You are on page 1of 92

What is software engineering?

answer: Software engineering is an engineering discipline that is concerned with all aspects of software production from specification to system maintenance. What are software engineering methods? answer: Structured approaches to software development which include system model s, notations, rules, design advice and process guidance. What are the three most important key challenges facing software engineering? answer: [3]:[1]Heterogeneity[2]Delivery[3]Trust What does the acronym CASE stand for? answer: Computer Aided Software Engineering. What are the most fundamental activities in software processes? answer: [4]:[1]Specification[2]Development[3]Validation[4]Evolution What are the principal components of a software engineering method? answer:[4]:[1]Process guidance[2]Recommendations[3]System model descriptions[4]R ules Which of the following are the 2 most fundamental types of software product? answer:[2]:[1]Customized products[2]Generic products Which question no longer concerns the modern software engineer? Why does computer hardware cost so much? What are the principal requirements engineering activities? answer:[4]:[1]Requirements elictation and analysis[2]Feasibility study[3]Require ment specification[4]Requirement validation What are the four advantages of using incremental development and delivery? answer:[4]:[1]Lower risk of overall project failure[2]Early increments serve as prototypes to explore requirements[3]Early delivery of critical functionality to customer[4]More extensive testing of critical customer functionality What are the three important stages in the testing process? answer:Component(or unit) testing, integration testing, acceptant testing List two types of evolutionary development? answer:[2]:[1]Throw-away prototyping[2]Exploratory development List the 3 fundamental software process frameworks that are used to create speci fic software process? answer:[3]:[1]Component-based software engineering[2]The Waterfall model[3]Evolu tionary development The prototyping model of software development is answer: A useful approach when a customer cannot define requirements clearly What are the four most fundamental activities that are common to all software pr ocesses? answer:[4]:[1]Software validation[2]Software specification[3]Software evolution[ 4]Software design and implementation What is the first step in risk management process? answer:Risk identification What is a milestone? answer: Milestones are the end-point of a process activity What are important differences between software project management and other typ es of project management? answer:[3]:[1]There are no standeard for software processes[2]Large software pro jects are often one-off projects[3]The product(software) is intangible Which of the following are considered a player in the software process? answer:[3]:[1]Customers[2]Project Manager[3]End-users What are included in a quality plan? answer: The quality procedures and standards that should be used in a project Effective software project management focuses on answer:[4]:[1]Performance[2]Process[3]Product[4]People What activity does a software project manager need to perform to minimize the ri sk of software failure? answer: Define milestones and track progress What is the first activity of project management answer: Proposal writing The project plan sets out

answer:[3]:[1]The resources available to the project[2]The work breakdown[3]A sc hedule for the work What are non-functional requirements? answer: Constraints on the serviecs or functions offered bt the system such as t iming constraints, constraints on the development process, standard, etc What are functional requirements? answer: Statements of services the system should provide how the system should r eact to particilar inputs and how the system should behave in particular situati ons List the requirements document sections suggested by the IEEE standard? answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe ndices[5]Index What are domain requirements? answer: Requirements that come from the application domain of the system and tha t reflect characteristics of that domain List 3 types of non-functional requirement answer: [3]:[1]Product[2]External[3]Organizational Which of the following belong to external requirements? answer:[3]:[1]Interoperability[2]Legislative[3]Ethical What are user requirements? answer: Statements in natural language plus diaframs of the services the system provides and its operational constraints. Written for customers What problems can arise when requirements are written in natural language? answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit y What are domain requirements? answer: Requirements that come from the application domain of the system and tha t reflect characteristics of that domain What is the software requirements document? answer: The official document that defines the requirements that should be imple mented by the system developers To construct a system model the engineer should consider one of the following re straining factors? answer: Assumptions and constraints What described in a semantic data model? answer: The local structure of the data processed by a system or managed by a da tabase. Which of these model types does not represent software architecture? answer: Data model Which of the following is not an area of concern in the design model? answer: Project scope What different object models may be developed? answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance models What are the components of an object class definition in the UML? answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o r methods associated with the class What perspectives may be used for system modelling? answer: [3]:[1]Structural[2]External[3]Behavioral What is described in a context model? answer: The immediate external environment of the system defining the system's c ontext and the dependencies that a system has on its environment What are the two principle styles used for modular decomposition? answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining What are advantages of object model answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely coupled so their implementation can be modified without affecting other objects [3]OO implementation languages are widely uesd What is the fundamental characteristic of a repository model answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i

s held in a central database or repository How is the system organized in a client-server model? answer: A set of services is provided by servers and clients access and use thes e services Check 4 fundamental questions that should be addressed in architectural design? answer: [4]:[1]How will the system be distributed[2]How should the system be str uctured[3]Is there a generic application architecture that can be used[4]What ar chitectural style or styles are appropriate What are advantages of pipeline model answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne w transformations What are advantage of explicitly designing and documenting a software architectu re? answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake holder communication[3]Helps with large-scale reuse Which of these statements about architectural design are true? answer: [3]:[1]Represents the link between specification and design processes[2] Often carried out in parallel with some specification activities[3]It involves i dentifying major system components and their communications What are the characteristics of Interrupt-driven systems answer: [2]:[1]Allows fast response[2]Used in real-time systems What are the advantages of repository model answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p ublished as the repository schema[3]Sub-systems need not be concerned with how d ata is produced Centralised management e.g. backup, security, ect Which of these is a characteristic of a good design? answer: Implements all requirements in the analysis model List the advantages of inheritance answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo ut domains and systems[2]It is a reuse mechanism at both the design and the prog ramming level[3]It is an abstraction mechanism which may be used to classify ent ities In the architectural model of the weather station system, what are the three lay ers in the software? answer: [3]:[1]Interface[2]Instruments[3]Data collection Object oriented approach does not facilitate design evolution answer: False What are the stages in an object-oriented development process? answer: [3]:[1]Programming[2]Analysis[3]Design What do you understand by the system context and model of use? answer: [2]:[1]The model of use-dynamic model[2]System context-static model Active object typically include an infinite loop so that they are always carryin g out the computation answer: True Which of the following is not an area of concern in design model answer: Project scope List the 5 key stages in an object-oriented design process? answer: [5]:[1]Specify[2]Design the system[3]Identify[4]Develop[5]Understand and define UML(unified modeling language) analysis modeling focuses on the answer: User model and structural model List 4 approaches that may be used to identify object classes answer: [4]:[1]Use scenario-based analysis[2]Grammatical[3]Use an approach[4]Ide ntify List three design models that are part of the UML answer: [3]:[1]Sequence[2]Subsystem[3]State What tools are normally included in a RAD environment? answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene rator[4]Links to office applications The prototyping model of software development is

answer: A useful approach when a customer cannot define requirements clearly What were the key benefits of prototyping found in Gordon and Bieman's studey? answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro ved system quality, improved maintainability[3]Reduced development effort What are the advantages of using an incremental approach to software development ? answer: Accelerated delivery of customer services, user engagement with the syst em. What is test-first development When a system feature is identified, the tests of the code implementing that fea ture are written before the code. Tests are automated and all tests are run when a new increment is added to the system. What are three important characteristics of extreme programming? answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse d as scenarios What are the advantages of pair programming answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c ommon ownership and resonsibility for the code[3]Helps support refactoring What of these statements about the differences between incremental development a nd prototyping are true? answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star ts-not well-understood Suggest three ways that a software prototype may be used? answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac k tests What are the four development stages in CBSE? Component-based software engineeri ng answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen t and integration[4]Component analysis What are the 4 sectors in each loop in Boehm's Spiral model? answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass essment and reduction What are three possible classes of application framework? answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr ucture What are three reuse types in Reuse-based software engineering answer: [3]:[1]Component[2]Object and function[3]Application system One of the key problems in software reuse is the inability to find existing reus able design patterns when hundreds of candidates exist answer: True What design choices have to be made when reusing COTS products? answer: [3]:[1]Which COTS products offer the most appropriate functionality[2]Wh at features of a product will actually be used[3]How will data be exchanged betw een different products Which of the following is not one of the issues that form a basis for design for reuse? answer: Object-oriented programming What are three types of program generator answer: [3]:[1]Code[2]Parser and lexical analyser[3]Application List 4 types of speciallsation of software product lines? answer: [4]:[1]Environment[2]Functional[3]Process[4]Platform What are the two main approaches to concept reuse? answer: [2]:[1]Generative programming[2]Design patterns What do Gamma et al.suggest are the four essential elements of a design pattern? answer: [4]:[1]Solution description[2]Statement of the consequences of applying the pattern[3]Description of the problem and when the pattern can be applied[4]M eaningful name What three approaches may be used when designing test cases? answer: [3]:[1]Requirements-based[2]Partition[3]Structural What are the two complementary goals of the testing process?

answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f aults or defects in the software Which type of test would you perform to accpect a build answer: User acceptant test Acceptance tests are normally conducted by the answer: End users What tests should be included in object class testing? answer: [3]:[1]that set and access all object attributes[2]for all operations in isolation[3]that force the object into all possible states What is the common limitation of automated testing? answer: They are not usefull when requirements are changing frequently Which of the following strategic issues needs to be addressed in a successful so ftware testing process? answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec hnical reviews prior to testing What is the purpose of defect testing? answer: To discover faults that make software's behaviour incorrect The best reason for using Independent software test teams is that answer: A test team will test the software more thoroughly What is common limitation of automated testing? answer: They are not useful when requirements are changing frequently What are the three important classes of interface errors? answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors What is the normal order of activities in which software testing process is orga nized answer: [1]Design[2]Prepare[3]Run[4]Compare What are three basic techniques for component identification? answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based New versions of software systems are created as they change answer: [3]:[1]Offering[2]Tailored[3]For different What facilities might be provided in system building CASE tools? answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object What are the objectives of change management procedures? answer: [3]:[1]Approving[2]Tracking[3]Analyzing When software configuration management is a formal activity, the software config uration audit is conducted by the answer: Quality assurance group What is a variant? answer: identical but non-functionally distinct from other instances of a system The primary purpose of configuration status reporting is to answer: Make sure that change information is communicated to all affected partie s What are the two types of CM workbench? answer: [2]:[1]Open[2]Integrated What is a version? answer: An instance of a system which is functionally distinct in some way from other system instances Software system are subject to continual change requests answer: [3]:[1]User[2]Developers[3]Market forces Define the security terms 'vulnerability' answer: Weakness in a computer-based system that may be exploited to cause loss or harm Define the security terms 'attack' answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage Define the security terms 'threats answer: Circumstances that have potential to cause loss or harm. You can think o f these as a system vulnerability that is subjected to an attack What is application security? answer: Application security is a software engineering problem where the system

is designed to resist attacks What are the three complementary strategies to achieve survivability? answer: [3]:[1]Recognition[2]Recovery[3]Resistance What is the first stage in survivability analysis answer: Review system requirements and architecture List 4 design guidelines for secure systems engineering? answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al l inputs What are the three levels of protection that might be used in an information sys tem? answer: [3]:[1]Application[2]Record[3]Platform What is infrastructure security? answer: Infrastructure security is a systems management problem where the infras tructure is configured to resist attacks In Iterative development approach, which phase takes the least cost? answer: Specification What are generic software process models? answer: [3]:[1]Waterfall[2]Iterative[3]Component-based What is a software process model? answer: A simplified representation of a software process, presented from a spec ific perspective The current trends suggest that the economies of ALL developed and developing na tions are dependent on software answer: True In Waterfall approach, which phase takes the most cost? answer: [2]:[1]Specification[2]Integration and testing What is a software process? answer: A set of activ ities whose goal is the development or evolution of softw are The distribution of the costs of software engineering NOT depends on the process model that is used answer: False What are essential attributes of good software? answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency In Component-based software engineering approach, which phase takes the least co st? answer: Specification Which is the correct sequence of the following activities in the process of Syst em evolution? answer: Define-Assess-Propses-Modify What is the main difference between the Spiral model and other software processe s models? answer: The explicit recognition of risk in the Spiral model What is the outputs of Requirements elicitation and analysis? answer: System models What is the correct sequence of the following iterations in the RUP(Rational Uni fied Process) model? answer: Incept-Elaborat-Construct-Transit What is the output of Feasibility study phase in the requirements engineering pr ocess? answer: Report that recommends whether or not to continue development project In contrast, the RUP (Rational Unified Process) is normally described from which types of perspectives? answer: [3]:[1]Dynamic[2]Static[3]Practice What is the main difference between the RUP (Rational Unified Pr ocess) and othe r software processes models? answer: Phase are more closely related to business rather than technical concern s Which is the correct sequence of the following activities in the Waterfall model ?

answer: Requirement-Design-Implementation-Integration-Operation Which is the correct sequence of the following activities in the Component-based software engineering? answer: Component-Requirement-Design-Development The Waterfall approach is the BEST approach to development software when ___ answer: The software system is large and that is need developed at several sites Three categories of risks are ___ answer: [3]:[1]Project[2]Technical[3]Business Why many software projects are 'one-off' projects? answer: Because the requirements of software projects are not the same What is the BEST way to do work breakdown structure? answer: Sets out the breakdown of the project into activ ities and identifies th e milestones and deliverables associated with each activity What are milestones in project planning? answer: Milestones are the end-point of a process activity What is the critical path? answer: The critical path is the sequence of dependent activities that Select the BEST statement about critical path answer: Project manager should allocate experienced people to do the tasks on th e critical path What is the output of the first milestone in software requirement engineering pr ocess? answer: Feasibility study report document Which is the BEST principle of project scheduling? answer: Minimize task dependencies to avoid delays caused by one task waiting fo r another to complete The project schedule shows ___ answer: The dependencies between activities, the estimated time required to reac h each milestone and the allocation of people to activities What are deliverables? answer: Deliverables are project results delivered to customers Which is the principle of prototype model? answer: A prototype is to build quickly demonstrate to the customer what the pro duct look like. Only minimal functionality of the actual product is provided dur ing prototyping phase What are nonfunctional requirements? answer: Constraints on the services or functions offered by the system such as t iming constraints, constraints on the development process, standards, etc What are good attributes of requirements? answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous What are system requirements? answer: A structured document setting out detailed descriptions of the systems fu nctions, services and operational constraints Which are types of non-functional requirement? answer: [3]:[1]Product[2]Organizational[3]External What is the BEST way to write requirement document? answer: Should include both a definition of user requirements and a specificatio n of the system requirements Which of the following requirement statements belongs to domain requirements? answer: There shall be a standard user interface to all database that shall be b ase on the Z39.50 standard In reality, the distinction between different types of requirements is not clear -cut answer: True Which of the following requirement statements belongs to non-functional requirem ents? answer: The user interface shall be implemented as simple HTML without frames Whats the BEST way to start creating a data-flow diagram? answer: In the data-flow diagram, you should start by analyzing the overall proc urement process and then move on to the analysis of sub-processes

When should you use state machine model? answer: [2]:[1]Describe how a system [2]It shows system states and events that c ause transition from one state to another When should you use data flow diagrams (DFD)? answer: DFD is used to showing the data exchange between a system and other syst ems in its environment Can two objects associate with one another in more than one way? answer: Yes Whats the BEST way to start creating a state diagram? answer: State diagram-on the transition Whats the BEST way to start creating a class diagram? answer: Class diagram-on the attributions, operations Another name for inheritance is ___ answer: Generalization When should you use sequence diagram? answer: Should use sequence diagram to illustrate the sequence of steps that mus t be performed in order to complete a task Which models give a static view of a system? answer: [3]:[1]Object[2]Data[3]Architectural When should you use use-case diagram? answer: Should use use-case diagram to represent all of the people who might use the functionalities of the system What are types of behavioral models? answer: [2]:[1]Data-Flow[2]State machine Which non-functional system requirements that the software system architecture m ay depend on? answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability Select the BEST solution for architectural design of a software system that perf ormance is a critical requirement answer: The architectural should be designed to localise critical operations and minimise communications, use large-grain rather thanfine-grain components Which of the following models belong to Event-driven systems? answer: [2]:[1]Broadcast[2]Interrupt-driven What is the correct statement about software architectural design decisions? answer: Architectural design is a creative process, the activities in the proces s differs depending on the type of system being developed Which of the following styles belong to Control styles? answer: [2]:[1]Centralised[2]Event-based Which of the following styles belong to System organization? answer: [3]:[1]Repository[2]Client-server[3]Abstract machine What is the correct statement about software architectural styles? answer: Most large systems are heterogeneous architectur al styles What is the correct statement about software architectural design? answer: The architectural design is normally expressed as a block diagram presen ting an overview of the system structure Which of the following models belong to Centralised control? answer: [2]:[1]Call-return[2]Manager What are advantages of explicitly designing and documenting software architectur e? answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse What are the models in architecture design? answer: [5]Static-Dynamic-Interface-Relationship-Distribution What are three general architectural styles? answer: [1]System organisation[2]Decomposition styles[3]Control styles Another name for * is a+ relationship is ___ answer: Generalization Which is the correct statement about coupling? answer: Coupling deals with interactions between objects or software components Which is NOT a primary goal in the design of the UML? answer: Be dependent on particular programming language

What do you mean by coupling in software design? answer: Coupling is a measure of the strength of association established by a co nnection from one object or software component to another. Which of the following is NOT an approach that may be used to identify object cl asses? answer: Use Event-based analysis Which are object-oriented strategies? answer: [3]:[1]Analysis[2]Design[3]Programming Which is NOT the main activity in design process? answer: Designing the test case What is the purpose of analysis? answer: The main objective of the analysis is to capture a complete, unambiguous , and consistent picture of requirements of the system and what the system must do to satisfy the users requirement and needs nother name for *has a+ relationship is ___ answer: Composition Which is NOT an advantage of inheritance? answer: The inheritance graphs of analysis, design and implementation have diffe rent functions and should be separately maintained. Which is the correct statement about object identification? answer: Object identification is an iterative process; it relies on the skill, e xperience and domain knowledge of system designers Which is the first stage in an object-oriented design process? answer: Develop an understanding of the relationships between the software being designed and its external environment Which is the right sequence in the process of prototype development? answer: Establish-Define-Develop-Evaluate The practices small, frequent releases of the system, the approach to requiremen ts description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods? answer: Incremental delivery What are common principles of agile methods? answer: [5]:[1]Customer[2]Incremental[3]People not[4]Embrace[5]Maintain Which of the following BEST describes the major difficulties with incremental de velopment? answer: [4]:[1]Contractual[2]Validation[3]Management[4]Maintenance Which of the following is NOT an advantage of using incremental development and delivery? answer: Systems are often have good structures The practices regular system release, test -first development and continuous int egration in Extreme Programming fit into which principle of agile methods? answer: Embrace change Which is NOT an advantage of rapid software development? answer: Only senior programmer are capable of taking the kind of decisions requi red during the development process Which is the evidence when said that pair programming is as efficient as the same number of programmers working individually? answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently What is a user story in extreme programming? answer: It is a requirement expressed as scenario The practices pair programming, collective ownership of the system code, and sus tainable pace in Extreme Programming fit into which principle of agile methods? answer: People not process Who chooses the stories for inclusion in the next release based on their priorit ies and the schedule estimates? answer: Customer In the extreme programming, what is the role of customer? answer: To help develop stories that defines the requirements Which part of the system can be reuse?

answer: [3]:[1]Application[2]Component reuse[3]Object and function The trend of design process in most software engineering disciplines is base on ___ answer: Reuse of existing system or component If the applications or components are developed in difference programming langua ge from the programming language you are using then you can not reuse that answer: False Which is NOT the main benefit of software reuse? answer: Creating and maintaining a component library You can not to combine multiple patterns in the complex software system answer: False Which is the correct statement about Product line architectures? answer: Architectures must be structured in such a way to separate different sub -systems and to allow them to be modified All of the following are the design choices have to be made when reusing COTS pr oducts EXCEPT answer: How will data be exchanged between different modules The trend of Reuse-based software engineering is an approach to development that tries to ___ answer: Maximize the reuse of existing software What are the benefits of software re-using? answer: [3]:[1]faster[2]lower cost[3]increased software quality Which is NOT a key factor that you should consider when planning reuse? answer: The name of the application or component reuse All of the following are types of program generator EXCEPT answer: Component generators What is the normal order of activities in which software testing is organized? answer: [4]:[1]Unit[2]Integration[3]Validation[4]System The main focus of acceptance testing is: answer: testing from a business perspective Unit testing is a __ answer: White box testing The effort required for locating and fixing an error in an operational program i s: answer: Maintainability Workbenches are also called ___ answer: All of the other choices A program validates a numeric field as follows: values less than 10 are rejected , values between 10 and 21 are accepted, values greater than or equal to 22 are rejected answer: 3,10,22 A successful defect test is a test which causes a program to behave in an normal way answer: False Which document identifies and describes the testing that will be implemented and executed? answer: Test case The testing intended to show that previously correct software has not been adver sely affected by changes is call: answer: Regression testing We split testing into distinct stages primarily because: answer: Each test stage has a different purpose. Which is the right sequence in the software testing process? answer: Create test case-Prepare-Perform-Create Which of the following is NOT part of configuration management? answer: The people in the project team Which is the change management concerned with? answer: All of the other choices Software systems are subject to continual change requests from ___ answer: Developers, Users, Market forces

The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: answer: effect of the change on the project schedule, cost, quality, and risks Which of the following is the source for software version up? answer: All of the other choices A configuration management system would NOT normally provide: answer: Facilities to compare test results with expected results. What is a release? answer: An instance of a system which is distributed to users outside of the dev elopment team. Who review and approves the change request? answer: Change control board Which of the following items would not come under Configuration Management? answer: Live data Which is the right sequence of the change management process? answer: Request-Analyze-Submit-Make-Creat Which are levels of protection in application security engineering? answer: [3]:[1]Platform[2]Application[3]Record Consider security design for username and password protection, what is the good design? answer: System users are authenticated using a login name/password combination. Requires user change password after 2 months What is the first stage in survivability analysis answer: Review system requirements and architecture. Password should be changed answer: All of the other choices Why do we need consider security for project? answer: To protect the system against external attack Which of the following design guidelines for secure systems engineering is NOT t rue? answer: Avoid using redundancy and diversity to reduce risk What is the last stage in survivability analysis answer: Identify softspots and surv ivability strategies. All of the following are the complementary strategies to achieve survivability E XCEPT answer: Conversion Which is the correct statement about integrity? answer: Extent to which access to software or data by an unauthorized persons ca n be controlled Probability of a software failure is the answer: Reliability What was the software crisis? answer: As more powerful hardware was introduced in the 1960s, larger software s ystems were developed. These were usually late, unreliable, did not meet user ne eds and cost more than expected. The problems of producing software was the soft ware crisis. What are the two fundamental types of software product? answer: Generic products that are designed to meet the needs of many different c ustomers. Customised products designed to meet the specific needs of a single cu stomer. What are the fundamental activities in software processes? answer: [4]:[1]Specifiation[2]Development[3]Validation[4]Evolution What are the three general paradigms of software development? answer: [3]:[1]Waterfall[2]Iterative[3]Component-based What are the principal components of a software engineering method? answer: System model descriptions, rules, recommendations, process guidance. Why is maintainability an important attribute of software? answer: Because all software is subject to change after it goes into use and the costs of software maintenance often exceeds the development costs of the softwa re.

What is a software engineering code of ethics? answer: A set of principles that set out, in a general way, standards of expecte d behaviour for professional software engineers. What are the fundamental activities that are common to all software processes? answer: Software specification, software design and implementation, software val idation, software evolution. List the three fundamental software process frameworks that are used to create s pecific software processes. answer: [3]:[1]Waterfall[2]Evolutionary[3]Component-based Why are iterations usually limited when the waterfall model is used? answer: The waterfall model is a document-driven model with documents produced a t the end of each phase. Because of the cost of producing and approving document s, iterations and costly and involve significant rework. Hence they are limited. Briefly describe two types of evolutionary development. answer: Exploratory development where the objective of the process is to work wi th customers to explore their requirements and deliver a final-system. Throw-awa y prototyping where the objective is to develop a better understanding of the cu stomers requirements and deliver a better requirements specification. What are the development stages in CBSE? answer: [4]:[1]Component[2]Requirements[3]System[4]Development What are the advantages of using incremental development and delivery? answer: Early delivery of critical functionality to the customer.Early increment s serve as prototypes to explore requirements.Lower risk of overall project fail ure.More extensive testing of critical customer functionality. What models might be developed when applying a structured method? answer: [5]:[1]Object[2]Sequence[3]State transition[4]Structural[5]Data-flow Why is it increasingly irrelevant to distinguish between software development an d evolution? answer: Few software systems are now completely new and a more realistic model o f software development is of an iterative process that lasts for the life time o f the software. What are the four phases of the Rational Unified Process? answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition. What are the six fundamental best practices in the RUP? answer: Develop software iteratively.Manage requirements.Use component-based arc hitectures.Visually model software.Verify software quality.Control changes to so ftware. Give five examples of activities that can be automated using CASE. answer: Graphical system modelling.Maintaining a data dictionary.Generating user interfaces.Program debugging.Translating programs from one language to another. What is the distinction between a CASE tool and a CASE workbench? answer: A CASE tool supports an individual process task such as checking the con sistency of a design. A CASE workbench supports sets of related activities such as specification or design. List five common project management activities. answer: Any five from the following: proposal writing, project planning and sche duling, project costing, project monitoring and reviewing, personnel selection a nd evaluation, report writing and presentations. What is included in a quality plan and a validation plan? answer: Quality plan: The quality procedures and standards that should be used i n a project.Validation plan: The approach, resources and schedule used for syste m validation. What is the difference between a milestone and a deliverable? answer: A milestone is a recognised endpoint of some activity that represents a decision point for a project. A deliverable is a project output that is delivere d to the customer. What is involved in project scheduling? answer: Separating the total planned work in the project into separate activitie s and judging the time required to complete these activities. Explain how bar charts and activity networks give different views of a project s

chedule. answer: Activity networks show the time required to complete an activity and the dependence on activities. Bar charts show the activity timeline illustrating th e relative length of activities and the dates when they take place. What are three related categories of risk? answer: [3]:[1]Project[2]Product[3]Business Suggest four risks that may threaten the success of a software project. answer: Staff turnover, management change, hardware unavailability,requirements change, specification delays, size underestimate, CASEtool underperformance, tec hnology change, product competition. Give two examples of technology risks that may arise in a software project. answer: The system database cannot process as many transactions as expected.Reus ed software components are defective. What is involved in risk monitoring? answer: Regularly assessing the project risks to decide whether or not that the risk is becoming more or less probable and whether the effects of the risk have changed. What are user requirements and system requirements? answer: User requirements are statements in a language that is understandable to a user of what services the system should provide and the constraints under whi ch it operates.System requirements are more detailed descriptions of the system services and constraint, written for developers of the system. What is the distinction between functional and non-functional requirements? answer: Functional requirements define what the system should do. Non-functional requirements are not directly concerned with specific system functions but spec ify required system properties or place constraints on the system or its develop ment process. List three types of non-functional requirement? answer: Product-Organisational-External What is a domain requirement? Give an example. answer: A requirements that is derived from the application domain of the system rather than from the specific needs of system users. For example, in a train co ntrol system, the requirement for the train braking system depends on characteri stics of the train and the track. What problems can arise when requirements are written in natural language? answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation. What is the distinction between the terms.'shall' and 'should' in a user require ments document? answer: Shall normally indicates a mandatory requirement Should indicates a desirabl e but not essential requirement Why is it impossible to completely separate system requirements and design? answer: The system architecture may have to be designed to structur e the requir ements specification. Existing systems constrain the design and these constr ain ts are requirements. The use of a specific architecture may be a requirement for business or regulatory reasons. What are the main advantages of using a standard format to specify requirements? answer: All requirements have the same format so are easier to read.The definiti on of form fields mean that writers are less likely to forget to include informa tion.Some automated processing is possible. What are three types of interface that may have to be defined in a requirements document? answer: [1]Procedural interfaces[2]Data structures[3]Representations of data What are the two main types of event-driven control models? answer: Broadcast models where an event is broadcast to all sub-systems Interrup t-driven models where external events are detected and processed by an interrupt handler What is a reference architecture? answer: An abstract model of a system class that can be used to inform designers about the general structure of that type of system. What is the distinction between validation and verification?

answer: Validation: Are we building the right product?/Verification: Are we buil ding the product right? What are the two complementary approaches used for checking and analysis? answer: Software testing/Software inspections or peer reviews. What are the principal sections included in a test plan?The testing process. answer: Requirements traceability/Tested items/Testing schedule/Test recording p rocedures/Constraints/Hardware and software requirements/ What are the advantages of inspections over testing? answer: 3/Inspections can discover many errors. In testing, one error may mask a nother/Incomplete versions of a system can be inspected/Inspections can consider broader quality attributes as well as program defects What are the stages in the software inspection process? answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow -up List the classes of faults that should be considered in an answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte rface faults/Storage management faults/Exception management faults What is automated static analysis answer: A process where an analysis program examines the source code looking for possible anomalies. These are drawn to the inspectors attention as they may repr esent faults in the program What are the main argument for the use of formal specification and verification? answer: Formal specification forces a detailed analysis of the requirements so r eveals errors and anomalies. Formal verification demonstrates that the program m eets its specification so implementation errors do not compromise dependability Why do formal specification and verification not guarantee reliability? answer: 3/The specification may not reflect the real requirements of users/The p roof may contain errors/The proof may assume a usage pattern which is incorrect. What are the five key strategies used in cleanroom development? answer: Formal specification/Incremental development/Structured programming/Stat ic verification/Statistical testing What is the distinction between application and infrastructure security? answer: 2/Application security the application is designed to resist attacks/Inf rastructure security the software is configured to r esist attacks Define the security terms vulnerability and asset Vulnerability answer: A weakness in a computer system that MAY be exploited to cause loss or h arm/Asset: A system resource that has a value and so should be protected What is security risk management? answer: Security risk management is concerned with assessing the possible losses that might ensue from attacks on assets in the system and balancing these losse s against the costs of security pr ocedures that may reduce the losses. What are the stages of preliminary risk assessment? answer: Asset identification/Asset value assessment/Exposure assessment/Threat i dentification/Threat probability assessment/Control identification/Feasibility a ssessment/Security requirements definition Suggest two possible vulnerabilities when login/password answer: authentication is used.Users set guessable passwords/Authorised users re veal their passwords to unauthorised users, perhaps through some social engineer ing process What fundamental issues have to be considered when designing system architecture for security? answer: 2/Protection: How should the system be organised so that critical assets can be protected against an external attack/Distribution: How should system ass ets be distributed so that the effects of a successful attack are minimised What are the three levels of protection that might be used in an information sys tem? answer: Platform-level protection/Application-level protection/Record-level prot ection List four design guidelines for secure systems engineering.Base security decisio ns on an explicit security policy

answer: Avoid a single point of failure/Use redundancy and div ersity to reduce risk/Validate all inputs Why is it important to design for deployment answer: Because many security vulnerabilities are introduced when the system is configured for use in its deployment environment What deployment support may be included in a system? answer: Support for viewing and analysing configurations/Default privilege minim isation/Configuration setting localisation/Easy ways to fix security vulnerabili ties What are the three complementary strategies to achieve survivability answer: Resistance/Recognition/Recovery List the stages in survivability analysis.Review system requirements and archite cture answer: Identify critical services and components/Identify attacks and compromis able components/Identify softspots and survivability strategies Which system model is described in the following graphic answer: Data-flow models Change request is proposal due to ___ answer: all: Market forces/Customers/Developers What's the difference between functional and non-functional requirements? answer: none:The functional requirement is described in details, the other is de scribed in high-level abstract/The functional requirement describes system prope rties and constraints, the other describes system services What are the user requirements? answer: The statements in a natural language plus diagrams that describe the ser vices' system and their constraints Suggest a most appropriate software process model that migh t be used as a basic for managing the developing of the software system that support categorizing go ods based on consumption pattern, tracking payments from the customers answer: The waterfall model How is the system organized in a client-server model? answer: none:A set of services is provided by servers and clients access and use these services/A set of services is provided by clients and servers access and usethese services Which of the following statements about the differences between integrating test ing and component testing are true? answer: The integrating testing test the result of the component while the compo nent testing test its internal structure Which of the following statements about project management is true? answer: The intangibility of software systems poses special problems for softwar e project management What are the distinctions between an object and an object class? answer: all: The object includes state variables and operations on that state as defined in the object class definition/An object is created at run-time by inst antiating an object class Which of the following is NOT a disadvantage of structured methods? answer: There are not many CASE tools that support structured methods The economies of all developed nations are dependent on software answer: True If performance is a critical requirement the architecture should be designed to answer: localize critical operations and minimize communications; use large rath er than fine-grain components Which of the following does NOT belong to important principles of agile methods? answer: Process not people What are the advantages of explicitly designing and documenting software archite cture? answer: all: It improves stakeholder communications/It encourages a detailed ana lysis of the system Which of the following statements about test first dev elopment are true? answer: all:When a system feature is identified, the tests of the code implement

ing that feature are written before the code/Tests are automated and all tests a re run when a new increment is added to the system What is the problem that cannot arise when requirements are written in natural l anguage? answer: Lack of user's understandability All of the fallowings are main benefits of software reuse EXCEPT answer: Reduce maintenance costs Which of the following statements about testing is NOT true? answer: Its goal is to fix errors of the software system Which of the following statement about the two distinct phases of system testing is NOT true? answer: The integration team does NOT have access to the source code of the syst em. Which of the following statements about Enterprise Resource Planning (ERP) syste ms is NOT true? answer: Enterprise Resource Planning systems are very widely used What is the second stage of risk management process? answer: Risk analysis Both the waterfall model of the software process and the prototyping model can b e accommodated in the spiral process model. answer: True Which of the following is a type of software process model that represents the r oles of the people involved in the software process and the activities for which they are responsible? answer: An role/action model What does computer science concern with? answer: Computer science is concerned with theories and methods that underlie co mputers and software systems What are included in a quality plan? answer: The quality procedures and standards that should be used in a project Which of the followings belong to Server type of concurrent object implementatio n answer: The object is a parallel process with methods corresponding to the objec t operations. Methods execute in response to external requests What is meant by configuration management answer: The dev elopment and use of standards and procedures for managing an evo lving software system Which of the following statements about Service-oriented software engineering is true? answer: Service-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality Which of the fallowings does NOT belong to the important differences between sof tware project management and other types of project management? answer: Cost of software project maintenance is higher than other type of projec ts is concerned with developing an oriented system model to implement requirements answer: Object-oriented Analysis What are system requirements answer: A structured document setting out detailed descriptions of the system's functions, services and operational constraints What key factors should be considered when planning reuse? answer: all: The development schedule for the software/The expected software lif etime/The background, skills and experience of the development team Applications frameworks are collections of concrete and abstract objects that ar e designed to be reused through specialization and the addition of new objects answer: true All of the following are the main benefits of software reuse EXCEPT answer: Reduce maintain cost Which of the following statements about Equivalence partitioning are NOT true?

answer: none Which of these statements about extreme programming are true? answer: New versions may be built several times per day Which of the following are the testing process goals answer: all:Discover faults or defects in the software/The check that the softwa re meets its requirements Which of the following statements about service interfaces is true answer: all: Service interfaces are defined in an XML-based language called WSDL /A WSDL specification includes a definition of the interface types and operation s, the binding protocol used by the service and the service location Which of the following statements about security is NOT true? answer: Security threats can be threats to the only confidentiality and integrit y of a system or its data All of the following are stages in an object-oriented dev elopment process EXCEP T? answer: Object-oriented evolution What are the components of an object class definition in the UML answer: all:The attributes of the class/The operations or methods associated wit h the class/The name of the object class Suggest the most appropriate generic software process model that might be used a s a basic for managing the development of the following system: A university acc ounting system that replaces an existing system answer: Waterfall model Requirements are usually presented at_ and _ levels of detail in requirements do cument answer: a high level statement/ a detailed system specification What are advantages of pipeline model? answer: all: Easy to add new transformations/Supports transformation reuse/Intui tive organization for stakeholder communication List the requirements document sections suggested by the IEEE standard. answer: Introduction-General-Specific-Appendices-Index. Which of the following statements about service interfaces is true? answer: AWSDL What is not an Upper-CASE tool? answer: Borland C A successful defect test is a test which causes a program to behave in an normal way answer: False What are the advantages of pair programming answer: It serves,It supports A critical distinction between a service and a component as defined in CBSE is t hat services are independent and: answer: All of the others Which one is not a web service standard? answer: SODP What are system requirements answer: A structured The two main approaches to concept reuse are: answer: Generative,Design Which of these statements about architectural design are true? answer: It involves,Represents,Often What do you understand by the system context and model of use? answer: The system context is a static,themodel is a dynamic When should you use data flow diagrams (DFD)? answer: showing dai nhat Which is the benefit of Service-oriented architectures? answer: inter-organizational is concerned with developing an object-oriented model of the application domain. The objects in that model reflect the entities and operations associated with th e problem to be solved

answer: Analysis Software systems are subject to continual change requests from answer: Developer,User What are the characteristics of RAD processes? answer: System,The system What is not a Lower_CASE tool? answer: Junit The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: answer: dai nhat quat vao Which of the followings belong to validation testing? answer: To demonstrate,Asuccessful test shows Change request is proposal due to answer: All of the others What is the correct sequence of the following activities in the Component-based software engineering? answer: 1,3,2,4 Which of the following statements about Equivalence partitioning are NOT true? answer: None of the others What types of system model may be developed? answer: Data,Composition,Architectural,Classification,Stimulus/response What is described in a context model? answer: The immediate external environment of the system defining the systems con text and the dependencies that a system has on its environment. What is described in a state machine model? answer: How the system responds to external events. What is a semantic data model? answer: A model that describes the logical structure of the data processed by a system or managed by a database. What are the components of an object class definition in the UML? answer: name,attributes,operations or methods associated What different object models may be developed? answer: Inheritance,Object aggregation,Object behaviour What is shown in an UML sequence model? answer: The sequence of interactions between objects and actors in the system as sociated with a single defined use-case. What is a structured method? answer: A systematic way of producing models of an existing system or of a syste m that is to be built. List four weaknesses of structured methods. answer: They do not support non-functional,They rarely include,They tend to prod uce,The models produced are detailed and often hard to understand. What are the stages in an object-oriented development process? answer: analysis,design,programming. What is the distinction between an object and an object class? answer: An object is created at run-time by instantiating an object class. The o bject includes state variables and operations on that state as defined in the ob ject class definition. Briefly describe two types of concurrent object implementation. answer: Servers: The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests.Active o bjects: The state of the object is changed by internal operations within the obj ect itself. The process executing these operations runs continuously. List the five key stages in an object-oriented design process. answer: Understand and define,Design,Identify,Develop,Specify object interfaces. What do you understand by the system context and model of use? answer: The system context is a static model of the other systems in the environ ment of the system being designed. The model of use is a dynamic model that desc ribes how the system being designed interacts with its environment. In the architectural model of the weather station system, what are the three lay

ers in the software? answer: interface,data collection,instruments List four approaches that may be used to identify object classes. answer: Grammatical,Identify,Use,Use scenario-based analysis. Briefly describe three design models that are part of the UML. answer: Subsystem,Sequence,State machine What is the purpose of interface design in an OO design process? answer: To define the signatures and semantics of the interfaces that are provid ed by an object or group of objects. Briefly explain why an OO approach facilitates design evolution. answer: The internal details of an object are hidden from other objects so chang ing these details is unlikely to have knock-on effects on other objects. What are the advantages of using an incremental approach to software development ? answer: Accelerated delivery of customer services.User engagement with the syste m. What is the key difference between incremental development and prototyping? answer: Incremental development starts with the requirements that are best under stood and that have the highest priority.Prototyping is intended to help underst and the requirements so starts with requirements that are not well understood. List five important principles of agile methods. answer: Customer,Incremental,People not,Embrace,Maintain What is test-first development? answer: When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system. Briefly describe the advantage of pair programming. answer: It supports the idea. It serves.It helps support What tools are normally included in a RAD environment? answer: database programming,interface generator,Links,report What is visual programming? answer: An approach to development where a programmer manipulates graphical icon s representing functions, data or user interface components and associates proce ssing scripts with these icons. Suggest three ways that a software prototype may be used. answer: help with,explore software,run back-to-back What were the key benefits of prototyping found in Gordon and Biemans study? answer: Improved system usability,Improved system quality,Reduced development ef fort. List the main benefits of software reuse. answer: Increased,Reduced Process Risk,Effective,Standards,Accelerated List the main problems with software reuse. answer: [2]:Lack of tool support[2]Increased maintenance costs| Increased,Lack,N ot-invented-here,Creating,Finding What key factors should be considered when planning reuse? answer: development,expected,background,criticality,application,system What is a design pattern and why are patterns important for reuse? answer: A design pattern is a description of a problem and the essence of its so lution. This solution is expressed in a generic way and can be instantiated and reused in different settings. What do Gamma et al. suggest are the four essential elements of a design pattern ? answer: meaningful,solution,statement. What is generator-based reuse? answer: An approach to reuse where reusable knowledge is embedded in a generator system which is programmed by domain experts to create the system. An executabl e system is then generated. What major software problem is addressed by aspect-oriented software development ? answer: The problem of separation of concerns so that a software unit is designe

d to do one thing and one thing only. What are three possible classes of application framework? answer: System infrastructure,Middleware,Enterprise What design choices have to be made when reusing COTS products? answer: Which COTS products.How data.What features List four types of specialisation of software product lines. answer: Platform,Environment,Functional,Process What is a successful defect test? answer: successful defect test is one where the systems operation does not confor m to its specification, i.e. one that exposes a defect in the system. Briefly describe the two distinct phases of system testing. answer: Integration,Release What guidelines does Whittaker suggest for defect testing? answer: Chose inputs,Design,Repeat,Force,Force What is the function of stress testing? answer: test,stress What tests should be included in object class testing? answer: Tests for all,Tests that set,Tests that force What three approaches may be used when designing test cases? answer: Requirements-based,Partition,Structural What is an equivalence partition? Give an example. answer: A class of inputs or outputs where it is reasonable to expect that the s ystem will behave the same way for all members of the class. For example, all st rings with less than 256 characters. What is path testing? answer: A structural testing strategy whose objective is to exercise every indep endent path through a program. What is meant by configuration management? answer: The development and use of standards and procedures for managing an evol ving software system. What is a baseline? answer: A controlled system where changes to the system have to be agreed and re corded before they are implemented. What should be included in a configuration management plan? answer: configuration,people,configuration,CM tool,schema Why is it necessary to define a configuration item identification scheme? answer: Because there may be thousands of source code modules, test scripts, des ign documents, etc. in a large project. You have to be able to uniquely identify and locate any specific item and so a unique naming scheme is required. What information may be included in a configuration database? answer: Information about configuration items such as data of creation, creator, etc. Information about users of components, system customers, execution platfor ms, and proposed changes to the system. What are the objectives of change management procedures? answer: To analyse the costs and benefits of proposed changes, approving changes that are worthwhile, and tracking which components of the system have been chan ged. What is the role of a change control board? answer: To assess the impact of proposed changes from a strategic and organisati onal perspective rather than a technical perspective. They should decide if chan ges are worthwhile and should prioritise changes to be implemented. What is the difference between a system version and a system release? answer: A system version is an instance of a system that differs, in some ways, from other instances. A system release is a version that is released to customer s. What are the advantages of attribute-based version identification? answer: When selecting components, you do not need to specify the version number (an error-prone process if there are many components) but simply list the requi red component attributes. What may be included in a system release?

answer: executable,Configuration,Data,installation,Electronic What are the key issues in system building? answer: Have all,Are the right,Are all,Are,Is the What are the key standards for web service-oriented architectures? answer: SOAP,WSDL,UDDI,WS-BPEL What is the definition of a (web) service? answer: A loosely coupled reusable software component that encapsulates discrete functionality which may be distributed and programmatically accessed. A web ser vice is a service that is accessed using standard Internet and XML-based protoco ls. What are the components of a WSDL specification? answer: interface specification,binding,location part What is service engineering? answer: The process of dev eloping services for reuse in service-oriented applic ations. What are the three fundamental types of service that may be identified? answer: Utility services,Business services,Coordination services What are the three stages in service interface design? answer: Logical interface,Message design,WSDL development What information is maintained in a UDDI description? answer: Details of,informal description,Information on,Subscription information How can web services be used to facilitate the use of legacy systems? answer: The legacy system functionality is hidden by wrapping it in a web service which is accessed by external applications. These applications therefore do not need to know the protocols and data structures used by the legacy system. Define software development with services answer: The creation of programs by composing and configuring services to create new composite services. What is a workflow? answer: A sequence of activities, ordered in time, that make up a coherent busin ess processes with each activity carrying out some part of the work of that proc ess. What are the stages in service construction by composition? answer: Formulate,Discover services,Select,Refine,Create,Test What is the difference between BPMN and WS-BPEL? answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a lower-level XML-based language. List five problems in testing service-oriented systems. answer: Services,Dynamic,non-functional,Testing,Compensating What are the advantage of explicitly designing and documenting a software archit ecture? answer: improves,encourages,helps What non-functional requirements may be influenced by the choice of system archi tecture? answer: Performance, security, safety, availability, maintainability. List four fundamental questions that should be addressed in architectural design .Is there a generic application architecture that can be used? answer: How will,What architectural,How should,What control,Etc. What architectural models may be developed? answer: static structural,dynamic process,interface,Relationship,distribution What is the fundamental characteristic of a repository model? answer: All shared data is held in a central database that can be accessed by al l sub-systems. How is the system organised in a client-server model? answer: A set of services is provided by servers and clients access and use thes e services. What are the two principle styles used for modular decomposition? answer: Object-oriented decomposition, Function-oriented pipelining. 1. What is the output of Risk Planning stage?

answer: Risk avoidance and contingency plans 2. How is the system organized in aclient-server model? answer: A set of services is provided by servers and clients access and use thes e services 3. What is the first stage in survivability analysis? answer: Review system requirements and architecture 4. Which of these statements about architectural design is not true? answer: Represents the link between specification and design processes 5. Which is not an advantage of inheritance? answer: Object classes are self-contained. They can be understood without refere nce to their super-classes 6. What is Not a type in Reuse-based software engineering? answer: Software development process reuse 7. What is described in a context model? answer: The immediate ecternal environment of the system defining the system's c ontext and the dependencies that a system has on its environment 8. Which of the follwing is Not a type of behavioral model? answer: Architectual mode 9. What is correct phase related to the term "CASE" in software engineering? answer: The software systems that provide automated support for software process activities 10. Which of the followings does not belong to external requirements? answer: Portability requiements 11. Which of the following is not a stage in componet - Base Software enginnerin g answer: System design with reuse 12. What activity does a software project manager need to perform to minimize th e risk of software failure? answer:Define milestones and track progress 13. What is describled in a state machine model? answer: How the system responds to external event 15. What is not a technique for component identification? answer: Function-based identification 16. What is not an essential element of design patterns? answer: A concrete design description 17. Which is NOT a problem that an arise when requirements are written in natura l language? answer: Lack of user's understandability 18. What is not an advantage of object model answer: complex entities are easy to represent as objects 19. When software configuration management is a formal activity, the software co nfiguration audit is conducted by the answer: Senior managers 20. Who is mainly responsible for the component (unit) testing? answer: Developer 21. Which is the purpose of data model? answer: Describle the logical structure of data processed by the system 22. Why do we need to consider security for project? answer: to protect the sestem against external attack 23. What is the main difference between RUP (Raditional Unified Process and othe r processes? answer: The construction phase is essentially concerned with system design, prog ramming and testing 24. What are non-functional requirements? answer: Constraints on the services or functions offered by the system such as t iming constraints, constraints on the development process, standards, etc 25. Which of the following is not an advantage of pipeline model answer: Easy to support event-based interaction 26. Which is Not an object-oriented strategy? answer: Object-oriented deployment

27. What is a version? answer: An instance of a system which is distributed to users outside of the dev elopment team 28. Which of the following is not a stage in an object-oriented development proc ess? answer: Object-oriented programming 29. What is Not a main problem with software reuse? answer: Not-invented-here syndrome 30. What are milestones? answer: Milestones are end-point of a project phase 31. Which is the right sequence in project scheduling? answer: (2)=>(1)=>(4)=>(3) 32. Which is Not a principal component of a software engineering method? answer: Process activities 33. What is the common limitation of auto mated testing? answer: They are not useful when rewuiement are changing frequently 34. What is the purpose of defect testing? answer: To discover faults that make software's behavior incorrect 35. What is Not a characteristic of extreme programming? answer: Delivery-first development 36. What is Not a component of a WSDL specification? answer: The location part 37. What are the four essential attributes of the good software? answer: Maintainability,dependability,efficiency,usability 38. What are the advantages of using an incremental approach to software develop ment? answer: Accelerated delivery of customer services, user engagement with the syst em. 40. What are functional requirements? answer: Statement of services the system should provide how the system should re act to particular inputs and how the system should behave in particular situatio ns 41. Which is NOT related to a characteristic of rapid application development pr ocesses? answer: It is always possible to arrive at a stable, consistent set of system re quirements 42. Which of following paradigms is not a general paradigm of software developme nt? answer: Rapid software development 43. What is WSDL standard? answer: A standard for workflow languages used to define service composition. 44. Which of the following design guidelines for secure systems engineering is N OT true? answer: Avoid using redundancy and diversity to reduce risk 45. What is the normal order of activities in which software testing process is organized? answer: (2)=>(1)=>(3)=>(4) 46. Which of the following is NOT a sector in each loop in Boehm's spiral model? answer: System design 47. What is the first stage in service construction by composition? answer: Formulate outline workflow 48. What is NOT the advantage of repository model answer: Sub-system need not be concerned with how data 49. Which of the following is NOT an advantage of using incremental development and dilivery? answer: Systems are offten have good structures 50. What is NOT an objective of change management procedures? answer: Approving changes that are worthwhite.

51. What are the advantage of explicitly designing and documenting softwore arch itecture? answer: It improves the sta***it helps with***it encourages a detailed 52. What is the Lower-CASE tool? answer: Netbeans 53. In the management system, the customer notices to one of requirements, with the same data, product information, the system should be performed difference pr esentations for correspondent departments such as Product department, Quallty de partment and Planning department. So which design or framework is applied for? answer: MVC-Model view 54. Which of the following is NOT a stype of behavioural model answer: Semantic data models 55. The student management system was completed with two functions, managing stu dent information and organizing quizes for review, after that the customer added one more function, organizing online examination. Finaly all of them are put in to the configuration management and are built for system testing, so what is the build called? answer: Release 56. What is the output of Feasibility Study stage in the Requirement Engineering Process? answer: Feasibility report 57. The Google map is a web service to be used in the weather system, which meth od is used in testing the system? answer: Integration testing 58. Using equivalence partition testing to check employee ID by format 8xxx: Boo lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin g? answer: 7999,8000,8500,8999,9000 59. Which is NOT related to a characteristic of rapid application development pr ocesses? answer: It is always possible to 60. List the tests that should be included in object class testing answer: Tests that set*** tests for all***tests that force 61. What is the Upper-CASE tool? answer: Microsoft Visio 62. Which is NOT an object-oriented strategy? answer: Object-oriented deployment 63. What are the two types of CM workbench? answer: Intergrated workbenches***Open workbenches 64. What problems can arise when requirements are written in natural language? answer: Lank of clarity*** requiment ama***requirement confu 65. Which of the following statements about Reference models are true? answer: Refference models*** they are a 66. All of the followings belong to organizational requirements EXCEPT? answer: Privacy requirements 67. What is the firt stage in service construction by composition? answer: Formulate outline workflow 68. List three types of program generator answer: Application*** code*** parser and lexical 69. Which question no longer concerns the modern software engineer? answer: Why does computer 70. What is the type of following requirement,"the result should be returned in the real time"? answer: Non-functional requirements 71. All of the following are advantages of pair programming EXCEPT answer: It helps to increase 72. What is the last stage in survivabilityanalysis? answer: Identify softspots and sur 73. How to build security for the CMS system? answer: Building system authemtication

74. Which of these statements about defect testing is NOT true? answer: A successful test 75. Which one is program type of the Java compite,Javac? answer: Parser and lexical analyser generators 76. Which of following statements about software engineering is NOT true? answer: SOftware costs more to develop than it does to maintain Final Exam - Ngay thi: 18.12.2009 Question 1 Marks: 1 How is the software engineering? a. It provides developers discipline to develop a software product b. It provides developers appropriate tools and techniques c. It is concerned with the practicalities of delivering useful software d. It is concerned with theory and fundamentals how to develop a softwar e product answer:a. It provides developers discipline to develop a software product Question 2 Marks: 1 What are the ethical responsibilities of the software engineers? a. Software engineers should not misrepresent their level of competence b. Software engineers shall be fair to and supportive of their colleague s c. The technical skills are set to highest priority d. Software engineers shall maintain integrity and independence in their professional judgment answer:a. Software engineers should not misrepresent their level of competence b . Software engineers shall be fair to and supportive of their colleagues d. Soft ware engineers shall maintain integrity and independence in their professional j udgment Question 3 Marks: 1 What is the difference between software engineering and computer science? a. Computer science is concerned with theory and fundamentals;Software e ngineering is concerned with the practicalities of developing and delivering use ful software b. Software engineering is concerned with theory and fundamentals;Comput er science is concerned with the practicalities of developing and delivering use ful software answer : a. Computer science is concerned with theory and fundamentals;Software engineering is concerned with the practicalities of developing and delivering us eful software Question 4 Marks: 1 Which of these statements about Software costs are true? a. Software costs more to maintain than it does to develop b. The costs of software on a PC are often greater than the hardware cos

t c. Software costs often dominate computer system costs d. Software costs more to develop than it does to maintain answer:a. Software costs more to maintain than it does to develop b. The costs o f software on a PC are often greater than the hardware cost c. Software costs of ten dominate computer system costs Question 5 Marks: 1 How are the prototyping development? a. Should start with well-understood requirements b. Specification, development and validation are interleaved c. Should start with poorly understood requirements d. Objective is to understand the system requirements and clarify what i s really needed answer:b. Specification, development and validation are interleaved c. Shoul d start with poorly understood requirements d. Objective is to understand the sy stem requirements and clarify what is really needed Question 6 Marks: 1 What are the most fundamental activities in software processes? a. Software specification, software development, software validation, software e volution b. Software specification, software development, software testing, softw are evolution c. Software specification, software development, software validation, so ftware maintenance d. Software requirement, software development, software validation, soft ware evolution answer: a. Software specification, software development, software validation, so ftware evolution Question 7 Marks: 1 Which process model is used in the Rational Unified Process? a. b. c. d. answer: c. Waterfall Transition Iteration Construction Iteration

Question 8 Marks: 1 Evolutionary software process models a. Are iterative in nature b. A risky model that rarely produces a meaningful product c. The best approach to use for projects with large development teams d. Can easily accommodate product requirements changes answer:a. Are iterative in nature d. Can easily accommodate product requirements changes

Question 9 Marks: 1 The component-based development model is a. Not cost effective by known quantifiable software metrics b. Not able to support the development of reusable components c. Works best when object technologies are available for support d. Only appropriate for computer hardware design answer:c. Works best when object technologies are available for support Question 10 Marks: 1 How are the software project management? a. No responsibility on the proposal preparation b. Consider budget and schedule constraints c. Consider software development process is not standardised d. Software engineering discipline is not the same as other domains answer:b. Consider budget and schedule constraints c. Consider software developm ent process is not standardised d. Software engineering discipline is not the sa me as other domains Question 11 Marks: 1 What should include in the project plan? a. b. c. d. answer: a. Work breakdown structure Architecture design Project schedule Risk report Work breakdown structure

c. Project schedule d. Risk report

Question 12 Marks: 1 What should we do to manage risk? a. Monitor the risks throughout the project b. Make contingency plans c. Risk assessment d. When risks happen, the suitable solutions are just generated answer:a. Monitor the risks throughout the project b. Make contingency plans c. Risk assessment Question 13 Marks: 1 Which factors should be considered in choosing the organizational structure for a software team? a. Degree of communication desired b. Rigidity of the delivery date c. Predicted size of the resulting program d. Size of the project budget answer: a. Degree of communication desired b. Rigidity of the delivery date c. Predicted size of the resulting program

Question 14 Marks: 1 One of the best ways to avoid frustration during the software development proce ss is to a. Give team members more control over process and technical decisions b. Hide bad news from the project team members until things improve c. Reward programmers based on their productivity. d. Give team members more control over process and technical decisions answer:a. Give team members more control over process and technical decisions Question 15 Marks: 1 How are the non-functional requirements? a. Timing constraints b. Statements of services should react to particular inputs c. They come from the application domain of the system and reflect chara cteristics of that domain d. Define system properties and constraints answer:a. Timing constraints d. Define system properties and constraints Question 16 Marks: 1 How are the user requirements? a. Non-functional requirements are requested by customer b. Requirements which programmers can develop right after understanding them c. Functional requirements are described by system users d. They are tables and diagrams which can be understood by all users answer:a. Non-functional requirements are requested by customer c. Functional re quirements are described by system users d. They are tables and diagrams which c an be understood by all users Question 17 Marks: 1 What happen when using natural language to describe requirements? a. Several different requirements may be expressed together as a single requirement b. Requirements, system goals and design information may not be clearly distinguished c. Easy to misunderstand between reader and writer d. It provides the most complete information for developers answer:a. Several different requirements may be expressed together as a single r equirement b. Requirements, system goals and design information may not be clear ly distinguished c. Easy to misunderstand between reader and writer Question 18 Marks: 1 The system specification describes the a. Function, performance and constraints of a computer-based system b. Implementation of each allocated system

c. Time required for system simulation d. Element software architecture answer:a. Function, performance and constraints of a computer-based system Question 19 Marks: 1 The best way to conduct a requirements validation review is to a. Use a checklist of questions to examine each requirement b. Send them to the design team and see if they have any concerns c. Have the customer look over the requirements d. Examine the system model for errors answer:a. Use a checklist of questions to examine each requirement Question 20 Marks: 1 How are the context model? a. o position b. c. d. answer: a. o position ries c. Social and organisational concerns may affect the decision on where t system boundaries They show what lies outside the system boundaries Relationship with other systems They show what lies inside the system boundaries Social and organisational concerns may affect the decision on where t system boundaries b. They show what lies outside the system bounda Relationship with other systems

Question 21 Marks: 1 Which ones relate to the behavioural model? a. Show the processing steps as data flows through a system b. Data flow diagrams are used in performing the data exchange between a system and other systems c. State diagrams show states when the systems response to events d. Semantic data describe the logical structure of data processed by the system answer:a. Show the processing steps as data flows through a system b. Data flow diagrams are used in performing the data exchange between a system and othe r systems c. State diagrams show states when the systems response to event s Question 22 Marks: 1 Which relationships are used in the data model? a. b. c. d. Interaction Association Aggregation Inheritance

answer: b. Association c. Aggregation d. Inheritance Question 23 Marks: 1 Which of following is not a UML diagram used creating a system analysis model

a. b. c. d.

Class diagram State diagram Activity diagram Dataflow diagram

answer:d. Dataflow diagram Question 24 Marks: 1 The data dictionary contains descriptions of each software a. b. c. d. answer: b. Notation Data object Diagram Control item Data object d. Control item

Question 25 Marks: 1 Which information are refered to make architectural design? a. b. c. d. Which components are distributed in the system How the sub-system is decomposed into modules Non-functional requirements are requested by customer A generic application architecture can be used

answer:a. Which components are distributed in the system b. How the sub-system i s decomposed into modules d. A generic application architecture can be used Question 26 Marks: 1 Which ones mention to the decomposition style? a. Data-flow model where the system is designed into functional modules which tr ansform inputs to outputs b. One sub-system has responsibility for starts and stops other sub-syst ems c. An object model where the system is designed into interacting objects d. Each sub-system can respond to externally generated events from other sub-systems answer:a. Data-flow model where the system is designed into functional modules w hich transform inputs to outputs c. An object model where the system is designed into interacting objects Question 27 Marks: 1 Which ones mention to the control style? a. One sub-system has responsibility for starts and stops other sub-syst ems b. Data-flow model where the system is designed into functional modules which transform inputs to outputs c. Each sub-system can respond to externally generated events from other sub-systems d. An object model where the system is designed into interacting objects

answer:a. One sub-system has responsibility for starts and stops other sub-syste ms c. Each sub-system can respond to externally generated events from other subsystems Question 28 Marks: 1 An architectural style encompasses which of the following elements? a. Set of components b. syntactic models c. Semantic models d. Constraints answer:a. Set of components c. Semantic models d. Constraints Question 29 Marks: 1 To determine the architectural style or combination of styles that best fits th e proposed system, requirements engineering is used to uncover a. b. c. d. Algorithmic complexity Control and data Characteristics and constraints Design patterns

answer:c. Characteristics and constraints Question 30 Marks: 1 Which relationships are used in the object-oriented design process? a. Inheritance b. Association c. Aggregation d. Interaction answer:a. Inheritance b. Association c. Aggregation

Which ones are used in the dynamic models? a. Active b. c. d. or passive objects Interaction relationships Object classes Object lifelines b. Interaction relationships d. Objec

answer: a. Active or passive objects t lifelines

Question 32 Marks: 1 How to identify objects within the system? a. Base on the static and dynamic models b. Base on tangible things in the application domain c. Depend on the skill, experience and domain knowledge of system design ers

d. Base on iterative scenarios answer:b. Base on tangible things in the application domain c. Depend on the ski ll, experience and domain knowledge of system designers d. Base on iterative sce narios Question 33 Marks: 1 Which of the following is not a characteristic common to all design methods? a. Notation quality assessment b. Functional component c. configuration management d. Guidelines refinement heuristics answer:c. configuration management Question 34 Marks: 1 What types of abstraction are used in software design? a. Data b. Environmental c. Control d. Procedural answer:a. Data c. Control d. Procedural Question 35 Marks: 1 Which of the following traits need to exist among the members of an agile softw are team? a. None of the above b. Mutual trust and respect c. Competence d. Decision-making ability answer:b. Mutual trust and respect c. Competence d. Decision-making abili ty Question 36 Marks: 1 Which of the following is not necessary to apply agility to a software process? a. Uses incremental product delivery strategy b. Eliminate the use of project planning and testing c. Only essential work products are produced d. Process allows team to streamline tasks answer:c. Only essential work products are produced Question 37 Marks: 1 When is the design pattern applied to? a. Re-use experiences of the specialists who developed reusable software b. Re-use to develop non-functionalities c. Re-use difference settings of the abstract knowledge d. Re-use abstract knowledge about a problem and its solution answer:a. Re-use experiences of the specialists who developed reusable software c. Re-use difference settings of the abstract knowledge d. Re-use abstract knowl

edge about a problem and its solution Question 38 Marks: 1 Which ones are framework classes? a. System infrastructure framework b. Enterprise application framework c. Middleware integration framework d. Parser and lexical analysing framework answer:a. System infrastructure framework b. Enterprise application framew ork c. Middleware integration framework Question 39 Marks: 1 Extending the framework involves a. Adding methods that are called in response to events that are recogni sed by the framework b. Adding data objects that are used in the framework c. Adding concrete classes that inherit operations from abstract classes in the framework answer:a. Adding methods that are called in response to events that are recognis ed by the framework c. Adding concrete classes that inherit operations from abstract classes in the framework Question 40 Marks: 1 Adaptation in software product lines may involve a. b. c. d. e. Adding new components to the system Selecting from a library of existing components Component and system configuration Modifying components to meet new requirements Modifying system design to meet new requirements

answer:a. Adding new components to the system b. Selecting from a library of e xisting components c. Component and system configuration d. Modifying com ponents to meet new requirements Question 41 Marks: 1 How are the system testing? a. Testing on integrating components to create a system or sub-system b. Testing on integrating sub-systems to create a system c. Testing is done by an independent testing team d. Testing on individual program components to create a sub-system answer:a. Testing on integrating components to create a system or sub-system b. Testing on integrating sub-systems to create a system c. Testing is do ne by an independent testing team Question 42 Marks: 1 How are the component testing?

a. Testing is done by an independent testing team b. Testing is done by component developers c. Testing on individual program components to create a sub-system d. Testing on interactive among components answer:b. Testing is done by component developers c. Testing on individual progr am components to create a sub-system Question 43 Marks: 1 Which types of testing are done by development team? a. Stress testing b. Interface testing c. Acceptance testing d. Release testing answer:a. Stress testing

b. Interface testing

d. Release testing

Question 44 Marks: 1 Which of the following need to be assessed during unit testing? a. Code stability b. Error handling c. Algorithmic performance d. Execution paths answer:b. Error handling d. Execution paths Question 45 Marks: 1 Top-down integration testing has as it's major advantage(s) that a. b. c. d. Major decision points are tested early No stubs need to be written No drivers need to be written Low level modules never need testing

answer:a. Major decision points are tested early c. No drivers need to be writte n Question 46 Marks: 1 Why is the configuration management applied? a. Make the product development more quality b. Support to evolve software product c. Aim to control the costs and effort involved in making changes to a s ystem d. Make necessary configurations for preparing software development envi ronment answer:a. Make the product development more quality b. Support to evolve sof tware product c. Aim to control the costs and effort involved in making change s to a system Question 47 Marks: 1

Which development phases are included in the configuration management plan? a. Testing b. Deployment c. Design d. Implementation answer:a. Testing c. Design d. Implementation Question 48 Marks: 1 Which information are included in the component header? a. b. c. d. Author of the component and creation date Pre-conditions and post conditions Project name Version number and what were changed d. Versi

answer:a. Author of the component and creation date c. Project name on number and what were changed

Question 49 Marks: 1 Which of the following is not considered one of the four important elements tha t should exist when a configuration management system is developed? a. Validation elements b. Process elements c. Component elements d. Human elements answer: d. Human elements Question 50 Marks: 1 Which of the following tasks is not part of software configuration management? a. Statistical quality control b. Eporting c. Change control d. Version control answer: a. Statistical quality control Question 51 Marks: 1 What are the security risk management concerned? a. Assessing the possible losses that might ensue from attacks on the system b. Balancing the possible losses against the costs of security procedure s that may reduce these losses c. Assessing the life cycle of risks d. Analyse assets of the system answer:a. Assessing the possible losses that might ensue from attacks on the sys tem b. Balancing the possible losses against the costs of security procedure s that may reduce these losses Question 52 Marks: 1 How are analyse assets of the system?

a. b. c. d.

Set level of vulnerabilities of each asset Set the level of exposure of each asset Identify system resources that have a value and have to be protected Set level of value of each asset c. Identify system resou d. Set level of value of

answer:b. Set the level of exposure of each asset rces that have a value and have to be protected each asset

Question 53 Marks: 1 What are the design guidelines to make the secure system? a. Raise awaremess of the security issues b. Consider as basic of a review checklist that is applied during the sy stem validation process c. Process guidance to develop the system more secure d. Coding techniques to make the system more secure answer:a. Raise awaremess of the security issues b. Consider as basic of a revie w checklist that is applied during the system validation process Question 54 Marks: 1 What is the first layer of system layers? a. Operation system b. Reusable components and libraries c. Application d. Middleware answer:c. Application Question 55 Marks: 1 What is the last layer of system layers? a. Reusable components and libraries b. Middleware c. Operation system d. Application answer:c. Operation system Question 56 Marks: 1 Which ones are related to the service-oriented architectures? a. Services may execute on different computers b. Protocols have been developed to support service communication and in formation exchange c. Model-View-Controller d. A system where the components are stand-alone services answer:a. Services may execute on different computers b. Protocols have been d eveloped to support service communication and information exchange d. A system w here the components are stand-alone services Question 57 Marks: 1 What are the service testing problems?

a. Service testing is difficult as external services are 'black-boxes' b. Non-functional behaviour of the service is unpredictable c. External services may be modified by the service provider thus invali dating tests which have been completed d. Find defects and demonstrate that a system meets its functional and n on-functional requirements answer:a. Service testing is difficult as external services are 'black-boxes' b. Non-functional behaviour of the service is unpredictable c. External services may be modified by the service provider thus invalidating tests which have been completed Question 58 Marks: 1 What is the last stage in service construction by composition? a. Refine workflow b. Create workflow program c. Discover services d. Test service e. Formulate outline workflow answer:d. Test service Question 59 Marks: 1 What is the output of "Refine workflow" in Construction by composition? a. Executable workflow b. Service specification c. Workflow design d. Deployable service e. Service list answer: c. Workflow design Question 60 Marks: 1 Which benefits of the incremental development? a. velopment b. ent c. d. r Meet requirements quickly because users have to be involved in the de The processes of specification, design and implementation are concurr The system are often well structured. Rapid to delivery the highest priority functionalities to the custome

answer: a. Meet requirements quickly because users have to be involved in the de velopment b. The processes of specification, design and implementation are concu rrent d. Rapid to delivery the highest priority functionalities to the customer In the UML, a (an) ______ is represented as a named rectangle with two sections. The object attributes are listed in the top section. The operations that are as sociated with the object are set out in the bottom section. answer:Object class Object-oriented systems are easier to change than systems developed using other approaches because the objects are independent. answer: True What are advantages of object oriented model answer: [3]:[1]The objects may reflect real-world entities [2]OO implementation languages are widely used [3]Objects are loosely coupled so their implementation can be modified without affecting other objects

Which of following paradigms are the three most general paradigms of software de velopment? answer: [3]:[1]Component-based software engineering [2] Waterfall approach [3]It erative development Which of following statements about software engineering is true? answer: [3]: [1]Software engineering is concerned with theories, methods and too ls for professional software development [2]The economies of ALL developed natio ns are dependent on software [3] More and more systems are software controlled The economies of all undeveloped nations are dependent on software answer: False A software process is a simplified representation of a software process model, p resented from a specific perspective. answer: False Software process model is a simplified representation of a software process, pre sented from a specific perspective. answer: True ========================================= Chap1 What can be represented by a workflow model? answer: The sequence of activities in the process along with their inputs, outpu ts and dependencies. ========================================= Chap4 The spiral model of software development answer: Includes project risks evaluation during each iteration ========================================= Chap8 Context models are used to illustrate the operational context of a system - they show what lies outside the system ______. answer: Boundaries Different models present the system from different perspectives: ______perspective showing the system's context or environment; ______perspective showing the behaviour of the system; ______perspective showing the system or data architecture. answer: External; Behavioural; Structural Which of these statements about Semantic Data Models are NOT true? answer:[2] [1]They show the system's responses.... [2]These model the behaviour of the system.... List 4 weaknesses of structured methods? answer:[4] [1]They do not support non-functional [2]They rarely include... [3]Th ey tend to produce.... [4] The models produced are detailed.... ========================================= Chap14 Object-oriented analysis is concerned with developing an object-oriented model o f a software system to implement the identified requirements. answer: false (Object-Oriented Development (OOD) mi ng!) ========================================= Giai de Final 1 4 What is a variant? answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system 5 All of the following are the advantages of using incremental development and d elivery EXCEPT answer: The system are often have good structures 6 What is the last stage of risk management process? answer: Risk monitoring

... stage of risk management process? answer: risk identification (1) -> risk analysis (2) -> risk planning (3) -> ris k monitoring (4) 7 Which of these statements about state machine models is NOT true? answer: They are used to describe the logical structure of data processed by the system 8 All of the following are types of interface that may have to be de ned in a requ irements document EXCEPT answer: Parameter interfaces 9 It is impossible to completely separate system requirements and design answer: true (impossible) 12 All of the following are disadvantages of structured methods EXCEPT answer: There are not many CASE tools that support structured methods 19 Which is NOT a principle style used for modular decomposition? answer: Attribute-oriented pipelining 20 Project plan sets out all of the following EXCEPT answer: The quality procedures and standards 22 All of the following are advantages of repository model EXCEPT answer: Easy to distribute efficiently 24 All of the following are advantages of object model EXCEPT answer: Complex entities are easy to represent as objects 25 All of the following are the components of an object class de nition in the UML EXCEPT answer: The interfaces of the class 26 What is NOT a type in main approaches to concept reuse answer: Object and fuction resuse 29 What is NOT a purpose of the testing process? answer: To fix faults or defects in the software 31 Suggest a way that a software prototype may NOT be used? answer: To save software prototype development effort 33 What does a workflow model represent? answer: It shows the sequence of activities in the process along with their inpu ts, outputs and dependencies. 36 Fixed - price contracts, where the contractor bids a xed price to complete a s ystem development, may be used as a main type of contracts. Do you think that th e use of such contracts may decrease the likelihood that product risks will aris e? 38 What is computer science concerned with? answer: Computer science is concerned with theories and methods that underlie co mputers and software systems 39 All of the following are advantages of inheritance EXCEPT answer: Object classes are self-contained. They can be understood without refere nce to their super-classes

43 Which of the following is NOT a fundamental type of service that may be ident i ed? answer: Security services 44 All of the following are types of program generator EXCEPT answer: Component generators 45 All of the following are the tests that should be included in object class te sting EXCEPT answer: Test the associations of the objects with the others 45 According to Sommerville, what is software? answer: Computer programs and associated documentation such as requirements, des ign models and user manuals 47 All of the following are advantages of pair programming EXCEPT answer: It helps to increase the process visibility 48 All of the following are techniques for component identi cation EXCEPT answer: Function-based identification 49 Which of the followings does NOT belong to organizational requirements? answer: Privacy requirements ========================================= De final 2 During requirement checking, which question you need to answer for the consisten cy? Answer: ### Are there any requirements conficts? What does the rapid application development concern with? Answer: ### An iterative approach to software development leads to faster delive ry of software Select the most suitable software process model for a project that are developed at different sites Answer: ### Waterfall _____ are very abstract. They do not show the nature of component relationships nor the externally visible properties of the sub-systerns. However, they useful for communication with stakeholders and for project planning. Answer: ### Box and line diagrams Select the type of following requirement: "The system shall provide appropriate viewers for the user to read documents in the document store." Answer: ### Functional requirement Which is the type of the following requirement: "The CMS system must be easy to use " Answer: ### User requirement The objective of _____ is to deliver a working system to end-users. The objectiv e of _____ is to validate or derive the system requirements. Answer: ### incremental development; throw-away prototyping What should we do first when we receive a change request from out customer? Answer: ### Analyse the change request In architecture design: Using large-grain components improves system _____ but r educes system _____.

Answer: ### Performance; maintainability Given the project activities chart as below, please de ne the critical path (the v alues mention in each arrow are activity name and activity duration) Answer: ### ABCI Select correct statements about software management Answer: ### [1] Software project management is an essential part ... [2] Good pr oject management can totally guarantee... Which are THREE essential elements of design pattems? (select three) Answer: ### [1] A name that is ... [2] A statement of the .... [3] A description of the problem... What are two phases of system testing? Answer: ### [1] Integration testing [2] Release testing A _____ is a way of reusing abstract knowledge about a problem and its solution. Answer: ### Design pattern Context models are used to illustrate the operational context of a system - they show what lies outside the system _____. Answer: ### Boundaries Which process model is most appropriate for a large software project with stable requirements? Answer: ### Waterfall Different models present the system from different perspectives: _____ perspecti ve showing the system's context or environment; _____ perspective showing the be haviour of the system; _____ perspective showing the system or data architecture . Answer: ### External; Behavioural; Structural All of the following statement about design pattem are true EXCEPT Answer: ### Design patterns are detail-level abstrations that document...

Which of the followings belong to "Vulnerability" Answer: ### A weakness in a computer-based system that maybe exploited to... ========================================= De final 4 What is the first milestone of the service engineering process? answer: ### Service requirements What are the users of system requirement speci cation? answer: ### [1] Client engineers [2] Software developers [3] System architects [ 4] System end-users Which of the following statements belong to system release? answer: ### An instance of a system which is distributed to users outside of the development team Using object oriented approach is hard to facilitate design evolution answer: ### False

List the main approaches of concept reuse answer: ### [1] Generative programming [2] Design patterns List the main benefits of so ware reuse answer: ### [1] Effective use of... [2] Accelerated development [3] Reduced proc ess risk [4] Increased dependability The change requests should be reviewed and approved by answer: ### Change control board Which are the static models among following models? answer: ### [1] Context model [2] State machine model Which of the following statements belong to software specification? answer: ### The functionality of the software and constraints on its operation m ust be defined. What is the third activity of project management? answer: ### Project costing The objective of Throw away prototyping is answer: ### To validate or derive the system requirements. Which of the following statements about structured methods are true? answer: ### [1] They do not support non-functional... [2] They tend to produce t oo much... [3] The models produced are detailed...

What is the second stage in survivability analysis answer: ### Identify critical services and components What should we do to improve the performance of the system ? answer: ### Localize safety-critical features in a small... Rapid application development is answer: ### An iterative approach to software... The system context is a static model of the other systems in the environment of the system being designed. answer: ### True The system context is a dynamic model that describes how the system being design ed interacts with its environment. answer: ### False There are many standard protocols that have been developed to support service co mmunication and information exchange answer: ### False

What are the roles of state machine models?

answer: ### [1] The show the system's responses to stimuli so are... [2] The are used to describe the logical structure of data... Pair programming helps to increase the process visibility answer: ### True Which of the following requirement statements belongs to functional requirements ? answer: ### An article information shall include Author, Title, Description and other related infomation Please choose the correct statement about unit testing answer: ### Unit testing is usually black-box or functional testing Which of the following statements about workflow model are true? answer: ### It shows the sequence of activities in the process... Which of the following statements about object models are true? answer: ### [1] The objects may reflect real-world entities [2] Objects are loos ely coupled so their implementaion... Data flow diagrams (DFD?) is used to answer: ### Show the data exchange between a system and other systems in its env ironment Services may execute on different computers from different service providers answer: ### True What is the second activity of project management? answer: ### Project planning and scheduling List the good ways to identify object classes? answer: ### [1] Identify tangible things... [2] Grammatical analysis... [3] Use an approach based on... [4] Use scenario-based analysis List the main purposes of the testing process? answer: ### [1] To demonstrate that the... [2] To discover faults or defects... Which of the following statements belong to SOAP standard? answer: ### A message exchange standard that supports service communication Using incremental development and delivery will reduce the risk of overall proje ct failure answer: ### True What is the first milestone of software requirement engineering process? answer: ### Feasibility study report document

List techniques that can be used for component identi cation

answer: ### [1] Version numbering [2] Attribute-based identification [3] Functio n-based identification Which of the followings are not the users of system requirement speci cation? answer: ### [1] Contractor managers [2] Client managers

What are the non-functional system requirements that the particular style and structure chosen for an application may depend on? answer: ### [1] Availability [2] User friendly [3] Safety ========================================= Giai de final 5 Prototyping method starts with requirements that are best understood answer: ### False What is a system context? answer: ### The system context is a static model of the other systems in the env ironment of the system being designed. The programs that are developed using evolutionary development are likely to be easy to maintain answer: ### False The change control board assess the impact of proposed changes from a strategic and organizational perspective rather than a technical perspective answer: ### True Which of the following statement about agile methods is NOT true answer: ### Angile methods focus on the design rather than the code Only exhaustive testing can show a program is free from defects. Therefore, most of important systems should be tested exhaustively. answer: ### False All of following statements about software management distinctions are true EXCE PT answer: ### The software product is tangible We should to make the distinction between developing the user requirements and d eveloping system requirements in the requirement engineering process answer: ### True What is SOAP standard? answer: ### A message exchange standard that supports service communication ========================================= Max length Answer: qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjklzxcvbnm qwertyuiopasdfghjk l 2 most fundamental types of software product: Answer: Generic products. Customized products. 3 most general paradigms of software development: Answer: Iterative development. Waterfall approach. Component-based software eng ineering

3 most important key challenges facing software engineering: Answer: Heterogeneity challenges. Delivery challenges. Trust challenges 4 essential attributes of good software: Answer: Maintainability. Dependability. Efficiency. Usability The principal components of a software engineering method: Answer: Process guidance. Recommendations. System model descriptions. Rules The question no longer concerns the modern software engineer: Answer: Why does computer hardware cost so much? The most fundamental activities in software processes: Answer: Software specification, software development, software validation, soft ware evolution Software engineering methods: Answer: System models, notations, rules, design advice and process guidance. ; Software engineering is: Answer: Concerned with all aspects of software production from specification to system maintenance Computer science concern with: Answer: Theories and methods that underlie computers and software systems Meaning of CASE: Answer: Computer Aided Software Engineering The economies of all undeveloped nations are dependent on software: Answer: False Software process is a simplified representation of a software process model, pre sented from a specific perspective: Answer: False 2 types of evolutionary development: Answer: Throw-away prototyping. Exploratory development 3 important stages in the testing process: Answer: Component ( or unit ) testing.Integration testing.Acceptant testing 3 fundamental software process frameworks that are used to create specific softw are processes: Answer: Evolutionary development.Component-based software engineering.The waterf all model 4 development stages in CBSE: Answer: Systemdesignwithreuse.Dev and integration.Require modification. Componen t analysis 4 sectors in each loop in Boehms spiral model Answer: Development and validation. Planning. Objective setting. Risk assessment and reduction 4 advantages of using incremental development and delivery Answer: More extensive testing.. Early incre serve .. Early delivery of critica l..Lower risk of overall project failure

4 most fundamental activities that are common to all software processes Answer: SW evolution. SW specification. SW validation. SW design and implementat ion The principal requirements engineering activities: Answer: Require elicitation&analysis. Require specification. Require validation. Feasibility study The prototyping model of software development is: Answer: A useful approach when a customer cannot define requirements clearly The spiral model of software development: Answer: Includes project risks evaluation during each iteration First step in risk management process: Answer: Risk identification First activity of project management: Answer: Proposal writing 3 most important differences between software project management and other types of project management Answer: Therere no standard for SW.. Large SW proj are often one-off ..The softwa re is intangible 3 related categories of risk: Answer: Business risk. Product risk. Project risk The following are considered a player in the software process: Answer: Customers. Project manager. End-users Effective software project management focuses on: Answer: Performance. Process. Product. People The activity does a software project manager need to perform to minimize the ris k of software failure is: Answer: Define milestones and track progress The project plan sets out: Answer: The resources available to the proj. The work breakdown. A schedule for the work Included in a quality plan: Answer: The quality procedures and standards that should be used in a project Milestone is: Answer: The end-point of a process activity Functional requirements: Answer: Statements of services the system should provide how the system should r eact to particular inputs and how the system should behave in particular situati ons Domain requirements: Answer: Requirements that come from the application domain of the system and th at reflect characteristics of that domain

Non functional requirements: Answer: Constraints on the services or functions offered by the system such as t iming constraints, constraints on the development process, standard, etc 3 types of non functional requirement Answer: Product requirements External requirements Organization requirements 5 requirements document sections suggested by the IEEE standard: Answer: General description.Specific requirements.Introduction.Appendices.Index The followings belong to external requirements Answer: Interoperability requirements. Legislative requirements. Ethical require ments Problems can arise when requirements are written in natural language Answer: Requirement confusion. Requirement amalgamation. Lack of clarity User requirement Answer: Statements in natural language plus diagrams of the services the system provides and its operational constraints. Written for customers System requirements Answer: A structured documents setting out detailed descriptions of the systems function, services and operational constrains The software requirements document Answer: The official document that defines the requirements that should be imple mented by the system developers Construct a system model, the engineer should consider one of the following rest raining factors Answer: Assumptions and constrains Described in a semantic data model Answer: The logical structure of the data processed by a system or managed by a database Described in a context model Answer: The immediate external environment of the system defining the systems con text and the dependencies that a system has on its environment Described in a state machine model Answer: How the system responds to external events The model types does NOT represent software architecture Answer: Data model The following is NOT an area of concern in the design model Answer: Project scope These is a characteristic of a good design Answer: Implements all requirements in the analysis model Different object models may be developed Answer: Object aggregation models. Object behavior model. Inheritance models In the UML, a (an) is represented as named rectangle with two sections. The obje ct attributes are listed in the top section. The operations that are associated with the object are set out in the bottom section.

Answer: Object class The components of an object class definition in the UML Answer: The name of the obj class.The attributes of the class.The operations or methods associated with the class Perspectives may be used for system modeling Answer: A structural perspective. An external perspective. A behavioral perspect ive These statements about State Machine Models are NOT true Answer: Widely used in database design. Used to describe the logical structure o f data processed by the system These statements about Semantic Data Model are NOT true Answer: These model .. to external and internal events.They show the systems .. s timuli..used for modeling real-time systems 4 weaknesses of structured methods Answer: ..produce too much.They do not support.. The models produced..They rarel y include guidelines to help users decide if they can be used in particular area UML analysis modeling focuses on the Answer: User model and structural model 2 principle styles used for modular decomposition Answer: Object-oriented decomposition. Function-oriented pipelining 4 fundamental questions that should be addressed in architectural design Answer: How will..How should..Is there a generic. What architectural style or st yles are appropriate Advantages of object model Answer: The objects. OO implementation languages. Objects are loosely coupled so their implementation can be modified without affecting other objects Advantages of repository model. Answer: Efficient way to share..Sharing model is published.. Sub-systems need..C entralised management e.g. backup, security, etc Advantages of pipeline model Answer: Intuitive organization for..Supports transformation..Easy to add new tra nsformations Advantages of explicitly designing and documenting a software architecture Answer: It encourages a detailed..It improves the stakeholder com..It helps with large-scale reuse The fundamental characteristic of a repository model Answer: Shared data is may be accessed by all sub-systems.Shared data is held in a central database or repository The system organized in a client-server model Answer: A set of services is provided by servers and clients access and use the se services The characteristics of Interrupt-driven systems Answer: Allows fast response. Used in real-time systems

These statements about architectural design are true Answer: Represents the link..Often carried out in..It involves identifying majo r system components and their communications

Unlike structured analysis, top-down decomposition and consideration of End-to-e nd processing sequences are not present when OOA is used Answer: False Object-oriented analysis is concerned with developing an object-oriented model o f a software system to implement the identified requirements Answer: False Active objects typically include an infinite loop so thay they are always carryi ng out the computation Answer: True Object oriented approach does not facilitate design evolution Answer: False 3 layers in the architectural model of the weather station system Answer: The interface layer. The instruments layer. The data collection layer 3 design models that are part of the UML Answer: Sequence model. Subsystem model. State machine model 4 approaches that may be used to identify object classes Answer: Use scenario-based..Grammatical analysis..Use an approach .. Identify ta ngible things in the application domain

5 key stages in an object-oriented design process Answer: Specify object..Design the..Identify the..Develop design..Understand and define the context and use of the system Advantages of inheritance Answer: The inheritance..It is a reuse mechanism.. It is an abstraction mechanis m which may be used to classify entities The stages in an object-oriented development process Answer: Object-oriented program. Object-oriented design. Object-oriented analys is The system context and model of use Answer: The model of use is a dynamic ... The system context is a static model o f the other systems in the environment of the system being designed 3 ways that a software prototype may be used Answer: To explore..To help with the elicitation.. To run back-to-back tests wit h the implemented system 3 important characteristics of extreme programming Answer: Test-first development. Pair programming. Requirements expressed as scen arios Tool are normally included in a RAD environment

Answer: An interface generator. A database programming .. A report generator. Li nks to office applications The key benefits of prototyping found in Gordon and Bieman study Answer: Improved system usability..Improved system quality..Reduced development effort Advantages of pair programming Answer: It serves as an informal ..It supports the idea of..It helps support ref actoring Advantages of using an incremental approach to software development Answer: Accelerated delivery of customer services, user engagement with the syst em Test-first development Answer: When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system Visual programming Answer: An approach to development where a programmer manipulates graphical icon s representing functions, data or user interface components and associates proce ssing scripts with these icons These statement about the differences between incremental development and protot yping Answer: Incremental development starts with[best understood] ..Prototyping start s with [not well-understood] 2 main approaches to concept reuse Answer: Generative programming. Design patterns 3 types of program generator Answer: Code generators.Parser and lexical analyses generators.Application gener ators 3 possible classes of application framework Answer: Middleware integration .. Enterprise application .. System infrastructur e frameworks 3 reuse types in Reuse-based software engineering Answer: Component reuse. Object and function reuse. Application system reuse 4 types of specialization of software product lines Answer: Environment specia.. Functional .. Process .. Platform specialization 4 essential elements of a design pattern Answer: A solution description.A statement of the consequences .. A description of the problem and when the pattern can be applied. A meaningful name The design choices have to be made when reusing COTS products Answer: Which COTS products ... What features of a product .. How will ..product s The following is NOT one of the issues that form a basis for design for reuse Answer: Object-oriented programming The main problem software reuse

Answer: Lack of tool support. Increased maintenance costs List the main problems with software reuse Answer: Lack of tool support. Increased maintenance costs The main benefits of software reuse Answer: Effective use of specialists..Accelerated deve..Reduced process risk. In creased dependability One of the key problems in software reuse is the inability to find existing reus able design patterns when hundreds of candidates exist Answer: True

2 complementary goals of the testing process Answer: To demonstrate that the software meets its .. To discover faults or defe cts in the software 3 approaches may be used when designing test cases Answer: Requirements-based testing. Partition testing. Structural testing 3 important classes of interface errors Answer: Interface misuse. Interface misunderstanding. Timing errors Type of test would you perform to accept a build Answer: User acceptant test Acceptance tests are normally conducted by the Answer: End users Tests should be included in object class testing Answer: Tests that set and access .. Test for all operations .. Tests that force the object into all possible states The purpose of defect testing Answer: To discover faults that make softwares behavior incorrect The best reason for using independent software test teams is Answer: A test team will test the software more thoroughly The common limitation of automated testing Answer: They are not useful when requirements are changing frequently The normal order of activities in which software testing process is Answer: Design test cases>Prepare test dt>Run program with test dt>Compare resul ts to test cases The following strategic issues needs to be addressed in a successful software te sting process Answer: Specify requirements in a quantifiable manner. Conduct formal technical reviews prior to testing

2 types of CM workbench Answer: Integrated workbenches. Open workbenches 3 basic techniques for component identification

Answer: Version numbering. Change-oriented identification. Attribute-based ident ification New versions of software system are created as they change Answer: Offering different .. Tailored for particular user .. For different mach ines/OS Facilities might be provided in system building CASE tools Answer: A dependency specification..Tool selection and..Distributed compilation. Derived object management The objectives of change management procedures Answer: Approving changes .. Tracking which components.. Analyzing the costs and benefits of proposed changes The primary purpose of configuration status reporting is to Answer: Make sure that change information is communicated to all affected partie s Software systems are subject to continual change requests Answer: From developers. From users. From market forces Which formal activity, the software configuration audit is conducted by the Answer: Quality assurance group Release is Answer: An instance of a system which is distributed to users outside of the dev elopment team Variant is Answer: An instance of a system which is functionally identical but non-function ally distinct from other instances of a system Version is Answer: An instance of a system which is functionally distinct in some way from other system instances

3 complementary strategies to achieve survivability Answer: Recognition. Recovery. Resistance 3 levels of protection that might be used in an information system Answer: Application-level protection. Record-level protection. Platform-level pr otection 4 design guidelines for secure systems engineering Answer: Use redundancy and ... Base security decisions .. Avoid a single .. Vali date all inputs Vulnerability is Answer: A weakness in a computer-based system that may be exploited to cause los s or harm Attack is Answer: An exploitation of a systems vulnerability. Generally, this is from outsi de the system and is a deliberate attempt to cause some damage Threats is Answer: Circumstances that have potential to cause loss or harm. You can think o

f these as a system vulnerability that is subjected to an attack Application security Answer: Application security is a software engineering problem where the system is designed to resist attacks Infrastructure security Answer: Infrastructure security is a systems management problem where the infras tructure is configured to resist attacks First stage in survivability analysis Answer: Review system requirements and architecture Security risk management involve Answer: Preliminary risk assessment. Life cycle risk assessment What is visual programming Answer: An approach to development where a programmer manipulates graphical icon s representing Which of the followings belong to Server type of concurrent object implementatio n Answer: All of the others(the object is a parallel + the state of the obj ..) Are the end-point of a a process activity Answer: Milestones What does the rapid application development concern with Answer: An iterative approach to software development leads to faster delivery o f software Select the most suitable software process model for a project that are developed at different sites Answer: Throw-away prototyping Are ery abstract. They do not show the nature of component relationships nor the externally visible properties of the sub-systems. However, they useful for comm unication with stakeholders and for project planning. Answer: Box and line diagrams Suggest the most appropriate generic software process model that might be used a s a basic for managing the development of the following system: A university acc ounting system that replaces and existing system Answer: Waterfall model Select the type of following requirement: The system shall provide appropriate vi ewers for the user to read documents in the document store Answer: Functional requirement Which is the type of the following requirement: The CMS system must be easy to us e Answer: User requirement The objective of is to deliver a working system to end-users. The objective of is to validate or derive the system requirement. Answer: incremental development, throw-away prototyping What should we do first when we receive a change request from out customer? Answer: Analyse the change request

Which of the following is NOT a disadvantage of structured methods? Answer: There are not many CASE tools that support structured methods Another name for [has a] relationship is Answer: Composition What tests should be included in object class testing? Answer: Tests that set and .. Tests for all operations .. Test that force the ob ject .. In architecture design: Using large-grain components improves system but reduces system Answer: Performance, maintainability Security is a software engineering problem where the system is designed to resis t attacks Answer: Application List 3 types of non-functional requirement Answer: External requirements, Organization requirements, Product requirement Which of the followings does NOT belong to the important differences between sof tware project management and other types of project management? Answer: cost of software project maintenance is higher than other type of projec ts Given the project activities chart as below, please define the critical path (th e values mention in each arrow are activity name and activity duration) Answer: AFDEI Select correct statements about software management Answer: Software project management is .. Good project management can totally .. Which are THREE essential elements of design patterns? Answer: A name that is ... A statement of the consequences .. A description of t he problem .. What are two phases of system testing? Answer: Integration testing, release testing Which of these statements about extreme programming are true? Answer: New versions maybe built several times per day A is a way of reusing abstract knowledge about a problem and its solution. Answer: Design pattern Context models are used to illustrate the operational context of a system they s how what lies outside the system Answer: behaviors Consider security design for username and password protection, what is the good design? Answer: System users are authenticated using a login Which process model is most appropriate for a large software project with stable requirements? Answer: Waterfall Different models present the system from different perspective: perspective show ing the systems context or environment; perspective showing the behavior of the s

ystem; perspective showing the system or data architecture. Answer: External, Behavioural, Structural What are the advantages of explicitly designing and documenting software archite cture? Answer: All of the others (improve stakeholder, encourages a detailed ..) What can be represented by a workflow model? Answer: The sequence of activities in the process along with .. What do gamma et al.suggest are the four essential elements Answer: A statement of .. A meaningful .. A solution.. A description of the prob lem What is not an Upper-CASE tool? Answer: Borland C A successful defect test is a test which causes a program to behave in normal wa y Answer: False What are the advantages of pair programming Answer: It serves as an informal .. It supports the idea of common .. A critical distinction between a service and a component as defined in CBSE is t hat services are independent and: Answer: None of the others Which one is not a web service standard? Answer: WSDL What are system requirements? Answer: A structured document setting out detailed .. When should you use data flow diagrams (DFD)? Answer: DFD is used to showing the data exchange between a system and other syst ems in its environment is concerned with developing an object-oriented model of the application domain. The objects in that model reflect the entities and opereations associated with the problem to be solved Answer: Object-oriented analysis. What are characteristics of RAD processes? Answer: System user interface .. The system is developed in a series .. What is not a Lower-CASE tool Answer: Junit What perspectives may be used for system modeling? Answer: An external perspective, A structure perspective, a behavioral perspecti ve What is software engineering? answer: Software engineering is an engineering discipline that is concerned with all aspects of software production from specification to system evolution. What are software engineering methods? answer: Structured approaches to software development which include system model

s, notations, rules, design advice and process guidance. What are the three most important key challenges facing software engineering? answer: [3]:[1]Heterogeneity[2]Delivery[3]Trust What does the acronym CASE stand for? answer: Computer Aided Software Engineering. What are the most fundamental activities in software processes? answer: [4]:[1]Specification[2]Development[3]Validation[4]Evolution What are the principal components of a software engineering method? answer:[4]:[1]Process guidance[2]Recommendations[3]System model descriptions[4]R ules Which of the following are the 2 most fundamental types of software product? answer:[2]:[1]Customized products[2]Generic products Which question no longer concerns the modern software engineer? Why does computer hardware cost so much? What are the principal requirements engineering activities? answer:[4]:[1]Requirements elictation and analysis[2]Feasibility study[3]Require ment specification[4]Requirement validation What are four advantages of using incremental development and delivery? [4]:[1]Lower risk of overall project failure[2]Early increments serve as prototy pes to explore requirements[3]Early delivery of critical functionality to custom er[4]More extensive testing of critical customer functionality What are the three important stages in the testing process? answer:Component(or unit) testing, integration testing, acceptant testing List two types of evolutionary development? answer:[2]:[1]Throw-away prototyping[2]Exploratory development List the 3 fundamental software process frameworks that are used to create speci fic software process? answer:[3]:[1]Component-based software engineering[2]The Waterfall model[3]Evolu tionary development The prototyping model of software development is answer: A useful approach when a customer cannot define requirements clearly What are the four most fundamental activities that are common to all software pr ocesses? answer:[4]:[1]Software validation[2]Software specification[3]Software evolution[ 4]Software design and implementation What is the first step in risk management process? answer:Risk identification What is a milestone? answer: Milestones are the end-point of a process activity What are important differences between software project management and other typ es of project management? answer:[3]:[1]There are no standeard for software processes[2]Large software pro jects are often one-off projects[3]The product(software) is intangible

Which of the following are considered a player in the software process? answer:[3]:[1]Customers[2]Project Manager[3]End-users What are included in a quality plan? answer: The quality procedures and standards that should be used in a project Effective software project management focuses on answer:[4]:[1]Performance[2]Process[3]Product[4]People What activity does a software project manager need to perform to minimize the ri sk of software failure? answer: Define milestones and track progress What is the first activity of project management answer: Proposal writing The project plan sets out answer:[3]:[1]The resources available to the project[2]The work breakdown[3]A sc hedule for the work What are non-functional requirements? answer: Constraints on the serviecs or functions offered bt the system such as t iming constraints, constraints on the development process, standard, etc What are functional requirements? answer: Statements of services the system should provide how the system should r eact to particilar inputs and how the system should behave in particular situati ons List the requirements document sections suggested by the IEEE standard? answer: [5]:[1]General description[2]Introduction[3]Specific requirements[4]Appe ndices[5]Index What are domain requirements? answer: Requirements that come from the application domain of the system and tha t reflect characteristics of that domain List 3 types of non-functional requirement answer: [3]:[1]Product[2]External[3]Organizational which of the following belong to external requirements? answer:[3]:[1]Interoperability[2]Legislative[3]Ethical What are user requirements? answer: Statements in natural language plus diaframs of the services the system provides and its operational constraints. Written for customers What problems can arise when requirements are written in natural language? answer: [3]:[1]Reuqirement confusion[2]Requirement amalgamation[3]Lack of clarit y What are domain requirements? answer: Requirements that come from the application domain of the system and tha t reflect characteristics of that domain What is the software requirements document? answer: The official document that defines the requirements that should be imple mented by the system developers To construct a system model the engineer should consider one of the following re

straining factors? answer: Assumptions and constraints What described in a semantic data model? answer: The local structure of the data processed by a system or managed by a da tabase. Which of these model types does not represent software architecture? answer: Data model Which of the following is not an area of concern in the design model? answer: Project scope What different object models may be developed? answer: [3]:[1]Object aggregation models[2]Object behaviour model[3]Inheritance models What are the components of an object class definition in the UML? answer: [3]:[1]Name of the object class[2]Attributes of the class[3]Operations o r methods associated with the class What perspectives may be used for system modelling? answer: [3]:[1]Structural[2]External[3]Behavioral What is described in a context model? answer: The immediate external environment of the system defining the system's c ontext and the dependencies that a system has on its environment What are the two principle styles used for modular decomposition? answer: [2]:[1]Object-oriented decomposition[2]Function-oriented pipelining What are advantages of object model answer: [3]:[1]The objects may reflect real-world entities[2]Objects are lossely coupled so their implementation can be modified without affecting other objects [3]OO implementation languages are widely uesd What is the fundamental characteristic of a repository model answer: [2]:[1]Shared data is may be accessed by all sub-systems[2]Shared data i s held in a central database or repository How is the system organized in a client-server model? answer: A set of services is provided by servers and clients access and use thes e services Check 4 fundamental questions that should be addressed in architectural design? answer: [4]:[1]How will the system be distributed[2]How should the system be str uctured[3]Is there a generic application architecture that can be used[4]What ar chitectural style or styles are appropriate What are advantages of pipeline model answer: [3]:[1]Intuitive organization[2]Supports transformation[3]Easy to add ne w transformations What are advantage of explicitly designing and documenting a software architectu re? answer: [3]:[1]Encourages a detailed analysis of the system[2]Improves the stake holder communication[3]Helps with large-scale reuse Which of these statements about architectural design are true? answer: [3]:[1]Represents the link between specification and design processes[2]

Often carried out in parallel with some specification activities[3]It involves i dentifying major system components and their communications What are the characteristics of Interrupt-driven systems answer: [2]:[1]Allows fast response[2]Used in real-time systems What are the advantages of repository model answer: [3]:[1]Efficient way to share large amounts of data[2]Sharing model is p ublished as the repository schema[3]Sub-systems need not be concerned with how d ata is produced Centralised management e.g. backup, security, ect Which of these is a characteristic of a good design? answer: Implements all requirements in the analysis model List the advantages of inheritance answer: [3]:[1]The inheritance graph is a source of organisational knowledge abo ut domains and systems[2]It is a reuse mechanism at both the design and the prog ramming level[3]It is an abstraction mechanism which may be used to classify ent ities In the architectural model of the weather station system, what are the three lay ers in the software? answer: [3]:[1]Interface[2]Instruments[3]Data collection Object oriented approach does not facilitate design evolution answer: Flase What are the stages in an object-oriented development process? answer: [3]:[1]Programming[2]Analysis[3]Design What do you understand by the system context and model of use? answer: [2]:[1]The model of use-dynamic model[2]System context-static model Active object typically include an infinite loop so that they are always carryin g out the computation answer: True Which of the following is not an area of concern in design model answer: Project scope List the 5 key stages in an object-oriented design process? answer: [5]:[1]Specify[2]Design the system[3]Identify[4]Develop[5]Understand and define UML(unified modeling language) analysis modeling focuses on the answer: User model and structural model List 4 approaches that may be used to identify object classes answer: [4]:[1]Use scenario-based analysis[2]Grammatical[3]Use an approach[4]Ide ntify List three design models that are part of the UML answer: [3]:[1]Sequence[2]Subsystem[3]State What is visual programming? answer: An approach to development where a programmer manipulates graphical icon s representing functions, data or user interface components and associates proce ssing scripts with these icons. What tools are normally included in a RAD environment?

answer: [4]:[1]Interface generator[2]Database programming language[3]Report gene rator[4]Links to office applications The prototyping model of software development is answer: A useful approach when a customer cannot define requirements clearly What were the key benefits of prototyping found in Gordon and Bieman's studey? answer: [3]:[1]Improved system usability, a closer match to user's needs[2]Impro ved system quality, improved maintainability[3]Reduced development effort What are the advantages of using an incremental approach to software development ? answer: Accelerated delivery of customer services, user engagement with the syst em. What is test-first development When a system feature is identified, the tests of the code implementing that fea ture are written before the code. Tests are automated and all tests are run when a new increment is added to the system. What are three important characteristics of extreme programming? answer: [3]:[1]Test-first development[2]Pair programming[3]Requirements expresse d as scenarios What are the advantages of pair programming answer: [3]:[1]Serves as an informl code review process[2]Supports the idea of c ommon ownership and resonsibility for the code[3]Helps support refactoring What of these statements about the differences between incremental development a nd prototyping are true? answer: [2]:[1]Incremental development starts-best understood[2]Prototyping star ts-not well-understood Suggest three ways that a software prototype may be used? answer: [3]:[1]Explore software design[2]Help with elicitation[3]Run back-to-bac k tests What are the four development stages in CBSE? answer: [4]:[1]System design with reuse[2]Requirements modification[3]Developmen t and integration[4]Component analysis What are the 4 sectors in each loop in Boehm's Spiral model? answer: [4]:[1]Development and validation[2]Planning[3]Object setting[4]Risk ass essment and reduction What are three possible classes of application framework? answer: [3]:[1]Middleware integration[2]Enterprise application[3]System infrastr ucture List the main problems with software reuse answer: [2]:Lack of tool support[2]Increased maintenance costs What are three reuse types in Reuse-based software engineering answer: [3]:[1]Component[2]Object and function[3]Application system One of the key problems in software reuse is the inability to find existing reus able design patterns when hundreds of candidates exist answer: True What design choices have to be made when reusing COTS products?

answer: [3]:[1]Which COTS products offer the most appropriate functionality[2]Wh at features of a product will actually be used[3]How will data be exchanged betw een different products Which of the following is not one of the issues that form a basis for design for reuse? answer: Object-oriented programming What are three types of program generator answer: [3]:[1]Code[2]Parser and lexical analyser[3]Application List 4 types of speciallsation of software product lines? answer: [4]:[1]Environment[2]Functional[3]Process[4]Platform What are the two main approaches to concept reuse? answer: [2]:[1]Generative programming[2]Design patterns What do Gamma et al.suggest are the four essential elements of a design pattern? answer: [4]:[1]Solution description[2]Statement of the consequences of applying the pattern[3]Description of the problem and when the pattern can be applied[4]M eaningful name What three approaches may be used when designing test cases? answer: [3]:[1]Requirements-based[2]Partition[3]Structural What are the two complementary goals of the testing process? answer: [2]:[1]Demonstrate that the software meets its requirements[2]Discover f aults or defects in the software Which type of test would you perform to accpect a build answer: User acceptant test Acceptance tests are normally conducted by the answer: End users What tests should be included in object class testing? answer: [3]:[1]that set and access all object attributes[2]for all operations in isolation[3]that force the object into all possible states What is the common limitation of automated testing? answer: They are not usefull when requirements are changing frequently Which of the following strategic issues needs to be addressed in a successful so ftware testing process? answer: [2]:[1]Specify requirements in a quantiflable maner[2]Conduct formal tec hnical reviews prior to testing What is the purpose of defect testing? answer: To discover faults that make software's behaviour incorrect The best reason for using Independent software test teams is that answer: A test team will test the software more thoroughly What is common limitation of automated testing? answer: They are not useful when requirements are changing frequently What are the three important classes of interface errors? answer: [3]:[1]Interface misuse[2]Interface misunderstanding[3]Timing errors What is the normal order of activities in which software testing process is orga

nized answer: [1]Design[2]Prepare[3]Run[4]Compare What are three basic techniques for component identification? answer: [3]:[1]Version[2]Change-oriented[3]Attribute-based New versions of software systems are created as they change answer: [3]:[1]Offering[2]Tailored[3]For different What facilities might be provided in system building CASE tools? answer: [4]:[1]Dependency[2]Tool selection[3]Distributed[4]Derived object What are the objectives of change management procedures? answer: [3]:[1]Approving[2]Tracking[3]Analyzing When software configuration management is a formal activity, the software config uration audit is conducted by the answer: Quality assurance group What is a variant? answer: identical but non-functionally distinct from other instances of a system The primary purpose of configuration status reporting is to answer: Make sure that change information is communicated to all affected partie s What are the two types of CM workbench? answer: [2]:[1]Open[2]Integrated What is a version? answer: distinct in some way from other system instances Software system are subject to continual change requests answer: [3]:[1]User[2]Developers[3]Market forces Define the security terms 'vulnerability' answer: Weakness in a computer-based system that may be exploited to cause loss or harm Define the security terms 'attack' answer: An exploitation of a system's vulnerability. Generally, this is from out side the system and is a deliberate attempt to cause some damage Define the security terms 'threats answer: Circumstances that have potential to cause loss or harm. You can think o f these as a system vulnerability that is subjected to an attack What is application security? answer: Application security is a software engineering problem where the system is designed to resist attacks What are the three complementary strategies to achieve survivability? answer: [3]:[1]Recognition[2]Recovery[3]Resistance What is the first stage in survivability analysis answer: Review system requirements and architecture List 4 design guidelines for secure systems engineering? answer: [4]:[1]Use redundancy[2]Base security[3]Avoid single point[4]Validate al l inputs

What are the three levels of protection that might be used in an information sys tem? answer: [3]:[1]Application[2]Record[3]Platform What is infrastructure security? answer: Infrastructure security is a systems management problem where the infras tructure is configured to resist attacks In Iterative development approach, which phase takes the least cost? answer: Specification What are generic software process models? answer: [3]:[1]Waterfall[2]Iterative[3]Component-based What is a software process model? answer: A simplified representation of a software process, presented from a spec ific perspective The current trends suggest that the economies of ALL developed and developing na tions are dependent on software answer: True In Waterfall approach, which phase takes the most cost? answer: [2]:[1]Specification[2]Integration and testing What is a software process? answer: A set of activ ities whose goal is the development or evolution of softw are The distribution of the costs of software engineering NOT depends on the process model that is used answer: False What are essential attributes of good software? answer: [4]:[1]Maintaina[2]Dependa[3]Accepta[4]Efficiency In Component-based software engineering approach, which phase takes the least co st? answer: Specification Which is the correct sequence of the following activities in the process of Syst em evolution? answer: Define-Assess-Propses-Modify What is the main difference between the Spiral model and other software processe s models? answer: The explicit recognition of risk in the Spiral model What is the outputs of Requirements elicitation and analysis? answer: System models What is the correct sequence of the following iterations in the RUP(Rational Uni fied Process) model? answer: Incept-Elaborat-Construct-Transit What is the output of Feasibility study phase in the requirements engineering pr ocess? answer: Report that recommends whether or not to continue development project

In contrast, the RUP (Rational Unified Process) is normally described from which types of perspectives? answer: [3]:[1]Dynamic[2]Static[3]Practice What is the main difference between the RUP (Rational Unified Pr ocess) and othe r software processes models? answer: Phase are more closely related to business rather than technical concern s Which is the correct sequence of the following activities in the Waterfall model ? answer: Requirement-Design-Implementation-Integration-Operation Which is the correct sequence of the following activities in the Component-based software engineering? answer: Component-Requirement-Design-Development The Waterfall approach is the BEST approach to development software when ___ answer: The software system is large and that is need developed at several sites Three categories of risks are ___ answer: [3]:[1]Project[2]Technical[3]Business Why many software projects are 'one-off' projects? answer: Because the requirements of software projects are not the same What is the BEST way to do work breakdown structure? answer: Sets out the breakdown of the project into activ ities and identifies th e milestones and deliverables associated with each activity What are milestones in project planning? answer: Milestones are the end-point of a process activity What is the critical path? answer: The critical path is the sequence of dependent activities that Select the BEST statement about critical path answer: Project manager should allocate experienced people to do the tasks on th e critical path What is the output of the first milestone in software requirement engineering pr ocess? answer: Feasibility study report document Which is the BEST principle of project scheduling? answer: Minimize task dependencies to avoid delays caused by one task waiting fo r another to complete The project schedule shows ___ answer: The dependencies between activities, the estimated time required to reac h each milestone and the allocation of people to activities What are deliverables? answer: Deliverables are project results delivered to customers Which is the principle of prototype model? answer: A prototype is to build quickly demonstrate to the customer what the pro duct look like. Only minimal functionality of the actual product is provided dur ing prototyping phase

What are nonfunctional requirements? answer: Constraints on the services or functions offered by the system such as t iming constraints, constraints on the development process, standards, etc What are good attributes of requirements? answer: [5]:[1]Testable[2]Complete[3]Clear[4]Consistent[5]Unambiguous What are system requirements? answer: A structured document setting out detailed descriptions of the systems fu nctions, services and operational constraints Which are types of non-functional requirement? answer: [3]:[1]Product[2]Organizational[3]External What is the BEST way to write requirement document? answer: Should include both a definition of user requirements and a specificatio n of the system requirements Which of the following requirement statements belongs to domain requirements? answer: There shall be a standard user interface to all database that shall be b ase on the Z39.50 standard In reality, the distinction between different types of requirements is not clear -cut answer: True Which of the following requirement statements belongs to non-functional requirem ents? answer: The user interface shall be implemented as simple HTML without frames Whats the BEST way to start creating a data-flow diagram? answer: In the data-flow diagram, you should start by analyzing the overall proc urement process and then move on to the analysis of sub-processes When should you use state machine model? answer: [2]:[1]Describe how a system [2]It shows system states and events that c ause transition from one state to another When should you use data flow diagrams (DFD)? answer: DFD is used to showing the data exchange between a system and other syst ems in its environment Can two objects associate with one another in more than one way? answer: Yes Whats the BEST way to start creating a state diagram? answer: State diagram-on the transition Whats the BEST way to start creating a class diagram? answer: Class diagram-on the attributions, operations Another name for inheritance is ___ answer: Generalization When should you use sequence diagram? answer: Should use sequence diagram to illustrate the sequence of steps that mus t be performed in order to complete a task Which models give a static view of a system? answer: [3]:[1]Object[2]Data[3]Architectural

When should you use use-case diagram? answer: Should use use-case diagram to represent all of the people who might use the functionalities of the system What are types of behavioral models? answer: [2]:[1]Data-Flow[2]State machine Which non-functional system requirements that the software system architecture m ay depend on? answer: [5]:[1]Performance[2]Security[3]Safety[4]Availability[5]Maintainability Select the BEST solution for architectural design of a software system that perf ormance is a critical requirement answer: The architectural should be designed to localise critical operations and minimise communications, use large-grain rather thanfine-grain components Which of the following models belong to Event-driven systems? answer: [2]:[1]Broadcast[2]Interrupt-driven What is the correct statement about software architectural design decisions? answer: Architectural design is a creative process, the activities in the proces s differs depending on the type of system being developed Which of the following styles belong to Control styles? answer: [2]:[1]Centralised[2]Event-based Which of the following styles belong to System organization? answer: [3]:[1]Repository[2]Client-server[3]Abstract machine What is the correct statement about software architectural styles? answer: Most large systems are heterogeneous architectur al styles What is the correct statement about software architectural design? answer: The architectural design is normally expressed as a block diagram presen ting an overview of the system structure Which of the following models belong to Centralised control? answer: [2]:[1]Call-return[2]Manager What are advantages of explicitly designing and documenting software architectur e? answer: [3]:Stakeholder[2]System analysis[3]Large-scale reuse What are the models in architecture design? answer: [5]Static-Dynamic-Interface-Relationship-Distribution What are three general architectural styles? answer: [1]System organisation[2]Decomposition styles[3]Control styles Another name for * is a+ relationship is ___ answer: Generalization Which is the correct statement about coupling? answer: Coupling deals with interactions between objects or software components Which is NOT a primary goal in the design of the UML? answer: Be dependent on particular programming language What do you mean by coupling in software design?

answer: Coupling is a measure of the strength of association established by a co nnection from one object or software component to another. Which of the following is NOT an approach that may be used to identify object cl asses? answer: Use Event-based analysis Which are object-oriented strategies? answer: [3]:[1]Analysis[2]Design[3]Programming Which is NOT the main activity in design process? answer: Designing the test case What is the purpose of analysis? answer: The main objective of the analysis is to capture a complete, unambiguou s, and consistent picture of requirements of the system and what the system must do to satisfy the users requirement and needs nother name for *has a+ relationship is ___ answer: Composition Which is NOT an advantage of inheritance? answer: The inheritance graphs of analysis, design and implementation have diffe rent functions and should be separately maintained. Which is the correct statement about object identification? answer: Object identification is an iterative process; it relies on the skill, e xperience and domain knowledge of system designers Which is the first stage in an object-oriented design process? answer: Develop an understanding of the relationships between the software being designed and its external environment Which is the right sequence in the process of prototype development? answer: Establish-Define-Develop-Evaluate The practices small, frequent releases of the system, the approach to requiremen ts description base on customer stories or scenarios in Extreme Programming fit into which principle of agile methods? answer: Incremental delivery What are common principles of agile methods? answer: [5]:[1]Customer[2]Incremental[3]People not[4]Embrace[5]Maintain Which of the following BEST describes the major difficulties with incremental de velopment? answer: [4]:[1]Contractual[2]Validation[3]Management[4]Maintenance Which of the following is NOT an advantage of using incremental development and delivery? answer: Systems are often have good structures The practices regular system release, test -first development and continuous int egration in Extreme Programming fit into which principle of agile methods? answer: Embrace change Which is NOT an advantage of rapid software development? answer: Only senior programmer are capable of taking the kind of decisions requi red during the development process

Which is the evidence when said that pair programming is as efficient as the same number of programmers working individually? answer: Measurements suggest that development productivity with pair programming is similar to that of two people working independently What is a user story in extreme programming? answer: It is a requirement expressed as scenario The practices pair programming, collective ownership of the system code, and sus tainable pace in Extreme Programming fit into which principle of agile methods? answer: People not process Who chooses the stories for inclusion in the next release based on their priorit ies and the schedule estimates? answer: Customer In the extreme programming, what is the role of customer? answer: To help develop stories that defines the requirements Which part of the system can be reuse? answer: [3]:[1]Application[2]Component reuse[3]Object and function The trend of design process in most software engineering disciplines is base on ___ answer: Reuse of existing system or component If the applications or components are developed in difference programming langua ge from the programming language you are using then you can not reuse that answer: False Which is NOT the main benefit of software reuse? answer: Creating and maintaining a component library You can not to combine multiple patterns in the complex software system answer: False Which is the correct statement about Product line architectures? answer: Architectures must be structured in such a way to separate different sub -systems and to allow them to be modified All of the following are the design choices have to be made when reusing COTS pr oducts EXCEPT answer: How will data be exchanged between different modules The trend of Reuse-based software engineering is an approach to development that tries to ___ answer: Maximize the reuse of existing software What are the benefits of software re-using? answer: [3]:[1]faster[2]lower cost[3]increased software quality Which is NOT a key factor that you should consider when planning reuse? answer: The name of the application or component reuse All of the following are types of program generator EXCEPT answer: Component generators What is the normal order of activities in which software testing is organized? answer: [4]:[1]Unit[2]Integration[3]Validation[4]System

The main focus of acceptance testing is: answer: testing from a business perspective Unit testing is a __ answer: White box testing The effort required for locating and fixing an error in an operational program i s: answer: Maintainability Workbenches are also called ___ answer: All of the other choices A program validates a numeric field as follows: values less than 10 are rejected , values between 10 and 21 are accepted, values greater than or equal to 22 are rejected answer: 3,10,22 A successful defect test is a test which causes a program to behave in an normal way answer: False Which document identifies and describes the testing that will be implemented and executed? answer: Test case The testing intended to show that previously correct software has not been adver sely affected by changes is call: answer: Regression testing We split testing into distinct stages primarily because: answer: Each test stage has a different purpose. Which is the right sequence in the software testing process? answer: Create test case-Prepare-Perform-Create Which of the following is NOT part of configuration management? answer: The people in the project team Which is the change management concerned with? answer: All of the other choices Software systems are subject to continual change requests from ___ answer: Developers, Users, Market forces The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: answer: effect of the change on the project schedule, cost, quality, and risks Which of the following is the source for software version up? answer: All of the other choices A configuration management system would NOT normally provide: answer: Facilities to compare test results with expected results. What is a release? answer: An instance of a system which is distributed to users outside of the dev elopment team. Who review and approves the change request?

answer: Change control board Which of the following items would not come under Configuration Management? answer: Live data Which is the right sequence of the change management process? answer: Request-Analyze-Submit-Make-Creat Which are levels of protection in application security engineering? answer: [3]:[1]Platform[2]Application[3]Record Consider security design for username and password protection, what is the good design? answer: System users are authenticated using a login name/password combination. Requires user change password after 2 months What is the first stage in survivability analysis answer: Review system requirements and architecture. Password should be changed answer: All of the other choices Why do we need consider security for project? answer: To protect the system against external attack Which of the following design guidelines for secure systems engineering is NOT t rue? answer: Avoid using redundancy and diversity to reduce risk What is the last stage in survivability analysis answer: Identify softspots and surv ivability strategies. All of the following are the complementary strategies to achieve survivability E XCEPT answer: Conversion Which is the correct statement about integrity? answer: Extent to which access to software or data by an unauthorized persons ca n be controlled Probability of a software failure is the answer: Reliability What was the software crisis? answer: As more powerful hardware was introduced in the 1960s, larger software s ystems were developed. These were usually late, unreliable, did not meet user ne eds and cost more than expected. The problems of producing software was the soft ware crisis. What are the two fundamental types of software product? answer: Generic products that are designed to meet the needs of many different c ustomers. Customised products designed to meet the specific needs of a single cu stomer. What are the fundamental activities in software processes? answer: [4]:[1]Specifiation[2]Development[3]Validation[4]Evolution What are the three general paradigms of software development? answer: [3]:[1]Waterfall[2]Iterative[3]Component-based

What are the principal components of a software engineering method? answer: System model descriptions, rules, recommendations, process guidance. Why is maintainability an important attribute of software? answer: Because all software is subject to change after it goes into use and the costs of software maintenance often exceeds the development costs of the softwa re. What is a software engineering code of ethics? answer: A set of principles that set out, in a general way, standards of expecte d behaviour for professional software engineers. What are the fundamental activities that are common to all software processes? answer: Software specification, software design and implementation, software val idation, software evolution. List the three fundamental software process frameworks that are used to create s pecific software processes. answer: [3]:[1]Waterfall[2]Evolutionary[3]Component-based Why are iterations usually limited when the waterfall model is used? answer: The waterfall model is a document-driven model with documents produced a t the end of each phase. Because of the cost of producing and approving document s, iterations and costly and involve significant rework. Hence they are limited. Briefly describe two types of evolutionary development. answer: Exploratory development where the objective of the process is to work wi th customers to explore their requirements and deliver a final-system. Throw-awa y prototyping where the objective is to develop a better understanding of the cu stomers requirements and deliver a better requirements specification. What are the development stages in CBSE? answer: [4]:[1]Component[2]Requirements[3]System[4]Development What are the advantages of using incremental development and delivery? answer: Early delivery of critical functionality to the customer.Early increment s serve as prototypes to explore requirements.Lower risk of overall project fail ure.More extensive testing of critical customer functionality. What models might be developed when applying a structured method? answer: [5]:[1]Object[2]Sequence[3]State transition[4]Structural[5]Data-flow Why is it increasingly irrelevant to distinguish between software development an d evolution? answer: Few software systems are now completely new and a more realistic model o f software development is of an iterative process that lasts for the life time o f the software. What are the four phases of the Rational Unified Process? answer: [4]:[1]Inception[2]Elaboration[3]Construction[4]Transition. What are the six fundamental best practices in the RUP? answer: Develop software iteratively.Manage requirements.Use component-based arc hitectures.Visually model software.Verify software quality.Control changes to so ftware. Give five examples of activities that can be automated using CASE. answer: Graphical system modelling.Maintaining a data dictionary.Generating user interfaces.Program debugging.Translating programs from one language to another.

What is the distinction between a CASE tool and a CASE workbench? answer: A CASE tool supports an individual process task such as checking the con sistency of a design. A CASE workbench supports sets of related activities such as specification or design. List five common project management activities. answer: Any five from the following: proposal writing, project planning and sche duling, project costing, project monitoring and reviewing, personnel selection a nd evaluation, report writing and presentations. What is included in a quality plan and a validation plan? answer: Quality plan: The quality procedures and standards that should be used i n a project.Validation plan: The approach, resources and schedule used for syste m validation. What is the difference between a milestone and a deliverable? answer: A milestone is a recognised endpoint of some activity that represents a decision point for a project. A deliverable is a project output that is delivere d to the customer. What is involved in project scheduling? answer: Separating the total planned work in the project into separate activitie s and judging the time required to complete these activities. Explain how bar charts and activity networks give different views of a project s chedule. answer: Activity networks show the time required to complete an activity and the dependence on activities. Bar charts show the activity timeline illustrating th e relative length of activities and the dates when they take place. What are three related categories of risk? answer: [3]:[1]Project[2]Product[3]Business Suggest answer: change, hnology four risks that may threaten the success of a software project. Staff turnover, management change, hardware unavailability,requirements specification delays, size underestimate, CASEtool underperformance, tec change, product competition.

Give two examples of technology risks that may arise in a software project. answer: The system database cannot process as many transactions as expected.Reus ed software components are defective. What is involved in risk monitoring? answer: Regularly assessing the project risks to decide whether or not that the risk is becoming more or less probable and whether the effects of the risk have changed. What are user requirements and system requirements? answer: User requirements are statements in a language that is understandable to a user of what services the system should provide and the constraints under whi ch it operates.System requirements are more detailed descriptions of the system services and constraint, written for developers of the system. What is the distinction between functional and non-functional requirements? answer: Functional requirements define what the system should do. Non-functional requirements are not directly concerned with specific system functions but spec ify required system properties or place constraints on the system or its develop ment process. List three types of non-functional requirement?

answer: Product-Organisational-External What is a domain requirement? Give an example. answer: A requirements that is derived from the application domain of the system rather than from the specific needs of system users. For example, in a train co ntrol system, the requirement for the train braking system depends on characteri stics of the train and the track. What problems can arise when requirements are written in natural language? answer: [1]Lack of clarity[2]Requirements confusion[3]Requirements amalgamation. What is the distinction between the terms.'shall' and 'should' in a user require ments document? answer: Shall normally indicates a mandatory requirement Should indicates a desirabl e but not essential requirement Why is it impossible to completely separate system requirements and design? answer: The system architecture may have to be designed to structur e the requir ements specification. Existing systems constrain the design and these constr ain ts are requirements. The use of a specific architecture may be a requirement for business or regulatory reasons. What are the main advantages of using a standard format to specify requirements? answer: All requirements have the same format so are easier to read.The definiti on of form fields mean that writers are less likely to forget to include informa tion.Some automated processing is possible. What are three types of interface that may have to be defined in a requirements document? answer: [1]Procedural interfaces[2]Data structures[3]Representations of data What are the two main types of event-driven control models? answer: Broadcast models where an event is broadcast to all sub-systems Interrup t-driven models where external events are detected and processed by an interrupt handler What is a reference architecture? answer: An abstract model of a system class that can be used to inform designers about the general structure of that type of system. What is the distinction between validation and verification? answer: Validation: Are we building the right product?/Verification: Are we buil ding the product right? What are the two complementary approaches used for checking and analysis? answer: Software testing/Software inspections or peer reviews. What are the principal sections included in a test plan?The testing process. answer: Requirements traceability/Tested items/Testing schedule/Test recording p rocedures/Constraints/Hardware and software requirements/ What are the advantages of inspections over testing? answer: 3/Inspections can discover many errors. In testing, one error may mask a nother/Incomplete versions of a system can be inspected/Inspections can consider broader quality attributes as well as program defects What are the stages in the software inspection process? answer: Planning/Overview/Individual preparation/Inspection meetingRework/Follow -up

List the classes of faults that should be considered in an answer: inspection checklist.Data faults/Control faults/Input/output faults/Inte rface faults/Storage management faults/Exception management faults What is automated static analysis answer: A process where an analysis program examines the source code looking for possible anomalies. These are drawn to the inspectors attention as they may repr esent faults in the program What are the main argument for the use of formal specification and verification? answer: Formal specification forces a detailed analysis of the requirements so r eveals errors and anomalies. Formal verification demonstrates that the program m eets its specification so implementation errors do not compromise dependability Why do formal specification and verification not guarantee reliability? answer: 3/The specification may not reflect the real requirements of users/The p roof may contain errors/The proof may assume a usage pattern which is incorrect. What are the five key strategies used in cleanroom development? answer: Formal specification/Incremental development/Structured programming/Stat ic verification/Statistical testing What is the distinction between application and infrastructure security? answer: 2/Application security the application is designed to resist attacks/Inf rastructure security the software is configured to r esist attacks Define the security terms vulnerability and asset Vulnerability answer: A weakness in a computer system that MAY be exploited to cause loss or h arm/Asset: A system resource that has a value and so should be protected What is security risk management? answer: Security risk management is concerned with assessing the possible losses that might ensue from attacks on assets in the system and balancing these losse s against the costs of security pr ocedures that may reduce the losses. What are the stages of preliminary risk assessment? answer: Asset identification/Asset value assessment/Exposure assessment/Threat i dentification/Threat probability assessment/Control identification/Feasibility a ssessment/Security requirements definition Suggest two possible vulnerabilities when login/password answer: authentication is used.Users set guessable passwords/Authorised users re veal their passwords to unauthorised users, perhaps through some social engineer ing process What fundamental issues have to be considered when designing system architecture for security? answer: 2/Protection: How should the system be organised so that critical assets can be protected against an external attack/Distribution: How should system ass ets be distributed so that the effects of a successful attack are minimised What are the three levels of protection that might be used in an information sys tem? answer: Platform-level protection/Application-level protection/Record-level prot ection List four design guidelines for secure systems engineering.Base security decisio ns on an explicit security policy answer: Avoid a single point of failure/Use redundancy and div ersity to reduce risk/Validate all inputs

Why is it important to design for deployment answer: Because many security vulnerabilities are introduced when the system is configured for use in its deployment environment What deployment support may be included in a system? answer: Support for viewing and analysing configurations/Default privilege minim isation/Configuration setting localisation/Easy ways to fix security vulnerabili ties What are the three complementary strategies to achieve survivability answer: Resistance/Recognition/Recovery List the stages in survivability analysis.Review system requirements and archite cture answer: Identify critical services and components/Identify attacks and compromis able components/Identify softspots and survivability strategies Which system model is described in the following graphic answer: Data-flow models Change request is proposal due to ___ answer: all: Market forces/Customers/Developers What's the difference between functional and non-functional requirements? answer: none:The functional requirement is described in details, the other is de scribed in high-level abstract/The functional requirement describes system prope rties and constraints, the other describes system services What are the user requirements? answer: The statements in a natural language plus diagrams that describe the ser vices' system and their constraints Suggest a most appropriate software process model that migh t be used as a basic for managing the developing of the software system that support categorizing go ods based on consumption pattern, tracking payments from the customers answer: The waterfall model How is the system organized in a client-server model? answer: none:A set of services is provided by servers and clients access and use these services/A set of services is provided by clients and servers access and usethese services Which of the following statements about the differences between integrating test ing and component testing are true? answer: The integrating testing test the result of the component while the compo nent testing test its internal structure Which of the following statements about project management is true? answer: The intangibility of software systems poses special problems for softwar e project management What are the distinctions between an object and an object class? answer: all: The object includes state variables and operations on that state as defined in the object class definition/An object is created at run-time by inst antiating an object class Which of the following is NOT a disadvantage of structured methods? answer: There are not many CASE tools that support structured methods

The economies of all developed nations are dependent on software answer: True If performance is a critical requirement the architecture should be designed to answer: localize critical operations and minimize communications; use large rath er than fine-grain components Which of the following does NOT belong to important principles of agile methods? answer: Process not people What are the advantages of explicitly designing and documenting software archite cture? answer: all: It improves stakeholder communications/It encourages a detailed ana lysis of the system Which of the following statements about test first dev elopment are true? answer: all:When a system feature is identified, the tests of the code implement ing that feature are written before the code/Tests are automated and all tests a re run when a new increment is added to the system What is the problem that cannot arise when requirements are written in natural l anguage? answer: Lack of user's understandability All of the fallowings are main benefits of software reuse EXCEPT answer: Reduce maintenance costs Which of the following statements about testing is NOT true? answer: Its goal is to fix errors of the software system Which of the following statement about the two distinct phases of system testing is NOT true? answer: The integration team does NOT have access to the source code of the syst em. Which of the following statements about Enterprise Resource Planning (ERP) syste ms is NOT true? answer: Enterprise Resource Planning systems are very widely used What is the second stage of risk management process? answer: Risk analysis Both the waterfall model of the software process and the prototyping model can b e accommodated in the spiral process model. answer: True Which of the following is a type of software process model that represents the r oles of the people involved in the software process and the activities for which they are responsible? answer: An role/action model What does computer science concern with? answer: Computer science is concerned with theories and methods that underlie co mputers and software systems What are included in a quality plan? answer: The quality procedures and standards that should be used in a project Which of the followings belong to Server type of concurrent object implementatio n

answer: The object is a parallel process with methods corresponding to the objec t operations. Methods execute in response to external requests What is meant by configuration management answer: The dev elopment and use of standards and procedures for managing an evo lving software system Which of the following statements about Service-oriented software engineering is true? answer: Service-oriented software engineering is based on the notion that progra ms can be constructed by composing independent services that encapsulate reusabl e functionality Which of the fallowings does NOT belong to the important differences between sof tware project management and other types of project management? answer: Cost of software project maintenance is higher than other type of projec ts is concerned with developing an oriented system model to implement requirements answer: Object-oriented Analysis What are system requirements answer: A structured document setting out detailed descriptions of the system's functions, services and operational constraints What key factors should be considered when planning reuse? answer: all: The development schedule for the software/The expected software lif etime/The background, skills and experience of the development team Applications frameworks are collections of concrete and abstract objects that ar e designed to be reused through specialization and the addition of new objects answer: true All of the following are the main benefits of software reuse EXCEPT answer: Reduce maintain cost Which of the following statements about Equivalence partitioning are NOT true? answer: none Which of these statements about extreme programming are true? answer: New versions may be built several times per day Which of the following are the testing process goals answer: all:Discover faults or defects in the software/The check that the softwa re meets its requirements Which of the following statements about service interfaces is true answer: all: Service interfaces are defined in an XML-based language called WSDL /A WSDL specification includes a definition of the interface types and operation s, the binding protocol used by the service and the service location Which of the following statements about security is NOT true? answer: Security threats can be threats to the only confidentiality and integrit y of a system or its data All of the following are stages in an object-oriented dev elopment process EXCEP T? answer: Object-oriented evolution What are the components of an object class definition in the UML

answer: all:The attributes of the class/The operations or methods associated wit h the class/The name of the object class Suggest the most appropriate generic software process model that might be used a s a basic for managing the development of the following system: A university acc ounting system that replaces an existing system answer: Waterfall model Requirements are usually presented at_ and _ levels of detail in requirements do cument answer: a high level statement/ a detailed system specification What are advantages of pipeline model? answer: all: Easy to add new transformations/Supports transformation reuse/Intui tive organization for stakeholder communication List the requirements document sections suggested by the IEEE standard. answer: Introduction-General-Specific-Appendices-Index. Which of the following statements about service interfaces is true? answer: AWSDL What is not an Upper-CASE tool? answer: Borland C A successful defect test is a test which causes a program to behave in an normal way answer: False What are the advantages of pair programming answer: It serves,It supports A critical distinction between a service and a component as defined in CBSE is t hat services are independent and: answer: All of the others Which one is not a web service standard? answer: SODP What are system requirements answer: A structured The two main approaches to concept reuse are: answer: Generative,Design Which of these statements about architectural design are true? answer: It involves,Represents,Often What do you understand by the system context and model of use? answer: The system context is a static,themodel is a dynamic When should you use data flow diagrams (DFD)? answer: showing dai nhat Which is the benefit of Service-oriented architectures? answer: inter-organizational is concerned with developing an object-oriented model of the application domain. The objects in that model reflect the entities and operations associated with th e problem to be solved

answer: Analysis Software systems are subject to continual change requests from answer: Developer,User What are the characteristics of RAD processes? answer: System,The system What is not a Lower_CASE tool? answer: Junit The customer wants to make a change to the project scope. The best thing for the project team to evaluate is the: answer: dai nhat quat vao Which of the followings belong to validation testing? answer: To demonstrate,Asuccessful test shows Change request is proposal due to answer: All of the others What is the correct sequence of the following activities in the Component-based software engineering? answer: 1,3,2,4 Which of the following statements about Equivalence partitioning are NOT true? answer: None of the others What types of system model may be developed? answer: Data,Composition,Architectural,Classification,Stimulus/response What is described in a context model? answer: The immediate external environment of the system defining the systems con text and the dependencies that a system has on its environment. What is described in a state machine model? answer: How the system responds to external events. What is a semantic data model? answer: A model that describes the logical structure of the data processed by a system or managed by a database. What are the components of an object class definition in the UML? answer: name,attributes,operations or methods associated What different object models may be developed? answer: Inheritance,Object aggregation,Object behaviour What is shown in an UML sequence model? answer: The sequence of interactions between objects and actors in the system as sociated with a single defined use-case. What is a structured method? answer: A systematic way of producing models of an existing system or of a syste m that is to be built. List four weaknesses of structured methods. answer: They do not support non-functional,They rarely include,They tend to prod uce,The models produced are detailed and often hard to understand.

What are the stages in an object-oriented development process? answer: analysis,design,programming. What is the distinction between an object and an object class? answer: An object is created at run-time by instantiating an object class. The o bject includes state variables and operations on that state as defined in the ob ject class definition. Briefly describe two types of concurrent object implementation. answer: Servers: The object is a parallel process with methods corresponding to the object operations. Methods execute in response to external requests.Active o bjects: The state of the object is changed by internal operations within the obj ect itself. The process executing these operations runs continuously. List the five key stages in an object-oriented design process. answer: Understand and define,Design,Identify,Develop,Specify object interfaces. What do you understand by the system context and model of use? answer: The system context is a static model of the other systems in the environ ment of the system being designed. The model of use is a dynamic model that desc ribes how the system being designed interacts with its environment. In the architectural model of the weather station system, what are the three lay ers in the software? answer: interface,data collection,instruments List four approaches that may be used to identify object classes. answer: Grammatical,Identify,Use,Use scenario-based analysis. Briefly describe three design models that are part of the UML. answer: Subsystem,Sequence,State machine What is the purpose of interface design in an OO design process? answer: To define the signatures and semantics of the interfaces that are provid ed by an object or group of objects. Briefly explain why an OO approach facilitates design evolution. answer: The internal details of an object are hidden from other objects so chang ing these details is unlikely to have knock-on effects on other objects. What are the advantages of using an incremental approach to software development ? answer: Accelerated delivery of customer services.User engagement with the syste m. What is the key difference between incremental development and prototyping? answer: Incremental development starts with the requirements that are best under stood and that have the highest priority.Prototyping is intended to help underst and the requirements so starts with requirements that are not well understood. List five important principles of agile methods. answer: Customer,Incremental,People not,Embrace,Maintain What are three important characteristics of extreme programming? answer: Requirements,Pair programming.Test-first What is test-first dev elopment? answer: When a system feature is identified, the tests of the code implementing that feature are written before the code. Tests are automated and all tests are run when a new increment is added to the system.

Briefly describe the advantage of pair programming. answer: It supports the idea. It serves.It helps support What tools are normally included in a RAD environment? answer: database programming,interface generator,Links,report What is visual programming? answer: An approach to development where a programmer manipulates graphical icon s representing functions, data or user interface components and associates proce ssing scripts with these icons. Suggest three ways that a software prototype may be used. answer: help with,explore software,run back-to-back What were the key benefits of prototyping found in Gordon and Biemans study? answer: Improved system usability,Improved system quality,Reduced development ef fort. List the main benefits of software reuse. answer: Increased,Reduced,Effective,Standards,Accelerated List the main problems with software reuse. answer: Increased,Lack,Not-invented-here,Creating,Finding What key factors should be considered when planning reuse? answer: development,expected,background,criticality,application,system What is a design pattern and why are patterns important for reuse? answer: A design pattern is a description of a problem and the essence of its so lution. This solution is expressed in a generic way and can be instantiated and reused in different settings. What do Gamma et al. suggest are the four essential elements of a design pattern ? answer: meaningful,solution,statement. What is generator-based reuse? answer: An approach to reuse where reusable knowledge is embedded in a generator system which is programmed by domain experts to create the system. An executabl e system is then generated. What major software problem is addressed by aspect-oriented software development ? answer: The problem of separation of concerns so that a software unit is designe d to do one thing and one thing only. What are three possible classes of application framework? answer: System infrastructure,Middleware,Enterprise What design choices have to be made when reusing COTS products? answer: Which COTS products.How data.What features List four types of specialisation of software product lines. answer: Platform,Environment,Functional,Process What are the two complementary goals of the testing process? answer: demonstrate,discover What is a successful defect test?

answer: successful defect test is one where the systems operation does not confor m to its specification, i.e. one that exposes a defect in the system. Briefly describe the two distinct phases of system testing. answer: Integration,Release What guidelines does Whittaker suggest for defect testing? answer: Chose inputs,Design,Repeat,Force,Force What is the function of stress testing? answer: test,stress What tests should be included in object class testing? answer: Tests for all,Tests that set,Tests that force What are the three important classes of interface errors? answer: Interface misuse.Interface misunderstanding.Timing errors. What three approaches may be used when designing test cases? answer: Requirements-based,Partition,Structural What is an equivalence partition? Give an example. answer: A class of inputs or outputs where it is reasonable to expect that the s ystem will behave the same way for all members of the class. For example, all st rings with less than 256 characters. What is path testing? answer: A structural testing strategy whose objective is to exercise every indep endent path through a program. What is meant by configuration management? answer: The development and use of standards and procedures for managing an evol ving software system. What is a baseline? answer: A controlled system where changes to the system have to be agreed and re corded before they are implemented. What should be included in a configuration management plan? answer: configuration,people,configuration,CM tool,schema Why is it necessary to define a configuration item identification scheme? answer: Because there may be thousands of source code modules, test scripts, des ign documents, etc. in a large project. You have to be able to uniquely identify and locate any specific item and so a unique naming scheme is required. What information may be included in a configuration database? answer: Information about configuration items such as data of creation, creator, etc. Information about users of components, system customers, execution platfor ms, and proposed changes to the system. What are the objectives of change management procedures? answer: To analyse the costs and benefits of proposed changes, approving changes that are worthwhile, and tracking which components of the system have been chan ged. What is the role of a change control board? answer: To assess the impact of proposed changes from a strategic and organisati onal perspective rather than a technical perspective. They should decide if chan ges are worthwhile and should prioritise changes to be implemented.

What is the difference between a system version and a system release? answer: A system version is an instance of a system that differs, in some ways, from other instances. A system release is a version that is released to customer s. What are the advantages of attribute-based version identification? answer: When selecting components, you do not need to specify the version number (an error-prone process if there are many components) but simply list the requi red component attributes. What may be included in a system release? answer: executable,Configuration,Data,installation,Electronic What are the key issues in system building? answer: Have all,Are the right,Are all,Are,Is the What are the key standards for web service-oriented architectures? answer: SOAP,WSDL,UDDI,WS-BPEL What is the definition of a (web) service? answer: A loosely coupled reusable software component that encapsulates discrete functionality which may be distributed and programmatically accessed. A web ser vice is a service that is accessed using standard Internet and XML-based protoco ls. What are the components of a WSDL specification? answer: interface specification,binding,location part What is service engineering? answer: The process of dev eloping services for reuse in service-oriented applic ations. What are the three fundamental types of service that may be identified? answer: Utility services,Business services,Coordination services What are the three stages in service interface design? answer: Logical interface,Message design,WSDL development What information is maintained in a UDDI description? answer: Details of,informal description,Information on,Subscription information How can web services be used to facilitate the use of legacy systems? answer: The legacy system functionality is hidden by wrapping it in a web service which is accessed by external applications. These applications therefore do not need to know the protocols and data structures used by the legacy system. Define software development with services answer: The creation of programs by composing and configuring services to create new composite services. What is a workflow? answer: A sequence of activities, ordered in time, that make up a coherent busin ess processes with each activity carrying out some part of the work of that proc ess. What are the stages in service construction by composition? answer: Formulate,Discover services,Select,Refine,Create,Test What is the difference between BPMN and WS-BPEL? answer: BPMN is a graphical language for defining workflows whereas WS-BPEL is a

lower-level XML-based language. List five problems in testing service-oriented systems. answer: Services,Dynamic,non-functional,Testing,Compensating What are the advantage of explicitly designing and documenting a software archit ecture? answer: improves,encourages,helps What non-functional requirements may be influenced by the choice of system archi tecture? answer: Performance, security, safety, availability, maintainability. List four fundamental questions that should be addressed in architectural design .Is there a generic application architecture that can be used? answer: How will,What architectural,How should,What control,Etc. What architectural models may be developed? answer: static structural,dynamic process,interface,Relationship,distribution What is the fundamental characteristic of a repository model? answer: All shared data is held in a central database that can be accessed by al l sub-systems. How is the system organised in a client-server model? answer: A set of services is provided by servers and clients access and use thes e services. What are the two principle styles used for modular decomposition? answer: Object-oriented decomposition, Function-oriented pipelining. 1. What is the output of Risk Planning stage? answer: Risk avoidance and contingency plans 2. How is the system organized in aclient-server model? answer: A set of services is provided by servers and clients access and use thes e services 3. What is the first stage in survivability analysis? answer: Review system requirements and architecture 4. Which of these statements about architectural design is not true? answer: Represents the link between specification and design processes 5. Which is not an advantage of inheritance? answer: Object classes are self-contained. They can be understood without refere nce to their super-classes 6. What is Not a type in Reuse-based software engineering? answer: Software development process reuse 7. What is described in a context model? answer: The immediate ecternal environment of the system defining the system's c ontext and the dependencies that a system has on its environment 8. Which of the follwing is Not a type of behavioral model? answer: Architectual mode 9. What is correct phase related to the term "CASE" in software engineering?

answer: The software systems that provide automated support for software process activities 10. Which of the followings does not belong to external requirements? answer: Portability requiements 11. Which of the following is not a stage in componet - Base Software enginnerin g answer: System design with reuse 12. What activity does a software project manager need to perform to minimize th e risk of software failure? answer:Define milestones and track progress 13. What is describled in a state machine model? answer: How the system responds to external event 14. The prototyping model of software development is answer: A risky model that rarely produces a meaningful product 15. What is not a technique for component identification? answer: Function-based identification 16. What is not an essential element of design patterns? answer: A concrete design description 17. Which is NOT a problem that an arise when requirements are written in natura l language? answer: Lack of user's understandability 18. What is not an advantage of object model answer: complex entities are easy to represent as objects 19. When software configuration management is a formal activity, the software co nfiguration audit is conducted by the answer: Senior managers 20. Who is mainly responsible for the component (unit) testing? answer: Developer 21. Which is the purpose of data model? answer: Describle the logical structure of data processed by the system 22. Why do we need to consider security for project? answer: to protect the sestem against external attack 23. What is the main difference between RUP (Raditional Unified Process and othe r processes? answer: The construction phase is essentially concerned with system design, prog ramming and testing 24. What are non-functional requirements? answer: Constraints on the services or functions offered by the system such as t iming constraints, constraints on the development process, standards, etc 25. Which of the following is not an advantage of pipeline model answer: Easy to support event-based interaction 26. Which is Not an object-oriented strategy? answer: Object-oriented deployment

27. What is a version? answer: An instance of a system which is distributed to users outside of the dev elopment team 28. Which of the following is not a stage in an object-oriented development proc ess? answer: Object-oriented programming 29. What is Not a main problem with software reuse? answer: Not-invented-here syndrome 30. What are milestones? answer: Milestones are end-point of a project phase 31. Which is the right sequence in project scheduling? answer: (2)=>(1)=>(4)=>(3) 32. Which is Not a principal component of a software engineering method? answer: Process activities 33. What is the common limitation of auto mated testing? answer: They are not useful when rewuiement are changing frequently 34. What is the purpose of defect testing? answer: To discover faults that make software's behavior incorrect 35. What is Not a characteristic of extreme programming? answer: Delivery-first development 36. What is Not a component of a WSDL specification? answer: The location part 37. What are the four essential attributes of the good software? answer: Maintainability,dependability,efficiency,usability 38. What are the advantages of using an incremental approach to software develop ment? answer: Accelerated delivery of customer services, user engagement with the syst em. 39. One of the key problems in software reuse is the inability to find existing reusable design patterns when hundreds of candidates exist answer: True 40. What are functional requirements? answer: Statement of services the system should provide how the system should re act to particular inputs and how the system should behave in particular situatio ns 41. Which is NOT related to a characteristic of rapid application development pr ocesses? answer: It is always possible to arrive at a stable, consistent set of system re quirements 42. Which of following paradigms is not a general paradigm of software developme nt? answer: Rapid software development 43. What is WSDL standard?

answer: A standard for workflow languages used to define service composition. 44. Which of the following design guidelines for secure systems engineering is N OT true? answer: Avoid using redundancy and diversity to reduce risk 45. What is the normal order of activities in which software testing process is organized? answer: (2)=>(1)=>(3)=>(4) 46. Which of the following is NOT a sector in each loop in Boehm's spiral model? answer: System design 47. What is the first stage in service construction by composition? answer: Formulate outline workflow 48. What is NOT the advantage of repository model answer: Sub-system need not be concerned with how data 49. Which of the following is NOT an advantage of using incremental development and dilivery? answer: Systems are offten have good structures 50. What is NOT an objective of change management procedures? answer: Approving changes that are worthwhite. 51. What are the advantage of explicitly designing and documenting softwore arch itecture? answer: It improves the sta***it helps with***it encourages a detailed 52. What is the Lower-CASE tool? answer: Netbeans 53. In the management system, the customer notices to one of requirements, with the same data, product information, the system should be performed difference pr esentations for correspondent departments such as Product department, Quallty de partment and Planning department. So which design or framework is applied for? answer: MVC-Model view 54. Which of the following is NOT a stype of behavioural model answer: Semantic data models 55. The student management system was completed with two functions, managing stu dent information and organizing quizes for review, after that the customer added one more function, organizing online examination. Finaly all of them are put in to the configuration management and are built for system testing, so what is the build called? answer: Release 56. What is the output of Feasibility Study stage in the Requirement Engineering Process? answer: Feasibility report 57. The Google map is a web service to be used in the weather system, which meth od is used in testing the system? answer: Integration testing 58. Using equivalence partition testing to check employee ID by format 8xxx: Boo lean checkValidEmployeeID (EmployeeID) Which EmployeeIDs are selected for testin

g? answer: 7999,8000,8500,8999,9000 59. Which is NOT related to a characteristic of rapid application development pr ocesses? answer: It is always possible to 60. List the tests that should be included in object class testing answer: Tests that set*** tests for all***tests that force 61. What is the Upper-CASE tool? answer: Microsoft Visio 62. Which is NOT an object-oriented strategy? answer: Object-oriented deployment 63. What are the two types of CM workbench? answer: Intergrated workbenches***Open workbenches 64. What problems can arise when requirements are written in natural language? answer: Lank of clarity*** requiment ama***requirement confu 65. Which of the following statements about Reference models are true? answer: Refference models*** they are a 66. All of the followings belong to organizational requirements EXCEPT? answer: Privacy requirements 67. What is the firt stage in service construction by composition? answer: Formulate outline workflow 68. List three types of program generator answer: Application*** code*** parser and lexical 69. Which question no longer concerns the modern software engineer? answer: Why does computer 70. What is the type of following requirement,"the result should be returned in the real time"? answer: Non-functional requirements 71. All of the following are advantages of pair programming EXCEPT answer: It helps to increase 72. What is the last stage in survivabilityanalysis? answer: Identify softspots and sur 73. How to build security for the CMS system? answer: Building system authemtication 74. Which of these statements about defect testing is NOT true? answer: A successful test 75. Which one is program type of the Java compite,Javac? answer: Parser and lexical analyser generators 76. Which of following statements about software engineering is NOT true? answer: SOftware costs more to develop than it does to maintain How is the software engineering? answer: a. It provides developers discipline to develop a software product

What are the ethical responsibilities of the software engineers? answer: Software engineers should..Software engineers shall be ..Software engine ers shall maintain integrity and independence in their professional judgment What is the difference between software engineering and computer science? answer: Computer science is concerned with theory and fundamentals;Software engi neering is concerned with the practicalities of developing and delivering useful software Which of these statements about Software costs are true? answer: Software costs more to maintain .. The costs of software ..Software cos ts often dominate computer system costs How are the prototyping development? answer: Specification, development and..Should start with poorly ..Objective is to understand the system requirements and clarify what is really needed What are the most fundamental activities in software processes? answer: Software specification, software development, software validation, softw are evolution Which process model is used in the Rational Unified Process? answer: c. Iteration Evolutionary software process models answer: Are iterative in nature. Can easily accommodate product requirements ch anges The component-based development model is answer: Works best when object technologies are available for support How are the software project management? answer: Consider budget and .. Consider software ..Software engineering discipl ine is not the same as other domains What should include in the project plan? answer: a. Work breakdown structure c. Project schedule d. Risk report What should we do to manage risk? answer: Monitor the risks throughout the .. Make contingency plans .. Risk ass essment Which factors should be considered in choosing the organizational structure for a software team? answer: Degree of communication .. Rigidity of the delivery date .. Predicted s ize of the resulting program One of the best ways to avoid frustration during the software development proces s is to answer: Give team members more control over process and technical decisions How are the non-functional requirements? answer: Timing constraints d. Define system properties and constraints How are the user requirements? answer: Non-functional requirements are .. They are tables and diagrams which c an be understood by all users What happen when using natural language to describe requirements? answer: Several different requirements ..Requirements, system .. Easy to misunde rstand between reader and writer The system specification describes the answer: a. Function, performance and constraints of a computer-based system The best way to conduct a requirements validation review is to answer: a. Use a checklist of questions to examine each requirement How are the context model? answer: Social and organisational concerns may ..They show what lies ..Relations hip with other systems Which ones relate to the behavioural model? answer: Show the processing steps as .. Data flow diagrams are used in .. State diagrams show states when the systems response to events

Which relationships are used in the data model? answer: b. Association c. Aggregation d. Inheritance UML diagram used creating a system analysis model answer: d. Dataflow diagram The data dictionary contains descriptions of each software answer: b. Data object d. Control item Which information are refered to make architectural design? answer: Which components are distributed .. How the sub-system is .. A generic a pplication architecture can be used Which ones mention to the decomposition style? answer: Data-flow model where the system is .. An object model where the system is designed into interacting objects Which ones mention to the control style? Answer: One sub-system has responsibility for .. Each sub-system can respond to externally generated events from other sub-systems An architectural style encompasses which of the following elements? answer: a. Set of components c. Semantic models d. Constraints To determine the architectural style or combination of styles that best fits the proposed system, requirements engineering is used to uncover answer: c. Characteristics and constraints Which relationships are used in the object-oriented design process? answer: a. Inheritance b. Association c. Aggregation Which ones are used in the dynamic models? answer: a. Active or passive objects b. Interaction relationships d. Object li felines How to identify objects within the system? answer: Base on tangible things in the .. Depend on the skill, ..Base on iterati ve scenarios Which of the following is not a characteristic common to all design methods? answer: c. configuration management What types of abstraction are used in software design? answer: a. Data c. Control d. Procedural Which of the following traits need to exist among the members of an agile softwa re team? answer: b. Mutual trust and respect c. Competence d. Decision-making ability Which of the following is not necessary to apply agility to a software process? answer: c. Only essential work products are produced When is the design pattern applied to? answer: Re-use experiences .. Re-use difference settings .. Re-use abstract kno wledge about a problem and its solution Which ones are framework classes? answer: System infrastructure ..Enterprise application framework Middleware in tegration framework Extending the framework involves answer: Adding methods that are called in response to ..Adding concrete classes that inherit operations from abstract classes in the framework Adaptation in software product lines may involve answer: Adding new .. Selecting from a ..Component and system ..Modifying compon ents to meet new requirements How are the system testing? answer: Testing on integrating components..Testing on integrating ..Testing is d one by an independent testing team How are the component testing? answer: b. Testing is done by component..Testing on individual program component s to create a sub-system Which types of testing are done by development team? answer: a. Stress testing b. Interface testing d. Release testing

Which of the following need to be assessed during unit testing? answer :b. Error handling d. Execution paths Top-down integration testing has as it's major advantage(s) that answer: a. Major decision points are tested early c. No drivers need to be writt en Why is the configuration management applied? answer: Make the product development.. to evolve software product.. Aim to contr ol the costs and effort involved in making changes to a system Which development phases are included in the configuration management plan? answer: a. Testing c. Design d. Implementation Which information are included in the component header? answer: a. Author of the component and c. Project name d. Version number and w hat were changed Which of the following is not considered one of the four important elements that should exist when a configuration management system is developed? answer: d. Human elements Which of the following tasks is not part of software configuration management? answer: Statistical quality control What are the security risk management concerned? answer: Assessing the possible losses that .. Balancing the possible losses aga inst the costs of security procedures that may reduce these losses How are analyse assets of the system? answer: Set the level of exposure of .. Identify system resources..Set level of value of each asset What are the design guidelines to make the secure system? answer: Raise awaremess of the security issues b. Consider as basic of a review checklist that is applied during the system validation process What is the first layer of system layers? answer: c. Application What is the last layer of system layers? answer: c. Operation system Which ones are related to the service-oriented architectures? answer: Services may execute on..Protocols have been developed ..A system where the components are stand-alone services What are the service testing problems? answer: Service testing is difficult. Non-functional behaviour ..External servic es may be modified by the service provider thus invalidating tests which have be en completed What is the last stage in service construction by composition? answer: d. Test service What is the output of "Refine workflow" in Construction by composition? answer: c. Workflow design Which benefits of the incremental development? answer: Meet requirements quickly ..The processes of specification..Rapid to del ivery the highest priority functionalities to the customer

You might also like