Option A: Creation of usage scenarios
Option B: Specific usage file
Option C: Generation of test cases from the servers end.
Option D: Reliability
Correct Answer: Generation of test cases from the servers end. ✔
Click for More Details
Option A: lower costs
Option B: faster software development
Option C: high effectiveness
Option D: lower risks
Correct Answer: high effectiveness ✔
Click for More Details
Option A: Periodic stimuli
Option B: Software stimuli
Option C: Hardware stimuli
Option D: Management stimuli
Correct Answer: Periodic stimuli ✔
Click for More Details
Option A: Class diagram
Option B: Object diagram
Option C: Sequence diagram
Option D: ER diagram
Correct Answer: Object diagram ✔
Click for More Details
Option A: A specific type of equipment
Option B: Maintenance record for each and every equipment item
Option C: Check in/check out equipment for maintenance
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
How does Clean room software engineering Differs from the conventional and object-oriented views ?
Option A: It makes explicit use of statistical quality control
Option B: It verifies design specification using a mathematically based proof of correctness
Option C: It relies heavily on statistical use testing to uncover high-impact errors
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: mean-time-to-function
Option B: mean-time-to-failure
Option C: manufacture-time-to-function
Option D: none of the mentioned
Correct Answer: mean-time-to-failure ✔
Click for More Details
Option A: real-life operating system
Option B: real-time operating system
Option C: real-time operating software
Option D: real-life operating software
Correct Answer: real-time operating system ✔
Click for More Details
Option A: Observe and React
Option B: Environmental Control
Option C: Embedded System
Option D: Process Pipeline
Correct Answer: Embedded System ✔
Click for More Details
Option A: Compile time
Option B: Frequency
Option C: Deadlines
Option D: Execution time
Correct Answer: Deadlines ✔
Click for More Details
Option A: 50 ms
Option B: 55 ms
Option C: 70 ms
Option D: 100 ms
Correct Answer: 50 ms ✔
Click for More Details
Option A: Class
Option B: Object
Option C: User authentication
Option D: All of the mentioned
Correct Answer: User authentication ✔
Click for More Details
Option A: Separation of concerns
Option B: Writing aspects
Option C: Finding code complexity
Option D: None of the mentioned
Correct Answer: Separation of concerns ✔
Click for More Details
Option A: 1ms
Option B: 10ms
Option C: 100ms
Option D: none of the mentioned
Correct Answer: 1ms ✔
Click for More Details
Option A: High-speed data acquisition system
Option B: Failure of a power supply in an embedded system
Option C: Both High-speed data acquisition system AND Failure of a power supply in an embedded system
Option D: None of the mentioned
Correct Answer: High-speed data acquisition system ✔
Click for More Details
Option A: software re-engineering
Option B: artificial programming
Option C: aspect-oriented programming
Option D: all of the mentioned
Correct Answer: aspect-oriented programming ✔
Click for More Details
Option A: Functional concerns
Option B: Quality of service concerns
Option C: Policy concern
Option D: Non-functional concern
Correct Answer: Functional concerns ✔
Click for More Details
Option A: maintaining records of patients
Option B: diagnose and treatments
Option C: consultations
Option D: all of the mentioned
Correct Answer: maintaining records of patients ✔
Click for More Details
Option A: aspect
Option B: join point
Option C: join point model
Option D: weaving
Correct Answer: weaving ✔
Click for More Details
Option A: Functional concerns
Option B: Quality of service concerns
Option C: System concerns
Option D: Cross-cutting concerns
Correct Answer: Cross-cutting concerns ✔
Click for More Details
Option A: aspect
Option B: join point
Option C: join point model
Option D: pointcut
Correct Answer: join point ✔
Click for More Details
Option A: Database
Option B: Software
Option C: Hardware
Option D: None of the mentioned
Correct Answer: ✔
Click for More Details
Option A: UI
Option B: DBMS
Option C: Application subsystem
Option D: None of the mentioned
Correct Answer: Application subsystem ✔
Click for More Details
Option A: Local Presentation
Option B: Distributed presentation
Option C: Remote presentation
Option D: All of the mentioned
Correct Answer: Remote presentation ✔
Click for More Details
Option A: File servers
Option B: Database servers
Option C: Client servers
Option D: None of the mentioned
Correct Answer: Database servers ✔
Click for More Details
Option A: Server tests
Option B: Application function tests
Option C: Transaction tests
Option D: Network communication tests
Correct Answer: Server tests ✔
Click for More Details
Option A: Distributed logic
Option B: Distributed presentation
Option C: Remote presentation
Option D: All of the mentioned
Correct Answer: Distributed logic ✔
Click for More Details
Option A: obtain pertinent information about the desired method from the interface repository
Option B: create a data structure with parameters to be passed to the object
Option C: create a request for the object
Option D: all of the mentioned
Correct Answer: all of the mentioned ✔
Click for More Details
Option A: Control couple
Option B: Application object
Option C: Data couple
Option D: Database object
Correct Answer: Data couple ✔
Click for More Details
Option A: Client/server SQL interaction
Option B: Remote procedure calls
Option C: SQL Injection
Option D: All of the mentioned
Correct Answer: Client/server SQL interaction ✔
Click for More Details
Option A: Activating & Deactivating Objects
Option B: Security features
Option C: Files implementing the entities identified within the ERD
Option D: Registering object implementation
Correct Answer: Files implementing the entities identified within the ERD ✔
Click for More Details
Option A: Common Object Request Build Architecture
Option B: Common Object Request Broker Architecture
Option C: Common Object Request Break Architecture
Option D: All of the mentioned
Correct Answer: Common Object Request Broker Architecture ✔
Click for More Details
Option A: Consistency
Option B: Reliability
Option C: Scalability
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Policy implementation
Option B: QoS
Option C: Security
Option D: Verify invoice
Correct Answer: Verify invoice ✔
Click for More Details
Option A: Strong coupling among objects
Option B: Communications are prescriptive rather than being descriptive
Option C: Data is separated from a service or behavior
Option D: Data and methods are integrated into a single object
Correct Answer: Data is separated from a service or behavior ✔
Click for More Details
Option A: Task centric service
Option B: Wrapper Services
Option C: Get account info
Option D: Entity centric service
Correct Answer: Wrapper Services ✔
Click for More Details
Option A: The Application Architecture
Option B: The Service Architecture
Option C: The Component Architecture
Option D: None of the mentioned
Correct Answer: The Component Architecture ✔
Click for More Details
Option A: The Application Architecture
Option B: The Service Architecture
Option C: The Component Architecture
Option D: None of the mentioned
Correct Answer: The Application Architecture ✔
Click for More Details
Option A: i, ii, iii, iv
Option B: iii, ii, i, iv
Option C: ii, iii, i, iv
Option D: ii, iii, iv, i
Correct Answer: ii, iii, i, iv ✔
Click for More Details
Option A: Strongly Coupled
Option B: Loosely Coupled
Option C: Strongly Cohesive
Option D: Loosely Cohesive
Correct Answer: Loosely Coupled ✔
Click for More Details
Option A: Yellow box
Option B: Clear box
Option C: White box
Option D: Black box
Correct Answer: Black box ✔
Click for More Details
Option A: Yellow box
Option B: Clear box
Option C: White box
Option D: Black box
Correct Answer: Clear box ✔
Click for More Details
Option A: State box
Option B: Clean box
Option C: White box
Option D: Black box
Correct Answer: State box ✔
Click for More Details
Option A: Sampling model
Option B: Component model
Option C: Certification model
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: box structure specification
Option B: referential transparency
Option C: degenerative error correction
Option D: none of the mentioned
Correct Answer: box structure specification ✔
Click for More Details
Option A: Mills
Option B: Dyer
Option C: Linger
Option D: All of the Mentioned
Correct Answer: All of the Mentioned ✔
Click for More Details
Option A: Specification team
Option B: Development team
Option C: Certification team
Option D: All of the mentioned
Correct Answer: Development team ✔
Click for More Details
Option A: Standardized
Option B: Independent
Option C: Composable
Option D: Documented
Correct Answer: Composable ✔
Click for More Details
Option A: Size
Option B: Distribution
Option C: Manageability
Option D: Interception
Correct Answer: Interception ✔
Click for More Details
Option A: Quality of security
Option B: Quality of system
Option C: Quality of service
Option D: None of the mentioned
Correct Answer: Quality of service ✔
Click for More Details
Option A: Parameter incompatibility
Option B: Operation incompleteness
Option C: Operation incompatibility
Option D: None of the mentioned
Correct Answer: Parameter incompatibility ✔
Click for More Details
Option A: properties
Option B: methods
Option C: mechanisms
Option D: all of the mentioned
Correct Answer: all of the mentioned ✔
Click for More Details
Option A: It increases quality
Option B: CBSE shortens delivery time
Option C: CBSE increases productivity
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: EJB
Option B: COM+
Option C: .NET
Option D: None of the mentioned
Correct Answer: None of the mentioned ✔
Click for More Details
Option A: Parameter incompatibility
Option B: Operation incompleteness
Option C: Operation incompatibility
Option D: None of the mentioned
Correct Answer: Operation incompatibility ✔
Click for More Details
Option A: Component modules
Option B: Component composition
Option C: Component model
Option D: Component interfaces
Correct Answer: Component model ✔
Click for More Details
Option A: Component-based software engineering
Option B: Component composition
Option C: Component model
Option D: Component interfaces
Correct Answer: Component-based software engineering ✔
Click for More Details
Option A: Component-based software engineering
Option B: Component composition
Option C: Component model
Option D: Component interfaces
Correct Answer: Component interfaces ✔
Click for More Details
Option A: Modification
Option B: Interruption
Option C: Fabrication
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Concurrency
Option B: Openness
Option C: Resource sharing
Option D: Fault tolerance
Correct Answer: Concurrency ✔
Click for More Details
Option A: Remote Method Invocations
Option B: Operating System
Option C: Client–server computing
Option D: None of the mentioned
Correct Answer: Remote Method Invocations ✔
Click for More Details
Option A: Multi-tier client–server architecture
Option B: Master-slave architecture
Option C: Distributed component architecture
Option D: Peer-to-peer architecture
Correct Answer: Multi-tier client–server architecture ✔
Click for More Details
Option A: SaaS
Option B: SOA
Option C: Configurability
Option D: Both SaaS and Configurability
Correct Answer: SaaS ✔
Click for More Details
Option A: Master-slave architectures
Option B: Client–server systems
Option C: Two-tier client–server architecture
Option D: Both Master-slave architectures AND Client–server systems
Correct Answer: Client–server systems ✔
Click for More Details
Option A: Multi-tier client–server architecture
Option B: Master-slave architecture
Option C: Distributed component architecture
Option D: Peer-to-peer architecture
Correct Answer: Distributed component architecture ✔
Click for More Details
Option A: Set
Option B: Sequence
Option C: Universal quantification
Option D: Both Set and Sequence
Correct Answer: Universal quantification ✔
Click for More Details
Option A: Multi-tier client–server architecture
Option B: Master-slave architecture
Option C: Distributed component architecture
Option D: Peer-to-peer architecture
Correct Answer: Peer-to-peer architecture ✔
Click for More Details
Option A: providing frameworks
Option B: verifying systems
Option C: provide investors
Option D: both providing frameworks and verifying systems
Correct Answer: providing frameworks ✔
Click for More Details
Option A: Contradictions
Option B: Post-condition
Option C: Vagueness
Option D: None of the mentioned
Correct Answer: None of the mentioned ✔
Click for More Details
Option A: semantic domain
Option B: syntactic domain
Option C: sequence
Option D: set
Correct Answer: syntactic domain ✔
Click for More Details
Which of the following is essential for success, when formal methods are used for the first time ?
Option A: Expert training
Option B: Consulting
Option C: Prerequisite knowledge
Option D: Both Expert training and Consulting
Correct Answer: Expert training ✔
Click for More Details
Option A: semantic domain
Option B: syntactic domain
Option C: sequence
Option D: set
Correct Answer: semantic domain ✔
Click for More Details
Option A: CMM
Option B: ISO-9001
Option C: CASE tools
Option D: Formal methods
Correct Answer: Formal methods ✔
Click for More Details
Option A: Contradictions
Option B: Ambiguities
Option C: Vagueness
Option D: Incompleteness
Correct Answer: Vagueness ✔
Click for More Details
Option A: Contradictions
Option B: Ambiguities
Option C: Vagueness
Option D: Comments
Correct Answer: Contradictions ✔
Click for More Details
Option A: difficult
Option B: expensive
Option C: unreliable
Option D: difficult and expensive
Correct Answer: difficult ✔
Click for More Details
Option A: Session Management
Option B: Security
Option C: User interaction
Option D: Database support
Correct Answer: User interaction ✔
Click for More Details
Option A: MVC pattern
Option B: Web application frameworks
Option C: Debugging framework
Option D: None of the mentioned
Correct Answer: Debugging framework ✔
Click for More Details
Option A: Observer pattern
Option B: Strategy pattern
Option C: Composite pattern
Option D: All of the mentioned
Correct Answer: All of the mentioned ✔
Click for More Details
Option A: Middleware integration frameworks
Option B: System infrastructure framework
Option C: Enterprise application frameworks
Option D: Web application frameworks
Correct Answer: System infrastructure framework ✔
Click for More Details
Option A: Standards compliance
Option B: Increased Reliability
Option C: Reduced Process risk
Option D: Maintaining a component library
Correct Answer: Reduced Process risk ✔
Click for More Details
Option A: Session management
Option B: Security
Option C: User interaction
Option D: Database support
Correct Answer: Database support ✔
Click for More Details
Option A: Session management
Option B: Security
Option C: User interaction
Option D: Database support
Correct Answer: Session management ✔
Click for More Details
Option A: Web application frameworks
Option B: Middleware integration frameworks
Option C: Web application frameworks
Option D: GUI design
Correct Answer: GUI design ✔
Click for More Details
Option A: C#
Option B: Ruby
Option C: PHP
Option D: Java
Correct Answer: PHP ✔
Click for More Details
Option A: Effective Reuse Planning
Option B: Enterprise Resource Planning
Option C: Effective Research Planning
Option D: None of the mentioned
Correct Answer: Enterprise Resource Planning ✔
Click for More Details
Option A: Software reuse
Option B: Object-oriented programming language
Option C: Framework
Option D: None of the mentioned
Correct Answer: Framework ✔
Click for More Details
Option A: COTS-solution systems
Option B: COTS-integrated systems
Option C: ERP systems
Option D: Both COTS-solution and COTS-integrated systems
Correct Answer: COTS-solution systems ✔
Click for More Details
Option A: System infrastructure frameworks
Option B: Middleware integration frameworks
Option C: Enterprise application frameworks
Option D: MVC
Correct Answer: Middleware integration frameworks ✔
Click for More Details
Option A: Process specialization
Option B: Platform specialization
Option C: Environment specialization
Option D: Functional specialization
Correct Answer: Process specialization ✔
Click for More Details
The open source movement has meant that there is a huge reusable code base available at __________?
Option A: free of cost
Option B: low cost
Option C: high cost
Option D: short period of time
Correct Answer: low cost ✔
Click for More Details
Option A: Java
Option B: Mac-OS
Option C: Microsoft
Option D: LINUX
Correct Answer: Microsoft ✔
Click for More Details
Option A: Class and function libraries that implement commonly used abstractions are available for reuse
Option B: Shared components are woven into an application at different places when the program is compiled
Option C: Large-scale systems that encapsulate generic business functionality and rules are configured for an organization
Option D: Systems are developed by configuring and integrating existing application systems
Correct Answer: Systems are developed by configuring and integrating existing application systems ✔
Click for More Details
Option A: Application system reuse
Option B: Component reuse
Option C: Object and function reuse
Option D: None of the mentioned
Correct Answer: Component reuse ✔
Click for More Details
Option A: Commercial Off-The-Shelf systems
Option B: Commercial Off-The-Shelf states
Option C: Commercial Off-The-System state
Option D: None of the mentioned
Correct Answer: Commercial Off-The-Shelf systems ✔
Click for More Details