Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PRESSMAN
9. The current software crisis was caused by the Y2K problem whose seeds were first sown by careless programmers in the early 1970's. a. True b. False 10. Software developers succeed more often than they fail, but software failures receive more press coverage. a. True b. False 11. Adding more people to a project that is already behind schedule is a good way to catch up. a. True b. False 12. Modern CASE tools are more important than the newest hardware for achieving good software quality and productivity. a. True b. False 13. Change cannot be easily accommodated in most software systems, unless a system was designed with change in mind. a. True b. False 14. A general statement of objectives is all that is needed to begin developing a piece of software. a. True b. False 15. The formal technical review is an inadequate substitute for testing regardless of nature of the software defect. a. True b. False 16. Documentation is no longer a necessary part of the software development process because no one reads it. a. True b. False
a. A reasonable approach when requirements are well defined. b. A useful approach when a customer cannot define requirements clearly. c. The best approach to use for projects with large development teams. d. A risky model that rarely produces a meaningful product. 10. The rapid application development model is a. Another name for component-based development. b. A useful approach when a customer cannot define requirements clearly. c. A high-speed adaptation of the linear sequential model. d. All of the above. 11. Evolutionary software process models a. Are iterative in nature b. Can easily accommodate product requirements changes c. Do not generally produce throwaway systems d. All of the above 12. The incremental model of software development is a. A reasonable approach when requirements are well defined. b. A good approach when a working core product is required quickly. c. The best approach to use for projects with large development teams. d. A revolutionary model that is not used for commercial products. 13. The spiral model of software development a. Ends with the delivery of the software product b. Is more chaotic than the incremental model c. Includes project risks evaluation during each iteration d. All of the above 14. The WINWIN spiral model of software development is a. A used when requirements must be defined by customer negotiation. b. Useful when a customer is able to provide requirements completely. c. The best approach to use for projects with large development teams. d. Like the spiral model without the risk assessment step. 15. The concurrent development model is a. Another name for the rapid application development model. b. Often used for the development of client/server applications. c. Only used for development of parallel or distributed systems. d. Used whenever a large number of change requests are anticipated. 16. The component-based development model is a. Only appropriate for computer hardware design. b. Not able to support the development of reusable components. c. Dependent on object technologies for support. d. Not cost effective by known quantifiable software metrics. 17. The formal methods model of software development makes use of mathematical methods to a. Define the specification for computer-based systems b. Develop defect free computer-based systems c. Verify the correctness of computer-based systems d. All of the above 18. Fourth generation techniques
Page 4 of 77 Compiled By: rkavirayani@yahoo.com
a. Allow software to be developed without any testing. b. Eliminate the need for costly requirements gathering activities. c. Can reduce the time required to develop software. d. Are best used by non-programmers to build small systems.
b. predicted size of the resulting program c. rigidity of the delivery date d. size of the project budget 10. One of the best ways to avoid frustration during the software development process is to a. give team members more control over process and technical decisions. b. give team members less control over process and technical decisions. c. hide bad news from the project team members until things improve. d. reward programmers based on their productivity. 11. Which of these software characteristics is not a factor contributing to project coordination difficulties? a. interoperability b. performance c. scale d. uncertainty 12. Which of these software characteristics are used to determine the scope of a software project? a. context, lines of code, function b. context, function, communication requirements c. information objectives, function, performance d. communications requirements, performance, information objectives 13. The major areas of problem decomposition during the project scoping activity are the a. customer workflow b. functionality to be delivered c. process used to deliver functionality d. answers b and c 14. Product and process decomposition occurs simultaneously as the project plan evolves. a. True b. False 15. When can selected common process framework activities be omitted during process decomposition? a. when the project is extremely small in size b. any time the software is mission critical c. rapid prototyping does not require their use d. never, the activities are invariant 16. What activity does a software project manager need to perform to minimize the risk of software failure? a. double the project team size b. request a large budget c. allow absolutely no schedule slippage d. define milestones and track progress 17. Which of the following questions is not addressed when the W5HH principle is applied? a. Why is the system being developed? b. What will be done by whom? c. Where are they organizationally located? d. How much of each resource is required? 18. Which of these is not a critical practice for performance-based project management? a. assessing product usability
Page 7 of 77 Compiled By: rkavirayani@yahoo.com
b. defect tracking against quality targets c. empirical cost estimation d. formal risk management
c. real-time or embedded applications d. computer graphics applications 10. Backfiring is the best way to compute function point measures once a software application is completed. a. True b. False 11. Which of the following software quality factors is most likely to be affected by radical changes to computing architectures? a. operation b. transition c. revision d. none of the above 12. Which of the following provide useful measures of software quality? a. correctness, performance, integrity, usability b. reliability, maintainability, integrity, sales c. correctness, maintainability, size, satisfaction d. correctness, maintainability, integrity, usability 13. A software quality metric that can be used at both the process and project levels is defect removal efficiency (DRE). a. True b. False 14. Why is it important to measure the process of software engineering and software it produces? a. It is really not necessary unless the project is extremely complex. b. To determine costs and allow a profit margin to be set. c. To determine whether a software group is improving or not. d. To make software engineering more like other engineering processes. 15. To be an effective aid in process improvement the baseline data used must be: a. based on reasonable guesstimates from past projects b. measured consistently across similar projects c. collected over the past 6 months d. based on all previously completed projects 16. Baseline data must be collected in an on-going manner and cannot be computed by formal study of historical project data. a. True b. False 17. One graphical technique for determining whether a process exhibits out-of-control change behavior is a a. control chart b. fishbone diagram c. Pareto diagram d. process diagram 18. Zone rules may be used to a. allocate software functions to team members b. determine a marketing strategy for a product
Page 10 of 77 Compiled By: rkavirayani@yahoo.com
c. identify an out-of-control process d. validate a set of software process metrics 19. Small software organizations are not likely to see any economic return from establishing software metrics program. a. True b. False 20. The software metrics chosen by an organization are driven by the business or technical goals an organization wishes to accomplish. a. True b. False
9. Reusable software components must be a. catalogued for easy reference. b. standardized for easy application c. validated for easy integration
Page 12 of 77 Compiled By: rkavirayani@yahoo.com
d. all of the above 10. The software engineering environment (SEE) consists of which of the following? a. customers and users b. developers and managers c. hardware platforms and software tools d. none of the above 11. The hardware required for most computer-based systems is more costly to purchase than the software. a. True b. False 12. Which of the following is a broad classification of software project estimation techniques? a. automated processes b. white-box methods c. empirical models d. regression models 13. The size estimate for a software product to be built must be based on a direct measure like LOC. a. True b. False 14. An expected value estimate is determined by computing the weighted average of a. estimates from three different estimators b. three different size estimates for the same project c. three different size estimates from similar projects d. none of the above 15. Problem-based estimation is based on problem decomposition that focuses on a. information domain values and software functions b. project schedule and milestones c. LOC and FP counts d. process activities 16. LOC-based estimation techniques require problem decomposition based on a. information domain values b. project schedule c. software functions d. process activities 17. FP-based estimation techniques require problem decomposition based on a. information domain values b. project schedule c. software functions d. process activities 18. Process-based estimation techniques require problem decomposition based on a. information domain values and data objects b. project schedule and milestones c. software functions and process activities
Page 13 of 77 Compiled By: rkavirayani@yahoo.com
d. none of the above 19. Empirical estimation models are typically based on a. expert judgement based on past project experiences b. refinement of expected value estimation c. regression models derived from historical project data d. trial and error determination of the parameters and coefficients 20. COCOMO II is an example of a suite of modern empirical estimation models that require sizing information expressed as: a. function points b. lines of code c. object points d. any of the above 21. Putnam's software equation is a dynamic empirical model that has two independent parameters: a size estimate and an indication of project duration in calendar months or years. a. True b. False 22. Using a statistical technique like decision tree analysis can provide some assistance in sorting out the true costs associated with the make-buy decision. a. True b. False 23. Outsourcing always provides a simple means of acquiring software at lower cost than on site development of the same product. a. True b. False 24. A weakness of the current generation of automated estimation tools is the a. high cost of acquisition and use b. inability of these tools to take software reuse into account when making an estimate c. inability to integrate LOC and FP data d. significant differences between tool estimates and actual values on several projects
9. Risk tables are sorted by a. probability and cost b. probability and impact
Page 15 of 77 Compiled By: rkavirayani@yahoo.com
c. probability and consequences d. probability and exposure 10. Individual team members can make their own estimate for a risk probability and then develop a consensus value. a. True b. False 11. Which factor(s) likely affect the probable consequences if a risk does occur? a. risk cost b. risk timing and scope c. risk resources d. all of the above 12. A risk referent level is a risk component value (performance, cost, support, schedule) or combination of values that cause a project to be terminated. a. True b. False 13. The reason for refining risks is to break them into smaller units having different consequences. a. True b. False 14. An effective risk management plan will need to address which of the following issues? a. risk avoidance b. risk monitoring c. contingency planning d. all of the above 15. Risk monitoring involves watching the risk indicators defined for the project and not determining the effectiveness of the risk mitigation steps themselves. a. True b. False 16. Hazard analysis focuses on the identification and assessment of potential hazards that can cause a. project termination b. schedule slippage c. cost overruns d. an entire system to fail 17. Risk information sheets (RIS) are never an acceptable substitute for a full risk mitigation, monitoring, and management (RMMM) plan. a. True b. False
9. A task set will grow in size and complexity as the degree of rigor a. shrinks b. changes c. grows
Page 17 of 77 Compiled By: rkavirayani@yahoo.com
d. all of the above 10. The term back-filling refers to writing additional documentation and conducting additional reviews after a project is delivered. a. True b. False 11. Adaptation criteria are used to determine the a. costs of product maintenance b. adjustments to the project schedule c. best project type classification for a software process d. recommended degree of rigor for software process 12. A task selector value is most appropriately used to determine whether to accept or reject a given task for inclusion in the project task set. a. True b. False 13. If the task selector value is in an overlap area it may be OK to choose a less formal degree of rigor for project with low risk levels. a. True b. False 14. For purposes of determining the major engineering tasks and distributing them on the project time line, the project manager should assume that the process model used is a. linear sequential b. iterative c. evolutionary d. any of the above 15. The only means in accomplishing task refinement is to make use of a process design language approach. a. True b. False 16. The task (activity) network is a useful mechanism for a. computing the overall effort estimate b. detecting inter-task dependencies c. specifying the task set to the customer d. none of the above 17. Two tools for computing critical path and project completion times from activity networks are a. CPM and PERT b. DRE and SQA c. FP and LOC d. ASD and BSD 18. Timeline charts assist project managers in determining what tasks will be conducted at a given point in time. a. True b. False
Page 18 of 77 Compiled By: rkavirayani@yahoo.com
19. The best indicator of progress on a software project is the completion a. of a defined engineering activity task b. of a successful budget review meeting on time c. and successful review of a defined software work product d. and successful acceptance of project prototype by the customer 20. The purpose of earned value analysis is to a. determine how to compensate developers based on their productivity b. provide a quantitative means of assessing software project progress c. provide a qualitative means of assessing software project progress d. set the price point for a software product based on development effort 21. Error tracking provides a quantitative means of assessing the quality of the individuals implementing a software product. a. True b. False 22. The software plan is not a static document, it is frequently adjusted to make the project appear on track to meet all deadlines and quality targets. a. True b. False
d. serve as the sole test team for any software produced 10. The purpose of software reviews is to uncover errors and defects in work products so they can be removed before moving on to the next phase of development. a. True b. False 11. In general the earlier a software defect is discovered and corrected the less costly to the overall project budget. a. True b. False 12. Defect amplification models can be used to illustrate the costs associated with using software from its initial deployment to its retirement. a. True b. False 13. Which of the following are objectives for formal technical reviews? a. allow senior staff members to correct errors b. assess programmer productivity c. par determining who introduced an error into a program d. uncover errors in software work products 14. At the end of a formal technical review all attendees can decide to a. accept the work product without modification b. modify the work product without further review c. reject the product due to severe errors d. all of the above 15. A review summary report answers which three questions? a. terminate project, replace producer, request a time extension b. what defects were found, what caused defects, who was responsible c. what was reviewed, who reviewed it, what were the findings d. none of the above 16. In any type of technical review, the focus of the review is on the product and not the producer. a. True b. False 17. Statistical quality assurance involves a. using sampling in place of exhaustive testing of software b. surveying customers to find out their opinions about product quality c. tracing each defect to its underlying cause, isolating the"vital few" causes, and moving to correct them d. tracing each defect to its underlying causes and using the Pareto principle to correct each problem found 18. Software reliability problems can almost always be traced to a. errors in requirements gathering b. errors in design and implementation c. human error
Page 21 of 77 Compiled By: rkavirayani@yahoo.com
d. errors in operation 19. Software safety is a quality assurance activity that focuses on hazards that a. affect the reliability of a software component b. may cause an entire system to fail c. may result from user input errors d. prevent profitable marketing of the final product 20. Poka-yoke devices are mechanisms that lead to the a. creation of quality processes with minimal resources b. determining causes of software defects c. prevention of potential quality problems d. none of the above 21. The ISO quality assurance standard that applies to software engineering is a. ISO 9000 b. ISO 9001 c. ISO 9002 d. ISO 9003 22. Which of the following is not a section in the standard for SQA plans recommended by IEEE? a. budget b. documentation c. reviews and audits d. test
10. Change control is not necessary if a development group is making use of an automated project database tool. a. True b. False 11. The check-in and check-out process helps with which element of change control? a. budget control b. object control c. synchronization control d. version control 12. Every customer change request is transformed into an engineering change order, regardless of its impact on the project. a. True b. False 13. Configuration audits are needed even if you make use of formal technical reviews as part of your software engineering process. a. True b. False 14. When software configuration management is a formal activity the software configuration audit is conducted by the a. development team b. quality assurance group c. senior managers d. testing specialists 15. The primary purpose of configuration status reporting is to a. allow revision of project schedule and cost estimates by project managers b. evaluate the performance of software developers and organizations c. make sure that change information is communicated to all affected parties d. none of the above
10. What makes requirements elicitation difficult? a. bounding scope b. understanding user needs c. requirements volatility d. all of the above 11. It is not possible to consider overall feasibility until the detailed requirements have been elicited from the customer. a. True b. False 12. It is relatively common for different customers to propose conflicting requirements, each arguing that his or her version is the right one. a. True b. False 13. The system specification describes the a. function and behavior of a computer-based system b. implementation of each allocated system element c. algorithmic detail and data structures d. time required for system simulation 14. System models are built to allow the system engineer to evaluate the system components in relationship to one another, a. True b. False 15. The best way to conduct a requirements validation review is to a. examine the system model for errors b. have the customer look over the requirements c. send them to the design team and see if they have any concerns d. use a checklist of questions to examine each requirement 16. The use of traceability tables helps to a. debug programs following the detection of run-time errors b. determine the performance of algorithm implementations c. identify, control, and track requirements changes d. none of the above 17. The top level of the hierarchical model of a system is known as the a. AFD b. DFD c. SCD d. SFD 18. The system model template contains which of the following elements a. input c. user interface b. output d. all of the above
b. False 10. Information content represents the individual data and control objects that comprise the information that is a. necessary to lay out all output. b. required for error handling. c. demanded for operating system interfacing. d. transformed by the software. 11. Information flow represents the manner in which data and control a. are related to one another. b. changeas each moves through the system. c. will be implemented in the final design. d. none of the above. 12. Information structure represents the internal organization of the a. data structures used to represent data types. b. project staffing model. c. project communications model. d. various data and control items. 13. What types of models are created during software requirements analysis? a. functional and behavioral b. algorithmic and data structure c. architectural and structural d. usability and reliability 14. In the context of requirements analysis, two types of problem partitioning are a. bottom-up and top-down b. horizontal and vertical c. subordinate and superordinate d. none of the above 15. In the context of requirements analysis, partitioning results in the elaboration of data, function, or behavior. a. True b. False 16. Which view should be consider first during software requirements analysis? a. actor view b. data view c. essential view d. implementation view 17. Evolutionary prototyping is generally preferred to throw away prototyping because it a. allows reuse of the initial prototype. b. does not require as much customer involvement. c. is easier to quickly. d. is more reliable.
18. For software prototyping to be effective technique, tools are required to develop prototypes rapidly to keep the schedule on track. a. True b. False 19. Which of the following is not a principle that should be followed when creating a specification? a. create a cognitive model rather than a design model b. make sure the specification dots every "i" and crosses every "t" c. recognize that the specification must be augmentable d. separate functionality from implementation 20. Which of the following is not a guideline for representing requirements? a. diagrams should be restricted in number and consistent in use b. representation format and content should be relevant to the content c. representations should be revisable d. use no more than 7 plus or minus 2 colors in any diagrams 21. Once the software requirements specification document is approved by both the customer and developer it becomes an unchangeable baseline document. a. True b. False
9. The data flow diagram must be augmented by descriptive text in order to describe the functional requirements for a software product. a. True b. False 10. It is not possible to use ordinary data flow diagrams to model the functional requirements of real-time systems. a. True b. False 11. The Ward-Mellor extensions to data flow diagrams use a. dashed lines to show control flow b. double headed arrows for time-continuous flow c. boldline to represent real-time operations d. solid bars as windows into the CSPEC 12. Control flow diagrams use a. dashed lines to show control flow b. solid bars as windows into the CSPEC c. answers a and b d. single headed arrows for discrete data flow 13. For purposes of behavior modeling a state is any a. consumer or producer of data. b. data object hierarchy. c. observable mode of behavior. d. well defined process. 14. The states shown in a state transition diagram do not necessarily correspond to the processes shown in a control flow diagram for the same system. a. True b. False 15. Performing a grammatical parse of the processing narrative is the good first step to take in producing a(n) a. data dictionary b. data flow diagram c. entity relationship diagram d. state transition diagram 16. Control flow diagrams are a. needed to model event driven systems. b. required for all systems. c. used in place of data flow diagrams. d. useful for modeling user interfaces 17. The process specification used to describe all flow processes that appear in the final DFD must be written using a program design language. a. True b. False
18. The data dictionary contains descriptions of each software a. configuration item b. data object c. diagram d. notation 19. The process activation table (PAT) provides a process view of the information contained in a state transition diagram (STD). a. True b. False
9. Which of these model types does not represent a software architecture? a. data b. dynamic c. process d. structural 10. The control hierarchy represents the a. decision order b. organization of modules c. repetition of operations d. sequence of processes 11. Horizontal partitioning defines separate branches for major program functions, while vertical partitioning distributes control in a top-down manner. a. True b. False 12. Data structure design takes less time than algorithm design, so it may be saved for last. a. True b. False 13. Software procedure focuses on the a. control hierarchy in a more abstract sense. b. processing details of each module individually. c. processing details of each the set of modules collectively. d. relationship between control and procedure. 14. Information hiding makes program maintenance easier by hiding data and procedure from unaffected parts of the program. a. True b. False 15. To achieve high modularity of software components you need a. high coupling and high cohesion b. high coupling and low cohesion c. low coupling and high cohesion d. low coupling and low cohesion 16. Cohesion is a qualitative indication of the degree to which a module a. can be written more compactly. b. focuses on just one thing. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world. 17. Coupling is a qualitative indication of the degree to which a module a. can be written more compactly. b. focuses on just one thing. c. is able to complete its function in a timely manner. d. is connected to other modules and the outside world.
18. Design heuristics are typically only used by students and not needed by experienced software engineers. a. True b. False 19. The reason it is a mistake to do component level design before data design is that a. component design is language dependent and data design is not. b. data design is easier to do. c. data design is hard to do. d. the structure of the data usually affects the way in which component-level design is conducted. 20. The purpose of the requirements cross reference (matrix) in the design document is to a. allow managers to monitor the productivity of the design team. b. establish that all requirements are accounted for by the design. c. indicate costs associated with each requirement d. provide implementers with the names of designers for each requirement.
10. Quantitative methods for assessing the quality of proposed architectural designs are readily available. a. True b. False 11. A useful technique for evaluating the overall complexity of a proposed architecture is to look at the component a. number and size of components b. flow dependencies and sharing dependencies c. size and cost d. none of the above 12. When the overall flow in a segment of a data flow diagram is largely sequential and follows straightline paths _________ is present. a. low coupling b. good modularity c. transaction flow d. transform flow 13. When the information flow in a segment of a data flow diagram is characterized by a single item that triggers other data flow along one of many paths _________ is present. a. high coupling b. poor modularity c. transaction flow d. transform flow 14. When refining the DFD during transform mapping the goal is to strive to derive bubbles showing high cohesion. a. True b. False 15. When you encounter both transform flow and transaction flow in the same DFD the flow is partitioned and the appropriate mapping technique is used on each part of the DFD. a. True b. False 16. In refining the DFD during transaction mapping it is unnecessary to create a PSPEC since only the CSPEC is relevant to this type of architectural style. a. True b. False 17. In transaction mapping the first level factoring results in the a. creation of a CFD b. derivation of the control hierarchy c. distribution of worker modules d. refinement of the module view 18. A necessary supplement to transform or transaction mapping needed to create a complete architectural design is a. entity relationship diagrams b. the data dictionary c. processing narratives for each module
Page 37 of 77 Compiled By: rkavirayani@yahoo.com
9. Which of these framework activities is not normally associated with the user interface design processes? a. cost estimation b. interface construction c. interface validation d. user and task analysis 10. Which approach to user task analysis can be useful in user interface design? a. have users indicate their preferences on questionnaires b. rely on the judgement of experienced programmers c. study related automated systems d. observe users performing tasks manually 11. Object-oriented analysis techniques can be used to identify and refine user task objects and actions. a. True b. False 12. The computer's display capabilities are the primary determinant of the order in which user interface design activities are completed. a. True b. False 13. One means of defining user interface objects and actions is to conduct a grammatical parse of the user scenario. a. True b. False 14. The following common design issues surface for almost every user interface: a. adaptive user profiles and functional shortcuts b. error handling and system response time c. resolution of graphics displays and design of icons d. none of the above 15. Add-on help facilities are almost always better received by users than integrated help facilities. a. True b. False 16. User interface development systems typically provide the following mechanism for building interface prototypes including a. code generation b. drawing tools c. input validation d. all of the above 17. Usability questionnaires are most meaningful to the interface designers when completed by a. customers b. experienced programmers c. product users d. project managers
18. Several usability measures can be collected while observing users interacting with a computer system including a. down time for the application b. number of software defects c. software reliability d. time spent looking at help materials
9. The cyclomatic complexity metric provides the designer with information regarding the number of a. cycles in the program b. errors in the program c. independent logic paths in the program d. statements in the program 10. The cyclomatic complexity of a program can be computed directly from a PDL representation of an algorithm without drawing a program flow graph. a. True b. False 11. Condition testing is a control structure testing technique where the criteria used to design test cases is that they a. rely on basis path testing b. exercise the logical conditions in a program module c. select test paths based on the locations and uses of variables d. focus on testing the validity of loop constructs 12. Data flow testing is a control structure testing technique where the criteria used to design test cases is that they a. rely on basis path testing b. exercise the logical conditions in a program module c. select test paths based on the locations and uses of variables d. focus on testing the validity of loop constructs 13. Loop testing is a control structure testing technique where the criteria is used to design test cases so that they a. rely basis path testing b. exercise the logical conditions in a program module c. select test paths based on the locations and uses of variables d. focus on testing the validity of loop constructs 14. Black-box testing attempts to find errors in which of the following categories a. incorrect or missing functions b. interface errors c. performance errors d. all of the above 15. Graph-based testing methods can only be used for object-oriented systems a. True b. False 16. Equivalence testing divides the input domain into classes of data from which test cases can be derived to reduce the total number of test cases that must be developed. a. True b. False 17. Boundary value analysis can only be used during white-box testing. a. True b. False
18. Comparison testing is typically done to test two competing products as part of customer market analysis prior to product release. a. True b. False 19. Orthogonal array testing enables the test designer to maximize the coverage of the test cases devised for relatively small input domains. a. True b. False 20. Real-time applications add a new and potentially difficult element to the testing mix a. performance b. reliability c. security d. time
9. Bottom-up integration testing has as it's major advantage(s) that a. major decision points are tested early b. no drivers need to be written c. no stubs need to be written d. regression testing is not required 10. Regression testing should be a normal part of integration testing because as a new module is added to the system new a. control logic and data flow paths are invoked b. memory size increases c. drivers require testing d. a and b 11. Smoke testing might best be described as a. bulletproofing shrink-wrapped software b. rolling integration testing c. testing that hides implementation errors d. unit testing for small programs 12. Sandwich testing involves the use of a. bottom-up testing for subordinate modules b. schedule compression techniques to reduce testing time c. testing within tight data boundaries d. two competitive test teams 13. Which test criteria should be applied in a phase of testing? a. functional validity b. interface integrity c. correctness d. all of the above 14. The focus of validation testing is to uncover places that users will be able to observe failure of the software to conform to its requirements. a. True b. False 15. Configuration reviews are not needed if regression testing has been rigorously applied during software integration. a. True b. False 16. Acceptance tests are normally conducted by the a. developer b. end users c. test team d. systems engineers 17. Recovery testing is a system test that forces the software to fail in a variety of ways and verifies that software is able to continue execution without interruption. a. True b. False
Page 46 of 77 Compiled By: rkavirayani@yahoo.com
18. Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration. a. True b. False 19. Stress testing examines the pressures placed on the user during system use in extreme environments. a. True b. False 20. Performance testing is only important for real-time or embedded systems. a. True b. False 21. Debugging is not testing, but always occurs as a consequence of testing. a. True b. False 22. Which of the following is an approach to debugging? a. backtracking b. brute force c. cause elimination d. all of the above
b. feedback c. measurement d. quantification 9. One of the most important attributes for a technical software metric is that it should be a. easy to compute b. qualitative in nature c. reliable over time d. widely applicable 10. The function point metric is an example of project metric that can be used to assist with technical decision-making based on the analysis model information, without making use of historical project data. a. True b. False 11. The computation of DeMarco's bang metric requires the developer to distinguish between functionstrong and data-strong applications. a. True b. False 12. Which two characteristics of the software requirementsare the specification metrics proposed by the Davis address? a. functionality and performance b. performance and completeness c. specificity and completeness d. specificity and functionality 13. Architectural design metrics focus on a. architectural structure b. data structural relationships c. internal module complexity d. module complexity 14. Component-level metrics include measures of a. complexity b. coupling c. module cohesion d. all of the above 15. Interface metrics are used to assess the complexity of the module's input and output relationships with external devices. a. True b. False 16. Halstead's source code metrics are based on the number of a. modules in the program b. operators and operands in the program c. number of Boolean conditions in the program d. volume elements in the program 17. Technical testing metrics fall into which broad category(s)
Page 49 of 77 Compiled By: rkavirayani@yahoo.com
a. metrics that focus on defect removal effectiveness b. metrics that focus on test coverage c. metrics that predict the number of test cases required d. answers b and c 18. The IEEE software maturity index is used to provide a measure of the a. maintainability of a software product based on its availability b. relative age of a software product being considered for retirement c. reliability of a software product following regression testing d. stability of a software product as it is modified during maintenance
10. Which of the following should be considered as candidate objects in a problem space? a. events b. people c. structures d. all of the above 11. Attributes are chosen for an object by examining the data dictionary and identifying the entities that appear to be related. a. True b. False 12. Which of the following is not one of the broad categories used to classify operations? a. computation b. data manipulation c. event monitors d. transformers 13. Consideration of an object's life history and messages passed among system objects may suggest additional operations that need to be added to an object definition. a. True b. False 14. Object-oriented projects require less management planning and oversight effort than conventional software projects. a. True b. False 15. The common process framework suggested for object-oriented software development consists of a(n) a. analysis part and a design part. b. recursive part and an iterative part c. recursive part and a parallel part d. quality process and a software reuse part 16. Because an overriding goal for object-oriented projects should be reuse, LOC estimates are good project metrics. a. True b. False 17. Two metrics that may be useful in scheduling object-oriented projects are a. number of key classes and number of support classes b. number of major iterations and number of completed contracts c. number of scenario scripts and number of subsystems d. all of the above 18. Which of the following may be considered a major milestone during an object-oriented software development project? a. object-oriented analysis completed b. object-oriented design completed c. object-oriented programming completed d. all of the above
Page 52 of 77 Compiled By: rkavirayani@yahoo.com
d. provide a description of end-user and system interaction 9. Which of the following items does not appear on a CRC card? a. class collaborators b. class name c. class reliability d. class responsibilities 10. Class responsibilities are defined by a. its attributes only b. its collaborators c. its operations only d. both its attributes and operations 11. Which of these is not a generic relationship that helps an analyst define potential class collaborators? a. comes-before b. depends-upon c. has-knowledge-of d. is-part-of 12. To review a complete CRC model the reviewers only need to walk through one or two representative use-cases. a. True b. False 13. Once the classes and objects have been identified using the CRC model the analyst should focus on the structure and hierarchy of the class model. a. True b. False 14. When a group of classes collaborate among themselves to accomplish a cohesive set of responsibilities they are referred to as a(n) a. collaboratory b. object hierarchy c. package d. subclass unit 15. The CRC model defines the relationships between the objects, but unlike the object-relationship model it does not specify the a. cardinality of the relationships b. collaboration among the classes c. direction of the relationships d. number of relationships 16. The object-behavior model indicates how the system a. functions in the operating environment b. objects collaborate with one another c. responds to external stimuli d. responds to internal stimuli 17. Events occur whenever a(n) a. actor and the OO system exchange information b. class operation is invoked
Page 54 of 77 Compiled By: rkavirayani@yahoo.com
c. messages are passed between objects d. all of the above 18. The passive state of an object is a. only observable from outside the system b. simply the current status of all its attributes c. the resting behavior of the class d. none of the above 19. An state transition can only occur when triggered by a(n) a. actor b. collaboration attempt c. event d. none of the above
9. User interfaces are frequently built from toolkits containing reusable classes so that the implementer only needs to instantiate objects appropriate to problem domain. a. True b. False 10. Which of these areas is considered part of the data management component of OOD system design? a. creation of an infrastructure for object storage and retrieval b. management of data critical to the application c. normalization of the class data attributes d. both a and b 11. A guardian object a. controls access to a resource and moderates conflicting requests for it b. is a multimedia database object c. provides security to a networked or web-based system d. none of the above 12. Every contract between subsystems is manifested by exactly one message that moves between an object in each subsystem. a. True b. False 13. The design description of an object can take one of two forms a. object template or pseudocode b. operator sequences or attribute graphs c. protocol description or object description d. subsystem collaboration graph or protocol graph 14. In OOD operations are refined by a. isolating new operations at lower abstraction levels b. performing a grammatical parse c. writing a processing narrative d. all of the above 15. Design patterns are not applicable to the design of object-oriented sofware? a. True b. False 16. Two design patterns that can be used in object-oriented systems are a. inheritance and composition b. inheritance and reuse c. polymorphism and composition d. polymorphism and reuse 17. Object-oriented designs do not need to be implemented using object-oriented programming techniques. a. True b. False
9. Encapsulation of attributes and operations inside objects makes it easy to obtain object state information during testing. a. True b. False 10. Use-cases can provide useful input into the design of black-box and state-based tests of OO software. a. True b. False 11. Fault-based testing is best reserved for a. conventional software testing b. operations and classes that are critical or suspect c. use-case validation d. white-box testing of operator algorithms 12. Testing OO class operations is made more difficult by a. encapsulation b. inheritance c. polymorphism d. both b and c 13. It is not necessary to test operators inherited by other objects. a. True b. False 14. Scenario-based testing a. concentrates on actor and software interaction b. misses errors in specifications c. misses errors in subsystem interactions d. both a and b 15. Deep structure testing is not designed to a. object behaviors b. communication mechanisms c. exercise object dependencies d. exercise structure observable by the user 16. Random order tests are conducted to exercise different class instance life histories. a. True b. False 17. Which of these techniques is not useful for partition testing at the class level a. attribute-based partitioning b. category-based partitioning c. equivalence class partitioning d. state-based partitioning 18. Multiple class testing is too complex to be tested using random test cases. a. True b. False 19. Test derived from behavioral class models should be based on the
Page 59 of 77 Compiled By: rkavirayani@yahoo.com
a. data flow diagram b. object-relation diagram c. state transition diagram d. use-case diagram
9. The depth of inheritance tree (DIT) metric can give an OO software designer a reading on the a. attributes required for each class b. completion time required for system implementation c. complexity of the class hierarchy d. level of object reusability achieved 10. For OO software it is important to keep class coupling low and operation cohesion high. a. True b. False 11. If you encounter a class with a large responsibility (large class size or CS value) you should consider a. making it a base class b. making it a subclass c. partitioning the class d. starting a new class hierarchy 12. Because the class is the dominant unit in OO systems there is no call for the definition of classoriented metrics. a. True b. False 13. OO design metrics provide an indication of design quality and also provide a general indication of the amount of testing effort required for the OO system. a. True b. False 14. OO testing metrics can help you in targeting suspect a. clusters b. scenarios c. threads d. all of the above 15. OO project metrics may be combined with historical project data to compute a. design metrics b. process metrics c. productivity metrics d. testing metrics 16. Which of the following metrics can provide the software planner with insight into software size? a. number of key classes b. number of scenario scripts c. number of subsystems d. all of the above
9. Constructive set specification is preferable to enumeration because it a. allows succinct definition of large sets b. only works for software products c. uses mathematical notation d. all of the above 10. Knowledge of _______ is indispensable if a software engineer intends to make use of formal methods. a. calculus b. differential equations c. set operations d. statistical methods 11. Universal quantification is a way of making a statement about a. all the elements of a set b. particular elements of a set c. quality of an operations input set d. use of metrics in the design process 12. Which of the following is not an operator that may be applied to sequences? a. head b. front c. rear d. tail 13. A common notational convention in many formal methods is to write the variable with a prime in the postcondition for an operator. a. True b. False 14. Which of these are components of a formal specification language? a. semantics that defines the objects used to describe system b. set of relations defining the object rules c. syntax that defining the notation d. all of the above 15. Using formal methods eliminates the need to write natural language commentary in the specification document. a. True b. False 16. Using formal methods absolves a software engineer from having to test any of the library components used in a software design. a. True b. False 17. Formal specification techniques are not widely used in industry yet. a. True b. False
Page 63 of 77 Compiled By: rkavirayani@yahoo.com
a. black box b. clear box c. state box d. white box 9. In cleanroom software engineering the structured programming approach is used to a. refine data design b. refine function design c. refine usage test cases d. both a and b 10. To prove a design correct you must identify all conditions and then prove a random statistical sample of these conditions are correct. a. True b. False 11. By using only structured programming constructs as you create a procedural design, you make the work of proving design correctness much easier. a. True b. False 12. Which of the following is not an advantage of using rigorous correctness verification of each refinement of the clear box design. a. improves performance of code b. produces better code than unit testing c. reduces verification effort d. results in near zero defect levels 13. Statistical use testing relies on probability distributions based on a. mixture of control structures used in the program b. order in which the module execute c. the way software will actually be used d. user interface design standards 14. Certification of an increment is complete once it has passed the formal verification process. a. True b. False 15. Which of the following models is part of the clean room certification process? a. component model b. sampling model c. both a and b d. none of the above
b. control mechanism c. user interface d. all of the above 9. Which of the following factors would not be considered during component qualification? a. application programming interface (API) b. development and integration tools required c. exception handling d. testing equipment required 10. Which of the following is not a technique used for component wrapping? a. black-box wrapping b. clear-box wrapping c. gray-box wrapping d. white-box wrapping 11. Which of the following should be part of an infrastructure for effective component integration? a. automation b. data exchange model c. underlying object model d. all of the above 12. Which of the following is not one of the issues that form a basis for design for reuse? a. object-oriented programming b. program templates c. standard data d. standard interface protocols 13. Which of the following is not one of the classification schemes used for software components? a. attribute-value classification b. domain classification c. enumerated classification d. faceted classification 14. In a reuse environment, library queries are often characterized using the ________ element of the 3C Model. a. concept b. content c. context d. all of the above 15. Which of the following is not improved by the effective use of CBSE? a. cost b. performance c. productivity d. quality 16. The effort required to qualify, adapt, and integrate structure points into new systems must be based on historical data collected for qualification, adaptation, and integration of these reusable components in other applications. a. True b. False
Page 67 of 77 Compiled By: rkavirayani@yahoo.com
17. It is impossible to develop effective metrics for software reuse. a. True b. False
b. False 9. The design approach used for C/S systems rarely requires modification to accommodate the hardware architecture. a. True b. False 10. To accommodate the differences between COTS components supplied by several vendors and inhouse components, the ORB architecture must be designed to a. achieve interoperability among components b. eliminate incompatible components from the system c. function only with in-house components d. replace the functionality of incompatible components 11. In the C/S context an elementary business process can be defined as a set of tasks performed fully by one user at a client site. a. True b. False 12. In the design repository a business object is defined as a. client information b. information visible to system developers c. information visible to system users d. server information 13. Which of the following techniques may be used for data distribution and management in C/S systems? a. fragmentation b. replication c. snapshot d. all of the above 14. Which symbol would not be found in the structure chart for an elementary business process? a. application object b. cardinality link c. control couple d. database object 15. Which entities do not reside in the design repository? a. business rule/component links b. components c. methods d. none of the above 16. With the exception of integration testing, C/S systems pose no new testing concerns for software engineers. a. True b. False 17. Which of the following testing approaches is commonly used to test C/S systems? a. database tests b. transaction testing c. network communication testing d. all of the above
Page 69 of 77 Compiled By: rkavirayani@yahoo.com
18. The tactics used in object-oriented testing are useless for testing a C/S system that has been implemented using an imperative programming language. a. True b. False
8. Which type of analysis is not conducted during the WebE process? a. content analysis b. functional analysis c. interaction analysis d. market analysis 9. Which technical elements should a web engineer try to reuse during web-based design? a. design methods b. design patterns c. templates d. all of the above 10. Which of the following is not one of the architectural structures used by web engineers in architectural design? a. linear b. grid c. hierarchical d. parallel 11. Which of the following is a design pattern used during web-based design? a. cycle b. counterpoint c. sieve d. all of the above 12. Web navigational design involves creating a semantic navigational unit for each goal associated with each defined user role. a. True b. False 13. Interface design for WebApps is identical to interface design for any other piece of interactive software. a. True b. False 14. Because WebApps are constantly evolving, testing is an on-going activity conducted by support staff using regression testing techniques. a. True b. False 15. Unit testing and integration testing are not needed when testing WebApps. a. True b. False 16. Which of these roles is not usually assigned to members of the WebE team? a. content developer b. marketing specialist c. web master d. web publisher 17. Although outsourcing WebApp development is common practice, it is important to perform thorough analysis of the application and even create a rough design internally before selecting a vendor. a. True b. False
18. Which of these issues require special consideration when considering tactics for WebApp configuration management? a. content b. politics c. scalability d. all of the above
1. Which of the following is not an example of a business process? a. designing a new product b. hiring an employee c. purchasing services d. testing software 2. Which of the following is not a principle that should guide business process reengineering? a. capture data at each source b. fully redocument legacy processes c. organize around outcomes d. put decision point where work is performed 3. Business process reengineering has no start or end, it is an evolutionary process. a. True b. False 4. Business process reengineering is just another silver bullet fad with no real benefits to anyone. a. True b. False 5. How much of software maintenance work involves fixing errors? a. 20 percent b. 40 percent c. 60 percent d. 80 percent 6. Which of the following activities is not part of the software reengineering process model? a. forward engineering b. inventory analysis c. prototyping d. reverse engineering 7. The software reengineering process model includes restructuring activities for which of the following work items? a. code b. documentation c. data d. all of the above 8. Which of the following is not an issue to consider when reverse engineering? a. abstraction level b. completeness
Page 72 of 77 Compiled By: rkavirayani@yahoo.com
c. connectivity d. directionality
9. The first reverse engineering activity involves seeking to understand a. data b. processing c. user interfaces d. none of the above 10. Reverse engineering of data focuses on a. database structures b. internal data structures c. both a and b d. none of the above 11. Reverse engineering should precede the reengineering of any user interface. a. True b. False 12. Which of these benefits can be achieved when software is restructured? a. higher quality programs b. reduced maintenance effort c. software easier to test d. all of the above 13. Code restructuring is a good example of software reengineering. a. True b. False 14. Which of these is not an example of data redesign? a. data analysis b. data name rationalization c. data record standardization d. none of the above 15. Forward engineering is not necessary if an existing software product is producing the correct output. a. True b. False 16. Reengineering client/server systems begins with a thorough analysis of the business environment that encompasses the existing computing system. a. True b. False 17. The only time reengineering enters into work with a legacy system is when its components will be implemented as objects. a. True b. False 18. Which of these activities would not be part of a process model for reengineering a user interface? a. correct ergonomic failings of the interface b. measure the interface performance in the marketplace c. remodel the interface behavior
Page 73 of 77 Compiled By: rkavirayani@yahoo.com
d. understanding the original interface 19. The cost benefits derived from reengineering are realized largely due to decreased maintenance and support costs for the new software product. a. True b. False
a. component-based design b. database technology c. object-oriented software engineering d. structured design 9. Which of the following is not one of the layers in the architectural model for the CASE integration framework? a. object management b. portability c. shared repository d. user interface 10. The primary purpose of the object management layer in the CASE integration framework is to a. allow the use of component-base software engineering b. perform configuration management c. support object-oriented design d. none of the above 11. The integrated CASE repository is a database that acts as the center for accumulation and storage of software engineering information. a. True b. False 12. Which of the following would not be one of the functions performed by the integrated CASE repository? a. data integrity b. document standardization c. information sharing d. project scheduling 13. Which database management technology is used to support today's CASE repositories? a. hierarchical b. object-oriented c. relational d. both b and c 14. Which of these integrated CASE repository features is not commonly found in commercial database management systems? a. integrity enforcement b. process/project management capability c. storage of sophisticated data structures d. all of the above 15. One of the most important features of the CASE repository is its ability to a. print document automatically b. test software products as they are accessed c. track daily code production by individual programmers d. track relationships among configuration objects
9. It is likely that hardware will continue to serve as the technology driver in computing for the next 30 years. a. True b. False