Wednesday, January 23, 2013

.::VULMSIT::.eNoxel.com CS504 QUIZ NO.2 DATED JAN 23, 2013

CS504  - Software Engineering-I

Quiz No.2 Dated Jan 23, 2013

 

Client Server model tries to data and processing

Distribute

Merge

Clone

Proceed

 

Anti- Patterns is another concept that corresponds to common in analysis and design.

Mistake

Issues

Problems

All of the given

 

Three tier architecture contains layers

Presentation

Application

Database

All of the above

 

MVC stands for

 

Model View Controller

Modern View Center

Model View Center

Modern View Controller

 

Fat client model is one of the configurations of model

 

Data-Centered

Layered

Reference

Client Server

 

Description of communicating objects and classes that are customized to solved a general problem in a particular context is called

Design Pattern

System Patter

System Design

None of the Given

 

 

In the N-tire Architecture, the idea is to enhance scalability and by distributing both data and the application using multiple server machines.

Usability

Performance

Interpretability

None of the given

Thin Client model is one of the configurations of ….. model

 

Data Centered

Client Server

Layered

Reference

 

Dynamic process model shows the process ………….. of the system

 

Components

Objects

Structure

Linkage

 

It ensures that a class only has one instance and provides a global point of access to it.

Singleton Pattern

Observer Pattern

Real Pattern

None of the given

 

Question # 1 of 10 ( Start time: 06:15:15 PM )  Total Marks: 1 

STL Stnads for ------------------ 

Standard Template Library

 Standard Type Link

 Standard Tempo Line

 None of the given

 

 

Question # 2 of 10 ( Start time: 06:16:10 PM )  Total Marks: 1 

Three tier architecture contains ------------- layers 

Select correct option: 

  Presentation

 Application

 Database 

 All of the above

 

Question # 3 of 10 ( Start time: 06:17:05 PM )  Total Marks: 1 

Which of following is/are among ten things,which the basic template of GOF design pattern includes. 

Select correct option: 

 

 Problem

 Context

 Forces

 All of the given

 

Question # 4 of 10 ( Start time: 06:18:40 PM )  Total Marks: 1 

Vertical partitioning is also known as….. 

Select correct option: 

 

 Balancing

 Mutating

 Parallelizing 

 Factoring

 

Question # 4 of 10 ( Start time: 06:18:40 PM )  Total Marks: 1 

Vertical partitioning is also known as….. 

Select correct option: 

  Balancing

 Mutating

 Parallelizing 

 Factoring

 

Question # 5 of 10 ( Start time: 06:20:06 PM )  Total Marks: 1 

Patterns are devices that allow programs to share knowledge about their -------------. 

Select correct option: 

 

 Code

 Design

 Analysis

 None of the given

 

Question # 6 of 10 ( Start time: 06:22:07 PM )  Total Marks: 1 

Client server model tries to …….data and processing. 

Select correct option: 

 

 Distribute

 Merge

 Clone

 Proceed

 

Question # 7 of 10 ( Start time: 06:23:24 PM )  Total Marks: 1 

N-tier architecture stems from the struggle to find a ----------- between the fat-client architecture and the thin-client architecture. 

Select correct option: 

 

 Concurrency

 Distribution point

 Middle ground 

 Similarity

 Question # 8 of 10 ( Start time: 06:24:20 PM )  Total Marks: 1 

Vertical partitioning divides the architecture application from a …… making perspective. 

Decision

 Design

 Conclusion

 Move

 

 

Question # 9 of 10 ( Start time: 06:25:23 PM )  Total Marks: 1 

Distributing the responsibilities to different subsystems so that we get a software system which is easy to maintain, is called ………the architecture. 

Select correct option: 

 

 Subtracting

 Partitioning

 Cloning

 Balancing

 

Question # 1 of 10 ( Start time: 01:35:10 PM ) Total Marks: 1

The nominal case should be put in the if-part and the exception in the else-part of an if statement.

Select correct option:

TURE

FALSE

sec(s)

Question # 2 of 10 ( Start time: 01:35:59 PM ) Total Marks: 1

Charles Simonyi first discussed Hungarian Notation. He was of ------ .

Select correct option:

Microsoft

IBM

Dell

Cisco

sec(s)

Question # 3 of 10 ( Start time: 01:36:25 PM ) Total Marks: 1

The terms get/set must be used where an attribute is accessed

Select correct option:

Indirectly

Directly

sec(s)

Question # 4 of 10 ( Start time: 01:36:37 PM ) Total Marks: 1

A self documented program/code contains the following attribute(s):

Size of each function

Choice of variable

Choice of variable

All of the given choices

sec(s)

Question # 5 of 10 ( Start time: 01:37:42 PM ) Total Marks: 1

"is" prefix should be used for------ variables and methods.

Select correct option:

General

Boolean

Constant

None of the given

sec(s)

Question # 6 of 10 ( Start time: 01:38:16 PM ) Total Marks: 1

The use of comments should be minimized by making the code self-documenting by appropriate name choices and an

explicit logical structure.

Select correct option:

TRUE

FALSE

sec(s)

Question # 7 of 10 ( Start time: 01:38:44 PM ) Total Marks: 1

Variables should be initialized where they are ------and they should be declared in the ------scope possible.

Select correct option:

defined and smallest

declared and medium

defined and medium

declared and smallest

sec(s)

Question # 8 of 10 ( Start time: 01:39:56 PM ) Total Marks: 1

Unrelated variables should be declared in the same statement.

Select correct option:

True

False

sec(s)

Question # 9 of 10 ( Start time: 01:40:22 PM ) Total Marks: 1

which of the following statements are same in output: 1) a = a >> 2 2) a = a / 4 3) a = a * 2

Select correct option:

(1) and (3) only

(2) and (3) only

(1) and (2) only

All procduce the same result

sec(s)

Question # 10 of 10 ( Start time: 01:41:38 PM ) Total Marks: 1

Goto statements violate the idea of

Select correct option:

object oriented code

structured code

control structure

repetition structure

sec(s)

Question # 2 of 10 ( Start time: 01:44:29 PM ) Total Marks: 1

MVC pattern was based on the --------------- pattern.

Select correct option:

Observer

Structural

Behavioral

None of given

sec(s)

Question # 3 of 10 ( Start time: 01:44:56 PM ) Total Marks: 1

Which one is correct?

Select correct option:

double total = 0.5;

double total = .5;

double total = .50;

all of the given

sec(s)

Question # 4 of 10 ( Start time: 01:46:09 PM ) Total Marks: 1

Code should not be:

Select correct option:

commented

indented

cryptic

aligned

sec(s)

Question # 5 of 10 ( Start time: 01:46:41 PM ) Total Marks: 1

Global variables in C++ should always be referred to by using the

Select correct option:

:: operator

: operator

Without an operator

None of the given

sec(s)

Question # 6 of 10 ( Start time: 01:47:17 PM ) Total Marks: 1

_________ was the first pure Object Oriented language in which observer pattern was used in implementing its Model

View Controller pattern

Select correct option:

Smalltalk

PASCAL

JAVA

C++

sec(s)

Question # 7 of 10 ( Start time: 01:47:56 PM ) Total Marks: 1

using proper paranthesis normally makes the code

Select correct option:

easy to read

easy to understand

less ambigous

All of the given options

sec(s)

Question # 9 of 10 ( Start time: 01:48:58 PM ) Total Marks: 1

Which of the following shows a commented statement in C++

Select correct option:

# Ans = first + second

// Ans = first + second

\\ Ans = first + second

/# Ans = first + second

sec(s)

Question # 1 of 10 ( Start time: 01:51:42 PM ) Total Marks: 1

The form for (;;) should be used for

Select correct option:

nested loop

empty loop

more than 1000 iterations

sec(s)

sec(s)

Question # 2 of 10 ( Start time: 01:52:09 PM ) Total Marks: 1

Identifier names also play a significant role in enhancing the -------- of a program.

Select correct option:

Writ ability

Readability

Reliability

sec(s)

Question # 3 of 10 ( Start time: 01:53:08 PM ) Total Marks: 1

It ensures that a class only has one instance and provides a global point of access to it.

Select correct option:

Singleton Pattern

Observer Pattern

Real Pattern

None of the given

sec(s)

Question # 4 of 10 ( Start time: 01:53:49 PM ) Total Marks: 1

Names representing methods and functions should be----and written in mixed case starting

with -----case.

Select correct option:

Noun—lower

Verb----lower

Noun ---upper

Noun----upper

 

sec(s)

Question # 5 of 10 ( Start time: 01:54:45 PM ) Total Marks: 1

A function should not be larger in any case and should not exceed ______ in length .

Select correct option:

Half page

One page

Two pages

Three Pages

sec(s)

Question # 7 of 10 ( Start time: 01:55:56 PM ) Total Marks: 1

-----provides a unified interface to a set of interfaces in a sub-system.

Select correct option:

Observer Pattern

Singleton Pattern

Façade Pattern

All of the above

sec(s)

Question # 8 of 10 ( Start time: 01:56:35 PM ) Total Marks: 1

MVC stands for ---------------

Select correct option:

Model View Controller

Modern View Center

Model View Center

Modern View Controller

sec(s)

Question # 8 of 10 ( Start time: 01:59:40 PM ) Total Marks: 1

A self documenting code is a code that explains itself without the need of comments and

extraneous documentation, like _______

Select correct option:

Flowcharts

UML diagrams

Process-flow state diagrams

All of the given choices

sec(s)

Question # 10 of 10 ( Start time: 02:00:38 PM ) Total Marks: 1

Complex expressions:

Select correct option:

Make the code easy to modify

Make the code difficult to modify

Make the code easy to understand

Does not effect understandablity

 

 

Question # 10 of 10 ( Start time: 01:49:27 PM ) Total Marks: 1

Comments should NOT be indented relative to their position in the code

Select correct option:

TRUE

FALSE

 

----Provides a unified interface to a set of interfaces in a sub-system

Observer Pattern

Singleton Pattern

Façade Pattern

All of the above

 

In Client Server model, there application is modeled as a set so --- that are provided by server

Application

Protocol

Services

All of the above

 

 

Vertical Partitioning is also know as

 

Balancing

Mutating

Parallizing

Factoring

 

 

 

Façade Pattern provides a unified interface to a set of interfaces ina sub-system.

True

False

 

Which of the is/are among ten things which the basis template of GOF design pattern includes.

 

Problem

Context

Forces

All of the above

 

Thin Client Model places a heavy processing load on……

Only Server

Only Network

Both Server and Network(Not Sure)

Neither server nor network

 

Zero install architecture does not need any installation on ____________.

Server side (not Sure)

Client side

Client & Server Side (Not Sure)

None of the above

 

Data-Centered Architectural Style is also called ….

 

Repository model

Client Server model

Sub system model

Reference model

 

If a major rework is required to translate a program written for one environment to

another, it means code is not or less _______

Select correct option:

Secure

Bug Free

plateform dependent

Portable

 

 

 

Bit fields are a convenient way to express many difficult operations. However, bit

fields suffer from one problem

Select correct option:

Lack of usability

Lack of security

Lack of performance

Lack of portability

 

A ________ is a variance from a desired product attribute.

Select correct option:

Exception

Error

Mistake

Defect

_______ cause major portability issues

Select correct option:

Loops

Bugs in code

Sizes of data types

Conditional Structures

 

Creative activity __ is a creative activity while ___ is a destructive activity

Select correct option:

Development, Testing

Testing, Development

Validation, Verification

Verification, Validation

The idea behind exception handling is to raise some error flag every time ______

Select correct option:

The code compiles

The code links

Memory is allocated

Something goes wrong

 

 

 

______ is a tool that can help us in reducing the size of individual functions.

Select correct option:

Inheritance

Modularity

Association

Abstraction

 

The number ________ is the most abused symbol in programs written in C or C++.

Select correct option:

1

0

2

3

In ___ we look inside the system and evaluate what it consists of and how is it

implemented.

Select correct option:

Black Box Tesing

White Box Tesing

Gray Box Testing

All of the given options

 

________ identifies which statements in a method or class have been executed.

Select correct option:

Method Coverage

Statement Coverage

Class Coverage

Brach Coverage

 

Comma ( , ) is very dangerous because

Select correct option:

Compiler does not recognise this symbol

It creates linkage problem

It causes side effects

All of the given options

 

Which one is used to describe flow of data or control in an application

Select correct option:

Class diagram

Use case diagram

Flow Chart

None of the given option

 

Consider the following statement: int a,b=10; Which of the following is correct:

Select correct option:

variable "a" is initialized to 10

Variable "b" is initialized to 10

Both variables "a" and "b" are initialized to 10

variables can not be initialized this way

 

The order in which bytes of one word are stored is _______ dependent

Select correct option:

hardware

software

language

syntax

 

 

 

 

 

 

Verification and validation are the processes in which we check a product against its

_______ and the ________ of the users who will be using it

Select correct option:

statements, expectations

specifications, expectations

specifications , arguments

statements, arguments

 

After integrating subsystems into a system, and then testing this system as a whole is

called

Select correct option:

Unit testing

Component testing

Subsystem testing

System testing

 

if (e.Title() == "CEO" || e.Salary() > 10000) in the above statement if

(e.Title()=="CEO") is TRUE then

Select correct option:

Second part is not evaluated

Second part is always evaluated

Second part must also be TRUE

Second part is not evaluated but e.Salary() is called

 

The raising of the imaginary error flag is simply called raising or ______ an error

Select correct option:

Catching

Casting

Throwing

None of given options

 

________ identifies which statements in a method or class have been executed.

Select correct option:

Method Coverage

Statement Coverage

Class Coverage

Brach Coverage

 

80/20 rule states that:

Select correct option:

you spend 80 percent of your time in 20 percent of the code

you spend 20 percent of your time in 80 percent of the code

We should try to optimized 80 percent or at least 20 percent of the code

None of the given options.

 

In order to make a code more portable, Instead of using vendor specific language

extensions, use _____ as much as possible

Select correct option:

STL

ANSI

ISO

CMMI

 

In order to write a portable code which of the following guideline will be helpful:

Select correct option:

Stick to the standards

Program in the mainstream

Size of data types

All of the given options

 

The formula for calculating the Cyclomatic Complexity of a program is:

Select correct option:

E - N + 2

E + N + 2

E - N - 2

N - E + 2

 

A good program must contain ______ infeasible paths.

Select correct option:

0

1

2

infinite

 

When an error is thrown the overall system (on the lookout for this error flag)

responds by ____ the error.

Select correct option:

Ignoring

Casting

Catching

All of the given options

 

Unit Testing will be done by

Select correct option:

Testers

End Users

Customer

Developers

 

haiBit fields are a convenient way to express many difficult operations. However, bit

fields suffer from one problem

Select correct option:

Lack of usability

Lack of security

Lack of performance

Lack of portability

______ and _______ are two important tools that helps in managing the program

complexity.

Select correct option:

Composition, Inheritance

Abstraction, Encapsulation

Aggregation, Inheritance

Modularity, Composition

 

if a major rework is required to translate a program written for one environment to

another, it means code is not or less _______

Select correct option:

Secure

Bug Free

plateform dependent

Portable

 

struct packed_struct { unsigned int f1:1; } pack; Here in "packed_struct":

Select correct option:

value of f1 = 1

size of f1 = 1 bit

value of f1 should not exceede 1

None of given options

 

if (e.Title() == "CEO" || e.Salary() > 10000) in the above statement if

(e.Title()=="CEO") is TRUE then

Select correct option:

Second part is not evaluated

Second part is always evaluated

Second part must also be TRUE

Second part is not evaluated but e.Salary() is called

 

In ___ we look inside the system and evaluate what it consists of and how is it

implemented.

Select correct option:

Black Box Tesing

White Box Tesing

Gray Box Testing

All of the given options

 

C/C++ language has not specified whether ____ is arithmetic or logical.

Select correct option:

Right shift >>

Right shift <<

&&

||

 

 

 

A test case involves

Select correct option:

Input/output specification plus a statement of the function under test

Steps to perform the function

Expected results that the software application produces

All of the given options

 

Verification means:

Select correct option:

Have you built the right product?

Does the product meet user expectations?

Does the product meet system specifications?

All of the given options

 

Exception handling provides:

Select correct option:

Portability mechanism

Code Usability mechanism

Error Handling mechanism

All of the given options

 

A ________ is a variance from a desired product attribute.

Select correct option:

Exception

Error

Mistake

Defect

 

Unit Testing will be done by

Select correct option:

Testers

End Users

Customer

Developers

 

Which type of testing is not concerned with how the inputs are transformed into

outputs?

Select correct option:

White Box

Gray Box

Black Box

All of the given options

 

In the switch statement, cases should always end with a -------statment.

Select correct option:

Switch

Go

Break

Stop

x = 0; // x is floating pt Which rewritten form of above line of code is more in line

with the self-documentation philosophy than the code above.

Select correct option:

x = false

x = NULL

x = 0.0;

x = '\0'

______ is a tool that can help us in reducing the size of individual functions.

Select correct option:

Inheritance

Modularity

Association

Abstraction

 

Alpha testing is:

Select correct option:

Testing individual components independent of other components

Testing a collection of dependent components

Validation against user expectations

Acceptance testing for customized projects, in-house testing for products

 

A test case involves

Select correct option:

Input/output specification plus a statement of the function under test

Steps to perform the function

Expected results that the software application produces

All of the given options

 

The process that involves verification of product with respect to its written

requirements is called _______.

Select correct option:

Maintainance

Debugging

Developement

Testing

 

struct packed_struct { unsigned int f1:1; } pack; Here in "packed_struct":

Select correct option:

value of f1 = 1

size of f1 = 1 bit

value of f1 should not exceede 1

None of given options

 

One of the main reasons to make functions is ______.

Select correct option:

Reliability

Reusability

Maintainability

Effeciency

The number ________ is the most abused symbol in programs written in C or C++.

Select correct option:

1

0

2

3

 

Software _______ is the process of examining the software product against its

requirements.

Select correct option:

Testing

Debugging

Exception handling

All of the given options

 

In order to write a portable code which of the following guideline will be helpful:

Select correct option:

Stick to the standards

Program in the mainstream

Size of data types

All of the given options

 

______ and _______ are two important tools that helps in managing the program

complexity.

Select correct option:

Composition, Inheritance

Abstraction, Encapsulation

Aggregation, Inheritance

Modularity, Composition

Bit fields are a convenient way to express many difficult operations. However, bit

fields suffer from one problem

Select correct option:

Lack of usability

Lack of security

Lack of performance

Lack of portability

 

The greatest advantage of exception handling is its ability to handle:

Select correct option:

Asynchronous errors

Syntax errors

Memory errors

Control Structure errors

 

 

 

Testing of collection of modules to discover interfacing problems among interacting

modules is called

Select correct option:

Unit testing

Module testing

Subsystem testing

None of the given options

 

The Basic coding structure(s) include:

Select correct option:

Sequences

If statement

Case statement

All of the given options

 

The order in which bytes of one word are stored is _______ dependent

Select correct option:

hardware

software

language

syntax

The idea behind exception handling is to raise some error flag every time ________

Select correct option:

The code compiles

The code links

Memory is allocated

Something goes wrong

 

One of the main reasons to make functions is ______.

Select correct option:

Reliability

Reusability

Maintainability

Effeciency

The C/C++ language does not define the alignment of items within

Select correct option:

structures

classes

unions

All of the given options

A test case involves

Select correct option:

Input/output specification plus a statement of the function under test

Steps to perform the function

Expected results that the software application produces

All of the given options

Be very careful when you use functions with side effects – functions that change the

values of the ________

Select correct option:

Objects

Classes

Structures

Variables

 

Objective of ____ is to show that the program does not work

Select correct option:

Requirements

Design

coding

Testing

In ___ we look inside the system and evaluate what it consists of and how is it

implemented.

Select correct option:

Black Box Tesing

White Box Tesing

Gray Box Testing

All of the given options

 

When an error is thrown the overall system (on the lookout for this error flag)

responds by ____ the error.

Select correct option:

Ignoring

Casting

Catching

All of the given options

 

Unit Testing will be done by

Select correct option:

Testers

End Users

Customer

Developers

Comma ( , ) is very dangerous because

Select correct option:

Compiler does not recognise this symbol

It creates linkage problem

It causes side effects

 

struct packed_struct { unsigned int f1:1; } pack; Here in "packed_struct":

Select correct option:

value of f1 = 1

size of f1 = 1 bit

value of f1 should not exceede 1

None of given options

 

 

Alpha testing is:

Select correct option:

Testing individual components independent of other components

Testing a collection of dependent components

Validation against user expectations

Acceptance testing for customized projects, in-house testing for products

 

A ___ is variance from a desired product attribute.

Select correct option:

Syntax error

Defect

Crash

All of the given options

 

x = 0; // x is floating pt Which rewritten form of above line of code is more in line

with the self-documentation philosophy than the code above.

Select correct option:

x = false

x = NULL

x = 0.0;

x = '\0'

 

Identify the TRUE statement:

Select correct option:

Portability effects security

Size of data types vary from one machine to other

Size of control structures vary from one machine to other

None of the given options

 

In ___, system's internal implementation details are not visible to the tester.

Select correct option:

White Box Testing

Gray Box Testing

Black Box Testing

All of the given options

 

After integrating subsystems into a system, and then testing this system as a whole is

called

Select correct option:

Unit testing

Component testing

Subsystem testing

System testing

A path through a program which is never traversed for any input data is called

________.

Select correct option:

Dependent path

Independent path

Infeasible path

Feasible path

 

Testing individual components independent of other components is called:

Select correct option:

Unit testing

Module testing

Subsystem testing

Non of the given options

 

The Basic coding structure(s) include:

Select correct option:

Sequences

If statement

Case statement

All of the given options

 

Exception handling is a powerful technique that separates error-handling code from

____ code.

Select correct option:

Normal

Faulty

Buggy

Complex

 

____ Testing of system is not possible

Select correct option:

Black Box

White Box

Exhaustive

None of the given options

 

In the switch statement, cases should always end with a -------statment.

Select correct option:

Switch

Go

Break

Stop

 

A test case involves

Select correct option:

Input/output specification plus a statement of the function under test

Steps to perform the function

Expected results that the software application produces

All of the given options

 

 

 

Exception handling is a powerful technique that separates error-handling code from

____ code.

Select correct option:

Normal

Faulty

Buggy

Complex

 

The C/C++ language does not define the alignment of items within

Select correct option:

structures

classes

unions

All of the given options

 

______ and _______ are two important tools that helps in managing the program

complexity.

Select correct option:\

Composition, Inheritance

Abstraction, Encapsulation

Aggregation, Inheritance

Modularity, Composition

 

Verification means:

Select correct option:

Have you built the right product?

Does the product meet user expectations?

Does the product meet system specifications?

All of the given options

 

Which type of testing is not concerned with how the inputs are transformed into

outputs?

Select correct option:

White Box

Gray Box

Black Box

All of the given options

 

The size of ________ plays a significant role in making the program easy or difficult

to understand.

Select correct option:

function

object

data type

none of the above

 

Exception handling provides:

Select correct option:

Portability mechanism

Code Usability mechanism

Error Handling mechanism

All of the given options

 

Identify the TRUE statement:

Select correct option:

Portability effects security

Size of data types vary from one machine to other

Size of control structures vary from one machine to other

None of the given options


--
Zindagi mein 2 Logo ka buhat khayal rahkoooo
Ist woh jiss ney tumhari jeet ke Liye buhat kuch hara hoo
(Father)
2nd woh jiss ko tum ney har dukh me pukaara hoo (Mother)
Regards,
Umair Saulat Mc100403250

--
--
Virtual University of Pakistan*** IT n CS Blog
================================
http://www.eNoxel.com
http://www.enoxelit.tk
http://www.geniusweb.tk
 
and Please do Share this group with your Friends and Class Fellows so that our Circle would expand and can be more useful for other Students.
 
Thanks, n Best of Luck......
 
 
You received this message because you are subscribed to the Google
Groups "vulms" group.
To post to this group, send email to vulmsit@googlegroups.com
To unsubscribe from this group, send email to
vulmsit+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vulmsit?hl=en?hl=en
---
You received this message because you are subscribed to the Google Groups "vulms" group.
Visit this group at http://groups.google.com/group/vulmsit?hl=en-GB.
 
 

No comments:

Post a Comment