VU Grand Quiz

CS605 Solved Grand Quiz Spring 2021

Welcome to CS605 Grand Quizzes at VUExamGuide.com – your ultimate destination for 100% Correct Answers! If you are a CS605 student at VU, seeking a reliable study resource to excel in your quizzes and exams, you’ve come to the right place.

Our CS605 Grand Quizzes cover a diverse range of topics, meticulously prepared by our expert team to ensure accuracy and clarity. With a focus on software engineering methodologies and practices, these quizzes will deepen your understanding and enhance your problem-solving skills in software development.

No more grappling with complex software engineering concepts or uncertain solutions! VUExamGuide.com empowers you to excel in CS605. Embrace the knowledge and skills you need to design, implement, and manage robust software systems.

Join us now and embark on a journey of academic excellence with CS605 Grand Quizzes. Prepare to shine and propel yourself towards a brighter future – start exploring VUExamGuide.com today!

CS605 SOLVED MCQs

Sr. NoMCQSANSWERS
 1Detect per function point is a______Metric
 2Which statement is correct?The greater the dependency  between the component is greater is coupling
 3________ technique was initially developed for manufacturing processes in the 1920s by Walter Shewart.Control chart
 4Hardware/software tools. People and reusable software components are considered as _________ for an organization.Resources  
 5In________ there is both vertical and horizontal communication.Controlled Decentralized( CD)
 6Requirements are sometimes filled with defects, normally known as _____requirements.Toxic requirements
 7A process model defines a task set which comprises of SE work task, milestone and_______Deliverables
 8______ activity is performed throughout software production.Quality assurance
 9The major activity related to software construction are:Requirement gathering, design development, coding, and testing
 10Estimation of the _______ is a prerequisite of all sorts o estimate, including, resources, time, and budget.Software scope
 11Which of the following is not a software measure?Defeats per function point
 12Capability maturity model (CMM) has______ levels.5
 13________ is the ability to encourage the people to create and feel creative.Innovation
 14________ model is a haphazard type of software development activity.Build and fix
 15A_______entity is the one which have any ________ in the problem domain without some other entity.Strong, role
 16The conceptual interface between the ‘internal’ application and the ‘external’ user world is known as_______Application boundary
 17Every project has a defined number of staff members. As time allocation occurs, project manager must ensure that no more than the allocated number of _______ has been scheduled at any given time.People
 18SEI stands for________Software Engineering Institute
 19We need to employ some statistical techniques and plot the results_______. These are known as statistical control techniques.Graphically  
 20Software Project Planning is an activity carried out by the______.Project Manager
 21________ is an object oriented model.Fountain
 22Files are the logical files that are the customer understands and must be maintained by the system.Internal  
 23In measuring process by using a control chart, if the gap between the defect reported and defect fixed is increasing.The product is in unusable condition
 24_________ is fundamental or providing mechanisms for objects evaluation of any process or activity. 
 25_____ lifecycle models appreciate the need for iteration within and between phases.Object-Oriented
 26_______of a product can be measured if we can measure its non-functional properties i.e. maintainability, integrity, and usability, etc.Quality
 27________dimension of Spiral model represented the cultivative cost to dateRadial
 28MOI model of leadership stands for.Motivation, Organization, Innovation
 29The important feature of extreme programming is the concept of_____Pair programming
 30If the gap between reported and defects fixed is decreasing then it means that the product is in __________ condition.Stable
 31After building the decision tree, the following formula is used to find the expected cost for an option. Choose the correct formula:Expected cost=?(path probability)i*(estimated path cost)
 32Extent to which access to software or data by unauthorized persons can be controlled, called ______Integrity
 33By default, every organization is working at________Level 1
 34Caper jhons is a famous researcher in the field of ______ who made a company named Software Productivity Research.Software engineering
 35 In Capability maturity model (CMM) ,______ performs optimaization.Level 5
 36Continuous process improvement is enabled by_____feedback from the _____.Qualitative, process
 37_________ can be the reason of project failure.Miscommunication
 38The _______model of software development is a useful approach when a customer cannot define requirements clearly.Prototyping
 39Capability maturity model (CMM) is used to judge the______level of an organization.Maturity
 40A ______provides a quantitative value of some attribute of a process or a product.Measure
 41In controlled centralized structure communication between team leader and the member is______.Vertical
 42Effective software project management focuses on the 4 P’s. These arePeople, product, process, project
 43Software ______ relates individual software measures to provide a normalized view.Metric
   44 Each process defines certain deliverables known as the________.Work products
 45FAST is a team-oriented approach to requirement gathering, the team FAST stands for:Facilitated Application Specification Techniques
 46_________ is fundamental for providing mechanisms for objective evaluation of any process or activity.Measuremnet
 47A PM has to first come up with the schedule and then monitor the_______of the project to ensure that things are happening accourding to the schedule. It would not be out of place to quote Fred Brooks at this point. He says” Project fall behind schedule ________at a time”.  Progress, one day
 48Certain reusable software component was to be developed by a/an ______ having no knowledge of its internal design standards.Third-party
 49The amount of “computing resources” required by a program to perform its function is called________.Efficiency
50 FTR stands for:Formal Technical Review
52 ________ engineering for software is a process for analyzing a program in an effort to create a representation of the program at a higher level abstraction than the source code.Reserve
 53A ________ provides a quantitative value of some attribute of a process or a product.Measure
 54A major issue in requirements engineering is the rate at at which requirements change once the requirements phase has “officially” ________.ENDED
 55We need to employ some statistical techniques and plot the results __________. These are known as statistical control techniques.Graphically
 56Effort required to test a program to ensure that it performs its intended function ________.Testability
 57Milestone represents:The defined target which you need to achieve
 58Configuration Auditing deals with:Ensuring that the changes have been implemented properly
 59A system is considered to be a legacy system if it has been in operation for ________ years. A legacy system has many components.Many
 60Which of the following is incorrect?Most faults are introduced during the coding phase
 61When more than one users interpret the same requirement in different ways then we can say that the requirement is:Ambigous
 62The amount of “computing resources”, required by a program to perform its function is __________.Efficiency
 63Configuration Status Reporting (CSR) reports onWhat happened?Who did it?When did it happen?All of the given  
 64In context of moving range and individual control charts, UNPL stands for:Upper Natural Process Limit
 65For a software the total number of requirements are equal to ________.Functional requirements + non functional requirements  
 66________ engineering does not simply create a modern equivalent of an older program, rather new user and technology requirements are integrated into the reengineering effort.Forward
 67Quality can be measured if we measure the _____ of the product.correctnessmaintainabilityintegrity and usabilityAll of the given options  
 68If an error related to requirements is identified in testing phase, this error will be considered as an error of ___________ phase.Requirements
 69Quality cost may be divided into costs associated with:Moving range control charts and Individual control charts  
 70Extent to which access to software or data by unauthorized persons can be controlled, is called ________.Integrity
 71_______ is one of the techniques used during severe deadline pressure.Time Boxing
 72Defects per function points is a ________.Metric
 73BAC stands forBudget at Completion
 74CPM stands for:Critical Path Model  
 75In context of “Individual control chart”, if a single metrics value lies outside UNPL, it means that:Process is out of control  
 76Which of the following is not TRUE about “Error Tracking”?During “Error Tracking”, we may also need the historical data from similar projects.  
 77Identify the most appropriate statement:The quality of the software specification is of extreme importance.  
 78BCWP refers to:Budgeted cost of work performed so far  
 79SQA is an umbrella activity in which following activities are performed EXCEPTInspection
 80BCWS for a task i will be equal to:Effort (person-days etc) for task i  
 81Schedule Performance Index (SPI) is equal toBCWP/BCWS
 82BCWS stands for:Budgeted Cost of Work Schedule  
 83Critical path defines:The chain of tasks that determines the duration of the project.  
 84The boundary time defines the following parameter(s) for a project:The latest time for task initiation before the minimum project completion time is delayedThe earliest finishThe latest finishAll of the given  
 85The equation to find out the Availability of software is:Availability = (MTTF / MTBF) x 100  
 84________ technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.Control Chart
85The software reengineering is a ________ activity.Non-Trival
86In order to use the PERT and CPM, which one of the following is NOT required?Teams communication mode details.  
87Defect removal efficiency is calculated as: Where E = errors found before delivery D = errors found after delivery (typically within the first year of operation)DRE = E/(E+D)  
88The extent to which a program can be reused in other applications is called ________Reusability
89MTTF is the abbreviation ofMean time to failure
90________ is the measure of how many defects are removed by the quality assurance processes before the product is shipped for operation.Defect removal efficiency  
91Effort required transferring the program from one hardware and/or software system environment to another.Portability
92Effort required to couple one system to anotherInteroperability
93Effort required to test a program to ensure that it performs its intended functionTestability
94Effort required to locate and fix an error in a programMaintainability
95Effort required to modify an operational programFlexibility
96The extent to which a program satisfies its specifications and fulfills the customer’s mission objectivesCorrectness
97The extent to which a program can be expected to perform its intended function with required precision.Reliability
98The amount of computing resources required by a program to perform its functionEfficiency
99Extent to which access to software or data by unauthorized persons can be controlled.Integrity
100Effort required to learn, operate, prepare input, and interpret output of a programUsability
101________ is one of the techniques to prepare project schedule once we have defined “task network” Program evaluation and review techniques (PERT)  
102Earned Value Analysis (EVA) is a ________ technique for assessing the progress of a project. Quantitative
103The more you refine the tasks, the more you can:Estimate task with accuracyConclude about scope with accuracySchedule the project with accuracyAll of the given  
104Quality assurance helps management in providing the necessary data about:Product Quality
105 The progress on a project at any given point in time can be calculated by:Adding all the BCWS till that point for all tasks  
106Defining a “Task Network” helps in defining:Sequence in which activities will be performed  
107Mean Time Between Failure (MTBF) can be calculated by:MTBF=MTTF+MTTR  
108________ engineering requires application of SE principles, methods, and concepts to re-create an existing application.Forward  
109Following are effective guidelines for Review EXCEPTTone should be high and strict  
110Which of the following is NOT an example of Software Configuration Item (SCI):Integration Plan  
 111Detect per function point is a______Metric
 112Which statement is correct?The greater the dependency  between the component is greater is coupling
 113________ technique was initially developed for manufacturing processes in the 1920s by Walter Shewart.Control chart
 114Hardware/software tools. People and reusable software components are considered as _________ for an organization.Resources  
 115In________ there is both vertical and horizaontal communication.Controlled Decentralized( CD)
 116Requirements are sometimes filled with defects, normally known as _____requirements.Toxic requirements
 117A process model defines a task set which comprises of SE work task, milestone and_______Deliverables
 118______ activity is performed throughout software production.Quality assurance
 119The major activity related to software construction are:Requirement gathering, design development, coding, and testing
 120Estimation of the _______ is a prerequisite of all sorts o estimate, including, resources, time, and budget.Software scope
 121Which of the following is not a software measure?Defeats per function point
 122Capability maturity model (CMM) has______ levels.5
 123________ is the ability to encourage the people to create and feel creative.Innovation
 124________ model is a haphazard type of software development activity.Build and fix
 125A_______entity is the one which have any ________ in the problem domain without some other entity.Strong, role
 126The conceptual interface between the ‘internal’ application and the ‘external’ user world is known as_______Application boundary
 127Every project has a defined number of staff members. As time allocation occurs, project manager must ensure that no more than the allocated number of _______ has been scheduled at any given time.People
 128SEI stands for________Software Engineering Institute
 129We need to employ some statistical techniques and plot the results_______. These are known as statistical control techniques.Graphically  
 130Software Project Planning is an activity carried out by the______.Project Manager
 131________ is an object oriented model.Fountain
 132Files are the logical files that are the customer understands and must be maintained by the system.Internal  
 133In measuring process by using a control chart, if the gap between the defect reported and defect fixed is increasing.The product is in unusable condition
 134_________ is fundamental or providing mechanisms for objects evaluation of any process or activity. 
 135_____ lifecycle models appreciate the need for iteration within and between phases.Object-Oriented
 136_______of a product can be measured if we can measure its non-functional properties i.e. maintainability, integrity, and usability, etc.Quality
 137________dimension of Spiral model represented the cultivative cost to dateRadial
 138MOI model of leadership stands for.Motivation, Organization, Innovation
 139The important feature of extreme programming is the concept of_____Pair programming
 140If the gap between reported and defects fixed is decreasing then it means that the product is in __________ condition.Stable
 141After building the decision tree, the following formula is used to find the expected cost for an option. Choose the correct formula:Expected cost=?(path probability)i*(estimated path cost)
 142Extent to which access to software or data by unauthorized persons can be controlled, called ______Integrity
 143By default, every organization is working at________Level 1
 144Caper jhons is a famous researcher in the field of ______ who made a company named Software Productivity Research.Software engineering
 145 In Capability maturity model (CMM) ,______ performs optimaization.Level 5
 146Continuous process improvement is enabled by_____feedback from the _____.Qualitative, process
 147_________ can be the reason of project failure.Miscommunication
 148The _______model of software development is a useful approach when a customer cannot define requirements clearly.Prototyping
 149Capability maturity model (CMM) is used to judge the______level of an organization.Maturity
 150A ______provides a quantitative value of some attribute of a process or a product.Measure
 151In controlled centralized structure communication between team leader and the member is______.Vertical
 152Effective software project management focuses on the 4 P’s. These arePeople, product, process, project
 153Software ______ relates individual software measures to provide a normalized view.Metric
    154Each process defines certain deliverables known as the________.Work products
 155FAST is a team-oriented approach to requirement gathering, the team FAST stands for:Facilitated Application Specification Techniques
 156_________ is fundamental for providing mechanisms for objective evaluation of any process or activity.Measuremnet
 157A PM has to first come up with the schedule and then monitor the_______of the project to ensure that things are happening accourding to the schedule. It would not be out of place to quote Fred Brooks at this point. He says” Project fall behind schedule ________at a time”.  Progress, one day
 158Certain reusable software component was to be developed by a/an ______ having no knowledge of its internal design standards.Third-party
 159The amount of “computing resources” required by a program to perform its function is called________.Efficiency

Leave a Reply

Your email address will not be published. Required fields are marked *