MCQOPTIONS
Saved Bookmarks
This section includes 176 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Business Administration (BBA) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Security (backups, firewall) will be a ________ requirement. |
| A. | functional. |
| B. | non-functional. |
| C. | normal. |
| D. | security. |
| Answer» C. normal. | |
| 52. |
The standard way of evaluating the economic benefits of any projects is to carryout a ________ analysis. |
| A. | price-benefit. |
| B. | cost-benefit. |
| C. | cash flow. |
| D. | fund flow. |
| Answer» C. cash flow. | |
| 53. |
The costs that include the salaries and other employment costs of the staff involvedin the project development and all associated costs are called____________. |
| A. | operational cost. |
| B. | development cost. |
| C. | setup cost. |
| D. | direct cost. |
| Answer» C. setup cost. | |
| 54. |
Diagrammatic form for Flow oriented Modelling……… |
| A. | functional diagrams. |
| B. | er diagrams. |
| C. | data flow diagrams. |
| D. | system flow diagrams. |
| Answer» D. system flow diagrams. | |
| 55. |
Requirements engineering provides the mechanism for _________. |
| A. | understanding custom needs. |
| B. | assessing facility. |
| C. | analyzing need. |
| D. | all of the above . |
| Answer» E. | |
| 56. |
__________ relates to the physical resources used when the software isexecuted. |
| A. | functionality. |
| B. | maintainability. |
| C. | reliability. |
| D. | efficiency. |
| Answer» E. | |
| 57. |
The time by which an activity may be delayed without affecting anysubsequent activity is called _________. |
| A. | action float. |
| B. | terminal float. |
| C. | free float |
| D. | null float |
| Answer» D. null float | |
| 58. |
_______ is a modular building block for computer software. |
| A. | control. |
| B. | flow. |
| C. | process. |
| D. | component. |
| Answer» E. | |
| 59. |
The shortest time in which we could expect to complete the activity, barringoutright miracles are called ________. |
| A. | optimistic time. |
| B. | pessimistic time. |
| C. | most likely time. |
| D. | shortest time. |
| Answer» B. pessimistic time. | |
| 60. |
In _________ stage, the entry, exit and process requirements areidentified for each activity. |
| A. | review and publicize plan. |
| B. | identify project scope and objectives. |
| C. | analyse project. |
| D. | identify the products and activities of the project. |
| Answer» E. | |
| 61. |
Number of interrelated activities can be organized in different ways are called______. |
| A. | activity model. |
| B. | network model. |
| C. | hierarchical model. |
| D. | process model. |
| Answer» E. | |
| 62. |
The saying "Cannot see the wood for the trees" is associated with ______. |
| A. | information superhighway. |
| B. | information overload. |
| C. | information under load. |
| D. | assumption. |
| Answer» C. information under load. | |
| 63. |
Clean-room software development is created by _______. |
| A. | henry mills. |
| B. | henry ford. |
| C. | john mills. |
| D. | harlan mills. |
| Answer» E. | |
| 64. |
____ is carried out to calculate the earliest dates on which each activitymay be started and completed. |
| A. | backward pass. |
| B. | forward pass. |
| C. | no pass. |
| D. | increasing pass. |
| Answer» C. no pass. | |
| 65. |
. SSADM means ___________. |
| A. | straight systems analysis design method. |
| B. | structured systems analysis design method. |
| C. | software systems analysis design method. |
| D. | solutions systems analysis design method. |
| Answer» C. software systems analysis design method. | |
| 66. |
The statement "Putting more people on a late job makes it later" is from_________ law. |
| A. | brooks. |
| B. | peters. |
| C. | parkinson\s. |
| D. | brokers. |
| Answer» B. peters. | |
| 67. |
___________ is also a part of design modelling. |
| A. | user interface design. |
| B. | testing. |
| C. | behaviour model. |
| D. | analysis. |
| Answer» B. testing. | |
| 68. |
BS EN ISO 9001:2000 is a _____. |
| A. | external standard. |
| B. | internal standard. |
| C. | cmm standard. |
| D. | tuv standard |
| Answer» B. internal standard. | |
| 69. |
_________ activities on the network diagram have zero duration and useno resources. |
| A. | dangling. |
| B. | dummy. |
| C. | null. |
| D. | zero. |
| Answer» C. null. | |
| 70. |
________ is refined by Barry Boehm and his co-workers. |
| A. | cocomo iii. |
| B. | cocomo iv. |
| C. | cocomo ii. |
| D. | cocomo i. |
| Answer» C. cocomo ii. | |
| 71. |
SSADM means ___________. |
| A. | straight systems analysis design method. |
| B. | structured systems analysis design method. |
| C. | software systems analysis design method. |
| D. | solutions systems analysis design method. |
| Answer» C. software systems analysis design method. | |
| 72. |
The relationship between program design and program specification can beportrayed in _________. |
| A. | data flow diagram |
| B. | product flow diagram |
| C. | network diagram |
| D. | data flow diagram |
| Answer» C. network diagram | |
| 73. |
Sometimes redesigns of the code is often called as ________. |
| A. | refactoring. |
| B. | redesigning. |
| C. | recoding. |
| D. | rearranging. |
| Answer» B. redesigning. | |
| 74. |
In PRINCE 2, 2 is meant for ______. |
| A. | number of clients. |
| B. | number of standards. |
| C. | version. |
| D. | edition. |
| Answer» D. edition. | |
| 75. |
________ are commonly published as lists or charts. |
| A. | resources. |
| B. | work plans. |
| C. | study plans. |
| D. | budgets. |
| Answer» C. study plans. | |
| 76. |
_______ is a qualitative measure of the degree to which classes areconnected to one another. |
| A. | cohesion. |
| B. | coupling. |
| C. | control. |
| D. | coordination. |
| Answer» C. control. | |
| 77. |
Effort = __________. |
| A. | system size x productivity rate. |
| B. | system size x kloc. |
| C. | person in months / sloc. |
| D. | person in months x productivity rate. |
| Answer» B. system size x kloc. | |
| 78. |
In _________, the priority activities are allocated resources in ascendingorder of total. float. |
| A. | total free. |
| B. | total float. |
| C. | technical float. |
| D. | top float. |
| Answer» C. technical float. | |
| 79. |
When a customer does not identify a detailed input, processing or outputrequirements, _______ model is used. |
| A. | prototyping. |
| B. | rad. |
| C. | incremental. |
| D. | spiral. |
| Answer» B. rad. | |
| 80. |
Ensuring that all the loose ends of a project are tied up is called as___________. |
| A. | demanding. |
| B. | decomposing. |
| C. | determining. |
| D. | decommissioning. |
| Answer» E. | |
| 81. |
The products handed over to the clients at the end of projects are called as_____________. |
| A. | software. |
| B. | application program. |
| C. | deliverables. |
| D. | intermediate products. |
| Answer» D. intermediate products. | |
| 82. |
One can_______ is classified into Functional and Non-functional. |
| A. | project. |
| B. | requirements. |
| C. | start date. . |
| D. | risk |
| Answer» C. start date. . | |
| 83. |
Projects are __________ by definition and therefore more uncertain than normalundertakings. |
| A. | routine |
| B. | non-routine |
| C. | specific |
| D. | controllable |
| Answer» C. specific | |
| 84. |
____________is part of Risk Management. |
| A. | risk analysis and risk estimation. |
| B. | risk control and risk planning. |
| C. | risk identification and monitoring. |
| D. | risk control, planning, identification and monitoring. |
| Answer» E. | |
| 85. |
_________ indicates the connectedness of the system that can be derivedmechanically. |
| A. | dependency. |
| B. | re-occurrence. |
| C. | inheritance |
| D. | relationship. |
| Answer» E. | |
| 86. |
The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity. |
| A. | hijacked. |
| B. | heuristic. |
| C. | hammocked. |
| D. | hole. |
| Answer» D. hole. | |
| 87. |
_________ standards should be in place to ensure that changes to requirements areimplemented in a safe and orderly way. |
| A. | change control and configuration management |
| B. | time control and configuration management |
| C. | access control and configuration management |
| D. | quality control and configuration management |
| Answer» B. time control and configuration management | |
| 88. |
. The scope of the deliverables for an increment is rigidly constrained by anagreed deadline called as ____________. |
| A. | sand boxing. |
| B. | time boxing. |
| C. | time delaying. |
| D. | local delaying. |
| Answer» C. time delaying. | |
| 89. |
Who is NOT usually present in a technical review? |
| A. | user. |
| B. | quality engineer. |
| C. | the programming tools supplier. |
| D. | specialist with knowledge of the application. |
| Answer» D. specialist with knowledge of the application. | |
| 90. |
Which of the following is NOT part of a software quality assurance plan? |
| A. | reference documents. |
| B. | configuration action. |
| C. | supplier control. |
| D. | customer control. |
| Answer» D. customer control. | |
| 91. |
Recruitment and training cost falls under _______ cost. |
| A. | developmental. |
| B. | data. |
| C. | profit |
| D. | setup. |
| Answer» E. | |
| 92. |
The calculation of __________ is a project evaluation technique that takes intoaccount the profitability of a project and the timing of cash flows that are produced. |
| A. | npv. |
| B. | tpv. |
| C. | spv. |
| D. | lpv. |
| Answer» B. tpv. | |
| 93. |
Time behaviour is the sub-characteristics of _______. |
| A. | maintainability. |
| B. | efficiency. |
| C. | usability. |
| D. | reliability. |
| Answer» C. usability. | |
| 94. |
A ________ specification is concerned with how much is to spent on thesystem. |
| A. | functional. |
| B. | quality. |
| C. | resource. |
| D. | scope. |
| Answer» D. scope. | |
| 95. |
Level 0 data flow diagrams are otherwise known as _______ . |
| A. | functional diagrams. |
| B. | er diagrams. |
| C. | data flow diagrams. |
| D. | context flow diagrams. |
| Answer» E. | |
| 96. |
Defect prevention is defined as ____________. |
| A. | finding and fixing errors after insertion. |
| B. | finding and fixing errors before release but after insertion. |
| C. | finding and fixing errors after release. |
| D. | avoiding defect insertion. |
| Answer» C. finding and fixing errors after release. | |
| 97. |
he Cost Benefit Analysis is done for ___________ feasibility. |
| A. | social |
| B. | technical. |
| C. | programm |
| D. | economical. |
| Answer» E. | |
| 98. |
Which are the two levels of development suggested by Booch ? |
| A. | micro and macro processes. |
| B. | inter and intra processes. |
| C. | internal and external processes. |
| D. | small and large processes. |
| Answer» D. small and large processes. | |
| 99. |
Cost Benefit Analysis is done for ___________ feasibility. |
| A. | social |
| B. | technical. |
| C. | process. |
| D. | economical. |
| Answer» E. | |
| 100. |
The percentage of a particular time interval that a system is usable iscalled _____. |
| A. | time interval. |
| B. | availability. |
| C. | utility. |
| D. | mean time. |
| Answer» C. utility. | |