752. All fault-tolerant techniques rely on__________________?
comments icon0

A. Dependability

B. Integrity

C. None of the mentioned

D. Redundancy
753. Which of the following is needed by Maintenance staff?
comments icon0

A. Maintenance record for each and every equipment item

B. A specific type of equipment

C. All of the mentioned

D. Check in/check out equipment for maintenance

755. Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model ?
comments icon0
A. Discover user interfaces

B. Refine the tentative classes

C. Determine candidate keys

D. Build an initial object model

757. Which of the following statements are incorrect with reference to web-based systems? Web-based systems__________________?
comments icon0

A. are subject to assorted legal, social, and ethical scrutiny

B. should be unscalable

C. must be able to cope with uncertain, random heavy demands on services

D. must be secure

760. Which of the following is not included in the certification approach ?
comments icon0

A. Reliability

B. Creation of usage scenarios

C. Generation of test cases from the servers end.

D. Specific usage file

761. RAM is_________________ and _________________?
comments icon0

A. non volatile, temporary

B. volatile, permanent

C. volatile, temporary

D. non volatile, permanent

762. Unit testing is done by__________________?
comments icon0

A. None of the mentioned

B. Users

C. Customers

D. Developers
763. Which of the following is a example of Configuration Items ?
comments icon0

A. SCM procedures

B. Source code

C. Software design descriptions

D. All of the mentioned
764. Debugging Program is a program which runs concurrently with the program under test & provide commands to_____________________?
comments icon0

A. search for references for particular variables, constant and registers

B. all of the mentioned

C. examine memory & registers

D. stop execution at a particular point

765. Which of the following is not a main phase in Configuration Management (CM) Process ?
comments icon0

A. Executing the CM process

B. None of the mentioned

C. CM audits

D. CM Planning

766. Which testing tool does a simple job of enforcing standards in a uniform way of many programs ?
comments icon0

A. Static Analyzer

B. Code Inspector

C. Standard Enforcer

D. Both Code Inspector & Standard Enforcer
768. Which of the following is black box testing______________________?
comments icon0

A. Basic path testing

B. Code path analysis

C. None of the mentioned

D. Boundary value analysis
769. What characterstics of read-only memory (ROM) makes it useful ?
comments icon0
A. Data in ROM is non volatile, that is, it remains there even without electrial power

B. ROM information can be easily updated

C. ROM provides very large amounts or inexpensive data storage

D. ROM chips are easily swapped between different brands of computers

770. MTTF stands for__________________?
comments icon0
A. mean-time-to-failure

B. none of the mentioned

C. manufacture-time-to-function

D. mean-time-to-function

771. Which of the following is a software process ?
comments icon0

A. Business modeling

B. Configuration and management

C. All of the mentioned

D. Analysis and design

775. Which one of the following is the first second-generation computer ?
comments icon0

A. IBM 801

B. IBM 7090

C. IBM 7070

D. All of the above

776. Alpha testing is done at________________?
comments icon0

A. Users end

B. None of the mentioned

C. Developers & Users end

D. Developers end
778. What information is required to process a change to a baseline ?
comments icon0

A. List of other items affected by the changes

B. Reasons for making the changes

C. A description of the proposed changes

D. All of the mentioned
779. Which one of the following is not an application layer protocol ?
comments icon0
A. resource reservation protocol

B. session initiation protocol

C. media gateway protocol

D. dynamic host configuration protocol

780. Non-conformance to software requirements is known as___________________?
comments icon0

A. Software reliability

B. Software failure

C. Software availability

D. None of the mentioned

781. How is reliability and failure intensity related to each other ?
comments icon0

A. direct relation

B. none of the mentioned

C. inverse relation

D. no relation

783. Which of the following is a risk associated with using hypertext in web applications?
comments icon0

A. Cognitive overload for users

B. All of the mentioned

C. Loss of sense of locality and direction

D. None of the mentioned

787. User datagram protocol is called connectionless because____________________?
comments icon0
A. all UDP packets are treated independently by transport layer

B. it sends data as a stream of related packets

C. both A and B

D. none of these

788. The CMM model is a technique to____________________?
comments icon0
A. improve the software process

B. test the software

C. all of the mentioned

D. automatically maintain the software reliability

789. The computer monitor is which type of device ?
comments icon0

A. Software

B. Scanning

C. Input

D. Output
790. Behavioral testing is__________________?
comments icon0
A. Black box testing

B. None of the mentioned

C. White box testing

D. Grey box testing

792. Which of the following is the way of ensuring that the tests are actually testing code ?
comments icon0

A. Control structure testing

B. Code coverage

C. Quality assurance of software

D. Complex path testing

795. Which of the following is not a Probabilistic Model ?
comments icon0

A. Input domain

B. Error seeding

C. Halsteads software metric

D. NHPP

796. Which of the following is a common pointwer problem ?
comments icon0

A. Accessing data elements of the wrong type

B. Attempting to use memory areas after freeing them

C. All of the mentioned

D. Data sharing errors

797. Which of the following is not a type of stakeholder concern ?
comments icon0
A. Functional concerns

B. Non-functional concern

C. Quality of service concerns

D. Policy concern

798. Which of the following Error Detection checks is not a part of Application detection ?
comments icon0

A. Coding checks

B. Timing checks

C. Hardware checks

D. Reversal checks

799. Software Testing with real data in real environment is known as_____________________?
comments icon0

A. regression testing

B. alpha testing

C. none of the mentioned

D. beta testing
800. NHPP stands for__________________?
comments icon0
A. Non Homogeneous Poisson Process

B. Non Homogeneous Poisson Product

C. Non-Hetrogeneous Poisson Process

D. Non-Hetrogeneous Poisson Product