Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

**Software Engineering 2: Exam 1 Sample Questions** **Chapter 6: Architectural Design and Tactics** 1. **Architectural design is primarily concerned with** \_\_\_\_\_\_\_\_\_\_.\ A. Coding\ B. Testing\ C. Understanding how a software system should be organized\ D. Maintenance\...

**Software Engineering 2: Exam 1 Sample Questions** **Chapter 6: Architectural Design and Tactics** 1. **Architectural design is primarily concerned with** \_\_\_\_\_\_\_\_\_\_.\ A. Coding\ B. Testing\ C. Understanding how a software system should be organized\ D. Maintenance\ **Correct Answer: C**\ **Explanation:** Architectural design identifies the main structural components of a system and the relationships between them. 2. **The primary output of the architectural design process is** \_\_\_\_\_\_\_\_\_\_.\ A. Source code\ B. Architectural model\ C. Test cases\ D. User documentation\ **Correct Answer: B**\ **Explanation:** The architectural model describes how the system is organized as a set of communicating components. 3. **In the 4 + 1 view model of software architecture, the \"process view\" describes** \_\_\_\_\_\_\_\_\_\_.\ A. How the system is decomposed into modules\ B. The key abstractions in the system\ C. How the software components are distributed across hardware\ D. How at run-time the system is composed of interacting processes\ **Correct Answer: D** 4. **An architectural pattern is defined as** \_\_\_\_\_\_\_\_\_\_.\ A. A document outlining system requirements\ B. A reusable solution to a recurring design problem\ C. A specific coding language\ D. A type of software testing\ **Correct Answer: B**\ **Explanation:** Architectural patterns capture proven design practices that can be reused in different contexts. #### #### #### Architectural Tactics 5. **Which architectural tactic would best enhance the security of the banking application?**\ A. Intrusion Detection Systems\ B. Model-View-Controller (MVC) Pattern\ C. Microservices Architecture\ D. Caching\ **Correct Answer: A**\ **Explanation:** Implementing intrusion detection systems is essential for monitoring and protecting against unauthorized access. 6. **What architectural tactic can be used to improve the app\'s usability?**\ A. Shadow Operation\ B. User Initiative\ C. Redundant Pathways\ D. Service-Oriented Architecture\ **Correct Answer: B**\ **Explanation:** User initiative tactics enhance user interaction by providing functionalities that allow users to control the system. 7. **Which tactic would best support the availability of the healthcare management system?**\ A. Service Decomposition\ B. Load Balancing\ C. Version Control\ D. User-Centric Design\ **Correct Answer: B**\ **Explanation:** Load balancing distributes incoming traffic across multiple servers, improving availability and performance. 8. **Which architectural tactic would make the CRM system more adaptable to changes?**\ A. Monolithic Architecture\ B. Component-Based Architecture\ C. Hardcoding Requirements\ D. Centralized Database\ **Correct Answer: B**\ **Explanation:** A component-based architecture allows for easier updates and adaptations of individual components. 9. **Which architectural style would best support the startup\'s needs for scalability and modularity?**\ A. Monolithic Architecture\ B. Microservices Architecture\ C. Client-Server Architecture\ D. Layered Architecture\ **Correct Answer: B**\ **Explanation:** Microservices architecture allows for independent deployment of services, facilitating scalability and flexibility. 10. **Which architectural style would best facilitate continuous delivery and deployment of features for the social media platform?**\ A. Monolithic Architecture\ B. Microservices Architecture\ C. Layered Architecture\ D. Peer-to-Peer Architecture\ **Correct Answer: B**\ **Explanation:** Microservices architecture enables continuous delivery and deployment, allowing rapid feature updates. 11. **Which architectural style would be most suitable for integrating diverse tools and ensuring secure communication between them?**\ A. Client-Server Architecture\ B. Service-Oriented Architecture (SOA)\ C. Event-Driven Architecture\ D. Model-View-Controller (MVC)\ **Correct Answer: B**\ **Explanation:** SOA facilitates secure communication and integration of various services and applications. 12. **Which architectural style would be most effective for ensuring real-time updates and data consistency across multiple locations?**\ A. Distributed Architecture\ B. Layered Architecture\ C. Monolithic Architecture\ D. Event-Driven Architecture\ **Correct Answer: A**\ **Explanation:** Distributed architecture allows for data management across multiple locations while maintaining consistency and real-time updates. 13. **Which architectural style would best facilitate integration and collaboration across different departments in the ERP system?**\ A. Microservices Architecture\ B. Layered Architecture\ C. Service-Oriented Architecture (SOA)\ D. Monolithic Architecture\ **Correct Answer: C**\ **Explanation:** SOA allows different departments to integrate services efficiently and collaborate effectively. 14. **Which architectural style would best support the integration of diverse devices and ensure responsive control in the smart home automation system?**\ A. Event-Driven Architecture\ B. Layered Architecture\ C. Monolithic Architecture\ D. Client-Server Architecture\ **Correct Answer: A**\ **Explanation:** Event-driven architecture enables responsive control and integration of various devices from different manufacturers. 15. **Which architectural style would be most appropriate for ensuring separation of concerns in the online banking application?**\ A. Microservices Architecture\ B. Layered Architecture\ C. Event-Driven Architecture\ D. Client-Server Architecture\ **Correct Answer: B**\ **Explanation:** Layered architecture enhances maintainability by separating the application into distinct layers, such as presentation, business logic, and data access layers. ### Scenario-Based Questions A software application processes a high volume of user requests during peak hours, causing performance degradation. 16. **To reduce resource demand and improve performance, which tactic should the team implement?**\ A. Resource Arbitration\ B. User Initiative\ C. Data Compression\ D. Active Redundancy\ **Correct Answer: A**\ **Explanation:** Resource arbitration helps manage resource contention among multiple requests. By optimizing resource allocation and scheduling, the system can efficiently handle more requests without performance degradation. #### Scenario 2: Enhancing System Usability A newly developed task management tool has received feedback that users find it challenging to navigate. The design team wants to enhance usability without extensive redesign. 17. **Which architectural tactic would most effectively improve usability?**\ A. User Initiative\ B. Shadow Operation\ C. Data Redundancy\ D. Availability Tactics\ **Correct Answer: A**\ **Explanation:** Implementing user initiative tactics empowers users by providing functionalities that allow them to interact with the system effectively, improving usability. #### Scenario 3: Ensuring System Availability A financial application needs to maintain high availability, particularly during critical trading hours. The architecture must be robust to handle potential system failures. 18. **Which tactic should be used to enhance the availability of the application?**\ A. Intrusion Prevention\ B. Passive Redundancy\ C. Localized Modification\ D. User-Centric Design\ **Correct Answer: B**\ **Explanation:** Passive redundancy involves having backup systems that can take over if the primary system fails, ensuring the application remains available during critical periods. #### Scenario 4: Adapting to Changing Requirements Your team is developing a content management system that must frequently accommodate new features based on user feedback. The system\'s architecture is currently rigid. 19. **Which tactic would be most beneficial for improving the system\'s adaptability to new requirements?**\ A. Monolithic Architecture\ B. Component-Based Architecture\ C. Hardcoding Requirements\ D. Centralized Database\ **Correct Answer: B**\ **Explanation:** A component-based architecture allows for modular design, making it easier to update and adapt individual components without affecting the entire system. #### Scenario 5: Detecting System Faults A health monitoring system needs to detect faults promptly to ensure user safety. Implementing a proactive approach to fault management is crucial. 20. **Which tactic should be employed to effectively detect and manage faults in the system?**\ A. Exception Handling\ B. Shadow Operation\ C. Event Logging\ D. All of the Above\ **Correct Answer: D**\ **Explanation:** All these tactics can contribute to effective fault detection. Exception handling allows for immediate responses to errors, shadow operations can be used to test components without impacting the live system, and event logging provides historical data for diagnosing issues. #### Scenario 6: Securing Sensitive Information A government agency is developing a system to handle classified information, which requires strict security measures to prevent unauthorized access. 21. **Which architectural tactic is essential for ensuring the confidentiality of the data?**\ A. Intrusion Prevention\ B. Load Balancing\ C. Data Compression\ D. Active Monitoring\ **Correct Answer: A**\ **Explanation:** Intrusion prevention systems help protect against unauthorized **\ ** **Chapter 12: User Experience Design** 22. **User experience design focuses on** \_\_\_\_\_\_\_\_\_\_.\ A. Technical specifications\ B. Creating meaningful experiences for users\ C. Financial analysis\ D. None of the above\ **Correct Answer: B** 23. **The \"Skeleton\" of user experience design includes** \_\_\_\_\_\_\_\_\_\_.\ A. Visual design\ B. Interaction design and navigation design\ C. User needs assessment\ D. None of the above\ **Correct Answer: B**\ **Explanation:** The skeleton refers to the structure that supports user interactions within the design. 24. **Which of the following is a principle of usability engineering?**\ A. Increase complexity\ B. Minimize learning time for users\ C. Reduce feedback from users\ D. Keep all features hidden\ **Correct Answer: B**\ **Explanation:** Usability engineering aims to make products easier to learn and use. A design team is tasked with creating a new mobile application for managing personal finances. They want to ensure that the app is user-friendly and intuitive, following best practices in user interface design. 25. **Which of the following design decisions would best align with the golden rule of \"Reduce the user's memory load\"?** a. **Incorporating a feature that allows users to save their frequently used transactions for quick access.** b. Using a complex menu structure that requires users to memorize multiple steps to complete a transaction. c. Designing the app with minimal feedback, so users can figure out their next actions independently. d. Implementing multiple color schemes without user preference settings. **Correct Answer: a**\ **Explanation:** Saving frequently used transactions allows users to access them quickly without needing to remember details, effectively reducing their memory load. This design decision makes it easier for users to perform tasks efficiently, aligning with the golden rule of minimizing memory load in user interface design. An e-commerce company wants to redesign its online shopping website to enhance user experience. The team is focused on making the website more intuitive and easier to navigate. 26. **Which of the following changes would best adhere to the golden rule of \"Make the interface consistent\"?** a. **Using the same layout and terminology across all product categories to help users know what to expect.** b. Creating unique layouts for different product categories to cater to specific user preferences. c. Changing the color scheme and button styles on different pages to keep the design fresh. d. Randomizing the placement of navigation elements each time a user visits the site. **Correct Answer: a**\ **Explanation:** Maintaining the same layout and terminology across all product categories helps users know what to expect, which enhances their experience by providing a consistent interface. This adherence to consistency minimizes confusion and improves overall usability. **\ ** **Chapter 22: Project Management** 27. **Successful project management ensures that software is delivered** \_\_\_\_\_\_\_\_\_\_.\ A. At the lowest cost\ B. With minimal testing\ C. On time, within budget, and meets requirements\ D. Without any risks\ **Correct Answer: C** 28. **Risk management in software projects involves** \_\_\_\_\_\_\_\_\_\_.\ A. Ignoring potential problems\ B. Identifying, analyzing, and mitigating risks\ C. Avoiding communication with stakeholders\ D. None of the above\ **Correct Answer: B** 29. **Teamwork in software development is essential because** \_\_\_\_\_\_\_\_\_\_.\ A. It reduces individual accountability\ B. Most software projects cannot be completed by one person alone\ C. It increases competition among team members\ D. None of the above\ **Correct Answer: B**\ **Explanation:** Teamwork ensures that the diverse skills of team members are utilized effectively. 30. Which of the following is NOT a factor influencing project management? A. Compnay size, B. Software customers, C. **Programming language used** D. Software development processes Explanation: The programming language used is not typically a direct factor influencing project management. While the choice of programming language can have implications for certain aspects of a project, such as development speed, maintainability, and scalability, it is generally considered a technical consideration rather than a factor directly related to project management. Factors such as company size, software customers, and software development processes are more directly related to project management as they can influence project planning, execution, and delivery. **\ ** **Chapter 5: Requirement Engineering** 31. The questions for \_\_\_\_\_\_\_\_\_\_\_\_\_\_ interviews are already set and finalized before the meeting.  A. Open Interviews B. Semi-structured Interviews C. **Closed Interviews** D. All of these Explanation: Closed interviews, also known as structured interviews, involve a set list of questions that are prepared and finalized before the interview takes place. This ensures that all interviewees are asked the same questions in the same order, allowing for consistent data collection. Open and semi-structured interviews, on the other hand, allow for more flexibility in questioning. 32. Discussion and important matters and issues are discussed with the client in \_\_\_\_\_\_\_\_\_\_\_\_.  A. **Open Interviews** B. Closed Interviews C. Structured Interviews D. All of these 33. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ include both user requirements and system requirements specifications.  A. Software Specification B. User Requirement Dcoument C. Master Requirement Tracking Document D. **Software Requirement Document** Explanation: The Software Requirement Document (SRD), also known as the Software Requirements Specification (SRS), includes both user requirements and system requirements. User requirements describe what the users need from the system, while system requirements provide detailed specifications of the system\'s functionalities and constraints to meet those user needs. 34. The software requirement document is a design document and should specify how a system should do it not what a system should do.  A. True B. **False** 35. These Two (2) techniques can be used to validate the requirements:  A. **Prototyping** B. **Test-Case Generation** C. Quality Assurance D. Verifiability  **Prototyping** allows stakeholders to interact with a model of the system to ensure the requirements meet their needs and expectations.  **Test-Case Generation** involves creating test cases to verify that the system meets the specified requirements by running tests based on these cases. 36. \_\_\_\_\_\_\_\_\_\_\_\_\_\_ ensures that all requirements specified for a system are compatible, coherent, and free from contradictions. A. Completeness B. Validity C. **Consistency** D. Realism Explanation: Consistency in requirements engineering ensures that all requirements specified for a system are compatible, coherent, and free from contradictions. This means that different requirements do not conflict with each other and can coexist without issues within the same system. 37. Identify user functional requirement from the following: A. Authentication of user whenever he/she logs into the system. B. System shutsdown in case of a cyberattack. C. **A Verification email is sent to user whenever he/she registers for the first time on a software system.** D. Emails should be sent with a latency of no greater than 12 hours for such an activity. E. The processing of each request should be done within 10 seconds. F. The site should load in 3 seconds when the number of simultaneous users are \> 10000. Explanation: Functional Requirements specify what the system should do. They define specific behaviors or functions. a. Authentication of user whenever he/she logs into the system. (Functionality related to login) b. System shuts down in case of a cyberattack. (Functionality related to system response in case of an attack) c. A verification email is sent to user whenever he/she registers for the first time on a software system. (Functionality related to user registration) 38. Identify non-functional requirement(s) from the following: A. Authentication of user whenever he/she logs into the system. B. System shutsdown in case of a cyberattack. C. A Verification email is sent to user whenever he/she registers for the first time on a software system. D. **Emails should be sent with a latency of no greater than 12 hours for such an activity.** E. **The processing of each request should be done within 10 seconds.** F. **The site should load in 3 seconds when the number of simultaneous users are \> 10000.** Explanation: Non-functional requirements specify the quality attributes of a system, such as performance, usability, reliability, etc. The non-functional requirements from the given options are related to performance and response times: D. Emails should be sent with a latency of no greater than 12 hours for such an activity. (Performance requirement related to email latency) E. The processing of each request should be done within 10 seconds. (Performance requirement related to request processing time) F. The site should load in 3 seconds when the number of simultaneous users is \> 10000. (Performance requirement related to site load time under heavy user load)

Use Quizgecko on...
Browser
Browser