Deck 2: Faults, and Bugs in Software and Hardware Systems

Full screen (f)
exit full mode
Question
Which of the following approaches are used to achieve reliable systems?

A)fault prevention
B)fault removal
C)fault tolerance
D)all of the mentioned
Use Space or
up arrow
down arrow
to flip the card.
Question
All fault-tolerant techniques rely on

A)integrity
B)dependability
C)redundancy
D)none of the mentioned
Question
Exception handling is a type of

A)forward error recovery mechanism
B)backward error recovery mechanism
C)all of the mentioned
D)none of the mentioned
Question
Which of the following Error Detection checks is not a part of Application detection?

A)hardware checks
B)timing checks
C)reversal checks
D)coding checks
Question
Which of the following is not a phase of "bathtub curve" of hardware reliability?

A)useful life
B)burn-in
C)wear-out
D)time
Question
How is software reliability defined?

A)time
B)efficiency
C)quality
D)speed
Question
How is reliability and failure intensity related to each other?

A)direct relation
B)inverse relation
C)no relation
D)none of the mentioned
Question
What is risk?

A)negative consequence that could occur
B)negative consequence that will occur
C)negative consequence that must occur
D)negative consequence that shall occur
Question
When can customer says that the quality of the product is too good?

A)software meets its defined specification
B)software is technically excellent
C)software has few bugs
D)software fulfills expectations of customer
Question
It defines how a system prevents or responds to bugs, errors, faults, or failures.

A)reliability
B)fault tolerance
C)quality
D)none of the above
Question
The problem that threatens the success of a project but which has not yet happened is called as __________

A)bug
B)error
C)risk
D)defect
Question
Bug is the same name of _______.

A)error
B)incident
C)mistake
D)defect
Question
Which of the followings is NOT a White Box Technique?

A)statement testing
B)path testing
C)data flow testing
D)none of the above
Question
Bugs can enter software in any of _____ stages.

A)1
B)2
C)3
D)4
Question
The number of occurrences of bugs is ____________ proportional to the experience of the software developer.

A)inversely
B)directly
C)no relation exists
D)none of the above
Question
Techniques of software debugging are

A)print statements
B)breakpoints
C)conditional compilation
D)all of the above
Question
Hardware tools for debugging include:

A)ice
B)cro
C)logic analyzer
D)none of the above
Question
File storage is_______, but reconstructing lost data is expensive or impossible.

A)cheap
B)expensive
C)free
D)none of the above
Question
Design issues for a user interface include:

A)response time
B)error handling
C)help facilities
D)all of the above
Question
Which one of the following is a real time operating system?

A)rtlinux
B)vxworks
C)windows ce
D)all of the mentioned
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Faults, and Bugs in Software and Hardware Systems
1
Which of the following approaches are used to achieve reliable systems?

A)fault prevention
B)fault removal
C)fault tolerance
D)all of the mentioned
all of the mentioned
2
All fault-tolerant techniques rely on

A)integrity
B)dependability
C)redundancy
D)none of the mentioned
none of the mentioned
3
Exception handling is a type of

A)forward error recovery mechanism
B)backward error recovery mechanism
C)all of the mentioned
D)none of the mentioned
forward error recovery mechanism
4
Which of the following Error Detection checks is not a part of Application detection?

A)hardware checks
B)timing checks
C)reversal checks
D)coding checks
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a phase of "bathtub curve" of hardware reliability?

A)useful life
B)burn-in
C)wear-out
D)time
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
How is software reliability defined?

A)time
B)efficiency
C)quality
D)speed
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
How is reliability and failure intensity related to each other?

A)direct relation
B)inverse relation
C)no relation
D)none of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
What is risk?

A)negative consequence that could occur
B)negative consequence that will occur
C)negative consequence that must occur
D)negative consequence that shall occur
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
When can customer says that the quality of the product is too good?

A)software meets its defined specification
B)software is technically excellent
C)software has few bugs
D)software fulfills expectations of customer
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
It defines how a system prevents or responds to bugs, errors, faults, or failures.

A)reliability
B)fault tolerance
C)quality
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The problem that threatens the success of a project but which has not yet happened is called as __________

A)bug
B)error
C)risk
D)defect
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Bug is the same name of _______.

A)error
B)incident
C)mistake
D)defect
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the followings is NOT a White Box Technique?

A)statement testing
B)path testing
C)data flow testing
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Bugs can enter software in any of _____ stages.

A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
The number of occurrences of bugs is ____________ proportional to the experience of the software developer.

A)inversely
B)directly
C)no relation exists
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Techniques of software debugging are

A)print statements
B)breakpoints
C)conditional compilation
D)all of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Hardware tools for debugging include:

A)ice
B)cro
C)logic analyzer
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
File storage is_______, but reconstructing lost data is expensive or impossible.

A)cheap
B)expensive
C)free
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Design issues for a user interface include:

A)response time
B)error handling
C)help facilities
D)all of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which one of the following is a real time operating system?

A)rtlinux
B)vxworks
C)windows ce
D)all of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.