Prep
Bee
Pakistan
Pakistan's #1 Free MCQ Practice Platform for Govt Job Exams
MCQs
Categories
Quiz
Past Papers
Quiz Mode
Login
Register
Preparing your study page...
Search MCQs
Search and filters
Search
Subject
Any subject
Agriculture
Biology
Chemical Engineering
Chemistry
Computer Science
Current Affairs
Economics
English
Everyday Science
General Knowledge
Intelligence
International Current Affairs
Islamic Studies
Judiciary And Law
Management Sciences
Mathematics
Mechanical Engineering
Medical Science
Pakistan Current Affairs
Pakistan Studies
Pedagogy
Physical Education
Physics
Psychology
Sociology
Software Engineering
Urdu
Difficulty
Any
Easy
Medium
Hard
Language
Any
English
Urdu
Bilingual
Sort
Latest
Oldest
Most attempted
Apply
MEDIUM
ENGLISH
Software Engineering
What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
A
Fault Avoidance
Option A
B
Fault detection
Option B
C
Fault tolerance
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
What is the term for a system that is designed such that the faults in the delivered software do not result in system failure ?
A
Fault Avoidance
Option A
B
Fault detection
Option B
C
Fault tolerance
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
What is a Range check ?
A
Check that the input does not exceed some maximum size e.g. 40 characters for a name
Option A
B
Check that the input falls within a known range
Option B
C
Use information about the input to check if it is reasonable rather than an extreme value
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which of the following is not a Protection system ?
A
System to stop a train if it passes a red light
Option A
B
System to indicate not returning of the library book
Option B
C
System to shut down a reactor if temperature/pressure are too high
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which of the following is a bad practice of Dependable programming ?
A
Limit the visibility of information in a program
Option A
B
Check array bounds
Option B
C
Check all inputs for validity
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which of the following is a layer of protection for Security ?
A
Platform-level protection
Option A
B
Application-level protection
Option B
C
Record-level protection
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
What are security controls ?
A
Controls that are intended to ensure that attacks are unsuccessful
Option A
B
Controls that are intended to detect and repel attacks
Option B
C
Controls that are intended to support recovery from problems
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Controls that are intended to ensure that attacks are unsuccessful is analogous to ______________ in dependability engineering?
A
Fault avoidance
Option A
B
Fault tolerance
Option B
C
Fault detection
Option C
D
Fault Recovery
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
What is Life cycle risk assessment ?
A
Risk assessment before the system has been deployed
Option A
B
Risk assessment while the system is being developed
Option B
C
All of the mentioned
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
A system resource that has a value and has to be protected is known as ________________________?
A
Asset
Option A
B
Control
Option B
C
Vulnerability
Option C
D
None of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Circumstances that have potential to cause loss or harm is known as___________________?
A
Attack
Option A
B
Threat
Option B
C
Vulnerability
Option C
D
Control
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic” ?
A
Storage management faults
Option A
B
Data Faults
Option B
C
Input/Output Faults
Option C
D
Interface faults
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Choose the fault class in which the following automated static analysis check would fall: “Unreachable code”?
A
Control Faults
Option A
B
Data Faults
Option B
C
Input/Output Faults
Option C
D
Interface faults
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which level of Static Analysis allows specific rules that apply to a program to be checked ?
A
Characteristic error checking
Option A
B
User-defined error checking
Option B
C
Assertion checking
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”?
A
Storage management faults
Option A
B
Data Faults
Option B
C
Input/Output Faults
Option C
D
Interface faults
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”?
A
Control Faults
Option A
B
Data Faults
Option B
C
Input/Output Faults
Option C
D
Interface faults
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Select the disadvantage of using Formal methods ___________________?
A
Concurrent systems can be analysed to discover race conditions that might lead to deadlock
Option A
B
Producing a mathematical specification requires a detailed analysis of the requirements
Option B
C
They require the use of specialised notations that cannot be understood by domain experts
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
The records of each patient that is receiving or has received treatment resembles which security concept ?
A
Asset
Option A
B
Threat
Option B
C
Vulnerability
Option C
D
Control
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which of the following is incorrect with respect to Model Checking ?
A
Model checking is particularly valuable for verifying concurrent systems
Option A
B
Model checking is computationally very inexpensive
Option B
C
The model checker explores all possible paths through the model
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
MEDIUM
ENGLISH
Software Engineering
Which of the following is a technique covered in Static Analysis ?
A
Formal verification
Option A
B
Model checking
Option B
C
Automated program analysis
Option C
D
All of the mentioned
Option D
Show Answer
Open Detail
Previous page
1
287
288
289
290
291
5754
Next page