Software Engineering

740

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BE Software Engineering Quiz

1 / 25

Which level of an organization is responsible for  setting medium  term goals  and allocating resources;-

2 / 25

Characteristic  for  testability  function is  not  include ;-

3 / 25

Which command is used to assign only read permission to all three categories of the file not:-

4 / 25

Software engineer shall act consistently with the public interest:-

5 / 25

Which category the following statement belongs " Classes to create and manage sessions are a part of a WAF" :-

6 / 25

Cyclomatic   complexity method  come  under which  testing  method :-

7 / 25

According to ISO 9001 , the cause of non conforming  product should be:-

8 / 25

Which  is  represented   as  an aspect  that  request  a  login name  and  password ;-

9 / 25

To deliver a message to correct an application program running on a host, the ______________ address must be consulted:-

10 / 25

The business engineering requires a major change in:-

11 / 25

Which name space contains  the definition  for ldb connection:-

12 / 25

Convert the ASCII/BEAR/assembly language pseudo -ops into hexadecimal machine language:-

13 / 25

Which is  not  a  software  quality model ;-

14 / 25

How many networks and nodes per networks , are allowed by the class B network:-

15 / 25

To select test by shading as you drag the mouse arrow over the text is referred to as:-

16 / 25

What is  exception handling  is   ;-

17 / 25

The  following  is  not  a   step  of requirement   engineering ;-

18 / 25

FIT  is  another  way  of  reporting :-

19 / 25

A characteristics of a software system that can lead to a system is known as:-

20 / 25

In which mode each user has a local input/ output device:-

21 / 25

What have  become  de  rigueur  for  computer based  products  and  system  of   every  type :-

22 / 25

Which command is used to create a Linux installation boot floppy:-

23 / 25

A system resources that has a value and has to be protected is known as:-

24 / 25

What is the product of the probability of incurring a loss due to the  risk and the potential magnitude  of that loss:-

25 / 25

What can be  requested  from any  object  of  the  class to  affect  behavior :-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *