Software Engineering Questions PDF
Document Details
![ThrilledOrbit5612](https://quizgecko.com/images/avatars/avatar-4.webp)
Uploaded by ThrilledOrbit5612
Gdańsk University of Technology
Tags
Summary
This document contains a series of practice questions covering various topics in software engineering, including software lifecycle models, the SOLID principles, requirements engineering, and project management. The questions are designed to test knowledge of software development concepts.
Full Transcript
Prezentacja 1a The highest error correction cost should be expected for errors uncovered during software: a) Usage & maintenance -----> 100-1000x b) Definition -----> 1x c) Construction -----> 10-100x d) Deployment...
Prezentacja 1a The highest error correction cost should be expected for errors uncovered during software: a) Usage & maintenance -----> 100-1000x b) Definition -----> 1x c) Construction -----> 10-100x d) Deployment -----> coś innego What is the proportion of (fully) successful IT projects in recent years, according to "Chaos Reports"? a) About 1/3 ----> 31% successful b) About 1/2 ----> 50% challanged c) About 2/3 (19% failed) d) About 90% Requirements analysis does NOT include: a) Identifying conflicts and inconsistencies b) Assigning requirements to categories c) Selecting stakeholders’ representatives d) Prioritizing requirements Prezentacja 1b A requirement expressing that the system must be failure-free for a specified period of time is a: a) Performance requirement ----> ile userow moze napierdalac b) Reliability requirement ----> jak dlugo ma sie nie spierdolic c) Security requirement ----> nikt go nie zhakuje d) Safety requirement ----> żeby nie odjebał nic niebezpiecznego xd Prezentacja 2 Which of the following is NOT an assumption of the waterfall model? a) Going back to previous stages is prohibited. b) Each stage concerns the entire developed system. c) The sequence of stages is fixed and does not change. d) Each next stage begins after the previous one is completed. The moment of system’s acceptance by the customer is called: a) Go live ----> the moment usage can be started b) Delivery ----> acceptance of the system by the customer c) Deployment ----> activities aimed at enabling usage of the IT system d) Installation ----> activity of DEPLOYMENT. Nie zwiazane z pytaniem Which software lifecycle model is not based on the idea of iterative development: a) Incremental ----> A kind of iterative development, where the goal of each iteration is to add a new portion of functionality b) Spiral ----> Combines iterative development with risk management, where the project is developed in repeated cycles c) V ----> A linear and sequential model where each development phase has a corresponding testing phase d) Prototyping ----> An iterative process where a prototype is built, tested, and refined multiple times until it meets requirements. Which of the following is the phase of the V lifecycle model? a) Prototype evaluation b) Black box testing c) Debugging d) Integration testing In development according to the V-model, the first tests performed will be: a) Regression tests b) Integration tests c) Acceptance tests d) Unit tests Which is NOT a main area of Requirements Engineering: a) Requirements elicitation 1. Elicitation --- 2. Analysis b) Requirements management 3. Specification --- 4. Validation c) Requirements implementation 5. Managment d) Requirements validation The “L” in SOLID principles is for: a) Liskov substitution principle b) Low coupling between classes principle c) Local encapsulation of changes principle d) Limited class responsibility principle The "I" from SOLID principles can be paraphrased as: a) Interactions between subsystems should be minimal b) Instantiation of classes should be done in runtime c) Identification of common properties between classes should result in generalization d) It is better to use many small interfaces than one complex interface The “D” from SOLID principles stands for: a) Data hiding b) Dependency inversion wysokie levele nie powiny polegac na niskich. Oba powinny byc abstrakcyjne c) Deterministic behavior d) Design by principle A wrong instruction or data definition in the software source code is: a) An error ----> – the state or behavior of the program which deviates from expectations (but may not be visible) b) A code smell ----> Zwiazane z refactoring c) A failure ----> program’s inability to deliver some functions (visible to users) d) A defect ----> a wrong instruction or data definition in the program The state or behavior of the program which deviates from expectations is: a) An error b) A bug (defect) c) A failure d) A defect (bug) An incorrect instruction in the program code is called: a) Defect b) Error c) Failure d) Debugging Which is the valid causal relationship (“→” meaning that the element to the left is the cause of the element to the right): a) Defect → Error → Failure (human mistake pierwszy) b) Defect → Failure → Error c) Failure → Defect → Error d) Error → Defect → Failure Which is NOT an activity belonging to the deployment area: a) Training courses for users b) Refactoring ----> modification of the internal code structure, which does not change its observable behavior c) Data migration d) Audit/certification Prezentacja 6 Which sub-area of requirements engineering is dedicated to confirmation of requirements by the stakeholders? a) Requirements analysis Analizowanie i procesowanie zebranych... b) Requirements validation potwierdzenie czy wszystko jest okej c) Requirements elicitation identyfikacja i zbieranie wymagań d) Requirements management Bycie consistent i lekkie modyfikacje A requirement specifying the hardware and/or software platforms the system must operate on is a: a) Performance requirement ile ludzi mozesz wjebac ile danych itp b) Reliability requirement failure free – system sie nie spierdoli c) Portability requirement system dostepny na roznych urzadzeniach d) Usability requirement chuj wie co to bait po prostu Non-functional requirements specifying the devices, platforms, and browsers the system must operate on are: a) Portability b) Flexibility c) Reliability d) Configurability A requirement identifying the most probable directions of a system’s further extensions/modifications is a: a) Portability requirement b) Flexibility requirement c) Availability requirement d) Configurability requirement SMART approach is dedicated to: a) Defining system goals b) Evaluating possible system architectures c) Managing IT projects d) Prioritizing requirements 6. Which is NOT a method of synchronizing access to shared global resources: a) Design pattern b) Guardian object c) DBMS mechanisms d) Locks 7. Business Logic layer is dependent on: a) Service layer b) None other layer c) Presentation layer d) Data layer 10. Changes made in the deployed and used IT system resulting from environment changes (DBMS, application server, web browsers, etc.) are called ___ maintenance: a) Adaptive b) Perfective c) Corrective d) Preventiv 3. Which of the following belongs to the architecture design (system design, high-level design)? a) Adoption of SOLID principles b) Designing algorithms (and the data structures they need) c) Handling boundary states of system operation d) Optimization of class structure 7. Which of the following is NOT a category of design patterns? a) Functional b) Structural c) Behavioral d) Creational 8. Changes made in the deployed and used IT system resulting from user requests for new functions or features are called... maintenance: a) Preventive b) Perfective c) Corrective d) Adaptive 9. "The system shall be developed using Spring Framework" is a: a) Non-functional (quality) requirement b) Product-related constraint c) Functional requirement d) System goal Numerowane pytania i odpowiedzi: 1. Which of the following is a non-functional (quality) requirement? a) The system shall be developed and deployed in 18 months' time b) A complete set of documentation related to testing shall be delivered to the customer c) The quality assurance in the project shall be conducted by an independent, third- party team d) The downtime (unavailability) of the system shall not exceed 0.5% 2. Interviews can be used to elicit: a) Functional requirements only b) All requirements except constraints c) Business goals only d) Virtually all kinds of requirements 3. Business Logic layer provides its services to: a) No other layer b) Data layer c) Presentation layer d) Network layer 4. Which discipline does cryptography belong to? a) Software Engineering (SE) b) Both disciplines (CS & SE) c) Computer Science (CS) d) Neither CS nor SE 5. What is on the lowest level of hierarchical models of software quality? a) Attributes b) Metrics c) Characteristics d) Design solutions 6. Changes made in the deployed and used IT system resulting from defects reported by users are called ___ maintenance. a) Preventive b) Corrective c) Adaptive d) Perfective 7. A traceability matrix is used for: a) Defining team member responsibilities b) Estimating project costs c) Analyzing dependencies between requirements d) Evaluating possible system architectures 8. A characteristic NOT specific to software compared to other technologies is: a) Ease of introducing changes b) No wear and tear or random defects c) Structural freedom d) Ease of estimating effort 9. The scope of a system project (high-level architecture) does NOT include: a) Optimizing class structure b) Defining system overload and failure handling c) Decisions about physical subsystem distribution d) Choosing an approach to data container management 10. The ATAM method is used for: a) Tasks in business analysis b) Evaluating possible system architectures c) Analyzing dependencies between requirements d) Analyzing user characteristics 11. Which of the following is NOT a category of requirements: a) User requirements b) Analytical patterns c) Business rules d) Constraints 12. One of the techniques used in the area of requirements validation is: a) Root cause analysis b) Observations c) MoSCoW d) Prototyping 13. A system stakeholder CANNOT: a) Be inanimate b) Be unwilling to cooperate c) Come from outside the client’s organization d) Lack a justified right to influence the system 14. What is the correct order of system layers?: a) Presentation, Services, Business Logic, Data b) Presentation, Business Logic, Services, Data c) Presentation, Business Logic, Services, Data d) Services, Presentation, Business Logic, Data 15. Requirements analysis does NOT include: a) Identifying conflicts and inconsistencies b) Assigning requirements to categories c) Selecting stakeholders’ representatives d) Prioritizing requirements 16. Which is NOT a main area of Requirements Engineering: a) Requirements elicitation b) Requirements management c) Requirements implementation d) Requirements validation 17. Which is NOT a method of synchronizing access to shared global resources: a) Design pattern b) Guardian object c) DBMS mechanisms d) Locks 18. Business Logic layer is dependent on: a) Service layer b) None other layer c) Presentation layer d) Data layer 19. Changes made in the deployed and used IT system resulting from environment changes (DBMS, application server, web browsers, etc.) are called ___ maintenance: a) Adaptive b) Perfective c) Corrective d) Preventive 20. Which is NOT an activity belonging to the deployment area: a) Training courses for users b) Refactoring c) Data migration d) Audit/certification 21. A requirement expressing that the system must be failure-free for a specified period of time is a: a) Performance requirement b) Reliability requirement c) Security requirement d) Safety requirement 22. Which of the following belongs to the architecture design (system design, high- level design)? a) Adoption of SOLID principles b) Designing algorithms (and the data structures they need) c) Handling boundary states of system operation d) Optimization of class structure 23. The "I" from SOLID principles can be paraphrased as: a) Interactions between subsystems should be minimal b) Instantiation of classes should be done in runtime c) Identification of common properties between classes should result in generalization d) It is better to use many small interfaces than one complex interface 24. What is the proportion of (fully) successful IT projects in recent years, according to "Chaos Reports"? a) About 1/3 b) About 1/2 c) About 2/3 d) About 90% 25. Which sub-area of requirements engineering is dedicated to confirmation of requirements by the stakeholders? a) Requirements analysis b) Requirements validation c) Requirements elicitation d) Requirements management 26. Which of the following is NOT a category of design patterns? a) Functional b) Structural c) Behavioral d) Creational 27. Changes made in the deployed and used IT system resulting from user requests for new functions or features are called... maintenance: a) Preventive b) Perfective c) Corrective d) Adaptive 28. "The system shall be developed using Spring Framework" is a: a) Non-functional (quality) requirement b) Product-related constraint c) Functional requirement d) System goal 29. Which of the following is the phase of the V lifecycle model? a) Prototype evaluation b) Black box testing c) Debugging d) Integration testing 41. Which of the following is NOT a method of synchronizing access to shared global resources? a) Guardian object b) Locks c) Design pattern d) DBMS mechanisms 42. The Hawthorne effect is: a) Deviation from the main purpose of a meeting caused by personal dislike b) Deliberately altered behavior of people who know they are being observed c) A situation in which the interlocutor prefers to give an answer rather than admit lack of knowledge d) A situation in which a participant of an event becomes too tired to notice what is happening 43. The design of a company's network and its elements, such as firewall, proxy, etc., are best illustrated using: a) Subsystem diagrams b) Collaboration diagrams c) Deployment diagrams d) Component diagrams 44. What categories of requirements can be elicited through interviews? a) Only business goals and functional requirements b) Practically all c) Only: business goals, functional requirements, and non-functional requirements d) All except business rules 45. The highest cost of correction should be expected for errors detected during the stage of: a) Definition b) Construction c) Deployment d) Usage and maintenance 46. Which weakness of the classical model is the V-model intended to improve? a) Detachment of the development process from users/stakeholders b) Low flexibility in case of changes c) Assumption of requirement stability d) High cost of fixing an overlooked defect 47. The requirement that indicates the most probable directions for further system expansions/modifications is: a) Portability requirement b) Configurability requirement c) Flexibility requirement d) Availability requirement 48. Which of the following is a model of an iterative development cycle? a) V-model b) Waterfall c) Cowboy coding d) Prototyping 49. Which of the following methods is NOT a requirement elicitation technique? a) Workshops b) Feasibility study c) Prototyping d) Observation 50. Which software development lifecycle model utilizes dedicated functionalities (e.g., new subsystems)? a) Incremental b) Prototyping c) V-model d) Waterfall 51. Which characteristic does NOT have to be true for every plan-driven methodology? a) It works best for large projects and teams. b) It is aligned with the waterfall development model. c) It has well-defined processes describing actions and products. d) A project plan is created at the beginning of the project. 52. Software maintenance is an area dedicated to: a) Introducing changes to the IT system after its deployment b) Debugging and fixing defects c) Monitoring quality metrics of the running system d) Configuration management 53. Which of the following values is NOT among the four expressed in the Agile Manifesto? a) Individuals and interactions over processes and tools b) Working software over comprehensive documentation c) Freedom over centralized management d) Customer collaboration over contract negotiation 54. What is the relationship between system users and stakeholders? a) Every stakeholder is a user. b) Every user is a stakeholder. c) Some users are stakeholders. d) Users and stakeholders are two separate, mutually exclusive groups. 55. Which of the following is NOT a category of requirements? a) Analytical patterns b) Business rules c) User requirements d) Constraints 56. The main causes of project failures originate in the areas of: a) Analysis and design b) Configuration management c) Requirements and project management d) Implementation and testing 57. Which of the following methods is NOT agile (agile methodology)? a) Cowboy coding b) Extreme programming c) Scrum d) Feature-driven development 58. The moment of system acceptance by the client is: a) Audit b) Deployment c) Go-live d) System acceptance 59. Which is NOT a main area of requirements engineering? a) Requirements validation b) Requirements implementation c) Requirements elicitation d) Requirements management 60. One of the techniques used in the area of requirements validation is: a) Observations b) Prototyping c) Root cause analysis d) MoSCoW 61. The business logic layer provides its services to: a) No other layer b) Network layer c) Presentation layer d) Data layer 62. Which of the following belongs to architecture design (system design, high- level design)? a) Designing algorithms (and data structures for them) b) Adopting SOLID principles c) Handling boundary conditions d) Optimizing class structure 63. For a typical IT system, the cost of its maintenance: a) Increases over time b) Is independent of time c) Decreases over time d) Remains constant 64. The scope of a class design (low-level design) includes: a) Handling boundary conditions b) Using design patterns c) Synchronizing access to global resources d) Defining subsystems and their interfaces 65. Which of the following phases is a phase of the V-model lifecycle? a) Debugging b) Integration testing c) Black-box testing d) Prototype evaluation 66. A requirement expressing the expected number of users simultaneously using the system and/or the expected amount of data is a: a) Availability requirement b) Usability requirement c) Performance requirement d) Flexibility requirement 71. A characteristic that is NOT specific to software compared to other technologies is: a) Immaterial product b) No structural limitations c) Requirement volatility d) Focused on design, not production 72. To which field(s) does Machine Learning belong? a) Computer Science (CS) b) Software Engineering (SE) c) Neither CS nor SE d) Both CS and SE 73. A quality requirement ensuring that the system will not endanger its target environment (e.g., harm people, destroy property) is: a) Reliability b) Security c) Safety d) Portability 74. Do non-functional requirements influence system architecture decisions? a) Only for safety-critical and mission-critical systems b) No, architecture depends only on functional requirements c) They shouldn't, but sometimes they do in practice d) Yes, this is very likely 75. Which of the following requirements elicitation techniques requires a moderator? a) Workshops b) Prototyping c) Observation d) Interviews 76. The scope of system design (high-level architecture) does NOT include: a) Defining handling of transitional and failure states of the system b) Decisions about the physical deployment of subsystems c) Choosing the approach to data container management d) Optimization of class structure 77. Which of the following is NOT an area of software development? a) Analysis b) Deployment c) Team management d) Implementation 78. What does the 1:10 rule say about defects? a) About 10% of defects are usually not found during testing. b) For every 10 corrected defects, one additional side effect is introduced. c) The cost of detecting and correcting defects can increase tenfold at each subsequent development phase. d) 1 in 10 defects is critical, while the rest have low priority. 79. A design pattern is: a) A general, reusable solution to a commonly occurring problem within a given context b) A guide on how to design a system in a given programming language or framework c) A library providing a set of specific functions d) An algorithm for solving a specific problem 80. The activities performed within system design (architecture design, high- level design) include: a) Defining system topology b) Designing relationship implementation c) Use of design patterns d) Database schema design 81. The business logic layer depends on: a) Data layer b) Service layer c) No other layer d) Presentation layer 82. Which of the following is NOT an area of project management? a) Time management b) Scope/stakeholder management c) Risk management d) Corporate resource management 83. Which of the following is NOT a category of design patterns? a) Creational b) Structural c) Functional d) Behavioral 84. The activities performed within system design (architecture design, high- level design) include: a) Use of design patterns b) Database schema design c) Choosing the approach to data container management d) Designing relationship implementation 85. A specific characteristic of software in relation to other technologies is NOT: a) Ease of estimating workload b) Ease of making changes c) Lack of wear and random errors d) Structural flexibility 86. Which subarea of requirements engineering is used to confirm requirements with stakeholders? a) Requirements validation b) Requirements analysis c) Requirements management d) Requirements elicitation 87. Which of the following requirements is non-functional (quality-related)? a) The system will be developed and deployed within 18 months. b) The system's downtime (unavailability) must not exceed 0.5%. c) Quality assurance in the project is conducted by an independent, external team. d) The client receives a complete set of documentation related to testing. 88. A state or behavior of a program that deviates from expectations is: a) Failure b) Error c) Test case d) Defect 89. A system stakeholder CANNOT: a) Be unwilling to cooperate b) Come from outside the client’s organization c) Lack a justified right to influence the system d) Be non-living 90. The "I" principle in the SOLID set of best practices states that: a) Interactions between systems should be minimal. b) Defining common properties between classes should result in generalization. c) It is better to use many small interfaces rather than a single complex interface. d) Class instantiation should take place at runtime. 91. A requirement specifying the hardware and/or software platforms on which the system must operate is: a) Portability requirement b) Performance requirements c) Usability requirement d) Reliability requirement 92. The "L" in the SOLID principles stands for: a) The principle of local encapsulation b) The Liskov Substitution Principle c) The principle of limited class responsibility d) The principle of low coupling between classes 93. Which software development lifecycle model is NOT based on the idea of iterative development? a) Spiral b) Prototyping c) Incremental d) V-model 94. One of the techniques for requirements elicitation is: a) Static analysis b) Traceability matrix c) Presenting d) Clicktracking 95. Changes introduced in a deployed and operational IT system due to changes in the environment (DBMS, application server, web browsers, etc.) are called... maintenance: a) Preventive b) Corrective c) Adaptive d) Perfective 96. What is the correct order of system layers? a) Presentation, Business Logic, Services, Data b) Services, Presentation, Business Logic, Data c) Presentation, Services, Business Logic, Data d) Presentation, Business Logic, Data, Services 97. Requirements analysis does NOT include: a) Selecting stakeholder representatives b) Identifying conflicts and inconsistencies c) Establishing priorities d) Assigning requirements to categories 98. A non-functional requirement defining how much and to what extent the system should be easily expandable is a requirement concerning: a) Availability b) Flexibility c) Portability d) Configurability 99. Which of the following concepts is NOT related to the deployment phase? a) User training b) Audit/certification c) Data migration d) Refactoring 100. The scope of system design (architecture, high-level) does NOT include: a) Design of algorithms and data structures for them b) Identification of concurrency c) Definition of subsystem interfaces d) Selection of an approach to data container management Pytania kontynuacja: 101. Which is the correct cause-and-effect relationship? a) Goals → Requirements → Design Solutions b) Requirements → Goals → Design Solutions c) Goals → Design Solutions → Requirements d) Design Solutions → Goals → Requirements 102. Which of the following is a design pattern? a) Optimizer b) Polymorphism c) Composite d) SOLID 103. Non-functional requirements specifying how much time and possibly during which periods the system may be unavailable refer to: a) Availability b) Flexibility c) Reliability d) Performance 104. Which of the following characteristics is a common feature of Agile methods? a) Comprehensive testing of each software module b) Retrospectives held after each iteration c) Teamwork with intensive, direct collaboration d) Reduced engineering effort requirements 105. The "O" principle in the SOLID set of best practices states that: a) A class should have a single responsibility. b) Operations in classes should not be overloaded. c) A class should be open for extension but closed for modification. d) Objects should have a defined belonging to classes. 106. Agile methodologies include: a) PRINCE2 b) Team Software Process c) Cowboy Coding d) Extreme Programming 107. Which of the following is NOT an Agile methodology? a) Scrum b) Extreme Programming c) Cowboy Coding d) Feature-Driven Development 108. A system stakeholder CANNOT: a) Be reluctant to cooperate b) Belong to an organization other than the customer’s c) Be non-human d) Lack a justifiable right to influence the system 109. What percentage of costs spent on IT projects are currently spent on maintenance? a) 10–20% b) 95% c) 5% d) 60–80% 110. Which is NOT an example of a system goal (business goal)? a) Increase of profits b) Additional marketing efforts c) Printout of invoices d) Decrease of costs related to business processes 111. 113. Which of the following is NOT an area of project management? a) Enterprise resource management b) Scope/stakeholder management c) Time management d) Risk management 114. What should NOT be included in SRS (Software Requirements Specification)? a) Constraints b) Design patterns used c) Functional requirements d) User characteristics 115. How many physical units (nodes) can a system based on 3-tier architecture be deployed to? a) 3 b) 1–2 c) 2–3 d) 1–3 116. Which one of the following does NOT belong to the description structure of design patterns? a) Requirements b) Consequences c) Solution d) Problem