MCQ Uml
MCQ Uml
MCQ Uml
1.Some of the tasks in the general problem-solving model are listed below. Which of the following list
these tasks in the correct sequence?
A)Problem definition, Finding solutions, Problem redefinition.
B)Data gathering, Finding solutions, Finding ideas.
C)Problem definition, Data gathering, Problem redefinition.
3. Which of the following best describes the term life cycle model?
A)It describes the way requirements for an application change at different stages in the life of the
organization.
B)It describes how a computerized information system is used during its lifetime.
C)It describes the phases through which a development project passes from the inception of the
idea to completion of the product and its eventual decommissioning.
6. Some of the phases of the Traditional Life Cycle are listed below. Which of the following lists is in
the correct sequence?
A)
C
on
str
uc
tio
n,
In
st
all
ati
on
an
-1-
d
Te
sti
ng
.
B)
R
eq
ui
re
m
en
ts
an
al
ys
is,
Sy
st
e
m
s
en
gi
ne
eri
ng
,
D
es
ig
n
C) Systems engineering, Requirements analysis, Design
10. One of the major challenges during system installation is which of the following?
A)Ensuring that the new software is correctly installed to use the computer effectively.
B)Avoiding unnecessary disruption and minimising the attendant risk of change.
C)Ensuring that both old and new systems run in parallel.
11. Which of following is true about software construction in the traditional life cycle?
A)Only one programming language could be used. B) Relational database management systems are
not used. C) The design is used to develop program code.
13. Iteration is problematic during the traditional life cycle for which of the following reasons?
A)Architectural decisions are difficult to change. C) Requirements will change during the project.
B)Ad hoc coding solutions may be used to address changes in requirements.
17. User involvement in software development is important for which of the following reasons?
A)It is cheaper to have users as part of the project team rather than professional software developers.
B)Users understand why the requirements cannot be met.
C)Users can influence the way a project proceeds by identifying the most acceptable course of
action from various alternatives.
A)Statements A, Band C are true. B) Statements A and C are true. C) Statements B and C are true.
Chapter 4
1. Which of the following best describes an object?
A)Part of a software system that is entirely unique. B) A concept, abstraction or thing in an
application domain. C) A program that represents something tangible in the problem domain.
-4-
7. Which of the following is a useful set of questions to ask when modelling an object, according to
Rebecca Wirfs-Brock?
A)Who am I, what can I do and what do I know? B) Where am I, what am I and who do I know?
C)What do I have, what can I get and what can I do?
9. Which of the following best describes the relationship between an object and its class?
A)The structure and permitted behaviours of an object are defined by its class.
B)A class is a container that holds a collection of similar objects.
C)An object is an implementation of a class.
15. What is meant by 'transitive operation' in the context of generalization and inheritance?
A)An operation in a superclass may be overwritten by a different operation in a subclass.
B)An operation in a superclass may not be overwritten by a different operation in a subclass.
C)A subclass inherits characteristics from all its superclasses at all levels.
22. Which of the following is a valid reason why it is difficult to design event-driven software in a
procedural manner?
A)It is difficult to anticipate and design for all possible sequences of use.
B)Procedurally designed programs are not capable of responding quickly to events.
C)Procedural programs are only suitable for record-based data structures.
CHAPTER - 5
A)A model is quicker and easier to build than the real thing
B)We can use a model in simulations to test our ideas
C)We can use a model instead of building the real thing
-6-
C)An engineer’s drawing of a cross-section through the fuselage of Concorde
3 Analysts and designers use models that consist of which of the following?
A)Diagrams and text B) Only diagrams C) Only text
7 Which of the following are the rules that modelling techniques should enforce?
A)Simplicity of representation, external consistency, completeness and network representation
B)Simplicity of representation, internal consistency, completeness and hierarchical representation
C)Simplicity, internal consistency, completeness and hierarchical symbols
-7-
14 Which of the following is not a purpose for using activity diagrams?
CHAPTER-6
1.Which of the following is not a reason for analysing the current system (if it exists)?
A)The analyst needs to know about problems with and defects in the current system.
B) The analyst must not lose sight of his or her objectives.
C)Much of the functionality of the existing system will be required in the new system.
6. Which of the following is not the kind of information gathered to understand usability requirements?
A)The characteristics of the users of the system. B) The context in which the system will be used
C)The volume of data in the existing system.
7. Which of the following lists only contains systems analysis fact-finding techniques?
A)Sampling, questionnaires, interviewing, reading and observation
B)Use case modelling, interviewing, class diagramming, observation and knowledge acquisition
C)Sampling, background reading, interviewing, use case modelling and activity diagramming
8. Which fact-finding technique is most suitable to be used in the initial stages of fact-finding and
particularly where the analyst is not familiar with the organization that is being studied?
A)Background reading B) Interviewing C) Questionnaires
9. Which of the following is a valid reason for using interviewing as a fact-finding technique?
A)The interviewer can gather statistical data about documents.
B)The interviewer can respond flexibly to the interviewee’s responses.
C)Interviews take very little time
-8-
10. In which of the following circumstances is it not appropriate to use questionnaires?
A)The views and knowledge of a large number of people must be obtained
B)The people who work for the organization are geographically dispersed
C)There is a need to check how people actually carry out their work.
11. Which of the following categories of people are not likely to be involved in a steering committee?
A)Senior managers.
B)System testers.
C)Representatives of users
12.
ANS:
A)An actor.
B)A use case
C)An activity
13.
ANS:
A)An actor
B)A use case
C)A user
14. Which of the following is not a purpose for using use cases?
A)To document the scope of the system.
B)To provide a high-level view of system functionality from the users’ perspective.
C)To describe the logic of operations
15. Which of the following pairs lists valid dependencies to show on a use case diagram?
A)«extend» and «include».
B)«extend» and «retract».
C)«exclude» and «include».
16. Which of the following is the correct name for the symbols placed round stereotyped names such as
«extend»?
A)Guillemots
B)Parakeets
C)Guillemets
-9-
17.
ANS:
A)Check campaign budget extends Print campaign summary
B)Check campaign budget includes Print campaign summary
C)Print campaign summary extends Check campaign budget
19. Which of the following is shown in a use case diagram by a rectangle surrounding a group of use
cases?
A) The class that implements the use cases
B)The system or sub-system that the use cases belong to.
C) The package that contains the use cases
- 10 -
23.
ANS:
A)A data flow from one actor to another
B)An inheritance relationship between two actors.
C)An Extend dependency between two actors
ANS:
A)Campaign Manager can use the same use cases as a Campaign Staff and one or more additional
ones
B)Campaign Staff can use the same use cases as a Campaign Manager and one or more additional ones
C)Only Campaign Manager actors exist, as Campaign Staff is an abstract actor.
25. Which of the following is the term for a textual description of a use case?
A)Behaviour description.
B)Use case activity.
C)Use case description
26. Which of the following is not a reason for using prototyping during use case development?
A)To clarify requirements
B)To test the architecture of architecturally significant use cases.
C)To get the user interface development started before the class diagramming is begun.
CHAPTER-7
1.Which of the following is not a good reason for constructing a requirements model?
A)It can show the business situation in enough detail to check that the requirements have been captured
fully and correctly.
B)It can demonstrate that all the use cases have been drawn using the correct notation
- 11 -
C)It can be organized in such a way that it will be useful later for designing the software
2. Which of the following statements best describes what a class diagram can include?
A)Only classes
B)Only classes and their relationships
C)Classes, instances and their relationships
3. Which is the correct name for "a possible set of classes, together with an understanding of how those
classes might interact to deliver the functionality of a use case?
A)A use case class diagram
B)A realization
C)A collaboration
4.
A)It shows that elements within the collaboration (the dotted ellipse) may reference elements
within the use case (the solid ellipse).
B)It shows that the collaboration (the dotted ellipse) cannot be implemented until the use case (the solid
ellipse) has been implemented
C)It shows the direction of the flow of control when the software executes
5. One of the following is not a difference between a class diagram and a collaboration diagram. Which
one?
A)A collaboration diagram shows object interaction, while a class diagram ignores this.
B)A class diagram shows more of the structural details than the collaboration diagram
C)A class diagram shows the names of the classes, while the collaboration ignores these
A) B) C)
ANS: Fig(B)
7. Which of these is the correct set of analysis class stereotypes in standard UML?
A)Interface, control and entity
B)Boundary, control and entity
C)Interface, sequence and entity.
- 12 -
8. One of the following is not an advantage of stereotyping analysis classes. Which one?
A)The resulting packages can form a basis for the system's architecture.
B)It can be useful to differentiate classes that have broad similarities in the way that they behave.
C)Once a class is stereotyped, its behaviour is likely to become more predictable
10. What is the significance of the double colon in the class name: User Interface::AddAdvertUI?
A)The class called AddAdvertUI is in the package called User Interface.
B)User Interface is the stereotype of a class called AddAdvertUI
C)User Interface and AddAdvertUI are two alternative names for the same class.
11. Which one of these is not a permitted symbol for a boundary class?
A) B) C)
ANS: FIG(A)
13.
One of these is not a permitted symbol for an entity class. Which one?
A) B) C)
ANS: Fig(B)
15. One of the following cannot directly affect the state of an object. Which one?
A)A change in the value of one of its attributes
B)The creation or destruction of another object of the same class
C)The creation or destruction of a link with another object
- 13 -
B)A link is a transient association
C)A link is an association between two entity classes.
17. What is the significance of the directional arrow indicated on this diagram?
A(A)It shows the direction in which you should read the name of the association
)
B(B)It shows the direction in which messages can be sent along the association
)
C(C)It shows the order in which the objects will be connected when a link is
)created
19.
ANS:
A)A staff member need not be associated with any grades, or it can be associated with an indeterminate
number of grades; a grade must be associated with one or more staff members
B)A grade cannot be associated with a staff member but a staff member can be associated with a grade
C)A grade need not be associated with any staff members, or it can be associated with an
indeterminate number of staff members; a staff member must be associated with one or more
grades.
21. When do we not need to represent the whole system as a class in the analysis model?
A)When the users have not stated that this is a requirement
B)When the system does not need to interact directly with other systems
C)When the system does not need to encapsulate data or behaviour that applies only to the system
as a whole
- 14 -
22. What is a domain class model?
A)A class model that does not include either boundary or control classes
B)An analysis class model that is independent of any particular use cases.
C)A class model that has been implemented in a particular domain.
23. One of the following is a bad guideline for deciding the class where an operation should be located.
Which one?
A)The operation represents a service that objects of that class should provide to objects of other classes.
B)The operation needs to access or update data that is stored in another class that has an
association with that class
C)The operation needs to access or update data that is stored in an attribute of that class
25. Why is it often difficult to determine the most appropriate choice of responsibilities for each class?
A)Because there may be several alternatives that appear equally justified.
B)Because the developers may not know enough about how the users want the system to be designed.
C)Because members of the development team are often lazy and avoid responsibility as much as they
can.
26. The requirements of different use cases may suggest different operations for the same class. How do
we resolve this?
A)We split the class so that there is one for each use case, and model each class with the particular
operations required for its use case.
B)We include in the class all the operations that are suggested by all the use cases.
C)We model the class with only that subset of operations that applies to all use cases
27. Which of the following is an advantage of the use of a control class in realizing a use case?
A)A control class prevents users from being able to change the way that the entity classes work.
B)A control class reduces the need for entity classes to know anything about other entity classes
unless this is directly relevant to their own responsibilities.
C)A control class allows the system to communicate with other systems on different networks.
CHAPTER-8
1.Which of the following best describes the advantages of using software components, assuming that
suitable components are available?
A)The users are more likely to get what they want.
B)The project is more likely to be completed in less time and at a lower cost
C)The software is more likely to be capable of running on different hardware platforms
- 15 -
3. One of the following is not a reason why object-oriented approaches support software reuse. Which
one?
A)Object-oriented development encourages the encapsulation of the internal details of components
B)Object-oriented models are organized in a way that makes it easier to find suitable components
C)Object-oriented development encourages developers to share ideas with developers in other
teams
5. Which of the following best describes how composition differs from aggregation?
A)A part cannot be removed from a composition, whereas a part can be removed from an aggregation.
B)A part can belong to only one composition, whereas a part can belong to more than one
aggregation.
C)A part that belongs to a composition cannot have associations with any other classes, whereas a part
that belongs to an aggregation can have associations with other classes
10. Which of the following is the best description of a software development pattern?
A)The way that a particular software developer tends to solve problems
B)The core of a solution to a software development problem that occurs over and over again
C)A particular approach to software development, such as the object-oriented approach or the structured
- 16 -
approach
CHAPTER-9
4. An interaction sequence diagram drawn during analysis differs from one drawn during design which
of the following ways?
A)It normally does not include design objects or detailed specifications of message signatures
B)It does not include boundary objects.
C)It does not include control objects
5.
- 17 -
A) 1 B) 2 C) 3
6. Which of the labelled symbols in the following diagram represents a synchronous message?
A) 1 B) 2 C) 3
7. What is meant by the term ‘thread of control’ in the context of concurrent behaviour?
A)A thread of control is a weak part of the control system
B)A thread of control is the mechanism that controls concurrent behaviour
C)A thread of control is an execution pathway that may occur simultaneously with other
execution pathways
8. Which of the following is an appropriate way of managing complex behaviour on an interaction
sequence diagram?
A)A group of objects can be represented by a single lifeline
B)Some messages are omitted to reduce the complexity
C)Some objects are omitted from the diagram to reduce the complexity
9. Collaboration diagrams differ from interaction sequence diagrams in the following way?
A)Collaboration diagrams cannot show the design detail that can be shown on a sequence diagram
B)Collaboration diagrams only show the collaboration and not the sequence in which the messages are
- 18 -
sent
C)Collaboration diagrams show the links between the objects
10. In a collaboration diagram one message has the sequence number 5.1.1. Which of the following
sequence numbers indicates the message that must be the immediate successor?
A)A message with the sequence number 5.1.2
B)A message with the sequence number 5.1.1.1
C)A message with the sequence number 5.2.1
12. An interaction diagram should be consistent with the associated class diagram in various ways.
Which of the following statements is true?
A)It is always correct to show a message between two objects if there is an association between their
classes
B)The sending object must have the object reference of the receiving object before sending an
object-scope message
C)A message should not be shown between two objects if there is no association between their classes
CHAPTER-10
A)A contract cannot be broken and thus the software will be more reliable in operation.
B)A contract encourages encapsulation by concentrating on the service that an
object will provide to other objects and by ignoring the way that the service is to
be achieved.
C)A contract encourages better design and testing by specifying exactly how an object
will achieve a service that it is to provide to other objects.
2. One of the following would not normally be included in a contract. Which one?
- 19 -
C)Algorithmic techniques are used to describe algorithmically complex operations, while non-
algorithmic techniques are used to describe only simple operations.
6.One of the following is not a control structure in Structured English. Which one?
A)The syntax and vocabulary of Structured English resemble those of a specific programming language,
while pseudo-code is language-neutral
B)The syntax and vocabulary of pseudo-code resemble those of a specific programming language,
while Structured English is language-neutral.
C)Pseudo-code is useful only for procedural programming languages, such as C, while Structured
English is useful for any programming language, including object-oriented languages.
8.
A)Get all the advert costs and apply the overhead rate to each in turn, then work out the total cost of the
campaign by adding these together, compare to the campaign budget and produce a warning if the
budget has been exceeded.
B)For each advert in turn, get the cost, apply the overhead rate, compare to the budget and produce a
warning if the budget has been exceeded, then do the same for the next advert.
C)Work out the total cost of the campaign by accumulating the cost of each advert in turn, apply
the overhead rate to the total, compare this to the campaign budget and produce a warning if
the budget has been exceeded.
- 20 -
9. Which of the following best describes the main use of OCL?
A)OCL is used to describe the interaction between objects in more detail than is shown graphically in an
interaction sequence diagram
B)OCL is used specifically to document operation specifications
C)OCL is used to give precise definition to any constraints in a UML model that cannot be
expressed clearly and unambiguously in a graphical notation.
CHAPTER-11
2. The transition from one state to another is triggered by an event. One type of event is a change
event. Which of the following statements is true?
4. A guard condition may be associated with a transition. Which of the following statements best
applies to guard conditions?
A)A guard condition may only involve attributes of the object that owns the statechart.
B)A guard condition may involve attributes and links of the object that owns the
statechart.
C)A guard condition may only involve parameters from the triggering event
- 21 -
5.
A) 1 B) 2 C) 3
7. When an internal transition occurs within a state which of the following is true?
8. A statechart may have states that include substates. Which of following is true?
A)Each of the submachines in the composite state must enter their final state
B)At least one of the submachines in the composite state must enter its final state.
C)Whatever combination of substates the composite is in, all those substates are exited.
10. The behavioural approach to constructing statecharts involves which of the following?
11. The lifecycle approach to constructing statecharts is so called for which of the following reasons.
12. When a statechart is checked for consistency with other models of the system which of the following
is true?
CHAPTER-12
1.Which of the following is the best description of a design model?
A)Iterative processes such as the Unified Process give phases different names from activities to confuse
students.
B)Iterative processes such as the Unified Process give phases different names from activities because
they share the same namespace and must be unique.
C)Iterative processes such as the Unified Process give phases different names from activities to
allow the same activities to take place in different phases.
4. Which of the following is not a reason for separating the analysis stage from the design stage?
A)Analysts and designers may be people with different skills and knowledge.
B)It is not possible to begin design until all the analysis has been completed.
C)Clients will want clear decision points at which they can agree that the project should progress to the
next stage and incur further costs.
- 23 -
5. Which of the following is claimed as an advantage of iterative development processes?
A)Design of aspects of the system without having to consider how they will physically be
implemented.
B)Design of the logic used in operations, based on decision trees, decision tables or Object Constraint
Language.
C)Design of the logic gates used in the implementation of the processor chips used in the system.
A)Communication between the Agate system and the company accounts system will be by passing
messages.
B)There will be a message sent to the accounts system called NewInvoice, which will be formatted in
XML, and each invoice will have a six-digit invoice number allocated by the accounts system.
C)Communication between the Agate system and the company accounts system will use the OpenJMS
Java message server with persistent storage of messages provided by the MySQL database.
A)High cohesion and low coupling. B) High cohesion and high coupling.
C)Low cohesion and high coupling.
A)Designing the architecture of the system and setting standards, for example for user interface
design.
B)Designing the inputs and outputs of the system, processes and data storage.
C)Designing classes that will implement the system in an object-oriented language.
- 24 -
A)Consistency, efficiency, effectiveness and correct scope.
B)Efficiency, reliability, security and flexibility.C)Efficiency, redundancy, functionality and usability.
CHAPTER-13
A)Class diagrams are mapped onto tables in a relational database management system.
B)Data management classes are identified.
C)Standards for code development and human computer interaction are
determined.
A)
T
he
so
ft
w
ar
e
ar
ch
ite
ct
ur
e
on
ly
de
ter
mi
ne
s
th
e
so
ft
w
ar
e
su
b-
sy
st
e
m
- 25 -
s.
B) Software architecture describes the relationships between the components of the system.
C) Software architecture determines the look and feel of an application.
3. The sub-division of an information system into sub-systems brings which of the following
benefits?
A)
T
he
cli
en
t
int
er
fa
ce
m
us
t
be
sp
ec
ifi
ed
fir
st.
C)
T
he
cli
en
t
re
q
ue
st
s
se
rv
ic
es
fr
o
m
- 26 -
th
e
se
rv
er
.
B) The server only provides the functionality required by the client.
A)Maintaining the interfaces for each layer. C) The further sub-division of complex layers.
B)Maintaining a consistent level of granularity for sub-systems.
8. In the Model–View–Controller architecture which of the following best describes the role of the
Model?
A)It is best suited to process control applications. C) It supports diverse styles of view and controller.
B)It places complex functionality in the controller components.
A)It is useful for allocating computer-processing resources when time constraints are not tight.
B)It determines which parts of the system execute in a pre-determined sequence.
C)It can be used to ensure that each thread of control operates within the constraints on its
response time.
12. The allocation of a system to multiple processors involves which of the following?
CHAPTER 14
1 When objects are being designed in detail the signature of each operation has to be specified. Which of
the following statements is consistent with the term operation signature?
2Which of the following best describes when primary operations should be shown on class diagrams?
3 Encapsulation is best enforced by which of the following decisions regarding object visibility?
A)The attributes in the class will only be accessed by the operations of that class.
B)The class will exhibit high levels of encapsulation.
C)The operations in the class will be easier to maintain.
9 How many collection classes could sensibly be used to implement a two-way many-to-many
association?
A)Two or
more.
B)Two.
C)One.
10 If there is a dependency constraint between two or more attributes which of the following statements
applies?
A)An object may only refer to another object if they share a link.
B)When an object is deleted all objects to which it refers must be deleted.
C)Referential integrity only applies for one-to-one associations.
CHAPTER 15
1. Which of the following statements best describes the relationship between patterns and
frameworks?
2. Several key principles underlie the use of patterns. Which of the following is not a key principle
involved in the use of patterns?
- 29 -
A)Abstraction.
B)Separation of concerns.
C)Conformance testing.
3. A pattern is normally described in the format of a pattern template. Which of the following
statements best describes the forces of a pattern?
A)The forces embody the constraints that must be addressed by the solution.
B)The forces describe why it is important to find a solution to the problem
C)The forces are the constraints that solution is unable to resolve.
4. Which of the following is not one of the categories defined for the GOF patterns?
A)Creational.
B)Static
C)Behavioural.
A)The pattern can be used to ensure that no more than a fixed number of instances of the
Singleton class are created.
B)Using the pattern always makes a system easier to maintain.
C)When the pattern is used global data can be accessed more quickly.
7. Which of the following best describes when to use the State pattern?
9. Which of the following is not an issue that should be considered before using a pattern?
10. Which of the following statements is most appropriate when using a pattern during information
systems development?
A)The pattern must be used without any changes to its overall structure.
B) The pattern should be implemented with names that are meaningful in the context of
the application.
C)The names of the classes in the pattern should be given the general names from the pattern
so that their roles are unambiguous.
Chapter - 16
1. Which of the following is not a task that will be carried out by a user of a system through its
interface?
A)Issuing commands to the system to indicate what the user wants to do.
B)Responding to and correcting errors.
C)Storing data in a database.
A)A term that is used figuratively to describe something but is not applied
literally.
B)A term that is used to describe something as being like something else
C)A narrative technique describing one thing in the guise of another.
3. Which of the following is not a metaphor for the way that users interact with the user interface?
A)Direct manipulation.
B)Scenario.
C)Dialogue.
A)Prompt.
B)Data.
C)Help.
5. Which kind of message is provided by a system when it displays a request for the user to enter data?
A)Status.
B)Help.
- 31 -
C)Prompt.
6. Why is the design of direct manipulation GUI interfaces more complicated than text-based dialogues?
A)They are event-driven, and the user can create events, such as button clicks, in any order.
B)There is no way of representing GUI interfaces in UML.
C)They can only be implemented using Visual Basic or Java.
8. A system provides hypertext help and tooltips, which display information about buttons in the toolbar
when the mouse cursor moves over them. Which of the following characteristics of good dialogues is
this an example of?
A)All dialogue boxes have an ‘OK’ button and a ‘Cancel’ button centred at the bottom of the
dialogue box.
B)When a shareware package starts, if it has not been licensed, the user has to click a button labelled ‘I
agree’, which appears in different positions in the start-up dialogue box on different occasions.
C)When entering a value, the user can sometimes type it in and sometimes select it from a list
11. Some organisations set standards for user interface design. What are these standards called?
A)Ethnographic standards
B)GUIdes (short for ‘GUI design’).
C)Style guides.
12. Which of the following is not a list of factors that affect the design of the user interface?
A)The nature of the task that the user is carrying out, the type of user, the amount of training the user
will have undertaken, the frequency of use and the hardware and software architecture.
- 32 -
B)The nature of the task that the user is carrying out, the type of user, the amount of training the
user will have undertaken, the frequency of use and the database architecture.
C)The nature of the task that the user is carrying out, the type of user, the choice of requirements
gathering techniques, the frequency of use and the hardware and software architecture.
14. Which of the following is not a characteristic of structured approaches to user-interface design?
A)They are based on a life cycle broken down into stages, steps and tasks.
B)They require the designer to participate in the day-to-day work of users.
C)They define specific techniques and lay down which techniques to use in each step or task.
15. Which of the following is not a characteristic of ethnographic approaches to user interface design?
A)They require the designer to participate in the day-to-day work of the users.
B)They use quantitative methods based on statistical analysis.
C)They recognise that different users have different subjective experiences of using systems.
16. Which of the following is used as a criticism of laboratory testing of user interface designs?
17. Which of the following is not a characteristic of scenario-based approaches to user interface design?
18. Which kind of user interface design approach is closest to use case analysis?
A)Structured.
B)Ethnographic.
C)Scenario-based.
A)Expense claims from designers who participate in the day-to-day work of users.
B)Supporting documentation that justifies the design decisions embodied in scenarios.
C)Document management support for the use of scenarios.
21. Which of the following organizations has laid down standards for the ergonomics of visual display
terminals?
22. Which of the following is not a requirement on employers under the UK’s Health and Safety
Regulations for Display Screen Equipment?
Chapter - 17
1. Which of the following types of class stereotype is always found in the presentation layer?
A) Boundary.
B) Control.
C) Entity.
A) Model.
B) View.
C) Controller.
3. Which of the following is not a reason for separating the display of instances of business classes
from the business classes themselves?
A) For classes to be reusable they should not be tied to a particular way of displaying the
attribute values of instances.
B) The state behaviour of the interface is different from the state behaviour of the
business objects.
C) There is no one standard layout for the attributes of business objects, so the display is better
handled by separate classes.
- 34 -
4. What is the presentation layer concerned with?
A) Presenting the attribute values of objects to the user and other systems.
B) Storing the data represented by the attribute values of objects.
C) Acting as an interface between the tiers of the three-tier architecture.
A) Horizontal.
B) Vertical.
C) Lateral.
A) A vertical prototype is discarded after it has been used to test out some aspect of the design.
B) A vertical prototype deals with a single layer of a layered architecture.
C) A vertical prototype takes one sub-system and develops it across all the layers.
A) A throwaway prototype is discarded after it has been used to test out some aspect of
the design.
B) A throwaway prototype takes one sub-system and develops it across all the layers.
C) A throwaway prototype is used to test the design of object deletion mechanisms.
9. Which of the following is not a reason for using prototyping in the design of the user interface?
A)
A
B)
- 35 -
B
C)
11. Boundary classes will usually have a dependency on classes in some kind of user interface
package, such as the Java Abstract Windowing Toolkit or the Microsoft Foundation Classes. What
kind of dependency is this likely to be?
A) «realize»
B) «import»
C) «include»
12. What notation is used in a sequence diagram to show that an object instance is created by a
message?
A) The arrow head of the message points at the object at the top of the lifeline.
B) The arrow head of the message is open.
C) A large ‘C’ for ‘Constructor’ is shown on the object lifeline.
13. What notation is used in a sequence diagram to show that an object instance is destroyed as a
result of receiving a message?
14. Which of the following statements best describes the excerpt from a class diagram shown
below?
15. Which of the following is meant by the large rectangle in the diagram below?
A) The messages within the rectangle result in the destruction of the :ListClients object.
B) The messages in the rectangle are repeated.
C) The messages in the rectangle are all sent by the same object.
16. Which of the objects in the diagram below would need to implement the ItemListener interface
in order to respond to the itemStateChanged(evt) message?
- 37 -
A) clientChoice:Choice.
B) CheckCampaignBudgetUI.
C) CheckCampaignBudget.
17. Which three patterns do Gamma et al. use to describe the Model–View–Controller architecture?
A) To model the permitted states of the user interface and the events that cause the
user interface to change state.
B) To model the lifetime of all the user interface classes beyond the existence of a particular
instance of the interface.
C) To show the sequential view of the user working through the user interface from top to
bottom.
19. Which of the following can be achieved by modelling the state of the user interface?
A) It shows that the state nested within another state will be recorded, and if a
transition is made back to the history indicator, then the object will return to the
recorded state.
B) When a transition enters the nested state it will restart at the start state.
C) If a transition is made to the history indicator then the object will return to the immediately
preceding state, as if the transition had never happened.
- 38 -
21. Which of the following is the notation for the deep history indicator?
A) H in a circle.
B) H* in a circle.
C) «history» in a round-cornered rectangle.
A) The actions that objects can carry out and the events that take place as a result of those
actions.
B) Events that objects can respond to and the actions that take place in response to those events.
C) Current states, events that can occur in each state, the actions associated with the
combination of state and event, and the next states after the actions have taken
place.
Chapter - 18
1. Which of the following statements best describes what is meant by a CASE tool?
2. Which of the following statements best describes what is meant by a configuration management tool?
A)A software package that keeps track of the dependencies between components and the versions
of source code and resource files used to produce a particular release of software.
B)A software package that enables a developer to produce a graphical user interface by dragging and
dropping components onto forms.
C)A software package that builds archives or zip files that can be used with an installation tool to install
software onto a computer.
3. Which of the following statements best describes what is meant by an integrated development
environment?
A)A software package that builds archives or zip files that can be used with an installation tool to install
software onto a computer.
B)A software package that contains a multi-window editor, mechanisms for managing the source
files in a project, and links to the compiler and debugger so that they can be run from within
the environment.
- 39 -
C)A software package that enables a developer to produce a graphical user interface by dragging and
dropping components onto forms.
4. Which of the following examples conforms to the standard for class names used in the book and
generally in Java programming?
A)Sales_Order_Proxy.
B)salesOrderProxy.
C)SalesOrderProxy.
5. Which of the following examples conforms to the standard for attribute names used in the book and
generally in Java programming?
A)budgetTextField.
B)budgetTextField().
C)BudgetTextField.
A)iLength.
B)length.
C)LengthInt.
A)Someone else may be maintaining the code that you have written.
B)However good your use of naming conventions, you can always provide extra help to readers of your
code (including yourself when you come back to it in a few months’ time).
C)End-users will need to read your program code to understand how to use the system.
A)1. Software components in the system and the dependencies between them.
B)Hardware components in the system and the software that runs on them.
C)Classes and the messages that are passed between them in the live system.
- 40 -
A)The component Production scheduler has a dependency on the component Staff planner.
B)The component Staff planner has a dependency on the component Production scheduler.
C)The software component Staff planner runs on the hardware component Production scheduler.
11. Based on the dependencies in the diagram below, which of the following statements is true?
A)
If
Sa
le
s
Or
de
r.c
pp
ch
an
- 41 -
ge
s
it
wi
ll
no
t
af
fe
ct
an
y
ot
he
r
co
m
po
ne
nt
s.
B) If SalesOrder.cpp changes it will affect the SalesOrder.h component.
C)If SalesOrder.cpp changes it will affect the SalesOrder.o and PrintOrder.exe components.
12. Which of the following statements best describes what is shown in a deployment diagram?
A)The configuration of run-time processing elements and the software components and processes
that are located on them.
B)The actors who will be involved in the deployment of software in the finished system and the
communication between them and the system hardware.
C)Software components and the dependencies between them.
13. Which of the following is the notation for a node in a deployment diagram?
A)1
B)2
C)3
14. Which of the following items are shown as well as the processor nodes in the deployment diagram
below?
- 42 -
A)Software components, a class and a stereotyped dependency.
B)Software components, an active object and a communication
association.
C)Hardware components, an active object and a message.
A)It tests the internal workings of the software and whether the software works as specified.
B)It tests whether the software produces the correct outputs for specific inputs.
C)It tests whether the software can be used ‘out of the box’ by end-users.
A)It tests the internal workings of the software and whether the software works as specified.
B)It tests whether the software produces the correct outputs for specific inputs.
C)It tests whether the software can be used ‘out of the box’ by end-users.
17. Which of the following is the likely order in which these five kinds of testing will be carried out?
A)Unit testing, integration testing, sub-system testing, system testing, user-acceptance testing.
B)Unit testing, user-acceptance testing, sub-system testing, integration testing, system testing.
C)User-acceptance testing, unit testing, sub-system testing, system testing, integration testing.
A)Testing individual classes and then the interaction between instances of those classes in programs.
B)Testing software applications in a simulated environment.
C)Testing software applications in a live environment.
19. Why are test plans with test data and expected results created?
- 43 -
A)So that programmers can make sure that testers only test their code with values that they know will
work.
B)So that testing is carried out thoroughly with a wide range of values, and the outcome according
to the specification can be checked.
C)To save time for testers, so that they don’t have to think about the results.
20. Which of the following best describes the activity of data conversion?
A)Making sure that all the data to be used in the system is converted into a modern format like XML as
soon as possible.
B)Testing that data from Windows systems can correctly be loaded into Unix applications.
C)Collating manually held data from different sources for entry into the new system, and
converting data from existing computerised systems into a format for import into the new
system.
A)Technical authors.
B)Programmers.
C)Users’ managers.
23. Which changeover strategy is most suitable for systems where there is a high level of risk and the
system is central to the operation of the business?
A)Direct changeover.
B)Phased changeover.
C)Parallel running.
A)The new system will immediately bring business benefits and will start paying for itself.
B)The outputs of the old and new systems can be compared as a form of validation.
C)Thorough testing of each stage or sub-system can be carried out as it is introduced.
25. In the diagram below which part represents parallel running schematically?
- 44 -
A)1
B)2
C)3
26. Which of the following is not a good reason for a post-implementation evaluation?
A)The project can be assessed to establish how well it has met the functional and non-functional
requirements, and if any functional requirements were left out a decision can be made about
implementing them in a future project.
B)Problems with the software can be identified and the developers responsible for those parts of
the system can be identified and demoted or sacked.
C)The experience can be used to learn useful things, for example, the actual time spent on each part of
the project can be compared with the estimates and used to improve the estimation process in future
projects.
A)In order to assess the cost of changes and the impact of changes on the rest of the system.
B)To maintain a steady income for the software company that developed the application.
C)To avoid maintenance activities interfering with work on developing new systems.
- 45 -
Chapter – 19
1. Which of the following statements best describes what is meant by persistent data?
4. Which of the following statements best describes how a database stores data?
A)Many organizations have existing relational databases containing existing business data.
B)Object databases are too complicated to use.
C)Relational databases are inherently better than object databases for business applications.
A)Fixed length.
B)Tagged.
C)Header and detail.
A)Each record is made up of a number of fields, each of which has a fixed length in bytes. If the data in
- 46 -
a field does not fill that many bytes, it is padded with a special character, usually null or space.
B)Each record is made up of a number of fields, each of which may have a maximum length but
has a minimum length of zero bytes. Either fields are separated by special delimiter characters
or the length of each field is held in the record structure.
C)Each record is tagged with a name in special characters. The end of the field is usually marked as
well. Fields can contain other fields in complex nested structures.
A)A throwaway prototype is discarded after it has been used to test out some aspect of the design.
B)A throwaway prototype takes one sub-system and develops it across all the layers.
C)A throwaway prototype is used to test the design of object deletion mechanisms.
A)Each record is written onto the end of the file. If a record is to be deleted, the file must be
copied from the start to the deleted record, which is skipped, and written back to disk.
B)Each record is written to file in a predetermined order, usually based on a key field. Records must be
added in the right place in the file.
C)Each record is located in the file by means of an algorithm that converts a key field into a position in
the file.
A)Records are stored in blocks. The key of the record is used to calculate which block to store the data
in, either using relative addressing or using a hashing algorithm.
B)Records are stored in blocks. The key of the record is used to determine which block to store a
record in. A block index is maintained, which lists the keys of the last record in each block.
C)Records are stored in blocks. records are written into blocks in the order in which they are created. If
there are too many records for the number of blocks, then the excess records are held in overflow
blocks.
A)1. A way of padding data in fixed length fields with the ASCII hash character ‘#’
- 47 -
B)A way of separating fields in records using the ASCII has character ‘#’ as a delimiter.
C)A way of converting record keys into numeric block addresses in a range of values.
14. Which of the following kinds of file would be used to store system settings?
A)Parameter file.
B)Temporary file.
C)Master file.
15. Which of the following is not a disadvantage of using files to store data?
A)As the number of applications grows, the number of files grows, and the same data may be held in
different files, creating data integrity problems.
B)Combining data from different applications to meet new business requirements is difficult, as data in
different files may be accessed in different ways.
C)Files can be used to hold prompts and labels in order to localize an application for use in
different countries.
16. Which of the following is not a list of features of a database management system?
17. Which of the following is not an advantage of using a database management system?
A)Relational databases automatically convert objects into tables consisting of rows and columns.
B)Relational databases hold data in two-dimensional tables that consist of rows and columns.
C)Object databases hold objects as complex nested structures if necessary.
A)Converting complex data structures into tables that meet clearly defined
criteria.
B)Removing dependencies from data in tables.
C)Converting class diagrams into entity-relationship diagrams.
- 48 -
20. Which of the following is not a valid guideline for mapping classes to tables?
21. Which of the following approaches is the best way of implementing inheritance in situations where it
is known that the superclass is abstract?
22. Which of the following statements best describes the use of object databases?
A)A standard for passing messages between objects running on different machines.
B)A standard for object-oriented databases.
C)A misspelling of COBRA, the most popular beer among Indian software developers.
24. Which of the following statements best describes the use of the PersistentObject approach to
designing the data storage layer?
A)All objects in the system implement the PersistentObject interface. This interface acts as a broker
between objects and the database.
B)All the operations that are concerned with storing and retrieving objects from the database are
implemented as class-scope operations.
C)All classes in the system that represent persistent objects must inherit from an abstract
superclass called PersistentObject that provides operations to store, delete and update objects
in the database.
- 49 -
A)numberOfCampaigns().
B)findByLocationCode().
C)Location().
26. Which of the following statements best describes the use of the broker framework?
A)For each persistent class there is a broker class that is responsible for materializing instances of
that class from the database and dematerialising them back into the database.
B)Every persistent class inherits from the abstract RelationalBroker class, which provides the
mechanisms for storing and retrieving object instances.
C)For every persistent object there is a broker object that is responsible for materializing the object from
the database and dematerialising it back into the database.
28. In the diagram below, what is the purpose of the IntCampaignProxy class?
- 50 -
A)The IntCampaignProxy contains the IntCampaignBroker object.
B)The IntCampaignProxy decouples the IntCampaign from the cache.
C)The IntCampaignProxy acts as a placeholder for the actual IntCampaign. The IntCampaign is
only materialized from the database when required.
CHAPTER - 20
A)If some of the requirements of a project can be met by existing components then the time spent
developing those components can be saved.
B)If components that have been used and tested in another application can be reused then the time spent
testing and quality assuring the components can be saved.
C)Reusing components allows developers to maintain their high salaries by claiming to have
developed software that has in fact been developed by someone else.
2 Which of the following is cited as a reason for the failure of object-oriented systems to have achieved
the expected levels of reuse?
A)Organizations plan for reuse too late. The architecture of a system needs to be designed to
support reuse and the organization needs to be structured to support reuse.
B)Reuse does not actually work. There are no systems that are enough like others to benefit from the
reuse of components.
C)Reuse only works for languages like C and Fortran in which libraries of reusable functions and
procedures can be developed.
- 51 -
3 Which of the following is not a standard that helps to support reusable components?
4 Which of the following kinds of organization is likely to benefit from developing a reuse-driven
software development process, according to Jacobson et al.?
5 Jacobson et al. suggest there are six stages that organizations go through in developing a culture of
reuse. Which of the following is their list of stages?
A)Java.
B)The Façade pattern.
C)A repository.
A)A type class or other workproduct that has been specifically engineered to be reusable.
B)Anything that appears in a component diagram.
C)A class or abstract superclass designed to be reused through inheritance.
- 52 -
A)Hiding reusable components behind a façade..
B)Sowing and harvesting reusable components.
C)Cloning reusable components from existing systems.
A)A pipedream.
B)Any software developed in Java.
C)Off the shelf components using standard protocols and clearly defined interfaces.
A)A design pattern to hide poorly implemented software behind a solid façade.
B)A design pattern to provide a simple unified interface to a complex sub-
system.
C)A design pattern to wrap legacy software in a Java interface using java.lang.Facade.
CHAPTER - 21
1 Which of the following statements best describes how critical path analysis finds the critical path?
A)It aims to identify those milestones where the earliest start time is equal to the latest start time.
B)It aims to identify those milestones where the earliest start time is less than the latest start time.
C)It aims to identify those milestones where the earliest start time is greater than the latest start time.
2 Which of the following statements describes how Gantt charts can be used in conjunction with a
staffing bar chart?
A)The Gantt chart can be used to show the total resource requirement at a given time.
B)The Gantt chart can be used to highlight resource conflicts.
C)The Gantt chart can be used as an aid to resource smoothing.
3 Which of the following statements best explains what is meant by slack time in Critical Path Analysis?
A)The slack time is the difference between an activity’s earliest start time and its latest start
time.
- 53 -
B)Time when no activity is occurring in the project is known as slack time.
C)Slack time is the time remaining when a project finishes earlier than scheduled.
Chapter – 22
1. How does Peter Checkland describe the difference between a method and a methodology?
- 54 -
A)Logical, physical and detailed.
B)Data, process and time.
C)Current, future and proposed.
A)To specify clearly all functions, data storage and interfaces for a proposed system.
B)To document all activities undertaken within the project.
C)To ensure that the project follows a waterfall lifecycle.
A)Construction.
B)Testing.
C)Design.
A)Inception.
B)Requirements.
C)Elaboration.
6. One of the following is not a similarity between participative design and object-oriented approaches.
Which one?
A)Hard methodologies are particularly useful for the development of complex systems, whereas soft
methodologies are more appropriate for the development of simple systems.
B)Hard methodologies are particularly useful when there is little uncertainty about the system
requirements, whereas soft methodologies are more appropriate where there is uncertainty
about the system requirements.
C)Hard methodologies are particularly useful for developing systems that will be used by scientists and
engineers, whereas soft methodologies are more appropriate for developing systems that will be used
by business people.
- 55 -
9. What is meant by ‘process uncertainty’?
10. What is the main focus of the Elaboration phase in the USDP?
A)The team concentrates on developing a small subset of the system in order to assess the overall
viability of the project.
B)The team concentrates on producing a design for the whole system that demonstrates how it can
be built within an acceptable timescale and at an acceptable cost.
C)The team concentrates on building a system that is capable of satisfactory operation in its target
environment.
- 56 -