Search
.Management Sciences
Category: Software Engineering types
What have become de rigueur for computer-based products and systems of every type ?
A. GUIs
B. Candidate keys
C. Object model
D. All of the mentioned
(more…)
When does one decides to re-engineer a product ?
A. when tools to support restructuring are disabled
B. when system crashes frequently
C. when hardware or software support becomes obsolete
D. subsystems of a larger system require few maintenance
(more…)
What category of web-based system would you assign to discussion groups ?
A. Collaborative work
B. Online communities
C. Web portals
D. Workflow-oriented
Source code translation is a part of which re-engineering technique ?
A. Data re-engineering
B. Refactoring
C. Restructuring
D. None of the mentioned
(more…)
Which analysis is a part of Analysis model of the web engineering process framework ?
A. Content Analysis
B. Interaction Analysis
C. Functional Analysis
D. All of the mentioned
(more…)
What category of web-based system would you assign to electronic shopping ?
A. Informational
B. Interactive
C. Transaction-oriented
D. Workflow-oriented
(more…)
Which web app attribute is defined by the statement:”A large number of users may access the WebApp at one time”?
A. Unpredictable load
B. Performance
C. Concurrency
D. Network intensiveness
If the user queries a collection of large databases and extracts information from the webapp, the webapp is categorized under____________________?
A. Service oriented app
B. Database access app
C. Portal app
D. Data warehousing app
(more…)
Which of the following term is best define by the statement:”Each object is stored only once, but is accessible by all CASE tools that need it.”?
A. Non-redundant data storage
B. Data independence
C. Transaction control
D. Ad Hoc data queries and reports
Which of the following statements are incorrect with reference to web-based systems? Web-based systems__________________?
A. should be unscalable
B. must be able to cope with uncertain, random heavy demands on services
C. must be secure
D. are subject to assorted legal, social, and ethical scrutiny
(more…)
Recent Comments