| Q 1: |
Most modern software applications enable you to customize and automate various features using small custom built mini programs called |
| (1) | Macros |
| (2) | Code |
| (3) | Routines |
| (4) | Subroutines |
| Correct Answer: Macros | |
| Q 2: | An anticipated result from multiprogramming operations is: |
| (1) | reduced computer idle time |
| (2) | the handling of more jobs |
| (3) | better scheduling of work |
| (4) | All of the above |
| Correct Answer: All of the above | |
| Q 3: |
Data security threats include |
| (1) | Privacy invasion |
| (2) | Hardware failure |
| (3) | Fraudlent manipulation of data |
| (4) | All of these |
| Correct Answer: Privacy invasion | |
| Q 4: |
Who will increase the redundancy of plain text? |
| (1) | Confusion |
| (2) | Diffusion |
| (3) | Both confusion and diffusion |
| (4) | None of these |
| Correct Answer: Diffusion | |
| Q 5: |
The set of attributes X will be fully functionally dependent on the set of attributes Y if the following conditions are satisfied. |
| (1) | X is functionally dependent on Y |
| (2) | X is not functionally dependent on any subset of Y |
| (3) | Both (a) and (b) |
| (4) | None of the above |
| Correct Answer: Both (a) and (b) | |
| Q 6: | In ASP.NET if one uses Windows authentication the current request attaches an object called as |
| (1) | Serialization |
| (2) | WindowsPrincipal |
| (3) | WindowDataset |
| (4) | None of the Above |
| Correct Answer: WindowsPrincipal | |
| Q 7: | For sampling of a large dataset D, n-tuples of D were divided into multiple disjoint subjects, then Random sampling was applied an each subset to obtain a sample of D. Sampling of D is :- |
| (1) | Cluster sampling |
| (2) | Partial sampling |
| (3) | Stratified sampling |
| (4) | Random sampling |
| Correct Answer: Stratified sampling | |
| Q 8: |
In the Spiral model of software development, the primary determinant in selecting activities in each iteration is |
| (1) | Iteration size |
| (2) | Cost |
| (3) | Adopted process such as Rational Unified Process or Extreme Programming |
| (4) | Risk |
| Correct Answer: Risk | |
| Q 9: |
The cyclomatic complexity of the flow graph of a program provides |
| (1) | An upper bound for the number of tests that must be conducted to ensure that all statements have been executed at most once. |
| (2) | An upper bound for the number of tests that must be conducted to ensure that all statements have been executed at least once. |
| (3) | A lower bound for the number of tests that must be conducted to ensure that all statements have been executed at most one. |
| (4) | A lower bound for the number of tests that must be conducted to ensure that all statements have been executed at least once. |
| Correct Answer: An upper bound for the number of tests that must be conducted to ensure that all statements have been executed at most once. | |
| Q 10: |
Which of these activities is not one of the activities recommended to be performed by an independent SQA group? |
| (1) | Prepare SQA plan for the project |
| (2) | Review software engineering activities to verify process compliance |
| (3) | Report any evidence of noncompliance to senior management |
| (4) | Serve as the sole test team for any software produced |
| Correct Answer: Serve as the sole test team for any software produced | |