Software Engineering Mcqs

Non-occurrence of improper alteration of information is known as___________________?

(A) Available Dependability

(B) Confidential Dependability

(C) Maintainable Dependability

(D) Integral Dependability

Submitted By: Ali Uppal


All fault-tolerant techniques rely on__________________?

(A) Integrity

(B) Dependability

(C) Redundancy

(D) None of the mentioned

Submitted By: Ali Uppal


Which of the following Error Detection checks is not a part of Application detection ?

(A) Hardware checks

(B) Timing checks

(C) Reversal checks

(D) Coding checks

Submitted By: Ali Uppal


Which of the following approaches are used to achieve reliable systems?

(A) Fault prevention

(B) Fault removal

(C) Fault tolerance

(D) All of the mentioned

Submitted By: Ali Uppal


In N-version programming which is the independent generation of N, the value of N is___________________?

(A) greater than 1

(B) less than 1

(C) greater than 2

(D) less than 2

Submitted By: Ali Uppal


Submitted By: Ali Uppal


Submitted By: Ali Uppal


What is Cyclomatic complexity ?

(A) Black box testing

(B) White box testing

(C) Yellow box testing

(D) Green box testing

Submitted By: Ali Uppal


Lower and upper limits are present in which chart ?

(A) Run chart

(B) Bar chart

(C) Control chart

(D) None of the mentioned

Submitted By: Ali Uppal


Exhaustive testing is___________________?

(A) always possible

(B) practically possible

(C) impractical but possible

(D) impractical and impossible

Submitted By: Ali Uppal