You are on page 1of 10

KIET Group of Institutions

(Department Of Information Technology)


IT, 6 th sem
Question Bank
Q. No. Question
Which of the following is reason of Software Crisis?
(i) Software development is personalized
(ii) Maintenance is easy
(iii) Easily traceable
1 A. Only (i) is true
B. Only (ii) is true
C. Only (iii) is true
D. All (i), (ii) and (iii) is true
ANSWER: A
Cost of hardware and software is _________ by the time
A. Increased
B. Decreased
2 C. Can’t Say
D. None of mentioned
ANSWER: B
Factors directly affect the operation of software are:
A. Product Transition Factors
B. Product Revision Factors
3 C. Product Operation Factors
D. None of mentioned
ANSWER: B
First phase of waterfall model is
A. Feasibility Study
B. Requirement Engineering
4 C. Design
D. None of mentioned
ANSWER: A
Spiral model is invented by:
A. Barry Bohem
B. Halstead
5 C. J. Mccabe
D. None of mentioned
Answer: A
Waterfall model is good:
A. For changing requirements
B. For phase wise getting requirements
6 C. Requirements are well known
D. None of mentioned
Answer: A
SDLC:
System Development Life Cycle
7 Software Development Life Cycle
Software Deployment Life Cycle
None of mentioned
Answer. B
Evolutionary models are:
(i) Iterative
(ii) Non Linear
8 (iii) Incremental
A. (i) and (iii) is true
B. (i) and (ii) is true
C. (i), (ii) and (iii) is true
D. (ii) and (iii) is true
ANSWER. B.
In Iterative model:
(i) Parallel development can be done
(ii) Easier to mange risk
(iii) Less costly to change requirement
9 A. (i), (ii) and (iii) are true
B. (i) and (iii) are true
C. (i) and (ii) are true
D. (ii) and (iii) are true
ANSWER: A.
Customer able to see partial product in Early Life Cycle
A. Waterfall Model
10 B. Spiral Model
C. Prototype Model
D. Software Development Life Cycle
ANSWER: C.
Software does not wear-out in the traditional sense of the term, but
software does tend to deteriorate as it evolves, because
A. Software suffers from exposure to hostile environments.
B. Defects are more likely to arise after software has been used often.
11 C. Multiple change requests introduce errors in component
interactions.
D. Software spare parts become harder to order.
Answer: C
Engineering uses
(i) Methods
(ii) Procedures
(iii) Tools
(iv) Standards
12 A. Only (i) is true
B. Only (ii) is true
C. Only (iii) is true
D. All are true

Installation guide is type of


A. Operating procedure
B. Documentation Manual
13 C. Software
D. Program
Answer. A
Evolutionary life cycle model is good for:
A. Small products
14 B. Medium size product
C. Large products
D. None of mentioned
ANSWER A.
Which of the following is an example of Software Failure?
A. Y2K Problem
B. Production Failure
15 C. Machine Failure
D. None of mentioned
ANSWER A
Zero level DFD is called Context diagram
A. True
16 B. False
Answer: A
In ER diagram, ternary cardinality shows relationship among ____ entity
A. 2
17 B. 3
C. 1
D. None of mentioned
ANSWER: B
ISO is:
(i) Specific to Software industry
(ii) Not specific to any industry
(iii) The base level of a quality system
18 A. (i), (ii) and (iii) is true
B. (ii) and (iii) is true
C. (i) and (iii) is true
D. (i) and (ii) is true
ANSWER: B
Which of the following level establish the plans and strategies to develop a
quantitative analysis:
A. Level-5
19 B. Level-3
C. Level-2
D. Level-4
ANSWER C
Full form of SQA is
A. Software Quality Audit
20 B. Software Quality Assurance
C. Software Quality Assessment
D. None of mentioned
ANSWER B
Which of the following is SQA technique:
A. Auditing
B. Design Inspection
21 C. Code Inspection
D. All mentioned
ANSWERD
SRS is said to be unambiguous if:
A. All requirements are correct
22 B. All requirements are consistent
C. All requirements have only 1 interpretation
D. None of mentioned
ANSWER C
Modifiability in SRS is:
A. Capable to accept changes
23 B. Properly Indexed
C. Cross-Referenced
D. All Mentioned
ANSWER: D
Testability in SRS helps:
A. To test the system in testing phase
24 B. Made easy to generate test cases and test plans
C. To test the system in all phases
D. None of mentioned
ANSWER: B
SRS contains
A. Functional Requirements
B. Non-Functional Requirements
25 C. Constraint Requirements
D. All mentioned
ANSWER D
Outcome of requirements specification phase is
A. Design Document
B. Software requirements specification
26 C. Test Document
D. None of the above
ANSWER B
Which one is not a step of requirement engineering?
A. Requirements elicitation
27 B. Requirements analysis
C. Requirements design
D. Requirements documentation
ANSWER C
28 Which is one of the most important stakeholder from the following ?
A. Entry level personnel
B. Middle level stakeholder
C. Managers
D. Users of the software
ANSWER D
Inverse Requirements are:
A. Specify the constraint on non-allowable behavior
B. Specify the constraint on allowable behavior
29 C. Specify the requirements
D. None of mentioned
ANSWER B
Which one is not a requirements elicitation technique?
A. Interviews
30 B. The use case approach
C. FAST
D. Data flow diagram
ANSWER B
Which of the following is decreasing order of coupling?
A. Content, common, external, stamp
31 B. Common, content, stamp external
C. External, control, Data
D. Common, Control, Data
ANSWER D
Coupling is:
A. Independence between two modules
B. Interdependence between two modules
32 C. Strength of modules
D. None of mentioned
ANSWER B
What is the meaning of Functional Cohesion?
A. Operations are part of single functional task and are placed in
same procedures.
33 B. All operations that access the same data are defined within one
class.
C. All operations that access the data from outside the module.
D. None of the above
ANSWER: A.
Which is the most desirable form of coupling?
A. Control coupling
34 B. Data coupling
C. Common coupling
D. Stamp coupling
ANSWER: B.
Abstraction is higher in:
Upper-level modules
Lower-levels module
35 At any level abstraction can be high
None of mentioned
ANSWER A
In Top Down Strategy, design start from
Detailed Design
36 Module Design
Abstract Design
Low Level Design
ANSWERC
Hash Directives, blank lines and comments in Halstead Measures are:
A. Counted as operand
B. Counted as operator
37 C. Ignored
D. blank lines and comments as operand/ hash directives as
operator
ANSWER: C
Function point method was developed by
38 A. B.Boehm
B. M.halstead
C. B.Beizer
D. Alan Albrecht
ANSWER D
How many domain values are used in Function point:
A. 4
39 B. 3
C. 2
D. 5
ANSWER: D
The valid reasons for measuring software processes, products and
resources are: (i) to evaluate (ii) to improve (iii) No benefit
A. (i) and (ii) is true
40 B. (ii) and (iii) is true
C. (i) and (iii) is true
D. (i), (ii) and (iii) all are false
ANSWER: A
Advantage of LOC is
A. LOC gives exact value
41 B. LOC is language dependent
C. LOC is done in Analysis phase
D. It is easy to calculate
ANSWER: D
CAF in function point stands for:
A. Complex Adjust Factor
42 B. Complexity Adjustment Factor
C. Complexity Average Factor
D. None of mentioned
ANSWER B
No. of Enquiries in function point measure is same as Inputs taken.
A. True
43 B. False
ANSWER: B
Pseudo Code is:
A. Need the compilation
44 B. No need of knowledge of programming language
C. Need specific programming language background
D. None of mentioned
ANSWER B
Object Oriented Design System is:
A. Collection of classes
45 B. Collection of Objects
C. Collection of Data and methods both
D. None of mentioned
ANSWER B
In walkthrough, focus is on:
A. Discover Errors
46 B. Solution to correct error
C. Developer is also evaluated
D. None of mentioned
ANSWER: A
Static testing is done:
A. By executing the code
47 B. Non-execution techniques
C. Can use both execution and non-execution
D. None of mentioned
ANSWER: B
Requirement document, Design testing is done using:
A. Unit Testing
48 B. Integration Testing
C. Static testing
D. None of mentioned
ANSWER: C
Cyclomatic complexity is used to measure
A. Path Complexity
49 B. Logical Complexity
C. Statement Complexity
D. None of mentioned
ANSWER: B
Cyclomatic complexity for a flow graph can be computed as:
A. V(G)=e+n-2
50 B. V(G)=e+n+2
C. V(G)=e-n+2
D. V(G)=e-n-2
ANSWER: C
All statement of code execution ensures that
A. Every decision will be executed once
51 B. Every path is executed
C. Every branch is executed
D. None of mentioned
ANSWER: A
Beta Test is conduct in:
A. Controlled Environment
52 B. Friendly Environment
C. End User Environment
D. None of mentioned
ANSWER: C
In an Examination a candidate has to score minimum of 24 marks in
order to clear the exam. The maximum that he can score is 40 marks. 
Identify the Valid Equivalence values if the student clears the exam.
53 A. 22, 23, 26
B. 21, 39, 40
C. 29, 30, 31
D. 0, 15, 22
ANSWER: C
System Testing follows:
A. Functional Testing Technique
54 B. Structural Testing Technique
C. Non-functional Testing Technique
D. None of mentioned
ANSWER: A
Non-functional Testing is done in:
A. Unit Testing phase
55 B. Integration Testing Phase
C. System Testing Phase
D. None of mentioned
ANSWER: C
If any bug is fixed or new functionality is added:
A. Security Testing is done
56 B. Regression Testing is done
C. Usability Testing is done
D. Stress Testing is done
ANSWER: B
For unit testing of a module, there is a need of: (i) Driver (ii) Stub (iii)
Neither Stub nor Driver
A. (i), (ii) and (iii) are true
57 B. (ii) and (iii) are true
C. (i) and (ii) are true
D. (i) and (iii) is true
ANSWER: C
Sandwich Integration use
A. Only Bottom up
58 B. Only top down
C. Bottom up and Top Down
D. Neither Bottom up Nor Top Down
ANSWER: C
Validation to ensure that
A. Software is traceable to requirements
59 B. Software is traceable to design
C. Software is perfectly working
D. None of mentioned
ANSWER: A
Black box testing uncovers the (i) Incorrect functions (ii) Missing functions
(iii) Independent paths
60 A. All True
B. i and iii are true
C. ii and iii are true
D. i and ii are true
ANSWER: D
Risk Management is:
A. Minimizing the impact of risk
61 B. Do not work on risk elements
C. Done when risk comes
D. Done of mentioned
ANSWER: A.
Risk is:
A. Event which surely occur
62 B. Probabilistic event
C. Event which will not occur in any situation if handled
D. None of mentioned
ANSWER: B.
Risk Assessment is done:
A. After the project is developed
63 B. When problem occur then assessed
C. At the time of project planning
D. None of mentioned
ANSWER: C.
In Risk Assessment: (i) Prioritize the risk (ii) Identify the risk (iii) Solve the
risk
A. (i), (ii) and (iii) are true
64 B. (ii) and (iii) are true
C. (i) and (ii) are true
D. (i) and (iii) is true
ANSWER: C
During the change control object to be changed is:
A. Checked in to project database to do changes
65 B. No baseline criteria
C. Checked out from project database for changes
D. None of mentioned
ANSWER: C.
Synchronization control helps during change control:
A. No change is allowed
66 B. Any one can change in baseline
C. Allow to do parallel changes
D. None of mentioned
ANSWER: C
If change request is approved by Change control authority then:
A. Engineering Change Order is generated
67 B. Effective Change Order is generated
C. Escalate Change Order is generated
D. None of mentioned
ANSWER: A
Design specification in Configuration Management is the:
A. Basic Object
68 B. Aggregate Object
C. Intra Object
D. Inter Object
ANSWER: B.
What combines procedures and tools to manage different versions of
configuration objects that are created during the software process?
A. Change control
69 B. Version control
C. SCIs
D. None of the mentioned
ANSWER: B
____ is created in same version for support different feature
A. Multiple version
70 B. Variation
C. Variant
D. None of mentioned
ANSWER: C
Before Re-engineering, It is necessary to:
71 i. Study Code
ii. No need to see overall control flow
iii. Use modern design techniques
A. All true
B. i. and ii is true
C. i, iii is true
D. ii and iii is true
ANSWER: C.
The main activity of reverse engineering is called
A. restructure code
72 B. directionality
C. extract abstractions
D. interactivity
ANSWER: C.
Software Evolution includes:
A. Always developing a new software
73 B. Add or remove obsolete functionalities
C. Doing negotiation with client
D. None of mentioned
ANSWER: B.
Software Maintenance is done:
A. During the development after the analysis phase
74 B. After the delivery of software
C. After the design phase
D. None of mentioned
ANSWER: B.
Adaptive Maintenance is done:
A. To make software product usable with changed environment
75 B. Imposed by internal environment
C. Often requested by client
D. None of mentioned
ANSWER: A.
1. Choose the correct option in terms of Issues related to professional
responsibility
a) Confidentiality
b) Intellectual property rights
c) Both Confidentiality & Intellectual property rights
d) Managing Client Relationships
View Answer
Answer: c
Explanation: Engineers should normally respect the confidentiality of their
employers or clients irrespective of whether or not a formal confidentiality
agreement has been signed.
They should be aware of local laws governing the use of intellectual
property such as patents, copyright, etc.
2. “Software engineers should not use their technical skills to misuse other
people’s computers.”Here the term misuse refers to:
a) Unauthorized access to computer material
b) Unauthorized modification of computer material
c) Dissemination of viruses or other malware
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
3. Explain what is meant by PRODUCT with reference to one of the eight
principles as per the ACM/IEEE Code of Ethics ?
a) The product should be easy to use
b) Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible
c) Software engineers shall ensure that their products and related
modifications satisfy the client
d) It means that the product designed /created should be easily available
View Answer
Answer: b
Explanation: None.
advertisement
4. Identify an ethical dilemma from the situations mentioned below:
a) Your employer releases a safety-critical system without finishing the
testing of the system
b) Refusing to undertake a project
c) Agreement in principle with the policies of senior management
d) All of the mentioned
View Answer
Answer: a
Explanation: None.
5. Identify the correct statement: “Software engineers shall
a) act in a manner that is in the best interests of his expertise and
favour.”
b) act consistently with the public interest.”
c) ensure that their products only meet the SRS.”
d) all of the mentioned
View Answer
Answer: b
Explanation: Software engineers shall act in a manner that is in the best
interests of their client and employer consistent with the public interest
and shall ensure that their products and related modifications meet the
highest professional standards possible.Thus options a & c are ruled out.
6. Select the incorrect statement: “Software engineers should
a) not knowingly accept work that is outside your competence.”
b) not use your technical skills to misuse other people’s computers.”
c) be dependent on their colleagues.”
d) maintain integrity and independence in their professional judgment.”
View Answer
Answer: c
Explanation:None.
7. Efficiency in a software product does not include ________
a) responsiveness
b) licensing
c) memory utilization
d) processing time
View Answer
Answer: b
Explanation: Licensing of a software product comes under corporate part of
the software company.
8. As per an IBM report, “31%of the project get cancelled before they are
completed, 53% overrun their cost estimates by an average of 189% and for
every 100 projects, there are 94 restarts”.What is the reason for these
statistics ?
a) Lack of adequate training in software engineering
b) Lack of software ethics and understanding
c) Management issues in the company
d) All of the mentioned
View Answer
Answer: a
Explanation: Option b & c are a part of Software Engineering as a
subject,hence option a covers them both.
9. The reason for software bugs and failures is due to
a) Software companies
b) Software Developers
c) Both Software companies and Developers
d) All of the mentioned
View Answer
Answer: c
Explanation: Software companies are responsible for making policies and
providing working atmosphere for the software development, so in turn these
companies become a part of software development process.Bugs from developers
side is no new thing. Thus option c answers the question.
10. Company has latest computers and state-of the- art software tools, so we
shouldn’t worry about the quality of the product.
a) True
b) False
View Answer
Answer: b
Explanation: The infrastructure is only one of the several factors that
determine the quality of the product.
Build & Fix Model is suitable for programming exercises of ___________ LOC
(Line of Code).
a) 100-200
b) 200-400

You might also like