Software Engineering Set 2 (30 mcqs)

1. What type of fault remains in the system for some period and then disappears?
a) Permanent
b) Transient
c) Intermittent

2. Which of the following approaches are used to achieve reliable systems?
a) Fault prevention
b) Fault removal
c) Fault tolerance
d) All of the mentioned

3. A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of
a) Full Fault Tolerance
b) Graceful Degradation
c) Fail Soft
d) Fail Safe

4. Which of the following Error Detection checks is not a part of Application detection?
a) Hardware checks
b) Timing checks
c) Reversal checks
d) Coding checks

5. Exception handling is a type of
a) forward error recovery mechanism
b) backward error recovery mechanism

6. Non-occurrence of improper alteration of information is known as
a) Available Dependability
b) Confidential Dependability
c) Maintainable Dependability
d) Integral Dependability

7. In N-version programming which is the independent generation of N, the value of N is
a) greater than 1
b) less than 1
c) greater than 2
d) less than 2

8. In Log-based fault tolerance, logs of undetermined events are saved and replayed on failure.
a) True
b) False

9. All fault-tolerant techniques rely on
a) Integrity
b) Dependability
c) Redundancy

10. It is imperative for a communicating processes to reach consistent recovery points to avoid the _________ effect, with backward error recovery mechanism.
a) Static
b) Dynamic
c) Domino
d) Whirlpool

11. What all has to be identified as per risk identification?
a) Threats
b) Vulnerabilities
c) Consequences
d) All of the mentioned

12. Which one is not a risk management activity?
a) Risk assessment
b) Risk generation
c) Risk control
d) None of the mentioned

13. What is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss?
a) Risk exposure
b) Risk prioritization
c) Risk analysis
d) All of the mentioned

14. What threatens the quality and timeliness of the software to be produced?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks

15. What threatens the viability of the software to be built?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks

16. Which of the following is not a business risk?
a) building an excellent product or system that no one really wants
b) losing the support of senior management due to a change in focus or change in people
c) lack of documented requirements or software scope
d) losing budgetary or personnel commitment

17. Which of the following is a systematic attempt to specify threats to the project plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection

18. Which risks are associated with the overall size of the software to be built or modified?
a) Business impact risks
b) Process definition risks
c) Product size risks
d) Development environment risks

19. Coupling is a qualitative indication of the degree to which a module
a) can be written more compactly.
b) focuses on just one thing.
c) is able to complete its function in a timely manner.
d) is connected to other modules and the outside world.

20. Which of the following term is best defined by the statement:”the degree of uncertainty that the product will meet its requirements and be fit for its intended use.”?
a) Performance risk
b) Cost risk
c) Support risk
d) Schedule risk

21. Choose the correct option in terms of Issues related to professional responsibility
a) Confidentiality
b) Intellectual property rights
c) Both a & b
d) Managing Client Relationships

22. “Software engineers should not use their technical skills to misuse other people’s computers.”Here the term misuse refers to:
a) Unauthorized access to computer material
b) Unauthorized modification of computer material
c) Dissemination of viruses or other malware
d) All of the mentioned

23. Explain what is meant by PRODUCT with reference to one of the eight principles as per the ACM/IEEE Code of Ethics ?
a) The product should be easy to use.
b) Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
c) Software engineers shall ensure that their products and related modifications satisfy the client.
d) It means that the product designed /created should be easily available.

24. Identify an ethical dilemma from the situations mentioned below:
a) Your employer releases a safety-critical system without finishing the testing of the system.
b) Refusing to undertake a project.
c) Agreement in principle with the policies of senior management.

25. Identify the correct statement: “Software engineers shall
a) act in a manner that is in the best interests of his expertise and favour.”
b) act consistently with the public interest.”
c) ensure that their products only meet the SRS.”
d) none

26. Select the incorrect statement: “Software engineers should
a) not knowingly accept work that is outside your competence.”
b) not use your technical skills to misuse other people’s computers.”
c) be dependent on their colleagues.”
d) maintain integrity and independence in their professional judgment.”

27. Efficiency in a software product does not include ________
a) responsiveness
b) licensing
c) memory utilization
d) processing time

28. As per an IBM report, “31%of the project get cancelled before they are completed, 53% overrun their cost estimates by an average of 189% and for every 100 projects, there are 94 restarts”.What is the reason for these statistics ?
a) Lack of adequate training in software engineering
b) Lack of software ethics and understanding
c) Management issues in the company

29. The reason for software bugs and failures is due to
a) Software companies
b) Software Developers
c) Both a and b

30. Company has latest computers and state-of the- art software tools, so we shouldn’t worry about the quality of the product.
a) True
b) False

Answers

1-b 2-d 3-d 4-a 5-a
6-d 7-c 8-a 9-c 10-c
11-d 12-b 13-a 14-d 15-b
16-c 17-d 18-c 19-d 20-a
21-c 22-d 23-b 24-a 25-b
26-c 27-b 28-a 29-c 30-b

Sharing is caring!

Leave a Comment

Your email address will not be published. Required fields are marked *

shares