Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. Which of the following is software engineer’s primary characteristics?
a) A collection of useful tools that will help in every step of building a product
b) An organized layout that enables tools to be found quickly and used efficiently
c) A skilled artisan who understands how to use the tools in an effective manner
d) All of the mentioned

View Answer

Answer: d

2. Database management software serves as a foundation for the establishment of a CASE database (repository) that we call
a) project database
b) system database
c) analysis and design tools
d) prototyping tools

View Answer

Answer: a [Reason:] Given the emphasis on configuration objects, database management tools for CASE are evolving from relational database management systems to object oriented database management systems.

3. What enables a software engineer to define screen layout rapidly for interactive applications?
a) Analysis and design tools
b) Tool kit
c) Screen painters
d) PRO/SIM tools

View Answer

Answer: c [Reason:] More sophisticated CASE prototyping tools enable the creation of a data design, coupled with both screen and report layouts.

4. _________tools assist in the planning, development, and control in CASE.
a) Dynamic measurement
b) Data acquisition
c) Test management
d) Cross-functional tools

View Answer

Answer: c

5. Which tools cross the bounds of the preceding categories?
a) Data acquisition
b) Dynamic measurement
c) Cross-functional tools
d) Simulation

View Answer

Answer: c

6. Which environment demands specialized testing tools that exercise the graphical user interface and the network communications requirements for client and server?
a) Dynamic analysis
b) Client/Server
c) Re-engineering
d) Test management

View Answer

Answer: b [Reason:] A client/server architecture is GUI based.

7. Which tools are used to modify on-line database systems?
a) Reverse engineering specification tools
b) Code restructuring and analysis tools
c) Test management tools
d) On-line system re-engineering tools

View Answer

Answer: d [Reason:] For example these tools convert IDMS or DB2 files into entity-relationship format.

8. Which is the definition of objects in the database that leads directly to a standard approach for the creation of software engineering documents.
a) Document standardization
b) Data integrity
c) Information sharing
d) Data/data integration

View Answer

Answer: a

9. Which of the following term is best defined by the statement: “CASE tools and the target applications are isolated from physical storage so they are not affected when the hardware configuration is changed.”?
a) Non-redundant data storage
b) Data independence
c) Data dependence
d) Adhoc data queries and reports

View Answer

Answer: b

10. Which of the following term is best define by the statement:”Each object is stored only once, but is accessible by all CASE tools that need it.”?
a) Non-redundant data storage
b) Data independence
c) Transaction control
d) Adhoc data queries and reports

View Answer

Answer: a

Set 2

1. What is testing process’ first goal?
a) Bug prevention
b) Testing
c) Execution
d) Analyses

View Answer

Answer: a [Reason:] Its better to prevent a bug rather than putting time in its testing and removal.

2. Software mistakes during coding are known as
a) errors
b) failures
c) bugs
d) defects

View Answer

Answer: c [Reason:] A software bug is an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result.

3. Name an evaluation technique to assess the quality of test cases.
a) Mutation analysis
b) Validation
c) Verification
d) Performance analysis

View Answer

Answer: a [Reason:] Mutation analysis is used to design new software tests and evaluate the quality of existing software tests.

4. Test should be conducted for every possible
a) data
b) case
c) variable
d) all of the mentioned

View Answer

Answer: d [Reason:] It increases the scope for code inspection.

5. Which of the following is not a part of bug report?
a) Test case
b) Output
c) Software Version
d) LOC

View Answer

Answer: d [Reason:] Line of code(LOC) is immaterial during testing, as it is an exhaustive process.

6. Which of the following is not a part of Execution Flow during debugging?
a) Step Over
b) Step Into
c) Step Up
d) Step Out

View Answer

Answer: c [Reason:] Step Into executes code, Step Out continues execution until bound value and Step Over is to execute code without stopping.

7. Cyclomatic Complexity method comes under which testing method.
a) Yellow box
b) White box
c) Gray box
d) Black box

View Answer

Answer: b [Reason:] Cyclomatic Complexity tells us about the number of indepoendent paths in a program which is covered in white box testing.

8. Which is a black box testing technique appropriate to all levels of testing?
a) Acceptance testing
b) Regression testing
c) Equivalence partitioning
d) Quality assurance

View Answer

Answer: c [Reason:] Equivalence partitioning is a software testing technique that divides the input data of a software unit into partitions of equivalent data from which test cases can be derived.

9. Which of the following is the way of ensuring that the tests are actually testing code?
a) Control structure testing
b) Complex path testing
c) Code coverage
d) Quality assurance of software

View Answer

Answer: c

10. Effective testing will reduce _______ cost.
a) maintenance
b) design
c) coding
d) documentation

View Answer

Answer: a [Reason:] Remaining options are a part of development process.

11. Which of the following is a common pointwer problem?
a) Data sharing errors
b) Accessing data elements of the wrong type
c) Attempting to use memory areas after freeing them
d) All of the mentioned

View Answer

Answer: d [Reason:] These are the common errors programmers make while coding.

Set 3

1. Which of the following examples does not involve dependability engineering ?
a) Medical Systems
b) Power Systems
c) Library Management
d) Telecommunications

View Answer

Answer: c [Reason:] Software customers expect all software to be dependable. However, for non-critical applications such as certain management systems, they may be willing to accept some system failures.

2. What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
a) Fault Avoidance
b) Fault detection
c) Fault tolerance
d) None of the mentioned

View Answer

Answer: a [Reason:] In Fault Avoidance, the system is developed in such a way that human error is avoided and thus system faults are minimised.

3. What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
a) Fault Avoidance
b) Fault detection
c) Fault tolerance
d) None of the mentioned

View Answer

Answer: c

4. Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants”?
a) Diverse
b) Documentable
c) Auditable
d) None of the mentioned

View Answer

Answer: c [Reason:] It means that process standards are being followed and make suggestions for process improvement.

5. Which of the following is not a Protection system ?
a) System to stop a train if it passes a red light
b) System to indicate not returning of the library book
c) System to shut down a reactor if temperature/pressure are too high
d) None of the mentioned

View Answer

Answer: b [Reason:] A Protection system is a specialized system that is associated with some other control system, which can take emergency action if a failure occurs.

6. The use of a well-defined, repeatable process is essential if faults in a system are to be minimized.
a) True
b) False

View Answer

Answer: a [Reason:] The answer is self explanatory.

7. Which of the following is a Strategy to achieve Software diversity ?
a) Different programming languages
b) Different design methods and tools
c) Explicit specification of different algorithms
d) All of the mentioned

View Answer

Answer: d [Reason:] Diversity means to provide the same functionality in different ways so that critical components of a dependable system will not fail in the same way.

8. Exception handling is a mechanism to provide some fault avoidance.
a) True
b) False

View Answer

Answer: b [Reason:] Exception handling is a mechanism to provide some fault tolerance.

9. Which of the following is a bad practice of Dependable programming ?
a) Limit the visibility of information in a program
b) Check array bounds
c) Check all inputs for validity
d) None of the mentioned

View Answer

Answer: d [Reason:] All the options are good practices to achieve Dependability Engineering.

10. What is a Range check?
a) Check that the input does not exceed some maximum size e.g. 40 characters for a name
b) Check that the input falls within a known range
c) Use information about the input to check if it is reasonable rather than an extreme value
d) None of the mentioned

View Answer

Answer: b

Set 4

1. A characteristic of a software system that can lead to a system error is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure

View Answer

Answer: b

2. An erroneous system state that can lead to system behavior that is unexpected by system users is known as?
a) Human error or mistake
b) System fault
c) System error
d) System failure

View Answer

Answer: c

3. An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____________
a) Human error or mistake
b) System fault
c) System error
d) System failure

View Answer

Answer: d

4. A chemical plant system may detect excessive pressure and open a relief valve to reduce these pressures before an explosion occurs. What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal

View Answer

Answer: d [Reason:] The system is designed so that hazards are detected and removed before they result in an accident.

5. An aircraft engine normally includes automatic fire extinguishers.What kind of dependability and security issue the example states?
a) Hazard avoidance
b) Damage limitation
c) Hazard detection
d) Hazard detection and removal

View Answer

Answer: b [Reason:] The system may include protection features that minimize the damage that may result from an accident.

6. An assessment of the worst possible damage that could result from a particular hazard is known as
a) Risk
b) Hazard probability
c) Hazard severity
d) Mishap

View Answer

Answer: c [Reason:] Hazard severity can range from catastrophic, where many people are killed, to minor, where only minor damage results. When an individual death is a possibility, a reasonable assessment of hazard severity is ‘very high’.

7. which of the following terms is a measure of the probability that the system will cause an accident?
a) Risk
b) Hazard probability
c) Accident
d) Damage

View Answer

Answer: a [Reason:] The risk is assessed by considering the hazard probability, the hazard severity, and the probability that the hazard will lead to an accident.

8. A weakness in a computer-based system that may be exploited to cause loss or harm is known as?
a) Vulnerability
b) Attack
c) Threat
d) Exposure

View Answer

Answer: a

9. A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.
a) risk
b) control
c) attack
b) asset

View Answer

Answer: b [Reason:] A control protective measure that reduces a system’s vulnerability.

10. The safety of a system is a system attribute that reflects the system’s ability to operate, normally or abnormally, without injury to people or damage to the environment.
a) True
b) False

View Answer

Answer: a

Set 5

1. Static Analysis involves executing a program.
a) True
b) False

View Answer

Answer: b [Reason:] Static analysis techniques are system verification techniques that don’t involve executing a program.

2. Which of the following is a technique covered in Static Analysis ?
a) Formal verification
b) Model checking
c) Automated program analysis
d) All of the mentioned

View Answer

Answer: d

3. Select the disadvantage of using Formal methods
a) Concurrent systems can be analysed to discover race conditions that might lead to deadlock
b) Producing a mathematical specification requires a detailed analysis of the requirements
c) They require the use of specialised notations that cannot be understood by domain experts
d) All of the mentioned

View Answer

Answer: c [Reason:] Formal methods are the ultimate static verification technique that may be used at different stages in the development process.

4. Which of the following is incorrect with respect to Model Checking?
a) Model checking is particularly valuable for verifying concurrent systems
b) Model checking is computationally very inexpensive
c) The model checker explores all possible paths through the model
d) All of the mentioned

View Answer

Answer: b [Reason:] Model checking is very expensive.It is only practical to use it in the verification of small to medium sized critical systems.

5. Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”.
a) Control Faults
b) Data Faults
c) Input/Output Faults
d) Interface faults

View Answer

Answer: b

6. Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”.
a) Control Faults
b) Data Faults
c) Input/Output Faults
d) Interface faults

View Answer

Answer: a

7. Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”.
a) Storage management faults
b) Data Faults
c) Input/Output Faults
d) Interface faults

View Answer

Answer: d

8. Static analysis is now routinely used in the development of many safety and security critical systems.
a) True
b) False

View Answer

Answer: a [Reason:] The static analyzer can discover areas of vulnerability such as buffer overflows or unchecked inputs

9. Which level of Static Analysis allows specific rules that apply to a program to be checked ?
a) Characteristic error checking
b) User-defined error checking
c) Assertion checking
d) All of the mentioned

View Answer

Answer: b [Reason:] Users of a programming language define error patterns, thus extending the types of error that can be detected.

10. Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”.
a) Storage management faults
b) Data Faults
c) Input/Output Faults
d) Interface faults

View Answer

Answer: a

.woocommerce-message { background-color: #98C391 !important; }