Software Engineering College Level Quiz Question Sets 5

Question 1

A ___ is a list that identifies the specific versions of multiple modules that were linked to create a load module or joint memory resident work unit.

Select one:

  • a. Module
  • b. Link
  • c. Code
  • d. Derivation

The correct answer is: Derivation


Question 2

When the changed version of the code module is reentered into the library, a charge-out occurs. It signifies that the updating of a charge in module to remove the lock.

Select one:

  • True
  • False

The correct answer is 'False'.


Question 3

The following is an example of Booch diagram?

Select one:

  • True
  • False

The correct answer is 'True'.


Question 4

The Common Vulnerability Scoring System (CVSS) is an open framework that addresses what issue?

Select one:

  • a. Identifying and assessing vulnerabilities across many disparate software platforms
  • b. Identifying and assessing vulnerabilities across many disparate hardware platforms
  • c. Identifying and assessing vulnerabilities across many disparate hardware and software platforms
  • d. None of the above

The correct answer is: Identifying and assessing vulnerabilities across many disparate hardware and software platforms


Question 5

The Base Metrics include all the following except:

Select one:

  • a. Access Vector
  • b. Authentication
  • c. Confidentiality, Integrity, Availability
  • d. Confidentiality, Integrity, Availability Impacts

The correct answer is: Confidentiality, Integrity, Availability


Question 6

Temporal Metrics include all but the following except:

Select one:

  • a. Environmental Metrics
  • b. Collateral Damage Potential (CDP)
  • c. Remediation Level (RL)
  • d. Report Confidence (RC)

The correct answer is: Environmental Metrics


Question 7

True or False: Vulnerability is a bug, flaw, weakness, or exposure of an application, system, device, or service that could lead to a failure of confidentiality, integrity, or availability.

Select one:

  • True
  • False

The correct answer is 'True'.


Question 8

True or False: The Temporal group reflects the intrinsic qualities of a vulnerability.

Select one:

  • True
  • False

The correct answer is 'False'.


Question 9

Select one:

  • a. CASE
  • b. UML
  • c. ERD
  • d. DFD

The correct answer is: CASE


Question 10

The video store case study in chapter 2 includes requirements for customer, video

and ______. Select one:

  • a. Rental Processing
  • b. Software
  • c. Hardware
  • d. Networks

The correct answer is: Rental Processing


Question 11

Control language constructs support iteration, sequential or selection processing via loops, exits, conditional statements, or case constructs

Select one:

  • True
  • False

The correct answer is 'True'.


Question 12

______ identify the flow of data into and out of modules and match the data flows on the DFD.

Select one:

  • a. Control Couples
  • b. Data Couples
  • c. Factoring
  • d. Morphology

The correct answer is: Data Couples


Question 13

The below example of Complex Context Diagram describes an inflows context called patients claims processing:

Select one:

  • True
  • False

The correct answer is 'True'.


Question 14

True or False: Threat is the likelihood or frequency of a harmful event occurring.

Select one:

  • True
  • False

The correct answer is 'True'.


Question 15

True or False: In job redesign, a caseworker approach is preferred to an assembly line approach.

Select one:

  • True
  • False

The correct answer is 'True'.


Question 16

In the following figure, CVSS metrics and equations, which values are considered optional when reflecting the risk posed by the vulnerability to a user's environment?

Select one:

  • a. B-Base Matric ; C- Temporal metric
  • b. B-Environmental metric; C- Base Metric
  • c. B-Temporal metric; C- Base metric
  • d. B- Temporal metric; C- Environmental metric

The correct answer is: B- Temporal metric; C- Environmental metric


Question 17

Select one:

  • a. Top Down
  • b. Bottom Up
  • c. Outward In
  • d. Functional Sequence

The correct answer is: Outward In


Question 18

The following figure depicts the ___ testing technique.

Select one:

  • a. Black box testing
  • b. White box testing
  • c. Bottom up testing
  • d. Top down testing

The correct answer is: White box testing


Question 19

A ___ depicts specific transformations and outputs as effects and identifies the input data causing those effects

Select one:

  • a. Boundary value analysis
  • b. Cause-effect graph
  • c. Bottom up testing
  • d. Top down testing

The correct answer is: Cause-effect graph


Question 20

The baseline is the official version of a code module that is in production use at any time.

Select one:

  • True
  • False

Feedback The correct answer is 'True'.


Question 21

Software engineers are involved in these activities in which correct order:

Select one:

  • a. Development, operation, maintenance or retirement
  • b. Operation, development, retirement and maintenance
  • c. Development, operation, maintenance and retirement
  • d. Operation, development, maintenance and retirement

The correct answer is: Development, operation, maintenance and retirement


Question 22

True and False: Booch diagrams are also called module structure diagram

Select one:

  • True
  • False

The correct answer is 'True'.


Question 23

A ______ shows the time ordering of processes and identifies relationships between processes.

Select one:

  • a. DFD
  • b. State Transition Diagram
  • c. Flowcharts
  • d. Gantt Chart

The correct answer is: State Transition Diagram


Question 24

Sequential interdependence defines highly interrelated activities that are worked on jointly by multiple units requiring feedback and constant adjustment.

Select one:

  • True
  • False

The correct answer is 'False'.


Question 25

___ management is the identification, organization, and control of modifications to software built by a programming team.

Select one:

  • a. Change
  • b. Project
  • c. Configuration
  • d. Software

The correct answer is: Configuration


Question 26

According to CoCoMo , the program having 128 thousand lines of codes falls under the category of

Select one:

  • a. Very Large
  • b. Large
  • c. Intermediate
  • d. Medium

The correct answer is: Large


Question 27

The Goal of 3NF Is to Remove Partial Key Dependencies

Select one:

  • True
  • False

The correct answer is 'False'.


Question 28

True or False: The systems engineer provides organizational expertise while the project manager provides technical expertise.

Select one:

  • True
  • False

The correct answer is 'False'.


Question 29

The ____ model defines all state changes and associates each with an action.

The ______ model defines all actions and associates each with a state.

Select one:

  • a. Moore, Mealy
  • b. Mealy, Moore
  • c. State, transition
  • d. Transition, state

The correct answer is: Mealy, Moore


Question 30

A critical success factor (CSF) defines some essential process, data, event, or action that must be present for the outcome to be

Select one:

  • True
  • False

The correct answer is 'True'.


Question 31

A ___ is a list that identifies the specific versions of multiple modules that were linked to create a load module or joint memory resident work unit.

Select one:

  • a. Module
  • b. Link
  • c. Code
  • d. Derivation

The correct answer is: Derivation


Question 32

The _______ scope defines the location of work for each activity.

The ___ scope defines technology platform by location.

Select one:

  • a. Technology, Network
  • b. Network, Technology
  • c. Data, Process
  • d. Enterprise, Network

The correct answer is: Network, Technology


Question 33

Draw ___ feet to show cardinality of each relationship in an ER diagram

Select one:

  • a. Crow
  • b. Bird
  • c. Sparrow
  • d. Eagle

The correct answer is: Crow


Question 34

Computer-aided software engineering (CASE) tools automate the hardware engineering process.

Select one:

  • True
  • False

The correct answer is 'False'.


Question 35

True or False: Software engineering is the systematic application of tools and techniques in the development of computer-based applications.*

Select one:

  • True
  • False

The correct answer is 'True'.


Question 36

Select one:

  • a. Object
  • b. Class
  • c. Abstract Data Type
  • d. Meta Class

The correct answer is: Abstract Data Type


Question 37

The _ supports and sells the goals of the project throughout the organization:

Select one:

  • a. Project Manager
  • b. Sponsor
  • c. Champion
  • d. User

The correct answer is: Champion

Related Posts

0 Comments

12345

    00