MCQ Uml

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 56

Chapter 3

1.Some of the tasks in the general problem-solving model are listed below. Which of the following list
these tasks in the correct sequence?
A)Problem definition, Finding solutions, Problem redefinition.
B)Data gathering, Finding solutions, Finding ideas.
C)Problem definition, Data gathering, Problem redefinition.

2. Which of the following is a consequence of subdividing the development process?


A)It makes it more difficult to manage a project.
B)It allows teams of developers with specialist skills to be allocated to a particular phase.
C)It helps identify smaller tasks that can be completely finished.

3. Which of the following best describes the term life cycle model?
A)It describes the way requirements for an application change at different stages in the life of the
organization.
B)It describes how a computerized information system is used during its lifetime.
C)It describes the phases through which a development project passes from the inception of the
idea to completion of the product and its eventual decommissioning.

4. Which of the following is a true statement regarding a systems development project?


A)A systems development project is only concerned with developing a software system.
B)A systems development project is only concerned with developing systems for controlling devices or
machines.
C)A systems development project may not involve software development.

5. Which of following describes Strategic Information Systems Planning?


A)It is concerned with planning the implementation of information systems.
B)It is concerned with planning information systems development within the context of the
organizational strategy.
C)It is concerned with how information systems can support strategic planning in an organization.

6. Some of the phases of the Traditional Life Cycle are listed below. Which of the following lists is in
the correct sequence?
A)
C
on
str
uc
tio
n,
In
st
all
ati
on
an

-1-
d
Te
sti
ng
.
B)
R
eq
ui
re
m
en
ts
an
al
ys
is,
Sy
st
e
m
s
en
gi
ne
eri
ng
,
D
es
ig
n
C) Systems engineering, Requirements analysis, Design

7. Which of the following in true about system requirements?


A)They can be used to develop user acceptance tests. B) They are mainly identified during systems
engineering. C) They change from one phase to another.

8. Which of following is true about the criteria for acceptance tests?


A)
T
he
y
ar
e
be
st
id
en
tif
ie
-2-
d
at
th
e
en
d
of
th
e
de
si
gn
ph
as
e.
B) They are best identified at the end of requirements analysis.
C) They are best identified at the beginning of the testing phase.

9. Which of the following statements is true about adaptive maintenance?


A)It is concerned with changing the system when requirements change.
B)It is concerned with ensuring the system data is adapted to suit changes in the organization.
C)It is concerned with maintaining the system so that it can adapt automatically to changes in the
organization.

10. One of the major challenges during system installation is which of the following?
A)Ensuring that the new software is correctly installed to use the computer effectively.
B)Avoiding unnecessary disruption and minimising the attendant risk of change.
C)Ensuring that both old and new systems run in parallel.

11. Which of following is true about software construction in the traditional life cycle?
A)Only one programming language could be used. B) Relational database management systems are
not used. C) The design is used to develop program code.

12. Which of the following is a disadvantage of the traditional life cycle?


A)It does not allow the use of object-oriented technology.
B)Requirements change during development after the main system requirements have been
agreed. C) It separates requirements analysis and design.

13. Iteration is problematic during the traditional life cycle for which of the following reasons?
A)Architectural decisions are difficult to change. C) Requirements will change during the project.
B)Ad hoc coding solutions may be used to address changes in requirements.

14. Which of the following statements is true about a prototype system?


A)A prototype system is always discarded before the final production system is built.
B)Rapid development tools are only used to build prototype systems.
C)A prototype system is incomplete or lacks the resilient construction of the final production
system.

15. Which of the following is not an advantage of prototyping?


A)Prototyping is easy to manage. B) Prototypes may be used to reduce misunderstandings about
requirements. C) Prototyping requires no analysis or design.
-3-
16. Which of the following is not a workflow in the Unified Software Development Process?
A)Construction. B) Implementation C) Test

17. User involvement in software development is important for which of the following reasons?
A)It is cheaper to have users as part of the project team rather than professional software developers.
B)Users understand why the requirements cannot be met.
C)Users can influence the way a project proceeds by identifying the most acceptable course of
action from various alternatives.

18. Consider the following statements about CASE tools.


A. Current CASE tools can perform semantic checks on a set of diagrams modelling an information
system.
B. Current CASE tools can perform syntactic and consistency checks on a set of diagrams
modelling information system.
C. Current CASE tools can perform syntactic checks on a set of diagrams modelling information
system.

Which of the following is true?

A)Statements A, Band C are true. B) Statements A and C are true. C) Statements B and C are true.

19. Which of the following is an example of a systems development methodology?


A)The traditional life cycle B) The Unified Modelling Language
C)The Unified Software Development Process.

Chapter 4
1. Which of the following best describes an object?
A)Part of a software system that is entirely unique. B) A concept, abstraction or thing in an
application domain. C) A program that represents something tangible in the problem domain.

2. Which of the following best describes abstraction?


A)A representation of something tangible. B) A representation that can be stored in a software system.
C)A representation that contains only relevant details.

3. Which of the following is not a reason for modelling objects?


A)To produce a design for part of a software system. B) To understand an aspect of the application
domain. C) To separate data from process.

4. What do all objects have?


A)State, behaviour and identity. B) Behaviour, data and identity. C) Instances, structure and similarity.

5. Which of the following best describes object state?


A)The particular condition that an object is in at a given moment, determining its possible
behaviours. B) Which class the object belongs to. C) The semantics of the object.

6. Which of the following best describes object behaviour?


A)What the object is able to do to other objects. B) What the object is able to do for other objects.
C)What the object is able to do to itself.

-4-
7. Which of the following is a useful set of questions to ask when modelling an object, according to
Rebecca Wirfs-Brock?
A)Who am I, what can I do and what do I know? B) Where am I, what am I and who do I know?
C)What do I have, what can I get and what can I do?

8. Which of the following is not a description of a class?


A)A set of objects that share the same behaviour, attributes, relationships and semantics.
B)An abstract descriptor for a set of instances with certain logical similarities to each other.
C)A set of objects that collaborate together to achieve some common objective.

9. Which of the following best describes the relationship between an object and its class?
A)The structure and permitted behaviours of an object are defined by its class.
B)A class is a container that holds a collection of similar objects.
C)An object is an implementation of a class.

10. What is generalization?


A)A process of broadening the scope of an object, such that it becomes more generally useful.
B)A kind of relationship between a more general element and a more specific element.
C)A process of collecting together objects into their respective classes.

11. Which of the following best describes a type?


A)A description of a set of objects with similar behaviours. B) A superclass in a generalization
hierarchy. C) A class with a characteristic that distinguishes it from all other classes.

12. Which of the following is not an advantage of using generalization?


A)Generalization helps to organize a model so that the degree of similarity between classes is made
more explicit. B) A generalization hierarchy is easy to extend to fit a changing picture.
C)Generalization helps to encapsulate classes and subsystems so that their implementation is
hidden from other parts of the system.

13. How does generalization differ from inheritance?


A)It doesn't - they are the same thing. B) Inheritance is a mechanism by which some OO languages
implement generalization.
C)With generalization each class has only one superclass, whereas with inheritance each class has two
or more superclasses.

14. Which of the following is not a characteristic of a subclass?


A)A subclass can only have superclasses, it cannot have subclasses of its own.
B)A subclass inherits all the characteristics of its superclass.
C)A subclass includes at least one detail that is not shared by its superclass.

15. What is meant by 'transitive operation' in the context of generalization and inheritance?
A)An operation in a superclass may be overwritten by a different operation in a subclass.
B)An operation in a superclass may not be overwritten by a different operation in a subclass.
C)A subclass inherits characteristics from all its superclasses at all levels.

16. What is the significance of message-passing in an OO system?


A)Messages represent input from users that tells the software system what to do.
B)Objects exchange messages in order to communicate with each other.
-5-
C)Messages represent output to users that show the results of processing.

17. What is a message protocol or signature?


A)A message protocol is a valid sequence of keystrokes by a user.
B)A message protocol is a valid sequence of operations in a series of different objects.
C)A message protocol is the interface to an operation.

18. What is meant by multiple inheritance?


A)Multiple inheritance signifies that a class simultaneously belongs to more than one
generalization hierarchy.
B)Multiple inheritance signifies that a class has more than one superclass.
C)Multiple inheritance signifies that a class can have different superclasses at different times.

19. Which of the following best describes encapsulation?


A)The implementation of an object can only be changed by its original programmer.
B)Data within an object can only be accessed by passing a valid message to one of its own
operations. C) Data within an object can only be accessed by passing a valid message to its class.

20. Which of the following best describes an object's interface?


A)The view that an object presents to users of the system. B) The links that an object has with other
objects. C) The complete set of signatures for all the object's operations.

21. Which of the following best describes polymorphism?


A)The capacity of an object to behave in different ways at different times according to its current state.
B)The capacity of different objects to respond to a similar message in appropriate but different ways.
C) The capacity of an object to send different messages to different objects according to their class.

22. Which of the following is a valid reason why it is difficult to design event-driven software in a
procedural manner?
A)It is difficult to anticipate and design for all possible sequences of use.
B)Procedurally designed programs are not capable of responding quickly to events.
C)Procedural programs are only suitable for record-based data structures.

23. Which of the following is not an advantage of modular software design?


A)Modular systems are typically more reliable in use.
B)Modular systems can be implemented in small, manageable chunks.
C)Modular systems are independent of the operating system that they run on.

CHAPTER - 5

1 Which of the following is not a reason for using a model?

A)A model is quicker and easier to build than the real thing
B)We can use a model in simulations to test our ideas
C)We can use a model instead of building the real thing

2 Which of the following is not a model?

A)Concorde B) A scale model of Concorde to use in a wind tunnel

-6-
C)An engineer’s drawing of a cross-section through the fuselage of Concorde

3 Analysts and designers use models that consist of which of the following?
A)Diagrams and text B) Only diagrams C) Only text

4 Which of the following do analysts and designers use diagrams for?


A)To communicate ideas B) To understand structures and relationships C) Both 1 and 2

5 Which of the following do analysts and designers use diagrams for?


A)To ensure that users don’t understand the specification for a system
B)To communicate ideas to users and other analysts and designers C) Neither A nor B

6 Why are systems analysis and design diagram standards important?


A)They promote communication between team members
B)They provide work for international standards committees
C)3. They prevent systems analysts’ clothes from shrinking in the wash

7 Which of the following are the rules that modelling techniques should enforce?
A)Simplicity of representation, external consistency, completeness and network representation
B)Simplicity of representation, internal consistency, completeness and hierarchical representation
C)Simplicity, internal consistency, completeness and hierarchical symbols

8 Which of the following is not an element of UML diagram notation?


A)Icon B) Vertex C) String

9 Which of the following is true?


A)Icons can contain two-dimensional symbols B) 2. Two-dimensional symbols can contain icons
C)An icon contains at least one vertex and one string

10 Which of the following is true?


A)A model consists of one and only one diagram
B)A diagram contains at least one model C) A model contains diagrams

11 Which of the following is the UML notation for a model?


A)Answer A B) Answer B C) Answer C

12 Which of the following does the Figure below show?

A)A model. B) A sub-system C) A package

13 As a model is developed it, which of the following does it become?

A)More abstract B) More detailed C) Less formal

-7-
14 Which of the following is not a purpose for using activity diagrams?

A)To show the sub-systems that make up a system B) To model a task


C)To describe the logic of an operation

CHAPTER-6
1.Which of the following is not a reason for analysing the current system (if it exists)?
A)The analyst needs to know about problems with and defects in the current system.
B) The analyst must not lose sight of his or her objectives.
C)Much of the functionality of the existing system will be required in the new system.

A) Security considerations B) Details of data that must be held in the system.


C) Descriptions of the processing that the system will be required to carry out
2. Which of the following is not an example of a functional requirement?

3. Which of the following describes a functional requirement.


A)The system must be capable of responding to all queries within 5 seconds
B)Users of the system will make 50% fewer errors than with the existing system
C)The system must allow users to enter details of advertising campaigns.

4. Which of the following is not an example of a non-functional requirement?


A)Volume of data B) Performance requirements C) The content of printed reports required from the
system

5. Which of the following describes a non-functional requirement?


A)The system must be capable of holding 500Mb of data initially, growing by 100Mb per year
B)The system must produce a report of all advertising campaigns for a particular client
C)The system must allow users to enter details of clients

6. Which of the following is not the kind of information gathered to understand usability requirements?
A)The characteristics of the users of the system. B) The context in which the system will be used
C)The volume of data in the existing system.

7. Which of the following lists only contains systems analysis fact-finding techniques?
A)Sampling, questionnaires, interviewing, reading and observation
B)Use case modelling, interviewing, class diagramming, observation and knowledge acquisition
C)Sampling, background reading, interviewing, use case modelling and activity diagramming

8. Which fact-finding technique is most suitable to be used in the initial stages of fact-finding and
particularly where the analyst is not familiar with the organization that is being studied?
A)Background reading B) Interviewing C) Questionnaires

9. Which of the following is a valid reason for using interviewing as a fact-finding technique?
A)The interviewer can gather statistical data about documents.
B)The interviewer can respond flexibly to the interviewee’s responses.
C)Interviews take very little time

-8-
10. In which of the following circumstances is it not appropriate to use questionnaires?
A)The views and knowledge of a large number of people must be obtained
B)The people who work for the organization are geographically dispersed
C)There is a need to check how people actually carry out their work.

11. Which of the following categories of people are not likely to be involved in a steering committee?
A)Senior managers.
B)System testers.
C)Representatives of users

12.
ANS:
A)An actor.
B)A use case
C)An activity

13.
ANS:
A)An actor
B)A use case
C)A user

14. Which of the following is not a purpose for using use cases?
A)To document the scope of the system.
B)To provide a high-level view of system functionality from the users’ perspective.
C)To describe the logic of operations

15. Which of the following pairs lists valid dependencies to show on a use case diagram?
A)«extend» and «include».
B)«extend» and «retract».
C)«exclude» and «include».

16. Which of the following is the correct name for the symbols placed round stereotyped names such as
«extend»?
A)Guillemots
B)Parakeets
C)Guillemets

-9-
17.
ANS:
A)Check campaign budget extends Print campaign summary
B)Check campaign budget includes Print campaign summary
C)Print campaign summary extends Check campaign budget

18. Which of the following statements is true?


A)Actors are linked to use cases by inheritance
B)Actors are linked to use cases by communication associations
C)Actors are linked to use cases by «uses» dependencies

19. Which of the following is shown in a use case diagram by a rectangle surrounding a group of use
cases?
A) The class that implements the use cases
B)The system or sub-system that the use cases belong to.
C) The package that contains the use cases

20. Which of the following is the best definition of an actor?


A)An actor represents a user of the system
B)An actor represents a role played by a user of the system
C)An actor represents a role played by a user of the system or by an external system.

21. Which of the following is true?


A)An Extend dependency means that the functionality of one use case optionally extends the
functionality of another at a particular point or points in its execution
B)An Extend dependency means that the functionality of one use case always extends the functionality
of another at a particular point or points in its execution
C)An Extend dependency means that the functionality of one use case inherits the functionality of
another at a particular point or points in its execution

22. Which of the following is true?


A)An Include dependency means that the functionality of one use case optionally includes the
functionality of another at a particular point or points in its execution
B)An Include dependency means that the functionality of one use case always includes the
functionality of another at a particular point or points in its execution
C)An Include dependency means that the functionality of one use case inherits the functionality of
another at a particular point or points in its execution

- 10 -
23.
ANS:
A)A data flow from one actor to another
B)An inheritance relationship between two actors.
C)An Extend dependency between two actors

24. Which of the following is true based on the diagram below?

ANS:
A)Campaign Manager can use the same use cases as a Campaign Staff and one or more additional
ones
B)Campaign Staff can use the same use cases as a Campaign Manager and one or more additional ones
C)Only Campaign Manager actors exist, as Campaign Staff is an abstract actor.

25. Which of the following is the term for a textual description of a use case?
A)Behaviour description.
B)Use case activity.
C)Use case description

26. Which of the following is not a reason for using prototyping during use case development?
A)To clarify requirements
B)To test the architecture of architecturally significant use cases.
C)To get the user interface development started before the class diagramming is begun.

27. Which of the following is true?


A)Business use cases are shown in grey
B)Business use cases show actors outside the organization interacting with the organization
C)Business use cases are always produced after ordinary use cases have been produced

CHAPTER-7
1.Which of the following is not a good reason for constructing a requirements model?
A)It can show the business situation in enough detail to check that the requirements have been captured
fully and correctly.
B)It can demonstrate that all the use cases have been drawn using the correct notation
- 11 -
C)It can be organized in such a way that it will be useful later for designing the software

2. Which of the following statements best describes what a class diagram can include?
A)Only classes
B)Only classes and their relationships
C)Classes, instances and their relationships

3. Which is the correct name for "a possible set of classes, together with an understanding of how those
classes might interact to deliver the functionality of a use case?
A)A use case class diagram
B)A realization
C)A collaboration

4.
A)It shows that elements within the collaboration (the dotted ellipse) may reference elements
within the use case (the solid ellipse).
B)It shows that the collaboration (the dotted ellipse) cannot be implemented until the use case (the solid
ellipse) has been implemented
C)It shows the direction of the flow of control when the software executes

5. One of the following is not a difference between a class diagram and a collaboration diagram. Which
one?
A)A collaboration diagram shows object interaction, while a class diagram ignores this.
B)A class diagram shows more of the structural details than the collaboration diagram
C)A class diagram shows the names of the classes, while the collaboration ignores these

6. Which of these figures is a collaboration diagram?

A) B) C)

ANS: Fig(B)

7. Which of these is the correct set of analysis class stereotypes in standard UML?
A)Interface, control and entity
B)Boundary, control and entity
C)Interface, sequence and entity.

- 12 -
8. One of the following is not an advantage of stereotyping analysis classes. Which one?
A)The resulting packages can form a basis for the system's architecture.
B)It can be useful to differentiate classes that have broad similarities in the way that they behave.
C)Once a class is stereotyped, its behaviour is likely to become more predictable

9. What do boundary classes represent?


A)Customers and suppliers of the business.
B)People who will use the system.
C)Interaction between the system and its actors.

10. What is the significance of the double colon in the class name: User Interface::AddAdvertUI?
A)The class called AddAdvertUI is in the package called User Interface.
B)User Interface is the stereotype of a class called AddAdvertUI
C)User Interface and AddAdvertUI are two alternative names for the same class.

11. Which one of these is not a permitted symbol for a boundary class?

A) B) C)
ANS: FIG(A)

12. What are entity classes?


A)Classes that contain data.
B)Classes that contain persistent data.
C)Classes that represent something or some concept in the application domain

13.
One of these is not a permitted symbol for an entity class. Which one?

A) B) C)
ANS: Fig(B)

14. What do control classes represent?


A)The calculation and scheduling aspects of the logic of the use case
B)Classes that interact with the users of the system.
C)Classes that control the storage of persistent data.

15. One of the following cannot directly affect the state of an object. Which one?
A)A change in the value of one of its attributes
B)The creation or destruction of another object of the same class
C)The creation or destruction of a link with another object

16. What is the difference between a link and an association?


A)A link connects two instances, while an association connects two classes

- 13 -
B)A link is a transient association
C)A link is an association between two entity classes.

17. What is the significance of the directional arrow indicated on this diagram?

A(A)It shows the direction in which you should read the name of the association
)
B(B)It shows the direction in which messages can be sent along the association
)
C(C)It shows the order in which the objects will be connected when a link is
)created

18. What is the significance of the multiplicity of an association?


A)It denotes the number of different classes that can be linked together
B)It constrains the number of objects of one participating class that can be linked to an object of
the other class
C)It constrains the number of times that an object of one participating class can be linked during its
lifetime

19.
ANS:
A)A staff member need not be associated with any grades, or it can be associated with an indeterminate
number of grades; a grade must be associated with one or more staff members
B)A grade cannot be associated with a staff member but a staff member can be associated with a grade
C)A grade need not be associated with any staff members, or it can be associated with an
indeterminate number of staff members; a staff member must be associated with one or more
grades.

20. How do operations differ from methods?


A)A method is a particular implementation of an operation
B)An operation is a particular implementation of a method.
C)Some object-oriented programming languages have methods, while other have operations.

21. When do we not need to represent the whole system as a class in the analysis model?
A)When the users have not stated that this is a requirement
B)When the system does not need to interact directly with other systems
C)When the system does not need to encapsulate data or behaviour that applies only to the system
as a whole

- 14 -
22. What is a domain class model?
A)A class model that does not include either boundary or control classes
B)An analysis class model that is independent of any particular use cases.
C)A class model that has been implemented in a particular domain.

23. One of the following is a bad guideline for deciding the class where an operation should be located.
Which one?
A)The operation represents a service that objects of that class should provide to objects of other classes.
B)The operation needs to access or update data that is stored in another class that has an
association with that class
C)The operation needs to access or update data that is stored in an attribute of that class

24. What is the main purpose of the Class-Responsibility-Collaboration technique?


A)To decide which team members will be responsible for developing each part of the software
B)To decide which classes of the system should be responsible for each use case
C)To decide how responsibilities should be distributed among the classes of the system

25. Why is it often difficult to determine the most appropriate choice of responsibilities for each class?
A)Because there may be several alternatives that appear equally justified.
B)Because the developers may not know enough about how the users want the system to be designed.
C)Because members of the development team are often lazy and avoid responsibility as much as they
can.

26. The requirements of different use cases may suggest different operations for the same class. How do
we resolve this?
A)We split the class so that there is one for each use case, and model each class with the particular
operations required for its use case.
B)We include in the class all the operations that are suggested by all the use cases.
C)We model the class with only that subset of operations that applies to all use cases

27. Which of the following is an advantage of the use of a control class in realizing a use case?
A)A control class prevents users from being able to change the way that the entity classes work.
B)A control class reduces the need for entity classes to know anything about other entity classes
unless this is directly relevant to their own responsibilities.
C)A control class allows the system to communicate with other systems on different networks.

CHAPTER-8
1.Which of the following best describes the advantages of using software components, assuming that
suitable components are available?
A)The users are more likely to get what they want.
B)The project is more likely to be completed in less time and at a lower cost
C)The software is more likely to be capable of running on different hardware platforms

2. What is meant by the NIH syndrome?


A)Some software developers are not inclined to trust software that was written elsewhere
B)Some project managers are not inclined to trust programmers who were trained elsewhere
C)Many users are not inclined to trust software that was written elsewhere

- 15 -
3. One of the following is not a reason why object-oriented approaches support software reuse. Which
one?
A)Object-oriented development encourages the encapsulation of the internal details of components
B)Object-oriented models are organized in a way that makes it easier to find suitable components
C)Object-oriented development encourages developers to share ideas with developers in other
teams

4. Which of the following best describes composition?


A)A package of model elements
B)A set of realizations for a single use case
C)A relationship between a whole and its parts

5. Which of the following best describes how composition differs from aggregation?
A)A part cannot be removed from a composition, whereas a part can be removed from an aggregation.
B)A part can belong to only one composition, whereas a part can belong to more than one
aggregation.
C)A part that belongs to a composition cannot have associations with any other classes, whereas a part
that belongs to an aggregation can have associations with other classes

6. How does generalization increase the opportunities for software reuse?


A)A generalization hierarchy can be extended to include new subclasses with minimal
effort
B)Generalization aids the encapsulation of software components
C)Generalization allows a group of software components to be treated as a single whole

7. What does it mean to say that an operation has been redefined?


A)The definition of the operation in a subclass overrides the superclass definition of the same
operation
B)The definition of the operation has been changed because users have changed their minds about the
requirements
C)The method that implements the operation does not follow the original definition of the operation

8. How do abstract and concrete classes differ from each other?


A)Abstract classes represent intangible concepts in the application domain, whereas concrete classes
represent physical things
B)Abstract classes are superclasses, whereas concrete classes are subclasses
C)Abstract classes have no instances, whereas concrete classes have instances

9. Which of the following best describes multiple inheritance?


A)Multiple inheritance occurs when a subclass is removed from one generalization hierarchy and added
to another
B)Multiple inheritance occurs when a subclass inherits from more than one generalization
hierarchy
C)Multiple inheritance occurs when a subclass inherits characteristics from more than one level of
superclass

10. Which of the following is the best description of a software development pattern?
A)The way that a particular software developer tends to solve problems
B)The core of a solution to a software development problem that occurs over and over again
C)A particular approach to software development, such as the object-oriented approach or the structured
- 16 -
approach

11. What is the role of encapsulation in reuse?


A)Encapsulation means that it is not necessary for other developers to know how a software
component works internally
B)Encapsulation means that software components can work more efficiently
C)Encapsulation means that there is no need for software developers to document their work

12. How does composition support software reuse?


A)A composite structure is capable of performing more than one task, and thus it is useful in more than
one context.
B)Composition structures are easy to extend with minimal effort
C)Composite structures encapsulate their sub-components, making it easy to treat the composite
as a single whole

CHAPTER-9

1.Which of the following is true?


A)Identifying what messages are passed between objects is a straightforward process.
B)Message passing is a metaphor used to describe object interaction
C)Message passing is only concerned with query operations

2. Which of the following is true about boundary objects?


A)The identification and specification of boundary objects is purely a design activity
B)The identification and specification of boundary objects is part of requirements specification
C)The identification and specification of boundary objects is considered in both analysis and
design but in different ways.

3. Which is the correct UML definition of a collaboration?


A)A collaboration describes the messages between objects
B)A collaboration describes objects that share functionality
C)A collaboration describes the structure of instances playing roles in a behaviour and their
relationships

4. An interaction sequence diagram drawn during analysis differs from one drawn during design which
of the following ways?
A)It normally does not include design objects or detailed specifications of message signatures
B)It does not include boundary objects.
C)It does not include control objects

5.

- 17 -
A) 1 B) 2 C) 3

6. Which of the labelled symbols in the following diagram represents a synchronous message?

A) 1 B) 2 C) 3

7. What is meant by the term ‘thread of control’ in the context of concurrent behaviour?
A)A thread of control is a weak part of the control system
B)A thread of control is the mechanism that controls concurrent behaviour
C)A thread of control is an execution pathway that may occur simultaneously with other
execution pathways
8. Which of the following is an appropriate way of managing complex behaviour on an interaction
sequence diagram?
A)A group of objects can be represented by a single lifeline
B)Some messages are omitted to reduce the complexity
C)Some objects are omitted from the diagram to reduce the complexity

9. Collaboration diagrams differ from interaction sequence diagrams in the following way?
A)Collaboration diagrams cannot show the design detail that can be shown on a sequence diagram
B)Collaboration diagrams only show the collaboration and not the sequence in which the messages are
- 18 -
sent
C)Collaboration diagrams show the links between the objects

10. In a collaboration diagram one message has the sequence number 5.1.1. Which of the following
sequence numbers indicates the message that must be the immediate successor?
A)A message with the sequence number 5.1.2
B)A message with the sequence number 5.1.1.1
C)A message with the sequence number 5.2.1

11. Which of the following is a disadvantage of collaboration diagrams?


A)A collaboration diagram can only be used during analysis
B)A collaboration diagram cannot include guard conditions
C)A collaboration diagram is difficult to read if there are many messages between two
objects

12. An interaction diagram should be consistent with the associated class diagram in various ways.
Which of the following statements is true?
A)It is always correct to show a message between two objects if there is an association between their
classes
B)The sending object must have the object reference of the receiving object before sending an
object-scope message
C)A message should not be shown between two objects if there is no association between their classes

CHAPTER-10

1.What is the advantage of using contracts in operation specification?

A)A contract cannot be broken and thus the software will be more reliable in operation.
B)A contract encourages encapsulation by concentrating on the service that an
object will provide to other objects and by ignoring the way that the service is to
be achieved.
C)A contract encourages better design and testing by specifying exactly how an object
will achieve a service that it is to provide to other objects.

2. One of the following would not normally be included in a contract. Which one?

A)The operation signature.


B)Events that the operation will transmit to other objects.
C)The object identifiers of other objects to which events will be
transmitted.
3. How does an algorithmic technique differ from a non-algorithmic technique?

A)Algorithmic techniques describe the internal logic of an operation, while non-algorithmic


techniques do not.
B)Algorithmic techniques describe only the external interface of an operation, whereas non-algorithmic
techniques also describe the internal details.

- 19 -
C)Algorithmic techniques are used to describe algorithmically complex operations, while non-
algorithmic techniques are used to describe only simple operations.

4. Only one of the following is an algorithmic technique. Which one is it?

A)Decision table. B) Activity diagram C) Pre- and post-condition pair

5.Only one of the following is a non-algorithmic technique. Which one is it?

A)Activity diagram. B) Structured English. C) Decision table.

6.One of the following is not a control structure in Structured English. Which one?

A GoTo. B) Iteration. C) Selection.


)

7. How does pseudo-code differ from Structured English?

A)The syntax and vocabulary of Structured English resemble those of a specific programming language,
while pseudo-code is language-neutral
B)The syntax and vocabulary of pseudo-code resemble those of a specific programming language,
while Structured English is language-neutral.
C)Pseudo-code is useful only for procedural programming languages, such as C, while Structured
English is useful for any programming language, including object-oriented languages.

8.

A)Get all the advert costs and apply the overhead rate to each in turn, then work out the total cost of the
campaign by adding these together, compare to the campaign budget and produce a warning if the
budget has been exceeded.
B)For each advert in turn, get the cost, apply the overhead rate, compare to the budget and produce a
warning if the budget has been exceeded, then do the same for the next advert.
C)Work out the total cost of the campaign by accumulating the cost of each advert in turn, apply
the overhead rate to the total, compare this to the campaign budget and produce a warning if
the budget has been exceeded.

- 20 -
9. Which of the following best describes the main use of OCL?

A)OCL is used to describe the interaction between objects in more detail than is shown graphically in an
interaction sequence diagram
B)OCL is used specifically to document operation specifications
C)OCL is used to give precise definition to any constraints in a UML model that cannot be
expressed clearly and unambiguously in a graphical notation.

10. What do OCL statements generally contain?

A)A context, a property of the context and an operation on that property.


B)Sequence, selection and iteration structures.
C)Operation intent, operation signature and logic description.

CHAPTER-11

1. Which of the following is true?

A)A state is never transitory, it always lasts for an interval of time.


B)A state is a condition during the life of an object or an interaction during which it satisfies some
condition.
C)An object always has more than one potential state.

2. The transition from one state to another is triggered by an event. One type of event is a change
event. Which of the following statements is true?

A)A change event occurs when a condition becomes true.


B)A change event occurs when a condition changes.
C)A change event occurs when an attribute value changes in an object.

3.Which of the following statements is true about statecharts in general?

A)A statechart must have a final state.


B)A statechart must have at least one initial state.
C)A statechart must have one initial and one final state

4. A guard condition may be associated with a transition. Which of the following statements best
applies to guard conditions?

A)A guard condition may only involve attributes of the object that owns the statechart.
B)A guard condition may involve attributes and links of the object that owns the
statechart.
C)A guard condition may only involve parameters from the triggering event

- 21 -
5.

A) 1 B) 2 C) 3

6. Which of the following statements is true about actions and activities?

A)An activity may be tied to a transition.


B)An action may only be tied to transitions.
C)Both actions and activities may be tied to a
state.

7. When an internal transition occurs within a state which of the following is true?

A)The entry and exit actions, if present, are triggered.


B)The entry and exit actions are not triggered.
C)The entry and exit actions if present and the action tied to the internal transition are all triggered.

8. A statechart may have states that include substates. Which of following is true?

A)An object may occupy more multiple concurrent substates simultaneously.


B)An object may occupy only two concurrent substates simultaneously.
C)An object may only occupy one substate at a time.

9. When an object exits a composite state which of the following is true.

A)Each of the submachines in the composite state must enter their final state
B)At least one of the submachines in the composite state must enter its final state.
C)Whatever combination of substates the composite is in, all those substates are exited.

10. The behavioural approach to constructing statecharts involves which of the following?

A)All interaction sequence diagrams should be analysed first.


B)All interaction sequence diagrams involving classes that have heavy messaging should be
- 22 -
analysed.
C)One interaction sequence diagram for each class must be analysed.

11. The lifecycle approach to constructing statecharts is so called for which of the following reasons.

A)The statecharts are constructed throughout the development lifecycle.


B)Collaboration diagrams rather than sequence diagrams are used to analyse behaviour.
C)It attempts to identify the lifecycle of a class from use cases and other requirements
documents.

12. When a statechart is checked for consistency with other models of the system which of the following
is true?

A)Every operation in a class must appear as an event on a statechart.


B)Every action should correspond to the execution of an operation on the appropriate class.
C)Every event must appear on a sequence diagram.

CHAPTER-12
1.Which of the following is the best description of a design model?

A)It shows what the system will do.


B)It shows how the system will work.
C)It shows why the system is required.

2. Which of the following is an example of design?

A)There will be a class called Client in the Agate system.


B)The Client class has an attribute called companyName.
C)The maximum length of the companyName attribute when printed will be 40 characters.

3. Which statement is true?

A)Iterative processes such as the Unified Process give phases different names from activities to confuse
students.
B)Iterative processes such as the Unified Process give phases different names from activities because
they share the same namespace and must be unique.
C)Iterative processes such as the Unified Process give phases different names from activities to
allow the same activities to take place in different phases.

4. Which of the following is not a reason for separating the analysis stage from the design stage?

A)Analysts and designers may be people with different skills and knowledge.
B)It is not possible to begin design until all the analysis has been completed.
C)Clients will want clear decision points at which they can agree that the project should progress to the
next stage and incur further costs.
- 23 -
5. Which of the following is claimed as an advantage of iterative development processes?

A)Risk mitigation—by identifying technical problems early on.


B)Logical design—by producing a design that is not tied to the physical implementation.
C)Diagram separation—by making it possible to use different kinds of diagrams in analysis from those
used in design.

6. Which of the following is a description of logical design?

A)Design of aspects of the system without having to consider how they will physically be
implemented.
B)Design of the logic used in operations, based on decision trees, decision tables or Object Constraint
Language.
C)Design of the logic gates used in the implementation of the processor chips used in the system.

7. Which statement is an example of logical design?

A)Communication between the Agate system and the company accounts system will be by passing
messages.
B)There will be a message sent to the accounts system called NewInvoice, which will be formatted in
XML, and each invoice will have a six-digit invoice number allocated by the accounts system.
C)Communication between the Agate system and the company accounts system will use the OpenJMS
Java message server with persistent storage of messages provided by the MySQL database.

8. Which combination of cohesion and coupling is desirable in a design?

A)High cohesion and low coupling. B) High cohesion and high coupling.
C)Low cohesion and high coupling.

9. What is system design?

A)Designing the architecture of the system and setting standards, for example for user interface
design.
B)Designing the inputs and outputs of the system, processes and data storage.
C)Designing classes that will implement the system in an object-oriented language.

10. Which of the following is not part of detailed design?

A)Screen and window layouts in the form of user interface classes.


B)Allocation of sub-systems to processors. C) Allocation of responsibilities to classes.

11. Which of the following is a list of characteristics of good analysis?

A)Completeness, consistency, correct scope and correct content.


B)Consistency, security, reliability and completeness.
C)Consistency, efficiency, effectiveness and correct scope.

12.Which of the following is a list of characteristics of good design?

- 24 -
A)Consistency, efficiency, effectiveness and correct scope.
B)Efficiency, reliability, security and flexibility.C)Efficiency, redundancy, functionality and usability.

CHAPTER-13

1. Which of the following is considered to be a major element of system design?

A)Class diagrams are mapped onto tables in a relational database management system.
B)Data management classes are identified.
C)Standards for code development and human computer interaction are
determined.

2.Which of the following is consistent with Buschmann’s definition of a software architecture


(Buschmann et al., 1996)?

A)
T
he
so
ft
w
ar
e
ar
ch
ite
ct
ur
e
on
ly
de
ter
mi
ne
s
th
e
so
ft
w
ar
e
su
b-
sy
st
e
m
- 25 -
s.
B) Software architecture describes the relationships between the components of the system.
C) Software architecture determines the look and feel of an application.

3. The sub-division of an information system into sub-systems brings which of the following
benefits?

A)The constructed system will be smaller and hence easier to maintain.


B)The server only provides the functionality required by the client.
C)It makes the system easier to maintain.

4. Which of the following statements is true about a client–server architecture?

A)
T
he
cli
en
t
int
er
fa
ce
m
us
t
be
sp
ec
ifi
ed
fir
st.
C)
T
he
cli
en
t
re
q
ue
st
s
se
rv
ic
es
fr
o
m
- 26 -
th
e
se
rv
er
.
B) The server only provides the functionality required by the client.

5. Which of the following is true about a closed layered architecture?

A)Dependencies between the layers are minimized.


B)The architecture is less open to change. C) A layer may only communicate with any of the layers
beneath it.

6. Which of the following is true about an open layered architecture?

A)System performance may be reduced. B) It is more open to change.


C)It is less easy to maintain.

7. When constructing a layered architecture which of following is not a specific consideration?

A)Maintaining the interfaces for each layer. C) The further sub-division of complex layers.
B)Maintaining a consistent level of granularity for sub-systems.

8. In the Model–View–Controller architecture which of the following best describes the role of the
Model?

A)It informs each view when model data has changed.


B)It ensures that the view updates its presentation of data.
C)It accepts user input in the form of events, and triggers the execution of operations.

9. The advantages of the Model–View–Controller architecture include which of the following?

A)It is best suited to process control applications. C) It supports diverse styles of view and controller.
B)It places complex functionality in the controller components.

10. Which of the following is a property of a broker architecture?

A)It improves performance while providing a client component with services.


B)It hides the server components from the client components. C) It acts a server component.

11. A scheduler provides which of the following facilities?

A)It is useful for allocating computer-processing resources when time constraints are not tight.
B)It determines which parts of the system execute in a pre-determined sequence.
C)It can be used to ensure that each thread of control operates within the constraints on its
response time.

12. The allocation of a system to multiple processors involves which of the following?

A)Concurrency requirements for each sub-system should be identified.


- 27 -
B)Each processor must use local data only. C) Each processor must be able to operate independently.

CHAPTER 14
1 When objects are being designed in detail the signature of each operation has to be specified. Which of
the following statements is consistent with the term operation signature?

A)Each operation in a class has the same signature.


B)The operation name and the number of parameters are part of the operation signature.
C)A class may not have two operations with the same name.

2Which of the following best describes when primary operations should be shown on class diagrams?

A)All primary operations are shown on class diagrams in design.


B)Primary operations are shown in class diagrams only if they modify attribute values
C)Primary operations are shown on design class diagrams if they are part of the public interface of
the class.

3 Encapsulation is best enforced by which of the following decisions regarding object visibility?

A)All attributes and operations are private.


B)All attributes are private and all operations are public.
C)All attributes are private and public operations are kept to a minimum.

4 When is a UML interface used?

A)It describes boundary classes


B)It describes an interface that a class may offer to another class
C)It describes the human-computer interface

5 Good coupling is best characterised by which of the following?

A)Keeping the number of message types between objects to a minimum


B)Ensuring that sub-classes are not strongly linked to their superclass.
C)Ensuring that operations in the same class are linked

6 Which of the following is a beneficial consequence of good cohesion in a class?

A)The attributes in the class will only be accessed by the operations of that class.
B)The class will exhibit high levels of encapsulation.
C)The operations in the class will be easier to maintain.

7 The Liskov Substitution Principle is best described by which of the following?

A)A derived object may be treated as if it is the base object.


B)A derived object should be replaced by its base object.
C)Derived objects should be used instead of base objects.
- 28 -
8 Which of the following statements best describes what is involved in the task of designing
associations?

A)It is concerned with how links between objects should be implemented.


B)Its main focus is determining the multiplicity of the associations.
C)It is concerned with specifying operations that may use the links between objects.

9 How many collection classes could sensibly be used to implement a two-way many-to-many
association?

A)Two or
more.
B)Two.
C)One.

10 If there is a dependency constraint between two or more attributes which of the following statements
applies?

A)The value of none of the attributes should be changed.


B)If the value of one of the attributes is changed then all the others must be updated by one or more
synchronizing operations.
C)Any change to the value of any of the attributes may require the other dependent attributes to
be updated by one or more synchronizing operations.
11 Which of the following statements best describe the application of referential integrity during object
design?

A)An object may only refer to another object if they share a link.
B)When an object is deleted all objects to which it refers must be deleted.
C)Referential integrity only applies for one-to-one associations.

CHAPTER 15

1. Which of the following statements best describes the relationship between patterns and
frameworks?

A)A framework may involve many patterns.


B)A framework is more abstract than a pattern.
C)A pattern may incorporate one or more frameworks.

2. Several key principles underlie the use of patterns. Which of the following is not a key principle
involved in the use of patterns?

- 29 -
A)Abstraction.
B)Separation of concerns.
C)Conformance testing.

3. A pattern is normally described in the format of a pattern template. Which of the following
statements best describes the forces of a pattern?

A)The forces embody the constraints that must be addressed by the solution.
B)The forces describe why it is important to find a solution to the problem
C)The forces are the constraints that solution is unable to resolve.

4. Which of the following is not one of the categories defined for the GOF patterns?

A)Creational.
B)Static
C)Behavioural.

5. Which of the following best describes an advantage of the Singleton pattern?

A)The pattern can be used to ensure that no more than a fixed number of instances of the
Singleton class are created.
B)Using the pattern always makes a system easier to maintain.
C)When the pattern is used global data can be accessed more quickly.

6. Which of the following statements is true about the Composite pattern?

A)The pattern must be used in conjunction with the Singleton pattern.


B)The pattern makes it easier to add new leaf subclasses.
C)The pattern makes it easier to add new operations to each of the leaf subclasses.

7. Which of the following best describes when to use the State pattern?

A)The pattern may be used when a class has many states.


B)The pattern may be used when a class has many operations.
C)The pattern may be used when an object appears to change class at run-time.

8. Which of the following is not an advantage of the State pattern?

A)State behaviour is localized.


B)The Singleton pattern may be used with the State
pattern.
C)State transitions are made explicit.

9. Which of the following is not an issue that should be considered before using a pattern?

A)If a simpler solution exists it should be used in preference to the pattern.


- 30 -
B)It is preferable to use patterns by themselves.
C)It is important that the context of the problem is consistent with the context of the pattern.

10. Which of the following statements is most appropriate when using a pattern during information
systems development?

A)The pattern must be used without any changes to its overall structure.
B) The pattern should be implemented with names that are meaningful in the context of
the application.
C)The names of the classes in the pattern should be given the general names from the pattern
so that their roles are unambiguous.

Chapter - 16

1. Which of the following is not a task that will be carried out by a user of a system through its
interface?

A)Issuing commands to the system to indicate what the user wants to do.
B)Responding to and correcting errors.
C)Storing data in a database.

2. Which of the following is the best definition of a metaphor?

A)A term that is used figuratively to describe something but is not applied
literally.
B)A term that is used to describe something as being like something else
C)A narrative technique describing one thing in the guise of another.

3. Which of the following is not a metaphor for the way that users interact with the user interface?

A)Direct manipulation.
B)Scenario.
C)Dialogue.

4. Which kind of message is both an input message and an output message?

A)Prompt.
B)Data.
C)Help.

5. Which kind of message is provided by a system when it displays a request for the user to enter data?

A)Status.
B)Help.
- 31 -
C)Prompt.

6. Why is the design of direct manipulation GUI interfaces more complicated than text-based dialogues?

A)They are event-driven, and the user can create events, such as button clicks, in any order.
B)There is no way of representing GUI interfaces in UML.
C)They can only be implemented using Visual Basic or Java.

7. Which of the following is not a characteristic of good user-interface dialogues?

A)Appropriate user support.


B)Minimal user input.
C)Minimal feedback from the system.

8. A system provides hypertext help and tooltips, which display information about buttons in the toolbar
when the mouse cursor moves over them. Which of the following characteristics of good dialogues is
this an example of?

A)Appropriate user support.


B)Consistency.
C)Minimal user input.

9. Which of the following is an example of consistency?

A)All dialogue boxes have an ‘OK’ button and a ‘Cancel’ button centred at the bottom of the
dialogue box.
B)When a shareware package starts, if it has not been licensed, the user has to click a button labelled ‘I
agree’, which appears in different positions in the start-up dialogue box on different occasions.
C)When entering a value, the user can sometimes type it in and sometimes select it from a list

10. Which of the following is not an example of minimal user input?

A)The user can enter abbreviations.


B)The user has to re-enter values in full when he or she has made an error.
C)The user can use control key combinations as shortcuts to menu items.

11. Some organisations set standards for user interface design. What are these standards called?

A)Ethnographic standards
B)GUIdes (short for ‘GUI design’).
C)Style guides.

12. Which of the following is not a list of factors that affect the design of the user interface?

A)The nature of the task that the user is carrying out, the type of user, the amount of training the user
will have undertaken, the frequency of use and the hardware and software architecture.
- 32 -
B)The nature of the task that the user is carrying out, the type of user, the amount of training the
user will have undertaken, the frequency of use and the database architecture.
C)The nature of the task that the user is carrying out, the type of user, the choice of requirements
gathering techniques, the frequency of use and the hardware and software architecture.

13. Which of the following is a list of approaches to user interface design?

A)Structured, ethnographic and scenario-based.


B)Consistent, adequate and minimal.
C)Requirements, design and evaluation.

14. Which of the following is not a characteristic of structured approaches to user-interface design?

A)They are based on a life cycle broken down into stages, steps and tasks.
B)They require the designer to participate in the day-to-day work of users.
C)They define specific techniques and lay down which techniques to use in each step or task.

15. Which of the following is not a characteristic of ethnographic approaches to user interface design?

A)They require the designer to participate in the day-to-day work of the users.
B)They use quantitative methods based on statistical analysis.
C)They recognise that different users have different subjective experiences of using systems.

16. Which of the following is used as a criticism of laboratory testing of user interface designs?

A) The tests lack ecological validity.


B) The tests take too long.
C)There is not evidence that the tests improve usability.

17. Which of the following is not a characteristic of scenario-based approaches to user interface design?

A)They use checklists, such as the contextual analysis questionnaire.


B)They use text or storyboards to describe interaction with the system step by step.
C)They can be used to visualise how users will interact with a new system.

18. Which kind of user interface design approach is closest to use case analysis?

A)Structured.
B)Ethnographic.
C)Scenario-based.

19. What is meant by the term ‘design claims’ in scenario-based design?

A)Expense claims from designers who participate in the day-to-day work of users.
B)Supporting documentation that justifies the design decisions embodied in scenarios.
C)Document management support for the use of scenarios.

20. Which of the following is a list of criteria for measuring usability?


- 33 -
A)Learnability, efficiency, flexibility and reusability.
B)User-friendliness, throughput, consistency and attitude.
C)Learnability, throughput, flexibility and attitude.

21. Which of the following organizations has laid down standards for the ergonomics of visual display
terminals?

A)International Standards Organization (ISO).


B)Object Management Group (OMG).
C)Unified Modelling Group (UMG).

22. Which of the following is not a requirement on employers under the UK’s Health and Safety
Regulations for Display Screen Equipment?

A)The employer must analyse workstations to assess and reduce risks.


B)The employer must provide training on health and safety relevant to workstations.
C)The employer must monitor employees’ use of workstations electronically.

Chapter - 17

1. Which of the following types of class stereotype is always found in the presentation layer?

A) Boundary.
B) Control.
C) Entity.

2. Which of the following elements of the Model–View–Controller architecture is essentially part of


the presentation layer?

A) Model.
B) View.
C) Controller.

3. Which of the following is not a reason for separating the display of instances of business classes
from the business classes themselves?

A) For classes to be reusable they should not be tied to a particular way of displaying the
attribute values of instances.
B) The state behaviour of the interface is different from the state behaviour of the
business objects.
C) There is no one standard layout for the attributes of business objects, so the display is better
handled by separate classes.

- 34 -
4. What is the presentation layer concerned with?

A) Presenting the attribute values of objects to the user and other systems.
B) Storing the data represented by the attribute values of objects.
C) Acting as an interface between the tiers of the three-tier architecture.

5. Which of the following is not a kind of prototype?

A) Horizontal.
B) Vertical.
C) Lateral.

6. Which of the following best describes a horizontal prototype?

A) A horizontal prototype deals only with the user interface.


B) A horizontal prototype deals with a single layer of a layered architecture.
C) A horizontal prototype takes one sub-system and develops it across all the layers.

7. Which of the following best describes a vertical prototype?

A) A vertical prototype is discarded after it has been used to test out some aspect of the design.
B) A vertical prototype deals with a single layer of a layered architecture.
C) A vertical prototype takes one sub-system and develops it across all the layers.

8. Which of the following best describes a throwaway prototype?

A) A throwaway prototype is discarded after it has been used to test out some aspect of
the design.
B) A throwaway prototype takes one sub-system and develops it across all the layers.
C) A throwaway prototype is used to test the design of object deletion mechanisms.

9. Which of the following is not a reason for using prototyping in the design of the user interface?

A) Alternative approaches to the interface of a use case can be tried out.


B) Guidelines for the design of the interface can be tested.
C) Visual development environments can be used to blur the distinction between the
interface and the business logic.

10. Which of the following is the stereotype for a boundary class?

A)

A
B)

- 35 -
B
C)

11. Boundary classes will usually have a dependency on classes in some kind of user interface
package, such as the Java Abstract Windowing Toolkit or the Microsoft Foundation Classes. What
kind of dependency is this likely to be?

A) «realize»
B) «import»
C) «include»

12. What notation is used in a sequence diagram to show that an object instance is created by a
message?

A) The arrow head of the message points at the object at the top of the lifeline.
B) The arrow head of the message is open.
C) A large ‘C’ for ‘Constructor’ is shown on the object lifeline.

13. What notation is used in a sequence diagram to show that an object instance is destroyed as a
result of receiving a message?

A) A large ‘X’ is shown on the lifeline.


B) The arrow head of the message is open.
C) A large ‘D’ for ‘Destructor’ is shown on the lifeline.

14. Which of the following statements best describes the excerpt from a class diagram shown
below?

A) CheckCampaignBudgetUI inherits its behaviour from ClientLister. ListClients contains one or


- 36 -
more ClientListers.
B) ListClients inherits its behaviour from ClientLister. CheckCampaignBudgetUI is a user interface
class because of its relationship with ClientLister.
C) CheckCampaignBudgetUI implements the ClientLister interface. ListClients uses the
operations of the interface when sending messages to CheckCampaignBudgetUI.

15. Which of the following is meant by the large rectangle in the diagram below?

A) The messages within the rectangle result in the destruction of the :ListClients object.
B) The messages in the rectangle are repeated.
C) The messages in the rectangle are all sent by the same object.

16. Which of the objects in the diagram below would need to implement the ItemListener interface
in order to respond to the itemStateChanged(evt) message?

- 37 -
A) clientChoice:Choice.
B) CheckCampaignBudgetUI.
C) CheckCampaignBudget.

17. Which three patterns do Gamma et al. use to describe the Model–View–Controller architecture?

A) Model, View and Controller.


B) Façade, ItemListener and Controller.
C) Observer, Composite and Strategy.

18. Why are statecharts used to model the user interface?

A) To model the permitted states of the user interface and the events that cause the
user interface to change state.
B) To model the lifetime of all the user interface classes beyond the existence of a particular
instance of the interface.
C) To show the sequential view of the user working through the user interface from top to
bottom.

19. Which of the following can be achieved by modelling the state of the user interface?

A) Passing responsibility for all validation to the controller class.


B) Constraining the behaviour of the interface to prevent users making errors.
C) Describing the high-level requirements and main user tasks.

20. What is the purpose of the history indicator in a statechart?

A) It shows that the state nested within another state will be recorded, and if a
transition is made back to the history indicator, then the object will return to the
recorded state.
B) When a transition enters the nested state it will restart at the start state.
C) If a transition is made to the history indicator then the object will return to the immediately
preceding state, as if the transition had never happened.

- 38 -
21. Which of the following is the notation for the deep history indicator?

A) H in a circle.
B) H* in a circle.
C) «history» in a round-cornered rectangle.

22. What is recorded in an event–action table?

A) The actions that objects can carry out and the events that take place as a result of those
actions.
B) Events that objects can respond to and the actions that take place in response to those events.
C) Current states, events that can occur in each state, the actions associated with the
combination of state and event, and the next states after the actions have taken
place.

Chapter - 18

1. Which of the following statements best describes what is meant by a CASE tool?

A)A software tool for drawing diagrams.


B)A software package that maintains graphical models and other data about systems, and may
generate program code.
C)A software package that enables a developer to produce a graphical user interface by dragging and
dropping components onto forms.

2. Which of the following statements best describes what is meant by a configuration management tool?

A)A software package that keeps track of the dependencies between components and the versions
of source code and resource files used to produce a particular release of software.
B)A software package that enables a developer to produce a graphical user interface by dragging and
dropping components onto forms.
C)A software package that builds archives or zip files that can be used with an installation tool to install
software onto a computer.

3. Which of the following statements best describes what is meant by an integrated development
environment?

A)A software package that builds archives or zip files that can be used with an installation tool to install
software onto a computer.
B)A software package that contains a multi-window editor, mechanisms for managing the source
files in a project, and links to the compiler and debugger so that they can be run from within
the environment.
- 39 -
C)A software package that enables a developer to produce a graphical user interface by dragging and
dropping components onto forms.

4. Which of the following examples conforms to the standard for class names used in the book and
generally in Java programming?

A)Sales_Order_Proxy.
B)salesOrderProxy.
C)SalesOrderProxy.

5. Which of the following examples conforms to the standard for attribute names used in the book and
generally in Java programming?
A)budgetTextField.
B)budgetTextField().
C)BudgetTextField.

6. Which of the following examples conforms to Hungarian notation?

A)iLength.

B)length.
C)LengthInt.

7. Which of the following is not a reason for documenting your code?

A)Someone else may be maintaining the code that you have written.
B)However good your use of naming conventions, you can always provide extra help to readers of your
code (including yourself when you come back to it in a few months’ time).
C)End-users will need to read your program code to understand how to use the system.

8. What is shown in a component diagram?

A)1. Software components in the system and the dependencies between them.
B)Hardware components in the system and the software that runs on them.
C)Classes and the messages that are passed between them in the live system.

9. Which of the following is true of the diagram below?

- 40 -
A)The component Production scheduler has a dependency on the component Staff planner.
B)The component Staff planner has a dependency on the component Production scheduler.
C)The software component Staff planner runs on the hardware component Production scheduler.

10. Which of the following can component diagrams be used for?

A)To show the dependency of compiled components on other compiled components.


B)To show the dependency of compiled components on the source code files used to produce them.
C)Both 1 and 2.

11. Based on the dependencies in the diagram below, which of the following statements is true?

A)
If
Sa
le
s
Or
de
r.c
pp
ch
an
- 41 -
ge
s
it
wi
ll
no
t
af
fe
ct
an
y
ot
he
r
co
m
po
ne
nt
s.
B) If SalesOrder.cpp changes it will affect the SalesOrder.h component.
C)If SalesOrder.cpp changes it will affect the SalesOrder.o and PrintOrder.exe components.

12. Which of the following statements best describes what is shown in a deployment diagram?

A)The configuration of run-time processing elements and the software components and processes
that are located on them.
B)The actors who will be involved in the deployment of software in the finished system and the
communication between them and the system hardware.
C)Software components and the dependencies between them.

13. Which of the following is the notation for a node in a deployment diagram?

A)1
B)2
C)3

14. Which of the following items are shown as well as the processor nodes in the deployment diagram
below?

- 42 -
A)Software components, a class and a stereotyped dependency.
B)Software components, an active object and a communication
association.
C)Hardware components, an active object and a message.

15. Which of the following best describes black box testing?

A)It tests the internal workings of the software and whether the software works as specified.
B)It tests whether the software produces the correct outputs for specific inputs.
C)It tests whether the software can be used ‘out of the box’ by end-users.

16. Which of the following best describes white box testing?

A)It tests the internal workings of the software and whether the software works as specified.
B)It tests whether the software produces the correct outputs for specific inputs.
C)It tests whether the software can be used ‘out of the box’ by end-users.

17. Which of the following is the likely order in which these five kinds of testing will be carried out?

A)Unit testing, integration testing, sub-system testing, system testing, user-acceptance testing.
B)Unit testing, user-acceptance testing, sub-system testing, integration testing, system testing.
C)User-acceptance testing, unit testing, sub-system testing, system testing, integration testing.

18. Which of the following statements best describes beta testing?

A)Testing individual classes and then the interaction between instances of those classes in programs.
B)Testing software applications in a simulated environment.
C)Testing software applications in a live environment.

19. Why are test plans with test data and expected results created?

- 43 -
A)So that programmers can make sure that testers only test their code with values that they know will
work.
B)So that testing is carried out thoroughly with a wide range of values, and the outcome according
to the specification can be checked.
C)To save time for testers, so that they don’t have to think about the results.

20. Which of the following best describes the activity of data conversion?

A)Making sure that all the data to be used in the system is converted into a modern format like XML as
soon as possible.
B)Testing that data from Windows systems can correctly be loaded into Unix applications.
C)Collating manually held data from different sources for entry into the new system, and
converting data from existing computerised systems into a format for import into the new
system.

21. When should user training take place?

A)Months before the implementation of the new system.


B)As soon as possible before the implementation of the new system.
C)A few weeks after the implementation of the new system.

22. Who should write user manuals?

A)Technical authors.
B)Programmers.
C)Users’ managers.

23. Which changeover strategy is most suitable for systems where there is a high level of risk and the
system is central to the operation of the business?

A)Direct changeover.
B)Phased changeover.
C)Parallel running.

24. Which of the following is an advantage of the direct changeover approach?

A)The new system will immediately bring business benefits and will start paying for itself.
B)The outputs of the old and new systems can be compared as a form of validation.
C)Thorough testing of each stage or sub-system can be carried out as it is introduced.

25. In the diagram below which part represents parallel running schematically?

- 44 -
A)1
B)2
C)3

26. Which of the following is not a good reason for a post-implementation evaluation?

A)The project can be assessed to establish how well it has met the functional and non-functional
requirements, and if any functional requirements were left out a decision can be made about
implementing them in a future project.
B)Problems with the software can be identified and the developers responsible for those parts of
the system can be identified and demoted or sacked.
C)The experience can be used to learn useful things, for example, the actual time spent on each part of
the project can be compared with the estimates and used to improve the estimation process in future
projects.

27. Which of the following is not likely to be a section in a post-implementation report?

A)Candidate components for reuse.


B)Positive experiences.
C)Test plan.

28. Why should maintenance of an application be controlled?

A)In order to assess the cost of changes and the impact of changes on the rest of the system.
B)To maintain a steady income for the software company that developed the application.
C)To avoid maintenance activities interfering with work on developing new systems.

- 45 -
Chapter – 19
1. Which of the following statements best describes what is meant by persistent data?

A)Data that only exists while a program is running.


B)Data in objects that keep trying to save themselves to disk storage.
C)Data that must be stored after a program stops running and be available to other users.

2. Which of the following kinds of objects are used in an object-oriented system?

A)Persistent objects only.


B)Transient objects only.
C)Both persistent and transient
objects.

3. Which of the following is an example of a persistent object?

A)A Client object in the Agate system.


B)A ClientBroker object in the Agate system.
C)A ClientProxy object in the Agate system.

4. Which of the following statements best describes how a database stores data?

A)Relational databases store data in tables, and each table is a file.


B)Databases provide a layer of abstraction between the way that data is presented to the user and
the way that it is stored in files.
C)Object databases store data in objects, and each object is a file.

5. Why might an object-oriented system use a relational DBMS?

A)Many organizations have existing relational databases containing existing business data.
B)Object databases are too complicated to use.
C)Relational databases are inherently better than object databases for business applications.

6. Which of the following types of record structure is used in an XML file?

A)Fixed length.
B)Tagged.
C)Header and detail.

7. Which of the following best describes a variable length record structure?

A)Each record is made up of a number of fields, each of which has a fixed length in bytes. If the data in

- 46 -
a field does not fill that many bytes, it is padded with a special character, usually null or space.
B)Each record is made up of a number of fields, each of which may have a maximum length but
has a minimum length of zero bytes. Either fields are separated by special delimiter characters
or the length of each field is held in the record structure.
C)Each record is tagged with a name in special characters. The end of the field is usually marked as
well. Fields can contain other fields in complex nested structures.

8. Which of the following best describes a throwaway prototype?

A)A throwaway prototype is discarded after it has been used to test out some aspect of the design.
B)A throwaway prototype takes one sub-system and develops it across all the layers.
C)A throwaway prototype is used to test the design of object deletion mechanisms.

9. Which of the following is a valid list of types of file organization?

A)Tagged, serial and variable length.


B)Hashed, index-sequential and serial.
C)Serial, sequential and random.

10. Which of the following best describes serial file organization?

A)Each record is written onto the end of the file. If a record is to be deleted, the file must be
copied from the start to the deleted record, which is skipped, and written back to disk.
B)Each record is written to file in a predetermined order, usually based on a key field. Records must be
added in the right place in the file.
C)Each record is located in the file by means of an algorithm that converts a key field into a position in
the file.

11. Which of the following is a valid list of file access methods?

A)Serial, index-sequential and direct.


B)Serial, sequential and random.
C)Tagged, serial and inverted.

12. Which of the following best describes index-sequential file access?

A)Records are stored in blocks. The key of the record is used to calculate which block to store the data
in, either using relative addressing or using a hashing algorithm.
B)Records are stored in blocks. The key of the record is used to determine which block to store a
record in. A block index is maintained, which lists the keys of the last record in each block.
C)Records are stored in blocks. records are written into blocks in the order in which they are created. If
there are too many records for the number of blocks, then the excess records are held in overflow
blocks.

13. What is a hashing algorithm?

A)1. A way of padding data in fixed length fields with the ASCII hash character ‘#’
- 47 -
B)A way of separating fields in records using the ASCII has character ‘#’ as a delimiter.
C)A way of converting record keys into numeric block addresses in a range of values.

14. Which of the following kinds of file would be used to store system settings?

A)Parameter file.
B)Temporary file.
C)Master file.

15. Which of the following is not a disadvantage of using files to store data?

A)As the number of applications grows, the number of files grows, and the same data may be held in
different files, creating data integrity problems.
B)Combining data from different applications to meet new business requirements is difficult, as data in
different files may be accessed in different ways.
C)Files can be used to hold prompts and labels in order to localize an application for use in
different countries.

16. Which of the following is not a list of features of a database management system?

A)DDL, DML, concurrency, tuning of storage.


B)Integrity constraints, transaction management, security.
C)DBA, DML, conceptual schema, security.

17. Which of the following is not an advantage of using a database management system?

A)The use of a conceptual schema can eliminate unnecessary duplication of data.


B)A database administrator must be employed to manage the system.
C)The performance of the database can be tuned to optimise access to the data.

18. Which of the following statements is not true?

A)Relational databases automatically convert objects into tables consisting of rows and columns.
B)Relational databases hold data in two-dimensional tables that consist of rows and columns.
C)Object databases hold objects as complex nested structures if necessary.

19. What is meant by normalization?

A)Converting complex data structures into tables that meet clearly defined
criteria.
B)Removing dependencies from data in tables.
C)Converting class diagrams into entity-relationship diagrams.

- 48 -
20. Which of the following is not a valid guideline for mapping classes to tables?

A)Classes with simple data structures become tables.


B)One-to-one associations are implemented using foreign key attributes.
C)Collection classes are implemented using foreign key attributes.

21. Which of the following approaches is the best way of implementing inheritance in situations where it
is known that the superclass is abstract?

A)Only implement the superclass as a table.


B)Only implement the subclasses as tables.
C)Implement all the classes (superclasses and subclasses) as tables.

22. Which of the following statements best describes the use of object databases?

A)Object databases store objects transparently. Compared to using a relational database,


designing for an object database will have a minimal impact on the design of the system.
B)Object databases store objects in relational database tables. The designer has to specify a set of rules
for how the objects are to be mapped to the tables.
C)Object databases provide the seamlessness claimed for object-oriented development by storing the
operations of objects in the database, while the data is mapped to relational tables.

23. What is CORBA?

A)A standard for passing messages between objects running on different machines.
B)A standard for object-oriented databases.
C)A misspelling of COBRA, the most popular beer among Indian software developers.

24. Which of the following statements best describes the use of the PersistentObject approach to
designing the data storage layer?

A)All objects in the system implement the PersistentObject interface. This interface acts as a broker
between objects and the database.
B)All the operations that are concerned with storing and retrieving objects from the database are
implemented as class-scope operations.
C)All classes in the system that represent persistent objects must inherit from an abstract
superclass called PersistentObject that provides operations to store, delete and update objects
in the database.

25. In the diagram below which operation is a class-scope operation?

- 49 -
A)numberOfCampaigns().
B)findByLocationCode().
C)Location().

26. Which of the following statements best describes the use of the broker framework?

A)For each persistent class there is a broker class that is responsible for materializing instances of
that class from the database and dematerialising them back into the database.
B)Every persistent class inherits from the abstract RelationalBroker class, which provides the
mechanisms for storing and retrieving object instances.
C)For every persistent object there is a broker object that is responsible for materializing the object from
the database and dematerialising it back into the database.

27. Why might six caches be used in a persistence framework?

A)Six caches are better than one.


B)To distinguish between the different states of objects (new/old and
clean/dirty/deleted).
C)The magic number seven plus or minus two.

28. In the diagram below, what is the purpose of the IntCampaignProxy class?

- 50 -
A)The IntCampaignProxy contains the IntCampaignBroker object.
B)The IntCampaignProxy decouples the IntCampaign from the cache.
C)The IntCampaignProxy acts as a placeholder for the actual IntCampaign. The IntCampaign is
only materialized from the database when required.

CHAPTER - 20

1 Which of the following is not an argument for reuse?

A)If some of the requirements of a project can be met by existing components then the time spent
developing those components can be saved.
B)If components that have been used and tested in another application can be reused then the time spent
testing and quality assuring the components can be saved.
C)Reusing components allows developers to maintain their high salaries by claiming to have
developed software that has in fact been developed by someone else.

2 Which of the following is cited as a reason for the failure of object-oriented systems to have achieved
the expected levels of reuse?

A)Organizations plan for reuse too late. The architecture of a system needs to be designed to
support reuse and the organization needs to be structured to support reuse.
B)Reuse does not actually work. There are no systems that are enough like others to benefit from the
reuse of components.
C)Reuse only works for languages like C and Fortran in which libraries of reusable functions and
procedures can be developed.

- 51 -
3 Which of the following is not a standard that helps to support reusable components?

A)SOAP (Simple Object Access Protocol).


B)CORBA (Common Object Request Broker Architecture).
C)ORCA (Object Reusable Component Architecture).

4 Which of the following kinds of organization is likely to benefit from developing a reuse-driven
software development process, according to Jacobson et al.?

A)Organizations producing hardware products with embedded software.


B)Small software companies producing one-off products.
C)Government departments developing software in-house.

5 Jacobson et al. suggest there are six stages that organizations go through in developing a culture of
reuse. Which of the following is their list of stages?

A)Business; user; data; solution; component; repository.


B)None; informal code reuse; black-box code reuse; managed workproduct reuse; architected
reuse; domain-specific reuse-driven organization.
C)Heroic individual reuse; informal code reuse; organized group code reuse; architecture-driven reuse;
component-driven reuse; repository-based reuse.
6 What do Allen and Frost regard as central to their model for the development of reusable code
components?

A)Java.
B)The Façade pattern.
C)A repository.

7 Which of the following is a good definition of a reusable component?

A)A type class or other workproduct that has been specifically engineered to be reusable.
B)Anything that appears in a component diagram.
C)A class or abstract superclass designed to be reused through inheritance.

8 Why are classes an inappropriate level at which to try to achieve reuse?

A)Attributes and associations of classes often couple them to other classes.


B)Objects not classes are suitable for reuse, as they are the things that are used in real systems.
C)Interfaces rather than classes should be reused, and then classes developed to implement them.

9 Which of the following is not a process in the Select Perpective?

A)The solution process.


B)The component process.
C)the repository process.

10 Which of the following analogies is used by Allen and Frost?

- 52 -
A)Hiding reusable components behind a façade..
B)Sowing and harvesting reusable components.
C)Cloning reusable components from existing systems.

11 What do Jacobson et al. recommend in their description of a Reuse-driven Software Engineering


Business?

A)Designing an architecture to support reuse from the start.


B)Setting up a department to check newly developed software for reusable components.
C)50% of all elements of a system should be reused.

12 BWhich of the following statements best describes commercially available componentware?

A)A pipedream.
B)Any software developed in Java.
C)Off the shelf components using standard protocols and clearly defined interfaces.

13 Which of the following best describes the Façade Pattern?

A)A design pattern to hide poorly implemented software behind a solid façade.
B)A design pattern to provide a simple unified interface to a complex sub-
system.
C)A design pattern to wrap legacy software in a Java interface using java.lang.Facade.

CHAPTER - 21

1 Which of the following statements best describes how critical path analysis finds the critical path?

A)It aims to identify those milestones where the earliest start time is equal to the latest start time.
B)It aims to identify those milestones where the earliest start time is less than the latest start time.

C)It aims to identify those milestones where the earliest start time is greater than the latest start time.

2 Which of the following statements describes how Gantt charts can be used in conjunction with a
staffing bar chart?

A)The Gantt chart can be used to show the total resource requirement at a given time.
B)The Gantt chart can be used to highlight resource conflicts.
C)The Gantt chart can be used as an aid to resource smoothing.

3 Which of the following statements best explains what is meant by slack time in Critical Path Analysis?

A)The slack time is the difference between an activity’s earliest start time and its latest start
time.
- 53 -
B)Time when no activity is occurring in the project is known as slack time.
C)Slack time is the time remaining when a project finishes earlier than scheduled.

4 Which of the following is not one of the underlying principles in DSDM?

A)DSDM teams are empowered to make decisions.


B)DSDM teams can lengthen a time-box if the project is behind
schedule.
C)All changes during development are reversible

5 Which of the following is not a legitimate maintainability objective in DSD


A)Maintainable from initial operation.
B)Only after the first year of operation.
C)Not subject to maintenance at all.

6 Extreme programming relies heavily on which of the following?

A)All program code must be developed as quickly as possible.


B)Group ownership of program code.
C)Program code can only be modified by its author to avoid errors.

7 Which of the following statements best describes refactoring?

A)Refactoring is a key step in object-oriented design.


B)Refactoring ensures that any changes in requirements are included in design.
C)Refactoring is essentially restructuring and simplifying code to improve
flexibility

Chapter – 22

1. How does Peter Checkland describe the difference between a method and a methodology?

A)There is no difference; the words mean the same thing.


B)Methodologies are more complex than methods, and are therefore more likely to be used in large
organizations or where there is a government-imposed rule.
C)A particular project follows a method, while a methodology is a more general set of principles
that can guide a range of projects.

2. Which three logical views of a system are proposed in this chapter?

- 54 -
A)Logical, physical and detailed.
B)Data, process and time.
C)Current, future and proposed.

3. What was the main aim of structured methodologies?

A)To specify clearly all functions, data storage and interfaces for a proposed system.
B)To document all activities undertaken within the project.
C)To ensure that the project follows a waterfall lifecycle.

4. Which one of the following is a phase in the USDP?

A)Construction.
B)Testing.
C)Design.

5. Which one of the following is a workflow in the USDP?

A)Inception.
B)Requirements.
C)Elaboration.

6. One of the following is not a similarity between participative design and object-oriented approaches.
Which one?

A)The active participation of users in the development activity.


B)An iterative and experimental approach to requirements definition and design.
C)The use of UML notation for models.
7. Which of the following statements best describes the difference between hard and soft
methodologies?

A)Hard methodologies are particularly useful for the development of complex systems, whereas soft
methodologies are more appropriate for the development of simple systems.
B)Hard methodologies are particularly useful when there is little uncertainty about the system
requirements, whereas soft methodologies are more appropriate where there is uncertainty
about the system requirements.
C)Hard methodologies are particularly useful for developing systems that will be used by scientists and
engineers, whereas soft methodologies are more appropriate for developing systems that will be used
by business people.

8. What is Flynn’s contingency framework used for?

A)To determine whether a project should proceed or should be cancelled.


B)To determine which type of methodology would be most appropriate for a project.
C)To determine how much overall float or slack should be incorporated into the project plan.

- 55 -
9. What is meant by ‘process uncertainty’?

A)Doubt regarding the reliability of a proposed software system.


B)Doubt about whether a project will be completed on time or within budget.
C)Doubt regarding the best way to build a proposed software system.

10. What is the main focus of the Elaboration phase in the USDP?

A)The team concentrates on developing a small subset of the system in order to assess the overall
viability of the project.
B)The team concentrates on producing a design for the whole system that demonstrates how it can
be built within an acceptable timescale and at an acceptable cost.
C)The team concentrates on building a system that is capable of satisfactory operation in its target
environment.

- 56 -

You might also like