The degree of interaction between two modules is known as
(a)
Cohesion (b)
Strength (c)
Inheritance
(d)
Coupling (e)
Instantiation.
15.
The relationship between a derived class (or subclass) and base class is
referred to as
(a)
Association (b)
Inheritance (c)
Polymorphism
(d)
Instantiation (e)
Aggregation.
16.
Myers (1978) identifies seven levels of cohesion. Which level of cohesion
may be defined as followed; "the output from one element in the
component serves as input for some other element"?
(c) Communicational
cohesion (d)
Temporal
cohesion (e)
None of these.
17.
A design is said
to be a good design if the components are
(a)
Strongly coupled
(b)
Weakly cohesive
(c)
Strongly coupled and Weakly cohesive
(d)
Strongly coupled and strongly cohesive
(e) Strongly cohesive
and weakly coupled.
18.
If a control
switch is passed as an argument this is an example of _______ coupling.
(a)
Content (b)
Common (c)
Control (d)
Stamp (e)
Data.
19.
Which of the
following is a type of abstraction?
(a)
Data (b)
Procedural (c)
Iteration
(d) All of the
above (e)
None of the above.
20.
In the classical
chief programmer team approach, the team member responsible for maintaining
the detailed design and coding is
(a)
The chief programmer
(b)
The programming secretary
(c)
A specialized function that exists outside 'the team'
(d)
The individual coder (i.e. programmer)
(e)
The back-up programmer.
Answers
11.
Answer : (c)
Expla: The
sole use of the rapid prototype is to determine what the client's real needs
are as rapidly as possible. The rapid prototype is then effectively discarded
so its internal structure is not relevant.
12.
Answer : (e)
Expla: There
are many risks involved in software development.
13.
Answer : (e)
Expla: A
simple way of looking at the spiral software life-cycle model is as a
waterfall model with each phase proceeded by risk analysis.
14.
Answer : (d)
Expla: The
degree of interaction between two modules is known as coupling.
15.
Answer : (b)
Expla: A
derived class inherits all the attributes of a base class.
16.
Answer : (e)
17.
Answer : (e)
Expla: You
should aim to maximize the interaction within a module and minimize the
interaction between modules.
18.
Answer : (c)
Expla: Two
modules are control coupled if one passes an element of control to another.
19.
Answer : (d)
Expla: The
three types of abstraction (data, procedural and iteration) are all instances
of the more general concept of information hiding.
20.
Answer : (d)
Expla: In the
classical chief programmer team approach, the team member responsible for
maintaining the detailed design and coding is the individual coder (i.e.
programmer).
1.
Identify, from among the following, the correct statement.
(a) One of the main challenges Software Engineering facing today is the requirement of most software systems to work with a multitude of homogenous systems
(b) ‘Legacy systems’ are custom developed software systems for the legal domain
(c) Software does not wear-out in the traditional sense of the term, but software does tend to deteriorate as it evolves
(d) Since software is essentially ‘intangible’ it is relatively easy to manage software projects
(e) With the advent of component based software assembly, we find that only less than 20% of today’s software is still custom built.
2.
Software Engineering:
(a) Is a set of rules about developing software products
(b) Has been around as a discipline since the early 50’s
(c) Started as a response to the so-called ‘Software Crisis’ of the late 90’s
(d) Is an engineering discipline concerned with all the aspects of software production
(e) Is now a mature discipline on par with other established engineering fields.
3.
Read the following paragraph and identify the correct statement.
“Imagine that you were recently hired as a software engineer to a company that specializes in aircraft navigation control software. While orientating yourselves to the company’s work practices, you observe that they in fact do not conduct a few tests that they should in order to comply with the relevant safety standard. When you inquire about this from the project manager, he dismisses it saying that those tests are really unnecessary (and takes an unreasonably long time to conduct, as well as being superfluous) and that they have managed with the other tests for so long, without any problems.”
(a) You should immediately resign from the company and file a complaint with the relevant standard institution
(b) You should do nothing and let the matter slide
(c) Although you are new to the company, and you hardly know anything about the internal processes and politics, you should insist on the company changing its work practices immediately; failing which you threaten to report the matter
(d) Since you are new to the company, and you are unfamiliar with the internal processes and politics, you should first find-out more about the issue and its background
(e) None of the above statements are correct.
4.
With regard to Evolutionary development, identify the correct statement.
(a) Evolutionary development usually comes in two flavors; exploratory development, and throw-away prototyping
(b) Very large projects are natural candidates for an evolutionary development based approach
(c) Exploratory development is used in situations where most of the requirements are well understood in advance
(d) One of the strong points of evolutionary development is that it facilitates easy project management, through the high volume of documentation it generates
(e) Often the construction of a throw-away prototype is not followed by a reimplementation of the system using a more structured approach.
5.
What is the fundamental reason that software cannot be considered to be engineered?
(a) It is designed by humans and therefore flawed
(b) Software engineering (as opposed to other forms of engineering, such as Civil) is an art - not a science
(c) The discipline is relatively new, say in comparison to bridge building that is an activity that has millennia of practice
(d) None of these are true. Software Engineering is a truly rigorous discipline
(e) The complexity of systems and their interaction continues faster than we can understand it.
6.
The software life cycle can be said to consist of a series of phases. The classical model is referred to as the waterfall model. Which phase may be defined as "The concept is explored and refined, and the client's requirements are elicited?"
(a) Requirements (b) Specification (c) Design
(d) Implementation (e) Integration.
7.
The individual or organisation who wants a product to be developed is known as the:
(a) Developer (b) User (c) Contractor (d) Initiator (e) Client.
8.
Which of the following items should not be included in the software project management plan?
(a) The techniques and case tools to be used
(b) Detailed schedules, budgets and resource allocations
(c) The life cycle model to be used
(d) The organisational structure of the development organisation, project responsibilities, managerial objectives and priorities
(e) None of the above.
9.
The final form of testing COTS software is _________ testing.
(a) Unit (b) Integration (c) Alpha (d) Module (e) Beta.
10.
In the maintenance phase the product must be tested against previous test cases. This is known as __________ testing.
(a) Unit (b) Integration (c) Regression (d) Module (e) Beta.
21.Multiple Regression means (a)Data are modeled using a straight line (b)Data are modeled using a curve line (c)Extension of linear regression involving only one predicator value (d)Extension of linear regression involving more than one predicator value (e)All (a), (b), (c) and (d) above. 22.Which of the following should not be considered for each dimension attribute? (a)Attribute name (b)Rapid changing dimension policy (c)Attribute definition (d)Sample data (e)Cardinality. 23.A Business Intelligence system requires data from: (a)Data warehouse (b)Operational systems (c)All possible sources within the organization and possibly from external sources (d)Web servers (e)Database servers. 24.Data mining application domains are (a)Biomedical (b)DNA data analysis (c)Financial data analysis (d)Retail industry and telecommunication industry (e)All (a), (b), (c) and (d) above. 25.The generalization of multidimensional attributes of a complex object class can be performed by examining each attribute, generalizing each attribute to simple-value data and constructing a multidimensional data cube is called as (a)Object cube (b)Relational cube (c)Transactional cube (d)Tuple (e)Attribute. 26.Which of the following project is a building a data mart for a business process/department that is very critical for your organization? (a)High risk high reward (b)High risk low reward (c)Low risk low reward (d)Low risk high reward (e)Involves high risks. 27.Which of the following tools a business intelligence system will have? (a)OLAP tool (b)Data mining tool (c)Reporting tool (d)Both(a) and (b) above (e)(a), (b) and (c) above. 28.Which of the following is/are the Data mining tasks? (a)Regression (b)Classification (c)Clustering (d)inference of associative rules (e)All (a), (b), (c) and (d) above. 29.In a data warehouse, if D1 and D2 are two conformed dimensions, then (a)D1 may be an exact replica of D2 (b)D1 may be at a rolled up level of granularity compared to D2 (c)Columns of D1 may be a subset of D2 and vice versa (d)Rows of D1 may be a subset of D2 and vice versa (e)All (a), (b), (c) and (d) above. 30.Which of the following is not an ETL tool? (a)Informatica (b)Oracle warehouse builder (c)Datastage (d)Visual studio (e)DT/studio.
Answers
Ans Explanation
21.DMultiple Regression means extension of linear regression involving more than one predicator value.
22.BRapid changing dimension policy should not be considered for each dimension attribute.
23.AA business Intelligence system requires data from Data warehouse
24.EData mining application domains are Biomedical, DNA data analysis, Financial data analysis and Retail industry and telecommunication industry
25.AThe generalization of multidimensional attributes of a complex object class can be performed by examining each attribute, generalizing each attribute to simple-value data and constructing a multidimensional data cube is called as object cube.
26.AHigh risk high reward project is a building a data mart for a business process/department that is very critical for your organization
27.ABusiness intelligence system will have OLAP, Data mining and reporting tolls.
28.ERegression, Classification and Clustering are the data mining tasks.
29.AIn a data warehouse, if D1 and D2 are two conformed dimensions, then D1 may be an exact replica of D2.
11.Data modeling technique used for data marts is (a)Dimensional modeling (b)ER – model (c)Extended ER – model (d)Physical model (e)Logical model.
12.A warehouse architect is trying to determine what data must be included in the warehouse. A meeting has been arranged with a business analyst to understand the data requirements, which of the following should be included in the agenda? (a)Number of users (b)Corporate objectives (c)Database design (d)Routine reporting (e)Budget.
13.An OLAP tool provides for (a)Multidimensional analysis (b)Roll-up and drill-down (c)Slicing and dicing (d)Rotation (e)Setting up only relations.
14.The Synonym for data mining is (a)Data warehouse (b)Knowledge discovery in database (c)ETL (d)Business intelligence (e)OLAP.
15.Which of the following statements is true? (a)A fact table describes the transactions stored in a DWH (b)A fact table describes the granularity of data held in a DWH (c)The fact table of a data warehouse is the main store of descriptions of the transactions stored in a DWH (d)The fact table of a data warehouse is the main store of all of the recorded transactions over time (e)A fact table maintains the old records of the database.
16.Most common kind of queries in a data warehouse (a)Inside-out queries (b)Outside-in queries (c)Browse queries (d)Range queries (e)All (a), (b), (c) and (d) above.
17.Concept description is the basic form of the (a)Predictive data mining (b)Descriptive data mining (c)Data warehouse (d)Relational data base (e)Proactive data mining.
18.The apriori property means (a)If a set cannot pass a test, all of its supersets will fail the same test as well (b)To improve the efficiency the level-wise generation of frequent item sets (c)If a set can pass a test, all of its supersets will fail the same test as well (d)To decrease the efficiency the level-wise generation of frequent item sets (e)All (a), (b), (c) and (d) above.
19.Which of following form the set of data created to support a specific short lived business situation? (a)Personal data marts (b)Application models (c)Downstream systems (d)Disposable data marts (e)Data mining models.
20.What is/are the different types of Meta data? I.Administrative. II.Business. III.Operational. (a)Only (I) above (b)Both (II) and (III) above (c)Both (I) and (II) above (d)Both (I) and (III) above (e)All (I), (II) and (III) above.
Answers
Ans AND Explanation
11.AData modeling technique used for data marts is Dimensional modeling.
12.DRoutine reporting should be included in the agenda.
13.CAn OLAP tool provides for Slicing and dicing.
14.CThe synonym for data mining is Knowledge discovery in Database.
15.DThe fact table of a data warehouse is the main store of all of the recorded transactions over time is the correct statement.
16.AThe Most common kind of queries in a data warehouse is Inside-out queries.
17.BConcept description is the basis form of the descriptive data mining.
18.BThe apriori property means to improve the efficiency the level-wise generation of frequent item sets.
19.DDisposable Data Marts is the form the set of data created to support a specific short lived business situation.
20.EThe different types of Meta data are Administrative, Business and Operational.
1.A collection of data designed to be used by different people is called a/an
(a)Organization
(b)Database
(c)Relationship
(d)Schema
(e)None of the above.
1.Answer : (b)
Explaination: A collection of data designed to be used by different people is called a data base.
2.Which of the following is the oldest database model?
(a)Relational
(b)Deductive
(c)Physical
(d)Network
(e)Hierarchical.
2.Answer : (d)
Explaination: Network Model is the oldest database model.
3.Which of the following schemas does define a view or views of the database for particular users?
(a)Internal schema
(b)Conceptual schema
(c)Physical schema
(d)External schema
(e)Outer schema.
3.Answer : (d)
Explaination: External Schema define a view or views of the database for particular users.
4.Which of the following is an attribute that can uniquely identify a row in a table?
(a)Secondary key
(b)Candidate key
(c)Foreign key
(d)Alternate key
(e)None of the above.
4.Answer : (b)
Explaination: Candidate Key following is an attribute that can uniquely identify a row in a table.
5.Which of the following is the process of selecting the data storage and data access characteristics of the database?
(a)Logical database design
(b)Physical database design
(c)Testing and performance tuning
(d)Evaluation and selecting
(e)External database design.
5.Answer : (b)
Explaination: Physical database design is the process of selecting the data storage and data access characteristics of the database.
6.Which of the following terms does refer to the correctness and completeness of the data in a database?
(a)Data security
(b)Data constraint
(c)Data independence
(d)Data model
(e)Data integrity.
6.Answer : (e)
Explaination: Data integrity refer to the correctness and completeness of the data in a database.
7.The relationship between DEPARTMENT and EMPLOYEE is a
(a)One-to-one relationship
(b)One-to-many relationship
(c)Many-to-many relationship
(d)Many-to-one relationship
(e)None of the above.
7.Answer : (b)
Explaination:: The relationship between DEPARTMENT and EMPLOYEE is a one-to-many relationship.
8.A table can be logically connected to another table by defining a
(a)Super key
(b)Candidate key
(c)Primary key
(d)Unique key
(e)Common attribute.
8.Answer : (c)
Explaination: A table can be logically connected to another table by defining a Primary Key.
9.If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called
(a)Consistent state
(b)Parallel state
(c)Durable state
(d)Atomic state
(e)Inconsistent state.
9.Answer : (e)
Explaination: If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called in consistent state.
10.Ensuring isolation property is the responsibility of the
(a)Recovery-management component of the DBMS
(b)Concurrency-control component of the DBMS
(c)Transaction-management component of the DBMS
(d)Buffer management component in DBMS
(e)Query processor in DBMS.
10.Answer : (b)
Explaination: Ensuring isolation property is the responsibility of the concurrency-control component of the DBMS
1. Which of the following is the most important when deciding on the data structure of a data mart?
(a) XML data exchange standards
(b) Data access tools to be used
(c) Metadata naming conventions
(d) Extract, Transform, and Load (ETL) tool to be used
(e) All (a), (b), (c) and (d) above.
1. B Data access tools to be used when deciding on the data structure of a data mart.
2. The process of removing the deficiencies and loopholes in the data is called as
(a) Aggregation of data
(b) Extracting of data
(c) Cleaning up of data.
(d) Loading of data
(e) Compression of data.
2. C The process of removing the deficiencies and loopholes in the data is called as cleaning up of data.
3. Which one manages both current and historic transactions?
(a) OLTP
(b) OLAP
(c) Spread sheet
(d) XML
(e) All (a), (b), (c) and (d) above.
3. B Online Analytical Processing (OLAP) manages both current and historic transactions.
4. Which of the following is the collection of data objects that are similar to one another within the same group?
(a) Partitioning
(b) Grid
(c) Cluster
(d) Table
(e) Data source.
4. C Cluster is the collection of data objects that are similar to one another within the same group.
5. Which of the following employees data mining techniques to analyze the intent of a user query, provided additional generalized or associated information relevant to the query?
(a) Iceberg query method
(b) Data analyzer
(c) Intelligent query answering
(d) DBA
(e) Query parser.
5. C Intelligent Query Answering employee’s data mining techniques to analyze the intent of a user query provided additional generalized or associated information relevant to the query.
6. Which of the following process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evolution and knowledge presentation?
(a) KDD process
(b) ETL process
(c) KTL process
(d) MDX process
(e) None of the above.
6. A KDD Process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evolution, and knowledge presentation.
7. At which level we can create dimensional models?
(a) Business requirements level
(b) Architecture models level
(c) Detailed models level
(d) Implementation level
(e) Testing level.
7. B Dimensional models can be created at Architecture models level.
8. Which of the following is not related to dimension table attributes?
(a) Verbose
(b) Descriptive
(c) Equally unavailable
(d) Complete
(e) Indexed.
8. C Equally unavailable is not related to dimension table attributes.
9. Data warehouse bus matrix is a combination of
(a) Dimensions and data marts
(b) Dimensions and facts
(c) Facts and data marts
(d) Dimensions and detailed facts
(e) All (a), (b), (c) and (d) above.
9. A Data warehouse bus matrix is a combination of Dimensions and data marts.
10. Which of the following is not the managing issue in the modeling process?
(a) Content of primary units column
(b) Document each candidate data source
(c) Do regions report to zones
(d) Walk through business scenarios
(e) Ensure that the transaction edit flat is used for analysis.
10. E Ensure that the transaction edit flat is used for analysis is not the managing issue in the modeling process.