151. The SRS document is also known as ________________ specification ?
comments icon0

A. white-box

B. black-box

C. grey-box

D. none of the mentioned

153. The longer a fault exists in software__________________?
comments icon0

A. the less likely it is to be properly corrected

B. the more tedious its removal becomes

C. the more costly it is to detect and correct

D. All of the mentioned
154. Select the incorrect statement: Software engineers should:
comments icon0

A. maintain integrity and independence in their professional judgment.

B. be dependent on their colleagues.

C. not knowingly accept work that is outside your competence.

D. not use your technical skills to misuse other peoples computers.

156. Identify an ethical dilemma from the situations mentioned below ?
comments icon0
A. Your employer releases a safety-critical system without finishing the testing of the system

B. All of the mentioned

C. Agreement in principle with the policies of senior management

D. Refusing to undertake a project

157. What is the first step of requirement elicitation ?
comments icon0

A. All of the mentioned

B. Identifying Stakeholder

C. Requirements Gathering

D. Listing out Requirements

158. The RUP is normally described from three perspectives-dynamic, static & practice.What does static perspective do ?
comments icon0

A. It shows the phases of the model over time

B. It suggests good practices to be used during the process

C. All of the mentioned

D. It shows the process activities that are enacted
160. Model preferred to create client/server applications is _______________________?
comments icon0
A. Concurrent Model

B. Spiral Model

C. Incremental Model

D. WINWIN Spiral Model

161. Spiral model was developed by ___________________?
comments icon0

A. Roger Pressman

B. Berry Boehm

C. Victor Bisili

D. Bev Littlewood

162. Which of the following statements explains portability in non-functional requirements ?
comments icon0

A. None of the mentioned

B. It is a degree to which software running on one platform can easily be converted to run on another platform

C. It cannot be enhanced by using languages, OS and tools that are universally available and standardized

D. The ability of the system to behave consistently in a user-acceptable manner when operating within the environment for which the system was intended

164. What are the four dimensions of Dependability ?
comments icon0

A. Usability, Reliability, Security, Flexibility

B. Availability, Reliability, Maintainability, Security

C. Availability, Reliability, Security, Safety

D. Security, Safety, Testability, Usability

167. If you were to create client/server applications, which model would you go for ?
comments icon0

A. WINWIN Spiral Model

B. Incremental Model

C. Spiral Model

D. Concurrent Model
168. Which of these does not affect different types of software as a whole ?
comments icon0

A. Security

B. Heterogeneity

C. Flexibility

D. Business and social change

172. Which is one of the most important stakeholder from the following ?
comments icon0

A. Middle level stakeholder

B. Users of the software

C. Entry level personnel

D. Managers

173. Which of the following Requirement Elicitation Techniques is applicable to messy, changing and ill-defined problem situations ?
comments icon0
A. Soft Systems Methodology (SSM)

B. Prototyping

C. Controlled Requirements Expression (CORE)

D. Quality Function Deployment (QFD)

174. What is the major drawback of using RAD Model ?
comments icon0

A. Increases reusability of components

B. Highly specialized & skilled developers/designers are required

C. Increases reusability of components, Highly specialized & skilled developers/designers are required

D. Encourages customer/client feedback

176. Which of the following is not a metric for design model ?
comments icon0

A. Interface design metrics

B. Complexity metrics

C. Architectural metrics

D. Component-level metrics

179. Which of the following states that work expands to fill the time available ?
comments icon0

A. Expert judgement

B. Pricing to win

C. CASE tools

D. Parkinsons Law
181. The process of generating analysis and design documents is known as ___________________?
comments icon0

A. Software re-engineering

B. Software engineering

C. Re-engineering

D. Reverse engineering
182. Which of the following manuals is not a user documentation ?
comments icon0
A. SRS

B. Beginners Guide

C. Installation guide

D. Reference Guide

183. Which of the following is a technique covered in Static Analysis ?
comments icon0

A. Automated program analysis

B. Formal verification

C. Model checking

D. All of the mentioned
185. Third Party Certification for software standards is based on ___________________?
comments icon0
A. Ul 1998, Second Edition

B. Ul 1996, Second Edition

C. Ul 1992, Second Edition

D. UT 1998, Second Edition

186. SMI stands for_______________?
comments icon0

A. Software Maturity Indicator

B. Software Mature Index

C. Software Maturity Index

D. Software Mature Indicator

187. Which of the following is not a business risk ?
comments icon0

A. building an excellent product or system that no one really wants

B. losing budgetary or personnel commitment

C. losing the support of senior management due to a change in focus or change in people

D. lack of documented requirements or software scope
188. Percentage of modules that were inspected is a part of__________________?
comments icon0

A. Product Metrics

B. Process Metrics

C. All of the mentioned

D. Project Metrics

189. What are the two ways to view the human error of a sociotechnical system ?
comments icon0

A. all of the mentioned

B. management and users approach

C. person and systems approach

D. hardware and software approach

190. What type of software testing is generally used in Software Maintenance ?
comments icon0

A. Integration Testing

B. System Testing

C. Unit Testing

D. Regression Testing
191. Which of the following is not an information domain required for determining function point in FPA ?
comments icon0

A. Number of external Interfaces

B. Number of user Input

C. Number of errors

D. Number of user Inquiries

192. Which of the following is/are true with respect to functions ?
comments icon0
A. All of the mentioned

B. A function such as search-book is represented using a circle

C. Functions represent some activity

D. Function symbol is known as a process symbol or a bubble in DFD

193. Which risks are associated with the overall size of the software to be built or modified ?
comments icon0

A. Development environment risks

B. Business impact risks

C. Process definition risks

D. Product size risks
195. CSQA stands for __________________?
comments icon0

A. Certified Software Quality Approved

B. Certified Software Quality Analyst

C. Certified Software Quality Acclaimed

D. None of the mentioned

196. Structured Analysis is based on the principles of___________________?
comments icon0

A. Graphical representation of results using DFDs

B. Top-down decomposition approach

C. All of the mentioned

D. Divide and conquer principle

197. Usability can be measured in terms of_________________?
comments icon0

A. Intellectual skill to learn the system

B. All of the mentioned

C. Time required to become moderately efficient in system usage

D. Net increase in productivity

199. The process each manager follows during the life of a project is known as ___________________?
comments icon0

A. All of the mentioned

B. Manager life cycle

C. Project Management

D. Project Management Life Cycle
200. In CMM, the life cycle activities of requirements analysis, design, code, and test are described in_________________________?
comments icon0

A. Software Subcontract Management

B. Software Quality Management

C. Software Quality Assurance

D. Software Product Engineering