1.the criticality of the performance and reusability of the code.
2.number of lines of code in the software.
3.number of technical manpower and hardware costs.
4.time period available and the level of user friendliness.
The Function Point (FP) metric is:
1.Calculated from user requirements
2. Calculated from Lines of code
3.Calculated from software’s complexity assessment
4.None of the above
Which of the following types of maintenance takes the maximum chunk of the total Maintenance effort in a typical commercial application environment?
A desirable property of module is
A legacy software system has 940 modules. The latest release required that 90 of these modules be changed. In addition, 40 new modules were added and 12 old modules were removed. Compute the software maturity index for the system.
Among the following, a representation that can be used for designing a system as a collection of procedures or modules:
1.Data flow diagrams
4. ER Modeling
An important aspect in coding is
3.To use as small memory
4.Brevity space as possible
Assume the following regarding the development of a software system P: - Estimated lines of code of P: 33, 480 LOC - Average productivity for P: 620 LOC per person-month - Number of software developers: 6 - Average salary of a software developer: Rs. 50,000 per month If E, D and C are the estimated development effort (in person-months), estimated development time (in months), and estimated development cost (in Rs Lac) respectively, then (E, D, C) = ...............
1.(48, 8, 24)
2.(54, 9, 27)
3.(60, 10, 30)
4.(42, 7, 21)
Assuming the existence of a start and end nodes for a program graph (PG), the total number of Paths is equivalent to ..................................set of test data required to test software.
Booting the computers means
2.Loading the resident part of the operating system into memory
3.Turning the computer on
4.Both a and b
Boundary value analysis is a method for:
1.White box testing
2. Black box testing
Design phase includes
1.Data, architecture and procedural designs only
2.Architectural, Procedural and interface designs only
3.Data, architecture, interface & Procedural designs
4.All of these
4.None of the above
1.Are relevant to him
2.Are not relevant to him
3. May be maliciously handled
Match each UML diagram in List I to its appropriate description in List II List I List I(a) State Diagram (i) Describes how the external entities (people, devices) can interact with the system (b) Use-Case Diagram (ii) Used to describe the static or structural view of a system (c) Class Diagram (iii) Used to show the flow of a business process, the steps of a use-case or the logic of an object behaviour (d) Activity Diagram (iv) Used to describe the dynamic behaviour of objects and could also be used to describe the entire system behaviourI
1.(a)-(i); (b)-(iv); (c)-(ii); (d)-(iii)
2.(a)-(iv); (b)-(ii); (c)-(i); (d)-(iii)
3.(a)-(i); (b)-(iv); (c)-(iii); (d)-(ii)
4.(a)-(iv); (b)-(i); (c)-(ii); (d)-(iii)
Match the following in Software Engineering: List - I (a) Product Complexity (b) Structured System Analysis (c) Coupling and Cohesion (d) Symbolic Execution List - II (i) Software Requirements Definition (ii) Software Design (iii) Validation Technique (iv) Software Cost Estimation Code: (a) (b) (c) (d)
1.(ii) (iii) (iv) (i)
2.(iii) (i) (iv) (ii)
3.(iv) (i) (ii) (iii)
4. (iii) (iv) (i) (ii)
Software coupling involves dependencies among pieces of software called modules. Which of the following are correct statements with respect to module coupling? P: Common coupling occurs when two modules share the same global data. Q: Control coupling occurs when modules share a composite data structure and use only parts of it. R: Content coupling occurs when one module modifies or relies on the internal working of another module. Choose the correct answer from the code given below:
1.P and Q only
2.P and R only
3.Q and R only
4.All of P, Q and R
1.To rectify bugs observed while the system is in use
2.When the customers need the product to run on new platforms
3.To support new features that users want it to support
4.To overcome wear and tear caused by the repeated use of the software
Structure programming codes include
4.All of these
The approach used for requirements elicitation in software design and development process:
4.All of these
The Software Requirement Specification (SRS) is said to be ................ if and only if no subset of individual requirements described in it conflict with each other.
4.All of the above
4.Following the plan
Which of the following statements is/are false? P: The clean-room strategy to software engineering is based on the incremental software process model. Q: The clean-room strategy to software engineering is one of the ways to overcome “unconscious” copying of copyrighted code.
1. P only
2. Q only
3. Both P and Q
4. Neither P nor Q
Which of the following statements is/are true? P: Software Reengineering is preferable for software products having high failure rates, having poor design and/or having poor code structure. Q: Software Reverse Engineering is the process of analyzing software with the objective of recovering its design and requirement specification.
2.Q only c.
3.Both P and Q
4.Neither P nor Q
2.Versioning and Revision history