Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. What type of fault remains in the system for some period and then disappears?
a) Permanent
b) Transient
c) Intermittent
d) All of the mentioned

View Answer

Answer: b [Reason:] For example many faults in communication systems are transient in nature.

2. Which of the following approaches are used to achieve reliable systems?
a) Fault prevention
b) Fault removal
c) Fault tolerance
d) All of the mentioned

View Answer

Answer: d [Reason:] All the options lead to formation of a reliable system.

3. A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of
a) Full Fault Tolerance
b) Graceful Degradation
c) Fail Soft
d) Fail Safe

View Answer

Answer: d

4. Which of the following Error Detection checks is not a part of Application detection?
a) Hardware checks
b) Timing checks
c) Reversal checks
d) Coding checks

View Answer

Answer: a [Reason:] Hardware is a part of environment detection check.

5. Exception handling is a type of
a) forward error recovery mechanism
b) backward error recovery mechanism
c) All of the mentioned
d) None of the mentioned

View Answer

Answer: a [Reason:] Exception handling is a forward error recovery mechanism, as there is no roll back to a previous state; instead control is passed to the handler so that recovery procedures can be initiated.

6. Non-occurrence of improper alteration of information is known as
a) Available Dependability
b) Confidential Dependability
c) Maintainable Dependability
d) Integral Dependability

View Answer

Answer: d [Reason:] Integrity is to keep the original content safe from alteration.

7. In N-version programming which is the independent generation of N, the value of N is
a) greater than 1
b) less than 1
c) greater than 2
d) less than 2

View Answer

Answer: c [Reason:] N-version programming (NVP), also known as multiversion programming or multiple-version dissimilar software, is a method or process in software engineering where multiple functionally equivalent programs are independently generated from the same initial specifications.

8. In Log-based fault tolerance, logs of undetermined events are saved and replayed on failure.
a) True
b) False

View Answer

Answer: a

9. All fault-tolerant techniques rely on
a) Integrity
b) Dependability
c) Redundancy
d) None of the mentioned

View Answer

Answer: c [Reason:] All fault-tolerant techniques rely on extra elements introduced into the system to detect & recover from faults.

10. It is imperative for a communicating processes to reach consistent recovery points to avoid the _________ effect, with backward error recovery mechanism.
a) Static
b) Dynamic
c) Domino
d) Whirlpool

View Answer

Answer: c

Set 2

1. Which one of the following is a functional requirement ?
a) Maintainability
b) Portability
c) Robustness
d) None of the mentioned

View Answer

Answer: d [Reason:] All are non-functional requirements representing quality of the system. Functional requirements describe what the software has to do.

2. Which one of the following is a requirement that fits in a developer’s module ?
a) Availability
b) Testability
c) Usability
d) Flexibility

View Answer

Answer: b [Reason:] A developer needs to test his product before launching it into the market.

3. “Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What kind of a requirement the system is providing ?
a) Functional
b) Non-Functional
c) Known Requirement
d) None of the mentioned

View Answer

Answer: a [Reason:] Functional requirements describe what the software has to do.

4. Which of the following statements explains portabililty in non-functional requirements?
a) It is a degree to which software running on one platform can easily be converted to run on another platform
b) It cannot be enhanced by using languages, OS’ and tools that are universally available and standardized
c) The ability of the system to behave consistently in a user-acceptable manner when operating within the environment for which the system was intended
d) None of the mentioned

View Answer

Answer: a [Reason:] Option c is termed as reliability and option e refers to efficiency.

5. Functional requirements capture the intended behavior of the system.
a) True
b) False

View Answer

Answer: a [Reason:] The behavior of functional requirements may be expressed as services, tasks or functions the system is required to perform.

6. Choose the incorrect statement with respect to Non-Functional Requirement(NFR).
a) Product-oriented Approach – Focus on system (or software) quality
b) Process-oriented Approach – Focus on how NFRs can be used in the design process
c) Quantitative Approach – Find measurable scales for the functionality attributes
d) Qualitative Approach – Study various relationships between quality goals

View Answer

Answer: c [Reason:] Quantitative Approaches in NFRs are used to find measurable scales for the quality attributes like efficiency, flexibility, integrity, usability etc.

7. How many classification schemes have been developed for NFRs ?
a) Two
b) Three
c) Four
d) Five

View Answer

Answer: d [Reason:] Software Quality Tree [Boehm 1976], Roman [IEEE Computer 1985], Process-Product-External considerations [Sommerville 1992], Mc Call’s NFR list and Dimensions of Quality–Components of FURPS+ are the five classification schemes for NFRs. .

8. According to components of FURPS+, which of the following does not belong to S ?
a) Testability
b) Speed Efficiency
c) Serviceability
d) Installability

View Answer

Answer: b [Reason:] Speed Efficiency belong to Performance (P) in FURPS+ .

9. Does software wear & tear by decomposition ?
a) Yes
b) No

View Answer

Answer: b [Reason:] Unlike hardware, software is reliable.

10. What are the four dimensions of Dependability ?
a) Usability, Reliability, Security, Flexibility
b) Availability, Reliability, Maintainability, Security
c) Availability, Reliability, Security, Safety
d) Security, Safety, Testability, Usability

View Answer

Answer: c [Reason:] All the traits of option c sync with dependability.

11. Choose the correct statement on how NFRs integrates with Rational Unified Process ?
a) System responds within 4 seconds on average to local user requests and changes in the environment
b) System responds within 4 seconds on average to remote user requests and changes in the environment
c) All of the mentioned
d) None of the mentioned

View Answer

Answer: b [Reason:] System response to a local user is 2 seconds on average.

Set 3

1. CMM stands for
a) Capability Management Module
b) Conservative Maturity Model
c) Capability Maturity Module
d) Capability Maturity Model

View Answer

Answer: d [Reason:] The Capability Maturity Model for Software describes the principles and practices underlying software process maturity and is intended to help software organizations improve the maturity of their software processes in terms of an evolutionary path from adhoc, chaotic processes to mature, disciplined software processes.

2. The ISO 9000 series of standards is a program that can be used for external quality assurance purposes.
a) True
b) False

View Answer

Answer: b [Reason:] The ISO 9000 series of standards is a set of documents.

3. According to ISO 9001, the causes of nonconforming product should be
a) deleted
b) eliminated
c) identified
d) eliminated and identified

View Answer

Answer: d [Reason:] ISO 9001 requires that the causes of nonconforming product to be identified. Potential causes of nonconforming product are eliminated.

4. .CO poliy in CMM means
a) The leadership practices in Commitment to Perform
b) The organizational structure (groups) practices in Ability to Perform
c) The policy practices in Commitment to Perform
d) The planning practices in Commitment to Perform

View Answer

Answer: c [Reason:] CMM have certain policy practices covered under .CO policy.

5. ISO 9001 is not concerned with ____________ of quality records.
a) collection
b) maintenance
c) verification
d) dis-positioning

View Answer

Answer: c [Reason:] The practices defining the quality records to be maintained in the CMM are distributed throughout the key process areas in the various Activities Performed practices.

6. Which of the following is not a maturity level in CMM?
a) Design
b) Repeatable
c) Managed
d) Optimizing

View Answer

Answer: c [Reason:] The CMM is organized into five maturity levels as namely: Initial, Repeatable, Defined, Managed and Optimizing.

7. In CMM, the life cycle activities of requirements analysis, design, code, and test are described in
a) Software Product Engineering
b) Software Quality Assurance
c) Software Subcontract Management
d) Software Quality Management

View Answer

Answer: a [Reason:] In CMM planning these activities is described in Software Project Planning, however the life cycle activities of requirements analysis, design, code, and test are described in Software Product Engineering.

8. Which of the following requires design control measures, such as holding and recording design reviews and qualification tests?
a) CMM
b) ISO 9001
c) ISO 9000-3
d) None of the mentioned

View Answer

Answer: c [Reason:] ISO 9000-3 states that the supplier should carry out reviews to ensure the requirements are met and design methods are correctly carried out.

9. The CMM emphasizes
a) continuous process improvement
b) the need to record information
c) the need to accept quality system
d) none of the mentioned

View Answer

Answer: b [Reason:] CMM emphasizes the need to record information for later use in the process and for improvement of the process.

10. _______ states that, where appropriate, adequate statistical techniques are identified and used to verify the acceptability of process capability and product characteristics.
a) ISO 9001
b) ISO 9000-4
c) CMM
d) All of the mentioned

View Answer

Answer: a [Reason:] ISO 9001 states that, where, appropriate adequate statistical techniques are identified and used to verify the acceptability of process capability and product characteristics.

Set 4

1. Project management involves the planning, monitoring, and control of the people, process, and events that occur as software evolves from a preliminary concept to an operational implementation.
a) True
b) False

View Answer

Answer: a

2. Which of the following is not an effective software project management focus?
a) people
b) product
c) popularity
d) process

View Answer

Answer: c [Reason:] Effective software project management focuses on the four P’s: people, product, process, and project.

3. PM-CMM stands for
a) people management capability maturity model
b) process management capability maturity model
c) product management capability maturity model
d) project management capability maturity model

View Answer

Answer: a [Reason:] The people management maturity model defines the following key practice areas for software people: recruiting, selection, performance management, training, compensation, career development, organization and work design, and team/culture development.

4. Which of the following is not a project manager’s activity?
a) project control
b) project management
c) project planning
d) project design

View Answer

Answer: d [Reason:] The design part of any project management is done by the project team.

5. A software ________ provides the framework from which a comprehensive plan for software development can be established.
a) people
b) product
c) process
d) none of the mentioned

View Answer

Answer: c [Reason:] A small number of framework activities are applicable to all software projects, regardless of their size or complexity.

6. Who defines the business issues that often have significant influence on the project?
a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned

View Answer

Answer: c

7. Who delivers the technical skills that are necessary to engineer a product or an application?
a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned

View Answer

Answer: a

8. Which of the following paradigm attempts to structure a team in a manner that achieves some of the controls associated with the closed paradigm but also much of the innovation that occurs when using the random paradigm?
a) asynchronous paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm

View Answer

Answer: b [Reason:] Open paradigm team structures are well suited to the solution of complex problems but may not perform as efficiently as other teams.

9. Which of the following is a people-intensive activity?
a) Problem solving
b) Organization
c) Motivation
d) Project management

View Answer

Answer: d [Reason:] For this reason, competent practitioners often make poor team leaders.

10. Which paradigm structures a team loosely and depends on individual initiative of the team members?
a) random paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm

View Answer

Answer: d

11. Which of the following is not an approach to software cost estimation?
a) Empirical
b) Heuristic
c) Analytical
d) Critical

View Answer

Answer: d [Reason:] Critical is no such standard approach of cost estimation.

Set 5

1. Which of the following is not a metric for design model?
a) Interface design metrics
b) Component-level metrics
c) Architectural metrics
d) Complexity metrics

View Answer

Answer: d [Reason:] Complexity metrics measure the logical complexity of source code.

2. Statement and branch coverage metrics are part of
a) Analysis Model
b) Testing
c) Design Model
d) Source Code

View Answer

Answer: b [Reason:] These metrics lead to the design of test cases that provide program coverage.

3. Function Points in software engineering was first proposed by
a) Booch
b) Boehm
c) Albrecht
d) Jacobson

View Answer

Answer: c [Reason:] First proposed by Albrecht in 1979, hundreds of books and papers have been written on functions points since then.

4. How many Information Domain Values are used for Function Point Computation?
a) three
b) four
c) five
d) six

View Answer

Answer: c [Reason:] The five values are: External Inputs, External Outputs, External Inquiries, Internal Logical Files and External Interface Files.

5. Function Point Computation is given by the formula
a) FP = [count total * 0.65] + 0.01 * sum(Fi)
b) FP = count total * [0.65 + 0.01 * sum(Fi)].
c) FP = count total * [0.65 + 0.01] * sum(Fi)
d) FP = [count total * 0.65 + 0.01] * sum(Fi)

View Answer

Answer: b [Reason:] Option b is the correct formula for Function Point Computation.

6. Architectural Design Metrics are ___________ in nature.
a) Black Box
b) White Box
c) Gray Box
d) Green Box

View Answer

Answer: a [Reason:] They are “black box” in that they do not require any knowledge of the inner workings of a particular software component.

7. Structural complexity of a module i is given as S(i) = f*f (i). What does f symbolizes here?
a) “fan check-out” of module i
b) “fan check-in” of module i
c) “fan in” of module i
d) “fan out” of module i

View Answer

Answer: d [Reason:] Fan out is number of modules directly invoked by module i.

8. SMI stands for
a) Software Mature Indicator
b) Software Maturity Index
c) Software Mature Index
d) Software Maturity Indicator

View Answer

Answer: b

9. As the SMI approaches 1.0, the software product starts becoming unstable
a) True
b) False

View Answer

Answer: b [Reason:] As the SMI approaches 1.0, the software product begins to stabilize.

10. SMI = [Mt – (Fa + Fc + Fd)]/Mt. Here Mt is the number of modules
a) in the current release
b) in the current release that have been changed
c) from the preceding release that were deleted in the current release
d) none of the mentioned

View Answer

Answer: a

11. The amount of time that the software is available for use is known as
a) Reliability
b) Usability
c) Efficiency
d) Functionality

View Answer

Answer: a

12. Usability in metric analysis is defined as the degree to which the software
a) stated needs
b) is easy to use
c) makes optimal use of system resources
d) none of the mentioned

View Answer

Answer: b