.
Title | |
---|---|
Which of the following represents DeSCRIPTOR specificationWhich of the following represents DeSCRIPTOR specification?
The answer is:
A. Program component decomposition and component relationships are shown in static models, such as class diagrams
|
|
Which of the following represents PAID specificationWhich of the following represents PAID specification?
The answer is:
B. Operation specifications, which elaborate operation responsibilities and state operation interfaces
|
|
What is a program entityWhat is a program entity?
The answer is:
D. All of the mentioned
|
|
What is a name and which of the following is trueWhat is a name and which of the following is true?
The answer is:
A. A name is an identifier bound to a program entity
|
|
What is visibilityWhat is visibility?
The answer is:
B. The portion of a text over which a program entity is visible
|
|
What are the types of visibilityWhat are the types of visibility?
The answer is:
D. All of the mentioned
|
|
What are the Object oriented visibilityWhat are the Object oriented visibility?
The answer is:
D. All of the mentioned
|
|
Which of the following are of non-local formWhich of the following are of non-local form ?
The answer is:
D. Public, Protected and Packaged
|
|
When is a program accessibleWhen is a program accessible?
The answer is:
C. All of the mentioned
|
|
What is referenceWhat is reference?
The answer is:
A. It is an expression that evaluates to an address where a value is stored
|
|
When is a variable called extending access beyond visibilityWhen is a variable called extending access beyond visibility?
The answer is:
D. All of the mentioned
|
|
What does Information Hiding meanWhat does Information Hiding mean?
The answer is:
A. The key technique for is to restrict access to program entities as much as possible
|
|
Which of the following are the strategies for restricting access to program entitiesWhich of the following are the strategies for restricting access to program entities?
The answer is:
D. None of the mentioned
|
|
What are the heuristics for information hidingWhat are the heuristics for information hiding?
The answer is:
D. All of the mentioned
|
|
What are the heuristics for information hiding under don’t extend accessWhat are the heuristics for information hiding under don’t extend access?
The answer is:
D. All of the mentioned
|
|
What is operation specification and what does it includeWhat is operation specification and what does it include?
The answer is:
D. All of the mentioned
|
|
What is SignatureWhat is Signature?
The answer is:
B. The operation name, the names and types of its parameters,and its return type
|
|
What is procedural specificationWhat is procedural specification?
The answer is:
B. An algorithmic behavior description
|
|
Declarative specifications are preferable for which of the following reasonsDeclarative specifications are preferable for which of the following reasons?
The answer is:
D. All of the mentioned
|
|
What is true with respect to operation contractWhat is true with respect to operation contract?
The answer is:
C. All of the mentioned
|
MCQs
Views
Best Answers
Points