Professional Documents
Culture Documents
Quiz - Software Engineering 2021
Quiz - Software Engineering 2021
Quiz - Software Engineering 2021
Instructions
IMPORTANT Instructions:
2. Only Quiz Page on the CANVAS portal is to be accessed and attempted during the quiz time. The use
of any other resources (including other pages on CANVAS, on the Internet, mobile, Google) is
STRICTLY prohibited. Please ensure the closing of all openable, windows, tabs, etc. before login into
CANVAS, and taking this exam.
3. You will get one chance to attempt a question, once you skip a question or attempt it, you will not get
another chance to go back to it.
4. Best.
Attempt History
Attempt Time Score
LATEST Attempt 1 44 minutes 14 out of 56
Which of the following are correct with respect to identifying the entity
objects in domain modeling?
a, e, and f
b, c, and e
d, e, and f
a, b, e, and f
Which of the following activities are NOT part of Sub-System Design (i.e.
High-level design)?
c and e
a and e
b, c, and e
b and e
Which statements are correct when comparing client-server (A) and peer-
to-peer (B) architecture styles?
1, 3, 4
1, 4, 5
2, 4
2, 5
All except 4
All except 5
All except 4, 5
Question 5 2 / 2 pts
Which of the following are correct with respect to identifying the boundary
objects in domain modeling?
a, b, d, and f
b, d, e, and f
b, d, and f
d, e, and f
a, b, and c
b, c, and e
a, c, and d
c, d, and e
Question 7 2 / 2 pts
In Java GUI programming, the concepts of source, event, and the listener
is indicative of which design pattern?
1. Strategy
2. Singleton
3. Decorator
4. Observer
5. Factory Method
Which of the following design principles are used in the Strategy Design
Pattern?
1, 2, 3, and 5
3, 5, and 6
2, 4, and 6
1, 3, 5, and 6
Question 9 2 / 2 pts
Let us say that you are writing an application that uses multiple third-party
libraries, and for each of these libraries, many classes/methods are used
in a little complex way that has made managing the code a little messy.
Which of the following design pattern(s) can be handy here?
a) Façade
b) Decorator
c) Adapter
d) Strategy
e) Composite
d and e
a and e
Assume you aim to design a mail software like Gmail. As mails are getting
received, they are scanned for spams and other security checks one after
other in stages. The checks can be different to different types of mails.
Each stage has its own functionality and depends on input from previous
stages. What can the most suitable architecture style that can be used
here?
1. Microkernel
2. Model view controller
3. Layered architecture
4. Pipe and filter
5. Blackboard
3, 4, and 5
1, 3, and 5
2, 3, and 4
2, 3, and 5
increase cohesion
decrease coupling
Question 13 2 / 2 pts
4, 5, and 6
1, 2, and 6
2, 4, and 6
1, 3, 5, and 6
a. High Modifiability
b. High Autonomy
c. High Runtime efficiency
d. High-Security
e. Low Coupling
a, b, d, and e
c, d, and e
a, c, d, and e
b, c, and d
3, 4, and 6
All except 2, 4
1, 3, 4, 5, and 6
All except 1
All except 5
Which of the following design principles are used in the Adapter Design
Pattern?
1 and 6
1, 4, and 5
2, 4, and 5
5 and 6
Separate the artifacts that are found during Domain Modeling activity:
b and f
c and d
c, d, and f
b, c, anf f
1. Peer-to-Peer
2. Model view controller
3. Blackboard
4. Layered Architecture
5. Pipe and filter
2 and 4
2, 3, and 4
1, 3, and 5
b and d
a, b, and c
a, c, and e
b and e
Which of the following design principles are used in the Decorator Design
Pattern?
1, 3, and 4
1, 2, 5, and 6
2, 4, and 5
1, 4, and 6
Question 22 2 / 2 pts
b, c, and e
b, c, and d
a, b, and e
a, c, and d
a and b
b and c
a and c
What is the design goal(s) important to clients or users, but not important
to developers engaged in developing client-specific applications?
a, c, and d
a, b, and e
b, c, and d
a, b, and c
Question 25 2 / 2 pts
Which of the following are correct with respect to identifying the control
objects in domain modeling?
c, e, and f
b, c, e
What is true about both the analysis and the design models?
c and e
d and e
a, c, e, and d
a and e
Question 27 2 / 2 pts
Which of the following design principles are used in the Observer Design
Pattern?
3, 5, and 6
2, 4, 5, and 6
1, 2, and 6
1, 2, 4 and 5
1. Data storage
2. Data Validation
3. Response generation
4. Data Manipulation
5. Authorization
6. Data Presentation
All except 6
All except 1