Cs312 Objective Part 2 Midterm
Cs312 Objective Part 2 Midterm
Software requirements
In requirement gathering phase ,if requirement gathering person is unable to explain the fact
Missing Requirements
Changing Requirements
Outstanding Requirements
process through which a person or a machine can check that the software product
Traceability
Consistent
Verifiable
Loading time of a software should be two second, this requirement is considered to be —----------- from all
stakeholders.
Completeness
Verifiable
Consistent
The ------------ should be communicated in such a way so the testing team should
Product
Scenario
Requirement
A --------- requirements specification must precisely define all the real world
Complete
Consistent
Traceability
In the completeness attribute of the software requirement , Which of the following should not be included?
Select the correct option
Reload Math Equations
Specific
Verifiable
With in scope
Non-verifiable
Hard
Phrases
Guess
The software requirement is said to be ---------- if it is not in conflict with any other
existing requirements.
Verifiable
Completeness
Consistent
------------ may arise due to variation in language patterns, use of different vocabulary or multiple descriptions of a
single requirement.
Conflict
Transform
Consent
Consider a scenario : the requirement says perform function Z after both X and Y
Failure
Success
Traceability
------------- of the origin can help to understand what modifications have been
Verifiable
Consistent
Traceability
Traceability of ------------ is used to aid the modification of future documents by stating where a requirement has
been referenced.
Falsity
Fabrication
Reference
A requirement is ---------- if both the origins and the references of the requirement
is available.
Select the correct option
Reload Math Equations
Lack consistency
Incomplete
Traceable
Non-Verifiable
techniques that ensure the completeness, ------------, and relevance of the system
requirements .
Consistency
Redundancy
Out of scope
System Analysis
Project management
Requirement engineering
Tangible
Scope
Intangible
Data Managements
Requirement Management
Which of the following disciplines will monitor and control the scope of the project?
Requirement Management
Data Managements
effectively.
Select the correct option
Reload Math Equations
Analysis
Communication
Validate
Commitment
------------------ is the process of identifying and then monitoring the needs of all stakeholders involved in a project,
and making sure that these goals/needs are met.
System Analysis
Requirement Management
Broader Scope
Internal Scope
Baseline scope
requirements.
Baseline
Soft
Broadline
------------ is a part in which the requirements are gathered and then turned into
specification of what the system must do, or the scope or features of the software
system.
System Analysis
Data Managements
Analysis
Complexity
Analysis
Consistency
Verification
Deployment Techniques
System Analysis
Data Managements
Which of the following techniques are frequently used for collecting/gathering the
Interview,Questionnaire
The ----------- of the scope is to be defined along with the baseline to deliver.
Select the correct option
Reload Math Equations
Priority
Efficiency
Requirement
Time
After prioritizing the features, development team is capable to schedule project activities to deliver with in
------------ .
Target
Budget
Time
In order to manage the scope of a project in a proper manner, which of the following
must be met?
Barrier
Baseline
Boundary
--------- -- at the time of requirement elicitation stage may leads to project failure.
Lack of stakeholder
Project management
Validation
Requirement documentation
To get good after prioritizing the features, development team is capable to schedule project activities to deliver
within ------------ .
Budget
Boundary
Time
Consider a program is developed for a Web server with the failure intensity
hours, handling 20,000 transactions per hour on average with no failures occurring.
Reliability
Robustness
Consistency
input, calculations.
User Friendliness
Robustness
Consistency
Functional requirements
Hardware requirements
User requirement
Requirement analysis identifies the conflict with the ------------- as the prototype is
made and the further development needs are clear at this stage.
Select the correct option
Reload Math Equations
Top management
Border line
Lower management
Base line
--------------- breaks down functional and non-functional requirements to a basic design view to provide a clear
system development process framework.
Hardware requirements
User requirement
Conflict analysis
Verification
Evaluation
Validation
Requirements Verification
Requirement analysis
Requirement Specification
----------- is defined as the wrong definition of the client’s requirements.
Bugs
Interrupt
Defect
Software Document
----------- can be defined as the noncompliance with the agreed behavior, or software
Bugs
Interrupt
Defect
Time
Bugs
Hardship
resorting to a combination of table name, primary key value, and column name. It is
------------.
All information in the relational database is represented in exactly one and only one
---------------is based on the relational model of data in which all the data is presented
Graph databases
Relational database
Wide-column databases
Null
Numaric
String
NULL values are supported in the fully relational RDBMS for representing ----------
Misinterpreted
Accurate
Missing
------------.
A database can only be accessed using a language having ----------- that supports
Language syntax
Linear syntax
Complex syntax
A --------------- can be defined as a language which is parsed from left to right which implies the ability to write
code without the use of line-feed or carriage-return characters.
Complex syntax
Linear syntax
Language syntax
Which of the following rule deals with views, which are virtual tables used to give
Information Rule
Database
Rows
Tables
Columns
Database
Tables
Which of the following operation is not supported by Relational Level Operation
rule?
Minus
Union
Power
supported for any retrievable set rather than just for a single row in a single table.
Insert, update, and delete operations ______ supported for any retrievable set rather
Partially
Should not be
May be
Independence” rule?
Users should be concerned about how the data is stored or how it’s accessed.
System should be concerned about how the data is stored or how it’s accessed.
System shouldn’t be concerned about how the data is stored or how it’s accessed.
Independence” rule?
User views data should not change when the logical structure (tables structure) of the
database changes.
Changes to the physical level must not require a change to an application based on the
structure.
User views data should change when the logical structure (tables structure) of the
database changes.
“Insert, update, and delete operations should be supported for any retrievable set rather
than just for a single row in a single table.”
“Changes to the logical level (tables, columns, rows, and so on) must not require a
change to an application based on the structure.”
“The way the data is stored physically must be independent of the logical manner in
which it’s accessed.”
Independence” rule?
Changes to the physical level must not require a change to an application based on the
structure.
User views data should not change when the logical structure (tables structure) of the
database changes.
Changes to the physical level must require a change to an application based on the
structure.
“The way the data is stored physically must be independent of the logical manner in
which it’s accessed.”
“Insert, update, and delete operations should be supported for any retrievable set rather
than just for a single row in a single table.”
“Changes to the logical level (tables, columns, rows, and so on) must not require a
change to an application based on the structure.”
The type of data independence in which the schema can be altered on conceptual
Dictionary
Context
Table
Consider the following statement and identify the relational database rule which is
“All its integrity constraints can be independently modified without the need of any
Integrity Independence
Distribution Independence
Union constraints
Check constraints
The database _____ must enable application programs and terminal activities to
remain logically unimpaired whether and whenever data are physically centralized
or distributed.”
Language
Logical design
Physical design
Which of the following rule says that the database language must be able to
Integrity Independence
Physical Data Independence
Integrity Independence
Distribution Independence
constraints defined.
Distribution Independence
that low- level language cannot be used to bypass the integrity rules or constraints
Non-Subversion Rule
Distribution Independence
Integrity Independence
MariaDB
Oracle
MongoDB
The _______ can also be referred as a blueprint of how the database is constructed or
Database Schema
Database relation
Database instance
Which of the following is a logical way of grouping database objects like tables, indexes and views?
Select the correct option
Reload Math Equations
Database relation
Database entity
Database instance
Database Schema
Which of the following has privileges to has authorized access to Objects and users
Database relation
Database entity
Database Schema
Database instance
Database entity
Database relation
Which of the following is better explained as the group of database objects like
tables, indexes, triggers and constraints that are related to each other?
Database instance
Database Schema
Database entity
Database instance
Database Schema
Database relation
Field
Record
Each record is assigned a _____ number to manage the record reference which is
known as a key.
Identical
Unique
Duplicate
This key equips each database record with a unique ______ which can be easily
tracked.
Select the correct option
Reload Math Equations
Documentation
Identification
Database
Table
1
Which of the following DDL (Data Definition Language) statement can be used to
CREATE
UPDATE
DROP
Which of the following language is a standard for commands that define the
DROP
INSERT
ALTER
Which of the following DML (Data Manipulation Language) command can be used to
INSERT
ALTER
Which of the following language is used for selecting, inserting, deleting and
INSERT
UPDATE
ALTER
UPDATE
GRANT
ALTER
Which of the following DCL (Data Control Language) command can be used to withdraw the access rights?
SAVEPOINT
REVOKE
ROLLBACK
Which of the following language is used to create privileges to allow users access
UPDATE
GRANT
INSERT
Which of the following command allows us to specify the type of information which
we want to retrieve?
REVOKE
SELECT
COMMIT
Which of the following language is used to retrieve data from a database object in
Which of the following diagram only visualize the business data instead of defining
Database diagram
Which of the following is a graphical representation of the relationships between data in a database?
Sequence diagram
Entity diagram
graphically.
Logical Structure
Model Structure
View Structure
Which of the following diagram in database design, which gives a higher level
Database diagram
Entity diagram
In Entity relationship diagram, data is represented as ________ that are linked with
each other by relationships that express the dependencies and requirements
between them.
Relationships
Cardinalities
Entity
3
1
The word entity is rooted from the Latin word “en” which means_______.
Useless
Nothingness
Being
All these entities have some ______ that give them their identity.
Attributes
Relationships
Cardinalities
Relationships
Cardinalities
Entities
Attributes
Cardinalities
Relationships
Cardinalities
Relationships
Attributes
Cardinalities
Attributes
Entities
Let suppose that you are collecting and storing information about a music collection
_____.
Attribute
Relation
Instance
In ERD, _______ represents how data is connected among entities in a given System.
Instance
Attributes
Cardinalities
Entities
Relationships