Professional Documents
Culture Documents
Cs8494 Software Engineering MCQ
Cs8494 Software Engineering MCQ
Cs8494 Software Engineering MCQ
in
IT - Regulations 2017
Answer: b
TOPIC 1.1 INTRODUCTION TO Explanation: None.
SOFTWARE ENGINEERING, 4. Identify an ethical dilemma from the
SOFTWARE PROCESS situations mentioned below:
a) Your employer releases a safety-critical
1. Choose the correct option in terms of system without finishing the testing of the
Issues related to professional responsibility system
a) Confidentiality b) Refusing to undertake a project
b) Intellectual property rights c) Agreement in principle with the policies of
c) Both Confidentiality & Intellectual senior management
property rights d) All of the mentioned
d) Managing Client Relationships
Answer: a
Answer: c Explanation: None.
Explanation: Engineers should normally
respect the confidentiality of their employers 5. Identify the correct statement: “Software
or clients irrespective of whether or not a engineers shall
formal confidentiality agreement has been a) act in a manner that is in the best interests
signed. of his expertise and favour.”
They should be aware of local laws governing b) act consistently with the public interest.”
the use of intellectual property such as c) ensure that their products only meet the
patents, copyright, etc.
SRS.” Answer: a
d) all of the mentioned Explanation: Option b & c are a part of
Software Engineering as a subject,hence
Answer: b option a covers them both.
Explanation: Software engineers shall act in
a manner that is in the best interests of their 9. The reason for software bugs and failures
client and employer consistent with the public is due to
interest and shall ensure that their products a) Software companies
and related modifications meet the highest b) Software Developers
professional standards possible.Thus options c) Both Software companies and Developers
a & c are ruled out. d) All of the mentioned
Answer: b
Explanation: Licensing of a software product TOPIC 1.2 PERSPECTIVE AND
comes under corporate part of the software SPECIALIZED PROCESS
company. MODELS
8. As per an IBM report, “31%of the project
1. Build & Fix Model is suitable for
get cancelled before they are completed, 53%
programming exercises of ___________ LOC
overrun their cost estimates by an average of
(Line of Code).
189% and for every 100 projects, there are 94
a) 100-200
restarts”.What is the reason for these statistics
b) 200-400
?
c) 400-1000
a) Lack of adequate training in software
d) above 1000
engineering
b) Lack of software ethics and understanding Answer: a
c) Management issues in the company Explanation: Build & Fix Model is suitable
d) All of the mentioned
for small projects & programming exercises a) No room for structured design
of 100 or 200 lines. b) Code soon becomes unfixable &
unchangeable
2. RAD stands for c) Maintenance is practically not possible
a) Relative Application Development d) It scales up well to large projects
M
b) Rapid Application Development
c) Rapid Application Document Answer: d
d) None of the mentioned Explanation: Build & Fix Model is suitable
O
for 100-200 LOC
Answer: b
C
Explanation: None. 7. RAD Model has
a) 2 phases
3. Which one of the following models is not
T.
b) 3 phase
suitable for accommodating any change? c) 5 phases
a) Build & Fix Model d) 6 phases
b) Prototyping Model
O
c) RAD Model Answer: c
d) Waterfall Model Explanation: RAD Model consists of five
SP
phases namely:Business modeling,Data
Answer: d modeling,Process modeling,Application
Explanation: Real projects rarely follow the generation and Testing & Turnover.
sequential flow that the Waterfall Model
proposes. 8. What is the major drawback of using RAD
G
Model?
4. Which is not one of the types of prototype a) Highly specialized & skilled
LO
Diagonal Prototype whereas other options Explanation: The client may create an
have their respective definitions. unrealistic product vision leading a team to
over or under-develop functionality.Also, the
5. Which one of the following is not a phase specialized & skilled developers are not
-R
Answer:a Answer: b
Explanation: None. Explanation: Incremental development is
supported through small, frequent system
8. Which of the following does not apply to releases.
agility to a software process?
a) Uses incremental product delivery strategy 2. In XP, as soon as the work on a task is
b) Only essential work products are produced complete, it is integrated into the whole
c) Eliminate the use of project planning and system.
testing a) True
d) All of the mentioned b) False
Answer:c Answer: a
Explanation: Testing is a major part of each Explanation: XP follows a continuous
software development process which can’t be integration approach.After any such
avoided. integration, all the unit tests in the system
must pass.
9. Which three framework activities are
present in Adaptive Software 3. In XP Increments are delivered to
Development(ASD) ? customers every _______ weeks.
a) analysis, design, coding a) One
b) requirements gathering, adaptive cycle b) Two
planning, iterative development c) Three
c) speculation, collaboration, learning d) Four
d) all of the mentioned
Answer: b
Answer:c Explanation: Extreme Programming (XP)
Explanation: None. takes an ‘extreme’ approach to iterative
development.New versions may be built
10. In agile development it is more important several times per day, hence delivering the
to build software that meets the customers’ increment for approval every 2nd week after
needs today than worry about features that testing the new version.
might be needed in the future.
a) True 4. User requirements are expressed as
b) False __________ in Extreme Programming.
a) implementation tasks
Answer:a b) functionalities
Explanation: None. c) scenarios
d) none of the mentioned
TOPIC 1.4 EXTREME Answer: c
PROGRAMMING-XP PROCESS Explanation: User requirements are
expressed as scenarios or user stories.These
are written on cards and the development used to run all component tests each time that
team break them down into implementation a new release is built.
tasks. These tasks are the basis of schedule
and cost estimates. 8. In XP an automated unit test framework is
used to write tests for a new piece of
5. Is a customer involved test development functionality before that functionality itself is
and validation in XP ? implemented.
a) Yes a) True
b) No b) False
c) It may vary from Customer to Customer
d) None of the mentioned Answer: a
Explanation: XP follows Test-first
Answer: c development approach.
Explanation: The role of the customer in the
testing process is to help develop acceptance 9. Developers work individually on a release
tests for the stories that are to be implemented and they compare their results with other
in the next release of the system.However, developers before forwarding that release to
people adopting the customer role have customers.
limited time available and so cannot work a) True
full-time with the development team. They b) False
may feel that providing the requirements was
enough of a contribution and so may be Answer: b
reluctant to get involved in the testing Explanation: XP follows the principle of pair
process. programming which means developers work
in pairs, checking each other’s work and
6. Programmers prefer programming to providing the support to always do a good
testing and sometimes they take shortcuts job.
when writing tests. For example, they may
write incomplete tests that do not check for 10. Which four framework activities are
all possible exceptions that may occur. found in the Extreme Programming(XP) ?
a) True a) analysis, design, coding, testing
b) False b) planning, analysis, design, coding
c) planning, design, coding, testing
Answer: a d) planning, analysis, coding, testing
Explanation: In XP Some tests can be very
difficult to write incrementally.For example, Answer: c
in a complex user interface, it is often Explanation: XP involves the mentioned four
difficult to write unit tests for the code that activities, and in the same in order.
implements the ‘display logic’ and workflow
between screens.
Answer: b Answer: d
Explanation: Stakeholders are anyone who Explanation: None.
has an interest in the project. Project
stakeholders are individuals and organizations 2. Which of the following is not an activity of
that are actively involved in the project, or Structured Analysis (SA) ?
whose interests may be affected as a result of a) Functional decomposition
project execution or project completion. b) Transformation of a textual problem
description into a graphic model
9. Conflicting requirements are common in c) All the functions represented in the DFD
Requirement Engineering, with each client are mapped to a module structure
proposing his or her version is the right one. d) All of the mentioned
a) True
b) False Answer: c
Explanation: The module structure is the
Answer: a software architecture.
Explanation: This situation is seen in every
field of work as each professional has his/her 3. To arrive at a form which is suitable for
way of looking onto things & would argue to implementation in some programming
get his/her point approved. language is the purpose of
a) Structured Analysis (SA)
10. Which is one of the most important b) Structured Design (SD)
stakeholder from the following ? c) Detailed Design (DD)
a) Entry level personnel d) None of the mentioned
b) Middle level stakeholder
c) Managers Answer: b
d) Users of the software Explanation: None.
M
Answer: b
Explanation: Structured Analysis follows 10. Data Store Symbol in DFD represents a
uses decomposition approach. a) Physical file
O
b) Data Structure
6. The context diagram is also known as c) Logical file
C
a) Level-0 DFD d) All of the mentioned
b) Level-1 DFD
Answer: d
T.
c) Level-2 DFD
d) All of the mentioned Explanation: A logical file can be a data
structure or a physical file on disk.
Answer: a
O
Explanation: Context diagram captures the
various entities external to the system
SP
interacting with it and data flow occurring
between the system and the external entities. UNIT III SOFTWARE
7. A directed arc or line in DFD represents
DESIGN
a) Data Store
G
b) Data Process TOPIC 3.1 DESIGN PROCESS ,
c) Data Flow DESIGN CONCEPTS-DESIGN
LO
without architecture is unstable hence every 9. Which of the following is incorrect for
software system has an architecture. Reference model, architectural styles and
reference architecture?
6. What is architectural style? a) They are not architectures
a) Architectural style is a description of b) They are useful steps towards an
component types architecture
b) It is a pattern of run-time control c) They are set of early design decisions
c) It is set of constraints on architecture d) None of the mentioned
d) All of the mentioned
Answer: d
Answer: d Explanation: All of the mentioned are
Explanation: An architectural style is a correct.
description of component types and pattern of
run-time control, It is set of constraints on 10. Which of the following can be considered
architecture. regarding client and server?
a) Client and server is an architectural style
7. What is a Reference Model? b) Client and server may be considered as an
a) It is a division of functionality together architectural style
with data flow between the pieces c) Client and server is not an architectural
b) It is a description of component types style
c) It is standard decomposition of a known d) None of the mentioned
problem into parts that cooperatively solve a
problem Answer: a
d) It is a division of functionality together Explanation: Client and server is an
with data flow between the pieces, It is architectural style.
standard decomposition of a known problem
into parts that cooperatively solve a problem 11. Which of the statements truly concludes
client and server relation with architectural
Answer: d styles?
Explanation: A reference model is division a) They are component types and their
of functionality together with data flow coordination is described in terms of
between the pieces and standard protocols that server uses to communicate
decomposition of a known problem into parts with each of its clients
that cooperatively solve a problem. b) Multiple client cannot exist at an instance
c) Architecture are countless for client and
8. What is Reference architecture? server but their architectural styles are
a) It is a reference model mapped onto different
software components d) All of the mentioned
b) It provided data flow with comments
c) It provides data flow with pieces Answer: a
d) It is a reference model mapped onto Explanation: Multiple client can exist at an
software components & data flow with instance and Architectural styles are countless
comments for client and server but their architectures are
different.
Answer: d
Explanation: Reference architecture is a 12. Which of the following is incorrect?
reference model mapped onto software a) A reference model divides the functionality
components and data flow with components. b) A reference architecture is the mapping of
Answer: d Answer: b
Explanation: This functionality is covered by Explanation: Software testing is the process
UML diagrams. of evaluation a software item to detect
differences between given input and expected
9. The________ is represented as two output.
processing boxes connected by an line
(arrow) of control. 2. What is Cyclomatic complexity?
a) Repetition a) Black box testing
b) Sequence b) White box testing
c) Condition c) Yellow box testing
d) None of the mentioned d) Green box testing
Answer: b Answer: b
Explanation: None. Explanation: Cyclomatic complexity
measures the amount of decision logic in the
10. Which of the following term is best program module.Cyclomatic complexity
defined by the statement “Notation that can gives the minimum number of paths that can
be input directly into a computer-based generate all possible paths through the
development system offers significant module.
benefits.”?
a) Machine readability 3. Lower and upper limits are present in
b) Maintainability which chart?
c) Structure enforcement a) Run chart
d) Overall simplicity b) Bar chart
c) Control chart
Answer: a d) None of the mentioned
Explanation: Readability is processing input.
Answer: a
Explanation: A run chart is used to monitor
the behavior of a variable over time for a
process or system. Run charts graphically
UNIT IV TESTING AND display cycles, trends, shifts, or non-random
MAINTENANCE patterns in behavior over time. It contains
lower and upper limits.
Answer: c
1. Which of the following term describes Explanation: Maintenance Testing is done on
testing? the already deployed software. The deployed
a) Finding broken code software needs to be enhanced, changed or
b) Evaluating deliverable to find errors migrated to other hardware. The Testing done
c) A stage of all projects during this enhancement, change and
d) None of the mentioned
differences between given input and expected 5. White Box techniques are also classified as
output. a) Design based testing
b) Structural testing
2. What is Cyclomatic complexity? c) Error guessing technique
a) Black box testing d) None of the mentioned
b) White box testing
c) Yellow box testing Answer: b
d) Green box testing Explanation: The structural testing is the
testing of the structure of the system or
Answer: b component. Structural testing is often referred
Explanation: Cyclomatic complexity to as ‘white box’ or ‘glass box’ or ‘clear-box
measures the amount of decision logic in the testing’ because in structural testing we are
program module.Cyclomatic complexity interested in what is happening ‘inside the
gives the minimum number of paths that can system/application’.
generate all possible paths through the
module. 6. Exhaustive testing is
a) always possible
3. Lower and upper limits are present in b) practically possible
which chart? c) impractical but possible
a) Run chart d) impractical and impossible
b) Bar chart
c) Control chart Answer: c
d) None of the mentioned Explanation: Exhaustive testing is the testing
where we execute single test case for multiple
Answer: a test data.It means if we are using single test
Explanation: A run chart is used to monitor case for different product or module under
the behavior of a variable over time for a manual testing.
process or system. Run charts graphically testing .
display cycles, trends, shifts, or non-random
patterns in behavior over time. It contains 7. Which of the following is/are White box
lower and upper limits. technique?
a) Statement Testing
4. Maintenance testing is performed using b) Decision Testing
which methodology? c) Condition Coverage
a) Retesting d) All of the mentioned
b) Sanity testing
c) Breadth test and depth test Answer: d
d) Confirmation testing Explanation: Statement testing, decision
testing, condition coverage all of them uses
Answer: c white box technique.
Explanation: Maintenance Testing is done on
the already deployed software. The deployed 8. What are the various Testing Levels?
software needs to be enhanced, changed or a) Unit Testing
migrated to other hardware. The Testing done b) System Testing
during this enhancement, change and c) Integration Testing
migration cycle is known as maintenance d) All of the mentioned
testing.
7. Which of the following errors should not 10. Which testing is an integration testing
be tested when error handling is evaluated? approach that is commonly used when
a) Error description is unintelligible “shrink-wrapped” software products are being
b) Error noted does not correspond to error developed?
encountered a) Regression Testing
c) Error condition causes system intervention b) Integration testing
prior to error handling c) Smoke testing
d) Error description provide enough d) Validation testing
information to assist in the location of the
cause of the error Answer: c
Explanation: Smoke testing is designed as a
Answer: a pacing mechanism for time-critical projects,
Explanation: Actually, error description does allowing the software team to assess its
not provide enough information to assist in project on a frequent basis.
the location of the cause of the error.
11. In which testing level the focus is on
8. What is normally considered as an adjunct customer usage?
to the coding step a) Alpha Testing
a) Integration testing b) Beta Testing
b) Unit testing c) Validation Testing
c) Completion of Testing d) Both Alpha and Beta
d) Regression Testing
Answer: d
Answer: b Explanation: Alpha testing is done at
Explanation: After source level code has developer’s end while beta testing is done at
been developed, reviewed, and verified for user’s end.
correspondence to component level design,
unit test case design begins. 12. Validation refers to the set of tasks that
ensure that software correctly implements a
9. Which of the following is not regression specific function.
test case? a) True
a) A representative sample of tests that will b) False
exercise all software functions
Answer: b Answer: c
Explanation: Its verification, while Explanation: None.
validation refers to a different set of tasks that
ensure that the software that has been built is 4. Forward engineering is not necessary if an
traceable to customer requirements. existing software product is producing the
correct output.
a) True
TOPIC 4.4 SOFTWARE b) False
IMPLEMENTATION
TECHNIQUES: CODING Answer: b
PRACTICES-REFACTORING- Explanation: Forward engineering refers to
taking a high-level model and using it to build
MAINTENANCE AND a more complex lower-level implementation.
REENGINEERING
5. Which of the following is not an example
of a business process?
TOPIC 4.5 BPR MODEL- a) designing a new product
REENGINEERING PROCESS b) hiring an employee
MODEL c) purchasing services
d) testing software
1. What are the problems with re-structuring? Answer: d
a) Loss of comments Explanation: It is a part of development
b) Loss of documentation phase.
c) Heavy computational demands
d) All of the mentioned 6. Which of the following is a data problem?
a) hardware problem
Answer: b b) record organisation problems
Explanation: Restructuring doesn’t help with c) heavy computational demands
poor modularisation where related d) loss of comments
components are dispersed throughout the
code. Answer: b
Explanation: Records representing the same
2. Which of the following is not a module entity may be organised differently in
type? different programs.
a) Object modules
b) Hardware modules 7. When does one decides to re-engineer a
c) Functional modules product?
d) Process support modules a) when tools to support restructuring are
disabled
Answer: a b) when system crashes frequently
Explanation: Except option a all other are c) when hardware or software support
module types. becomes obsolete
d) subsystems of a larger system require few
3. Reverse engineering of data focuses on
maintenance
a) Internal data structures
b) Database structures Answer: c
c) ALL of the mentioned Explanation: Re-engineering involves
d) None of the mentioned
12. Transformation of a system from one 2. Cost and effort estimation of a software
representational form to another is known as uses only one forms of decomposition, either
a) Re-factoring decomposition of the problem or
b) Restructuring decomposition of the process.
c) Forward engineering a) True
d) Both Re-factoring and Restructuring b) False
Answer: d Answer: b
Explanation: None. Explanation: Estimation uses one or both
forms of partitioning.
13. Which of the following is not an objective
of reverse engineering? 3. If a Direct approach to software project
a) to reduce maintenance effort sizing is taken, size can be measured in
b) to cope with complexity a) LOC
c) to avoid side effects b) FP
d) to assist migration to a CASE environment c) LOC and FP
d) None of the mentioned
Answer: d
Explanation: Reverse engineering helps us to Answer: a
detect side effects rather than avoiding them. Explanation: LOC or Line of Code is a direct
measure to estimate project size.
9. A make-buy decision is based on whether 13. If an Indirect approach is taken, then the
a) The software may be purchased off-the- sizing approach is represented as
shelf a) LOC
b) “Full-experience” or “Partial-experience” b) FP
software components should be used
a) Changing customer requirements that are 5. Ensuring that no more than the allocated
not reflected in schedule changes number of people are allocated at any given
b) Technical difficulties that could not have time in Software Scheduling is known as
been foreseen in advance a) Time Allocation
c) Human difficulties that could not have b) Effort Validation
been foreseen in advance c) Defined Milestone
d) All of the mentioned d) Effort Distribution
Answer: d Answer: b
Explanation: None. Explanation: None.
Answer: a Answer: b
Explanation: None. Explanation: These can vary from client to
client.
Answer: d
Explanation: Program evaluation and review
TOPIC 5.4 PROJECT PLAN,
technique (PERT) and critical path method PLANNING PROCESS, RFP
(CPM) are two project scheduling methods RISK MANAGEMENT
that can be applied to software development.
1. Risk management is one of the most
10. A technique for performing quantitative important jobs for a
analysis of progress is known as a) Client
a) BCWS b) Investor
b) EVA c) Production team
c) BAC d) Project manager
d) CBSE
Answer: d
Answer: b Explanation: Risk management involves
Explanation: The earned value system anticipating risks that might affect the project
provides a common value scale for every schedule or the quality of the software being
task, regardless of the type of work being developed, and then taking action to avoid
performed. The total hours to do the whole these risks.
project are estimated, and every task is given
an earned value based on its estimated 2. Which of the following risk is the failure of
percentage of the total. a purchased component to perform as
expected?
11. What is the recommended distribution of a) Product risk
effort for a project? b) Project risk
a) 40-20-40 c) Business risk
b) 50-20-30 d) Programming risk
c) 30-40-30
d) 50-30-20 Answer: a
Explanation: Risks that affect the quality or
Answer: a performance of the software being developed.
Explanation: A recommended distribution of
effort across the software process is 40% 3. Which of the following term is best defined
(analysis and design), 20% (coding), and 40% by the statement: “There will be a change of
(testing). organizational management with different
priorities.”?
12. A project usually has a timeline chart a) Staff turnover
which was developed by b) Technology change
a) Henry Gantt c) Management change
b) Barry Boehm d) Product competition
Answer: c Answer: b
Explanation: None. Explanation: The risks associated with
technology might affect the product
4. Which of the following term is best defined development.
by the statement: “The underlying technology
on which the system is built is superseded by 8. Which of the following term is best defined
new technology.”? by the statement: “Derive traceability
a) Technology change information to maximize information hiding
b) Product competition in the design.”?
c) Requirements change a) Underestimated development time
d) None of the mentioned b) Organizational restructuring
c) Requirements changes
Answer: a d) None of the mentioned
Explanation: Technology changes are
common in the competitive environment of Answer: c
software engineering. Explanation: Tracing the requirements can
help us understand the risk.
5. What assess the risk and your plans for risk
mitigation and revise these when you learn 9. Which of the following strategies means
more about the risk? that the impact of the risk will be reduced?
a) Risk monitoring a) Avoidance strategies
b) Risk planning b) Minimization strategies
c) Risk analysis c) Contingency plans
d) Risk identification d) All of the mentioned
Answer: a Answer: b
Explanation: None. Explanation: None.
6. Which of the following risks are derived 10. Risk management is now recognized as
from the organizational environment where one of the most important project
the software is being developed? management tasks.
a) People risks a) True
b) Technology risks b) False
c) Estimation risks
d) Organizational risks Answer: a
Explanation: None.
Answer: d
Explanation: These risks are at management
level.
TOPIC 5.5 IDENTIFICATION,
PROJECTION - RISK
7. Which of the following risks are derived MANAGEMENT-RISK
from the software or hardware technologies
that are used to develop the system?
a) Managerial risks TOPIC 5.6 IDENTIFICATION-
b) Technology risks RMMM PLAN-CASE TOOLS
c) Estimation risks
d) Organizational risks 1. What all has to be identified as per risk
identification?
Answer: a Answer: d
Explanation: None. Explanation: By identifying known and
predictable risks, the project manager takes a
4. What threatens the quality and timeliness first step toward avoiding them when possible
of the software to be produced? and controlling them when necessary.
a) Known risks
b) Business risks 8. Which risks are associated with the overall
c) Project risks size of the software to be built or modified?
d) Technical risks a) Business impact risks
b) Process definition risks
Answer: d c) Product size risks
Explanation: Technical risks identify d) Development environment risks
potential design, implementation, interface,
verification, and maintenance problems. Answer: c
Explanation: None.
5. What threatens the viability of the software
to be built? 9. Which risks are associated with constraints
a) Known risks imposed by management or the marketplace?
b) Business risks a) Business impact risks
b) Process definition risks
c) Product size risks requirements and be fit for its intended use.”?
d) Development environment risks a) Performance risk
b) Cost risk
Answer: a c) Support risk
Explanation: None. d) Schedule risk