Software Engineering
Software Engineering
A. act in a manner that is in the best interests of his expertise and favour.”
B. act consistently with the public interest.”
C. ensure that their products only meet the SRS.”
D. all of the mentioned
A. Web has led to availability of software services and possibility of developing highly
distributed service based systems
B. Web based systems have led to degradation of programming languages
C. Web brings concept of software as service
D. Web based system should be developed and delivered incrementally
Which of the following statements regarding Build & Fix Model is wrong?
A. Software processes
B. Software Security
C. Software reuse
D. Software Validation
A. Quick Design
B. Coding
C. Prototype Refinement
D. Engineer Product
Which model can be selected if user is involved in all the phases of SDLC ?
A. Waterfall Model
B. Prototyping Model
C. RAD Model
D. both Prototyping Model & RAD Model
Build & Fix Model is suitable for programming exercises of ______________ LOC (Line of
Code)?
A. 100-200
B. 200-400
C. 400-1000
D. above 1000
Which one of the following models is not suitable for accommodating any change ?
A. Heterogeneity
B. Flexibility
C. Business and social change
D. Security
Which of these software engineering activities are not a part of software processes ?
A. Software dependence
B. Software development
C. Software validation
D. Software specification
A. Increasing Demand
B. Low expectation
C. Increasing Supply
D. Less reliable and expensive
A. Software companies
B. Software Developers
C. Both Software companies and Developers
D. All of the mentioned
As per an IBM report, “31%of the project get cancelled before they are completed, 53%
overrun their cost estimates by an average of 189% and for every 100 projects, there are 94
restarts”.What is the reason for these statistics ?
Explain what is meant by PRODUCT with reference to one of the eight principles as per
the ACM/IEEE Code of Ethics ?
Software engineers should not use their technical skills to misuse other people’s
computers.”Here the term misuse refers to ___________________?
A. Unauthorized access to computer material
B. Unauthorized modification of computer material
C. Dissemination of viruses or other malware
D. All of the mentioned