The software ................. of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them. (A) Design (B) Architecture (C) Process (D) Requirement

1 Answer

Answer :

(B) Architecture

Related questions

Description : To which one of the following aspects does an established pattern of relationships among the components of an organization refer ? (A) Organization strategy (B) Organization structure (C) Organization process (D) Organization policy

Last Answer : Answer: Organization structure

Description : The quick design of a software that is visible to end users leads to ............ (A) iterative model (B) prototype model (C) spiral model (D) waterfall model 

Last Answer : (B) prototype model

Description : Which model is used to compute the effort required to  integrate reusable components or program code that is  automatically generated by design or program translation  tools? a) An application-composition model b) A post-architecture model c) A reuse model d) An early design model

Last Answer : c) A reuse model

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III

Last Answer : (A) I, II, III & IV

Description : If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is: (A) 1 + S3/S1 (B) 1 - S3/S1 (C) 1 + S1/S3 (D) 1 - S1/S3

Last Answer : (B) 1 - S3/S1

Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.

Last Answer : C) Manipulation & processing of database.

Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation

Last Answer : (C) Requirement design

Description : Which of the following is not included in waterfall model ? (A) Requirement analysis (B) Risk analysis (C) Design (D) Coding

Last Answer : (B) Risk analysis

Description : Which one of the following non-functional quality attributes is not highly affected by the architecture of the software ? (A) Performance (B) Reliability (C) Usability (D) Portability

Last Answer : (C) Usability

Description : Which of the following statement(s) is/are true with respect to software architecture? S1: Coupling is a measure of how well the things grouped together in a module belong together logically. S2: Cohesion is a measure of the ... ) Only S1 and S2 (2) Only S3 (3) All of S1, S2 and S3 (4) Only S1

Last Answer : Answer: 2

Description : The study of homologous structures in mature organism provides evidence for the evolutionary relationships among certain groups of organisms. Which fi

Last Answer : The study of homologous structures in mature organism provides evidence for the evolutionary ... Biochemistry C. Geology D. Comparative anatomy

Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above

Last Answer : D) None of above

Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.

Last Answer : (D) Both S1 and S2 are correct.

Description : A variable is defined within a block in a body of a function. Which of the following are true? A) It is visible throughout the function. B) It is visible from the point of definition to the end ... visible from the point of definition to the end of the block. D) It is visible throughout the block.

Last Answer : D) It is visible throughout the block.

Description : Which of the following is true about the static member variable in C++. i) It is initialized to zero when the first object of its class is created. Other initialization is also permitted. ii) It is visible only within ... , ii-True B) ii-False, ii-True C) i-True, ii-False D) i-False, iii-False

Last Answer : B) ii-False, ii-True

Description : _____________ is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers). A. Virtualization B. Service-Oriented Architecture C. Grid Computing D. Utility Computing

Last Answer : Virtualization

Description : Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) the changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes (D) all of the above

Last Answer : (D) all of the above

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : Which model assumes that systems are created fromreusable  components, scripting or database programming? a) An application-composition model b) A post-architecture model c) A reuse model d) An early design model

Last Answer : a) An application-composition model

Description : A .................... architecture assigns only a few essential functions to the kernel, including address spaces, Inter process communication(IPC) and basic scheduling. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : B) Micro kernel

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : What are the three components and the major parts of each that comprise the skeletal system?

Last Answer : What is the answer ?

Description : Functional system testing is: a) testing that the system functions with other systems b) testing that the components that comprise the system function together c) testing the end to end functionality of the system as a whole d) testing the system performs functions within specified response times

Last Answer : c) testing the end to end functionality of the system as a whole

Description : Itis the task of the __to locate externally defined symbols in programs, load them in to memory by placing their __ of symbols in calling program: a. Loader and name b. Linker and values c. Linker and name d. Loader and values

Last Answer : d. Loader and values

Description : DLC stands for A) System Development Life Cycle B) Structure Design Life Cycle C) System Design Life Cycle D) Structure development Life Cycle

Last Answer : A) System Development Life Cycle

Description : Requirement Development, Organizational Process Focus, Organizational Training, Risk Management and Integrated Supplier Management are process areas required to achieve maturity level (A) Performed (B) Managed (C) Defined (D) Optimized

Last Answer : (C) Defined

Description : What are the three major components of glycerophospholipids, the main component of lipid bilayers that comprise cellular membranes?

Last Answer : Glycerol, a phosphate group, fatty acid chains

Description : Software testing is (A) the process of establishing that errors are not present. (B) the process of establishing confidence that a program does what it is supposed to do. (C) the process of ... as per specifications. (D) the process of executing a program with the intent of finding errors. 

Last Answer : (D) the process of executing a program with the intent of finding errors.

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Design is not just the pattern or the style of a newspaper. It is the architecture on the basis of which the whole structure is built. What does the word architecture mean? a) White space b) Important c) Structural design d) None of these

Last Answer : c) Structural design

Description : Advantages of system flowcharts …………………. A) Effective communication B) Effective analysis C) Queasier group or relationships D) All A, B, C

Last Answer : D) All A, B, C

Description : Which of the following attempts to understand relationships among phenomena as they naturally occur, without any intervention? a. Ex post facto research b. Experimental research c. Prospective design d. Retrospective design

Last Answer : a. Ex post facto research

Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV

Last Answer : (B) I and III

Description : …………………. is a group of interested components working together towards a common goal by accepting inputs and producing outputs in an organized transformation process. A) System B) Network C) Team D) System Unit

Last Answer : A) System

Description : Architecture of the database can be viewed as (A) two levels. (B) four levels. (C) three levels. (D) one level.

Last Answer : (C) three levels

Description : extendible architecture is A. Modular design of a software application that facilitates the integration of new modules B. Showing a universal law or rule to be invalid by providing a counter example C. ... of attributes in a database table that refers to data in another table D. None of these

Last Answer : A. Modular design of a software application that facilitates the integration of new modules

Description : Capri is a brand of cigarette that is low tar and slim in design to appeal to women. In this instance, women comprise Capri's: A)marketing mix B)target market C)target audience D)marketing strategy E)marketing opportunity

Last Answer : B)target market

Description : MDP stands for A) Master Development Plan B) Master Design Program C) Mandatory Database Program D) Master Database Plan

Last Answer : A) Master Development Plan

Description : Which design metric is used to measure the compactness of the program in terms of lines of code? (A) Consistency (B) Conciseness (C) Efficiency (D) Accuracy

Last Answer : (B) Conciseness

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2 are two relationships between E1 and E2 where R1 is one-many and R2 is many-many. R1 and R2 do not have any ... are required to represent this situation in the Relational Model? (A) 4 (B) 3 (C) 2 (D) 1

Last Answer : (B) 3 

Description : Based on the identification of objectives, input, output and file content, the vital document is called … A) System Definition B) System Document C) System Requirement Document D) System Subject

Last Answer : B) System Document

Description : The major shortcoming of waterfall model is (A) the difficulty in accommodating changes after requirement analysis. (B) the difficult in accommodating changes after feasibility analysis. (C) the system testing. (D) the maintenance of system.

Last Answer : (A) the difficulty in accommodating changes after requirement analysis.

Description : ………… is a good example of deterministic system. A) Life cycle B) Computer Program C) Software Program D) None of the above

Last Answer : B) Computer Program