System Development process is also called as ……………..
A) System Development Life Cycle
B) System Life Cycle
C) Both A and B
D) System Process Cycle

1 Answer

Answer :

A) System Development Life Cycle

Related questions

Description : Which process model is also called as classic life cycle model? (A) Waterfall model (B) RAD model (C) Prototyping model (D) Incremental model

Last Answer : (A) Waterfall model

Description : DLC stands for A) System Development Life Cycle B) Structure Design Life Cycle C) System Design Life Cycle D) Structure development Life Cycle

Last Answer : A) System Development Life Cycle

Description : ………… is a good example of deterministic system. A) Life cycle B) Computer Program C) Software Program D) None of the above

Last Answer : B) Computer Program

Description : State true or false for the following statements in Java. i) Java beans slow down software development process. ii) Java Servlets do not have built in multithreading feature. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : A) i-false, ii-false

Description : To create vehicle of information to provide evidence in the development process and to monitor the process. This is one of the objectives of A) Analysis B) Design C) Development D) Documentation

Last Answer : D) Documentation

Description : Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level (A) Performed (B) Managed (C) Defined (D) Optimized

Last Answer : (C) Defined

Description : The ................ model is preferred for software development when the requirements are not clear. (A) Rapid Application Development (B) Rational Unified Process (C) Evolutionary Model (D) WaterfallModel

Last Answer : (C) Evolutionary Model

Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.

Last Answer : Answer: 3

Description : Given the following two statements: S1: If L1 and L2 are recursively enumerable languages over ∑, then L1⋃L2 and L1⋂L2 are also recursively enumerable. S2: The set of recursively enumerable languages is countable. ... correct (C) Both S1 and S2 are not correct (D) Both S1 and S2 are correct

Last Answer : (D) Both S1 and S2 are correct

Description : Consider the following two commands C1 and C2 on the relation R from an SQL database:  C1: drop table R; C2: delete from R; Which of the following statements is TRUE? I. Both C1 and C2 delete the schema for R. II. C2 ... R. (A) I only (B) I and II only (C) II and III only (D) I, II and III

Last Answer : (C) II and III only

Description : Briefly explain the steps involved in a fetch cycle?

Last Answer : Answer :Fetch cycle is the time required to fetch an opcode from a particular location in memory. General Fetch Cycles consist of 3T states. The first T state involves the sending of the memory address ... . For slower memories the processors has the provision to get in to the WAIT cycles as well.

Description : Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz input clock. Assume that the microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What ... (A) 8x106 bytes/sec (B) 4x106 bytes/sec (C) 16x106 bytes/sec (D) 4x109 bytes/sec 

Last Answer : (B) 4x106 bytes/sec

Description : A CPU handles interrupt by executing interrupt service subroutine................. (A) by checking interrupt register after execution of each instruction (B) by checking interrupt register ... cycle (C) whenever an interrupt is registered (D) by checking interrupt register at regular time interval

Last Answer : (A) by checking interrupt register after execution of each instruction

Description : A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average ... of the DMA transfer? (A) 0.06% (B) 0.12% (C) 1.2% (D) 2.5%

Last Answer : Answer: B

Description : A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes? (A) 0.64 (B) 0.96 (C) 2.00 (D) 0.32

Last Answer : Answer: D Explanation: in 1ms : refresh = 32 times Memory cycle = 1ms/250ns = 106ns/250ns = 4000 times Therefore, % of refresh time = (32 x 100ns)/(4000 x 250ns) = 3200ns/1000000 x 100% = 0.32%

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true

Last Answer :  (B) Both (a) and (b) are true

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true

Last Answer : D) i, ii & iv are true

Description : . Costs for a computer based information system include the salaries of the system analysts and computer programmers. costs for a computer based information system include the ... ) Development, Development B) Development, Operating C) Operating, Development C) Operating, Operating

Last Answer : B) Development, Operating

Description : State True or False. i) Master Development Plan basically is a schedule of various applications to be comprised. ii) It consists of start and finish dates of a system analysis, design implementation and maintenance activities. ... B) i-False, ii-True C) i-True, ii-False D) i-False, ii-False

Last Answer : A) i-True, ii-True

Description : ………… is a sort of blueprint of the system Development Effort. A) MDP B) DMP C) MPD D) DPM

Last Answer : A) MDP

Description : ………………….. means coordinated effort, to communicate the information of the system written form. A) System documentation B) Resource required C) Development schedule D) User Document

Last Answer : A) System documentation

Description : In Java variables, if first increment of the variable takes place and then the assignment occurs. This operation is also called ............................. . A) pre increment B) post increment C) incrementation D) pre incrementation

Last Answer : A) pre increment

Description : Stack is also called as A) Last in first out B) First in last out C) Last in last out D) First in first out

Last Answer : A) Last in first out

Description : The unit of dispatching is usually referred to as a ………….. A) Thread B) Lightweight process C) Process D) Both A and B

Last Answer : D) Both A and B

Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true

Last Answer : (A) (a) is true, (b) is false

Description : The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is A. tee B. tr C. sort D. grep E. None of the above

Last Answer : A. tee

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is true about the static member variable in C++. i) It is initialized to zero when the first object of its class is created. Other initialization is also permitted. ii) It is visible only within ... , ii-True B) ii-False, ii-True C) i-True, ii-False D) i-False, iii-False

Last Answer : B) ii-False, ii-True

Description : State true or false. i) An empty tree is also a binary tree. ii) In strictly binary tree, the outdegree of every node is either o or 2. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

Last Answer : C) i-true, ii-true

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : The output of executing string.ascii_letters can also be achieved by: a) string.ascii_lowercase_string.digits b) string.ascii_lowercase+string.ascii_upercase c) string.letters d) string.lowercase_string.upercase

Last Answer : d) string.lowercase_string.upercase

Description : Given the following statements : S1 : If L is a regular language then the language {uv | uϵL, vϵLR} is also regular. S2 : L = {wwR} is regular language. Which of the following is true ? (A) S1 is not ... S2 is correct. (C) S1 is correct and S2 is not correct. (D) S1 is correct and S2 is correct.

Last Answer : (C) S1 is correct and S2 is not correct.

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.

Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.

Description : In 3G network, W-CDMA is also known as UMTS. The minimum spectrum allocation required for W-CDMA is .......... (1) 2 MHz (2) 20 KHz (3) 5 KHz (4) 5 MHz

Last Answer : Answer: 4

Description : Which statement is not true about process 0 in the Unix operating system? (A) Process 0 is called init process. (B) Process 0 is not created by fork system call. (C) After forking process 1, process 0 becomes swapper process. (D) Process 0 is a special process created when system boots.

Last Answer : (A) Process 0 is called init process.

Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager

Last Answer : (B) Hardware abstraction layer

Description : The output of problem definition stage is …………….. A) Master Development Plan B) Terms of reference C) Feasibility report D) Final product

Last Answer : B) Terms of reference

Description : …………………… is a schedule of various applications to be computerized. A) Materials planning B) Master development Plan C) Manufacturing organization D) None of the above

Last Answer : B) Master development Plan

Description : MDP stands for A) Master Development Plan B) Master Design Program C) Mandatory Database Program D) Master Database Plan

Last Answer : A) Master Development Plan

Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost

Last Answer : (D) Hardware maintenance cost