1. Which of the following is/are the situations where forward error recovery can be applied.
i) When coded is corrupted.
ii) When linked structure are corrupted
A) i only
B) ii only
C) Both i and ii
D) None of the above
2. State whether the following statements about fault recovery are True or False.
i) Forward recovery involves trying to correct the damaged system state.
ii) Backward recovery restores the system state to a known correct state.
A) True, False
B) False, True
C) False, False
D) True, True
3. In ……………………., the database is only updated after the transaction is finished and no problems are detected.
A) Forward recovery
B) Backward recovery
C) System recovery
D) Both A and C
4. The key problem with …………… is ensuring that the software is portable, it should execute on several different platforms.
A) Application System Reuse
B) Sub-System Reuse
C) Object Reuse
D) Systematic Reuse
5. An example of ……………….. is a pattern matching system developed as part of a text processing system may be reused in a database management system.
A) Application System Reuse
B) Sub-System Reuse
C) Object Reuse
D) Systematic Reuse
6. In ………………….., components of a system representing a collection of functions may be reused.
A) Application System Reuse
B) Sub-System Reuse
C) Object Reuse
D) Systematic Reuse
7. Systematic reuse in the development process offers which of the following advantages.
i) System reliability increased
ii) Overall process risk is reduced
iii) Effective use can be made of specialists
A) i and ii only
B) ii and iii only
C) i and iii only
D) All i, ii and iii
8. State whether the following conditions for software development with reuse are True.
i) It must be possible to find appropriate reusable components.
ii) The reuser of the components must have confidence that the components will behave as specified and will be reliable.
iii) The components must have associated documentation to help the reuser understand them and adapt them to a new application.
iv) CASE toolsets support development with reuse.
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
9. Adapting a component to make it reusable may involve making different changes, which may be
i) Name generalization
ii) Component generalization
iii) Operation generalization
iv) Exception generalization
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
10. The names used in the component may be modified in …………………, so that they are neutral rather than a direct reflection of some specific application entity.
A) Name generalization
B) Component generalization
C) Operation generalization
D) Exception generalization
11. ……………….. may involve adding operations to a component or removing operations, which are very specific to some application domain.
A) Name generalization
B) Component generalization
C) Operation generalization
D) Exception generalization
12. ………………. may involve checking each component to see which exceptions it might generate and including these exceptions in the component interface.
A) Name generalization
B) Component generalization
C) Operation generalization
D) Exception generalization
13. In ………………. reusable knowledge is captured in a program generator system, which can be programmed in a domain oriented language.
A) Application System Reuse
B) Generator Based Reuse
C) Domain Oriented Reuse
D) Systematic Reuse
14. …………….. is cost effective but depends on identifying stereotypical domain abstractions.
A) Application System Reuse
B) Generator Based Reuse
C) Domain Oriented Reuse
D) Systematic Reuse
15. A special case of software reuse is ……………. where a whole application system is reused by implementing it across a range of different computers and operating systems.
A) Application System Reuse
B) Generator Based Reuse
C) Domain Oriented Reuse
D) Systematic Reuse
16. …………… can improve reliability, reduce management risk and reduce development costs.
A) Application System Reuse
B) Generator Based Reuse
C) Domain Oriented Reuse
D) Systematic Reuse
17. …………….. involves analyzing the system state to gauge the extent of the state corruption.
A) Exception Handling
B) Defensive Programming
C) Failure Prevention
D) Damage Assessment
18. …………….. is the process of modifying the state space of the system so that the effects of the fault are minimized.
A) Fault avoidance
B) Fault detection
C) Fault repair
D) Fault recovery
Answers
1. C) Both i and ii
2. D) True, True
3. B) Backward recovery
4. A) Application System Reuse
5. B) Sub-System Reuse
6. C) Object Reuse
7. D) All i, ii and iii
8. A) i, ii and iii only
9. C) i, iii and iv only
10. A) Name generalization
11. C) Operation generalization
12. D) Exception generalization
13. B) Generator Based Reuse
14. B) Generator Based Reuse
15. A) Application System Reuse
16. D) Systematic Reuse
17. D) Damage Assessment
18. D) Fault recovery
Read Next: MCQ Questions On Software Design Principles Part-1