Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

1351.

Probability of success of two modules in unit testing of 0.9 each. The probability of success of Integration testing is 0.9. The Joint probability of success is

A. 0.9
B. 0.81
C. 0.729
D. 0.1
Answer» D. 0.1
1352.

A program written in machine language

A. Is easy to understand and modify
B. Run more slowly than a program written in a high level
C. Both a and b
D. None of these
Answer» E.
1353.

A structured program

A. can be reduced to control structures
B. Is generally more complicated than non – structured program
C. Can only be modified by the person who wrote it
D. All of these
Answer» B. Is generally more complicated than non – structured program
1354.

Types of design phase is/are

A. One
B. Two
C. Three
D. Four
Answer» C. Three
1355.

Home finance programs are

A. Project management programs
B. accounting programs
C. inventory management programs
D. None of these
Answer» C. inventory management programs
1356.

In testing phase, the effort distribution is

A. 10%
B. 20%
C. 40%
D. 50%
Answer» E.
1357.

A legacy software system has 940 modules. The latest release required that 90 of these modules be changed. In addition, 40 new modules were added and 12 old modules were removed. Compute the software maturity index for the system.

A. 0.849
B. 0.524
C. 0.725
D. 0.923
Answer» B. 0.524
1358.

Match the following in Software Engineering:List - I (a) Product Complexity(b) Structured System Analysis(c) Coupling and Cohesion(d) Symbolic ExecutionList - II(i) Software Requirements Definition(ii) Software Design(iii) Validation Technique(iv) Software Cost EstimationCode: (a) (b) (c) (d)

A. (ii) (iii) (iv) (i)
B. (iii) (i) (iv) (ii)
C. (iv) (i) (ii) (iii)
D. (iii) (iv) (i) (ii)
Answer» D. (iii) (iv) (i) (ii)
1359.

Which of the following statements is/are false?P: The clean-room strategy to software engineering is based on the incremental software process model.Q: The clean-room strategy to software engineering is one of the ways to overcome “unconscious” copying of copyrighted code.

A. P only
B. Q only
C. Both P and Q
D. Neither P nor Q
Answer» E.
1360.

Black Box testing is done

A. to show that s/w is operational at its interfaces i.e. input and output.
B. to examine internal details of code.
C. at client side.
D. none of above.
Answer» B. to examine internal details of code.
1361.

Structured programs do not include

A. Loops
B. GOTO statements
C. Both a and b
D. None of these
Answer» C. Both a and b
1362.

Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived.

A. White-box testing
B. Black-box testing
C. Orthogonal array testing
D. Stress testing
Answer» C. Orthogonal array testing
1363.

When the ERASE command is used

A. The file content is erased
B. The file name is deleted from the directions on the disk
C. Both a and b
D. None of these
Answer» C. Both a and b
1364.

Water fall model for software development is:

A. a top down approach
B. a bottom up approach
C. a sequential approach
D. a consequential approach
Answer» D. a consequential approach
1365.

Structured programming is enforced in

A. PASCAL
B. BASIC
C. FORTRAN
D. Both a and b
Answer» B. BASIC
1366.

Prototyping is used to

A. test the software as an end product
B. expand design details
C. refine and establish requirements gathering
D. None of the above
Answer» D. None of the above
1367.

Sliding window concept of software project management is:

A. Preparation of comprehensible plan
B. Preparation of the various stages of development
C. Ad-hoc planning
D. Requirement analysis
Answer» C. Ad-hoc planning
1368.

Which of the following is used for test data generation?

A. White box
B. Black box
C. Boundary-value analysis
D. All of the above
Answer» D. All of the above
1369.

Which one of the following is not typically provided by Source Code Management Software?

A. Synchronisation
B. Versioning and Revision history
C. Syntax highlighting
D. Project forking
Answer» D. Project forking
1370.

The advantage of better testing in software development is in

A. Waterfall model
B. Prototyping
C. Iterative
D. All of these
Answer» D. All of these
1371.

‘Abstraction’ is......................step of Attribute in a software design.

A. First
B. Final
C. Last
D. Middle
Answer» B. Final
1372.

The approach to software testing is to design test cases to:

A. break the software
B. understand the software
C. analyze the design of sub processes in the software
D. analyze the output of the software
Answer» B. understand the software
1373.

In an IBM PC, ROM contains

A. The operating system supervisor
B. The I/O manager
C. The file manager
D. All of these
Answer» B. The I/O manager
1374.

Design recovery from source code is done during

A. reverse engineering
B. re-engineering
C. reuse
D. all of the above
Answer» E.
1375.

Reasons to re-engineer a software include :P: Allow legacy software to quickly adapt to the changing requirementsQ: Upgrade to newer technologies/platforms/paradigm (for example, object-oriented)R: Improve software maintainabilityS: Allow change in the functionality and architecture of the software

A. P, R and S only
B. P and R only
C. P, Q and S only
D. P, Q and R only
Answer» E.
1376.

Which of the following tools is not required during system analysis phase of system development life cycle?

A. Case tool
B. RAD tool
C. Reverse engineering
D. None of these
Answer» D. None of these
1377.

System Development Life-cycle has following stages:(I) Requirement analysis        (II) Coding(III) Design                    (IV) TestingWhich option describes the correct sequence of stages?

A. III, I, IV, II
B. II, III, I, IV
C. I, III, IV, II
D. None of the above
Answer» E.
1378.

A simple stand - alone software utility is to be developed in ’C’ programming by a team of software experts for a computer running Linux and the overall size of this software is estimated to be 20,000 lines of code. Considering (a, b) = (2.4, 1.05) as multiplicative and exponention factor for the basic COCOMO effort estimation equation and (c, d)=(2.5, 0.38) as multiplicative and exponention factor for the basic COCOMO development time estimation equation, approximately how long does the software project take to complete?

A. 10.52 months
B. 11.52 months
C. 12.52 months
D. 14.52 months
Answer» C. 12.52 months
1379.

Reverse engineering is the process which deals with:

A. Size measurement
B. Cost measurement
C. Design recovery
D. All of the above
Answer» D. All of the above
1380.

Temporal cohesion means

A. Coincidental cohesion
B. Cohesion between temporary variables
C. Cohesion between local variables
D. Cohesion with respect to time
Answer» B. Cohesion between temporary variables
1381.

Which one of these are not software maintenance activity?

A. Error correction
B. Adaptation
C. Implementation of Enhancement
D. Establishing scope
Answer» E.
1382.

Match the following:a. Good quality              i. Program does  not fail for a                                               specified time in a given                                               environment'b. Correctness              ii. Meets the functional                                               requirementsc. Predictable                iii. Meets both functional and                                              non-functional requirements ,d. Reliable                    iv.  Process is under statistical                                               control Codes a   b   c  d

A. iii     ii      iv     i
B. ii      iii     iv      i
C. i     ii     iv     iii
D. i      ii     iii      iv
Answer» C. i     ii     iv     iii
1383.

Maximum possible value of reliability is

A. 100
B. 10
C. 1
D. 0
Answer» D. 0
1384.

Assume that the software team defines a project risk with 80% probability of occurrence of risk in the following manner:Only 70 percent of the software components scheduled for reuse will be integrated into the application arid the remaining functionality will have to be custom developed: If 60 reusable components were planned with average component size as ' 100 LOC and software engineering cost for each LOC as $ 14, then the risk exposure would be

A. $ 25,200
B. $ 20,160
C. $ 17,640
D. $ 15,120
Answer» E.
1385.

What is true about UML stereotypes ?

A. Stereotype is used for extending the UML language
B. Stereotyped class must be abstract
C. The stereotype indicates that the UML element cannot be changed
D. UML profiles can be stereotyped for backward compatibility
Answer» E.
1386.

Match the following List - I List - II(a) Size-oriented metric (i) uses number of external interfaces as one of the measurement parameters(b) Function-oriented metrics (ii) originally designed to be applied to business information system(c) Extended Function Point Metrics (iii) derived by normalizing quality and/ or productivity measures by considering the size of the software.(d) Function Point (iv) uses algorithm characteristics as of the measurement parametercode:(a)  (b)  (c)  (d)

A. (iii)  (iv)  (i)   (ii)
B. (ii)  (i)  (iv)   (iii)
C. (iv)  (ii)  (iii)   (i)
D. (iii)  (i)  (iv)   (ii)
Answer» E.
1387.

Which one of the following is not a source code metric?

A. Halstead metric
B. Function point metric
C. Complexity metric
D. Length metric
Answer» B. Function point metric
1388.

A software design is highly modular if :

A. cohesion is functional and coupling is data type
B. cohesion is coincidental and coupling is data type
C. cohesion is sequential and coupling is content type
D. cohesion is functional and coupling is stamp type
Answer» B. cohesion is coincidental and coupling is data type
1389.

Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial failure intensity was 20 failures/CPU hr. Then the current failure intensity will be

A. 5 failures/CPU hr
B. 10 failures/CPU hr
C. 20 failures/CPU hr
D. 40 failures/CPU hr
Answer» C. 20 failures/CPU hr
1390.

Software testing is

A. the process of establishing that errors are not present
B. the process of establishing confidence that a program does what it is supposed to do
C. the process of executing a program to show that it is working as per specifications
D. the process of executing a program with the intent of finding errors
Answer» E.
1391.

The ................ model is preferred for software development when the requirements are not clear.

A. Rapid Application Development
B. Rational Unified Process
C. Evolutionary Model
D. Waterfall Model
Answer» D. Waterfall Model
1392.

Consider a project with the following functional units:Number of user inputs = 50Number of user outputs = 40Number of user inquiries = 35Number of user files = 06Number of external interfaces = 04Assuming all complexity adjustment factors  and  weighing  factors  as average, the function points for the project will be

A. 135
B. 722
C. 675
D. 672
Answer» E.
1393.

If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is:

A. 1 + S3/S1
B. 1 - S3/S1
C. 1 + S1/S3
D. 1 - S1/S3
Answer» C. 1 + S1/S3
1394.

Which one of the following is not a definition of error ?

A. It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value
B. It refers to the actual output of software and the correct output
C. It refers to a condition that causes a system to fail
D. It refers to human action that results in software containing a defect or fault
Answer» D. It refers to human action that results in software containing a defect or fault
1395.

Match the followinga. data  coupling i. module A and module B have shared  datab. stamp coupling ii. dependency between modules is based on the fact they communicate by only passing of datac. common coupling iii. when complete structure is passed from one module to anotherd. content  coupling iv. when the control is passed from one module to the middle of anothercodes: a b c d

A. iii  ii  i  iv
B. ii  iii  i  iv
C. ii  iii  iv  i
D. iii  ii  iv  i
Answer» C. ii  iii  iv  i
1396.

Which one of the following is not a key process area in CMM level 5 ?

A. Defect prevention
B. Process change management
C. Software product engineering
D. Technology change management
Answer» D. Technology change management
1397.

Function points can be calculated by

A. UFP * CAF
B. UFP * FAC
C. UFP * Cost
D. UFP * Productivity
Answer» B. UFP * FAC
1398.

The software _______ of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them.

A. Design
B. Architecture
C. Process
D. Requirement
Answer» C. Process
1399.

One weakness of boundary value analysis and equivalence partitioning is

A. they are not effective
B. they do not explore combinations of input circumstances
C. they explore combinations of input circumstances
D. None of the above
Answer» C. they explore combinations of input circumstances
1400.

Which one of the following set of attributes should not be encompassed by effective software metrics?

A. Simple and computable
B. Consistent and objective
C. Consistent in the use of units and dimensions
D. Programming language dependent
Answer» E.