Software Architectures Questions and Answers

 

Software Architectures Questions and Answers




Software Architectures Questions and Answers contain set of 64 Software Architectures MCQs with answers which will help you to clear beginner level quiz.



Question 1
“Partitioning of data would benefit performance” belongs to
Select one:
a. All of the given choices
b. Resource Mgmt of performance
c. Co-ordination model of performance
d. Data Model of performance
Correct answer : Data Model of performance
Question 2
Which of the following is not related to Resource Management of Performance
Select one:
a. Maintaining multiple copies of key data would benefit performance
b. System elements that need to be aware of, and manage, time and other performance-critical resources
c. Process/thread models
d. Prioritization of resources
Correct answer : Prioritization of resources
Question 3
Information hiding methods is one of the
Select one:
a. Availability tactic
b. Reliability tactic
c. Usability tactic
d. Modifiabilty tactic
Correct answer : Modifiabilty tactic
Question 4
Utility tree is to represeting
Select one:
a. Architecturally significant requirement (ASR)
b. Functional requirement
c. Stakeholders requirement
d. Business requirement
Correct answer : Architecturally significant requirement (ASR)
Question 5
Which requirements can affect binding time decisions out of the following mentioned?
Select one:
a. Configurations
b. Portability
c. Regional distinctions
d. All of the choices given
Correct answer : All of the choices given
Question 6
One of the statements given below is not true with respect to stakeholders’ priorities. Which one?
Select one:
Database Designer: Information security issues?
Users/Customers: How easy it is to use?
Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Application Development team: How do I plan for division of work?
Correct answer : Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Question 7
Decomposition,Uses,Layered and class are keywords used in
Select one:
a. Module structure
b. Allocation structure
c. Structure of structure
d. Component and connector structure
Correct answer : Module structure
Question 8
Identification of potential quality attributes from business goals is the measure step of
Select one:
a. ASR
b. QAW
c. PALM
d. Utility Tree
Correct answer : PALM
Question 9
Methods to improve Usability include (Pick the wrong answer)
Select one:
a. Intuitive UI
b. Undo / redo feature
c. Displaying status
d. Asking user to enter name twice
Correct answer : Asking user to enter name twice
Question 10
One of the statements given below is not true with respect to stakeholders’ priorities. Which one?
Select one:
a. Database Designer: Information security issues?
b. Application Development team: How do I plan for division of work?
c. Users/Customers: How easy it is to use?
d. Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Correct answer : Release & Configuration Manager: How do I replace of a subsystem with minimal impact ?
Question 11
Which of the following represents a Hierarchical organization?
Select one:
Client-Server
Deployment
Layered Structure
Decomposition
Correct answer : Layered Structure
Question 12
Ability to “continuously provide”  service without failure means
Select one:
Performance
Usability
Reliability
Availability
Correct answer : Reliability
Question 13
Which of the following does not appear on a diagram describing the WIndows Architecture?
Select one:
User Mode
SQLite
Kernel Mode
DLLs
Correct answer : SQLite
Question 14
Deployment, implementation and work assignmnet are the keywords used in
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure
Correct answer : Allocation structure
Question 15
How is the system to relate to non-software structures in its environment such as CPU
Select one:
a. Component and connector structure
b. Structure of structure
c. Module structure
d. Allocation structure
Correct answer : Allocation structure
Question 16
Learnability feature of usability attribute provides
Select one:
a. User familiarity to the system
b. Confidence to the user
c. Minimizing the impact of error
d. Adopt user need
Correct answer : User familiarity to the system
Question 17
Why is software architecture called vehicle for stakeholder communication?
Select one:
a. Architecture provides a common language in which different concerns can be expressed
b. Architecture is more of technical in nature and not meant for all stakeholders
c. Both a and b
d. Each stakeholder of a software system is concerned with different characteristics of the system affected by architecture
Correct answer : Both a and b
Question 18
Which software structure of module structure is useful for “implementing systems on top of ‘virtual machine’ portability?
Select one:
a. Class
b. Layered
c. Uses
d. Decomposition
Correct answer : Layered
Question 19
Record and Playback is a
Select one:
Strategy for one of the testabilty tactics
New feature in modern music web apps
Performance enhancing tactics
Methodology to ensure the security feature of the system
Question 20
QAW(Quality Attribute Workshop)  is focused on:
Select one:
Reference model level concerns
System level concerns
None of the above
Component level concerns
Correct answer : System level concerns
Question 21
—————- pattern facilitates accessing shared resources and services for large numbers of distributed distributed clients.
Select one:
A. Web server
B. Client server
C. Data server
D. Proxy server
Correct answer : Client server
Question 22
How do developing organizations influence by architects?
Select one:
A. Long term business
B. All of the mentioned
C. Organization structure
D. Immediate business
Correct answer : All of the mentioned
Question 23
—————– pattern suggests a solution in which components interact with via announced messages or events.
Select one:
A. Newspaper
B. Bookkeeper
C. Librarian
D. Publish Subscribe
Correct answer : Publish Subscribe
Question 24
————- pattern set a system of “equal” distributed computational entities connected to each other via a common protocol to self organize and achieve high availability and implacability.
Select one:
A. Agents
B. ATM
C. Bots
D. P2P
Correct answer : P2P
Question 25
What are the concerns raised for the scenario selection procedure?
Select one:
A. How would we know if the vendor representatives were being factual?
B. Both these
C. None
D. Does the locality of change necessarily yield higher cost?
Correct answer : How would we know if the vendor representatives were being factual?
Question 26
The module B expects A to write the count of total transactions handled at a particular memory location. The dependency of B on A is of
Select one:
A. Data semantics dependency
B. Location dependency
C. Data type dependency
D. Sequence dependency
Correct answer : Data semantics dependency
Question 27
Which of the following can be included under observable measure?
Select one:
A. How easy it is to integrate?
B. How well the systems during execution satisfy its behavioral requirements?
C. How easy it is to test and modify?
D. All of the mentioned
Correct answer : How well the systems during execution satisfy its behavioral requirements?
Question 28
The important categorie(s) of architecture structure is / are
Select one:
A. All of these mentioned
B. Allocation
C. Component and Connector
D. Module
Correct answer : All of these mentioned
Question 29
In —————– pattern interaction, persistent data is exchanged between multiple data accessors and at least one shared data store.
Select one:
A. Shared Data
B. NDF
C. DBMS
D. Shared Object
Correct answer :  Shared Data
Question 30
What is the main goal for the choice of scenarios?
Select one:
A. They should reflect the important quality requirements
B. There be a sufficient number to reflect the views of all the stakeholders
C. Both mentioned
D. None mentioned
Correct answer : Both mentioned
Question 31
Which of the following is not a performance tactic?
Select one:
A. Resource Demand
B. Resource Management
C. Resource Monitor
D. Resource Arbitration
Correct answer : Resource Monitor
Question 32
There are several modules that calls a service provided by A. What is the implicit dependency on A?
Select one:
A. Quality of service provided by A
B. Semantics of the result generated by A
C. the fact that A shares the same memory location of these calling modules
D. The assumption that A exists when calling the service of A
Correct answer : The assumption that A exists when calling the service of A
Question 33
An on-line tax-filing application uploads the form-16 document from the employer and it fills the tax return form of an employee once she logs into the system. The file-tax-return button submits the return form and also deducts additional tax amount from her registered credit card. From quality attribute perspective, this application improves
Select one:
A. interoperability
B. performance
C. usability
D. availability
Correct answer : usability
Question 34
Architecture based process includes which of the following
Select one:
A. Creating the business case for the system
B. Analyzing or valuating the architecture
C. Understanding the requirements
D. All of these mentioned
Correct answer : All of these mentioned
Question 35
Adding an intermediate component between two interacting modules in an application will improve:
Select one:
A. Security of the System
B. Reliability of the System
C. Availability of the System
D. Modifiability of the System
Correct answer : Modifiability of the System
Question 36
What is architectural style?
Select one:
A. Architectural style is a description of component types
B. It is a pattern of run-time control
C. All of these mentioned
D. It is set of constraints on architecture
Correct answer : All of these mentioned
Question 37
What would happen if different organization were given same set of requirements?
Select one:
A. It will produce same architecture
B. It may or may not produce same architecture
C. None of the mentioned
D. It will produce different architecture
Correct answer : None of the mentioned
Question 38
————- pattern splits system into a number of computationally independent execution structures to achieve optimized usage of resources.
Select one:
A. Layers
B. Multi tier
C. Agent
D. Broker
Correct answer : Multi tier
Question 39
In a GUI application, when a user presses a button an action event is generated. What is action event in a general quality scenario?
Select one:
A. Artifact
B. Stimulus
C. Response
D. Source
Correct answer : Stimulus
Question 40
—————— pattern is a tactic to achieve highly efficient processing of enormous volumes of data at petabyte scale.
Select one:
A. Map Reduce
B. Supercomputer
C. Shift Reduce
D. Goggle
Correct answer : Map Reduce
Question 41
———————— is a tactic to achieve Security.
Select one:
A. Maintain Audit Trail
B. License Key
C. Discover
D. copyright
Correct answer : Maintain Audit Trail
Question 42
There is a monitor that records the status of the system during runtime. This is an example of
Select one:
A. Modifiability of the System
B. Availability of the System
C. Security of the System
D. Reliability of the System
Correct answer : Security of the System
Question 43
————— pattern helps to achieve separation of concerns such that modules of system may be independently developed and maintained.
Select one:
A. SOA
B. Microkernel
C. Layered
D. MVC
Correct answer : Layered
Question 44
Source of stimulus can be
Select one:
A. Any actuator
B. Stimulus
C. None of these mentioned
D. Environment
Correct answer : Any actuator
Question 45
—————– pattern is characterized by successive transformation of streams of data using generic, loosely coupled components.
Select one:
A. Blackboard
B. Pipes and filters
C. Classroom
D. Abstraction
Correct answer : Pipes and filters
Question 46
Which of the following is the main goal for the choice of scenarios?
Select one:
A. They should reflect the important quality requirements
B. Both
C. None of these
D. There be a sufficient number to reflect the views of all the stakeholders
Correct answer : There be a sufficient number to reflect the views of all the stakeholders
Question 47
The incorrect method for structural design is?
Select one:
A. More procedural approach
B. Handling of larger and more complex products
C. Transition of problem models to solution models
D. Designing Object oriented systems
Correct answer : Handling of larger and more complex products
Question 48
The proto scenarios recorded on flip charts as phrases as which of the following?
Select one:
A. WWW client access
B. Double number of user
C. All of these mentioned
D. Degraded Operation
Correct answer : All of these mentioned
Question 49
Denial of Service attack affects the __________ of the system.
Select one:
A. All of these
B. Usability
C. Availability
D. Security
Correct answer : Availability
Question 50
Tactics which ensures interoperability includes
Select one:
A. Orchestrate and Tailor interface
B. Both of these
C. None of these
D. Discover service and Tailor interface
Correct answer : Both of these
Question 51
To capture data store and access to data from the store by various components you use
Select one:
A. Module dependency structure
B. component and hardware dependency
C. component connector structure
D. work-allocation of modules
Correct answer : component connector structure
Question 52
————— pattern defines a runtime component that mediates the communication between a number of clients and servers.
Select one:
A. Proxy
B. Middleware
C. Broker
D. Load balancer
Correct answer : Broker
Question 53
—————- pattern separates out presentation from functionality of the system.
Select one:
A. Maps
B. UI/UX
C. MVC
D. Controller
Correct answer : MVC
Question 54
Authorizing the user is a __________
Select one:
A. Usability tactic
B. Security tactic
C. Availability tactic
D. Performance tactic
Correct answer : Security tactic
Question 55
Which of the following is the incorrect sequence Summary Steps for scenario selection process?
Select one:
A. Method presentation
B. Refinement and selection
C. Participant buy-in and expression of concerns and issues
D. All of these mentioned
Correct answer : Participant buy-in and expression of concerns and issues
Question 56
Which among the following are true with regards to the architecture business cycle?
Select one:
A. All of these mentioned
B. None of these mentioned
C. The architecture affects the structure of developing organizations
D. The architecture can affect the enterprise goals of the developing organizations
Correct answer : The architecture affects the structure of developing organizations
Question 57
Here are two applications with the following operational failure characteristics on a given day. Application 1 crashed 10 times and it took 5min to restart every time after the crash. Application 2 crashed 20 times and it took 2min to restart.
Which one has a better availability?
Select one:
A. 1 has the better availability
B. 1 and 2 has more or less the same availability
C. 2 has the better availability
D. their availability values can’t be compared
Correct answer : 2 has the better availability
Question 58
What are the steps involved in Financial management system?
Select one:
A. choosing Scenarios And Achieving Deep understanding
B. Scenario Selection Process
C. Observation on the scenario selection process
D. all of these
Correct answer : all of these
Question 59
Which of the following are scenarios for the financial management system analysis?
Select one:
A. Multiple fiscal year budgets
B. All of these mentioned
C. Degraded operation mode
D. Bottom Up person
Correct answer : All of these mentioned
Question 60
A representation of a coherent set of architectural elements, as written by and read by system stakeholders is
Select one:
A. Allocation structure
B. Component and Connector structure
C. Views
D. Module structure
Correct answer : Views
Question 61
The architect designs the allocation of services to hosts so that only limited services are available on each host. It will help to improve
Select one:
A. Security of the System
B. Availability of the System
C. Reliability of the System
D. Modifiability of the System
Correct answer : Security of the System
Question 62
Resynchoronizing the state of a repaired component with the current state of operation and then re-introducing this component is the tactic for improving which of the following attribute.
Select one:
A. Performance
B. Security
C. Testability
D. Availability
Correct answer : Availability
Question 63
Reduction of coupling between modules is a tactic for
Select one:
A. usability tactic
B. Availability tactic
C. Modifiability tactic
D. Security tactic
Correct answer : Modifiability tactic
Question 64
While describing a deployment containing hardware infrastructure, you should
Select one:
A. show relationship between a process component and a hardware infrastructure
B. show relationship between a hardware component and a software module/sub-modules
C. show a relationship between a module and a data item that the module uses
D. show a relationship between a package and a hardware infrastructure
Correct answer : show relationship between a process component and a hardware infrastructure
Question 65
In —————– pattern interaction, persistent data is exchanged between multiple data accessors and at least one shared data store.
Select one:
A. Shared Object
B. Shared Data
C. DBMS
D. NDF
Correct answer : Shared Data
Question 66
————— pattern defines a runtime component that mediates the communication between a number of clients and servers.
Select one:
A. Load balancer
B. Proxy
C. Broker
D. Middleware
Correct answer : Broker
Question 67
————– pattern describes a collection of distributed components that provide and/or consume the services.
Select one:
A. Client server
B. Broker
C. P2P
D. SOA
Correct answer : SOA
Question 68
The architects are influenced by which of the following factors?
Select one:
A. Developing organization
B. All of these mentioned
C. Customers and end users
D. Background and experience of the architects
Correct answer : All of these mentioned
Question 69
Availability ensures
Select one:
A. All of these mentioned
B. Minimize service outage time by fault reduction
C. Availability ensures
D. Attainment of reliability
Correct answer : All of these mentioned
Question 70
Architectural pattern that best fits online flight booking application is
Select one:
A. Service Oriented Architecture
B. Layer Architecture
C. Distributed Architecture
D. Model View Controller Architecture
Correct answer : Model View Controller Architecture
Question 71
—————— pattern is a tactic to achieve highly efficient processing of enormous volumes of data at petabyte scale.
Select one:
A. Supercomputer
B. Shift Reduce
C. Map Reduce
D. Goggle
Correct answer : Map Reduce
Question 72
—————– pattern is characterized by successive transformation of streams of data using generic, loosely coupled components.
Select one:
A. Abstraction
B. Blackboard
C. Pipes and filters
D. Classroom
Correct answer : Pipes and filters
Question 73
—————- pattern facilitates accessing shared resources and services for large numbers of distributed distributed clients.
Select one:
A. Data server
B. Client server
C. Web server
D. Proxy server
Correct answer : Client server
Question 74
Here are two applications with the following operational failure characteristics on a given day. Application 1 crashed 10 times and it took 5min to restart every time after the crash. Application 2 crashed 20 times and it took 2min to restart.
Which one has a better availability?
Select one:
A. 1 and 2 has more or less the same availability
B. their availability values can’t be compared
C. 2 has the better availability
D. 1 has the better availability
Correct answer : 2 has the better availability
Question 75
—————– pattern suggests a solution in which components interact with via announced messages or events.
Select one:
A. Bookkeeper
B. Newspaper
C. Publish Subscribe
D. Librarian
Correct answer : Publish Subscribe
Question 76
————— pattern helps to achieve separation of concerns such that modules of system may be independently developed and maintained.
Select one:
A. SOA
B. Microkernel
C. Layered
D. MVC
Correct answer :Layered
Question 77
————- pattern splits system into a number of computationally independent execution structures to achieve optimized usage of resources.
Select one:
A. Broker
B. Layers
C. Multi tier
D. Agent
Correct answer :Multi tier
Question 78
———————— is a tactic to achieve Security.
Select one:
A.
Discover
B. copyright
C. License Key
D. Maintain Audit Trail
Correct answer :Maintain Audit Trail
Question 79
—————- pattern separates out presentation from functionality of the system.
Select one:
A. Controller
B. Maps
C. MVC
D. UI/UX
Correct answer :MVC
Question 80
Example(s) of Interchangeable software components
Select one:
A. open source software
B. All of these
C. publicly available apps
D. Commercial off-the-shelf components
Correct answer :All of these
Question 81
————- pattern set a system of “equal” distributed computational entities connected to each other via a common protocol to self organize and achieve high availability and implacability.
Select one:
A. P2P
B. ATM
C. Bots
D. Agents
Correct answer :P2P
Question 82
Architecture of software is based on?
Select one:
A. Design
B. neither Design nor requirements
C. Design and requirements
D. Requirements
Correct answer : Requirements