Showing posts sorted by date for query object oriented. Sort by relevance Show all posts
Showing posts sorted by date for query object oriented. Sort by relevance Show all posts

November 27, 2019

Object Oriented Programming and Design - MCQS

Note: We have tried to upload as much as we can, all the question and answers might be shuffled - Please find the answer below each question, some answers might be wrong please review on the last date(some answers might be changed) if you find any wrong answer please comment down below.


Question: 1



Select one:
A. The program has a runtime error because the array elements are not initialized.
B. The program has a compile error because the size of the array wasn’t specified when declaring the array.
C. The program has a runtime error because the array element x[0] is not defined.
D. The program runs fine and displays x[0] is 0.
Correct Answer: The program runs fine and displays x[0] is 0.

Question: 2
Given:
public class Foo {
staticint[] a;
static { a[0]=2; }
public static void main( String[] args ) {}
 }
Which exception or error will be thrown when a
programmer attempts to run this code?
Select one:
A. Compilation fails
B. java.lang.StackOverflowError
C. java.lang.IllegalStateException
D. java.lang.ExceptionInInitializerError
E. java.lang.ArrayIndexOutOfBoundsException
Correct Answer: java.lang.ExceptionInInitializerError

Question: 3
For a given interface, which of the following can we legally declare within an interface definition?
Select one:
A. public double methoda();
B. protected void methoda(double d1);
C. static void methoda(double d1);
D. public final double methoda();
Correct Answer: protected void methoda(double d1);

Question: 4
Among given methods, which is executed first before execution of any other in a java program?
Select one:
A. args public method
B. static before main method
C. main in private method
D. main in public methods
Correct Answer: static before main method

Question: 5
What is the default value of a static integer variable of a class in java?
Select one:
A. 1
B. null
C. 0
D. Garbage value
Correct Answer: 0

Question: 6
Which of the following are the legal declarations of array?
Select one:
A. int () myScores (2);
B. int [] totalPrice ();
C. int [] myScores [];
D. int () myScores [2];
Correct Answer: int [] myScores [];

Question: 7
What is the output of the following code?
int y = 100, x = 5;
while(y > 0)
{
y--;
if(y%x != 0)
{
            continue;
}
System.out.println(y);
}
Select one:
A. Prints from 95 skipping 5
B. Error
C. Prints 1 to 100
D. None of the above
Correct Answer: Prints from 95 skipping 5

Question: 8
public class Test {
public void print(byte x) {
System.out.print("byte");
 }
public void print(Integer x) {
System.out.print("Integer");
 }
public void print(Short x) {
System.out.print("Short");
 }
public void print(Object x) {
System.out.print("Object");
 }
public static void main(String[] args) {
 Test t = new Test();
short s = 123;
t.print(s);
t.print(true);
t.print(6.789);
 }
}
Select one:
A. IntegerObjectObject
B. IntegerIntegerObject
C. ShortObjectObject
D. byteObjectObject
E. byteObjectObject
Correct Answer: ShortObjectObject

Question: 9
Given:
public class Test {
public static void main(String [] args) {
int x = 5;
boolean b1 = true;
boolean b2 = false;
if ((x == 4) && !b2 )
System.out.print("1 ");
System.out.print("2 ");
if ((b2 = true) && b1 )
System.out.print("3 ");
 }
 }
What is the result?
Select one:
A. 2
B. 1 2 3
C. 2 3
D. 1 2
E. 3
Correct Answer: 2 3

Question: 10
What will be the output of the following Java program, if attempted to compile and run this code with command line argument “java Account ragu raja”?
public class Account
{
  Static int rupee=18000;
public static void main(String arg[])
        {
int rupee=12000;
  System.out.println(arg[1]+" :Rs."+rupee);
        }
}
Select one:
A. Compilation and output raja :  Rs.12000
B. Compilation and output raja :  Rs.18000
C. Compile time error
D. Compilation and output ragu : Rs.12000
Correct Answer: Compile time error

Question: 11
class conversion
        {
        public static void main(String [] args)
        {
        double a = 295.04;
        int b = 300;
        byte c = (byte)a;
        byte d =(byte) b;
        System.out.println(c+ "  " + d);
        }
        }
Select one:
A. None of these
B. 39 43
C. 39 44
D. 295 300
E. 38 43
Correct Answer: 39 44

Question: 12
Which of the following is not an valid declaration of an array?
Select one:
A. int a[][]=new int[3][3];
B. int[] a=new int[3];
C. int [][]a=new int[][3];
D. int [][]a=new int[3][];
Correct Answer: int[] a=new int[3];
  
Question: 13
What Java keyword is used to declare a constant?
Select one:
A. Private
B. Static
C. None of the above
D. Final
Correct Answer: Final

Question: 14
Which of these is not a correct statement?
1.  Java support  Multilevel Inheritance
2.   Abstract class can be initiated by new operator
3.  Abstract class defines only the structure of the class not its implementation
4.  Abstract class cannot be inherited
Select one:
A. 2
B. 1 and 4
C. 1 and 2
D.1 and 3
Correct Answer: 1 and 2

Question: 15
In Java, int data type is
Select one:
A. Primitive Datatype with 16 bit size
B. Primitive Datatype with 32 bit size
C. Reference Datatype with 16 bit size
D. Reference Datatype with 32 bit size
Correct Answer: Primitive Datatype with 32 bit size

Question: 16
To prevent any method for overriding, we declare the method as
Select one:
A. final
B. Static
C. const
D. abstract
Correct Answer: final

Question: 17
Which of the following is not the reserved word in Java
Select one:
A. Char
B. Interfaces
C. String
D. Class
Correct Answer: String

Question: 18
When function overloading will not happen ?
Select one:
A. More than one method with same name, same signature, same number of parameters but different type
B. More than one method with same name but different method signature and different number or type of parameters
C. More than one method with same name, same signature but different number of signature
D. More than one method with same name, same number of parameters and type but different signature
Correct Answer: More than one method with same name, same signature but different number of signature

Question: 19
Which of the following line will not compile assuming x, y and z are bytes and j is int variable?
Select one:
A. z = 10 * x;
B. x = 3;
C. y = (byte)j;
D. z = a * b;
Correct Answer: z = 10 * x;

Question: 20

Select one:
A. 34
B. 34 S
C. S
D. Throws exception.
Correct Answer: 34 S

Question: 21
public class Test
{
public static void main (String[] args)
    {
        String foo = args[1];
        String bar = args[2];
        String baz = args[3];
System.out.println("baz = " + baz); /* Line 8 */
    }
}
Command line statement is as follows
java Test .class hello .exe epam
Select one:
A. Runtime Exception
B. baz = .
C. baz = null
D. baz = epam
Correct Answer: Runtime Exception

Question: 22
Which of the following is not true about super keyword
Select one:
A. Super never references to base class.
B. The super keyword is available in all non-static methods of a class.
C. Using super is the only case in which the type of the reference governs selection of the method implementation to be used
D. Super acts as a reference to the current object as an instance of its superclass
Correct Answer: Super never references to base class.

Question: 23
Given:
 23. Object [] myObjects = {
 24. new Integer(12),
 25. new String("foo"),
 26. new Integer(5),
 27. new Boolean(true)
 28. };
 29. Arrays.sort(myObjects);
 30. for(inti=0; i<myObjects.length; i++) {
 31. System.out.print(myObjects[i].toString());
 32. System.out.print(" ");
 33. }
What is the result?
Select one:
A. Compilation fails due to an error in line 23.
B. The value of all four objects prints in natural order.
C. A ClassCastException occurs in line 29.
D. Compilation fails due to an error in line 29.
E. A ClassCastException occurs in line 31.
Correct Answer: A ClassCastException occurs in line 29.

Question: 24
in Java, the range at which a char can span from
Select one:
A. -65535 to 65535
B. -32767 to 32766
C. 0 to 65535
D. -32768 to 32768
Correct Answer: 0 to 65535

Question: 25
Which of the following is correct?
Select one:
A. package Members declared with no access modifier are not accessible in any class at all.
B. package Members declared with private access modifier are accessible in classes in the other package, as well as in the same class itself.
C. package Members declared with private access modifier are accessible in classes in the same package, as well as in the class itself.
D. package Members declared with no access modifier are accessible in classes in the same package, as well as in the class itself.
Correct Answer: package Members declared with no access modifier are accessible in classes in the same package, as well as in the class itself.

Question: 26
Which of the following is not true about abstract class?
Select one:
A. Abstract class can contain variables marked with final keyword
B. An object of abstract class can always be created.
C. Abstract class can contain abstract and non-abstract methods
D. Each method not implemented in abstract class is also marked abstract
Correct Answer: An object of abstract class can always be created.

Question: 27
public static void main(String[] args){
               /*insert code here*/
        array[0]=10;
        array[1]=20;
        System.out.print(array[0]+":"+array[1]);
        }
 Which code fragment, when inserted at line 2, enables the code to print 10:20?

Select one:
A.
Integer array[]=new Integer[2];
               for(inti : array.length)
                       array[i]=new Integer();
B.
int[] array;
array =new  int[2];
C.int array = new int[2];
D.int array [2] ;
Correct Answer: B. int[] array;
array =new  int[2];

Question: 28
class X{
        static int i;
        int j;
        public static void main(String[] args){
               X x1= new X();
               X x2 = new X();
               x1.i=3;
               x1.j=4;
               x2.i=5;
               x2.j=6;
               System.out.println(x1.i + " "+ x1.j+ " "+x2.i+ " "+x2.j );
        }
}
What is the result?
Select one:
A. 3 4 3 6
B. 3 4 5 6
C. 3 6 4 6
D. 5 4 5 6
Correct Answer: 5 4 5 6

Question: 29
class Test {
public void display(int x, double y) {
System.out.println(x+y);
}
public double display(int p, double q){
return (p+q);
}
public static void main(String [] args) {
Test test = new Test();
test.display(4, 5.0);
System.out.println(test.display(4,5.0));
} }
Select one:
A. Compilation Error
B. 9.0 9.0
C. 9 9
D. None of these
Correct Answer: Compilation Error

Question: 30
Which of the following are true?
Select one:
A. A public class that has private fields and package private methods is not visible to classes outside the package.
B. Package private access is more lenient than protected access.
C.
You can use access modifiers to allow read access to all methods, but not any instance variables.
E. You can use access modifiers to restrict read access to all classes that begin with the word Test.
D.
You can use access modifiers so only some of the classes in a package see a particular package private class.
Correct Answer: You can use access modifiers to allow read access to all methods, but not any instance variables.

July 11, 2019

Data Storage Technologies and Networks - Comprehensive Reference Solutions

Question 
Why is SCSI performance superior to that of IDE/ATA? Explain the reasons from an architectural perspective

Answer :
SCSI offers improved performance and expandability and compatibility  options, making it suitable for high-end computers.
- Number of devices supported is 16
- SCSI architecture derives its base from the client-server relationship
- SCSI initiator, or a client, sends a request to a SCSI target, or a server.
- The target performs the tasks requested and sends the output to the initiator
- When a device is initialized, SCSI allows for automatic assignment of device IDs on the bus, which prevents two or more devices using the same SCSI IDs

Question 
What is a difference between a Cluster and a geographically-dispersed Cluster from administrative perspective?

Answer :
Geographically dispersed clusters, also called stretched clusters or extended clusters, are clusters comprised of nodes that are placed in different physical sites. Geographically dispersed clusters are designed to provide failover in the event of a site loss due to power issues, natural disasters or other unforeseen events.
From administrative perspective the difference would come up due to the storage that will be used. It won't be a common storage available at the respective locations instead a replication between the two will have to be set up and managed accordingly. Managing failover will also be different than a normal
cluster.

Question
DAS provides an economically viable alternative to other storage networking Solutions. Justify this statement

Answer :
- Setup requires a relatively lower initial investment
- Setup is managed using host-based tools, such as the host OS, which makes storage management tasks easy for small and medium enterprises.
- Requires fewer management tasks, and less hardware and software elements to set up and operate.

Question

i.Write the type of networks in place of N1 and N2. Write the type of ports in place of P1 and P2.
ii. What is meant by FC network is lossless? How FC achieve this ? How can we achieve losslessness in FCoE?

Answer
(i)N1 – IP Network. N2 – FC SAN. P1- Native SCSI port. N2- FC port

(ii) An FC network is lossless, meaning that the protocol has a built-in mechanism that prevents frame drops caused by congestion. Fibre Channel manages congestion through link level, credit based flow control. With credit-based flow control, the receiver sends credits to the sender to indicate the availability of receive buffers; the sender waits for credits before transmitting messages to the receiver Busy receive port can send the control frame to the transmit port for pause in transmission. This is called PAUSE capability of ethernet. Using this FCoE supports losslessness which is required in FC transmission.

Question
i.Write Server Configuration for the following:
Export src and ports to client01 and client02, but only, client01 has root privileges on it.
The client machines have root and can mount anywhere  on /exports. Anyone in the world can mount /exports/obj read-only.

ii.How do you recover the data from backup in following scenarios :      
(a) Full backup taken on Monday, Incremental backup taken on Tuesday, Wednesday and Thursday. You have to restore system on Friday.
(b) Full backup taken on Monday, Cumulative backup taken on Tuesday, Wednesday and Thursday. You have to restore system on Friday.

Answer
i)
# Export src and ports to client01 and client02, but only
# client01 has root privileges on it
/usr/src /usr/ports -maproot=root    client01
/usr/src /usr/ports               client02
# The client machines have root and can mount anywhere
# on /exports. Anyone in the world can mount /exports/obj read-only
/exports -alldirs -maproot=root      client01 client02
/exports/obj –ro

ii)
First restore Mondays full backup. 
(a) Then restore backup of Tuesday, wednesday and Thursday. 
(b) After restoration of Monday’s, restore Thursday’s backup

Question 
A host generates 8,000 I/Os at peak utilization with an average I/O size of 32 KB.  The response time is currently measured at an average of 12 ms during peak utilizations. When synchronous replication is implemented with a Fiber Channel ink to a remote site, what is the response time experienced by the host if the network latency is 6 ms per I/O?

Answer
Actual response time = 12+ (6*4) + (32*1024/8000) = 40.096 
Where 12 ms = current response time 
6 ms per I/O = latency 
                   32*1024/8000 = data transfer time
Question 
We have 6 nodes running a cluster. If suddenly 5 nodes found that they can communicate with each other but they cannot communicate with one specific node.
i. What steps the cluster should take to prevent data corruption? What is this phenomena called?
ii. Now if it is found that cluster is split in two groups with 3 nodes in each group. Nodes in one group can communicate with each other but can not communicate with nodes of other group. What is this situation called? Explain in brief about the steps the cluster will take to resolve the problem. 
Answer :
(i) The node will be forced to shut down through some managed Switch. This is called fencing.
(ii)This is called as split brain. To prevent data corruption cluster should shut down the group with lesser number of nodes. Since here the number of nodes are equal, cluster will take the help of quorum disk to decide the group of nodes to be shut down

Question
A host generates 8,000 I/Os at peak utilization with an average I/O size of 32 KB.  The response time is currently measured at an average of 12 ms during peak utilizations. When synchronous replication is implemented with a Fiber Channel ink to a remote site, what is the response time experienced by the host if the network latency is 6 ms per I/O?

Answer :
Actual response time = 12+ (6*4) + (32*1024/8000) = 40.096
Where 12 ms = current response time
6 ms per I/O = latency
                   32*1024/8000 = data transfer time

Question 
It is required to connect one FOCE SAN and one FC SAN to a rack mounted servers having 10Gbe CNAs. Suggest a plan of connection with a diagram showing necessary components.

Answer :

Question 
Explain the action involved between the NDMP DMA control and NDMP Server during Recovery process in the given scenario.


Answer :

DMA creates a control connection to the secondary storage agent
 Connect using TCP port 10,000
 NDMP_CONNECT_OPEN  (to negotiate version)
 NDMP_CONNECT_CLIENT_AUTH (to authenticate DMA to Server)
DMA uses the tape library media changer to load the required tape
The SCSI service is invoked
 NDMP_SCSI_OPEN
 NDMP_SCSI_EXECUTE_CDB - to manipulate media changer
NDMP_SCSI_CLOSE
DMA prepares the tape service for a recovery operation
 The tape service is invoked
 NDMP_TAPE_OPEN
 NDMP_TAPE_READ - to validate volume label
 NDMP_TAPE_MTIO - to position tape to start of backup data
DMA prepares the mover for a recovery operation
 The mover is invoked
 NDMP_MOVER_SET_RECORD_SIZE
 NDMP_MOVER_SET_WINDOW
  DMA opens control connection to the primary storage agent
 Connect using TCP port 10,000
 NDMP_CONNECT_OPEN - to negotiate protocol version
 NDMP_CONNECT_CLIENT_AUTH - to authenticate DMA to Server
  DMA queries secondary storage agent for capabilities
 NDMP_CONFIG_GET_CONNECTION_TYPE
  DMA queries primary storage agent for capabilities
 NDMP_CONFIG_GET_BUTYPE_INFO
 NDMP_CONFIG_GET_CONNECTION_TYPE
  DMA obtains the data server’s data connection address information
 The Data service is invoked
 NDMP_DATA_LISTEN
  DMA creates a data connection connection between NDMP servers
 NDMP_MOVER_CONNECT
  DMA creates a data connection connection between NDMP servers
 The mover connects to the specified IP address & TCP port
  DMA instructs the data server to initiate the recovery operation
 NDMP_DATA_START_RECOVER
  DMA recovery request is processed
 Data service determines the offset & length of the DMA specified recovery data
 Data server requests the specified data stream be transferred
 NDMP_NOTIFY_DATA_READ
  DMA instructs the mover to transfer the specified recovery stream
 NDMP_MOVER_READ
the mover interacts with the tape service to access the recovery stream
  DMA instructs the mover to transfer the specified recovery stream
 The mover begins sending recovery stream over data connection
  NDMP Data & Tape services send periodic log messages to DMA
 NDMP_LOG_MESSAGE
  NDMP Tape service sends notification when DMA intervention is required
example: end of mover window or tape medium encountered
 NDMP_NOTIFY_MOVER_PAUSED
  DMA initiates tape swap possibly utilizing media changer support
 NDMP_TAPE_MTIO - to rewind/unload tape
 NDMP_SCSI_EXECUTE_CDB - to manipulate media changer
 NDMP_TAPE_MTIO - to position new tape
 NDMP_TAPE_READ - to validate new tape header
DMA prepares the mover to continue the recovery operation
 NDMP_MOVER_SET_WINDOW
 NDMP_MOVER_CONTINUE
Data server detects end of recovery operation

April 26, 2019

Software Architectures - MCQS


Note: We have tried uploading as much as we can, there may be 4 to 6 questions which you wouldn't find it here but surely we will upload it soon. So stay tuned. At last, Thanks to Pintu one of our pro-active user who helped in this a lot. 

Question
“Partitioning of data would benefit performance” belongs to
Select one:
a. All of the given choices
b. Resource Mgmt of performance
c. Co-ordination model of performance
d. Data Model of performance

The correct answer is: Data Model of performance

Question
Which of the following is not related to Resource Mgmt of Performance
Select one:
a. Maintaining multiple copies of key data would benefit performance
b. System elements that need to be aware of, and manage, time and other performance-critical resources
c. Process/thread models
d. Prioritization of resources

The correct answer is: Prioritization of resources

Question
Information hiding methods is one of the
Select one:
a. Availability tactic
b. Reliability tactic
c. Usability tactic
d. Modifiabilty tactic

The correct answer is: Modifiabilty tactic

Question
Utility tree is to represeting
Select one:
a. Architecturally significant requirement (ASR)
b. Functional requirement
c. Stakeholders requirement
d. Business requirement

The correct answer is: Architecturally significant requirement (ASR)

Question
Which requirements can affect binding time decisions out of the following mentioned?
Select one:
a. Configurations
b. Portability
c. Regional distinctions
d. All of the choices given

The correct answer is: All of the choices given

Question
One of the statements given below is not true with respect to stakeholders' priorities. Which one?
Select one:
Database Designer: Information security issues?
Users/Customers: How easy it is to use?
Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Application Development team: How do I plan for division of work?

The correct answer is: Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?

Question
Decomposition,Uses,Layered and class are keywords used in
Select one:
a. Module structure
b. Allocation structure
c. Structure of structure
d. Component and connector structure

The correct answer is: Module structure

Question
Identification of potential quality attributes from business goals is the measure step of
Select one:
a. ASR
b. QAW
c. PALM
d. Utility Tree

The correct answer is: PALM

Question
Methods to improve Usability include (Pick the wrong answer)
Select one:
a. Intuitive UI
b. Undo / redo feature
c. Displaying status
d. Asking user to enter name twice

The correct answer is: Asking user to enter name twice

Question
One of the statements given below is not true with respect to stakeholders' priorities. Which one?
Select one:
a. Database Designer: Information security issues?
b. Application Development team: How do I plan for division of work?
c. Users/Customers: How easy it is to use?
d. Release &amp; Configuration Manager: How do I replace of a subsystem with minimal impact ?

The correct answer is: Release &amp; Configuration Manager: How do I replace of a subsystem with minimal impact ?

Question
Architecture of software is based on?

Select one:
A. Requirements
B. Design
C. Design and requirements
D. neither Design nor requirements

The correct answer is: Requirements

Question
Architectural pattern that best fits online flight booking application is

Select one:
A. Distributed Architecture
B. Model View Controller Architecture
C. Layer Architecture
D. Service Oriented Architecture

The correct answer is: Model View Controller Architecture

Question
Which of the following represents a Hierarchical organization?

Select one:
Client-Server
Deployment
Layered Structure
Decomposition

The correct answer is: Layered Structure

Question
Example(s) of Interchangeable software components

Select one:
A. All of these
B. Commercial off-the-shelf components
C. publicly available apps
D. open source software

The correct answer is: All of these

Question
Ability to “continuously provide”  service without failure means

Select one:
Performance
Usability
Reliability
Availability

The correct answer is: Reliability

Question
Which of the following does not appear on a diagram describing the WIndows Architecture?

Select one:
User Mode
SQLite
Kernel Mode
DLLs

The correct answer is: SQLite

Question
Deployment, implementation and work assignmnet are the keywords used in
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure

The correct answer is: Allocation structure

Question
How is the system to relate to non-software structures in its environment such as CPU
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure

The correct answer is: Allocation structure

Question
Learnability feature of usability attribute provides
Select one:
a. User familiarity to the system
b. Confidence to the user
c. Minimizing the impact of error
d. Adopt user need

The correct answer is: User familiarity to the system



Question
Why is software architecture called vehicle for stakeholder communication?
Select one:
a. Architecture provides a common language in which different concerns can be expressed
b. Architecture is more of technical in nature and not meant for all stakeholders
c. Both a and b
d. Each stakeholder of a software system is concerned with different characteristics of the system affected by architecture

The correct answer is: Both a and b

Question
Which software structure of module structure is useful for "implementing systems on top of 'virtual machine' portability?
Select one:
a. Class
b. Layered
c. Uses
d. Decomposition

The correct answer is: Layered

Question
Record and Playback is a

Select one:
Strategy for one of the testabilty tactics
New feature in modern music web apps
Performance enhancing tactics
Methodology to ensure the security feature of the system

Question
QAW(Quality Attribute Workshop)  is focused on:

Select one:
Reference model level concerns
System level concerns
None of the above
Component level concerns

The correct answer is: System level concerns

Question
---------------- pattern facilitates accessing shared resources and services for large numbers of distributed distributed clients.

Select one:
A. Web server
B. Client server
C. Data server
D. Proxy server

The correct answer is: Client server

Question
How do developing organizations influence by architects?

Select one:
A. Long term business
B. All of the mentioned
C. Organization structure
D. Immediate business

The correct answer is: All of the mentioned

Question
----------------- pattern suggests a solution in which components interact with via announced messages or events.

Select one:
A. Newspaper
B. Bookkeeper
C. Librarian
D. Publish Subscribe

The correct answer is: Publish Subscribe

Question
------------- pattern set a system of “equal” distributed computational entities connected to each other via a common protocol to self organize and achieve high availability and implacability.

Select one:
A. Agents
B. ATM
C. Bots
D. P2P

The correct answer is: P2P

Question
What are the concerns raised for the scenario selection procedure?

Select one:
A. How would we know if the vendor representatives were being factual?
B. Both these
C. None
D. Does the locality of change necessarily yield higher cost?

The correct answer is: How would we know if the vendor representatives were being factual?

Question
The module B expects A to write the count of total transactions handled at a particular memory location. The dependency of B on A is of

Select one:
A. Data semantics dependency
B. Location dependency
C. Data type dependency
D. Sequence dependency

The correct answer is: Data semantics dependency

Question
Which of the following can be included under observable measure?

Select one:
A. How easy it is to integrate?
B. How well the systems during execution satisfy its behavioral requirements?
C. How easy it is to test and modify?
D. All of the mentioned

The correct answer is: How well the systems during execution satisfy its behavioral requirements?

Question
The important categorie(s) of architecture structure is / are

Select one:
A. All of these mentioned
B. Allocation
C. Component and Connector
D. Module

The correct answer is: All of these mentioned

Question
In ----------------- pattern interaction, persistent data is exchanged between multiple data accessors and at least one shared data store.

Select one:
A. Shared Data
B. NDF
C. DBMS
D. Shared Object

The correct answer is:  Shared Data

Question
What is the main goal for the choice of scenarios?

Select one:
A. They should reflect the important quality requirements
B. There be a sufficient number to reflect the views of all the stakeholders
C. Both mentioned
D. None mentioned

The correct answer is: There be a sufficient number to reflect the views of all the stakeholders

Question
Which of the following is not a performance tactic?

Select one:
A. Resource Demand
B. Resource Management
C. Resource Monitor
D. Resource Arbitration

The correct answer is: Resource Monitor

Question
There are several modules that calls a service provided by A. What is the implicit dependency on A?

Select one:
A. Quality of service provided by A
B. Semantics of the result generated by A
C. the fact that A shares the same memory location of these calling modules
D. The assumption that A exists when calling the service of A
The assumption that A exists when calling the service of A

The correct answer is: The assumption that A exists when calling the service of A

Question
An on-line tax-filing application uploads the form-16 document from the employer and it fills the tax return form of an employee once she logs into the system. The file-tax-return button submits the return form and also deducts additional tax amount from her registered credit card. From quality attribute perspective, this application improves

Select one:
A. interoperability
B. performance
C. usability
D. availability

The correct answer is: usability

Question
Architecture based process includes which of the following

Select one:
A. Creating the business case for the system
B. Analyzing or valuating the architecture
C. Understanding the requirements
D. All of these mentioned

The correct answer is: All of these mentioned

Question
Adding an intermediate component between two interacting modules in an application will improve:

Select one:
A. Security of the System
B. Reliability of the System
C. Availability of the System
D. Modifiability of the System

The correct answer is: Modifiability of the System

Question
What is architectural style?

Select one:
A. Architectural style is a description of component types
B. It is a pattern of run-time control
C. All of these mentioned
D. It is set of constraints on architecture

The correct answer is: All of these mentioned

Question
What would happen if different organization were given same set of requirements?

Select one:
A. It will produce same architecture
B. It may or may not produce same architecture
C. None of the mentioned
D. It will produce different architecture

The correct answer is: None of the mentioned

Question
Availability ensures

Select one:
A. Attainment of reliability
B. All of these mentioned
C. Availability ensures
D. Minimize service outage time by fault reduction

The correct answer is: All of these mentioned

Question
------------- pattern splits system into a number of computationally independent execution structures to achieve optimized usage of resources.

Select one:
A. Layers
B. Multi tier
C. Agent
D. Broker

The correct answer is: Multi tier

Question
In a GUI application, when a user presses a button an action event is generated. What is action event in a general quality scenario?

Select one:
A. Artifact
B. Stimulus
C. Response
D. Source

The correct answer is: Stimulus

Question
------------------ pattern is a tactic to achieve highly efficient processing of enormous volumes of data at petabyte scale.

Select one:
A. Map Reduce
B. Supercomputer
C. Shift Reduce
D. Goggle

The correct answer is: Map Reduce

Question
------------------------ is a tactic to achieve Security.

Select one:
A. Maintain Audit Trail
B. License Key
C. Discover
D. copyright

The correct answer is: Maintain Audit Trail

Question
There is a monitor that records the status of the system during runtime. This is an example of

Select one:
A. Modifiability of the System
B. Availability of the System
C. Security of the System
D. Reliability of the System

The correct answer is: Security of the System

Question
--------------- pattern helps to achieve separation of concerns such that modules of system may be independently developed and maintained.

Select one:
A. SOA
B. Microkernel
C. Layered
D. MVC

The correct answer is: Layered

Question
The architects are influenced by which of the following factors?

Select one:
A. Background and experience of the architects
B. Customers and end users
C. Developing organization
D. All of these mentioned Correct

The correct answer is: All of these mentioned

Question
-------------- pattern describes a collection of distributed components that provide and/or consume the services.

Select one:
A. SOA
B. Client server
C. P2P
D. Broker

The correct answer is: SOA

Question
Source of stimulus can be

Select one:
A. Any actuator
B. Stimulus
C. None of these mentioned
D. Environment

The correct answer is: Any actuator

Question
----------------- pattern is characterized by successive transformation of streams of data using generic, loosely coupled components.

Select one:
A. Blackboard
B. Pipes and filters
C. Classroom
D. Abstraction

The correct answer is: Pipes and filters

Question
Which of the following is the main goal for the choice of scenarios?

Select one:
A. They should reflect the important quality requirements
B. Both
C. None of these
D. There be a sufficient number to reflect the views of all the stakeholders

The correct answer is: Both

Question
The incorrect method for structural design is?

Select one:
A. More procedural approach
B. Handling of larger and more complex products
C. Transition of problem models to solution models
D. Designing Object oriented systems

The correct answer is: Handling of larger and more complex products

Question
The proto scenarios recorded on flip charts as phrases as which of the following?

Select one:
A. WWW client access
B. Double number of user
C. All of these mentioned
D. Degraded Operation

The correct answer is: All of these mentioned

Question
Denial of Service attack affects the __________ of the system.

Select one:
A. All of these
B. Usability
C. Availability
D. Security

The correct answer is: Availability

Question
Tactics which ensures interoperability includes

Select one:
A. Orchestrate and Tailor interface
B. Both of these
C. None of these
D. Discover service and Tailor interface

The correct answer is: Both of these

Question
To capture data store and access to data from the store by various components you use

Select one:
A. Module dependency structure
B. component and hardware dependency
C. component connector structure
D. work-allocation of modules

The correct answer is: component connector structure

Question
--------------- pattern defines a runtime component that mediates the communication between a number of clients and servers.

Select one:
A. Proxy
B. Middleware
C. Broker
D. Load balancer

The correct answer is: Broker

Question
---------------- pattern separates out presentation from functionality of the system.

Select one:
A. Maps
B. UI/UX
C. MVC
D. Controller

The correct answer is: MVC

Question
Authorizing the user is a __________

Select one:
A. Usability tactic
B. Security tactic
C. Availability tactic
D. Performance tactic

The correct answer is: Security tactic

Question
Which of the following is the incorrect sequence Summary Steps for scenario selection process?

Select one:
A. Method presentation
B. Refinement and selection
C. Participant buy-in and expression of concerns and issues
D. All of these mentioned

The correct answer is: Participant buy-in and expression of concerns and issues

Question
Which among the following are true with regards to the architecture business cycle?

Select one:
A. All of these mentioned
B. None of these mentioned
C. The architecture affects the structure of developing organizations
D. The architecture can affect the enterprise goals of the developing organizations

The correct answer is: The architecture affects the structure of developing organizations

January 04, 2019

Software Testing Methodologies - MCQS 2

                                                                
Question
Which is not Fault categories in these?

Select one:
a. Extra State Error
b. Logical Error
c. Transfer Error
d. Missing State Error

The correct answer is: Logical Error

Question
Adding Variables and Conditions to FSM is called

Select one:
a. None
b. FSM++
c. Advanced FSM
d. Extended FSM

The correct answer is: Extended FSM

Question
Characteristics of Path-based Integration

Select one:
a. Interfaces are behavioral
b. Interfaces are behavioral
c. None
d. Co-functioning, Interfaces are structural and interactions are behavioral

The correct answer is: Co-functioning, Interfaces are structural and interactions are behavioral

Question
Which one of the followings is a Call Graph-Based Integration

Select one:
a. Neighbourhood and Closed-users
b. All of the above
c. Pairwise and Neighbourhood
d. Pairwise and Closed-Users

The correct answer is: Pairwise and Neighbourhood

Question
Path based integration testing is also called as

Select one:
a. Hybrid integration testing
b. Pairwise integration testing
c. Neighbourhood integration testing
d. Sandwich integration testing

The correct answer is:Hybrid integration testing

Question
MM path testing is used is

Select one:
a. model based testing
b. object oriented testing
c. state based testing
d. System testing

The correct answer is:object oriented testing

Question
What are the Integration testing appraoch classified under Call Graph-Based Integration:

Select one:
a. Neighbourhood, Sandwich
b. Pair-Wise, Top-down
c. Bottom-up,Neighbourhood
d. Pair-Wise, Neighbourhood

The correct answer is:Pair-Wise, Neighbourhood

Question
In Data Flow Testing, an Use is a statement that __________ a value of variable

Select one:
a. All options
b. validates
c. references
d. Manipulates

The correct answer is:references

Question
Which of the following is black-box oriented and can be accomplished by applying the same black-box methods discussed for conventional software?

Select one:
a. Test case design
b. Both Conventional testing and OO system validation testing
c. OO system validation testing
d. Conventional testing

The correct answer is:Both Conventional testing and OO system validation testing

Question
Which of the testing processes is the process of verifying the interaction between software components?

Select one:
a. Integration Testing
b. System Testing
c. Object-Oriented Testing
d. Unit Testing

The correct answer is:Integration Testing

Question
In an Object Oriented System, if A derives from B and B derives from C, then which one of the following is incorrect with respect to OO testing?

Select one:
a. To test A, create a class by flattening technique (merge methods and attributes of A, B and C)
b. Cannot directly test A- need to flatten it because it is a sub-class
c. To test C, create a class by flattening technique (merge methods and attributes of A, B and C)
d. To test B, create a class by flattening technique (merge methods and attributes of B and C)

The correct answer is:To test C, create a class by flattening technique (merge methods and attributes of A, B and C)

Question
A usage node USE(v, n) is a predicate use (denoted as P-use)

Select one:
a. iff the statement n is an output statement
b. iff the statement n is a predicate statement
c. iff the statement n is procedure call
d. iff the statement n is an input statement

The correct answer is:iff the statement n is a predicate statement

Question
Issue with class flattening is

Select one:
a. Uncertainty-flattened class is not part of final system
b. meaning of system will change
c. None of the options
d. create irrelevant class

The correct answer is:Uncertainty-flattened class is not part of final system

Question
Integration testing is

Select one:
a. process of verifying interaction between software components
b. ALL
c. process of testing interfaces
d. process of verifying interaction between different programs

The correct answer is:process of verifying interaction between software components

Question
operation error in fault model is tested by

Select one:
a. Extra state testing
b. Missing state testing
c. Incorrect state transition
d. Error generated upon transition

The correct answer is:Error generated upon transition

Question
Which is NOT a higher level of testing?

Select one:
a. System Testing
b. Unit Testing
c. Integration Testing
d. Sub-System Testing

The correct answer is:Unit Testing

Question
Class flattening is

Select one:
a. Association of attributes and operation of a class
b. Removing unnecessary attributes and operations from class
c. A composition of various classes together
d. Original class expanded to include all the attributes and operation it inherits

The correct answer is: Original class expanded to include all the attributes and operation it inherits

Question
which statement is not True in case of Neighbourhood?

Select one:
a. Interior nodes = nodes - (source nodes + sink nodes)
b. Neighbourhoods = nodes - sink nodes
c. Neighbourhoods = sink nodes + nodes
d. Neibhourhoods = interior nodes + source nodes

The correct answer is:Neighbourhoods = sink nodes + nodes

Question
class flattening is used to test following object oriented feature

Select one:
a. constructor
b. template
c. polymorphism
d. inheritance

The correct answer is:inheritance

Question
Which View of class testing is used for Inheritance?

Select one:
a. Compile Time View
b. None
c. Execution View
d. Static View

The correct answer is:Compile Time View

Question
Call Graph (CG) based approach is

Select one:
a. Both Pair-wise and Neighborhood integration
b. Neither Pair-wise integration nor Neighborhood integration
c. Only Pair-wise integration
d. Only Neighborhood integration

The correct answer is: Both Pair-wise and Neighborhood integration

Question
In Top-Down integration testing, which one of the followings that you may need to develop?

Select one:
a. Drivers
b. Connectors
c. Interfaces
d. Stubs

The correct answer is:Stubs

Question
Data Flow Testing is best where _____________________ is high.

Select one:
a. Complexity requirement
b. Usability
c. Reliability requirement
d. Computation

The correct answer is:Reliability requirement

Question
One of the  issues with flattened class could be the following:

Select one:
a. A flattened class will be part of a final system, so some redundancy of testing remains
b. A flattened class will not be part of a final system, so no uncertainty remains
c. A flattened class will not be part of a final system, so some uncertainty remains
d. A flattened class will not be part of a final system, so no uncertainty remains

The correct answer is:A flattened class will not be part of a final system, so some uncertainty remains

Question
When will the working version of the system be ready in case Sandwich approach?

Select one:
a. None
b. Early
c. Never
d. Late

The correct answer is:Early

Question
Number of Integration Cycles/Sessions in Integration Testing is:

Select one:
a. Session = nodes  +  leaves  + edges
b. Session = nodes  – leaves  +  edge
c. Session = nodes  + leaves  –  edges
d. Session = nodes  –  leaves  – edges

The correct answer is:Session = nodes  – leaves  +  edge

Question
Big Bang integration approach:

Select one:
a. Suffers with problem of fault isolation
b. None of the option
c. Requires creation of a large number of stubs and drivers
d. Number of integration testing sessions is 2

The correct answer is:Suffers with problem of fault isolation.

Question
System of systems is

Select one:
a. A set of component systems
b. A collection of cooperating systems
c. All of the above options
d. A  collection of autonomous systems

The correct answer is: A collection of cooperating systems

Question
Select the odd man out

Select one:
a. Sandwich
b. Pair-Wise
c. Top-down
d. Bottom-up

The correct answer is: Pair-Wise

Question
Sandwich integration strategies

Select one:
a. use equal number of stubs and drivers
b. use less stubs and more drivers
c. use more stubs and less drivers
d. use both stubs and drivers

The correct answer is: use both stubs and drivers

Question
Parallel Testing is highly used in which Integration approach?

Select one:
a. Sandwich
b. Big Bang
c. Bottom-up
d. Top-down

The correct answer is: Big Bang

Question
Which of the following determines state diagram?

Select one:
a. The UML notation for specifying finite automata is the state diagram
b. None of the mentioned
c. All of the mentioned
d. In state diagrams, states are represented by rounded rectangles

The correct answer is: All of the mentioned

Question
Data Flow testing refers to forms of structural testing that focus on:

Select one:
a. All options
b. An unifying structure of test coverage metrics
c. Serves as a “reality check” on path testing
d. The point at which variables receive values and the point at which these values are used (or referenced)

The correct answer is: All options

Question
if (v>0) then print (v) represents:

Select one:
a. USE of v
b. C-use of v
c. Define of v
d. P-use of v

The correct answer is: P-use of v

Question
In Bottom-Up integration testing, which one of the followings that you may need to develop?

Select one:
a. Interfaces
b. Stubs
c. Drivers
d. Connectors

The correct answer is: Drivers

Question
What is the main problem with static view of a class while treating class as a unit?

Select one:
a. Methods of the class are ignored
b. Functions of the class are ignored
c. Inheritances are ignored
d. Data of the class are ignored

The correct answer is: Inheritances are ignored

Question
In data flow testing, objective is to find

Select one:
a. All du-paths
b. All dc-paths that are not du-paths
c. All du-paths that are not dc-paths
d. All dc-paths

The correct answer is: All du-paths

Question
Data Flow Testing refer to

Select one:
a. Point at which the variable receive values and the point at which it is used
b. Understanding how Data changes to Result
c. None of the options
d. Inputting Data

The correct answer is: Point at which the variable receive values and the point at which it is used

Question
Different strategies used in state model to design test cases are

Select one:
a. State Testing, Transition Testing, Path Testing
b. Transition Testing, Coverage Testing
c. Code Testing, Path Testing
d. State Testing, Code Testing

The correct answer is: State Testing, Transition Testing, Path Testing

Question 
Which of the testing methods is NOT part of decomposition based integration testing?

Select one:
a. Circular
b. Bottom-Up
c. Top-Down
d. Sandwich

The correct answer is: Circular

Question
A rich extention of FSM

Select one:
a. None
b. Path testing
c. Petri nets
d. State Charts

The correct answer is: State Charts

Question
One of the  issues with flattened class could be the following:

Select one:
a. A flattened class will not be part of a final system, so some uncertainty remains
b. A flattened class will not be part of a final system, so no uncertainty remains
c. A flattened class will be part of a final system, so some redundancy of testing remains
d. A flattened class will not be part of a final system, so no uncertainty remains

The correct answer is: A flattened class will not be part of a final system, so some uncertainty remains

Question
Which one is not a State amongst these?

Select one:
a. Name
b. Colour
c. Barking
d. Age

The correct answer is: Barking

Question
A usage node USE(v, n) is a computation use (denoted as C-use)

Select one:
a. iff the statement n is an input/output statement
b. None of the options
c. iff the statement n is a predicate statement
d. iff the statement n is a Computation statement

The correct answer is: iff the statement n is a Computation statement

Question
Software Test Stubs are

Select one:
a. Used to connect a software with a driver
b. None of the options
c. Programs which simulate the behaviors of software components that are the control modules of a under test module
d. Programs which simulate the behaviors of software components that are the dependent modules of a under test module

The correct answer is: Programs which simulate the behaviors of software components that are the dependent modules of a under test module

Question
A Module Execution Path (MEP) is

Select one:
a. None of the options
b. A sequence of statements that begins with a ‘Source Node’ and ends with a ‘Sink Node’, with no intervening sink nodes
c. A sequence of statements that begins with a ‘Sink Node’ and ends with a ‘Source Node’, with no intervening sink nodes
d. A sequence of statements that begins with a couple of ‘Source Nodes’ and ends with a couple of ‘Sink Nodes’, with no intervening sink nodes

The correct answer is: A sequence of statements that begins with a ‘Source Node’ and ends with a ‘Sink Node’, with no intervening sink nodes

Question
Operation error in a fault model is:

Select one:
a. Corrupt input
b.  input function
c. Output values are garbled
d. Error generated upon transition like  output function

The correct answer is: Error generated upon transition like  output function

Question
What is the BEST definition of flattened class?

Select one:
a. A flattened class is an original class expanded to include all the attributes and functions.
b. A flattened class is an original class expanded to include all the attributes and operations it inherits
c. A flattened class is an original class expanded to include all the attributes of the class itself.
d. A flattened class is an original class expanded to include all the attributes but not the operations it inherits

The correct answer is: A flattened class is an original class expanded to include all the attributes and operations it inherits

Question
Which are not Issues with Flattening in Inheritence

Select one:
a. Uncertainity
b. flattened class is not part of final system
c. flattened class is part of the final system
d. Similar issue as insrumented code

The correct answer is: flattened class is part of the final system

Question
Transfer error in a fault model is:

Select one:
a. Incorrect state transition
b. None of the option
c. Specification-based testing technique
d. transition to next state

The correct answer is: Incorrect state transition

Question
Testing criteria of state machine are

Select one:
a. state coverage,transition coverage and path coverage
b. All the options are correct
c. path coverage
d. state coverage only

The correct answer is: state coverage,transition coverage and path coverage

Question
Data Flow testing helps to resolve the define/reference  anomalies:

Select one:
a. A variable that is used but never defined
b. All options
c. A variable that is defined twice before it is used
d. A variable that is defined but never used (referenced)

The correct answer is: All options

Question
Fault categories include

Select one:
a. new state error,fault state error,operation error,transfer error
b. operation error and transfer error
c. transmission error
d. operation error,transfer error,extra state error,missing state error

The correct answer is: operation error,transfer error,extra state error,missing state error

Question
Which of the following is true?

Select one:
a. Transitions may be spontaneous, but usually some event triggers them
b. A transition is a change from one state to another
c. All of the mentioned
d. An event is a noteworthy occurrence at a particular time; events have no duration

The correct answer is: All of the mentioned   

Question
Software Test Drivers are

Select one:
a. None of the options
b. Programs which simulate the behaviors of software components that are the dependent modules of a under test module
c. Used to connect a software with a driver
d. Programs which simulate the behaviors of software components that are the control modules of a under test module

The correct answer is: Programs which simulate the behaviors of software components that are the control modules of a under test module

Question
Issues with Flattening of classes leads to

Select one:
a. None
b. problems like any instrumented code
c. poor testing
d. uncertainity as it is not part of the final system

The correct answer is: uncertainity as it is not part of the final system

Question
Which of the following is a part of testing OO code?

Select one:
a. Integration tests
b. System tests
c. Validation tests
d. Class tests

The correct answer is: Class tests

Question
Which one of  the  following  statements best  reflects realistic  expectations from  introducing MBT  into the software development life cycle?

Select one:
a. Since reuse of a system design model is possible in MBT, after small investment, the usage of MBT in a development process is almost for free.
b. Adding an MBT tool without change in the existing organization and/or test process is an effective approach.
c. MBT users do not need to understand test design techniques because test generation with MBT is fully automated.
d. Carefully introducing changes to the whole test process when introducing MBT, including test team training, helps to obtain measurable progress.

The correct answer is: Carefully introducing changes to the whole test process when introducing MBT, including test team training, helps to obtain measurable progress.

Question
Useful formalism to express concurrency and timing - this is true for which model?

Select one:
a. StateCharts
b. Petri Nets
c. FSM
d. None

The correct answer is: Petri Nets

Question
Flattening of classes is

Select one:
a. Required for testing subclasses
b. Required to overcome the challenges posed by encapsulation concept of OO systems
c. Involves merging methods of a sub-class
d. Creates classes that are a part of the final product

The correct answer is: Required for testing subclasses

Question
The statement v=x+n+2; a definition of v

Select one:
a. None
b. is a computation use of v
c. is a definition of v
d. is a output statement of v

The correct answer is: is a definition of v

Question
In a Definition – Use pair (du pair)

Select one:
a. There should be a control path from d to u along which the variable is not modified
b. All of the options
c. There should be a Definition statement to define a variable (d)
d. There should be a Use statement where the variable is used (u)

The correct answer is: All of the options

Question
What are the Integration testing appraoch classified under Decomposition based:

Select one:
a. Top-down, Pair-Wise, Bottom-up
b. Sandwich, Neighbourhood, Top-down
c. Top-down, Bottom-up, Sandwich, Big-bang
d. Pair-wise, Neighbourhood

The correct answer is: Top-down, Bottom-up, Sandwich, Big-bang

Question
which of following describes system behaviour

Select one:
a. Control flow graph
b. Data Flow graph
c. Path in the flow graphs
d. Finite state machine

The correct answer is: Finite state machine

Question
When will be the interface erros will get detected in case Biga Bang appraoch?

Select one:
a. Never
b. Early
c. None
d. Late

The correct answer is: Late

Question
i=0;if (i<10) { x= i+1; print(x);} How many DU pairs are there for i ?

Select one:
a. 4
b. 1
c. 3
d. 2

The correct answer is: 2

Question
Which one is not an Executable Model?

Select one:
a. Finite State Machines
b. Petri Nets
c. StateCharts
d. Basis Paths


The correct answer is: Basis Paths

Question
One of the  issues with flattened class could be the following:

Select one:
a. A flattened class will be part of a final system, so some redundancy of testing remains
b. A flattened class will not be part of a final system, so no uncertainty remains
c. A flattened class will not be part of a final system, so some uncertainty remains
d. A flattened class will not be part of a final system, so no uncertainty remains


The correct answer is: A flattened class will not be part of a final system, so some uncertainty remains

Question
Testing polymorphism

Select one:
a. is to develop test cases for client that exercise all client bindings to polymorphic calls.
b. is to develop test cases for base and derived classes.
c. is to develop test cases using class flattening
d. is to develop test cases for all possible classes and objects Incorrect

The correct answer is: is to develop test cases for client that exercise all client bindings to polymorphic calls.

Question
i=i+1 represents:

Select one:
a. DEF (i, n)
b. C-USE (i, n)
c. USE (i, n)
d. P-USE (i, n)

The correct answer is: DEF (i, n)