Explore topic-wise MCQs in Bachelor of Business Administration (BBA).

This section includes 176 Mcqs, each offering curated multiple-choice questions to sharpen your Bachelor of Business Administration (BBA) knowledge and support exam preparation. Choose a topic below to get started.

51.

Security (backups, firewall) will be a ________ requirement.

A. functional.
B. non-functional.
C. normal.
D. security.
Answer» C. normal.
52.

The standard way of evaluating the economic benefits of any projects is to carryout a ________ analysis.

A. price-benefit.
B. cost-benefit.
C. cash flow.
D. fund flow.
Answer» C. cash flow.
53.

The costs that include the salaries and other employment costs of the staff involvedin the project development and all associated costs are called____________.

A. operational cost.
B. development cost.
C. setup cost.
D. direct cost.
Answer» C. setup cost.
54.

Diagrammatic form for Flow oriented Modelling………

A. functional diagrams.
B. er diagrams.
C. data flow diagrams.
D. system flow diagrams.
Answer» D. system flow diagrams.
55.

Requirements engineering provides the mechanism for _________.

A. understanding custom needs.
B. assessing facility.
C. analyzing need.
D. all of the above .
Answer» E.
56.

__________ relates to the physical resources used when the software isexecuted.

A. functionality.
B. maintainability.
C. reliability.
D. efficiency.
Answer» E.
57.

The time by which an activity may be delayed without affecting anysubsequent activity is called _________.

A. action float.
B. terminal float.
C. free float
D. null float
Answer» D. null float
58.

_______ is a modular building block for computer software.

A. control.
B. flow.
C. process.
D. component.
Answer» E.
59.

The shortest time in which we could expect to complete the activity, barringoutright miracles are called ________.

A. optimistic time.
B. pessimistic time.
C. most likely time.
D. shortest time.
Answer» B. pessimistic time.
60.

In _________ stage, the entry, exit and process requirements areidentified for each activity.

A. review and publicize plan.
B. identify project scope and objectives.
C. analyse project.
D. identify the products and activities of the project.
Answer» E.
61.

Number of interrelated activities can be organized in different ways are called______.

A. activity model.
B. network model.
C. hierarchical model.
D. process model.
Answer» E.
62.

The saying "Cannot see the wood for the trees" is associated with ______.

A. information superhighway.
B. information overload.
C. information under load.
D. assumption.
Answer» C. information under load.
63.

Clean-room software development is created by _______.

A. henry mills.
B. henry ford.
C. john mills.
D. harlan mills.
Answer» E.
64.

____ is carried out to calculate the earliest dates on which each activitymay be started and completed.

A. backward pass.
B. forward pass.
C. no pass.
D. increasing pass.
Answer» C. no pass.
65.

. SSADM means ___________.

A. straight systems analysis design method.
B. structured systems analysis design method.
C. software systems analysis design method.
D. solutions systems analysis design method.
Answer» C. software systems analysis design method.
66.

The statement "Putting more people on a late job makes it later" is from_________ law.

A. brooks.
B. peters.
C. parkinson\s.
D. brokers.
Answer» B. peters.
67.

___________ is also a part of design modelling.

A. user interface design.
B. testing.
C. behaviour model.
D. analysis.
Answer» B. testing.
68.

BS EN ISO 9001:2000 is a _____.

A. external standard.
B. internal standard.
C. cmm standard.
D. tuv standard
Answer» B. internal standard.
69.

_________ activities on the network diagram have zero duration and useno resources.

A. dangling.
B. dummy.
C. null.
D. zero.
Answer» C. null.
70.

________ is refined by Barry Boehm and his co-workers.

A. cocomo iii.
B. cocomo iv.
C. cocomo ii.
D. cocomo i.
Answer» C. cocomo ii.
71.

SSADM means ___________.

A. straight systems analysis design method.
B. structured systems analysis design method.
C. software systems analysis design method.
D. solutions systems analysis design method.
Answer» C. software systems analysis design method.
72.

The relationship between program design and program specification can beportrayed in _________.

A. data flow diagram
B. product flow diagram
C. network diagram
D. data flow diagram
Answer» C. network diagram
73.

Sometimes redesigns of the code is often called as ________.

A. refactoring.
B. redesigning.
C. recoding.
D. rearranging.
Answer» B. redesigning.
74.

In PRINCE 2, 2 is meant for ______.

A. number of clients.
B. number of standards.
C. version.
D. edition.
Answer» D. edition.
75.

________ are commonly published as lists or charts.

A. resources.
B. work plans.
C. study plans.
D. budgets.
Answer» C. study plans.
76.

_______ is a qualitative measure of the degree to which classes areconnected to one another.

A. cohesion.
B. coupling.
C. control.
D. coordination.
Answer» C. control.
77.

Effort = __________.

A. system size x productivity rate.
B. system size x kloc.
C. person in months / sloc.
D. person in months x productivity rate.
Answer» B. system size x kloc.
78.

In _________, the priority activities are allocated resources in ascendingorder of total. float.

A. total free.
B. total float.
C. technical float.
D. top float.
Answer» C. technical float.
79.

When a customer does not identify a detailed input, processing or outputrequirements, _______ model is used.

A. prototyping.
B. rad.
C. incremental.
D. spiral.
Answer» B. rad.
80.

Ensuring that all the loose ends of a project are tied up is called as___________.

A. demanding.
B. decomposing.
C. determining.
D. decommissioning.
Answer» E.
81.

The products handed over to the clients at the end of projects are called as_____________.

A. software.
B. application program.
C. deliverables.
D. intermediate products.
Answer» D. intermediate products.
82.

One can_______ is classified into Functional and Non-functional.

A. project.
B. requirements.
C. start date. .
D. risk
Answer» C. start date. .
83.

Projects are __________ by definition and therefore more uncertain than normalundertakings.

A. routine
B. non-routine
C. specific
D. controllable
Answer» C. specific
84.

____________is part of Risk Management.

A. risk analysis and risk estimation.
B. risk control and risk planning.
C. risk identification and monitoring.
D. risk control, planning, identification and monitoring.
Answer» E.
85.

_________ indicates the connectedness of the system that can be derivedmechanically.

A. dependency.
B. re-occurrence.
C. inheritance
D. relationship.
Answer» E.
86.

The activities have zero duration but are assumed to start at the sametime as the first and the end at the same time as the last one iscalled__________ activity.

A. hijacked.
B. heuristic.
C. hammocked.
D. hole.
Answer» D. hole.
87.

_________ standards should be in place to ensure that changes to requirements areimplemented in a safe and orderly way.

A. change control and configuration management
B. time control and configuration management
C. access control and configuration management
D. quality control and configuration management
Answer» B. time control and configuration management
88.

. The scope of the deliverables for an increment is rigidly constrained by anagreed deadline called as ____________.

A. sand boxing.
B. time boxing.
C. time delaying.
D. local delaying.
Answer» C. time delaying.
89.

Who is NOT usually present in a technical review?

A. user.
B. quality engineer.
C. the programming tools supplier.
D. specialist with knowledge of the application.
Answer» D. specialist with knowledge of the application.
90.

Which of the following is NOT part of a software quality assurance plan?

A. reference documents.
B. configuration action.
C. supplier control.
D. customer control.
Answer» D. customer control.
91.

Recruitment and training cost falls under _______ cost.

A. developmental.
B. data.
C. profit
D. setup.
Answer» E.
92.

The calculation of __________ is a project evaluation technique that takes intoaccount the profitability of a project and the timing of cash flows that are produced.

A. npv.
B. tpv.
C. spv.
D. lpv.
Answer» B. tpv.
93.

Time behaviour is the sub-characteristics of _______.

A. maintainability.
B. efficiency.
C. usability.
D. reliability.
Answer» C. usability.
94.

A ________ specification is concerned with how much is to spent on thesystem.

A. functional.
B. quality.
C. resource.
D. scope.
Answer» D. scope.
95.

Level 0 data flow diagrams are otherwise known as _______ .

A. functional diagrams.
B. er diagrams.
C. data flow diagrams.
D. context flow diagrams.
Answer» E.
96.

Defect prevention is defined as ____________.

A. finding and fixing errors after insertion.
B. finding and fixing errors before release but after insertion.
C. finding and fixing errors after release.
D. avoiding defect insertion.
Answer» C. finding and fixing errors after release.
97.

he Cost Benefit Analysis is done for ___________ feasibility.

A. social
B. technical.
C. programm
D. economical.
Answer» E.
98.

Which are the two levels of development suggested by Booch ?

A. micro and macro processes.
B. inter and intra processes.
C. internal and external processes.
D. small and large processes.
Answer» D. small and large processes.
99.

Cost Benefit Analysis is done for ___________ feasibility.

A. social
B. technical.
C. process.
D. economical.
Answer» E.
100.

The percentage of a particular time interval that a system is usable iscalled _____.

A. time interval.
B. availability.
C. utility.
D. mean time.
Answer» C. utility.