SPM MCQ - Easier To Study MCQ Question Bank SPM MCQ - Easier To Study MCQ Question Bank
SPM MCQ - Easier To Study MCQ Question Bank SPM MCQ - Easier To Study MCQ Question Bank
B. project duration
C. project effort
D. all of the above
7. Once project planning is complete, project managers document
their plan in
A. SPMP document
B. SRS document
C. Detailed Design documet
D. Excel Sheet
8. Which of the following serves as metrics for project size
estimation?
A. Lines of codes
B. function point
C. Number of persons
D. Only A & B
9. Lines of Code measures the size of project by counting
A. True
B. False
C. NA
D. NA
A. LOC
B. Function Point Metric
C. Bothg
D. None
14. Which of the following serves as project estimation technique?
A. Empirical estimation
B. Heuristic technique
C. Analytical estimation
D. All of the above
15. Heuristics estimation techniquedepends on
A. educated guess
B. prior experience
C. Common sense
D. All of the above
16. Which of the following is empirical estimation technique?
(i) expert judgement (ii) Delphi estimation (iii) COCOMO (iv)
Critical path Method
A. only i, ii & iii
B. only i & ii
C. only i, iii & iv
D. All of the above
A. COCOMO
B. intermediate COCOMO
C. both
D. None
Explanation
A. Heuristic technique
B. Delphi cost esttimation
C. Basis COCOMO
D. only a & b
Explanation
Explanation
A. Norden's Work
B. Putnam's Work
C. Both
Explanation
A. PERT chart
B. Gantt chart
C. UML
D. pi-chart
Explanation
A. PERT chart
B. Gantt chart
C. UML
D. pi-chart
Explanation
Explanation
A. functional formation
B. project format
C. both
D. none
Explanation
Explanation
Explanation
A. Risk indentification
B. Risk Assessment
C. Risk Containment
Explanation
A. Risk Containment
B. Risk Assessment
C. Risk indentification
D. Risk Mapping
Explanation
A. Risk avoiding
B. Transfer risk
C. Risk indentification
D. Risk reduction
Explanation
Explanation
Explanation
Correct Option :A
32. Coding is undertaken
Explanation
Explanation
Explanation
A. code review
B. Unit testing
C. integration testing
D. All of the above
Explanation
A. code inspection
B. code walkthrough
C. both
D. None
Explanation
Correct Option :C
37. Which of the following helps detect algorithmic and logical error
in code?
A. code walkthrough
B. code inspection
C. both
D. None
Explanation
A. code walkthrough
B. code inspection
C. both
D. None
Explanation
Explanation
b) Product competition
c) Testing
d) Staff turnover
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as
risk
43. The process each manager follows during the life of a project is
known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly
implement and manage projects successfully.
44. A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
Explanation: The probability of the risk might be assessed as very low
(<10%), low (10–25%), moderate (25–50%), high (50–75%), or very
high (>75%)
45. Which of the following is/are main parameters that you should use
when computing the costs of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is
required to complete each activity and, from this, calculating the total
cost of activities.
46. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software
qualities and describe how these are to be assessed.
47. Which of the following is incorrect activity for the configuration
management of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes
define how to record and process proposed system changes, how to
decide what system components to change, how to manage different
versions of the system and its components, and how to distribute
changes to customers.
48. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
Explanation: The current process is assessed, and process weaknesses
and bottlenecks are identified.
49. An independent relationship must exist between the attribute that
can be measured and the external quality attribute.
a) True
b) False
Answer:b
Explanation: The value of the quality attribute must be related, in
some way, to the value of the attribute than can be measured.
A. Peer Review
B. Delphi Technique
C. Expected value technique
D. Work Breakdown Structure (WBS)
E. DBMS Architecture
1. FS
2. FF
3. SS
4. SF
1. Scope verification
2. Completing a scope statement
3. scope definition
4. Risk management plan
1. Quality control
2. Quality planning
3. Checking adherence to processes
4. Quality assurance
4. Trivandrum
1. with
2. over
3. on
4. round
5. 46%
59. The model serves as the basis for the creation of ______ for the
Software.
(a) Design
(b) Maintenance
(c) Testing
(d) Specifications
(b) Interviewing
(c) Meeting
62.Insufficient identification is a
65. Many software projects digress from the original scope because
of the nature of the software product or technology used, it’s happen
in ________
(a) Product scope changed toward the end of the project life cycle
(a) Analyst
(b) Designer
(c) Coder
(d)Manager
(a) Customer
(b) A developer
(c) An outsider
(a) Procedure
(b) Tools
(a)Product scope changed toward the end of the project life cycle
(c)Defined scope
(d)Fuzzy users
(a)Software design
(b)Software process
(c)Software schedule
(d)Framework
(a)Elicitation process
(b)Interviewing
(c)Meeting
(d)None of given
72.Defined scope is a
(a)Technology-related problems
(b)Product-related problems
(c)Process-related problems
(a)SCIs
(b)SCM
(c)Design
(d)Construction
(a)Goals
(b)Objective
(c)Design
(a)Evaluating
(b)Motivation
(d)Monitoring
(b)Identify learning
(d)none
94.In earned value analysis, it is desirable that variance and index are
1.positive and less than 1
2.negative and greater than 1
3.negative and less than 1
4.positive and greater than 1
The correct answer/s : negative and less than 1
101.A risk table will not contain following information about risk
1.Impact
2.Probability
3.Category
4.Source
The correct answer/s : Category
1.Perfective Maintenance
2.Preventive Maintenance
3.Adaptive Maintenance
4.Corrective Maintenance
109.Software feasibility is based on which of the following
1.business and marketing concerns
2.scope, constraints, market
3.technology, finance, time, resources
4.technical prowess of the developers
The correct answer/s : scope, constraints, market
1.quality management
2.configuration management
3.risk management
4.requirement analysis
The correct answer/s : configuration management
2.Evolutionary Model
3.Waterfall model
4.Spiral Model
4.errors in requirements
The correct answer/s : errors in operation
3.test team
4.development team
The correct answer/s : senior managers
154.At the end of a formal technical review all attendees can decide to
1.modify the work product and continue the review
2.reject the product due to stylistic discrepancies
3.accept the work product without modification
4.advise developer about the problem domain
The correct answer/s : reject the product due to stylistic discrepancies
4.data analysis
The correct answer/s : data record standardization
163. Project managers have to assess the risks that may affect a
project.
a) True
b) False
Answer:B
164.Which of the following is not considered as a risk in project
management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer:C 4.
165.process each manager follows during the life of a project is
known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer:C
166.A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
e) very high
Answer:D
167. Which of the following is/are main parameters that you should
use when computing the costs of a software development project?
Answer:A
175. The only deliverable work product for a successful project is the
working program.
a) True
b) False
Answer:B
176. Which phase of the RUP is used to establish a business case for
the system
a) Transition
b) Elaboration
c) Construction
d) Inception
Answer:D
Answer:D
180. Component-based Software Engineering allows faster delivery.
a) True
b) False
Answer:A
181. Arrange the following steps to form a basic/general Engineering
Process Model. i. Test ii. Design iii. Install iv. Specification v.
Manufacture vi. Maintain
a) 2, 4, 5, 1, 6, 3
b) 4, 2, 5, 1, 3, 6
c) 2, 4, 5, 1, 3, 6
d) 4, 2, 5, 1, 6, 3
Answer:B
182. Which of the following categories is part of the output of
software process?
a) computer programs
b) documents that describe the computer programs
c) data
d) All of the mentioned
Answer:D
183. Which is a software configuration management concept that
helps us to control change without seriously impeding justifiable
change?
a) Baselines
b) Source code
c) Data model
d) None of the mentioned
Answer:A
184. Software Configuration Management can be administered in
several ways. These include
a) A single software configuration management team for the whole
organization
b) A separate configuration management team for each project
c) Software Configuration Management distributed among the project
members
d) All of the mentioned
Answer:A 25.
185.What combines procedures and tools to manage different versions
of configuration objects that are created during the software process?
a) Change control
b) Version control
c) SCIs
d) None of the mentioned
Answer:B
186. What complements the formal technical review by assessing a
configuration object for characteristics that are generally not
considered during review?
a) Software configuration audit
b) Software configuration management
c) Baseline
d) None of the mentioned
Answer:A
187. Which of the following is the process of assembling program
components, data, and libraries, and then compiling and linking these
to create an executable system?
a) System building
b) Release management
c) Change management
d) Version management
Answer:A
188. Which of the following option is not tracked by configuration
management tools?
a) Tracking of change proposals
b) Storing versions of system components
c) Tracking the releases of system versions to customers
d) None of the mentioned
Answer:D
189. Which of the following is not a Software Configuration
Management Activity?
a) Configuration item identification
b) Risk management
c) Release management
d) Branch management
Answer:B
190. The definition and use of configuration management standards is
essential for quality certification in
a) ISO 9000
b) CMM
c) CMMI
d) All of the mentioned
Answer:D
191. What involves preparing software for external release and
keeping track of the system versions that have been released for
customer use?
a) System building
b) Release management
c) Change management
d) Version management
Answer:B
192. Which two requirements are given priority during Requirement
Management of a product ?
a) User and Developer
b) Functional and Non-functional
c) Enduring and Volatile
Answer: C
193. Considering the example of issue/return of a book, cataloging
etc. in a library management.What type of management requirement
is being depicted here?
a) Enduring
b) Volatile
Answer:A
194. Why is Requirements Management Important ? It is due to the
changes
a) to the environment
b) in technology
c) in customer’s expectations
d) in all of the mentioned
. Answer:D
195. Requirements Management is a prerequisite for Quality-Oriented
Development.
a) True
b) False
Answer:A
196. Requirements traceability is one of the most important part
requirement management. It may also be referred to as the heart of
requirement management.
a) True
b) False
Answer:A
197. Requirements Management has a high initial start-up cost but
does not need ongoing funding throughout a project.
a) True
b) False
Answer:B
Answer:a
207. Which technique is applicable when other projects in the same
analogy application domain have been completed?
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer:c
208. Which model assumes that systems are created from reusable
components, scripting or database programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:A
209. Which of the following states that work expands to fill the time
available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
Answer:C
210. Which model is used during early stages of the system design
after the requirements have been established?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:D
211. Which model is used to compute the effort required to integrate
reusable components or program code that is automatically generated
by design or program translation tools?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:C
212. The COCOMO model takes into account different approaches to
software development, reuse, etc.
a) True
b) False
Answer:B
213.Identify, from among the following, the correct statement.
c) Although you are new to the company, and you hardly know
anything about the internal processes and politics, you should insist
on the company changing its work practices immediately; failing
which you threaten to report the matter
d) Since you are new to the company, and you are unfamiliar with the
internal processes and politics, you should first find-out more about
the issue and its background
e) None of the above statements are correct.
Answer:D
216. With regard to Evolutionary development, identify the correct
statement.
a) Evolutionary development usually comes in two flavors;
exploratory development, and throw-away prototyping
b) Very large projects are natural candidates for an evolutionary
development based approach
c) Exploratory development is used in situations where most of the
requirements are well understood in advance
d) One of the strong points of evolutionary development is that it
facilitates easy project management, through the high volume of
documentation it generates
e) Often the construction of a throw-away prototype is not followed
by a reimplementation of the system using a more structured
approach.
Answer:A
217. What is the fundamental reason that software cannot be
considered to be engineered?
a) It is designed by humans and therefore flawed
(b) Integration
(c) Alpha
(d) Module
(e) Beta.
Answer:E
222. In the maintenance phase the product must be tested against
previous test cases. This is known as __________ testing.
a) Unit
(b) Integration
(c) Regression
(d) Module
(e) Beta.
Answer:C
223. Which property of the rapid prototype is not important?
a) The speed with which it can be developed
b) The speed with which it can be modified
c) Its ability to determine the client’s real needs
d) The insights that the design team can gain from it, even if they are
of the ‘how not to do it’ variety
e) Its internal structure.
Answer:C
224. An example of the risk involved in software development is
a) Key personnel may resign before the product is complete
b) The manufacturer of critical components (e.g. the hardware
associated with a real-time system) may go bankrupt
c) Technology changes may render the product obsolete
d) Competitors may market a fully functional lower-cost equivalent
package
e) All of these are risks involved in software development.
Answer:E
225. A simple way of looking at the spiral software life-cycle model is
as a waterfall model with each phase proceeded by
a) Build-and-fix
b) Freezing
c) Synchronization
d) Testing
e) Risk analysis.
Answer:E
226. The degree of interaction between two modules is known as
a) Cohesion
b) Strength
c) Inheritance
d) Coupling
e) Instantiation.
Answer:D
227. The relationship between a derived class (or subclass) and base
class is referred to as
a) Association
b) Inheritance
c) Polymorphism
d) Instantiation
e) Aggregation
. Answer:B
228. Myers (1978) identifies seven levels of cohesion. Which level of
cohesion may be defined as followed; “the output from one element in
the component serves as input for some other element”?
a) Communicational cohesion
b) Functional cohesion
c) Communicational cohesion
d) Temporal cohesion
e) None of these
. Answer:A
229. A design is said to be a good design if the components are
a) Strongly coupled
b) Weakly cohesive
c) Strongly coupled and Weakly cohesive
d) Strongly coupled and strongly cohesive
e) Strongly cohesive and weakly coupled.
Answer:E
230. If a control switch is passed as an argument this is an example of
_______ coupling.
a) Content
b) Common
c) Control
d) Stamp
e) Data.
Answer:C
231. Which of the following is a type of abstraction?
a) Data
b) Procedural
c) Iteration
b) Semidetached
c) Organic
d) Multiplicative
e) Monolithic.
Answer:A
237. Work that continues throughout the project and does not relate to
any specific phase of software development is termed a(n)
a) Milestone
b) Project function
c) Activity
d) Task
e) Baseline.
Answer:B
238. The advantage of following the IEEE Standard for drawing up a
Software Project Management Plan (SPMP) – see IEEE Standard
1059.1 1987 – is
a) It is drawn up by representatives from major software development
organisations
b) It is designed for all types of software products
c) It is a framework that can be used irrespective of process model or
specific techniques
d) It can be tailored for each organisation for a particular application
area, development team or technique.
e) All of the above.
Answer:E
239. The best way to test the Software Project Management Plan
(SPMP) is by
a) Prototyping
b) Inspection
c) Simulation
d) Compilation
e) Debugging.
Answer:B
240. Algorithmic cost estimation in different organisations may be
different for the same application development, because
a) Different organisations consider complexity factors differently
Answer: b
Explanation: Risk management involves
IT8075 Software anticipating risks that might affect the project
schedule or the quality of the software being
Project Management
M
developed, and then taking action to avoid
these risks.
CSE - Professional
O
3. Which of the following is not considered as
a risk in project management?
Elective - II a) Specification delays
C
b) Product competition
c) Testing
T.
Regulations 2017 d) Staff turnover
Answer: c
O
Explanation: Testing is a part of project, thus
it can’t be categorized as risk.
SP
4. The process each manager follows during
UNIT I PROJECT the life of a project is known as
EVALUATION AND a) Project Management
PROJECT PLANNING b) Manager life cycle
G
c) Project Management Life Cycle
d) All of the mentioned
LO
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
engineers and managers) identified.
d) all of the mentioned
10. An independent relationship must exist
Answer: d between the attribute that can be measured
M
Explanation: Estimation involves working and the external quality attribute.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
O
total cost of activities.
Answer: b
C
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
T.
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
O
Answer: b
TOPIC 1.2 ACTIVITIES -
METHODOLOGIES
SP
Explanation: The quality plan should set out
the desired software qualities and describe
how these are to be assessed. 1. Which of these truly defines Software
design?
8. Which of the following is incorrect activity
G
a) Software design is an activity subjected to
for the configuration management of a constraints
software system? b) Software Design specifies nature and
LO
Answer: a Answer: d
Explanation: Configuration management Explanation: Software design explains all of
policies and processes define how to record the statements as its definition.
17
solutions
Answer: b
Explanation: The current process is assessed,
M
refinement? Explanation: Notations used are more
a) Nicklaus Wirth described the first software specialized and sophisticated one.
engineering method as stepwise refinement
O
b) Stepwise refinement follows its existence 7. Which of the following is an incorrect
from 1971 method for structural design?
C
c) It is a top down approach a) Transition of problem models to solution
d) All of the mentioned models
T.
b) Handling of larger and more complex
Answer: d products
Explanation: It is top down approach and not c) Designing Object oriented systems
bottom up. d) More procedural approach
O
4. What is incorrect about structural design? Answer: b
SP
a) Structural design introduced notations and Explanation: It does not account for larger
heuristics and complex products.
b) Structural design emphasis on procedural
decomposition 8. What is followed by the design task?
a) Choosing specific classes, operations
G
c) The advantage is data flow representation
d) It follows Structure chart b) Checking model’s completeness
c) Following design task heuristics
LO
M
c) Central model represents class diagrams products and related modifications meet the
that show the classes comprising a program highest professional standards possible
O
and their relationships to one another c) Software engineers shall ensure that their
d) Object-oriented methods incorporates products and related modifications satisfy the
Structural methods client
C
d) It means that the product designed /created
Answer: a should be easily available
T.
Explanation: It does not follow regular
procedural decomposition. Answer: b
Explanation: None.
O
TOPIC 1.3 CATEGORIZATION 4. Identify an ethical dilemma from the
OF SOFTWARE PROJECTS situations mentioned below:
SP
a) Your employer releases a safety-critical
1. Choose the correct option in terms of system without finishing the testing of the
Issues related to professional responsibility system
a) Confidentiality b) Refusing to undertake a project
G
b) Intellectual property rights c) Agreement in principle with the policies of
c) Both Confidentiality & Intellectual senior management
property rights d) All of the mentioned
LO
respect the confidentiality of their employers 5. Identify the correct statement: “Software
or clients irrespective of whether or not a engineers shall
formal confidentiality agreement has been a) act in a manner that is in the best interests
of his expertise and favour.”
17
signed.
They should be aware of local laws governing b) act consistently with the public interest.”
the use of intellectual property such as c) ensure that their products only meet the
patents, copyright, etc. SRS.”
d) all of the mentioned
-R
a) Unauthorized access to computer material a manner that is in the best interests of their
b) Unauthorized modification of computer client and employer consistent with the public
material interest and shall ensure that their products
c) Dissemination of viruses or other malware and related modifications meet the highest
professional standards possible.Thus options
C
M
other people’s computers.” become a part of software development
c) be dependent on their colleagues.” process.Bugs from developers side is no new
O
d) maintain integrity and independence in thing. Thus option c answers the question.
their professional judgment.”
10. Company has latest computers and state-
C
Answer: c of the- art software tools, so we shouldn’t
Explanation:None. worry about the quality of the product.
T.
a) True
7. Efficiency in a software product does not b) False
include ________
a) responsiveness Answer: b
O
b) licensing Explanation: The infrastructure is only one
c) memory utilization of the several factors that determine the
SP
d) processing time quality of the product.
Answer: b .
Explanation: Licensing of a software product
G
comes under corporate part of the software
company.
TOPIC 1.4 SETTING
OBJECTIVES
LO
Answer: c engineering
Explanation: Software is not just set of d) Software engineering is concerned with the
program but it is also associated practicalities of developing and delivering
documentation and configuration of data to useful software
make program run.
M
Answer: c
3. Which of these does not account for Explanation: Software engineering is a vast
software failure ? sub domain which comes under computer
O
a) Increasing Demand science which is main domain.
b) Low expectation
C
c) Increasing Supply 7. Which of these is true ?
d) Less reliable and expensive a) Generic products and customized products
T.
are types of software products
Answer: c b) Generic products are produced by
Explanation: Increasing supply will lead to organization and sold to open market
more production and not failure. c) Customized products are commissioned by
O
particular customer
4. What are attributes of good software ? d) All of the mentioned
SP
a) Software maintainability
b) Software functionality Answer: d
c) Software development Explanation: All of them are true.
d) Software maintainability & functionality
8. Which of these does not affect different
G
Answer: d types of software as a whole?
Explanation: Good software should deliver a) Heterogeneity
LO
activities are not a part of software processes Explanation: Option b & c are a part of
? Software Engineering as a subject,hence
a) Software dependence option a covers them both.
17
b) Software development
c) Software validation 9. The fundamental notions of software
d) Software specification engineering does not account for ?
a) Software processes
-R
Answer: d
6. Which of these is incorrect ? Explanation: Software validation is an
a) Software engineering belongs to Computer activity for software process and not the
science fundamental for engineering.
C
M
d) Web based system should be developed 4. Which one of the following is not an
and delivered incrementally application of embedded software product?
a) keypad control of a security system
O
Answer: b b) pattern recognition game playing
Explanation: Web based systems has led to c) digital function of dashboard display in a
C
important advances in programming car
languages. d) none of the mentioned
T.
. Answer: b
Explanation: Pattern recognition uses
Artificial Intelligence (AI) software.
O
TOPIC 1.5 MANAGEMENT
PRINCIPLES 5. Purpose of process is to deliver software
SP
a) in time
1. Which one of the following is not a b) with acceptable quality
software process quality? c) that is cost efficient
a) Productivity d) both in time & with acceptable quality
G
b) Portability
c) Timeliness Answer: d
d) Visibility Explanation: Cost of a software is a
LO
M
c) Modeling & Construction
d) Deployment TOPIC 1.6 MANAGEMENT
O
Answer: d CONTROL
Explanation: In Deployment the product is
C
delivered to the customer who evaluates the 1. SCM stands for
product and provides feedback based on the a) Software Control Management
T.
evaluation. b) Software Configuration Management
c) Software Concept Management
8. Process adopted for one project is same as d) None of the mentioned
the process adopted from another project.
O
a) True Answer: b
b) False Explanation: In software engineering,
SP
software configuration management (SCM) is
Answer: b the task of tracking and controlling changes
Explanation: the overall flow of activities, in the software, part of the larger cross-
actions,tasks,the level of autonomy given to discipline field of configuration management.
G
the software team and the inter dependencies
among two process can never be the same. 2. When code is made available to others, it
goes in a/an
LO
and risk.
a) Reusability management Answer: b
b) Risk management Explanation: None.
c) Measurement
17
c) CM audits
10. Four types of change are encountered d) None of the mentioned
during the support phase.Which one of the
following is not one that falls into such Answer: d
SE
d) Prevention a) True
b) False
M
a) Version Control
b) Access control Answer: c
c) CM Process Explanation: Testing verifies the agreed-to
O
d) Version Control and Access control description.
C
Answer: a 10. Which of the following is a example of
Explanation: It allows software engineers to Configuration Items ?
T.
continue development along a branch even a) SCM procedures
when a line of development is frozen. b) Source code
c) Software design descriptions
6. Which of the following is not a change d) All of the mentioned
O
management process?
a) Log the changes Answer: d
SP
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
c) Review impact with stakeholders
d) None of the mentioned 11. SCM controls only the products of the
development process.
Answer: d a) True
G
Explanation: All are required for a change. b) False
LO
M
a) conveyor line sorting system
1. Which of the following is an important b) conveyor line sorting software
c) conveyor line sorting speed
O
factor that can affect the accuracy and
efficacy of estimates? d) conveyor line sorting specification
a) Project size
C
b) Planning process Answer: a
c) Project complexity Explanation: The conveyor line sorting
T.
d) Degree of structural uncertainty system (CLSS) sorts boxes moving along a
conveyor line. Each box is identified by a
Answer: a barcode that contains a part number and is
Explanation: As size increases, the sorted into one of six bins at the end of the
O
interdependence among various elements of line.
the software grows rapidly.
SP
5. The project planner examines the statement
2. What describes the data and control to be of scope and extracts all important software
processed? functions which is known as
a) Planning process a) Association
G
b) Software scope b) Decomposition
c) External hardware c) Planning process
d) Project complexity d) All of the mentioned
LO
Answer: b Answer: b
Explanation: Functions described in the Explanation: None
statement of scope are evaluated and in some
6. The environment that supports the software
.B
creation of a joint team of customers b) Use one or more empirical models for
and developers who work together to identify software cost and effort estimation
the problem, propose elements c) Use relatively simple decomposition
M
Answer: d Evolutionary Process Model?
Explanation: None. a) WINWIN Spiral Model
O
b) Incremental Model
8. What can be used to complement c) Concurrent Development Model
decomposition techniques and offer a d) All of the mentioned
C
potentially valuable estimation approach in
their own right? Answer: d
T.
a) Automated estimation tools Explanation: None.
b) Empirical estimation models
c) Decomposition techniques 2. The Incremental Model is a result of
d) Both Automated estimation tools and combination of elements of which two
O
Empirical estimation models models?
a) Build & FIX Model & Waterfall Model
SP
Answer: b b) Linear Model & RAD Model
Explanation: An estimation model for c) Linear Model & Prototyping Model
computer software uses empirically derived d) Waterfall Model & RAD Model
formulas to predict effort as a function of
G
LOC or FP. Answer: c
Explanation: Each linear sequence produces
9. Which of the following is not achieved by a deliverable “increment” of the software and
LO
M
d) Royce phases.
a) True
Answer: b b) False
O
Explanation: None.
Answer: b
C
5. The spiral model has two dimensions Explanation: None.
namely _____________ and ____________
9. How is Incremental Model different from
T.
a) diagonal, angular
b) radial, perpendicular Spiral Model?
c) radial, angular a) Progress can be measured for Incremental
d) diagonal, perpendicular Model
O
b) Changing requirements can be
Answer: c accommodated in Incremental Model
SP
Explanation: The radial dimension of the c) Users can see the system early in
model represents the cumulative costs and the Incremental Model
angular dimension represents the progress d) All of the mentioned
made in completing each cycle. Each loop of
Answer: a
G
the spiral from X-axis clockwise through
360o represents one phase. Explanation: None.
LO
6. How is WINWIN Spiral Model different 10. If you were to create client/server
from Spiral Model? applications, which model would you go for?
a) It defines tasks required to define a) WINWIN Spiral Model
resources, timelines, and other project related b) Spiral Model
c) Concurrent Model
.B
information
b) It defines a set of negotiation activities at d) Incremental Model
the beginning of each pass around the spiral
Answer: c
17
well.
M
d) Project manager 5. What assess the risk and your plans for risk
mitigation and revise these when you learn
Answer: d more about the risk?
O
Explanation: Risk management involves a) Risk monitoring
anticipating risks that might affect the project b) Risk planning
C
schedule or the quality of the software being c) Risk analysis
developed, and then taking action to avoid d) Risk identification
T.
these risks.
Answer: a
2. Which of the following risk is the failure of Explanation: None.
a purchased component to perform as
O
expected? 6. Which of the following risks are derived
a) Product risk from the organizational environment where
SP
b) Project risk the software is being developed?
c) Business risk a) People risks
d) Programming risk b) Technology risks
c) Estimation risks
G
Answer: a d) Organizational risks
Explanation: Risks that affect the quality or
performance of the software being developed. Answer: d
LO
priorities.”?
a) Staff turnover that are used to develop the system?
b) Technology change a) Managerial risks
c) Management change b) Technology risks
17
M
help us understand the risk. Answer: b
Explanation: Risk management involves
9. Which of the following strategies means anticipating risks that might affect the project
O
that the impact of the risk will be reduced? schedule or the quality of the software being
a) Avoidance strategies developed, and then taking action to avoid
C
b) Minimization strategies these risks.
c) Contingency plans
T.
d) All of the mentioned 3. Which of the following is not considered as
a risk in project management?
Answer: b a) Specification delays
Explanation: None. b) Product competition
O
c) Testing
10. Risk management is now recognized as d) Staff turnover
SP
one of the most important project
management tasks. Answer: c
a) True Explanation: Testing is a part of project, thus
b) False it can’t be categorized as risk.
G
Answer: a 4. The process each manager follows during
Explanation: None. the life of a project is known as
LO
a) Project Management
. b) Manager life cycle
c) Project Management Life Cycle
TOPIC 1.10 STRATEGIC d) All of the mentioned
.B
Answer: d Answer: d
Explanation: Projects need to be managed Explanation: The probability of the risk
because professional software engineering is might be assessed as very low (<10%), low
always subject to organizational budget and (10–25%), moderate (25–50%), high (50–
C
M
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
identified.
O
engineers and managers)
d) all of the mentioned
10. An independent relationship must exist
C
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
T.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
O
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
SP
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
G
TOPIC 1.11 STEPWISE
Answer: b
Explanation: The quality plan should set out PROJECT PLANNING
LO
c) Version management
d) System management Answer: a
Explanation: As size increases, the
Answer: a interdependence among various elements of
-R
statement of scope are evaluated and in some 6. The environment that supports the software
cases refined to provide more detail prior to project is called
the beginning of estimation. a) CLSS
b) SEE
3. A number of independent investigators c) FAST
M
have developed a team-oriented approach to d) CBSE
requirements gathering that can be applied to
establish the scope of a project called Answer: b
O
a) JAD Explanation: Software engineering
b) CLASS environment (SEE), incorporates hardware
C
c) FAST and software.
d) None of the mentioned
T.
7. Which of the following is not an option to
Answer: c achieve reliable cost and effort estimate?
Explanation: Facilitated application a) Base estimates on similar projects that
specification techniques have already been completed
O
(FAST), this approach encourages the b) Use one or more empirical models for
creation of a joint team of customers software cost and effort estimation
SP
and developers who work together to identify c) Use relatively simple decomposition
the problem, propose elements techniques to generate project cost and effort
of the solution, negotiate different estimates
approaches, and specify a preliminary set of d) The ability to translate the size estimate
G
requirements. into human effort, calendar time, and dollars
Answer: b
5. The project planner examines the statement Explanation: An estimation model for
of scope and extracts all important software computer software uses empirically derived
SE
M
to client. Explanation: rest all are sub
categories/applications of option c.
10. Software project estimation can never be
O
an exact science, but a combination of good 3. Software costs more to maintain than it
historical data and systematic techniques can does to develop.
C
improve estimation accuracy. a) True
a) True b) False
T.
b) False
Answer: a
Answer: a Explanation: For systems with a long life,
Explanation: None. maintenance costs may be several times
O
development costs.
.
SP
4. Which one of the following is not an
application of embedded software product?
a) keypad control of a security system
b) pattern recognition game playing
UNIT II PROJECT LIFE c) digital function of dashboard display in a
G
car
CYCLE AND EFFORT d) none of the mentioned
LO
ESTIMATION
Answer: b
Explanation: Pattern recognition uses
TOPIC 2.1 SOFTWARE Artificial Intelligence (AI) software.
PROCESS AND PROCESS
.B
change. Answer: d
i. support Explanation: None.
ii. development
iii. definition 10. Four types of change are encountered
a) 1, 2, 3 during the support phase.Which one of the
M
b) 2, 1, 3 following is not one that falls into such
c) 3, 2, 1 category?
a) Translation
O
d) 3, 1, 2
b) Correction
Answer: c c) Adaptation
C
Explanation: None. d) Prevention
T.
7. Which of the following activities of a Answer: a
Generic Process framework provides a Explanation: Translation is done in the
feedback report? development phase.
a) Communication
O
b) Planning .
c) Modeling & Construction
SP
d) Deployment TOPIC 2.2 CHOICE OF
Answer: d PROCESS MODELS - RAPID
Explanation: In Deployment the product is APPLICATION DEVELOPMENT
G
delivered to the customer who evaluates the
product and provides feedback based on the 1. Build & Fix Model is suitable for
evaluation. programming exercises of ___________ LOC
LO
(Line of Code).
8. Process adopted for one project is same as a) 100-200
the process adopted from another project. b) 200-400
a) True c) 400-1000
.B
M
Explanation: Real projects rarely follow the phases namely:Business modeling,Data
sequential flow that the Waterfall Model modeling,Process modeling,Application
proposes. generation and Testing & Turnover.
O
4. Which is not one of the types of prototype 8. What is the major drawback of using RAD
C
of Prototyping Model? Model?
a) Horizontal Prototype a) Highly specialized & skilled
T.
b) Vertical Prototype developers/designers are required
c) Diagonal Prototype b) Increases reusability of components
d) Domain Prototype c) Encourages customer/client feedback
d) Increases reusability of components,
O
Answer: c Highly specialized & skilled
Explanation: Their is no such thing as developers/designers are required
SP
Diagonal Prototype whereas other options
have their respective definitions. Answer: d
Explanation: The client may create an
5. Which one of the following is not a phase unrealistic product vision leading a team to
of Prototyping Model?
G
over or under-develop functionality.Also, the
a) Quick Design specialized & skilled developers are not
b) Coding easily available.
LO
c) Prototype Refinement
d) Engineer Product 9. SDLC stands for
a) Software Development Life Cycle
Answer: b b) System Development Life cycle
Explanation: A prototyping model generates
.B
a) 2 phases .
b) 3 phase
TOPIC 2.3 AGILE METHODS
1. Select the option that suits the Manifesto to be able to respond quickly to changing
for Agile Software Development requirements without excessive rework.
a) Individuals and interactions
b) Working software 5. How is plan driven development different
c) Customer collaboration from agile development ?
M
d) All of the mentioned a) Outputs are decided through a process of
negotiation during the software development
Answer:d process
O
Explanation: None. b) Specification, design, implementation and
testing are interleaved
C
2. Agile Software Development is based on c) Iteration occurs within activities
a) Incremental Development d) All of the mentioned
T.
b) Iterative Development
c) Linear Development Answer:c
d) Both Incremental and Iterative Explanation: A plan-driven approach to
Development software engineering is based around separate
O
development stages with the outputs to be
Answer:d produced at each of these stages planned in
SP
Explanation: The software is developed in advance.
increments with the customer specifying the
requirements to be included in each increment 6. How many phases are there in Scrum ?
and the highest priority is to satisfy the a) Two
G
customer through early and continuous b) Three
delivery of valuable software. They are c) Four
iterative because they work on one iteration d) Scrum is an agile method which means it
LO
M
software development process which can’t be
avoided. Answer: b
Explanation: None.
O
9. Which three framework activities are
present in Adaptive Software 3. Which one of the following models is not
C
Development(ASD) ? suitable for accommodating any change?
a) analysis, design, coding a) Build & Fix Model
T.
b) requirements gathering, adaptive cycle b) Prototyping Model
planning, iterative development c) RAD Model
c) speculation, collaboration, learning d) Waterfall Model
d) all of the mentioned
O
Answer: d
Answer:c Explanation: Real projects rarely follow the
SP
Explanation: None. sequential flow that the Waterfall Model
proposes.
10. In agile development it is more important
to build software that meets the customers’ 4. Which is not one of the types of prototype
needs today than worry about features that of Prototyping Model?
G
might be needed in the future. a) Horizontal Prototype
a) True b) Vertical Prototype
LO
Explanation: Build & Fix Model is suitable regarding Build & Fix Model is wrong?
for small projects & programming exercises a) No room for structured design
of 100 or 200 lines. b) Code soon becomes unfixable &
M
Explanation: Build & Fix Model is suitable Answer: c
for 100-200 LOC Explanation: None.
O
7. RAD Model has .
a) 2 phases
C
b) 3 phase
c) 5 phases
TOPIC 2.5 EXTREME
PROGRAMMING
T.
d) 6 phases
O
phases namely:Business modeling,Data system release once every month.
modeling,Process modeling,Application a) True
SP
generation and Testing & Turnover. b) False
8. What is the major drawback of using RAD Answer: b
Model? Explanation: Incremental development is
a) Highly specialized & skilled
G
supported through small, frequent system
developers/designers are required releases.
b) Increases reusability of components
LO
b) False
Answer: d
Explanation: The client may create an Answer: a
unrealistic product vision leading a team to Explanation: XP follows a continuous
17
M
__________ in Extreme Programming. implements the ‘display logic’ and workflow
a) implementation tasks between screens.
b) functionalities
O
c) scenarios 7. Tests are automated in Extreme
d) none of the mentioned Programming.
C
a) True
Answer: c b) False
T.
Explanation: User requirements are
expressed as scenarios or user stories.These Answer: a
are written on cards and the development Explanation: Automated test harnesses are
team break them down into implementation used to run all component tests each time that
O
tasks. These tasks are the basis of schedule a new release is built.
and cost estimates.
SP
8. In XP an automated unit test framework is
5. Is a customer involved test development used to write tests for a new piece of
and validation in XP ? functionality before that functionality itself is
a) Yes implemented.
G
b) No a) True
c) It may vary from Customer to Customer b) False
d) None of the mentioned
LO
Answer: a
Answer: c Explanation: XP follows Test-first
Explanation: The role of the customer in the development approach.
testing process is to help develop acceptance
9. Developers work individually on a release
.B
c) planning, design, coding, testing 5. CIM and WBEM has been defined by ?
d) planning, analysis, coding, testing a) DMTF
b) SMI Standards Organization
Answer: c c) Open Standards Body
Explanation: XP involves the mentioned four d) None of the mentioned
M
activities, and in the same in order.
Answer: a
.
O
6. _________ instruments one or more
aspects of the CIM Schema
TOPIC 2.6 MANAGING
C
a) Distributor
b) Provider
This set of multiple choice SAN storage
T.
c) Manager
questions and answers focuses on Storage d) None of the mentioned
Management aspects.
Answer: b
O
1. A Subprofile can reference other
subprofiles 7. The server can operate directly on the
SP
a) True underlying system by calling the system’s
b) False commands, services, and library functions.
a) True
Answer: a b) False
G
2. Clients use which protocol to discover SMI Answer: a
Agents on Storage Area Network?
LO
Answer: a
Answer: b
3. Encoding mechanism of CIM Data as
17
Answer: b Answer: a
SE
4. Can a vendor implement additional Classes 10. Collects responses from providers and
or support additional Properties than are returns to the client
defined in a Profile and still be considered a) xmlCIM
conformant? b) CIMOM
C
a) True c) DMTF
b) False d) None of the mentioned
Answer: a Answer: b
M
PROCESSES a) that can not drop below zero
b) that can not be more than zero
c) that can not drop below one
O
1. Which process can be affected by other
processes executing in the system? d) that can not be more than one
a) cooperating process
C
b) child process Answer: a
c) parent process Explanation: None.
T.
d) init process
6. Mutual exclusion can be provided by the
Answer: a __________
Explanation: None. a) mutex locks
O
b) binary semaphores
2. When several processes access the same c) both mutex locks and binary semaphores
SP
data concurrently and the outcome of the d) none of the mentioned
execution depends on the particular order in
which the access takes place, is called? Answer: c
a) dynamic condition Explanation: Binary Semaphores are known
as mutex locks.
G
b) race condition
c) essential condition
d) critical condition 7. When high priority task is indirectly
LO
a) mutual exclusion
b) critical exclusion Answer: a
c) synchronous exclusion Explanation: None.
d) asynchronous exclusion
-R
M
d) all of the mentioned employees.
O
Explanation: None. of the delivered software?
a) Function-related metrics
C
10. To enable a process to wait within the b) Product-related metrics
monitor __________ c) Size-related metrics
T.
a) a condition variable must be declared as d) None of the mentioned
condition
b) condition variables must be used as Answer: a
boolean objects Explanation: Productivity is expressed in
O
c) semaphore must be used terms of the amount of useful functionality
d) all of the mentioned produced in some given time. Function points
SP
and object points
Answer: a are the best-known metrics of this type.
Explanation: None.
4. A _________ is developed using historical
cost information that relates some software
G
TOPIC 2.8 BASICS OF metric to the project cost.
SOFTWARE ESTIMATION a) Algorithmic cost modelling
LO
b) Expert judgement
c) Estimation by analogy
TOPIC 2.9 EFFORT AND COST d) Parkinson’s Law
ESTIMATION TECHNIQUES
Answer: a
.B
1. Which of the following are parameters Explanation: The model uses a basic
involved in computing the total cost of a regression formula with parameters that are
derived from historical project data and
17
b) Costs of providing heating and lighting of code size but are often still inaccurate.
office space
M
c) Estimation by analogy simplified set of seven multipliers.
d) Parkinson’s Law
10. Which model is used to compute the
O
Answer: c effort required to integrate reusable
Explanation: The cost of a new project is components or program code that is
C
estimated by analogy with these completed automatically generated by design or program
projects. translation tools?
T.
a) An application-composition model
7. Which model assumes that systems are b) A post-architecture model
created from reusable components, scripting c) A reuse model
or database programming? d) An early design model
O
a) An application-composition model
b) A post-architecture model Answer: c
SP
c) A reuse model Explanation: None.
d) An early design model
11. The COCOMO model takes into account
Answer: a different approaches to software
G
Explanation: It is designed to make estimates development, reuse, etc.
of prototype development. a) True
b) False
LO
Answer: c .
17
2. Statement and branch coverage metrics are 6. Architectural Design Metrics are
part of ___________ in nature.
a) Analysis Model a) Black Box
b) Testing b) White Box
c) Design Model c) Gray Box
M
d) Source Code d) Green Box
Answer: b Answer: a
O
Explanation: These metrics lead to the Explanation: They are “black box” in that
design of test cases that provide program they do not require any knowledge of the
C
coverage. inner workings of a particular software
component.
T.
3. Function Points in software engineering
was first proposed by 7. Structural complexity of a module i is
a) Booch given as S(i) = f*f (i). What does f
b) Boehm symbolizes here?
O
c) Albrecht a) “fan check-out” of module i
d) Jacobson b) “fan check-in” of module i
SP
c) “fan in” of module i
Answer: c d) “fan out” of module i
Explanation: First proposed by Albrecht in
1979, hundreds of books and papers have Answer: d
G
been written on functions points since then. Explanation: Fan out is number of modules
directly invoked by module i.
4. How many Information Domain Values are
LO
Answer: c Answer: b
Explanation: The five values are: External Explanation: None.
17
M
Explanation: None. because professional software engineering is
always subject to organizational budget and
11. The amount of time that the software is schedule constraints.
O
available for use is known as
a) Reliability 2. Project managers have to assess the risks
C
b) Usability that may affect a project.
c) Efficiency a) True
T.
d) Functionality b) False
Answer: a Answer: b
Explanation: None. Explanation: Risk management involves
O
anticipating risks that might affect the project
12. Usability in metric analysis is defined as schedule or the quality of the software being
SP
the degree to which the software developed, and then taking action to avoid
a) stated needs these risks.
b) is easy to use
c) makes optimal use of system resources 3. Which of the following is not considered as
d) none of the mentioned a risk in project management?
G
a) Specification delays
Answer: b b) Product competition
LO
M
might be assessed as very low (<10%), low
(10–25%), moderate (25–50%), high (50– 9. Identify the sub-process of process
75%), or very high (>75%). improvement
O
a) Process introduction
6. Which of the following is/are main b) Process analysis
C
parameters that you should use when c) De-processification
computing the costs of a software d) Process distribution
T.
development project?
a) travel and training costs Answer: b
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
O
engineers and managers) identified.
d) all of the mentioned
SP
10. An independent relationship must exist
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
out how much effort is required to complete a) True
G
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
LO
c) customers
d) project manager
Answer: b
TOPIC 3.2 PROJECT
17
8. Which of the following is incorrect activity a) Changing customer requirements that are
for the configuration management of a not reflected in schedule changes
software system? b) Technical difficulties that could not have
a) Internship management
SE
Answer: a Answer: d
Explanation: Configuration management Explanation: None.
policies and processes define how to record
M
b) Software Project scheduling b) Adaptation criteria
c) Software Detailed schedule c) Task Set
O
d) None of the mentioned d) Both degree of Rigor and adaptation
criteria
Answer: b
C
Explanation: None. Answer: b
Explanation: Four different degrees of rigor
T.
3. Every task that is scheduled should be are: casual, structured, strict, and quick
assigned to a specific team member is termed reaction.
as
a) Compartmentalization 7. What evaluates the risk associated with the
O
b) Defined milestones technology to be implemented as part of
c) Defined responsibilities project scope?
SP
d) Defined outcomes a) Concept scoping
b) Preliminary concept planning
Answer: c c) Technology risk assessment
Explanation: These responsibilities are d) Customer reaction to the concept
G
domain specific.
Answer: b
4. What is a collection of software Explanation: None.
LO
Answer: a Answer: b
Explanation: None. Explanation: These can vary from client to
client.
5. Ensuring that no more than the allocated
-R
number of people are allocated at any given 9. Which of the following is a project
time in Software Scheduling is known as scheduling method that can be applied to
a) Time Allocation software development?
b) Effort Validation a) PERT
SE
M
a) BCWS category of ____________
b) EVA a) Non-preemptive scheduling
c) BAC
O
b) Preemptive scheduling
d) CBSE c) All of the mentioned
d) None of the mentioned
C
Answer: b
Explanation: The earned value system Answer: b
T.
provides a common value scale for every Explanation: None.
task, regardless of the type of work being
performed. The total hours to do the whole 2. With round robin scheduling algorithm in a
project are estimated, and every task is given time shared system ____________
O
an earned value based on its estimated a) using very large time slices converts it into
percentage of the total. First come First served scheduling algorithm
SP
b) using very small time slices converts it into
11. What is the recommended distribution of First come First served scheduling algorithm
effort for a project? c) using extremely small time slices increases
a) 40-20-40 performance
G
b) 50-20-30 d) using very small time slices converts it into
c) 30-40-30 Shortest Job First algorithm
d) 50-30-20
LO
Answer: a
Answer: a Explanation: All the processes will be able to
Explanation: A recommended distribution of get completed.
effort across the software process is 40%
.B
(analysis and design), 20% (coding), and 40% 3. The portion of the process scheduler in an
(testing). operating system that dispatches processes is
concerned with ____________
12. A project usually has a timeline chart a) assigning ready processes to CPU
17
Answer: a c) tQ = 45ms
Explanation: Large computers are d) tQ = 50ms
overloaded with a greater number of
processes. Answer: a
Explanation: None.
M
5. What is FIFO algorithm?
a) first executes the job that came in last in 9. Orders are processed in the sequence they
the queue arrive if _______ rule sequences the jobs.
O
b) first executes the job that came in first in a) earliest due date
the queue b) slack time remaining
C
c) first executes the job that needs minimal c) first come, first served
processor d) critical ratio
T.
d) first executes the job that has maximum
processor needs Answer: c
Explanation: None.
Answer: b
O
Explanation: None. 10. Which of the following algorithms tends
to minimize the process flow time?
SP
6. The strategy of making processes that are a) First come First served
logically runnable to be temporarily b) Shortest Job First
suspended is called ____________ c) Earliest Deadline First
a) Non preemptive scheduling d) Longest Job First
G
b) Preemptive scheduling
c) Shortest job first Answer: b
d) First come First served Explanation: None.
LO
processes are scheduled with the Round- II. Preemptive scheduling may cause starvat
Robin time sharing method. Which out of the
following quantum times is the best value for III. Round robin is better than FCFS in ter
small response times, if the processes have a
C
M
scheduling is a preemptive version of shortest protocols for error control functions.
job scheduling. It may cause starvation as
shorter processes may keep coming and a 3. TCP/IP model does not have ______ layer
O
long CPU burst process never gets CPU. but OSI model have this layer.
II) Preemption may cause starvation. If a) session layer
C
priority based scheduling with preemption is b) transport layer
used, then a low priority process may never c) application layer
T.
get CPU. d) network layer
III) Round Robin Scheduling improves
response time as all processes get CPU after a Answer: a
specified time. Explanation: In OSI reference model, there
O
. are two layers which are not present in
TCP/IP model. They are Presentation and
SP
Session layer. The functions of Presentation
TOPIC 3.5 NETWORK and Session layer in the OSI model are
PLANNING MODELS handled by the transport layer itself in
TCP/IP.
G
1. OSI stands for __________
a) open system interconnection 4. Which layer is used to link the network
b) operating system interface support layers and user support layers?
LO
d) 7
Answer: d
Answer: d Explanation: The physical, logical, port and
Explanation: In OSI reference model, there specific addresses are used in TCP/IP
M
the internet implementation of these examples of port numbers are port 20 which
addresses. is used for FTP data, port 22 which is used
O
for SSH remote login ,and port 23 which is
6. TCP/IP model was developed _____ the used for TELNET.
OSI model.
C
a) prior to 9. Which layer provides the services to user?
b) after a) application layer
T.
c) simultaneous to b) session layer
d) with no link to c) presentation layer
d) physical layer
Answer: a
O
Explanation: Several TCP/IP prototypes Answer: a
were developed at multiple research centers Explanation: In networking, a user mainly
SP
between 1978 and 1983, whereas OSI interacts with application layer to create and
reference model was developed in the year send information to other computer or
1984. TCP/IP was developed with the network. Application layer provides the
intention to create a model for the Internet interface between applications and the
G
while OSI was intended to be a general network. It is the top-most layer in both the
network model. TCP/IP and the OSI model.
LO
7. Which layer is responsible for process to 10. Transmission data rate is decided by
process delivery in a general network model? ____________
a) network layer a) network layer
b) transport layer b) physical layer
.B
Answer: b Answer: b
17
layer is TCP and UDP. The transport layer is speed is determined by the cables and
responsible for segmentation of the data. It connectors used. Hence it is physical layer
uses ports for the implementation of process- that determines the transmission speed in
SE
M
testing? Answer: c
a) Finding broken code Explanation: Maintenance Testing is done on
b) Evaluating deliverable to find errors the already deployed software. The deployed
O
c) A stage of all projects software needs to be enhanced, changed or
d) None of the mentioned migrated to other hardware. The Testing done
C
during this enhancement, change and
Answer: b migration cycle is known as maintenance
Explanation: Software testing is the process
T.
testing.
of evaluation a software item to detect
differences between given input and expected 5. White Box techniques are also classified as
output. a) Design based testing
O
b) Structural testing
2. What is Cyclomatic complexity? c) Error guessing technique
SP
a) Black box testing d) None of the mentioned
b) White box testing
c) Yellow box testing Answer: b
d) Green box testing Explanation: The structural testing is the
G
testing of the structure of the system or
Answer: b component. Structural testing is often referred
Explanation: Cyclomatic complexity to as ‘white box’ or ‘glass box’ or ‘clear-box
LO
measures the amount of decision logic in the testing’ because in structural testing we are
program module.Cyclomatic complexity interested in what is happening ‘inside the
gives the minimum number of paths that can system/application’.
generate all possible paths through the
module.
.B
6. Exhaustive testing is
a) always possible
3. Lower and upper limits are present in b) practically possible
which chart? c) impractical but possible
17
manual testing.
process or system. Run charts graphically testing .
display cycles, trends, shifts, or non-random
patterns in behavior over time. It contains 7. Which of the following is/are White box
lower and upper limits. technique?
C
a) Statement Testing
4. Maintenance testing is performed using b) Decision Testing
which methodology?
c) Condition Coverage
TOPIC 3.10 RISK
d) All of the mentioned
IDENTIFICATION
Answer: d
Explanation: Statement testing, decision 1. What is the main purpose of hazard
M
testing, condition coverage all of them uses identification?
white box technique. a) To minimise the effect of a consequence
O
b) For better risk management
8. What are the various Testing Levels? c) To characterize adverse effect of toxins
a) Unit Testing d) To reduce probability of occurrence
C
b) System Testing
c) Integration Testing Answer: c
T.
d) All of the mentioned Explanation: Hazard identification is the first
step in risk assessment. The goal is to
Answer: d understand the concentration of toxins, spatial
Explanation: Unit, system, integration testing distribution and there movement.
O
all of them are levels in testing.
2. The ____________ process determines
SP
9. Boundary value analysis belong to? whether exposure to a chemical can increase
a) White Box Testing the incidence of adverse health effect.
b) Black Box Testing a) Hazard identification
c) White Box & Black Box Testing b) Exposure assessment
d) None of the mentioned
G
c) Toxicity assessment
d) Risk characterization
Answer: b
LO
10. Alpha testing is done at 3. Which of the following data is not required
a) Developer’s end for hazard identification?
b) User’s end a) Land use
17
M
5. Why does site history have to be Answer: a
considered for hazard identification? Explanation: An incident is called hazardous
a) To estimate the risk only when the contaminant poses threat to
O
b) To calculate carcinogenic exposure humans and ecological systems which may
c) To know the probable source and causes of results in catastrophic.
C
contamination on site
d) For determination of remedial actions 9. The purpose of risk management is to
T.
identify potential problems before they occur
Answer: c so that risk-handling activities may be
Explanation: Site history provides precise planned.
information about the activities that had been a) False
O
carried on the area. Most of the instance b) True
contamination is due to past activities on site.
SP
Answer: b
6. What is the main objective of risk Explanation: The main goal of risk
assessment? management is to reduce the threats from an
a) To evaluate hazard and minimize the risks activity so that harm to the surrounding is
G
b) Remediation of contaminated sites minimized.
c) Hazard management
d) To know source of pollutants 10. Hazard identification mainly focus on
LO
______________
Answer: a a) Chemical source and concentration
Explanation: Risk assessment helps to b) Chemical exposure
understand possible problems and provides c) Chemical analysis
.B
M
information about the activities that had been
2. The ____________ process determines carried on the area. Most of the instance
whether exposure to a chemical can increase contamination is due to past activities on site.
O
the incidence of adverse health effect.
a) Hazard identification 6. What is the main objective of risk
C
b) Exposure assessment assessment?
c) Toxicity assessment a) To evaluate hazard and minimize the risks
T.
d) Risk characterization b) Remediation of contaminated sites
c) Hazard management
Answer: a d) To know source of pollutants
Explanation: Hazard identification traces the
O
path of the toxins and also determines the Answer: a
likelihood of occurrence in humans. Explanation: Risk assessment helps to
SP
understand possible problems and provides
3. Which of the following data is not required alternatives as well as control measures to
for hazard identification? reduce the accident.
a) Land use
7. What is the first stage of risk assessment?
G
b) Contaminant levels
c) Affected population a) Exposure assessment
d) Estimation of risk b) Hazard identification
LO
c) Toxicity study
Answer: d d) Risk characterization
Explanation: Estimation of risk is done at
risk characterization whereas land use, Answer: b
Explanation: Hazard identification is the first
.B
9. The purpose of risk management is to 2. Which of the following risk is the failure of
identify potential problems before they occur a purchased component to perform as
so that risk-handling activities may be expected?
planned. a) Product risk
a) False b) Project risk
M
b) True c) Business risk
d) Programming risk
Answer: b
O
Explanation: The main goal of risk Answer: a
management is to reduce the threats from an Explanation: Risks that affect the quality or
C
activity so that harm to the surrounding is performance of the software being developed.
minimized.
T.
3. Which of the following term is best defined
10. Hazard identification mainly focus on by the statement: “There will be a change of
______________ organizational management with different
a) Chemical source and concentration priorities.”?
O
b) Chemical exposure a) Staff turnover
c) Chemical analysis b) Technology change
SP
d) Chemical pathway c) Management change
d) Product competition
Answer: a
Explanation: The main aim of hazard Answer: c
G
identification is to identify chemical source, Explanation: None.
concentration and its movement in
environment. 4. Which of the following term is best defined
LO
c) Production team
d) Project manager 5. What assess the risk and your plans for risk
mitigation and revise these when you learn
more about the risk?
SE
Answer: d
Explanation: Risk management involves a) Risk monitoring
anticipating risks that might affect the project b) Risk planning
schedule or the quality of the software being c) Risk analysis
developed, and then taking action to avoid d) Risk identification
C
these risks.
Answer: a
Explanation: None.
6. Which of the following risks are derived 10. Risk management is now recognized as
from the organizational environment where one of the most important project
the software is being developed? management tasks.
a) People risks a) True
b) Technology risks b) False
M
c) Estimation risks
d) Organizational risks Answer: a
Explanation: None.
O
Answer: d
Explanation: These risks are at management .
C
level.
TOPIC 3.14 PERT TECHNIQUE
T.
7. Which of the following risks are derived
from the software or hardware technologies
that are used to develop the system? 1. Which of the following is not a phase of
a) Managerial risks project management?
O
b) Technology risks a) Project planning
c) Estimation risks b) Project scheduling
SP
d) Organizational risks c) Project controlling
d) Project being
Answer: b
Explanation: The risks associated with Answer: d
Explanation: There are three phases of
G
technology might affect the product
development. project management. These are project
planning, project scheduling and project
LO
8. Which of the following term is best defined controlling. Project management refers to a
by the statement: “Derive traceability highly specialised job to achieve the
information to maximize information hiding objectives of a project.
in the design.”?
2. Who introduced the bar charts?
.B
d) Joseph henry
Answer: c
Explanation: Tracing the requirements can Answer: b
help us understand the risk. Explanation: Henry Gantt introduced the bar
-R
b) Minimization strategies
c) Contingency plans 3. Bar charts were modified later to obtain the
d) All of the mentioned milestone charts.
a) True
C
Answer: b b) False
Explanation: None.
M
milestone charts. a) True
b) False
4. The full form of PERT is ___________
O
a) Program Evaluation and Rate Technology Answer: b
b) Program Evaluation and Robot Technique Explanation: A CPM network is activity-
C
c) Program Evaluation and Robot Technology oriented while a PERT network is event-
d) Program Evaluation and Review oriented. Event is the completion of an
T.
Technique activity or the commencement of an activity.
An event may be head event, tail event or
Answer: d dual role event.
Explanation: There are various network
O
techniques that are called by various names 8. _________ are used to represent activity in
like PERT, CPM, TOPS and LESS. Network a network diagram.
SP
technique is one of the major advancements a) Circles
in management science. The full form of b) Squares
PERT is Program Evaluation and Review c) Rectangles
Technique. d) Arrows
G
5. The full form of CPM is ___________ Answer: d
a) Critical Path Method Explanation: A network is a flow diagram
LO
c) Blue
d) Green estimates made by PERT planners. These are
the optimistic time estimate, the pessimistic
Answer: d time estimate and the most likely time
Explanation: In bar charts, different colours estimate. The shortest possible time in which
C
are sometimes filled in the bars for showing an activity can be achieved under ideal
various control information. For actual circumstances is known as the optimistic time
progress, green colour is used. For anticipated estimate.
10. According to the time estimates made by 1. A randomized algorithm uses random bits
the PERT planners, the maximum time that as input inorder to achieve a _____________
would be needed to complete an activity is good performance over all possible choice of
called as __________ random bits.
a) The most likely time estimate a) worst case
M
b) Optimistic time estimate b) best case
c) Pessimistic time estimate c) average case
O
d) Expected time estimate d) none of the mentioned
Answer: c Answer: c
C
Explanation: According to the time estimates Explanation: A randomized algorithm is an
made by the PERT planners, the maximum algorithm that employs a degree of
T.
time that would be needed to complete an randomness as a part of its logic using
activity is called the pessimistic time random bits as inputs and in hope of
estimate. This estimate does not include producing average case good performace.
possible effects of floods, earthquakes, etc.
O
2. Which of the following options match the
11. In a network, a critical path is the time- given statement:
SP
wise shortest path. Statement: The algorithms that use the
a) True random input to reduce the expected running
b) False time or memory usage, but always terminate
with a correct result in a bounded amount of
G
Answer: b time.
Explanation: In a network, a critical path is a) Las Vegas Algorithm
the time-wise longest path. The critical path b) Monte Carlo Algorithm
LO
time available and the actual time needed to Explanation: The other type of algorithms
perform an activity is known as _________ are probabalistic algorithms, which
a) Free float depending upon the random input, have a
b) Independent float chance of producing incorrect results or fail
17
total float. Hence, the total float is the excess d) All of the mentioned
of the maximum available time throughout
the time of the activity. Answer: d
Explanation: Monte Carlo algorithms are
very vast, but only probably correct. On thr
C
TOPIC 3.15 MONTE CARLO other side, Las Vegas algorithms are always
SIMULATION correct, but probably fast.
M
d) All of the mentioned probalistic distribution.
O
Explanation: The atlantic city algorithms probability of finding after k iterations:
which are bounded polynomial time
C
algorithms are probably correct and probably find_a(array A, n, k)
fast. It is correct more than 75% of the times.
begin
T.
5. Prisonner’s dilemma can be related to the i=0
following:
a) cooperative behaviour repeat
O
b) graph theory
Randomly select one element out
c) Both (a) and (b)
SP
d) None of the mentioned i=i+1
punishment. b) (1-(1/3))k
c) 1-(1/2)k
6. Unix sort command uses _________ as its d) None of the mentioned
sorting technique.
.B
10. Which of the following can be referred to 3. In _________ the embedded devices and
as applications of Randomized algorithm? objects working under IoT are resource
a) Quicksort constrained.
b) Min Cut a) Health
c) Verifying Matrix Multiplication b) Industry
M
d) All of the mentioned c) Home
d) Information system
Answer: d
O
Explanation: Freivalds algorithm is a Answer: d
probabalistic randomized algorithm we use to Explanation: In the information system the
C
verify matrix multiplication. On the other embedded devices and objects working under
hand, Randomness can be useful in quicksort. IoT implementation are resource constrained.
T.
If the algorithm selects pivot element
uniformaly at random, it has a probably high 4. What type of networks is interacting under
probabilty of finishing the work in O(nlogn) IoT?
time regardless of the input. a) Heterogeneous only
O
b) Homogeneous Only
c) Both hetero and homogeneous
TOPIC 3.16 RESOURCE
SP
d) Neither hetero nor Homo
ALLOCATION
Answer: a
1. What is the popular method of organizing Explanation: Due to the huge number of
G
wireless network topologies? heterogeneous network elements interacting
a) Software and working under IoT based information
b) Synchronization systems, there is an enormous need for
LO
M
is to solicit the efforts and ongoing research application of IoT?
work in the domain of resource management a) Role of green IoT system
in IoT. b) QoS in communication
O
c) Secure communication
7. Resource management will elaborate the d) Multimedia communication
C
key aspects of _________
a) Industrial management Answer: a
T.
b) Energy management Explanation: Future applications of IoT:
c) Network management –> IoT based information system for Ambient
d) Information management living
–> Cyber Physical System in IoT
O
Answer: c –> Role of Green IoT system
Explanation: Resource management will –> Fog computing.
SP
elaborate the key aspects of energy
management, communication protocols and 11. The object of IoT will be empowered by
future applications of IoT for information ___________
systems. a) Network
G
b) Cloud
8. Resource management includes c) Devices
___________ d) Connectivity
LO
a) IoT Devices
b) IoT Cloud Answer: c
c) IoT Networks Explanation: The objects of the Internet of
d) IoT Web Things will be empowered by embedded
.B
M
Synchronization techniques
Answer: b
Answer: d Explanation: In architectural design you
O
Explanation: The use of Cluster, Software design a system organization satisfying the
agent, and Synchronization techniques in functional and non-functional requirements of
C
order to overcome the challenges of a system.
managing the resources of the Internet of
T.
Things objects. 2. A ________ view shows the system
hardware and how software components are
14. Which will reduce the energy distributed across the processors in the
expenditure? system.
O
a) Clustering a) physical
b) Software agents b) logical
SP
c) Synchronization techniques c) process
d) Cluster, Software agent, and d) all of the mentioned
Synchronization techniques
Answer: a
G
Answer: a Explanation: A physical view is
Explanation: Clustering will be beneficial to implemented by system engineers
reduce the energy expenditure and improve implementing the system hardware.
LO
Answer: b Answer: d
Explanation: Synchronization techniques Explanation: The UML was designed for
will be necessary to address the various describing object-oriented systems and, at the
-R
challenges of harmonising plenty of copies of architectural design stage, you often want to
object data with potentially partially describe systems at a higher level of
disconnected Internet of Things architecture abstraction.
SE
components.
4. Which of the following view shows that
the system is composed of interacting
TOPIC 3.17 CREATION OF processes at run time?
CRITICAL PATHS, COST a) physical
C
SCHEDULES. b) development
c) logical
d) process
M
c) model-view-controller
5. Which of the following is an architectural d) different operating system
conflict?
O
a) Using large-grain components improves Answer: c
performance but reduces maintainability Explanation: Model-View-Controller pattern
C
b) Introducing redundant data improves is the basis of interaction management in
availability but makes security more difficult many web-based systems.
T.
c) Localizing safety-related features usually
means more communication so degraded 9. What describes how a set of interacting
performance components can share data?
d) All of the mentioned a) model-view-controller
O
b) architecture pattern
Answer: d c) repository pattern
SP
Explanation: High availability architecture d) none of the mentioned
can be affected by several design factors that
are required to be maintained to ensure that Answer: c
no single points of failure exist in such Explanation: The majority of systems that
G
design. use large amounts of data are organized
around a shared database or repository.
6. Which of the following is not included in
LO
M
develop estimates of the information domain
characteristics?
a) Function point sizing
O
UNIT IV PROJECT b) Change sizing
c) Standard component sizing
MANAGEMENT AND
C
d) Fuzzy logic sizing
CONTROL
T.
Answer: a
Explanation: None.
TOPIC 4.1 FRAMEWORK FOR
MANAGEMENT AND CONTROL 5. The expected value for the estimation
O
variable (size), S, can be computed as a
weighted average of the optimistic(Sopt),
1. Why is decomposition technique required?
SP
most likely (Sm), and pessimistic (Spess)
a) Software project estimation is a form of
estimates given as
problem solving
b) Developing a cost and effort estimate for a a) EV = (Sopt + 4Sm + Spess)/4
software project is too complex b) EV = (Sopt + 4Sm + Spess)/6
G
c) All of the mentioned c) EV = (Sopt + 2Sm + Spess)/6
d) None of the mentioned d) EV = (Sopt + 2Sm + Spess)/4
LO
Answer: c Answer: b
Explanation: For these reasons, we Explanation: This assumes that there is a
decompose the problem, re-characterizing it very small probability that the actual size
as a set of smaller problems. result will fall outside the optimistic or
.B
pessimistic values.
2. Cost and effort estimation of a software
6. How many forms exists of Barry Boehm’s
uses only one forms of decomposition, either
COCOMO Model?
17
Answer: b
Answer: b
Explanation: Estimation uses one or both
forms of partitioning. Explanation: The three forms include the
basic, intermediate and advanced COCOMO
SE
c) Boehm Answer: b
d) Putnam and Myers Explanation: The planner must determine the
cause of divergence and then reconcile the
Answer: d estimates.
Explanation: None.
M
12. Programming language experience is a
8. In many cases, it is often more cost- part of which factor of COCOMO cost
effective to acquire, rather than develop, drivers?
O
computer software. a) Personnel Factor
a) True b) Product Factor
C
b) False c) Platform Factor
d) Project Factor
Answer: a
T.
Explanation: Managers are faced with a Answer: a
make-buy decision in such situations. Explanation: None.
O
9. A make-buy decision is based on whether 13. If an Indirect approach is taken, then the
a) The software may be purchased off-the- sizing approach is represented as
SP
shelf a) LOC
b) “Full-experience” or “Partial-experience” b) FP
software components should be used c) Fuzzy Logic
c) Customer-built software should be d) LOC and FP
developed
G
d) All of the mentioned Answer: b
Explanation: A function point (FP) is a unit
LO
Explanation: External inputs, external process, and events that occur as software
outputs, external inquiries, internal logical evolves from a preliminary concept to an
files, external interface files are the five operational implementation.
domains.
SE
a) True
b) False
11. The project planner must reconcile the
estimates based on decomposition techniques Answer: a
to produce a single estimate of effort. Explanation: None.
C
a) True
b) False 2. Which of the following is not an effective
software project management focus?
a) people Answer: c
b) product Explanation: A small number of framework
c) popularity activities are applicable to all software
d) process projects, regardless of their size or
complexity.
M
Answer: c
Explanation: Effective software project 6. Who defines the business issues that often
management focuses on the four P’s: people, have significant influence on the project?
O
product, process, and project. a) Practitioners
b) Project managers
C
3. PM-CMM stands for c) Senior managers
a) people management capability maturity d) None of the mentioned
T.
model
b) process management capability maturity Answer: c
model Explanation: None.
c) product management capability maturity
O
model 7. Who delivers the technical skills that are
d) project management capability maturity necessary to engineer a product or an
SP
model application?
a) Practitioners
Answer: a b) Project managers
Explanation: The people management c) Senior managers
G
maturity model defines the following key d) None of the mentioned
practice areas for software people: recruiting,
selection, performance management, training, Answer: a
LO
framework from which a comprehensive plan problems but may not perform as efficiently
for software development can be established. as other teams.
a) people
b) product 9. Which of the following is a people-
C
M
practitioners often make poor team leaders. d) Senior managers
O
and depends on individual initiative of the Explanation: A product is always built to
team members? satisfy an end-user.
C
a) random paradigm
b) open paradigm 3. Which of the following is not an effective
T.
c) closed paradigm project manager trait?
d) synchronous paradigm a) Problem solving
b) Managerial identity
Answer: d c) Influence and team building
O
Explanation: None. d) None of the mentioned
SP
11. Which of the following is not an approach Answer: d
to software cost estimation? Explanation: All are key traits of an effective
a) Empirical project manager.
b) Heuristic
c) Analytical 4. Which type of software engineering team
G
d) Critical has a defined leader who coordinates specific
tasks and secondary leaders that have
LO
6. Which software engineering team has no the functionality that must be delivered and
permanent leader? the process that will be used to deliver it.
a) Controlled decentralized (CD)
b) Democratic decentralized (DD) 10. Which of the following is not a sign that
c) Controlled Centralized (CC) indicates that an information systems project
M
d) None of the mentioned is in jeopardy?
a) Software people don’t understand their
Answer: b customers needs
O
Explanation: Here Communication among b) Changes are managed poorly
team members is horizontal. c) Sponsorship is gained
C
d) Users are resistant
7. Which of the following is not a project
T.
factor that should be considered when Answer: c
planning the structure of software engineering Explanation: Other options are contradictory
teams? to the question.
a) The difficulty of the problem to be solved
O
b) High frustration caused by personal, 11. SPMP stands for
business, or technological factors that causes a) Software Project Manager’s Plan
SP
friction among team members b) Software Project Management Plan
c) The degree of sociability required for the c) Software Product Management Plan
project d) Software Product Manager’s Plan
d) The rigidity of the delivery date
Answer: b
G
Answer: c Explanation: After planning is complete,
Explanation: Development is irrelevant of documenting of the plans is done in a
LO
a) Formal approaches
b) Formal, interpersonal procedures TOPIC 4.4 COST MONITORING
c) Informal, interpersonal procedures
d) All of the mentioned
17
Explanation: During the scoping activity management concept that helps us to control
decomposition is applied in two major areas: change without seriously impeding justifiable
change?
a) Baselines c) Baseline
b) Source code d) None of the mentioned
c) Data model
d) None of the mentioned Answer: a
Explanation: None.
M
Answer: a
Explanation: A baseline is analogous to the 6. Which of the following is the process of
kitchen doors in the restaurant. Before a assembling program components, data, and
O
software configuration item becomes a libraries, and then compiling and linking
baseline, change may be made quickly and these to create an executable system?
C
informally. a) System building
b) Release management
T.
3. Software Configuration Management can c) Change management
be administered in several ways. These d) Version management
include
a) A single software configuration Answer: a
O
management team for the whole organization Explanation: None.
b) A separate configuration management
SP
team for each project 7. Which of the following option is not
c) Software Configuration Management tracked by configuration management tools?
distributed among the project members a) Tracking of change proposals
d) All of the mentioned b) Storing versions of system components
c) Tracking the releases of system versions to
G
Answer: a customers
Explanation: None d) None of the mentioned
LO
process?
a) Change control Configuration Management Activity?
b) Version control a) Configuration item identification
c) SCIs b) Risk management
17
5. What complements the formal technical management standards is essential for quality
review by assessing a configuration object for certification in
characteristics that are generally not a) ISO 9000
considered during review? b) CMM
C
M
external release and keeping track of the a) Version and release identification
system versions that have been released for b) Build script generation
customer use? c) Project support
O
a) System building d) Change history recording
b) Release management
C
c) Change management Answer: b
d) Version management Explanation: All other options are a part of
T.
version management.
Answer: b
Explanation: None. 4. Which method recommends that very
frequent system builds should be carried out
O
. with automated testing to discover software
problems?
SP
a) Agile method
TOPIC 4.5 EARNED VALUE b) Parallel compilation method
ANALYSIS c) Large systems method
d) All of the mentioned
G
1. Which of the following process ensures
that versions of systems and components are Answer: a
recorded and maintained? Explanation: In keeping with the agile
LO
b) Version management
c) System building systems usually provide storage management
d) Release management facilities.
M
means that the versions of the components d) Mainline
making up the system cannot be changed.
Answer: a
O
7. Which of the following is a configuration Explanation: The code may then be
item? developed independently.
C
a) Design & Test specification
b) Source code .
T.
c) Log information
d) All of the mentioned
TOPIC 4.6 PRIORITIZING
Answer: d MONITORING
O
Explanation: A configuration item is an
approved and accepted deliverable, changes 1. “Robustness” answers which of the
SP
have to be made through formal procedure. following description?
a) CASE tools be used to support the process
8. Which of the following is a part of system activities
release? b) Process errors are avoided or trapped
a) electronic and paper documentation
G
before they result in product errors
describing the system c) Defined process is acceptable and usable
b) packaging and associated publicity that by the engineers responsible for producing
LO
Answer: d
Answer: d Explanation: None.
Explanation: Release creation is the process
of creating the collection of files and 2. Process improvement is the set of
17
documentation that includes all of the activities, methods, and transformations that
components of the system release. developers use to develop and maintain
information systems.
9. A sequence of baselines representing a) True
-R
M
problems Explanation: Process models may be
presented from different perspectives.
Answer: a
O
Explanation: None. 8. It is always best to start process analysis
with a new test model.
C
4. How many stages are there in process a) True
improvement? b) False
T.
a) three
b) four Answer: b
c) five Explanation: It is always best to start process
d) six analysis with an existing model. People then
O
may extend and change this.
Answer: a
SP
Explanation: Process measurement, analysis 9. What is a tangible output of an activity that
and change are the three stages. is predicted in a project plan?
a) Deliverable
5. In which stage of process improvement b) Activity
bottlenecks and weaknesses are identified? c) Condition
G
a) Process measurement d) Process
b) Process analysis
LO
M
process completion rather than changing it. Answer: b
Explanation: Risk management involves
12. The Capability Maturity Model (CMM) is anticipating risks that might affect the project
O
a continuous model. schedule or the quality of the software being
a) True developed, and then taking action to avoid
C
b) False these risks.
Answer: b
T.
3. Which of the following is not considered as
Explanation: The CMM is discrete rather a risk in project management?
than continuous. a) Specification delays
b) Product competition
O
13. The CMMI assessment is based on a x- c) Testing
point scale. What is the value of x? d) Staff turnover
SP
a) 0
b) 2 Answer: c
c) 4 Explanation: Testing is a part of project, thus
d) 6 it can’t be categorized as risk.
G
Answer: d 4. The process each manager follows during
Explanation: Not performed, performed, the life of a project is known as
LO
M
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
identified.
O
engineers and managers)
d) all of the mentioned
10. An independent relationship must exist
C
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
T.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
O
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
SP
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
G
TOPIC 4.8 CHANGE CONTROL
Answer: b
Explanation: The quality plan should set out
LO
3. Which of the following is not a main phase 8. What is one or more software configuration
in Configuration Management (CM) Process? items that have been formally reviewed and
a) CM Planning agreed upon and serve as a basis for further
b) Executing the CM process development?
c) CM audits a) Baseline
M
d) None of the mentioned b) Cumulative changes
c) CM
Answer: d
O
d) Change Control
Explanation: All are main phases of CM.
Answer: a
C
4. CM is about managing the different items Explanation: In configuration management, a
in the product, and changes in them. “baseline” is an agreed-to description of the
T.
a) True attributes of a product, at a point in time,
b) False which serves as a basis for defining change.
O
Explanation: None. a) By reviews
b) By inspections
SP
5. What allows different projects to use the c) By testing of code
same source files at the same time? d) All of the mentioned
a) Version Control
b) Access control Answer: c
c) CM Process
G
Explanation: Testing verifies the agreed-to
d) Version Control and Access control description.
LO
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
c) Review impact with stakeholders
d) None of the mentioned 11. SCM controls only the products of the
development process.
-R
Answer: d a) True
Explanation: All are required for a change. b) False
M
a) Reasons for making the changes b) A separate configuration management
b) A description of the proposed changes team for each project
c) List of other items affected by the changes
O
c) Software Configuration Management
d) All of the mentioned distributed among the project members
d) All of the mentioned
C
Answer: d
Explanation: A baseline is an agreed-to Answer: a
T.
description of the product, changes require Explanation: None
multiple reasons..
4. What combines procedures and tools to
. manage different versions of configuration
O
objects that are created during the software
TOPIC 4.9 SOFTWARE process?
SP
a) Change control
CONFIGURATION b) Version control
MANAGEMENT c) SCIs
d) None of the mentioned
G
1. Which of the following categories is part of
the output of software process? Answer: b
a) computer programs Explanation: Configuration management
LO
a) Baselines
b) Source code Answer: a
c) Data model Explanation: None.
SE
Answer: a .
Explanation: None.
M
7. Which of the following option is not TOPIC 4.10 MANAGING
tracked by configuration management tools? CONTRACTS - CONTRACT
O
a) Tracking of change proposals MANAGEMENT.
b) Storing versions of system components
C
c) Tracking the releases of system versions to 1. A voluntary arrangement between two or
customers more parties that is enforceable by law as a
T.
d) None of the mentioned binding legal agreement is known as
__________
Answer: d
a) job
Explanation: All the options are tracked.
O
b) loan
8. Which of the following is not a Software c) contract
d) mutual fund
SP
Configuration Management Activity?
a) Configuration item identification
Answer: c
b) Risk management
Explanation: A contract arises when the
c) Release management
parties agree that there is an agreement.
d) Branch management
G
Formation of a contract generally requires an
Answer: b offer, acceptance, consideration, and a mutual
LO
Avery where Lord Denning MR held that the 5. Which tender allows anyone to submit a
contract can only be voided if the plaintiff can tender to supply the goods or services that are
show that, at the time of agreement, the required?
plaintiff believed the other party’s identity a) Framework tendering
was of vital importance. A mere mistaken b) Selective tendering
M
belief as to the credibility of the other party is c) Open tendering
not sufficient. d) Close tendering
O
3. _______________ contract is one that has Answer: c
automatic renewals until one party requests Explanation: On larger projects, there may
C
termination. then be a pre-qualification process that
a) Uniform produces a short-list of suitable suppliers who
T.
b) Evergreen will be invited to prepare tenders. This sort of
c) Moderate pre-qualification process is not the same as
d) On-demand selective tendering.
Open tendering has been criticised for
O
Answer: b attracting tenders / expressions of interest
Explanation: If these are left unattended, from large numbers of suppliers, some of
SP
they can have significant cost impacts with whom may be entirely unsuitable for the
little value. If these agreements won’t work contract and as a result it can waste a great
for the company, the clauses stating the deal of time, effort and money. However,
contract automatically renews should be open tendering offers the greatest competition
G
removed. If the clause makes sense or cannot and has the advantage of allowing new or
be taken out, alerts can still be set in a emerging suppliers to try to secure work.
contract management platform as a reminder.
LO
d) Serial tendering
Answer: a
Explanation: Electronic signatures, or e- Answer: d
Signatures, have become crucial for Explanation: The rates submitted can then be
businesses as they seek to increase the speed used to value works over a series of similar
-R
of time-to-signature, e-Signatures are legally projects, often for a fixed period of time
binding and have the same legal status as a following which the tendering procedure may
written signature, as long as it fulfills the be repeated. Serial tendering can reduce
SE
requirements of the regulation it was created tender costs, and may encourage suppliers to
under. submit low rates to secure an ongoing
A contract management platform should program of work.
include the ability to integrate with an e-
Signature software, or include e-Signatures as 7. _______________ tendering is used when
C
M
Answer: a
Explanation: Single-stage tendering is the 9. Mutual mistake occurs when both parties
more traditional route, used when all the of a contract are mistaken as to the terms.
O
information necessary to calculate a realistic a) False
price is available when tendering commences: b) True
C
• An invitation to tender is issued to
prospective suppliers (perhaps following Answer: b
T.
completion of a pre-qualification Explanation: Each believes they are
questionnaire and/or a pre-tender interview). contracting to something different. Courts
The invitation to tender will include usually try to uphold such mistakes if a
information describing the goods or services reasonable interpretation of the terms can be
O
required in sufficient detail to enable found. However, a contract based on a mutual
prospective suppliers to prepare an accurate mistake in judgment does not cause the
SP
tender. contract to be voidable by the party that is
• Tenders are prepared and returned by adversely affected.
prospective suppliers (this may involve
questions and answers and a mid-tender 10. In Schedule contract the contractor
G
interview to clarify the client’s requirements). undertakes the execution or construction of
• Submitted tenders are then assessed and specific work with all its contingencies, to
compared (this may involve further complete it in all respect within a specified
LO
a) Holiday packages
b) Preliminarie contingencies, to complete it in all respect
c) A letter of invitation to tender within a specified time for a fixed amount. In
d) Design drawing this an owner agrees to pay a contractor a
specified lump sum after the completion of
-R
M
a) True framework from which a comprehensive plan
b) False for software development can be established.
a) people
O
Answer: a b) product
Explanation: None. c) process
C
d) none of the mentioned
2. Which of the following is not an effective
T.
software project management focus? Answer: c
a) people Explanation: A small number of framework
b) product activities are applicable to all software
c) popularity projects, regardless of their size or
O
d) process complexity.
SP
Answer: c 6. Who defines the business issues that often
Explanation: Effective software project have significant influence on the project?
management focuses on the four P’s: people, a) Practitioners
product, process, and project. b) Project managers
G
c) Senior managers
3. PM-CMM stands for d) None of the mentioned
a) people management capability maturity
LO
model Answer: c
b) process management capability maturity Explanation: None.
model
c) product management capability maturity 7. Who delivers the technical skills that are
necessary to engineer a product or an
.B
model
d) project management capability maturity application?
model a) Practitioners
b) Project managers
17
team/culture development.
some of the controls associated with the
4. Which of the following is not a project closed paradigm but also much of the
manager’s activity? innovation that occurs when using the random
a) project control paradigm?
C
M
are well suited to the solution of complex
problems but may not perform as efficiently
as other teams. TOPIC 5.4 MOTIVATION
O
9. Which of the following is a people- 1. Interviews are conversations with _______
C
intensive activity? a) fun
a) Problem solving b) purpose
T.
b) Organization c) friendliness
c) Motivation d) informality
d) Project management
Answer: b
O
Answer: d Explanation: The correct statement is:
Explanation: For this reason, competent Interviews are conversations with purpose.
SP
practitioners often make poor team leaders. For the employer the purpose is to determine
the most suitable person for the job.
10. Which paradigm structures a team loosely
and depends on individual initiative of the 2. A job interview is a formal meeting
team members?
G
between a job seeker and an employer.
a) random paradigm a) True
b) open paradigm b) False
LO
c) closed paradigm
d) synchronous paradigm Answer: a
Explanation: The statement is true. Interview
Answer: d is a formal face-to-face meeting. A job
Explanation: None.
.B
a) Empirical a) True
b) Heuristic b) False
c) Analytical
d) Critical Answer: a
-R
c) Music interview
BEHAVIOR d) Lunch interview
M
video interview and sequential interview. d) The audition
O
in which the employability of the job Explanation: For some positions such as
applicant is evaluated? computer programmers or trainers, companies
C
a) Stress interview want to see you in action before they make
b) Screening interview their decision. Here, the audition type is
T.
c) Group interview adapted.
d) Behavioural interview
9. In which of these, more than one candidate
Answer: b is interviewed?
O
Explanation: In the screening interview, a) The behavioural interview
companies use screening tools to ensure that b) The stress interview
SP
candidates meet minimum qualification c) The group interview
requirements. d) The audition
Explanation: There are two styles used in a 10. Which of these interviews is taken for a
screening interview. They are: the directive candidate far away?
style and the meandering style. a) Lunch interview
b) Telephone
17
M
TOPIC 5.6 STRESS , HEALTH Answer: a
AND SAFETY Explanation: Factor of safety tells us about
how much load the material can take before it
O
1. Which of the following is the numerator of fails. Basically, it states the load carrying
factor safety formula? capacity of a material beyond the actual load.
C
a) Working stress
b) Shear stress 5. What can understand by the factor of safety
T.
c) Tensile stress equal to one?
d) Ultimate stress a) It means that the structure will fail under
load
Answer: d b) It means that the structure will only
O
Explanation: Factor of safety is defined as support the actual load
ratio of ultimate stress and working stress. It c) it means that the structure will support
SP
is also called as factor of ignorance. The more than the actual load
factor of safety is dependent on the type of d) There is no relation between factor safety
load. and load application
G
2. Which of the following can be the factor of Answer: b
safety for a dead load? Explanation: When the factor of safety is one
a) 6 it means that the ultimate stress is equal to the
LO
d) 7
7. What is a safe factor of failure for a
Answer: b component which on failure can result in
Explanation: For shock loading, the range in financial loss or serious injury?
which the factor of safety can lie is 12 to 15. a) 1
C
M
more than 4.
3. Explain what is meant by PRODUCT with
8. Design factor for most aircraft structures is reference to one of the eight principles as per
O
2. the ACM/IEEE Code of Ethics ?
a) True a) The product should be easy to use
C
b) False b) Software engineers shall ensure that their
products and related modifications meet the
T.
Answer: b highest professional standards possible
Explanation: The design factor of safety for c) Software engineers shall ensure that their
most aircraft structures or components is products and related modifications satisfy the
taken to be 1.5 and not 2. More factors affect client
O
this value, but it is most of the time taken as d) It means that the product designed /created
1.5. should be easily available
SP
Answer: b
TOPIC 5.7 ETHICAL AND Explanation: None.
PROFESSIONAL CONCERNS OF
4. Identify an ethical dilemma from the
G
WORKING IN TEAMS
situations mentioned below:
a) Your employer releases a safety-critical
LO
senior management
property rights
d) All of the mentioned
d) Managing Client Relationships
Answer: a
17
Answer: c
Explanation: None.
Explanation: Engineers should normally
respect the confidentiality of their employers 5. Identify the correct statement: “Software
or clients irrespective of whether or not a engineers shall
-R
formal confidentiality agreement has been a) act in a manner that is in the best interests
signed. of his expertise and favour.”
They should be aware of local laws governing b) act consistently with the public interest.”
the use of intellectual property such as c) ensure that their products only meet the
SE
computers.”Here the term misuse refers to: Explanation: Software engineers shall act in
a) Unauthorized access to computer material a manner that is in the best interests of their
b) Unauthorized modification of computer client and employer consistent with the public
material
interest and shall ensure that their products 9. The reason for software bugs and failures
and related modifications meet the highest is due to
professional standards possible.Thus options a) Software companies
a & c are ruled out. b) Software Developers
c) Both Software companies and Developers
M
6. Select the incorrect statement: “Software d) All of the mentioned
engineers should
a) not knowingly accept work that is outside Answer: c
O
your competence.” Explanation: Software companies are
b) not use your technical skills to misuse responsible for making policies and providing
C
other people’s computers.” working atmosphere for the software
c) be dependent on their colleagues.” development, so in turn these companies
T.
d) maintain integrity and independence in become a part of software development
their professional judgment.” process.Bugs from developers side is no new
thing. Thus option c answers the question.
Answer: c
O
Explanation:None. 10. Company has latest computers and state-
of the- art software tools, so we shouldn’t
SP
7. Efficiency in a software product does not worry about the quality of the product.
include ________ a) True
a) responsiveness b) False
b) licensing
G
c) memory utilization Answer: b
d) processing time Explanation: The infrastructure is only one
of the several factors that determine the
LO
8. As per an IBM report, “31%of the project TOPIC 5.8 DECISION MAKING
get cancelled before they are completed, 53%
overrun their cost estimates by an average of 1. Software Maintenance includes
17
189% and for every 100 projects, there are 94 a) Error corrections
restarts”.What is the reason for these statistics b) Enhancements of capabilities
? c) Deletion of obsolete capabilities
a) Lack of adequate training in software d) All of the mentioned
-R
engineering
b) Lack of software ethics and understanding Answer: d
c) Management issues in the company Explanation: None.
SE
M
3. The modification of the software to match b) three
changes in the ever changing environment, c) four
falls under which category of software
O
d) five
maintenance?
a) Corrective Answer: b
C
b) Adaptive Explanation: The three categories include:
c) Perfective Coverage, Minimization and Safe techniques.
T.
d) Preventive
8. Which selective retest technique selects
Answer: b every test case that causes a modified
Explanation: None. program to produce a different output than its
O
original version?
4. How many phases are there in Taute a) Coverage
SP
Maintenance Model? b) Minimization
a) six c) Safe
b) seven d) Maximization
c) eight
G
d) nine Answer: c
Explanation: Safe techniques do not focus on
Answer: c coverage criteria, instead they select every
LO
b) Precision
Answer: a c) Generality
Explanation: All other options are known as d) Inclusiveness
levels of software testing which further have
-R
M
extent to which a technique chooses test cases d) None of the mentioned
that will cause the modified program to
produce different output than the original Answer: c
O
program, and thereby expose faults caused by Explanation: An implementation exhibits an
modifications. architecture if it conforms to the structural
C
decisions described by the architecture, the
. implementation must be divided into
T.
prescribed components.
TOPIC 5.9 ORGANIZATIONAL 4. Why does architecture dictates
STRUCTURES organizational structure?
O
a) Architecture describes the structure of the
1. Why is Software architecture so important? system being developed which becomes
SP
a) Communication among stakeholders engraved in the development project structure
b) Early Design decisions b) An implementation exhibits an architecture
c) Transferable abstraction of a system if it conforms to the structural decisions
d) All of the mentioned described by the architecture
G
c) Architecture may not describe structure as
Answer: d whole
Explanation: Reasons of the architecture to d) None of the mentioned
LO
M
6. Which of the following is correct for d) All of the mentioned
decisions made at life cycle level?
a) Decisions at all level of like cycle from Answer: a
O
high level design to coding, implementation Explanation: A local change is accomplished
affect system quality by modifying a single component.
C
b) Decisions at all level of like cycle from
high level design to coding, implementation 10. An architecture help in evolutionary
T.
may or may not affect system quality prototyping in which of the following ways?
c) Decisions at all level of like cycle from a) Potential performance problem can be
high level design to coding,implementation identified early in the product’s life cycle
does not affect system quality b) The system is executable early in the
O
d) None of the mentioned product’s life cycle
c) All of the mentioned
SP
Answer: a d) None of the mentioned
Explanation: Decisions at all level of like
cycle from high level design to coding, Answer: c
implementation affect system quality. Explanation: All the mentioned are the valid
G
ways.
7. Is it possible to make quality predictions
about a system based solely on evaluation of 11. Which of the following are software
LO
Answer: a Answer: d
Explanation: Yes it is possible to make Explanation: All of the mentioned are the
17
b) Non Local
c) Architectural d) Calls structure
d) All of the mentioned
Answer: a
Answer: d Explanation: Conceptual structure-describes
C
Explanation: All of the mentioned are true. units as abstraction of system’s functional
requirements.
13. Which structure’s view is orthogonal to as-you-go usage model allows for costs to be
the module and conceptual view? applied to individual accounts directly.
a) Module Structure
b) Process Structure 2. Point out the correct statement.
c) Uses Structure a) Except for tightly managed SaaS cloud
M
d) Data flow providers, the burden of resource
management is still in the hands of the user
Answer: b b) Cloud computing vendors run very reliable
O
Explanation: Process Structure-view is networks
orthogonal to the module and conceptual c) The low barrier to entry cannot be
C
view. accompanied by a low barrier to provisioning
d) All of the mentioned
T.
14. Which structure’s view shows the
mapping of software onto hardware? Answer: b
a) Module Structure Explanation: Often, cloud data is load-
b) Process Structure balanced between virtual systems and
O
c) Physical Structure replicated between sites.
d) Class Structure
SP
3. ________ captive requires that the cloud
Answer: c accommodate multiple compliance regimes.
Explanation: Physical Structure- view shows a) Licensed
the mapping of software onto hardware. b) Policy-based
G
c) Variable
15. Which structure describes units are d) All of the mentioned
programs or module?
LO
b) Compliance
c) Data Privacy
TOPIC 5.10 DISPERSED AND d) All of the mentioned
VIRTUAL TEAMS
-R
Answer: c
1. Which of the following subject area deals Explanation: To ensure data privacy in the
with pay-as-you-go usage model? cloud, additional security methods such as
private encryption, VLANs, firewalls, and
SE
a) Accounting Management
b) Compliance local storage of sensitive data are necessary.
c) Data Privacy
d) All of the mentioned 5. Point out the wrong statement.
a) Large cloud providers with geographically
C
b) Private data centers tend to be located in 9. Cloud ________ are standardized in order
places where the company or unit was to appeal to the majority of its audience.
founded or acquired a) SVAs
c) A network backbone is a very low-capacity b) SLAs
network connection c) SALs
M
d) None of the mentioned d) None of the mentioned
Answer: c Answer: b
O
Explanation: On the Internet, an Internet Explanation: Custom SLAs that allow for
backbone consists of the high-capacity routes multiple data sources are difficult to obtain or
C
and routers that are typically operated by an enforce.
individual service provider such as a
T.
government or commercial entity. 10. ___________ is a function of the
particular enterprise and application in an on-
6. Which of the following captive area deals premises deployment.
with monitoring? a) Vendor lock
O
a) Licensed b) Vendor lock-in
b) Variable but under control c) Vendor lock-ins
SP
c) Low d) None of the mentioned
d) All of the mentioned
Answer: b
Answer: b Explanation: Vendor lock-in for a cloud
G
Explanation: For private systems, any computing solution in a PaaS model is very
monitoring system the organization wishes to high.
deploy can be brought to bear.
LO
b) small
c) big TOPIC 5.12 COMMUNICATION
d) all of the mentioned PLANS
17
Answer: a
c) tenants Explanation: Noise is the external sounds
d) all of the mentioned present in the channels of communication,
which results in the reduction of the audibility
Answer: c
or omission of some words from the message.
C
M
Answer: b reduction exercise.
Explanation: Lack of planning must be a) True
avoided for effects communication. There are b) False
O
innumerable examples of people who would
give an ill planned, long winding lecture Answer: a
C
while a short presentation with tables or Explanation: The statement is true.
graphs would be sufficient. Communication should serve as a conflict-
T.
reduction exercise. When people start
3. __________ are problems arising from competing for the fulfillment of their narrow
expression. interests communication suffers.
a) Cultural barriers
O
b) Semantic problems 7. _______ means to impart understanding of
c) Wrong assumptions the message.
SP
d) Selecting perception a) Encoding
b) Receiver
Answer: b c) Decoding
Explanation: The correct statement is: d) Feedback
G
Semantic problems are problems arising from
expression or transmission of meaning in Answer: c
communication. Explanation: The correct statement is:
LO
b) False
complete?
Answer: a a) When the sender transmits the message
Explanation: The statement is true. Both b) When the message enters the channel
17
encoding and decoding of message are c) When the message leaves the channel
influenced by our emotions. Emotions play a d) When the receiver understands the
very important role in our lives. message.
-R
Answer: b a) Noise
Explanation: In the case of over b) Clarity
communication, the actual message is lost in
M
is the first and foremost enemy of effective communication?
communication. Every possible effort must be a) Clarity in language
made to eliminate the element of noise that b) Listen poorly
O
distorts communication. c) Home communication skills
d) Adequate medium
C
10. Which of these must be avoided for
effective communication? Answer: b
T.
a) Sharing of activity Explanation: In order to ensure an effective
b) Listening communication one must take care of ten
c) Ambiguity commandments: Clarity in language, home
d) Politeness communication skills, listen attentively, etc..
O
Answer: c
SP
Explanation: Ambiguity must be avoided.
Clarity and crispness of the message is very
G
LO
.B
17
-R
SE
C
2 A software project that meets all the given objectives is a success of _________.
A. Project fundamental purpose
B. Project quality
C. Project requirement
D. Project management*
11. What should a project manager do or follow to ensure clear boundaries for project completion?
a.Scope verification
b.Completing a scope statement*
c.scope definition
d.Process Management in OS
12. Before requirements can be analyzed, modeled, or specified they must be gathered through a/an_______
(a) Elicitation process*
(b) Interviewing
(c) Meeting
(d) None of given
13. When you build a product or system, it’s important to go through a series of predictable steps , the process which you
follow to develop it is known as________
(a)Software design
(b)Software process*
(c)Software schedule
(d)Framework
14. Which of the following is not an adaptation criteria for software projects?
a) Size of the project
b) Customers Complaints*
c) Project staff
d) Mission criticality
15. Commitments to unrealistic time and resource estimates may result in
a) project delay
b) poor quality work
c) project failure
d) all of the mentioned*
16. Which of the following is the reason that software is delivered late?
a) Changing customer requirements that are not reflected in schedule changes
b) Technical difficulties that could not have been foreseen in advance
c) Human difficulties that could not have been foreseen in advance
d) All of the mentioned*
17. Which of the following is an activity that distributes estimated effort across the planned project duration by allocating the
effort to specific software engineering tasks?
a) Software Macroscopic schedule
b) Software Project scheduling*
c) Software Detailed schedule
d) None of the mentioned
18. What evaluates the risk associated with the technology to be implemented as part of project scope?
a) Concept scoping
b) Preliminary concept planning8
c) Technology risk assessment
d) Customer reaction to the concept
19. Which of the following is not an adaptation criteria for software projects?
a) Size of the project
b) Customers Complaints*
c) Project staff
d) Mission criticality
20. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
a) Risk monitoring*
b) Risk planning
c) Risk analysis
d) Risk identification
21. Which of the following risks are derived from the organizational environment where the software is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks*
22. Which of the following risks are derived from the software or hardware technologies that are used to develop the
system?
a) Managerial risks
b) Technology risks*
c) Estimation risks
d) Organizational risks
23. Risk management is now recognized as one of the most important project management tasks.
a) True*
b) False
24. If desired rate of return is minimum by actual rate of return then it is classified as
a)future cash flows
b)present cash flows
c)positive cash flows
d)negative cash flows*
25. The present value of cash inflows is 50000 US $ and the present value of cash outflows is $ 55000 then NPV is
____________
26. If desired rate of return is exceeded by actual rate of return then it is classified as
a)positive cash flows
b)negative cash flows
c) future cash flows*
d)present cash flows
27. Which of the following is an important factor that can affect the accuracy and efficacy of estimates?
a) Project size*
b) Planning process
c) Project complexity
d) Degree of structural uncertainty
28. What describes the data and control to be processed?
a) Planning process
b) Software scope*
c) External hardware
d) Project complexity
29. Risk management is one of the most important jobs for a
a) Client
b) Investor
c) Production team
d) Project manager*
30. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk*
b) Project risk
c) Business risk
d) Programming risk
31. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
a) Risk monitoring*
b) Risk planning
c) Risk analysis
d) Risk identification
32. Which of the following risks are derived from the organizational environment where the software is being
developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks*
33. Which of the following risks are derived from the software or hardware technologies that are used to develop the
system?
a) Managerial risks
b) Technology risks*
c) Estimation risks
d) Organizational risks
34. Software consist of
a)programs
b) associated documentation
c) operating procedures
d) all of the above*
35. __ What threatens the quality and timeliness of the software to be produced?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks*
36. What threatens the viability of the software to be built?
a) Known risks
b) Business risks*
c) Project risks
d) Technical risks
37. Which of the following is a systematic attempt to specify threats to the project plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection*
38. Which risks are associated with the overall size of the software to be built or modified?
a) Business impact risks
b) Process definition risks
c) Product size risks*
d) Development environment risks
39. Which of the following term is best defined by the statement:”the degree of uncertainty that the product will meet its
requirements and be fit for its intended use.”?
a) Performance risk*
b) Cost risk
c) Support risk
d) Schedule risk
40. Which one is not a risk management activity?
a) Risk assessment
b) Risk generation*
c) Risk control
d) None of the mentioned
41. Which of the following is not project management goal?
a) Keeping overall costs within budget
b) Delivering the software to the customer at the agreed time
c) Maintaining a happy and well-functioning development team
d) Avoiding customer complaints*
42. Project managers have to assess the risks that may affect a project.
a) True
b) False*
43. Which of the following is not considered as a risk in project management?
a) Specification delays
b) Product competition
c) Testing*
d) Staff turnover
44. Which of the following is/are main parameters that you should use when computing the costs of a software development
project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned*
45. What is followed by the design task?
a) Choosing specific classes, operations
b) Checking model’s completeness
c) Following design task heuristics
d) All of the mentioned*
46. Which of the following is project management goal?
a) Keeping overall costs within budget
b) Delivering the software to the customer at the agreed time
c) Maintaining a happy and well-functioning development team
d) all of the mentioned*
47. Risk managers have to assess the risks that may affect a project.
a) True *
b) False
48. Which of the following is considered as a risk in project management?
a) Specification delays
b) Product competition
c) Delay in schedule
d) all of the mentioned*
49. Quality planning is the process of developing a quality plan for
a) team
b) project*
c) customers
d) project manager
50. Which of the following items should not be included in the software project management plan?
a) The techniques and case tools to be used
b) Detailed schedules, budgets and resource allocations
c) The life cycle model to be used
d) nONE*
51. The effective software project management focuses on four P’s People, Process, Product and Management True/ False
52. _____must plan, motivate, organize and control the practitioners who do software work
a) Project Managers*
b) Senior Managers
c) Customers
d) End users
53. Project management, is the application of knowledge, skills, tools, and techniques to project activities to meet the
project requirements
a. True*
b. False
54. Which is the first step in the software development life cycle ?
a) Analysis
b) Design
c) Problem/Opportunity Identification*
d) Development and Documentation
55. A step by step instruction used to solve a problem is known as
a) Sequential structure
b) A List
c) A plan
d) An Algorithm*
56. In the Analysis phase, the development of the ____________ occurs, which is a clear statement of the goals and
objectives of the project.
a) documentation
b) flowchart
c) program specification*
d) design
57. Actual programming of software code is done during the ____________ step in the SDLC.
a) Maintenance and Evaluation
b) Design
c) Analysis
d) Development and Documentation*
58. ____________ is the process of translating a task into a series of commands that a computer will use to perform that
task.
a) Project design
b) Installation
c) Systems analysis
d) Programming*
59. Selection of a model is based on
a) Requirements
b) Development team & Users
c) Project type and associated risk
d) All of the mentioned*
60. Which two models doesn’t allow defining requirements early in the cycle?
a) Waterfall & RAD
b) Prototyping & Spiral*
c) Prototyping & RAD
d) Waterfall & Spiral
61. Which of the following life cycle model can be chosen if the development team has less experience on similar projects?
a) Spiral*
b) Waterfall
c) RAD
d) Iterative Enhancement Model
62. If you were a lead developer of a software company and you are asked to submit a project/product within a stipulated
time-frame with no cost barriers, which model would you select?
a) Waterfall
b) Spiral
c) RAD*
d) Incremental
63. Which two of the following models will not be able to give the desired outcome if user’s participation is not involved?
a) Waterfall & Spiral
b) RAD & Spiral
c) RAD & Waterfall
d) RAD & Prototyping*
64. One can choose Waterfall Model if the project development schedule is tight.
a) True
b) False*
65 Investigation into whether a prospective project is worth starting, probable development cost, operational cost and
benefits of the new system are investigated.
a) Feasibility study*
b) Planning
c) System analysis
d) SRS
66. Difference between total cost and total income over the life of the project.
a) Net profit*
b) Payback period
c) Return on investment(ROI)
d) Net present value
67. Time taken to break even or pay back the initial investment
a) Net profit
b) Payback period*
c) Return on investment(ROI)
d) Net present value
68. Also known as the accounting rate of return (ARR)
a) Net profit
b) Payback period
c) Return on investment(ROI)*
d) Net present value
69. A project evaluation technique that takes into account the profitability of a project and the timing of the cash flows that
are produced
a) Net profit
b) Payback period
c) Return on investment(ROI)
d) Net present value*
70. ____________sum of all incoming and outgoing payments, discounted using an interest rate, to a fixed point in time
(the present)
a) Net profit
b) Payback period
c) Return on investment(ROI)
d) Net present value*
71. ____________is the discount rate that would produce an NPV of 0 for the project.
a) IRR*
e) Payback period
f) Return on investment(ROI)
g) Net present value
72 Identifying and estimating all of the costs and benefits of carrying out the project and operating the delivered application:
a) Cost-benefit analysis*
b) Feasibility analysis
c) Technical analysis
d) Business analysis
73. ________compares the sensitivity of each factor of project profiles by varying parameters which affect the project cost
benefits
a) Sensitivity analysis
b) Risk profiles*
c) Business analysis
d) None
74. Strategic Project Management is about forming clear links between your Projects and Strategic Objectives
True*
False
75. It is important to review plan to review quality aspects of the project plan.
a) True*
b) False
76. Includes the salaries and other employment costs of the staff in the development project.
a) Development Cost*
b) Set up cost
c) Operational cost
d) None
77. Includes costs of any new hardware and ancillary equipment in the development project.
a) Development Cost
b) Set up cost*
c) Operational cost
d) None
78. Consist of the cost of operating the system Once it has been installed.
a) Development Cost
b) Set up cost
c) Operational cost*
d) None
79. Earning directly from the operation of the proposed system.
a) Direct benefits*
b) Indirect benefits
c) Intangible benefits
d) None
80. Earning secondary benefits like increased accuracy of a proposed system
a) Direct benefits
b) Indirect benefits*
c) Intangible benefits
d) None
81 benefits difficult to quantify like lower recruitment cost:
a) Direct benefits
b) Indirect benefits
c) Intangible benefits*
d) None
82 Which one of the following is not a software process quality?
a) Productivity
b) Portability
c) Timeliness
d) Visibility
83 Purpose of process is to deliver software
a) in time
b) with acceptable quality
c) that is cost efficient
d) both in time & with acceptable quality*
84 Which are the types of requirements ?
a) Availability
b) Reliability
c) Usability
d) All of the mentioned*
85. Select the developer-specific requirement?
a) Portability
b) Maintainability
c) Availability
d) Both Portability and Maintainability*
86. Which one of the following is not a step of requirement engineering?
a) elicitation
b) design*
c) analysis
d) documentation
87. _____________&_____________ are two kinds of software products.
a) CAD, CAM
b) Firmware, Embedded
c) Generic, Customised*
d) None of the mentioned
88. Software costs more to maintain than it does to develop.
a) True*
b) False
89 Which one of the following is not an application of embedded software product?
a) keypad control of a security system
b) pattern recognition game playing*
c) digital function of dashboard display in a car
d) none of the mentioned
90. The only deliverable work product for a successful project is the working program.
a) True
b) False
91. The longer a fault exists in software
a) the more tedious its removal becomes
b) the more costly it is to detect and correct
c) the less likely it is to be properly corrected
d) All of the mentioned*
92 Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code).
a) 100-200*
b) 200-400
c) 400-1000
d) above 1000
93 What is the major advantage of using Incremental Model?
a) Customer can respond to each increment
b) Easier to test and debug
c) It is used when there is a need to get a product to the market early
d) *Easier to test and debug & It is used when there is a need to get a product to the market early*
94. Arrange the following steps to form a basic/general Engineering Process Model.
1. Test
2. Design
3. Install
4. Specification
5. Manufacture
6. Maintain
a) 2, 4, 5, 1, 6, 3
b) 4, 2, 5, 1, 3, 6*
c) 2, 4, 5, 1, 3, 6
d) 4, 2, 5, 1, 6, 3
95. Efficiency in a software product does not include ________
a) responsiveness
b) licensing*
c) memory utilization
d) processing time
96. Company has latest computers and state-of the- art software tools, so we shouldn’t worry about the quality of the
product.
a) True
b) False
97. RAD stands for
a) Relative Application Development
b) Rapid Application Development*
c) Rapid Application Document
d) None of the mentioned
98. Which one of the following is not a phase of Prototyping Model?
a) Quick Design
b) Coding*
c) Prototype Refinement
d) Engineer Product
99. SDLC stands for
a) Software Development Life Cycle*
b) System Development Life cycle
c) Software Design Life Cycle
d) System Design Life Cycle
100. Which model can be selected if user is involved in all the phases of SDLC?
a) Waterfall Model
b) Prototyping Model
c) RAD Model*
d) both Prototyping Model & RAD Model
Which one of the following charts would be the most useful to decompose the project activities
which one of the following is the critical path for the activity network given below?
a) A, B, F, H, G, I,L
b) A,B,F,H,I,L
c) A, C, D, J, K,L
d) A,C,D,G,K,L
Answer: c
Consider a portion of a PERT network diagram given below. What is the LF of activity C?
a) 10
b) 11
c) 16
d) 17
Answer: d
Consider a portion of a PERT network diagram given below. What is the ES of activity C?
a) 9
b) 10
c) 11
d) 12
Answer: b
PERT method differs from CPM in which one of the following aspects?
a) PERT uses statistical time durations where as CPM uses deterministic time durations.
b) PERT uses dummy activities whereas CPM does not
c) PERT uses free float, whereas CPM uses total float in critical path calculations.
d) PERT uses activity on arc whereas CPM uses activity on node networks.
Answer: a
Consider the data regarding the activities, their duration, and precedence for ascertain project given in the following table. What is the total project
duration?
Activity Duration Predecessors
A 14
B 13 A
C 20 A
D 10 B,C
a)37
b)44
c)47
d)57
Answer: b
Which one of the following statements regarding critical paths in a PERT chart is true?
a) A critical path through a PERT chart is any path through the chart that contains the least number
of edges.
b) Some activities on the critical path can have slack.
c) Every PERT chart has exactly one critical path.
d) It is possible that in the PERT chart for a project, there can be multiple critical paths, all having exactly the same duration.
Answer: d
For a project whose activities, their precedence ordering, estimated time for completion are given in the following table.
Immediate Estimated time
Activity in
follower
weeks
A E,B 3
B C,F 2
C D,G B
D F 4
E F 5
F 10
G 10
Which one of the following paths has the greatest slack time
a. A-E-F
b. A—B-C—G
c. A—B-C—D—F
d. A—B---F
Answer: d
What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
a) Risk monitoring
b) Risk planning
c) Risk analysis
d) Risk identification
Answer: a
Which of the following strategies means that the impact of the risk will be reduced?
a) Avoidance strategies
b) Minimization strategies
c) Contingency plans
d) All of the mentioned
Answer: b
a)Specification delays
b)Product competition
c)Testing
d) Staff turnover
Answer: c
Which one of the following is captured in the Work Breakdown Structure (WBS)?
a. The life cycle phases.
b. The logical order of tasks.
c. The scope of the project.
d. Project costs.
Answer: c
PERT/CPM is
A. Network techniques
B. Assignment techniques
C. Project evaluation techniques
D. None of the above
Answer: c
Which of these statements is not one of the Critical Chain fundamental principles?
A. The project performance first lies into the performance of each task
B. The resource availability is taken into account.
C. Project execution is managed by the relative consumption of buffers.
a Small projects
b Deterministic activities
Answer: c
PERT analysis is based upon
a Optimistic time
c Pessimistic time
Answer: d
a Event
b Node
c Connector
Answer: D
d Is a path that operates from the starting node to the end node
Answer: a
a Event
b Activity
c Dummy
d Contract
Answer: b
a normal time
b most likely time
c pessimistic time
d optimistic time
Answer: a
Among the following, critical path and slack time analysis most help .................
Activities A, B, and C are the immediate predecessors for Y activity. If the earliest finishing time for the three activities are 12, 15, and 10, then what will
be the earliest starting time for Y?
A. 10
B. 15
C. 12
D. Cannot be determined
Answer: B
Activities P, Q, and R instantly follow activity M, and their current starting times are 12, 19, and 10. So, what is the latest finishing time for activity M?
A. 11
B. 10
C. 18
D. Cannot be determined
Answer: A
Your actual cost is 155 and your earned value is 170. What is your cost variance?
A. 15
B. -15
C. 162.5
D. -155
ANSWER: A
Your project is behind schedule but has a positive cost variance. Completing the project in time is a top-priority. Which
approach to calculate the estimate at completion do you choose?
A. Continue to use BAC as the project needs to meet the plan
B. Estimate at completion using SPI and CPI
C. Estimate at completion with top-down ETC
D. Do the operational project work rather than wasting time calculating a new EAC
ANSWER: B
Your schedule performance index is 0.8. Which of the following statements is true?
A. The planned value exceeds the earned value by 0.8$
B. The project is ahead of schedule
C. The earned value exceeds the planned value by 0.8$
D. The project is behind schedule
ANSWER: D
Your project controlling shows you actual cost of 500 and an earned value of 600. Calculate the schedule performance index.
A. 0.8333
B. 1
C. 1.2
D. Not enough data provided to calculate the SPI
ANSWER: D
You are managing a project with a cumulative cost variance of -30 and you expect the project to perform at the budgeted rate.
Which of the following statements is true?
A. You expect your project to be completed within the budget
B. Your projected Variance at Completion is -30
C. You need to get a bottom-up ETC to determine your EAC
D. You should calculate the EAC considering CPI and SPI
ANSWER: B
Calculate the estimate at completion based on the current cost performance index for the following situation: AC=1150;
EV=1000; BAC=2000
A. 2300
B. 1739
C. 2000
D. 2150
ANSWER: A
The cumulative earned value is 40 with cumulative actual cost of 60. The budget at completion is 400. What is your current to-
complete-performance index?
A. 1.0588
B. 1.5
C. 0.9444
D. 1.2841
ANSWER: A
Your SPI is 0.8 and your CPI 1.1. Which of the following statements describes the current project status correctly?
A. The project incurred higher cost than planned and is behind schedule
B. The project incurred less cost than planned and is ahead of the schedule
C. The project incurred higher cost than planned but is ahead of the schedule
D. The project incurred less cost than planned but is behind schedule
ANSWER: B
What does a CPI of less than 1 tell you about the cost situation of your project?
A. The project will not be completed within the budget
B. The incurred cost are lower than the earned value
C. The project will be completed within the budget
D. The incurred cost are higher than the earned value
ANSWER: D
Teams occur when a number of people have ____________________ and recognise that their personal
success is dependent on the success of others.
A. common goal
B. Similar jobs
C. The same manager
D. A shared work environment
ANSWER: A
Groups which are formed as the consequence of organisational structure and work division are known as:
A. formal groups
B. operational groups
C. informal groups
D. target groups
ANSWER: A
In the Tuckman model, groups at the ___________________ stage develop guidelines and standards of
acceptable behaviour.
A. Norming
B. Adjourning
C. Forming
D. Storming
ANSWER: A
A virtual team is a collection of people who are _________________ separated but still
__________________ together closely.
A. Physically; think
B. Temporally; work
C. Geographically; work
D. Geographically; decide
ANSWER: C
A role-set is the range of contacts with whom an individual in a particular role has:
A. A line management relationship
B. Meaningful interactions
C. Daily contact
D. Regular appraisals
ANSWER: B
The team-role which is likely to demonstrate such positive qualities as imagination and creativity but may
show disregard for practical details is:
A. Shaper
B. Team Worker
C. Specialist
D. Plant
ANSWER: D
The team-role which is likely to demonstrate such positive qualities as strategic vision and accurate
judgement but may also be overly critical is:
A. Team Worker
B. Monitor-Evaluator
C. Specialist
D. Shaper
ANSWER: B
The risky-shift phenomenon means that there is a tendency for groups to make decisions which are
_______________________ than those which individual members would make.
A. Less risky
B. More conservative
C. Less consistent
D. More risky
ANSWER: D
Answer: d
Explanation: Projects need to be managed because professional software engineering is always
subject to organizational budget and schedule constraints.
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project schedule or
the quality of the software being developed, and then taking action to avoid these risks.
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as risk.
4. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and manage
projects successfully.
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–25%),
moderate (25–50%), high (50–75%), or very high (>75%).
6. Which of the following is/are main parameters that you should use when computing the costs of a
software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each activity
and, from this, calculating the total cost of activities.
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how these
are to be assessed.
8. Which of the following is incorrect activity for the configuration management of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes define how to record and process
proposed system changes, how to decide what system components to change, how to manage
different versions of the system and its components, and how to distribute changes to customers.
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are
identified.
10. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of the
attribute than can be measured.
11. Which of these truly defines Software design?
a) Software design is an activity subjected to constraints
b) Software Design specifies nature and composition of software product
c) Software Design satisfies client needs and desires
d) All of the mentioned
Answer: d
Explanation: Software design explains all of the statements as its definition.
16. Which of these are followed by the latest versions of structural design?
a) More detailed and flexible processes
b) Regular Notations
c) Wide support by CASE(Computer Aided Software Engineering)
d) Wide support by CASE, More detailed and flexible processes
Answer: d
Explanation: Notations used are more specialized and sophisticated one.
25. Which of the following is correct option for given statements about TQM?
Statement 1: Design of the formal system is a one time effort.
Statement 2: TQM is a management philosophy.
a) F, F
b) F, T
c) T, T
d) T, F
Answer: b
Explanation: Design of a system is not a onetime effort but it wills changes continuously according to
the customer need and organization.
TQM is a management philosophy to a journey of excellence of organization and also to satisfy
needs of customer.
26. What are the core principles of the TQM in a company-wide effort?
a) Customer and process orientation only
b) Continuous improvement only
c) Process orientation and continuous improvement only
d) Continuous improvement, process and customer orientation
Answer: d
Explanation: TQM as a company-wide effort emphasizes 3 core principles. These principles are
process orientation, customer orientation and continuous improvement. Some core areas are
essential to implement these principles that organization need to follow.
29. How many stages are needed for inspection and testing in TQM as per ISO 9001?
a) 1
b) 2
c) 3
d) 4
Answer: c
Explanation: There are three stages of inspection and testing as per ISO 9001. These stages are
receiving inspection and testing, in process inspection and third is testing and final inspection and
testing.
33. Which of the following is not a main phase in Configuration Management (CM) Process?
a) CM Planning
b) Executing the CM process
c) CM audits
d) None of the mentioned
Answer: d
Explanation: All are main phases of CM.
34. CM is about managing the different items in the product, and changes in them.
a) True
b) False
Answer: a
Explanation: None.
35. What allows different projects to use the same source files at the same time?
a) Version Control
b) Access control
c) CM Process
d) Version Control and Access control
Answer: a
Explanation: It allows software engineers to continue development along a branch even when a line
of development is frozen.
38. What is one or more software configuration items that have been formally reviewed and agreed
upon and serve as a basis for further development?
a) Baseline
b) Cumulative changes
c) CM
d) Change Control
Answer: a
Explanation: In configuration management, a “baseline” is an agreed-to description of the attributes
of a product, at a point in time, which serves as a basis for defining change.
44. Which of the following is an important factor that can affect the accuracy and efficacy of
estimates?
a) Project size
b) planning process
c) Project complexity
d) Degree of structural uncertainty
Answer: a
Explanation: As size increases, the interdependence among various elements of the software grows
rapidly.
47. The project planner examines the statement of scope and extracts all important software
functions which is known as
a) Association
b) Decomposition
c) Planning process
d) All of the mentioned
Answer: b
Explanation: None
48. Which of the following is not an option to achieve reliable cost and effort estimate?
a) Base estimates on similar projects that have already been completed
b) Use one or more empirical models for software cost and effort estimation
c) Use relatively simple decomposition techniques to generate project cost and effort estimates
d) The ability to translate the size estimate into human effort, calendar time, and dollars
Answer: d
Explanation: None.
49. What can be used to complement decomposition techniques and offer a potentially valuable
estimation approach in their own right?
a) Automated estimation tools
b) Empirical estimation models
c) Decomposition techniques
d) Both Automated estimation tools and Empirical estimation models
Answer: b
Explanation: An estimation model for computer software uses empirically derived formulas to predict
effort as a function of LOC or FP.
51. Software project estimation can never be an exact science, but a combination of good historical
data and systematic techniques can improve estimation accuracy.
a) True
b) False
Answer: a
Explanation: None.
53. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk
Answer: a
Explanation: Risks that affect the quality or performance of the software being developed.
54. Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition
Answer: c
Explanation: None.
55. Which of the following term is best defined by the statement: “The underlying technology on
which the system is built is superseded by new technology.”?
a) Technology change
b) Product competition
c) Requirements change
d) None of the mentioned
Answer: a
Explanation: Technology changes are common in the competitive environment of software
engineering.
56. What assess the risk and your plans for risk mitigation and revise these when you learn more
about the risk?
a) Risk monitoring
b) Risk planning
c) Risk analysis
d) Risk identification
Answer: a
Explanation: None.
57. Which of the following risks are derived from the organizational environment where the software
is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer: d
Explanation: These risks are at management level.
58. Which of the following risks are derived from the software or hardware technologies that are
used to develop the system?
a) Managerial risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer: b
Explanation: The risks associated with technology might affect the product development.
59. Which of the following term is best defined by the statement: “Derive traceability information to
maximize information hiding in the design.”?
a) Underestimated development time
b) Organizational restructuring
c) Requirements changes
d) None of the mentioned
Answer: c
Explanation: Tracing the requirements can help us understand the risk.
60. Which of the following strategies means that the impact of the risk will be reduced?
a) Avoidance strategies
b) Minimization strategies
c) Contingency plans
d) All of the mentioned
Answer: b
Explanation: None.
61. Risk management is now recognized as one of the most important project management tasks.
a) True
b) False
Answer: a
Explanation: None.
1. Which one of the following is not a software process quality?
a) Productivity
b) Portability
c) Timeliness
d) Visibility
Answer: b
Explanation: Portability is a software product quality which means software can run on different
hardware platforms or software environments.
Answer: c
Explanation: rest all is sub categories/applications of option c.
Answer: a
Explanation: For systems with a long life, maintenance costs may be several times development
costs.
Answer: b
Explanation: Pattern recognition uses Artificial Intelligence (AI) software.
Answer: d
Explanation: Cost of software is a management issue & is not related to process activities.
6. The work associated with software engineering can be categorized into three generic phases,
regardless of application area, project size, or complexity namely the__________ phase which
focuses on what, the_________ phase which focuses on how and the_________ phase which
focuses on change.
i. support
ii. development
iii. definition
a) 1, 2, 3
b) 2, 1, 3
c) 3, 2, 1
d) 3, 1, 2
Answer: c
Explanation: None.
7. Which of the following activities of a Generic Process framework provides a feedback report?
a) Communication
b) Planning
c) Modeling & Construction
d) Deployment
Answer: d
Explanation: In Deployment the product is delivered to the customer who evaluates the product and
provides feedback based on the evaluation.
8. Process adopted for one project is same as the process adopted from another project.
a) True
b) False
Answer: b
Explanation: the overall flow of activities, actions, tasks, the level of autonomy given to the software
team and the inter dependencies among two process can never be the same.
9. Which one of the following is not an Umbrella Activity that complements the five process
framework activities and help team manage and control progress, quality, change, and risk.
a) Reusability management
b) Risk management
c) Measurement
d) User Reviews
Answer: d
Explanation: None.
10. Four types of change are encountered during the support phase.Which one of the following is
not one that falls into such category?
a) Translation
b) Correction
c) Adaptation
d) Prevention
Answer: a
Explanation: Translation is done in the development phase.
11. Select the option that suits the Manifesto for Agile Software Development
a) Individuals and interactions
b) Working software
c) Customer collaboration
d) All of the mentioned
Answer: d
Explanation: None.
Answer: d
Explanation: The software is developed in increments with the customer specifying the requirements
to be included in each increment and the highest priority is to satisfy the customer through early and
continuous delivery of valuable software. They are iterative because they work on one iteration
followed by improvements in next iteration
Answer: b
Explanation: The 4GT approach does not incorporate iteration and the continuous feedback, which
is the fundamental aspect of an agile method.
14. Agility is defined as the ability of a project team to respond rapidly to a change.
a) True
b) False
Answer: b
Explanation: The aim of agile methods is to reduce overheads in the software process and to be
able to respond quickly to changing requirements without excessive rework.
Answer: c
Explanation: A plan-driven approach to software engineering is based around separate development
stages with the outputs to be produced at each of these stages planned in advance.
16. Agile methods seem to work best when team members have a relatively high skill level.
a) True
b) False
Answer: a
Explanation: None.
17. Which of the following does not apply to agility to a software process?
a) Uses incremental product delivery strategy
b) Only essential work products are produced
c) Eliminate the use of project planning and testing
d) All of the mentioned
Answer: c
Explanation: Testing is a major part of each software development process which can’t be avoided.
18. Which three framework activities are present in Adaptive Software Development (ASD) ?
a) analysis, design, coding
b) requirements gathering, adaptive cycle planning, iterative development
c) speculation, collaboration, learning
d) all of the mentioned
Answer: c
Explanation: None.
19. In agile development it is more important to build software that meets the customers’ needs
today than worry about features that might be needed in the future.
a) True
b) False
Answer: a
Explanation: None.
Answer: b
Explanation: None.
21. Which one of the following models is not suitable for accommodating any change?
a) Build & Fix Model
b) Prototyping Model
c) RAD Model
d) Waterfall Model
Answer: d
Explanation: Real projects rarely follow the sequential flow that the Waterfall Model proposes.
Answer: c
Explanation: There is no such thing as Diagonal Prototype whereas other options have their
respective definitions
Answer: b
Explanation: A prototyping model generates only a working model of a system.
Answer: c
Explanation: RAD Model consists of five phases namely: Business modeling, Data modeling,
Process modeling, Application generation and Testing & Turnover.
Answer: d
Explanation: The client may create an unrealistic product vision leading a team to over or under-
develop functionality. Also, the specialized & skilled developers are not easily available.
27. Which model can be selected if user is involved in all the phases of SDLC?
a) Waterfall Model
b) Prototyping Model
c) RAD Model
d) both Prototyping Model & RAD Model
Answer: c
Explanation: None.
28. Incremental development in Extreme Programming (XP) is supported through a system release
once every month.
a) True
b) False
Answer: b
Explanation: Incremental development is supported through small, frequent system releases.
29. In XP, as soon as the work on a task is complete, it is integrated into the whole system.
a) True
b) False
Answer: a
Explanation: XP follows a continuous integration approach.After any such integration, all the unit
tests in the system must pass.
Answer: b
Explanation: Extreme Programming (XP) takes an ‘extreme’ approach to iterative development.New
versions may be built several times per day, hence delivering the increment for approval every 2nd
week after testing the new version.
Answer: c
Explanation: User requirements are expressed as scenarios or user stories.These are written on
cards and the development team break them down into implementation tasks. These tasks are the
basis of schedule and cost estimates.
32. Is a customer involved test development and validation in XP ?
a) Yes
b) No
c) it may vary from Customer to Customer
d) none of the mentioned
Answer: c
Explanation: The role of the customer in the testing process is to help develop acceptance tests for
the stories that are to be implemented in the next release of the system.However, people adopting
the customer role have limited time available and so cannot work full-time with the development
team. They may feel that providing the requirements was enough of a contribution and so may be
reluctant to get involved in the testing process.
33. Programmers prefer programming to testing and sometimes they take shortcuts when writing
tests. For example, they may write incomplete tests that do not check for all possible exceptions that
may occur.
a) True
b) False
Answer: a
Explanation: In XP Some tests can be very difficult to write incrementally.For example, in a complex
user interface, it is often difficult to write unit tests for the code that implements the ‘display logic’ and
workflow between screens.
Answer: a
Explanation: Automated test harnesses are used to run all component tests each time that a new
release is built.
35. In XP an automated unit test framework is used to write tests for a new piece of functionality
before that functionality itself is implemented.
a) True
b) False
Answer: a
Explanation: XP follows Test-first development approach.
36. Developers work individually on a release and they compare their results with other developers
before forwarding that release to customers.
a) True
b) False
Answer: b
Explanation: XP follows the principle of pair programming which means developers work in pairs,
checking each other’s work and providing the support to always do a good job.
37. Which four framework activities are found in the Extreme Programming(XP) ?
a) analysis, design, coding, testing
b) planning, analysis, design, coding
c) planning, design, coding, testing
d) planning, analysis, coding, testing
Answer: c
Explanation: XP involves the mentioned four activities, and in the same in order.
38. Which of the following are parameters involved in computing the total cost of a software
development project?
a) Hardware and software costs
b) Effort costs
c) Travel and training costs
d) All of the mentioned
Answer: d
Explanation: All these are accounted for in estimating a software development cost.
39. Which of the following costs is not part of the total effort cost?
a) Costs of networking and communications
b) Costs of providing heating and lighting office space
c) Costs of lunch time food
d) Costs of support staff
Answer: c
Explanation: This is a incurred by the employees.
Answer: a
Explanation: Productivity is expressed in terms of the amount of useful functionality produced in
some given time. Function points and object points
are the best-known metrics of this type.
41. A _________ is developed using historical cost information that relates some software metric to
the project cost.
a) Algorithmic cost modeling
b) Expert judgments
c) Estimation by analogy
d) Parkinson’s Law
Answer: a
Explanation: The model uses a basic regression formula with parameters that are derived from
historical project data and current as well as future project characteristics.
42. It is often difficult to estimate size at an early stage in a project when only a specification is
available
a) True
b) False
Answer: a
Explanation: Function-point and object-point estimates are easier to produce than estimates of code
size but are often still inaccurate.
43. Which technique is applicable when other projects in the same analogy application domain have
been completed?
a) Algorithmic cost modeling
b) Expert judgments
c) Estimation by analogy
d) Parkinson’s Law
Answer: c
Explanation: The cost of a new project is estimated by analogy with these completed projects.
44. Which model assumes that systems are created from reusable components, scripting or
database programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer: a
Explanation: It is designed to make estimates of prototype development.
45. Which of the following states that work expands to fill the time available.
a) CASE tools
b) pricing to win
c) Parkinson’s Law
d) Expert judgments
Answer: c
Explanation: The cost is determined by available resources rather than by objective assessment. If
the software has to be delivered in 12 months and 5 people are available, the effort required is
estimated to be 60 person-months.
46. Which model is used during early stages of the system design after the requirements have been
established?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer: d
Explanation: Estimates are based on function points, which are then converted to number of lines of
source code. The formula follows the standard form discussed above with a simplified set of seven
multipliers.
47. Which model is used to compute the effort required to integrate reusable components or
program code that is automatically generated by design or program translation tools?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer: c
Explanation: None.
48. The COCOMO model takes into account different approaches to software development, reuse,
etc
a) True
b) False
Answer: b
Explanation: Its the COCOMO-2 model. COCOMO 2 incorporates a range of sub-models that
produce increasingly detailed software estimates.
Answer: d
Explanation: Complexity metrics measure the logical complexity of source code.
Answer: b
Explanation: These metrics lead to the design of test cases that provide program coverage.
52. How many Information Domain Values are used for Function Point Computation?
a) three
b) four
c) five
d) six
Answer: c
Explanation: The five values are: External Inputs, External Outputs, External Inquiries, Internal
Logical Files and External Interface Files.
Answer: b
Explanation: Option b is the correct formula for Function Point Computation.
Answer: a
Explanation: They are “black box” in that they do not require any knowledge of the inner workings of
a particular software component.
55. The amount of time that the software is available for use is known as
a) Reliability
b) Usability
c) Efficiency
d) Functionality
Answer: a
Explanation: None.
56. Usability in metric analysis is defined as the degree to which the software
a) stated needs
b) is easy to use
c) makes optimal use of system resources
d) none of the mentioned
Answer: b
Explanation: None.
1. Which of the following is not project management goal?
a) Keeping overall costs within budget
b) Delivering the software to the customer at the agreed time
c) Maintaining a happy and well-functioning development team
d) Avoiding customer complaints
Answer: d
Explanation: Projects need to be managed because professional software engineering is always
subject to organizational budget and schedule constraints.
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project schedule or
the quality of the software being developed, and then taking action to avoid these risks.
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as risk.
4. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and manage
projects successfully.
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–25%),
moderate (25–50%), high (50–75%), or very high (>75%).
6. Which of the following is/are main parameters that you should use when computing the costs of a
software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each activity
and, from this, calculating the total cost of activities.
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how these
are to be assessed.
8. Which of the following is incorrect activity for the configuration management of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes define how to record and process
proposed system changes, how to decide what system components to change, how to manage
different versions of the system and its components, and how to distribute changes to customers.
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are
identified.
10. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of the
attribute than can be measured.
11. Which of the following is the reason that software is delivered late?
a) Changing customer requirements that are not reflected in schedule changes
b) Technical difficulties that could not have been foreseen in advance
c) Human difficulties that could not have been foreseen in advance
d) All of the mentioned
Answer: d
Explanation: None.
12. Which of the following is an activity that distributes estimated effort across the planned project
duration by allocating the effort to specific software engineering tasks?
a) Software Macroscopic schedule
b) Software Project scheduling
c) Software Detailed schedule
d) None of the mentioned
Answer: b
Explanation: None.
13. Every task that is scheduled should be assigned to a specific team member is termed as
a) Compartmentalization
b) Defined milestones
c) Defined responsibilities
d) Defined outcomes
Answer: c
Explanation: These responsibilities are domain specific.
14. What is a collection of software engineering work tasks, milestones, and deliverables that must
be accomplished to complete a particular project?
a) Task set
b) Degree of milestone
c) Adaptation criteria
d) All of the mentioned
Answer: a
Explanation: None.
15. Ensuring that no more than the allocated number of people are allocated at any given time in
Software Scheduling is known as
a) Time Allocation
b) Effort Validation
c) Defined Milestone
d) Effort Distribution
Answer: b
Explanation: None.
16. What is used to determine the recommended degree of rigor with which the software process
should be applied on a project?
a) Degree of Rigor
b) Adaptation criteria
c) Task Set
d) Both degree of Rigor and adaptation criteria
Answer: b
Explanation: Four different degrees of rigor are: casual, structured, strict, and quick reaction.
17. What evaluates the risk associated with the technology to be implemented as part of project
scope?
a) Concept scoping
b) Preliminary concept planning
c) Technology risk assessment
d) Customer reaction to the concept
Answer: b
Explanation: None.
18. Which of the following is not an adaptation criteria for software projects?
a) Size of the project
b) Customers Complaints
c) Project staff
d) Mission criticality
Answer: b
Explanation: These can vary from client to client.
19. Which of the following is a project scheduling method that can be applied to software
development?
a) PERT
b) CPM
c) CMM
d) Both PERT and CPM
Answer: d
Explanation: Program evaluation and review technique (PERT) and critical path method (CPM) are
two project scheduling methods that can be applied to software development.
Answer: b
Explanation: The earned value system provides a common value scale for every task, regardless of
the type of work being performed. The total hours to do the whole project are estimated, and every
task is given an earned value based on its estimated percentage of the total.
Answer: a
Explanation: A recommended distribution of effort across the software process is 40% (analysis and
design), 20% (coding), and 40% (testing).
Answer: a
Explanation: Timeline chart, also called a Gantt chart was invented by Henry Gantt, an industrial
engineer in 1917.
Answer: a
Explanation: None.
Answer: b
Explanation: Software testing is the process of evaluation a software item to detect differences
between given input and expected output.
Answer: a
Explanation: A run chart is used to monitor the behavior of a variable over time for a process or
system. Run charts graphically display cycles, trends, shifts, or non-random patterns in behavior
over time. It contains lower and upper limits.
Answer: c
Explanation: Maintenance Testing is done on the already deployed software. The deployed software
needs to be enhanced, changed or migrated to other hardware. The Testing done during this
enhancement, change and migration cycle is known as maintenance testing.
Answer: b
Explanation: The structural testing is the testing of the structure of the system or component.
Structural testing is often referred to as ‘white box’ or ‘glass box’ or ‘clear-box testing’ because in
structural testing we are interested in what is happening ‘inside the system/application’.
Answer: c
Explanation: Exhaustive testing is the testing where we execute single test case for multiple test
data.It means if we are using single test case for different product or module under manual testing.
testing.
30. Which of the following is/are White box technique?
a) Statement Testing
b) Decision Testing
c) Condition Coverage
d) All of the mentioned
Answer: d
Explanation: Statement testing, decision testing, condition coverage all of them uses white box
technique.
Answer: d
Explanation: Unit, system, integration testing all of them are levels in testing.
Answer: b
Explanation: Boundary value analysis is based on testing at the boundaries between partitions and
checks the output with expected output.
Answer: a
Explanation: Alpha testing takes place at the developer’s end. Developers observe the users and
note problems. Alpha testing is testing of an application when development is about to complete.
Minor design changes can still be made as a result of alpha testing.
Answer: c
Explanation: Hazard identification is the first step in risk assessment. The goal is to understand the
concentration of toxins, spatial distribution and there movement.
35. Which of the following data is not required for hazard identification?
a) Land use
b) Contaminant levels
c) Affected population
d) Estimation of risk
Answer: d
Explanation: Estimation of risk is done at risk characterization whereas land use, contaminant level,
affected population and biota data play a major role while identifying a hazard.
Answer: b
Explanation: Risk is the probability of suffering harm whereas hazard is a potential source of harm.
Answer: a
Explanation: Risk assessment helps to understand possible problems and provides alternatives as
well as control measures to reduce the accident.
38. The purpose of risk management is to identify potential problems before they occur so that risk-
handling activities may be planned.
a) False
b) True
Answer: b
Explanation: The main goal of risk management is to reduce the threats from an activity so that harm
to the surrounding is minimized.
Answer: d
Explanation: Risk management involves anticipating risks that might affect the project schedule or
the quality of the software being developed, and then taking action to avoid these risks.
40. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk
Answer: a
Explanation: Risks that affect the quality or performance of the software being developed.
41. Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition
Answer: c
Explanation: None.
42. Which of the following term is best defined by the statement: “The underlying technology on
which the system is built is superseded by new technology.”?
a) Technology change
b) Product competition
c) Requirements change
d) None of the mentioned
Answer: a
Explanation: Technology changes are common in the competitive environment of software
engineering.
43. What assess the risk and your plans for risk mitigation and revise these when you learn more
about the risk?
a) Risk monitoring
b) Risk planning
c) Risk analysis
d) Risk identification
Answer: a
Explanation: None.
44. Which of the following risks are derived from the organizational environment where the software
is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer: d
Explanation: These risks are at management level.
45. Which of the following risks are derived from the software or hardware technologies that are
used to develop the system?
a) Managerial risks
b) Technology risks
c) Estimation risks
d) Organizational risks
Answer: b
Explanation: The risks associated with technology might affect the product development.
46. Which of the following term is best defined by the statement: “Derive traceability information to
maximize information hiding in the design.”?
a) Underestimated development time
b) Organizational restructuring
c) Requirements changes
d) None of the mentioned
Answer: c
Explanation: Tracing the requirements can help us understand the risk.
47. Which of the following strategies means that the impact of the risk will be reduced?
a) Avoidance strategies
b) Minimization strategies
c) Contingency plans
d) All of the mentioned
Answer: b
Explanation: None.
48. Risk management is now recognized as one of the most important project management tasks.
a) True
b) False
Answer: a
Explanation: None.
Answer: d
Explanation: There are three phases of project management. These are project planning, project
scheduling and project controlling. Project management refers to a highly specialized job to achieve
the objectives of a project.
Answer: d
Explanation: There are various network techniques that are called by various names like PERT,
CPM, TOPS and LESS. Network technique is one of the major advancements in management
science. The full form of PERT is Program Evaluation and Review Technique.
Answer: a
Explanation: The full form of CPM is the Critical Path Method. CPM networks are mainly used for
those projects for which a fairly accurate estimate of time of completion can be made for each
activity.
Answer: b
Explanation: A CPM network is activity-oriented while a PERT network is event-oriented. Event is
the completion of an activity or the commencement of an activity. An event may be head event, tail
event or dual role event.
53. According to the time estimates made by the PERT planners, the maximum time that would be
needed to complete an activity is called as __________
a) The most likely time estimate
b) Optimistic time estimate
c) Pessimistic time estimate
d) Expected time estimate
Answer: c
Explanation: According to the time estimates made by the PERT planners, the maximum time that
would be needed to complete an activity is called the pessimistic time estimate. This estimate does
not include possible effects of floods, earthquakes, etc.
Answer: b
Explanation: In a network, a critical path is the time-wise longest path. The critical path in the Critical
Path Method plays an essential role in scheduling and planning.
55. The difference between the maximum time available and the actual time needed to perform an
activity is known as _________
a) Free float
b) Independent float
c) Total float
d) Half float
Answer: c
Explanation: The difference between the maximum time available and the actual time needed to
perform an activity is known as the total float. Hence, the total float is the excess of the maximum
available time throughout the time of the activity.
1. Which of the following is not project management goal?
a) Keeping overall costs within budget
b) Delivering the software to the customer at the agreed time
c) Maintaining a happy and well-functioning development team
d) Avoiding customer complaints
Answer: d
Explanation: Projects need to be managed because professional software engineering is
always subject to organizational budget and schedule constraints.
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project
schedule or the quality of the software being developed, and then taking action to avoid
these risks.
3. Which of the following is not considered as a risk in project management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as risk.
4. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and
manage projects successfully.
5. A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–
25%), moderate (25–50%), high (50–75%), or very high (>75%).
6. Which of the following is/are main parameters that you should use when computing the costs
of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each
activity and, from this, calculating the total cost of activities.
7. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how
these are to be assessed.
8. Which of the following is incorrect activity for the configuration management of a software
system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes define how to record and
process proposed system changes, how to decide what system components to change, how
to manage different versions of the system and its components, and how to distribute
changes to customers.
9. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are
identified.
10. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of
the attribute than can be measured.
11. In a similar way to structure prediction methods models can be evaluated using RMSD to
measure the similarity between two molecular complexes.
a) True
b) False
Answer: a
Explanation: This is only the case if an experimental structure already exists. Several
docking methods have been evaluated at ‘Critical Assessment of Structure Prediction 2’
(CASP2) for both protein-ligand and protein-protein interactions.
12. In practical circumstances there exists an experimental structure of the complex.
a) True
b) False
Answer: a
Explanation: In practical circumstances an experimental structure of the complex does not
already exist. Some other evaluation criteria are needed. This is by necessity experimental
validation. The hypothetical protein-biomolecular complex predicts a mode of interaction
between the two molecules that can be tested experimentally.
13. Which of the following is not project management goal?
a) Keeping overall costs within budget
b) Delivering the software to the customer at the agreed time
c) Maintaining a happy and well-functioning development team
d) Avoiding customer complaints
Answer: d
Explanation: Projects need to be managed because professional software engineering is
always subject to organizational budget and schedule constraints.
14. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project
schedule or the quality of the software being developed, and then taking action to avoid
these risks.
15. Which of the following is not considered as a risk in project management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as risk.
16. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and
manage projects successfully.
17. A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–
25%), moderate (25–50%), high (50–75%), or very high (>75%).
18. Which of the following is/are main parameters that you should use when computing the costs
of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each
activity and, from this, calculating the total cost of activities.
19. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how
these are to be assessed.
20. Which of the following is incorrect activity for the configuration management of a software
system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes define how to record and
process proposed system changes, how to decide what system components to change, how
to manage different versions of the system and its components, and how to distribute
changes to customers.
21. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are
identified.
22. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of
the attribute than can be measured.
23. A voluntary arrangement between two or more parties that is enforceable by law as a binding
legal agreement is known as __________
a) job
b) loan
c) contract
d) mutual fund
Answer: c
Explanation: A contract arises when the parties agree that there is an agreement. Formation
of a contract generally requires an offer, acceptance, consideration, and a mutual intent to be
bound. Each party to a contract must have capacity to enter the agreement. Minors,
intoxicated persons, and those under a mental affliction may have insufficient capacity to
enter a contract. Some types of contracts may require formalities, such as a memorialization
in writing.
24. _______________ contract is one that has automatic renewals until one party requests
termination.
a) Uniform
b) Evergreen
c) Moderate
d) On-demand
Answer: b
Explanation: If these are left unattended, they can have significant cost impacts with little
value. If these agreements won’t work for the company, the clauses stating the contract
automatically renews should be removed. If the clause makes sense or cannot be taken out,
alerts can still be set in a contract management platform as a reminder.
25. How are final contracts signed in modern business?
a) e-Signatures
b) Document scanning
c) Thump impression
d) Shaking hands
Answer: a
Explanation: Electronic signatures, or e-Signatures, have become crucial for businesses as
they seek to increase the speed of time-to-signature, e-Signatures are legally binding and
have the same legal status as a written signature, as long as it fulfills the requirements of the
regulation it was created under.
A contract management platform should include the ability to integrate with an e-Signature
software, or include e-Signatures as part of the platform.
26. An invitation to tender might not include?
a) Holiday packages
b) Preliminarie
c) A letter of invitation to tender
d) Design drawing
Answer: a
Explanation: An invitation to tender might be issued for a range of contracts, including;
equipment supply, the main construction contract (perhaps including design by the
contractor), demolition, enabling works and so on.
An invitation to tender might include:
• A letter of invitation to tender.
• The form of tender.
• Preliminaries.
• The form of contract.
• A tender pricing document.
• A drawing schedule.
• Design drawings.
• Specifications.
27. Mutual mistake occurs when both parties of a contract are mistaken as to the terms.
a) False
b) True
Answer: b
Explanation: Each believes they are contracting to something different. Courts usually try to
uphold such mistakes if a reasonable interpretation of the terms can be found. However, a
contract based on a mutual mistake in judgment does not cause the contract to be voidable
by the party that is adversely affected.
28. Which of the following categories is part of the output of software process?
a) computer programs
b) documents that describe the computer programs
c) data
d) all of the mentioned
Answer: d
Explanation: None
29. Which is a software configuration management concept that helps us to control change
without seriously impeding justifiable change?
a) Baselines
b) Source code
c) Data model
d) None of the mentioned
Answer: a
Explanation: A baseline is analogous to the kitchen doors in the restaurant. Before a
software configuration item becomes a baseline, change may be made quickly and
informally.
30. Software Configuration Management can be administered in several ways. These include
a) A single software configuration management team for the whole organization
b) A separate configuration management team for each project
c) Software Configuration Management distributed among the project members
d) All of the mentioned
Answer: a
Explanation: None
31. What combines procedures and tools to manage different versions of configuration objects
that are created during the software process?
a) Change control
b) Version control
c) SCIs
d) None of the mentioned
Answer: b
Explanation: Configuration management allows a user to specify alternative configurations of
the software system through the selection of appropriate versions.
32. What complements the formal technical review by assessing a configuration object for
characteristics that are generally not considered during review?
a) Software configuration audit
b) Software configuration management
c) Baseline
d) None of the mentioned
Answer: a
Explanation: None.
33. Which of the following is the process of assembling program components, data, and libraries,
and then compiling and linking these to create an executable system?
a) System building
b) Release management
c) Change management
d) Version management
Answer: a
Explanation: None.
34. Which of the following option is not tracked by configuration management tools?
a) Tracking of change proposals
b) Storing versions of system components
c) Tracking the releases of system versions to customers
d) None of the mentioned
Answer: d
Explanation: All the options are tracked.
35. Which of the following is not a Software Configuration Management Activity?
a) Configuration item identification
b) Risk management
c) Release management
d) Branch management
Answer: b
Explanation: Risk management is an entirely different domain.
36. The definition and use of configuration management standards is essential for quality
certification in
a) ISO 9000
b) CMM
c) CMMI
d) All of the mentioned
Answer: d
Explanation: It is defined in all the mentioned options.
37. What involves preparing software for external release and keeping track of the system
versions that have been released for customer use?
a) System building
b) Release management
c) Change management
d) Version management
Answer: b
Explanation: None.
38. SCM stands for
a) Software Control Management
b) Software Configuration Management
c) Software Concept Management
d) None of the mentioned
Answer: b
Explanation: In software engineering, software configuration management (SCM) is the task
of tracking and controlling changes in the software, part of the larger cross-discipline field of
configuration management.
39. When code is made available to others, it goes in a/an
a) hard drive
b) access-controlled library
c) servers
d) access control
Answer: b
Explanation: None.
40. Which of the following is not a main phase in Configuration Management (CM) Process?
a) CM Planning
b) Executing the CM process
c) CM audits
d) None of the mentioned
Answer: d
Explanation: All are main phases of CM.
41. CM is about managing the different items in the product, and changes in them.
a) True
b) False
Answer: a
Explanation: None.
42. What allows different projects to use the same source files at the same time?
a) Version Control
b) Access control
c) CM Process
d) Version Control and Access control
Answer: a
Explanation: It allows software engineers to continue development along a branch even
when a line of development is frozen.
43. Which of the following is not a change management process?
a) Log the changes
b) Estimate impact on effort and schedule
c) Review impact with stakeholders
d) None of the mentioned
Answer: d
Explanation: All are required for a change.
44. Configuration management (CM) is needed to deliver product to the client
a) True
b) False
Answer: a
Explanation: None.
45. What is one or more software configuration items that have been formally reviewed and
agreed upon and serve as a basis for further development?
a) Baseline
b) Cumulative changes
c) CM
d) Change Control
Answer: a
Explanation: In configuration management, a “baseline” is an agreed-to description of the
attributes of a product, at a point in time, which serves as a basis for defining change.
46. How are baselines verified?
a) By reviews
b) By inspections
c) By testing of code
d) All of the mentioned
Answer: c
Explanation: Testing verifies the agreed-to description.
47. Which of the following is a example of Configuration Items ?
a) SCM procedures
b) Source code
c) Software design descriptions
d) All of the mentioned
Answer: d
Explanation: All are covered in CM.
48. SCM controls only the products of the development process.
a) True
b) False
Answer: a
Explanation: None.
49. CCB stands for
a) Change Control Board
b) Change Control Baseline
c) Cumulative Changes in Baseline
d) None of the mentioned
Answer: a
Explanation: None.
50. What information is required to process a change to a baseline?
a) Reasons for making the changes
b) A description of the proposed changes
c) List of other items affected by the changes
d) All of the mentioned
Answer: d
Explanation: A baseline is an agreed-to description of the product, changes require multiple
reasons.
1. Project management involves the planning, monitoring, and control of the people,
process, and events that occur as software evolves from a preliminary concept to an
operational implementation.
a) True
b) False
Answer: a
Explanation: None
2. Which of the following is not an effective software project management focus?
a) people
b) product
c) popularity
d) process
Answer: c
Explanation: Effective software project management focuses on the four P’s: people,
product, process, and project.
3. PM-CMM stands for
a) people management capability maturity model
b) process management capability maturity model
c) product management capability maturity model
d) project management capability maturity model
Answer: a
Explanation: The people management maturity model defines the following key practice
areas for software people: recruiting, selection, performance management, training,
compensation, career development, organization and work design, and team/culture
development.
4. Which of the following is not a project manager’s activity?
a) project control
b) project management
c) project planning
d) project design
Answer: d
Explanation: The design part of any project management is done by the project team.
5. A software ________ provides the framework from which a comprehensive plan for
software development can be established.
a) people
b) product
c) process
d) none of the mentioned
Answer: c
Explanation: A small number of framework activities are applicable to all software
projects, regardless of their size or complexity.
6. Who defines the business issues that often have significant influence on the project?
a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned
Answer: c
Explanation: None.
7. Who delivers the technical skills that are necessary to engineer a product or an
application?
a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned
Answer: a
Explanation: None.
8. Which of the following paradigm attempts to structure a team in a manner that achieves
some of the controls associated with the closed paradigm but also much of the innovation
that occurs when using the random paradigm?
a) asynchronous paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm
Answer: b
Explanation: Open paradigm team structures are well suited to the solution of complex
problems but may not perform as efficiently as other teams.
9. Which of the following is a people-intensive activity?
a) Problem solving
b) Organization
c) Motivation
d) Project management
Answer: d
Explanation: For this reason, competent practitioners often make poor team leaders.
10. Which paradigm structures a team loosely and depends on individual initiative of the
team members?
a) random paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm
Answer: d
Explanation: None.
11. Which of the following is not an approach to software cost estimation?
a) Empirical
b) Heuristic
c) Analytical
d) Critical
Answer: d
Explanation: Critical is no such standard approach of cost estimation.
12. Which of the following is the valid component of the predictor?
a) data
b) question
c) algorithm
d) all of the mentioned
Answer: d
Explanation: A prediction is a statement about the future.
13. Point out the wrong statement.
a) In Sample Error is also called generalization error
b) Out of Sample Error is the error rate you get on the new dataset
c) In Sample Error is also called resubstitution error
d) All of the mentioned
Answer: a
Explanation: Out of Sample Error is also called generalization error.
14. Which of the following is correct order of working?
a) questions->input data ->algorithms
b) questions->evaluation ->algorithms
c) evaluation->input data ->algorithms
d) all of the mentioned
Answer: a
Explanation: Evaluation is done in the last.
15. Which of the following shows correct relative order of importance?
a) question->features->data->algorithms
b) question->data->features->algorithms
c) algorithms->data->features->question
d) none of the mentioned
Answer: b
Explanation: Garbage in should be equal to garbage out.
16. Point out the correct statement.
a) In Sample Error is the error rate you get on the same dataset used to model a predictor
b) Data have two parts-signal and noise
c) The goal of predictor is to find signal
d) None of the mentioned
Answer: d
Explanation: Perfect in sample prediction can be built.
17. Which of the following is characteristic of best machine learning method?
a) Fast
b) Accuracy
c) Scalable
d) All of the mentioned
Answer: d
Explanation: There is always a trade-off in prediction accuracy.
18. True positive means correctly rejected.
a) True
b) False
Answer: b
Explanation: True positive means correctly identified.
19. Which of the following trade-off occurs during prediction?
a) Speed vs Accuracy
b) Simplicity vs Accuracy
c) Scalability vs Accuracy
d) None of the mentioned
Answer: d
Explanation: Interpretability also matters during prediction.
20. Which of the following expression is true?
a) In sample error < out sample error
b) In sample error > out sample error
c) In sample error = out sample error
d) All of the mentioned
Answer: a
Explanation: Out of sample error is given more importance.
21. Backtesting is a key component of effective trading-system development.
a) True
b) False
Answer: a
Explanation: Backtesting is the process of applying a trading strategy or analytical
method to historical data to see how accurately the strategy or method would have
predicted actual results.
Answer: b
Explanation: The correct statement is: Interviews are conversations with purpose. For the
employer the purpose is to determine the most suitable person for the job.
23. A job interview is a formal meeting between a job seeker and an employer.
a) True
b) False
Answer: a
Explanation: The statement is true. Interview is a formal face-to-face meeting. A job interview is
a formal meeting between a job seeker and an employer.
26. Which kind of interview includes a process in which the employability of the job applicant is
evaluated?
a) Stress interview
b) Screening interview
c) Group interview
d) Behavioural interview
Answer: b
Explanation: In the screening interview, companies use screening tools to ensure that candidates
meet minimum qualification requirements.
Answer: a
Explanation: There are two styles used in a screening interview. They are: the directive style and
the meandering style.
Answer: b
Explanation: In stress interview, insults and miscommunication is common. All this is designed
to see whether you have the mettle to withstand the company culture or other potential stress.
Answer: d
Explanation: For some positions such as computer programmers or trainers, companies want to
see you in action before they make their decision. Here, the audition type is adapted.
Answer: c
Explanation: In group interview, more than one candidate is interviewed. Interviewing
simultaneously with other candidates can be disconcerting, but it provides the company with a
sense of your leadership potential and style.
Answer: b
Explanation: Many organizations will conduct jnterviews by telephone to narrow a field of
candidates. Telephone interviews may also be used as a preliminary interview for candidates
who live far away.
32. Which of the following is the numerator of factor safety formula?
a) Working stress
b) Shear stress
c) Tensile stress
d) Ultimate stress
Answer: d
Explanation: Factor of safety is defined as ratio of ultimate stress and working stress. It is
also called as factor of ignorance. The factor of safety is dependent on the type of load.
33. Which of the following can be the factor of safety for a dead load?
a) 6
b) 2
c) 4
d) 7
Answer: c
Explanation: For dead load, the range in which the factor of safety can lie is 4 to 5.
Therefore only 4 lies in that range and 6, 2, 7 are all values which are beyond that range.
34. Which of the following can be the factor of safety for shock loading?
a) 11
b) 13
c) 4
d) 7
Answer: b
Explanation: For shock loading, the range in which the factor of safety can lie is 12 to 15.
Therefore only 13 lies in that range and 11, 4, 7 are all values which are beyond that
range.
35. Factor of safety is used to find out the reliability of the design.
a) True
b) False
Answer: a
Explanation: Factor of safety tells us about how much load the material can take before it
fails. Basically, it states the load carrying capacity of a material beyond the actual load.
36. What can understand by the factor of safety equal to one?
a) It means that the structure will fail under load
b) It means that the structure will only support the actual load
c) it means that the structure will support more than the actual load
d) There is no relation between factor safety and load application
Answer: b
Explanation: When the factor of safety is one it means that the ultimate stress is equal to
the working stress and therefore the body can only support load up to actual load and no
more before failing.
37. For which of the following design factor of safety the design will work properly?
a) 0.1
b) 1
c) 2
d) 0.9
Answer: c
Explanation: If the design factor of safety is not more than 1 then the design may not
work and will fail under certain conditions.
38. What is a safe factor of failure for a component which on failure can result in financial
loss or serious injury?
a) 1
b) 2
c) 3
d) 4
Answer: d
Explanation: For components which on failing can be hazardous and can lead to serious
injuries, death and financial loss, the factor of safety should be taken equal to or more
than 4.
39. Design factor for most aircraft structures is 2.
a) True
b) False
Answer: b
Explanation: The design factor of safety for most aircraft structures or components is
taken to be 1.5 and not 2. More factors affect this value, but it is most of the time taken as
1.5.
40. Choose the correct option in terms of Issues related to professional responsibility
a) Confidentiality
b) Intellectual property rights
c) Both Confidentiality & Intellectual property rights
d) Managing Client Relationships
Answer: c
Explanation: Engineers should normally respect the confidentiality of their employers or
clients irrespective of whether or not a formal confidentiality agreement has been signed.
They should be aware of local laws governing the use of intellectual property such as
patents, copyright, etc.
41. “Software engineers should not use their technical skills to misuse other people’s
computers.”Here the term misuse refers to:
a) Unauthorized access to computer material
b) Unauthorized modification of computer material
c) Dissemination of viruses or other malware
d) All of the mentioned
Answer: d
Explanation: None.
42. Explain what is meant by PRODUCT with reference to one of the eight principles as per
the ACM/IEEE Code of Ethics?
a) The product should be easy to use
b) Software engineers shall ensure that their products and related modifications meet the
highest professional standards possible
c) Software engineers shall ensure that their products and related modifications satisfy the
client
d) It means that the product designed /created should be easily available
Answer: b
Explanation: None.
43. Identify an ethical dilemma from the situations mentioned below:
a) Your employer releases a safety-critical system without finishing the testing of the
system
b) Refusing to undertake a project
c) Agreement in principle with the policies of senior management
d) All of the mentioned
Answer: a
Explanation: None.
44. Identify the correct statement: “Software engineers shall
a) act in a manner that is in the best interests of his expertise and favour.”
b) act consistently with the public interest.”
c) ensure that their products only meet the SRS.”
d) all of the mentioned
Answer: b
Explanation: Software engineers shall act in a manner that is in the best interests of their
client and employer consistent with the public interest and shall ensure that their products
and related modifications meet the highest professional standards possible.Thus options a
& c are ruled out.
45. Select the incorrect statement: “Software engineers should
a) not knowingly accept work that is outside your competence.”
b) not use your technical skills to misuse other people’s computers.”
c) be dependent on their colleagues.”
d) maintain integrity and independence in their professional judgment.”
Answer: c
Explanation:None.
46. Efficiency in a software product does not include ________
a) responsiveness
b) licensing
c) memory utilization
d) processing time
Answer: b
Explanation: Licensing of a software product comes under corporate part of the software
company.
47. As per an IBM report, “31%of the project get cancelled before they are completed, 53%
overrun their cost estimates by an average of 189% and for every 100 projects, there are
94 restarts”.What is the reason for these statistics ?
a) Lack of adequate training in software engineering
b) Lack of software ethics and understanding
c) Management issues in the company
d) All of the mentioned
Answer: a
Explanation: Option b & c are a part of Software Engineering as a subject,hence option a
covers them both.
48. The reason for software bugs and failures is due to
a) Software companies
b) Software Developers
c) Both Software companies and Developers
d) All of the mentioned
Answer: c
Explanation: Software companies are responsible for making policies and providing
working atmosphere for the software development, so in turn these companies become a
part of software development process.Bugs from developers side is no new thing. Thus
option c answers the question.
49. Company has latest computers and state-of the- art software tools, so we shouldn’t worry
about the quality of the product.
a) True
b) False
Answer: b
Explanation: The infrastructure is only one of the several factors that determine the
quality of the product.
50. Fading channel has memory.
a) True
b) False
Answer: a
Explanation: Fading channel has memory and the received samples are correlated
with each other in time.
51. How can frequency selective distortion be minimized?
a) By using pilot signal
b) By adaptive equalization
c) By spread spectrum
d) All of the mentioned
Answer: d
Explanation: Frequency selective distortion can be minimized by using adaptive
equalization, by using spread spectrum, by using pilot signal and also by using
orthogonal FDM modulation.
52. How can slow fading be minimized?
a) By diversity technique
b) Error correcting codes
c) By diversity technique & Error correcting codes
d) None of the mentioned
Answer: c
Explanation: Slow fading can be minimized by using error correcting codes and also
by using diversity technique to get additional uncorrelated estimates of a signal.
53. Fast fading can be minimized by
a) Robust modulation
b) Coding and interleaving
c) Robust modulation, Coding and interleaving
d) None of the mentioned
Answer: c
Explanation: Fast fading can be minimized by using coding and interleaving, by using
robust modulation and by introducing signal redundancy to increase signalling rate.
54. The decision feedback equalizer has a linear traversal filter which is
a) Feed forward section
b) Feedback section
c) Feed forward section & Feedback section
d) None of the mentioned
Answer: a
Explanation: The decision feedback filter has a feed forward section which is a linear
traversal filter.
55. Decision making needs
a) Priors
b) Likelihoods
c) Priors & Likelihoods
d) None of the mentioned
Answer: c
Explanation: Decision making needs both priors and likelihoods and Bayes decision rule
combines them to achieve minimum probability of error.
56. Why is Software architecture so important?
a) Communication among stakeholders
b) Early Design decisions
c) Transferable abstraction of a system
d) All of the mentioned
Answer: d
Explanation: Reasons of the architecture to be important are all the mentioned above.
57. Why is software architecture called vehicle for stakeholder communication?
a) Each stakeholder of a software system is concerned with different characteristics of the
system affected by architecture
b) Architecture provides a common language in which different concerns can be
expressed
c) All of the mentioned
d) None of the mentioned
Answer: d
Explanation: All of the mentioned are correct.
58. Which lines depict that architecture defines constraints on an implementation?
a) An implementation exhibits an architecture if it conforms to the structural decisions
described by the architecture
b) The implementation need not be divided into prescribed components
c) An implementation exhibits an architecture if it conforms to the structural decisions
described by the architecture and the implementation must be divided into prescribed
components
d) None of the mentioned
Answer: c
Explanation: An implementation exhibits an architecture if it conforms to the
structural decisions described by the architecture, the implementation must be divided
into prescribed components.
59. Why does architecture dictates organizational structure?
a) Architecture describes the structure of the system being developed which becomes
engraved in the development project structure
b) An implementation exhibits an architecture if it conforms to the structural decisions
described by the architecture
c) Architecture may not describe structure as whole
d) None of the mentioned
Answer: a
Explanation: Architecture describes the structure of the system being developed
which becomes engraved in the development project structure.
60. Which of the following is right dependence relationship?
a) Performance depends on how strongly components are coupled with other components
in system
b) Re-usability depends on the volume and complexity of the inter-component
communication and coordination
c) Modifiability depends on system’s modularization
d) All of the mentioned
Answer: c
Explanation: Performance depends on the volume and complexity of the inter-
component communication and coordination, re-usability depends on how strongly
components are coupled with other components in system and modifiability depends
on system’s modularization.
61. Which of the following is correct for decisions made at life cycle level?
a) Decisions at all level of like cycle from high level design to coding, implementation
affect system quality
b) Decisions at all level of like cycle from high level design to coding, implementation
may or may not affect system quality
c) Decisions at all level of like cycle from high level design to coding,implementation
does not affect system quality
d) None of the mentioned
Answer: a
Explanation: Decisions at all level of like cycle from high level design to coding,
implementation affect system quality
62. Is it possible to make quality predictions about a system based solely on evaluation of its
architecture?
a) Yes
b) No
c) May be
d) None of the mentioned
Answer: a
Explanation: Yes it is possible to make quality predictions about a system based
solely on evaluation of its architecture.
63. Every possible architecture partition possible changes into which of the following
categories?
a) Local
b) Non Local
c) Architectural
d) All of the mentioned
Answer: d
Explanation: All of the mentioned are true.
64. Which change is accomplished by modifying a single component?
a) A local change
b) Non Local Change
c) Architectural change
d) All of the mentioned
Answer: a
Explanation: A local change is accomplished by modifying a single component.
65. An architecture help in evolutionary prototyping in which of the following ways?
a) Potential performance problem can be identified early in the product’s life cycle
b) The system is executable early in the product’s life cycle
c) All of the mentioned
d) None of the mentioned
Answer: c
Explanation: All the mentioned are the valid ways.
66. Which of the following are software structures?
a) Module Structure
b) Conceptual or logical structure
c) Process structure
d) All of the mentioned
Answer: d
Explanation: All of the mentioned are the valid structures.
67. Which structure describes units as abstraction of system’s functional requirements?
a) Conceptual structure
b) Module structure
c) Physical structure
d) Calls structure
Answer: a
Explanation: Conceptual structure-describes units as abstraction of system’s
functional requirements.
68. Which structure’s view is orthogonal to the module and conceptual view?
a) Module Structure
b) Process Structure
c) Uses Structure
d) Data flow
Answer: b
Explanation: Process Structure-view is orthogonal to the module and conceptual
view.
69. Which structure’s view shows the mapping of software onto hardware?
a) Module Structure
b) Process Structure
c) Physical Structure
d) Class Structure
Answer: c
Explanation: Physical Structure- view shows the mapping of software onto hardware.
70. Which structure describes units are programs or module?
a) Calls Structure
b) Uses Structure
c) Data Flow
d) Control Flow
Answer: d
Explanation: Control Flow-structure describes units are programs or module.
71. Which of these is the external sound present in the channels of communication?
a) Noise
b) Semantic problems
c) Cultural barriers
d) Over communication
Answer: a
Explanation: Noise is the external sounds present in the channels of
communication, which results in the reduction of the audibility or omission of
some words from the message.
72. Which of these should not be avoided for effective communication?
a) Noise
b) Planning
c) Semantic problems
d) Wrong assumptions
Answer: b
Explanation: Lack of planning must be avoided for effects communication. There
are innumerable examples of people who would give an ill planned, long winding
lecture while a short presentation with tables or graphs would be sufficient.
73. __________ are problems arising from expression.
a) Cultural barriers
b) Semantic problems
c) Wrong assumptions
d) Selecting perception
Answer: b
Explanation: The correct statement is: Semantic problems are problems arising
from expression or transmission of meaning in communication
74. Both encoding and decoding of message are influenced by our emotions.
a) True
b) False
Answer: a
Explanation: The statement is true. Both encoding and decoding of message are
influenced by our emotions. Emotions play a very important role in our lives.
75. In which of these problems, is the actual message lost in the abundance of transmitted
information?
a) Selecting perception
b) Over communication
c) Under communication
d) Filtering
Answer: b
Explanation: In the case of over communication, the actual message is lost in the
jungle of information whereas in under communication the sender is blamed for
sharing less information
76. Communication should serve as a conflict- reduction exercise.
a) True
b) False
Answer: a
Explanation: The statement is true. Communication should serve as a conflict-
reduction exercise. When people start competing for the fulfillment of their
narrow interests communication suffers.
77. _______ means to impart understanding of the message.
a) Encoding
b) Receiver
c) Decoding
d) Feedback
Answer: c
Explanation: The correct statement is: Decoding means to impart understanding
of the message. Receiver has to identify the person, words symbols, etc..
78. When is the communication process complete?
a) When the sender transmits the message
b) When the message enters the channel
c) When the message leaves the channel
d) When the receiver understands the message.
Answer: d
Explanation: Communication is complete only when the receiver understands the
message. Many communication problems arise because of misunderstandings.
79. ______ is the first enemy of communication.
a) Noise
b) Clarity
c) Politeness
d) Completeness
Answer: a
Explanation: The correct statement is: Noise is the first and foremost enemy of
communication. Every possible effort must be made to eliminate the element of
noise that distorts communication.
80. Which of these must be avoided for effective communication?
a) Sharing of activity
b) Listening
c) Ambiguity
d) Politeness
Answer: c
Explanation: Ambiguity must be avoided. Clarity and crispness of the message is
very important. The sender of the message should be careful to see that the
receiver does not have to go beyond the text of the message.
81. Which of these is not a commandment of effective communication?
a) Clarity in language
b) Listen poorly
c) Home communication skills
d) Adequate medium
Answer: b
Explanation: In order to ensure an effective communication one must take care of
ten commandments: Clarity in language, home communication skills, listen
attentively, etc..
Answer: A
91. Leaders with a low LPC score gain satisfaction from _______________ according to
Fiedler’s LPC scale:
A. Developing team relationships
B. Achieving objectives
C. Both of these
D. None of the above
Answer: B
92. Model of leadership based on which aspects of a leader’s decision is Vroom and
Yetton’s contingency?
A. Decision acceptance
B. Decision quality
C. Both of these
D. None of the above
Answer: C
93. An individual’s motivation is dependent on:
A. Whether path-goal relationships are clarified
B. Expectations that increased effort to achieve an improved level of performance will be
successful
C. Their effective performance
D. The necessary direction, guidance, training and support is provided
Answer: B
94. A firm that chooses a cost-leadership business strategy focuses on gaining advantages
by reducing its costs to a level equal to all of its competitors.
True/ False
Answer: False
95. A cost-leadership competitive strategy helps reduce the threat of entry by creating cost-based
barriers to entry.
True/False
Answer: True
96. Cost leadership and product differentiation are so widely recognized that they are often
called generic business strategies.
True/False
Answer: True
97. Firms implementing cost-leadership strategies will generally adopt what is known as a
functional organizational structure.
True/False
Answer: True
98. In general, economies of scale and diseconomies of scale are relatively easy-to-duplicate
bases of cost leadership.
True/False
Answer: True
99. The best example of a firm following a cost-leadership business strategy is
(A) Wal-Mart
(B) Rolls Royce
(C) Mercedes Benz.
(D) .Macy’s
Answer: A) Wal-Mart
100. Cost-leadership and product-differentiation strategies are so widely recognized that
they are often called
(A) common business strategies.
(B) generic business strategies.
(C) generic corporate strategies
(D) common corporate strategies.
Answer: B) generic business strategies.
101. Compensation at cost-leadership firms is usually tied directly to product innovation and
customer service efforts.
True/ False
Answer: False
102. Cost leadership as a strategy requires a firm to __.
(A). aim at a cost advantage in a niche market
(B). be unique in its product offering
(C). aggressively search out efficiencies to maintain the lowest cost structure
(D). aim to be similar to its competition in most operations
Answer: (C). aggressively search out efficiencies to maintain the lowest cost structure
103. Firms implementing cost-leadership strategies will generally adopt a
(A) multidivisional structure.
(B) functional organizational structure.
(C) product divisional structure.
(D) matrix structure.
Answer: (B) functional organizational structure.
104. Firms implementing cost-leadership strategies will have ________ layers in their reporting
structure.
(A) relatively complex
(B) relatively simple
(C) relatively few
(D) many
Answer: (D) many
105. One aspect of using a cost leadership strategy is that experience effects may lead to
lower costs.
True/False
Answer: True
109. Under which condition would a cost leadership strategy be especially effective?
Answer: Cost leadership strategy is more effective under the following two conditions;
1. When price competition among competitive sellers is too much.
2 When the products of competitive sellers is identical to your product and supplies are
readily available.
110. One aspect of using a cost leadership strategy is that experience effects may lead to
lower costs. Experience effects are achieved by……?
ANswer: repeating a process until a task becomes easier.
111. Firms pursuing a cost-leadership strategy are typically characterized by?
(A) loose cost control systems.
(B) close supervision of labor, raw materials, inventory, and other costs.
(C) Both A and B
(D) a de -emphasis on quantitative cost goals and costs.
(E). None of these
Answer: B) close supervision of labor, raw materials, inventory, and other costs.
112. What must a cost-leadership strategy accomplish to be successful?
(A). It must increase the firm’s cost above that of its competitors while offering adequate value.
(B. It must reduce the firm’s cost below that of its competitors while offering superior value.
(C). Both A and B
(D). It must reduce the firm’s cost below that of its competitors while offering adequate value.
(E). None of these
Answer: (D). It must reduce the firm's cost below that of its competitors while offering
adequate value.
a) A science
b) An art
a. encoding
b. idea origination
c. decoding
d. channel selection
Answer: b. idea origination
115. A study of the culture and practises in different societies is called _____
a) Personality
b) Anthropology
c) Perception
d) Attitudes
Answer: b) Anthropology
a) People
b) Environment
c) Technology
a. Leadership
b. Perception
c. Job Design
d. Technology
Answer: d. Technology
a) Employee expectation
b) Workforce diversity
c) Globalization
a) Individual behaviour
b) Group behaviour
c) Organisational behaviour
d) None of these
a) William Gilbreth
b) Hendry Fayol
c) F.W.Taylor
d) Elton Mayo
122. Some of OB’s challenges and opportunities include all of the following except
123. Hawthorne Studies is related to which stage of the organisational behaviour evolution?
a) Industrial revolution
b) Scientific management
c) Organisational behaviour
124. The field of organizational behaviour examines such questions as the nature of
leadership, effective team development, and______
b) Organisational control; conflict management
d) Planning; development
125. Organisational Behaviour is a field of study backed by a body associated with growing
concern for people at the workplace
a) Theory
b) Research
c) Application
126. Which of the following is not correct for the organisational behaviour?
b) Labour Movement
c) Hawthorne Studies
d) All of these
128.Nowadays a lot of stress is being put on the __________ of the employee in the
organisation
a. Character
b. improvement
c. Behaviour
d. Rewards
Answer: c. Behaviour
129. The term ‘psychology’ is derived from the word ‘psyche’, which means ‘soul’ or
‘spirit’_______
a) Latin
b) French
c) Greek
d) None of these
Answer: c) Greek
d) Both a and c.
A. Human
B. Employer
C. Human Behaviour
D. Employees
a) William Gilbreth
b) Hendry Fayol
c) F.W.Taylor
d) Elton Mayo
c) Society only
d) Department only
a) Motivation
b) Efficiency
c) interpersonal relations
d) Communication
a) Organizational Cultural
b) Organizational Structure
c) Organizational Behaviour
d) Organisational Value
137. Common uniform, canteen, office does not mean common treatment is a limitation of
a) Organizational Cultural
b) Organizational Structure
c) Organizational Behaviour
d) Organisational Value
a) Anthropology
b) Psychology
c) physiology
d) sociology
Answer: c) physiology
139. ____________ is a Study of individual Behaviour
a) Anthropology
b) Psychology
c) political science
d) sociology
Answer: b) Psychology
a) Anthropology
b) Psychology
c) physiology
d) sociology
Answer: d) sociology
a) Anthropology
b) Psychology
c) Social psychology
d) sociology
Answer: a) Anthropology
142. _________ focuses on the influence of people on one another
a) Anthropology
b) Psychology
c) Social psychology
d) sociology
Q2. The methods and regulation used to define goals, plan and monitor tasks and resources,
identify and resolve issues, and control costs and budgets for a specific project is known as
… a. project management.
b. Software
c. Process
d. Activities
Q5) You are working in Career Ride as a project manager. What will you do to minimize the
risk of software failure?
a. Request a large budget
b. You will increase the team size
c. Track progress
d. None of the above.
Q6) Boehm suggests an approach that addresses project objectives, milestones and schedules,
responsibilities, management and technical approaches and required resources, This principle is
called as ______.
a. W3HH principle
b. WHO principle
c. W5HH principle
d. None of the above.
Q7) Effective software project management focuses on the four P’s. What are those four
P’s? a. People, performance, payment, product
b. People, product, process, project
c. People, product, performance, project
d. All of the above.
Q8) For the best Software model suitable for the project, in which of the phase the developers
decide a roadmap for project plan?
a. Software Design
b. System Analysis
c. Coding
d. Testing
Q10)) Following are the phases of Project Management Life Cycle. Arrange them in correct
order
1. Design, 2. Marketing, 3. Analysis and evaluation, 4. Inspection, testing and
delivery a) 3-2-1-4
b) 1-2-3-4
c) 2-3-1-4
d) 4-3-2-1
16). ___ must plan, motivate, organize and control the practitioners who do software
work. a) Project Managers
b) Senior Managers
c) Customers
d) End Users
17) Risk the combination of both the possibility of occurrence of adverse event and the impact
of such bad event. (True / False)
a) False
b) True
18. A ___ is a discrepancy between how a requirement was mentioned and how the same
requirement is implemented. (Pick right option)
a) Defect
b) Change
c) Risk
d) None of the above
19 ___ can take place at any time during the project, though the sooner the better. (Pick right
option)
a) Risk assessment
b) Risk management planning
c) Risk resolution
d) Risk prioritization
21. The Mangers use the acronym SMART while goal setting.What does SMART stand
for? a. spectacular, measurable, actionable, resourced, timely
b. specific, measurable, achievable, relevant, timely
c. suitable, measurable, actionable, reviewed, timely
d. standardized, measurable, actionable, resourced, timely
22) A ___ is a discrepancy between how a requirement was mentioned and how the same
requirement is implemented. (Pick right option)
a) Defect
b) Change
c) Risk
d) None of the above
Q23) __ can take place at any time during the project, though the sooner the better. (Pick right
option)
a) Risk assessment
b) Risk management planning
c) Risk resolution
d) Risk prioritization
Q24) _ are the people involved in or affected by project activities and include the project
sponsor, project team, support staff, customers, users, suppliers, and even opponents of the
project.
a. Managers
b. Stakeholders
c. Directors
d. Citizens
Q25). Project ____ management involves defining and managing all the work required to
complete the project successfully.
a. scope
b. quality
c. time
d. cost
Q26). Project ____ management ensures that the project will satisfy the stated or implied needs
for which it was undertaken.
a. cost
b. time
c. scope
d. quality
Q27). Project ____ management is concerned with making effective use of the people involved
with the project.
a. human resource
b. risk
c. communications
d. procurement
Q28). Project ____ management involves generating, collecting, disseminating, and storing
project information.
a. risk
b. procurement
c. communications
d. resource
Q29). What works on one project may not work on another, so it is essential for project
managers to continue to develop their knowledge and ____ in managing projects. a.
time
b. resources
c. funding
d. skills
Q30) "All project leaders use a shared road map, focusing on key business aspects of their
projects while integrating goals across all parts of the organization" describes the ____ best
practice for project delivery.
a. Use an integrated toolbox
b. Grow project leaders
c. Develop a streamlined project delivery process
d. Measure project health using metrics
Q31. ____ project management software integrates information from multiple projects to show
the status of active, approved, and future projects across an entire organization. a. Investment
b. Active
c. Enterprise
d. Budget
Q32). A ____ can have many different job descriptions, which can vary tremendously based on
the organization and the project.
a. project supervisor
b. project manager
c. job coordinator
d. project coordinator
Q33) In an interview with two chief information officers (CIOs), both men agreed that the most
important project management skills seem to depend on ____.
Q34). Achieving high performance on projects requires ____, otherwise called human relations
skills.
a. capital skills
b. soft skills
c. light skills
d. hard skills
Q35) A(n) ____ focuses on long-term goals and big-picture objectives, while inspiring people
to reach those goals.
a. assistant
b. programmer
c. leader
d. manager
Q36) A(n) ____ often deals with the day-to-day details of meeting specific
goals. a. manager
b. leader
c. programmer
d. analyst
Q37). Some people say that ____ achieve the vision of a project.
a. leaders
b. managers
c. stakeholders
d. supervisors
Q38). Most people agree that the modern concept of project management began with the
____. a. Great Wall of China
b. first space shuttle
c. Egyptian pyramids
d. Manhattan Project
Q39). During the Cold War years of the 1950s and '60s, ____ continued to be key in refining
several project management techniques.
a. NASA
b. the military
c. steel manufacturing
d. marine biology
Q40). The longest path through a network diagram that determines the earliest completion of a
project is called the ____ path.
a. essential
b. important
c. critical
d. vital
Q41) What should a project manager do or follow to ensure clear boundaries for project
completion?
a. Scope verification
b. Completing a scope statement
c. Scope definition
d. Process Management in OS
Q) 42. An organization is certified to a stringent environmental standard and uses that as the
key differentiator with its competitors. Alternative method is available but involves lot of risk.
What should the project team do?
a. Drop the alternative approach
b.Work out a mitigation plan
c. Procure an insurance against the risk
d.Plan all precautions to avoid the risk
Q43): That is the objective of project manager behind the study of the work processes on a
project.
a. Quality control
b. Quality planning
c. Checking adherence to processes
d. Quality assurance
Q44) which of the following is NOT an input to project plan
execution? a)Work authorization system
b)Project plan
c)Corrective action
d)Preventive action
Q. (45) The model serves as the basis for the creation of ______ for the
Software. (a) Design
(b) Maintenance
(c) Testing
(d) Specifications
Q48). When you build a product or system, it’s important to go through a series of predictable
steps, the process which you follow to develop it is known as________
(a)Software design
(b)Software process
(c)Software schedule
(d)Framework
Q49__contains an analysis of what went wrong, what went right, and what you could have
done better in the software project.
Select correct option:
(a)Prepare closedown report
(b)Identify learning
(c)Identify reusable software components
(d)none
Q50) The three most important factors that influence project management are ___, ___and
___. a. Time, Cost, Scope
b. Money, time, budget
c. Time, staff, budget
d. None of them
Answer Keys:
Ans1 (a)
Ans2(a)
Ans3( d )
Ans4(c )
Ans5( c )
Ans6 (c)
Ans7 (b)
Ans8 (b)
Ans9 (a)
Ans 10 ( A )
Ans 11(B )
Ans12 ( c)
Ans13 (a)
Ans14 (D)
Answer15 : b
Ans 16 .( a)
Ans 17 (b)
Ans.18 (a)
Ans. 19(a)
Ans 20. a
Ans 21.(b)
Ans.22. a)
Ans.23 a)
Ans 24 : B
Ans25 : A
Ans26 : D
Ans 27 :A
Ans28 :D
Ans29 : D
Ans 30: C
Ans 31: D
Ans 32: B
Ans33: D
Ans34: B
Ans35: C
Ans 36: A
Ans 37: B
Ans 38: D
Ans 39: B
Ans 40: C
Ans 41(b)
Ans 42(a)
Ans 43.(d)
Ans 44. a
Ans 45(d)
Ans 46(b)
Ans 47(a)
Ans 48(b)
Ans49(a)
Ans 50. a
UNIT II - PROJECT LIFE CYCLE AND EFFORT ESTIMATION
Q3) The software life cycle can be said to consist of a series of phases. The classical model is referred
to as the waterfall model. Which phase may be defined as “The concept is explored and refined, and the
client’s requirements are elicited?”
(a) Requirements
(b) Specification
(c) Design
((d) Implementation
Q4) In Intermediate COCOMO the mode that represents complex products is referred to as
a) Embedded
b) Semidetached
c) Organic
d) Multiplicative
Q5) Which one of the following models is not suitable for accommodating any
change? a) Build & Fix Model
b) Prototyping Model
c) RAD Model
d) Waterfall Model
Q6. A simple way of looking at the spiral software life-cycle model is as a waterfall model with each
phase proceeded by
a) Build-and-fix
b) Freezing
c) Synchronization
d) Testing
e) Risk analysis
Q7) __ is the least flexible and most obsolete of the life cycle models.
a) Spiral model
b) Waterfall model
c) Throwaway prototyping model
d) Iterative / incremental development model
Q8) Before requirements can be analyzed, modeled, or specified they must be gathered through
a/an_______
(a) Elicitation process
(b) Interviewing
(c) Meeting
(d) None of given
Q10) Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of
Code). a) 100-200
b) 200-400
c) 400-1000
d) above 1000
Q15). Which of the following statements regarding Build & Fix Model is
wrong? a) No room for structured design
b) Code soon becomes unfixable & unchangeable
c) Maintenance is practically not possible
d) It scales up well to large projects
Q17) Which model can be selected if user is involved in all the phases of
SDLC? a) Waterfall Model
b) Prototyping Model
c) RAD Model
d) both Prototyping Model & RAD Model
Q22. The process each manager follows during the life of a project is known
as a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Q23 Which of the following is/are main parameters that you should use when computing the costs of
a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Q24 ___________is the least flexible and most obsolete of the life cycle models.
a) Spiral model
b) Waterfall model
c) Throwaway prototyping model
d) Iterative / incremental development model
a.person month
b.monthly cost
c.person cost
d.none of them
Q26.For normalization purposes, the productivity of a project is measured in terms of ___ per person
month.
a.functions
b.function point
c.cost
d.functional point
Q 27 Which of the following is not a metric for design model?
a) Interface design metrics
b) Component-level metrics
c) Architectural metrics
d) Complexity metrics
b) Use one or more empirical models for software cost and effort estimation
c) Use relatively simple decomposition techniques to generate project cost and effort estimates
d)The ability to translate the size estimate into human effort, calendar time, and dollar Q30)
What can be used to complement decomposition techniques and offer a potentially valuable
estimation approach in their own right Automated estimation tool
c) Size-related metrics
Q32 A ------------is developed using historical cost information that relates some metrics to the project
cost.
a) Algorithmic Cost Modeling
b) Expert Juggememt
c) Estimation by Anlogy
d) Parkison’a Law
Q38) Which of the options is correct for the prototyping model of software
development? a. For projects with large development teams.
b. When requirements are well defined.
c. When a customer cannot define requirements clearly.
d. both a & b
e. All of the above
f. None of the above
Q42. Which phase of the RUP is used to establish a business case for the system
? a) Transition
b) Elaboration
c) Construction
d) Inception
Q44) In a university, students are asked to develop software. Which model would be
preferable? a. Waterfall model
b. Spiral model
c. Agile model
d. Code and fix model
Q46.which of the following testing strategy established during requirements analysis against
developed software?
a.Validation
b.Integration
c.Regression
d.System
Q1. The entire process of a project may be considered to be made up on number of sub process placed
in different stage called the
(A) Technical key resources
(B) Work key structure
(C) Work Breakdown Structure (WBS)
(D) None of the above
Q2) Each component of the software product is separately estimated and the results aggregated to
produce an estimate for the overall job.
(A) Algorithmic model
(B) Expert judgment
(C) Bottom-up
(D) Top down
Q3 Tool used for comparison of the proposed project to complete projects of a similar nature whose
costs are known.
(A) Algorithmic model
(B) Expert judgment
(C) Top down
(D) Analogy
Q4). Which of the following states that work expands to fill the time
available. a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement?
Q5) A is developed using historical cost information that relates some software metric to the project
cost.
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law A
Q7) wo general notations used for scheduling are ___ charts and ___
charts. a.Pert, histogram
b.PERT, gantt
c.CPM,gantt
d.none of them
Q10) Which of the following can estimate size of project directly from problem
specification? A.LOC
B.Function Point Metric
C.Bothg
D.None
Q)11. In ____, Henry Gantt developed the famous Gantt chart as a tool for scheduling work in
factories.
a. 1897
b. 1917
c. 1927
d. 1957
Q12. A Gantt chart is a standard format for displaying project schedule information by listing project
activities and their corresponding start and finish dates in a ____ format.
a. pie chart
b. line graph
c. bar graph
d. calendar
Q13) _ is the sequence of processing steps that completely handles one business transaction or
customer request
Select one:
a. Model
b. Workflow
c. Prototype
d. Mock-up
Q19) Smith is a project manager for ABC Video games. He has produced a project network diagram
and has updated the activity list. Which process have he just finished?
Select one:
a. The Activity Sequencing process, which identifies all the activities dependences b. The Activity
Sequencing process, which identifies all the specific activities of the project c. The activity duration
Estimating process, which identifies all the dependent activities of the project d. The activity
duration Estimating process, which diagram project network time estimates
Q20) Which of the following is not the technique for network planning model
? a) PERT
b)CPM
c) Monte Carlo simulation
d) Hybrid approach tecnique
Q21) Which of the following activity is undertaken immediately after feasibility study and before the
requirement analysis and specification phase?
A.Project Planning
B.Project Monitoring
C.Project Control
D.Project Scheduling
Q22)
The particular task performance in CPM is known as
a) Event
b)Activity
c) Task
d) contract
Q24) Which of the following activity is not the part of project planning?
A.project estimation
B.project scheduling
C.project monitoring
D.risk management
Explanation
Q25) In the project planning, which of the following is considered as the most basic parameter based
on which all other estimates are made?
A.project size
B.project effort
C.project duration
D.project schedule
Q27 ) Once project planning is complete, project managers document their plan
in A.SPMP document
B.SRS document
C.Detailed Design documet
D.Excel Sheet
Q28) Which of the following serves as metrics for project size estimation?
A.Lines of codes
B.function point
C.Number of persons
D.Only A & B
Q35) Activities A, B, and C are the immediate predecessors for Y activity. If the earliest finishing time
for the three activities are 12, 15, and 10, then what will be the earliest starting time for Y? A. 10
B. 15
C. 12
D. Cannot be determined
Q36Activities P, Q, and R instantly follow activity M, and their current starting times are 12, 19, and
10. So, what is the latest finishing time for activity M?
A. 11
B. 10
C. 18
D. Cannot be determined
a) Red
b) Blue
c) Black
d) Green
Q45. Who introduced bar chart in
CPM?
a) Jane Gantt
b) Henry Gantt
c) Williams henry
d) Joseph henry
Ans Keys:
Ans1 c)
Ans2(C )
Ans 3(D)
Ans 4(c)
Ans5 (a)
Ans.6 a
Ans 7. b
Ans. 8(a)
Ans 9 d
Ans 10 (B)
Answe11(: B)
Answer:12( D)
Ans 13(b)
Ans 14(b)
Ans 15(c)
Ans16. a
Ans 17(c)
Ans 18(c)
Ans 19(b)
Ans 20(d)
Ans 21(A)
Ans 22(b)
Ans 23(b)
Ans 24(c)
Ans 25 (:A.)
Ans 26(D)
Ans 27(A)
.Ans 28(D)
Ans 29( D)
Ans 30(B)
Ans 31(c)
Ans 32(b)
Ans 33 c
Ans 34(D)
Ans 35(B)
Ans 36( A)
Ans 37(B)
Ans 38(D)
Ans 39(a)
Ans 40(a)
Ans 41(a)
Ans 42(c)
Ans 43(b)
Ans 44(d)
Ans 45(b)
Ans 46(d)
Ans 47(d)
Ans 48 (d)
Ans 49(c)
Ans 50(b)
a) True
b) False
2. ___ manage hardware/software requirements for development, testing, validation, and production
environments.
a) Logistics
b) Labour
c) staff
d) none
4. Project Management is the application of knowledge, skills, tools and techniques to project activities
to meet the project requirements.
a) True
b) False
a) Informal
b) Formal
c) adhoc
d) general
a) True
b) False
9. The ___ stage determines the nature and scope of the development.
a) Initiation
b) Implementation
c) Planning and Design
d) Maintenance
a) two
b) one
c) four
d) none
12. The purpose of a ___ is to detail the work requirements for projects and programs that have
deliverables and/or services performed.
a) Initiation
b) Statement of Work (SoW)
c) Planning and Design
d) Maintenance
14. The three most important factors that influence project management are ___, ___and ___.
17. The _____________ documented in 1970 by Royce was the first publicly documented life cycle
model.
a) RAD model
b) Spiral model
c) Waterfall model
d) None of the above
18. Most life cycle models can be derived as special cases of the ___.
a) RAD model
b) Spiral model
c) Waterfall model
d) None of the above
19. ___ is the least flexible and most obsolete of the life cycle models.
a) Spiral model
b) Waterfall model
c) Throwaway prototyping model
d) Iterative / incremental development model
21. Project scope, pros and cons are discussed in the ___________ phase.
a) Initiation
b) Implementation
c) Planning and Design
d) Maintenance
22. A semiformal way of breaking down the goal is called the ___.
a) RAD model
b) Spiral model
c) Waterfall model
d) Work Breakdown Structure
23. Two general notations used for scheduling are ___ charts and ___ charts.
a) bar, pert
b) PERT, Gantt
c) gantt, histogram
d) None
24. The purpose of planning a project is to identify the sequence of activities as per their complexities
and dependencies.
a) True
b) False
25. COCOMO stands for ___.
26. In ___ mode the project is characterized by tight, stringent constraints and interface
requirements. a) Organic
b) Embedded
c) Semidetached
d) None of the above
27. Budgeting in a business sense is the __________ allocation of available funds to each department
within a company.
a) Initiation
b) Implementation
c) Planning and Design
d) planned
31. A _____________ provides the idea about the start and finishes dates of key activities or terminal
elements of the project.
a) Schedule
b) Implementation
c) Design
d) plan
a) True
b) False
36. Accelerating the project schedule is often termed as ___ of the schedule. (Pick right
option) a) Breaking
b) Crashing
c) Speeding
d) None of the above
a) Person-Months
b) Plan-Months
c) Person-Years
d) None
a) True
b) False
40. If there is a certain probability that the objectives of the project will not be achieved, this risk should
not be reported to higher management.
a) True
b) False
41. Risk the combination of both the possibility of occurrence of adverse event and the impact of such
_____ event.
a) bad
b) good
c) average
d) planned
42. When there are disagreements between the project lead and overall project manager, the same can be
resolved through ___.
a) Change control board
b) Implementation
c) Planning
d) Design
43. A ___ is a discrepancy between how a requirement was mentioned and how the same requirement is
implemented. (Pick right option)
a) Defect
b) Change
c) Risk
d) None of the above
44. Tom DeMarco stated, “You can’t control what you can’t _________”.
a) Initiate
b) Implement
c) measure
d) plan
45. ___ is the statistics gathered over the course of the execution of the project.
a) Requirement
b) Software Metric
c) Software Plan
d) Cost
46. ___ is a software package used for preparing earned value analysis. (Pick right
option) a) MS Project
b) Primavera
c) Lotus Notes
d) None of the above
47. Status meetings and status reporting are required for a medium-size project.
a) True
b) False
48. ___ is a set of practices originally developed by Motorola to systematically improve processes by
eliminating defects.
a) Six Sigma
b) four sigma
c) SMART
d) none
49. Six Sigma is a registered service mark and trademark of ___. (Pick right
option) a) Microsoft
b) Sun Microsystems
c) Motorola
d) None of the above
50. ___ involves activities like typical strategies, processes, techniques, and tools involved in containing
the adverse impacts of risks on the software project.
ANSWER KEY
1. A
2. A
3. D
4. A
5. A
6. B
7. B
8. B
9. A
10.C
11.C
12.B
13.C
14.A
15.A
16.A
17.B
18.B
19.B
20.A
21.A
22.D
23.B
24.A
25.A
26.B
27.D
28.A
29.C
30.A
31.A
32.C
33.A
34.B
35.D
36.B
37.A
38.A
39.B
40.B
41.A
42.A
43.A
44.C
45.B
46.B
47.A
48.A
49.A
50.C
UNIT-V STAFFING IN SOFTWARE PROJECTS
2. Which of the following is not included in Hackman and Oldham’s job characteristics
model ofwork motivation?
a) Variety of
skill
b)Significance of
the taskc)Quality
of job life
d)Autonomy
3. Organizational
behavior is
a)A science
b)An art
c)A science as well as an art
d)None of the above
9.The is based on the environment. Though like thinking, expectations and perception do
exist, and they are not needed to manage or predict behaviou a)Behaviouristic approach,
Cognitive processes,
b)cognitive processes, behaviouristic approach
c) Social cognitive, behaviouristic
approachd)Cognitive processes, social
cognitive
10. Now a days a lot of stress is being put on the of the employee in theorganization
a)Character
b)improvemen
tc)Behaviour
d)Rewards
11. The purpose of job enrichment is to
a)expand the number of tasks an individual can do
b)increase job efficiency
c)increase job effectiveness
d)increase job satisfaction of middle management
13. theory emphasis that, Unsatisfied need can influence the behaviour satisfied one will not
act as a motivator.
a)Maslow Theory
b)Herzberg’s Theory
c) Expectancy theory
d)Alderfer’s ERG
theory
14. Among the following which is not a problem in changing the attitude of the
employeea)Insufficient Information
b)Resistant by
employeec)Cognitive
Dissonance
d)Cognitive
Dissonance
15. Motivation
includesa)job
enrichment
b)Job rotation
c)Job enlargement
d)all of the above
20. Which of the following best defines the type of rewards that are distributed
toindividuals fortheir unique contribution to the team?
a)functional team rewards
b)competitive team rewards
c)cooperative team rewards
d)non-competitive team
rewards
22. What is the ideal size of a team in order for it to be productive and
successful?a)2 to 4
b)9 to 12
c)5 to 8
d)8 to 11
23. Which of the following best defines an organization where decision making authority is at
thetop of the organization and employees have little freedom to make their own decisions?
a)decentralized organization
b)centralized
organizationc)virtual
organization d)functional
organization
29. On her work team Michelle develops detailed tasks lists and work flow charts to help
her team members understand the steps involved in each project. She also maintains
the project calendar and receives periodic updates from each team member to ensure
that projects are progressing on schedule.Which role does Michelle most likely fill
on her team?
a)assessorb)organizerc)maintainerd)creator
33. Project managers have to assess the risks that may affect a project.
a) True
b) False
35. The process each manager follows during the life of a project is known
as a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
37. Which of the following is/are main parameters that you should use when computing the
costs of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
39. Which of the following is incorrect activity for the configuration management of a software
system?
a) Internship management
b) Change management
c) Version management
d) System management
41. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
42. Project management involves the planning, monitoring, and control of the people, process,
and events that occur as software evolves from a preliminary concept to an operational
implementation.
a) True
b) False
46. A software ________ provides the framework from which a comprehensive plan for
software development can be established.
a) people
b) product
c) process
d) none of the mentioned
47. Who defines the business issues that often have significant influence on the
project? a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned
48. Who delivers the technical skills that are necessary to engineer a product or an
application? a) Practitioners
b) Project managers
c) Senior managers
d) None of the mentioned
49. Which of the following paradigm attempts to structure a team in a manner that achieves
some of the controls associated with the closed paradigm but also much of the innovation that
occurs when using the random paradigm?
a) asynchronous paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm
51. Which paradigm structures a team loosely and depends on individual initiative of the team
members?
a) random paradigm
b) open paradigm
c) closed paradigm
d) synchronous paradigm
53. ___ must plan, motivate, organize and control the practitioners who do software
work. a) Project Managers
b) Senior Managers
c) Customers
d) End Users
54. The realistic percentage for striving to work in Software Project Development is
___. a) 40%
b) 80%
c) 50%
d) 100%
55. ___ organizations take the networked structure one step further by combining IT with
traditional components to form new types of components.
a) Hierarchical
b) Flat
c) T-form (Technology-based)
d) Matrix
ANSWER KEY
1. D
2. C
3. C
4. A
5. D
6. D
7. A
8. B
9. C
10. C
11. B
12. C
13. A
14. B
15. D
16. D
17. B
18. A
19. C
20. B
21. B
22. C
23. B
24. C
25. D
26. B
27. A
28. C
29. B
30. C
31. E
32.
D
33. B
34. C
35. C
36.
D
37.
D
38. B
39.
A
40. B
41. B
42.
A
43. C
44.
A
45.
D
46. C
47. C
48.
A
49. B
50.
D
51.
D
52.
D
53.
A
54. B
55. C
SEMESTER VIII
SOFTWARE PROJECT MANAGEMENT
Multiple Choice Questions.
7. The first stage of the software project is a which results in a recommended course of action.
A. system driven project
B. software driven project
C. hardware driven project
D. objectives driven project
ANSWER: D
9. In case of product-driven projects, the objectives of the project are defined in terms of .
A. functional requirements only
B. resource and non-functional requirements
C. functional and quality requirements
D. resource requirements only
ANSWER: C
13. is record of how much the organization is willing to spend to the system
A. Resource requirements.
B. Functional requirements.
C. Security requirements.
D. Non-functional requirements.
ANSWER: A
14. Projects are by definition and therefore more uncertain than normal undertakings.
A. routine
B. non-routine
C. specific
D. controllable
ANSWER: B
18. The organization as part of its monitoring and control policy may have a programme in place which dictates that certain statistics have to be collected at
various stages of a project.
A. measurement.
B. system.
C. software.
D. testing.
ANSWER: A
19. The products handed over to the clients at the end of projects are called as .
A. software
B. application program
C. deliverables
D. intermediate products
ANSWER: C
22. The relationship between program design and program specification can be portrayed in .
A. PFD.
B. DFD.
C. PDF.
D. DDF.
ANSWER: A
Prepared by S.PRABU Asso.Prof
23. Which one of the following is NOT an agile method?
A. SCRUM
B. Extreme Programming (XP)
C. DSDM
D. Waterfall
ANSWER: D
24. Same generic fragment relates to more than instance of the particular type of the product.
A. one.
B. two.
C. three
D. four
ANSWER: A
27. In order to carry out a successful strategic assessment of a potential project there should be strategic plan clearly defining the organization's .
A. objectives.
B. rules.
C. conditions.
D. ideas.
ANSWER: A
28. The standard way of evaluating the economic benefits of any projects is to carry out a analysis.
A. price-benefit.
B. cost-benefit.
C. cash flow.
D. fund flow.
ANSWER: B
Prepared by S.PRABU Asso.Prof
29. The costs that include the salaries and other employment costs of the staff involved in the development project and all associated costs are .
A. operational cost.
B. development cost.
C. setup cost
D. direct cost.
ANSWER: B
30. Long term or benefits that are considered very difficult to quantify is called .
A. direct benefits.
B. assessable benefits.
C. indirect benefits.
D. intangible benefits.
ANSWER: D
31. will indicate when expenditure and income will take place.
A. Cash flow forecast.
B. Cost analysis.
C. Fund flow.
D. Technical forecast.
ANSWER: A
32. is the time taken to break even or pay back the initial investment.
A. Back period.
B. Payback period.
C. Cash back period.
D. Rate of Return.
ANSWER: B
36. RAD is .
A. Resource Application Development.
B. Resource Allocation Development.
C. Rapid Application Development.
D. Rapid Action Development.
ANSWER: C
37. JAD is .
A. J2EE Application Development.
B. J2ME Allocation Development.
C. J2SE Application Development.
D. Joint Action Development.
ANSWER: D
42. prototypes are used and discarded when the true development of the operational system is commenced.
A. Evolutionary.
B. Throw away.
C. Operational.
D. Real.
ANSWER: B
43. is as when copies of input screens are shown to the users on a workstation, but the screens cannot actually be used.
A. Simulation.
B. Annealing.
C. Mock-ups.
D. RAD system.
ANSWER: C
45. The scope of the deliverables for an increment is rigidly constrained by an agreed deadline called as .
A. sand boxing.
B. time boxing.
C. time delaying.
D. local delaying.
ANSWER: B
46. would mean the change can be implemented without software development.
A. One cost.
B. Total cost.
C. Zero cost.
D. No cost.
ANSWER: C
Prepared by S.PRABU Asso.Prof
47. SSADM means .
A. Straight Systems Analysis Design Method.
B. Structured Systems Analysis Design Method.
C. Software Systems Analysis Design Method.
D. Solutions Systems Analysis Design Method.
ANSWER: B
54. The statement "If a system does not have to reliable, it can meet any other objective" is from .
A. Brooks Law.
B. Peters Law.
C. Parkinson's first Law.
D. Weinberg's Zeroth Law.
ANSWER: D
58. Effort = .
A. system size x productivity rate.
B. system size x KLOC.
C. person in months / SLOC.
D. person in months x productivity rate.
ANSWER: A
Prepared by S.PRABU Asso.Prof
59. The estimator seeks out projects that have been completed and that have similar characteristics to the new project is called .
A. code based reasoning.
B. case based reasoning.
C. case based analysis.
D. code based analysis.
ANSWER: B
63. the degree to which there is a large dispersed team as opposed to there being a small tightly knit team.
A. Small cohesion.
B. Team cohesion.
C. Process maturity.
D. Team maturity.
ANSWER: B
67. PERT is .
A. Process Evaluation and Review Technique.
B. Product Evaluation and Review Technique.
C. Program Evaluation and Review Technique.
D. Project Evaluation and Review Technique.
ANSWER: C
69. The activities have zero duration but are assumed to start at the same time as the first and the end at the same time as the last one is called .
A. hijacked activity.
B. heuristic activity.
C. hammocked activity.
D. hole activity.
ANSWER: C
70. is carried out to calculate the earliest dates on which each activity may be started and completed.
A. Backward pass.
B. Forward pass.
C. No pass.
D. Increasing pass.
ANSWER: B
Prepared by S.PRABU Asso.Prof
71. The time by which an activity may be delayed without affecting any subsequent activity is called .
A. action float.
B. terminal float.
C. free float
D. null float
ANSWER: C
72. The objective of is to avoid or minimize the adverse effects of unforeseen events is called
A. risk management.
B. risk maintenance.
C. risk taking.
D. risky job.
ANSWER: A
73. A is an event that might occur and if it occurs, create a problem for the successful completion of the project.
A. planning.
B. hazard.
C. safety.
D. start.
ANSWER: B
75. RRL is .
A. risk reduction leverage.
B. risk relax leverage.
C. risk reading letter.
D. risk resource letter.
ANSWER: A
78. The shortest time in which we could expect to complete the activity, barring outright miracles called .
A. Optimistic Time
B. Pessimistic Time
C. Most Likely Time
D. Shortest Time
ANSWER: A
79. PERT combines three estimates of time and obtains a single expected duration is .
A. te
B. tp
C. tm
D. ts
ANSWER: A
80. is proportional to the difference between the optimistic and pessimistic estimates.
A. Activity Regression
B. Activity mean
C. Activity Standard Deviation
D. Activity Variance
ANSWER: C
81. The value in PERT is calculated for each node that has a target date.
A. x value.
B. y value.
C. t value.
D. z value.
ANSWER: D
84. A is any item or person required for the execution of the project.
A. risk.
B. allocation.
C. activity.
D. resource.
ANSWER: D
85. According to Bob Hughes and Mike Cotterell, resources fall into categories.
A. five.
B. four.
C. seven.
D. two.
ANSWER: C
87. "Each activity has been scheduled to start at its earliest start date" is called as .
A. likelihood.
B. activity schedule.
C. probability.
D. planning.
ANSWER: A
92. represents expenditure that an organization incurs, which cannot be directly related.
A. Under head
B. Over head.
C. Top head.
D. Miscellaneous expenses
ANSWER: B
96. is an activity bar chart indicating scheduled activity dates and durations frequently augmented with activity floats. .
A. Bar chart.
B. Ball chart.
C. Slip Chart.
D. Gantt chart
ANSWER: D
97. Gantt charts, Slip chars and Ball charts are under process.
A. monitoring.
B. verification.
C. control.
D. visualization.
ANSWER: D
98. is the method of recording and displaying the way in which targets have changed throughout the duration of the project.
A. Gantt chart.
B. Bar chart.
C. Timeline.
D. Schedule.
ANSWER: C
102. relates to the physical resources used when the software is executed.
A. Functionality.
B. Maintainability.
C. Reliability.
D. Efficiency.
ANSWER: D
109. An is a named property of a class that describes the object being modeled.
A. method.
B. constant.
C. message.
D. attribute.
ANSWER: B
111. is a description of a set of objects that share the same attributes,operations, relationships, and semantics.
A. Object.
B. Class.
C. Process.
D. Instance
ANSWER: B
112. will divide the domain of the task hierarchy in activity diagrams.
A. Swim lane.
B. Activity.
C. Interface.
D. Split.
ANSWER: A
Prepared by S.PRABU Asso.Prof
113. is the task/process which describes the way in which the actor interact the system.
A. Class.
B. Flow.
C. Object.
D. Use case.
ANSWER: D
115. A metric used to measure the characteristic of documentation and code called as
A. Process metric
B. Product Metric
C. Test metrics
D. None of the above
ANSWER: B
118. Software testing which is done without planning and Documentation is known as
A. adHoc Testing
B. Unit Testing
C. Regression testing
D. Functional testing.
ANSWER: A
Prepared by S.PRABU Asso.Prof
119. This type of testing method attempts to find incorrect or missing functions, errors in data structures or external database access, interface errors, Performance errors
and initialization and Termination errors. It is called as
A. White Box Testing
B. Grey Box Testing
C. Black Box Testing
D. Open Box Testing
ANSWER: C
120. Retesting of a single program or component after a change has been made?
A. Full Regression Testing
B. Unit Regression
C. Regional Regression
D. Retesting
ANSWER: B
121. Defects are less costly if detected in which of the following phases
A. Coding
B. Design
C. Requirements Gathering
D. Implementation
ANSWER: C
133. You are told to prepare a report on the most commonly occurring product defects. You review the software defect reports, which categories the defects of coding
errors, requirement errors, documentation errors, etc. The best tool to report this information is
A. A histogram
B. A pareto diagram
C. A cause and effect diagram
D. A scatter plot
ANSWER: A
134. A statistical technique to assess, monitor and maintain the stability of a process is
A. Pareto chart
B. Control chart
C. Run chart
D. Histogram
ANSWER: B
136. If the measurement taken by the two people are same refers to the terms as
A. Reliability
B. Validity
C. Calibration
Prepared by S.PRABU Asso.Prof
D. Ease of use and simplicity
ANSWER: A
139. You are performing a test to see that it complies with the user requirement that a certain field be populated by using a drop down box containing a list of values.
What kind of testing are you doing?
A. White box testing
B. Black box testing
C. Load testing
D. Regression testing
ANSWER: B
141. The approach/document used to make sure all the requirements are covered when writing test cases
A. Test Matrix
B. Checklist
C. Test bed
D. Traceablity Matrix
ANSWER: D
142. Executing the same test case by giving the number of inputs on same build called as
A. Regression Testing
B. ReTesting
Prepared by S.PRABU Asso.Prof
C. Ad hoc Testing
D. Sanity Testing
ANSWER: B
143. To check whether we are developing the right product according to the customer requirements are not. It is a static process
A. Validation
B. Verification
C. Quality Assurance
D. Quality Control
ANSWER: B
144. To check whether we have developed the product according to the customer requirements r not. It is a Dynamic process.
A. Validation
B. Verification
C. Quality Assurance
D. Quality Control
ANSWER: A
146. A Non-Functional Software testing done to check if the user interface is easy to use and understand
A. Usability Testing
B. Security Testing
C. Unit testing
D. Block Box Testing
ANSWER: A
147. It measures the quality of processes used to create a quality product. It is a system of management activities, It is a preventive process, It applies for entire life cycle
& Deals with Process.
A. Validation
B. Verification
C. Quality Assurance
D. Quality Control
ANSWER: C
150. Name the events that will be analyzed, Count the named incidents, Rank the count by frequency using a bar chart & Validate reasonableness of the analysis is called
as
A. Pareto Analysis
B. Cause and Effect Diagram
C. SWOT Analysis
D. Pie Charts
ANSWER: A
Answer:D
-----------------------------------------------------------------------------------------------------------------------
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer:B
-----------------------------------------------------------------------------------------------------------------------
3. Which of the following is not considered as a risk in project management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer:C
----------------------------------------------------------------------------------------------------------------------
4. The process each manager follows during the life of a project is known as
a) Project Management
a) very low
b) low
c) moderate
d) high
e) very high
Answer:D
-----------------------------------------------------------------------------------------------------------------------
6. Which of the following is/are main parameters that you should use when computing the
costs of a software development project?
Answer:D
-----------------------------------------------------------------------------------------------------------------------
7. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer:B
8. Which of the following is incorrect activity for the configuration management of a software
system?
a) Internship management
Vi Institute of Technology Page 2
c) Version management
d) System management
Answer:A
-----------------------------------------------------------------------------------------------------------------------
9. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer:B
-----------------------------------------------------------------------------------------------------------------------
10. An independent relationship must exist between the attribute that can be measured
and the external quality attribute.
a) True
b) False
Answer:B
----------------------------------------------------------------------------------------------------------------------
11. If a software production gets behind schedule, one can add more programmers and catch up.
a) True
b) False
Answer:B
-----------------------------------------------------------------------------------------------------------------------
12. Choose an internal software quality from given below:
a) scalability
b) usability
c) reusability
d) reliability
Vi Institute of Technology Page 3
Answer:D
-----------------------------------------------------------------------------------------------------------------------
14. The RUP is normally described from three perspectives-dynamic, static & practice.What
does static perspective do ?
Answer:A
-----------------------------------------------------------------------------------------------------------------------
15. The only deliverable work product for a successful project is the working program.
a) True
b) False
Answer:B
-----------------------------------------------------------------------------------------------------------------------
16. Which phase of the RUP is used to establish a business case for the system ?
a) Transition
b) Elaboration
c) Construction
d) Inception
Answer:D
17. Which one of the following is not a fundamental activity for software processes in
Vi Institute of Technology Page 4
b) Software Validation
d) Software evolution
e) Software specification
Answer:A
----------------------------------------------------------------------------------------------------------------------
18. A general statement of objectives is the major cause of failed software efforts.
a) True
b) False
Answer:A
----------------------------------------------------------------------------------------------------------------------
19. The longer a fault exists in software
Answer:D
----------------------------------------------------------------------------------------------------------------------
20. Component-based Software Engineering allows faster delivery.
a) True
b) False
Answer:A
-----------------------------------------------------------------------------------------------------------------------
21. Arrange the following steps to form a basic/general Engineering Process Model.
i. Test
ii. Design
iv. Specification
v. Manufacture
vi. Maintain
a) 2, 4, 5, 1, 6, 3
b) 4, 2, 5, 1, 3, 6
c) 2, 4, 5, 1, 3, 6
d) 4, 2, 5, 1, 6, 3
Answer:B
-----------------------------------------------------------------------------------------------------------------------
22. Which of the following categories is part of the output of software process?
a) computer programs
c) data
Answer:D
-----------------------------------------------------------------------------------------------------------------------
23. Which is a software configuration management concept that helps us to control change
without seriously impeding justifiable change?
a) Baselines
b) Source code
c) Data model
Answer:A
-----------------------------------------------------------------------------------------------------------------------
24. Software Configuration Management can be administered in several ways. These include
Answer:A
-----------------------------------------------------------------------------------------------------------------------
25. What combines procedures and tools to manage different versions of configuration objects
that are created during the software process?
a) Change control
b) Version control
c) SCIs
Answer:B
-----------------------------------------------------------------------------------------------------------------------
26. What complements the formal technical review by assessing a configuration object for
characteristics that are generally not considered during review?
c) Baseline
Answer:A
-----------------------------------------------------------------------------------------------------------------------
27. Which of the following is the process of assembling program components, data, and
libraries, and then compiling and linking these to create an executable system?
a) System building
b) Release management
c) Change management
Answer:A
-----------------------------------------------------------------------------------------------------------------------
28. Which of the following option is not tracked by configuration management tools?
Answer:D
-----------------------------------------------------------------------------------------------------------------------
29. Which of the following is not a Software Configuration Management Activity?
b) Risk management
c) Release management
d) Branch management
Answer:B
-----------------------------------------------------------------------------------------------------------------------
30. The definition and use of configuration management standards is essential for quality
certification in
a) ISO 9000
b) CMM
c) CMMI
Answer:D
-----------------------------------------------------------------------------------------------------------------------
31. What involves preparing software for external release and keeping track of the system
versions that have been released for customer use?
a) System building
c) Change management
d) Version management
Answer:B
----------------------------------------------------------------------------------------------------------------------
32. Which two requirements are given priority during Requirement Management of a product ?
Answer: C
----------------------------------------------------------------------------------------------------------------------
33. Considering the example of issue/return of a book, cataloging etc. in a library
management. What type of management requirement is being depicted here?
a) Enduring
b) Volatile
Answer:A
----------------------------------------------------------------------------------------------------------------------
34. Why is Requirements Management Important ? It is due to the changes
a) to the environment
b) in technology
c) in customer’s expectations
Answer:D
----------------------------------------------------------------------------------------------------------------------
35. Requirements Management is a prerequisite for Quality-Oriented Development.
a) True
b) False
Answer:A
36. Requirements traceability is one of the most important part requirement management. It
Vi Institute of Technology Page 9
a) True
b) False
Answer:A
-----------------------------------------------------------------------------------------------------------------------
37. Requirements Management has a high initial start-up cost but does not need ongoing
funding throughout a project.
a) True
b) False
Answer:B
-----------------------------------------------------------------------------------------------------------------------
38.Which of the following is not a Requirement Management workbench tool ?
a) RTM
b) DOORS
c) Rational Suite
d) RDD 100
Answer:C
-----------------------------------------------------------------------------------------------------------------------
39. Which of the following is a requirement management activity ?
a) Investigation
b) Design
Answer:D
-----------------------------------------------------------------------------------------------------------------------
40. What functionality of Requirement Management Tool (RMT) is depicted by the statement:
“the tool should be able to automatically detect relations between artifacts. For example
information retrieval techniques, monitoring of change history, naming schemas or model
transformations.”
a) Automatic Link Detection
c) Graphical Representation
Answer:A
-----------------------------------------------------------------------------------------------------------------------
41. According to a statistical report: “over 30% of all software projects are cancelled before
completion and over 70% of the remainder fail to deliver expected features”. What must be the
reason for such a situation ?
Answer:B
-----------------------------------------------------------------------------------------------------------------------
42. Which of the following are parameters involved in computing the total cost of a software
development project?
b) Effort costs
a) Function-related metrics
b) Product-related metrics
c) Size-related metrics
Answer:A
-----------------------------------------------------------------------------------------------------------------------
45. A is developed using historical cost information that relates some software metric
to the project cost.
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer:A
-----------------------------------------------------------------------------------------------------------------------
46. It is often difficult to estimate size at an early stage in a project when only a specification is
available
a) True
b) False
Answer:A
-----------------------------------------------------------------------------------------------------------------------
47. Which technique is applicable when other projects in the same analogy application
domain have been completed?
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer:C
a) An application-composition model
b) A post-architecture model
c) A reuse model
Answer:A
---------------------------------------------------------------------------------------------------------------------
49. Which of the following states that work expands to fill the time available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
Answer:C
-----------------------------------------------------------------------------------------------------------------------
50. Which model is used during early stages of the system design after the requirements
have been established?
a) An application-composition model
b) A post-architecture model
c) A reuse model
Answer:D
-----------------------------------------------------------------------------------------------------------------------
51. Which model is used to compute the effort required to integrate reusable components or
program code that is automatically generated by design or program translation tools?
a) An application-composition model
b) A post-architecture model
c) A reuse model
Vi Institute of Technology Page 13
Answer:C
-----------------------------------------------------------------------------------------------------------------------
52. The COCOMO model takes into account different approaches to software development, reuse,
etc.
a) True
b) False
Answer:B
-----------------------------------------------------------------------------------------------------------------------
53.Identify, from among the following, the correct statement.
a) One of the main challenges Software Engineering facing today is the requirement of most
software systems to work with a multitude of homogenous systems
b) ‘Legacy systems’ are custom developed software systems for the legal domain
c) Software does not wear-out in the traditional sense of the term, but software does tend to
deteriorate as it evolves
e) With the advent of component based software assembly, we find that only less than 20% of
today’s software is still custom built.
Answer:C
-----------------------------------------------------------------------------------------------------------------------
54.Software Engineering:
Answer:D
-----------------------------------------------------------------------------------------------------------------------
“Imagine that you were recently hired as a software engineer to a company that specializes in
aircraft navigation control software. While orientating yourselves to the company’s work
practices, you observe that they in fact do not conduct a few tests that they should in order to
comply with the relevant safety standard. When you inquire about this from the project manager,
he dismisses it saying that those tests are really unnecessary (and takes an unreasonably long
time to conduct, as well as being superfluous) and that they have managed with the other tests
for so long, without any problems.”
a) You should immediately resign from the company and file a complaint with the relevant
standard institution
c) Although you are new to the company, and you hardly know anything about the internal
processes and politics, you should insist on the company changing its work practices
immediately; failing which you threaten to report the matter
d) Since you are new to the company, and you are unfamiliar with the internal processes and
politics, you should first find-out more about the issue and its background
Answer:D
-----------------------------------------------------------------------------------------------------------------------
56. With regard to Evolutionary development, identify the correct statement.
c) Exploratory development is used in situations where most of the requirements are well
understood in advance
d) One of the strong points of evolutionary development is that it facilitates easy project
management, through the high volume of documentation it generates
b) Software engineering (as opposed to other forms of engineering, such as Civil) is an art – not a
science
c) The discipline is relatively new, say in comparison to bridge building that is an activity
that has millennia of practice
e) The complexity of systems and their interaction continues faster than we can understand it.
Answer:E
-----------------------------------------------------------------------------------------------------------------------
58.The software life cycle can be said to consist of a series of phases. The classical model is
referred to as the waterfall model. Which phase may be defined as “The concept is explored and
refined, and the
client’s requirements are elicited?”
Answer:E
-----------------------------------------------------------------------------------------------------------------------
60.Which of the following items should not be included in the software project management plan?
Answer:E
-----------------------------------------------------------------------------------------------------------------------
61.The final form of testing COTS software is testing.
Answer:E
-----------------------------------------------------------------------------------------------------------------------
62.In the maintenance phase the product must be tested against previous test cases. This is known
as
testing.
Answer:C
-----------------------------------------------------------------------------------------------------------------------
63.Which property of the rapid prototype is not important?
d) The insights that the design team can gain from it, even if they are of the ‘how not to do it’
variety
Answer:C
-----------------------------------------------------------------------------------------------------------------------
64.An example of the risk involved in software development is
b) The manufacturer of critical components (e.g. the hardware associated with a real-time
system) may go bankrupt
b) Freezing
c) Synchronization
d) Testing
e) Risk analysis.
Answer:E
-----------------------------------------------------------------------------------------------------------------------
66.The degree of interaction between two modules is known as
a) Cohesion
b) Strength
c) Inheritance
d) Coupling
e) Instantiation.
Answer:D
-----------------------------------------------------------------------------------------------------------------------
67.The relationship between a derived class (or subclass) and base class is referred to as
a) Association
b) Inheritance
c) Polymorphism
d) Instantiation
e) Aggregation.
Answer:B
-----------------------------------------------------------------------------------------------------------------------
68.Myers (1978) identifies seven levels of cohesion. Which level of cohesion may be defined as
a) Communicational cohesion
b) Functional cohesion
c) Communicational cohesion
d) Temporal cohesion
e) None of these.
Answer:A
-----------------------------------------------------------------------------------------------------------------------
69.A design is said to be a good design if the components are
a) Strongly coupled
b) Weakly cohesive
Answer:E
-----------------------------------------------------------------------------------------------------------------------
70.If a control switch is passed as an argument this is an example of coupling.
a) Content
b) Common
c) Control
d) Stamp
e) Data.
Answer:C
a) Data
c) Iteration
Answer:D
-----------------------------------------------------------------------------------------------------------------------
72.In the classical chief programmer team approach, the team member responsible for maintaining
the detailed design and coding is
a) The chief programmer
Answer:D
-----------------------------------------------------------------------------------------------------------------------
73.Internal costs include
a) Developers salaries
Answer:A
-----------------------------------------------------------------------------------------------------------------------
74.Problems with using Lines of Code to measure the size of a product include(s)
b) The Lines of Code (LOC) will differ between languages and cannot be measured for some
languages
D) The final size (kLOC) can only be determined once the product is delivered
Answer:E
-----------------------------------------------------------------------------------------------------------------------
75.Software Science bases its estimation of the size of a product on
Answer:D
-----------------------------------------------------------------------------------------------------------------------
76.In Intermediate COCOMO the mode that represents complex products is referred to as
a) Embedded
b) Semidetached
c) Organic
d) Multiplicative
e) Monolithic.
Answer:A
77.Work that continues throughout the project and does not relate to any specific phase of software
development is termed a(n)
a) Milestone
b) Project function
d) Task
e) Baseline.
Answer:B
78.The advantage of following the IEEE Standard for drawing up a Software Project Management
Plan (SPMP) – see IEEE Standard 1059.1 1987 – is
d) It can be tailored for each organisation for a particular application area, development
team or technique.
Answer:E
79.The best way to test the Software Project Management Plan (SPMP) is by
a) Prototyping
b) Inspection
c) Simulation
d) Compilation
e) Debugging
Answer:B
-----------------------------------------------------------------------------------------------------------------------
80Algorithmic cost estimation in different organisations may be different for the same application
development, because
a) Different organisations consider complexity factors differently
Answer:E
-----------------------------------------------------------------------------------------------------------------------
81.The aim of software engineering is to produce software that is
a) Fault-free
b) Delivered on time
Answer:E
-----------------------------------------------------------------------------------------------------------------------
82.Object-oriented concepts are not new. The first OO language was considered to be
a) ALGOL-68
b) FORTRAN 77
c) C
d) MODULA
e) SIMULA 67.
Answer:E
Answer: d
Explanation: Projects need to be managed because professional software engineering is always
subject to organizational budget and schedule constraints.
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project schedule
or the quality of the software being developed, and then taking action to avoid these risks.
3. Which of the following is not considered as a risk in project management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as risk.
4. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and manage
projects successfully.
5. A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–25%),
moderate (25–50%), high (50–75%), or very high (>75%).
6. Which of the following is an important factor that can affect the accuracy and efficacy of
estimates?
a) Project size
b) Planning process
c) Project complexity
d) Degree of structural uncertainty
Answer: a
Explanation: As size increases, the interdependence among various elements of the software
grows rapidly.
7. What describes the data and control to be processed?
a) Planning process
b) Software scope
c) External hardware
d) Project complexity
Answer: b
Explanation: Functions described in the statement of scope are evaluated and in some cases
refined to provide more detail prior to the beginning of estimation.
8. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how
these are to be assessed
9. What all has to be identified as per risk identification?
a) Threats
b) Vulnerabilities
c) Consequences
d) All of the mentioned
Answer: d
Explanation: Risk identification states what could cause a potential loss.
10. Which one is not a risk management activity?
a) Risk assessment
b) Risk generation
c) Risk control
d) None of the mentioned
Answer: b
Explanation: Risk management activities would never want a new risk to be generated.
11. What is the product of the probability of incurring a loss due to the risk and the potential
magnitude of that loss?
a) Risk exposure
b) Risk prioritization
c) Risk analysis
d) All of the mentioned
Answer: a
Explanation: None.
12. What threatens the quality and timeliness of the software to be produced?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks
Answer: d
Explanation: Technical risks identify potential design, implementation, interface, verification,
and maintenance problems.
13. What threatens the viability of the software to be built?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks
Answer: b
Explanation: Business risks often jeopardize the project or the product.
advertisement
14. Which of the following is not a business risk?
a) building an excellent product or system that no one really wants
b) losing the support of senior management due to a change in focus or change in people
c) lack of documented requirements or software scope
d) losing budgetary or personnel commitment
Answer: c
Explanation: This is not considered as a business risk.
15. Which of the following is a systematic attempt to specify threats to the project plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection
Answer: d
Explanation: By identifying known and predictable risks, the project manager takes a first step
toward avoiding them when possible and controlling them when necessary.
16. Which risks are associated with the overall size of the software to be built or modified?
a) Business impact risks
b) Process definition risks
c) Product size risks
d) Development environment risks
Answer: c
Explanation: None.
17. Which risks are associated with constraints imposed by management or the marketplace?
a) Business impact risks
b) Process definition risks
c) Product size risks
d) Development environment risks
Answer: a
Explanation: None.
18. Which of the following term is best defined by the statement:”the degree of uncertainty that
the product will meet its requirements and be fit for its intended use.”?
a) Performance risk
b) Cost risk
c) Support risk
d) Schedule risk
19. Purchasing insurance coverage for your project equipment is an example of ________ risk
response.
a) Transfer
b) Mitigation
c) Acceptance
d) Avoidance
Answer: a
Explanation:
This is an example of transfer as the financial risk is transferred to the insurance company.
20. A project manager is managing a pilot project of a short duration and has started the risk
management planning process. He has identified new risks and prioritized them based on the
probability and impact matrix. The project manager now proceeds to plan responses for the risks
without analyzing the risks numerically. According to you, this decision of project manager is:
a)Incorrect, as it is important to numerically analyzeeach risk so that it can be responded
properly
b) Correct, as quantitative risk analysis is a waste of time and not required if risks are already
assessed qualitatively
c) Incorrect, as quantitative risk analysis is important to calculate EMV for each risk and then
later move to risk response planning
d) Correct, as this is a short project and project manager might skip quantitative risk analysis if
he feels it is not assisting in the risk management process
Answer: d
Explanation:
The amount of rigor in the analysis is dependent upon the duration and complexity of the project.
For a project with a short duration, it may not be necessary to perform numeric (quantitative) risk
analysis.
21. Which of the following is/are main parameters that you should use when computing the costs
of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each
activity and, from this, calculating the total cost of activities.
22. Which of the following is incorrect activity for the configuration management of a software
system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes define how to record and process
proposed system changes, how to decide what system components to change, how to manage
different versions of the system and its components, and how to distribute changes to customers.
23. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are
identified.
24. An independent relationship must exist between the attribute that can be measured and the
external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of the
attribute than can be measured.
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on
“Project Planning”.
Answer: c
Explanation: Facilitated application specification techniques
(FAST), this approach encourages the creation of a joint team of customers
and developers who work together to identify the problem, propose elements
of the solution, negotiate different approaches, and specify a preliminary set of
requirements.
26. CLSS stands for
a) conveyor line sorting system
b) conveyor line sorting software
c) conveyor line sorting speed
d) conveyor line sorting specification
Answer: a
Explanation: The conveyor line sorting system (CLSS) sorts boxes moving along a conveyor
line. Each box is identified by a barcode that contains a part number and is sorted into one of six
bins at the end of the line.
27. The project planner examines the statement of scope and extracts all important software
functions which is known as
a) Association
b) Decomposition
c) Planning process
d) All of the mentioned
Answer: b
Explanation: None
28. The environment that supports the software project is called
a) CLSS
b) SEE
c) FAST
d) CBSE
Answer: b
Explanation: Software engineering environment (SEE), incorporates hardware and software.
29. Which of the following is not an option to achieve reliable cost and effort estimate?
a) Base estimates on similar projects that have already been completed
b) Use one or more empirical models for software cost and effort estimation
c) Use relatively simple decomposition techniques to generate project cost and effort estimates
d) The ability to translate the size estimate into human effort, calendar time, and dollars
Answer: d
Explanation: None.
30. What can be used to complement decomposition techniques and offer a potentially valuable
estimation approach in their own right?
a) Automated estimation tools
b) Empirical estimation models
c) Decomposition techniques
d) Both Automated estimation tools and Empirical estimation models
Answer: b
Explanation: An estimation model for computer software uses empirically derived formulas to
predict effort as a function of LOC or FP.
31. Which of the following is not achieved by an automated estimation tools?
a) Predicting staffing levels
b) Predicting software cost
c) Predicting software schedules
d) Predicting clients demands
Answer: d
Explanation: Demands can vary from client to client.
32. Software project estimation can never be an exact science, but a combination of good
historical data and systematic techniques can improve estimation accuracy.
a) True
b) False
Answer: a
Explanation: None.
33. Which of the following are parameters involved in computing the total cost of a software
development project?
a) Hardware and software costs
b) Effort costs
c) Travel and training costs
d) All of the mentioned
Answer: d
Explanation: All these are accounted for in estimating a software development cost.
34. Which of the following costs is not part of the total effort cost?
a) Costs of networking and communications
b) Costs of providing heating and lighting office space
c) Costs of lunch time food
d) Costs of support staff
Answer: c
Explanation: This is a incurred by the employees.
35. What is related to the overall functionality of the delivered software?
a) Function-related metrics
b) Product-related metrics
c) Size-related metrics
d) None of the mentioned
Answer: a
Explanation: Productivity is expressed in terms of the amount of useful functionality produced in
some given time. Function points and object points
are the best-known metrics of this type.
36. A _________ is developed using historical cost information that relates some software metric
to the project cost.
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer: a
Explanation: The model uses a basic regression formula with parameters that are derived from
historical project data and current as well as future project characteristics.
37. It is often difficult to estimate size at an early stage in a project when only a specification is
available
a) True
b) False
Answer: a
Explanation: Function-point and object-point estimates are easier to produce than estimates of
code size but are often still inaccurate.
advertisement
38. Which technique is applicable when other projects in the same analogy application domain
have been completed?
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer: c
Explanation: The cost of a new project is estimated by analogy with these completed projects.
39. Which model assumes that systems are created from reusable components, scripting or
database programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer: a
Explanation: It is designed to make estimates of prototype development.
40. Which of the following states that work expands to fill the time available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
Answer: c
Explanation: The cost is determined by available resources rather than by objective assessment.
If the software has to be delivered in 12 months and 5 people are available, the effort required is
estimated to be 60 person-months.
UNIT-III : Activity Planning and Risk Management
41.Who is typically responsible for approving project charter.
a) Project Sponsor
b) Senior Management
c) Project Manager
d) Project Stakeholder
Answer : a
Explanation: Project Sponsor is typically responsible for Project charter
42. Which of the following is not a characteristic of a project?
a)Repeats every week
b)Temporary
c)Definite beginning and end
d)Interrelated activities
Answer: A
Explanation: Characteristic of the project based on the project definition. Except the choice a,
everything else is a part of a project definition itself.
Answer: C
Inputs, Tools, Techniques, Outputs
44. A project manager is validating the scope. Which Process Group is the project manager
working in?
a) Planning
b) Monitoring and Controlling
c) Initiating
d) Closing
Answer: b
Monitoring and Controlling During project closure the project manager reviews the acceptance
documentation from scope validation to ensure that all project requirements are completed.
Answer is: a
The project manager is in control of the project throughout the project life cycle.
46. The high level project schedule constraints have been determined. Which Process Group is
the project in?
a)Planning
b)Closing
c)Monitoring and Controlling
d)Initiating
Answer: d
The high level constraints of schedule and budget are determined during the Initiating Process
Group. The detailed planning is done during the Planning Process Group.
47. Which of the following is not true about project life cycle?
a)Cost of changes increases as the project approaches completion
b)Stakeholder influences are greatest towards the end of the project
c)Risk and uncertainty are greatest at the start of the project
d) Cost and staffing levels are low at the start, peak as the work is carried out, and
drop rapidly as the project draws to a close
Answer: b
Explanation: Stakeholder influences are greatest towards the beginning of the project.
48. Which of the following Process Groups should be included in all the projects?
a) Initiating, Planning, Executing, Monitoring and Controlling, Closing
b) Planning, Executing, Monitoring and Controlling
c) Monitoring and Controlling
d) Initiating, Planning, and Executing
Answer: a
In every project, all five Process Groups must be included but the level of attention given to each
Process Group will be governed by the project manager depending on the project size and
complexity.
49. A project manager is working on a project to construct a new bridge. The resources report to
the functional manager and are mainly occupied with operational work. The project manager has
no authority to properly assign resources. What type of organizational structure is the project
manager in?
a)Functional
b) Projectized
c) Strong Matrix
d) Weak Matrix
Answer: a
Explanation : In a functional organization, team members are more concerned with their daily
functional activities than with the project activities.
Answer:a
Explanation: Characteristic of a project is based on the project definition. Except for choice a,
everything else is part of the project definition itself.
51. How is a project life cycle different from product life cycle?
a) A project life cycle has no methodology
b) A project life cycle depends on the control needs of the performing organization
c) A project life cycle can contain many product life cycles
d) A project life cycle only includes specific project management activities
Answer: b
Explanation:
A project life cycle depends on the control needs of the performing organization. Choice C is just
the opposite, i.e., a product life cycle can include many projects through its life cycle, not the
other way around.
52 With respect to change, which of the following is the most important for a project manager to
focus on?
Undertake the change
Track and record the change
Prevent uncontrolled change
Inform project sponsor of the change
It is the responsibility of the project manager to proactively manage the project. This includes
Answer. D
Explanation:
The Plan-do-Check-Act philosophy was proposed by Deming. Continuous small improvements
are part of Kaizen theory.
54. What makes Project Integration Management unique among the other ten knowledge areas?
a)It is the only knowledge area with processes in each of the project process groups (Initiating,
Planning, Execution and Monitoring and Controlling).
b) Integration Management is the only knowledge area where no resources are assigned as it is a
coordination function that is the responsibility of the project manager.
c) Integration Management is the only knowledge area that can be completed in the Planning
phase.
d) When closing integration planning, it is not necessary to have sign-off as it only delivers
subsidiary plans.
55). What is the most important thing that a project manager should ensure during the Validate
Scope process?
a) Accuracy
b) Timeliness
c) Acceptance
d) Completeness
Ans: C
Explanation: Scope validation involves formal acceptance of the work deliverables.
56. The WBS for your project has been prepared and distributed to the project team members.
When execution begins, which document will provide the detailed descriptions of the WBS
elements?
a) Scope Statement
b) Project Management Plan
c) WBS dictionary
d) Project Statement of Work
Answer: C
Explanation:
The WBS dictionary provides detailed descriptions about the deliverables listed in the WBS.
57. Which of the following is not true regarding subdividing the work in the WBS?
a) Subdivide until it has a meaningful conclusion
b) Subdivide until it can be done by a single person
c) Subdivide until it cannot be logically subdivided further
d) Subdivide until it can be realistically estimated
Answer : b
Explanation:
WBS need not be decomposed until it can be done by a single person.
58 A project team is working on the network diagram of a project and wants to determine the
float of a project activity. Which of the following is the correct formula?
a) Late Finish-Early finish (LF-EF)
b) Late Finish-Early finish (LF-EF) or Late Start-Early Start (LS-ES)
c) Late Start-Early Start (LS-ES)
d) Late Finish-Late Start (LF-LS)
Answer: B
Explanation: Float is calculated by subtracting either the Early Finish (EF) from the Late
Finish (LF) or the Early Start (ES) from the Late Start (LS). Float for an activity = LS-ES or
LF-EF.
59. A sequence of tasks within a project schedule that has zero slack is called ________.
a) Critical Chain
b) Critical Path
c) Zero Slack Track
d) Network Dependency Diagram
Answer: b
Explanation:
The Critical Path in a project has zero slack, and any delays on tasks on the critical path will
delay the end date of the project.
60.If Earned Value (EV) is $550, Actual Cost (AC) is $650, and Planned Value (PV) is $600,
what is the Cost Variance (CV)?
a) -100
b) +50
c) -50
d) +100
Answer: a
Explanation: Apply the formula CV = EV –AC to get the answer. Note that although PV is
provided, it is not used in solving this problem.
Explanation: Risk management involves anticipating risks that might affect the project schedule
or the quality of the software being developed, and then taking action to avoid these risks.
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
64. The process each manager follows during the life of a project is known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
65.A horizontal bar chart that shows project tasks against a calendar is called
a) milestone
b) goal
c) Gantt chart
d) PERT chart
Answer : (c) Gantt chart
66. _______ is the method of recording and displaying the way in which targets have
changed throughout the duration of the project.
a) Gantt chart.
b) Bar chart.
c) Timeline.
d) Schedule.
ANSWER: c
67. Which of the following represents the estimated value of the work actually
accomplished?
Answer : a
Answer : c
69. Check points of a project plan must be _____.
a) regular.
b) irregular.
c) random
d) fixed.
Answer: a
70. Gantt charts, Slip chars and Ball charts are under ___________ process.
a) monitoring.
b) verification.
c) control.
d) visualization.
Answer: d
71. _______ is the method of recording and displaying the way in which targets have
changed throughout the duration of the project.
a) Gantt chart.
b) Bar chart.
c) Timeline.
d) Schedule.
Answer: c
72. The priorities we might apply in deciding levels in monitoring is called as ______.
a) Deciding monitoring.
b) monitoring.
c) tracking.
d) prioritized monitoring.
Answer: d
73. Which of the following categories is part of the output of software process?
a) computer programs
c) data
a) Baselines
b) Source code
c) Data model
Answer: a
75. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
a) Change control
b) Version control
c) SCIs
Answer: b
Answer: D
78. Which contract type places the most risk on the seller?
a) Cost plus percentage fee
b) Cost plus incentive fee
c) Cost plus fixed fee
d) Fixed price plus incentive fee
e) Firm fixed price
Answer: e
79. From a contract management perspective, the project manager must consider the:
a) acquisition process
b) contract administration
c) ecological environment
d) offer, acceptance, and consideration
e) a and b
Answer: e
80. You have been asked to assist the contract manager in drafting the contract for a large project
with limited scope clarity. Which type of contract would you suggest so that your organization
does not incur any financial losses?
a)Time and material
b) Fixed price
c) Cost plus fixed fee
d) Cost plus incentive fee
Answer: c
Explanation: In a cost plus fixed fee project, the seller can exercise control over the cost
rather than getting locked into a rate or a price. In a project with limited scope clarity, incentives
are hard to define and agree.
SOFTWARE PROJECT MANAGEMENT MCQ
1. The effective software project management focuses on four P’s – People, Process, Product, and Project.
(True / False)
Ans. True
2. People Management Capability Maturity Model (PM-CMM) has been developed by ____.
Ans. Software Engineering Institute (SEI)
3. ____ must plan, motivate, organize and control the practitioners who do software work.
a) Project Managers
b) Senior Managers
c) Customers
d) End Users
Ans. a
5. Wheelwright and Clark define a continuum of organizational structures between two extremes, ____
organizations and ____ organizations.
Ans. Functional, Project
6. The realistic percentage for striving to work in Software Project Development is ____.
a) 40%
b) 80%
c) 50%
d) 100%
Ans. b
7. In flat structured organizations, work is more flexible and the employee does whatever is needed. (True / False)
Ans. True
8. In ____ organizations, work is organized into small workgroups and integrated regionally and nationally/globally.
Ans. Matrix
9. ____ organizations take the networked structure one step further by combining IT with traditional components to
form new types of components.
a) Hierarchical
b) Flat
c) T-form (Technology-based)
d) Matrix
Ans. C
10. Team Leader is responsible for all aspects of the project. (True / False)
Ans. True
11. ____ manage hardware/software requirements for development, testing, validation, and production
environments.
Ans. Logistics
1
12. ____ define testing procedures and certification process.
a) Software Support
b) Software Development
c) Software Management
d) Software Testing
Ans. d
13. Project Management is the application of knowledge, skills, tools and techniques to project activities to meet the
project requirements. (True /False)
Ans. True
14. Interoperability has become a key characteristic of many systems. (True/ False)
Ans. True
17. Project implementation is the first stage in project development. (True / False)
Ans. False
18. The ____ stage determines the nature and scope of the development.
Ans. Initiation
19. Testing and Module Integration strategies are addressed in ____ phase.
a) Initiation
b) Implementation
c) Planning and Design
d) Maintenance
Ans. C
21. The purpose of a ____ is to detail the work requirements for projects and programs that have deliverables and/or
services performed.
Ans. Statement of Work (SoW)
24. The three most important factors that influence project management are ____, ____and _____.
Ans. Time, Cost, Scope
27. The "spiral model", documented in 1970 by Royce was the first publicly documented life cycle model. (True /
False)
Ans. False
28. Most life cycle models can be derived as special cases of the ____.
Ans. Spiral model
29. ____ is the least flexible and most obsolete of the life cycle models.
a) Spiral model
b) Waterfall model
c) Throwaway prototyping model
d) Iterative / incremental development model
Ans. b) Waterfall model
31. Project scope, pros and cons are discussed in the initiation phase. (True/ False)
Ans. True
32. A semiformal way of breaking down the goal is called the ____.
Ans. Work Breakdown Structure (WBS)
33. Two general notations used for scheduling are ____ charts and ____ charts.
Ans. PERT, Gantt
34. The purpose of planning a project is to identify the sequence of activities as per their complexities and
dependencies. (True / False)
Ans. True
36. In ____ mode the project is characterized by tight, stringent constraints and interface requirements.
a) Organic
b) Embedded
c) Semidetached
d) None of the above
Ans. b) Embedded
3
37. Budgeting in a business sense is the planned allocation of available funds to each department within a company.
(True / False)
Ans. True
39. ____ is a standard method for the financial appraisal of long-term projects.
Ans. Net Present Value (NPV)
40. Cost in a project includes software, hardware and human resources. (True / False)
Ans. True
41. A schedule provides the idea about the start and finishes dates of key activities or terminal elements of the
project. (True / False)
Ans. True
44. Booz Allen Hamilton, Inc. has developed a Gantt chart. (True / False)
Ans. False
46. Accelerating the project schedule is often termed as ____ of the schedule. (Pick right option)
a) Breaking
b) Crashing
c) Speeding
d) None of the above
Ans. b) Crashing
51. Risk the combination of both the possibility of occurrence of adverse event and the impact of such bad event.
(True / False)
Ans. True
52. When there are disagreements between the project lead and overall project manager, the same can be resolved
through ____.
Ans. Change control board
53. A ____ is a discrepancy between how a requirement was mentioned and how the same requirement is
implemented. (Pick right option)
a) Defect
b) Change
c) Risk
d) None of the above
Ans. a) Defect
54. Tom DeMarco stated, “You can’t control what you can't measure”. (True / False)
Ans. True
55. ____ is the statistics gathered over the course of the execution of the project.
Ans. Software Metric
56. _____ is a software package used for preparing earned value analysis. (Pick right option)
a) MS Project
b) Primavera
c) Lotus Notes
d) None of the above
Ans. b) Primavera
57. Status meetings and status reporting are required for a medium-size project. (True / False)
Ans. True
58. ____ is a set of practices originally developed by Motorola to systematically improve processes by eliminating
defects.
Ans. Six Sigma
59. Six Sigma is a registered service mark and trademark of ____. (Pick right option)
a) Microsoft
b) Sun Microsystems
c) Motorola
d) None of the above
Ans. c) Motorola
60. ____ involves activities like typical strategies, processes, techniques, and tools involved in containing the
adverse impacts of risks on the software project.
Ans. Software risk management
5
61. Software Configuration Management (SCM) is an umbrella activity that is applied throughout the software
process. (True / False)
Ans. True
62. A ____ becomes the basis to further elaboration of Project plan and the Software Requirement specification as
the project progresses.
Ans. Scope and Vision document
63. A ____ has a name, attributes, and is "connected" to other objects by relationships.
Ans. Configuration Object
64. Software configuration management is not an element of software quality assurance. (True / False)
Ans. False
65. Two types of objects that can be identified in configuration management are ____ and _____.
Ans. Base Objects, Aggregate Objects
66. ____ combines procedures and tools to manage different versions of configuration objects that are created
during the software process.
Ans. Version Control
67. For a large software engineering project, uncontrolled change rapidly leads to chaos. (True / False)
Ans. True
68. The results of the evaluation are presented as a change report, which is used by a ____.
Ans. Change Control Authority
69. ____ helps to eliminate the problems by improving communication among all people involved.
Ans. Status Reporting
70. ____ can take place at any time during the project, though the sooner the better. (Pick right option)
a) Risk assessment b) Risk management planning
c) Risk resolution d) Risk prioritization
Ans. a) Risk assessment
71. Project risks are those risks that could result in project slippage, budget constraints related issues, and resource
and customer requirement related issues. (True / False)
Ans. True
72. ____ threaten the applicability of the software product being built.
Ans. Business risk
73. ACAT stands for ____. Ans. Avoid, Control, Accept or Transfer
74. The risk associated with the degree of uncertainty that the project schedule will be maintained and that the
product will be delivered on time is a schedule risk. (True / False)
Ans. True
75. The risk associated with the degree of uncertainty that the resulting software will be easy to correct, adapt and
enhance is a ____.
Ans. Support risk
6
(MCQs) Question Bank on “Software Project Management”.
Answer: d
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the
project schedule or the quality of the software being developed, and then taking
action to avoid these risks.
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
4. The process each manager follows during the life of a project is known as
a) Project Management
Answer: c
a) very low
b) low
c) moderate
d) high
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low
(10–25%), moderate (25–50%), high (50–75%), or very high (>75%).
6. Which of the following is an important factor that can affect the accuracy and
efficacy of estimates?
a) Project size
b) Planning process
c) Project complexity
Answer: a
a) Planning process
b) Software scope
c) External hardware
d) Project complexity
Answer: b
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software qualities and
describe how these are to be assessed
a) Threats
b) Vulnerabilities
c) Consequences
Answer: d
a) Risk assessment
b) Risk generation
c) Risk control
11. What is the product of the probability of incurring a loss due to the risk and the
potential magnitude of that loss?
a) Risk exposure
b) Risk prioritization
c) Risk analysis
Answer: a
Explanation: None.
12. What threatens the quality and timeliness of the software to be produced?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks
Answer: d
b) Business risks
c) Project risks
d) Technical risks
Answer: b
advertisement
Answer: c
15. Which of the following is a systematic attempt to specify threats to the project
plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection
Answer: d
Explanation: By identifying known and predictable risks, the project manager takes
a first step toward avoiding them when possible and controlling them when
necessary.
16. Which risks are associated with the overall size of the software to be built or
modified?
Answer: c
Explanation: None.
17. Which risks are associated with constraints imposed by management or the
marketplace?
Answer: a
Explanation: None.
18. Which of the following term is best defined by the statement:”the degree of
uncertainty that the product will meet its requirements and be fit for its intended
use.”?
a) Performance risk
b) Cost risk
c) Support risk
d) Schedule risk
a) Transfer
b) Mitigation
c) Acceptance
d) Avoidance
Answer: a
Explanation:
20. A project manager is managing a pilot project of a short duration and has
started the risk management planning process. He has identified new risks and
prioritized them based on the probability and impact matrix. The project manager
now proceeds to plan responses for the risks without analyzing the risks
numerically. According to you, this decision of project manager is:
b) Correct, as quantitative risk analysis is a waste of time and not required if risks
are already assessed qualitatively
d) Correct, as this is a short project and project manager might skip quantitative
risk analysis if he feels it is not assisting in the risk management process
Answer: d
Explanation:
The amount of rigor in the analysis is dependent upon the duration and complexity
of the project. For a project with a short duration, it may not be necessary to
perform numeric (quantitative) risk analysis.
21. Which of the following is/are main parameters that you should use when
computing the costs of a software development project?
Answer: d
22. Which of the following is incorrect activity for the configuration management
of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
24. An independent relationship must exist between the attribute that can be
measured and the external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the
value of the attribute than can be measured.
This set of Software Engineering Multiple Choice Questions & Answers (MCQs)
focuses on “Project Planning”.
a) JAD
b) CLASS
c) FAST
Answer: c
Explanation: Facilitated application specification techniques
and developers who work together to identify the problem, propose elements
requirements.
Answer: a
Explanation: The conveyor line sorting system (CLSS) sorts boxes moving along a
conveyor line. Each box is identified by a barcode that contains a part number and
is sorted into one of six bins at the end of the line.
27. The project planner examines the statement of scope and extracts all important
software functions which is known as
a) Association
b) Decomposition
c) Planning process
Explanation: None
a) CLSS
b) SEE
c) FAST
d) CBSE
Answer: b
29. Which of the following is not an option to achieve reliable cost and effort
estimate?
b) Use one or more empirical models for software cost and effort estimation
d) The ability to translate the size estimate into human effort, calendar time, and
dollars
Answer: d
Explanation: None.
30. What can be used to complement decomposition techniques and offer a
potentially valuable estimation approach in their own right?
c) Decomposition techniques
Answer: b
Answer: d
32. Software project estimation can never be an exact science, but a combination of
good historical data and systematic techniques can improve estimation accuracy.
a) True
b) False
Answer: a
Explanation: None.
33. Which of the following are parameters involved in computing the total cost of a
software development project?
b) Effort costs
Answer: d
34. Which of the following costs is not part of the total effort cost?
Answer: c
a) Function-related metrics
b) Product-related metrics
c) Size-related metrics
Answer: a
36. A _________ is developed using historical cost information that relates some
software metric to the project cost.
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer: a
Explanation: The model uses a basic regression formula with parameters that are
derived from historical project data and current as well as future project
characteristics.
37. It is often difficult to estimate size at an early stage in a project when only a
specification is available
a) True
b) False
Answer: a
advertisement
38. Which technique is applicable when other projects in the same analogy
application domain have been completed?
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer: c
39. Which model assumes that systems are created from reusable components,
scripting or database programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
40. Which of the following states that work expands to fill the time available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
Answer: c
a) Project Sponsor
b) Senior Management
c) Project Manager
d) Project Stakeholder
Answer : a
Explanation: Project Sponsor is typically responsible for Project charter
b)Temporary
d)Interrelated activities
Answer: A
Answer: C
44. A project manager is validating the scope. Which Process Group is the project
manager working in?
a) Planning
c) Initiating
d) Closing
Answer: b
Monitoring and Controlling During project closure the project manager reviews the
acceptance documentation from scope validation to ensure that all project
requirements are completed.
a)Project manager
b)Functional manager
c)Team members
d) Stakeholders
Answer is: a
The project manager is in control of the project throughout the project life cycle.
46. The high level project schedule constraints have been determined. Which
Process Group is the project in?
a)Planning
b)Closing
c)Monitoring and Controlling
d)Initiating
Answer: d
The high level constraints of schedule and budget are determined during the
Initiating Process Group. The detailed planning is done during the Planning
Process Group.
47. Which of the following is not true about project life cycle?
d) Cost and staffing levels are low at the start, peak as the work is carried out, and
Answer: b
48. Which of the following Process Groups should be included in all the projects?
Answer: a
In every project, all five Process Groups must be included but the level of attention
given to each Process Group will be governed by the project manager depending
on the project size and complexity.
a)Functional
b) Projectized
c) Strong Matrix
d) Weak Matrix
Answer: a
b) Temporary
Answer:a
51. How is a project life cycle different from product life cycle?
b) A project life cycle depends on the control needs of the performing organization
Answer: b
Explanation:
A project life cycle depends on the control needs of the performing organization.
Choice C is just the opposite, i.e., a product life cycle can include many projects
through its life cycle, not the other way around.
52 With respect to change, which of the following is the most important for a
project manager to focus on?
b) Marginal Analysis
Answer. D
Explanation:
54. What makes Project Integration Management unique among the other ten
knowledge areas?
a)It is the only knowledge area with processes in each of the project process groups
(Initiating, Planning, Execution and Monitoring and Controlling).
c) Integration Management is the only knowledge area that can be completed in the
Planning phase.
d) When closing integration planning, it is not necessary to have sign-off as it only
delivers subsidiary plans.
Explanation:
Project integration manage has processes within each project process group and
ensures that the entire project is planned, executed and managed effectively.
55). What is the most important thing that a project manager should ensure during
the Validate Scope process?
a) Accuracy
b) Timeliness
c) Acceptance
d) Completeness
Ans: C
56. The WBS for your project has been prepared and distributed to the project team
members. When execution begins, which document will provide the detailed
descriptions of the WBS elements?
a) Scope Statement
Answer: C
Explanation:
The WBS dictionary provides detailed descriptions about the deliverables listed in
the WBS.
57. Which of the following is not true regarding subdividing the work in the
WBS?
Answer : b
Explanation:
Answer: B
Explanation: Float is calculated by subtracting either the Early Finish (EF) from
the Late Finish (LF) or the Early Start (ES) from the Late Start (LS). Float for
an activity = LS-ES or LF-EF.
59. A sequence of tasks within a project schedule that has zero slack is called
________.
a) Critical Chain
b) Critical Path
Answer: b
Explanation:
The Critical Path in a project has zero slack, and any delays on tasks on the critical
path will delay the end date of the project.
60.If Earned Value (EV) is $550, Actual Cost (AC) is $650, and Planned Value
(PV) is $600, what is the Cost Variance (CV)?
a) -100
b) +50
c) -50
d) +100
Answer: a
Explanation: Apply the formula CV = EV –AC to get the answer. Note that
although PV is provided, it is not used in solving this problem.
Answer: d
Explanation: Projects need to be managed because professional software
engineering is always subject to organizational budget and schedule constraints.
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
Answer: b
Explanation: Risk management involves anticipating risks that might affect the
project schedule or the quality of the software being developed, and then taking
action to avoid these risks.
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
4. The process each manager follows during the life of a project is known as
a) Project Management
Answer: c
5. A horizontal bar chart that shows project tasks against a calendar is called
a) milestone
b) goal
c) Gantt chart
d) PERT chart
a) Gantt chart.
b) Bar chart.
c) Timeline.
d) Schedule.
ANSWER: c
7. Which of the following represents the estimated value of the work actually
accomplished?
Answer : a
b) Planning control
c) Ishikawa diagrams
d) Integrating the project components into a whole
Answer: a
c) data
Answer: d
a) Baselines
b) Source code
c) Data model
Answer: a
a) Change control
b) Version control
c) SCIs
Answer: b
a. Identify change
b. Control change
c. Ensure that change is being properly implemented
d. All of the above
ANSWER: All of the above
Answer: D
19. Which contract type places the most risk on the seller?
a) Cost plus percentage fee
b) Cost plus incentive fee
c) Cost plus fixed fee
d) Fixed price plus incentive fee
e) Firm fixed price
Answer: e
20. From a contract management perspective, the project manager must consider
the:
a) acquisition process
b) contract administration
c) ecological environment
d) offer, acceptance, and consideration
e) a and b
Answer: e
Software Engineering Questions and Answers – Risk
Management
« Prev Next »
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Risk Management”.
a) Client
b) Investor
c) Production team
d) Project manager
View Answer
Answer: d
Explanation: Risk management involves anticipating risks that might affect the project schedule or the
quality of the software being developed, and then taking action to avoid these risks.
advertisement
2. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk
b) Project risk
c) Business risk
d) Programming risk
View Answer
Answer: a
Explanation: Risks that affect the quality or performance of the software being developed.
3. Which of the following term is best defined by the statement: “There will be a change of organizational
management with different priorities.”?
a) Staff turnover
b) Technology change
c) Management change
d) Product competition
View Answer
Answer: c
Explanation: None.
advertisement
4. Which of the following term is best defined by the statement: “The underlying technology on which the
system is built is superseded by new technology.”?
a) Technology change
b) Product competition
c) Requirements change
View Answer
Answer: a
Explanation: Technology changes are common in the competitive environment of software engineering.
5. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
a) Risk monitoring
b) Risk planning
c) Risk analysis
d) Risk identification
View Answer
Answer: a
Explanation: None.
advertisement
6. Which of the following risks are derived from the organizational environment where the software is being
developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks
View Answer
Answer: d
7. Which of the following risks are derived from the software or hardware technologies that are used to
develop the system?
a) Managerial risks
b) Technology risks
c) Estimation risks
d) Organizational risks
View Answer
Answer: b
Explanation: The risks associated with technology might affect the product development.
advertisement
8. Which of the following term is best defined by the statement: “Derive traceability information to maximize
information hiding in the design.”?
b) Organizational restructuring
c) Requirements changes
View Answer
Answer: c
9. Which of the following strategies means that the impact of the risk will be reduced?
a) Avoidance strategies
b) Minimization strategies
c) Contingency plans
View Answer
Answer: b
Explanation: None.
advertisement
10. Risk management is now recognized as one of the most important project management tasks.
a) True
b) False
View Answer
Answer: a
Explanation: None.
To practice all areas of Software Engineering, here is complete set of 1000+ Multiple Choice Questions and
Answers on Software Engineering.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks
below and stay updated with latest contests, videos, internships and jobs!
« Prev - Software Engineering Questions and Answers – Software Risks and Identification
» Next - Software Engineering Questions and Answers – Decomposition Techniques in Software Project
Planning
advertisement
Recommended Posts:
1. Mechanical Engineering Questions and Answers
2. Aeronautical Engineering Questions and Answers
3. Information Technology Questions and Answers
4. Mechatronics Engineering Questions and Answers
5. Railway Engineering MCQ (Multiple Choice Questions)
6. Cloud Computing MCQ (Multiple Choice Questions)
7. Embedded System MCQ (Multiple Choice Questions)
8. Basic Civil Engineering MCQ (Multiple Choice Questions)
9. Protein Engineering MCQ (Multiple Choice Questions)
10. C# Programming Examples on Data Structures
11. Best Reference Books – Technology, Engineering and Sciences
12. Civil Engineering Questions and Answers
13. Cognitive Radio MCQ (Multiple Choice Questions)
14. Database Management System MCQ (Multiple Choice Questions)
15. Highway Engineering MCQ (Multiple Choice Questions)
16. Energy & Environment Management MCQ (Multiple Choice Questions)
17. Total Quality Management MCQ (Multiple Choice Questions)
18. Hazardous Waste Management MCQ (Multiple Choice Questions)
19. Software Architecture & Design MCQ (Multiple Choice Questions)
20. Software Engineering MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is
Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He
lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel,
Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C
Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI
& Fiber Channel. Stay connected with him @
LinkedIn | Youtube | Instagram | Facebook |
Twitter
Name*
Email*
Subscribe
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Project
Management”.
View Answer
Answer: d
Explanation: Projects need to be managed because professional software engineering is always subject to
organizational budget and schedule constraints.
advertisement
2. Project managers have to assess the risks that may affect a project.
a) True
b) False
View Answer
Answer: b
Explanation: Risk management involves anticipating risks that might affect the project schedule or the
quality of the software being developed, and then taking action to avoid these risks.
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
View Answer
Answer: c
advertisement
4. The process each manager follows during the life of a project is known as
a) Project Management
View Answer
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly implement and manage projects
successfully.
a) very low
b) low
c) moderate
d) high
View Answer
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%), low (10–25%), moderate (25–
50%), high (50–75%), or very high (>75%).
advertisement
6. Which of the following is/are main parameters that you should use when computing the costs of a software
development project?
View Answer
Answer: d
Explanation: Estimation involves working out how much effort is required to complete each activity and,
from this, calculating the total cost of activities.
a) team
b) project
c) customers
d) project manager
View Answer
Answer: b
Explanation: The quality plan should set out the desired software qualities and describe how these are to be
assessed.
advertisement
8. Which of the following is incorrect activity for the configuration management of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
View Answer
Answer: a
Explanation: Configuration management policies and processes define how to record and process proposed
system changes, how to decide what system components to change, how to manage different versions of
the system and its components, and how to distribute changes to customers.
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
View Answer
Answer: b
Explanation: The current process is assessed, and process weaknesses and bottlenecks are identified.
advertisement
10. An independent relationship must exist between the attribute that can be measured and the external
quality attribute.
a) True
b) False
View Answer
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to the value of the attribute
than can be measured.
To practice all areas of Software Engineering, here is complete set of 1000+ Multiple Choice Questions and
Answers on Software Engineering.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks
below and stay updated with latest contests, videos, internships and jobs!
« Prev - Software Engineering Questions and Answers – Metrics for Quality Control
» Next - Software Engineering Questions and Answers – Project Planning
advertisement
Recommended Posts:
1. Basic Civil Engineering MCQ (Multiple Choice Questions)
2. Mechatronics Engineering Questions and Answers
3. Civil Engineering Questions and Answers
4. Cloud Computing MCQ (Multiple Choice Questions)
5. Embedded System MCQ (Multiple Choice Questions)
6. Engineering Metrology MCQ (Multiple Choice Questions)
7. Pulp & Paper Engineering MCQ (Multiple Choice Questions)
8. Electronics & Communication Engineering Questions and Answers
9. Environmental Engineering MCQ (Multiple Choice Questions)
10. Aeronautical Engineering Questions and Answers
11. Mechanical Engineering Questions and Answers
12. Database Management System MCQ (Multiple Choice Questions)
13. Energy & Environment Management MCQ (Multiple Choice Questions)
14. Dairy Engineering MCQ (Multiple Choice Questions)
15. Highway Engineering MCQ (Multiple Choice Questions)
16. Statistical Quality Control MCQ (Multiple Choice Questions)
17. Total Quality Management MCQ (Multiple Choice Questions)
18. Hazardous Waste Management MCQ (Multiple Choice Questions)
19. Software Architecture & Design MCQ (Multiple Choice Questions)
20. Software Engineering MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and
CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about
competency developments in these areas. He lives in Bangalore and delivers focused
training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers,
Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies,
SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him
@
LinkedIn | Youtube | Instagram | Facebook | Twitter
Name*
Email*
Subscribe
Exams
Software project management is dedicated to the planning, scheduling,
(https://www.deepcrazy
resource allocation, execution, tracking, and delivery of software and web
world.com/unit-5-
We useprojects.
cookies on our website to give you the most relevant experience by remembering your preferences and repeat
software-engineering-
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
mcq-questions-for-
increasing pace of business and iterate based on customer and stakeholder (https://www.deepcrazy
feedback. world.com/unit-4-
software-engineering-
mcq-questions-for-
aktu-exams/)
July 27,
Software project management MCQ | SPM
2021
MCQ
Unit 3 Software
Engineering MCQ
Question 1: Project has uncertainties on some functionalities at the beginning Questions for AKTU
which will improve over time. Which software development model is suitable?
Exams
Select one:
(https://www.deepcrazy
world.com/unit-3-
a. None of the above
software-engineering-
b. Waterfall
mcq-questions-for-
c. Iterative
aktu-exams/)
July 27,
d. Incremental
2021
d. Estimation mcq-questions-for-
aktu-exam-2021/)
July
Answer: Estimation 24, 2021
Unit 1 Software
Question 3: This term is least critical from customer view point
Engineering MCQ
a. UAT
a. Activity Diagram
How to Fill Invalid
b. CPM
Activity Appeal For
Google AdSense 2021
c. Timesheet
(https://www.deepcrazy
d. Gantt chart
world.com/how-to-fill-
invalid-activity-appeal-
We useAnswer:
cookiesTimesheet
on our website to give you the most relevant experience by remembering your preferences and repeat
for-google-adsense/)
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
July 21, 2021
Digital Communication
MCQ (Signals and
Spectra) UNIT-1
(https://www.deepcrazy
world.com/digital-
communication-mcq-
Question 5: There are __ types of Work Breakdown Structures. multiple-choice-
questions/)
July 4, 2021
a. Four
Renewable Energy
b. Three
MCQ (Geothermal
c. none
Energy) Unit – 6
d. Two
(https://www.deepcrazy
world.com/renewable-
Answer: Two
energy-mcq-
geothermal-energy-
Question 6: If Task A to complete, it takes 10 days of human effort. It started 5
unit-6/)
July 4, 2021
days earlier to the scheduled date and completed on 35th day. Then, the float
value
a. 25
b. 10
c. 20
d. 15
Archives
b. Predicting software schedules.
July 2021
d. Predicting staffing levels.
(https://www.deepcrazy
world.com/2021/07/)
Answer: Predicting clients demands.
June 2021
Question 8: The Mangers use the acronym SMART while goal setting. What (https://www.deepcrazy
does SMART stand for?
world.com/2021/06/)
May 2021
b. specific, measurable, achievable, relevant, timely
(https://www.deepcrazy
c. suitable, measurable, actionable, reviewed, timely
world.com/2021/05/)
d. standardised, measurable, actionable, resourced, timely
We use cookies on our website to give you the most relevant experience by remembering your preferences
April 2021 and repeat
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
(https://www.deepcrazy
Answer: specific, measurable, achievable, relevant, timely
world.com/2021/04/)
Cookie settings ACCEPT
Question 9 Which of these is NOT true for a matrix organizational structure?
February 2021
a. It follows the unity of command principle rigorously
(https://www.deepcrazy
b. Task and personality conflicts are a disadvantage of Matrix structure
world.com/2021/02/)
c. Individual operators have to do double reporting both to a Project Manager
January 2021
and to the Functional manager
(https://www.deepcrazy
d. It is generally employed in project driven organizations
world.com/2021/01/)
November 2020
1)Test
(https://www.deepcrazy
2)Design
world.com/2020/11/)
3)Install
October 2020
4)Specification
(https://www.deepcrazy
5)Manufacture
world.com/2020/10/)
6)Maintain Select one:
September 2020
a. 4, 2, 5, 1, 3, 6
(https://www.deepcrazy
b. 2, 4, 5, 1, 3, 6
world.com/2020/09/)
c. 4, 2, 5, 1, 6, 3
August 2020
d. 2, 4, 5, 1, 6, 3
(https://www.deepcrazy
world.com/2020/08/)
Answer: 4, 2, 5, 1, 3, 6
July 2020
Question 11: Project management (PM) is the application of _____ to meet (https://www.deepcrazy
project requirements. world.com/2020/07/)
June 2020
a. skills, tools and techniques
(https://www.deepcrazy
b. knowledge, skills, tools and techniques
world.com/2020/06/)
c. knowledge, tools and techniques
March 2020
Question 12: A __ is the sequence of processing steps that completely handles
(https://www.deepcrazy
one business transaction or customer request
world.com/2020/03/)
d. Mock-up
January 2020
(https://www.deepcrazy
Answer: Workflow
world.com/2020/01/)
Question 13: __ model is not suitable for accommodating any change December 2019
(https://www.deepcrazy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
a. Waterfall Model
world.com/2019/12/)
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
b. Prototyping Model
November 2019
Cookiec.settings ACCEPT
Build & Fix Model
(https://www.deepcrazy
d. RAD Model
Answer: Waterfall Model world.com/2019/11/)
October 2019
Question 14: Smith is a project manager for ABC Video games. He has
(https://www.deepcrazy
produced a project network diagram and has updated the activity list. Which
world.com/2019/10/)
process have he just finished?
September 2019
a. The Activity Sequencing process, which identifies all the activities (https://www.deepcrazy
dependences
world.com/2019/09/)
b. The Activity Sequencing process, which identifies all the specific activities of
August 2019
the project
(https://www.deepcrazy
c. The activity duration Estimating process, which identifies all the dependent world.com/2019/08/)
activities of the project
Answer: The Activity Sequencing process, which identifies all the specific
activities of the project
Question 15: Which of the following costs is not part of the total effort cost? Follow Us
b. Costs of lunch time food
b. Version management
deTec m/tec
c. Release management
d. System building
hnic? hnicd
a. Project management
b. Organization
c. Motivation
(https:
d. Problem solving
//www (https:
Answer: Project management
.insta //in.pi
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
a. Changes are managed poorly.
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
b. Deadlines are unrealistic
gram. nteres
Cookiec.settings ACCEPT
The product scope is poorly define
d. All of the given options. com/t t.com/
Answer: All of the given options.
echni techni
Question 19: If a software production gets behind schedule, one can add more
programmers and catch up.
c_dud cdude
a. True
b. False
e26/) 026/)
Answer: False
Question 20 The project life cycle consists of
(https:
a. Objectives of the project
//www
c. Formulation and planning various activities
a. Analogy
b. Function Point
c. WBS
b. project team
c. sales team
d. customer
We usea.cookies
Big Bang
onmodel
themes
our website to give you the most relevant experience by remembering your for 2020and
preferences – repeat
visits. By clicking “Accept”,
b. Spiral model
you consent to the use of ALL the cookies. Responsive Themes
(https://www.deepcrazy
c. V-model
a. Outlier analysis
b. prediction
a. Hide bad news from the project team members until things improve.
b. Give team members more control over process and technical decisions.
c. Give team members less control over process and technical decisions.
Answer: Give team members more control over process and technical
How to Make a
decisions.
Wallpaper App with
pixel in Android Studio
Question 29 Select from the following which is not project management goal
(https://www.deepcrazy
world.com/how-to-
a. Delivering the software to the customer at the agreed time.
make-a-wallpaper-app-
b. Keeping overall costs within budget.
with-pixel-in-android-
c. Maintaining a happy and well-functioning development team.
studio/)
d. Avoiding costumer complaints. (DeepCrazyWorld)
(1,456)
We useAnswer:
cookiesAvoiding
on our website
costumerto complaints.
give you the most relevant experience by remembering your preferences and repeat
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
a. Prototyping
b. Spiral
c. Agile
d. Waterfall
Answer: Waterfall
C) providing redundancy
D) A and C
E) A, B, and C
Answer : A and C
Answer: d
34. Project managers have to assess the risks that may affect a project.
We use cookies
a) True
on our website to give you the most relevant experience by remembering your preferences and repeat
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
b) False
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer: c
36. The process each manager follows during the life of a project is known as
a) Project Management
Answer: c
a) very low
b) low
c) moderate
d) high
Answer: d
Explanation: The probability of the risk might be assessed as very low (<10%),
low (10–25%), moderate (25–50%), high (50–75%), or very high (>75%).
38. Which of the following is/are main parameters that you should use when
computing the costs of a software development project?
Answer: d
a) team
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
b) project
c) customers
Explanation: The quality plan should set out the desired software qualities and
describe how these are to be assessed.
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
42. An independent relationship must exist between the attribute that can be
measured and the external quality attribute.
a) True
b) False
Answer: b
Explanation: The value of the quality attribute must be related, in some way, to
the value of the attribute than can be measured.
According to Forbes, there are eight ways to improve and streamline the
software project management process.
Taking non-development work off your team’s plate to let them focus on
the product
Motivating your team by sharing others’ success stories
Avoiding any changes to tasks once assigned
Trying to stick to the plan (until it needs to be changed)
Encouraging organization by being organized yourself
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
Streamlining productivity through effective delegation
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Getting to know your team and building a rapport
Cookie settings ACCEPT
Breaking down the plan and assigning specific daily tasks
Digital Image Processing MCQ | Basics Of Image Sampling & Quantization
(https://www.deepcrazyworld.com/digital-image-processing-multiple-choice-
questions-answers/)
READ MORE…
(https://www.deepcrazyworld.com/high-
performance-computing-mcq-questions-and-
answers/)
Technic Dude
YouTube
If you found this post useful, don’t forget to share this with your friends, and
if you have any query feel free to comment it in the comment section.
Post Views: 66
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
visits. By clickingSHARE
PLEASE “Accept”, you consent to the use of ALL the cookies.
THIS
m/shar are? ttps://w ts/sham/shar
Cookie settings ACCEPT
20%26 deepc .deep %28SPw.deep .deepw.deep www.d .deep w.deep
ct%20
q%2F) q%2F) on%2C +track %2F) q%2F) q%2F) %2F)
DeepCrazyWorld
(Https://Www.Deepcrazyworld.Com/Author/Deepcrazyworld/)
Hey, I'm Deepika a professional blogger, web designer, Android developer and
(https://ww software engineer. I like to gain every type of knowledge that's why i have done
w.deepcraz many courses in different fields like engineering and technology. I love thrills and
yworld.co travelling to new places and hills.
m/author/d
eepcrazyw
orld/)
5
Article Rating
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
visits. Byclicking “Accept”,
Subscribe you consent to the use of ALL the cookies.
0 COMMENTS
I have worked on many projects like Advance Android application printing website, and more , For
Creating Your Android App and website CONTACT ME !
DeepCrazyWorld
(https://www.deepcrazyworld.com/)
MOBILE APP DEVELOPMENT COMPANY
Company Business
Home(https://www.deepcrazyworld.com/) Projects(https://www.deepcrazyworld.com/category/projec
Blog(https://www.deepcrazyworld.com/blog/) AKTU(https://www.deepcrazyworld.com/category/aktu-
MCQ mcq/)
Contact (https://www.deepcrazyworld.com/contact-
US us/) Wordpress(https://www.deepcrazyworld.com/category/wo
Privacy
We use cookies (https://www.deepcrazyworld.com/privacy-
on our website Android
to give you the most relevant experience (https://www.deepcrazyworld.com/category/andro
by remembering your preferences and repeat
visits. By clicking “Accept”,
Policy you consent
policy-2/) to the use of ALL the cookies. Studio studio/)
[email protected](http://[email protected])
Instagram(https://www.instagram.com/technic_dude26/)
YouTube(https://www.youtube.com/c/TechnicDude)
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat
visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Size and Cost
Estimation of Software”.
1. Which of the following are parameters involved in computing the total cost of a software development
project?
b) Effort costs
View Answer
Answer: d
Explanation: All these are accounted for in estimating a software development cost.
advertisement
2. Which of the following costs is not part of the total effort cost?
View Answer
Answer: c
a) Function-related metrics
b) Product-related metrics
c) Size-related metrics
View Answer
Answer: a
Explanation: Productivity is expressed in terms of the amount of useful functionality produced in some given
time. Function points and object points
advertisement
4. A _________ is developed using historical cost information that relates some software metric to the project
cost.
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
View Answer
Answer: a
Explanation: The model uses a basic regression formula with parameters that are derived from historical
project data and current as well as future project characteristics.
5. It is often difficult to estimate size at an early stage in a project when only a specification is available
a) True
b) False
View Answer
Answer: a
Explanation: Function-point and object-point estimates are easier to produce than estimates of code size but
are often still inaccurate.
advertisement
6. Which technique is applicable when other projects in the same analogy application domain have been
completed?
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
View Answer
Answer: c
Explanation: The cost of a new project is estimated by analogy with these completed projects.
7. Which model assumes that systems are created from reusable components, scripting or database
programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
View Answer
Answer: a
advertisement
8. Which of the following states that work expands to fill the time available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
View Answer
Answer: c
Explanation: The cost is determined by available resources rather than by objective assessment. If the
software has to be delivered in 12 months and 5 people are available, the effort required is estimated to be
60 person-months.
9. Which model is used during early stages of the system design after the requirements have been established?
a) An application-composition model
b) A post-architecture model
c) A reuse model
View Answer
Answer: d
Explanation: Estimates are based on function points, which are then converted to number of lines of source
code. The formula follows the standard form discussed above with a simplified set of seven multipliers.
advertisement
10. Which model is used to compute the effort required to integrate reusable components or program code
that is automatically generated by design or program translation tools?
a) An application-composition model
b) A post-architecture model
c) A reuse model
View Answer
Answer: c
Explanation: None.
11. The COCOMO model takes into account different approaches to software development, reuse, etc.
a) True
b) False
View Answer
Answer: b
Explanation: Its the COCOMO-2 model. COCOMO 2 incorporates a range of sub-models that produce
increasingly detailed software estimates.
To practice all areas of Software Engineering, here is complete set of 1000+ Multiple Choice Questions and
Answers on Software Engineering.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks
below and stay updated with latest contests, videos, internships and jobs!
advertisement
Recommended Posts:
1. Genetic Engineering MCQ (Multiple Choice Questions)
2. Founder
3. Tissue Engineering MCQ (Multiple Choice Questions)
4. Environmental Engineering MCQ (Multiple Choice Questions)
5. Railway Engineering MCQ (Multiple Choice Questions)
6. Microwave Engineering MCQ (Multiple Choice Questions)
7. Cloud Computing MCQ (Multiple Choice Questions)
8. C# Programming Examples on Data Structures
9. Basic Civil Engineering MCQ (Multiple Choice Questions)
10. Fluidization Engineering MCQ (Multiple Choice Questions)
11. Mechatronics Engineering Questions and Answers
12. Civil Engineering Drawing MCQ (Multiple Choice Questions)
13. Protein Engineering MCQ (Multiple Choice Questions)
14. Traffic Engineering MCQ (Multiple Choice Questions)
15. Chemical Engineering Questions and Answers
16. Chemical Reaction Engineering MCQ (Multiple Choice Questions)
17. Civil Engineering Questions and Answers
18. Highway Engineering MCQ (Multiple Choice Questions)
19. Software Architecture & Design MCQ (Multiple Choice Questions)
20. Software Engineering MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and
CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about
competency developments in these areas. He lives in Bangalore and delivers focused
training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers,
Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies,
SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him
@
LinkedIn | Youtube | Instagram | Facebook | Twitter
Name*
Email*
Subscribe
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Project Planning”.
1. Which of the following is an important factor that can affect the accuracy and efficacy of estimates?
a) Project size
b) Planning process
c) Project complexity
View Answer
Answer: a
Explanation: As size increases, the interdependence among various elements of the software grows rapidly.
advertisement
a) Planning process
b) Software scope
c) External hardware
d) Project complexity
View Answer
Answer: b
Explanation: Functions described in the statement of scope are evaluated and in some cases refined to
provide more detail prior to the beginning of estimation.
a) JAD
b) CLASS
c) FAST
View Answer
Answer: c
and developers who work together to identify the problem, propose elements
requirements.
advertisement
View Answer
Answer: a
Explanation: The conveyor line sorting system (CLSS) sorts boxes moving along a conveyor line. Each box is
identified by a barcode that contains a part number and is sorted into one of six bins at the end of the line.
5. The project planner examines the statement of scope and extracts all important software functions which is
known as
a) Association
b) Decomposition
c) Planning process
View Answer
Answer: b
Explanation: None
advertisement
a) CLSS
b) SEE
c) FAST
d) CBSE
View Answer
Answer: b
7. Which of the following is not an option to achieve reliable cost and effort estimate?
b) Use one or more empirical models for software cost and effort estimation
c) Use relatively simple decomposition techniques to generate project cost and effort estimates
d) The ability to translate the size estimate into human effort, calendar time, and dollars
View Answer
Answer: d
Explanation: None.
advertisement
8. What can be used to complement decomposition techniques and offer a potentially valuable estimation
approach in their own right?
c) Decomposition techniques
View Answer
Answer: b
Explanation: An estimation model for computer software uses empirically derived formulas to predict effort
as a function of LOC or FP.
View Answer
Answer: d
advertisement
10. Software project estimation can never be an exact science, but a combination of good historical data and
systematic techniques can improve estimation accuracy.
a) True
b) False
View Answer
Answer: a
Explanation: None.
To practice all areas of Software Engineering, here is complete set of 1000+ Multiple Choice Questions and
Answers on Software Engineering.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks
below and stay updated with latest contests, videos, internships and jobs!
advertisement
Recommended Posts:
1. Probability and Statistics MCQ (Multiple Choice Questions)
2. Corrosion Engineering MCQ (Multiple Choice Questions)
3. Engineering Drawing MCQ (Multiple Choice Questions)
4. Genetic Engineering MCQ (Multiple Choice Questions)
5. Microwave Engineering MCQ (Multiple Choice Questions)
6. C# Programming Examples on Sorting
7. Visual Basic MCQ (Multiple Choice Questions)
8. Cognitive Radio MCQ (Multiple Choice Questions)
9. Irrigation Engineering MCQ (Multiple Choice Questions)
10. Mechatronics Engineering Questions and Answers
11. Protein Engineering MCQ (Multiple Choice Questions)
12. C Programming Examples on Searching and Sorting
13. Railway Engineering MCQ (Multiple Choice Questions)
14. C# Programming Examples on Data Structures
15. Basic Civil Engineering MCQ (Multiple Choice Questions)
16. Highway Engineering MCQ (Multiple Choice Questions)
17. Civil Engineering Drawing MCQ (Multiple Choice Questions)
18. Tissue Engineering MCQ (Multiple Choice Questions)
19. Software Architecture & Design MCQ (Multiple Choice Questions)
20. Software Engineering MCQ (Multiple Choice Questions)
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is
Linux Kernel Developer & SAN Architect and is passionate about competency
developments in these areas. He lives in Bangalore and delivers focused training sessions
to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux
Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI
Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @
LinkedIn | Youtube | Instagram | Facebook | Twitter
Name*
Email*
Subscribe
A. Consistency*
B. Correctness
C. Concurrency
D. None of these
2 A software project that meets all the given objectives is a success of _________.
B. Project quality
C. Project requirement
D. Project management*
A. people
B. product
C. process
D. popularity*
A. project design*
B. project management
C. project planning
D. project control
A. Analytical
B. Critical*
C. Empirical
E. Heuristic
A. Staff turnover*
B. Testing
C. Product competition
D. Specification delays
7. What is the process each manager follows during the life of a project is known as
A. Project Management
A. Project Management
B. sdlc*
A. customers
B. project manager
C. team
D. project*
10. What should be done by the project manager to ensure that all work in the project is
included?
c.Create a WBS*
11. What should a project manager do or follow to ensure clear boundaries for project
completion?
a.Scope verification
c.scope definition
d.Process Management in OS
12. Before requirements can be analyzed, modeled, or specified they must be gathered through
a/an_______
(a) Elicitation process*
(b) Interviewing
(c) Meeting
13. When you build a product or system, it’s important to go through a series of predictable
steps , the process which you follow to develop it is known as________
(a)Software design
(b)Software process*
(c)Software schedule
(d)Framework
14. Which of the following is not an adaptation criteria for software projects?
b) Customers Complaints*
c) Project staff
d) Mission criticality
a) project delay
c) project failure
16. Which of the following is the reason that software is delivered late?
17. Which of the following is an activity that distributes estimated effort across the planned
project duration by allocating the effort to specific software engineering tasks?
18. What evaluates the risk associated with the technology to be implemented as part of project
scope?
a) Concept scoping
19. Which of the following is not an adaptation criteria for software projects?
b) Customers Complaints*
c) Project staff
d) Mission criticality
20. What assess the risk and your plans for risk mitigation and revise these when you learn more
about the risk?
a) Risk monitoring*
b) Risk planning
c) Risk analysis
d) Risk identification
21. Which of the following risks are derived from the organizational environment where the
software is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks*
22. Which of the following risks are derived from the software or hardware technologies that
are used to develop the system?
a) Managerial risks
b) Technology risks*
c) Estimation risks
d) Organizational risks
23. Risk management is now recognized as one of the most important project management
tasks.
a) True*
b) False
24. If desired rate of return is minimum by actual rate of return then it is classified as
25. The present value of cash inflows is 50000 US $ and the present value of cash outflows is $
55000 then NPV is ____________
26. If desired rate of return is exceeded by actual rate of return then it is classified as
27. Which of the following is an important factor that can affect the accuracy and efficacy of
estimates?
a) Project size*
b) Planning process
c) Project complexity
a) Planning process
b) Software scope*
c) External hardware
d) Project complexity
a) Client
b) Investor
c) Production team
d) Project manager*
30. Which of the following risk is the failure of a purchased component to perform as expected?
a) Product risk*
b) Project risk
c) Business risk
d) Programming risk
31. What assess the risk and your plans for risk mitigation and revise these when you learn more
about the risk?
a) Risk monitoring*
b) Risk planning
c) Risk analysis
d) Risk identification
32. Which of the following risks are derived from the organizational environment where the
software is being developed?
a) People risks
b) Technology risks
c) Estimation risks
d) Organizational risks*
33. Which of the following risks are derived from the software or hardware technologies that
are used to develop the system?
a) Managerial risks
b) Technology risks*
c) Estimation risks
d) Organizational risks
a)programs
b) associated documentation
c) operating procedures
35. __ What threatens the quality and timeliness of the software to be produced?
a) Known risks
b) Business risks
c) Project risks
d) Technical risks*
b) Business risks*
c) Project risks
d) Technical risks
37. Which of the following is a systematic attempt to specify threats to the project plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection*
38. Which risks are associated with the overall size of the software to be built or modified?
39. Which of the following term is best defined by the statement:”the degree of uncertainty
that the product will meet its requirements and be fit for its intended use.”?
a) Performance risk*
b) Cost risk
c) Support risk
d) Schedule risk
a) Risk assessment
b) Risk generation*
c) Risk control
a) True
b) False*
a) Specification delays
b) Product competition
c) Testing*
d) Staff turnover
44. Which of the following is/are main parameters that you should use when computing the
costs of a software development project?
47. Risk managers have to assess the risks that may affect a project.
a) True *
b) False
a) Specification delays
b) Product competition
c) Delay in schedule
d) all of the mentioned*
a) team
b) project*
c) customers
d) project manager
50. Which of the following items should not be included in the software project management
plan?
d) nONE*
51. The effective software project management focuses on four P’s People, Process, Product
and Management True/ False
52. _____must plan, motivate, organize and control the practitioners who do software work
a) Project Managers*
b) Senior Managers
c) Customers
d) End users
53. Project management, is the application of knowledge, skills, tools, and techniques to project
activities to meet the project requirements
a. True*
b. False
54. Which is the first step in the software development life cycle ?
a) Analysis
b) Design
c) Problem/Opportunity Identification*
a) Sequential structure
b) A List
c) A plan
d) An Algorithm*
56. In the Analysis phase, the development of the ____________ occurs, which is a clear
statement of the goals and objectives of the project.
a) documentation
b) flowchart
c) program specification*
d) design
57. Actual programming of software code is done during the ____________ step in the SDLC.
b) Design
c) Analysis
58. ____________ is the process of translating a task into a series of commands that a computer
will use to perform that task.
a) Project design
b) Installation
c) Systems analysis
d) Programming*
a) Requirements
60. Which two models doesn’t allow defining requirements early in the cycle?
61. Which of the following life cycle model can be chosen if the development team has less
experience on similar projects?
a) Spiral*
b) Waterfall
c) RAD
62. If you were a lead developer of a software company and you are asked to submit a
project/product within a stipulated time-frame with no cost barriers, which model would you select?
a) Waterfall
b) Spiral
c) RAD*
d) Incremental
63. Which two of the following models will not be able to give the desired outcome if user’s
participation is not involved?
64. One can choose Waterfall Model if the project development schedule is tight.
a) True
b) False*
a) Feasibility study*
b) Planning
c) System analysis
d) SRS
66. Difference between total cost and total income over the life of the project.
a) Net profit*
b) Payback period
c) Return on investment(ROI)
67. Time taken to break even or pay back the initial investment
a) Net profit
b) Payback period*
c) Return on investment(ROI)
a) Net profit
b) Payback period
c) Return on investment(ROI)*
69. A project evaluation technique that takes into account the profitability of a project and the
timing of the cash flows that are produced
a) Net profit
b) Payback period
c) Return on investment(ROI)
70. ____________sum of all incoming and outgoing payments, discounted using an interest
rate, to a fixed point in time (the present)
a) Net profit
b) Payback period
c) Return on investment(ROI)
71. ____________is the discount rate that would produce an NPV of 0 for the project.
a) IRR*
e) Payback period
f) Return on investment(ROI)
72 Identifying and estimating all of the costs and benefits of carrying out the project and
operating the delivered application:
a) Cost-benefit analysis*
b) Feasibility analysis
c) Technical analysis
d) Business analysis
73. ________compares the sensitivity of each factor of project profiles by varying parameters
which affect the project cost benefits
a) Sensitivity analysis
b) Risk profiles*
c) Business analysis
d) None
74. Strategic Project Management is about forming clear links between your Projects and
Strategic Objectives
True*
False
75. It is important to review plan to review quality aspects of the project plan.
a) True*
b) False
76. Includes the salaries and other employment costs of the staff in the development project.
a) Development Cost*
b) Set up cost
c) Operational cost
d) None
77. Includes costs of any new hardware and ancillary equipment in the development project.
a) Development Cost
b) Set up cost*
c) Operational cost
d) None
78. Consist of the cost of operating the system Once it has been installed.
a) Development Cost
b) Set up cost
c) Operational cost*
d) None
b) Indirect benefits
c) Intangible benefits
d) None
a) Direct benefits
b) Indirect benefits*
c) Intangible benefits
d) None
a) Direct benefits
b) Indirect benefits
c) Intangible benefits*
d) None
a) Productivity
b) Portability
c) Timeliness
d) Visibility
a) in time
a) Availability
b) Reliability
c) Usability
a) Portability
b) Maintainability
c) Availability
a) elicitation
b) design*
c) analysis
d) documentation
a) CAD, CAM
b) Firmware, Embedded
c) Generic, Customised*
a) True*
b) False
90. The only deliverable work product for a successful project is the working program.
a) True
b) False
92 Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code).
a) 100-200*
b) 200-400
c) 400-1000
d) above 1000
d) *Easier to test and debug & It is used when there is a need to get a product to the market early*
94. Arrange the following steps to form a basic/general Engineering Process Model.
1. Test
2. Design
3. Install
4. Specification
5. Manufacture
6. Maintain
a) 2, 4, 5, 1, 6, 3
b) 4, 2, 5, 1, 3, 6*
c) 2, 4, 5, 1, 3, 6
d) 4, 2, 5, 1, 6, 3
a) responsiveness
b) licensing*
c) memory utilization
d) processing time
96. Company has latest computers and state-of the- art software tools, so we shouldn’t worry
about the quality of the product.
a) True
b) False
a) Quick Design
b) Coding*
c) Prototype Refinement
d) Engineer Product
100. Which model can be selected if user is involved in all the phases of SDLC?
a) Waterfall Model
b) Prototyping Model
c) RAD Model*
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Software Risks and Identification”.
a) Threats
b) Vulnerabilities
c) Consequences
View Answer
Answer: d
advertisement
a) Risk assessment
b) Risk generation
c) Risk control
View Answer
Answer: b
Explanation: Risk management activities would never want a new risk to be generated.
3. What is the product of the probability of incurring a loss due to the risk and the potential magnitude of that loss?
a) Risk exposure
b) Risk prioritization
c) Risk analysis
View Answer
Answer: a
Explanation: None.
advertisement
a) Known risks
b) Business risks
c) Project risks
d) Technical risks
View Answer
Answer: d
Explanation: Technical risks identify potential design, implementation, interface, verification, and maintenance problems.
a) Known risks
b) Business risks
c) Project risks
d) Technical risks
View Answer
Answer: b
advertisement
6. Which of the following is not a business risk?
b) losing the support of senior management due to a change in focus or change in people
View Answer
Answer: c
7. Which of the following is a systematic attempt to specify threats to the project plan?
a) Risk identification
b) Performance risk
c) Support risk
d) Risk projection
View Answer
Answer: d
Explanation: By identifying known and predictable risks, the project manager takes a first step toward avoiding them when
possible and controlling them when necessary.
advertisement
8. Which risks are associated with the overall size of the software to be built or modified?
View Answer
Answer: c
Explanation: None.
9. Which risks are associated with constraints imposed by management or the marketplace?
View Answer
Answer: a
Explanation: None.
advertisement
10. Which of the following term is best defined by the statement:”the degree of uncertainty that the product will meet its
requirements and be fit for its intended use.”?
a) Performance risk
b) Cost risk
c) Support risk
d) Schedule risk
View Answer
Answer: a
Explanation: None.
To practice all areas of Software Engineering, here is complete set of 1000+ Multiple Choice Questions and Answers on Software
Engineering.
Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated
with latest contests, videos, internships and jobs!
advertisement
Recommended Posts:
1. Mechanical Engineering Questions and Answers
2. Founder
3. Tissue Engineering MCQ (Multiple Choice Questions)
4. Cloud Computing MCQ (Multiple Choice Questions)
5. Computer Fundamentals MCQ (Multiple Choice Questions)
6. Civil Engineering Questions and Answers
7. Aeronautical Engineering Questions and Answers
8. Embedded System MCQ (Multiple Choice Questions)
9. Cognitive Radio MCQ (Multiple Choice Questions)
10. Mechatronics Engineering Questions and Answers
11. Engineering Mechanics MCQ (Multiple Choice Questions)
12. Basic Civil Engineering MCQ (Multiple Choice Questions)
13. Railway Engineering MCQ (Multiple Choice Questions)
14. Protein Engineering MCQ (Multiple Choice Questions)
15. Polymer Engineering MCQ (Multiple Choice Questions)
16. Pulp & Paper Engineering MCQ (Multiple Choice Questions)
17. Hazardous Waste Management MCQ (Multiple Choice Questions)
18. Highway Engineering MCQ (Multiple Choice Questions)
19. Software Architecture & Design MCQ (Multiple Choice Questions)
20. Software Engineering Questions and Answers – Requirement Engineering
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He
is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas.
He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux
Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage
Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @
LinkedIn | Youtube | Instagram | Facebook | Twitter
Name*
Email*
Subscribe
B. project duration
C. project effort
D. all of the above
7. Once project planning is complete, project managers document
their plan in
A. SPMP document
B. SRS document
C. Detailed Design documet
D. Excel Sheet
8. Which of the following serves as metrics for project size
estimation?
A. Lines of codes
B. function point
C. Number of persons
D. Only A & B
9. Lines of Code measures the size of project by counting
A. True
B. False
C. NA
D. NA
A. LOC
B. Function Point Metric
C. Bothg
D. None
14. Which of the following serves as project estimation technique?
A. Empirical estimation
B. Heuristic technique
C. Analytical estimation
D. All of the above
15. Heuristics estimation techniquedepends on
A. educated guess
B. prior experience
C. Common sense
D. All of the above
16. Which of the following is empirical estimation technique?
(i) expert judgement (ii) Delphi estimation (iii) COCOMO (iv)
Critical path Method
A. only i, ii & iii
B. only i & ii
C. only i, iii & iv
D. All of the above
A. COCOMO
B. intermediate COCOMO
C. both
D. None
Explanation
A. Heuristic technique
B. Delphi cost esttimation
C. Basis COCOMO
D. only a & b
Explanation
Explanation
A. Norden's Work
B. Putnam's Work
C. Both
Explanation
A. PERT chart
B. Gantt chart
C. UML
D. pi-chart
Explanation
A. PERT chart
B. Gantt chart
C. UML
D. pi-chart
Explanation
Explanation
A. functional formation
B. project format
C. both
D. none
Explanation
Explanation
Explanation
A. Risk indentification
B. Risk Assessment
C. Risk Containment
Explanation
A. Risk Containment
B. Risk Assessment
C. Risk indentification
D. Risk Mapping
Explanation
A. Risk avoiding
B. Transfer risk
C. Risk indentification
D. Risk reduction
Explanation
Explanation
Explanation
Correct Option :A
32. Coding is undertaken
Explanation
Explanation
Explanation
A. code review
B. Unit testing
C. integration testing
D. All of the above
Explanation
A. code inspection
B. code walkthrough
C. both
D. None
Explanation
Correct Option :C
37. Which of the following helps detect algorithmic and logical error
in code?
A. code walkthrough
B. code inspection
C. both
D. None
Explanation
A. code walkthrough
B. code inspection
C. both
D. None
Explanation
Explanation
b) Product competition
c) Testing
d) Staff turnover
Answer: c
Explanation: Testing is a part of project, thus it can’t be categorized as
risk
43. The process each manager follows during the life of a project is
known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer: c
Explanation: A proven methodical life cycle is necessary to repeatedly
implement and manage projects successfully.
44. A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
Explanation: The probability of the risk might be assessed as very low
(<10%), low (10–25%), moderate (25–50%), high (50–75%), or very
high (>75%)
45. Which of the following is/are main parameters that you should use
when computing the costs of a software development project?
a) travel and training costs
b) hardware and software costs
c) effort costs (the costs of paying software engineers and managers)
d) all of the mentioned
Answer: d
Explanation: Estimation involves working out how much effort is
required to complete each activity and, from this, calculating the total
cost of activities.
46. Quality planning is the process of developing a quality plan for
a) team
b) project
c) customers
d) project manager
Answer: b
Explanation: The quality plan should set out the desired software
qualities and describe how these are to be assessed.
47. Which of the following is incorrect activity for the configuration
management of a software system?
a) Internship management
b) Change management
c) Version management
d) System management
Answer: a
Explanation: Configuration management policies and processes
define how to record and process proposed system changes, how to
decide what system components to change, how to manage different
versions of the system and its components, and how to distribute
changes to customers.
48. Identify the sub-process of process improvement
a) Process introduction
b) Process analysis
c) De-processification
d) Process distribution
Answer: b
Explanation: The current process is assessed, and process weaknesses
and bottlenecks are identified.
49. An independent relationship must exist between the attribute that
can be measured and the external quality attribute.
a) True
b) False
Answer:b
Explanation: The value of the quality attribute must be related, in
some way, to the value of the attribute than can be measured.
A. Peer Review
B. Delphi Technique
C. Expected value technique
D. Work Breakdown Structure (WBS)
E. DBMS Architecture
1. FS
2. FF
3. SS
4. SF
1. Scope verification
2. Completing a scope statement
3. scope definition
4. Risk management plan
1. Quality control
2. Quality planning
3. Checking adherence to processes
4. Quality assurance
4. Trivandrum
1. with
2. over
3. on
4. round
5. 46%
59. The model serves as the basis for the creation of ______ for the
Software.
(a) Design
(b) Maintenance
(c) Testing
(d) Specifications
(b) Interviewing
(c) Meeting
62.Insufficient identification is a
65. Many software projects digress from the original scope because
of the nature of the software product or technology used, it’s happen
in ________
(a) Product scope changed toward the end of the project life cycle
(a) Analyst
(b) Designer
(c) Coder
(d)Manager
(a) Customer
(b) A developer
(c) An outsider
(a) Procedure
(b) Tools
(a)Product scope changed toward the end of the project life cycle
(c)Defined scope
(d)Fuzzy users
(a)Software design
(b)Software process
(c)Software schedule
(d)Framework
(a)Elicitation process
(b)Interviewing
(c)Meeting
(d)None of given
72.Defined scope is a
(a)Technology-related problems
(b)Product-related problems
(c)Process-related problems
(a)SCIs
(b)SCM
(c)Design
(d)Construction
(a)Goals
(b)Objective
(c)Design
(a)Evaluating
(b)Motivation
(d)Monitoring
(b)Identify learning
(d)none
94.In earned value analysis, it is desirable that variance and index are
1.positive and less than 1
2.negative and greater than 1
3.negative and less than 1
4.positive and greater than 1
The correct answer/s : negative and less than 1
101.A risk table will not contain following information about risk
1.Impact
2.Probability
3.Category
4.Source
The correct answer/s : Category
1.Perfective Maintenance
2.Preventive Maintenance
3.Adaptive Maintenance
4.Corrective Maintenance
109.Software feasibility is based on which of the following
1.business and marketing concerns
2.scope, constraints, market
3.technology, finance, time, resources
4.technical prowess of the developers
The correct answer/s : scope, constraints, market
1.quality management
2.configuration management
3.risk management
4.requirement analysis
The correct answer/s : configuration management
2.Evolutionary Model
3.Waterfall model
4.Spiral Model
4.errors in requirements
The correct answer/s : errors in operation
3.test team
4.development team
The correct answer/s : senior managers
154.At the end of a formal technical review all attendees can decide to
1.modify the work product and continue the review
2.reject the product due to stylistic discrepancies
3.accept the work product without modification
4.advise developer about the problem domain
The correct answer/s : reject the product due to stylistic discrepancies
4.data analysis
The correct answer/s : data record standardization
163. Project managers have to assess the risks that may affect a
project.
a) True
b) False
Answer:B
164.Which of the following is not considered as a risk in project
management?
a) Specification delays
b) Product competition
c) Testing
d) Staff turnover
Answer:C 4.
165.process each manager follows during the life of a project is
known as
a) Project Management
b) Manager life cycle
c) Project Management Life Cycle
d) All of the mentioned
Answer:C
166.A 66.6% risk is considered as
a) very low
b) low
c) moderate
d) high
e) very high
Answer:D
167. Which of the following is/are main parameters that you should
use when computing the costs of a software development project?
Answer:A
175. The only deliverable work product for a successful project is the
working program.
a) True
b) False
Answer:B
176. Which phase of the RUP is used to establish a business case for
the system
a) Transition
b) Elaboration
c) Construction
d) Inception
Answer:D
Answer:D
180. Component-based Software Engineering allows faster delivery.
a) True
b) False
Answer:A
181. Arrange the following steps to form a basic/general Engineering
Process Model. i. Test ii. Design iii. Install iv. Specification v.
Manufacture vi. Maintain
a) 2, 4, 5, 1, 6, 3
b) 4, 2, 5, 1, 3, 6
c) 2, 4, 5, 1, 3, 6
d) 4, 2, 5, 1, 6, 3
Answer:B
182. Which of the following categories is part of the output of
software process?
a) computer programs
b) documents that describe the computer programs
c) data
d) All of the mentioned
Answer:D
183. Which is a software configuration management concept that
helps us to control change without seriously impeding justifiable
change?
a) Baselines
b) Source code
c) Data model
d) None of the mentioned
Answer:A
184. Software Configuration Management can be administered in
several ways. These include
a) A single software configuration management team for the whole
organization
b) A separate configuration management team for each project
c) Software Configuration Management distributed among the project
members
d) All of the mentioned
Answer:A 25.
185.What combines procedures and tools to manage different versions
of configuration objects that are created during the software process?
a) Change control
b) Version control
c) SCIs
d) None of the mentioned
Answer:B
186. What complements the formal technical review by assessing a
configuration object for characteristics that are generally not
considered during review?
a) Software configuration audit
b) Software configuration management
c) Baseline
d) None of the mentioned
Answer:A
187. Which of the following is the process of assembling program
components, data, and libraries, and then compiling and linking these
to create an executable system?
a) System building
b) Release management
c) Change management
d) Version management
Answer:A
188. Which of the following option is not tracked by configuration
management tools?
a) Tracking of change proposals
b) Storing versions of system components
c) Tracking the releases of system versions to customers
d) None of the mentioned
Answer:D
189. Which of the following is not a Software Configuration
Management Activity?
a) Configuration item identification
b) Risk management
c) Release management
d) Branch management
Answer:B
190. The definition and use of configuration management standards is
essential for quality certification in
a) ISO 9000
b) CMM
c) CMMI
d) All of the mentioned
Answer:D
191. What involves preparing software for external release and
keeping track of the system versions that have been released for
customer use?
a) System building
b) Release management
c) Change management
d) Version management
Answer:B
192. Which two requirements are given priority during Requirement
Management of a product ?
a) User and Developer
b) Functional and Non-functional
c) Enduring and Volatile
Answer: C
193. Considering the example of issue/return of a book, cataloging
etc. in a library management.What type of management requirement
is being depicted here?
a) Enduring
b) Volatile
Answer:A
194. Why is Requirements Management Important ? It is due to the
changes
a) to the environment
b) in technology
c) in customer’s expectations
d) in all of the mentioned
. Answer:D
195. Requirements Management is a prerequisite for Quality-Oriented
Development.
a) True
b) False
Answer:A
196. Requirements traceability is one of the most important part
requirement management. It may also be referred to as the heart of
requirement management.
a) True
b) False
Answer:A
197. Requirements Management has a high initial start-up cost but
does not need ongoing funding throughout a project.
a) True
b) False
Answer:B
Answer:a
207. Which technique is applicable when other projects in the same
analogy application domain have been completed?
a) Algorithmic cost modelling
b) Expert judgement
c) Estimation by analogy
d) Parkinson’s Law
Answer:c
208. Which model assumes that systems are created from reusable
components, scripting or database programming?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:A
209. Which of the following states that work expands to fill the time
available.
a) CASE tools
b) Pricing to win
c) Parkinson’s Law
d) Expert judgement
Answer:C
210. Which model is used during early stages of the system design
after the requirements have been established?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:D
211. Which model is used to compute the effort required to integrate
reusable components or program code that is automatically generated
by design or program translation tools?
a) An application-composition model
b) A post-architecture model
c) A reuse model
d) An early design model
Answer:C
212. The COCOMO model takes into account different approaches to
software development, reuse, etc.
a) True
b) False
Answer:B
213.Identify, from among the following, the correct statement.
c) Although you are new to the company, and you hardly know
anything about the internal processes and politics, you should insist
on the company changing its work practices immediately; failing
which you threaten to report the matter
d) Since you are new to the company, and you are unfamiliar with the
internal processes and politics, you should first find-out more about
the issue and its background
e) None of the above statements are correct.
Answer:D
216. With regard to Evolutionary development, identify the correct
statement.
a) Evolutionary development usually comes in two flavors;
exploratory development, and throw-away prototyping
b) Very large projects are natural candidates for an evolutionary
development based approach
c) Exploratory development is used in situations where most of the
requirements are well understood in advance
d) One of the strong points of evolutionary development is that it
facilitates easy project management, through the high volume of
documentation it generates
e) Often the construction of a throw-away prototype is not followed
by a reimplementation of the system using a more structured
approach.
Answer:A
217. What is the fundamental reason that software cannot be
considered to be engineered?
a) It is designed by humans and therefore flawed
(b) Integration
(c) Alpha
(d) Module
(e) Beta.
Answer:E
222. In the maintenance phase the product must be tested against
previous test cases. This is known as __________ testing.
a) Unit
(b) Integration
(c) Regression
(d) Module
(e) Beta.
Answer:C
223. Which property of the rapid prototype is not important?
a) The speed with which it can be developed
b) The speed with which it can be modified
c) Its ability to determine the client’s real needs
d) The insights that the design team can gain from it, even if they are
of the ‘how not to do it’ variety
e) Its internal structure.
Answer:C
224. An example of the risk involved in software development is
a) Key personnel may resign before the product is complete
b) The manufacturer of critical components (e.g. the hardware
associated with a real-time system) may go bankrupt
c) Technology changes may render the product obsolete
d) Competitors may market a fully functional lower-cost equivalent
package
e) All of these are risks involved in software development.
Answer:E
225. A simple way of looking at the spiral software life-cycle model is
as a waterfall model with each phase proceeded by
a) Build-and-fix
b) Freezing
c) Synchronization
d) Testing
e) Risk analysis.
Answer:E
226. The degree of interaction between two modules is known as
a) Cohesion
b) Strength
c) Inheritance
d) Coupling
e) Instantiation.
Answer:D
227. The relationship between a derived class (or subclass) and base
class is referred to as
a) Association
b) Inheritance
c) Polymorphism
d) Instantiation
e) Aggregation
. Answer:B
228. Myers (1978) identifies seven levels of cohesion. Which level of
cohesion may be defined as followed; “the output from one element in
the component serves as input for some other element”?
a) Communicational cohesion
b) Functional cohesion
c) Communicational cohesion
d) Temporal cohesion
e) None of these
. Answer:A
229. A design is said to be a good design if the components are
a) Strongly coupled
b) Weakly cohesive
c) Strongly coupled and Weakly cohesive
d) Strongly coupled and strongly cohesive
e) Strongly cohesive and weakly coupled.
Answer:E
230. If a control switch is passed as an argument this is an example of
_______ coupling.
a) Content
b) Common
c) Control
d) Stamp
e) Data.
Answer:C
231. Which of the following is a type of abstraction?
a) Data
b) Procedural
c) Iteration
b) Semidetached
c) Organic
d) Multiplicative
e) Monolithic.
Answer:A
237. Work that continues throughout the project and does not relate to
any specific phase of software development is termed a(n)
a) Milestone
b) Project function
c) Activity
d) Task
e) Baseline.
Answer:B
238. The advantage of following the IEEE Standard for drawing up a
Software Project Management Plan (SPMP) – see IEEE Standard
1059.1 1987 – is
a) It is drawn up by representatives from major software development
organisations
b) It is designed for all types of software products
c) It is a framework that can be used irrespective of process model or
specific techniques
d) It can be tailored for each organisation for a particular application
area, development team or technique.
e) All of the above.
Answer:E
239. The best way to test the Software Project Management Plan
(SPMP) is by
a) Prototyping
b) Inspection
c) Simulation
d) Compilation
e) Debugging.
Answer:B
240. Algorithmic cost estimation in different organisations may be
different for the same application development, because
a) Different organisations consider complexity factors differently
Answer: b
Explanation: Risk management involves
IT8075 Software anticipating risks that might affect the project
schedule or the quality of the software being
Project Management
M
developed, and then taking action to avoid
these risks.
CSE - Professional
O
3. Which of the following is not considered as
a risk in project management?
Elective - II a) Specification delays
C
b) Product competition
c) Testing
T.
Regulations 2017 d) Staff turnover
Answer: c
O
Explanation: Testing is a part of project, thus
it can’t be categorized as risk.
SP
UNIT I PROJECT 4. The process each manager follows during
the life of a project is known as
EVALUATION AND a) Project Management
PROJECT PLANNING b) Manager life cycle
G
c) Project Management Life Cycle
d) All of the mentioned
LO
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
engineers and managers) identified.
d) all of the mentioned
10. An independent relationship must exist
Answer: d between the attribute that can be measured
M
Explanation: Estimation involves working and the external quality attribute.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
O
total cost of activities.
Answer: b
C
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
T.
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
O
Answer: b
TOPIC 1.2 ACTIVITIES -
METHODOLOGIES
SP
Explanation: The quality plan should set out
the desired software qualities and describe
how these are to be assessed. 1. Which of these truly defines Software
design?
8. Which of the following is incorrect activity
G
a) Software design is an activity subjected to
for the configuration management of a constraints
software system? b) Software Design specifies nature and
LO
Answer: a Answer: d
Explanation: Configuration management Explanation: Software design explains all of
policies and processes define how to record the statements as its definition.
17
solutions
Answer: b
Explanation: The current process is assessed,
M
refinement? Explanation: Notations used are more
a) Nicklaus Wirth described the first software specialized and sophisticated one.
engineering method as stepwise refinement
O
b) Stepwise refinement follows its existence 7. Which of the following is an incorrect
from 1971 method for structural design?
C
c) It is a top down approach a) Transition of problem models to solution
d) All of the mentioned models
T.
b) Handling of larger and more complex
Answer: d products
Explanation: It is top down approach and not c) Designing Object oriented systems
bottom up. d) More procedural approach
O
4. What is incorrect about structural design? Answer: b
SP
a) Structural design introduced notations and Explanation: It does not account for larger
heuristics and complex products.
b) Structural design emphasis on procedural
decomposition 8. What is followed by the design task?
a) Choosing specific classes, operations
G
c) The advantage is data flow representation
d) It follows Structure chart b) Checking model’s completeness
c) Following design task heuristics
LO
M
c) Central model represents class diagrams products and related modifications meet the
that show the classes comprising a program highest professional standards possible
O
and their relationships to one another c) Software engineers shall ensure that their
d) Object-oriented methods incorporates products and related modifications satisfy the
Structural methods client
C
d) It means that the product designed /created
Answer: a should be easily available
T.
Explanation: It does not follow regular
procedural decomposition. Answer: b
Explanation: None.
O
TOPIC 1.3 CATEGORIZATION 4. Identify an ethical dilemma from the
OF SOFTWARE PROJECTS situations mentioned below:
SP
a) Your employer releases a safety-critical
1. Choose the correct option in terms of system without finishing the testing of the
Issues related to professional responsibility system
a) Confidentiality b) Refusing to undertake a project
G
b) Intellectual property rights c) Agreement in principle with the policies of
c) Both Confidentiality & Intellectual senior management
property rights d) All of the mentioned
LO
respect the confidentiality of their employers 5. Identify the correct statement: “Software
or clients irrespective of whether or not a engineers shall
formal confidentiality agreement has been a) act in a manner that is in the best interests
of his expertise and favour.”
17
signed.
They should be aware of local laws governing b) act consistently with the public interest.”
the use of intellectual property such as c) ensure that their products only meet the
patents, copyright, etc. SRS.”
d) all of the mentioned
-R
a) Unauthorized access to computer material a manner that is in the best interests of their
b) Unauthorized modification of computer client and employer consistent with the public
material interest and shall ensure that their products
c) Dissemination of viruses or other malware and related modifications meet the highest
professional standards possible.Thus options
C
M
other people’s computers.” become a part of software development
c) be dependent on their colleagues.” process.Bugs from developers side is no new
O
d) maintain integrity and independence in thing. Thus option c answers the question.
their professional judgment.”
10. Company has latest computers and state-
C
Answer: c of the- art software tools, so we shouldn’t
Explanation:None. worry about the quality of the product.
T.
a) True
7. Efficiency in a software product does not b) False
include ________
a) responsiveness Answer: b
O
b) licensing Explanation: The infrastructure is only one
c) memory utilization of the several factors that determine the
SP
d) processing time quality of the product.
Answer: b .
Explanation: Licensing of a software product
G
comes under corporate part of the software
company.
TOPIC 1.4 SETTING
OBJECTIVES
LO
Answer: c engineering
Explanation: Software is not just set of d) Software engineering is concerned with the
program but it is also associated practicalities of developing and delivering
documentation and configuration of data to useful software
make program run.
M
Answer: c
3. Which of these does not account for Explanation: Software engineering is a vast
software failure ? sub domain which comes under computer
O
a) Increasing Demand science which is main domain.
b) Low expectation
C
c) Increasing Supply 7. Which of these is true ?
d) Less reliable and expensive a) Generic products and customized products
T.
are types of software products
Answer: c b) Generic products are produced by
Explanation: Increasing supply will lead to organization and sold to open market
more production and not failure. c) Customized products are commissioned by
O
particular customer
4. What are attributes of good software ? d) All of the mentioned
SP
a) Software maintainability
b) Software functionality Answer: d
c) Software development Explanation: All of them are true.
d) Software maintainability & functionality
8. Which of these does not affect different
G
Answer: d types of software as a whole?
Explanation: Good software should deliver a) Heterogeneity
LO
activities are not a part of software processes Explanation: Option b & c are a part of
? Software Engineering as a subject,hence
a) Software dependence option a covers them both.
17
b) Software development
c) Software validation 9. The fundamental notions of software
d) Software specification engineering does not account for ?
a) Software processes
-R
Answer: d
6. Which of these is incorrect ? Explanation: Software validation is an
a) Software engineering belongs to Computer activity for software process and not the
science fundamental for engineering.
C
M
d) Web based system should be developed 4. Which one of the following is not an
and delivered incrementally application of embedded software product?
a) keypad control of a security system
O
Answer: b b) pattern recognition game playing
Explanation: Web based systems has led to c) digital function of dashboard display in a
C
important advances in programming car
languages. d) none of the mentioned
T.
. Answer: b
Explanation: Pattern recognition uses
Artificial Intelligence (AI) software.
O
TOPIC 1.5 MANAGEMENT
PRINCIPLES 5. Purpose of process is to deliver software
SP
a) in time
1. Which one of the following is not a b) with acceptable quality
software process quality? c) that is cost efficient
a) Productivity d) both in time & with acceptable quality
G
b) Portability
c) Timeliness Answer: d
d) Visibility Explanation: Cost of a software is a
LO
M
c) Modeling & Construction
d) Deployment TOPIC 1.6 MANAGEMENT
O
Answer: d CONTROL
Explanation: In Deployment the product is
C
delivered to the customer who evaluates the 1. SCM stands for
product and provides feedback based on the a) Software Control Management
T.
evaluation. b) Software Configuration Management
c) Software Concept Management
8. Process adopted for one project is same as d) None of the mentioned
the process adopted from another project.
O
a) True Answer: b
b) False Explanation: In software engineering,
SP
software configuration management (SCM) is
Answer: b the task of tracking and controlling changes
Explanation: the overall flow of activities, in the software, part of the larger cross-
actions,tasks,the level of autonomy given to discipline field of configuration management.
G
the software team and the inter dependencies
among two process can never be the same. 2. When code is made available to others, it
goes in a/an
LO
and risk.
a) Reusability management Answer: b
b) Risk management Explanation: None.
c) Measurement
17
c) CM audits
10. Four types of change are encountered d) None of the mentioned
during the support phase.Which one of the
following is not one that falls into such Answer: d
SE
d) Prevention a) True
b) False
M
a) Version Control
b) Access control Answer: c
c) CM Process Explanation: Testing verifies the agreed-to
O
d) Version Control and Access control description.
C
Answer: a 10. Which of the following is a example of
Explanation: It allows software engineers to Configuration Items ?
T.
continue development along a branch even a) SCM procedures
when a line of development is frozen. b) Source code
c) Software design descriptions
6. Which of the following is not a change d) All of the mentioned
O
management process?
a) Log the changes Answer: d
SP
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
c) Review impact with stakeholders
d) None of the mentioned 11. SCM controls only the products of the
development process.
Answer: d a) True
G
Explanation: All are required for a change. b) False
LO
M
a) conveyor line sorting system
1. Which of the following is an important b) conveyor line sorting software
c) conveyor line sorting speed
O
factor that can affect the accuracy and
efficacy of estimates? d) conveyor line sorting specification
a) Project size
C
b) Planning process Answer: a
c) Project complexity Explanation: The conveyor line sorting
T.
d) Degree of structural uncertainty system (CLSS) sorts boxes moving along a
conveyor line. Each box is identified by a
Answer: a barcode that contains a part number and is
Explanation: As size increases, the sorted into one of six bins at the end of the
O
interdependence among various elements of line.
the software grows rapidly.
SP
5. The project planner examines the statement
2. What describes the data and control to be of scope and extracts all important software
processed? functions which is known as
a) Planning process a) Association
G
b) Software scope b) Decomposition
c) External hardware c) Planning process
d) Project complexity d) All of the mentioned
LO
Answer: b Answer: b
Explanation: Functions described in the Explanation: None
statement of scope are evaluated and in some
6. The environment that supports the software
.B
creation of a joint team of customers b) Use one or more empirical models for
and developers who work together to identify software cost and effort estimation
the problem, propose elements c) Use relatively simple decomposition
M
Answer: d Evolutionary Process Model?
Explanation: None. a) WINWIN Spiral Model
O
b) Incremental Model
8. What can be used to complement c) Concurrent Development Model
decomposition techniques and offer a d) All of the mentioned
C
potentially valuable estimation approach in
their own right? Answer: d
T.
a) Automated estimation tools Explanation: None.
b) Empirical estimation models
c) Decomposition techniques 2. The Incremental Model is a result of
d) Both Automated estimation tools and combination of elements of which two
O
Empirical estimation models models?
a) Build & FIX Model & Waterfall Model
SP
Answer: b b) Linear Model & RAD Model
Explanation: An estimation model for c) Linear Model & Prototyping Model
computer software uses empirically derived d) Waterfall Model & RAD Model
formulas to predict effort as a function of
G
LOC or FP. Answer: c
Explanation: Each linear sequence produces
9. Which of the following is not achieved by a deliverable “increment” of the software and
LO
M
d) Royce phases.
a) True
Answer: b b) False
O
Explanation: None.
Answer: b
C
5. The spiral model has two dimensions Explanation: None.
namely _____________ and ____________
9. How is Incremental Model different from
T.
a) diagonal, angular
b) radial, perpendicular Spiral Model?
c) radial, angular a) Progress can be measured for Incremental
d) diagonal, perpendicular Model
O
b) Changing requirements can be
Answer: c accommodated in Incremental Model
SP
Explanation: The radial dimension of the c) Users can see the system early in
model represents the cumulative costs and the Incremental Model
angular dimension represents the progress d) All of the mentioned
made in completing each cycle. Each loop of
Answer: a
G
the spiral from X-axis clockwise through
360o represents one phase. Explanation: None.
LO
6. How is WINWIN Spiral Model different 10. If you were to create client/server
from Spiral Model? applications, which model would you go for?
a) It defines tasks required to define a) WINWIN Spiral Model
resources, timelines, and other project related b) Spiral Model
c) Concurrent Model
.B
information
b) It defines a set of negotiation activities at d) Incremental Model
the beginning of each pass around the spiral
Answer: c
17
well.
M
d) Project manager 5. What assess the risk and your plans for risk
mitigation and revise these when you learn
Answer: d more about the risk?
O
Explanation: Risk management involves a) Risk monitoring
anticipating risks that might affect the project b) Risk planning
C
schedule or the quality of the software being c) Risk analysis
developed, and then taking action to avoid d) Risk identification
T.
these risks.
Answer: a
2. Which of the following risk is the failure of Explanation: None.
a purchased component to perform as
O
expected? 6. Which of the following risks are derived
a) Product risk from the organizational environment where
SP
b) Project risk the software is being developed?
c) Business risk a) People risks
d) Programming risk b) Technology risks
c) Estimation risks
G
Answer: a d) Organizational risks
Explanation: Risks that affect the quality or
performance of the software being developed. Answer: d
LO
priorities.”?
a) Staff turnover that are used to develop the system?
b) Technology change a) Managerial risks
c) Management change b) Technology risks
17
M
help us understand the risk. Answer: b
Explanation: Risk management involves
9. Which of the following strategies means anticipating risks that might affect the project
O
that the impact of the risk will be reduced? schedule or the quality of the software being
a) Avoidance strategies developed, and then taking action to avoid
C
b) Minimization strategies these risks.
c) Contingency plans
T.
d) All of the mentioned 3. Which of the following is not considered as
a risk in project management?
Answer: b a) Specification delays
Explanation: None. b) Product competition
O
c) Testing
10. Risk management is now recognized as d) Staff turnover
SP
one of the most important project
management tasks. Answer: c
a) True Explanation: Testing is a part of project, thus
b) False it can’t be categorized as risk.
G
Answer: a 4. The process each manager follows during
Explanation: None. the life of a project is known as
LO
a) Project Management
. b) Manager life cycle
c) Project Management Life Cycle
TOPIC 1.10 STRATEGIC d) All of the mentioned
.B
Answer: d Answer: d
Explanation: Projects need to be managed Explanation: The probability of the risk
because professional software engineering is might be assessed as very low (<10%), low
always subject to organizational budget and (10–25%), moderate (25–50%), high (50–
C
M
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
identified.
O
engineers and managers)
d) all of the mentioned
10. An independent relationship must exist
C
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
T.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
O
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
SP
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
G
TOPIC 1.11 STEPWISE
Answer: b
Explanation: The quality plan should set out PROJECT PLANNING
LO
c) Version management
d) System management Answer: a
Explanation: As size increases, the
Answer: a interdependence among various elements of
-R
statement of scope are evaluated and in some 6. The environment that supports the software
cases refined to provide more detail prior to project is called
the beginning of estimation. a) CLSS
b) SEE
3. A number of independent investigators c) FAST
M
have developed a team-oriented approach to d) CBSE
requirements gathering that can be applied to
establish the scope of a project called Answer: b
O
a) JAD Explanation: Software engineering
b) CLASS environment (SEE), incorporates hardware
C
c) FAST and software.
d) None of the mentioned
T.
7. Which of the following is not an option to
Answer: c achieve reliable cost and effort estimate?
Explanation: Facilitated application a) Base estimates on similar projects that
specification techniques have already been completed
O
(FAST), this approach encourages the b) Use one or more empirical models for
creation of a joint team of customers software cost and effort estimation
SP
and developers who work together to identify c) Use relatively simple decomposition
the problem, propose elements techniques to generate project cost and effort
of the solution, negotiate different estimates
approaches, and specify a preliminary set of d) The ability to translate the size estimate
G
requirements. into human effort, calendar time, and dollars
Answer: b
5. The project planner examines the statement Explanation: An estimation model for
of scope and extracts all important software computer software uses empirically derived
SE
M
to client. Explanation: rest all are sub
categories/applications of option c.
10. Software project estimation can never be
O
an exact science, but a combination of good 3. Software costs more to maintain than it
historical data and systematic techniques can does to develop.
C
improve estimation accuracy. a) True
a) True b) False
T.
b) False
Answer: a
Answer: a Explanation: For systems with a long life,
Explanation: None. maintenance costs may be several times
O
development costs.
.
SP
4. Which one of the following is not an
application of embedded software product?
a) keypad control of a security system
b) pattern recognition game playing
UNIT II PROJECT LIFE c) digital function of dashboard display in a
G
CYCLE AND EFFORT car
d) none of the mentioned
LO
ESTIMATION
Answer: b
Explanation: Pattern recognition uses
TOPIC 2.1 SOFTWARE Artificial Intelligence (AI) software.
PROCESS AND PROCESS
.B
change. Answer: d
i. support Explanation: None.
ii. development
iii. definition 10. Four types of change are encountered
a) 1, 2, 3 during the support phase.Which one of the
M
b) 2, 1, 3 following is not one that falls into such
c) 3, 2, 1 category?
a) Translation
O
d) 3, 1, 2
b) Correction
Answer: c c) Adaptation
C
Explanation: None. d) Prevention
T.
7. Which of the following activities of a Answer: a
Generic Process framework provides a Explanation: Translation is done in the
feedback report? development phase.
a) Communication
O
b) Planning .
c) Modeling & Construction
SP
d) Deployment TOPIC 2.2 CHOICE OF
Answer: d PROCESS MODELS - RAPID
Explanation: In Deployment the product is APPLICATION DEVELOPMENT
G
delivered to the customer who evaluates the
product and provides feedback based on the 1. Build & Fix Model is suitable for
evaluation. programming exercises of ___________ LOC
LO
(Line of Code).
8. Process adopted for one project is same as a) 100-200
the process adopted from another project. b) 200-400
a) True c) 400-1000
.B
M
Explanation: Real projects rarely follow the phases namely:Business modeling,Data
sequential flow that the Waterfall Model modeling,Process modeling,Application
proposes. generation and Testing & Turnover.
O
4. Which is not one of the types of prototype 8. What is the major drawback of using RAD
C
of Prototyping Model? Model?
a) Horizontal Prototype a) Highly specialized & skilled
T.
b) Vertical Prototype developers/designers are required
c) Diagonal Prototype b) Increases reusability of components
d) Domain Prototype c) Encourages customer/client feedback
d) Increases reusability of components,
O
Answer: c Highly specialized & skilled
Explanation: Their is no such thing as developers/designers are required
SP
Diagonal Prototype whereas other options
have their respective definitions. Answer: d
Explanation: The client may create an
5. Which one of the following is not a phase unrealistic product vision leading a team to
of Prototyping Model?
G
over or under-develop functionality.Also, the
a) Quick Design specialized & skilled developers are not
b) Coding easily available.
LO
c) Prototype Refinement
d) Engineer Product 9. SDLC stands for
a) Software Development Life Cycle
Answer: b b) System Development Life cycle
Explanation: A prototyping model generates
.B
a) 2 phases .
b) 3 phase
TOPIC 2.3 AGILE METHODS
1. Select the option that suits the Manifesto to be able to respond quickly to changing
for Agile Software Development requirements without excessive rework.
a) Individuals and interactions
b) Working software 5. How is plan driven development different
c) Customer collaboration from agile development ?
M
d) All of the mentioned a) Outputs are decided through a process of
negotiation during the software development
Answer:d process
O
Explanation: None. b) Specification, design, implementation and
testing are interleaved
C
2. Agile Software Development is based on c) Iteration occurs within activities
a) Incremental Development d) All of the mentioned
T.
b) Iterative Development
c) Linear Development Answer:c
d) Both Incremental and Iterative Explanation: A plan-driven approach to
Development software engineering is based around separate
O
development stages with the outputs to be
Answer:d produced at each of these stages planned in
SP
Explanation: The software is developed in advance.
increments with the customer specifying the
requirements to be included in each increment 6. How many phases are there in Scrum ?
and the highest priority is to satisfy the a) Two
G
customer through early and continuous b) Three
delivery of valuable software. They are c) Four
iterative because they work on one iteration d) Scrum is an agile method which means it
LO
M
software development process which can’t be
avoided. Answer: b
Explanation: None.
O
9. Which three framework activities are
present in Adaptive Software 3. Which one of the following models is not
C
Development(ASD) ? suitable for accommodating any change?
a) analysis, design, coding a) Build & Fix Model
T.
b) requirements gathering, adaptive cycle b) Prototyping Model
planning, iterative development c) RAD Model
c) speculation, collaboration, learning d) Waterfall Model
d) all of the mentioned
O
Answer: d
Answer:c Explanation: Real projects rarely follow the
SP
Explanation: None. sequential flow that the Waterfall Model
proposes.
10. In agile development it is more important
to build software that meets the customers’ 4. Which is not one of the types of prototype
needs today than worry about features that of Prototyping Model?
G
might be needed in the future. a) Horizontal Prototype
a) True b) Vertical Prototype
LO
Explanation: Build & Fix Model is suitable regarding Build & Fix Model is wrong?
for small projects & programming exercises a) No room for structured design
of 100 or 200 lines. b) Code soon becomes unfixable &
M
Explanation: Build & Fix Model is suitable Answer: c
for 100-200 LOC Explanation: None.
O
7. RAD Model has .
a) 2 phases
C
b) 3 phase
c) 5 phases
TOPIC 2.5 EXTREME
PROGRAMMING
T.
d) 6 phases
O
phases namely:Business modeling,Data system release once every month.
modeling,Process modeling,Application a) True
SP
generation and Testing & Turnover. b) False
8. What is the major drawback of using RAD Answer: b
Model? Explanation: Incremental development is
a) Highly specialized & skilled
G
supported through small, frequent system
developers/designers are required releases.
b) Increases reusability of components
LO
b) False
Answer: d
Explanation: The client may create an Answer: a
unrealistic product vision leading a team to Explanation: XP follows a continuous
17
M
__________ in Extreme Programming. implements the ‘display logic’ and workflow
a) implementation tasks between screens.
b) functionalities
O
c) scenarios 7. Tests are automated in Extreme
d) none of the mentioned Programming.
C
a) True
Answer: c b) False
T.
Explanation: User requirements are
expressed as scenarios or user stories.These Answer: a
are written on cards and the development Explanation: Automated test harnesses are
team break them down into implementation used to run all component tests each time that
O
tasks. These tasks are the basis of schedule a new release is built.
and cost estimates.
SP
8. In XP an automated unit test framework is
5. Is a customer involved test development used to write tests for a new piece of
and validation in XP ? functionality before that functionality itself is
a) Yes implemented.
G
b) No a) True
c) It may vary from Customer to Customer b) False
d) None of the mentioned
LO
Answer: a
Answer: c Explanation: XP follows Test-first
Explanation: The role of the customer in the development approach.
testing process is to help develop acceptance
9. Developers work individually on a release
.B
c) planning, design, coding, testing 5. CIM and WBEM has been defined by ?
d) planning, analysis, coding, testing a) DMTF
b) SMI Standards Organization
Answer: c c) Open Standards Body
Explanation: XP involves the mentioned four d) None of the mentioned
M
activities, and in the same in order.
Answer: a
.
O
6. _________ instruments one or more
aspects of the CIM Schema
TOPIC 2.6 MANAGING
C
a) Distributor
b) Provider
This set of multiple choice SAN storage
T.
c) Manager
questions and answers focuses on Storage d) None of the mentioned
Management aspects.
Answer: b
O
1. A Subprofile can reference other
subprofiles 7. The server can operate directly on the
SP
a) True underlying system by calling the system’s
b) False commands, services, and library functions.
a) True
Answer: a b) False
G
2. Clients use which protocol to discover SMI Answer: a
Agents on Storage Area Network?
LO
Answer: a
Answer: b
3. Encoding mechanism of CIM Data as
17
Answer: b Answer: a
SE
4. Can a vendor implement additional Classes 10. Collects responses from providers and
or support additional Properties than are returns to the client
defined in a Profile and still be considered a) xmlCIM
conformant? b) CIMOM
C
a) True c) DMTF
b) False d) None of the mentioned
Answer: a Answer: b
M
PROCESSES a) that can not drop below zero
b) that can not be more than zero
c) that can not drop below one
O
1. Which process can be affected by other
processes executing in the system? d) that can not be more than one
a) cooperating process
C
b) child process Answer: a
c) parent process Explanation: None.
T.
d) init process
6. Mutual exclusion can be provided by the
Answer: a __________
Explanation: None. a) mutex locks
O
b) binary semaphores
2. When several processes access the same c) both mutex locks and binary semaphores
SP
data concurrently and the outcome of the d) none of the mentioned
execution depends on the particular order in
which the access takes place, is called? Answer: c
a) dynamic condition Explanation: Binary Semaphores are known
as mutex locks.
G
b) race condition
c) essential condition
d) critical condition 7. When high priority task is indirectly
LO
a) mutual exclusion
b) critical exclusion Answer: a
c) synchronous exclusion Explanation: None.
d) asynchronous exclusion
-R
M
d) all of the mentioned employees.
O
Explanation: None. of the delivered software?
a) Function-related metrics
C
10. To enable a process to wait within the b) Product-related metrics
monitor __________ c) Size-related metrics
T.
a) a condition variable must be declared as d) None of the mentioned
condition
b) condition variables must be used as Answer: a
boolean objects Explanation: Productivity is expressed in
O
c) semaphore must be used terms of the amount of useful functionality
d) all of the mentioned produced in some given time. Function points
SP
and object points
Answer: a are the best-known metrics of this type.
Explanation: None.
4. A _________ is developed using historical
cost information that relates some software
G
TOPIC 2.8 BASICS OF metric to the project cost.
SOFTWARE ESTIMATION a) Algorithmic cost modelling
LO
b) Expert judgement
c) Estimation by analogy
TOPIC 2.9 EFFORT AND COST d) Parkinson’s Law
ESTIMATION TECHNIQUES
Answer: a
.B
1. Which of the following are parameters Explanation: The model uses a basic
involved in computing the total cost of a regression formula with parameters that are
derived from historical project data and
17
b) Costs of providing heating and lighting of code size but are often still inaccurate.
office space
M
c) Estimation by analogy simplified set of seven multipliers.
d) Parkinson’s Law
10. Which model is used to compute the
O
Answer: c effort required to integrate reusable
Explanation: The cost of a new project is components or program code that is
C
estimated by analogy with these completed automatically generated by design or program
projects. translation tools?
T.
a) An application-composition model
7. Which model assumes that systems are b) A post-architecture model
created from reusable components, scripting c) A reuse model
or database programming? d) An early design model
O
a) An application-composition model
b) A post-architecture model Answer: c
SP
c) A reuse model Explanation: None.
d) An early design model
11. The COCOMO model takes into account
Answer: a different approaches to software
G
Explanation: It is designed to make estimates development, reuse, etc.
of prototype development. a) True
b) False
LO
Answer: c .
17
2. Statement and branch coverage metrics are 6. Architectural Design Metrics are
part of ___________ in nature.
a) Analysis Model a) Black Box
b) Testing b) White Box
c) Design Model c) Gray Box
M
d) Source Code d) Green Box
Answer: b Answer: a
O
Explanation: These metrics lead to the Explanation: They are “black box” in that
design of test cases that provide program they do not require any knowledge of the
C
coverage. inner workings of a particular software
component.
T.
3. Function Points in software engineering
was first proposed by 7. Structural complexity of a module i is
a) Booch given as S(i) = f*f (i). What does f
b) Boehm symbolizes here?
O
c) Albrecht a) “fan check-out” of module i
d) Jacobson b) “fan check-in” of module i
SP
c) “fan in” of module i
Answer: c d) “fan out” of module i
Explanation: First proposed by Albrecht in
1979, hundreds of books and papers have Answer: d
G
been written on functions points since then. Explanation: Fan out is number of modules
directly invoked by module i.
4. How many Information Domain Values are
LO
Answer: c Answer: b
Explanation: The five values are: External Explanation: None.
17
M
Explanation: None. because professional software engineering is
always subject to organizational budget and
11. The amount of time that the software is schedule constraints.
O
available for use is known as
a) Reliability 2. Project managers have to assess the risks
C
b) Usability that may affect a project.
c) Efficiency a) True
T.
d) Functionality b) False
Answer: a Answer: b
Explanation: None. Explanation: Risk management involves
O
anticipating risks that might affect the project
12. Usability in metric analysis is defined as schedule or the quality of the software being
SP
the degree to which the software developed, and then taking action to avoid
a) stated needs these risks.
b) is easy to use
c) makes optimal use of system resources 3. Which of the following is not considered as
d) none of the mentioned a risk in project management?
G
a) Specification delays
Answer: b b) Product competition
LO
M
might be assessed as very low (<10%), low
(10–25%), moderate (25–50%), high (50– 9. Identify the sub-process of process
75%), or very high (>75%). improvement
O
a) Process introduction
6. Which of the following is/are main b) Process analysis
C
parameters that you should use when c) De-processification
computing the costs of a software d) Process distribution
T.
development project?
a) travel and training costs Answer: b
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
O
engineers and managers) identified.
d) all of the mentioned
SP
10. An independent relationship must exist
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
out how much effort is required to complete a) True
G
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
LO
c) customers
d) project manager
Answer: b
TOPIC 3.2 PROJECT
17
8. Which of the following is incorrect activity a) Changing customer requirements that are
for the configuration management of a not reflected in schedule changes
software system? b) Technical difficulties that could not have
a) Internship management
SE
Answer: a Answer: d
Explanation: Configuration management Explanation: None.
policies and processes define how to record
M
b) Software Project scheduling b) Adaptation criteria
c) Software Detailed schedule c) Task Set
O
d) None of the mentioned d) Both degree of Rigor and adaptation
criteria
Answer: b
C
Explanation: None. Answer: b
Explanation: Four different degrees of rigor
T.
3. Every task that is scheduled should be are: casual, structured, strict, and quick
assigned to a specific team member is termed reaction.
as
a) Compartmentalization 7. What evaluates the risk associated with the
O
b) Defined milestones technology to be implemented as part of
c) Defined responsibilities project scope?
SP
d) Defined outcomes a) Concept scoping
b) Preliminary concept planning
Answer: c c) Technology risk assessment
Explanation: These responsibilities are d) Customer reaction to the concept
G
domain specific.
Answer: b
4. What is a collection of software Explanation: None.
LO
Answer: a Answer: b
Explanation: None. Explanation: These can vary from client to
client.
5. Ensuring that no more than the allocated
-R
number of people are allocated at any given 9. Which of the following is a project
time in Software Scheduling is known as scheduling method that can be applied to
a) Time Allocation software development?
b) Effort Validation a) PERT
SE
(CPM) are two project scheduling methods TOPIC 3.4 SEQUENCING AND
that can be applied to software development.
SCHEDULING
10. A technique for performing quantitative
analysis of progress is known as 1. Round robin scheduling falls under the
M
a) BCWS category of ____________
b) EVA a) Non-preemptive scheduling
c) BAC
O
b) Preemptive scheduling
d) CBSE c) All of the mentioned
d) None of the mentioned
C
Answer: b
Explanation: The earned value system Answer: b
T.
provides a common value scale for every Explanation: None.
task, regardless of the type of work being
performed. The total hours to do the whole 2. With round robin scheduling algorithm in a
project are estimated, and every task is given time shared system ____________
O
an earned value based on its estimated a) using very large time slices converts it into
percentage of the total. First come First served scheduling algorithm
SP
b) using very small time slices converts it into
11. What is the recommended distribution of First come First served scheduling algorithm
effort for a project? c) using extremely small time slices increases
a) 40-20-40 performance
G
b) 50-20-30 d) using very small time slices converts it into
c) 30-40-30 Shortest Job First algorithm
d) 50-30-20
LO
Answer: a
Answer: a Explanation: All the processes will be able to
Explanation: A recommended distribution of get completed.
effort across the software process is 40%
.B
(analysis and design), 20% (coding), and 40% 3. The portion of the process scheduler in an
(testing). operating system that dispatches processes is
concerned with ____________
12. A project usually has a timeline chart a) assigning ready processes to CPU
17
Answer: a c) tQ = 45ms
Explanation: Large computers are d) tQ = 50ms
overloaded with a greater number of
processes. Answer: a
Explanation: None.
M
5. What is FIFO algorithm?
a) first executes the job that came in last in 9. Orders are processed in the sequence they
the queue arrive if _______ rule sequences the jobs.
O
b) first executes the job that came in first in a) earliest due date
the queue b) slack time remaining
C
c) first executes the job that needs minimal c) first come, first served
processor d) critical ratio
T.
d) first executes the job that has maximum
processor needs Answer: c
Explanation: None.
Answer: b
O
Explanation: None. 10. Which of the following algorithms tends
to minimize the process flow time?
SP
6. The strategy of making processes that are a) First come First served
logically runnable to be temporarily b) Shortest Job First
suspended is called ____________ c) Earliest Deadline First
a) Non preemptive scheduling d) Longest Job First
G
b) Preemptive scheduling
c) Shortest job first Answer: b
d) First come First served Explanation: None.
LO
processes are scheduled with the Round- II. Preemptive scheduling may cause starvat
Robin time sharing method. Which out of the
following quantum times is the best value for III. Round robin is better than FCFS in ter
small response times, if the processes have a
C
M
scheduling is a preemptive version of shortest protocols for error control functions.
job scheduling. It may cause starvation as
shorter processes may keep coming and a 3. TCP/IP model does not have ______ layer
O
long CPU burst process never gets CPU. but OSI model have this layer.
II) Preemption may cause starvation. If a) session layer
C
priority based scheduling with preemption is b) transport layer
used, then a low priority process may never c) application layer
T.
get CPU. d) network layer
III) Round Robin Scheduling improves
response time as all processes get CPU after a Answer: a
specified time. Explanation: In OSI reference model, there
O
. are two layers which are not present in
TCP/IP model. They are Presentation and
SP
Session layer. The functions of Presentation
TOPIC 3.5 NETWORK and Session layer in the OSI model are
PLANNING MODELS handled by the transport layer itself in
TCP/IP.
G
1. OSI stands for __________
a) open system interconnection 4. Which layer is used to link the network
b) operating system interface support layers and user support layers?
LO
d) 7
Answer: d
Answer: d Explanation: The physical, logical, port and
Explanation: In OSI reference model, there specific addresses are used in TCP/IP
M
the internet implementation of these examples of port numbers are port 20 which
addresses. is used for FTP data, port 22 which is used
O
for SSH remote login ,and port 23 which is
6. TCP/IP model was developed _____ the used for TELNET.
OSI model.
C
a) prior to 9. Which layer provides the services to user?
b) after a) application layer
T.
c) simultaneous to b) session layer
d) with no link to c) presentation layer
d) physical layer
Answer: a
O
Explanation: Several TCP/IP prototypes Answer: a
were developed at multiple research centers Explanation: In networking, a user mainly
SP
between 1978 and 1983, whereas OSI interacts with application layer to create and
reference model was developed in the year send information to other computer or
1984. TCP/IP was developed with the network. Application layer provides the
intention to create a model for the Internet interface between applications and the
G
while OSI was intended to be a general network. It is the top-most layer in both the
network model. TCP/IP and the OSI model.
LO
7. Which layer is responsible for process to 10. Transmission data rate is decided by
process delivery in a general network model? ____________
a) network layer a) network layer
b) transport layer b) physical layer
.B
Answer: b Answer: b
17
layer is TCP and UDP. The transport layer is speed is determined by the cables and
responsible for segmentation of the data. It connectors used. Hence it is physical layer
uses ports for the implementation of process- that determines the transmission speed in
SE
M
testing? Answer: c
a) Finding broken code Explanation: Maintenance Testing is done on
b) Evaluating deliverable to find errors the already deployed software. The deployed
O
c) A stage of all projects software needs to be enhanced, changed or
d) None of the mentioned migrated to other hardware. The Testing done
C
during this enhancement, change and
Answer: b migration cycle is known as maintenance
Explanation: Software testing is the process
T.
testing.
of evaluation a software item to detect
differences between given input and expected 5. White Box techniques are also classified as
output. a) Design based testing
O
b) Structural testing
2. What is Cyclomatic complexity? c) Error guessing technique
SP
a) Black box testing d) None of the mentioned
b) White box testing
c) Yellow box testing Answer: b
d) Green box testing Explanation: The structural testing is the
G
testing of the structure of the system or
Answer: b component. Structural testing is often referred
Explanation: Cyclomatic complexity to as ‘white box’ or ‘glass box’ or ‘clear-box
LO
measures the amount of decision logic in the testing’ because in structural testing we are
program module.Cyclomatic complexity interested in what is happening ‘inside the
gives the minimum number of paths that can system/application’.
generate all possible paths through the
module.
.B
6. Exhaustive testing is
a) always possible
3. Lower and upper limits are present in b) practically possible
which chart? c) impractical but possible
17
manual testing.
process or system. Run charts graphically testing .
display cycles, trends, shifts, or non-random
patterns in behavior over time. It contains 7. Which of the following is/are White box
lower and upper limits. technique?
C
a) Statement Testing
4. Maintenance testing is performed using b) Decision Testing
which methodology?
c) Condition Coverage
TOPIC 3.10 RISK
d) All of the mentioned
IDENTIFICATION
Answer: d
Explanation: Statement testing, decision 1. What is the main purpose of hazard
M
testing, condition coverage all of them uses identification?
white box technique. a) To minimise the effect of a consequence
O
b) For better risk management
8. What are the various Testing Levels? c) To characterize adverse effect of toxins
a) Unit Testing d) To reduce probability of occurrence
C
b) System Testing
c) Integration Testing Answer: c
T.
d) All of the mentioned Explanation: Hazard identification is the first
step in risk assessment. The goal is to
Answer: d understand the concentration of toxins, spatial
Explanation: Unit, system, integration testing distribution and there movement.
O
all of them are levels in testing.
2. The ____________ process determines
SP
9. Boundary value analysis belong to? whether exposure to a chemical can increase
a) White Box Testing the incidence of adverse health effect.
b) Black Box Testing a) Hazard identification
c) White Box & Black Box Testing b) Exposure assessment
d) None of the mentioned
G
c) Toxicity assessment
d) Risk characterization
Answer: b
LO
10. Alpha testing is done at 3. Which of the following data is not required
a) Developer’s end for hazard identification?
b) User’s end a) Land use
17
M
5. Why does site history have to be Answer: a
considered for hazard identification? Explanation: An incident is called hazardous
a) To estimate the risk only when the contaminant poses threat to
O
b) To calculate carcinogenic exposure humans and ecological systems which may
c) To know the probable source and causes of results in catastrophic.
C
contamination on site
d) For determination of remedial actions 9. The purpose of risk management is to
T.
identify potential problems before they occur
Answer: c so that risk-handling activities may be
Explanation: Site history provides precise planned.
information about the activities that had been a) False
O
carried on the area. Most of the instance b) True
contamination is due to past activities on site.
SP
Answer: b
6. What is the main objective of risk Explanation: The main goal of risk
assessment? management is to reduce the threats from an
a) To evaluate hazard and minimize the risks activity so that harm to the surrounding is
G
b) Remediation of contaminated sites minimized.
c) Hazard management
d) To know source of pollutants 10. Hazard identification mainly focus on
LO
______________
Answer: a a) Chemical source and concentration
Explanation: Risk assessment helps to b) Chemical exposure
understand possible problems and provides c) Chemical analysis
.B
M
information about the activities that had been
2. The ____________ process determines carried on the area. Most of the instance
whether exposure to a chemical can increase contamination is due to past activities on site.
O
the incidence of adverse health effect.
a) Hazard identification 6. What is the main objective of risk
C
b) Exposure assessment assessment?
c) Toxicity assessment a) To evaluate hazard and minimize the risks
T.
d) Risk characterization b) Remediation of contaminated sites
c) Hazard management
Answer: a d) To know source of pollutants
Explanation: Hazard identification traces the
O
path of the toxins and also determines the Answer: a
likelihood of occurrence in humans. Explanation: Risk assessment helps to
SP
understand possible problems and provides
3. Which of the following data is not required alternatives as well as control measures to
for hazard identification? reduce the accident.
a) Land use
7. What is the first stage of risk assessment?
G
b) Contaminant levels
c) Affected population a) Exposure assessment
d) Estimation of risk b) Hazard identification
LO
c) Toxicity study
Answer: d d) Risk characterization
Explanation: Estimation of risk is done at
risk characterization whereas land use, Answer: b
Explanation: Hazard identification is the first
.B
9. The purpose of risk management is to 2. Which of the following risk is the failure of
identify potential problems before they occur a purchased component to perform as
so that risk-handling activities may be expected?
planned. a) Product risk
a) False b) Project risk
M
b) True c) Business risk
d) Programming risk
Answer: b
O
Explanation: The main goal of risk Answer: a
management is to reduce the threats from an Explanation: Risks that affect the quality or
C
activity so that harm to the surrounding is performance of the software being developed.
minimized.
T.
3. Which of the following term is best defined
10. Hazard identification mainly focus on by the statement: “There will be a change of
______________ organizational management with different
a) Chemical source and concentration priorities.”?
O
b) Chemical exposure a) Staff turnover
c) Chemical analysis b) Technology change
SP
d) Chemical pathway c) Management change
d) Product competition
Answer: a
Explanation: The main aim of hazard Answer: c
G
identification is to identify chemical source, Explanation: None.
concentration and its movement in
environment. 4. Which of the following term is best defined
LO
c) Production team
d) Project manager 5. What assess the risk and your plans for risk
mitigation and revise these when you learn
more about the risk?
SE
Answer: d
Explanation: Risk management involves a) Risk monitoring
anticipating risks that might affect the project b) Risk planning
schedule or the quality of the software being c) Risk analysis
developed, and then taking action to avoid d) Risk identification
C
these risks.
Answer: a
Explanation: None.
6. Which of the following risks are derived 10. Risk management is now recognized as
from the organizational environment where one of the most important project
the software is being developed? management tasks.
a) People risks a) True
b) Technology risks b) False
M
c) Estimation risks
d) Organizational risks Answer: a
Explanation: None.
O
Answer: d
Explanation: These risks are at management .
C
level.
TOPIC 3.14 PERT TECHNIQUE
T.
7. Which of the following risks are derived
from the software or hardware technologies
that are used to develop the system? 1. Which of the following is not a phase of
a) Managerial risks project management?
O
b) Technology risks a) Project planning
c) Estimation risks b) Project scheduling
SP
d) Organizational risks c) Project controlling
d) Project being
Answer: b
Explanation: The risks associated with Answer: d
Explanation: There are three phases of
G
technology might affect the product
development. project management. These are project
planning, project scheduling and project
LO
8. Which of the following term is best defined controlling. Project management refers to a
by the statement: “Derive traceability highly specialised job to achieve the
information to maximize information hiding objectives of a project.
in the design.”?
2. Who introduced the bar charts?
.B
d) Joseph henry
Answer: c
Explanation: Tracing the requirements can Answer: b
help us understand the risk. Explanation: Henry Gantt introduced the bar
-R
b) Minimization strategies
c) Contingency plans 3. Bar charts were modified later to obtain the
d) All of the mentioned milestone charts.
a) True
C
Answer: b b) False
Explanation: None.
M
milestone charts. a) True
b) False
4. The full form of PERT is ___________
O
a) Program Evaluation and Rate Technology Answer: b
b) Program Evaluation and Robot Technique Explanation: A CPM network is activity-
C
c) Program Evaluation and Robot Technology oriented while a PERT network is event-
d) Program Evaluation and Review oriented. Event is the completion of an
T.
Technique activity or the commencement of an activity.
An event may be head event, tail event or
Answer: d dual role event.
Explanation: There are various network
O
techniques that are called by various names 8. _________ are used to represent activity in
like PERT, CPM, TOPS and LESS. Network a network diagram.
SP
technique is one of the major advancements a) Circles
in management science. The full form of b) Squares
PERT is Program Evaluation and Review c) Rectangles
Technique. d) Arrows
G
5. The full form of CPM is ___________ Answer: d
a) Critical Path Method Explanation: A network is a flow diagram
LO
c) Blue
d) Green estimates made by PERT planners. These are
the optimistic time estimate, the pessimistic
Answer: d time estimate and the most likely time
Explanation: In bar charts, different colours estimate. The shortest possible time in which
C
are sometimes filled in the bars for showing an activity can be achieved under ideal
various control information. For actual circumstances is known as the optimistic time
progress, green colour is used. For anticipated estimate.
10. According to the time estimates made by 1. A randomized algorithm uses random bits
the PERT planners, the maximum time that as input inorder to achieve a _____________
would be needed to complete an activity is good performance over all possible choice of
called as __________ random bits.
a) The most likely time estimate a) worst case
M
b) Optimistic time estimate b) best case
c) Pessimistic time estimate c) average case
O
d) Expected time estimate d) none of the mentioned
Answer: c Answer: c
C
Explanation: According to the time estimates Explanation: A randomized algorithm is an
made by the PERT planners, the maximum algorithm that employs a degree of
T.
time that would be needed to complete an randomness as a part of its logic using
activity is called the pessimistic time random bits as inputs and in hope of
estimate. This estimate does not include producing average case good performace.
possible effects of floods, earthquakes, etc.
O
2. Which of the following options match the
11. In a network, a critical path is the time- given statement:
SP
wise shortest path. Statement: The algorithms that use the
a) True random input to reduce the expected running
b) False time or memory usage, but always terminate
with a correct result in a bounded amount of
G
Answer: b time.
Explanation: In a network, a critical path is a) Las Vegas Algorithm
the time-wise longest path. The critical path b) Monte Carlo Algorithm
LO
time available and the actual time needed to Explanation: The other type of algorithms
perform an activity is known as _________ are probabalistic algorithms, which
a) Free float depending upon the random input, have a
b) Independent float chance of producing incorrect results or fail
17
total float. Hence, the total float is the excess d) All of the mentioned
of the maximum available time throughout
the time of the activity. Answer: d
Explanation: Monte Carlo algorithms are
very vast, but only probably correct. On thr
C
TOPIC 3.15 MONTE CARLO other side, Las Vegas algorithms are always
SIMULATION correct, but probably fast.
M
d) All of the mentioned probalistic distribution.
O
Explanation: The atlantic city algorithms probability of finding after k iterations:
which are bounded polynomial time
C
algorithms are probably correct and probably find_a(array A, n, k)
fast. It is correct more than 75% of the times. begin
T.
5. Prisonner’s dilemma can be related to the i=0
following:
a) cooperative behaviour repeat
O
b) graph theory
Randomly select one element out
c) Both (a) and (b)
SP
d) None of the mentioned i=i+1
punishment. b) (1-(1/3))k
c) 1-(1/2)k
6. Unix sort command uses _________ as its d) None of the mentioned
sorting technique.
.B
10. Which of the following can be referred to 3. In _________ the embedded devices and
as applications of Randomized algorithm? objects working under IoT are resource
a) Quicksort constrained.
b) Min Cut a) Health
c) Verifying Matrix Multiplication b) Industry
M
d) All of the mentioned c) Home
d) Information system
Answer: d
O
Explanation: Freivalds algorithm is a Answer: d
probabalistic randomized algorithm we use to Explanation: In the information system the
C
verify matrix multiplication. On the other embedded devices and objects working under
hand, Randomness can be useful in quicksort. IoT implementation are resource constrained.
T.
If the algorithm selects pivot element
uniformaly at random, it has a probably high 4. What type of networks is interacting under
probabilty of finishing the work in O(nlogn) IoT?
time regardless of the input. a) Heterogeneous only
O
b) Homogeneous Only
c) Both hetero and homogeneous
TOPIC 3.16 RESOURCE
SP
d) Neither hetero nor Homo
ALLOCATION
Answer: a
1. What is the popular method of organizing Explanation: Due to the huge number of
G
wireless network topologies? heterogeneous network elements interacting
a) Software and working under IoT based information
b) Synchronization systems, there is an enormous need for
LO
M
is to solicit the efforts and ongoing research application of IoT?
work in the domain of resource management a) Role of green IoT system
in IoT. b) QoS in communication
O
c) Secure communication
7. Resource management will elaborate the d) Multimedia communication
C
key aspects of _________
a) Industrial management Answer: a
T.
b) Energy management Explanation: Future applications of IoT:
c) Network management –> IoT based information system for Ambient
d) Information management living
–> Cyber Physical System in IoT
O
Answer: c –> Role of Green IoT system
Explanation: Resource management will –> Fog computing.
SP
elaborate the key aspects of energy
management, communication protocols and 11. The object of IoT will be empowered by
future applications of IoT for information ___________
systems. a) Network
G
b) Cloud
8. Resource management includes c) Devices
___________ d) Connectivity
LO
a) IoT Devices
b) IoT Cloud Answer: c
c) IoT Networks Explanation: The objects of the Internet of
d) IoT Web Things will be empowered by embedded
.B
M
Synchronization techniques
Answer: b
Answer: d Explanation: In architectural design you
O
Explanation: The use of Cluster, Software design a system organization satisfying the
agent, and Synchronization techniques in functional and non-functional requirements of
C
order to overcome the challenges of a system.
managing the resources of the Internet of
T.
Things objects. 2. A ________ view shows the system
hardware and how software components are
14. Which will reduce the energy distributed across the processors in the
expenditure? system.
O
a) Clustering a) physical
b) Software agents b) logical
SP
c) Synchronization techniques c) process
d) Cluster, Software agent, and d) all of the mentioned
Synchronization techniques
Answer: a
G
Answer: a Explanation: A physical view is
Explanation: Clustering will be beneficial to implemented by system engineers
reduce the energy expenditure and improve implementing the system hardware.
LO
Answer: b Answer: d
Explanation: Synchronization techniques Explanation: The UML was designed for
will be necessary to address the various describing object-oriented systems and, at the
-R
challenges of harmonising plenty of copies of architectural design stage, you often want to
object data with potentially partially describe systems at a higher level of
disconnected Internet of Things architecture abstraction.
SE
components.
4. Which of the following view shows that
the system is composed of interacting
TOPIC 3.17 CREATION OF processes at run time?
CRITICAL PATHS, COST a) physical
C
SCHEDULES. b) development
c) logical
d) process
M
c) model-view-controller
5. Which of the following is an architectural d) different operating system
conflict?
O
a) Using large-grain components improves Answer: c
performance but reduces maintainability Explanation: Model-View-Controller pattern
C
b) Introducing redundant data improves is the basis of interaction management in
availability but makes security more difficult many web-based systems.
T.
c) Localizing safety-related features usually
means more communication so degraded 9. What describes how a set of interacting
performance components can share data?
d) All of the mentioned a) model-view-controller
O
b) architecture pattern
Answer: d c) repository pattern
SP
Explanation: High availability architecture d) none of the mentioned
can be affected by several design factors that
are required to be maintained to ensure that Answer: c
no single points of failure exist in such Explanation: The majority of systems that
G
design. use large amounts of data are organized
around a shared database or repository.
6. Which of the following is not included in
LO
M
develop estimates of the information domain
characteristics?
a) Function point sizing
O
UNIT IV PROJECT b) Change sizing
MANAGEMENT AND c) Standard component sizing
C
d) Fuzzy logic sizing
CONTROL
T.
Answer: a
Explanation: None.
TOPIC 4.1 FRAMEWORK FOR
MANAGEMENT AND CONTROL 5. The expected value for the estimation
O
variable (size), S, can be computed as a
1. Why is decomposition technique required? weighted average of the optimistic(Sopt),
SP
a) Software project estimation is a form of most likely (Sm), and pessimistic (Spess)
problem solving estimates given as
b) Developing a cost and effort estimate for a a) EV = (Sopt + 4Sm + Spess)/4
software project is too complex b) EV = (Sopt + 4Sm + Spess)/6
G
c) All of the mentioned c) EV = (Sopt + 2Sm + Spess)/6
d) None of the mentioned d) EV = (Sopt + 2Sm + Spess)/4
LO
Answer: c Answer: b
Explanation: For these reasons, we Explanation: This assumes that there is a
decompose the problem, re-characterizing it very small probability that the actual size
as a set of smaller problems. result will fall outside the optimistic or
.B
pessimistic values.
2. Cost and effort estimation of a software
uses only one forms of decomposition, either 6. How many forms exists of Barry Boehm’s
COCOMO Model?
17
Answer: b
Answer: b
Explanation: Estimation uses one or both
forms of partitioning. Explanation: The three forms include the
basic, intermediate and advanced COCOMO
SE
c) Boehm Answer: b
d) Putnam and Myers Explanation: The planner must determine the
cause of divergence and then reconcile the
Answer: d estimates.
Explanation: None.
M
12. Programming language experience is a
8. In many cases, it is often more cost- part of which factor of COCOMO cost
effective to acquire, rather than develop, drivers?
O
computer software. a) Personnel Factor
a) True b) Product Factor
C
b) False c) Platform Factor
d) Project Factor
Answer: a
T.
Explanation: Managers are faced with a Answer: a
make-buy decision in such situations. Explanation: None.
O
9. A make-buy decision is based on whether 13. If an Indirect approach is taken, then the
a) The software may be purchased off-the- sizing approach is represented as
SP
shelf a) LOC
b) “Full-experience” or “Partial-experience” b) FP
software components should be used c) Fuzzy Logic
c) Customer-built software should be d) LOC and FP
developed
G
d) All of the mentioned Answer: b
Explanation: A function point (FP) is a unit
LO
Explanation: External inputs, external process, and events that occur as software
outputs, external inquiries, internal logical evolves from a preliminary concept to an
files, external interface files are the five operational implementation.
domains.
SE
a) True
b) False
11. The project planner must reconcile the
estimates based on decomposition techniques Answer: a
to produce a single estimate of effort. Explanation: None.
C
a) True
b) False 2. Which of the following is not an effective
software project management focus?
a) people Answer: c
b) product Explanation: A small number of framework
c) popularity activities are applicable to all software
d) process projects, regardless of their size or
complexity.
M
Answer: c
Explanation: Effective software project 6. Who defines the business issues that often
management focuses on the four P’s: people, have significant influence on the project?
O
product, process, and project. a) Practitioners
b) Project managers
C
3. PM-CMM stands for c) Senior managers
a) people management capability maturity d) None of the mentioned
T.
model
b) process management capability maturity Answer: c
model Explanation: None.
c) product management capability maturity
O
model 7. Who delivers the technical skills that are
d) project management capability maturity necessary to engineer a product or an
SP
model application?
a) Practitioners
Answer: a b) Project managers
Explanation: The people management c) Senior managers
G
maturity model defines the following key d) None of the mentioned
practice areas for software people: recruiting,
selection, performance management, training, Answer: a
LO
framework from which a comprehensive plan problems but may not perform as efficiently
for software development can be established. as other teams.
a) people
b) product 9. Which of the following is a people-
C
M
practitioners often make poor team leaders. d) Senior managers
10. Which paradigm structures a team loosely Answer: a
O
and depends on individual initiative of the Explanation: A product is always built to
team members? satisfy an end-user.
C
a) random paradigm
b) open paradigm 3. Which of the following is not an effective
T.
c) closed paradigm project manager trait?
d) synchronous paradigm a) Problem solving
b) Managerial identity
Answer: d c) Influence and team building
O
Explanation: None. d) None of the mentioned
SP
11. Which of the following is not an approach Answer: d
to software cost estimation? Explanation: All are key traits of an effective
a) Empirical project manager.
b) Heuristic
c) Analytical 4. Which type of software engineering team
G
d) Critical has a defined leader who coordinates specific
tasks and secondary leaders that have
LO
6. Which software engineering team has no the functionality that must be delivered and
permanent leader? the process that will be used to deliver it.
a) Controlled decentralized (CD)
b) Democratic decentralized (DD) 10. Which of the following is not a sign that
c) Controlled Centralized (CC) indicates that an information systems project
M
d) None of the mentioned is in jeopardy?
a) Software people don’t understand their
Answer: b customers needs
O
Explanation: Here Communication among b) Changes are managed poorly
team members is horizontal. c) Sponsorship is gained
C
d) Users are resistant
7. Which of the following is not a project
T.
factor that should be considered when Answer: c
planning the structure of software engineering Explanation: Other options are contradictory
teams? to the question.
a) The difficulty of the problem to be solved
O
b) High frustration caused by personal, 11. SPMP stands for
business, or technological factors that causes a) Software Project Manager’s Plan
SP
friction among team members b) Software Project Management Plan
c) The degree of sociability required for the c) Software Product Management Plan
project d) Software Product Manager’s Plan
d) The rigidity of the delivery date
Answer: b
G
Answer: c Explanation: After planning is complete,
Explanation: Development is irrelevant of documenting of the plans is done in a
LO
a) Formal approaches
b) Formal, interpersonal procedures TOPIC 4.4 COST MONITORING
c) Informal, interpersonal procedures
d) All of the mentioned
17
Explanation: During the scoping activity management concept that helps us to control
decomposition is applied in two major areas: change without seriously impeding justifiable
change?
a) Baselines c) Baseline
b) Source code d) None of the mentioned
c) Data model
d) None of the mentioned Answer: a
Explanation: None.
M
Answer: a
Explanation: A baseline is analogous to the 6. Which of the following is the process of
kitchen doors in the restaurant. Before a assembling program components, data, and
O
software configuration item becomes a libraries, and then compiling and linking
baseline, change may be made quickly and these to create an executable system?
C
informally. a) System building
b) Release management
T.
3. Software Configuration Management can c) Change management
be administered in several ways. These d) Version management
include
a) A single software configuration Answer: a
O
management team for the whole organization Explanation: None.
b) A separate configuration management
SP
team for each project 7. Which of the following option is not
c) Software Configuration Management tracked by configuration management tools?
distributed among the project members a) Tracking of change proposals
d) All of the mentioned b) Storing versions of system components
c) Tracking the releases of system versions to
G
Answer: a customers
Explanation: None d) None of the mentioned
LO
process?
a) Change control Configuration Management Activity?
b) Version control a) Configuration item identification
c) SCIs b) Risk management
17
5. What complements the formal technical management standards is essential for quality
review by assessing a configuration object for certification in
characteristics that are generally not a) ISO 9000
considered during review? b) CMM
C
M
external release and keeping track of the a) Version and release identification
system versions that have been released for b) Build script generation
customer use? c) Project support
O
a) System building d) Change history recording
b) Release management
C
c) Change management Answer: b
d) Version management Explanation: All other options are a part of
T.
version management.
Answer: b
Explanation: None. 4. Which method recommends that very
frequent system builds should be carried out
O
. with automated testing to discover software
problems?
SP
a) Agile method
TOPIC 4.5 EARNED VALUE b) Parallel compilation method
ANALYSIS c) Large systems method
d) All of the mentioned
G
1. Which of the following process ensures
that versions of systems and components are Answer: a
recorded and maintained? Explanation: In keeping with the agile
LO
b) Version management
c) System building systems usually provide storage management
d) Release management facilities.
M
means that the versions of the components d) Mainline
making up the system cannot be changed.
Answer: a
O
7. Which of the following is a configuration Explanation: The code may then be
item? developed independently.
C
a) Design & Test specification
b) Source code .
T.
c) Log information
d) All of the mentioned
TOPIC 4.6 PRIORITIZING
Answer: d MONITORING
O
Explanation: A configuration item is an
approved and accepted deliverable, changes 1. “Robustness” answers which of the
SP
have to be made through formal procedure. following description?
a) CASE tools be used to support the process
8. Which of the following is a part of system activities
release? b) Process errors are avoided or trapped
a) electronic and paper documentation
G
before they result in product errors
describing the system c) Defined process is acceptable and usable
b) packaging and associated publicity that by the engineers responsible for producing
LO
Answer: d
Answer: d Explanation: None.
Explanation: Release creation is the process
of creating the collection of files and 2. Process improvement is the set of
17
documentation that includes all of the activities, methods, and transformations that
components of the system release. developers use to develop and maintain
information systems.
9. A sequence of baselines representing a) True
-R
M
problems Explanation: Process models may be
presented from different perspectives.
Answer: a
O
Explanation: None. 8. It is always best to start process analysis
with a new test model.
C
4. How many stages are there in process a) True
improvement? b) False
T.
a) three
b) four Answer: b
c) five Explanation: It is always best to start process
d) six analysis with an existing model. People then
O
may extend and change this.
Answer: a
SP
Explanation: Process measurement, analysis 9. What is a tangible output of an activity that
and change are the three stages. is predicted in a project plan?
a) Deliverable
5. In which stage of process improvement b) Activity
bottlenecks and weaknesses are identified? c) Condition
G
a) Process measurement d) Process
b) Process analysis
LO
M
process completion rather than changing it. Answer: b
Explanation: Risk management involves
12. The Capability Maturity Model (CMM) is anticipating risks that might affect the project
O
a continuous model. schedule or the quality of the software being
a) True developed, and then taking action to avoid
C
b) False these risks.
Answer: b
T.
3. Which of the following is not considered as
Explanation: The CMM is discrete rather a risk in project management?
than continuous. a) Specification delays
b) Product competition
O
13. The CMMI assessment is based on a x- c) Testing
point scale. What is the value of x? d) Staff turnover
SP
a) 0
b) 2 Answer: c
c) 4 Explanation: Testing is a part of project, thus
d) 6 it can’t be categorized as risk.
G
Answer: d 4. The process each manager follows during
Explanation: Not performed, performed, the life of a project is known as
LO
M
b) hardware and software costs Explanation: The current process is assessed,
c) effort costs (the costs of paying software and process weaknesses and bottlenecks are
identified.
O
engineers and managers)
d) all of the mentioned
10. An independent relationship must exist
C
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
T.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
total cost of activities.
Answer: b
O
7. Quality planning is the process of Explanation: The value of the quality
developing a quality plan for attribute must be related, in some way, to the
SP
a) team value of the attribute than can be measured.
b) project
c) customers .
d) project manager
G
TOPIC 4.8 CHANGE CONTROL
Answer: b
Explanation: The quality plan should set out
LO
3. Which of the following is not a main phase 8. What is one or more software configuration
in Configuration Management (CM) Process? items that have been formally reviewed and
a) CM Planning agreed upon and serve as a basis for further
b) Executing the CM process development?
c) CM audits a) Baseline
M
d) None of the mentioned b) Cumulative changes
c) CM
Answer: d
O
d) Change Control
Explanation: All are main phases of CM.
Answer: a
C
4. CM is about managing the different items Explanation: In configuration management, a
in the product, and changes in them. “baseline” is an agreed-to description of the
T.
a) True attributes of a product, at a point in time,
b) False which serves as a basis for defining change.
O
Explanation: None. a) By reviews
b) By inspections
SP
5. What allows different projects to use the c) By testing of code
same source files at the same time? d) All of the mentioned
a) Version Control
b) Access control Answer: c
c) CM Process
G
Explanation: Testing verifies the agreed-to
d) Version Control and Access control description.
LO
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
c) Review impact with stakeholders
d) None of the mentioned 11. SCM controls only the products of the
development process.
-R
Answer: d a) True
Explanation: All are required for a change. b) False
7. Configuration management (CM) is needed Answer: a
SE
M
a) Reasons for making the changes b) A separate configuration management
b) A description of the proposed changes team for each project
c) List of other items affected by the changes
O
c) Software Configuration Management
d) All of the mentioned distributed among the project members
d) All of the mentioned
C
Answer: d
Explanation: A baseline is an agreed-to Answer: a
T.
description of the product, changes require Explanation: None
multiple reasons..
4. What combines procedures and tools to
. manage different versions of configuration
O
objects that are created during the software
TOPIC 4.9 SOFTWARE process?
SP
a) Change control
CONFIGURATION b) Version control
MANAGEMENT c) SCIs
d) None of the mentioned
G
1. Which of the following categories is part of
the output of software process? Answer: b
a) computer programs Explanation: Configuration management
LO
a) Baselines
b) Source code Answer: a
c) Data model Explanation: None.
SE
Answer: a .
Explanation: None.
M
7. Which of the following option is not TOPIC 4.10 MANAGING
tracked by configuration management tools? CONTRACTS - CONTRACT
O
a) Tracking of change proposals MANAGEMENT.
b) Storing versions of system components
C
c) Tracking the releases of system versions to 1. A voluntary arrangement between two or
customers more parties that is enforceable by law as a
T.
d) None of the mentioned binding legal agreement is known as
__________
Answer: d
a) job
Explanation: All the options are tracked.
O
b) loan
8. Which of the following is not a Software c) contract
d) mutual fund
SP
Configuration Management Activity?
a) Configuration item identification
Answer: c
b) Risk management
Explanation: A contract arises when the
c) Release management
parties agree that there is an agreement.
d) Branch management
G
Formation of a contract generally requires an
Answer: b offer, acceptance, consideration, and a mutual
LO
Avery where Lord Denning MR held that the 5. Which tender allows anyone to submit a
contract can only be voided if the plaintiff can tender to supply the goods or services that are
show that, at the time of agreement, the required?
plaintiff believed the other party’s identity a) Framework tendering
was of vital importance. A mere mistaken b) Selective tendering
M
belief as to the credibility of the other party is c) Open tendering
not sufficient. d) Close tendering
O
3. _______________ contract is one that has Answer: c
automatic renewals until one party requests Explanation: On larger projects, there may
C
termination. then be a pre-qualification process that
a) Uniform produces a short-list of suitable suppliers who
T.
b) Evergreen will be invited to prepare tenders. This sort of
c) Moderate pre-qualification process is not the same as
d) On-demand selective tendering.
Open tendering has been criticised for
O
Answer: b attracting tenders / expressions of interest
Explanation: If these are left unattended, from large numbers of suppliers, some of
SP
they can have significant cost impacts with whom may be entirely unsuitable for the
little value. If these agreements won’t work contract and as a result it can waste a great
for the company, the clauses stating the deal of time, effort and money. However,
contract automatically renews should be open tendering offers the greatest competition
G
removed. If the clause makes sense or cannot and has the advantage of allowing new or
be taken out, alerts can still be set in a emerging suppliers to try to secure work.
contract management platform as a reminder.
LO
d) Serial tendering
Answer: a
Explanation: Electronic signatures, or e- Answer: d
Signatures, have become crucial for Explanation: The rates submitted can then be
businesses as they seek to increase the speed used to value works over a series of similar
-R
of time-to-signature, e-Signatures are legally projects, often for a fixed period of time
binding and have the same legal status as a following which the tendering procedure may
written signature, as long as it fulfills the be repeated. Serial tendering can reduce
SE
requirements of the regulation it was created tender costs, and may encourage suppliers to
under. submit low rates to secure an ongoing
A contract management platform should program of work.
include the ability to integrate with an e-
Signature software, or include e-Signatures as 7. _______________ tendering is used when
C
M
Answer: a
Explanation: Single-stage tendering is the 9. Mutual mistake occurs when both parties
more traditional route, used when all the of a contract are mistaken as to the terms.
O
information necessary to calculate a realistic a) False
price is available when tendering commences: b) True
C
• An invitation to tender is issued to
prospective suppliers (perhaps following Answer: b
T.
completion of a pre-qualification Explanation: Each believes they are
questionnaire and/or a pre-tender interview). contracting to something different. Courts
The invitation to tender will include usually try to uphold such mistakes if a
information describing the goods or services reasonable interpretation of the terms can be
O
required in sufficient detail to enable found. However, a contract based on a mutual
prospective suppliers to prepare an accurate mistake in judgment does not cause the
SP
tender. contract to be voidable by the party that is
• Tenders are prepared and returned by adversely affected.
prospective suppliers (this may involve
questions and answers and a mid-tender 10. In Schedule contract the contractor
G
interview to clarify the client’s requirements). undertakes the execution or construction of
• Submitted tenders are then assessed and specific work with all its contingencies, to
compared (this may involve further complete it in all respect within a specified
LO
a) Holiday packages
b) Preliminarie contingencies, to complete it in all respect
c) A letter of invitation to tender within a specified time for a fixed amount. In
d) Design drawing this an owner agrees to pay a contractor a
specified lump sum after the completion of
-R
M
a) True framework from which a comprehensive plan
b) False for software development can be established.
a) people
O
Answer: a b) product
Explanation: None. c) process
C
d) none of the mentioned
2. Which of the following is not an effective
T.
software project management focus? Answer: c
a) people Explanation: A small number of framework
b) product activities are applicable to all software
c) popularity projects, regardless of their size or
O
d) process complexity.
SP
Answer: c 6. Who defines the business issues that often
Explanation: Effective software project have significant influence on the project?
management focuses on the four P’s: people, a) Practitioners
product, process, and project. b) Project managers
G
c) Senior managers
3. PM-CMM stands for d) None of the mentioned
a) people management capability maturity
LO
model Answer: c
b) process management capability maturity Explanation: None.
model
c) product management capability maturity 7. Who delivers the technical skills that are
necessary to engineer a product or an
.B
model
d) project management capability maturity application?
model a) Practitioners
b) Project managers
17
team/culture development.
some of the controls associated with the
4. Which of the following is not a project closed paradigm but also much of the
manager’s activity? innovation that occurs when using the random
a) project control paradigm?
C
M
are well suited to the solution of complex
problems but may not perform as efficiently
as other teams. TOPIC 5.4 MOTIVATION
O
9. Which of the following is a people- 1. Interviews are conversations with _______
C
intensive activity? a) fun
a) Problem solving b) purpose
T.
b) Organization c) friendliness
c) Motivation d) informality
d) Project management
Answer: b
O
Answer: d Explanation: The correct statement is:
Explanation: For this reason, competent Interviews are conversations with purpose.
SP
practitioners often make poor team leaders. For the employer the purpose is to determine
the most suitable person for the job.
10. Which paradigm structures a team loosely
and depends on individual initiative of the 2. A job interview is a formal meeting
team members?
G
between a job seeker and an employer.
a) random paradigm a) True
b) open paradigm b) False
LO
c) closed paradigm
d) synchronous paradigm Answer: a
Explanation: The statement is true. Interview
Answer: d is a formal face-to-face meeting. A job
Explanation: None.
.B
a) Empirical a) True
b) Heuristic b) False
c) Analytical
d) Critical Answer: a
-R
c) Music interview
BEHAVIOR d) Lunch interview
M
video interview and sequential interview. d) The audition
O
in which the employability of the job Explanation: For some positions such as
applicant is evaluated? computer programmers or trainers, companies
C
a) Stress interview want to see you in action before they make
b) Screening interview their decision. Here, the audition type is
T.
c) Group interview adapted.
d) Behavioural interview
9. In which of these, more than one candidate
Answer: b is interviewed?
O
Explanation: In the screening interview, a) The behavioural interview
companies use screening tools to ensure that b) The stress interview
SP
candidates meet minimum qualification c) The group interview
requirements. d) The audition
Explanation: There are two styles used in a 10. Which of these interviews is taken for a
screening interview. They are: the directive candidate far away?
style and the meandering style. a) Lunch interview
b) Telephone
17
M
TOPIC 5.6 STRESS , HEALTH Answer: a
AND SAFETY Explanation: Factor of safety tells us about
how much load the material can take before it
O
1. Which of the following is the numerator of fails. Basically, it states the load carrying
factor safety formula? capacity of a material beyond the actual load.
C
a) Working stress
b) Shear stress 5. What can understand by the factor of safety
T.
c) Tensile stress equal to one?
d) Ultimate stress a) It means that the structure will fail under
load
Answer: d b) It means that the structure will only
O
Explanation: Factor of safety is defined as support the actual load
ratio of ultimate stress and working stress. It c) it means that the structure will support
SP
is also called as factor of ignorance. The more than the actual load
factor of safety is dependent on the type of d) There is no relation between factor safety
load. and load application
G
2. Which of the following can be the factor of Answer: b
safety for a dead load? Explanation: When the factor of safety is one
a) 6 it means that the ultimate stress is equal to the
LO
d) 7
7. What is a safe factor of failure for a
Answer: b component which on failure can result in
Explanation: For shock loading, the range in financial loss or serious injury?
which the factor of safety can lie is 12 to 15. a) 1
C
M
more than 4.
3. Explain what is meant by PRODUCT with
8. Design factor for most aircraft structures is reference to one of the eight principles as per
O
2. the ACM/IEEE Code of Ethics ?
a) True a) The product should be easy to use
C
b) False b) Software engineers shall ensure that their
products and related modifications meet the
T.
Answer: b highest professional standards possible
Explanation: The design factor of safety for c) Software engineers shall ensure that their
most aircraft structures or components is products and related modifications satisfy the
taken to be 1.5 and not 2. More factors affect client
O
this value, but it is most of the time taken as d) It means that the product designed /created
1.5. should be easily available
SP
Answer: b
TOPIC 5.7 ETHICAL AND Explanation: None.
PROFESSIONAL CONCERNS OF
4. Identify an ethical dilemma from the
G
WORKING IN TEAMS
situations mentioned below:
a) Your employer releases a safety-critical
LO
senior management
property rights
d) All of the mentioned
d) Managing Client Relationships
Answer: a
17
Answer: c
Explanation: None.
Explanation: Engineers should normally
respect the confidentiality of their employers 5. Identify the correct statement: “Software
or clients irrespective of whether or not a engineers shall
-R
formal confidentiality agreement has been a) act in a manner that is in the best interests
signed. of his expertise and favour.”
They should be aware of local laws governing b) act consistently with the public interest.”
the use of intellectual property such as c) ensure that their products only meet the
SE
computers.”Here the term misuse refers to: Explanation: Software engineers shall act in
a) Unauthorized access to computer material a manner that is in the best interests of their
b) Unauthorized modification of computer client and employer consistent with the public
material
interest and shall ensure that their products 9. The reason for software bugs and failures
and related modifications meet the highest is due to
professional standards possible.Thus options a) Software companies
a & c are ruled out. b) Software Developers
c) Both Software companies and Developers
M
6. Select the incorrect statement: “Software d) All of the mentioned
engineers should
a) not knowingly accept work that is outside Answer: c
O
your competence.” Explanation: Software companies are
b) not use your technical skills to misuse responsible for making policies and providing
C
other people’s computers.” working atmosphere for the software
c) be dependent on their colleagues.” development, so in turn these companies
T.
d) maintain integrity and independence in become a part of software development
their professional judgment.” process.Bugs from developers side is no new
thing. Thus option c answers the question.
Answer: c
O
Explanation:None. 10. Company has latest computers and state-
of the- art software tools, so we shouldn’t
SP
7. Efficiency in a software product does not worry about the quality of the product.
include ________ a) True
a) responsiveness b) False
b) licensing
G
c) memory utilization Answer: b
d) processing time Explanation: The infrastructure is only one
of the several factors that determine the
LO
8. As per an IBM report, “31%of the project TOPIC 5.8 DECISION MAKING
get cancelled before they are completed, 53%
overrun their cost estimates by an average of 1. Software Maintenance includes
17
189% and for every 100 projects, there are 94 a) Error corrections
restarts”.What is the reason for these statistics b) Enhancements of capabilities
? c) Deletion of obsolete capabilities
a) Lack of adequate training in software d) All of the mentioned
-R
engineering
b) Lack of software ethics and understanding Answer: d
c) Management issues in the company Explanation: None.
SE
M
3. The modification of the software to match b) three
changes in the ever changing environment, c) four
falls under which category of software
O
d) five
maintenance?
a) Corrective Answer: b
C
b) Adaptive Explanation: The three categories include:
c) Perfective Coverage, Minimization and Safe techniques.
T.
d) Preventive
8. Which selective retest technique selects
Answer: b every test case that causes a modified
Explanation: None. program to produce a different output than its
O
original version?
4. How many phases are there in Taute a) Coverage
SP
Maintenance Model? b) Minimization
a) six c) Safe
b) seven d) Maximization
c) eight
G
d) nine Answer: c
Explanation: Safe techniques do not focus on
Answer: c coverage criteria, instead they select every
LO
b) Precision
Answer: a c) Generality
Explanation: All other options are known as d) Inclusiveness
levels of software testing which further have
-R
M
extent to which a technique chooses test cases d) None of the mentioned
that will cause the modified program to
produce different output than the original Answer: c
O
program, and thereby expose faults caused by Explanation: An implementation exhibits an
modifications. architecture if it conforms to the structural
C
decisions described by the architecture, the
. implementation must be divided into
T.
prescribed components.
TOPIC 5.9 ORGANIZATIONAL 4. Why does architecture dictates
STRUCTURES organizational structure?
O
a) Architecture describes the structure of the
1. Why is Software architecture so important? system being developed which becomes
SP
a) Communication among stakeholders engraved in the development project structure
b) Early Design decisions b) An implementation exhibits an architecture
c) Transferable abstraction of a system if it conforms to the structural decisions
d) All of the mentioned described by the architecture
G
c) Architecture may not describe structure as
Answer: d whole
Explanation: Reasons of the architecture to d) None of the mentioned
LO
M
6. Which of the following is correct for d) All of the mentioned
decisions made at life cycle level?
a) Decisions at all level of like cycle from Answer: a
O
high level design to coding, implementation Explanation: A local change is accomplished
affect system quality by modifying a single component.
C
b) Decisions at all level of like cycle from
high level design to coding, implementation 10. An architecture help in evolutionary
T.
may or may not affect system quality prototyping in which of the following ways?
c) Decisions at all level of like cycle from a) Potential performance problem can be
high level design to coding,implementation identified early in the product’s life cycle
does not affect system quality b) The system is executable early in the
O
d) None of the mentioned product’s life cycle
c) All of the mentioned
SP
Answer: a d) None of the mentioned
Explanation: Decisions at all level of like
cycle from high level design to coding, Answer: c
implementation affect system quality. Explanation: All the mentioned are the valid
G
ways.
7. Is it possible to make quality predictions
about a system based solely on evaluation of 11. Which of the following are software
LO
Answer: a Answer: d
Explanation: Yes it is possible to make Explanation: All of the mentioned are the
17
b) Non Local
c) Architectural d) Calls structure
d) All of the mentioned
Answer: a
Answer: d Explanation: Conceptual structure-describes
C
Explanation: All of the mentioned are true. units as abstraction of system’s functional
requirements.
13. Which structure’s view is orthogonal to as-you-go usage model allows for costs to be
the module and conceptual view? applied to individual accounts directly.
a) Module Structure
b) Process Structure 2. Point out the correct statement.
c) Uses Structure a) Except for tightly managed SaaS cloud
M
d) Data flow providers, the burden of resource
management is still in the hands of the user
Answer: b b) Cloud computing vendors run very reliable
O
Explanation: Process Structure-view is networks
orthogonal to the module and conceptual c) The low barrier to entry cannot be
C
view. accompanied by a low barrier to provisioning
d) All of the mentioned
T.
14. Which structure’s view shows the
mapping of software onto hardware? Answer: b
a) Module Structure Explanation: Often, cloud data is load-
b) Process Structure balanced between virtual systems and
O
c) Physical Structure replicated between sites.
d) Class Structure
SP
3. ________ captive requires that the cloud
Answer: c accommodate multiple compliance regimes.
Explanation: Physical Structure- view shows a) Licensed
the mapping of software onto hardware. b) Policy-based
G
c) Variable
15. Which structure describes units are d) All of the mentioned
programs or module?
LO
b) Compliance
c) Data Privacy
TOPIC 5.10 DISPERSED AND d) All of the mentioned
VIRTUAL TEAMS
-R
Answer: c
1. Which of the following subject area deals Explanation: To ensure data privacy in the
with pay-as-you-go usage model? cloud, additional security methods such as
private encryption, VLANs, firewalls, and
SE
a) Accounting Management
b) Compliance local storage of sensitive data are necessary.
c) Data Privacy
d) All of the mentioned 5. Point out the wrong statement.
a) Large cloud providers with geographically
C
b) Private data centers tend to be located in 9. Cloud ________ are standardized in order
places where the company or unit was to appeal to the majority of its audience.
founded or acquired a) SVAs
c) A network backbone is a very low-capacity b) SLAs
network connection c) SALs
M
d) None of the mentioned d) None of the mentioned
Answer: c Answer: b
O
Explanation: On the Internet, an Internet Explanation: Custom SLAs that allow for
backbone consists of the high-capacity routes multiple data sources are difficult to obtain or
C
and routers that are typically operated by an enforce.
individual service provider such as a
T.
government or commercial entity. 10. ___________ is a function of the
particular enterprise and application in an on-
6. Which of the following captive area deals premises deployment.
with monitoring? a) Vendor lock
O
a) Licensed b) Vendor lock-in
b) Variable but under control c) Vendor lock-ins
SP
c) Low d) None of the mentioned
d) All of the mentioned
Answer: b
Answer: b Explanation: Vendor lock-in for a cloud
G
Explanation: For private systems, any computing solution in a PaaS model is very
monitoring system the organization wishes to high.
deploy can be brought to bear.
LO
b) small
c) big TOPIC 5.12 COMMUNICATION
d) all of the mentioned PLANS
17
Answer: a
c) tenants Explanation: Noise is the external sounds
d) all of the mentioned present in the channels of communication,
which results in the reduction of the audibility
Answer: c or omission of some words from the message.
C
M
Answer: b reduction exercise.
Explanation: Lack of planning must be a) True
avoided for effects communication. There are b) False
O
innumerable examples of people who would
give an ill planned, long winding lecture Answer: a
C
while a short presentation with tables or Explanation: The statement is true.
graphs would be sufficient. Communication should serve as a conflict-
T.
reduction exercise. When people start
3. __________ are problems arising from competing for the fulfillment of their narrow
expression. interests communication suffers.
a) Cultural barriers
O
b) Semantic problems 7. _______ means to impart understanding of
c) Wrong assumptions the message.
SP
d) Selecting perception a) Encoding
b) Receiver
Answer: b c) Decoding
Explanation: The correct statement is: d) Feedback
G
Semantic problems are problems arising from
expression or transmission of meaning in Answer: c
communication. Explanation: The correct statement is:
LO
b) False
complete?
Answer: a a) When the sender transmits the message
Explanation: The statement is true. Both b) When the message enters the channel
17
encoding and decoding of message are c) When the message leaves the channel
influenced by our emotions. Emotions play a d) When the receiver understands the
very important role in our lives. message.
-R
Answer: b a) Noise
Explanation: In the case of over b) Clarity
communication, the actual message is lost in
M
is the first and foremost enemy of effective communication?
communication. Every possible effort must be a) Clarity in language
made to eliminate the element of noise that b) Listen poorly
O
distorts communication. c) Home communication skills
d) Adequate medium
C
10. Which of these must be avoided for
effective communication? Answer: b
T.
a) Sharing of activity Explanation: In order to ensure an effective
b) Listening communication one must take care of ten
c) Ambiguity commandments: Clarity in language, home
d) Politeness communication skills, listen attentively, etc..
O
Answer: c
SP
Explanation: Ambiguity must be avoided.
Clarity and crispness of the message is very
G
LO
.B
17
-R
SE
C
In Software Project Management, the end users and developers require to know
the
A. cost of the project
B. duration
C. Length
D. All the above
ANSWER: D
Cost-Benefit Analysis
A. evaluates the tangible and non-tangible factors
B. compares the cost, with the benefits, of introducing a computer-based system
C. estimates the hardware and software costs
D. All of the above
ANSWER: D
Calculate the net profit for the project according to given data:- Cash Flows are (-
1,20,000/- for 0 year,20,000/- for 1st year, 40,000/- for 2nd year, 60,000/- for 3rd
year, 80,000/- for 4th year):-
A. 50,000/-
B. 60,000/-
C. 70,000/-
D. 80,000/-
ANSWER: D
The methods and regulation used to define goals, plan and monitor tasks and re-
sources, identify and resolve issues, and control costs and budgets for a specific
project is known as …
A. project management.
B. Software
C. Process
D. Activities
ANSWER: A
Payback Period for the project according to given data:- Cash Flows are
(-1,20,000/- for 0 year,20,000/- for 1st year, 40,000/- for 2nd year, 60,000/- for
3rd year, 70,000/- for 4th year) will be
A. 1 year
B. 2 years
C. 3 years
D. 4 years
ANSWER: C
What are Requirements refined and analyzed to assess their clarity, completeness,
and_____
A. Consistency
B. Correctness
C. Concurrency
D. None of these
ANSWER: A
A software project that meets all the given objectives is a success of _________.
A. Project fundamental purpose
B. Project quality
C. Project requirement
D. Project management
ANSWER: D
___________ is not an effective software project management focus.
A. people
B. product
C. process
D. popularity
ANSWER: D
What is the process each manager follows during the life of a project is known as
A. Project Management
B. Project Management Life Cycle
C. Manager life cycle
D. All of the mentioned
ANSWER: B
Before actual software development begins, this model requires to build the toy
implementation of it.
A. Spiral Model
B. Prototype Model
C. Waterfall Model
D. Evolutionary Model
ANSWER: B
Which one of the following function points is most suitable for use in embedded
system development projects?
A. IFGUP function points
B. Mark II function points
C. COSMIC function points
D. None of these
ANSWER: C
RAD stands for
A. Relative Application Development
B. Rapid Application Development
C. Rapid Application Document
D. None of the mentioned
ANSWER: B
Which model can be selected if user is involved in all the phases of SDLC?
A. Waterfall Model
B. Prototyping Model
C. RAD Model
D. both Prototyping Model & RAD Model
ANSWER: C
Which two models doesn’t allow defining requirements early in the cycle?
A. Waterfall & RAD
B. Prototyping & Spiral
C. Prototyping & RAD
D. Waterfall & Spiral
ANSWER: B
Which of the following life cycle model can be chosen if the development team
has less experience on similar projects?
A. Spiral
B. Waterfall
C. RAD
D. Iterative Enhancement Model
ANSWER: A
Which one of the following charts would be the most useful to decompose the
project activities into smaller tasks that are more meaningfully managed?
A. PERT chart
B. GANTT chart
C. Task network representation
D. Work Breakdown Structure (WBS)
ANSWER: D
PERT method differs from CPM in which one of the following aspects?
A. PERT uses statistical time durations where as CPM uses deterministic time du-
rations.
B. PERT uses dummy activities whereas CPM does not
C. PERT uses free float, whereas CPM uses total float in critical path calcula-
tions.
D. PERT uses activity on arc whereas CPM uses activity on node networks.
ANSWER: A
Activities A, B, and C are the immediate predecessors for Y activity. If the earli-
est finishing time for the three activities are 12, 15, and 10, then what will be the
earliest starting time for Y?
A. 10
B. 15
C. 12
D. Cannot be determined
ANSWER: B
Andrew is a Project Manager for Green Valley project. A risk management plan
has been prepared for the project. Which of the following should Andrew do
next?
A. Perform Qualitative risk analysis
B. Perform Quantitative risk analysis
C. Identify risks
D. Plan Risk responses
ANSWER: C
What assess the risk and your plans for risk mitigation and revise these when you
learn more about the risk?
A. Risk monitoring
B. Risk planning
C. Risk analysis
D. Risk identification
ANSWER: A
Among the following, critical path and slack time analysis most help .................
A. managers define the project activities.
B. highlight relationships among project activities.
C. point out who is responsible for various activities.
D. pinpoint activities that need to be closely watched.
ANSWER: D
Which one of the following statements regarding critical paths in a PERT chart is
true?
A. A critical path through a PERT chart is any path through the chart that contains
the least number of edges.
B. Some activities on the critical path can have slack.
C. Every PERT chart has exactly one critical path.
D. It is possible that in the PERT chart for a project, there can be multiple critical
paths, all having exactly the same duration.
ANSWER: D
Risk management is one of the most important jobs for a
A. Client
B. Investor
C. Production team
D. Project manager
ANSWER: D
Your actual cost is 145 and your earned value is 170. What is your cost variance?
A. 25
B. -25
C. 162.5
D. -15
ANSWER: A
Calculate the estimate at completion based on the current cost performance index
for the following situation: AC=1150; EV=1000; BAC=2000
A. 2300
B. 1739
C. 2000
D. 2150
ANSWER: A
Calculate the estimate at completion based on the current cost performance index
for the following situation: AC=1150; EV=1000; BAC=2000
A. 2300
B. 1739
C. 2000
D. 2150
ANSWER: A
The cumulative earned value is 40 with cumulative actual cost of 60. The budget
at completion is 400. What is your current to-complete-performance index?
A. 1.0588
B. 1.5
C. 0.9444
D. 1.2841
ANSWER: A
Your SPI is 0.8 and your CPI 1.1. Which of the following statements describes
the current project status correctly?
A. The project incurred higher cost than planned and is behind schedule
B. The project incurred less cost than planned and is ahead of the schedule
C. The project incurred higher cost than planned but is ahead of the schedule
D. The project incurred less cost than planned but is behind schedule
ANSWER: B
Your project is behind schedule but has a positive cost variance. Completing the
project in time is a top-priority. Which approach to calculate the estimate at com-
pletion do you choose?
A. Continue to use BAC as the project needs to meet the plan
B. Estimate at completion using SPI and CPI
C. Estimate at completion with top-down ETC
D. Do the operational project work rather than wasting time calculating a new
EAC
ANSWER: B
Your project controlling shows you actual cost of 500 and an earned value of 600.
Calculate the schedule performance index.
A. 0.8333
B. 1
C. 1.2
D. Not enough data provided to calculate the SPI
ANSWER: D
You are managing a project with a cumulative cost variance of -30 and you ex-
pect the project to perform at the budgeted rate. Which of the following state-
ments is true?
A. You expect your project to be completed within the budget
B. Your projected Variance at Completion is -30
C. You need to get a bottom-up ETC to determine your EAC
D. You should calculate the EAC considering CPI and SPI
ANSWER: B
Calculate the budget at completion based on the current cost performance index
for the following situation: AC=1150; EV=1000; EAC=2300
A. 2300
B. 1739
C. 2000
D. 2150
ANSWER: C
The risky-shift phenomenon means that there is a tendency for groups to make
decisions which are _______________________ than those which individual
members would make.
A. Less risky
B. More conservative
C. Less consistent
D. More risky
ANSWER: D
A. Facilitating communication
B. Development of the Project Plan
C. Execution of the Project Plan
D. all of the above
ANSWER: D
Which of the following costs is not part of the total effort cost?
A. Costs of support staff
B. Costs of lunch time food
C. Costs of networking and communications
D. Costs of providing heating and lighting office space
ANSWER: B
The Mangers use the acronym SMART while goal setting. What does SMART
stand for?
A. spectacular, measurable, actionable, resourced, timely
B. specific, measurable, achievable, relevant, timely
C. suitable, measurable, actionable, reviewed, timely
D. standardised, measurable, actionable, resourced, timely
ANSWER: B
Cost-Benefit Analysis
A. evaluates the tangible and non-tangible factors
B. compares the cost, with the benefits, of introducing a computer-based system
C. estimates the hardware and software costs
D. All of the above
ANSWER: D
Payback Period for the project according to given data:- Cash Flows are
(-1,20,000/- for 0 year,20,000/- for 1st year, 40,000/- for 2nd year, 60,000/- for
3rd year, 70,000/- for 4th year) will be
A. 2 year
B. 3 years
C. 4 years
D. 5 years
ANSWER: B
Calculate the net profit for the project according to given data:- Cash Flows are (-
1,20,000/- for 0 year,20,000/- for 1st year, 40,000/- for 2nd year, 60,000/- for 3rd
year, 80,000/- for 4th year):-
A. 50,000/-
B. 60,000/-
C. 70,000/-
D. 80,000/-
ANSWER: D
What are Requirements refined and analyzed to assess their clarity, completeness,
and_____
A. Consistency
B. Correctness
C. Concurrency
D. None of these
ANSWER: A
If you were a lead developer of a software company and you are asked to submit
a project/product within a stipulated time-frame with no cost barriers, which
model would you select?
A. Waterfall
B. Spiral
C. RAD
D. Incremental
ANSWER: C
Which two of the following models will not be able to give the desired outcome
if user’s participation is not involved?
A. Waterfall & Spiral
B. RAD & Spiral
C. RAD & Waterfall
D. RAD & Prototyping
ANSWER: D
Identifying and estimating all of the costs and benefits of carrying out the project
and operating the delivered application:
A. Cost-benefit analysis
B. Feasibility analysis
C. Technical analysis
D. Business analysis
ANSWER: A
Includes the salaries and other employment costs of the staff in the development
project.
A. Development Cost
B. Set up cost
C. Operational cost
D. None
ANSWER: A
Activities A, B, and C are the immediate predecessors for Y activity. If the earli-
est finishing time for the three activities are 12, 15, and 10, then what will be the
earliest starting time for Y?
A. 10
B. 15
C. 12
D. Cannot be determined
ANSWER: B
PERT method differs from CPM in which one of the following aspects?
A. PERT uses statistical time durations where as CPM uses deterministic time du-
rations.
B. PERT uses dummy activities whereas CPM does not
C. PERT uses free float, whereas CPM uses total float in critical path calcula-
tions.
D. PERT uses activity on arc whereas CPM uses activity on node networks.
ANSWER: A
Your project controlling shows you actual cost of 500 and an earned value of 600.
Calculate the schedule performance index.
A. 0.8333
B. 1
C. 1.2
D. Not enough data provided to calculate the SPI
ANSWER: D
You are managing a project with a cumulative cost variance of -30 and you ex-
pect the project to perform at the budgeted rate. Which of the following state-
ments is true?
A. You expect your project to be completed within the budget
B. Your projected Variance at Completion is -30
C. You need to get a bottom-up ETC to determine your EAC
D. You should calculate the EAC considering CPI and SPI
ANSWER: B
Calculate the estimate at completion based on the current cost performance index
for the following situation: AC=1150; EV=1000; BAC=2000
A. 2300
B. 1739
C. 2000
D. 2150
ANSWER: A
Your SPI is 0.8 and your CPI 1.1. Which of the following statements describes
the current project status correctly?
A. The project incurred higher cost than planned and is behind schedule
B. The project incurred less cost than planned and is ahead of the schedule
C. The project incurred higher cost than planned but is ahead of the schedule
D. The project incurred less cost than planned but is behind schedule
ANSWER: B
What does a CPI of less than 1 tell you about the cost situation of your project?
A. The project will not be completed within the budget
B. The incurred cost are lower than the earned value
C. The project will be completed within the budget
D. The incurred cost are higher than the earned value
ANSWER: D
The risky-shift phenomenon means that there is a tendency for groups to make
decisions which are _______________________ than those which individual
members would make.
A. Less risky
B. More conservative
C. Less consistent
D. More risky
ANSWER: D
→Telegram Channel
→Telegram Group
*************** Join:- https://t.me/AKTU_Notes_Books_Quantum ***************
Answer: b
Explanation: Risk management involves
IT8075 Software anticipating risks that might affect the
project schedule or the quality of the
Project Management software being developed, and then taking
action to avoid these risks.
um
risk in project management?
Elective - II a) Specification delays
nt
b) Product competition
ua
c) Testing
Regulations 2017 d) Staff turnover
_Q
Answer: c
ks
Explanation: Testing is a part of project,
oo
thus it can’t be categorized as risk.
_B
UNIT I PROJECT The process each manager follows during
the life of a project is known as
EVALUATION AND es
a) Project Management
ot
b) Manager life cycle
PROJECT PLANNING
_N
development team
d) Avoiding customer complaints Answer: d
:-
effort costs (the costs of paying software and process weaknesses and bottlenecks are
engineers and managers) identified.
all of the mentioned
An independent relationship must exist
Answer: d between the attribute that can be measured
Explanation: Estimation involves working and the external quality attribute.
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
um
total cost of activities.
Answer: b
Quality planning is the process of Explanation: The value of the quality
nt
developing a quality plan for attribute must be related, in some way, to the
ua
a) team b) value of the attribute than can be measured.
_Q
project c)
customers .
ks
d) project manager
TOPIC 1.2 ACTIVITIES
oo
Answer: b
- METHODOLOGIES
_B
Explanation: The quality plan should set out
the desired software qualities and describe
how these are to be assessed. es
Which of these truly defines Software
ot
design?
Which of the following is incorrect activity a) Software design is an activity subjected to
_N
Answer: a Answer: d
Explanation: Configuration management
/t.
to decide what system components to change, Which of the following statement is false?
how to manage different versions of the a) A process is a collection of related tasks
ht
system and its components, and how to that transforms a set of inputs to the set of
:-
representational system
improvement c) A design heuristic is a rule proceeding
a) Process introduction guidance, with guarantee for achieving
b) Process analysis c) some end
De-processification d) d) Software design method is orderly
Process distribution procedure for providing software
design solutions
Answer: b
Explanation: The current process is assessed,
um
its existence from 1971 method for structural design?
c) It is a top down approach a) Transition of problem models to
nt
d) All of the mentioned solution models
ua
b) Handling of larger and more complex
_Q
Answer: d products
Explanation: It is top down approach and c) Designing Object oriented systems
ks
not bottom up. d) More procedural approach
oo
What is incorrect about structural design? a) Answer: b
_B
Structural design introduced notations and Explanation: It does not account for
heuristics larger and complex products.
b) Structural design emphasis on procedural
decomposition
es
What is followed by the design task? a)
ot
c) The advantage is data flow representation Choosing specific classes, operations b)
_N
by a design task.
m
of data in and out of procedures c) Object oriented design are given more
:-
notations
xplanation: It is solution to central
problem. Rest others are problems. Answer: b
Explanation: Though object oriented design
Which of these are followed by the latest is considered a far better approach but it
versions of structural design? never dominates structural approach.
a) More detailed and flexible
processes b) Regular Notations Which of these does not represent object
c) Wide support by CASE(Computer Aided oriented design?
um
Object-oriented methods incorporates products and related modifications satisfy
Structural methods the client
nt
d) It means that the product designed /created
Answer: a should be easily available
ua
Explanation: It does not follow
_Q
regular procedural decomposition. Answer: b
Explanation: None.
ks
TOPIC 1.3 CATEGORIZATION Identify an ethical dilemma from the
oo
OF SOFTWARE PROJECTS situations mentioned below:
_B
a) Your employer releases a safety-critical
Choose the correct option in terms of system without finishing the testing of the
Issues related to professional es
system
ot
responsibility a) Confidentiality b) Refusing to undertake a project
c) Agreement in principle with the policies of
_N
property rights
d) Managing Client Relationships
Answer: a
K
respect the confidentiality of their employers Identify the correct statement: “Software
m
formal confidentiality agreement has been a) act in a manner that is in the best
interests of his expertise and favour.”
s:/
signed.
They should be aware of local laws governing b) act consistently with the public interest.”
tp
the use of intellectual property such as c) ensure that their products only meet the
SRS.”
ht
computers.”Here the term misuse refers to: Explanation: Software engineers shall act in
a) Unauthorized access to computer a manner that is in the best interests of their
material b) Unauthorized modification of client and employer consistent with the
computer material public interest and shall ensure that their
c) Dissemination of viruses or other malware products and related modifications meet the
d) All of the mentioned highest professional standards possible.Thus
options a & c are ruled out.
Answer: d
Explanation: None.
um
Company has latest computers and state-of
Answer: c the- art software tools, so we shouldn’t worry
nt
Explanation:None. about the quality of the product
ua
a) True
_Q
Efficiency in a software product does not b) False
include ________
ks
a) responsiveness Answer: b
b) licensing Explanation: The infrastructure is only
oo
c) memory utilization one of the several factors that determine
_B
d) processing time the quality of the product.
Answer: b . es
ot
Explanation: Licensing of a software product
comes under corporate part of the software
_N
189% and for every 100 projects, there are 94 Code of Ethics and Professional Practice ?
e/
? b) PROFESSION
/t.
Answer: c engineering
Explanation: Software is not just set of Software engineering is concerned with the
program but it is also associated practicalities of developing and delivering
documentation and configuration of data to useful software
make program run.
Answer: c
Which of these does not account for Explanation: Software engineering is a vast
software failure ? sub domain which comes under computer
a) Increasing Demand
um
science which is main domain.
b) Low expectation c)
Increasing Supply 7. Which of these is true ?
nt
d) Less reliable and expensive Generic products and customized products
ua
are types of software products
_Q
Answer: c Generic products are produced by
Explanation: Increasing supply will lead organization and sold to open market
ks
to more production and not failure. Customized products are commissioned by
particular customer
oo
What are attributes of good software ? All of the mentioned
_B
a) Software maintainability
b) Software functionality Answer: d
c) Software development es
Explanation: All of them are true.
ot
d) Software maintainability & functionality
Which of these does not affect different
_N
activities are not a part of software processes Explanation: Option b & c are a part of
? Software Engineering as a subject,hence
/t.
b) Software development
The fundamental notions of software
tp
c) Software validation d)
engineering does not account for ?
ht
Software specification
a) Software processes
:-
um
Explanation: Web based systems has led c) digital function of dashboard display in a
car
nt
to important advances in programming
languages. d) none of the mentioned
ua
_Q
. Answer: b
Explanation: Pattern recognition uses
ks
TOPIC 1.5 MANAGEMENT Artificial Intelligence (AI) software.
oo
PRINCIPLES Purpose of process is to deliver software a)
_B
in time
Which one of the following is not a b) with acceptable quality
software process quality? es
c) that is cost efficient
ot
a) Productivity d) both in time & with acceptable quality
b) Portability
_N
c) Timeliness Answer: d
Explanation: Cost of a software is a
TU
d) Visibility
management issue & is not related to process
Answer: b activities.
K
product quality which means software can run The work associated with software
e/
definition a)
Jo
Answer: c 1, 2, 3
xplanation: rest all are sub b) 2, 1, 3
categories/applications of option c. c) 3, 2, 1
d) 3, 1, 2
oftware costs more to maintain than it
does to develop. Answer: c
a) True Explanation: None.
b) False
um
Explanation: In Deployment the product is
delivered to the customer who evaluates the 1. SCM stands for
nt
product and provides feedback based on the Software Control Management
ua
evaluation. Software Configuration Management
_Q
Software Concept Management
Process adopted for one project is same as None of the mentioned
ks
the process adopted from another project. a)
True Answer: b
oo
b) False Explanation: In software engineering,
_B
software configuration management (SCM) is
Answer: b the task of tracking and controlling changes
Explanation: the overall flow of activities, es
in the software, part of the larger cross-
ot
actions,tasks,the level of autonomy given to discipline field of configuration management.
the software team and the inter dependencies
_N
among two process can never be the same. When code is made available to others, it
goes in a/an
TU
c) CM audits
in
um
to description.
Answer: a Which of the following is a example of
nt
Explanation: It allows software engineers to Configuration Items ?
ua
continue development along a branch even a) SCM procedures
_Q
when a line of development is frozen. b) Source code
c) Software design descriptions
ks
Which of the following is not a change d) All of the mentioned
management process?
oo
a) Log the changes Answer: d
_B
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
c) Review impact with stakeholders
d) None of the mentioned es
CM controls only the products of the
development process.
ot
Answer: d a) True
_N
a) True
A
development?
What information is required to process a
:-
a) Baseline
change to a baseline?
in
b) Cumulative changes
c) CM a) Reasons for making the changes
Jo
um
efficacy of estimates?
a) Project size
Answer: a
nt
b) Planning process c)
Project complexity Explanation: The conveyor line sorting
ua
d) Degree of structural uncertainty system (CLSS) sorts boxes moving along
_Q
a conveyor line. Each box is identified by
Answer: a a barcode that contains a part number and
ks
Explanation: As size increases, the is sorted into one of six bins at the end of
the line.
oo
interdependence among various elements
of the software grows rapidly.
_B
The project planner examines the statement
What describes the data and control to be of scope and extracts all important software
processed? es
functions which is known as
ot
a) Planning process a) Association
b) Software scope c) b) Decomposition
_N
Project complexity
Answer: b Answer: b
K
cases refined to provide more detail prior to The environment that supports the software
m
um
c) Concurrent Development
decomposition techniques and offer a Model d) All of the mentioned
potentially valuable estimation approach
nt
in their own right? Answer: d
ua
a) Automated estimation tools Explanation: None.
_Q
b) Empirical estimation models
c) Decomposition techniques The Incremental Model is a result of
ks
d) Both Automated estimation tools combination of elements of which two
and Empirical estimation models models?
oo
a) Build & FIX Model & Waterfall
_B
Answer: b Model b) Linear Model & RAD Model
Explanation: An estimation model for Linear Model & rototyping Model
computer software uses empirically derived es
Waterfall Model & RAD Model
ot
formulas to predict effort as a function of
LOC or FP. Answer: c
_N
um
Answer: b
The spiral model has two dimensions Explanation: None.
nt
namely _____________ and ____________
ua
a) diagonal, angular How is Incremental Model different from
Spiral Model?
_Q
b) radial, perpendicular
c) radial, angular a) Progress can be measured for Incremental
ks
d) diagonal, perpendicular Model
b) Changing requirements can be
oo
Answer: c accommodated in Incremental Model
_B
Explanation: The radial dimension of the c) Users can see the system early in
model represents the cumulative costs and the Incremental Model
angular dimension represents the progress es
d) All of the mentioned
ot
made in completing each cycle. Each loop of
the spiral from X-axis clockwise through Answer: a
_N
o Explanation: None.
360 represents one phase.
TU
d) It defines tasks required to construct, test, applications, the concurrent process model
defines activities in two dimensions: a system
ht
tasks/activities are present in Spiral Model simultaneously and can be modeled using the
as well. state-oriented approach.
um
anticipating risks that might affect the b) Risk planning
c) Risk analysis
nt
project schedule or the quality of the
software being developed, and then taking d) Risk identification
ua
action to avoid these risks.
_Q
Answer: a
Which of the following risk is the failure of a Explanation: None.
ks
purchased component to perform as
expected? Which of the following risks are derived
oo
a) Product risk from the organizational environment where
_B
b) Project risk the software is being developed?
c) Business risk a) People risks
d) Programming risk es
b) Technology risks c)
ot
Estimation risks d)
Answer: a Organizational risks
_N
organizational management with different Which of the following risks are derived
e/
b) Technology change
c) Management change Technology risks c)
s:/
Organizational risks
Answer: c
ht
Which of the following term is best defined by with technology might affect the
the statement: “The underlying technology on
Jo
product development.
which the system is built is superseded by new
technology.”? Which of the following term is best defined
a) Technology change b) by the statement: “Derive traceability
Product competition c) information to maximize information hiding
Requirements change d) in the design.”?
None of the mentioned a) Underestimated development time
b) Organizational restructuring
um
project schedule or the quality of the
a) Avoidance strategies software being developed, and then taking
b) Minimization strategies
nt
action to avoid these risks.
c) Contingency plans
ua
d) All of the mentioned Which of the following is not considered as a
_Q
risk in project management?
Answer: b a) Specification delays
ks
Explanation: None. b) Product competition
c) Testing
oo
Risk management is now recognized as d) Staff turnover
one of the most important project
_B
management tasks. Answer: c
a) True
b) False
es
Explanation: Testing is a part of project,
thus it can’t be categorized as risk.
ot
_N
a) Project Management
. b) Manager life cycle
K
PROGRAM MANAGEMENT
m
Answer: c
Explanation: A proven methodical life cycle
/t.
Answer: d Answer: d
Explanation: Projects need to be managed Explanation: The probability of the risk
because professional software engineering is might be assessed as very low (<10%),
always subject to organizational budget and low (10–25%), moderate (25–50%), high
schedule constraints. (50– 75%), or very high (>75%).
um
d) all of the mentioned
An independent relationship must exist
Answer: d between the attribute that can be measured
nt
Explanation: Estimation involves working and the external quality attribute
ua
out how much effort is required to complete a) True
_Q
each activity and, from this, calculating the b) False
total cost of activities.
ks
Answer: b
Quality planning is the process of Explanation: The value of the quality
oo
developing a quality plan for attribute must be related, in some way, to the
_B
a) team b) value of the attribute than can be measured.
project c)
customers . es
ot
d) project manager
TOPIC 1.11 STEPWISE
_N
Answer: b
Explanation: The quality plan should set out PROJECT PLANNING
TU
Version management d)
tp
statement of scope are evaluated and in some The environment that supports the software
cases refined to provide more detail prior to project is called
the beginning of estimation. a) CLSS
b) SEE
A number of independent investigators have c) FAST
developed a team-oriented approach to d) CBSE
requirements gathering that can be applied to
establish the scope of a project called Answer: b
a) JAD b) Explanation: Software engineering
um
CLASS c) environment (SEE), incorporates hardware
FAST
nt
and software.
d) None of the mentioned
ua
Which of the following is not an option to
_Q
Answer: c achieve reliable cost and effort estimate? a)
Explanation: Facilitated Base estimates on similar projects that have
ks
application specification techniques already been completed
(FAST), this approach encourages the b) Use one or more empirical models for
oo
creation of a joint team of customers software cost and effort estimation
_B
and developers who work together to identify c) Use relatively simple decomposition
the problem, propose elements techniques to generate project cost and effort
of the solution, negotiate different es
estimates
ot
approaches, and specify a preliminary set of d) The ability to translate the size estimate
requirements. into human effort, calendar time, and dollars
_N
a barcode that contains a part number and d) Both Automated estimation tools
ht
is sorted into one of six bins at the end of and Empirical estimation models
the line.
:-
Answer: b
in
The project planner examines the statement Explanation: An estimation model for
Jo
of scope and extracts all important software computer software uses empirically derived
functions which is known as formulas to predict effort as a function of
a) Association LOC or FP.
b) Decomposition
c) Planning process Which of the following is not achieved by
d) All of the mentioned an automated estimation tools?
a) Predicting staffing levels
Answer: b b) Predicting software cost
Explanation: None
um
historical data and systematic techniques can does to develop.
improve estimation accuracy. a) True
nt
a) True b) False
ua
b) False
Answer: a
_Q
Answer: a Explanation: For systems with a long
ks
Explanation: None. life, maintenance costs may be several
times development costs.
oo
.
Which one of the following is not an
_B
application of embedded software product?
es
a) keypad control of a security system
b) pattern recognition game playing
ot
UNIT II PROJECT LIFE c) digital function of dashboard display in a
_N
ESTIMATION
Answer: b
K
MODELS
in time
/t.
b) Portability Answer: d
c) Timeliness
:-
Answer: b
xplanation: Portability is a software The work associated with software
product quality which means software can run engineering can be categorized into three
on different hardware platforms or software generic phases,regardless of application area,
environments. project size, or complexity namely
the__________ phase which focuses on what,
_____________&_____________ are two
the_________ phase which focuses on how
kinds of software products. and the_________ phase which focuses on
a) CAD, CAM
change. Answer: d
support Explanation: None.
development
definition a) Four types of change are encountered
1, 2, 3 during the support phase.Which one of
b) 2, 1, 3 the following is not one that falls into
c) 3, 2, 1 such category?
d) 3, 1, 2 a) Translation
b) Correction
um
Answer: c c) Adaptation
Explanation: None.
nt
d) Prevention
ua
Which of the following activities of a Answer: a
_Q
Generic Process framework provides a Explanation: Translation is done in
feedback report? the development phase.
ks
a) Communication
b) Planning .
oo
c) Modeling & Construction
_B
d) Deployment TOPIC 2.2 CHOICE OF PROCE
Answer: d esMODELS - RAPID
APPLICATION DEVELOPMENT
ot
Explanation: In Deployment the product is
delivered to the customer who evaluates the
_N
product and provides feedback based on the Build & Fix Model is suitable for
evaluation.
TU
a) 100-200 b)
the process adopted from another project. a)
200-400 c)
A
True
400-1000 d)
e/
Answer: b
/t.
Answer: a
Explanation: the overall flow of activities,
s:/
the software team and the inter dependencies of 100 or 200 lines.
among two process can never be the same.
ht
um
Which is not one of the types of prototype What is the major drawback of using RAD
of Prototyping Model? Model?
nt
a) Horizontal Prototype a) Highly specialized & skilled
ua
b) Vertical Prototype c) developers/designers are required
_Q
Diagonal Prototype d) b) Increases reusability of components
Domain Prototype c) Encourages customer/client feedback
ks
d) Increases reusability of components,
Answer: c Highly specialized & skilled
oo
Explanation: Their is no such thing as developers/designers are required
_B
Diagonal Prototype whereas other options
have their respective definitions. Answer: d
c) Prototype Refinement
d) Engineer Product 9. SDLC stands for
K
RAD Model
Answer: d d) both Prototyping Model & RAD Model
xplanation: Build & Fix Model is
suitable for 100-200 LOC Answer: c
Explanation: None.
RAD Model has a)
2 phases .
b) 3 phase
TOPIC 2.3 AGILE METHODS
Select the option that suits the Manifesto for to be able to respond quickly to changing
Agile Software Development requirements without excessive rework.
a) Individuals and interactions
b) Working software How is plan driven development different
c) Customer collaboration from agile development ?
d) All of the mentioned a) Outputs are decided through a process of
negotiation during the software
Answer:d development process
Explanation: None. b) Specification, design, implementation
um
and testing are interleaved
Agile Software Development is based on c) Iteration occurs within
nt
a) Incremental Development activities d) All of the mentioned
ua
b) Iterative Development
_Q
c) Linear Development Answer:c
d) Both Incremental and Iterative Explanation: A plan-driven approach to
ks
Development software engineering is based around separate
development stages with the outputs to be
oo
Answer:d produced at each of these stages planned in
_B
Explanation: The software is developed in advance.
increments with the customer specifying the
requirements to be included in each increment es
How many phases are there in Scrum ? a)
Two
ot
and the highest priority is to satisfy the
customer through early and continuous b) Three
_N
of an agile method.
Answer:a
Jo
um
present in Adaptive Software Which one of the following models is not
Development(ASD) ? suitable for accommodating any change? a)
nt
a) analysis, design, coding Build & Fix Model
ua
b) requirements gathering, adaptive cycle b) Prototyping Model
_Q
planning, iterative development c) RAD Model
c) speculation, collaboration, learning d) Waterfall Model
ks
d) all of the mentioned
Answer: d
oo
Answer:c Explanation: Real projects rarely follow
_B
Explanation: None. the sequential flow that the Waterfall Model
proposes.
In agile development it is more important to
build software that meets the customers’
es
Which is not one of the types of prototype
ot
needs today than worry about features that of Prototyping Model?
_N
Answer:a
A
of Prototyping Model?
a) Quick Design
ht
a) 100 200 b)
200-400 c) Answer: b
400-1000 d) Explanation: A prototyping model
above 1000 generates only a working model of a system.
um
2 phases
b) 3 phase
nt
TOPIC 2.5 EXTREME
c) 5 phases
ua
d) 6 phases PROGRAMMING
_Q
Answer: c Incremental development in Extreme
ks
Explanation: RAD Model consists of five Programming (XP) is supported through
phases namely:Business modeling,Data a system release once every month.
oo
modeling,Process modeling,Application a) True
_B
generation and Testing & Turnover. b) False
What is the major drawback of using RAD
Model?
es
Answer: b
ot
Explanation: Incremental development is
a) Highly specialized & skilled supported through small, frequent system
_N
b) False
m
Answer: d
Explanation: The client may create an Answer: a
/t.
the specialized & skilled developers are not integration, all the unit tests in the system
easily available.
ht
must pass.
:-
um
d) none of the mentioned Programming.
a) True
nt
Answer: c b) False
ua
Explanation: User requirements are
_Q
expressed as scenarios or user stories.These Answer: a
are written on cards and the development Explanation: Automated test harnesses are
ks
team break them down into implementation used to run all component tests each time
tasks. These tasks are the basis of schedule that a new release is built.
oo
and cost estimates.
_B
In XP an automated unit test framework is
Is a customer involved test development used to write tests for a new piece of
and validation in XP ? es
functionality before that functionality itself
ot
a) Yes is implemented.
b) No a) True
_N
Answer: a
Answer: c Explanation: XP follows Test-
K
tests for the stories that are to be Developers work individually on a release
m
implemented in the next release of the system and they compare their results with other
developers before forwarding that release to
/t.
c) planning, design, coding, testing 5. CIM and WBEM has been defined by ?
d) planning, analysis, coding, testing a) DMTF
b) SMI Standards Organization
Answer: c c) Open Standards Body
Explanation: XP involves the mentioned four d) None of the mentioned
activities, and in the same in order.
Answer: a
.
um
_________ instruments one or more aspects
of the CIM Schema
nt
TOPIC 2.6 MANAGING
a) Distributor
ua
b) Provider
This set of multiple choice SAN storage c) Manager
_Q
questions and answers focuses on Storage d) None of the mentioned
ks
Management aspects.
oo
Answer: b
A Subprofile can reference other subprofiles
_B
a) True The server can operate directly on the
b) False es
underlying system by calling the system’s
commands, services, and library functions. a)
ot
Answer: a True
_N
b) False
Clients use which protocol to discover SMI
TU
c) SNMP
Answer: a d) None of the mentioned
/t.
s:/
vendors.
d) None of the mentioned
in
a) True
b) False
Jo
Answer: b
Answer: a
4. Can a vendor implement additional Classes 10. Collects responses from providers and
or support additional Properties than are returns to the client
defined in a Profile and still be considered a) xmlCIM
conformant? b) CIMOM
a) True c) DMTF
b) False d) None of the mentioned
Answer: a Answer: b
*************** Join:- https://t.me/AKTU_Notes_Books_Quantum *************** 24
um
nt
ua
_Q
ks
oo
_B
es
ot
_N
TU
K
A
e/
m
/t.
s:/
tp
ht
:-
in
Jo
*************** Join:- https://t.me/AKTU_Notes_Books_Quantum ***************
um
processes executing in the system? that can not be more than one
a) cooperating process
Answer: a
nt
b) child process
c) parent process Explanation: None.
ua
d) init process
6. Mutual exclusion can be provided by the
_Q
Answer: a
ks
Explanation: None. mutex locks
binary semaphores
oo
When several processes access the same both mutex locks and binary semaphores
_B
data concurrently and the outcome of the none of the mentioned
execution depends on the particular order
in which the access takes place, is called? es
Answer: c
Explanation: Binary Semaphores are known
ot
a) dynamic condition
b) race condition as mutex locks.
_N
c) essential condition
When high priority task is indirectly
TU
d) critical condition
preempted by medium priority task
Answer: b effectively inverting the relative priority
K
a) mutual exclusion
Answer: a
tp
b) critical exclusion
Explanation: None.
ht
c) synchronous exclusion
d) asynchronous exclusion Process synchronization can be done on
:-
in
Answer: a __________
a) hardware level
Jo
xplanation: None.
b) software level
Which one of the following is a c) both hardware and software
synchronization tool? level d) none of the mentioned
a) thread
b) pipe Answer: c
c) semaphore Explanation: None.
d) socket A monitor is a module that encapsulates
__________
um
a) Function-related metrics
To enable a process to wait within the b) Product-related metrics
nt
monitor __________ c) Size-related metrics
ua
a) a condition variable must be declared as d) None of the mentioned
_Q
condition
b) condition variables must be used Answer: a
ks
as boolean objects Explanation: Productivity is expressed in
c) semaphore must be used terms of the amount of useful functionality
oo
d) all of the mentioned produced in some given time. Function
_B
points and object points
Answer: a are the best-known metrics of this type.
Explanation: None. es
4. A is developed using historical cost
ot
information that relates some software
_N
Expert judgement
TOPIC 2.9 EFFORT AND COST Estimation by analogy
K
Parkinson’s Law
A
ESTIMATION TECHNIQUES
e/
Answer: a
m
Which of the following are parameters Explanation: The model uses a basic
regression formula with parameters that are
/t.
um
Explanation: The cost of a new project is program code that is automatically generated
by design or program translation tools?
nt
estimated by analogy with these completed
projects. a) An application-composition model
ua
b) A post-architecture model
_Q
Which model assumes that systems are c) A reuse model
created from reusable components, scripting d) An early design model
ks
or database programming?
a) An application-composition model Answer: c
oo
b) A post-architecture model Explanation: None.
_B
c) A reuse model
d) An early design model The COCOMO model takes into account
Answer: a
es
different approaches to software
development, reuse, etc.
ot
Explanation: It is designed to make a) True
_N
Expert judgement
.
/t.
Answer: c
s:/
available, the effort required is estimated to Which of the following is not a metric for
in
Statement and branch coverage metrics are Architectural Design Metrics are
part of ___________ in
a) Analysis Model nature. a) Black Box
b) Testing b) White Box
c) Design Model c) Gray Box
d) Source Code d) Green Box
Answer: b Answer: a
Explanation: These metrics lead to the Explanation: They are “black box” in that
um
design of test cases that provide program they do not require any knowledge of the
nt
coverage. inner workings of a particular software
component.
ua
Function Points in software engineering
_Q
was first proposed by Structural complexity of a module i is
a) Booch b) given as S(i) = f*f (i). What does f
ks
Boehm c) symbolizes here?
Albrecht d) a) “fan check-out” of module i
oo
Jacobson b) “fan check-in” of module i
_B
c) “fan in” of module i
Answer: c d) “fan out” of module i
Explanation: First proposed by Albrecht in es
Answer: d
ot
1979, hundreds of books and papers have
been written on functions points since then. Explanation: Fan out is number of
_N
Answer: c Answer: b
/t.
Files.
a) True
:-
formula
Answer: b
Jo
um
a) Reliability b) Project managers have to assess the risks
Usability c) that may affect a project.
nt
Efficiency d) a) True
ua
Functionality b) False
_Q
Answer: a Answer: b
ks
Explanation: None. Explanation: Risk management involves
anticipating risks that might affect the
oo
Usability in metric analysis is defined as the project schedule or the quality of the
degree to which the software
_B
software being developed, and then taking
a) stated needs action to avoid these risks.
b) is easy to use
c) makes optimal use of system
es
Which of the following is not considered as a
ot
resources d) none of the mentioned risk in project management?
_N
a) Specification delays
Answer: b b) Product competition
TU
.
A
Answer: c
e/
a) Project Management
MANAGEMENT b) Manager life cycle
ht
um
Which of the following is/are main b) Process analysis c)
parameters that you should use when
nt
De-processification d)
computing the costs of a software Process distribution
ua
development project?
_Q
a) travel and training costs Answer: b
b) hardware and software costs Explanation: The current process is assessed,
ks
c) effort costs (the costs of paying and process weaknesses and bottlenecks are
software engineers and managers) identified.
oo
d) all of the mentioned
_B
An independent relationship must exist
Answer: d between the attribute that can be measured
Explanation: Estimation involves working es
and the external quality attribute.
ot
out how much effort is required to complete a) True
each activity and, from this, calculating the b) False
_N
project c)
e/
customers .
m
d) project manager
/t.
Which of the following is an activity that What is used to determine the recommended
distributes estimated effort across the degree of rigor with which the software
planned project duration by allocating the process should be applied on a project?
effort to specific software engineering tasks? a) Degree of Rigor
a) Software Macroscopic schedule b) Adaptation
b) Software Project scheduling c) criteria c) Task Set
Software Detailed schedule d) Both degree of Rigor and adaptation
d) None of the mentioned criteria
um
Answer: b Answer: b
Explanation: None. Explanation: Four different degrees of rigor
nt
are: casual, structured, strict, and quick
ua
Every task that is scheduled should be reaction.
_Q
assigned to a specific team member is
termed as What evaluates the risk associated with the
ks
a) Compartmentalization technology to be implemented as part of
b) Defined milestones project scope?
oo
c) Defined responsibilities a) Concept scoping
_B
d) Defined outcomes b) Preliminary concept planning
c) Technology risk assessment
Answer: c es
d) Customer reaction to the concept
ot
Explanation: These responsibilities
are domain specific. Answer: b
_N
Explanation: None.
What is a collection of software
TU
engineering work tasks, milestones, and Which of the following is not an adaptation
deliverables that must be accomplished to criteria for software projects?
K
Ensuring that no more than the allocated Which of the following is a project
:-
number of people are allocated at any given scheduling method that can be applied to
in
Time Allocation
ffort Validation b) CPM
Defined Milestone c) CMM
Effort Distribution d) Both PERT and CPM
Answer: b Answer: d
Explanation: None. Explanation: Program evaluation and review
technique (PERT) and critical path method
(CPM) are two project scheduling methods TOPIC 3.4 SEQUENCING AND
that can be applied to software development.
SCHEDULING
A technique for performing quantitative
analysis of progress is known as Round robin scheduling falls under the
a) BCWS category of ____________
b) EVA a) Non-preemptive scheduling
c) BAC b) Preemptive scheduling
um
d) CBSE c) All of the mentioned d)
None of the mentioned
Answer: b
nt
Explanation: The earned value system Answer: b
ua
provides a common value scale for every Explanation: None.
_Q
task, regardless of the type of work being
performed. The total hours to do the whole With round robin scheduling algorithm in a
ks
project are estimated, and every task is given time shared system
an earned value based on its estimated a) using very large time slices converts it into
oo
percentage of the total. First come First served scheduling algorithm
_B
b) using very small time slices converts it
What is the recommended distribution of into First come First served scheduling
effort for a project? es
algorithm c) using extremely small time
ot
a) 40-20-40 slices increases performance
b) 50-20-30 d) using very small time slices converts it
_N
Answer: a
Answer: a Explanation: All the processes will be able to
K
(analysis and design), 20% (coding), and The portion of the process scheduler in an
m
concerned with
A project usually has a timeline chart a) assigning ready processes to CPU
s:/
queue
c) Ivar Jacabson d) all of the mentioned
:-
Answer: a
Answer: a
Jo
Explanation: None.
xplanation: Timeline chart, also called a
Gantt chart was invented by Henry Gantt, an Complex scheduling algorithms
industrial engineer in 1917 . ____________
a) are very appropriate for very
. large computers
b) use minimal resources
TOPIC 3.3 ACTIVITIES c) use many resources d)
all of the mentioned
Answer: a tQ = 45ms
Explanation: Large computers are tQ = 50ms
overloaded with a greater number of
processes. Answer: a
Explanation: None.
5. What is FIFO algorithm?
first executes the job that came in last in Orders are processed in the sequence they
the queue arrive if _______ rule sequences the jobs. a)
first executes the job that came in first in earliest due date
um
the queue b) slack time remaining
first executes the job that needs minimal c) first come, first
nt
processor served d) critical ratio
ua
first executes the job that has maximum
Answer: c
_Q
processor needs
Explanation: None.
ks
Answer: b
Explanation: None. Which of the following algorithms tends to
oo
minimize the process flow time?
_B
The strategy of making processes that are a) First come First served
logically runnable to be temporarily hortest Job First
suspended is called ____________ es
Earliest Deadline First
Longest Job First
ot
a) Non preemptive scheduling
b) Preemptive scheduling
_N
Explanation: None.
Which of the following statements are
:-
in
um
nt
ua
_Q
ks
oo
_B
es
ot
_N
TU
K
A
e/
m
/t.
s:/
tp
ht
:-
in
Jo
*************** Join:- https://t.me/AKTU_Notes_Books_Quantum ***************
um
Preemption may cause starvation. If priority a) session layer b)
based scheduling with preemption is used,
nt
transport layer c)
then a low priority process may never get application layer
ua
CPU. d) network layer
_Q
Round Robin Scheduling improves response
time as all processes get CPU after a Answer: a
ks
specified time. Explanation: In SI reference model, there
. are two layers which are not present in
oo
TCP/IP model. They are Presentation and
_B
Session layer. The functions of
TOPIC 3.5 NETWORK
Presentation and ession layer in the OSI
PLANNING MODELS es
model are handled by the transport layer
ot
itself in TCP/IP.
OSI stands for __________
_N
provides a structured plan on how Explanation: Physical, data link and network
layers are network support layers and session,
s:/
for troubleshooting. It is recognized by the support layers. The transport layer links these
ht
ISO as the generalized model for computer layers by segmenting and rearranging the data.
network i.e. it can be modified to design any It uses protocols like TCP and UDP.
:-
The number of layers in ISO OSI reference employing the TCP/IP protocols?
model is __________ a) physical address and logical
a) 4 address b) port address
b) 5 c) specific address
c) 6 d) all of the mentioned
d) 7
Answer: d
Answer: d Explanation: The physical, logical, port
Explanation: In OSI reference model, there and specific addresses are used in TCP/IP
um
OSI model.
a) prior to
nt
b) after
ua
c) simultaneous to
_Q
d) with no link to
ks
Answer: a
Explanation: Several TCP/IP prototypes
oo
were developed at multiple research
_B
centers between 1978 and 1983, whereas
OSI reference model was developed in the
year 1984. TCP/IP was developed with the es
ot
intention to create a model for the Internet
while OSI was intended to be a general
_N
network model.
TU
a) network layer
A
b) transport layer
e/
c) session layer
m
Answer: b
s:/
Answer: c
Explanation: A port number is a way to
identify a specific process to which an
Internet or other network message is to be
forwarded when it arrives at a server. Some
examples of port numbers are port 20 which
is used for FTP data, port 22 which is used for
SSH remote login ,and port 23 which is used
um
for TELNET.
Which layer provides the services to user? a)
nt
application layer
ua
b) session layer
_Q
c) presentation layer
d) physical layer
ks
Answer: a
oo
Explanation: In networking, a user mainly
_B
interacts with application layer to create and
send information to other computer or
network. Application layer provides the es
ot
interface between applications and the
network. It is the top-most layer in both the
_N
network layer
A
physical layer
e/
transport layer
/t.
Answer: b
s:/
35
IT8075 Software Project Management Regulations 2017
um
d) None of the mentioned changed or migrated to other hardware. The
Testing done during this enhancement,
nt
Answer: b change and migration cycle is known as
ua
Explanation: Software testing is the process maintenance testing.
_Q
of evaluation a software item to detect
differences between given input and White Box techniques are also classified as
ks
expected output. a) Design based testing
b) Structural testing
oo
What is Cyclomatic complexity? a) c) Error guessing technique
Black box testing
_B
d) None of the mentioned
b) White box testing
c) Yellow box testing
d) Green box testing
es
Answer: b
Explanation: The structural testing is the
ot
testing of the structure of the system or
_N
a) always possible
Lower and upper limits are present in
/t.
b) practically possible
which chart? c) impractical but possible d)
s:/
Bar chart c)
Control chart Answer: c
ht
um
nt
ua
_Q
ks
oo
_B
es
ot
_N
TU
K
A
e/
m
/t.
s:/
tp
ht
:-
in
Jo
*************** Join:- https://t.me/AKTU_Notes_Books_Quantum ***************
um
c) To characterize adverse effect of toxins
a) Unit Testing d) To reduce probability of occurrence
b) System Testing
nt
c) Integration Testing Answer: c
ua
d) All of the mentioned Explanation: Hazard identification is the first
_Q
step in risk assessment. he goal is to
Answer: d understand the concentration of toxins,
ks
Explanation: Unit, system, integration testing spatial distribution and there movement.
all of them are levels in testing.
oo
2. The process determines whether exposure
Boundary value analysis belong to?
_B
to a chemical can increase the incidence of
a) White Box Testing adverse health effect.
b) Black Box Testing
c) White Box & Black Box
es
Hazard identification
ot
Exposure assessment
Testing d) None of the mentioned
_N
Toxicity assessment
Answer: b Risk characterization
TU
between partitions and checks the output path of the toxins and also determines the
A
um
humans and ecological systems which may
c) To know the probable source and causes results in catastrophic.
of contamination on site
nt
d) For determination of remedial actions The purpose of risk management is to
ua
identify potential problems before they occur
_Q
Answer: c so that risk-handling activities may be
Explanation: Site history provides precise planned.
ks
information about the activities that had been a) False
carried on the area. Most of the instance b) True
oo
contamination is due to past activities on site.
_B
Answer: b
What is the main objective of risk Explanation: The main goal of risk
assessment?
a) To evaluate hazard and minimize the
es
management is to reduce the threats from an
ot
activity so that harm to the surrounding is
risks b) Remediation of contaminated sites minimized.
_N
c) Hazard management
d) To know source of pollutants 10. Hazard identification mainly focus on
TU
What is the first stage of risk assessment? Explanation: The main aim of hazard
s:/
d) Risk characterization
:-
Answer: b
Jo
um
a) Hazard identification What is the main objective of risk
assessment?
nt
b) Exposure assessment
c) Toxicity assessment a) To evaluate hazard and minimize the
ua
d) Risk characterization risks b) Remediation of contaminated sites
_Q
c) Hazard management
Answer: a d) To know source of pollutants
ks
Explanation: Hazard identification traces the
path of the toxins and also determines the Answer: a
oo
likelihood of occurrence in humans. Explanation: Risk assessment helps to
_B
understand possible problems and
Which of the following data is not required provides alternatives as well as control
for hazard identification? es
measures to reduce the accident.
ot
a) Land use
b) Contaminant levels What is the first stage of risk assessment?
_N
c) Toxicity study
Answer: d d) Risk characterization
K
contaminant level, affected population and Explanation: Hazard identification is the first
m
biota data play a major role while identifying stage of risk assessment. It provides clear
understanding about chemical contaminants,
/t.
a hazard.
their concentration and distribution in
s:/
b) False when?
:-
The purpose of risk management is to Which of the following risk is the failure of a
identify potential problems before they occur purchased component to perform as
so that risk-handling activities may be expected?
planned. a) Product risk
a) False b) Project risk
b) True c) Business risk
d) Programming risk
Answer: b
Explanation: The main goal of risk Answer: a
um
management is to reduce the threats from an Explanation: Risks that affect the quality or
nt
activity so that harm to the surrounding is performance of the software being developed.
minimized.
ua
Which of the following term is best defined
by the statement: “There will be a change of
_Q
Hazard identification mainly focus on
______________ organizational management with different
ks
a) Chemical source and priorities.”?
concentration b) Chemical exposure a) Staff turnover
oo
c) Chemical analysis b) Technology change
_B
d) Chemical pathway c) Management change
d) Product competition
Answer: a es
Answer: c
ot
Explanation: The main aim of hazard
identification is to identify chemical Explanation: None.
_N
a) Technology change b)
e/
Requirements change d)
MANAGEMENT
/t.
a) Client
b) Investor of software engineering.
:-
c) Production team
in
d) Project manager What assess the risk and your plans for risk
mitigation and revise these when you learn
Jo
Which of the following risks are derived Risk management is now recognized as
from the organizational environment where one of the most important project
the software is being developed? management tasks.
a) People risks a) True
b) Technology risks c) b) False
Estimation risks d)
Organizational risks Answer: a
Explanation: None.
Answer: d
um
Explanation: These risks are at .
nt
management level.
TOPIC 3.14 PERT TECHNIQUE
ua
Which of the following risks are derived
_Q
from the software or hardware technologies
that are used to develop the system? Which of the following is not a phase of
ks
a) Managerial risks b) project management?
Technology risks c) a) Project planning b)
oo
Estimation risks d) Project scheduling c)
_B
Organizational risks Project controlling d)
Project being
Answer: b es
Answer: d
ot
Explanation: The risks associated
with technology might affect the Explanation: There are three phases of
_N
Which of the following term is best defined controlling. Project management refers to a
by the statement: “Derive traceability highly specialised job to achieve the
K
in the design.”?
e/
c) Requirements changes
d) None of the mentioned c) Jane Gantt d)
s:/
Joseph henry
tp
Answer: c
Explanation: Tracing the requirements Answer: b
ht
can help us understand the risk. Explanation: Henry Gantt introduced the
:-
um
b) Program Evaluation and Robot Technique Explanation: A CPM network is activity-
oriented while a PERT network is event-
nt
c) Program Evaluation and Robot
Technology d) Program Evaluation and oriented. Event is the completion of an
ua
Review Technique activity or the commencement of an
_Q
activity. An event may be head event, tail
Answer: d event or dual role event.
ks
Explanation: There are various network
techniques that are called by various names are used to represent activity in a network
oo
like PERT, CPM, TOPS and LESS. diagram.
_B
Network technique is one of the major a) Circles
advancements in management science. The quares
full form of PERT is Program Evaluation es
Rectangles
ot
and Review Technique. Arrows
_N
a) Red
Jo
b) Black Answer: b
c) Blue Explanation: There are three kinds of time
d) Green estimates made by PERT planners. These are
the optimistic time estimate, the pessimistic
Answer: d time estimate and the most likely time
Explanation: In bar charts, different colours estimate. The shortest possible time in which
are sometimes filled in the bars for showing an activity can be achieved under ideal
various control information. For actual circumstances is known as the optimistic time
progress, green colour is used. For anticipated estimate.
According to the time estimates made by the A randomized algorithm uses random bits as
PERT planners, the maximum time that input inorder to achieve a _____________
would be needed to complete an activity is good performance over all possible choice of
called as __________ random bits.
a) The most likely time estimate a) worst case
b) Optimistic time estimate b) best case c)
c) Pessimistic time estimate average case
d) Expected time estimate d) none of the mentioned
um
Answer: c Answer: c
Explanation: According to the time estimates Explanation: A randomized algorithm is an
nt
made by the PERT planners, the maximum algorithm that employs a degree of
ua
time that would be needed to complete an randomness as a part of its logic using
_Q
activity is called the pessimistic time random bits as inputs and in hope of
estimate. This estimate does not include producing average case good performace.
ks
possible effects of floods, earthquakes, etc.
Which of the following options match the
oo
In a network, a critical path is the time- given statement:
_B
wise shortest path. Statement: The algorithms that use the
a) True random input to reduce the expected
b) False es
running time or memory usage, but always
ot
terminate with a correct result in a bounded
Answer: b amount of time.
_N
available and the actual time needed to Explanation: The other type of algorithms
m
d) Half float
Which of the following are probalistic
ht
Answer: c algorithms?
:-
maximum time available and the actual time b) Monte Carlo Algorithm
Jo
um
probability of finding after k iterations:
which are bounded polynomial time
find_a(array A, n, k)
nt
algorithms are probably correct and probably
fast. It is correct more than 75% of the times.
ua
begin
Prisonner’s dilemma can be related to the
_Q
i=0
following:
ks
a) cooperative behaviour repeat
b) graph theory
oo
Randomly select one element
c) Both (a) and (b)
_B
d) None of the mentioned out i=i+1
Answer: a
Explanation: Prisonner’s dilemma is a
es until i=k or a is found
ot
end
standard example of a game analysed in game
_N
k
punishment. (1-(1/3))
1-(1/2)k
K
sorting technique.
e/
c) Radix Sort
d) Merge Sort succeeds, else the algorith fails. The
s:/
a) P=BPP problem
Jo
Which of the following can be referred to as In _________ the embedded devices and
applications of Randomized algorithm? a) objects working under IoT are resource
Quicksort constrained.
b) Min Cut a) Health
c) Verifying Matrix Multiplication b) Industry
d) All of the mentioned c) Home
d) Information system
Answer: d
Explanation: Freivalds algorithm is a Answer: d
um
probabalistic randomized algorithm we use to Explanation: In the information system the
verify matrix multiplication. On the other
nt
embedded devices and objects working under
hand, Randomness can be useful in quicksort. IoT implementation are resource constrained.
ua
If the algorithm selects pivot element
_Q
uniformaly at random, it has a probably high What type of networks is interacting under
probabilty of finishing the work in O(nlogn) IoT?
ks
time regardless of the input. a) Heterogeneous only
b) Homogeneous nly
oo
TOPIC 3.16 RESOURCE c) Both hetero and homogeneous
_B
d) Neither hetero nor Homo
ALLOCATION
es
Answer: a
ot
What is the popular method of organizing Explanation: Due to the huge number of
heterogeneous network elements interacting
_N
b) Synchronization
c) Network resource management for the smooth
running of IoT operations.
K
d) Cluster
A
Answer: d
ht
um
Resource management will elaborate the d) Multimedia communication
key aspects of _________
nt
a) Industrial management Answer: a
ua
b) Energy management c) Explanation: Future applications of IoT:
–> IoT based information system for
_Q
Network management d)
Information management Ambient living
ks
–> Cyber Physical System in IoT
Answer: c –> Role of Green IoT system –>
oo
Explanation: Resource management will Fog computing.
_B
elaborate the key aspects of energy
management, communication protocols and 11. The object of IoT will be empowered by
future applications of IoT for information es
Network
ot
systems.
Cloud
_N
a) IoT Devices
b) IoT Cloud c) Answer: c
K
IoT Cloud, IoT based industrial and home The embedded devices will form _______
s:/
FDDI d)
:-
in IoT?
Answer: d
Jo
a) Smart cities
b) Cyber physical system Explanation: It is envisioned that these
c) Mac layer issue devices will be able to form ad-hoc network,
d) Managing energy and that the connection from these networks
to the Internet of Things infrastructure will
Answer: c not always be possible.
Explanation: Role of communication
protocol in IoT : _______ are used to overcome the
–> Multimedia communication challenges of managing the resources of the
um
design a system organization satisfying the
agent, and Synchronization techniques in functional and non-functional requirements
order to overcome the challenges of
nt
of a system.
managing the resources of the Internet of
ua
Things objects. 2. A view shows the system hardware and
_Q
how software components are distributed
Which will reduce the energy across the processors in the system.
ks
expenditure?
a) Clustering physical
oo
b) Software agents logical
_B
c) Synchronization techniques process
d) Cluster, Software agent, and all of the mentioned
Synchronization techniques es
Answer: a
ot
Answer: a Explanation: A physical view is
_N
harmonising. SRS
/t.
Answer: b Answer: d
Explanation: Synchronization techniques Explanation: The UML was designed for
ht
challenges of harmonising plenty of copies the architectural design stage, you often want
in
um
performance but reduces maintainability b) Explanation: Model-View-Controller
Introducing redundant data improves
nt
pattern is the basis of interaction
availability but makes security more management in many web-based systems.
ua
difficult c) Localizing safety-related features
_Q
usually means more communication so What describes how a set of interacting
degraded performance components can share data?
ks
d) All of the mentioned a) model-view-controller
b) architecture pattern c)
oo
Answer: d repository pattern
_B
Explanation: High availability architecture d) none of the mentioned
can be affected by several design factors
that are required to be maintained to ensure es
Answer: c
ot
that no single points of failure exist in such Explanation: The majority of systems that
design. use large amounts of data are organized
_N
c) logical
Answer: d
/t.
d) process
Explanation: Architectural design decisions
s:/
um
MANAGEMENT AND c) Standard component sizing
nt
d) Fuzzy logic sizing
CONTROL
ua
Answer: a
_Q
Explanation: None.
TOPIC 4.1 FRAMEWORK FOR
ks
MANAGEMENT AND CONTROL The expected value for the estimation
variable (size), S, can be computed as a
oo
Why is decomposition technique required? weighted average of the optimistic(Sopt),
_B
a) Software project estimation is a form of most likely (Sm), and pessimistic (Spess)
estimates given as
problem solving
b) Developing a cost and effort estimate for a es
a) EV = ( opt + 4Sm + Spess)/4 b)
ot
EV = ( opt + 4Sm + Spess)/6 c)
software project is too complex
EV = (Sopt + 2Sm + Spess)/6 d)
_N
Answer: b
Answer: c
Explanation: This assumes that there is a
K
pessimistic values.
m
b) Three
a) True
c) Four
ht
b) False
d) No form exists
:-
Answer: b
in
Answer: b
Explanation: Estimation uses one or both
Jo
Boehm Answer: b
Putnam and Myers Explanation: The planner must determine the
cause of divergence and then reconcile the
Answer: d estimates.
Explanation: None.
Programming language experience is a
In many cases, it is often more cost- part of which factor of COCOMO cost
effective to acquire, rather than drivers?
develop, computer software. a) Personnel Factor
um
a) True b) Product Factor c)
b) False
nt
Platform Factor d)
Project Factor
ua
Answer: a
_Q
Explanation: Managers are faced with a Answer: a
make-buy decision in such situations. Explanation: None.
ks
A make-buy decision is based on whether a) If an Indirect approach is taken, then the
oo
The software may be purchased off-the- sizing approach is represented as
_B
shelf a) LOC
b) “Full-experience” or “Partial-experience” b) FP
software components should be used
c) Customer-built software should
es
c) Fuzzy Logic
ot
d) LOC and FP
be developed
_N
a) External inputs b)
/t.
External inquiries
Project management involves the planning,
ht
Explanation: External inputs, external process, and events that occur as software
in
operational implementation.
the five domains. a) True
The project planner must reconcile the b) False
estimates based on decomposition techniques Answer: a
to produce a single estimate of effort. Explanation: None.
a) True
b) False Which of the following is not an effective
software project management focus?
people Answer: c
product Explanation: A small number of
popularity framework activities are applicable to all
process software projects, regardless of their size or
complexity.
Answer: c
Explanation: Effective software project Who defines the business issues that often
management focuses on the four P’s: have significant influence on the project? a)
Practitioners
um
people, product, process, and project.
b) Project managers
3. PM-CMM stands for c) Senior managers
nt
people management capability maturity d) None of the mentioned
ua
model
_Q
process management capability maturity Answer: c
model Explanation: None.
ks
product management capability maturity
model Who delivers the technical skills that are
oo
project management capability maturity necessary to engineer a product or an
_B
model application?
a) Practitioners
Answer: a
Explanation: The people management
es
b) Project managers
ot
enior managers
maturity model defines the following key None of the mentioned
_N
Which of the following is not a project some of the controls associated with the
m
a) project control
b) project management paradigm?
s:/
um
team members? to satisfy an end-user.
a) random paradigm
nt
b) open paradigm c) Which of the following is not an effective
ua
closed paradigm project manager trait?
_Q
d) synchronous paradigm a) Problem solving b)
Managerial identity
ks
Answer: d c) Influence and team building
Explanation: None. d) None of the mentioned
oo
Which of the following is not an approach to
_B
Answer: d
software cost estimation? Explanation: All are key traits of an effective
a) Empirical
b) Heuristic
es
project manager.
ot
c) Analytical Which type of software engineering team has
_N
Answer: a
/t.
the problem with little active communication resource estimates may result in
Jo
Which software engineering team has no the functionality that must be delivered and
permanent leader? the process that will be used to deliver it.
a) Controlled decentralized (CD)
b) Democratic decentralized Which of the following is not a sign that
(DD) c) Controlled Centralized indicates that an information systems project
(CC) d) None of the mentioned is in jeopardy?
a) Software people don’t understand
Answer: b their customers needs
Explanation: Here Communication among b) Changes are managed poorly
um
team members is horizontal. c) Sponsorship is gained
d) Users are resistant
nt
Which of the following is not a project factor
ua
that should be considered when planning the Answer: c
_Q
structure of software engineering teams? Explanation: Other options are contradictory
a) The difficulty of the problem to be solved to the question.
ks
b) High frustration caused by personal,
business, or technological factors that 11. SPMP stands for
oo
causes friction among team members Software roject Manager’s Plan
_B
c) The degree of sociability required for the Software roject Management Plan
project oftware roduct Management Plan
d) The rigidity of the delivery date esoftware Product Manager’s Plan
ot
Answer: c Answer: b
_N
a) Formal approaches .
e/
Explanation: None.
a) computer programs
ht
Which activity sits at the core of software b) documents that describe the computer
:-
c) Problem elaboration
d) All of the mentioned Answer: d
Explanation: None
Answer: d
Explanation: During the scoping activity Which is a software configuration
decomposition is applied in two major areas: management concept that helps us to control
change without seriously impeding
justifiable change?
Baselines Baseline
Source code None of the mentioned
Data model
None of the mentioned Answer: a
Explanation: None.
Answer: a
Explanation: A baseline is analogous to the Which of the following is the process of
kitchen doors in the restaurant. Before a assembling program components, data, and
software configuration item becomes a libraries, and then compiling and linking
um
baseline, change may be made quickly and these to create an executable system?
a) System building
nt
informally.
b) Release management
ua
Software Configuration Management can c) Change management
_Q
be administered in several ways. These d) Version management
include
ks
a) A single software configuration Answer: a
management team for the whole Explanation: None.
oo
organization b) A separate configuration
Which of the following option is not tracked
_B
management team for each project
c) Software Configuration Management by configuration management tools? a)
distributed among the project members es
Tracking of change proposals
toring versions of system components
ot
d) All of the mentioned
Tracking the releases of system versions to
_N
Answer: a customers
Explanation: None None of the mentioned
TU
manage different versions of configuration Explanation: All the options are tracked.
A
a) Change control
a) Configuration item identification
/t.
b) Version control
c) SCIs b) Risk management
s:/
d) Branch management
Answer: b
ht
um
b) Release management
Answer: b
nt
c) Change management
d) Version management Explanation: All other options are a part
ua
of version management.
_Q
Answer: b
Explanation: None. Which method recommends that very
ks
frequent system builds should be carried out
. with automated testing to discover software
oo
problems?
_B
TOPIC 4.5 EARNED a) Agile method
b) Parallel compilation method
VALUE ANALYSIS es
c) Large systems method
ot
d) All of the mentioned
Which of the following process ensures
_N
um
item? be developed independently.
a) Design & Test
nt
specification b) Source code .
ua
c) Log information
_Q
d) All of the mentioned TOPIC 4.6 PRIORI IZING
MONITORING
ks
Answer: d
Explanation: A configuration item is an
oo
approved and accepted deliverable, changes “Robustness” answers which of the
_B
have to be made through formal procedure. following description?
a) CA E tools be used to support the process
Which of the following is a part of system
release?
es
activities
ot
b) Process errors are avoided or trapped
a) electronic and paper documentation before they result in product errors
_N
Answer: d
m
of creating the collection of files and Process improvement is the set of activities,
s:/
information systems.
A sequence of baselines representing a) True
:-
as a) System building
Jo
b) Mainline Answer: b
c) Software Configuration Item(SCI) Explanation: The definition is of a
d) None of the mentioned system development process.
Answer: b “Understandability” answers which of the
Explanation: None. following description?
a) The extent to which the process is
Which of the following term is best explicitly defined
defined by the statement “The creation of a b) Process errors are avoided or trapped
um
with a new test model.
How many stages are there in process a) True
nt
improvement? b) False
ua
a) three
Answer: b
_Q
b) four
c) five Explanation: It is always best to start
ks
d) six process analysis with an existing model.
People then may extend and change this.
oo
Answer: a
What is a tangible output of an activity that is
_B
Explanation: Process measurement, analysis
and change are the three stages. predicted in a project plan?
b) Exception
s:/
Managed c) Answer: b
:-
Answer: a exception.
xplanation: Here the development team
chose their own way of working. Which of the following is not a part of
process change?
The documentation of a process which a) Introducing new practices, methods or
records the tasks, the roles and the entities processes
used is called b) Introducing new team members to existing
a) Process metric project
um
project schedule or the quality of the
a) True software being developed, and then taking
b) False
nt
action to avoid these risks.
ua
Answer: b Which of the following is not considered as a
_Q
Explanation: The CMM is discrete rather risk in project management?
than continuous. a) Specification delays
ks
b) Product competition
The CMMI assessment is based on a x- c) Testing
oo
point scale. What is the value of x? d) Staff turnover
_B
a) 0
b) 2 Answer: c
c) 4
d) 6
es
Explanation: Testing is a part of project,
thus it can’t be categorized as risk.
ot
_N
um
d) all of the mentioned
An independent relationship must exist
Answer: d between the attribute that can be measured
nt
Explanation: Estimation involves working and the external quality attribute
ua
out how much effort is required to complete a) True
_Q
each activity and, from this, calculating the b) False
total cost of activities.
ks
Answer: b
Quality planning is the process of Explanation: The value of the quality
oo
developing a quality plan for attribute must be related, in some way, to the
_B
a) team b) value of the attribute than can be measured.
project c)
customers . es
ot
d) project manager
TOPIC 4.8 CHANGE CONTROL
_N
Answer: b
Explanation: The quality plan should set out
TU
software system?
Answer: b
/t.
a) Internship management
b) Change management c) Explanation: In software engineering,
s:/
Which of the following is not a main phase in What is one or more software configuration
Configuration Management (CM) Process? a) items that have been formally reviewed and
CM Planning agreed upon and serve as a basis for further
b) Executing the CM process development?
c) CM audits a) Baseline
d) None of the mentioned b) Cumulative changes
c) CM
Answer: d d) Change Control
Explanation: All are main phases of CM.
um
Answer: a
CM is about managing the different items Explanation: In configuration management, a
nt
in the product, and changes in them. “baseline” is an agreed-to description of the
ua
a) True attributes of a product, at a point in time,
_Q
b) False which serves as a basis for defining change.
ks
Answer: a How are baselines verified? a)
Explanation: None. By reviews
oo
b) By inspections
What allows different projects to use the
_B
c) By testing of code d)
same source files at the same time? All of the mentioned
a) Version Control
b) Access control
es
Answer: c
ot
c) CM Process Explanation: Testing verifies the agreed-
_N
b) Estimate impact on effort and schedule Explanation: All are covered in CM.
tp
development process.
:-
Answer: d a) True
in
um
changes d) All of the mentioned distributed among the project members
d) All of the mentioned
Answer: d
nt
Explanation: A baseline is an agreed-to Answer: a
ua
description of the product, changes Explanation: None
_Q
require multiple reasons..
What combines procedures and tools to
.
ks
manage different versions of configuration
objects that are created during the software
oo
TOPIC 4.9 SOFTWARE process?
_B
a) Change control
CONFIGURATION b) Version control
MANAGEMENT esCIs
ot
None of the mentioned
Which of the following categories is part of
_N
a) computer programs
b) documents that describe the computer allows a user to specify alternative
configurations of the software system through
K
programs
c) data the selection of appropriate versions.
A
Explanation: None
considered during review?
s:/
a) Baselines b)
in
um
b) Storing versions of system components
c) Tracking the releases of system versions to
nt
A voluntary arrangement between two or
customers
ua
more parties that is enforceable by law as a
d) None of the mentioned binding legal agreement is known as
_Q
Answer: d
job
ks
Explanation: All the options are tracked.
loan
oo
Which of the following is not a Software contract
Configuration Management Activity? mutual fund
_B
a) Configuration item identification Answer: c
b) Risk management
c) Release management
es
Explanation: A contract arises when the
ot
parties agree that there is an agreement.
d) Branch management
_N
The definition and use of configuration mental affliction may have insufficient
capacity to enter a contract. Some types of
e/
b) CMM c)
s:/
mentioned options.
Individual mistake
Jo
Avery where Lord Denning MR held that the Which tender allows anyone to submit a
contract can only be voided if the plaintiff can tender to supply the goods or services that are
show that, at the time of agreement, the required?
plaintiff believed the other party’s identity a) Framework tendering
was of vital importance. A mere mistaken b) Selective tendering
belief as to the credibility of the other party is c) Open tendering
not sufficient. d) Close tendering
_______________ contract is one that has Answer: c
um
automatic renewals until one party requests Explanation: On larger projects, there may
termination. then be a pre-qualification process that
nt
a) Uniform b) produces a short-list of suitable suppliers who
ua
Evergreen c) will be invited to prepare tenders his sort of
_Q
Moderate d) pre-qualification process is not the same as
On-demand selective tendering.
ks
Open tendering has been criticised for
Answer: b attracting tenders / expressions of interest
oo
Explanation: If these are left unattended, they from large numbers of suppliers, some of
_B
can have significant cost impacts with little whom may be entirely unsuitable for the
value. If these agreements won’t work for the contract and as a result it can waste a great
company, the clauses stating the contract es
deal of time, effort and money. However,
ot
automatically renews should be removed. If open tendering offers the greatest competition
the clause makes sense or cannot be taken out,
_N
platform as a reminder.
6. involves the preparation of tenders
How are final contracts signed in modern based on a typical or notional bill of
K
a) e-Signatures
e/
Serial tendering
Answer: a
tp
Signatures, have become crucial for Explanation: The rates submitted can then be
businesses as they seek to increase the speed used to value works over a series of similar
:-
of time to signature, e-Signatures are legally projects, often for a fixed period of time
in
binding and have the same legal status as a following which the tendering procedure may
Jo
written signature, as long as it fulfills the be repeated. Serial tendering can reduce
requirements of the regulation it was created tender costs, and may encourage suppliers to
under. submit low rates to secure an ongoing
A contract management platform should program of work.
include the ability to integrate with an e-
Signature software, or include e-Signatures as _______________ tendering is used when
part of the platform. all the information necessary to calculate a
realistic price is available when tendering
commences.
um
price is available when tendering commences: b) True
An invitation to tender is issued to
nt
prospective suppliers (perhaps following Answer: b
ua
completion of a pre-qualification Explanation: Each believes they are
_Q
questionnaire and/or a pre-tender contracting to something different. Courts
interview). The invitation to tender will usually try to uphold such mistakes if a
ks
include information describing the goods or reasonable interpretation of the terms can be
services required in sufficient detail to found. However, a contract based on a
oo
enable prospective suppliers to prepare an mutual mistake in judgment does not cause
_B
accurate tender. the contract to be voidable by the party that is
Tenders are prepared and returned by adversely affected.
prospective suppliers (this may involve es
10. In chedule contract the contractor
ot
questions and answers and a mid-tender
interview to clarify the client’s requirements). undertakes the execution or construction of
_N
Submitted tenders are then assessed and specific work with all its contingencies, to
complete it in all respect within a specified
TU
Answer: a
the preferred tenderer may then be appointed.
m
um
Explanation: None. c) process
d) none of the mentioned
nt
Which of the following is not an effective
ua
software project management focus? Answer: c
_Q
a) people b) Explanation: A small number of
product c) framework activities are applicable to all
ks
popularity software projects, regardless of their size or
d) process complexity.
oo
_B
Answer: c Who defines the business issues that often
Explanation: Effective software project have significant influence on the project? a)
management focuses on the four P’s: es
Practitioners
ot
people, product, process, and project. b) Project managers
c) Senior managers
_N
model Answer: c
process management capability maturity Explanation: None.
K
model
A
product management capability maturity Who delivers the technical skills that are
e/
model
b) Project managers
s:/
um
Which of the following is a people- Interviews are conversations with a)
intensive activity? fun
nt
a) Problem solving b) purpose
ua
b) Organization c) c) friendliness
_Q
Motivation d) informality
d) Project management
ks
Answer: b
Answer: d Explanation: The correct statement is:
oo
Explanation: For this reason, competent Interviews are conversations with purpose.
_B
practitioners often make poor team leaders. For the employer the purpose is to determine
the most suitable person for the job.
Which paradigm structures a team loosely
and depends on individual initiative of the
es
A job interview is a formal meeting
ot
team members? between a job seeker and an employer.
_N
closed paradigm
d) synchronous paradigm Answer: a
K
software cost estimation? All job interviews have the same objective. a)
s:/
a) Empirical True
tp
b) Heuristic b) False
c) Analytical
ht
d) Critical Answer: a
:-
um
applicant is evaluated? computer programmers or trainers, companies
a) Stress interview
nt
want to see you in action before they make
b) Screening interview their decision. Here, the audition type is
ua
c) Group interview adapted.
_Q
d) Behavioural interview
In which of these, more than one candidate is
ks
Answer: b interviewed?
Explanation: In the screening interview, a) The behavioural interview
oo
companies use screening tools to ensure b) The stress interview
_B
that candidates meet minimum qualification c) The group interview
requirements. d) The audition
and style.
A
Answer: a
e/
Explanation: There are two styles used in a Which of these interviews is taken for a
m
um
Which of the following is the numerator of fails. Basically, it states the load carrying
factor safety formula? capacity of a material beyond the actual load.
nt
a) Working stress
b) Shear stress c) What can understand by the factor of safety
ua
Tensile stress d) equal to one?
_Q
Ultimate stress a) It means that the structure will fail under
load
ks
Answer: d b) It means that the structure will only
support the actual load
oo
Explanation: Factor of safety is defined as
ratio of ultimate stress and working stress. c) it means that the structure will support
_B
It is also called as factor of ignorance. The more than the actual load
factor of safety is dependent on the type of d) There is no relation between factor
load. es
safety and load application
ot
Which of the following can be the factor of Answer: b
_N
safety for a dead load? Explanation: When the factor of safety is one
it means that the ultimate stress is equal to the
TU
a) 6
b) 2 working stress and therefore the body can
only support load up to actual load and no
K
c) 4
d) 7 more before failing.
A
e/
Explanation: For dead load, the range in safety the design will work properly?
/t.
d) 0.9
ht
um
a) True a) The product should be easy to use
b) Software engineers shall ensure that their
nt
b) False
products and related modifications meet the
ua
Answer: b highest professional standards possible
_Q
Explanation: The design factor of safety for c) Software engineers shall ensure that their
most aircraft structures or components is products and related modifications satisfy
ks
taken to be 1.5 and not 2. More factors the client
affect this value, but it is most of the time d) It means that the product designed /created
oo
taken as 1.5. should be easily available
_B
Answer: b
TOPIC 5.7 ETHICAL AND
PROFESSIONAL CONCERNS OF
es
Explanation: None.
ot
WORKING IN TEAMS Identify an ethical dilemma from the
_N
responsibility a) Confidentiality
b) Refusing to undertake a project
A
senior management
property rights
m
Answer: a
s:/
Answer: c
Explanation: None.
Explanation: Engineers should normally
tp
respect the confidentiality of their employers Identify the correct statement: “Software
ht
the use of intellectual property such as c) ensure that their products only meet the
patents, copyright, etc. SRS.”
“Software engineers should not use their d) all of the mentioned
technical skills to misuse other people’s Answer: b
computers.”Here the term misuse refers to: Explanation: Software engineers shall act in a
a) Unauthorized access to computer manner that is in the best interests of their
material b) Unauthorized modification of client and employer consistent with the public
computer material
interest and shall ensure that their products The reason for software bugs and failures is
and related modifications meet the highest due to
professional standards possible.Thus options a) Software companies
a & c are ruled out. b) Software Developers
c) Both Software companies and
Select the incorrect statement: “Software Developers d) All of the mentioned
engineers should
a) not knowingly accept work that is outside Answer: c
your competence.” Explanation: Software companies are
um
b) not use your technical skills to misuse responsible for making policies and providing
other people’s computers.” working atmosphere for the software
nt
c) be dependent on their colleagues.” development, so in turn these companies
ua
d) maintain integrity and independence become a part of software development
_Q
in their professional judgment.” process.Bugs from developers side is no new
thing. Thus option c answers the question.
ks
Answer: c
Explanation:None. Company has latest computers and state-of
oo
the- art software tools, so we shouldn’t worry
_B
Efficiency in a software product does not about the quality of the product.
include ________ a) True
a) responsiveness es
b) False
ot
b) licensing
c) memory utilization Answer: b
_N
company.
e/
As per an IBM report, “31%of the project get TOPIC 5.8 DECISION MAKING
m
b) Enhancements of capabilities c)
? Deletion of obsolete capabilities
ht
engineering
in
um
a) Corrective Answer: b
b) Adaptive Explanation: The three categories include:
nt
c) Perfective Coverage, Minimization and Safe techniques.
ua
d) Preventive
_Q
Which selective retest technique selects
Answer: b every test case that causes a modified
ks
Explanation: None. program to produce a different output than its
original version?
oo
How many phases are there in Taute a) Coverage
_B
Maintenance Model? b) Minimization
a) six b) afe
seven c) es
Maximization
ot
eight d)
nine Answer: c
_N
Precision
Answer: a
tp
Generality
Explanation: All other options are known as
ht
Inclusiveness
levels of software testing which further have
:-
um
program, and thereby expose faults caused by
modifications. architecture if it conforms to the structural
nt
decisions described by the architecture, the
. implementation must be divided into
ua
prescribed components.
_Q
TOPIC 5.9 ORGANIZATIONAL
Why does architecture dictates
STRUCTURES
ks
organizational structure?
a) Architecture describes the structure of the
oo
Why is Software architecture so important? system being developed which becomes
_B
a) Communication among stakeholders engraved in the development project structure
b) Early Design decisions b) An implementation exhibits an architecture
c) Transferable abstraction of a es
if it conforms to the structural decisions
ot
system d) All of the mentioned described by the architecture
c) Architecture may not describe structure
_N
Answer: d as whole
Explanation: Reasons of the architecture to d) None of the mentioned
TU
um
implementation affect system quality by modifying a single component.
b) Decisions at all level of like cycle from
nt
high level design to coding, implementation An architecture help in evolutionary
ua
may or may not affect system quality prototyping in which of the following ways?
_Q
c) Decisions at all level of like cycle from a) Potential performance problem can be
high level design to coding,implementation identified early in the product’s life cycle b)
ks
does not affect system quality The system is executable early in the
d) None of the mentioned product’s life cycle
oo
c) All of the mentioned d)
_B
Answer: a None of the mentioned
Explanation: Decisions at all level of like
cycle from high level design to coding, es
Answer: c
ot
implementation affect system quality. Explanation: All the mentioned are the
valid ways.
_N
b) No b) Conceptual or logical
A
Answer: a Answer: d
/t.
Which structure’s view is orthogonal to the as-you-go usage model allows for costs to
module and conceptual view? be applied to individual accounts directly.
a) Module Structure
b) Process Structure 2. Point out the correct statement.
c) Uses Structure d) Except for tightly managed SaaS cloud
Data flow providers, the burden of resource
management is still in the hands of the user
Answer: b Cloud computing vendors run very reliable
Explanation: Process Structure-view is networks
um
orthogonal to the module and conceptual The low barrier to entry cannot be
accompanied by a low barrier to provisioning
nt
view.
All of the mentioned
ua
Which structure’s view shows the
_Q
mapping of software onto hardware? Answer: b
a) Module Structure Explanation: Often, cloud data is load-
ks
b) Process Structure balanced between virtual systems and
c) Physical Structure replicated between sites.
oo
d) Class Structure
_B
captive requires that the cloud
Answer: c accommodate multiple compliance regimes.
Explanation: Physical Structure- view shows es
a) Licensed
ot
the mapping of software onto hardware. b) Policy-based
c) Variable
_N
d) Control Flow
e/
Compliance
tp
VI TUAL TEAMS
:-
Answer: c
in
Which of the following subject area deals Explanation: To ensure data privacy in the
Jo
with pay as you-go usage model? cloud, additional security methods such as
a) Accounting Management private encryption, VLANs, firewalls, and
b) Compliance local storage of sensitive data are necessary.
c) Data Privacy
d) All of the mentioned 5. Point out the wrong statement.
Large cloud providers with geographically
Answer: a dispersed sites worldwide, therefore, achieve
Explanation: For cloud computing, the pay- reliability rates that are hard for private
systems to achieve
Private data centers tend to be located in Cloud ________ are standardized in order to
places where the company or unit was appeal to the majority of its audience.
founded or acquired a) SVAs
A network backbone is a very low-capacity b) SLAs
network connection c) SALs
None of the mentioned d) None of the mentioned
Answer: c Answer: b
Explanation: On the Internet, an Internet Explanation: Custom SLAs that allow for
um
backbone consists of the high-capacity multiple data sources are difficult to obtain
routes and routers that are typically operated
nt
or enforce.
by an individual service provider such as a
ua
government or commercial entity. 10. is a function of the particular enterprise
_Q
and application in an on-premises
Which of the following captive area deals deployment.
ks
with monitoring? Vendor lock
a) Licensed Vendor lock-in
oo
b) Variable but under Vendor lock-ins
_B
control c) Low None of the mentioned
d) All of the mentioned
Answer: b
es
Answer: b
ot
Explanation: Vendor lock-in for a cloud
Explanation: For private systems, any computing solution in a PaaS model is very
_N
a) large
e/
b) small
TOPIC 5.12
m
c) big
COMMUNICATION PLANS
/t.
Explanation: This is the case for staging, present in the channels of communication?
ht
shared by
d) Over communication
Jo
a) replicas
b) shards Answer: a
c) tenants Explanation: Noise is the external sounds
d) all of the mentioned present in the channels of communication,
Answer: c which results in the reduction of the audibility
Explanation: Clouds often have or omission of some words from the message.
higher reliability than private systems. Which of these should not be avoided for
effective communication?
um
would give an ill planned, long winding Answer: a
Explanation: The statement is true
nt
lecture while a short presentation with tables
or graphs would be sufficient. Communication should serve as a conflict-
ua
reduction exercise. When people start
_Q
__________ are problems arising from competing for the fulfillment of their narrow
expression. interests communication suffers.
ks
a) Cultural barriers b)
Semantic problems c) means to impart understanding of the
oo
Wrong assumptions d) message.
_B
Selecting perception a) Encoding
b) Receiver
Answer: b es
c) Decoding
ot
Explanation: The correct statement is: d) Feedback
Semantic problems are problems arising from
_N
a) True
e/
complete?
Answer: a a) When the sender transmits the
/t.
Explanation: The statement is true. Both message b) When the message enters the
s:/
encoding and decoding of message are channel c) When the message leaves the
tp
um
distorts communication.
d) Adequate medium
Which of these must be avoided for
nt
effective communication? Answer: b
ua
a) Sharing of activity Explanation: In order to ensure an effective
_Q
b) Listening communication one must take care of ten
c) Ambiguity commandments: Clarity in language, home
ks
d) Politeness communication skills, listen attentively, etc..
oo
Answer: c
_B
Explanation: Ambiguity must be avoided.
Clarity and crispness of the message is very
es
ot
_N
TU
K
A
e/
m
/t.
s:/
tp
ht
:-
in
Jo