance
3.Preventive Maintenance
4.Perfective Maintenance
A desirable property of module is
1.Independency
2.Low cohesiveness
3.High coupling
4.Multifunctional
A legacy software system has 940 modules. The latest release required that 90 of these modules be changed. In addition, 40 new modules were added and 12 old modules were removed. Compute the software maturity index for the system.
1.0.849
2.0524
3.0.725
4.0.923
Among the following, a representation that can be used for designing a system as a collection of procedures or modules:
1.Data flow diagrams
2.Activity Chart
3.Flow chart
4. ER Modeling
An important aspect in coding is
1.Readability
2.Productivity
3.To use as small memory
4.Brevity space as possible
Assertions are conditions which are true at the points of execution
1.Always
2.Sometimes
3.Many times
4.No times
Assume the following regarding the development of a software system P: - Estimated lines of code of P: 33, 480 LOC - Average productivity for P: 620 LOC per person-month - Number of software developers: 6 - Average salary of a software developer: Rs. 50,000 per month If E, D and C are the estimated development effort (in person-months), estimated development time (in months), and estimated development cost (in Rs Lac) respectively, then (E, D, C) = ...............
1.(48, 8, 24)
2.(54, 9, 27)
3.(60, 10, 30)
4.(42, 7, 21)
Assuming the existence of a start and end nodes for a program graph (PG), the total number of Paths is equivalent to ..................................set of test data required to test software.
1.Minimum
2.Maximum
3.Optimum
4.Supreme
Booting the computers means
1.Logging in
2.Loading the resident part of the operating system into memory
3.Turning the computer on
4.Both a and b
Boundary value analysis is a method for:
1.White box testing
2. Black box testing
3.Structural testing
4.Mutation testing
Design phase includes
1.Data, architecture and procedural designs only
2.Architectural, Procedural and interface designs only
3.Data, architecture, interface & Procedural designs
4.All of these
In PERT/CPM, the merge event represents .............. of two or more events.
1.completion
2.beginning
3.splitting
4.joining
In transform analysis, input portion is called:
1.Afferent branch
2.Efferent branch
3.Central Transform
4.None of the above
Information hiding is hide from user, details that
1.Are relevant to him
2.Are not relevant to him
3. May be maliciously handled
4.Are confidential
Interaction modeling cannot be done using:
1.State Diagrams
2.Use-Cases
3.Sequence Diagrams
4.Activity Diagrams
Match each UML diagram in List I to its appropriate description in List II List I List I(a) State Diagram (i) Describes how the external entities (people, devices) can interact with the system (b) Use-Case Diagram (ii) Used to describe the static or structural view of a system (c) Class Diagram (iii) Used to show the flow of a business process, the steps of a use-case or the logic of an object behaviour (d) Activity Diagram (iv) Used to describe the dynamic behaviour of objects and could also be used to describe the entire system behaviourI
1.(a)-(i); (b)-(iv); (c)-(ii); (d)-(iii)
2.(a)-(iv); (b)-(ii); (c)-(i); (d)-(iii)
3.(a)-(i); (b)-(iv); (c)-(iii); (d)-(ii)
4.(a)-(iv); (b)-(i); (c)-(ii); (d)-(iii)
Match the following in Software Engineering: List - I (a) Product Complexity (b) Structured System Analysis (c) Coupling and Cohesion (d) Symbolic Execution List - II (i) Software Requirements Definition (ii) Software Design (iii) Validation Technique (iv) Software Cost Estimation Code: (a) (b) (c) (d)
1.(ii) (iii) (iv) (i)
2.(iii) (i) (iv) (ii)
3.(iv) (i) (ii) (iii)
4. (iii) (iv) (i) (ii)
Software coupling involves dependencies among pieces of software called modules. Which of the following are correct statements with respect to module coupling? P: Common coupling occurs when two modules share the same global data. Q: Control coupling occurs when modules share a composite data structure and use only parts of it. R: Content coupling occurs when one module modifies or relies on the internal working of another module. Choose the correct answer from the code given below:
1.P and Q only
2.P and R only
3.Q and R only
4.All of P, Q and R
Software products need perfective maintenance for which of the following reasons?
1.To rectify bugs observed while the system is in use
2.When the customers need the product to run on new platforms
3.To support new features that users want it to support
4.To overcome wear and tear caused by the repeated use of the software
Structure programming codes include
1.Sequencing
2.Alteration
3.Iteration
4.All of these
The approach used for requirements elicitation in software design and development process:
1.View Points
2.Interview
3.Use-Cases
4.All of these
The process of testing individual components in a software.
1.Interface Testing
2.Partition Testing
3.Unit Testing
4.Structural Testing
The Software Requirement Specification (SRS) is said to be ................ if and only if no subset of individual requirements described in it conflict with each other.
1.Correct
2.Consistent
3.Unambiguous
4.Verifiable
Which of the following is a tool in design phase?
1.Abstraction
2.Refinement
3.Information hiding
4.All of the above
Which of the following is not one of the principles of agile software development method?
1.Customer involvement
2.Embrace change
3.Incremental delivery
4.Following the plan
Which of the following statements is/are false? P: The clean-room strategy to software engineering is based on the incremental software process model. Q: The clean-room strategy to software engineering is one of the ways to overcome “unconscious” copying of copyrighted code.
1. P only
2. Q only
3. Both P and Q
4. Neither P nor Q
Which of the following statements is/are true? P: Software Reengineering is preferable for software products having high failure rates, having poor design and/or having poor code structure. Q: Software Reverse Engineering is the process of analyzing software with the objective of recovering its design and requirement specification.
1.P only
2.Q only c.
3.Both P and Q
4.Neither P nor Q
Which one of the following is not typically provided by Source Code Management Software?
1.Synchronisation
2.Versioning and Revision history
3.Syntax highlighting
4.Project forking