41. Water
fall model for software development is:
(A) a top down approach.
(B) a bottom up approach.
(C) a sequential approach.
(D) a consequential approach.
42. In
software development, value adjustment factors include the following among
others:
(A) the criticality of the performance and
reusability of the code.
(B) number of lines of code in the software.
(C) number of technical manpower and hardware
costs.
(D) time period available and the level of
user friendliness.
Answer: A
43. While
designing the user interface, one should:
(A) use as many short cuts as possible.
(B) use as many defaults as possible.
(C) use as many visual layouts as possible.
(D) reduce the demand on short-term memory.
Answer: D
44. In
software cost estimation, base estimation is related to:
(A) cost of similar projects already
completed.
(B) cost of the base model of the present
project.
(C) cost of the project with the base minimum
profit.
(D) cost of the project under ideal
situations.
Answer: A
45. In
clean room software engineering:
(A) only eco-friendly hardware is used.
(B) only hired facilities are used for
development.
(C) correctness of the code is verified
before testing.
(D) implementation is done only after
ensuring correctness.
Answer: D
46. Amdahl’s
law states that the maximum speedup S achievable by a parallel computer with ‘p’
processors is given by:
(A) S≤f+(1-f)/p
(B) S≤f/p+(1-f)
(C) S≤1/[f+(1-f)/p]
(D) S≤1/[1-f+f/p]
Answer: D
47. With
reference to cluster analysis in data mining, a distance measure that is NOT
used is:
(A) Euclidean distance.
(B) Manhattan distance.
(C) Chebychev’s distance.
(D) Lee distance.
Answer: D
48. In
a mobile communication system, a geographic region is divided into cells. For
each frequency set, there is a buffer ............... wide where that frequency
is not used.
(A) one-cell
(B) two-cells
(C) three-cells
(D) four-cells
Answer: B
49. Identify
the incorrect statement:
(A) The overall strategy drives the
e-commerce data warehousing strategy.
(B) Data warehousing in an e-commerce
environment should be done in a classical manner.
(C) E-commerce opens up an entirely new world
of web servers.
(D) E-commerce security threats can be
grouped into three major categories.
Answer: D
50. Identify
the incorrect statement:
(A) The ATM adaptation layer is not service
dependent.
(B) Logical connections in ATM are referred
to as virtual channel connections.
(C) ATM is a streamlined protocol with
minimal error and flow control capabilities.
(D) ATM is also known as cell relay.
Answer: A
0 Comments