Software Engineering College Level Quiz Question Sets 5
Question 1
A ___ is a list that identifies the specific versions of multiple modules that were linked to create a load module or joint memory resident work unit.
Select one:
- a. Module
- b. Link
- c. Code
- d. Derivation
The correct answer is: Derivation
Question 2
When the changed version of the code module is reentered into the library, a charge-out occurs. It signifies that the updating of a charge in module to remove the lock.
Select one:
- True
- False
The correct answer is 'False'.
Question 3
The following is an example of Booch diagram?
Select one:
- True
- False
The correct answer is 'True'.
Question 4
The Common Vulnerability Scoring System (CVSS) is an open framework that addresses what issue?
Select one:
- a. Identifying and assessing vulnerabilities across many disparate software platforms
- b. Identifying and assessing vulnerabilities across many disparate hardware platforms
- c. Identifying and assessing vulnerabilities across many disparate hardware and software platforms
- d. None of the above
The correct answer is: Identifying and assessing vulnerabilities across many disparate hardware and software platforms
Question 5
The Base Metrics include all the following except:
Select one:
- a. Access Vector
- b. Authentication
- c. Confidentiality, Integrity, Availability
- d. Confidentiality, Integrity, Availability Impacts
The correct answer is: Confidentiality, Integrity, Availability
Question 6
Temporal Metrics include all but the following except:
Select one:
- a. Environmental Metrics
- b. Collateral Damage Potential (CDP)
- c. Remediation Level (RL)
- d. Report Confidence (RC)
The correct answer is: Environmental Metrics
Question 7
True or False: Vulnerability is a bug, flaw, weakness, or exposure of an application, system, device, or service that could lead to a failure of confidentiality, integrity, or availability.
Select one:
- True
- False
The correct answer is 'True'.
Question 8
True or False: The Temporal group reflects the intrinsic qualities of a vulnerability.
Select one:
- True
- False
The correct answer is 'False'.
Question 9
IEW and IEF are the popular _ tools discussed in the data-oriented design technique context
Select one:
- a. CASE
- b. UML
- c. ERD
- d. DFD
The correct answer is: CASE
Question 10
The video store case study in chapter 2 includes requirements for customer, video
and ______. Select one:
- a. Rental Processing
- b. Software
- c. Hardware
- d. Networks
The correct answer is: Rental Processing
Question 11
Control language constructs support iteration, sequential or selection processing via loops, exits, conditional statements, or case constructs
Select one:
- True
- False
The correct answer is 'True'.
Question 12
______ identify the flow of data into and out of modules and match the data flows on the DFD.
Select one:
- a. Control Couples
- b. Data Couples
- c. Factoring
- d. Morphology
The correct answer is: Data Couples
Question 13
The below example of Complex Context Diagram describes an inflows context called patients claims processing:
Select one:
- True
- False
The correct answer is 'True'.
Question 14
True or False: Threat is the likelihood or frequency of a harmful event occurring.
Select one:
- True
- False
The correct answer is 'True'.
Question 15
True or False: In job redesign, a caseworker approach is preferred to an assembly line approach.
Select one:
- True
- False
The correct answer is 'True'.
Question 16
In the following figure, CVSS metrics and equations, which values are considered optional when reflecting the risk posed by the vulnerability to a user's environment?
Select one:
- a. B-Base Matric ; C- Temporal metric
- b. B-Environmental metric; C- Base Metric
- c. B-Temporal metric; C- Base metric
- d. B- Temporal metric; C- Environmental metric
The correct answer is: B- Temporal metric; C- Environmental metric
Question 17
In this approach of identifying processes, we use context diagram entities and data flows to identify 'boundary' processes with which they directly interact. It is used to define what other transformations are required to link the input and output boundary processes.
Select one:
- a. Top Down
- b. Bottom Up
- c. Outward In
- d. Functional Sequence
The correct answer is: Outward In
Question 18
The following figure depicts the ___ testing technique.
Select one:
- a. Black box testing
- b. White box testing
- c. Bottom up testing
- d. Top down testing
The correct answer is: White box testing
Question 19
A ___ depicts specific transformations and outputs as effects and identifies the input data causing those effects
Select one:
- a. Boundary value analysis
- b. Cause-effect graph
- c. Bottom up testing
- d. Top down testing
The correct answer is: Cause-effect graph
Question 20
The baseline is the official version of a code module that is in production use at any time.
Select one:
- True
- False
Feedback The correct answer is 'True'.
Question 21
Software engineers are involved in these activities in which correct order:
Select one:
- a. Development, operation, maintenance or retirement
- b. Operation, development, retirement and maintenance
- c. Development, operation, maintenance and retirement
- d. Operation, development, maintenance and retirement
The correct answer is: Development, operation, maintenance and retirement
Question 22
True and False: Booch diagrams are also called module structure diagram
Select one:
- True
- False
The correct answer is 'True'.
Question 23
A ______ shows the time ordering of processes and identifies relationships between processes.
Select one:
- a. DFD
- b. State Transition Diagram
- c. Flowcharts
- d. Gantt Chart
The correct answer is: State Transition Diagram
Question 24
Sequential interdependence defines highly interrelated activities that are worked on jointly by multiple units requiring feedback and constant adjustment.
Select one:
- True
- False
The correct answer is 'False'.
Question 25
___ management is the identification, organization, and control of modifications to software built by a programming team.
Select one:
- a. Change
- b. Project
- c. Configuration
- d. Software
The correct answer is: Configuration
Question 26
According to CoCoMo , the program having 128 thousand lines of codes falls under the category of
Select one:
- a. Very Large
- b. Large
- c. Intermediate
- d. Medium
The correct answer is: Large
Question 27
The Goal of 3NF Is to Remove Partial Key Dependencies
Select one:
- True
- False
The correct answer is 'False'.
Question 28
True or False: The systems engineer provides organizational expertise while the project manager provides technical expertise.
Select one:
- True
- False
The correct answer is 'False'.
Question 29
The ____ model defines all state changes and associates each with an action.
The ______ model defines all actions and associates each with a state.
Select one:
- a. Moore, Mealy
- b. Mealy, Moore
- c. State, transition
- d. Transition, state
The correct answer is: Mealy, Moore
Question 30
A critical success factor (CSF) defines some essential process, data, event, or action that must be present for the outcome to be
Select one:
- True
- False
The correct answer is 'True'.
Question 31
A ___ is a list that identifies the specific versions of multiple modules that were linked to create a load module or joint memory resident work unit.
Select one:
- a. Module
- b. Link
- c. Code
- d. Derivation
The correct answer is: Derivation
Question 32
The _______ scope defines the location of work for each activity.
The ___ scope defines technology platform by location.
Select one:
- a. Technology, Network
- b. Network, Technology
- c. Data, Process
- d. Enterprise, Network
The correct answer is: Network, Technology
Question 33
Draw ___ feet to show cardinality of each relationship in an ER diagram
Select one:
- a. Crow
- b. Bird
- c. Sparrow
- d. Eagle
The correct answer is: Crow
Question 34
Computer-aided software engineering (CASE) tools automate the hardware engineering process.
Select one:
- True
- False
The correct answer is 'False'.
Question 35
True or False: Software engineering is the systematic application of tools and techniques in the development of computer-based applications.*
Select one:
- True
- False
The correct answer is 'True'.
Question 36
An __ is the new, user-defined data type that encapsulates definitions of object data plus legal processes for that data
Select one:
- a. Object
- b. Class
- c. Abstract Data Type
- d. Meta Class
The correct answer is: Abstract Data Type
Question 37
The _ supports and sells the goals of the project throughout the organization:
Select one:
- a. Project Manager
- b. Sponsor
- c. Champion
- d. User
The correct answer is: Champion