-
Notifications
You must be signed in to change notification settings - Fork 208
/
Copy pathSWE102.txt
2112 lines (2111 loc) · 230 KB
/
SWE102.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Which it NOT a correct statement about keep track of problems in configuration management ? | Careful record keeping is essential for small project
Web Service Description Language ( WSDL ) is a XML vocabulary that defines the methods a web service makes available and how clients intreract with them | True
Which description belong to COMMUNICATION AND DATA management stack of the sociotechnical systems ? | Middleware that provides access to remote systems and databases
The quality of system will decline when the systems are modified to reflect changes in their operational environment. | True
The software evolution processes NOT depend on ___ | The name of software being maintained
Web service requests are typically transported over the Internet via the HTTP protocol | True
Which is the CORRECT order change implementation process ? | Proposed changes | Requirements analysis | Requirements updating | Software Developement
Which descriptions belong to OPERATING SYSTEM stack of the sociotechnical system ? | Provides a set of common facilities for higher levels in the system.
In a service - oriented architecture, what role does WSDL play ? | It defines the interface that web service provides
Which descriptions belong to APPLICATION SYSTEM stack of the sociotechnical system ? | Specific functionality to meet some organization for requirements.
Which is NOT the key configuration management activity ? | Risk management
Which is the FIRST stage in the change management process ? | Request change by completing a change request form
A In Software Evolution, you use process metric to assess maintainability. If NUMBER OF OUTSTANDING change requests is INCREASE them the maintainability of the software system is ____ | Decrease
B Which descriptions belong to ORGANISATIONS stack of the sociotechnical system ? | Higher level strategic business activities that affect the operation of the system.
All methods of a web service class can be invoked by clients of that web service | False
A SOAP-based web service can return data in _____ format | XML
Which descriptions belong to BUSINESS PROCESSES stack of the sociotechnical system ? | A set of processes involving people and computer system that support the activities of the business.
A When messages are sent between an application and a web service using SOAP, each message is placed in a(n) ____ | SOAP message or SOAP envelope
Which is the FIRST stage in the change management process if change is accepted? | Record changes and link to associated change request
In Software Evolution, you use process metric to assess maintainability. If AVERAGE TIME TAKEN TO IMPLEMENT A change requests is INCREASE them the maintainability of the software system is | Decrease
A How do Web services fit into a Service Oriented Architecture ( SOA) ? | SOA is an architectural style and Web services provide and implementation strategy
Which descriptions belong to SOCIETY stack of the sociotechnical system ? | Laws, regulation and culture that affect the operation of the system
A Which is NOT a technique is used for Component Version identification ? | Function - based identification
D Which is the CORRECT order change identification and evolution process ? | Change identification process;Change proposals;Software Evolution process;New system
A In Software Evolution, you use process metric to assess maintainability. If NUMER OF REQUESTS for corrective maintenance is INCREASE them the maintainability of the software system is ____ | Decrease
A In Software Evolution, you use process metric to assess maintainability. If AVERAGE TIME REQUIRED for impact analysis is INCREASE them the maintainability of the software system is | Decrease
As an evolving program changes, its structure tends to become more complex | False
A web service normally uses SOAP to send and receive messages | True
Which symbol is used to indicate the visibility of an attribute in UML class diagram ? | a When you design a software system that use fine-grain, replaceable components for not only improves the maintainability but also improves the performance of that system | TRUE
is a critical requirement | The architectural should be designed to localise critical operations and minimise
D What is the correct statement about software architectural design? | The architectural design is normally expressed as a block diagram presenting an overview of the system structure
In Iterative development approach, which phase takes the least cost? | Specification
What are generic software process models? (Choose one) | Waterfall, Iterative development, Component-based software engineering
d What is a software process model? | A simplified representation of a software process, presented from a specific perspective
The current trends suggest that the economies of ALL developed and developing nations are dependent on software | True
In Waterfall approach, which phase takes the most cost? | Integration and testing
What is a software process? | A set of activities whose goal is the development or evolution of software
The distribution of the costs of software engineering NOT depends on the process model that is used | False
In Waterfall approach, which phase takes the least cost? | Specification
What are essential attributes of good software? | Maintainability; Dependability; Efficiency; Acceptability
a In Component-based software engineering approach, which phase takes the least cost? | Specification
What are the key challenges facing software engineering in the 21st century? (Choose one) | The heterogeneity challenge, the delivery challenge, the trust challenge
b Which is the correct sequence of the following activities in the process of System evolution? | Define system requirements;Assess;Propose;Modify
What is the main difference between the Spiral model and other software processes models? | The explicit recognition of risk in the Spiral model
What is the correct sequence of the following iterations in the RUP(Rational Unified Process) model? | Inception;Elaboration;Construction; Transition
What is the output of Feasibility study phase in the requirements engineering process? | Report that recommends whether or not to continue development project
In contrast, the RUP (Rational Unified Process) is normally described from which types of perspectives? | Dynamic perspective, Static perspective, Practice perspective
b What is the main difference between the RUP (Rational Unified Process) and other software processes models? | Phase are more closely related to business rather than technical concerns
Which is the correct sequence of the following activities in the Component-based software engineering? | Component;Requirements;System;Development
The Waterfall approach is the BEST approach to development software when | The software system is large and that is need developed at several sites
a Three categories of risks are ___ | Project risks, technical risks, business risks
Why many software projects are 'one-off' projects? | Because the requirements of software projects are not the same
What is the BEST way to do work breakdown structure? | Sets out the breakdown of the project into activities and identifies the milestones and deliverables associated with each activity
c What are milestones in project planning? | Milestones are the end-point of a process activity
What is the critical path? | The critical path is the sequence of dependent activities that defines the time required to complete the project
Select the BEST statement about critical path | Project manager should allocate experienced people to do the tasks on the critical path
What is the output of the first milestone in software requirement engineering process? | Feasibility study report document
Which is the BEST principle of project scheduling? | Minimize task dependencies to avoid delays caused by one task waiting for another to complete
b The project schedule shows ___ | The dependencies between activities, the estimated time required to reach each milestone and the allocation of people to activities
What are deliverables? (Choose one) | Deliverables are project results delivered to customers
a Which is the principle of prototype model? | A prototype is to build quickly demonstrate to the customer what the product look like. Only minimal functionality of the actual product is provided during prototyping phase.
What is the correct statement about software architectural design decisions? | Architectural design is a creative process, the activities in the process differs depending on the type of system being developed
Why do we need consider security for project | To protect the system against external attack
Which of the following design guidelines for secure systems engineering is NOT true | Avoid using redundancy and diversity to reduce risk
What is the last stage in survivability analysis | Identify softspots and survivability strategies
All of the following are the complementary strategies to achieve survivability EXCEPT | Conversion
Define the security terms 'attack' | An exploitation of a system's vulnerability. Generally, this is from outside the system and is a deliberate attempt to cause some damage
Which is the correct statement about integrity | Extent to which access to software or data by an unauthorized persons can be controlled
Probability of a software failure is the | Reliability
What was the software crisis | As more powerful hardware was introduced in the 1960s, larger software systems were developed. These were usually late, unreliable, did not meet user needs and cost more than expected. The problems of producing software was the software crisis
What are the two fundamental types of software product | Generic products that are designed to meet the needs of many different customers
What is software engineering | An engineering discipline concerned with all aspects of software production from specification to system maintenance
What are the fundamental activities in software processes | Software specifiation, software development, software validation and software evolution
What are the three general paradigms of software development | The waterfall approach, iterative development, component-based software engineering
What are the principal components of a software engineering method | System model descriptions, rules, recommendations, process guidance
What does the acronym CASE stand for | Computer Aided Software Engineering
Why is maintainability an important attribute of software | Because all software is subject to change after it goes into use and the costs of software maintenance often exceeds the development costs of the software
What are three key challenges facing software engineering | The heterogeneity challenge, the delivery challenge, the trust challenge
What is a software engineering code of ethics | A set of principles that set out, in a general way, standards of expected behaviour for professional software engineers
What are the fundamental activities that are common to all software processes | Software specification, software design and implementation, software validation, software evolution
Why are iterations usually limited when the waterfall model is used | The waterfall model is a document-driven model with documents produced at the end of each phase. Because of the cost of producing and approving documents, iterations and costly and involve significant rework. Hence they are limited
Briefly describe two types of evolutionary development | Exploratory development where the objective of the process is to work with customers to explore their requirements and deliver a final-system. Throw-away prototyping where the objective is to develop a better understanding of the customer�s requirements and deliver a better requirements specification
Why is it increasingly irrelevant to distinguish between software development and evolution | Few software systems are now completely new and a more realistic model of software development is of an iterative process that lasts for the lifetime of the software
What are the four phases of the Rational Unified Process | Inception, elaboration, construction, transition
What is the distinction between a CASE tool and a CASE workbench | A CASE tool supports an individual process task such as checking the consistency of a design. A CASE workbench supports sets of related activities such as specification or design
List five common project management activities | Any five from the following: proposal writing, project planning and scheduling, project costing, project monitoring and reviewing, personnel selection and evaluation, report writing and presentations
What is the difference between a milestone and a deliverable | A milestone is a recognised endpoint of some activity that represents a decision point for a project. A deliverable is a project output that is delivered to the customer
What is involved in project scheduling | Separating the total planned work in the project into separate activities and judging the time required to complete these activities
Explain how bar charts and activity networks give different views of a project schedule | Activity networks show the time required to complete an activity and the dependence on activities. Bar charts show the activity timeline illustrating the relative length of activities and the dates when they take place
Suggest four risks that may threaten the success of a software project | Staff turnover, management change, hardware unavailability, requirements change, specification delays, size underestimate, CASE tool underperformance, technology change, product competition
What is involved in risk monitoring | Regularly assessing the project risks to decide whether or not that the risk is becoming more or less probable and whether the effects of the risk have changed
What are system requirements | Descriptions of the services to be provided by a system and the system�s operational constraints
What is the software requirements document | The offical document that defines the requirements that should be implemented by the system developers
What is described in a context model | The immediate external environment of the system defining the system�s context and the dependencies that a system has on its environment
What is described in a state machine model | How the system responds to external events
What is a semantic data model | A model that describes the logical structure of the data processed by a system or managed by a database
What is shown in an UML sequence model | The sequence of interactions between objects and actors in the system associated with a single defined use-case
What is a structured method | A systematic way of producing models of an existing system or of a system that is to be built
What is the distinction between an object and an object class | An object is created at run-time by instantiating an object class. The object includes state variables and operations on that state as defined in the object class definition
What is the purpose of interface design in an OO design process | To define the signatures and semantics of the interfaces that are provided by an object or group of objects
What is test-first development | When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system
What is visual programming | An approach to development where a programmer manipulates graphical icons representing functions, data or user interface components and associates processing scripts with these icons
What is a design pattern and why are patterns important for reuse | A design pattern is a description of a problem and the essence of its solution. This solution is expressed in a generic way and can be instantiated and reused in different settings
What is generator-based reuse | An approach to reuse where reusable knowledge is embedded in a generator system which is programmed by domain experts to create the system. An executable system is then generated
What major software problem is addressed by aspect-oriented software development | The problem of separation of concerns so that a software unit is designed to do one thing and one thing only
What is a successful defect test | A successful defect test is one where the system�s operation does not conform to its specification, i.e. one that exposes a defect in the system
What is path testing | A structural testing strategy whose objective is to exercise every independent path through a program.
What is an equivalence partition? Give an example | A class of inputs or outputs where it is reasonable to expect that the system will behave the same way for all members of the class. For example, all strings with less than 256 characters
What is meant by configuration management | The development and use of standards and procedures for managing an evolving software system
What is a baseline | A controlled system where changes to the system have to be agreed and recorded before they are implemented
What information may be included in a configuration database | Information about configuration items such as data of creation, creator, etc. Information about users of components, system customers, execution platforms, and proposed changes to the system.
What are the objectives of change management procedures | To analyse the costs and benefits of proposed changes, approving changes that are worthwhile, and tracking which components of the system have been changed.
What is the role of a change control board | To assess the impact of proposed changes from a strategic and organisational perspective rather than a technical perspective. They should decide if changes are worthwhile and should prioritise changes to be implemented.
What is the difference between a system version and a system release | A system version is an instance of a system that differs, in some ways, from other instances. A system release is a version that is released to customers.
What are the advantages of attribute-based version identification | When selecting components, you do not need to specify the version number (an error-prone process if there are many components) but simply list the required component attributes
What is service engineering | The process of developing services for reuse in service-oriented applications
What is the difference between BPMN and WS-BPEL | BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language
What is a workflow | A sequence of activities, ordered in time, that make up a coherent business processes with each activity carrying out some part of the work of that process
Define �software development with services | The creation of programs by composing and configuring services to create new composite services
What non-functional requirements may be influenced by the choice of system architecture | Performance, security, safety, availability, maintainability
What is the fundamental characteristic of a repository model | All shared data is held in a central database that can be accessed by all sub-systems.
How is the system organised in a client-server model | A set of services is provided by servers and clients access and use these services
What is a reference architecture | An abstract model of a system class that can be used to inform designers about the general structure of that type of system
What is automated static analysis | A process where an analysis program examines the source code looking for possible anomalies. These are drawn to the inspector�s attention as they may represent faults in the program
Define the security terms �vulnerability�Eand �asset�EVulnerability: A weakness in a computer system that MAY be exploited to cause loss or harm | Asset: A system resource that has a value and so should be protected
What is security risk management | Security risk management is concerned with assessing the possible losses that might ensue from attacks on assets in the system and balancing these losses against the costs of security procedures that may reduce the losses
Suggest two possible vulnerabilities when login/password authentication is used.Users set guessable passwords | Authorised users reveal their passwords to unauthorised users, perhaps through some social engineering process
Why is it important to design for deployment | Because many security vulnerabilities are introduced when the system is configured for use in its deployment environment
Which system model is described in the following graphic | Data-flow models
Change request is proposal due to | All of the others
What's the difference between functional and non-functional requirements | None of the others
What are the user requirements | The statements in a natural language plus diagrams that describe the services' system and their constraints
Suggest a most appropriate software process model that might be used as a basic for managing the developing of the software system that support categorizing goods based on consumption pattern, tracking payments from the customers | The waterfall model
How is the system organized in a client-server model | None of the others
Which of the following statements about the differences between integrating testing and component testing are true | The integrating testing test the result of the component while the component testing test its internal structure
Which of the following statements about project management is true | The intangibility of software systems poses special problems for software project management
What are the distinctions between an object and an object class | All of the others
Which of the following is NOT a disadvantage of structured methods | There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software | True
If performance is a critical requirement the architecture should be designed to | localize critical operations and minimize communications; use large rather than fine-grain components
Which of the following does NOT belong to important principles of agile methods | Process not people
What are the advantages of explicitly designing and documenting software architecture | All of the others
Which of the following statements about test first development are true | All of the others
What is the problem that cannot arise when requirements are written in natural language | Lack of user's understandability
All of the fallowings are main benefits of software reuse EXCEPT | Reduce maintenance costs
Which of the following statements about testing is NOT true | Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing is NOT true | The integration team does NOT have access to the source code of the system
Which of the following statements about Service-oriented software engineering is true | Service-oriented software engineering is based on the notion that programs can be constructed by composing independent services that encapsulate reusable functionality
Which of the fallowings does NOT belong to the important differences between software project management and other types of project management | Cost of software project maintenance is higher than other type of projects
is concerned with developing an oriented system model to implement requirements | ]Object-oriented Analysis
What are system requirements | A structured document setting out detailed descriptions of the system's functions, services and operational constraints
What key factors should be considered when planning reuse | All of the others
Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects | True
All of the following are the main benefits of software reuse EXCEPT | Reduce maintain cost
Which of the following statements about Equivalence partitioning are NOT true | None of the others
Which of these statements about extreme programming are true | New versions may be built several times per day
Which of the following are the testing process goals | All of the others
Which of the following statements about service interfaces is true | All of the others
Which of the following statements about security is NOT true | Security threats can be threats to the only confidentiality and integrity of a system or its data
All of the following are stages in an object-oriented development process EXCEPT | Object-oriented evolution
What are the components of an object class definition in the UML | All of the others
All of the following statement about design pattern are true EXCEPT | ( tat ca deu dung)
Suggest the most appropriate generic software process model that might be used as a basic for managing the development of the following system: A university accounting system that replaces an existing system | Waterfall model
Requirements are usually presented at_ and _ levels of detail in requirements document | a high level statement/ a detailed system specification
What are advantages of pipeline model | All of the others
All of the fallowings are the ways that a software prototype may be used EXCEPT | To test all functions of the completed system
Which of the following is NOT object model that may be developed | Workflow model
What is application security | Application security is a software engineering problem where the system is designed to resist attacks
The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective | True
What can be represented by a workflow model | The sequence of activities in the process along with their inputs, outputs and dependencies
Which of the following requirement statements belongs to functional requirements | An article information shall include Author, Title, Description and other related information
The Waterfall approach is the BEST approach to development software when | The requirements are well-understood and changes will be fairly limited during the design process
Domain requirements may be functional or non-functional requirements | True
What is the basis of schedule and cost estimates in the extreme programming | The tasks that are broken down by the team from the scenarios or user stories written cards
The term 'CASE' is the acronym of | Computer-Aided Software Engineering
Which is the first stage in an object-oriented design process | Develop an understanding of the relationships between the software being designed and its external environment
Select the BEST model when you want to design a software system that very fast responses to events is a critical requirement | Interrupt-driven model
What are the purposes of system modelling | To help the analyst to understand more about the functionalities of the system, and help communicating with customer
Which is the right sequence in the risk management process | 2=>1=>4=>3 (1) Risk analysis (2) Risk identification (3) Risk monitoring (4) Risk planning
Object identification is a(n) process | Iterative
What is SOAP standard | A message exchange standard that supports service communication
In Waterfall approach, which phase takes the least cost | Specification
Given the project activities chart as below, please define the critical path (the values mention in each arrow are activity name and activity duration) | AFDEI
There are only one approach to reuse software applications or components that can be used | False
What are stages of service interface design | Logical interface design, Message design, WSDL description
Which one of the following statements about system testing is NOT true | End-users should be involved in system tests.
Before doing integration testing this testing must have been done | Unit testing
Acceptance testing will be done by | User
The decision where the programmers can reuse a pattern or need to develop a special-purpose solution always easy | False
What is WSDL standard | This standard allows a service interface and its bindings to be defined
In Component-based software engineering approach, which phase takes the most cost | Specification
Are the software engineering methods and tools used depending on the type of application being developed | Yes
The practices small, frequent releases of the system, the approach to requirements description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods | Incremental delivery
Which statement is correct about software processes | There are no right or wrong software processes
What is the correct sequence of the following activities in the debugging process? | 3 => 2 => 1 => 4 (1) Repair error (2) Design error repair (3) Locate error (4) Re-test program
What is software engineering concerned with | Software engineering is concerned with theories, methods and tools for professional software development
Which is NOT related to a characteristic of rapid application development processes | The processes of specification, design and implementation are concurrent
Which is NOT a problem with agile methods | Maintaining simplicity reduce effort
Which is NOT the general issue that affects most software | Heterogeneity
In Iterative development approach, which phase takes the least cost | Specification
The practices pair programming, collective ownership of the system code, and sustainable pace in Extreme Programming fit into which principle of agile methods | People not process
Which is NOT the benefit of Test first development | All previous and new tests are can not automatically run when new functionality is added
The practices customer is the member of the development team and is responsible for bring system requirements to the team for implementation in Extreme Programing fit into which methods | Customer involvement
What is the output of Requirements elicitation and analysis | System models
Why is incremental delivery hard to maintain | System is poorly structured
Which of the following NOT a principle of the agile methods | Test first development
Which is the BEST case to use Agile methods | Agile methods used in product development where a software company is developing a large-sized product for sale
In Waterfall approach, which phase takes the most cost | Integration and testing
According to Ian Somerville, what are fundamental types of software product | Generic products, Customized (or Bespoke) products
In iterative development approach, which phase takes the most cost | Iterative development
Both the Waterfall model of the software process and the prototyping model can be accommodated in the spiral process model | True
The software systems that are developed using Evolutionary development are more cost-effective, easier to maintain than that developed using Waterfall model | True
Which is the CORRECT statement about development and validation sector in Boehm's spiral model | A development model for the system is chosen which can be any of the generic models
Unit testing is a___ | While box testing
Study object models for one system, each object has been named and showed the relation between them (by inheritance, a..) What is a forced rule had to follow in terms below | Every object must have at least one associated operation.
Which is true about the use of italics in the diagram of the image | The use of italics carries no standard UML meaning.
Which of the following is a black box design technique | Error-guessing
What is the purpose of analysis | The main objective of the analysis is to capture a complete, unambiguous, and consistent picture of requirements of the system must do to satisfy the users�Erequirement and needs
What is the normal order of activities in which software testing is organized | Unit test, integration test, validation test, system test
Which is NOT a common characteristic that used to evaluate architecture design solution | Technology
What describes an actor best | An actor specifies a role played by a user or any other systems that interacts with the subject
Generalization in the UML is implemented as ___ in Object Oriented programming languages | Inheritance
The testing intended to show that previously correct software has not been adversely affected by changes is call | Regression testing
What is the role of state machine model | State machine is used to help the analyst to understand the functionality of the system, communicating with customer
When you design a Banking software system that use redundant components and mechanisms for fault tolerance for not only availability but also makes security of that system easier to implement | False
Which one of the following statements about system testing is NOT true | End-users should be involved in system test
Which non-functional system requirements that the software system architecture may depend on | Performance, Security, Safety, Availability Maintainability
A generalization relationship is NOT used between___ | an Actor and a UseCase
Which pattern provides a standard way of accessing the elements in a collection, irrespective of how that collection is implements | Fa�ade pattern
Which is NOT increases software maintainability | High coupling
When should you use-case diagram | Should use use-case diagram to represent exception behavior (when errors happen)
We split testing into distinct stages primarily because | Each test stage has a different purpose
A has-a relationship is implemented via inheritance | False
What are advantages of explicitly designing and documenting a software architecture | Stakeholder communication; System analysis; Large-scale reuse
Which is the correct statement about object identification | Object identification is a waterfall process; it relies on the skill, experience and domain knowledge of system designers.
Which architectural model shows the process structure of the system | Dynamic process model
Which is the attribute name of the diagram in the image | Eat
What is NOT important class of interface error | Interface misunderstanding
What is the correct statement about software design and implementation | The activities of design and implementation are closely related and may be inter-leaved
A program validates a numeric field as follows Values less than 10 are rejected, value between 10 and 21 are accepted, values greater than or equal to 22 are rejected. Which of the following input values cover all equivalence partitions | 10, 11, 21
When you design a software system that use fine-grain, replaceable components for not only improves the maintainability but also improves the performance of that system | False
In Iterative development approach | Specification
What are generic software process models? | Waterfall, Iterative development, Component-based software engineering
What is a software process model? | simplified representation of a software process, presented from a specific perspective
The current trends suggest that the economies of ALL developed and developing | True
What is a software process? | goal is the development or evolution of software
What are essential attributes of good software? | Maintainability Dependability Efficiency Acceptability
In Component-based software engineering approach, which phase takes the least cost? | Specification
What are the key challenges facing software engineering in the 21st century? | The heterogeneity challenge, the delivery challenge, the trust challenge
Which is the correct sequence of the following activities in the process of System evolution? 1Assess existing systems 2Define system requirements 3Modify systems 4Propose system changes | 2=>1=>4=>3
What is the outputs of Requirements elicitation and analysis? (Choose one) | System models
What is the correct sequence of the following iterations in the RUP(Rational Unified Process) model? | Inception; Elaboration;Construction;Transition
What is the main difference between the RUP (Rational Unified Process) and other software processes models? | Phase are more closely related to business rather than technical concerns
Which is the correct sequence of the following activities in the Waterfall model? | Requirement definition;System and software design;Implementation and unit testing;Integration and system testing ;Operation and maintenance
Which is the correct sequence of the following activities in the Component-based software engineering? | Component analysis;3Requirements;System design with reuse modification;Development and integration
Three categories of risks are | Project risks, technical risks, business risks
What are milestones in project planning? | Milestones are the end-point of a process activity
Which is the BEST principle of project scheduling? | dependencies to avoid delays caused by one task waiting
The project schedule show | between activities, the estimated time required to reach each milestone and the allocation
Which is the principle of prototype model? | A prototype is to build quickly demonstrate.. product is provided during prot
What are non �Efunctional requirements? | Constraints on .. constraints on the development process, standards, etc
What are good attributes of requirements? (Choose one) | Requirements that come from the application domain of the system and that reflect characteristics and constraints of that domain
What are system requirements? | A structured document setting out detailed descriptions of the system�s functions, services and operational constraints
Which are types of non-functional requirement? (Choose one) | Product requirements; Organizational requirements; External requirements
What is the BEST way to write requirement document? | Should include both a definition of user requirements and a specification of the system requirements
What are functional requirements? | Statements of services the system should provide how the system should react to particular inputs and how the system should behave in particular situations.
What are user requirements? | Statements in natural language plus diagrams of the services the system provides and its operational constraints
Which of the following requirement statements belongs to domain requirements? | There shall be a standard user interface to all database that shall be base on the Z39.50 standard
In reality, the distinction between different types of requirements is not clear-cut | True
Which of the following requirement statements belongs to non-functional requirements? | The user interface shall be implemented as simple HTML without frames
What�s the BEST way to start creating a data-flow diagram? | In the data-flow diagram procurement process and analysis of sub-processes
When should you use state machine model? (Choose one) | Describe how a It shows system states and events that cause transition from one state to another
When should you use data flow diagrams (DFD)? (Choose one) | DFD is used to showing the data exchange between a system and other systems in its environment
Can two objects associate with one another in more than one way? | Yes
What�s the BEST way to start creating a state diagram? | In the state diagram..then focus on the transition
What�s the BEST way to start creating a class diagram? | In the class diagram.. then focus on the attributions, operations
Another name for inheritance is | Generalization
When should you use sequence diagram? (Choose one) | Should use sequence diagram to illustrate the sequence of steps that must be performed in order to complete a task
Which models give a static view of a system? | Object model Data model Architectural model
When should you use use-case diagram? (Choose one) | Should use use-case diagram to .. use the functionalities of the system
What are types of behavioral models? (Choose one) | Data-Flow, State machine
Which non-functional system requirements that the software system architecture may depend on? (Choose one) | Performance, Security, Safety, Availability, Maintainability
Select the BEST solution for architectural design of a software system that performance is a critical requirement | The architectural..large-grain rather than fine-grain components
Which of the following models belong to Event-driven systems? (Choose one) | Broadcast models, Interrupt-driven models
What is the correct statement about software architectural design decisions? | Architectural design is a .. type of system being developed
Which of the following styles belong to Control styles? (Choose one) | Centralised control, Event-based control
Which of the following styles belong to System organization? (Choose one) | Most large systems are heterogeneous architectural styles
What is the correct statement about software architectural design? | architectural design normally expressed block diagram presentingoverview structure
Which of the following models belong to Centralised control? (Choose one) | Call-return model, Manager model
What are advantages of explicitly designing and documenting software architecture? | Stakeholder communication; System analysis; Large-scale reuse
What are the models in architecture design? (Choose one) | Static, Dynamic, Interface, Relationship, Distribution
What are three general architectural styles? (Choose one) | System organisation; decomposition styles; Control styles
Another name for [�Eis a�E relationship is ___ | Generalization
Which is the correct statement about coupling? | Coupling deals with interactions between objects or software components
Which is NOT a primary goal in the design of the UML? | Be dependent on particular programming language
What do you mean by coupling in software design? | Coupling strength of association established by a connection
Which of the following is NOT an approach that may be used to identify object classes? | Use Event-based analysis
Which are object-oriented strategies? (Choose one) | Object-oriented analysis, Object-oriented design, Object-oriented programming
Which is NOT the main activity in design process? | Designing the test case
What is the purpose of analysis? | The main objective of the analysis is to capture a complete, unambiguous, and consistent picture of requirements of the system and what the system must do to satisfy the users�Erequirement and needs
Another name for [�Eas a�E relationship is ___ | Composition
Which is NOT an advantage of inheritance? | inheritance graphs analysis, design implementation different functions should separately
Which is the correct statement about object identification? | Object identification is an iterative process; it relies on the skill, experience and domain knowledge of system designers
Which is the first stage in an object-oriented design process? | Develop understanding relationships between software designed environment
Which is the right sequence in the process of prototype development? | Establish prototype objectives;Define prototype functionality;Develop prototype;Evaluate prototype
The practices small, frequent releases of the system, the approach to requirements description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods? | Incremental delivery
What are common principles of agile methods? | Customer involvementincrementaldeliverypeople not process; embrace simplicity
Which of the following BEST describes the major difficulties with incremental development? | Contractual problems validation problems management problems maintenance problems
Which of the following is NOT an advantage of using incremental development and delivery? | Systems are often have good structures
The practices regular system release, test-first development and continuous integration in Extreme Programming fit into which principle of agile methods? | Embrace change
Which is NOT an advantage of rapid software development? | Only senior programmer capable taking decisions required during development
Which is the evidence when said that �pair programming is as efficient as the same number of programmers working individually�E (Choose one) | Measurements suggest development productivity pair programming similar that two people working independently
What is a user story in extreme programming? | It is a requirement expressed as scenario
The practices pair programming, collective ownership of the system code, and sustainable pace in Extreme Programming fit into which principle of agile methods? | People not process
Who chooses the stories for inclusion in the next release based on their priorities and the schedule estimates? | Customer
In the extreme programming, what is the role of customer? | To help code refactoring
Which part of the system can be reuse? (Choose one) | Application system, Component reuse, Object and function
The trend of design process in most software engineering disciplines is base on ___ | Reuse of existing system or component
If the applications or components are developed in difference programming language from the programming language you are using then you can not reuse that | False
Which is NOT the main benefit of software reuse? | Creating and maintaining a component library
You can not to combine multiple patterns in the complex software system | False
Which is the correct statement about Product line architectures? | to allow them to be modified
All of the following are the design choices have to be made when reusing COTS products EXCEPT | How will data be exchanged between different modules
The trend of Reuse-based software engineering is an approach to development that tries to ___ | Maximize the reuse of existing software
What are the benefits of software re-using? | To have faster delivery of system, lower cost, increased software quality
Which is NOT a key factor that you should consider when planning reuse? | The name of the application or component reuse
All of the following are types of program generator EXCEPT | Component generators
What is the normal order of activities in which software testing is organized? | Unit test, integration test, validation test, system test
The main focus of acceptance testing is: | testing from a business perspective
Unit testing is a __ | White box testing
The effort required for locating and fixing an error in an operational program is: | Maintainability
Workbenches are also called ___ | All of the other choices
values less than 10 are rejected, values between 10 and 21 are accepted, values greater than or equal to 22 are rejected | 3,10,22
A successful defect test is a test which causes a program to behave in an normal way | False
Which document identifies and describes the testing that will be implemented and executed? | Test case
What is the purpose of defect testing? | To discover faults that make software�s behavior incorrect
The testing intended to show that previously correct software has not been adversely affected by changes is call: | Regression testing
We split testing into distinct stages primarily because: | Each test stage has a different purpose.
Which is the right sequence in the software testing process? | Create test case;Prepare test data;Perform test;Create test report
Which of the following is NOT part of configuration management? | The people in the project team
Which is the change management concerned with? | All of the other choices
Software systems are subject to continual change requests from ___ | Developers, Users, Market forces
The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: | effect of the change on the project schedule, cost, quality, and risks
Which of the following is the source for software version up? | All of the other choices
A configuration management system would NOT normally provide: | Facilities to compare test results with expected results
What is a release? | An instance of a system which is distributed to users outside of the development team.
Who review and approves the change request? | Change control board
Which of the following items would not come under Configuration Management? | Live data
Which is the right sequence of the change management process? | Request;Analyze;Submit;Make;Create
Which are levels of protection in application security engineering? (Choose one) | Platform-level. Application-level. Record-level
Consider security design for username and password protection, what is the good design? | System users are authenticated using a login name/password combination. Requires user change password after 2 months
What is the first stage in survivability analysis | Review system requirements and architecture.
Password should be changed | All of the other choices
Why do we need consider security for project? (Choose one) | To protect the system against external attack
Which of the following design guidelines for secure systems engineering is NOT true? | Avoid using redundancy and diversity to reduce risk
What is the last stage in survivability analysis | Identify softspots and survivability strategies.
Define the security terms 'attack' | exploitation system vulnerability Generally outside system deliberate attempt some damage
Which is the correct statement about integrity? | Extent access software data by an unauthorized persons can controlled
Password should be changed | On regular basis
Which system model is described in the following graphic? | Data-flow models
Change request is proposal due to ______ | All of the others
What's the difference between functional and non-functional requirements? | None of the others
What are the user requirements? | The statements in a natural language plus diagrams that describe the services' system and their constraints
Suggest a most appropriate software process model that might be used as a basic for managing the developing of the software system that support categorizing goods based on consumption pattern, tracking payments from the customers. | The waterfall model
How is the system organized in a client-server model? | None of the others
Which of the following statements about the differences between integrating testing and component testing are true? | integrating testing test result component component testing test internal structure
Which of the following statements about project management is true? | The intangibility of software systems poses special problems for software project management
What are the distinctions between an object and an object class? | All of the others
Which of the following is NOT a disadvantage of structured methods? | There are not many CASE tools that support structured methods
The economies of all developed nations are dependent on software. | True
If performance is a critical requirement the architecture should be designed to | localize critical operations minimize communications use large rather fine-grain components
Which of the following does NOT belong to important principles of agile methods? | Process not people
What are the advantages of explicitly designing and documenting software architecture? | All of the others
What is the problem that cannot arise when requirements are written in natural language? | Lack of user's understandability
Which of the following statements about testing is NOT true? | Its goal is to fix errors of the software system
Which of the following statement about the two distinct phases of system testing is NOT true? | The integration team does NOT have access the source code of the system.
Which of the following statements about Enterprise Resource Planning (ERP) systems is NOT true? | Enterprise Resource Planning systems are very widely used
What is the second stage of risk management process? | Risk analysis
Both the waterfall model of the software process and the prototyping model can be accommodated in the spiral process model. | True
Which of the following is a type of software process model that represents the roles of the people involved in the software process and the activities for which they are responsible? | An role/action model
What does computer science concern with? | Computer science is concerned with theories and methods that underlie computers and software systems
What are included in a quality plan? | The quality procedures and standards that should be used in a project
Which of the followings belong to Server type of concurrent object implementation? | The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests
What is meant by configuration management? | The development and use of standards and procedures for managing an evolving software system
Which of the following statements about Service-oriented software engineering is true? | ce-oriented software engineer based can construct compos independ services encaps reusable funct
Which of the fallowings does NOT belong to the important differences between software project management and other types of project management? | Cost of software project maintenance is higher than other type of projects
is concerned with developing an oriented system model to implement requirements | Object-oriented Analysis
What are system requirements? | A structured document setting out detailed descriptions of the system's functions, services and operational constraints
What key factors should be considered when planning reuse? | All of the others
Applications frameworks are collections of concrete and abstract objects that are designed to be reused through specialization and the addition of new objects. | True
Which of the following statements about Equivalence partitioning are NOT true? | None of the others
Which of these statements about extreme programming are true? | New versions may be built several times per day
Which of the following are the testing process goals? | All of the others
Which of the following statements about service interfaces is true? | All of the others
Which of the following statements about security is NOT true? | Security threats can threats only confidentiality integrity system data.
All of the following are stages in an object-oriented development process EXCEPT? | Object-oriented evolution
What are the components of an object class definition in the UML? | All of the others
What are advantages of pipeline model? | All of the others
All of the fallowings are the ways that a software prototype may be used EXCEPT | *[A]To test all functions of the completed system
Which of the following is NOT object model that may be developed? | Application security is a software engineering problem where the system is designed to resist attacks
What can be represented by a workflow model? | The sequence of activities in the process along with their inputs, outputs and dependencies.
Which of the following requirement statements belongs to functional requirements? | An article information shall include Author, Title, Description and other related information
What is the basis of schedule and cost estimates in the extreme programming? | The tasks broken down team from scenarios user stories written cards
Which is the first stage in an object-oriented design process? | Develop understanding relationships between software being designed its external environment
Select the BEST model when you want to design a software system that very fast responses to events is a critical requirement? | Interrupt-driven model
What are the purposes of system modelling? (Choose one) | help analyst understand more about functionalities system help communicat with customer
Which is the right sequence in the risk management process? | Risk identification; Risk analysis; Risk planning; planning;
Object identification is a(n)_process | Iterative
What is SOAP standard? | A message exchange standard that supports service communication
There are only one approach to reuse software applications or components that can be used. | False
What are stages of service interface design? | Logical interface design, Message design, WSDL description
Which one of the following statements about system testing is NOT true? | End-users should be involved in system tests.
What is WSDL standard? | This standard allows a service interface and its bindings to be defined
What is the purpose of software validation? | To check and ensure that the software is what the customer wants
Which is the most correct definition of software? | Computer programs associated documents requirements design model user manual
In component-based software engineering model, which phase takes the most cost? | Integration and testin
What is not an example of software process perspective? | User
What is correct phase related to the term "CASE" in software engineering? | CASE tools software systems provide automated support software process acti
What is software engineering? | engineering discipline concerned with all aspects software production
Which doesn�t software engineering relate to? | Human resources for software development
What is the list of attributes of good software? | Usability, Maintainability, Dependability, Efficiency
In waterfall model, which phase would take less cost? | Specification
In general, software must be | Usable, maintainable, reliable, and secure
Which is NOT common fundamental activity to all software processes? | Software process modeling
What is the correct sequence of the following iterations in the RUP model? | Inception;Elaboration;Construction;Termination
What is the correct sequence of the following activities in the Waterfall model? | Requirements;System;Implementation;Integration;Operation
In general, which activity would utilize the biggest number of CASE tools? | Implementation
The waterfall model is considered for | Projects that need to develop in several sites
Which process model supports for process iteration? | Incremental delivery
Feasibility study is considered as a part of which phase in the Rational Unified Process? | Inception
What is the output of Feasibility study phase? | Report that recommends whether or not to continue
In which process model, the process activities are represented as separate process phases? | Waterfall model
What is the main difference between the spiral model and other models? | Explicit recognition of risk
The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the | effect of the change on the project schedule, cost, quality, and risk
Which of the following is not needed in software version up? | For different machines/OS6
hat is the purpose of risk contingency plan | To minimize the risk's impact
The project plan sets out | Both a and b
Which is NOT a management activity | Coding
Which of the following is not needed in the project plan | Activity Network
is the output of Risk Planning stage | Risk avoidance and contingency plans
is NOT a management activity | Design and implementation
charts that shows a project calendar and the start and finish date of activities are also referred to as | Gantt charts
is right sequence in project scheduling | Identify;Estimate;Allocate;Create
What is the output of Requirements elicitation and analysis process? | Requirement documents
Which question does the traceability check in requirement review answer? | Is the origin of the requirement clearly stated
During requirement checking, which question you need to answer for the consistency? | Are all functions required by the customer included?
Which is the output of requirement elicitation and analysis activities? | System models
During requirement checking, which question you need to answer for the completeness? | Are there any requirements conflicts?
What is the purpose of requirements discovery stage? | Interact with stakeholders to get to know their requirements.
Which activity is not part of Requirement engineering process? | Risk management
What are done in the requirement management activities? | Manage changing requireme during requir engineer process system develop
What is a requirement? | Descrip which services functionality system should provide
In the following description, select a non-functional requirement? | The response time should be 0.5s
Which is not a diagram in the behavioral models? | Deployment diagram
Which is the purpose of architectural model? | Show the system and its relationship with other systems
is not non-functional requirement among requirements of the library management system | allow the users to search for an item
not belong to the group of method supporting tools | unit testing
From various perspectives, different models are developed for the system includes external, behavioral, structural and which of following models? | Object model
The purposes of system modeling are (select two answers)? | help the analyst and communicate with
UML notation, which relationship is the | Dependency
There are three objects: Animal, Cat, and Dog. The relationship between Cat and Animal is | Inheritance
Which is the purpose of data models? | Describe the logical
A Classification model is | object class/inheritance
Which is not a characteristic of the system architecture? | Efficiency
Which is not a description of the architectural design? | It is concerned with
What are the models in architecture design? | Interface, Relationship
What are the characteristics of the system architecture? | Security, Safety, Availability, Maintainability
What are the software architecture styles? | System organization, Modular
Which of the following styles belong to Modular decomposition? | oriented decomposition, Function
Which of the following styles that is not a widely used organizational style? | A modular decomposition style
Which architectural model shows the process structure of the system? | Dynamic process model
Another name for a relationship is | Generalization
What is not a class relationship? | Realization
Which is NOT a stage in object oriented design process? | Implementation
Which is the static model among following object oriented design models? | Context model
Which is concerned with developing an object model of the application domain? | oriented analysis
What is not a class relationship? | Socialization
Another name for has a relationship is | Aggregation
Which diagram should present on Architecture design? | Deployment diagram
Which is NOT an object-oriented strategy? | deployment
Which is the dynamic model among following object oriented design models? | Use case model
Which is not related to a characteristic of rapid application development processes? | It is always possible
In the extreme programming, what is the role of customer? | develop stories
Which step is repeated in the iterative development process? | Validate system
What does the rapid application development concerns with? | An iterative approach
Why is incremental delivery hard to maintain? | System is poorly
What don�t Agile methods concern with? | They emphasizes
Which is not a practice that is included in the extreme programming? | Independent working
Why water-fall model can not be applied in Rapid development? | Within the rapid
What is an advantage of incremental development? | It can deliver
What is not a tool in rapid application development environment? | Data generators
Which is a problem of software re-use? | Team gets difficulties in finding
If you are developing a long-time system, what key factor that you should consider when planning reuse? | expected software
What does software re-use (in software engineering) concern with? | Use the software
What is NOT the problem when reuse? | Increased dependability
Which is not a main reason for software re-using? | resource
Which is a benefit of software re-use? | Reducing the number
What is NOT the element of design patterns? | The guide line to use pattern
What is NOT the benefit when reuse? | Creating and
Which is not a reuse-based software engineering? | software manuals
Which is not concern with patterns and design patterns? | A way of reusing
What is the purpose of defect testing? | discover faults
Which is not a testing approach in integration testing? | Review architecture
What is not an approach in designing test cases? | Object-oriented
Which document identifies and describes the testing that will be implemented and executed? | case
Which is role in the project that is mainly responsible for the component testing? | Developer
Which document is the base of performing system test? | Software
Which is right sequence in the software testing process? | Create test case;Prepare test data;Perform test;Create test report
Please choose the correct definition of the release testing? | It is to increase
Which is the approach that is not commonly used to define the system test scenarios? | software outputs
Which is not an activity during the system testing phase? | unit testing
Which of the following is NOT needed in software version up? | For bug fixing
Software systems are subject to continual change requests from | Both User and Developer
Which of the following is valid for the distinctions that make software management difficult? | Both There
Which is the change management concerned with? | All others
Which are two fundamental issues of the system? | Protection and Distribution
Security requirement is a part of | Both Functional
Why we need consider security for project? | protect the system
Which of the following is NOT a principle category of security threat? | Vulnerability
Which is NOT the security requirement of the CMS system? | Allow users
Consider security design for username and password protection, what are two good designs? | System users are and Requires
Which doesn�t software engineering relate to? | Human resources
What is the purpose of software validation? | customer wants
Which is the most correct definition of software? | user manual
What is the list of attributes of good software? | Usability, Maintainability
In component-based software engineering model, which phase takes the most cost? | Integration
What is software engineering? | It is an engineering
In general, software must be | Usable, maintainable
What is correct phase related to the term "CASE" in software engineering? | CASE tools are software
The waterfall model is considered for | Projects that need
What is the output of Feasibility study phase? | Report that recommends and Incremental delivery
What is the main difference between the spiral model and other models? | Explicit
Which is NOT common fundamental activity to all software processes? | process modeling
What is the correct sequence of the following activities in the Waterfall model? | Requirements;software;unit;system;maintenance
Which of the following is not needed in the project plan? | Activity Network
Which of the following is not needed in software version up? | For different
What is the output of Risk Planning stage? | Risk avoidance
The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the | schedule, cost, quality, and risk
What is the purpose of risk contingency plan? | To minimize
Which is NOT a management activity? | Design and
Which is NOT a management activity? | Coding
Bar charts that shows a project calendar and the start and finish date of activities are also referred to as | Gantt charts
Which is right sequence in project scheduling? | Identify tasks;Estimate resource;Allocate resource;Create project charts
Which question does the traceability check in requirement review answer? | requirement clearly stated
In the following description, select a non-functional requirement? | response time should
Which activity is not part of Requirement engineering process? | Manage changing requirements
What is a requirement? | functionality that system should provide
What is the purpose of requirements discovery stage? | Interact with stakeholders
Which is not non-functional requirement among requirements of the library management system as listed below? | item by title, author, or ISBN.
Which does not belong to the group of method supporting tools? | unit testing
There are three objects: Animal, Cat, and Dog. The relationship between Cat and Animal is | Generalization
In UML notation, which relationship is the used to indicate? | Dependency
A Classification model is | characteristics
The purposes of system modeling are (select two answers)? | To help the and To communicate
Which is the purpose of architectural model? | Show the system
Which is the purpose of data models? | Describe the logical structure
Which architectural model shows the process structure of the system? | Dynamic
Which is not a description of the architectural design? | It is concerned
Which of the following styles belong to Modular decomposition? | decomposition, Function �EOriented pipelining
Which of the following styles that is not a widely used organizational style? | A modular
What are the models in architecture design? | ,Dynamic, Interface, Relationship, Distribution
Which is the dynamic model among following object oriented design models? | Use
Another name for has a relationship is: | Aggregation
Which is the static model among following object oriented design models? | Context
What is not a class relationship? | Inheritance
Which is concerned with developing an object model of the application domain? | analysis
Which diagram should present on Architecture design? | Deployment
Another name for is a relationship is : | Generalization
Which is not a practice that is included in the extreme programming? | Independent
Which step is repeated in the iterative development process? | Validate
What is not a tool in rapid application development environment? | Data
What don�t Agile methods concern with? | emphasizes that involving
In the extreme programming, what is the role of customer? | develop stories that defines
What is an advantage of incremental development? | deliver the highest priority
What does the rapid application development concerns with? | An iterative approach to software
Why is incremental delivery hard to maintain? | System is poorly structured
Which is not concern with patterns and design patterns? | They are high-level abstractions
What is NOT the element of design patterns? | guide line to use pattern
What is NOT the benefit when reuse? | Creating and maintaining
Which is not a main reason for software re-using? | resource involve in software development
If you are developing a long-time system, what key factor that you should consider when planning reuse? | expected software lifetime
What does software re-use (in software engineering) concern with? | Design system by composing
Which is a benefit of software re-use? | Reducing the number of defects
Which is not an activity during the system testing phase? | Perform unit testing
Please choose the correct definition of the release testing? | It is to increase the suppliers
What is not an approach in designing test cases? | Object-oriented testing
Which is right sequence in the software testing process? | case;data;test;report
Which is the approach that is not commonly used to define the system test scenarios? | Test the software outputs
What is the purpose of defect testing? | To discover faults
Software systems are subject to continual change requests from | Both a and b
Which is the change management concerned with? | All above
Which of the following is valid for the distinctions that make software management difficult? | Both a and b
Which of the following is not needed in software version up? | For bug fixing
Which is NOT the security requirement of the CMS system? | Allow users post comments
Consider security design for username and password protection, what are two good designs? | Requires user and System users
Security requirement is a part of: | Both a & b
Why we need consider security for project? | To protect the system against
Which are two fundamental issues of the system? | Distribution and Protection
in waterfall approach, which phase takes the least cost? | specification
what are essential attributes of good software? | maintainability, dependent , efficiency , acceptability
what is software process model? | a simplified deprecation of software process, presented from a specific perspective
The distribution of the cost of software engineering not depends on the process model that are use? | false
what is a software process | a set of activities whose goal is development
in iterative development approach , which phase take the least cost? | specification
in waterfall approach which phase take the most cost? | integration and testing
the current trends suggest that the economies of all developed and developing nations | true
what are generic software process models? | waterfall iterative development, component-based, software engineering
what is the main difference between RUP(rational unified process) and other software process model | phase are more closely related to business
what is the outputs of requirements elicitation and analyze | system models
what is the correct sequence of the following iteration in the RUP | ....;Alaboration;construction;transition
in contrast the RUP (rational unified process) | dynamic perspective, static perspective, practice perspective
what is the main difference between the Spiral model and other software processes model? | the explicit recognition of risk in the spiral model
what are milestones in project planning? | milestones are the end point of process activity
three categories of risk are | project risk, technical risk, business risk
which is the best principle of project scheduling | minimize task dependencies to avoid delays cost...
the project schedule show | the dependencies between activity
what is the critical path? | the critical path is the sequence of dependent activity that define the time required to complete the project
which is the principle of prototype models? a prototype is to build quickly software to the customer, almost | functionality of the produce are completed and system tested
what are deliverables | deliverables are project result deliverables to customer
what is the best way to do work breakdown structure | set out the breakdown of the project into activities and indentifies the milestone and deliverables
why many software project are "one off" project | because requirement of software project are not the same
what is the output of the first milestone in software requirement engineering process? | feasibility study report document.
What are user requirements? | statements in natural language plus diagrams of the services the system provide
what are good attributes of requirements? | testable, complete, clear, consistent, unambiguous
which are types of non-functional requirement? | products requirement, organizational requirement, external requirement
what are non-functional requirements? | constraint on the services or functional...
what is the best way to write requirement document? | there shall be standard user interface to all database that show
which of following requirement statements belongs to non-functional requirement? | the user interface shall be implemented as simple HTML without frames
what are functional requirements? | statements of service the system should provide how...
what are domain requirements? | requirements that come from the application domain of the system and that reflect...
what are system requirement? | a strutted document setting out detailed description of the system's function
what is the best way to start creating a class diagram? | in the class diagram, you list all the classes and then...
when should you user state machine model? | Describe how s system response to external ...
what are types of behavioral diagram? | data-flow, state machine
when should you use use-case diagram? | should you use use-case diagram to represent all of the people who use the
another name for inheritance is: | generalization
what is the best way to start creating a data-flow diagram? | in the data-flow diagram...
when should you use data flow diagram | DFD is used to showing the data exchange between a system
when should you use sequence diagram | should use sequence diagram to illustrate the sequence of steps that must
can two objects associate with one another in more than one way? | yes
what is the correct statement about software architectural design? | block diagram
what is the correct statement about software architectural styles? | heterogeneous
what is the correct statement about software architectural design decision? | is a creative process
what are the model in architectural design? | static, dynamic, interface, relationship, distribution
which of following styles belong to control style? | centralized control, even base control
what are three general architectural styles? | system organization, decomposition styles, control styles
what are advantages of explicitly designing and documenting software architectural? | large-scale reuse
which of following models belong to centralized control? | Call - return model, manager model
which of following models belong to event-driven systems? | broadcast models,..
which non-functional system requirements that the software system architecture may depend on? | performance, security, safely, availability, maintainability
select the best solution for architectural design of a software system that performance is critical requirement? | minimize...fine-grain
which is the correct statement about object identification | an integrative process
which is not an advantage of inheritance? | have difference function and should be separately maintained
which are object-oriented strategies? | object-oriented analyze, object-oriented design, object-oriented programming
which is not a primary goal in the design of the UML? | be dependent on particular programming language
another name for is a relationship is? | Generalization
what is the purpose of analysis? | unambiguous and consistency
another name for "has a" relationship is | association
which of the following is not an approach that may be use to identify object classes? | use event-based analysis
which is not the main activity in design process? | develop an understanding
in the extreme programming, what is the role of customer? | define the requirement
the practices small, frequent releases of the system, the approach to requirements description base on customer | customer involvement
which is the evidence when said that pair programming is a | measurements suggest that development productivity with
what is a user story in extreme programming? | it is a requirement expressed as scenario
which of the following is not advantage of using incremental development and delivery? | system are often have good structure
what are common principles of agile methods? | people process, embrace change
the practices regular system release, test-first development and continuous | only senior programmer
who chooses the stories for inclusion in the next release based on their | customer
which of the following BEST describes the major difficult with | contractual problem, validation problem
the practices pair programming, collective | people not process
the trend of design process in most software engineering | reuse of existing systems or components
all of the following are the design choices have to be made when | how will data be exchange between different modules
what is the correct statement about product line architectures? | ...to allow them to be...
all of the following are types of program generator EXCEPT | component generate
which part of the system can be reuse? | application system, component reuse, object and function
block1AM you can not to combine multiple patterns | false
which is not the main benefit of software reuse? | creating and maintaining a component library
which is not a key factor that you should consider when planning reuse? | the name of application or component reuse
in the application or component are developed in different programming language | true
what are the benefits of software re-using? | to have faster delivery of system, lower cost
the trend reuse-based software engineering is an approach to | maximize the reuse of existing software
What is the purpose of defect testing: | to discover fault that make software's behavior incorrect
value less than 10 are rejected value less than 10 are rejected value greater than pr = 22 are rejected | 3, 10, 22
what is the normal order of activities in which software testing is organized | unit test; integration test; system test; validation test
which document identifies and describes the testing will be implemented and executed | test case
the testing intended to show that previously correct software has not been adversely affected by changed is called: | regression testing
workbenches are also call | all of the other choices
the main focus of acceptance testing is: | ensuring that the system is acceptable to all users
the effort required for locating and fixing an error in an operational program is: | testability
unit testing is a: | white box testing
a successful defect test is a test which causes a program to behave in an normal way | false
who review and approves the change request? | change control board
Which of following item would not come under configuration management? | live data
Which of following is the source for software version up ? | all of the other choices
software system are subject to continual change request from | developers, users, market forces
the customer want to make a change to the project scope. The best thing for the project team to evaluate is the: | effect of change on the project schedule, cost, quality, and risk
a configuration management system would not normally provide : | facility to compare test result with expected result
which is the change management concerned with : | keeping track the change
which are levels of protection in application security engineering | platform - levels, application - levels, recorded levels
Consider security design for username and password protection, what is the good design? | system user are authenticated
what is the first stage in survivability analysis? | indentify soft spots and survivability strategies.
password should be changed | when you suspect that password is compromised
why do we need consider security for project? | to protect the system again external attack
which of following design guidelines for secure systems engineering is not true? | avoid using redundancy and diversity to reduce risk
what is the last stage in survivability analysis? | review system requirements and architecture
all the following are the complementary strategies to achieve survivability EXCEPT | conversion
define the security terms "attack" | an exploitation of a system's
which is statement correct about integrity? | extent to which access to software or data by an auth....
probability of software failure is the | defect rate
password should be changed | when you forget the password
What is a method? | Step by step plan that can be used over and over many times to achieve a result
What are the software development activities? | Solution Requirements ,Design Solution, Develop Solution, Test Solution, Deploy Solution,Maintain Solution
What are some software engineering methods? | Waterfall, Unified Method (RUP), Spiral/Iterative, Agile/Scrum
What is a Software Engineering method? | Step by step plan that can be used over and over many times to build software systems.
Solution Requirements | Gathering what the system needs to do.This is understanding the problem.
Who gathers Requirements? | Systems Analysts, Software Engineers
How are Requirements documented? | Requirements Documents, User Cases & Scenarios, User Stories
Design Solution | Creating the solution the problem. This is devising a solution.
Who creates Designs? | Systems Architects, Software Designers, System Engineers
How are Designs documented? | Design Documents, UML Diagrams, Screen and Report Layouts
Develop Solution | Building all the components of a solution. This is implementing a solution.
Who develops solutions? | Project Managers, Software Developers, Programmers, Software Engineers
How are solutions documented? | Software Documentation, Process Documents, Training/Help Documents
Test Solution | Determining if all the system components work. This is evaluating the solution.
Who tests solutions? | Programmers, Testers, Quality Assurance
How is testing documented? | Test Plans, Test Cases, Acceptance Criteria
Deploy Solution | Putting the solution into production. Setting up up all production components. Often involves training users.
Who does deployment? | Development Team, Technical Operations, Trainers
How is deployment documented? | Operational Procedure, Configuration Plans, Technical Documents
Maintain Solution | Fixing and improving solution, Support, Monitoring Performance, Evaluating the Solution
Who maintains a solution | Operations Team, Development Team, Support Team
How is maintenance documented? | Bug Reports, Release Notes
Waterfall | All system development activities in linear sequence.
Spiral/Iterative | All system development activities repeated to develop a part of the product.
Rational Unified Method | A method framework for all system development activities primarily for OO development.
Agile | All activates repeated to develop a set of functions as working software in a time box of work.
Final | Final
1. Activity diagrams are used to support | The process view
2. With a good software design, which is benefit we will get | b. It helps to coordinate development teams to work together orderly
3. Which of the following is advantage of broker architecture | a. Changeability and extensibility
4. The outcomes of Object Oriented Analysis stage are | Requirement Specification, Initial logic structure of the system
5. Which of the following if limitation of Non-buffered Event-Based architecture | b. Reliability and overhead of indirect invocations
6. Package diagram is grouped in which of following UML diagram category | a. Structure diagram
7. The Architectural Decision Procedure includes following steps | 2-1-3
8. Design produces architectures that specify products and components in the form of which of the following | c. A detail-level design solution
9. Which of the following is TRUE for implementing the separation of the user interface from the logic of software system | b. The same logic can be accessed by different kinds of user interfaces
10. The constituent parts of the architecture of a system are which of the following | a. Its component, connectors, and the rules governing their interactions
11. Which diagram equivalent to a sequence diagram | d. Collaboration diagram
12. Which of the following is NOT benefit of distributed architecture | c. Testability
13. Which of the following architecture is suitable for the embedded system software design | b. Process-Control Architecture
14. When you are requested to develop a Radar software system, a Traffic management system, etc, which of the following architecture is the best suitable for development | b. PAC architecture
15. Which of the perspective where the connectors in software architecture might be classification into 4 types: Variable, environment resource, method, message | a. Based on connector�s information carrier
16. ATAM is which of the following methods | a. Architecture Trace-off Analysis Method
17. Repository architecture and Backboard architecture is categorized into which of the following architecture style | a. Data-centered architecture style
18. Which of the following is TRUE? | c. Hardware independence does not imply software independence
19. Which of the following is one limitation of Client/Server architecture | c. Server availability and reliability
20. Which of the following is limitation of message-driven architecture | a. Capacity limit of message queue
21. When will you apply the Batch Sequence architecture | a. Developing a system where each sub-system reads related input files and writes output files.
22. Which of the following attributes which could be observable at runtime | a. Availability, Security, Performance
23. Which of the following is one of advantages of Component-Based architecture | c. Productivity for the software development and future software development
24. The usability of a user interface is enhanced by consistency and integration | a. The usability of a user interface is enhanced by consistency and integration
25. Which of the following is a limitation of Layered architecture | a. Lower runtime performance
26. User interface Evaluation does NOT focus on which of following features | a. Only the tailor �able of the user interface
27. Quality attributes are used to make architectural decision, which of the following is NOT a quality attribute | c. Productivity
28. Which of the following is a limitation of component architecture | a. Adaption of components
29. The acronym SAPCO is used for which of following purpose | b. Describing the Satisfactory principles of user interface
30. Which of the following guides is NOT the guideline for mapping runtime elements in a software architecture design | a. If the two elements are mapped to a single process, the connector could be mapped to local method invocation
31. Polymorphism principles mean that�E | An object can have different appearance/behaviors under difference circumstances
33. Which of the following is NOT an architecture style in hierarchical architecture | a. Client-Server architecture
34. Which of the following is the limitation of Repository Architecture Style? | c. Data store reliability availability is a very important issue
35. a. High dependency between data structure of data store and its agency | a. High dependency between data structure of data store and its agency
36. Which of the following is NOT a buffer- based software architecture | a. Peer-to-peer connection
37. Which of the following is a buffer- based software architecture | b. Publish-Subscribe Messaging(P&S)
38. In UML 2.0, which diagram derived from use case scenarios | c. Use-case diagram
39. Which of the following is an Open-Close principle�s implication | c. Keep attributes private
40. Which of the following is NOT the benefit of multi-tier architecture style | C- Load balancing
41. In Client-Server architecture style, there are follow types | B- Thin-client, Fat-client
42. In Thin-client type, the server includes which of the following processing | C- Data storage processing, Business Logic Processing
43. In Fat-client type, the server includes which of the following processing | A- Presentation processing, Business Logic Processing
44. Which of the following is the design style could be applicable in Weather broadcast, Pattern recognition and authentication security systems? | Blackboard
45. Which of following structures describe the static properties of software architecture | a. Software code structure.
46. Which of following structures describe the dynamic properties of software architecture | b. Software runtime structure
47. Which of the following notations is used to support the physical view | d. None of the above
48. Which of the following are benefits of OO design | e. All of the above.
49. Which of the following are features of OO methodology | c. Inheritance
50. Which are the categories of operations that a class can provide | b. Constructor, Destructor, Accessor, Mutator
51. Polymorphism implies the following: < knowledge of OOP, need review> | d. All of the others
52. Which of the following are considered as Runtime attribute | d. Availability, Security, Performance, Usability
53. Which of the following is not an Open-Closed principle�s implication | a. Feel free to change software code
54. What is a class involved in accomplishing the responsibility of a class called in CRC modeling | c. Collaborator
55. Which of the following diagram is NOT an structural diagram | d. Sequence diagram
56. In UML 2.0 Which of the following is true | b. Sequence Diagram both concurrencies and loops can be specified
57. In a sequence diagram, boxes on top of the diagram can represent classes, objects and actors. We found a description of a box as follow �John:Doctor�E Which of the following is correct expression | c. An object named �John�Ewhose class is �Doctor�E
58. Which of the following is Open-Closed principle | d. Open to extension, Close to modification
59. Which is not a structure which can be described in a software architecture | a. Dynamic structure
60. Which view in �E+1�Eview model identifies software modules and their boundaries, interfaces, external environment, usage scenarios | d. Logical view
61. Which of the following are not benefits of pipe and filter | b. Interactive
62. Which of the following are not benefits of batch sequential | f. All of the above
The below image is a snapshot of which architecture styles following | d. Event-based architecture
64. The follow image is an example of | d. Repository architecture
65. Which of the following is true about buffered message system | d. All of the others
66. The below image is a snapshot of which architecture styles following | b. Repository architecture
67. Which of the following architecture is suitable for the embedded system software design | c. Process-Control Architecture
68. Which of the following is an Open-Close principle�s implication | b. Separate interface and implementation
69. Based on connector�s information carrier, the connectors in software architecture might be classification into | b. Variable, Environment resource, Method, Message
70. Which of the following diagram called | c. Sequence diagram
71. Polymorphism principles means that | a. An object can have different appearance/behaviors under different circumstances.
72. Which of the following are considered as Business attributes | d. Time to market, Lifetime, Cost
73. When will you apply the Process-Control architecture | a. Developing a system which needs to maintain an output data at a stable level
74. The Architectural Decision Procedure includes following steps | c. 2 => 1 => 3
75. ATAM is which of the following methods | c. Architecture Trade-off Analysis Method
76. Which of the following is one of distributed architecture | b. Service Oriented architecture
77. Which of the following is a PAC architecture benefit | d. All of the others
78. State machine diagram is grouped in which of following UML diagram category | a. Behavioral Diagrams
79. Sequence diagram are used to support | a. The logical view
80. Which of the following is a typical style of Hierarchical architecture | d. Hierarchical structure, Layered, Master-Slave, Virtual Machine
81. The following diagram is a description of which architecture style | a. Blackboard architecture
82. 1) is better because of which following | c. Easy expansion
83. Compared with Service Oriented Architecture (SOA), the advantage of Component Based Architecture (CBA) is which of the following | b. Allows stateful service
84. In UML 2.0, Which diagram describes time sequence of messages passed between objects in timeline | e. Sequence Diagram
85. In Non-buffered Event-based architecture, how many partitions a system could be broken into | c. 2 partitions
86. Portability refers to | c. The level of independence of the system on software and hardware platforms
87. Which is the benefit of MVC | a. Multiple views synchronized with same data model
c. One of limitation of Batch Sequence architecture is that it does not support for interactive interfaces | c. One of limitation of Batch Sequence architecture is that it does not support for interactive interfaces
89. Which diagram is equivalent to a sequence diagram? | c. State machine diagram
90. Which of the following is TRUE for implementing the separation of the user interface from the logic of the software system | d. The same logic can be accessed by different kinds of user interfaces.
94. Which of the followings are not benefits of batch sequential | f. All
95. Which of the following is not a benefit of repository architecture | c. Concurrency
96. Which of the following is a typical design domain of blackboard architecture | a. AI system
97. Which of the following is not a benefit of hierarchical architecture | b. Interactive
98. Which of the following is a disadvantage of hierarchical architecture | c. Incremental
99. Which of the following is one of the benefits of asynchronous architecture | d. Loose coupling of modules
100. Which of the followings is not typical design domain of the asynchronous architecture | c. Web server site application
101. Which of the following is not a benefit of the MVC architecture | a. Supports multiple independent agents
102. Which of the following is a typical design domain for the MVC architecture | c. Web server site application
103. Which of the following is not one of the benefits of distributed architecture | c. Supports multiple views
104. Which of the following is not a typical style of distributed architecture | b. Hierarchical structure
106. Which of the following is not a benefit of component architecture | a. Performance
108. Which of the following is true about heterogeneous architecture | c. If the general structure of a system is connected using one architecture style, and each component can use a different one, this is one example of heterogeneous architecture
114. In SOA architecture, Interoperability means what | c. Technically any client or any services regardless of their Platform, Technology, Vendors, Language implementations
118. SAPCO stands for which | a. It refers to five major principles interface design considers: Simple, Aesthetic, Productive, Customizable, Other
121. In user interface evaluation step, we should focus on what | c. The usability of the interface
At software developement time, the software element are | source code modules or files which...
Which of following is Not True about Detailed design step? | We will describe...
For sofware project resource allocation, the sofware element are.. | Specific manipulation
129. UML diagrams are ________ which are used for system analysis and design | Tools
Which of the following is NOT TRUE about Architecurak design step | Wel will describe the interconnection the components which visible to stakeholders
Which of the design below is better | Co 3 draw o duoi
At sofware deployment time, the sofware element are___ | The executable version
Architects use___in sofware construction to divide and conquer the complexities of a problem domain to solve the problem. | Various design strategies
What is an arechitecture design space | dai nhat thi chon
The following diagram is a description of which architecture style? | 3 angent -> data source. DAP AN: REPOSITORY
When you apply Layered Architechture style into system architecture design , why run time performance of the system might be slow | A client request or a response to client must go through potentially several layrers.
Batch Sequence Architecture | Batch Sequence Architecture
Which the reasoning method that starts with the initial state of data and proceeds towards a goal | Forward Reasoning
Which of the following are benefits of Non-buffered Event Based architecture | Framework availabity ,Reusablity of components, Possibility of parallel execution
You will apply the batch sequential architecture when? | Developing a system where intermediate file is a sequential access fileWhich is NOT the way to make the data flow in Pipe and Filter architecture | Leave data in a center repository
Which is the purpose of Main-Subroutine Architecture? | To reuse the subroutines
Both Sequential and Parallel processing are supported by | Pipe and Filter Architecture
A Component is NOT___. Which is the best choice? | A whole system which could be executed independent
In interaction oriented software architecture,_____ is responsible for visual or audio data output presentation and it may also provide user input interface as well when necessary. Which is the best choice? | The view presentation module
The key point of the interaction oriented software architecture is ___ Which is the best answer | C. In the separation of user interaction from data abstraction and business data processing
The important features of a distributed architecture are ______. Which is the best choice? | B. all of the others
In Interaction oriented software architecture, ___ provides the data abstraction and all core business logic on data processing. Which is the best choice? | The data module
Which of the following is the correct statement about Component-based architecture? | - it divides the problem into sub-problem each associated with component partitions
-The interaction oriented software architecture decomposes the system into___. Which is the best choice? | 3 major partitions �EData module, Control module, Presentation Module
Which of the following statement is a correct description about the job of an architecture designer? | Exhaust all possible solutions, pick up the best one
Which of the following is the main motivation of Component-based architecture? | Component reusability
What of the following statement about the characteristic in Service-oriented and Broker are Correct? | Both are hard
Which of below description is a benefit of PAC architecture style? | Complete separation
Three-tier and Client-Server architecture | Three-tier and Client-Server architecture
Which of the following attribute related to time and space? | Efficiency
Which of the following attribute related to error tolerance and avaibility? | Reliability
Which of the following attribute related to hardware independence and installability? | Portability
Which is the reason when you apply component-based architecture, overall system reliability will be increased? | you could increase the reliability....
in MVC, said that it is easy to plug-in new or change interface views mean thich of following? | it allows updating...
what of following characteristic do MVC and PAC both have? | Support for developing
1. Which of the following is NOT the benefit of multi-tier architecture style | C- Load balancing (correct)
2. Event-based architecture is difficult to test and debug | A- True (correct)
3. Main- subroutine architecture can also be applied in any object-oriented software design | B- False
4. Component deployment is a good practice in a layered architecture. | A- True
6. Client-server architecture is general is better availability than the multi-tier model | B- False
8. Sequential flow control can be predetermined in batch sequential | A- True
9. Facts are installed in the Blackboard component of the Blackboard architecture? | A- True
10. RPG is widely used to implement batch sequential | A- True
11. Event-based architecture style is a buffered architecture | False
12. Only directly adjacent layers can invoke each other�s methods in a layered architecture. | B- False
13. Java can be used to implement a pipe and filter design system | A- True
14. The control flow in batch sequential is implicit. | True
16. In Thin-client type, the server includes which of the following processing | C- Data storage processing, Business Logic Processing
17. Implicit notification is often used in blackboard architecture | A- True
18. The control flow in pipe and filter is explicit. | A- True
19. FPT�s University CMS is an example of repository design | True
20. The master-slave architecture is a specialized form of main-subroutine architecture | True
21. In Fat-client type, the client includes which of the following processing | A- Presentation processing, Business Logic Processing
22. Repository architecture design could NOT be object-oriented design | True
23. Agents in the repository architecture normally do not talk with each other directly, except thought the data store. | True
24. which of the following is the design style could be applicable in Weather broadcast, Pattern recognition and authentication security systems? | D- Blackboard architecture
25. Rule-based knowledge is installed in the blackboard component of the blackboard architecture. | True
The testing of synchronous architecture is more straightforward than asynchronous architecture. | True
27. Two modules in a data flow system can change their order without any constrains. | B- False
28. Multiple event targets can register with same event source. | A- True
29. Hierarchical architecture is a procedure-oriented design paradigm only. | A- False
30. Sequential flow control can be predetermined in pipe and filter. | A- True
32. Which of the following is not an open-close principles�s implication? | b. Feel free to change software code.
33. Architecture design is about choosing the right single architecture style for a project | b. False
34. Software quality attributes must satisfy functional requirements | b. False
35. UML diagrams are used for system analysis and design | a. True
36. The CRC card method in used to identify the responsiblities of each class | True
37. Which of the following notations is used to support the physical view? | d. Non of the others
38. Which of the following are considered as implementation attributes? | a. Interoperability, maintainability, prortability, fexibility
39. Which of the following notations is used to support the logical view? | d. All of the others
40. Pipe-and-Filter is one of the architecture styles | True
41. In a sequence diagram, boxes on top of the diagram can represent classes, objects, and actors. We found a desscription of a box as follow �John:Doctor�E Which of the following is correct experssion? | a. An object named �John�Ewhose class is �Doctor�E
c. Sequence diagram both concurrencies and loops can be specified | c. Sequence diagram both concurrencies and loops can be specified
43. Which of the following diagram is NOT an structural diagram | 43. Which of the following diagram is NOT an structural diagram
44. The purpose of the software design phase is to product a software requirement specification | False
45. What is a class involved in accomplishing the responsibility of a class called in CRC modeling? | a. Collaboration
47. Which of the following is open-close principle? | b. Open to extension, close to modification
48. Use case diagrams are generated in the early stages of the SDLC. Whereas deloyment diagrams are generated in the later stges of the SDLC. | a. True
49. Software architecture design is based on the software requirement specification | True
50. Which are the categories of operations that a class can provide? | b. Constructor, Destructor, Accessor, Mutator
51. Which of the following are considered as Runtime attributes | b. Availability, Security, Performance, Usabilty
52. Object-oriented design is a design methodology | True
53. Which view in �E+1�Eview model identifies software module and their boundaries, interfaces, external environment usage senarios, etc. | a. Logical view
54. Which of the following is a feature of object oriented methodology? | d. Inheritance
55. Which is NOT a structure which can be described in a software architecture? | c. Operation structure
56. Architecture styles contribute to software quality attributes | a. True
57. Which of the following structures descibe the dynamic properties of software architecture? | c. Software runtime structure
58. Abstraction via inheritance is one effctive way to achieve the open-close principle | True
59. Polymorphism implies the following | c. All of the others
60. Which of the following are benefits of object oriented design | e. All of the others
61. Which of the following is an architecture design evaluation methodology? | a. SAAM
62. SAAM relies on scenarios to test an architecture design | b. True
63. Which of the following is NOT a benefit of Component architecture | a. Performance
64. RMI is an example of the broker architecture | b. True
65. Which of the following is NOT a typical style of distributed architecture? | MVC
66. In SOA architecture, Interperability means what? | c. Technically any client or any services regardless of their Platform, Technology, Vendors, Language implementations
67. Event-based architecture is appropriate for a compiler in an IDE design | a. False.
68. The image below is an example of static style of user interce�slaout? Which which is the correct answer? | a. It�s 1D layout
69. The abstraction and presentation components in a PAC agent do not talk to each other directly | a. True
70. The PAC architecture is a hieracchically structured sofware architecture | a. True
71. There is always onlyone architecture design that can meet all requirements | a. False
a. The usability of a user interface is enhanced by consistency and integration. | a. The usability of a user interface is enhanced by consistency and integration.
73. A component architecture can be derived from use case analysis and business concept diagrams | a. True
74. Which of the following is NOT the benefit of Broker architecture style? | a. Easy in testing
75. Blackboard architecture is difficult to debug and test. | True
76. Modifiability and expandability are essentially the same quality attribute. | False
78. Implicit notication is often used in the MVC architecture. | True
79. Google Map is an example of services in SOA architecture | True
80. The interaction operations in the use case diagrams should be included as part of provided interfaces of components. | a. True
81. Many MVC vender framework toolkits are available is one of the benefits of MVC architecture style | True
82. Which of the following is TRUE about heterogeneous architecture? | c. If the general structure of a system is connected using one architecture style, and each component can use a different one, this is an example of heterogeneous architecture
83. Coupling in message-driven architecture is even looser than in event-driven architecture | a. True
84. Batch sequential architecture is general more time efficient then pipe and filter | False
85. In user interface design step.User-centered factor consideration means what? | d. Designers must take into account the needs, experiences, and capabilities of the system users.
86. Core type classes can be recognized as a new component | True
87. SAPCO stands for which? | a. It refers to five major principles interface design considers:Simple, Aesthetic, Productive, Customizable, Other
88. Which is the most appropriate architecture style to develop a radar system like below? | PAC
89. In CORBA architecture, IDL-Stubs is which correspoding component in the Broker Architecture Style? | b. Client-side proxy
90. In user interface evaluation step, we should focus on what? | c. The usability of the interface
1. The constituent elements of software architecture are software elements and their connections | False
2. Software architecture design involves many software design methodologies and architecture styles. | True.
3. Software architecture = software architecture styles. | False.
4. Which of the following structures describe the static properties of software architecture? | Software code structure.
5. Different architecture structures have different element and connector types. | True.
6. Element and connector attributes are derived from the project requirements. | True.
7. Divide-and-conquer is not a suitable methodology for architecture design. | False.
8. Deployment decisions should be reflected in early architecture designs. | False.
9. Activity diagrams are used to support the process view. | True.
10. Deployment diagrams are used to support the physical view. | True.
11. Component diagrams are used to support the development view. | True.
12. The software sub modules and their interfaces are described in the logical view. | True.
13. Concurrency control activity is part of the process view. | True
14. System and network configuration decisions are part of the physical view. | True.
15. Software architecture is concerned only with functional requirements. | False.
16. Prototyping can be used to support UI design. | True.
17. ADL is a programming language. | False.
18. ADL can produce target code. | True.
19. ADL is used only for software architecture specification. | False.
20. Composite structure diagrams are based on object diagrams. | True.
21. Component diagrams are based on object diagrams. | True.
22. A UML diagram must provide a complete view of the entire software system. | True.
23. A component is a class or an object. | False.
24. Asynchronous message invocation can be expressed in sequence diagrams. | True.
25. Conditional branching can be represented in sequence diagrams. | True.
26. An activation in an object lifeline may have its own cycle message pointed back to itself in a sequence diagram. | True.
27. An interaction overview diagram is based on all low-level interaction diagrams. | True.
28. Architecture design is about choosing the right single architecture style for a project | F
1. Which of the following are not benefits of pipe and filter? | Interactive.
2. Which of the followings are not benefits of batch sequential? | Interactive.
3. COBOL is widely used to implement batch sequential. | True.
4. Two modules in a data flow system can change their order without any constraints. | False.
5. Java can be used to implement a pipe and filter design system. | True.
6. The control flow in pipe and filter is explicit. | True.
7. The control flow in batch sequential is implicit. | True.
8. There are data sharing (shared data) among all subsystems in a data flow system. | False.
9. Sequential flow control can be predetermined in pipe and filter. | True.
10. Sequential flow control can be predetermined in batch sequential. | True.