Deck 2: Faults, and Bugs in Software and Hardware Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 2: Faults, and Bugs in Software and Hardware Systems
1
Which of the following approaches are used to achieve reliable systems?
A)fault prevention
B)fault removal
C)fault tolerance
D)all of the mentioned
A)fault prevention
B)fault removal
C)fault tolerance
D)all of the mentioned
all of the mentioned
2
All fault-tolerant techniques rely on
A)integrity
B)dependability
C)redundancy
D)none of the mentioned
A)integrity
B)dependability
C)redundancy
D)none of the mentioned
none of the mentioned
3
Exception handling is a type of
A)forward error recovery mechanism
B)backward error recovery mechanism
C)all of the mentioned
D)none of the mentioned
A)forward error recovery mechanism
B)backward error recovery mechanism
C)all of the mentioned
D)none of the mentioned
forward error recovery mechanism
4
Which of the following Error Detection checks is not a part of Application detection?
A)hardware checks
B)timing checks
C)reversal checks
D)coding checks
A)hardware checks
B)timing checks
C)reversal checks
D)coding checks
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a phase of "bathtub curve" of hardware reliability?
A)useful life
B)burn-in
C)wear-out
D)time
A)useful life
B)burn-in
C)wear-out
D)time
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
How is software reliability defined?
A)time
B)efficiency
C)quality
D)speed
A)time
B)efficiency
C)quality
D)speed
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
How is reliability and failure intensity related to each other?
A)direct relation
B)inverse relation
C)no relation
D)none of the mentioned
A)direct relation
B)inverse relation
C)no relation
D)none of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
What is risk?
A)negative consequence that could occur
B)negative consequence that will occur
C)negative consequence that must occur
D)negative consequence that shall occur
A)negative consequence that could occur
B)negative consequence that will occur
C)negative consequence that must occur
D)negative consequence that shall occur
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
When can customer says that the quality of the product is too good?
A)software meets its defined specification
B)software is technically excellent
C)software has few bugs
D)software fulfills expectations of customer
A)software meets its defined specification
B)software is technically excellent
C)software has few bugs
D)software fulfills expectations of customer
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
It defines how a system prevents or responds to bugs, errors, faults, or failures.
A)reliability
B)fault tolerance
C)quality
D)none of the above
A)reliability
B)fault tolerance
C)quality
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The problem that threatens the success of a project but which has not yet happened is called as __________
A)bug
B)error
C)risk
D)defect
A)bug
B)error
C)risk
D)defect
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Bug is the same name of _______.
A)error
B)incident
C)mistake
D)defect
A)error
B)incident
C)mistake
D)defect
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the followings is NOT a White Box Technique?
A)statement testing
B)path testing
C)data flow testing
D)none of the above
A)statement testing
B)path testing
C)data flow testing
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Bugs can enter software in any of _____ stages.
A)1
B)2
C)3
D)4
A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
The number of occurrences of bugs is ____________ proportional to the experience of the software developer.
A)inversely
B)directly
C)no relation exists
D)none of the above
A)inversely
B)directly
C)no relation exists
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Techniques of software debugging are
A)print statements
B)breakpoints
C)conditional compilation
D)all of the above
A)print statements
B)breakpoints
C)conditional compilation
D)all of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Hardware tools for debugging include:
A)ice
B)cro
C)logic analyzer
D)none of the above
A)ice
B)cro
C)logic analyzer
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
File storage is_______, but reconstructing lost data is expensive or impossible.
A)cheap
B)expensive
C)free
D)none of the above
A)cheap
B)expensive
C)free
D)none of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Design issues for a user interface include:
A)response time
B)error handling
C)help facilities
D)all of the above
A)response time
B)error handling
C)help facilities
D)all of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which one of the following is a real time operating system?
A)rtlinux
B)vxworks
C)windows ce
D)all of the mentioned
A)rtlinux
B)vxworks
C)windows ce
D)all of the mentioned
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck