Monday, 9 July 2012

ACP PAPER 2


RPSC has uploaded the keys on their website.
URL: http://rpsc.rajasthan.gov.in/Interview_Related_Query.aspx

------------------------------------------------------------------------------------------------------------

Following questions have wrong answer in the key of the paper 1:
Q# 147719  :  All options are wrong. This question should be removed.

Following questions have wrong answer in the key of paper 2: 
Q# 147265  :  Correct Answer:  3 
Q# 147289  :  Correct Answer:  3
Q# 147307  :  Correct Answer:  1
Q# 147319  :  Correct Answer:  1,2,3 / Question should be removed
Q# 147343  :  Correct Answer:  1
Q# 147356  :  Correct Answer:  1
Q# 147376 :   Correct Answer : 4

------------------------------------------------------------------------------------------------------------


Please go to the following page and let us know your marks: We'll calculate cut off marks and share with you soon.

Thanks
Study Circle





------------------------------------------------------------------------------------------------------------

Question Paper Preview

  • Question Paper Name: ACP Paper 2 - 2012
  • Creation Date: 2012-06-28 13:29:36.0
  • Cut Off: 0
  • Duration: 120
  • Status: Sealed



Section 1

Question id : 147263 (Correct + 0.83 , Wrong - 0.28)
System Study involves

1. Study of an existing system
2. Documenting the existing system
3. Identifying current deficiencies and establishing new goals
4. All of the above

ANS: 4



Question id : 147264 (Correct + 0.83 , Wrong - 0.28)
The primary tool used in structured design is a:

1. Structure chart
2. Data-flow diagram
3. Program flow chart
4. Module

ANS: 1



Question id : 147265 (Correct + 0.83 , Wrong - 0.28)
In a ________ one module of the new information system is activates at a time.

1. System Development Life Cycle
2. CASE tool
3. Phased Conversion
4. Success factors

ANS: 3



Question id : 147266 (Correct + 0.83 , Wrong - 0.28)
The approach used in top-down analysis and design is

1. To identify the top level functions by combining many smaller components into a signel entity
2. To prepare flow charts after programming has been completed
3. To identify a top level function and then create a hierachy of lower-level modules and components
4. All of the above

ANS: 3



Question id : 147267 (Correct + 0.83 , Wrong - 0.28)
The first step in the systems development life cycle (SDLC) is:

1. Analysis
2. Design
3. Problem/Opportunity Identification
4. Development and Documentation

ANS: 3



Question id : 147268 (Correct + 0.83 , Wrong - 0.28)
The make-or-buy decision is associated with the _______ step in the SDLC.

1. Problem/opportunity identification
2. Design
3. Analysis
4. Development and documentation

ANS: 2



Question id : 147269 (Correct + 0.83 , Wrong - 0.28)
In the Analysis phase, the development of the _______ occurs, which is a clear statement of the goals and objectives of the project.

1. Documentation
2. Flowchart
3. Program Specification
4. Design

ANS: 3



Question id : 147270 (Correct + 0.83 , Wrong - 0.28)
Actual programming of software code is done during the _______ step in the SDLC

1. Maintenance and Evaluation
2. Design
3. Analysis
4. Development and Documentation

ANS: 4



Question id : 147271 (Correct + 0.83 , Wrong - 0.28)
Translating the algorithm into a programming language occurs at the _______ step of the PDLC

1. Debugging
2. Coding
3. Testing and Documentation
4. Algorithm Development

ANS: 2



Question id : 147272 (Correct + 0.83 , Wrong - 0.28)
System testing falls within the scope of

1. White box testing
2. Black box testing
3. Both of them
4. None

ANS:2



Question id : 147273 (Correct + 0.83 , Wrong - 0.28)
Alpha testing is

1. Internal testing
2. An independent test team at the client' site
3. An independent test team at the developers' site
4. None

ANS: 3




Question id : 147274 (Correct + 0.83 , Wrong - 0.28)
Beta testing is

1. Internal testing
2. An independent test team at the client's site
3. An independent test team at the developers' site
4. None

ANS: 2



Question id : 147275 (Correct + 0.83 , Wrong - 0.28)
Unit Testing will be done by

1. Testers
2. End Users
3. Customer
4. Developers

ANS: 4



Question id : 147276 (Correct + 0.83 , Wrong - 0.28)
Which Software Development Life cycle model will require to start Testing Activities when starting development activities itself

1. Water Falls Model
2. Spiral Model
3. V-Model
4. Linear Model

ANS: 3



Question id : 147277 (Correct + 0.83 , Wrong - 0.28)
Testing Technique examines the basic program structure and it derives the test data from the program logic; Ensuring that all statements and conditions executed at least once. It is called as

1. Block box Testing
2. White box Testing
3. Grey Box Testing
4. Closed Box Testing

ANS: 2



Question id : 147278 (Correct + 0.83 , Wrong - 0.28)
Software feasibility is based on which of the following

1. Business and marketing concerns
2. Scope, constraints, market
3. Technology, finance, time, resources
4. Technical prowess of the developers

ANS: 3



Question id : 147279 (Correct + 0.83 , Wrong - 0.28)
Condition testing is a control structure testing technique where the criteria used to design test cases is that they

1. Rely onbasis path testing
2. Exercise the logical conditions in a program module
3. Select test paths based on the locations and uses of variables
4. Focus on testing the validity of loop constructs

ANS: 2



Question id : 147280 (Correct + 0.83 , Wrong - 0.28)
Data flow testing is a control structure testing technique where the criteria used to design test cases is that they

1. Rely on basis path testing
2. Exercise the logical conditions in a program module
3. Select test paths based on the locations and uses of variables
4. Focus on testing the validity of loop constructs

ANS: 3




Question id : 147281 (Correct + 0.83 , Wrong - 0.28)
Loop testing is a control structure testing technique where the criteria used to design test cases is that they

1. Rely basis path testing
2. Exercise the logical conditions in a program module
3. Select test paths based on the locations and uses of variables
4. Focus on testing the validity of loop constructs

ANS: 4



Question id : 147282 (Correct + 0.83 , Wrong - 0.28)
Testing OO class operations ia made more difficult by

1. Encapsulation
2. Inheritance
3. Polymorphism
4. Both 2 and 3

ANS: 4



Question id : 147283 (Correct + 0.83 , Wrong - 0.28)
Deep structure testing is not designed to

1. Examine Object Behaviors
2. Exercise Communication Mechanisms
3. Exercise Object Dependencies
4. Exercise Structure Observable By The User

ANS: 4



Question id : 147284 (Correct + 0.83 , Wrong - 0.28)
To check whether we are developing the right product according to the customer requirements are not. It is a static process.

1. Validation
2. Verification
3. Quality Assurance
4. Quality Control

ANS: 2



Question id : 147285 (Correct + 0.83 , Wrong - 0.28)
Goals are identified by

1. Finding the deficiencies in the current system
2. Observing the current system
3. Analyzing competitor's system
4. Finding the advantages in the current system

ANS: 1



Question id : 147286 (Correct + 0.83 , Wrong - 0.28)
A data dictionary is usually developed

1. At requirements specification phase
2. During feasibility analysis
3. When DFD is developed
4. When a database is designed

ANS: 3



Question id : 147287 (Correct + 0.83 , Wrong - 0.28)
A data dictionary has information about

1. Every data element in a data flow
2. Only key data element in a data flow
3. Only important data elements in a data flow
4. Only numeric data elements in a data flow

ANS: 1



Question id : 147288 (Correct + 0.83 , Wrong - 0.28)
It is necessary to carefully design data input to a computer based system because

1. It is good to be careful
2. The volume of data handled is large
3. The volume of data handled is small
4. Data entry operators are not good

ANS:2



Question id : 147289 (Correct + 0.83 , Wrong - 0.28)
Errors occur more often when

1. Data is entered by users
2. Data is entered by operators
3. When data is handwritten by users and entered by an operator
4. The key board design is bad

ANS: 3



Question id : 147290 (Correct + 0.83 , Wrong - 0.28)
In interactive data input terminal commands are normally used to

1. Enter new data
2. Add/delete data
3. Select one out of many alternatives often by a mouse click
4. Detect errors in data input

ANS: 2




Question id : 147291 (Correct + 0.83 , Wrong - 0.28)
Data inputs which required coding are

1. Fields which specify prices
2. Key fields
3. Name fields such as product name
4. Fields which are of variable length

ANS: 2



Question id : 147292 (Correct + 0.83 , Wrong - 0.28)
By the term "comprehensive code" we understand that the code

1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded

ANS: 4



Question id : 147293 (Correct + 0.83 , Wrong - 0.28)
Verification is

1. Checking that we are building the right system
2. Checking that we are building the system right
3. Performed by an independent test team
4. Making sure that it is what the user really wants

ANS: 2



Question id : 147294 (Correct + 0.83 , Wrong - 0.28)
A regression test

1. Will always be automated
2. Will help ensure unchanged areas of the software have not been affected
3. Will help ensure changed areas of the software have not been affected
4. Can only be run during user acceptance testing

ANS: 2



Question id : 147295 (Correct + 0.83 , Wrong - 0.28)
If an expected result is not specified then

1. We cannot run the test
2. It may be difficult to repeat the test
3. It may be difficult to determine if the test has passed or failed
4. We cannot automate the user inputs

ANS: 3



Question id : 147296 (Correct + 0.83 , Wrong - 0.28)
Requirement specification is carried out

1. After requirements are determined
2. Before requirements are determined
3. Simultaneously with requirements determination
4. Independent of requirements determination

ANS: 1



Question id : 147297 (Correct + 0.83 , Wrong - 0.28)
By economic feasibility of a system we mean that

1. It is economical to operate
2. It is expensive to operate
3. It will be cost-effective if implemented
4. Finances are available to implement the system and it will be cost-effective

ANS: 4



Question id : 147298 (Correct + 0.83 , Wrong - 0.28)
The major goal of requirement determination phase of information system development is

1. Determine whether information is needed by an organization
2. Determine what information is needed by an organization
3. Determine how information needed by an organization can be provided
4. Determine when information is to be given

ANS:2



Question id : 147299 (Correct + 0.83 , Wrong - 0.28)
Information requirements of an organization can be determined by

1. Interviewing managers and users and arriving at the requirements based on consensus
2. Finding out what similar organizations do
3. Telling organization what they need based on your experience
4. Sending a questionnaire to all employees of the organization

ANS:1



Question id : 147300 (Correct + 0.83 , Wrong - 0.28)
It is necessary to prioritize information requirements of an organization at the requirements determination phase as

1. It is always good to prioritize
2. There are conflicting demands from users
3. There are constraints on budgets, available time, human resource and requirement
4. all good organization do it

ANS: 3



Question id : 147301 (Correct + 0.83 , Wrong - 0.28)
System evaluation is carried out

1. After the system has been operational for a reasonable time
2. During system implementation
3. Whenever managers of user organization want it
4. Whenever operational staff want it

ANS: 1



Question id : 147302 (Correct + 0.83 , Wrong - 0.28)
Themain objective of feasibility study is

1. To assess whether it is possible to meet the requirements specifications
2. To assess if it is possible to meet the requirements specified subject to Constraints of budget, human resource and hardware
3. To assist the management in implementing the desired system
4. To remove bottlenecks in implementing the desired system

ANS: 2




Question id : 147303 (Correct + 0.83 , Wrong - 0.28)
Quantification of goals is required because

1. Without quantification no work can be done
2. When goals are quantified it is possible to verify unambioguously whether they have been fulfilled
3. Goals have to be quantified for a good system
4. It facilitates designing a good system

ANS: 2



Question id : 147304 (Correct + 0.83 , Wrong - 0.28)
During feasibility analysis it is necessary to examine several alternative solutions because

( I ). A comparison of alternatives will lead to a cost-effective solution.
( II ). A pre-conceived singlesolution may turn out to be un-implementable.
( III ). It is always good to examine alternatives.
( IV). Management normally looks at alternatives.

1. i and iii
2. i and iv
3. i and ii
4. iiand iv

ANS: 3



Question id : 147305 (Correct + 0.83 , Wrong - 0.28)
At the end of the feasibility study the systems analyst

1. Meets the users for a discussion
2. Gives a summary feasibility report to the management
3. Gives a systems proposal to management
4. Tells the top management if the system is not feasible

ANS: 2



Question id : 147306 (Correct + 0.83 , Wrong - 0.28)
Data cannot flow from an external entity to an external entity because

1. It will get corrupted
2. It is not allowed in dfd
3. An external entity has no mechanism to read or write
4. Both are outside the context of the system

ANS: 4



Question id : 147307 (Correct + 0.83 , Wrong - 0.28)
A context diagram is used

1. As the first step in developing a detailed dfd of a system
2. In systems analysis of very complex systems
3. As an aid to system design
4. As an aid to programmers

ANS: 1




Question id : 147308 (Correct + 0.83 , Wrong - 0.28)
In on-line data entry it is possible to

1. Give immediate feedback if incorrect data is entered
2. Eliminate all errors
3. Save data entry operators time
4. Eliminate forms

ANS: 1


Question id : 147309 (Correct + 0.83 , Wrong - 0.28)
A code is useful to represent a key field because

1. It is a concise representation of the field
2. It is usually done by all
3. It is generally a good idea
4. It is needed in database design

ANS: 1



Question id : 147310 (Correct + 0.83 , Wrong - 0.28)
By the term "concise code" we understand that the code

1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded

ANS: 2


Question id : 147311 (Correct + 0.83 , Wrong - 0.28)
By the term "meaningful code" we understand that the code

1. Conveys information on item being coded
2. Is of small length
3. Can add new item easily
4. Includes all relevant characteristics of item being coded

ANS: 1



Question id : 147312 (Correct + 0.83 , Wrong - 0.28)
A DFD is normally levelled as

1. It is a good ideal in design
2. It is recommended by many experts
3. It is easy to do it
4. It is easier to read and understand a number of smaller dfds than one large dfd

ANS: 4



Question id : 147313 (Correct + 0.83 , Wrong - 0.28)
In UML diagram of a class

1. State of object cannot be represented
2. State is irrelevant
3. State is represented as an attribute
4. State is represented as a result of an operation

ANS: 3



Question id : 147314 (Correct + 0.83 , Wrong - 0.28)
Attributes are assigned value

1. When operations are performed on an object
2. When instances of objects are defined
3. When methods are invoked
4. When classes are identified

ANS: 2




Question id : 147315 (Correct + 0.83 , Wrong - 0.28)
The primary objective of cost-benefit analysis is

1. To find out direct and indirect cost of developing the information system
2. To determine the tangible benefits of the information system
3. To determine if it is economically worthwhile to invest in developing the information system
4. To determine the intangible benefits of the information system

ANS: 3



Question id : 147316 (Correct + 0.83 , Wrong - 0.28)
The tangible benefits in the following list are

( I ). savings due to reducing investment
( II ). savings due to sending bills faster and consequent early collection
( III ). providing better service to the customers
( IV). improving quality of company's products.

1. i and ii
2. ii and iii
3. iii and iv
4. i and iii

ANS: 1



Question id : 147317 (Correct + 0.83 , Wrong - 0.28)
In order to understand the working of an organization for which a computer based system is being designed, an analyst must

1. Look at only current work and document flow in the organization
2. Discuss with top level and middle level management only
3. Interview top, middle, line managers and also clerks who will enter data and use the system
4. Only clerical and middlelevel staff who have long experience in the organization and will be users of the system

ANS: 3



Question id : 147318 (Correct + 0.83 , Wrong - 0.28)
Changing an operational information system is

1. Impossible
2. Expensive And Done Selectively
3. Never Required
4. Usually Done

ANS: 2



Question id : 147319 (Correct + 0.83 , Wrong - 0.28)
System analysts have to interact with

1. Managers of organizations
2. Users in the organization
3. Programming team
4. Data entry operator

ANS: 1,2,3

Question id : 147320 (Correct + 0.83 , Wrong - 0.28)
By polymorphism of a subsystem we mean

1. It should be reusable
2. It should have polymorphic data types
3. It should accept generic commands and interpret appropriately
4. It should morph polygons

ANS: 3



Question id : 147321 (Correct + 0.83 , Wrong - 0.28)
Inheritance in object-oriented system is used to

1. Create new classes from existing classes
2. Add new operations to existing operations
3. Add new attributes to existing attributes
4. Add new states to existing states

ANS: 1



Question id : 147322 (Correct + 0.83 , Wrong - 0.28)
System design is carried out

1. As soon as system requirements are determined
2. Whenever a system analyst feels it is urgent
3. After final system specifications are approved by the organization
4. Whenever the user management feels it should be done

ANS: 3



Question id : 147323 (Correct + 0.83 , Wrong - 0.28)
If your projectis rated Very High forComplexity (effort multiplier of 1.34), and Low for Language & Tools Experience (effort multiplier of 1.09), and all of the other cost drivers are rated to be Nominal (effort multiplier of 1.00), the EAF is the product of 1.34 and 1.09

1. 28.9 PM
2. 48 PM
3. 30 PM
4. 42.3 PM

ANS: 4

Question id : 147324 (Correct + 0.83 , Wrong - 0.28)
Continuing the previous question, and substituting the exponent of 0.3179 that is calculated from the scale drivers, yields an estimate of just over a year, and an average staffing of between 3 and 4 people

1. 12.1 months & 3.5 people
2. 15 months & 5 people
3. 10 months & 3 people
4. 7 months & 5 people

ANS: 1

Question id : 147325 (Correct + 0.83 , Wrong - 0.28)
A metric used tomeasure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as

1. Process metric
2. Product Metric
3. Test metrics
4. none

ANS: 1



Question id : 147326 (Correct + 0.83 , Wrong - 0.28)
A Plan to overcome the risk called as

1. Migration Plan
2. Master plan
3. Maintenance plan
4. Mitigation plan

ANS: 4




Question id : 147327 (Correct + 0.83 , Wrong - 0.28)
Splitting project into tasks and estimate time and resources required to complete each task called as

1. Project scheduling
2. Project tracking
3. Both
4. None

ANS: 1




Question id : 147328 (Correct + 0.83 , Wrong - 0.28)
Risk tables are sorted by

1. Probability and cost
2. Probability and impact
3. Probability and size
4. Probability and exposure

ANS: 2



Question id : 147329 (Correct + 0.83 , Wrong - 0.28)
Optimization, Defect Prevention and Quality Control. Its come under the

1. CMM Level 2
2. CMM Level 3
3. CMM Level 4
4. CMM Level 5

ANS: 4



Question id : 147330 (Correct + 0.83 , Wrong - 0.28)
Which of the following are characteristics of testable software

1. Observability
2. Simplicity
3. Stability
4. All of the above

ANS: 4



Question id : 147331 (Correct + 0.83 , Wrong - 0.28)
The cyclomatic complexiy metric provides the designer with information regarding the number of

1. Cycles in the program
2. Errors in the program
3. Independent logic paths in the program
4. Statements in the program

ANS: 3



Question id : 147332 (Correct + 0.83 , Wrong - 0.28)
Which of these techniques is not useful for partition testing at the class level

1. Attribute-based partitioning
2. Category-based partitioning
3. Equivalence class partitioning
4. State-based partitioning

ANS: 3




Question id : 147333 (Correct + 0.83 , Wrong - 0.28)
Real-time applications add a new and potentially difficult element to the testing mix

1. Performance
2. Reliability
3. Security
4. Time

ANS: 4



Question id : 147334 (Correct + 0.83 , Wrong - 0.28)
The most common reason for the presence of a large number of bugs in a software product is

1. Incompetence of the developer
2. Incompetence of the tester
3. Bad requirements
4. Wrong use of tools and techniques

ANS: 4



Question id : 147335 (Correct + 0.83 , Wrong - 0.28)
Which of the following does not form a part of a workbench?

1. Standards
2. Quality attributes
3. Quality control
4. Procedures

ANS: 2

Question id : 147336 (Correct + 0.83 , Wrong - 0.28)
Modifying existing standards to better match the need of a project or environment is

1. Definition
2. Standard for a standard
3. Tailoring
4. Customization

ANS: 3




Question id : 147337 (Correct + 0.83 , Wrong - 0.28)
Which of the items listed below is not one of the software engineering layers?

1. Process
2. Manufacturing
3. Methods
4. Tools

ANS: 2



Question id : 147338 (Correct + 0.83 , Wrong - 0.28)
Which of these are the 5 generic software engineering framework activities?

1. Communication, planning, modeling, construction, deployment
2. Communication, risk management, measurement, production, reviewing
3. Analysis, designing, programming, debugging, maintenance
4. Analysis, planning, designing, programming, testing

ANS: 1



Question id : 147339 (Correct + 0.83 , Wrong - 0.28)
Which of these is not a characteristic of Personal Software Process?

1. Emphasizes personal measurement of work product
2. Practitioner requires careful supervision by the project manager
3. Individual practitioner is responsible for estimating and scheduling
4. Practitioner is empowered to control quality of software work products

ANS: 2

Question id : 147340 (Correct + 0.83 , Wrong - 0.28)
Effective software project management focuses on four P's which are

1. People, performance, payoff, product
2. People, product, performance, process
3. People, product, process, project
4. People, process, payoff, product

ANS: 3



Question id : 147341 (Correct + 0.83 , Wrong - 0.28)
The first step in project planning is to

1. Determine the budget
2. Select a team organizational model
3. Determine the project constraints
4. Establish the objectives and scope

ANS: 4



Question id : 147342 (Correct + 0.83 , Wrong - 0.28)
The best project team organizational model to use when tackling extremely complex problems is the

1. Closed paradigm
2. Open paradigm
3. Random paradigm
4. Synchronous paradigm

ANS: 2




Question id : 147343 (Correct + 0.83 , Wrong - 0.28)
One of the best ways to avoid frustration during the software development process is to

1. Give team members more control over process and technical decisions
2. Give team members less control over process and technical decisions
3. Hide bad news from the project team members until things improve
4. Reward programmers based on their productivity

ANS: 1



Question id : 147344 (Correct + 0.83 , Wrong - 0.28)
Which of these software characteristics are used to determine the scope of a software project?

1. Context, lines of code, function
2. Context, function, communication requirements
3. Information objectives, function, performance
4. Communications requirements, performance, information objectives

ANS: 3



Question id : 147345 (Correct + 0.83 , Wrong - 0.28)
How does a software project manager nned to act to minimize the risk of software failure?

1. Request a large budget
2. Start on the right foot
3. Track progress
4. Both 2 and 3

ANS: 4




Question id : 147346 (Correct + 0.83 , Wrong - 0.28)
Which of these are reasons for using technical product measures during software development?

1. Large body of scientific evidence supports their use
2. Provides software engineers with an objective mechanism for assessing software quality
3. They allow all software quality information to be expressed unambiguously as a single number
4. All of the above

ANS: 2



Question id : 147347 (Correct + 0.83 , Wrong - 0.28)
One of the most important attributes for a software product metric is that it should be

1. Easy to compute
2. Qualitative in nature
3. Reliable over time
4. Widely applicable

ANS: 1



Question id : 147348 (Correct + 0.83 , Wrong - 0.28)
The specification metrics proposed by Davis address which two characteristics of the software requirements?

1. Functionality and performance
2. Performance and completeness
3. Specificity and completeness
4. Specificity and functionality

ANS: 3

Question id : 147349 (Correct + 0.83 , Wrong - 0.28)
Which of the following is not a measurable characteristic of an object-oriented design?

1. Completeness
2. Efficiency
3. Size
4. Volatility

ANS: 2




Question id : 147350 (Correct + 0.83 , Wrong - 0.28)
The depth of inheritance tree (DIT) metric can give an OO software designer a reading on the

1. Attributes required for each class
2. Completion time required for system implementation
3. Complexity of the class hierarchy
4. Level of object reusability achieved

ANS: 2



Question id : 147351 (Correct + 0.83 , Wrong - 0.28)
If you encounter a class with a large responsibility (large class size or CS value) you should consider

1. Making it a base class
2. Making it a sub class
3. Partitioning the class
4. Starting a new class hierarchy

ANS: 3



Question id : 147352 (Correct + 0.83 , Wrong - 0.28)
Software testing metrics fall into two broad categories

1. Metrics that focus on test coverage
2. Metrics that estimate the duration of the testing process
3. Metrics that predict thenumber of test cases required
4. Both 2 and 3

ANS: ALL OPTION WRONG




Question id : 147353 (Correct + 0.83 , Wrong - 0.28)
The IEEE software maturity index is used to provide a measure of the

1. Maintainability of a software product based on its availability
2. Relative age of a software product being considered for retirement
3. Reliability of a software product following regression testing
4. Stability of a software product as it is modified during maintenance

ANS: 4



Question id : 147354 (Correct + 0.83 , Wrong - 0.28)
Which of these are valid reaons for measuring software processes, products and resources

1. To characterize them
2. To evaluate them
3. To improve them
4. All of the above

ANS: 4



Question id : 147355 (Correct + 0.83 , Wrong - 0.28)
Which of the following items are not measured by software project metrics?

1. Inputs
2. Markets
3. Outputs
4. Results

ANS: 2



Question id : 147356 (Correct + 0.83 , Wrong - 0.28)
Which of following are advantages of using LOC (lines of code) as a size-oriented metric?

1. LOC Is easily computed
2. LOC is a language dependent measure
3. LOC is a language independent measure
4. LOC can be computed before a design is completed

ANS: 1



Question id : 147357 (Correct + 0.83 , Wrong - 0.28)
Which of the following software quality factors is most likely to be affected by radical changes to computing architectures?

1. Operation
2. Transition
3. Revision
4. None of the above

ANS: 4

Question id : 147358 (Correct + 0.83 , Wrong - 0.28)
Which of the following provide useful measures of software quality?

1. Correctness, business relevance, integrity, usuability
2. Reliability, maintainability, integrity, sales
3. Correctness, maintainability, size, satisfaction
4. Correctness, maintainability, integrity, usuability

ANS: 4




Question id : 147359 (Correct + 0.83 , Wrong - 0.28)
Why is it important to measure the process of software engineering and software it produces?

1. It is really not necessary unless the project is extremely complex
2. To determine costs and allow a profit margin to be set
3. To determine whether a software group is improving or not
4. To make software engineering more like other engineering processes

ANS: 3



Question id : 147360 (Correct + 0.83 , Wrong - 0.28)
The objective of software project planning is to

1. Convince the customer that a project is feasible
2. Make use of historical project data
3. Enable a manager tomake reasonable estimates of cost and schedule
4. Determine the probable profit margin prior to bidding on a project

ANS: 3



Question id : 147361 (Correct + 0.83 , Wrong - 0.28)
Software feasibility is based on which of the following

1. Business and marketing concerns
2. Scope, constraints, market
3. Technology, finance, time, resources
4. Technical prowess of the developers

ANS: 3



Question id : 147362 (Correct + 0.83 , Wrong - 0.28)
Reusable software components must be

1. Catalogued for easy reference
2. Standardized for easy application
3. Validated for easy integration
4. All of the above

ANS: 4



Question id : 147363 (Correct + 0.83 , Wrong - 0.28)
Software project estimation techniques can be broadly classified under which of the following headings?

1. Automated processes
2. Decomposition techniques
3. Empirical models
4. Both 2 and 3

ANS: 4



Question id : 147364 (Correct + 0.83 , Wrong - 0.28)
LOC-based estimation techniques require problem decomposition based on

1. Informationdomain values
2. Project schedule
3. Software functions
4. Process activities

ANS: 3


Question id : 147365 (Correct + 0.83 , Wrong - 0.28)
FP-based estimation techniques require problem decomposition based on

1. Information domain values
2. Project schedule
3. Software functions
4. Process activities

ANS: 1



Question id : 147366 (Correct + 0.83 , Wrong - 0.28)
Empirical estimation models are typically based on

1. Expert judgement based on past project experiences
2. Refinement of expected value estimation
3. Regression models derived from historical project data
4. Trial and error determination of the parameteres and coefficients

ANS: 3



Question id : 147367 (Correct + 0.83 , Wrong - 0.28)
COCOMO II is an example of a suite of modern empirical estimation models that require sizing information expressed as:

1. Function points
2. Lines of code
3. Object points
4. All of the above

ANS: 4




Question id : 147368 (Correct + 0.83 , Wrong - 0.28)
In agile software development estimation techniques focus on the time required to complete each

1. Increment
2. Function
3. Task
4. All of the above

ANS: 1



Question id : 147369 (Correct + 0.83 , Wrong - 0.28)
Which of the following is not one of the guiding principles of software project scheduling

1. Compartmentalization
2. Market assessment
3. Time allocation
4. Effort validation

ANS: 2



Question id : 147370 (Correct + 0.83 , Wrong - 0.28)
The software equation can be used to show that by extending the project deadlineslightly

1. Fewer people are required
2. You are guaranteed to meet the deadline
3. More lines of code can be produced
4. None of the above

ANS: 1



Question id : 147371 (Correct + 0.83 , Wrong - 0.28)
For purposes of determining the major engineering tasks and distributing them on the project time line, the project manager should assume that the process model used is

1. Linear
2. Sequential
3. Iterative evolutionary
4. All of the above

ANS: 4



Question id : 147372 (Correct + 0.83 , Wrong - 0.28)
The best indicator of progress on a software project is the completion

1. Of a defined engineering activity task
2. Of a successful budget review meeting on time
3. And successful review of a defined software work product
4. And successful acceptance of project prototype by the customer

ANS: 3



Question id : 147373 (Correct + 0.83 , Wrong - 0.28)
The purpose of earned value analysis is to

1. Determine how to compensate developers based on their productivity
2. Provide a quantitative means of assessing software project progress
3. Provide a qualitative means of assessing software project progress
4. Set the price point for a software product based on development effort

ANS: 2



Question id : 147374 (Correct + 0.83 , Wrong - 0.28)
Softrware risk always involves two characteristics

1. Fire fighting and crisis management
2. Known and unknown risks
3. Uncertainty and loss
4. Staffing and budget

ANS: 3



Question id : 147375 (Correct + 0.83 , Wrong - 0.28)
Software risk impact assessment should focus on consequences affecting

1. Planning, resources, cost, schedule
2. Marketability, cost, personnel
3. Business, technology, process
4. Performance, support, cost schedule

ANS:4



Question id : 147376 (Correct + 0.83 , Wrong - 0.28)
Hazard analysis focuses on the identification and assessment of potential hazards that can cause

1. Project termination
2. Schedule slippage
3. External problems
4. Entire system to fail

ANS: 4



Question id : 147377 (Correct + 0.83 , Wrong - 0.28)
A key concept of quality control is that all work products

1. Are delivered on time and under budget
2. Have complete documentation
3. Have measurable specifications for process outputs
4. Are thoroughly tested before delivery to the customer

ANS: 3

Question id : 147378 (Correct + 0.83 , Wrong - 0.28)
Which of these activities is not one of the activities recommended to be performed by an independent SQA group?

1. Prepare SQA plan for the project
2. Review software engineering activities to verify process compliance
3. Report any evidence of noncompliance to senior management
4. Serve as the sole test team forany software produced

ANS: 4



Question id : 147379 (Correct + 0.83 , Wrong - 0.28)
A review summary report answers which three questions?

1. Terminate project, replace producer, request a time extension
2. What defects were found, what caused defects, who was responsible
3. What was reviewed, who reviewed it, what were the findings
4. None of the above

ANS: 3



Question id : 147380 (Correct + 0.83 , Wrong - 0.28)
Statistical quality assurance involves

1. Using sampling in place of exhaustive testing of software
2. Surveying customers to find out their opinions about product quality
3. Tracing each defect to its underlying cause, isolating the "vital few" causes, and moving to correct them
4. Tracing each defect to its underlying causes and using thepareto principle to correct eachproblem found

ANS: 3



Question id : 147381 (Correct + 0.83 , Wrong - 0.28)
Software safety is a quality assurance activity that focuses on hazards that

1. Affect the reliability of a software component
2. May cause an entire system to fail
3. May result from user input errors
4. Prevent profitable marketing of the final product

ANS: 2


Question id : 147382 (Correct + 0.83 , Wrong - 0.28)
The ISO quality assurance standard that applies to software engineering is

1. ISO 9000 : 2004
2. ISO 9001 : 2000
3. ISO 9002 : 2001
4. ISO 9003 : 2004

ANS: 2