Multiple choice question for engineering
Set 1
1. What are the types of requirements ?
a) Availability
b) Reliability
c) Usability
d) All of the mentioned
Answer
Answer: d [Reason:] All the mentioned traits are beneficial for an effective product to be developed.
2. Select the developer specific requirement ?
a) Potability
b) Maintainability
c) Availability
d) Both Potability and Maintainability
Answer
Answer: d [Reason:] Availability is user specific requirement.
3. Which one of the following is not a step of requirement engineering?
a) elicitation
b) design
c) analysis
d) documentation
Answer
Answer: b [Reason:] Requirement Elicitation, Requirement Analysis, Requirement Documentation and Requirement Review are the four crucial process steps of requirement engineering.Design is in itself a different phase of Software Engineering.
4. FAST stands for
a) Functional Application Specification Technique
b) Fast Application Specification Technique
c) Facilitated Application Specification Technique
d) None of the mentioned
Answer
Answer: c
5. QFD stands for
a) quality function design
b) quality function development
c) quality function deployment
d) none of the mentioned
Answer
Answer: c
6. A Use-case actor is always a person having a role that different people may play.
a) True
b) False
Answer
Answer: b [Reason:] Use-case Actor is anything that needs to interact with the system, be it a person or another (external) system.
7. The user system requirements are the parts of which document ?
a) SDD
b) SRS
c) DDD
d) SRD
Answer
Answer: b [Reason:] Software requirements specification (SRS), is a complete description of the behaviour of a system to be developed and may include a set of use cases that describe interactions the users will have with the software.
8. A stakeholder is anyone who will purchase the completed software system under development.
a) True
b) False
Answer
Answer: b [Reason:] Stakeholders are anyone who has an interest in the project. Project stakeholders are individuals and organizations that are actively involved in the project, or whose interests may be affected as a result of project execution or project completion.
9. Conflicting requirements are common in Requirement Engineering, with each client proposing his or her version is the right one.
a) True
b) False
Answer
Answer: a [Reason:] This situation is seen in every field of work as each professional has his/her way of looking onto things & would argue to get his/her point approved.
10. Which is one of the most important stakeholder from the following ?
a) Entry level personnel
b) Middle level stakeholder
c) Managers
d) Users of the software
Answer
Answer: d [Reason:] Users are always the most important stakeholders.After all, without users or customers, what’s the point of being in business?.
Set 2
1. Which two requirements are given priority during Requirement Management of a product ?
a) User and Developer
b) Functional and Non-functional
c) Enduring and Volatile
d) All of the mentioned
Answer
Answer: c [Reason:] Enduring requirements are core requirements & are related to main activity of the organization while volatile requirements are likely to change during software development life cycle or after delivery of the product.
2. Considering the example of issue/return of a book, cataloging etc. in a library management.What type of management requirement is being depicted here?
a) Enduring
b) Volatile
c) Both Enduring & Volatile
d) All of the mentioned
Answer
Answer: a [Reason:] For library management system issue/return of a book, cataloging etc. are core activities and are stable for any system.
3. Why is Requirements Management Important ? It is due to the changes
a) to the environment
b) in technology
c) in customer’s expectations
d) in all of the mentioned.
Answer
Answer: d [Reason:] Systems continue to be built as the advancement of new products being launched in the market and so does the market changes, the technology and in turn customer’s expectation.
4. Requirements Management is a prerequisite for Quality-Oriented Development.
a) True
b) False
Answer
Answer: a [Reason:] Quality makes no sense without reference to requirements, which means quality-oriented development is requirements-driven development, thus requirements management is a prerequisite for quality-oriented development.
5. Requirements traceability is one of the most important part requirement management. It may also be referred to as the heart of requirement management.
a) True
b) False
Answer
Answer: a [Reason:] Requirements traceability refers to the ability to describe and follow the life of a requirement in both forwards and backwards direction. Requirements can be traced from its origins, through its development and specification, to its subsequent deployment and use, and through periods of ongoing refinement and iteration in any of these phases.
6. Requirements Management has a high initial start-up cost but does not need ongoing funding throughout a project.
a) True
b) False
Answer
Answer: b [Reason:] Requirements Management needs continued funding throughout a project.Project funding is often limited at the onset of a project, restricted to those aspects of the project which are tangible and visible, and subsequently allocated in a phase-by-phase manner.
7. Which of the following is not a Requirement Management workbench tool ?
a) RTM
b) DOORS
c) Rational Suite
d) RDD 100
Answer
Answer: c [Reason:] Rational Suite is an environment tool for requirement management.
8. Which of the following is a requirement management activity ?
a) Investigation
b) Design
c) Construction and Test
d) All of the mentioned
Answer
Answer: d [Reason:] All the options are the activities of requirement management.
9. What functionality of Requirement Management Tool (RMT) is depicted by the statement: “the tool should be able to automatically detect relations between artifacts. For example information retrieval techniques, monitoring of change history, naming schemas or model transformations.”
a) Automatic Link Detection
b) Documentation Support
c) Graphical Representation
d) Automatic Link Creation and Change
Answer
Answer: a [Reason:] DOORS is one such tool that supports Automatic Link Detection.
10. According to a statistical report: “over 30% of all software projects are cancelled before completion and over 70% of the remainder fail to deliver expected features”. What must be the reason for such a situation ?
a) Poor change management
b) Poor requirements management
c) Poor quality control
d) All of the mentioned
Answer
Answer: b [Reason:] Fundamental to the problem mentioned in the statistical report is poor requirements management. Option a and c are its sub parts.
Set 3
1. In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code?
a) interactivity
b) completeness
c) abstraction level
d) direction level
Answer
Answer: c
2. In reverse engineering, what refers to the level of detail that is provided at an abstraction level?
a) interactivity
b) completeness
c) abstraction level
d) directionality
Answer
Answer: b
3. The core of reverse engineering is an activity called
a) restructure code
b) directionality
c) extract abstractions
d) interactivity
Answer
Answer: c [Reason:] The engineer must evaluate the old program and extract a meaningful specification of the processing that is performed, the user interface that is applied, and the program data structures or database that is used.
4. What have become de rigueur for computer-based products and systems of every type?
a) GUIs
b) Candidate keys
c) Object model
d) All of the mentioned
Answer
Answer: a [Reason:] Therefore, the redevelopment of user interfaces has become one of the most common types of re-engineering activity. But before a user interface can be rebuilt, reverse engineering should occur.
5. Forward engineering is also known as
a) extract abstractions
b) renovation
c) reclamation
d) both renovation and reclamation
Answer
Answer: d [Reason:] Forward engineering, also called renovation or reclamation , not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system in an effort to improve its overall quality.
6. Reverse engineering is the process of deriving the system design and specification from its
a) GUI
b) Database
c) Source code
d) All of the mentioned
Answer
Answer: c
7. Reverse engineering techniques for internal program data focus on the definition of classes of objects.
a) True
b) False
Answer
Answer: a [Reason:] This is accomplished by examining the program code with the intent of grouping related program variables.
8. Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:
a) Build an initial object model
b) Determine candidate keys
c) Refine the tentative classes
d) Discover user interfaces
Answer
Answer: d [Reason:] Once information defined in the preceding steps is known, a series of transformations can be applied to map the old database structure into a new database structure.
9. Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing
a) candidate keys
b) interface
c) database structure
d) none of the mentioned
Answer
Answer: b [Reason:] The GUI or the interface provides the base for the behavioral model.
10. Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called
a) data analysis
b) directionality
c) data extraction
d) client applications
Answer
Answer: a
11. Reverse engineering and Re-engineering are equivalent processes of software engineering.
a) True
b) False
Answer
Answer: b [Reason:] Re engineering is a process of analysis and change whereby a system is modified by first reverse engineering and then forward engineering.
12. Transformation of a system from one representational form to another is known as
a) Re-factoring
b) Restructuring
c) Forward engineering
d) Both Re-factoring and Restructuring
Answer
Answer: d
13. Which of the following is not an objective of reverse engineering?
a) to reduce maintenance effort
b) to cope with complexity
c) to avoid side effects
d) to assist migration to a CASE environment
Answer
Answer: d [Reason:] Reverse engineering helps us to detect side effects rather than avoiding them.
Set 4
1. Risk management is one of the most important jobs for a
a) Client
b) Investor
c) Production team
d) Project manager
Answer
Answer: d [Reason:] Risk management involves anticipating risks that might affect the project schedule or the quality of the software being developed, and then taking action to avoid these risks.
2. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk
Answer
Answer: a [Reason:] Risks that affect the quality or performance of the software being developed.
3. Which of the following term is best defined by the statement: “There will be a change of organizational management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition
Answer
Answer: c
4. Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”?
a) Technology change
b) Product competition
c) Requirements change
d) None of the mentioned
Answer
Answer: a [Reason:] Technology changes are common in the competitive environment of software engineering.
5. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
a) Risk monitoring
b) Risk planning
c) Risk analysis
d) Risk identification
Answer
Answer: a
6. Which of the following risks are derived from the organizational environment where the software is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer
Answer: d [Reason:] These risks are at management level.
7. Which of the following risks are derived from the software or hardware technologies that are used to develop the system?
a) Managerial risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer
Answer: b [Reason:] The risks associated with technology might affect the product development.
8. Which of the following term is best defined by the statement: “Derive traceability information to maximize information hiding in the design.”?
a) Underestimated development time
b) Organizational restructuring
c) Requirements changes
d) None of the mentioned
Answer
Answer: c [Reason:] Tracing the requirements can help us understand the risk.
9. Which of the following strategies means that the impact of the risk will be reduced?
a) Avoidance strategies
b) Minimization strategies
c) Contingency plans
d) All of the mentioned
Answer
Answer: b
10. Risk management is now recognized as one of the most important project management tasks.
a) True
b) False
Answer
Answer: a
Set 5
1. Which of the following is a layer of protection for Security ?
a) Platform-level protection
b) Application-level protection
c) Record-level protection
d) All of the mentioned
Answer
Answer:d
2. Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks.
a) True
b) False
Answer
Answer:b [Reason:] Security engineering is concerned with maintenance as well as development of such systems.
3. What are security controls ?
a) Controls that are intended to ensure that attacks are unsuccessful
b) Controls that are intended to detect and repel attacks
c) Controls that are intended to support recovery from problems
d) All of the mentioned
Answer
Answer:d [Reason:] All the options define a security control property.
4. Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) None of the mentioned
Answer
Answer:b [Reason:] Here the system is designed so that faults in the delivered software do not result in system failure.
5. Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.
a) Fault avoidance
b) Fault tolerance
c) Fault detection
d) Fault Recovery
Answer
Answer:a [Reason:] In Fault avoidance the system is developed in such a way that human error is avoided and thus system faults are minimised.
6. What is Life cycle risk assessment ?
a) Risk assessment before the system has been deployed
b) Risk assessment while the system is being developed
c) All of the mentioned
d) None of the mentioned
Answer
Answer:c
7. A system resource that has a value and has to be protected is known as
a) Asset
b) Control
c) Vulnerability
d) None of the mentioned
Answer
Answer:a [Reason:] The answer is self explanatory.
8. An impersonation of an authorised user is an example of a security threat.
a) True
b) False
Answer
Answer:b [Reason:] It is a security attack.
9. The records of each patient that is receiving or has received treatment resembles which security concept ?
a) Asset
b) Threat
c) Vulnerability
d) Control
Answer
Answer:a [Reason:] Asset is a system resource that has a value and has to be protected.
10. Circumstances that have potential to cause loss or harm is known as
a) Attack
b) Threat
c) Vulnerability
d) Control
Answer
Answer:b [Reason:] The answer is self explanatory.
Total Views: 13