You are on page 1of 5

1. Are requirements validation and analysis distinct requirements activities? a.

Yes, because requirements validation needs a complete draft of the requirements document while the requirements analysis works with incomplete requirements. b. Yes, because requirements validation works with incomplete requirements while the requirements analysis needs a complete draft of the requirements document. c. Yes, because validation can only be done with testing while analysis can be done with prototyping. d. No, they are not distinct activities as they both work on requirements and aid in their elicitation.

2. Suppose a team is developing a web-based ticket distribution system. Which of the following decisions was most likely made during system design?

a. The ticket distributor will include a user interface subsystem. b. The ticket distributor will follow web-accessibility standards. c. The ticket distributor will provide the traveler with on-line help. d. The ticket distributor requirements have been met and satisfy customer needs. 3. In designing an object-oriented class hierarchy to represent binary expressions, which structural pattern and behavioral pattern could be used most effectively?

a. Composite and Interpreter b. Decorator and Command c. Flyweight and Strategy d. Proxy and Visitor 4. Using a structural model to represent an architectural design has which of the following characteristics? a. A structural model allows identifying repeatable architectural design frameworks that are encountered in similar applications b. A structural model addresses behavioral aspects which indicate how the system changes as a function of external events

c. A structural model represents the architecture as an organized collection of program modules and components d. A structural model focuses on the business or technical processes that a system must accommodate

5. . An incorrect step, process, or data definition in a computer program is a a. Failure b. Mistake c. Fault d. Consequence 6. Identification and selection of a version control tool is a part of which software configuration management activity? a. Release Management and Delivery b. Management and Planning c. Configuration Auditing d. Configuration Control 7. A configuration control board (CCB) handles which of the following?

a. tool selection b. software change requests c. software configuration audits d. software release documentation 8. A software engineer is employed by the company that designs and manufactures voting machines. She is employed to develop an archival system for retaining voting information and results. Which of the following actions would most likely be a violation of the Software Engineering Code of Ethics and Professional Practice? a. She failed to keep adequate documentation of her work on the project. b. She has not previously worked on a voting machine project.

c. She has registered as a voter in the state in which the machines will be used. d. She discovered significant number defects in her design for the archival system.

Computing Foundation 1. Consider a recursive function "recurr" that calculates and returns a value based on input n, a positive integer.

function recurr(n) // purpose: ? // input: a positive integer n // output: a number x equal to the value of recurr(n) x := 1 if n > 10 , then if n < 10, then return x x := 2*recurr(n-10) x := x*3

What is the value of recurr(55) ?

a. 165 b. 96 c. 1 d. 48

2. The following pseudocode defines a sorting algorithm SORT for sorting numbers: algorithm SORT(A) // purpose: sorts the array A in ascending order //input: an array A[0,...,n-1] of orderable elements //output: an array A[0,...,n-1] sorted in ascending order. for i = 0 to n-2 do

min := i for j = i+1 to n-1 do if A[j] < A[min], then min := j swap A[i] and A[min]

Which of the following statements concerning SORT are true:

a. The number of comparisons is given by sum b. The number of comparisons is given by n(n+1)/4. c. The number of comparisons is O(nlogn). d. The number of swaps is n + 2.