Q No 1: Which is not included in test criteria applied in a phase of testing?
A: Functional validity
B: Interface integrity
C: Correctness
D: Programing Logic
C
Q No 2: For inspections, …………- are prepared that contain information regarding defects
A: Tables
B: Checklists
C: Lists
D: Frames
B
Q No 3: Equivalence ………….. help you in designing test cases to test the system effectively and efficiently
A: Functions
B: Classes
C: Objects
D: Interfaces
B
Q No 4:………….. are used to describe flow of data or control in an application
A: Code structures
B: String matching
C: Paths
D: Flow graphs
D
Q No 5: Writing test cases and generating test data are processes that demand ………….. building capabilities
A: Domain
B: System
C: Scenario
D: Code
C
Q No 6: The raising of the imaginary error flag is simply called raising or …………… an error
A: Throwing
B: Sending
C: Casting
D: Handling
A
Q No 7:…………… requirements are often called product features
A: Functional
B: Business
C: User
D: Non-functional
B
Q No 8: Many compilers limit the maximum number of bits in the bit field to the size of a(n) ……………
A: Integer
B: Float
C: Character
D: Double
A
Q No 9: In Java, “>>” is used for …………… shift and “>>>” for …………… shift
A: Arithmetic, Logical
B: Mathematical, Logical
C: Incremental, Arithmetic
D: Logical, Arithmetic
A
Q No 10: When large amount of data is to be shared, repository model is used. This model has been extensively used in the …………… based application
A: Mainframe
B: Super Computers
C: Personal Computers
D: Real time
A
Q No 11: There are four basic coding structures: sequence, if statement, case statement, and …………..
A: For loop
B: While loop
C: Switch statement
D: Logical operations
B
Q No 12:………….. is only a reference for defining protocols and designing and implementing systems developed by different parties
A: OSI model
B: Reference architecture
C: Layered architecture
D: N-tier architecture
B
Q No 13: The pattern movement became very quiet until ………….. when patterns appeared again at OOPSLA conference
A: 1987
B: 1988
C: 1962
D: 1995
A
Q No 14: STL Stands for ……………
A: Standard Temporary Line
B: Standard Temporary Library
C: Standard Template Library
D: Standard Type Link
C
Q No 15:………….. ensures that a class only has one instance and provides a global point of access to it
A: Singleton Pattern
B: Observer Pattern
C: Behavioral Pattern
D: Joint Pattern
A
Q No 16: Which design pattern provides a unified interface to a set of interfaces in a sub-system?
A: Façade
B: Singleton
C: Observer
D: Joint
A
Q No 17: Testing activities require destructive instincts in ………….. for the purpose of breaking system to discover loopholes into its functionality
A: Bug Fixers
B: Tester
C: Developer
D: Requirement Engineer
B
Q No 18: Camel Case is now the official convention for file names and identifiers in the ………….. programming language
A: C#
B: C++
C: Java
D: Visual Basic.Net
C
Q No 19: In presence of …………… bug in a program, the results are the opposite of what is expected
A: Memory Leak
B: Memory Over-runs
C: Syntax Error
D: Logical Error
D
Q No 20: Split lines occur when a statement exceed the …………… column limit
A: 80
B: 85
C: 90
D: 95
A
Q No 21: Identifier names play a significant role in enhancing the …………… of a program
A: Writability
B: Readability
C: Reliability
D: Usability
B
Q No 22: “is” prefix should be used for………….. variables and methods
A: Static
B: General
C: Boolean
D: Constant
C
Q No 23: Comments should be indented relative to their position in the ……………
A: Code
B: Design
C: Analysis
D: Requirements
A
Q No 24: Modularity is a tool that can help us in ………….. the size of individual functions
A: Stabilizing
B: Reducing
C: Increasing
D: Strengthening
B
Q No 25: Perry and Wolfe proposed the following formula for software architecture
A: Software architecture = {Forms, Rationale}
B: Software architecture = {Elements, Forms, Rationale}
C: Software architecture = {Parts, Rationale}
D: Software architecture = {Parts, Elements}
B
Q No 26: The code is misbehaving in a way that cannot be easily explained. The above statement is the symptom of …………..
A: Runtime Error
B: Logical Error
C: Memory Leak
D: Exception
B
Q No 27: Ideally speaking, a function should not be larger than ……………lines of code and in any case should not exceed one page in length
A: 15
B: 20
C: 25
D: 30
B
Q No 28: The construction should appear at the ………….. of the header file
A: Top
B: Bottom
C: Left
D: Right
A
Q No 29: A process which does not take input is called ……
A: Miracle process
B: Core process
C: Secondary process
D: Zombie process
A
Q No 30: Data Flow Diagrams ……………
A: Replace the job of systems analysts
B: Do not allow every function to work at the same time
C: Can be automatically generated by computer aided software engineering tools
D: Describes how data flows from one logical processing unit to another
D
Q No 31: Krutchen’s 4+1 architectural view model proposes the development of …… main views
A: 2
B: 3
C: 4
D: 5
D
Q No 32: Client server model tries to …………… data and processing
A: Distribute
B: Centralize
C: Process in parallel
D: Combine
A
Q No 33: We can divide the whole Software Engineering process in 4 distinct phases namely vision, definition, development, and maintenance. Which of the following is not among “Definition related” activities of software development?
A: Requirement verification
B: Change Control
C: Requirement Engineering
D: Software Requirements
B
Q No 34: Which writing style is best regarding identifier role in enhancing the readability of a program?
A: If (Flag = = 0)
B: If (Flag = = START.NUMBER)
C: If (Z = = START.NUMBER)
D: If (Z= =0)
A
Q No 35: Inspections can check conformance with a specification but not conformance with the …- ………-requirements
A: Customer’s real
B: Developer
C: Tester
D: Manger
A
Q No 36: Testing is an intellectually demanding activity and has a lifecycle ………- to software development
A: Equal
B: Parallel
C: Sequential
D: In contrast
B
Q No 37: A memory leak bug is one in which memory is somehow allocated from either the operating system or an ………- “pool”, but never deallocated when the memory is finished being used
A: Mixed memory
B: External memory
C: Internal Memory
D: Mutually exculive memory
C
Q No 38: What types of errors are missed by black-box testing and can be uncovered by whitebox testing?
A: Runtime errors
B: Logic errors
C: Performance errors
D: Input errors
D
Q No 39: The cyclomatic complexity metric provides the designer with information regarding the number of …………..
A: Statements in the program
B: Cycles in the program
C: Errors in the program
D: Independent logic paths in the program
D
Q No 40:………….. is intended to define a many to many relationship between objects so that when one object changes state all its dependants are notified and updated automatically
A: Observer Pattren
B: Facade Pattren
C: Singleton Pattren
D: Joint Pattren
A
Q No 41: In the switch statement, cases should always end with …………..
A: Return
B: Semi colon
C: Break
D: Full stop
C
Q No 42: Abstraction and encapsulation are two important tools that can help in managing and mastering the …………… of a program
A: Usability
B: Complexity
C: Understandability
D: Reliability
B
Q No 43: Which of the following is/are NOT one of the umbrella activities?
A: Requirement analysis
B: Architecture design
C: Architecture design
D: All of the given options
D
Q No 44: The code is misbehaving in a way that cannot be easily explained. The above statement is the symptom of …………..
A: Runtime Error
B: Logical Error
C: Memory Leak
D: Exception
B
Q No 45: Ideally speaking, a function should not be larger than ……………lines of code and in any case should not exceed one page in length
A: 15
B: 20
C: 25
D: 30
B
Q No 46: The construction should appear at the ………….. of the header file
A: Top
B: Bottom
C: Left
D: Right
A
Q No 47: A process which does not take input is called ……
A: Miracle process
B: Core process
C: Secondary process
D: Zombie process
A
Q No 48: Data Flow Diagrams ……………
A: Replace the job of systems analysts
B: Do not allow every function to work at the same time
C: Can be automatically generated by computer aided software engineering tools
D: Describes how data flows from one logical processing unit to another
D
Q No 49: Krutchen’s 4+1 architectural view model proposes the development of …… main views
A: 2
B: 3
C: 4
D: 5
D
Q No 50: Client server model tries to …………… data and processing
A: Distribute
B: Centralize
C: Process in parallel
D: Combine
A