Peer Instruction
Questions in Software
Engineering
Bhuvana Gopal
Lecturer
Department of Computer Science and Engineering
University of
This HTML is created from PDF at
The documentation involved in agile is
A.Minimal
B.Extensive
C.Just another deliverable and depends on the project
D.Does not need to be completed and can be done at the end of the project
E.None of the above
This HTML is created from PDF at
Peer
Instruction
Design involved in agile is
Peer Instruction
A. Minimal, and loaded upfront B. Extensive, and loaded upfront
C. Just another deliverable and depends on the project D. Omnipresent and happens throughout the project E. None of the above
This HTML is created from PDF at
Agile is least suited for
A. Fixed deadline projects
B. Greenfield projects
C. Brownfield projects
D. All of the above
E. None of the above
This HTML is created from PDF at
Peer Instruction
Here are some statements about database modeling. Arrange them in the correct order.
1.Document all entities discovered during the
2.Create new entities (tables) for multivalued attributes and repeating groups. Incorporate these new entities (tables) in the ER diagram. Review with appropriate personnel.
A.1,2,3,4,5
B.5,4,3,2,1
C.5,3,1,2,4
3.Document all attributes that belong to each entity. Select candidate and primary keys. Ensure that all
4.Develop an initial ER diagram and review it with appropriate personnel. (Remember that this is an iterative process.)
5.Verify ER modeling by normalizing tables.
D.1,3,4,2,5
E.3,2,4,1,5
Peer Instruction
This HTML is created from PDF at
_____ limits who gains access to the database
while _____ limits what a user can access
within the database.
A. Access authentication, user definition
B. Access authentication, view definition
C. Data access, user monitoring
D. Access control, database security
E. Access authentication, user monitoring
Peer Instruction
This HTML is created from PDF at
Which is the most suitable type of database for storing sensitive data?
A.RDBMS
B.XML
C.NoSQL
D.Open source
E.Only A and B
Peer Instruction
This HTML is created from PDF at
How does access context control combat privilege abuse and enforce access policies?
A. It provides authorization checks based on "what you have."
B. It provides authorization checks based on "what you do."
C. It provides authorization checks based on "what you know."
D. It provides authorization checks based on "what you have and what you do."
E. All of the above
Peer Instruction
This HTML is created from PDF at
Why is the segregation of database administrator duties an important security control?
A. It means administrators have more time to do their jobs properly.
B. It ensures development and production data are kept on separate systems.
C. It means no one individual can act alone to misuse powerful database privileges for malicious purposes.
D. Administrators can specialize in a specific area of database administration.
Peer Instruction
This HTML is created from PDF at
Which of the following is not a unit test?
A. Code that stuffs things into a database or that reads a file from disk
B. Test that throws thousands of requests for a service you’ve written
C. A test that can fail when run on a machine without the “proper setup”
D. All of the above
E. Only A and C
This HTML is created from PDF at
Peer Instruction
Which of the following statements about writing a unit test in C# .NET is false?
A. It is decorated with the [TestMethod] attribute
B. It returns void
C. It cannot have parameters
D. It cannot test for exceptions
This HTML is created from PDF at
Peer Instruction
Which of the following is the right way to unit test?
A. Each test method should have a few but not too many assert statements. B. Test multiple things at a time per test method.
C. Ignore empty cases and error cases D. Tests should avoid logic
E. Only A and D
This HTML is created from PDF at
Peer Instruction
Which of the following are test case smells?
A. Constrained test order
B. Tests call shared helper methods
C. Tests call each other
D. A, B and C
E. Only A and C
This HTML is created from PDF at
Peer Instruction
Which of the following artifacts can be examined by using review techniques?
A. Software code
B. Requirements specification
C. Test designs
D. All of the above
E. Only A and C
This HTML is created from PDF at
Peer Instruction
Which statement about the function of a static analysis tool is true?
A.Gives quality information about the code without executing it.
B.Checks expected results against actual results.
C.Can detect memory leaks.
D.Gives information about what code has and has not been exercised.
E.Only A and D
This HTML is created from PDF at
Peer Instruction
Static code analysis typically identifies all but one of the following problems. Which is it?
A. Unreachable code
B. Undeclared variables
C. Faults in the requirements
D. Too few comments
This HTML is created from PDF at
Peer Instruction
Static code analysis typically identifies all but one of the following problems. Which is it?
A. Unreachable code
B. Undeclared variables
C. Faults in the requirements
D. Too few comments
This HTML is created from PDF at
Peer Instruction
Classes that are hard to unit test often break:
A. Single Responsibility principle
B. Open/Closed principle
C. Liskov Substitution principle
D. Interface segregation principle
E. Dependency Inversion principle
This HTML is created from PDF at
Peer Instruction
Go down to your local store and pay for something with a credit card. The clerk doesn't examine your card and get out the "Visa Machine" after seeing that your card is a Visa. He just takes your card, whatever it is, and swipes it. Which one of the SOLID principles does this exemplify?
A. Single Responsibility principle
B. Open/Closed principle
C. Liskov Substitution principle
D. Interface segregation principle
E. Dependency Inversion principle
This HTML is created from PDF at
Peer Instruction
Think of going down to your local corner restaurant and checking out the menu. You'll see all of the normal menu mainstays, and then something that's just called "soup of the day." What SOLID principle is this an example of?
A. Single Responsibility principle
B. Open/Closed principle
C. Liskov Substitution principle
D. Interface segregation principle
E. Dependency Inversion principle
This HTML is created from PDF at
Peer Instruction
Peer Instruction question
Some causes for merge hell are:
A. Merging late
B. Not merging often
C. Solution architecture - well defined boundaries between components
D. A, B
E. A, B and C
This HTML is created from PDF at
Which of these is NOT an issue with traditional CI:
A. Once “bad” code is checked in, the “latest build” is broken
B. Developer lack of motivation to fix their code
C. Lack of automated unit tests
D. Once “it works”, management won’t prioritize a “make it work properly” task
E. The release branch always has high stability with traditional CI.
This HTML is created from PDF at
What are some common pitfalls of gated builds?
A. Build master can focus on improving the build process rather than track down failing tests
B. Tests take too long
C. all builds suddenly failing, or randomly failing - a big mess to clean up
D. Always have a working product
This HTML is created from PDF at
Which of these reflects an increasing order of control given to the subscriber?
Peer Instruction
1.SaaS
2.Paas
3.IaaS
4.In house resources that are not on the cloud
A.1,2,3,4
B.1,3,2,4
C.4,1,2,3
D.4,2,3,1
E.1,4,2,3
This HTML is created from PDF at
Peer
In addition to identifying assets and threats,Instruction what are the two main steps involved in establishing a streamlined security analysis process for the cloud?
A. Identify countermeasures
B. Establish organizational context
C. Identify if the countermeasures are appropriate for organization independent analysis
D. A and C
E. A , B and C
This HTML is created from PDF at
What are the essential steps in creating a virtual machine on the cloud?
A. Select a machine image to run, select the size of the VM, select the security credentials
B. select the size of the VM, select the security credentials, select an application to run
C. Select a machine image to run, select the size of the VM, select an application to run
D. Select a machine image to run, select an application to run, select security credentials
Peer Instruction
This HTML is created from PDF at
For which of the following workloads can cloud computing have the greatest benefit?
A. Fixed and predictable workloads
B. Unexpectedly varying workloads
C. Steadily decreasing workloads
D. Steadily increasing workloads
E. A and C
Peer Instruction
This HTML is created from PDF at
For which of the following workloads can cloud computing have the least benefit?
Peer Instruction
A.
B.
workloads that manage sensitive data
highly customized,
workloads
C. where virtualization is not supported by
D. All of the above
E.All but A
This HTML is created from PDF at