0

Software Engineering (UGC/NET)

Description: Software Engineering, UGC/NET
Number of Questions: 15
Created by:
Tags: Software Engineering UGC/NET Computer Science CS
Attempted 0/15 Correct 0 Score 0

______________ technique in fault-tolerance involves analysing the system state to gauge the extent of the state corruption.

  1. Failure prevention

  2. Defensive programming

  3. Damage assessment

  4. Fault recovery

  5. Exception handling


Correct Option: C
Explanation:

This technique in fault-tolerance involves analysing the system state to gauge the extent of the state corruption.

________________ requirement is defined quantitatively in the system requirement specification.

  1. Efficiency

  2. Reliability

  3. Software Reuse

  4. Fault-tolerant

  5. Abstract data type


Correct Option: B
Explanation:

This requirement is defined quantitatively in the system requirement specification.

____________ model in system development is an approach to data modelling that includes information about the meaning of the data and that allows a better abstract model to be produced.

  1. Data flow

  2. Object

  3. Inheritance

  4. Semantic

  5. Process


Correct Option: D
Explanation:

This model in system development is an approach to data modelling that includes information about the meaning of the data and that allows a better abstract model to be produced.

In which of the following stages of software design does the designer write an informal design description before creating formal documentation?

  1. Study and understand the problem

  2. Describe each abstraction used in the solution

  3. Identify gross features of at least one possible solution

  4. Component design

  5. Algorithm design


Correct Option: B
Explanation:

This stage in software design is the one in which before creating formal documentation the designer writes an informal design description.

________________ is one of the software reliability metrics that measures the frequency of occurrence with which unexpected behavior is likely to occur.

  1. POFOD

  2. MTTF

  3. AVAIL

  4. ROCOF

  5. UNAVAIL


Correct Option: D
Explanation:

ROCOF refers to rate of failure occurrence. It is one of the software reliability metrics that measures the frequency of occurrence with which unexpected behavior is likely to occur.

A system model based on a shared database that can be accessed by all sub-systems is sometimes called _______________.

  1. the abstract machine model

  2. Client-Sever model

  3. Repository model

  4. Architectural design

  5. Control model


Correct Option: C
Explanation:

This is a system model based on a shared database that can be accessed by all sub-systems.

________________ is one of the software reuse methods in which software components that implement a single function is reused.

  1. Application system reuse

  2. Module reuse

  3. Function reuse

  4. Sub-system reuse

  5. Object reuse


Correct Option: C
Explanation:

This is one of the software reuse methods in which software components which implement a single function is reused.

___________ term describes the overall strategy for integration and is divided into phases and builds that address specific functional and behavioral characteristics of the software.

  1. Verification

  2. Validation

  3. Test plan

  4. Test management tools

  5. Acceptance testing


Correct Option: C
Explanation:

This term describes the overall strategy for integration and is divided into phases. It builds an address specific functional and behavioral characteristics of the software.

_________________ is also called renovation or reclamation that not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system.

  1. Data structuring

  2. Forward engineering

  3. Code restructuring

  4. Reverse engineering

  5. Document restructuring


Correct Option: B
Explanation:

This is also called renovation or reclamation that not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system.

________________ is the fault-tolerant approach where each programme component includes a text to check if the component has executed successfully.

  1. Exception handling

  2. Recovery blocks

  3. N-version programming

  4. Defensive programming

  5. Damage assessment


Correct Option: B
Explanation:

This is the fault-tolerant approach where each program component includes a text to check if the component has executed successfully.

______________ is a factor of maintenance costs of a system in which keeping track of all system documents and ensuring that these are kept consistent.

  1. The application domain

  2. Module independence

  3. Configuration management techniques

  4. Staff stability

  5. Programming style


Correct Option: C
Explanation:

This is a factor of maintenance costs of a system in which keeping track of all system documents and ensuring that these are kept consistent.

________________ is type of system testing is sometimes performed with realistic data of the client to demonstrate satisfactory working of the software.

  1. Acceptance

  2. Regression

  3. Top-down

  4. Bottom-up

  5. Stress


Correct Option: A
Explanation:

This is type of system testing is sometimes performed with realistic data of the client to demonstrate satisfactory working of the software..

_____________ models are based on loosely coupled entities that maintains their own state and operations.

  1. Repository

  2. Object

  3. Data-flow

  4. Domain specific

  5. Client-Server


Correct Option: B
Explanation:

This type of models are based on loosely coupled entities that maintains their own state and operations.

______________ proposal to identify objects in object-oriented design is the one in which each scenario is analysed and the team responsible for the analysis must identify the required objects.

  1. Grammatical analysis

  2. Tangible entities

  3. Behavioral approach

  4. Scenario-based analysis

  5. Inheritance


Correct Option: D
Explanation:

This proposal to identify objects in object-oriented design is the one in which each scenario is analysed and the team responsible for the analysis must identify the required objects.

______________ type of tests focus on the program control structure and test cases are derived to ensure that all statements in the programme have been executed at least once during testing.

  1. Black-box

  2. White-box

  3. Task

  4. Behavioral

  5. Inter-task


Correct Option: B
Explanation:

This type of tests focus on the programme control structure and the test cases are derived to ensure that all statements in the programme have been executed at least once during testing.

- Hide questions