MCQOPTIONS
Saved Bookmarks
This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 901. |
The importance of software design can be summarized in a single word which is: |
| A. | Efficiency |
| B. | Accuracy |
| C. | Quality |
| D. | Complexity |
| Answer» D. Complexity | |
| 902. |
Debugging is: |
| A. | creating program code |
| B. | finding and correcting errors in the program code |
| C. | identifying the task to be computerized |
| D. | creating the algorithm |
| Answer» C. identifying the task to be computerized | |
| 903. |
In Design phase, which is the primary area of concern ? |
| A. | Architecture |
| B. | Data |
| C. | Interface |
| D. | All of the mentioned |
| Answer» E. | |
| 904. |
Which tool is use for structured designing ? |
| A. | Program flowchart |
| B. | Structure chart |
| C. | Data-flow diagram |
| D. | Module |
| Answer» C. Data-flow diagram | |
| 905. |
Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”. |
| A. | Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”. |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» B. Data Faults | |
| 906. |
Which level of Static Analysis allows specific rules that apply to a program to be checked ? |
| A. | Characteristic error checking |
| B. | User-defined error checking |
| C. | Assertion checking |
| D. | All of the mentioned |
| Answer» C. Assertion checking | |
| 907. |
Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”. |
| A. | Storage management faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» E. | |
| 908. |
Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”. |
| A. | Control Faults |
| B. | Data Faults |
| C. | Input/Output Faults |
| D. | Interface faults |
| Answer» C. Input/Output Faults | |
| 909. |
The records of each patient that is receiving or has received treatment resembles which security concept ? |
| A. | Asset |
| B. | Threat |
| C. | Vulnerability |
| D. | Control |
| Answer» B. Threat | |
| 910. |
Circumstances that have potential to cause loss or harm is known as |
| A. | Attack |
| B. | Threat |
| C. | Vulnerability |
| D. | Control |
| Answer» C. Vulnerability | |
| 911. |
What is a Range check? |
| A. | Check that the input does not exceed some maximum size e.g. 40 characters for a name |
| B. | Check that the input falls within a known range |
| C. | Use information about the input to check if it is reasonable rather than an extreme value |
| D. | None of the mentioned |
| Answer» C. Use information about the input to check if it is reasonable rather than an extreme value | |
| 912. |
Which of the following is a bad practice of Dependable programming ? |
| A. | Limit the visibility of information in a program |
| B. | Check array bounds |
| C. | Check all inputs for validity |
| D. | None of the mentioned |
| Answer» E. | |
| 913. |
Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants”? |
| A. | Diverse |
| B. | Documentable |
| C. | Auditable |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 914. |
Which reliability requirements are concerned with maintaining copies of the system? |
| A. | Checking requirements |
| B. | Recovery requirements |
| C. | Redundancy requirements |
| D. | Ambiguous requirements |
| Answer» C. Redundancy requirements | |
| 915. |
At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions? |
| A. | Preliminary risk analysis |
| B. | Life-cycle risk analysis |
| C. | Operational risk analysis |
| D. | All of the mentioned |
| Answer» C. Operational risk analysis | |
| 916. |
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems. |
| A. | risk |
| B. | control |
| C. | attack |
| D. | asset |
| Answer» C. attack | |
| 917. |
An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____ |
| A. | Human error or mistake |
| B. | System fault |
| C. | System error |
| D. | System failure |
| Answer» E. | |
| 918. |
What are the two ways to view the human error of a sociotechnical system? |
| A. | hardware and software approach |
| B. | management and users approach |
| C. | person and systems approach |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 919. |
Program modularization and Source code translation are the activities of____ |
| A. | Forward engineering |
| B. | Reverse Engineering |
| C. | Reengineering |
| D. | Reverse Engineering and Reengineering |
| Answer» D. Reverse Engineering and Reengineering | |
| 920. |
________ classes are used to create the interface that the user sees and interacts with as the software is used. |
| A. | Controller |
| B. | Entity |
| C. | Boundary |
| D. | Business |
| Answer» D. Business | |
| 921. |
_____________ & ______________ diagrams of UML represent Interaction modeling. |
| A. | Use Case, Sequence |
| B. | Class, Object |
| C. | Activity, State Chart |
| D. | All of the mentioned |
| Answer» B. Class, Object | |
| 922. |
Which level of Entity Relationship Diagram (ERD) models all entities and relationships ? |
| A. | Level 1 |
| B. | Level 2 |
| C. | Level 3 |
| D. | Level 4 |
| Answer» C. Level 3 | |
| 923. |
________________ allows us to infer that different members of classes have some common characteristics. |
| A. | Realization |
| B. | Aggregation |
| C. | Generalization |
| D. | dependency |
| Answer» D. dependency | |
| 924. |
The UML supports event-based modeling using ____________ diagrams. |
| A. | Deployment |
| B. | Collaboration |
| C. | State chart |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 925. |
Which of the following diagram is not supported by UML considering Data-driven modeling ? |
| A. | Activity |
| B. | Data Flow Diagram (DFD) |
| C. | State Chart |
| D. | Component |
| Answer» C. State Chart | |
| 926. |
According to a statistical report: “over 30% of all software projects are cancelled before completion and over 70% of the remainder fail to deliver expected features”. What must be the reason for such a situation ? |
| A. | Poor change management |
| B. | Poor requirements management |
| C. | Poor quality control |
| D. | All of the mentioned |
| Answer» C. Poor quality control | |
| 927. |
What functionality of Requirement Management Tool (RMT) is depicted by the statement: “the tool should be able to automatically detect relations between artifacts. For example information retrieval techniques, monitoring of change history, naming schemas or model transformations.” |
| A. | Automatic Link Detection |
| B. | Documentation Support |
| C. | Graphical Representation |
| D. | Automatic Link Creation and Change |
| Answer» B. Documentation Support | |
| 928. |
Consider the following Statement: “The product should have a good human interface.”What characteristic of SRS is being depicted here ? |
| A. | Consistent |
| B. | Non-Verifiable |
| C. | Correct |
| D. | Ambiguous |
| Answer» C. Correct | |
| 929. |
Consider the following Statement: “The data set will contain an end of file character.”What characteristic of SRS is being depicted here ? |
| A. | Consistent |
| B. | Non-verifiable |
| C. | Correct |
| D. | Ambiguous |
| Answer» C. Correct | |
| 930. |
Consider the following Statement: “The output of a program shall be given within 10 secs of event X 10% of the time.”What characteristic of SRS is being depicted here ? |
| A. | Consistent |
| B. | Verifiable |
| C. | Non-verifiable |
| D. | Correct |
| Answer» C. Non-verifiable | |
| 931. |
Which of the following property of SRS is depicted by the statement : “Conformity to a standard is maintained” ? |
| A. | Correct |
| B. | Complete |
| C. | Consistent |
| D. | Modifiable |
| Answer» C. Consistent | |
| 932. |
The SRS is said to be consistent if and only if |
| A. | its structure and style are such that any changes to the requirements can be made easily while retaining the style and structure |
| B. | every requirement stated therein is one that the software shall meet |
| C. | every requirement stated therein is verifiable |
| D. | no subset of individual requirements described in it conflict with each other |
| Answer» E. | |
| 933. |
Coad and Yourdon suggested _______ selection characteristics that should be used as an analyst considers each potential object for inclusion in the requirement analysis model. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 934. |
________ and _________ are the two issues of Requirement Analysis. |
| A. | Performance, Design |
| B. | Stakeholder, Developer |
| C. | Functional, Non-Functional |
| D. | None of the mentioned |
| Answer» C. Functional, Non-Functional | |
| 935. |
Who controls the FAST (Facilitated Application Specification Techniques) meeting ? |
| A. | System Analyst |
| B. | Scribe |
| C. | Facilitator |
| D. | Manager |
| Answer» D. Manager | |
| 936. |
How is brainstorming different from JAD ? Brainstorming sessions |
| A. | last for about 2-3 hours |
| B. | last for about 2-3 days |
| C. | cover the technology used for the development |
| D. | all of the mentioned |
| Answer» B. last for about 2-3 days | |
| 937. |
What of the following is not an output of a JAD session ? |
| A. | Context Diagrams |
| B. | DFDs |
| C. | ER model |
| D. | UML diagrams |
| Answer» E. | |
| 938. |
Which one of the following is not an actor in JAD sessions ? |
| A. | User |
| B. | Tester |
| C. | Scribe |
| D. | Sponsor |
| Answer» C. Scribe | |
| 939. |
“Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What kind of a requirement the system is providing ? |
| A. | Functional |
| B. | Non-Functional |
| C. | Known Requirement |
| D. | None of the mentioned |
| Answer» B. Non-Functional | |
| 940. |
What are the four dimensions of Dependability ? |
| A. | Usability, Reliability, Security, Flexibility |
| B. | Availability, Reliability, Maintainability, Security |
| C. | Availability, Reliability, Security, Safety |
| D. | Security, Safety, Testability, Usability |
| Answer» D. Security, Safety, Testability, Usability | |
| 941. |
Choose the incorrect statement with respect to Non-Functional Requirement(NFR) |
| A. | Product-oriented Approach – Focus on system (or software) quality |
| B. | Process-oriented Approach – Focus on how NFRs can be used in the design process |
| C. | Quantitative Approach – Find measurable scales for the functionality attributes |
| D. | Qualitative Approach – Study various relationships between quality goals |
| Answer» D. Qualitative Approach – Study various relationships between quality goals | |
| 942. |
Which one of the following is a requirement that fits in a developer’s module ? |
| A. | Availability |
| B. | Testability |
| C. | Usability |
| D. | Flexibility |
| Answer» C. Usability | |
| 943. |
Which three framework activities are present in Adaptive Software Development(ASD) ? |
| A. | analysis, design, coding |
| B. | requirements gathering, adaptive cycle planning, iterative development |
| C. | speculation, collaboration, learning |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 944. |
The longer a fault exists in software |
| A. | the more tedious its removal becomes |
| B. | the more costly it is to detect and correct |
| C. | the less likely it is to be properly corrected |
| D. | All of the mentioned |
| Answer» E. | |
| 945. |
RUP stands for____________ created by a division of _________ |
| A. | Rational Unified Program, IBM |
| B. | Rational Unified Process, Infosys |
| C. | Rational Unified Process, Microsoft |
| D. | Rational Unified Process, IBM |
| Answer» E. | |
| 946. |
Four types of change are encountered during the support phase.Which one of the following is not one that falls into such category? |
| A. | Translation |
| B. | Correction |
| C. | Adaptation |
| D. | Prevention |
| Answer» B. Correction | |
| 947. |
Which one of the following is not an Umbrella Activity that complements the five process framework activities and help team manage and control progress, quality, change, and risk. |
| A. | Reusability management |
| B. | Risk management |
| C. | Measurement |
| D. | User Reviews |
| Answer» E. | |
| 948. |
Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ? |
| A. | Spiral Model |
| B. | Waterfall Model |
| C. | Rad Model |
| D. | 4GT Model |
| Answer» E. | |
| 949. |
What is a major advantage of using a 4GT Model for producing small scale products, applications or programs ? |
| A. | Improved productivity of software engineers |
| B. | Reduction in software development time |
| C. | 4GT helped by CASE tools and code generators offers a credible solution to many software problems |
| D. | None of the mentioned |
| Answer» C. 4GT helped by CASE tools and code generators offers a credible solution to many software problems | |
| 950. |
Which of the following is not a type of a 4GL? One originating ___ |
| A. | on Lisp machine |
| B. | on report generators |
| C. | from database query languages |
| D. | from GUI creators |
| Answer» B. on report generators | |