Sunday, 22 March 2020

CS605-Software Engineering 2 Quiz MCQs Lecture 23-45 Finalterm Objective Questions | SUPERSTARWEBTECH


CS605-Software Engineering II Quiz  MCQS #Objective #Questions #Finalterm

1. Earned Value Analysis (EVA) is a ___ technique for assessing the progress of a project
  • Qualitative
  • Quantitative
  • Subjective
  • None
2. The basic idea behind Software configuration management is:
  • To manage and control the change
  • To efficiently allocate the resources
  • To properly manage status reporting
  • None
3. Following are effective guidelines for Review EXCEPT
  • We need to review the product, not the producer
  • Be sensitive to personal egos
  • Errors should be pointed out gently
  • Tone should be high and strict
4. if :
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
  • DRE = E + (E+D)
  • DRE = E-(E+D)
  • DRE = E*(E+D)
  • DRE = E/(E+D)
5. In order to use the PERT and CPM, which one of the following is NOT required?
  • Decomposition of tasks - also known as the work breakdown structure (WBS)
  • Teams communication mode details
  • Estimation of effort
  • Interdependencies
6. If an error related to requirements is identified in testing phase, this error will be considered as an error of ___ phase
  • Requirement
  • Design
  • Code
  • Testing
7. Quality cost may be delivered into costs associated with:
  • Prevention, appraisal and failure
  • Customers, developers and maintenace
  • Builds, releases and products
  • Bugs, errors and reports
8. Poka-Yoke is the name of a
  • QA technique
  • Japanese dish
  • Idiom
  •  None
9. Configuration Auditing deals with:
  • Ensuring that Resources have been allocated properly
  • Ensuring that changes are implemented parallel with SDLC framework activities
  • Ensuring that the changes have been implemented properly
  • All of the given
10. FTR stands for:
  • Feasibility of technical requirement
  • Fetched Technical Requirement
  • Formal Technical Review
  • None 
11. A Software Requirement Specification is traced if the ___ of its requirements is clear.
  • Quality
  • Slandered
  • Origin
  • None
12. Version Control discusses about:
  • How does an organization control changes before and after software is released to a customer
  • How the resources will be assigned to tasks in work breakdown structure (WBS)
  • How the test cases will be executed before deploying each release.
  • All of given
13. The implemented requirement has been ___ through the selected approach, such as testing or inspection.
  • Verified
  • Deleted
  • Approved
  • None
14. The Software reengineering is a ___ activity.
  • Code
  • Out dated
  • Document
  • Non-trivial
15. Which of the following is NOT an example of Software Configuration Item (SCI):
  • Test Case
  • Integration Plan
  • Design specification
  • None
16. Mean Time Between Failure (MTBF) can be calculated by:
  • MTBF = MTTF + MTTR
  • MTBF = MTTF - MTTR
  • MTBF = (MTTF/MTTR)*100
  • MTBF = (MTTR/MTTF)*100
17. ___ software development is itself risky as changes to one part of the system inevitably involve further changes to other components.
  • Forward
  • Reverse
  • Old
  • New
18. Program is restructured ___ the reverse engineering phase. In this case we modify source code and data in order to make it amenable to future changes.
  • After
  • None
  • Along with
  • Before
19. ___ Managers look at the system from the angle that does the system and associated business process make an effective contribution to the business goal?
  • Senior
  • IT
  • None
  • Line
20. ___ user assess the system from the perspective of how effective do they find the system in supporting their business processes and how much of the system functionality is used.
  • Senior
  • IT
  • Line
  • End
21. A system is considered to be a legacy system if it has been in operation for ___ years. A legacy system has many components.
  • Less than seven
  • Many
  • More than two
  • Less than ten
22. Legacy system migration, however, is an easy task and there are a number of risks involved that need to be mitigated
  • Simple
  • Crucial
  • None
  • Easy
23. ___ engineering does not simply create a modern equivalent of an older program, rather new user and technology requirements are integrated into the reengineering effort
  • Forward
  • None
  • Reverse
  • BPR
24. Which of the following the NOT one of the attributes of requirements.
  • Requirement ID
  • Creation Date
  • Created By
  • Received By
25. If the version of a release changes from 1.0.0 to 2.0.0 what will you conclude about new release (having version 2.0.0)
  • There was no change in functionality
  • There was major change in functionality
  • There was partial change in functionality 
  • Bugs in previous functionality were removed
26. Which of the following is NOT one of the tasks included in Software Configuration Management.
  • Version Control
  • Configuration Auditing
  • Test Case develoment
  • Change control