0% found this document useful (0 votes)
119 views10 pages

University of Ghana: ALL Questions. Circle The Correct Answer On The Question Paper in

The document is an exam for a course on Introduction to Software Engineering. It contains 17 multiple choice questions that assess knowledge of software engineering processes, models, requirements, and responsibilities. Key topics covered include software quality techniques, software process characteristics, merits of process modeling, paradigms of software development, challenges in developing legacy systems, and categories of functional and non-functional requirements.

Uploaded by

Josiah Gyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views10 pages

University of Ghana: ALL Questions. Circle The Correct Answer On The Question Paper in

The document is an exam for a course on Introduction to Software Engineering. It contains 17 multiple choice questions that assess knowledge of software engineering processes, models, requirements, and responsibilities. Key topics covered include software quality techniques, software process characteristics, merits of process modeling, paradigms of software development, challenges in developing legacy systems, and categories of functional and non-functional requirements.

Uploaded by

Josiah Gyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

I UNIVERSITY OF GHANA

(All rights reserved)

I F ACUL TY OF ENGINEERING. SCIENCES

I':' FIRST SEMESTER EXAMINA'FIONS: 2012/2013


LEVEL 200: BACHELOR OF SCIENCE IN ENGINEERING

,I CPEN 207: INTRODUCTION TO SOFTWARE ENGINEERING [3 Credits]


TIME: 3 HOURS

I Instructions: Answer ALL questions. Circle the correct answer on the question paper in .
section A and answer section B in the answer booklet p r o v i d e d . '
ID NUMBER: _ _ _-"--_ _ _ _ SIGNATURE: _ _ _ _ _ __

I SECTION A: [50 MARKS]

I AI. Software engineers use the following to enhance the quality of their products:
I. Tools II. Techniques III. Procedures IV. Paradigm
A. I and II

-I B. I, II and III
C.l, II and IV,

I- D. I, II, III and IV


A2. A software process has the following characteristics:
I. The activities are organized in a sequence, so that it is clear when one activity is performed
~, ;

I relative to the other activities techniques.


II. The process prescribes all of the major pr;ocess,activities.
~ .... '.. 1- ,

III. Each process activity has entry exit criteria, so that we know when the activity b~giris and
I ends.
'" ••" t. ~ , "

IV. Constr.aints or controls may apply to an activity only.


. ' ;

I A. I"and II
B.'I, II and III
C. I, II and IV
I D. I, II, III and IV
A3. Modelling 'a process offers the follow'Ing merits
I. It forms"a common understanding of the activities, resources, and Gonstraints.)nvolved in
I software development.
II. Every process should be the same for all solutions.
. ,,'
"
.'.
,))'.i
.' .
'-)' 0;

~ I , III. It helps the development team find inconsistencies, redundancies and omissions 'in the
process and in its constituent parts.

Examiner: Robert Adjetey Sowah, PhD Pag~ 1 of10


I
A. I and II
B. I and III "\'

C. II and III ~~:~i


..l".'
D. I, II and III
A4. The software process model which transforms specification to design is known as

A. Waterfall B. data~flow model C. rfo!€!!action model


T ' ,
A5. _ _ _ _ _ _ approach of software development is customer centered
D.,process model,
~ I
A. Waterfall B. Evolutionary development
components
,,
C. Formal transformation D. reusable
I
A6. All paradigms of software development '-Yill have the _____ as one ,?f its constituent
part.
A. Workflow model B. data-flow model C. role/action model D. process model
I
A 7. The following paradigms of software development is/are more likely round.in other
engineering disciplines.
,L The watt;,rfall appro?ch
I
II. Evolutionary qevelopment
III. Formal transformation I
IV. Reusable components
A. I and II
B. II and IV
I
C. I and IV
"
D. I, II, III and IV
A8. Software systems that are old and yet to perform criticai'business functions faces
I
A. The legacy challenge
'J
-I
B. The heterogeneity challenge
C. Delivery challenge
D. Maintenance challenge ,
I
A9. When software Engineers .
don't disclose
,
information about their clients and employers to
.,il,,'
other people, what responsibility are they adhering to? ' 'I"'"
A. Confidentiality
B. Competence
C. Intellectual property right
I
D. Computer misuse
AIO. The delivery challenge is the challe'nge()f _ _ _ _ _ _ _ _ __
A. Delivering software on time
:1,//
B. Shortening software delivery time
C. Delivering complex software on time
~I :
D. Delivering software late
I
:I/~
Examiner: Robert Adjetey Sowah, PhD Pa~e 2 of 10
~,_ ~rl
i:
.II')"
'f C I)
~ - ::::/

" :Jh
I A11. Each foop in the spiral model is divided into _ _ _ _ sectors.
A. Two
B. Three
I C. Four
D. Six

I A12. The major dlstinguishing feature of the spiral model is _ _ _ _ _--'-_


A. The setting of objectives in each phase
B. Specification, design and validation can be done concurrently
I C. Consideration of risk
D. Conducting of a feasibility study

I A13. Reuse-oriented development has the following merits:


I. amount of software to be developed is :reduced
, II. Cost of development is reduced

I III. It is high risk approach to software development


A. I and II
B. I, II and III
I C. I and III
D. II and III
......

I A14. A detailed, mathematical formal definition of a system function is a

A. User requirement
I B. Formal transformation
C. Functional requirements

I- D. Requirement . ~,
A15. Non-functional requirement are mostly derivedJrom the needs of the _~_ _~_ __
A. User

I B. Software engineers
C. Project manager r'
D. Project team
I A16. Non-functional requirements ,?ould be classifkd.inJo _ _ _ _ _~. mail1 categories ..
A. Two

I B. Three
C. Four
D. Five
I
~ .:.
A17. Requirement that specify how a software system behaves are kpown as _-,--~_ _
A. Reliability requirements
B. Usability requirements
I C. Product requirements
D. Performance requirements

I

I Examiner: Robert Adjetey Sowah, PhD Page 3 of10

I
,
,
'\
\
'.~. c'l

""')
I
i)j,
,t.
\..J
kl
~ ,

" ,

A18. Robustness of a software system can, be'measured


A. Mean time to failure
,J

,~ ,
by - - - - _ - - - ._ __ "
I'
B. Processed transactions per second
C. Availability ,.
D. Percentage of events causiri.g failure' I
A19. To develop a satisfactory system, the software engineers must have an understanding of the
,

_ _ _ _ _ _ _ _ _ _ _ _ _ _-----:''--e

A. Functional requirement
"';-
, ,

I
B. Non-functional requirement,
C. Application domain
.'
I
D. System requirements,
A20. User requirements are best written using~~---L,-------_
'A. Naturallariguage
I
B. System ~odels
C. Technical terms
D. English language
I
A2l. The following are consumers of the software requirements specification.
I. Customers I
II. Managers
III.
A. I only
Software engineers I
B. I and II
C. II and III
D. I, II and III
I
A22. Requirements engineering is concerned with _ _ _ _ _ _ _ _ _ _ _~
A. Testing of the system . ..
, j
. " -I
" B. System analysis process
C. Software maintenance
D. Activities needed to create and maintain a system requirement document
I
A23. Which of the following is the preferred stanaard
practitioners?
....
method of communication for software
~ . ." ,
I
A. Structural natural language
B. Design description language
C. Graphical notations
I
D. Mathematical specifications "'' ' ;.,
A24. What is the most difficult and critical stage of the requirement engine-erlng process?
A. Feasibility study . ,;, """,.--::,~o=-:::,:,,,'
I
B. Requirements eliCitation and analysis
C. Requirements specification
' /~~.. S,(I'::'l,ji.;~~ .
.~;;.Y;//· '<~ \ ~ l I
.. ,:%G~~/ 4" .~, ' i '
D. Requirements validation, f}(<,~~// ,_ ~., ""
I
! /"

/.//~ / ",j~\'~ .i: /


If/ICY / ....,.,,p~, .' ',.' I
II) I • "" ~ • '>;,. / A
Examiner: Robert Adjetey Sowah, PhD
(~~'~ A~",~'0" Pag~40fl0
::> \
\J
,' .... / , '\"
,~,~\-S\./
"fi.. ,l)i~'0"
I

/ t)
I A2S. Repairing coding errors is _ _ _ _ _ _ _ repairing requirement errors.
A. More expensive than
B. More cheaper than
I C. The same as
D. 50 percent more than,

I A26. The process of converting a system specification into an executable system is known as

A. programming
I B. design
C. implementation
D. testing
I A27. Software designers create _ _ _ _ _ _ design version(s) for a every software system
they produce.

I A.One B. Two C. Four D. Several


A28. Interface design can be associated with _ _ _ _ _ _ __
A.GUI
I B. The system
C. Subsystems

I D.Architecture
A29. The essence of debugging is _ _ _~_ _ _ __
A.Location of errors
I B.Repairing errors
C. Testing the system

I- D.Locating and correction of errors.


A30. Context models are used to define the - - - - - - - - of the system. '
A.Behavior

I B. Environment
C.Architecture
D.State
I A31. Which of the following is/are used in modeling the behavior of a system?
I. State machine model
II. Data-flow model
I III. Architectural model
A.Ionly
I B.II only
C.I and II
D.I, II and III
I
I
I Examiner: Robert Adjetey Sowah, PhD ~. Page 5 ofl0

I
\,0
"'~ ...

A32. Which model is characterized by system states and events which cause transitions from one
state to another?
A. Data-flow model
B. State machine model
C. Architectural model
I
D. Process model
A33. Different types of users, using the system refers to the principle of _ _ _ _ _ _ _ _ . ,
A. User familiarity
I
B. User diversity
C. Consistency I
D. User guidance
A34. The process of ensuring that the softwar~,Q1eets the c~stomer's expectation is .............. .
A. Testing
I
B. Verification
C. Validation
D. User requirements.
I
A35. The process of checking that the sqftware conforms to its specification is referred 'to as I"
A. Testing B. Verification C. Validation D. Software requirements
specification
A36. What activity is needed to find inconsistencies between a program and.its specification?
I
A. Defect testing
B. Debugging I
C. Statistical testing
D. None of the above
A37. -What name is given to the testing done by the customer?
,\-

-I
A. Unit testing r
B. Module testing
C. Sub-system testing
I
D. Acceptance testing
A38. Which of the following is usually the tesp'onsibility of programmers? '
,
I
I. Unit testing
II.
III.
Module testing
Sub-system t e s t i n g , f i ,
I
A. I only B. II only C. I and II D. I, n and III ' "-",,
A39. Software that is used'to support softw~reprocess activities isr~{~Jx:~d to as ...... : ........... .
~ ~ "'~:~',.-;: ~JI" =\;.~
.. - .
I
A. CASE , : ~c; Sf.;";:",,, ".("!t$ ~
B. CAD
C. CADE
' ,y:"~ "
4'<)~"/",,-% )' ;
",,~:;;>'/ (,\.;.~ ~ "
,
_ .1,. ' I
D. CAES 7;';,/ ,/ f'~";,' ) ' ~ r "
f~"/
'~f'\/
_/"~.
~~~:~.J~
::'.:::-/
:y'':;(~~'' I
Examiner: Robert Adjetey Sowah, PhD a -' v .J,.
Page 6 of 10..
\\? ,~~
~ii. '-~;' '" . ,~

I
I
~
.1.
,I
.!)
(

.....,
\ I
/

1'\'
r'

It','

.-.....

I A40. Which fisk can he identified in 'th~ following statement "The underfy.ing teClfnology on
which the system is built is superseded by new tec~nology": . ~, .
A. Hardware uBavailability' ,.
I B. Requirement change
C. Technologychange

I D. Business ri~k '


A41. The nature of software causes problems for management. 4.

A. tangible
I B. intangible
C. complex
D. testing
I A42. What· risk type can be identified in the following statement "There' will be a large
number of changes to the requirements than anticipated". ~

I
' .....
A. Requirement change
B. product and project I"
C. Product ..

'I
-f;.

D. Business ,<
A43. The process of identifying activities, milestones and deliverables produced by a
project is referred to as _ _ _ _ __ 't

I A. Proposal writing
B. Project p}anning ..
C. Project' monitoring and review"
;. .. .' ~

I A44.
D. Personnel selection'and reviews
relationship is between a client and a supplier.
A. an association

I- B. an aggregati'on
C. a dependency
D. a scJ;1edule algo~it\uns ,'; .
A45. In principle, the functional requirements specification of a syst~pl.should be both ........... ..
I A. complete and efficient
B. consist~nt
. -.
:,
.

C. complete and consistent "

I D. efficient
A46. In an activity network diagram, the longest path is referred to as _ __
A. critical length
B. critical deadline
I C. critical path
D. critical milestone.
A47. It is general knowledge that inspections and reviews are more effective in
I defects than testing.
A. True B. False
discovering

A48. There is a regular progress report in evolutionary development.


I A. True B. False
A49. When using color in user interface design it is important to use color change to
a significant event.
illustrate

I A. True B. False
A50. Program tes~ing is the most widely used verification and validation technique.
A. True B. False

I Examiner: Robert Adjetey Sowah, PhD Page 7 of 10

I
\.\
\

t,

"

I
I
I
'~~~~gj,
I
I
I
I
I
I
-I
I
I
I
I
I
I
Examiner: Robert Adjetey Sowah, PhD . ~ .;

I
I
;I
I
I SECTION B: [50 MARKS]
Answer ALL questions inthis section.

I BI. [10 marks]


What will be the values of the array 'a' after the function executes? You must trace the
I algorithm carefully outlining all your steps

void Mystery()
I {
int,'hold;
int[] a = {62~4~le~33~1~6~2};

I for(int i = e; i < a.length-l; i+t)


{ - '

for(int j = e ; j < a.length-l; j++)


I {
if( a[j] <a [j+l])
{
I hold = a[j 1;
a[j] = a[j+l];
a[j+l] = hold;
I }
}

}
I }

B2. [10 marks]


I- What would be the value of 'mystery_num' after the following block of code executes if
number=53468. Trace the algorithm carefully outlining all your steps also showing how each
I variable changes.

int number~ mystery_num e~ digit;


I while(number > 0)
{
mystery_num = mystery_num * 10;
I digit = number % 10;
digit = (digit + 7) % 10;

I }
mystery_num = mystery_num + digit;
number = number / 10;

I B3. [8 marks]
a) You are a software engineering consultant and have been called in by the vice-president ,
I for finance of Level200 Desserts, a corporation that manufactures and sells a variety of

I Examiner: Robert Adjetey Sowah, PhD . Page 9 of10

·Ii
desserts to restaurants. She wants yout organization to build a stock control product that
. ' ~

will monitor the company's product, starting with the purchasing of the various
ingredients and keeping track of th/desserts ,as they are manufactured and distributed to
the various restaurants. What criteria would you use in selecting a life-cycle model for
the project? '. ' [5 marks]
b) Briefly explain why non-functional: requirement is critical to the system usability. as I
compared to functional requirement.! [3 marks]

B4. [10 marks]


I
Management of a car washing bay has decid~d to automate its car ,washing business. The,''::.J
.
• '", ~.
".
customer chooses the type of wash and notes the type of car. The system computes the fee
' r . ~,

~hd
rl.'f.,"· I
displays the amount'due on a control panel. The customer can, then pay for the car wash. After
payment, if the wash is currently busy,' 'the syst~tn indicates th~t the customer must wait .. I
Otherwise, the system indicates tha~the cust~Ii1er should dl-ive the car into the car wash bay.
'"

a) Develop a set of use cases (Use Case Diagram) for the operation of the washing bay. I
b) Draw a sequence diagram for the abpye description.
[3 marks]
[7 marks] I
I
B5.[12 marks]
a) You are asked by your manager . '
to
..
deliver software based on a schedule that you
" , ' ,. know
can only pe met by asking your proje~t team to work unpaid overtime. All team members
have young children. Discuss whether. you shpuld accept this demand from your manager
.,
or whether you should persuade YOlfr team to give their time to the organization rather I
than to their families. What factors might be, significant in your decision? [6 marks]
b) Suggest ways in which the user interface to an e-commerce system such as an online I~
bookstore or music retailer might be ,adapted for users who have a visual impairment or
problems with muscular control. [6 marks] I
I
I
...... '

Examiner: Robert Adjetey Sowah, PhD


,
I
Page 10 of10
I /

I~

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy