51. An impersonation of an authorised user is an example of a security threat.
52. Which of the following is a building block of UML?
53. . . . . . . . . can be associated with a separate processor or core, so that the processing steps can be carried out in parallel.
54. The modification of the software to match changes in the ever changing environment, falls under which category of software maintenance?
55. Alpha testing is done at
56. Frameworks are an effective approach to reuse, but are . . . . . . . . to introduce into software development processes.
57. Consider an example of a system which has a police command and control system that may include a geographical information system to provide details of the location of incidents. What kind of system the example represents?
58. Acceptance testing is also known as
59. Spiral Model has user involvement in all its phases.
60. Classes and interfaces are a part of
Read More Section(Software Engineering)
Each Section contains maximum 100 MCQs question on Software Engineering. To get more questions visit other sections.
- Software Engineering - Section 1
- Software Engineering - Section 3
- Software Engineering - Section 4
- Software Engineering - Section 5
- Software Engineering - Section 6
- Software Engineering - Section 7
- Software Engineering - Section 8
- Software Engineering - Section 9
- Software Engineering - Section 10
- Software Engineering - Section 11