SlideShare a Scribd company logo
1 | P a g e O d d S e m e s t e r
Department of Information Technology
Software Engineering -21UITC51
Unit -1
Part-A
The set of rules,data structure and memory these three combination is______.
A. Hardware
B. Framework
C. Software
D. Malware
2. Software Engineering is a___________.
A. Layered Technology
B. Framework
C. Component
D. Tool
3. Communication Framework activity involves heavy communication and
collaboration with_________.
A. Developer
B. Tester
C. User/Customer
D. Distributor
4. Example of System software is__________.
A. Framework
B. AI
C. Compiler
D. Web
5. Product Line software designed to provide a ________ for use by many
different customer.
2 | P a g e O d d S e m e s t e r
A. Linked
B. Developer
C. Specific Capability
D. Limited
6. _______ is rapidly becoming a computing engine as well as a content
provider
A. World Wide Web
B. Internet
C. Vast Network
D. Wireless Network
7. The rapid growth of wireless networking may soon lead to true______.
A. Project
B. User Market
C. Distributed Computing
D. Legacy
8. What type technology which include tools as a part of their technology.?
A. IEEE
B. Wireless Technology
C. Legacy
D. Layered Technology
9. SEI Stands for_____.
A. Software Engineering Institute
B. Software Project Tracking and Control
C. Reusability Management
D. Software Quality Assurance
10. The foundation for software engineering is the_____.?
A. Manage
B. Development
C. Software
D. Process Layer
3 | P a g e O d d S e m e s t e r
11. The RAD model is a _______ of waterfall model.?
A. Low Speed
B. Mid Speed
C. High Speed
D. Normal Speed
12. Prototype can be used as a ________process model.
A. General
B. Competitive
C. Standalone
D. Complex
13. The Component - based development model incorporates many of
characteristics of the ________.?
A. Technical model
B. General model
C. Complex model
D. Spiral model
14. ASD is a technique for building________.?
A. High end software
B. Low end software
C. Complex software and system
D. Framework
15. The Incremental Model applies _____________ in a staggered fashion as
calendar time progresses.
A. RAD Model
B. Prescriptive Models
C. Phases - business
D. Linear Sequences
Part-B
1. Define software
2. Define software engineering.
4 | P a g e O d d S e m e s t e r
3. What is prototyping?
4. Define verification.
5. What is agile?
6. Write notes on Agility.
7. Define scrum.
Part-C
1. Write about the layered technology, Write neat diagram.
2. Explain the Process Framework with necessary illustration.
3. Write about CMMI from level 0 to level 5.
4. Write notes on Specific Goals for the Project Management.
5. Explain Waterfall Model.
Part-D
1. Describe the Evolutionary Process Model, Write necessary illustration.
2. Describe Agile Process Model.
3. Write a principles of agile process.
Unit -2
Part -A
1) In 1970, less than ______ percent of the public could have defined
what "computer Software" meant
a) Five b) One c) Seven d) Two
2) _____ software is a collection of programs written to service other programs.
a) Application b) Embedded c) System d) Product Line
3) Today, there are _______broad categories of computer software
present continuing challenges for software engineers
a) six b) Seven c) eight d) nine
4) When a hardware component wears out it is _____ by a spare part.
5 | P a g e O d d S e m e s t e r
a) Replaced b) Destroyed c) Maintain d) Distrubuted
5) Collection of processed data is called _________
a) Class b) Object c) Information d) Software
6) The WWW is rapidly becoming a computing engine as well as ______
provider
a) Concept b) Content c) Resource d) Component
7) _______ span a wide array of applications.
a) AI b) Icons c) Web Apps d) Testing
8) The rapid growth of wireless network may soon lead to true ______
computing
a) Distributed b) Developed c) Significant d) Processed
9) The software must be ______ to meet the needs of new computing
environment.
a) Enhanced b) Adapted c) Rearchitected d) Interoperable
10) ______ have a number of attributes that have made them Insidious
a) Information b) Interface c) Inheritance d) Myths
11) The software must be _______ implement new business requirement.
a) Enhanced b) Adapted c) Interoperable d) Rearchitected
12) _______and his colleagues described Legacy Software
a) Dayani-Fard b) David Vaskevitch c) Dennis Ritche d) Anonymous
13) _____ is a example for Artifical intelligence software
a) OS b) Pattern Lock c) Database d) Digital Function
14) The Law of continuing change was started on__________.
a) 1999 b) 1974
c) 1954 d) 1982
15) RAD stands for
6 | P a g e O d d S e m e s t e r
a) Rapid Application development b) Relate Applet Distributer c) Rapid
Achieved Development d) Rapid Actual Distributor
16.When a hardware component wears out it is _____ by a spare part.
a) Replaced b) Repair c)remove d) maintain
17.The WWW is rapidly becoming a computing engine as well as
______ provider.
a) Concept a) Renew c)resource d) service
18.______________ are used to create interfaces.
a) Boundary classes a) classes c) Public classes c) Private classes
19. The _____________ takes the input output view of the system.
a) Flowchart a) Data flow c) Procedure c) Algorithm
Part-B
1. List the Requirement Engineering Tasks.
2. Write notes on Inception.
3. Write notes on Elicitation.
4. Define QFD.
5. Write notes on Reviews.
Part-C
1. Elaborate Negotiating Requirements.
2. Write notes on Developing use cases.
3. Describe a Behavioural Model with an Example.
4. Describe the Short Note on Inception in Requirement Engineering.
5. List the Validating Requirements.
6. List the Analysis Rule of Thumb.
Part-D
1. Explain Eliciting Requirements.
2. Write notes on Flow oriented Modelling with relevant example.
7 | P a g e O d d S e m e s t e r
Unit- 3
Part -A
1. The __________ transforms analysis-class models into design class
realizations and the Requisite data structure required to implement the
Software
a)Architectural Design b)Data/class design c) Interface Design
d) components level design
2. The ________defines the relationship between major structural
elements of software
a)Data/class Design b) Interface Design c)Architectural Design
d)component-level Design
3. The _________ describes how the Software Communicates with system
That interoperate with it and with human who use it
a)Data/class Design b) Interface Design c)Architectural Design
d)component-level Design
4. The Component level design transforms structural elements of the
Software architecture into a procedural description of __________
a)Software Component b)architecture design c) Class design d) Data
flow
5. Software design is an ________ Process
a)Iterative process b) modular c) Blue prints d) design
6. A design should be ________
a)Function independence b) Refinement c)Modular d) Architecture
7. Usability is accessed by considering ________
a)Reliability b) Performance e) supportability d) human factor
8 | P a g e O d d S e m e s t e r
8. _________ refers to a Sequence of instructions that have a Specific and
limited function
a)Procedural abstraction b)Data abstraction c) Highest level abstraction
d) lowest level abstraction
9. _______Is a named Collection of data that describe a data object
a)procedural abstraction b) Highest level Abstraction c) Lowest level
abstraction d) Data abstraction
10. ________ Represents architecture as of an organized Collection of
program Component
a)Dynamic model b)Structural model c) Functional model d) Framework
model
11. Functional model can in be used to represent the ______of a system
a)Behavioural aspects b) Functional hierarchy c) Technical process
d) Collection of program Component
12. ___________ strategy originally proposed by niklaus writh
a)Top-Down b) Down-Top c)
13. __________ Is actually Process of elaboration
a)Refinement b)Abstraction c) Architecture d)Refactoring
14. __________ Creates a model of data and or information
a)Architecture Design b) Data Design c) Interface Design d) Component
level design
15. The business IT Community has developed data mining techniques also
Classes Called __________
a)Knowledge discovery in database b) data warehouse c) different
structure d) existing database environment
9 | P a g e O d d S e m e s t e r
16. _______ those system that use the target system part of some higher a
Level processing Scheme
a)Superordinate system b) subordinate system C) poor level system
d)Actors
17. _________those system that Interacts on a poor-to-poor basis.
a)Superordinate system b) peer-level systems c) Subordinate system
d) Actors
18. _________ those entities that interacts with the target system by
producing
a)Superordinate system b) peer-level systems c) Subordinate system
d) Actors
19. __________ Coordinates access to all detectors attached to the system
a) Control panel processing. B) Alarm processing c) Detector
Management d) External communication management
20. __________ Is a set of design stops that allows a DFD with transform.
A)Transaction flow b) Transform mapping c)Transaction mapping
d)Transform flow
Part – B
1. Define architectural design .
2. Write notes on interface design
3. What is component level design.
4. Define abstraction.
5. Define, Functional independence. ( Coupling, cohesion)
6. List the levels of data design.
Part – C
1. List Quality Guidelines?
2. Elabroate design classes
10 | P a g e O d d S e m e s t e r
3. Explain why architecture is important?
4. How will you represent a system in context
5. Write notes on design trade-off analysis method
6. write the steps involved in transaction mapping
Part – D
1. Explain design Concepts
2. Discuss the design element in design model
3. Explain architectural styles and pattern
4. Illustrate transform mapping
Unit – 4
Part – A
1. Testing begins at the _______level
a)Design b) Component c)modular d) Iterative
2. _________ Refers to different set of activity that ensure that the
software that has been built is traceable to Customer requirements
a)validation b)verification c) Specification d)Elaboration
3. ___________Refer to the Set of activities that ensure that software
correctly implement a specific function
a)validation b)verification c) Specification d)Elaboration
4. Expand ITG
a)Integrated Technology Group b) Independent test Group
c)Information Technology Group d) Internet Technology Group
5. Good Design dictates that error Conditions be anticipated and error-
handling path is called as
a)Control Flow b) Antibugging c) data structure d)unit test
11 | P a g e O d d S e m e s t e r
6. ______ and _______ represent overhead
a)Planning and Control b) Analysis and Design c)Implementation and
execution d) Drivers and stubs
7. ____________ is a systematic technique
a)Unit testing b)Completion of Testing c)Regression Testing
d)Integration testing
8. __________ is the activity that helps to ensure changes
a)Unit testing b)Completion of Testing c)Regression Testing
d)Integration testing
9. ________ outlines The classes of tests to be conducted
a)Test Summary Report b)Test Plan c)Defect Report d)Test Design
10.The configuration review, sometimes called an
a)Unit testing b) Antibugging c)unit test d) Audit
11.Debugging occurs as a consequence of successful ________
a)Bug prevention b)Execution c)Testing d)Analyses
12.A Common debugging approach for small program is called as ________
a)Back tracking b)Bug prevention c)Execution d)Testing
Part B
1. Differentiate between verification a validations .
2. write note on unit testing.
3. list the steps in bottom-up integration Testing.
4. Define alpha-beta testing.
5. List the software testing fundamentals.
6. Write notes on data flow testing.
12 | P a g e O d d S e m e s t e r
Part C
1. Elaborate smoke testing
2. Compare and Contract between Top-down and bottom up integration
3. Explain black box testing
4. Explain flow-graph notation?
5. How will you derive test cases?
Part D
1. Explain the types of system testing?
2. Describe the art of debugging
3. Explain in detail Control structure testing
Unit – 5
Part A
1. The function point metric (FP), first proposed by
a))Albrecht b) Marvin c) Tom Demarco d)Freed Brooks
2. _______metrics focus on characteristics of the program architecture
a)Architectural design b)Data/class design c) Interface Design
d) components level design
3. _______ Is measured by taking a static count of OO entities such as
classes or operations.
a)Volume b)Population c) length D) Functionality
4. ________ is the physical connections between elements of the OO
design
a)Coupling b) Complexity C)Cohesion d) Sufficiency
5. _______compares the abstraction from the point of view of the current
application
a)Sufficiency b)Coupling c) Complexity d)Cohesion
13 | P a g e O d d S e m e s t e r
6. The _______ is the fundamental unit of an OO system
a)Flow lines b)Class c) Entity d)Attributes
7. Expand RFC
a)Response for a class b) Request for Comments c) Remote Flow Control
d)Remote Function Call
8. _______ is a set of data tokens lies on one or more data slice
a)Data Slice b) Data Token c)Stickiness d)Glue tokens
9. The most widely used (and debated) complexity metric for computer
software is __________
a)Encyclopedic b) operation Complexity c)cyclomatic complexity d)
Cohesion Metrics
10.__________ provides an indication of the stability of a software product
a)software maturity index b) integrated Technology Group c)
Information Technology Group
11._________Provides the framework from which a comprehensive plan
for software development can be established.
a)software process b)software development c) process Framework d)
Task pattern
12._________highly motivated project team, also called an agile team
a)Four b)Five c) Three d)Seven
Part B
1. Define Software quality
2. List the factors of quality
3. List the measures of metrics for Source Code ?
4. Give the effective software project management Spector
5. Define Problem Solving
14 | P a g e O d d S e m e s t e r
6. Define the structure of software engineering teams
Part – C
1. Explain ISO 9126 quality factors?
2. Explain the process of software project management
3. List the approaches to Software projects
4. Describe the measurable Characteristic of OO design
5. Explain the MODE metrics Suite
Part – D
1. Elaborate function based metrics.
2. Explain architectural design metrics
3. Discuss the role of people in project management

More Related Content

Similar to Software Engineering Question Bank.docx

Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
lizabonilla
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
elizabethbrown2018
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final examsexamzking
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
MARKSHEET
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
CodeOps Technologies LLP
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
Ganesh Samarthyam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%sharing3444
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%singup22
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%largest433
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%flyperhan
 
Bis 220
Bis 220 Bis 220
Bis 220
beatcourse
 
Bis 220 final examination
Bis 220 final examinationBis 220 final examination
Bis 220 final examination
beatcourse
 
Bis 220 final
Bis 220 finalBis 220 final
Bis 220 final
beatcourse
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...Ninna Basley
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
supportonlineexam11
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part II
Ali I. Al-Mosawi
 
MID SEM (MCQ) - 3.ppt
MID SEM (MCQ) - 3.pptMID SEM (MCQ) - 3.ppt
MID SEM (MCQ) - 3.ppt
LimKhaiHong
 

Similar to Software Engineering Question Bank.docx (20)

Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
 
Software Architecture - Quiz Questions
Software Architecture - Quiz QuestionsSoftware Architecture - Quiz Questions
Software Architecture - Quiz Questions
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220
Bis 220 Bis 220
Bis 220
 
Bis 220 final examination
Bis 220 final examinationBis 220 final examination
Bis 220 final examination
 
Bis 220 final
Bis 220 finalBis 220 final
Bis 220 final
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Samples of competitive examination questions: part II
Samples of competitive examination questions: part IISamples of competitive examination questions: part II
Samples of competitive examination questions: part II
 
MID SEM (MCQ) - 3.ppt
MID SEM (MCQ) - 3.pptMID SEM (MCQ) - 3.ppt
MID SEM (MCQ) - 3.ppt
 

More from karthikaparthasarath

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
karthikaparthasarath
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docx
karthikaparthasarath
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
karthikaparthasarath
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptx
karthikaparthasarath
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
karthikaparthasarath
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdf
karthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
karthikaparthasarath
 
simple programs.docx
simple programs.docxsimple programs.docx
simple programs.docx
karthikaparthasarath
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
karthikaparthasarath
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docx
karthikaparthasarath
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docx
karthikaparthasarath
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
karthikaparthasarath
 
Activity Hill Cipher.pptx
Activity  Hill Cipher.pptxActivity  Hill Cipher.pptx
Activity Hill Cipher.pptx
karthikaparthasarath
 
Activity Caesar Cipher.pptx
Activity Caesar Cipher.pptxActivity Caesar Cipher.pptx
Activity Caesar Cipher.pptx
karthikaparthasarath
 
Cyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptxCyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptx
karthikaparthasarath
 
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
karthikaparthasarath
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
karthikaparthasarath
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
karthikaparthasarath
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
karthikaparthasarath
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
karthikaparthasarath
 

More from karthikaparthasarath (20)

BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
Fundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docxFundamentals of Computers MCQS.docx
Fundamentals of Computers MCQS.docx
 
BASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptxBASIC COMPUTER ORGANIZATION unit 1.pptx
BASIC COMPUTER ORGANIZATION unit 1.pptx
 
ATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptxATTACKER TECHNIQUES AND MOTIVATION.pptx
ATTACKER TECHNIQUES AND MOTIVATION.pptx
 
Unit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptxUnit - I cyber security fundamentals part -1.pptx
Unit - I cyber security fundamentals part -1.pptx
 
BUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdfBUilt in Functions and Simple programs in R.pdf
BUilt in Functions and Simple programs in R.pdf
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
simple programs.docx
simple programs.docxsimple programs.docx
simple programs.docx
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
UNIT III Process Synchronization.docx
UNIT III Process Synchronization.docxUNIT III Process Synchronization.docx
UNIT III Process Synchronization.docx
 
Android Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docxAndroid Lab Mannual 18SUITSP5.docx
Android Lab Mannual 18SUITSP5.docx
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
 
Activity Hill Cipher.pptx
Activity  Hill Cipher.pptxActivity  Hill Cipher.pptx
Activity Hill Cipher.pptx
 
Activity Caesar Cipher.pptx
Activity Caesar Cipher.pptxActivity Caesar Cipher.pptx
Activity Caesar Cipher.pptx
 
Cyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptxCyber Security Unit I Part -I.pptx
Cyber Security Unit I Part -I.pptx
 
Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
UNIT I - Part 1.pptx
UNIT I - Part 1.pptxUNIT I - Part 1.pptx
UNIT I - Part 1.pptx
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Software Engineering Question Bank.docx

  • 1. 1 | P a g e O d d S e m e s t e r Department of Information Technology Software Engineering -21UITC51 Unit -1 Part-A The set of rules,data structure and memory these three combination is______. A. Hardware B. Framework C. Software D. Malware 2. Software Engineering is a___________. A. Layered Technology B. Framework C. Component D. Tool 3. Communication Framework activity involves heavy communication and collaboration with_________. A. Developer B. Tester C. User/Customer D. Distributor 4. Example of System software is__________. A. Framework B. AI C. Compiler D. Web 5. Product Line software designed to provide a ________ for use by many different customer.
  • 2. 2 | P a g e O d d S e m e s t e r A. Linked B. Developer C. Specific Capability D. Limited 6. _______ is rapidly becoming a computing engine as well as a content provider A. World Wide Web B. Internet C. Vast Network D. Wireless Network 7. The rapid growth of wireless networking may soon lead to true______. A. Project B. User Market C. Distributed Computing D. Legacy 8. What type technology which include tools as a part of their technology.? A. IEEE B. Wireless Technology C. Legacy D. Layered Technology 9. SEI Stands for_____. A. Software Engineering Institute B. Software Project Tracking and Control C. Reusability Management D. Software Quality Assurance 10. The foundation for software engineering is the_____.? A. Manage B. Development C. Software D. Process Layer
  • 3. 3 | P a g e O d d S e m e s t e r 11. The RAD model is a _______ of waterfall model.? A. Low Speed B. Mid Speed C. High Speed D. Normal Speed 12. Prototype can be used as a ________process model. A. General B. Competitive C. Standalone D. Complex 13. The Component - based development model incorporates many of characteristics of the ________.? A. Technical model B. General model C. Complex model D. Spiral model 14. ASD is a technique for building________.? A. High end software B. Low end software C. Complex software and system D. Framework 15. The Incremental Model applies _____________ in a staggered fashion as calendar time progresses. A. RAD Model B. Prescriptive Models C. Phases - business D. Linear Sequences Part-B 1. Define software 2. Define software engineering.
  • 4. 4 | P a g e O d d S e m e s t e r 3. What is prototyping? 4. Define verification. 5. What is agile? 6. Write notes on Agility. 7. Define scrum. Part-C 1. Write about the layered technology, Write neat diagram. 2. Explain the Process Framework with necessary illustration. 3. Write about CMMI from level 0 to level 5. 4. Write notes on Specific Goals for the Project Management. 5. Explain Waterfall Model. Part-D 1. Describe the Evolutionary Process Model, Write necessary illustration. 2. Describe Agile Process Model. 3. Write a principles of agile process. Unit -2 Part -A 1) In 1970, less than ______ percent of the public could have defined what "computer Software" meant a) Five b) One c) Seven d) Two 2) _____ software is a collection of programs written to service other programs. a) Application b) Embedded c) System d) Product Line 3) Today, there are _______broad categories of computer software present continuing challenges for software engineers a) six b) Seven c) eight d) nine 4) When a hardware component wears out it is _____ by a spare part.
  • 5. 5 | P a g e O d d S e m e s t e r a) Replaced b) Destroyed c) Maintain d) Distrubuted 5) Collection of processed data is called _________ a) Class b) Object c) Information d) Software 6) The WWW is rapidly becoming a computing engine as well as ______ provider a) Concept b) Content c) Resource d) Component 7) _______ span a wide array of applications. a) AI b) Icons c) Web Apps d) Testing 8) The rapid growth of wireless network may soon lead to true ______ computing a) Distributed b) Developed c) Significant d) Processed 9) The software must be ______ to meet the needs of new computing environment. a) Enhanced b) Adapted c) Rearchitected d) Interoperable 10) ______ have a number of attributes that have made them Insidious a) Information b) Interface c) Inheritance d) Myths 11) The software must be _______ implement new business requirement. a) Enhanced b) Adapted c) Interoperable d) Rearchitected 12) _______and his colleagues described Legacy Software a) Dayani-Fard b) David Vaskevitch c) Dennis Ritche d) Anonymous 13) _____ is a example for Artifical intelligence software a) OS b) Pattern Lock c) Database d) Digital Function 14) The Law of continuing change was started on__________. a) 1999 b) 1974 c) 1954 d) 1982 15) RAD stands for
  • 6. 6 | P a g e O d d S e m e s t e r a) Rapid Application development b) Relate Applet Distributer c) Rapid Achieved Development d) Rapid Actual Distributor 16.When a hardware component wears out it is _____ by a spare part. a) Replaced b) Repair c)remove d) maintain 17.The WWW is rapidly becoming a computing engine as well as ______ provider. a) Concept a) Renew c)resource d) service 18.______________ are used to create interfaces. a) Boundary classes a) classes c) Public classes c) Private classes 19. The _____________ takes the input output view of the system. a) Flowchart a) Data flow c) Procedure c) Algorithm Part-B 1. List the Requirement Engineering Tasks. 2. Write notes on Inception. 3. Write notes on Elicitation. 4. Define QFD. 5. Write notes on Reviews. Part-C 1. Elaborate Negotiating Requirements. 2. Write notes on Developing use cases. 3. Describe a Behavioural Model with an Example. 4. Describe the Short Note on Inception in Requirement Engineering. 5. List the Validating Requirements. 6. List the Analysis Rule of Thumb. Part-D 1. Explain Eliciting Requirements. 2. Write notes on Flow oriented Modelling with relevant example.
  • 7. 7 | P a g e O d d S e m e s t e r Unit- 3 Part -A 1. The __________ transforms analysis-class models into design class realizations and the Requisite data structure required to implement the Software a)Architectural Design b)Data/class design c) Interface Design d) components level design 2. The ________defines the relationship between major structural elements of software a)Data/class Design b) Interface Design c)Architectural Design d)component-level Design 3. The _________ describes how the Software Communicates with system That interoperate with it and with human who use it a)Data/class Design b) Interface Design c)Architectural Design d)component-level Design 4. The Component level design transforms structural elements of the Software architecture into a procedural description of __________ a)Software Component b)architecture design c) Class design d) Data flow 5. Software design is an ________ Process a)Iterative process b) modular c) Blue prints d) design 6. A design should be ________ a)Function independence b) Refinement c)Modular d) Architecture 7. Usability is accessed by considering ________ a)Reliability b) Performance e) supportability d) human factor
  • 8. 8 | P a g e O d d S e m e s t e r 8. _________ refers to a Sequence of instructions that have a Specific and limited function a)Procedural abstraction b)Data abstraction c) Highest level abstraction d) lowest level abstraction 9. _______Is a named Collection of data that describe a data object a)procedural abstraction b) Highest level Abstraction c) Lowest level abstraction d) Data abstraction 10. ________ Represents architecture as of an organized Collection of program Component a)Dynamic model b)Structural model c) Functional model d) Framework model 11. Functional model can in be used to represent the ______of a system a)Behavioural aspects b) Functional hierarchy c) Technical process d) Collection of program Component 12. ___________ strategy originally proposed by niklaus writh a)Top-Down b) Down-Top c) 13. __________ Is actually Process of elaboration a)Refinement b)Abstraction c) Architecture d)Refactoring 14. __________ Creates a model of data and or information a)Architecture Design b) Data Design c) Interface Design d) Component level design 15. The business IT Community has developed data mining techniques also Classes Called __________ a)Knowledge discovery in database b) data warehouse c) different structure d) existing database environment
  • 9. 9 | P a g e O d d S e m e s t e r 16. _______ those system that use the target system part of some higher a Level processing Scheme a)Superordinate system b) subordinate system C) poor level system d)Actors 17. _________those system that Interacts on a poor-to-poor basis. a)Superordinate system b) peer-level systems c) Subordinate system d) Actors 18. _________ those entities that interacts with the target system by producing a)Superordinate system b) peer-level systems c) Subordinate system d) Actors 19. __________ Coordinates access to all detectors attached to the system a) Control panel processing. B) Alarm processing c) Detector Management d) External communication management 20. __________ Is a set of design stops that allows a DFD with transform. A)Transaction flow b) Transform mapping c)Transaction mapping d)Transform flow Part – B 1. Define architectural design . 2. Write notes on interface design 3. What is component level design. 4. Define abstraction. 5. Define, Functional independence. ( Coupling, cohesion) 6. List the levels of data design. Part – C 1. List Quality Guidelines? 2. Elabroate design classes
  • 10. 10 | P a g e O d d S e m e s t e r 3. Explain why architecture is important? 4. How will you represent a system in context 5. Write notes on design trade-off analysis method 6. write the steps involved in transaction mapping Part – D 1. Explain design Concepts 2. Discuss the design element in design model 3. Explain architectural styles and pattern 4. Illustrate transform mapping Unit – 4 Part – A 1. Testing begins at the _______level a)Design b) Component c)modular d) Iterative 2. _________ Refers to different set of activity that ensure that the software that has been built is traceable to Customer requirements a)validation b)verification c) Specification d)Elaboration 3. ___________Refer to the Set of activities that ensure that software correctly implement a specific function a)validation b)verification c) Specification d)Elaboration 4. Expand ITG a)Integrated Technology Group b) Independent test Group c)Information Technology Group d) Internet Technology Group 5. Good Design dictates that error Conditions be anticipated and error- handling path is called as a)Control Flow b) Antibugging c) data structure d)unit test
  • 11. 11 | P a g e O d d S e m e s t e r 6. ______ and _______ represent overhead a)Planning and Control b) Analysis and Design c)Implementation and execution d) Drivers and stubs 7. ____________ is a systematic technique a)Unit testing b)Completion of Testing c)Regression Testing d)Integration testing 8. __________ is the activity that helps to ensure changes a)Unit testing b)Completion of Testing c)Regression Testing d)Integration testing 9. ________ outlines The classes of tests to be conducted a)Test Summary Report b)Test Plan c)Defect Report d)Test Design 10.The configuration review, sometimes called an a)Unit testing b) Antibugging c)unit test d) Audit 11.Debugging occurs as a consequence of successful ________ a)Bug prevention b)Execution c)Testing d)Analyses 12.A Common debugging approach for small program is called as ________ a)Back tracking b)Bug prevention c)Execution d)Testing Part B 1. Differentiate between verification a validations . 2. write note on unit testing. 3. list the steps in bottom-up integration Testing. 4. Define alpha-beta testing. 5. List the software testing fundamentals. 6. Write notes on data flow testing.
  • 12. 12 | P a g e O d d S e m e s t e r Part C 1. Elaborate smoke testing 2. Compare and Contract between Top-down and bottom up integration 3. Explain black box testing 4. Explain flow-graph notation? 5. How will you derive test cases? Part D 1. Explain the types of system testing? 2. Describe the art of debugging 3. Explain in detail Control structure testing Unit – 5 Part A 1. The function point metric (FP), first proposed by a))Albrecht b) Marvin c) Tom Demarco d)Freed Brooks 2. _______metrics focus on characteristics of the program architecture a)Architectural design b)Data/class design c) Interface Design d) components level design 3. _______ Is measured by taking a static count of OO entities such as classes or operations. a)Volume b)Population c) length D) Functionality 4. ________ is the physical connections between elements of the OO design a)Coupling b) Complexity C)Cohesion d) Sufficiency 5. _______compares the abstraction from the point of view of the current application a)Sufficiency b)Coupling c) Complexity d)Cohesion
  • 13. 13 | P a g e O d d S e m e s t e r 6. The _______ is the fundamental unit of an OO system a)Flow lines b)Class c) Entity d)Attributes 7. Expand RFC a)Response for a class b) Request for Comments c) Remote Flow Control d)Remote Function Call 8. _______ is a set of data tokens lies on one or more data slice a)Data Slice b) Data Token c)Stickiness d)Glue tokens 9. The most widely used (and debated) complexity metric for computer software is __________ a)Encyclopedic b) operation Complexity c)cyclomatic complexity d) Cohesion Metrics 10.__________ provides an indication of the stability of a software product a)software maturity index b) integrated Technology Group c) Information Technology Group 11._________Provides the framework from which a comprehensive plan for software development can be established. a)software process b)software development c) process Framework d) Task pattern 12._________highly motivated project team, also called an agile team a)Four b)Five c) Three d)Seven Part B 1. Define Software quality 2. List the factors of quality 3. List the measures of metrics for Source Code ? 4. Give the effective software project management Spector 5. Define Problem Solving
  • 14. 14 | P a g e O d d S e m e s t e r 6. Define the structure of software engineering teams Part – C 1. Explain ISO 9126 quality factors? 2. Explain the process of software project management 3. List the approaches to Software projects 4. Describe the measurable Characteristic of OO design 5. Explain the MODE metrics Suite Part – D 1. Elaborate function based metrics. 2. Explain architectural design metrics 3. Discuss the role of people in project management