MCQOPTIONS
Saved Bookmarks
This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 651. |
)CMM model is a technique to( |
| A. | Improve the software process |
| B. | Automatically develop the software |
| C. | Test the software |
| D. | All of the above |
| Answer» B. Automatically develop the software | |
| 652. |
Cities, states and country can be defined as |
| A. | Subsystem – Cities, states: System – country |
| B. | Subsystem – state :System– country, cities |
| C. | Subsystem – Country: System– cities, state |
| D. | Subsystem– Country, state: System– Cities |
| Answer» B. Subsystem – state :System– country, cities | |
| 653. |
Quality plan describes |
| A. | Quality procedure and standards |
| B. | Approaches, resources and schedules |
| C. | Configuration management and structure |
| D. | None of these |
| Answer» B. Approaches, resources and schedules | |
| 654. |
The most desirable form of cohesion is( |
| A. | Logical cohesion |
| B. | Procedural cohesion |
| C. | Functional cohesion |
| D. | Temporal cohesion |
| Answer» D. Temporal cohesion | |
| 655. |
In Data reduction |
| A. | Here data-flow diagram show, how data is processed at different stages in the system. |
| B. | It registers all/ selected activities of a computer system. |
| C. | Technique used to transform raw data into a more useful form. |
| D. | Data is shifted to modern data base management system. |
| Answer» D. Data is shifted to modern data base management system. | |
| 656. |
Relational schemas and other metadata about relations are stored in a structure called the____________ |
| A. | Metadata |
| B. | Catalog |
| C. | Log |
| D. | Data Dictionary |
| Answer» E. | |
| 657. |
Attribute-based identification is |
| A. | Here each component has a unique name and an associated set of attribute, which differs for each version of component |
| B. | Extent to which a software system records information concerning transactions performed against the system. |
| C. | Extent to which a system or component is operational and accessible when required for use |
| D. | They are used to describe the over all behavior of the system. Auditable is |
| Answer» B. Extent to which a software system records information concerning transactions performed against the system. | |
| 658. |
Spiral development involves |
| A. | Risk assessment |
| B. | Reduction of risk |
| C. | A and B both |
| D. | None of these |
| Answer» D. None of these | |
| 659. |
--------means that parts of the organization depend on one another |
| A. | Interaction |
| B. | Interdependence |
| C. | Integration |
| D. | Central Objective |
| Answer» C. Integration | |
| 660. |
Lehman’s Fourth Law (Lehman and Belady 1985) is |
| A. | Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. |
| B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
| C. | Large program evolution: Program evolution is a self-regulating process. |
| D. | None of these |
| Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. | |
| 661. |
Software engineering needed for building -----------systems in a timely manner with highquality. |
| A. | Software |
| B. | Hardware |
| C. | Process |
| D. | All of above |
| Answer» B. Hardware | |
| 662. |
Sensor component |
| A. | Causes changes in system environment |
| B. | Communicate with other components |
| C. | Collects information from system environment |
| D. | Coordinate the operation of other components. |
| Answer» D. Coordinate the operation of other components. | |
| 663. |
A clearly defined objective, entry and exit conditions which is normally is atomic is referred as |
| A. | Active objects |
| B. | Activity |
| C. | Adaptability |
| D. | None of these |
| Answer» C. Adaptability | |
| 664. |
Iterative model includes |
| A. | Waterfall model |
| B. | Sequential model |
| C. | Incremental development |
| D. | Random model |
| Answer» E. | |
| 665. |
System architecture model identifies |
| A. | Hardware components |
| B. | Software components |
| C. | Virtual components and software components |
| D. | Hardware and software components both |
| Answer» E. | |
| 666. |
Enduring requirements |
| A. | Emerges due to user’s understanding of system develops, during system development |
| B. | Requirements derived from the core activity of the organization and directly related to the domain of the system* |
| C. | Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. |
| D. | None of these. |
| Answer» C. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. | |
| 667. |
Cost estimation is |
| A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. |
| B. | Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. |
| C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. |
| D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. |
| Answer» B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. | |
| 668. |
Concept of software engineering is applicable to( |
| A. | FORTRAN language only |
| B. | Pascal language only |
| C. | ‘C’ language only |
| D. | All of the above |
| Answer» E. | |
| 669. |
Sub system is |
| A. | Dependent system |
| B. | Independent system |
| C. | Component |
| D. | None of these |
| Answer» C. Component | |
| 670. |
System analyst consist of following tasks: |
| A. | Problem identification |
| B. | Problem understanding |
| C. | Analysis Problem |
| D. | All of the above |
| Answer» B. Problem understanding | |
| 671. |
Floating point process is a |
| A. | Communication component |
| B. | Computation component |
| C. | Coordination component |
| D. | Sensor component |
| Answer» C. Coordination component | |
| 672. |
Beta testing is done a |
| A. | User’s end |
| B. | Developer’s end |
| C. | User’s & Developer’s end |
| D. | None of the mentioned |
| Answer» B. Developer’s end | |
| 673. |
Match the following : A-Control metrics : B- Process metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation |
| A. | A-1, B-2,C-3,D-4 |
| B. | A-4,B-3,C-2,D-1 |
| C. | A-3, B-2,C-1,D-4 |
| D. | None is true |
| Answer» B. A-4,B-3,C-2,D-1 | |
| 674. |
Why is Requirements Elicitation a difficult task? |
| A. | Problem of scope |
| B. | Problem of understanding |
| C. | Problem of volatility |
| D. | All of the mentioned |
| Answer» E. | |
| 675. |
Exhaustive testing |
| A. | always possible |
| B. | practically possible |
| C. | impractical but possible |
| D. | impractical and impossible |
| Answer» D. impractical and impossible | |
| 676. |
Here the state of the object changes by internal operations executing within the object itself. And also object continually executes and operations never suspend itself is referred as |
| A. | Active objects |
| B. | Activity |
| C. | Adaptability |
| D. | None of these |
| Answer» B. Activity | |
| 677. |
Each maturity model is CMM has( |
| A. | One KPA |
| B. | Equal KPAs |
| C. | Several KPAs |
| D. | no KPA |
| Answer» D. no KPA | |
| 678. |
In Broadcast models |
| A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. |
| B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested |
| C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
| D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. |
| Answer» D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. | |
| 679. |
RAD stands f |
| A. | Relative Application Development |
| B. | Rapid Application Development |
| C. | Rapid Application Document |
| D. | None of the mentioned |
| Answer» C. Rapid Application Document | |
| 680. |
) Beta testing is carried out by( |
| A. | Users |
| B. | Developers |
| C. | Testers |
| D. | All of the above |
| Answer» B. Developers | |
| 681. |
-------------- The functional independence of program componets. |
| A. | Error tolerance |
| B. | Training |
| C. | Modularity |
| D. | Simplicity |
| Answer» D. Simplicity | |
| 682. |
Safety validation is |
| A. | Associated with the role of people involved in software process and the activities for which they are responsible. |
| B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. |
| C. | It is concerned with establishing a confidence level in the system that might vary from low to high |
| D. | None of these |
| Answer» D. None of these | |
| 683. |
Each entity has a set of _____________ |
| A. | Entity |
| B. | Attribute |
| C. | Row |
| D. | None |
| Answer» C. Row | |
| 684. |
-------------is a unit that is part of a larger system that means a larger system divided intosubparts the subpart is known as -------------- |
| A. | Execution Information system(EIS) |
| B. | Integrated system |
| C. | Subsystem |
| D. | Transaction processing system |
| Answer» D. Transaction processing system | |
| 685. |
Cost estimation for a project may include( |
| A. | Software Cost |
| B. | Hardware Cost |
| C. | Personnel Costs |
| D. | All of the above |
| Answer» E. | |
| 686. |
Which of the following Requirement Elicitation Techniques is applicable to messy, changingand ill-defined problem situations? |
| A. | Quality Function Deployment (QFD) |
| B. | Prototyping |
| C. | Soft Systems Methodology (SSM) |
| D. | Controlled Requirements Expression (CORE) |
| Answer» D. Controlled Requirements Expression (CORE) | |
| 687. |
If project is the enhancement of existing system, which model is best suited?( |
| A. | Waterfall model |
| B. | Prototyping model |
| C. | Iterative enhancement model |
| D. | Spiral model |
| Answer» D. Spiral model | |
| 688. |
) In Basic execution time model, additional number of failures required to achieve a failure intensity objective is expressed as( |
| A. | 0/λ0(λP - λF) |
| B. | ) 0/λ0(λF – λP) |
| C. | λ0 0(λF – λP) |
| D. | λ0/ 0 (λP - λF) |
| Answer» B. ) 0/λ0(λF – λP) | |
| 689. |
Which of the property of software modularity is incorrect with respect to benefitssoftware modularity? |
| A. | Modules are robust |
| B. | Module can use other modules |
| C. | Modules Can be separately compiled and stored in a library |
| D. | Modules are mostly dependent |
| Answer» E. | |
| 690. |
structured design was developed by ----- and --------------------. |
| A. | ED Yourdon and Larry constatine |
| B. | By codd |
| C. | All of these |
| D. | None of these |
| Answer» B. By codd | |
| 691. |
---------- The degree to which full implementation of required function has been achieved. |
| A. | Error tolerance |
| B. | Training |
| C. | Completeness |
| D. | Simplicity |
| Answer» D. Simplicity | |
| 692. |
CASE Workbench |
| A. | A measure of the amount of work a system can perform |
| B. | It provides automated support for software process. |
| C. | Support individual process tasks |
| D. | Set of tools to support a particular phase of software process such as design, implementation or testing |
| Answer» B. It provides automated support for software process. | |
| 693. |
Fail safe is |
| A. | Trustworthiness with which a system or component can be modified to increase its storage or functional capacity |
| B. | Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure. |
| C. | Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures. |
| D. | None of these |
| Answer» E. | |
| 694. |
) A decision table has( |
| A. | Four portions |
| B. | Three portions |
| C. | Five portions |
| D. | Two portions |
| Answer» B. Three portions | |
| 695. |
Capacity is |
| A. | A measure of the amount of work a system can perform |
| B. | It provides automated support for software process. |
| C. | Support individual process tasks |
| D. | Set of tools to support a particular phase of software process such as design, implementation or testing. |
| Answer» B. It provides automated support for software process. | |
| 696. |
Hazard |
| A. | Hazard cannot arise due system design. |
| B. | The probability of the event occurring which create a hazard. |
| C. | An assessment of the worst possible damage, which could result from a particular hazard. |
| D. | A condition with the potential for causing or contributing to an accident. |
| Answer» E. | |
| 697. |
In ISO 9126, each characteristic is related to( |
| A. | one attributes |
| B. | two attributes |
| C. | three attributes |
| D. | four attributes |
| Answer» B. two attributes | |
| 698. |
DFD stands for( |
| A. | Data Flow design |
| B. | Descriptive functional design |
| C. | Data flow diagram |
| D. | None of the above |
| Answer» D. None of the above | |
| 699. |
This set of Basic Software Engineering Questions and Answers focuses on “FunctionOriented Software Design”. 1. Choose the option that does not define Function Oriented Software Design. |
| A. | It consists of module definitions |
| B. | Modules represent data abstraction |
| C. | Modules support functional abstraction |
| D. | None of the mentioned |
| Answer» C. Modules support functional abstraction | |
| 700. |
) In Basic execution time model, failure intensity is given by( |
| A. | λ(µ)=λ0(1-µ2 / V0) |
| B. | λ(µ)=λ0(1-µ / V0) |
| C. | λ(µ)=λ0(1-V0/ µ2) |
| D. | λ(µ)=λ0(1- V0/ µ) |
| Answer» C. λ(µ)=λ0(1-V0/ µ2) | |