0% found this document useful (0 votes)
37 views8 pages

ISE Final 2022 Solved

This document is an examination paper for the Introduction to Software Engineering course at Bahria University, Karachi Campus, for the Spring Semester of 2022. It includes multiple-choice questions, subjective questions, and instructions for answering them, covering various topics in software engineering. The exam is structured to assess students' understanding of software development processes, risk management, and system modeling.

Uploaded by

mfarhan024260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views8 pages

ISE Final 2022 Solved

This document is an examination paper for the Introduction to Software Engineering course at Bahria University, Karachi Campus, for the Spring Semester of 2022. It includes multiple-choice questions, subjective questions, and instructions for answering them, covering various topics in software engineering. The exam is structured to assess students' understanding of software development processes, risk management, and system modeling.

Uploaded by

mfarhan024260
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

BAHRIA UNIVERSITY (KARACHI CAMPUS)

FINAL TERM EXAMINATION – SPRING SEMESTER – 2022


INTRODUCTION TO SOFTWARE ENGINEERING (SEN 120) OBJECTIVE
Class:BSE 2 (A/B)

Morning
Time Allowed: 40 Minutes
Course Instructor: Engr. Mobeen Nazar
Time:
Date:Session: Student’s Name:
Max Marks: 20

Note:
Write the letters for your answers in the table provided.

MULTIPLE CHOICE ANSWER SHEET

Q. NO. # ANSWER Q. NO. # ANSWER Q. NO. # ANSWER Q. NO. # ANSWER

Q. 1 D Q. 11 D Q. 21 A Q. 31 A

Q. 2 D Q. 12 B Q. 22 D Q. 32 D

Q. 3 Q. 13 A Q. 23 B Q. 33 B

Q. 4 B Q. 14 A Q. 24 C Q. 34 C

Q. 5 A Q. 15 A Q. 25 B Q. 35 B

Q. 6 C Q. 16 Q. 26 A Q. 36 D

Q. 7 B Q. 17 A Q. 27 A Q.37 D

Q. 8 A Q.18 A Q. 28 D Q. 38 B

Q. 9 B Q. 19 B Q. 29 B Q. 39 C

Q. 10 D Q. 20 D Q. 30 A Q. 40 D

Page 1 of 6
Question No 1) (CLO 1) [20
Marks]

Answer each of the following questions by choosing the best answer from the options given
and write your answers in the table above.

1. Estimation of size for a project is dependent on.


A. Cost
B. Time
C. Schedule
D. None of the mentioned

2. Risk management is responsibility of the .


A. Customer
B. Investor
C. Developer
D. Project team

3. As a tester which of the following will come under product risk if you are testing an e-
commerce website? *
A. Failure to transfer a user to secure gateway while paying
B. Many changes in SRS that caused changes in test cases
C. Delay in fixing defects by development team
D. Shortage of testers

4. In the process of the risk management what should be consider before talking the
decision of risk.
A. Risk assessment
B. Risk identification
C. Risk retention
D. Risk transfer

5. The degree of uncertainty that the product will meet its requirements and be fit for its
intended use.
A. Performance risk
B. Cost risk
C. Support risk
D. Schedule risk

6. CPM is:
A. Critical Project Management
B. Critical Path Management
C. Critical Path Method
D. Crash Project Method

7. Software testing with real data in real environment is known as.


A. Alpha testing
B. Beta testing
C. Regression testing
D. None of the mentioned

Page 2 of 6
8. “Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing?
A. Functional
B. Non-Functional
C. Known Requirement
D. None of the mentioned

9. The prototyping model of software development is


A. A reasonable approach when requirements are well defined.
B. A useful approach when a customer cannot define requirements clearly.
C. The best approach to use for projects with large development teams.
D. A risky model that rarely produces a meaningful product

10. The UML was designed for describing


A. Object-oriented systems
B. Architectural design
C. SRS
D. Both object-oriented systems and Architectural design

11. Why is architecture important?


A. Handling complexity
B. Communication among stakeholders
C. Early Design Decisions
D. All the above

12. Which testing is done after code fixes, upgrades or any other system maintenance to
check the new code has not affected the existing code?
A. Equivalence Partitioning
B. Regression
C. Boundary Value Analysis
D. Functional

13. Reactive risk management is sometimes described as firefighting.


A. True
B. False

14. CASE stands for?


A. Computer-Aided Software Engineering
B. Control Aided Science and Engineering
C. Cost Aided System Experiments
D. None of the mentioned

15. Identify the disadvantage of Spiral Model.


A. Doesn’t work well for smaller projects
B. High amount of risk analysis
C. Strong approval and documentation control
D. Additional Functionality can be added at a later date

Page 3 of 6
16. Which of these terms are level names in the Capability Maturity Model?*
A. Performed
B. Repeated
C. Reused
D. Optimized
E. both a and d

17. Risk is expressed in terms of probability and impact.


A. True
B. False

18. Risk management is important part of a project management


A. True
B. False

19. What is the full form of the “COCOMO” model?


A. Cost Constructive Estimation Model
B. Constructive Cost Estimation Model
C. Constructive Case Estimation Model
D. Constructive Cost Estimating Model

20. Most Common Software problems


A. Incorrect calculation
B. Data searches that yields incorrect results
C. Incorrect data edits & ineffective data edits
D. All the above

21. A good test case is one that has a probability of finding an as yet undiscovered error.
A. True
B. False

22. Which of the following is not a part of Software evolution?


A. Re-engineering activities
B. Maintenance activities
C. Development activities
D. Negotiating with client

23. Integral testing requires knowledge of the internal program design and code.
A. True
B. False

24. Identify the incorrect phase of the prototype model.


A. Prototype refinement
B. Engineer product
C. Coding
D. Quick design

25. Black box testing knowledge of internal design or code required.


A. True

Page 4 of 6
B. False

26. Black Box - testing technique determined to incorrect or missing functions, Interface
errors, Errors in data structures or external database access Performance errors,
Initialization and termination errors.
A. True
B. False

27. Test case is defined as set of test inputs, execution conditions and expected results,
developed for a particular objective.
A. True
B. False

28. Black box type testing that is based on overall requirements specifications; covering all
combined parts of the system.
A. Functional testing
B. System testing
C. End to end testing
D. All the above

29. Boundary value analysis belongs to?


A. White Box Testing
B. Black Box Testing
C. White Box & Black Box Testing
D. None of the mentioned

30. A functional requirement is a description of the features characteristics, and attributes


of the systems as well as any constraints that may limit the boundaries
A. True
B. False

31. Non- functional requirement define system properties and constraints e.g. reliability,
response time and storage requirements. Constraints are I/O device capability, system
representations, etc
A. True
B. False

32. Which one of the following is a functional requirement?


A. Maintainability
B. Portability
C. Robustness
D. None of the mentioned

33. Which one of the following is a requirement that fits in a developer’s module?
A. Availability
B. Testability
C. Usability
D. None of the mentioned

Page 5 of 6
34. Choose the incorrect statement with respect to Non-Functional Requirement (NFR).
A. Product-oriented Approach – Focus on system (or software) quality
B. Process-oriented Approach – Focus on how NFRs can be used in the
design process
C. Quantitative Approach – Find measurable scales for the functionality
attributes
D. Qualitative Approach – Study various relationships between quality goals

35. Validation refers to the set of tasks that ensure that software correctly implements a
specific function.
A. True
B. False

36. Select the correct option which refers to internal software equality?
A. Reusability
B. Scalability
C. Usability
D. Reliability

37. What are the categories in which quality attributes are divided in?
A. Development Attributes
B. Operational Attributes
C. Functional Attributes
D. Development & Operational Attributes

38. Software is manufactured in the classical sense and it doesn't "wear out.
A. True
B. False

39. What is Cyclomatic complexity?


A. Black box testing
B. White box testing
C. Yellow box testing
D. Green box testing

40. Which of the following is not a section in the standard for SQA plans recommended by
IEEE?
A. Budget
B. Time
C. People
D. None of the above

************

Page 6 of 6
BAHRIA UNIVERSITY (KARACHI CAMPUS)
FINAL TERM EXAMINATION – SPRING SEMESTER – 2022
INTRODUCTION TO SOFTWARE ENGINEERING (SEN 120) SUBJECTIVE
Class:BSE 2 (A/B)

Morning
Time Allowed: 1hour 20 mints Max Marks:30
Course Instructor: Engr. Mobeen Nazar
Registration No.
Date:Session: Student’s Name:

Note:
Attempt all questions in sequence.

Question 2: (CLO 2) [12 Marks- 2 Mark each]


a) Describe different system perspectives for system modeling.
b) Describe different process perspectives for system modeling.
c) Describe SQA activities.
d) Describe CMM and its levels.
e) Explain seven principles of risk management.
f) Explain four P’s of Software Project Management.

Question 3: (CLO 3) [09 Marks – 3 Mark each]


A customer visits the online shopping system .By using this system customer may buy item or
just visit the page and logout. The customer can select a segment, then a category, and brand
to get the different products in the desired brand. The customer can select the product for
purchasing. The process can be repeated for more items. Once the customer finishes selecting
the product/s the cart can be viewed, if the customer wants to edit the final cart it can be done
here. The manager will be responsible for adding, deleting and updating the items into the
system which will be stored in an external database server.

a) Construct context diagram of the given scenario.


b) Construct sequence diagram of the given scenario.
c) Construct the layered architecture of the given scenario.

Question 4: (CLO 3) [09 Marks- 3 Mark each]


a) For the given table below calculate:
1) Unadjusted function point
2) Function point count
3) Function point value
For the complex function with complexity adjustment factor as 3. Perform all necessary
calculations and steps.
No of User I/P: 50
No of user O/P: 40

Page 1 of 2
No. of user Enquiries: 35
No. of user files: 06
No. of user interfaces: 04

Function Simple Average Complex

1. Number of external inputs (EI) 7 10 15

2. Number of external outputs (EO) 5 7 10

3. Number of external inquiries 3 4 6


(EQ)
4. Number of internal files (ILF) 4 5 7

5. Number of external files (EIF) 3 4 6

b) Calculate Risk Exposure where probability is 0.80 and Cost is $25,200.

c) For the data given below in the table calculate the data for the cumulative data
of activity A & B :
1) Schedule Performance index
2) Cost Performance index
3) Cost Schedule index

Tasks Planned Actual % Earned


Value Cost (AC) Completio Value
(PV) n (EV)
Activity A 1,80,000 2,00,000 100% 1,80,000 Rs
Rs Rs
Activity B 80,000 Rs 1,00,000 75% 60,000 Rs
Rs
Cumulativ 2,60,000 3,00,000 – 2,40,000 Rs
e Rs Rs

***End of Examination Paper***

Page 2 of 2

You might also like