You are on page 1of 23

Model Question Paper Subject Code: MIT104 Subject Name: Software Engineering Credits: 4 Part A (One mark questions)

1. _____ is a set of application programs. A) Software B) Hardware C) Algorithm D) Pseudo code 2. Software delivers the most important product of our time i.e. _____. A) Money B) Information C) Knowledge D) Wealth 3. _____ resides only in read-only memory and is used to control products and systems for the consumer and industrial markets. A) System software B) Real time software C) Embedded software D) Business software 4. _____ is an example for common PC software.

Marks: 140

A) Embedded software B) Real time software C) AI software D) Word processing 5. Software Engineering is a sub discipline of _____. A) Computer science engineering B) Electronics engineering C) Mechanical engineering D) Civil engineering 6. The cost of software engineering includes roughly _____ % of development costs and _____ % of testing costs. A) 50, 50 B) 60, 40 C) 40, 60 D) 70, 30 7. _____ model combines the techniques of both prototyping and the waterfall model. A) Spiral Development B) Incremental Development C) Iterative Development D) Linear Sequential Development 8. _____ model combines the techniques of linear sequential model with the iterative of prototyping.

A) Concurrent Development B) Waterfall Development C) Spiral Development D) Incremental Development 9. The _____ of a software system is a measure of how well users think it provides the services that they require. A) Reliability B) Fault tolerance C) Fault avoidance D) Fault detection 10. _____ is a measure of the likelihood that the system will fail when a service request is made. A) Rate of Failure Occurrence (ROCOF) B) Probability of Failure on Demand (POFOD) C) Mean Time to Failure (MTTF) D) Availability (AVAIL) 11. _____ is a software testing process in which the objective is to measure the reliability of the software rather than to discover software faults. A) Unit testing B) System testing C) Statistical testing D) Integration testing

12. A good software process should be oriented towards _____ rather than fault detection and removal. A) Fault tolerance B) Fault avoidance C) Reliability D) None of the above 13. In _____ model data flow diagrams may be used to show how data is processed at different stages in the system. A) Data Processing B) Composition C) Classification D) Process 14. In _____ model entity-relation diagrams may be used to show how some entities in the system are composed of other entities. A) Classification B) Composition C) Stimulus-response D) Process 15. In _____ model the system is modeled using the data transformations, which take place as it is processed. A) Data Flow B) Entity Relation C) Structural

D) Object Oriented 16. In _____ model the system components and their interactions are documented. A) Data Flow B) Entity Relation C) Structural D) Object Oriented 17. _____ is concerned with developing an object-oriented model of the application domain. A) Functional programming B) Object oriented design C) Object oriented programming D) Object oriented analysis 18. _____ is concerned with developing an object-oriented model of a software system to implement the identified requirements. A) Object oriented programming B) Procedural programming C) Object oriented design D) Object oriented analysis 19. The service name may be _____. A) Operation name B) Attribute name C) A or B D) None of the above

20. Designers should avoid _____ representation information in their interface design. A) Interfaces B) Classes C) Objects D) Attributes 21. The software development strategies are called _____. A) Process models B) Project models C) People models D) Product models 22. _____ are used recently to identify customer requirements. A) Objects B) Use cases C) Prototypes D) Classes 23. The most famous risk reduction strategy is _____. A) Waterfall model B) Incremental model C) Spiral model D) Iterative model 24. _____ model is based on incremental development under statistical quality control and formal correctness principles.

A) Waterfall B) Spiral C) Iterative D) Cleanroom 25. CAD stands for _____. A) Computer Aided Design B) Computer Aided Drafting C) Computer Aided Documentation D) Computer Aided Database 26. _____ tools are analogous to CAD tools. A) Database B) CASE C) Word processing D) Spreadsheet 27. CASE stands for _____. A) Computer Aided System Engineering B) Computer Aided Statistical Engineering C) Computer Aided Software Engineering D) Computer Aided Structural Engineering 28. Tools used in the early phases of the life cycle are called _____ CASE tools. A) Lower

B) Back-end C) Intermediate D) Upper 29. _____ and _____ described a simulated approach to process modeling in a series of papers in 1983, 1989, and 1991. A) Abdel-Hamid, Madnick B) Leveson, Dulac C) Larkin and Simon D) Vessey and Conger 30. The simulation model applies _____ theory of group productivity. A) Levesons B) Steiners C) Madnicks D) Vesseys 31. PERL is a _____ language. A) Scripting B) Database C) Programming D) Spreadsheet 32. _____ is the open source software. A) Internet Explorer B) Mozilla

C) MS-Office D) Oracle 33. The statement Since the software engineering process used for a specific project should reflect particular needs, a framework is needed to provide consistency between projects was proposed by _____. A) Humphrey B) Liu C) Curtis D) Kellner 34. _____ argued against unification in models, but proposed essential features that every successful model should have. A) Humphrey B) Liu and Horowitz C) Curtis D) Kellner 35. According to Moores law, the density of digital chips _____ approximately every 18 months. A) Doubles B) Triples C) Increases four times D) Remain constant 36. _____ law observes that networks increase in value with each additional node (user) in proportion to the square of the number of users. A) Moores

B) Metcalfes C) Newtons D) Ohms 37. The statement The process can be altered or adapted to suit a set of special needs or purposes was given by _____. A) Jacobson B) Booch C) Basili & Rombach D) Boole 38. _____ is a prevalent characteristic of the software process modeling literature. A) Integrity B) Multiplicity C) Uniformity D) Diversity 39. _____ thinking helps us to understand problems better and therefore solve problems more effectively. A) Multidisciplinary B) Unique C) Focused D) Single Disciplinary 40. In Software Engineering, people are considered as a/an _____. A) Asset

B) Resource C) Problem Solver D) Knowledge Provider

Part B (Two mark questions)


41. The role of computer software has undergone significant change over a time span of little more than _____ years. A) 30 B) 40 C) 50 D) 60 42. Software is a _____ element. A) Physical B) Static C) Dynamic D) Logical 43. Software Engineering is the systematic approach to the development, operation, maintenance and retirement of software. This definition is given by _____. A) IEEE B) Boehm C) Bauer D) Charles Babbage 44. _____ model is also called as the classic life cycle or the Waterfall model.

A) Iterative Development B) Incremental Development C) Spiral Development D) Linear Sequential Development 45. _____ is a measure of the frequency of occurrence with which unexpected behavior is likely to occur. A) Probability of Failure on Demand (POFOD) B) Availability (AVAIL) C) Rate of Failure Occurrence (ROCOF) D) Mean Time to Failure (MTTF) 46. _____ is a measure of the time between observed system failures. A) Probability of Failure on Demand (POFOD) B) Rate of Failure Occurrence (ROCOF) C) Availability D) Mean Time to Failure (MTTF) 47. In _____ model objects class/inheritance diagrams may be used to show how entities have common characteristics. A) Composition B) Classification C) Process D) Data Processing 48. _____ is a list of names used by the systems, arranged alphabetically.

A) Data Dictionary B) Hardware list C) Data Directory D) Software list 49. _____ is concerned with realizing a software design using an object oriented programming language. A) Object oriented design B) Structural programming C) Object oriented programming D) Object oriented analysis 50. A/An _____ is an entity that has a state and a defined set of operations, which operate on that state. A) Class B) Message C) Interface D) Object 51. _____ refers to the elimination or reduction of third-party intermediaries between the client or customer. A) Intermediation B) Disintermediation C) Mediation D) None of the above

52. RAD stands for _____. A) Random Application Development B) Raw Application Development C) Robust Application Development D) Rapid Application Development 53. State True or False. 1. 4GLs are not CASE tools. 2. The domain of applicability of CASE tools are much more limited than the 4GL. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 54. State True or False. 1. CASE tools actually model the semantics of a design. 2. UML uses class diagrams to describe the relations between the objects or classes in a problem. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 55. State True or False. 1. Abdel-Hamid and Madnick described a simulated approach to process modeling.

2. The system dynamics model can be used to examine the productivity paradox. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 56. State True or False. 1. Open source developers or contributors like those involved in Linux tend to be highly experienced professional programmers. 2. Even if the software is free, customers are willing to pay for convenience and a brand they can trust. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 57. State True or False. 1. Curtis, Kellner, and Over identified five uses for process models. 2. Blackburn et al. identified the five most influential factors in the development process. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 58. State True or False.

1. Through LANs one can be connected to the business environment regardless of location, time, or local technical infrastructure. 2. Executive or expert systems that handle structured as well as routine connection problems provide backup for the communication and decision-making link. A) 1-True, 2-False B) 1-True, 2-True C) 1-False, 2-True D) 1-False, 2-False 59. State True or False. 1. Working with small software systems entails the same experience as working with large software systems. 2. Diversity can be acquired through inheritance as well as by over riding the presuppositions that derive from inheritance. A) 1-True, 2-True B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False 60. State True or False. 1. Problem complexity is low at the strategic management level and high at the operational level. 2. Many organizations currently link their corporate intranets to extranet systems accessible to their business partners. A) 1-True, 2-True

B) 1-True, 2-False C) 1-False, 2-True D) 1-False, 2-False

Part C (Four mark questions)


61. _____ is a collection of programs written to service other programs. A) System software B) Real time software C) Business software D) Embedded software 62. Rapid Application Development (RAD) assumes the use of _____ generation techniques. A) First B) Fourth C) Second D) Third 63. The specifications, called _____ govern how the component is to interact with other components and systems. A) Bonds B) Agreements C) Contracts D) Requirements 64. In _____ design, the sub-systems making up the system and their relationships are identified and documented.

A) Component B) Abstract C) Interface D) Architectural 65. Objects are organized into a/an _____ structure that shows how one object is composed of a number of other objects. A) Aggregation B) Hierarchy C) Inheritance D) None of the above 66. _____ is the process of analyzing a program in an effort to create a representation of the program at a higher level of obstruction than source code. A) Reverse Engineering B) Forward Engineering C) Document Restructuring D) Inventory Analysis 67. Black-box testing, also called _____. A) System testing B) Structural testing C) Behavioral testing D) Unit testing 68. Match the following:

Set A 1. Waterfall model

Set B a. Iterative model, with risk metrics and collaborative reevaluation

2. Incremental model

b. Experimental method for obtaining an understanding of a proposed system

3. Prototyping model 4. Spiral model A) 1-d, 2-c, 3-b, 4-a B) 1-a, 2-c, 3-b, 4-d C) 1-b, 2-d, 3-a, 4-c D) 1-c, 2-a, 3-d, 4-b 69. Match the following: Set A 1. Inventory analysis

c. Phased development model d. One of the first and most influential model

Set B a. Translation of the current model to the target data model

2.

Reverse engineering

b. Use of the process results or products to develop the new system

3.

Forward engineering

c. Attempt to extract and abstract design information from the existing systems source code

4.

Data Reengineering

d. Makes a detailed review of all existing business applications

A) 1-a, 2-c, 3-b, 4-d B) 1-d, 2-c, 3-b, 4-a

C) 1-b, 2-d, 3-a, 4-c D) 1-c, 2-a, 3-d, 4-b 70. Match the following: Set A 1. Frequential simplification Set B a. Describes the cooperative behavior manifested by a user and an interface during an interaction 2. Inferential simplification 3. Requirements b. Refer to the qualities of the representation c. Process in which similar interactions are merged into prototypical rules where differences are blurred 4. User Action Notation d. Process by which infrequently taken interactions are forgotten A) 1-b, 2-d, 3-a, 4-c B) 1-a, 2-c, 3-b, 4-d C) 1-d, 2-c, 3-b, 4-a D) 1-c, 2-a, 3-d, 4-b 71. Match the following: Set A (Model) 1. Open source development 2. Agile software development 3. Rapid application development 4. Aspect oriented development A) 1-a, 2-c, 3-b, 4-d B) 1-c, 2-a, 3-d, 4-b Set B (Application domain) a. Distributed and concurrent systems b. Not appropriate for high-performance systems c. Smaller projects d. System infrastructure and development tools

C) 1-b, 2-d, 3-a, 4-c D) 1-d, 2-c, 3-b, 4-a 72. Match the following: Set A 1. Metric-oriented assessments Set B a. Incorporate automated tools into process modeling 2. Taxonomy-driven assessments b. Come from the perspective that existing models are insufficient and need enhancements 3. Process improvement assessments 4. Environment-based assessments c. Build a classification d. Provide standards and metrics for further process enhancement and evaluation A) 1-d, 2-c, 3-b, 4-a B) 1-a, 2-c, 3-b, 4-d C) 1-b, 2-d, 3-a, 4-c D) 1-c, 2-a, 3-d, 4-b 73. Software technology has enabled breakthrough transformations in businesses and provided benefits that have included: 1. Removal of unnecessary processes 2. Overall quality improvement 3. Organizational flexibility 4. Cost reduction A) 1, 2, 3 only B) 2, 3, 4 only

C) 1, 3, 4 only D) All of the above 74. The effects of a lack of communication can be summarized as: 1. Ignorance of lack of sources 2. Extra-contextual ignorance 3. Ignorance of lack of communication channels 4. Differentiation ignorance A) All of the above B) 1, 2, 3 only C) 2, 3, 4 only D) 1, 3, 4 only 75. Match the following: Set A 1. Project conception 2. Planning Set B a. The project activities are phased out b. Manage the resources necessary to accomplish the objectives 3. Execution c. The performance, cost and schedule estimates are refined 4. Termination A) 1-a, 2-c, 3-b, 4-d B) 1-d, 2-c, 3-b, 4-a C) 1-b, 2-d, 3-a, 4-c D) 1-c, 2-a, 3-d, 4-b d. Determine the feasibility of the project

Answer Keys
Part - A Q. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Ans. Key A B C D A B C D A B C B A B A C D C C A Q. No. 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Ans. Key A B C D A B C D A B A B A B A B C D A B Part - B Q. No. 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Ans. Key C D A D C D B A C D B D A C A A A B C C Part - C Q. No. 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 Ans. Key A B C D A A C A B C D A D A B

You might also like