Software Engineering Mcqs

Practice MCQs under Software Engineering Mcqs. 2032 available Open paginated MCQ list →

Questions

Correct options are highlighted when revealed.

1.Is it crucial to implement a clearly defined and consistent process to reduce errors in a system?

2.What do we call a system that continues to operate correctly even if there are faults in the software delivered?

3.What is the name of the development approach where defects are identified and corrected prior to delivering the system to the customer?

4.Which approach is considered a strategy for attaining software diversity?

5.In Dependability Engineering, which process attribute is described by the phrase: "The process must be comprehensible to individuals other than those directly involved"?

6.Which of the following scenarios is least associated with dependability engineering?

7.Which type of failure occurs when a system's malfunction results in harm to the system or its data?

8.During which phase of risk analysis are extra security requirements incorporated based on the technologies employed in system construction as well as design and implementation decisions?

9.Which reliability metric indicates the expected number of system failures within a specified time frame?

10.Is it necessary to identify the risks to be addressed when defining security requirements?

11.Which type of reliability requirements focus on restoring system functionality by maintaining backups or copies?

12.Which of the following does not represent a functional reliability requirement for a system?

13.What does the acronym POFOD represent?

14.What is the total number of phases involved in the Risk-driven requirements specification process?

15.What is the term for an occurrence at a specific time when a system fails to provide the service its users anticipate?

16.If a system becomes inaccessible and is unable to provide its functionalities to users, what type of failure does this represent?

17.What term describes a flaw in a computer system that can be exploited to inflict damage or loss?

18.What term describes a password validation mechanism that rejects passwords consisting of common dictionary words or proper names in the context of security systems?

19.What term describes the evaluation of the most severe damage that a specific hazard could cause?

20.What is the term for an incorrect system condition that may cause the system to behave in ways not anticipated by its users?

Past Papers & Resources →