Top 1000+ Solved Software Engineering MCQ Questions Answer
Q. In Data tension
a. It shows the software process as a set of activities each of which carries out data transformation.
b. Data and associated programs are re- engineered to remove limits on the data processing
c. It is responsible for the definition, operation, protection, performance, and recovery of a database.
d. Development of a database to meet a user’s requirements
Q. Database administration
a. It shows the software process as a set of activities each of which carries out data transformation.
b. Data and associated programs are re- engineered to remove limits on the data processing.
c. It is responsible for the definition, operation, protection, performance, and recovery of a database.
d. Development of a database to meet a user’s requirements
Q. Database design
a. This model shows the software process as a set of activities each of which carries out data transformation.
b. Data and associated programs are re- engineered to remove limits on the data processing.
c. It is responsible for the definition,operation, protection, performance, and recovery of a database.
d. Development of a database to meet a user’s requirements Exploratory development is
Q. Collection of logically related data stored together in one or more computerized files.
a. Database
b. Debugging
c. Defect testing
d. Defensive programming
Q. Exception is
a. Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
b. An error of some kind or an unexpected event occurs during the execution of a program
c. Here the objective of the process is to work with uses to explore their requirement and deliver a final system.
d. Possible loss or harm in computing system.
Q. When the program is developed, it is to be tested and defects are to be removed from the program.
a. Database
b. Debugging
c. Defect testing
d. Defensive programming
Q. 174. It is intended to find inconsistencies between a program and its specification. These inconsistencies are usually due to program faults or defects.
a. Database
b. Debugging
c. Defect testing
d. Defensive programming
Q. It is a property of the system that equates to its trustworthiness. It is the degree of user’s confidence that the system will operate as one expect, that the system would not fail in normal use.
a. Dependability
b. Availability
c. Maintainability
d. None of these
Q. Fail safe is
a. Trustworthiness with which a system or component can be modified to increase its storage or functional capacity
b. Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure.
c. Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures.
d. None of these
Q. Represents the number of discrete levers in the inheritance tree where subclasses inherit attributes and operations from super classes.
a. Depth of inheritance tree
b. Breath of inheritance tree
c. Radius of inheritance tree
d. None of these Fan- out is referred to
Q. Embedded systems are
a. These system runs on a single processor or an integrated group of processors
b. A system where each sub-system can respond to generated events where the events might be generated from other sub-systems or from the environment of the system.
c. A system continues in operation after some system faults have manifested themselves.
d. A system whose operation is incorrect, if results are not produced according to the timing specifications
Q. Emergent requirements
a. Emerges due to user’s understanding of system develops, during system development
b. Requirements derived from the core activity of the organization and directly related to the domain of the system.
c. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system.
d. None of these.
Q. Fat-client model is
a. It is a measure of number of function that calls some other function.
b. It is measure of number of functions that are called by a function.
c. In it server is only responsible for data management.
d. None of these
Q. Fault recovery is
a. It is the process of modifying the state space of the system so that the effects of the fault are minimized and system can continue in operation in some degraded state
b. Capacity of a system or component to continue normal operation despite the presence of hardware or software faults.
c. It is the widely used hazard technique
d. Incorrect step, process, or data definition in a computer program
Q. Enduring requirements
a. Emerges due to user’s understanding of system develops, during system development
b. Requirements derived from the core activity of the organization and directly related to the domain of the system*
c. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system.
d. None of these.