Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Software Engineering Multiple choice questions:

1. You are auditing current customer practices potentially amenable to software application(s). Which two should be part of the audit? (Choose two.)

A. identification of current logical system(s)

B. identification of current virtual system(s)

C. identification of current physical system(s)

D. identification of current corporate strategies

2. What are three parts of a feasibility analysis? (Choose three.)

A. legal feasibility

B. political feasibility

C. technical feasibility

D. economic feasibility

E. environmental feasibility

3. Project schedules are often based on programmer productivity on past projects as measured in terms of size unit per time unit (such as lines of code per day). Which two must be considered when developing project schedules using this approach? (Choose two.)

A. time schedule

B. similarity of projects

C. expertise of programmers

D. complexity of programming language

4. Which two factors must be considered when developing acceptance criteria? (Choose three.)

A. user availability

B. match with requirements

C. ability to benchmark system

D. schedule of system delivery

5. Which two are included in the software requirements specification? (Choose two.)

A. error handling

B. data description

C. functional description

D. performance description

E. maintainability description

6. A corporation uses formal methods for requirements specification because they believe that it guarantees that the customer's needs will be met by the new software application. Which statement about this corporation's belief is true?

A. Formal methods do provide this guarantee because they are safer to use.

B. Formal methods do not provide this guarantee because they are not testable.

C. Formal methods do provide this guarantee because they are based on mathematical techniques for which proof systems exist.

D. Formal methods do not provide this guarantee because they are difficult to communicate accurately to the user.

7. A data dictionary was created during the requirements analysis phase of a software engineering project. What information does it contain? (Choose three.)

A. interface

B. data type

C. restrictions

D. content description

8. What is configuration management in software engineering?

A. overall management of the design of the system

B. management of the configurable components in a system

C. the identification of the configuration of a system at discreet points in time to control changes to the configuration

D. in object-oriented programming, the management of objects that control the configuration of some other function(s) in the system

9. Which statement about the preliminary design stage of a software development project is true?

A. The preliminary design is an internal document used only by programmers.

B. The preliminary design is the result of mapping product requirements into software and hardware functions.

C. The preliminary design of the product comes from the initial meetings between the customer and the programmer.

D. The developers produce the preliminary design by defining the software structure in enough detail to permit coding.

10. What is functional decomposition in software system design?

A. a design method that breaks a system into smaller units

B. a requirements analysis method that breaks the system into cohesive and related units

C. a design methodology that uses modular prototypes to build the complete system

D. the ability to upgrade the features of a particular module of a system with minimal impact on other modules

11. A software project classifies system entities, their activities and relationships. The classification and abstraction of system entities is important.

Which modeling methodology most clearly shows the classification and abstraction of entities in the system?

A. data flow model

B. event driven model

C. object oriented model

D. entity-relationship model

12. Which three non-functional system requirements are affected by system architecture? (Choose three.)

A. cost

B. security

C. usability

D. performance

E. maintainability

13. Which statement about a prototype is true?

A. It is a functional model of the entire system.

B. It is the complete untested product ready for final review by the customer.

C. It is necessary in order to accurately verify that the product is progressing in accordance with requirements specifications.

D. It is a full-scale model of the entire system at some partial stage in development showing the functional form of the system.

14. What is usability in software engineering?

A. the ability of the end user to use the product successfully

B. a measure of the relative effort required to learn how to use a software product

C. the degree to which the product integrates with the environment in which it is used

D. a metric that describes the degree to which a software product meets its requirements

15. What is the purpose of a test case specification in software engineering?

A. to specify the sequence of actions for the execution of a test

B. to specify inputs, predicted results, and a set of execution conditions for a test item

C. to list the test procedures to be performed on the integration of the software with hardware

D. to list the specific tests to be conducted on the integration of each software module with other modules

16. n/a

17. Which four types of testing are a part of system testing? (Choose four.)

A. stress testing

B. function testing

C. recovery testing

D. white box testing

E. incremental testing

F. performance testing

18. When should the system testing phase begin?

A. after beta testing

B. before unit testing

C. after white box testing

D. before functional testing

E. after user acceptance testing

F. before user acceptance testing

19. In the software testing process, when is validation testing performed?

A. after coding

B. after unit testing

C. after module testing

D. after integration testing

20. What are three reasons why performance testing is not adequately performed? (Choose three.)

A. Users are unable to project how the new system will be used in terms of files sizes, transaction sizes, peak periods, etc.

B. Vendors are unable to assume the risk of guaranteeing performance when the user is unable to quantify system performance parameters.

C. Users rely on vendor performance formulas and statistics based on an average company, not their company.

D. Vendors are unwilling to assume the risk of having hidden bugs in their code cause the test to fail.

21. You monitoring the number of change requests submitted by customers to determine if the software meets the needs of the customers. When a change request is received, the customer is kept involved in the redesign process in order to reduce the number of change requests received in the future. In some cases, the number of change requests is reduced; in other cases, it is increased.

What are three explanations for this apparent discrepancy? (Choose three.)

A. The software does not do what customers want it to do and more requests are generated.

B. The software has increased market share to the point that it has saturated the market.

C. The software is very good, and widely used; more requests are a natural result.

D. The company is responsive to customers' requests and customers know their requests are taken seriously.

E. The software is seriously flawed but customers continue to use it because its interface is very similar to other products on the market in the same price range.

22. A system upgrade typically encompasses changes or enhancements to which three? (Choose three.)

A. allocation of functions among system resources

B. operating system on which the software runs

C. functional characteristics of individual components

D. type of hardware upon which the system is required to reside

E. logical structure of the system (interrelationship of components)

23. Software _____ is work done to enhance software functionality, correct errors and improve the performance of software.

A.  re-design

B. maintenance

C. corrections

D. re-engineering

24. How is an application's "version" different from its "release"?

A. A release is a small change to an earlier release.

B. A version is a small change made to an earlier version.

C. A version is the one made available to customers and a release is a change to a previous version.

D. A release is the one made available to customers and a version is a change to a previous release.

25. Which two steps are part of a typical post-implementation review? (Choose two.)

A. briefly describe the general impact of the system on the managers, users, and customers

B. outline the traceability matrix mapping requirements to function points to test cases to test results

C. generate an architectural baseline from which to measure risk, success factors, and customer satisfaction

D. describe the primary project management methodology and systems development methodology used to develop the system

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M91616946
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Software Engineering

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

Write review on this article with apa formatalthough

Write review on this article with APA format. Although computer crimes are being seen in our society more and more each day, it is still difficult to prosecute people who commit these crimes mainly because everything is ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Assignment lab - statement of workclient liberty vacation

Assignment Lab - Statement of Work Client: Liberty Vacation Planning Inc. (LVP) Project: Website Assessment 1. Project Objectives With this statement of work, LVP is engaging you to conduct a website assessment to determ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As