Wednesday 1 August 2012

MC0084, MCA-5, Software Project Management and Quality Assurance


MCA-5

MC0084

Software Project Management and Quality Assurance


1.         Putnam and Myers approach, which used the approximate reasoning techniques, is called.
            A)         Functional point sizing                           B)         Standard Component Sizing
            C)         Effort validation                                      D)         Defined responsibilities

2.         The degree of uncertainty that the product will be delivered on time is called.
            A)         Support risk      B)         Schedule risk    C)         Cost risk           D)         Performance risk

3.         Task set selector value greater than 2,4 then degree of rigor is______
            A)         Casual  B)         Structured                     C)         Strict                D)         Quick reaction

4.         ________ Metric is used to make predictions about the software later in the life cycle.
            A)         Descriptive         B)         Future   C)         Predictive                     D)         None of  these

5.         Defect type number ‘70’ – means________
            A)         Build package   B)         Data     C)         Interface           D)         Function          

6.       Involvement of debugging and other strategies for identifying where the error occurs in the error occurs in the code is called. _______
            A)         Error detection  B)         Error Removal   C)         Error Tracking    D)         Regression testing

7.         _______ testing is where all possible pants through the code defined and covered.
            A)         Path                 B)         Loop                C)         Basis path                    D)        Data flow

8.         _______ activity overlay the software process model
            A)         Software quality assurance                    B)         Software configuration management
            C)         Work products                                      D)         All the above

9.         In the project Resource pyramid ________ sits at the foundation of the structure
            A)         People B)         Hardware/Software tools            C)         Reusable software         D)         Primary resources

10.        In SQA plan, _________ section identifies all the organization that will be affected by the new software.
            A          SIDs                 B)         Resource          C)   Software Requirement   D)       Design document

11.        Testing the design of a project is called
            A)         Acceptance testing                                B)         Design testing
            C)         Integration testing                                  D)         System testing

12.        Choose the approaches to structural testing.
            A)         Control flow based testing         B)         Data flow based testing
            C)         Mutation testing                       D)         All the above

13.        ‘Inconsisency’ in SRS means
            A)         Contradiction in requirements                 B)         Multriple meanings of requirement                                                          C)         Inconect facts recorded in SRS                          D)         Requirement witch is not included in SRS
14.        Loop testing is ---------testing recinnique
            A)         White box         B)         Black box                    C)         Cobn box         D)         none of these
15.        White box tasting is also called as
            A)         Glass box testing          B)         Behavioral testing C)    Back to back testing D)  None of these
16.        The integrity of a system can be defined as------------
            A)         Integrity = [(1-threat) / (1-security)]                      B)         Integrity = [(1+threat) (1-secuirty)]
            C)         integrity = [(1+threat) / (1-security)]                     D)         Integrity = [(1- threat) (1-secuirty)]

17.        Which technique takes the divide and conquer approach to software project estimation?]
            A)         Divide and rule  B)         Software Sizing C)         Decomposition D)         Fuzzy logic

18.        Decomposition for function point based estimation focuses on?
            A)         Risk factor                                                       B)         Software values
            C)         Line of code                                                     D)         Information domain values

19.        What assumes that the mitigation efforts have failed and that the risk has become reality?
A)  Risk avoidance B)  Risk monitoring C)  Risk mitigation  D)Risk management & contingency planning

20.     The number of delivered lines of code, ‘L’, is related to effort and development time by the equation ________ Where ‘E’ is the development effort in person, ‘P’ is the productivity parameter and ‘t’ is the project.        
            A)         L = P/E4/3t1/3   B)         L = PE1/3t4/3    C)         L = PE4/3t1/3    D)         L = P/E1/3t4/3

21      A set of activities that have been developed to manage change throughout the life-cycle of computer software is________
            A)         Software project management                            B)         Software configuration management
            C)         Software project planning                                  D)         Software configuration planning

22.     What combines procedure and tools to manage different version of configuration objects that are created during the software process?
          A)           Task control                  B)         Version control  C)         Configuration control     D)         Process control

23.     Which strategy monitors the project for likely
          A)           Reactive strategy          B)         Intelligent strategy                     C)         Proactive strategy                     D)   Active strategy

24.     What the risk of building a product that no longer fits in to the overall business strategy for the company called?
          A)           Strategic risk     B)         market risk                    C)         Management risk                       D)         Budget risk

25.     ________ is the international standard for quality system containing a design/development component.
          A)           ISO       9000                 B)         ISO       9001                 C)         ISO       9002                 D)         ISO       9003

26.     A _________ technique is employed to create tests that reflect the dependencies exist among variables on the module interface.
          A)           Effect and cause graphing         B)         Cause and effect graphing
          C)           Error and cause graphing                       D)         Cause and error graphing
27.     The approach of __________ method is generic and assumption is made that all equivalent classes are dependent.
          A)           Command Line Testing              B)         Module interface Testing
          C)           Integration Testing                     D)         Domain Testing
28.     A weakness of _________ testing is that it tends to be insensitive to missing functions.
          A)           Black box                     B)         Whit box                       C)         Ad Hoc             D)         Loop

29.     _______ procedures are required to control and verify design activities to take the results from market research thought practical designs.
          A)           Quality system B)         Design Control C)         Contract review D)         Inspection
30.     Risk analysis means
          A)           Risk identification          B)         Risk assessment           C)         Risk Prioritization           D)         All the Above

31.     _______ is the ease of making changes required by changes in the operating environment.
          A)           Integrity            B)         Portability                     C)         Flexibility                      D)         Interoperability

32.     Involvement of debugging and other strategies for identifying where the error occurs in the code is called
          A)           Error detection B)         Error Removal   C)         Error Tracking    D)         Regression testing

33.     Risk can be divided into
          A)           Schedule          B)         Performance     C)         Cost                 D)         All the Above

34.     The degree of uncertainty that that product will be delivered on time is called.
          A)           Support risk                  B)         Scheduled risk  C)         Cost risk           D)         Performance risk

35.     Task set selector value greater then 2,4 has the degree of rigor
          A)           Casual  B)         Structured                     C)         Strict                D)         Quick reaction

36.     A _______ is a symbolic construction that represents some common and general feature or features of many objective or events.
          A)           Decision                       B)         Concept                        C)         Failure              D)         Exception
37.     In testing,_________  is the inability of a system to perform a required function according to its specifications
          A)           Error                             B)         Fault                             C)         Failure              D)         Exception
38.     A test plan should contain
          A)           Test deliverables           B)         Personal allocation                    C)         Schedule          D)         All the above
39.     Choose the quality criteria which has direct interrelationship.
          i) Usability Vs efficiency                           ii)          Correctness Vs Efficiency
          iii)           Maintainability Vs reusability                  iv)         Reusability Vs Relaiability
          v)            Portability Vs reusability
40.     Mach the following:
                        SET – A
                        i)          Democratic Decentralized                      ii)          Controlled Decentralized                        iii)   Controlled Centralized
                        SET – B
1.          The communication between the leader and team members is vertical
2.          This engineering team has no permanent leader
3.          This team has defined leader who coordinates specific tasks
4.          This team has no leader
41.        Choose the different approaches to the sizing problem suggested by Putnam and myers
            i)          Fuzzy bgicsizing            ii)          Feature point sizing       iii)         Standard Component sizing iv Change sizing
            A)         Project, performance     B)         Except ii                       C)         i & iii                 D)         i, ii, iii, v           
42.     _______ risk dentify schedule, personnel resource customer and requirement problems and their impact on a software project and ______ risks identify implementation interface verification and maintenance problem.
          A)           Project, performance     B)         Support, performance  C)         Project, Technical                      D)   Support, Schedule
43.     Choose the boundary ties described by Rigs
          i) The earliest finish                      ii)          The total float    iii)         The total time fortask initation
          iv)           The latest finish             v)         The total time for task completion
          A)           i, ii& iii  B)         Except iii & v    C)         Only i & iv                     D)         All the above
44.     Match the following :
                        Set – A
            i.          Qualities related to the operation of the system. ii)          Question related to the maintenance
                        Set – B
          1.            Fiexibility, testability and modifiability    2          Portability, interoperability and requsability
          3.            Correctness, reliability, efficiency, usability and integrity
         
          A)           i-3, ii-2  B)         i- 3, ii-1 C)         i- 3,ii- 1 D)         i- 2, ii – 3
45.     Match the following metrics with their descriptions
                        Set – A
          i.             Quality metrics ii)          Function oriented metrics           iii)         Technical metrics
                        Set – B
          1.            Focus on the characteristics such as logical complexity, degree of modularity etc.
          2.            Used to collect direct measures of development, process output and quality.
          3.            Provide an indication of how closely software conforms to the implicit or explicit customer requirements.
          4.            provide indirect measures
            A)         i- 3, ii- 4 iii- 1     B)         i- 2, ii- 4 iii- 1     C)         i- 3, ii- 1 iii- 4     D)         i- 3, ii- 1 iii- 2
46.     Which among the following are the prominent measures of software quality?
          1)            Maintainability               2)         Flexibility          3)         integrity            4)         usability            5)   Accessibility
          6)            Compatibility     7)         Correctness
          A)           1,3,4,7  B)         1, 3,4,5,6,         C)         1,2,3,4  D)         5,6,7,1
47.     What does the scope of the software describe?
          1.            Data and control to be processed
          2.            Function
          3.            Performance
          4.            Constrains
          5.            Interfaces
          6.            Reliability
          A)           1,4,5,6  B)         2,3,5,6  C)         1, 3,4,5,6          D)         1, 2, 3,4,5,6
48.     The degrees of rigor are _______
          1.            Casual  2.         Structured         3.         Balanced          4.         Strict                5.         Quick restion
          A)           1,3,4,5  B)         1,2,4,5  C          2,3,4,5  D)         1, 2,3,4,5
49.     Pick the correct statement from the below:
          1.            Quality is a Competitive issue
          2.            Quality is an essential for survival
          3.            Quality is an essential for international marketing
          4.            Quality is an essential for international marketing
            A)         All the above     B)         1,2,3,4  C          1,3,5     D)         2&4
50.     Boehm’s criteria of quality contains_______
          1.            Usability           2.         Clarity   3.         Efficiency         4.         Portability                     5.   Documentation
            A)         1, 2& 5  B)         2, 3, 4   C          1,3,4,5  D)         All the above

No comments:

Post a Comment