You are on page 1of 40

1.

An architecture enables the software engineer to:


a. analyze the effectiveness of design
b. consider the architectural alternatives
c. reduce the risks
d. all of above
2. Which of following is Architectural design?
a. Data centered
b. Pipe and filter
c. Call and return
d. All of above
3. Architecture once established can be applied for other products as well
a. True
b. False
4. What is the advantage of architecture?
a. Highlights early design decisions
b. Constitutes the relatively small, intellectually graspable mode
c. Both a and b
d. None
5. In Pipe and filter pattern, the set of components called
a. Filters
b. Pipes
c. Both a and b
d. None
6. The architectural style enables us to achieve a program structure that is easy to modify and
scale
a. Pipe and filter
b. Call and return
c. Layered
d. None
7. How many layers are there in layered architectural style?
a. 1
b. 2
c. 3
d. 4
8. Intermediate layer in layered Architectural provide?
a. User interface operation
b. Operating system interfacing
c. Utility services
d. Both b and c
9. ________ act as the middle man between the client component and server component
a. Broker
b. Archetype
c. Task schedular pattern
d. None
10. Which of the following is architectural conflict?
a. Using large grain components improve performance but reduce maintainability.
b. Introducing redundant data improves availability but makes security more difficult.
c. Localizing safety related features usually means more communication so degraded.
performance
d. All of above
11. The UML was designed for describing
a. Architectural design
b. Object oriented system]
c. SRS
d. Both a and b
12. ________is an abstraction (similar to class) that represent one element of system behavior
a. Class diagram
b. Archetype
c. Architectural design
d. None
13. For accomplishing architectural design which of the following step is used?
a. Representing system in context
b. Defining architype
c. Refining architecture into components
d. All of above
14. Which of the following is not included in architectural design decisions?
a. Testing the system
b. Type of application
c. Distribution of system
d. Architectural styles
15. For Safe Home security you must define the following archetypes
a. Node, Controller
b. Detector, Indicator
c. Both a and b
d. None of these
16. During representing the system in context, the target systems are:
a. Superordinate and Subordinate system
b. Peer level system
c. Actors
d. All of above
17. In Call and Return architecture there are ______ substyles?
a. 2
b. 3
c. 4
d. 5
18. The systems that are used by target systems and provide data or processing that are necessary
to complete target system functionality are called
a. Peer level systems
b. Subordinate systems
c. Superordinate systems
d. None
19. Each architectural style that describes the system category that encompass
a. A set of components /connections
b. Constraints
c. Semantic module
d. All of above
20. The process of defining a collection of hardware and software components and their
interfaces to establish the framework for the development of system is called
a. Architectural design
b. Architectural Pattern
c. Architectural Style
d. None

Answer key
1. d 6. b 11. d 16. d
2. d 7. d 12. b 17. a
3. b 8. c 13. d 18. c
4. c 9. a 14. a 19. d
5. a 10. d 15. c 20. a

````````````````````````````````````````````````````````````````````````````````````````````````````

1. Does more functional and non functional requirements means more efficieny of program or it
means more complexity of program?
A) True
B) False

Answer)True
2. Considering the safe home system example which is given in book which of the following is non
functional requirement

A) A three times wrong password attempt


i. turn on alarm
B) A motion detector should turn on alarm if movement detected
C) Motion Sensor Sensitivity
D) A and C Both

Answer)D

3. A programmer makes an app but it does run on Linux platform . Which thing was missing from
developement phase?

A)Functional Requirement
B)Non Functional Requirement
C)Analysis Phase
D)None of these

Answer)B

4. is it possible to make a software having no Non Functional Requirement?

A) Yes it is possible but program will have bugs


B) No
C) May be possible an may be not
D) None of these

Answer)A

5. If developers are running short of time should they neglect non functional requiremnts?

A) Yes , in extreme cases


B)No

Answer)A

6. Which is more important to consider during developement funtional or non functional

A)Functional Requirements
B)Non Functional Requirements

Answer)B as functional requirements are obviously important

7. Are Non Functional Requirements only Condition of good software?

A) No , there are other things also


B) Yes

Answer)A

8. WHich of the following includes desciption of Non Functional and Functional Requirements
A) Swimline Diagram
B) Use Case Diagram
C) Activity Diagram
D) None of these

Answer)B

9. Computation of functional and non functional requirements is done in which phase ?


A) Validation
B) Inception
C) Requirement Analysis Modeling
D) None of these
Answer)C

10. The functional requirements which are not asked by stackholder but developer does it for free are
called?

A) Gold Platted
B) Functional Requirements
C) Non Functional Requirements
D) None of these

Answer)A

11. Are functional and non functional requirements given by stackholder or not?

A) Sometime they are given


B) Few given and few not given
C) Only Functional Requirements are given always
D) None of these

Answer)C

12. Does good functional and non functioal requirements gurantees good sucess criteria?

A) Yes,Always
B) No,Never
C) Yes,Sometime
D) None of these

Answer)C

13. A functional requirement is _


A) Property
B) Attribute
C) Noun
D) Verb

Answer)D

14. Is Functional Reuiqment mandatory

A) Yes
B) No

Answer)A

15. Which of the following testing is included in non functional requirements


A) Performance
B) Stress
C) Usability
D) All of these

Answer)D

16. What is end result of Non functional requirements

A) Software Properties
B) Software Attributes
C) Both of these
D) None of These

Answer)A

17. Non functional requiremtn is an _

A) Property
B) Attribute
C) Noun
D) None of these

Answer)B

```````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1) Functional requirements are the statements of services provide by:


a) System
b) Stake holder
c) User
2) Non –Functional requirements are often applicable to :
a) Individual services
b) Individual system features
c) Whole system
3) User shall be able to search all HEC recognized universities is an example of:
a) Functional requirement
b) Non-Functional requirement
c) Just a Requirement
4) Overall architecture of system is affected by
a) Functional requirement
b) Non-Functional requirement
c) None of above
5) A Non-Functional requirement may result into many functional
requirements:
a) Yes
b) NO

6) Non-Functional requirements arise on the part of:


a) User
b) System functionality
c) Both
7) The answer to ‘’what’’ falls in:
a) Functional requirement
b) Non-Functional requirement
c) Both
8) The answer to ‘’how‘’ falls in:
a) Functional requirement
b) Non-Functional requirement
c) Both

9) A requirement can be both functional and non-functional at same time


a) Yes
b) NO

10) Robustness falls in:


a) Functional requirement
b) Non-Functional requirement
c) None of above
11) Operational Process requirements falls in:
a) Functional requirement
b) Non-Functional requirement
c) None of above

12) User demands a system of 10TB, this is:


a) Functional requirement
b) Non-Functional requirement
c) Space constraint requirement

13) A system must have:


a) Functional requirement
b) Non-Functional requirement
c) Both

14) Building a system with perspective of usability falls in:


a) Functional requirement
b) Non-Functional requirement
c) Product requirement

15) System without a single non-functional requirement is possible:


a) Yes
b) No
Answer Key

1) A
2) C
3) A
4) B
5) A
6) A
7) A
8) B
9) B
10) B
11) B
12) B
13) A
14) B
15) A

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1)Which level DFD is also known as context-level DFD?


a)0 Level
b)1 Level
c)2 Level

2)In which level DFD, we cannot represent procedural logic?


a)0 Level
b)1 Level
c)2 Level
d)All of above

3)What is suitable expansion ratio in level 1 DFD?


a)1:6
b)1:7
c)1:5
d)1:4
4)Context Diagram defines the scope of the system by identifying the
system boundary?
a) Context Diagram
b) Level 0 DFD
c) Level 1 DFD
d) Level 2 DFD

5)Lowest level DFDs may add new data flows to represent exception
handling?
a) True
b) False

6)Objects in a set of DFDs have unique names?


a) True
b) False

7)A data flow may or may not be attached to at least one process?
a) True
b) False

8)External Entities may be a?


a) Source of input data only
b) Source of input data or destination of results
c) Destination of results only
d) Repository of data

9)By levelling a DFD we mean?


a) Splitting it into different levels
b) Make its structure uniform
c) Expanding a process into one with more sub-processes giving more detail
d) Summarizing a DFD to specify only the essentials

10)When a process is expanded during levelling?


a) Data flows entering it are replaced
b) All data stores used by it are replaced
c) All data flows entering it must also enter the levelled DFD
d) All external entities used by it are replaced

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
\\\\\\
Answer keys:
1) a
2) a
3) c
4) a
5) a
6) a
7) b
8) b
9) c
10) c
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. ERD stands for


a) Entity relation diagram
b) Entity refer diagram
c) Exhibit relational diagram
d) None

2. At highest level a DFD is referred as


a) Context level DFD
b) 1ST level DFD
c) 2nd level DFD
d) Scope level DFD

3. ER diagram is related with


a) Entity relation
b) Data flow
c) Foreign key
d) System testing

4. Which of the following gives a logical structure of the database graphically?


a) Entity-relationship diagram
b) Entity diagram
c) Database diagram
d) Architectural representation

5. The entity relationship set is represented in E-R diagram as


a) Double diamonds
b) Undivided rectangles
c) Dashed lines
d) Diamond

6. If you were collecting and storing information about your music collection, an album would be
considered a(n) _____
a) Relation
b) Entity
c) Instance
d) Attribute

7. What term is used to refer to a specific record in your music database; for instance; information
stored about a specific album?
a) Relation
b) Instance
c) Table
d) Column

8. Given the basic ER and relational models, which of the following is INCORRECT?
a) An attribute of an entity can has more than one value
b) An attribute of an entity can be composite
c) In a row of a relational table, an attribute can have more than one value
d) In a row of a relational table, an attribute can have exactly one value or a NULL value

9. In one-to-many relation, the entity on one side is called


a) Child
b) Parent
c) Instance
d) Sub child

10. Which of one is not basic model of all E-R diagram?


a) Entity
b) Attribute
c) Relationship
d) Primary key

KEY
1) A
2) C
3) A
4) A
5) D
6) B
7) B
8) C
9) B
10) D

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. Which one is not secondary in software development?


a. Stakeholders understand after examining early iterations
b. Things become clear as S/W is build.
c. Waterfall method
d. Producing a working program
2. The board spectrum of tasks and techniques that lead to an understanding of requirements is
called?

a) Understanding requirements
b) Establishing ground work
c) Eliciting requirements
d) Requirement engineering
3. Requirement Engineering encompasses how many distinct task?
a) 8
b) 4
c) 11
d) 7
4. In general most projects begin with

a) Cooking
b) Identify requirements
c) business needs being defined
d) Business meetings
5. The problem of customer not being sure of what is need is problem of

a) Knowledge
b) Making sense
c) Understanding
d) Misconception

6. Elaboration focuses on
a) Expanding information of inception and elicitation
b) Creation and refinement
c) Developing refined model
d) Business domain entities

7. The approach in negotiation is


a) Recursive
b) Linear
c) Iterative
d) Circular
8. Specification means
a) Different things to different people
b) Essential for our special needs
c) A detailed description for design criteria
d) Naming explicitly
9. The work products produced are assessed for
a) Verification
b) Validation
c) Specification
d) Testing
10. The primary requirement validation mechanism is the
a) Tactical review
b) Experiment review
c) Testing review
d) Technical review

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1)In DFD, symbol is used for

a)External Entry

b)Process

c)Data Flow

d)Data Store

2)In DFD, the symbol is used for

a)External Entry

b)Process

c)Data Flow

d)Data Store

3)In DFD, the symbol is used for

a)External Entry

b)Process

c)Data Flow

d)Data Store

4)In DFD, the symbol is used for

a)External Entry

b)Process

c)Data Flow
d)Data Store

5)Which level DFD is also known as context-level DFD?

a)0 Level

b)1 Level

c)2 Level

6)In which level DFD, we cannot represent procedural logic?

a)0 Level

b)1 Level

c)2 Level

d)All of above

7)What is suitable expansion ratio in level 1 DFD?

a)1:6

b)1:7

c)1:5

d)1:4

8)The expansion ratio _____ as the levels of DFD increase.

a)increases

b)decreases

c)remains the same

9)Which things are present in DSEC.

a)pseudocode (PDL)

b)tables

c)diagrams and/or charts

d)all of above

10)Can two icons in DFD have same name?

a) Yes

b) No

Answer Key

1) a
2) b

3) c

4) d

5) a

6) a

7) c

8) b

9) d

10) b

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1.Which type of abstraction is shown by data design?

 Low level abstraction


 Middle level abstraction
 High level abstraction

2.How many approaches of data design to implement?

 One
 Two
 Three

4.Which type of key is used to enforce entity integrity by uniquely identifying entity instances?

 Foreign key
 Primary key
 Composite key

3.How many components of data design?

 2
 3
 4

5.Which type of key is used to enforce referential integrity by completing an association b/w two
entities.
 Foreign key
 Primary key
 Composite key

6.How entities are described?

 By records
 By attributes
 By columns

7.Which type of key is used to identify more than one attributes uniquely?

 Foreign key
 Primary key
 Composite key

8.When primary key is large or complex, then which type of key is used?

 Foreign key
 Artificial key
 Composite key

9.The ----------------key has no repeated values.

 Foreign key
 Primary key
 Composite key

10.The entity that depend upon another entity is

 Weak entity
 Strong entity
 Associative entity

11.The entity that are relate to another entity is

 Strong entity
 Weak entity
 Associative entity

12.The independent entity is

 Strong entity
 Weak entity
 Associative entity

13.The relationship b/w strong entities is

 Strong relationship
 Weak relationship
 Moderate relationship

14.The attributes whose value can be calculated from related attribute.

 Single attribute
 Multilevel attribute
 Derived attribute

15.Relationships are among

 Attributes
 Entities
 Keys

16.Single entity relationship

 Unary
 Ternary
 Binary

17.Double entity relationship

 Unary
 Ternary
 Binary

18.Triple entity relationship

 Unary
 Ternary
 Binary

19.--------------- specify how many instances of an entity relate to one instance of another entity.

 Cardinality
 Relationship
 Diagram

20. Which table is used to combine (m-n) relationship?

 Binary table
 Truth table
 Auxiliary table
1) c 2) b 3) b 4) b 5) a
6) b 7) c 8) b 9) b 10) a
11) c 12) a 13) a 14) c 15) b
16) a 17) c 18) b 19) a 20) c

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. Use case descriptions consists of interaction among which of the following ?


a) Product
b) Use case
c) Actor
d) Product & Actor
2. A UML diagram that facilitates requirements gathering and interacts between system and
external users, is called as
a) Flowchart diagram
b) Sequence diagram
c) Use case diagram
d) Data flow diagram
3. Which of these is best
a) Brief
b) Fully dressed
c) UC description
d) Casual
4. The first two requirements engineering tasks that provide you with the information you’ll need
to begin writing use cases are
a) inception and elicitation
b) inception and elaboration
c) specification and elaboration
d) elaboration and elicitation
5. Which UML diagram below cannot be used to demonstrate the detailed behavior of a use case
a) Activity diagram
b) Sequence diagram
c) Class diagram
d) Swim lane diagram
6. In use case diagram ,which component can be placed inside the system boundary
a) Primary actors
b) Secondary actors
c) Relationships
d) Users
7. The <<include>> relationship shows :
a) Behavior of one use case that does not stand alone but is incorporated as part of some
larger use case
b) One use case includes the behavior of an external actor in its behavior
c) One use case inherits the behavior of another use case
d) That a use cases optionally provides additional functionality to another use case at certain
points
8. The <<extend>> relationship shows :
a) Behavior of one use case that does not stand alone but is incorporated as part of some
larger use case
b) One use case includes the behavior of an external actor in its behavior
c) One use case inherits the behavior of another use case
d) That a use cases optionally provides additional functionality to another use case at certain
points
9. The generalization relationship shows:
a) Behavior of one use case that does not stand alone but is incorporated as part of some
larger use case
b) One use case includes the behavior of an external actor in its behavior
c) One use case inherits the behavior of another use case
d) That a use cases optionally provides additional functionality to another use case at certain
points
10. Which description is inappropriate ?
a) A use case is a type of agent that interacts with a product
b) An actor is a type of complete interaction between product and its environment
c) All of the mentioned
d) None of the mentioned

11. Use case models can be summarized under which of these category ?

a) Use case Diagram


b) Use case Description
c) All of the mentioned
d) None of the mentioned

Answers :
1. d
2. c
3. b
4. a
5. c
6. c
7. a
8. d
9. c
10. c
11. c

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

I. A diagram that represents active states for each class and the
events that cause changes between these active states
a)activity b) DFD c) UML State d)CFD
II. A state that is simply the current status of all of an object’s
attributes.
a)active b) DFD c) CFD d)passive
III. A state of an object that indicates the current status of the object as
it undergoes a continuing transformation or processing.
a)active b) DFD c) CFD d)passive
IV. In state diagram starting state is indicated as:
a) b) c) d)
V. State diagram has starting state.
a)only one b) only two c) more than one d)only three
VI. State diagram has ending state.
a)one or more than one b) two c) one d)only three

VII. Transition is indicated as:


a) b) c) d)
VIII. Variables that set states are known as:
a)state variables b) start variables c) end variables d)none
IX. Method of state diagram includes:
a)state variables b) state name c) events d)all of these
X. The movement from one state to another is:
a)state b) event c)transition state d) action
XI. Process that occurs as a consequence of making a transition is:
a)state b) event c)transition state d) action
XII. An occurrence that causes the system to exhibit some predictable
form of behavior:
a)state b) event c)transition state d) action
XIII. A set of observable circumstances that characterizes the behavior
of a system at a given time:
a)state b) event c)transition state d) action
XIV. To specify behaviour we use:
a)ERD b) data dictionary c) UML State d)none
XV. A diagram that represents a series of actions or flow of control of a
system is known as:
a)activity b) DFD c) State d)CFD
XVI. In activity diagram starting state is indicated as:
a) b) c) d)
XVII. Processing flow can be described by:
a)activity diagram b) DFD c) ERD d) CFD

XVIII. Decision symbol is represented as:


a) b) c) d)
XIX. Activity or action state is represented as:
a) b) c) d)
XX. Steps in USE CASE diagram can be described by:
a)activity diagram b) DFD c) ERD d) CFD

```````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1)Functional requirements are describing the systems:


a)performance b)applications c)behavior d)software
2)Non functional requirements are elaborating the systems:
a)performance b)applications c)behavior d)software
3)Functional requirements depend upon the:
a)users b)type of system c) type of software d)all
4)Non functional requirements are classified into further how many
requirements:
a)1 b)2 c)3 d)4
5)Understandability and implicitness are which requirements problem:
a)domain b)product c)external d)none
6)Speed ,execution and reliability are requirements:
a)domain b)product c)external d)none
7)Process standard use ,implementation requirements are:
a)domain b)product c)external d)organizational
8)Interoperability, legislative requirements are:
a)domain b)product c)external d)organizational
9)Which is more critical:
a)functional b)non functional c)system d)none
10)Requirements should be:
a)complete b)consistent c)vary d) a & b
Answers:
1)c 2)a 3)d 4)c 5)a 6)b 7)d 8)c 9)b 10)d

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1.At project inception, what you mainly do is

a) Basic understanding of a problem b) Question the domain

c) Regular interviews d) None of these

2.Elicitation is related to

a) Workers b) domain

c) Stakeholders d) None of these

3.Elaboration is related to

a) Analysis Model b) Agility

c) Conformity d) None of these

4.Negotitation results

a) Work chunks b) domain

c) Problematic d) Realistic System

5.Elicitation is not related to

a) Workers b) both a and b

c) Stakeholders d) None of these

6.A collection of use cases lies in

a) Specification b) Elaboration
c) Elicitation d) None of these

7.Which requirement do you think is Exciting requirement?

a) Security b) Login

c) Data design d) Both a and b

8.Data flow diagram is

a) Data oriented Model b) domain

c) Flow oriented Analysis Model d) None of these

9.One of the Goal of eliciting Requirement is

a) Complete mere tasks b) Identify the Problem

c)Woo the Stakeholders d) None of these

10.Requirement Engineering is necessary for

a) Study of Domain b) Software Development

c) Stakeholders d) None of these

Answers:

1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
a c A d a a d c b B

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. Each Architectural style encompasses a set of components that:


a) perform a function required by a system
b) enables communication among components
c) define how components can be integrated to form the system
d) enable a designer to understand the overall properties of a system by analyzing the known
properties of its constituent parts
2. Each Architectural style encompasses a set of connectors that:
a) perform a function required by a system
b) enables communication among components
c) define how components can be integrated to form the system
d) enable a designer to understand the overall properties of a system by analyzing the known
properties of its constituent parts
3. Each Architectural style encompasses a set of constraints that:
a) perform a function required by a system
b) enables communication among components
c) define how components can be integrated to form the system
d) enable a designer to understand the overall properties of a system by analyzing the known
properties of its constituent parts
4. Each Architectural style encompasses a set of semantic models that:
a) perform a function required by a system
b) enables communication among components
c) define how components can be integrated to form the system
d) enable a designer to understand the overall properties of a system by analyzing the known
properties of its constituent parts
5. An architectural pattern differs from style as the scope of a pattern is:
a) Less broad
b) focusing on one aspect of the architecture
c) focusing on the architecture entirely
d) both a and b
6. Pattern imposes a rule on the architecture, describing how the software will handle some aspect
of its functionality at the
a) External level
b) Internal level
c) Infrastructure level
d) Conceptual level
7. Architectural style handles aspects as:
a) synchronization
b) concurrency
c) interrupts
d) all of above
8. Call and Return Architectures enables you to achieve a program structure that is relatively easy
to modify and:
a) scale
b) concurrent
c) manage
d) regulate
9. This classic program structure decomposes function into a control hierarchy where a “main”
program invokes a number of program components, which in turn may invoke still other
components:
a) subprogram architecture
b) data and design architecture
c) object oriented architecture
d) remote procedure call architectures
10. The components of a main program are distributed across multiple computers on a network is:
a) subprogram architecture
b) data and design architecture
c) object oriented architecture
d) remote procedure call architectures
11. One source for the derivation and refinement of architectural components is:
a) application domain
b) behavioral domain
c) architectural style domain
d) architectural pattern domain
12. Software components includes database components as well as:
a) memory management components
b) communication components
c) task management components
d) all of above
13. In many software applications, a single data item triggers one or a number of information flows
that effect a function implied by the triggering data item, this is called:
a) Transaction mapping
b) Transform mapping
c) All of above
d) None of above
14. A set of design steps that allows a DFD with transform flow characteristics to be mapped into a
specific architectural style is:
a) Transaction mapping
b) Transform mapping
c) All of above
d) None of above

Answer key here:

1. A)
2. B)
3. C)
4. D)
5. D)
6. C)
7. D)
8. A)
9. A)
10. D)
11. A)
12. D)
13. A)
14. B)
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. The broad spectrum of tasks and techniques that lead to an _____________________


is called requirements engineering.
(a) Meeting of requirements (b) changing requirements
(c) Understanding of requirements (d) none

2. Requirements engineering encompass ___________ tasks.


(a) 5 (b) 7 (c) 9 (d) None

3. Does the need evolve over time? This question is Part of _______________task.
(a) Inception (b) Elicitation (c) Negotiation (d) Validation

4. The requirements change over time is called as______________


(a) Inception (b) requirement management
(c) specification (d) Problems of volatility

5. Which of the following is not task of requirement engineering?


(a) Inception (b) Elicitation (c) Design (d) Validation

6. The information obtained from the customer during inception and elicitation is expanded and
refined during ___________
(a) Negotiation (b) specification (c) Design (d) elaboration

7. The term _____________ means different things to different people.


(a) Negotiation (b) specification (c) validation (d) elaboration

8. SRS stands for______________


(a) Software requirement specification (b) structured requirement specification
(c) software requirement simplifying (d) none

9. _______________is a collection of user scenarios and little else.


(a) Negotiation (b) specification (c) validation (d) elaboration

10. Formal requirement management is only for __________________project.


(a) Small (b) large (c) both a and b (d) none

11. “Anyone who benefits in a direct or indirect way from the system which is being developed.”
(a) Software engineer (b) Stack holder (c) manager (d) none

12. The most important in software engineering process is____________


(a) Software engineer (b) Stack holder (c) manager (d) User
Answer key

1. c 2. b 3. a 4. d
5. c 6. d 7. b 8. a
9. b 10. b 11. b 12. d

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

No. Questions (A) (B) (C) (D)


DFDs are used to show how _____
(1). flows through a sequence of Data Activities Steps None
processing
steps.
diamond shaped
(2). In a DFD external entities are Rectangle Ellipse circle
represented by a box

(3). A .... is represented graphically by an Process Entity Level Flow


arrow into or out of a process

(4). Objects in a set of DFD’s have unique True False None


names

(5). An example of a data input would be Employee


Payroll check Tax payment Tax report
a(n) change form

Which documentation technique


System
(6). illustrates the flow of documents and Data flow Document Process
information among areas of diagram flowchart flowchart flowchart
responsibility within an organization?
Data sources Transformation
(7). What do the circles on a data flow Data flows Data stores
diagram represent? and destinations processes

Context
(8). At highest level, a DFD is referred to Scope diagram Level 1 DFD Level 2 DFD
as diagram
diamond shaped
(9). In a dfd, an originator or data receiver Rectangle Square circle
is usually designated by box

all of the
(10). A data model contains data object Attributes Relationships
mentioned

Answers:
1. a 2. a 3. d 4. a 5.d

6. b 7. a 8. b 9. a 10. d

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1) What is necessary for a statement to be a functional requirement?

a)State the services the system should provide

b)State a performance characteristic of the system

c)State what the system should not do

d)Both a and b

2) Identify the functional requirement in the following.

a)System will upload Whatsapp backup to Google drive.

b)System will upload backup every week.

c)System will upload backup at exactly 2 a.m.

d)Backup will include images and videos.

3) Identify the functional requirement in the following.


a)School shall provide an online fee payment facility through it's website

b)Meetings with prison inmates shall be conducted on Friday

c)Patients will be able to make appointments through email

d)Both a and c

4) Functional requirements depend on

a)The type of software

b)The type of users

c)The type of system for which the software is designed

d)All of above

5) Identify the funtional requirement in the following

a)Every user can access their account on any device connected to the internet

b)User shall access the account by his or her 12-digit password

c)Users will have they personal accounts

d)All of above

6) Which of the following is a non-functional requirement constraint (excluding process requirements)?

a)System Representations

b)The IDE used to develope the software

c)The type of procedural interface designed

d)The levels of DFD exploded

7) Which of the following is a process non-functional requirement?

a)I/O device capability

b)The IDE used

c)Response time

d)Storage capacity

8) Which of the following is not possible?

a)Non-functional requirements may affect the overall architecture

b)Non-functional requirements may affect the development process

c)Non-fucntional requirements may restrict existing requirements

d)A non-functional requirement may generate a number of functional requirements


9) Non-functional requirements are classified into how many categories?

a)3 b)4 c)5 d)6

10) Identify the non-functional requirement in the following

a)Police officers will have an all-time access to the security camera footage room

b)They will have the liberty to interrogate any member of the organization

c)The interrogations have to be non-violent

d)The primary suspects will be at their constant watch

Answer Key

1) a

2) a

3) d

4) d

5) d

6) a

7) b

8) b

9) a

10) c

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. In software modeling, CFD stands for:


(A) Context flow diagram (B) Control flow diagram (C) Central
flow diagram (D) Control flow Data
2. Control flow modeling represents:
(A) events (B) input-output C(C) use -cases (D) requirements
3. The CSPEC can be:
(A) State transition table (B) decision table (C) activation
table (D) all above
4. CSPEC stands for:
(A) Control specification(B) control speculation(C) none
(D) both a and b
5. CFD is a part of:
(A) Architectural modeling(B)behavioral modeling (C) data
modeling (D) class modeling
6. processes in CFD are shown by:
(A) double circles(B)double squares (C) straight boxes(D)
dotted circles
7. CSPEC table is a combination of:
(A)input-output (B)events-states (C) requirement-usecase
(D)all above
8.In CFD event is a Boolean condition that can be ascertained
by:
(A)listing all sensors(B)listing all interrupt conditions (C)
listing all data conditions(D)all above
9.Main difference between DFD and CFD is:
(A)requirements & usecases(B)diagram representation (C)
dfd converts input to output & cfd tansform events
states(D)both b & c

10.In CSPEC table what 0 & 1 represents:


(A)enabled & not active (B)not active & enabled (C)both
means yes (D)present & absent
Key:
1.(b) 2. ( a ) 3.(d) 4.(a) 5.(b)
6.(d) 7.(b) 8(d) 9.(d) 10.(b)

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. In Activity Diagram horizontal lines indicates

a) System Function

b) Parallel Activities

c) Flow through the system

d) Flow of data

2. State diagrams are the notation used for

a) System modeling

b) System behavior

c) Process modeling

d) Behavioral modeling

3. Arrows in state diagram represents

a) Change of state

b) Change in requirement

c) Flow of data

d) flow of informationally

4. In activity diagram, an arrow pointing to a filled circle nested inside another represents

a) Initial state

b) Final state

c) Object flow
d) Action flow

5. In state diagram rounded rectangle is used to represent

a) Class

b) State

c) Transition

d) Activity

6. Activity and state diagram are which type of diagrams in UML

a) Behavior diagram

b) Structure diagram

c) Data flow diagram

d) Class diagrams

7. Activity diagram illustrates

a) Static structure of a system

b) Functionality of a system

c) Dynamic nature of a system

d) Interaction among classes

8. Solid arrows in state diagram represents

a) Initial state

b) Final state

c) State

d) Transition

9. In activity and state diagram, which symbol is used for decision

a) Square

b) Rectangle
c) Circle

d) Diamond

10. which one of the following is true about state diagram

a) It is a structure diagram

b) It shows the functionality of system

c) Triangle symbol is used as decision symbol

d) None of the above

ANSWERS

1. B

2. D

3. A

4. B

5. B

6. A

7. C

8. D

9. D

10.D

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. Description of external entities that interact with the software and the nature of their interaction are
needed for the implementation of:

A)pattern B)Context C)Genre

2. Top-level abstractions that represent pivotal elements of the system’s behavior or function are
called:

A)archetypes B)Actors C)Genre


3. Architectural design is accomplished using_____ distinct steps:

A)2 B)3 C)4

4. In SafeHome home security function, you might define the following archetypes:

A)Node B)indicator C)Detector D)All

5. Pre-Step for refining the system architecture into components is:

A)Establishment of Context B)Defining Archetypes C)Instantiation Description

6. ______ is not a part of Architecture Context Diagram (ACD) :

A)Peer Level Systems B)Actors C)Genre

7. Those systems that are used by the target system and provide data or processing that are necessary
to complete target system functionality are:

A)Peer Level Systems B)Subordinate systems C)Superordinate systems

8. UML notation used for:

A)Archetypes B)ACD C)none

9. Which one isn’t a source for the derivation and refinement of components.

A)Application Domain B)Infrastructure Domain C) None

10. The ______________ element is usually depicted as a set of interconnected subsystems, often
derived from analysis packages within the requirements model.

A) Architecture Design B)Interface Design C)Component Level Design

KEY:

1. B

2. A

3. C

4. D

5. B

6. C

7. B
8. A

9. C

10.A

``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````

1. The requirements for a system that describes what the system should do are
a) Non-Functional Requirements
b) Functional Requirements
c) True Requirements
d) None
2. The requirements that are not directly concerned with the specific services delivered by the
system to its users are
a) Non-Functional Requirements
b) Functional Requirements
c) Full Requirements
d) None
3. In principle, the functional requirements specification of a system should be both
a) Nice and Clear
b) Complete and Consistent
c) Large and Typed
d) All of the above
4. A person or role that is affected by the system in some way is
a) Programmer
b) Stakeholder
c) Analyst
d) Project Manager
5. Requirements, such as performance, security or availability fall in the class of
a) Project Requirements
b) Non-Functional Requirements
c) Functional Requirements
d) None
6. The requirements that specify or constrain the behavior of the software
a) Organizational Requirements
b) Product Requirements
c) External Requirements
d) None
7. The requirements that are broad system requirements derived from policies and procedures in
the customer’s and developer’s organization
a) Organizational Requirements
b) Product Requirements
c) External Requirements
d) Behavioral Requirements
8. The requirements that are derived from factors external to the system and its development
process
a) Organizational Requirements
b) Product Requirements
c) Factors Requirements
d) External Requirements
9. In practice, for large, complex systems, it is practically impossible to achieve requirements
consistency and completeness because
a) Easy to make mistakes and omissions when writing specifications
b) There are many stakeholders in a large system
c) Both (a) & (b)
d) None
10. The requirements that are derived from the application domain of the system rather than from
the specific needs of system users
a) Application Requirements
b) Domain Requirements
c) Testing Requirements
d) None

You might also like