IT, 6 th sem Question Bank Q. No. Question Which of the following is reason of Software Crisis? (i) Software development is personalized (ii) Maintenance is easy (iii) Easily traceable 1 A. Only (i) is true B. Only (ii) is true C. Only (iii) is true D. All (i), (ii) and (iii) is true ANSWER: A Cost of hardware and software is _________ by the time A. Increased B. Decreased 2 C. Can’t Say D. None of mentioned ANSWER: B Factors directly affect the operation of software are: A. Product Transition Factors B. Product Revision Factors 3 C. Product Operation Factors D. None of mentioned ANSWER: B First phase of waterfall model is A. Feasibility Study B. Requirement Engineering 4 C. Design D. None of mentioned ANSWER: A Spiral model is invented by: A. Barry Bohem B. Halstead 5 C. J. Mccabe D. None of mentioned Answer: A Waterfall model is good: A. For changing requirements B. For phase wise getting requirements 6 C. Requirements are well known D. None of mentioned Answer: A SDLC: System Development Life Cycle 7 Software Development Life Cycle Software Deployment Life Cycle None of mentioned Answer. B Evolutionary models are: (i) Iterative (ii) Non Linear 8 (iii) Incremental A. (i) and (iii) is true B. (i) and (ii) is true C. (i), (ii) and (iii) is true D. (ii) and (iii) is true ANSWER. B. In Iterative model: (i) Parallel development can be done (ii) Easier to mange risk (iii) Less costly to change requirement 9 A. (i), (ii) and (iii) are true B. (i) and (iii) are true C. (i) and (ii) are true D. (ii) and (iii) are true ANSWER: A. Customer able to see partial product in Early Life Cycle A. Waterfall Model 10 B. Spiral Model C. Prototype Model D. Software Development Life Cycle ANSWER: C. Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves, because A. Software suffers from exposure to hostile environments. B. Defects are more likely to arise after software has been used often. 11 C. Multiple change requests introduce errors in component interactions. D. Software spare parts become harder to order. Answer: C Engineering uses (i) Methods (ii) Procedures (iii) Tools (iv) Standards 12 A. Only (i) is true B. Only (ii) is true C. Only (iii) is true D. All are true
Installation guide is type of
A. Operating procedure B. Documentation Manual 13 C. Software D. Program Answer. A Evolutionary life cycle model is good for: A. Small products 14 B. Medium size product C. Large products D. None of mentioned ANSWER A. Which of the following is an example of Software Failure? A. Y2K Problem B. Production Failure 15 C. Machine Failure D. None of mentioned ANSWER A Zero level DFD is called Context diagram A. True 16 B. False Answer: A In ER diagram, ternary cardinality shows relationship among ____ entity A. 2 17 B. 3 C. 1 D. None of mentioned ANSWER: B ISO is: (i) Specific to Software industry (ii) Not specific to any industry (iii) The base level of a quality system 18 A. (i), (ii) and (iii) is true B. (ii) and (iii) is true C. (i) and (iii) is true D. (i) and (ii) is true ANSWER: B Which of the following level establish the plans and strategies to develop a quantitative analysis: A. Level-5 19 B. Level-3 C. Level-2 D. Level-4 ANSWER C Full form of SQA is A. Software Quality Audit 20 B. Software Quality Assurance C. Software Quality Assessment D. None of mentioned ANSWER B Which of the following is SQA technique: A. Auditing B. Design Inspection 21 C. Code Inspection D. All mentioned ANSWERD SRS is said to be unambiguous if: A. All requirements are correct 22 B. All requirements are consistent C. All requirements have only 1 interpretation D. None of mentioned ANSWER C Modifiability in SRS is: A. Capable to accept changes 23 B. Properly Indexed C. Cross-Referenced D. All Mentioned ANSWER: D Testability in SRS helps: A. To test the system in testing phase 24 B. Made easy to generate test cases and test plans C. To test the system in all phases D. None of mentioned ANSWER: B SRS contains A. Functional Requirements B. Non-Functional Requirements 25 C. Constraint Requirements D. All mentioned ANSWER D Outcome of requirements specification phase is A. Design Document B. Software requirements specification 26 C. Test Document D. None of the above ANSWER B Which one is not a step of requirement engineering? A. Requirements elicitation 27 B. Requirements analysis C. Requirements design D. Requirements documentation ANSWER C 28 Which is one of the most important stakeholder from the following ? A. Entry level personnel B. Middle level stakeholder C. Managers D. Users of the software ANSWER D Inverse Requirements are: A. Specify the constraint on non-allowable behavior B. Specify the constraint on allowable behavior 29 C. Specify the requirements D. None of mentioned ANSWER B Which one is not a requirements elicitation technique? A. Interviews 30 B. The use case approach C. FAST D. Data flow diagram ANSWER B Which of the following is decreasing order of coupling? A. Content, common, external, stamp 31 B. Common, content, stamp external C. External, control, Data D. Common, Control, Data ANSWER D Coupling is: A. Independence between two modules B. Interdependence between two modules 32 C. Strength of modules D. None of mentioned ANSWER B What is the meaning of Functional Cohesion? A. Operations are part of single functional task and are placed in same procedures. 33 B. All operations that access the same data are defined within one class. C. All operations that access the data from outside the module. D. None of the above ANSWER: A. Which is the most desirable form of coupling? A. Control coupling 34 B. Data coupling C. Common coupling D. Stamp coupling ANSWER: B. Abstraction is higher in: Upper-level modules Lower-levels module 35 At any level abstraction can be high None of mentioned ANSWER A In Top Down Strategy, design start from Detailed Design 36 Module Design Abstract Design Low Level Design ANSWERC Hash Directives, blank lines and comments in Halstead Measures are: A. Counted as operand B. Counted as operator 37 C. Ignored D. blank lines and comments as operand/ hash directives as operator ANSWER: C Function point method was developed by 38 A. B.Boehm B. M.halstead C. B.Beizer D. Alan Albrecht ANSWER D How many domain values are used in Function point: A. 4 39 B. 3 C. 2 D. 5 ANSWER: D The valid reasons for measuring software processes, products and resources are: (i) to evaluate (ii) to improve (iii) No benefit A. (i) and (ii) is true 40 B. (ii) and (iii) is true C. (i) and (iii) is true D. (i), (ii) and (iii) all are false ANSWER: A Advantage of LOC is A. LOC gives exact value 41 B. LOC is language dependent C. LOC is done in Analysis phase D. It is easy to calculate ANSWER: D CAF in function point stands for: A. Complex Adjust Factor 42 B. Complexity Adjustment Factor C. Complexity Average Factor D. None of mentioned ANSWER B No. of Enquiries in function point measure is same as Inputs taken. A. True 43 B. False ANSWER: B Pseudo Code is: A. Need the compilation 44 B. No need of knowledge of programming language C. Need specific programming language background D. None of mentioned ANSWER B Object Oriented Design System is: A. Collection of classes 45 B. Collection of Objects C. Collection of Data and methods both D. None of mentioned ANSWER B In walkthrough, focus is on: A. Discover Errors 46 B. Solution to correct error C. Developer is also evaluated D. None of mentioned ANSWER: A Static testing is done: A. By executing the code 47 B. Non-execution techniques C. Can use both execution and non-execution D. None of mentioned ANSWER: B Requirement document, Design testing is done using: A. Unit Testing 48 B. Integration Testing C. Static testing D. None of mentioned ANSWER: C Cyclomatic complexity is used to measure A. Path Complexity 49 B. Logical Complexity C. Statement Complexity D. None of mentioned ANSWER: B Cyclomatic complexity for a flow graph can be computed as: A. V(G)=e+n-2 50 B. V(G)=e+n+2 C. V(G)=e-n+2 D. V(G)=e-n-2 ANSWER: C All statement of code execution ensures that A. Every decision will be executed once 51 B. Every path is executed C. Every branch is executed D. None of mentioned ANSWER: A Beta Test is conduct in: A. Controlled Environment 52 B. Friendly Environment C. End User Environment D. None of mentioned ANSWER: C In an Examination a candidate has to score minimum of 24 marks in order to clear the exam. The maximum that he can score is 40 marks. Identify the Valid Equivalence values if the student clears the exam. 53 A. 22, 23, 26 B. 21, 39, 40 C. 29, 30, 31 D. 0, 15, 22 ANSWER: C System Testing follows: A. Functional Testing Technique 54 B. Structural Testing Technique C. Non-functional Testing Technique D. None of mentioned ANSWER: A Non-functional Testing is done in: A. Unit Testing phase 55 B. Integration Testing Phase C. System Testing Phase D. None of mentioned ANSWER: C If any bug is fixed or new functionality is added: A. Security Testing is done 56 B. Regression Testing is done C. Usability Testing is done D. Stress Testing is done ANSWER: B For unit testing of a module, there is a need of: (i) Driver (ii) Stub (iii) Neither Stub nor Driver A. (i), (ii) and (iii) are true 57 B. (ii) and (iii) are true C. (i) and (ii) are true D. (i) and (iii) is true ANSWER: C Sandwich Integration use A. Only Bottom up 58 B. Only top down C. Bottom up and Top Down D. Neither Bottom up Nor Top Down ANSWER: C Validation to ensure that A. Software is traceable to requirements 59 B. Software is traceable to design C. Software is perfectly working D. None of mentioned ANSWER: A Black box testing uncovers the (i) Incorrect functions (ii) Missing functions (iii) Independent paths 60 A. All True B. i and iii are true C. ii and iii are true D. i and ii are true ANSWER: D Risk Management is: A. Minimizing the impact of risk 61 B. Do not work on risk elements C. Done when risk comes D. Done of mentioned ANSWER: A. Risk is: A. Event which surely occur 62 B. Probabilistic event C. Event which will not occur in any situation if handled D. None of mentioned ANSWER: B. Risk Assessment is done: A. After the project is developed 63 B. When problem occur then assessed C. At the time of project planning D. None of mentioned ANSWER: C. In Risk Assessment: (i) Prioritize the risk (ii) Identify the risk (iii) Solve the risk A. (i), (ii) and (iii) are true 64 B. (ii) and (iii) are true C. (i) and (ii) are true D. (i) and (iii) is true ANSWER: C During the change control object to be changed is: A. Checked in to project database to do changes 65 B. No baseline criteria C. Checked out from project database for changes D. None of mentioned ANSWER: C. Synchronization control helps during change control: A. No change is allowed 66 B. Any one can change in baseline C. Allow to do parallel changes D. None of mentioned ANSWER: C If change request is approved by Change control authority then: A. Engineering Change Order is generated 67 B. Effective Change Order is generated C. Escalate Change Order is generated D. None of mentioned ANSWER: A Design specification in Configuration Management is the: A. Basic Object 68 B. Aggregate Object C. Intra Object D. Inter Object ANSWER: B. What combines procedures and tools to manage different versions of configuration objects that are created during the software process? A. Change control 69 B. Version control C. SCIs D. None of the mentioned ANSWER: B ____ is created in same version for support different feature A. Multiple version 70 B. Variation C. Variant D. None of mentioned ANSWER: C Before Re-engineering, It is necessary to: 71 i. Study Code ii. No need to see overall control flow iii. Use modern design techniques A. All true B. i. and ii is true C. i, iii is true D. ii and iii is true ANSWER: C. The main activity of reverse engineering is called A. restructure code 72 B. directionality C. extract abstractions D. interactivity ANSWER: C. Software Evolution includes: A. Always developing a new software 73 B. Add or remove obsolete functionalities C. Doing negotiation with client D. None of mentioned ANSWER: B. Software Maintenance is done: A. During the development after the analysis phase 74 B. After the delivery of software C. After the design phase D. None of mentioned ANSWER: B. Adaptive Maintenance is done: A. To make software product usable with changed environment 75 B. Imposed by internal environment C. Often requested by client D. None of mentioned ANSWER: A. 1. Choose the correct option in terms of Issues related to professional responsibility a) Confidentiality b) Intellectual property rights c) Both Confidentiality & Intellectual property rights d) Managing Client Relationships View Answer Answer: c Explanation: Engineers should normally respect the confidentiality of their employers or clients irrespective of whether or not a formal confidentiality agreement has been signed. They should be aware of local laws governing the use of intellectual property such as patents, copyright, etc. 2. “Software engineers should not use their technical skills to misuse other people’s computers.”Here the term misuse refers to: a) Unauthorized access to computer material b) Unauthorized modification of computer material c) Dissemination of viruses or other malware d) All of the mentioned View Answer Answer: d Explanation: None. 3. Explain what is meant by PRODUCT with reference to one of the eight principles as per the ACM/IEEE Code of Ethics ? a) The product should be easy to use b) Software engineers shall ensure that their products and related modifications meet the highest professional standards possible c) Software engineers shall ensure that their products and related modifications satisfy the client d) It means that the product designed /created should be easily available View Answer Answer: b Explanation: None. advertisement 4. Identify an ethical dilemma from the situations mentioned below: a) Your employer releases a safety-critical system without finishing the testing of the system b) Refusing to undertake a project c) Agreement in principle with the policies of senior management d) All of the mentioned View Answer Answer: a Explanation: None. 5. Identify the correct statement: “Software engineers shall a) act in a manner that is in the best interests of his expertise and favour.” b) act consistently with the public interest.” c) ensure that their products only meet the SRS.” d) all of the mentioned View Answer Answer: b Explanation: Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest and shall ensure that their products and related modifications meet the highest professional standards possible.Thus options a & c are ruled out. 6. Select the incorrect statement: “Software engineers should a) not knowingly accept work that is outside your competence.” b) not use your technical skills to misuse other people’s computers.” c) be dependent on their colleagues.” d) maintain integrity and independence in their professional judgment.” View Answer Answer: c Explanation:None. 7. Efficiency in a software product does not include ________ a) responsiveness b) licensing c) memory utilization d) processing time View Answer Answer: b Explanation: Licensing of a software product comes under corporate part of the software company. 8. As per an IBM report, “31%of the project get cancelled before they are completed, 53% overrun their cost estimates by an average of 189% and for every 100 projects, there are 94 restarts”.What is the reason for these statistics ? a) Lack of adequate training in software engineering b) Lack of software ethics and understanding c) Management issues in the company d) All of the mentioned View Answer Answer: a Explanation: Option b & c are a part of Software Engineering as a subject,hence option a covers them both. 9. The reason for software bugs and failures is due to a) Software companies b) Software Developers c) Both Software companies and Developers d) All of the mentioned View Answer Answer: c Explanation: Software companies are responsible for making policies and providing working atmosphere for the software development, so in turn these companies become a part of software development process.Bugs from developers side is no new thing. Thus option c answers the question. 10. Company has latest computers and state-of the- art software tools, so we shouldn’t worry about the quality of the product. a) True b) False View Answer Answer: b Explanation: The infrastructure is only one of the several factors that determine the quality of the product. Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code). a) 100-200 b) 200-400