MCQ For SMD PDF
MCQ For SMD PDF
MCQ For SMD PDF
Unit I
1. The Unified Modeling Language (UML) has become an effective standard for software
modelling.How many different notations does it have ?
a) Three
b) Four
c) Six
d) Nine
View Answer
Answer: d
Explanation: The different notations of UML includes the nine UML diagrams namely class, object,
sequence, collaboration, activity, state-chart, component, deployment and use case diagrams.
2. Which model in system modeling depicts the dynamic behavior of the system ?
a) Context Model
b) Behavioral Model
c) Data Model
d) Object Model
View Answer
Answer: b
Explanation: Behavioral models are used to describe the dynamic behavior of an executing system.
This can be modeled from the perspective of the data processed by the system or by the events that
stimulate responses from a system.
3. Which model in system modelling depicts the static nature of the system ?
a) Behavioral Model
b) Context Model
c) Data Model
d) Structural Model
View Answer
Answer: d
Explanation: Structural models show the organization and architecture of a system. These are used
to define the static structure of classes in a system and their associations.
4. Which perspective in system modelling shows the system or data architecture.
a) Structural perspective
b) Behavioral perspective
c) External perspective
d) All of the mentioned
View Answer
Answer: a
Explanation: Structural perspective is used to define the static structure of classes in a system and
their associations.
5. Which system model is being depicted by the ATM operations shown below:
a) Structural model
b) Context model
c) Behavioral model
d) Interaction model
View Answer
Answer: b
Explanation: Context models are used to illustrate the operational context of a system.They show
what lies outside the system boundaries.
6. Activity diagrams are used to model the processing of data.
a) True
b) False
View Answer
Answer: a
Explanation: The statement mentioned is true and each activity represents one process step.
7. Model-driven engineering is just a theoretical concept. It cannot be converted into a
working/executable code.
a) True
b) False
View Answer
Answer:b
Explanation: Model-driven engineering is an approach to software development in which a system is
represented as a set of models that can be automatically transformed to executable code.
advertisement
Answer: c
Explanation: State diagrams show system states and events that cause transitions from one state to
another.
Unit II
UNIT IV
Answer: b
Explanation: In architectural design you design a system organization satisfying the functional and
non-functional requirements of a system.
2. A ________ view shows the system hardware and how software components are distributed
across the processors in the system.
a) physical
b) logical
c) process
d) all of the mentioned
View Answer
Answer: a
Explanation: A physical view is implemented by system engineers implementing the system
hardware.
3. The UML was designed for describing _________
a) object-oriented systems
b) architectural design
c) SRS
d) Both object-oriented systems and Architectural design
View Answer
Answer: d
Explanation: The UML was designed for describing object-oriented systems and, at the architectural
design stage, you often want to describe systems at a higher level of abstraction.
4. Which of the following view shows that the system is composed of interacting processes at run
time?
a) physical
b) development
c) logical
d) process
View Answer
Answer: d
Explanation: High availability architecture can be affected by several design factors that are required
to be maintained to ensure that no single points of failure exist in such design.
6. Which of the following is not included in Architectural design decisions?
a) type of application
b) distribution of the system
c) architectural styles
d) testing the system
View Answer
Answer: d
Explanation: Architectural design decisions include decisions on the type of application, the
distribution of the system, the architectural styles to be used, and the ways in which the architecture
should be documented and evaluated.
7. Architecture once established can be applied to other products as well.
a) True
b) False
View Answer
Answer: b
Explanation: Systems in the same domain often have similar architectures that reflect domain
concepts.
8. Which of the following pattern is the basis of interaction management in many web-based
systems?
a) architecture
b) repository pattern
c) model-view-controller
d) different operating system
View Answer
Answer: c
Explanation: Model-View-Controller pattern is the basis of interaction management in many web-
based systems.
9. What describes how a set of interacting components can share data?
a) model-view-controller
b) architecture pattern
c) repository pattern
d) none of the mentioned
View Answer
Answer: c
Explanation: The majority of systems that use large amounts of data are organized around a shared
database or repository.
10. Which view in architectural design shows the key abstractions in the system as objects or object
classes?
a) physical
b) development
c) logical
d) process
View Answer
Answer: c
Explanation: It is possible to relate the system requirements to entities in a logical view.
advertisement
11. Which of the following is a type of Architectural Model?
a) Static structural model
b) Dynamic process model
c) Distribution model
d) All of the mentioned
View Answer
Answer: d
Explanation: All these models reflects the basic strategy that is used to structure a system.
UNIT V
1. Which of these following sensor is a useful as part of a burglar alarm system for commercial
buildings?
a) Movement detector
b) Door sensor
c) Window sensor
d) All of the mentioned
View Answer
Answer: d
Explanation: A burglar alarm system for commercial buildings include movement detectors in
individual rooms, door sensors that detect corridor doors opening, and window sensors on ground-
floor windows that can detect when a window has been opened.
2. Which of the following is not real-time architectural patterns that are commonly used?
a) Asynchronous communication
b) Observe and React
c) Environmental Control
d) Process Pipeline
View Answer
Answer: a
Explanation: These patterns can be combined and you will often see more than one of them in a
single system.
3. A monitoring system examines its environment through
a) operating system
b) communication
c) set of sensors
d) none of the mentioned
View Answer
Answer: c
Explanation: If some exceptional event or sensor state is detected by the system, the monitoring
system takes some action. Often, this involves raising an alarm to draw an operator’s attention to the
event.
4. Which of the following is applicable on software radio?
a) Environmental Control
b) Process Pipeline
c) Distributed system
d) None of the mentioned
View Answer
Answer: b
Explanation: A software radio accepts incoming packets of digital data representing the radio
transmission and transforms these into a sound signal that people can listen to.
5. An example of a system that may use a process pipeline is a high-speed
a) data distributing system
b) data acquisition system
c) data collector system
d) none of the mentioned
View Answer
Answer: b
Explanation: Data acquisition systems collect data from sensors for subsequent processing and
analysis.
6. Monitoring systems are an important class of embedded real-time systems.
a) True
b) False
View Answer
Answer: a
Explanation: A monitoring system examines its environment through a set of sensors and, usually,
displays the state of the environment in some way.
7. Which of the following is an example of a controller for a car braking system?
a) Observe and React
b) Process Pipeline
c) Environmental Control
d) None of the mentioned
View Answer
Answer: d
Explanation: An anti-skid braking system in a car monitors the car’s wheels and brake system .
8. ETL stands for
a) Data Extraction Transformation & Loading
b) Data Execution Transformation & Loading
c) Extraction Transformation & Loading
d) Execution Transformation & Loading
View Answer
Answer: a
Explanation: None.
9. Control systems may make use of the Environmental Control pattern, which is a general control
pattern that includes _________processes.
a) sensor
b) actuator
c) pipeline
d) both sensor and actuator
View Answer
Answer: d
Explanation: Such patterns are quite common in Environmental Control Systems.
10. ________ can be associated with a separate processor or core, so that the processing steps can
be carried out in parallel.
a) Process Pipeline
b) Environmental Control
c) Observe and React
d) None of the mentioned
View Answer
Answer: a
Explanation: The Process Pipeline pattern makes this rapid processing possible by breaking down
the required data processing into a sequence of separate transformations, with each transformation
carried out by an independent process.
UNIT VI
Answer: b
Explanation: Software testing is the process of evaluation a software item to detect differences
between given input and expected output.
2. What is Cyclomatic complexity?
a) Black box testing
b) White box testing
c) Yellow box testing
d) Green box testing
View Answer
Answer: b
Explanation: Cyclomatic complexity measures the amount of decision logic in the program
module.Cyclomatic complexity gives the minimum number of paths that can generate all possible
paths through the module.
3. Lower and upper limits are present in which chart?
a) Run chart
b) Bar chart
c) Control chart
d) None of the mentioned
View Answer
Answer: a
Explanation: A run chart is used to monitor the behavior of a variable over time for a process or
system. Run charts graphically display cycles, trends, shifts, or non-random patterns in behavior
over time. It contains lower and upper limits.
4. Maintenance testing is performed using which methodology?
a) Retesting
b) Sanity testing
c) Breadth test and depth test
d) Confirmation testing
View Answer
Answer: c
Explanation: Maintenance Testing is done on the already deployed software. The deployed software
needs to be enhanced, changed or migrated to other hardware. The Testing done during this
enhancement, change and migration cycle is known as maintenance testing.
5. White Box techniques are also classified as
a) Design based testing
b) Structural testing
c) Error guessing technique
d) None of the mentioned
View Answer
Answer: b
Explanation: The structural testing is the testing of the structure of the system or component.
Structural testing is often referred to as ‘white box’ or ‘glass box’ or ‘clear-box testing’ because in
structural testing we are interested in what is happening ‘inside the system/application’.
6. Exhaustive testing is
a) always possible
b) practically possible
c) impractical but possible
d) impractical and impossible
View Answer
Answer: c
Explanation: Exhaustive testing is the testing where we execute single test case for multiple test
data.It means if we are using single test case for different product or module under manual testing.
testing .
7. Which of the following is/are White box technique?
a) Statement Testing
b) Decision Testing
c) Condition Coverage
d) All of the mentioned
View Answer
Answer: d
Explanation: Statement testing, decision testing, condition coverage all of them uses white box
technique.
advertisement
Answer: d
Explanation: Unit, system, integration testing all of them are levels in testing.
9. Boundary value analysis belong to?
a) White Box Testing
b) Black Box Testing
c) White Box & Black Box Testing
d) None of the mentioned
View Answer
Answer: b
Explanation: Boundary value analysis is based on testing at the boundaries between partitions and
checks the output with expected output.
10. Alpha testing is done at
a) Developer’s end
b) User’s end
c) Developer’s & User’s end
d) None of the mentioned
View Answer
Answer: a
Explanation: Alpha testing takes place at the developer’s end. Developers observe the users and
note problems. Alpha testing is testing of an application when development is about to complete.
Minor design changes can still be made as a result of alpha testing.
11. The testing in which code is checked
a) Black box testing
b) White box testing
c) Red box testing
d) Green box testing
View Answer
Answer: b
Explanation: White-box testing is a method of testing software that tests internal structures or
workings of an application, as opposed to its functionality .
12. Testing done without planning and Documentation is called
a) Unit testing
b) Regression testing
c) Adhoc testing
d) None of the mentioned
View Answer
Answer: c
Explanation: Adhoc testing is used term for software testing performed without planning and
documentation. The tests are intended to be run only once, unless a defect is discovered.
13. Acceptance testing is also known as
a) Grey box testing
b) White box testing
c) Alpha Testing
d) Beta testing
View Answer
Answer: d
Explanation: Acceptance testing is a test conducted to determine if the requirements of a
specification or contract are met and is done by users.
14. Which of the following is non-functional testing?
a) Black box testing
b) Performance testing
c) Unit testing
d) None of the mentioned
View Answer
Answer: b
Explanation: Performance testing is in general testing performed to determine how a system
performs in terms of responsiveness and stability under a particular workload.
15. Beta testing is done at
a) User’s end
b) Developer’s end
c) User’s & Developer’s end
d) None of the mentioned
View Answer
Answer: a
Explanation: In beta testing the user evaluates the product and gives his feedback.
16. SPICE stands for
a) Software Process Improvement and Compatibility Determination
b) Software Process Improvement and Control Determination
c) Software Process Improvement and Capability Determination
d) None of the mentioned
View Answer
Answer: c
Explanation: SPICE stands for Software Process Improvement and Control Determination.
17. Unit testing is done by
a) Users
b) Developers
c) Customers
d) None of the mentioned
View Answer
Answer: b
Explanation: Unit testing is a method by which individual units of source code, sets of one or more
computer program modules together with associated control data, usage procedures, and operating
procedures are tested to determine if they are fit for use.
advertisement
Answer: b
Explanation: Black-box testing is a method of software testing that examines the functionality of an
application without peering into its internal structures or workings.
19. Which of the following is black box testing
a) Basic path testing
b) Boundary value analysis
c) Code path analysis
d) None of the mentioned
View Answer
Answer: b
Explanation: Boundary value analysis is a software testing technique in which tests are designed to
include representatives of boundary values.
20. Which of the following is not used in measuring the size of the software
a) KLOC
b) Function Points
c) Size of module
d) None of the mentioned
View Answer
Answer: c
Explanation: KLOC and function points both can be used as size measurement for measuring the
size of the software.