Quiz ZZZZ
Quiz ZZZZ
Quiz ZZZZ
Answer key
1. d 6. b 11. d 16. d
2. d 7. d 12. b 17. a
3. b 8. c 13. d 18. c
4. c 9. a 14. a 19. d
5. a 10. d 15. c 20. a
````````````````````````````````````````````````````````````````````````````````````````````````````
1. Does more functional and non functional requirements means more efficieny of program or it
means more complexity of program?
A) True
B) False
Answer)True
2. Considering the safe home system example which is given in book which of the following is non
functional requirement
Answer)D
3. A programmer makes an app but it does run on Linux platform . Which thing was missing from
developement phase?
A)Functional Requirement
B)Non Functional Requirement
C)Analysis Phase
D)None of these
Answer)B
Answer)A
5. If developers are running short of time should they neglect non functional requiremnts?
Answer)A
A)Functional Requirements
B)Non Functional Requirements
Answer)A
8. WHich of the following includes desciption of Non Functional and Functional Requirements
A) Swimline Diagram
B) Use Case Diagram
C) Activity Diagram
D) None of these
Answer)B
10. The functional requirements which are not asked by stackholder but developer does it for free are
called?
A) Gold Platted
B) Functional Requirements
C) Non Functional Requirements
D) None of these
Answer)A
11. Are functional and non functional requirements given by stackholder or not?
Answer)C
12. Does good functional and non functioal requirements gurantees good sucess criteria?
A) Yes,Always
B) No,Never
C) Yes,Sometime
D) None of these
Answer)C
Answer)D
A) Yes
B) No
Answer)A
Answer)D
A) Software Properties
B) Software Attributes
C) Both of these
D) None of These
Answer)A
A) Property
B) Attribute
C) Noun
D) None of these
Answer)B
```````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
1) A
2) C
3) A
4) B
5) A
6) A
7) A
8) B
9) B
10) B
11) B
12) B
13) A
14) B
15) A
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
5)Lowest level DFDs may add new data flows to represent exception
handling?
a) True
b) False
7)A data flow may or may not be attached to at least one process?
a) True
b) False
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
\\\\\\
Answer keys:
1) a
2) a
3) c
4) a
5) a
6) a
7) b
8) b
9) c
10) c
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
6. If you were collecting and storing information about your music collection, an album would be
considered a(n) _____
a) Relation
b) Entity
c) Instance
d) Attribute
7. What term is used to refer to a specific record in your music database; for instance; information
stored about a specific album?
a) Relation
b) Instance
c) Table
d) Column
8. Given the basic ER and relational models, which of the following is INCORRECT?
a) An attribute of an entity can has more than one value
b) An attribute of an entity can be composite
c) In a row of a relational table, an attribute can have more than one value
d) In a row of a relational table, an attribute can have exactly one value or a NULL value
KEY
1) A
2) C
3) A
4) A
5) D
6) B
7) B
8) C
9) B
10) D
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
a) Understanding requirements
b) Establishing ground work
c) Eliciting requirements
d) Requirement engineering
3. Requirement Engineering encompasses how many distinct task?
a) 8
b) 4
c) 11
d) 7
4. In general most projects begin with
a) Cooking
b) Identify requirements
c) business needs being defined
d) Business meetings
5. The problem of customer not being sure of what is need is problem of
a) Knowledge
b) Making sense
c) Understanding
d) Misconception
6. Elaboration focuses on
a) Expanding information of inception and elicitation
b) Creation and refinement
c) Developing refined model
d) Business domain entities
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
a)External Entry
b)Process
c)Data Flow
d)Data Store
a)External Entry
b)Process
c)Data Flow
d)Data Store
a)External Entry
b)Process
c)Data Flow
d)Data Store
a)External Entry
b)Process
c)Data Flow
d)Data Store
a)0 Level
b)1 Level
c)2 Level
a)0 Level
b)1 Level
c)2 Level
d)All of above
a)1:6
b)1:7
c)1:5
d)1:4
a)increases
b)decreases
a)pseudocode (PDL)
b)tables
d)all of above
a) Yes
b) No
Answer Key
1) a
2) b
3) c
4) d
5) a
6) a
7) c
8) b
9) d
10) b
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
One
Two
Three
4.Which type of key is used to enforce entity integrity by uniquely identifying entity instances?
Foreign key
Primary key
Composite key
2
3
4
5.Which type of key is used to enforce referential integrity by completing an association b/w two
entities.
Foreign key
Primary key
Composite key
By records
By attributes
By columns
7.Which type of key is used to identify more than one attributes uniquely?
Foreign key
Primary key
Composite key
8.When primary key is large or complex, then which type of key is used?
Foreign key
Artificial key
Composite key
Foreign key
Primary key
Composite key
Weak entity
Strong entity
Associative entity
Strong entity
Weak entity
Associative entity
Strong entity
Weak entity
Associative entity
Strong relationship
Weak relationship
Moderate relationship
Single attribute
Multilevel attribute
Derived attribute
Attributes
Entities
Keys
Unary
Ternary
Binary
Unary
Ternary
Binary
Unary
Ternary
Binary
19.--------------- specify how many instances of an entity relate to one instance of another entity.
Cardinality
Relationship
Diagram
Binary table
Truth table
Auxiliary table
1) c 2) b 3) b 4) b 5) a
6) b 7) c 8) b 9) b 10) a
11) c 12) a 13) a 14) c 15) b
16) a 17) c 18) b 19) a 20) c
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
11. Use case models can be summarized under which of these category ?
Answers :
1. d
2. c
3. b
4. a
5. c
6. c
7. a
8. d
9. c
10. c
11. c
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
I. A diagram that represents active states for each class and the
events that cause changes between these active states
a)activity b) DFD c) UML State d)CFD
II. A state that is simply the current status of all of an object’s
attributes.
a)active b) DFD c) CFD d)passive
III. A state of an object that indicates the current status of the object as
it undergoes a continuing transformation or processing.
a)active b) DFD c) CFD d)passive
IV. In state diagram starting state is indicated as:
a) b) c) d)
V. State diagram has starting state.
a)only one b) only two c) more than one d)only three
VI. State diagram has ending state.
a)one or more than one b) two c) one d)only three
```````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
2.Elicitation is related to
a) Workers b) domain
3.Elaboration is related to
4.Negotitation results
a) Specification b) Elaboration
c) Elicitation d) None of these
a) Security b) Login
Answers:
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
a c A d a a d c b B
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
1. A)
2. B)
3. C)
4. D)
5. D)
6. C)
7. D)
8. A)
9. A)
10. D)
11. A)
12. D)
13. A)
14. B)
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
3. Does the need evolve over time? This question is Part of _______________task.
(a) Inception (b) Elicitation (c) Negotiation (d) Validation
6. The information obtained from the customer during inception and elicitation is expanded and
refined during ___________
(a) Negotiation (b) specification (c) Design (d) elaboration
11. “Anyone who benefits in a direct or indirect way from the system which is being developed.”
(a) Software engineer (b) Stack holder (c) manager (d) none
1. c 2. b 3. a 4. d
5. c 6. d 7. b 8. a
9. b 10. b 11. b 12. d
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
Context
(8). At highest level, a DFD is referred to Scope diagram Level 1 DFD Level 2 DFD
as diagram
diamond shaped
(9). In a dfd, an originator or data receiver Rectangle Square circle
is usually designated by box
all of the
(10). A data model contains data object Attributes Relationships
mentioned
Answers:
1. a 2. a 3. d 4. a 5.d
6. b 7. a 8. b 9. a 10. d
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
d)Both a and b
d)Both a and c
d)All of above
a)Every user can access their account on any device connected to the internet
d)All of above
a)System Representations
c)Response time
d)Storage capacity
a)Police officers will have an all-time access to the security camera footage room
b)They will have the liberty to interrogate any member of the organization
Answer Key
1) a
2) a
3) d
4) d
5) d
6) a
7) b
8) b
9) a
10) c
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
a) System Function
b) Parallel Activities
d) Flow of data
a) System modeling
b) System behavior
c) Process modeling
d) Behavioral modeling
a) Change of state
b) Change in requirement
c) Flow of data
d) flow of informationally
4. In activity diagram, an arrow pointing to a filled circle nested inside another represents
a) Initial state
b) Final state
c) Object flow
d) Action flow
a) Class
b) State
c) Transition
d) Activity
a) Behavior diagram
b) Structure diagram
d) Class diagrams
b) Functionality of a system
a) Initial state
b) Final state
c) State
d) Transition
a) Square
b) Rectangle
c) Circle
d) Diamond
a) It is a structure diagram
ANSWERS
1. B
2. D
3. A
4. B
5. B
6. A
7. C
8. D
9. D
10.D
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
1. Description of external entities that interact with the software and the nature of their interaction are
needed for the implementation of:
2. Top-level abstractions that represent pivotal elements of the system’s behavior or function are
called:
4. In SafeHome home security function, you might define the following archetypes:
7. Those systems that are used by the target system and provide data or processing that are necessary
to complete target system functionality are:
9. Which one isn’t a source for the derivation and refinement of components.
10. The ______________ element is usually depicted as a set of interconnected subsystems, often
derived from analysis packages within the requirements model.
KEY:
1. B
2. A
3. C
4. D
5. B
6. C
7. B
8. A
9. C
10.A
``````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````````
1. The requirements for a system that describes what the system should do are
a) Non-Functional Requirements
b) Functional Requirements
c) True Requirements
d) None
2. The requirements that are not directly concerned with the specific services delivered by the
system to its users are
a) Non-Functional Requirements
b) Functional Requirements
c) Full Requirements
d) None
3. In principle, the functional requirements specification of a system should be both
a) Nice and Clear
b) Complete and Consistent
c) Large and Typed
d) All of the above
4. A person or role that is affected by the system in some way is
a) Programmer
b) Stakeholder
c) Analyst
d) Project Manager
5. Requirements, such as performance, security or availability fall in the class of
a) Project Requirements
b) Non-Functional Requirements
c) Functional Requirements
d) None
6. The requirements that specify or constrain the behavior of the software
a) Organizational Requirements
b) Product Requirements
c) External Requirements
d) None
7. The requirements that are broad system requirements derived from policies and procedures in
the customer’s and developer’s organization
a) Organizational Requirements
b) Product Requirements
c) External Requirements
d) Behavioral Requirements
8. The requirements that are derived from factors external to the system and its development
process
a) Organizational Requirements
b) Product Requirements
c) Factors Requirements
d) External Requirements
9. In practice, for large, complex systems, it is practically impossible to achieve requirements
consistency and completeness because
a) Easy to make mistakes and omissions when writing specifications
b) There are many stakeholders in a large system
c) Both (a) & (b)
d) None
10. The requirements that are derived from the application domain of the system rather than from
the specific needs of system users
a) Application Requirements
b) Domain Requirements
c) Testing Requirements
d) None