Top 1000+ Software Engineering Subject Mcqs Pdf Download Set No 05

Print/Downlaod pdf

Q No 1: Which is not included in test criteria applied in a phase of testing?
A: Functional validity
B: Interface integrity
C: Correctness
D: Programing Logic
C


Q No 2: For inspections, …………- are prepared that contain information regarding defects
A: Tables
B: Checklists
C: Lists
D: Frames
B


Q No 3: Equivalence ………….. help you in designing test cases to test the system effectively and efficiently
A: Functions
B: Classes
C: Objects
D: Interfaces
B


Q No 4:………….. are used to describe flow of data or control in an application
A: Code structures
B: String matching
C: Paths
D: Flow graphs
D


Q No 5: Writing test cases and generating test data are processes that demand ………….. building capabilities
A: Domain
B: System
C: Scenario
D: Code
C


Q No 6: The raising of the imaginary error flag is simply called raising or …………… an error
A: Throwing

B: Sending
C: Casting
D: Handling
A


Q No 7:…………… requirements are often called product features
A: Functional
B: Business
C: User
D: Non-functional
B


Q No 8: Many compilers limit the maximum number of bits in the bit field to the size of a(n) ……………
A: Integer

B: Float
C: Character
D: Double
A


Q No 9: In Java, “>>” is used for …………… shift and “>>>” for …………… shift
A: Arithmetic, Logical

B: Mathematical, Logical
C: Incremental, Arithmetic
D: Logical, Arithmetic
A


Q No 10: When large amount of data is to be shared, repository model is used. This model has been extensively used in the …………… based application
A: Mainframe

B: Super Computers
C: Personal Computers
D: Real time
A


Q No 11: There are four basic coding structures: sequence, if statement, case statement, and …………..
A: For loop
B: While loop
C: Switch statement
D: Logical operations
B


Q No 12:………….. is only a reference for defining protocols and designing and implementing systems developed by different parties
A: OSI model
B: Reference architecture
C: Layered architecture
D: N-tier architecture
B


Q No 13: The pattern movement became very quiet until ………….. when patterns appeared again at OOPSLA conference
A: 1987

B: 1988
C: 1962
D: 1995
A


Q No 14: STL Stands for ……………
A: Standard Temporary Line
B: Standard Temporary Library
C: Standard Template Library
D: Standard Type Link
C


Q No 15:………….. ensures that a class only has one instance and provides a global point of access to it
A: Singleton Pattern

B: Observer Pattern
C: Behavioral Pattern
D: Joint Pattern
A


Q No 16: Which design pattern provides a unified interface to a set of interfaces in a sub-system?
A: Façade

B: Singleton
C: Observer
D: Joint
A


Q No 17: Testing activities require destructive instincts in ………….. for the purpose of breaking system to discover loopholes into its functionality
A: Bug Fixers
B: Tester
C: Developer
D: Requirement Engineer
B


Q No 18: Camel Case is now the official convention for file names and identifiers in the ………….. programming language
A: C#
B: C++
C: Java
D: Visual Basic.Net
C


Q No 19: In presence of …………… bug in a program, the results are the opposite of what is expected
A: Memory Leak
B: Memory Over-runs
C: Syntax Error
D: Logical Error
D


Q No 20: Split lines occur when a statement exceed the …………… column limit
A: 80

B: 85
C: 90
D: 95
A


Q No 21: Identifier names play a significant role in enhancing the …………… of a program
A: Writability
B: Readability
C: Reliability
D: Usability
B


Q No 22: “is” prefix should be used for………….. variables and methods
A: Static
B: General
C: Boolean
D: Constant
C


Q No 23: Comments should be indented relative to their position in the ……………
A: Code

B: Design
C: Analysis
D: Requirements
A


Q No 24: Modularity is a tool that can help us in ………….. the size of individual functions
A: Stabilizing
B: Reducing
C: Increasing
D: Strengthening
B


Q No 25: Perry and Wolfe proposed the following formula for software architecture
A: Software architecture = {Forms, Rationale}
B: Software architecture = {Elements, Forms, Rationale}
C: Software architecture = {Parts, Rationale}
D: Software architecture = {Parts, Elements}
B


Q No 26: The code is misbehaving in a way that cannot be easily explained. The above statement is the symptom of …………..
A: Runtime Error
B: Logical Error
C: Memory Leak
D: Exception
B


Q No 27: Ideally speaking, a function should not be larger than ……………lines of code and in any case should not exceed one page in length
A: 15
B: 20
C: 25
D: 30
B


Q No 28: The construction should appear at the ………….. of the header file
A: Top

B: Bottom
C: Left
D: Right
A


Q No 29: A process which does not take input is called ……
A: Miracle process

B: Core process
C: Secondary process
D: Zombie process
A


Q No 30: Data Flow Diagrams ……………
A: Replace the job of systems analysts
B: Do not allow every function to work at the same time
C: Can be automatically generated by computer aided software engineering tools
D: Describes how data flows from one logical processing unit to another
D


Q No 31: Krutchen’s 4+1 architectural view model proposes the development of …… main views
A: 2
B: 3
C: 4
D: 5
D


Q No 32: Client server model tries to …………… data and processing
A: Distribute

B: Centralize
C: Process in parallel
D: Combine
A


Q No 33: We can divide the whole Software Engineering process in 4 distinct phases namely vision, definition, development, and maintenance. Which of the following is not among “Definition related” activities of software development?
A: Requirement verification
B: Change Control
C: Requirement Engineering
D: Software Requirements
B


Q No 34: Which writing style is best regarding identifier role in enhancing the readability of a program?
A: If (Flag = = 0)

B: If (Flag = = START.NUMBER)
C: If (Z = = START.NUMBER)
D: If (Z= =0)
A


Q No 35: Inspections can check conformance with a specification but not conformance with the …- ………-requirements
A: Customer’s real

B: Developer
C: Tester
D: Manger
A


Q No 36: Testing is an intellectually demanding activity and has a lifecycle ………- to software development
A: Equal
B: Parallel
C: Sequential
D: In contrast
B


Q No 37: A memory leak bug is one in which memory is somehow allocated from either the operating system or an ………- “pool”, but never deallocated when the memory is finished being used
A: Mixed memory
B: External memory
C: Internal Memory
D: Mutually exculive memory
C


Q No 38: What types of errors are missed by black-box testing and can be uncovered by whitebox testing?
A: Runtime errors
B: Logic errors
C: Performance errors
D: Input errors
D


Q No 39: The cyclomatic complexity metric provides the designer with information regarding the number of …………..
A: Statements in the program
B: Cycles in the program
C: Errors in the program
D: Independent logic paths in the program
D


Q No 40:………….. is intended to define a many to many relationship between objects so that when one object changes state all its dependants are notified and updated automatically
A: Observer Pattren
B: Facade Pattren
C: Singleton Pattren
D: Joint Pattren
A


Q No 41: In the switch statement, cases should always end with …………..
A: Return
B: Semi colon
C: Break
D: Full stop
C


Q No 42: Abstraction and encapsulation are two important tools that can help in managing and mastering the …………… of a program
A: Usability
B: Complexity
C: Understandability
D: Reliability
B


Q No 43: Which of the following is/are NOT one of the umbrella activities?
A: Requirement analysis
B: Architecture design
C: Architecture design
D: All of the given options
D


Q No 44: The code is misbehaving in a way that cannot be easily explained. The above statement is the symptom of …………..
A: Runtime Error
B: Logical Error
C: Memory Leak
D: Exception

B


Q No 45: Ideally speaking, a function should not be larger than ……………lines of code and in any case should not exceed one page in length
A: 15
B: 20
C: 25
D: 30

B


Q No 46: The construction should appear at the ………….. of the header file
A: Top

B: Bottom
C: Left
D: Right

A


Q No 47: A process which does not take input is called ……
A: Miracle process

B: Core process
C: Secondary process
D: Zombie process

A


Q No 48: Data Flow Diagrams ……………
A: Replace the job of systems analysts
B: Do not allow every function to work at the same time
C: Can be automatically generated by computer aided software engineering tools
D: Describes how data flows from one logical processing unit to another

D


Q No 49: Krutchen’s 4+1 architectural view model proposes the development of …… main views
A: 2
B: 3
C: 4
D: 5

D


Q No 50: Client server model tries to …………… data and processing
A: Distribute

B: Centralize
C: Process in parallel
D: Combine

A