Professional Documents
Culture Documents
ﺤ ﻣ
3. Software system should meet users’ needs. This characteristic is known as:
ﻤ
a. usable b. usefu c. flexible d. affordable
ﺪ
4. One of the following is not a characteristic of legacy systems.
a. Large b. critical to business c. difficult to understand d. easy to
maintain
life cycle.
a. Incremental development ﺍ
5. ……………… model is a software development model that has purely sequential
carried out.
ﻣ ﺮ
6. A …………………… is a condition that must be hold before a use case can be
ﺎ ﻀ
a. Precondition b. postcondition c. compound condition d. nested condition
11.Identify which of the following element is not associated with Use Case
diagrams:
a. an actor b. extend stereotype
c. include stereotype d. aggregate relationship
12. Functional requirements are those requirements that specify the _____ of a
system.
a. reliability b. behavior c. usability d. all of the above
Activity Diagrams:
a. associations b. initial node, final node ﻣ
13.Identify which of the following modeling element is not associated with
ﺤ
c. swimlanes d. fork and join
nodes
a. iterative b. product
ﺪ ﻤ
14.Which one is not a lifecycle model for software development process?
c. waterfall d. incremental
ﻣ ﺮ
16.During the search process for classes, the following are useful sources of objects:
ﻀ
a. Tangible objects b. roles c. organizational units d. all of the above
ﻥ ﺎ
17.In class diagram, ___________ represents how many of one sort of thing can
be related to another sort of thing.
a. Multiplicity b. class c. association d. role
Page 2
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﻣ
a. External factors b. speed factors c. internal factors d. security factors
ﺪ
b. Functional technical requirement
c. Non-functional look and feel requirement
d. Non-functional usability requirement
business:
ﻟ ﺍ
24.In a car rental company, “renting a car” is one of the _________of the
ﺮ
a. Constraints b. domains c. rules d. processes
ﻀ ﻣ
25.A software characteristic that is related to ease of use is called:
a. Maintainability
b. Malleability
ﺎ
c. Flexibility
ﻥ
26.The activity where requirements are categorized and prioritized, and examined
for their properties of consistency, completeness and non-ambiguity is called:
d. Elicitation
e. Gathering
f. Analysis and negotiation
g. Validation
27.Special requirements that come about because of people involved in the
product’s development and operation:
a. Cultural and political
b. Performance
c. Maintainability
d. Operational
Page 3
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﻣ
h. Activity
i. Use case
ﺤ
j. Class
k. Object
n. Substitutability
ﻟ ﺍ
31.The “exclude” stereotype is related to which part of the use case?
ﻣ ﺮ
o. Pre-condition
p. Post-condition
q. Main success scenarios
ﻀ
r. Alternative scenarios
ﺎ
32.……………………. causes transitions in an activity diagram
ﻥ
s. Synchronization bar
t. Event
u. Completion of an activity
v. Guard
33.In a car rental company, “renting a car” is one of the …………...of the business:
a. Constraints b. Rules c. domains d. Processes
34.A ………… is an association, in which both of its ends terminate on the same class.
a. link b. qualified association c. recursive association d. derived association
35. One of the following is not an important characteristic that effects software development
a. size b. malleability c. complexity d. integrity
Page 4
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
36. ……………..is a collection of computer programs and related data that provide
instructions to tell computer what to do.
a. software b. system c. hardware d. domain
37. ………………is made up of those things which are not part of the system, but
which can either affect the system or be affected by it.
a. system b. system boundary c. system’s environment d. domain
ﺤ ﻣ
38. System an assembly of components that are connected together in an organised way.
ﺪ ﻤ
39. One of the characteristics that effect software development and which
ﻟ ﺍ
ﻣ ﺮ
ﺎ ﻀ
ﻥ
Page 5
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﻣ
3. Guards are used in ……………. diagram.
a. State-chart b. sequence c. activity d. all of them
ﻤ ﺤ
4. One of architecture view which addresses concurrent aspects of the
system at run-time, including all system processes and system start-up and shut-
ﺪ
down.
a. logical view b. process view c. deployment view d. functional view
ﺍ
5. Types of systems that are large, complex, integrated with other systems and
require many diverse interfaces……………….
ﻟ
a. legacy systems b. critical systems c. enterprise systems d. embedded systems
ﻣ ﺮ
6. ………………….factors concern of people-technology relationship. It's a
technological artifact that supports human activities.
a. Process related b. task related c. person-related d. product-related human
ﺎ ﻀ
7. One of person-related individual factors, where the characteristics of
individuals matching characteristics of a job is ………………..
ﻥ
a. motivation b. competence c. communication d. complexity
10. If risk is seen as low probability and low cost, project manager recommend
that risk be accepted. This strategy is known as………..:
a. risk reduction b. risk transfer c. risk avoidance d. risk retention
Page 6
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
12. "Do not use Java, because the software engineers have no experience
of Java." is an example of …………...
a. risk retention b. risk avoidance c. risk transfer d. risk reduction
ﻣ
a. use case diagram b. package diagram c. class diagram d. activity diagram
ﺤ
14. ……….. is the process of exercising software to check that it does what it is
supposed to.
a. Testing b. analysis c. design
ﺪ ﻤ
15. ………. is the formal testing of an entire system, conducted by a customer, to
determine whether it satisfies its acceptance criteria and thus whether the
ﺍ
customer should accept the system.
a. system testing b. acceptance testing c. unit testing d. stress testing
ﺮ ﻟ
16.…………... is a software quality factor that determine how well the software
does what the customer wants;
ﻣ
a. Portability b. Correctness c. Flexibility d. Maintainability
ﺎ ﻀ
17.…………... testing occurs during developmental testing and system
maintenance, and checks that fixing one bug has not introduced others.
a. Regression b. Unit c. System d. acceptance
ﻥ
18.An object oriented metric that is defined as the number of relationships the
class has with other classes.
a. DIT b. NOC c. RFC d. CBO
Page 7
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
21.A boolean statement which must be true before executing a code, and it is the
client responsibility to check that it is true:
a. assertion b. invariant c. pre-condition d. post-condition
ﻟ ﺍ
25.Scoring the likelihood of each risk as ‘high’ or ‘low’ and its impact as ‘high’ or
‘low’, and only worry about the high-risk, high-cost events, this approach is
ﺮ
used to …………… .
a. Identify risk b. asses risk seriousness c. avoid risk d. accept risk
ﻀ ﻣ
26.A claim that something is either true or false is known as:…………..
ﺎ
a. invariant b. DBC c. inertial d. assertion
ﻥ
27.………….Is a project management chart that emphasise the times at which
things happen.
a. Gantt chart b. pert chart c. quality circle d. state chart
30.One of the following software characteristics does not affect the development process:
a. Malleability b. Complexity c. Size d. flexibility
Page 8
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
31.A software that can be easily modified to meet the user needs is
a.Flexible b. Reliable c. Available d. Usable
33.The model that assumes that we can perform analysis, design, implementation
ﻣ
and testing in one sequence is called ……………. model.
b. iterative b. waterfall c. incremental d. spiral
ﻤ ﺤ
34.The diagram that is used to model the coordination and sequencing of actions
in order to achieve a given purpose is ………
ﺍ
35.The Law of Demeter states that a method, say m, in a class A should not refer
to another class, say B, unless B is the class of:
ﻟ
c. an instance variable used in the method m;
d. a parameter to the method m;
ﻣ
f. a and b
ﺮ
e. An object returned by the method m;
ﻀ
36.Which of the following strategies for implementing "use cases" is more
ﺎ
difficult
ﻥ
a.Using a class for each actor b. Using a class for each use case
37.___________ for (of) a module is a service that the module needs in order to
work correctly.
a. context dependency b. interface c. interconnection d. structure
Page 9
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
40.In a state chart diagram, ___________ is something that the object does, such
as sending a message to itself or to another object.
a.An action b. an event c. a state
ﺤ ﻣ
d. Self-transition
a. Customer
the above
b. User
ﺪ ﻤ
41.A ___________ is the person who pays for a software system.
c. Domain expert d. None of
ﺍ
42.A ___________ is an association, both of whose ends terminate on the same class.
a. Link b. Qualified c. Recursive d. Derived
a.Time b. Call
ﻟ
43.An entry and exit events are ___________ events.
ﺮ
c. Signal d. Change
ﻀ ﻣ
44. ………….diagram is not considered as a behavioral UML diagram.
a. Class b. Communication c. Sequence d. Activity
ﻥ ﺎ
45. Package diagrams are designed for:
a. organizing a large project into components
b. depicting the overall structure of a system
c. assisting testing
d. all of the bove
Page 10
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﻣ
a. aggregation b. composition c. inheritance d. recursive association
ﺤ
49. Which design pattern is used to create complex instance hierarchy.
a. creator b. Factory c. Singleton d. MVC
ﺍ
52. A Project manager decides to send all software engineers on a UML training
course so all the has a common understanding of current best practice in using
ﻟ
UML. This strategy to deal with such risk is known as……………….
a. risk retention
ﻣ ﺮ
b. risk transfer c. risk reduction d. risk avoidance
52. The degree to which the employee receives information about the
ﻀ
effectiveness of their performance is known as………………..
ﻥ ﺎ
a. skill variety b. feedback c. autonomy d. task identity
53. One of the following is not a factor that effect functioning of a team
a. team structure
c. team leadership
b. team goals
d. team communication
Page 11
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
56. The online registration should be able to handle 100 students at the same
time. This is an example of …………..requirement.
a. usability b. look and feel c. performance d. operational
57. ………… are intruders who test their skills against the security measures of a
system for their personal pleasure.
a. hackers b. competitors c. Fraudsters d. developer
ﻣ
58. Business .................... define what is done in a business, by whom, in what
order, needing which resources, and with what consequences
ﺤ
a. domain b. rules c. resources d. processes
ﺪ ﻤ
59. In UML diagrams guard is represented using ............... brackets.
d. {...}
ﺍ
a. sequence b. use case c. class d. activity
60. ………….. is something done to an object such as sending it a message
ﻟ
a. a transition b. an event c. an action d. a state
ﻣ
a. signal event b. change event c. time event d. call event
ﺎ ﻀ
62. An alarm system produces sound if there is a lot of smokes. This is an example of:
a. signal event b. change event c. time event d. call event
ﻥ
63.Which off the following is a drawback (disadvantage) of the water fall model
a. A working version of the system is not available until late in the testing activity
a. Any error detected in the working version could be very costly to fix.
b. Rarely works in real life
c. All of the above.
64.When DbC is used, any problem that might occur at run-time is the
responsibility of
a. Either the client or the supplier.
b. The supplier.
c. Either the client or the supplier, but not both.
d. The client.
Page 12
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
b. Validation
c. Both a and b
d. None of the above
ﺪ ﻤ
ﺍ
67.Which of the following is the most commonly used risk management strategy
a. Risk avoidance
ﻟ
b. Risk retention
ﺮ
c. Risk reduction
d. Risk Transfer
ﻀ ﻣ
68.The risks that may negatively affect a project but which derive from the client
and/or user environments are called
ﺎ
a. Project risks
b. Technical risks
ﺤ ﻣ
ﻤ
d. All of the above
ﺪ
73.The interfaces needed by a component to supply its services are called
a. Provided interfaces
b. Required interfaces
ﺍ
c. Needed interfaces
ﻟ
d. Inherited interfaces
ﺮ
74.A component is
a. A replaceable piece of software
ﻣ
b. A reusable piece of software
ﻀ
c. a and b
d. None of the above
ﻥ ﺎ
75.One of the following is not a SQF that is affected by product transition
requirement
a. Testability
b. Portability
c. Reusability
d. Interoperability
76.Maintainability is measured in
a. Defects per KLOC
b. MTTC
c. Run time errors per second
d. Function points
Page 14
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﺪ ﻤ
79.……………… is a precise and testable statement of a requirement .
ﺍ
a. Fit criteria
b. Non-functional requirement
c. Artifact
d. Deliverables
ﺮ ﻟ
ﻀ
a. Activity
b. Use case ﻣ
80.Sequence diagrams and collaboration diagrams are known as ………… diagram.
ﻥ ﺎ
c. Interaction
d. Structural
83.A document that cross-references the different words that are to be used on
the project, and explains how they interrelate is called:
a. Glossary
b. Scenario
c. Activity diagram
d. Class diagram
ﻣ
commercial transactions take place.
a. Firewall
b. Computer security
c. Threat
d. E-commerce
ﻤ ﺤ
85.The main function of a prototype is to …………
a. Facilitate requirements analysis ﺪ
ﺍ
b. Reduce the risk of the requirements being identified incorrectly
c. Test the software system after it is being complete
ﻟ
d. a and b
a. developer
ﺮ
86. Acceptance tests are normally conducted by the
ﻣ
b. end users c. test team d. systems engineers
ﺎ ﻀ
87.Functional analysis is a ______ testing technique, whereas functional testing is
a _________ testing technique.
ﻥ
a. static, dynamic b. unit, integration c. dynamic, static d. integration, unit
metric?
ﺤ ﻣ
92.Which of following are advantages of using LOC (lines of code) as a size-oriented
ﻤ
a. LOC can be computed before a design is completed. b. LOC is easily
computed
ﺪ
c. LOC is a language dependent measure. d. LOC is a language independent measure.
ﺍ
93.Which of the following need to be assessed during unit testing?
a. algorithmic performance and code stability
b. error handling
ﻣ
a. correctness, maintainability, integrity, usability
b. correctness, maintainability, size, satisfaction
ﻀ
c. reliability, maintainability, integrity, sales
d. correctness, business relevance, integrity, usability
ﻥ ﺎ
95.Which of the following are advantages of using function points (FP) as a
measure of the functionality delivered by a software application?
a. FP is easily computed. b. FP is a language dependent measure.
c. FP is a language independent measure.
d. FP can be computed before a design is completed.
Page 17
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
ﻣ
d. all of the mentioned choices
ﺤ
99.In the UML, a way of adding detail to a model element is known as:
a. Expansion b. Stereotype
c. Elimination
ﺪ ﻤ
d. None of the above
100. Which of the following models shows the possible life histories of an object
of a class?
ﺍ
a. Static View b. Use Case View
c. State Machine View d. None of the above
ﺮ
integrity of the system is:
ﻟ
101. If a computer system have four major types of threats, then the maximum
ﻣ
a. 100 b. 1
b. 4 c. 2
ﺎ ﻀ
102. Black box testing alone is not enough because:
a. indicate poor coverage levels
ﻥ
b. may not reveal that a customer requirement has been omitted in
implementation
c. not suitable for all types of systems
d. all of the above
106. There are several different types of risks that impinge on projects. Those
that are often far harder to identify, as they may come from areas outside the
project manager’s control, are known as:
a. Technical risks b. Project risks
ﻣ
c. Quality risks d. Business risks
ﺤ
107. The estimated effort is measured in:
a. KLOC b. Person-months
c. months d. cyclomatic metric
ﺪ ﻤ
108. In a Use Case diagram, which stereotype is used when 2 or more Use Cases
share the same behavior?
ﺍ
a. <<extend>> b. <<include>>
c. <<share>> d. <<access>>
ﺮ
a. class diagram
ﻟ
109. An object diagram may be viewed as an instance of:
b. activity diagram
ﻣ
c. structural diagram d. non of the above
ﻀ
110. Integrity of a software product could be measured by considering:
a. denial of service b. accidental attack
ﻥ ﺎ
c. KLOC
b. development testing
d. requirements-based testing
113. The …………… should test a prototype of borrowing and returning books.
a. developer b. librarian
c. borrower d. administrator
Page 19
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
115. Which of the following tasks usually requires the largest percentage of
effort and time?
a. requirement analysis b. design
c. coding d. testing
ﺪ ﻤ
c. Finding the right people to work on the project
ﺍ
a. Supplier
b. Client
ﻟ
c. Supplier and Client
d. Method prototype
118.
a. Class
ﻣ ﺮ
In Accounts::AccountsReceived::Customer, AccountsReceived represents a(n) ....
b. Object
ﻀ
c. Package d. a or b
ﻥ ﺎ
119. In collaboration diagram , object creation and destruction is shown by the
UML notations ................. and .............., respectively.
a. {create}, {destroyed}
c. {new}, {destroyed}
b. {create}, {delete}
d. None of the above
Page 20
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
122. The term …. Is used to refer to the degree of closeness between the activity
within a single module.
a. cohesion. b. coupling.
c. partition. d. projection.
ﻣ
b. a decision diamond
c. a guard
ﺤ
d. a swimlane.
a. supplier.
b. client .
c. inertial convention.
ﻤ
124. A pre-condition violation indicates a defect in the …….
ﺪ
ﺍ
d. a and b.
ﻟ
125. which of the following is measured by defects per KLOC ?
a. usability b. correctness
c. size
ﻀ
a. extended Java Balls
b. extended Java Beans
ﻥ ﺎ
c. Enterprise Java Beans
d. None of above .
127. In a state chart diagram, a(n) ______ is something that the object dose, such
as sending a message to itself or to another object .
a. state
b. event
c. self-transition
d. action
129. “ do not use Java, because the software engineers have no experience of
Java.” Is an example of them .
a. risk retention
b. risk avoidance
c. risk transfer
d. risk reduction
ﻣ
130. One of the following software characteristics does not affect their development
a. Malleability
ﺤ
b. Complexity
c. Size
d. None of the above
ﺍ
b. acts as a discussion tool between developer and user
c. offers a common language for agreeing the function of the software
ﻟ
system .
d. all of the above
ﻣ ﺮ
132. We need object diagram because
a. They are useful for checking our understanding of concepts and relationships .
ﻀ
b. A pair of object diagram is useful for showing the system before and after some
operation has been performed on it .
ﻥ ﺎ
c. they help determine whether or not some configuration of objects is valid
d. all of the above
133. Which of the following is not a software quality factor that is affected by the
product operation requirement :
a. Correctness
b. Reliability
c. Efficiency
d. None of the above
ﻣ
b. Component repository
c. Documentation
ﺤ
d. none of the above
137.Correctness is measured in
a. Defects per KLOC
b. Defects per LOC
c. Mean time to change
ﺪ ﻤ
ﺍ
d. None of the above
ﻟ
138.Java gives most of what is wanted to implement components except
a. Provided interfaces cannot be divided
ﻣ ﺮ
b. Required interfaces cannot be made explicit
c. Required interfaces cannot be divided
d. a and b
ﺎ ﻀ
139.The process of examining an artifact in order to determine how it was built is called
a. Reversed engineering
ﻥ
b. Forward engineering
c. Decoding
d. Code degeneration
142. a …. Describes a sequence of interaction between the system and some actors.
a. Use case
b. Sequence diagram
c. Scenario
d. Collaboration diagram
ﻣ
b. Guard
c. Invariant
ﺤ
d. Action
144: Class model is not sufficient to describe a system because …
a. Class model is a static model
b. class model is a dynamic model
c. of its associations
d. None of the above
ﺪ ﻤ
charts emphasize ……..
ﻟ ﺍ
145: Unlike Gantt charts which emphasize times at which things happen, PERT
a. Concurrency b. Synchronization
c. Sequence
146: A diagram that shows the flow of control from an activity to another is called:
ﻀ
a. An activity diagram
b. A collaboration diagram
ﻥ ﺎ
c. State machine diagram
d. Use care diagram
148:…… means that the description of the same part of the system do not
contradicts other.
a. correctness
b. consistency
c. usability
d. integrity
Page 24
ﻻﺴﺗﻼﻡ ﺍﺧﺑﺎﺭ ﺍﻟﺟﺎﻤﻌﺔ ﻭﺍﻻﺟﺎﺑﺔ ﻋﻠﻰ ﺍﺴﺗﻔﺴﺎﺭﺍﺗﻜﻢ ﻭﺍﻻﻧﻀﻤﺎﻡ ﻟﻘﺮﻭﺑﺎﺕ ﺍﻟﻤﻮﺍﺩ- 94981522
M363 MCQs Collected By/Waleed Omar
149: which of the following techniques are used measure that complexity :
a. lines-of-code (LOC)
b. Cyclomatic metric
c. function point analysis (FPA)
d. all of the above.
ﻣ
b. specification of the system
c. security of the data
ﺤ
d. effort required to couple systems together
ﻤ
151: One way in dealing with risks which may appear during SW development is
ﺪ
to accept that risk if it has low probability of occurrence and cost is known as :
a. risk avoidance
b. risk retention
ﺍ
c. risk reduction
d. risk transfer
ﺮ ﻟ
152: The task of keeping track of different versions of items created during
software development is the responsibility of :
ﻣ
a. project management
b. people management
ﻀ
c. configuration management
d. quality management
ﻥ ﺎ
153: A diagram that shows a history of an object is :
a. activity diagram
b. use case diagram
c. state machine diagram
d. sequence diagram
154: ……. A class of risk tat is associated with the management of a project:
a. project risks b. technical risks
c. business risks d. implementation risks
Page 25