MCA-5
MC0084
Software Project Management and Quality Assurance
1. Putnam and Myers approach, which used the approximate
reasoning techniques, is called.
A) Functional
point sizing B) Standard Component Sizing
C) Effort
validation D) Defined responsibilities
2. The degree of uncertainty that the product will be delivered
on time is called.
A) Support
risk B) Schedule risk C) Cost risk D) Performance
risk
3. Task set selector value greater than 2,4 then degree of
rigor is______
A) Casual B) Structured C) Strict D) Quick reaction
4. ________ Metric is used to make predictions about the
software later in the life cycle.
A) Descriptive B) Future C) Predictive D) None
of these
5. Defect type number ‘70’ – means________
A) Build
package B) Data C) Interface D) Function
6. Involvement of debugging and other
strategies for identifying where the error occurs in the error occurs in the
code is called. _______
A) Error
detection B) Error Removal C) Error Tracking D) Regression
testing
7. _______ testing is where all possible pants through the code
defined and covered.
A) Path B) Loop C) Basis path D) Data
flow
8. _______ activity overlay the software process model
A) Software
quality assurance B) Software configuration management
C) Work
products D) All the above
9. In the project Resource pyramid ________ sits at the
foundation of the structure
A) People B) Hardware/Software
tools C) Reusable software D) Primary resources
10. In SQA plan, _________ section identifies all the
organization that will be affected by the new software.
A SIDs B) Resource C) Software Requirement D) Design
document
11. Testing the design of a project is called
A) Acceptance
testing B) Design testing
C) Integration
testing D) System testing
12. Choose the approaches to structural testing.
A) Control
flow based testing B) Data flow based testing
C) Mutation
testing D) All the above
13. ‘Inconsisency’ in SRS means
A) Contradiction
in requirements B) Multriple meanings of requirement C) Inconect facts recorded in SRS D) Requirement witch is not included in
SRS
14. Loop testing is
---------testing recinnique
A) White box B)
Black box C) Cobn box D) none of
these
15. White box tasting is also called as
A) Glass box
testing B) Behavioral testing C) Back to back testing D) None
of these
16. The integrity of a system can be defined as------------
A) Integrity
= [(1-threat) / (1-security)] B) Integrity = [(1+threat) (1-secuirty)]
C) integrity
= [(1+threat) / (1-security)] D) Integrity = [(1- threat) (1-secuirty)]
17. Which technique takes the divide and conquer approach to
software project estimation?]
A) Divide and rule B) Software Sizing C) Decomposition D) Fuzzy
logic
18. Decomposition for function point based estimation focuses on?
A) Risk
factor B) Software values
C) Line of
code D) Information domain values
19. What assumes that the mitigation efforts have failed and that
the risk has become reality?
A) Risk avoidance B) Risk
monitoring C) Risk mitigation D)Risk management & contingency
planning
20. The number of delivered lines of code, ‘L’,
is related to effort and development time by the equation ________ Where ‘E’ is
the development effort in person, ‘P’ is the productivity parameter and ‘t’ is
the project.
A) L =
P/E4/3t1/3 B) L = PE1/3t4/3 C) L = PE4/3t1/3 D) L = P/E1/3t4/3
21 A set of activities that have been
developed to manage change throughout the life-cycle of computer software
is________
A) Software
project management B) Software configuration management
C) Software
project planning D) Software configuration planning
22. What combines procedure and tools to manage
different version of configuration objects that are created during the software
process?
A) Task
control B) Version control C) Configuration
control D) Process control
23. Which strategy monitors the project for
likely
A) Reactive
strategy B) Intelligent strategy C) Proactive strategy D) Active strategy
24. What the risk of building a product that no
longer fits in to the overall business strategy for the company called?
A) Strategic
risk B) market risk C) Management risk D) Budget
risk
25. ________ is the international standard for
quality system containing a design/development component.
A) ISO 9000 B) ISO 9001 C) ISO 9002 D) ISO 9003
26. A _________ technique is employed to create
tests that reflect the dependencies exist among variables on the module
interface.
A) Effect
and cause graphing B) Cause and effect graphing
C) Error
and cause graphing D) Cause and error graphing
27. The approach of __________ method is
generic and assumption is made that all equivalent classes are dependent.
A) Command
Line Testing B) Module interface Testing
C) Integration
Testing D) Domain Testing
28. A weakness of _________ testing is that it
tends to be insensitive to missing functions.
A) Black
box B) Whit box C) Ad
Hoc D) Loop
29. _______ procedures are required to control
and verify design activities to take the results from market research thought
practical designs.
A) Quality
system B) Design Control C) Contract review D) Inspection
30. Risk analysis means
A) Risk
identification B) Risk assessment C) Risk
Prioritization D) All the Above
31. _______ is the ease of making changes
required by changes in the operating environment.
A) Integrity B) Portability C) Flexibility D) Interoperability
32. Involvement of debugging and other
strategies for identifying where the error occurs in the code is called
A) Error
detection B) Error Removal C) Error Tracking D) Regression testing
33. Risk can be divided into
A) Schedule
B) Performance C) Cost D)
All the Above
34. The degree of uncertainty that that product
will be delivered on time is called.
A) Support
risk B) Scheduled risk C) Cost risk D) Performance
risk
35. Task set selector value greater then 2,4
has the degree of rigor
A) Casual B) Structured C) Strict D) Quick reaction
36. A _______ is a symbolic construction that
represents some common and general feature or features of many objective or
events.
A) Decision
B) Concept C) Failure D) Exception
37. In testing,_________ is the inability of a system to perform a
required function according to its specifications
A) Error
B) Fault C) Failure D) Exception
38. A test plan should contain
A) Test
deliverables B) Personal allocation C) Schedule D) All the above
39. Choose the quality criteria which has
direct interrelationship.
i) Usability
Vs efficiency ii) Correctness Vs Efficiency
iii) Maintainability
Vs reusability iv) Reusability Vs Relaiability
v) Portability
Vs reusability
40. Mach the following:
SET – A
i) Democratic Decentralized ii) Controlled Decentralized iii) Controlled Centralized
SET – B
1.
The communication between the leader and team
members is vertical
2.
This engineering team has no permanent leader
3.
This team has defined leader who coordinates
specific tasks
4.
This team has no leader
41. Choose the different approaches to the sizing problem
suggested by Putnam and myers
i) Fuzzy
bgicsizing ii) Feature point sizing iii) Standard
Component sizing iv Change sizing
A) Project,
performance B) Except ii C) i & iii D) i,
ii, iii, v
42. _______ risk dentify schedule, personnel
resource customer and requirement problems and their impact on a software
project and ______ risks identify implementation interface verification and maintenance
problem.
A) Project,
performance B) Support, performance C) Project,
Technical D) Support, Schedule
43. Choose the boundary ties described by Rigs
i) The
earliest finish ii) The total float iii) The total time
fortask initation
iv) The
latest finish v) The total time for task completion
A) i,
ii& iii B) Except iii & v C) Only i & iv D) All
the above
44. Match the following :
Set – A
i. Qualities
related to the operation of the system. ii) Question related to the maintenance
Set – B
1. Fiexibility,
testability and modifiability 2 Portability, interoperability and
requsability
3. Correctness,
reliability, efficiency, usability and integrity
A) i-3,
ii-2 B) i-
3, ii-1 C) i-
3,ii- 1 D) i-
2, ii – 3
45. Match the following metrics with their
descriptions
Set – A
i. Quality
metrics ii) Function oriented metrics iii) Technical metrics
Set – B
1. Focus
on the characteristics such as logical complexity, degree of modularity etc.
2. Used
to collect direct measures of development, process output and quality.
3. Provide
an indication of how closely software conforms to the implicit or explicit
customer requirements.
4. provide
indirect measures
A) i-
3, ii- 4 iii- 1 B) i- 2, ii- 4 iii- 1 C) i-
3, ii- 1 iii- 4 D) i- 3, ii- 1 iii- 2
46. Which among the following are the prominent
measures of software quality?
1) Maintainability 2) Flexibility 3) integrity 4) usability 5) Accessibility
6) Compatibility 7) Correctness
A) 1,3,4,7 B) 1,
3,4,5,6, C) 1,2,3,4 D) 5,6,7,1
47. What does the scope of the software
describe?
1. Data
and control to be processed
2. Function
3. Performance
4. Constrains
5. Interfaces
6. Reliability
A) 1,4,5,6 B) 2,3,5,6 C) 1,
3,4,5,6 D) 1, 2, 3,4,5,6
48. The degrees of rigor are _______
1. Casual 2. Structured 3. Balanced 4. Strict 5. Quick restion
A) 1,3,4,5 B) 1,2,4,5 C 2,3,4,5 D) 1,
2,3,4,5
49. Pick the correct statement from the below:
1. Quality
is a Competitive issue
2. Quality
is an essential for survival
3. Quality
is an essential for international marketing
4. Quality
is an essential for international marketing
A) All
the above B) 1,2,3,4 C 1,3,5 D) 2&4
50. Boehm’s criteria of quality contains_______
1. Usability 2. Clarity 3. Efficiency
4. Portability 5. Documentation
A) 1,
2& 5 B) 2, 3, 4 C 1,3,4,5 D) All the above
No comments:
Post a Comment