Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

251.

Lehman’s Second Law (Lehman and Belady 1985) is

A. Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment.
B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
C. Large program evolution: Program evolution is a self-regulating process.
D. None of these
Answer» C. Large program evolution: Program evolution is a self-regulating process.
252.

Which model in system modelling depicts the dynamic behavior of the system?

A. Context Model
B. Behavioral Model
C. Data Model
D. Object Model
Answer» C. Data Model
253.

Process analysis

A. Trustworthiness with which a system are transferred from one hardware environment to another
B. Here one sub system encapsulates a set of procedures, which can be called by other sub-systems.
C. It is concerned with studying existing process to understand the relationship between different parts of the process.
D. None of these
Answer» D. None of these
254.

Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications:D-Formal System development: 1- Here the formal mathema- tical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program.

A. A-1,B-2,C-3,D-4
B. A-4,B-2,C-3,D-1
C. A-2,B-1,C-3,D-4
D. A-1,B-3,C-2,D-4
Answer» B. A-4,B-2,C-3,D-1
255.

Which of the following is black box testing

A. Basic path testing
B. Boundary value analysis
C. Code path analysis
D. None of the mentioned
Answer» C. Code path analysis
256.

System procurement process involves

A. Specifying system requirement
B. Choosing suppliers
C. A and B both
D. None of these
Answer» D. None of these
257.

If requirements are frequently changing, which model is to be selected?(

A. Waterfall model
B. Prototyping model
C. RAD model
D. Iterative enhancement model
Answer» C. RAD model
258.

Embedded system

A. Run on single processor
B. Run on integrated group of process linked by network
C. Network models
D. None of these
Answer» B. Run on integrated group of process linked by network
259.

Hazard avoidance

A. Hazard cannot arise due system design.
B. The probability of the event occurring which create a hazard.
C. An assessment of the worst possible damage, which could result from a particular hazard.
D. A condition with the potential for causing or contributing to an accident.
Answer» B. The probability of the event occurring which create a hazard.
260.

Requirements review process is carried out to(

A. Spend time in requirements gathering
B. Improve the quality of SRS
C. Document the requirements
D. None of the above
Answer» C. Document the requirements
261.

Effort is measured in terms of:(

A. Person-months
B. Rupees
C. Persons
D. Months
Answer» B. Rupees
262.

Decision table are useful for describing situations in which:(

A. An action is taken under varying sets of conditions.
B. Number of combinations of actions is taken under varying sets of conditions
C. No action is taken under varying sets of conditions
D. None of the above
Answer» E.
263.

Work flow model includes

A. Inputs
B. Out puts
C. Dependencies
D. All the above
Answer» E.
264.

What is Cyclomatic complexity

A. Black Box Testing
B. White Box Testing
C. Green Box Testing
D. Yellow Box Testing
Answer» C. Green Box Testing
265.

_________ represent derived attribute.

A. Double ellipse
B. Dashed ellipse
C. Diamonds
D. Lines
Answer» C. Diamonds
266.

The worst type of cohesion is(

A. Temporal cohesion
B. Coincidental cohesion
C. Logical cohesion
D. Sequential cohesion
Answer» C. Logical cohesion
267.

) A node with indegree=0 and outdegree ≠ 0 is called(

A. Source node
B. Destination node
C. Transfer node
D. None of the above
Answer» B. Destination node
268.

)Cyclomatic complexity is developed by(

A. B.W.Boehm
B. T.J.McCabe
C. B.W.Lettlewood
D. Victor Basili
Answer» E.
269.

Acceptance testing is also known a

A. Grey box testing
B. White box testing
C. Alpha Testing
D. Beta testing
Answer» E.
270.

In Data flow (Activity model)

A. It shows the software process as a set of activities each of which carries out data transformation.
B. Data and associated programs are re- engineered to remove limits on the data processing.
C. It is responsible for the definition, operation, protection, performance, and recovery of a database.
D. Development of a database to meet a user’s requirements.
Answer» B. Data and associated programs are re- engineered to remove limits on the data processing.
271.

This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Requirement Elicitation”. What is the first step of requirement elicitation?

A. Identifying Stakeholder
B. Listing out Requirements
C. Requirements Gathering
D. All of the mentioned
Answer» B. Listing out Requirements
272.

Debugging is a process of

A. Developing faults
B. Removing faults
C. Ignoring faults
D. None of these
Answer» C. Ignoring faults
273.

A                      executes the loop task first, then tests a condition and repeats the task until the condition fails.

A. repeat until
B. condition
C. do while tests
D. if then-else
Answer» B. condition
274.

Agents are

A. Quality measures that address how easily a system can evolve or migrate
B. Piece of software that acts to accomplish tasks on behalf of its user
C. A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis
D. Extent to which a software system or component allows for or supports anonymous transactions
Answer» C. A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis
275.

In software system requirements, the functional requirement for the system describes

A. Services the system is expected to provide
B. Factors of system development
C. Reliability, response time or system capacity
D. None of these
Answer» C. Reliability, response time or system capacity
276.

Corrupting failure is

A. Maintenance performed to correct faults in hardware or software
B. A failure of software-controlled systems in convenience, but there are source systems where system failure is resulted in significant critical losses.
C. Failure that corrupts system state or data
D. None is true
Answer» D. None is true
277.

The following is not true for client-server model

A. It contains the set of stand alone servers
B. A set of clients that can use services offered by servers
C. A network which allows the clients to access these services
D. An intersection between clients by passing the server
Answer» E.
278.

In system modelingStatement-1: State-machine model is used to model the behavior of a system in response to internal and external events.Statement-2: Stimulus response model represents state transition diagram that show how system reacts to internal and external events.

A. Statement-1 and 2 both correct
B. Statement-1 and 2 both false
C. Statement-1 is true and Statement-2 is false
D. Statement-1 is false and Statement-2 is true
Answer» B. Statement-1 and 2 both false
279.

Which one is not a functional requirement?(

A. Efficiency
B. Reliability
C. Product features
D. Stability
Answer» D. Stability
280.

Testing done without planning and Documentation is ca

A. Unit testing
B. Regression testing
C. Adhoc testing
D. None of the mentioned
Answer» D. None of the mentioned
281.

If user participation is available, which model is to be chosen?(

A. Waterfall model
B. Iterative enhancement model
C. Spiral model
D. RAD model
Answer» E.
282.

During software development, which factor is most crucial?(

A. People
B. Product
C. Process
D. Project
Answer» B. Product
283.

_________represent weak entity set.

A. Double ellipse
B. Dashed ellipse
C. Double rectangle
D. Lines
Answer» D. Lines
284.

Equivalence class partitioning is related to(

A. Structural testing
B. Black box testing
C. Mutation testing
D. All of the above
Answer» C. Mutation testing
285.

Which of these is not project development activity?

A. Planning
B. Organizing
C. Operating
D. Tracking
Answer» D. Tracking
286.

Which one is not a phase of “bath tub curve” of hardware reliability(

A. Burn-in
B. Useful life
C. Wear-out
D. Test-out
Answer» E.
287.

---------- it includes the steps of maintenance phase of software.

A. Maintainability
B. Flexibility
C. Testability
D. Portability
Answer» B. Flexibility
288.

Extent to which a system or component contains enough information to explain its objectives and properties is referred as

A. Self-descriptiveness
B. Servers
C. Simplicity
D. None of these
Answer» B. Servers
289.

_________ attributes can be divided into subparts.

A. Simple
B. Composite
C. Single valued
D. Multivalued
Answer» C. Single valued
290.

Which of the following Choices and standardizes patterns for a problem domainpromotes software reuse and, hence, quality and productivity?

A. Promoting Communication
B. Streamlining Documentation
C. Increasing Development Efficiency
D. Supporting Software Reuse
Answer» E.
291.

We can define information system as a set of devices, procedures, rules but most of thework performs manually

A. Formal Information system
B. Manmade Information system
C. Informal information system
D. All of above
Answer» C. Informal information system
292.

CMM stands for(

A. Capacity maturity model
B. Capability maturity model
C. Cost management model
D. Comprehensive maintenance model
Answer» C. Cost management model
293.

------------- component should be designed and implemented so that it can be reused inmany different programs.

A. Reusability
B. Effectiveness
C. Flexibility
D. None of these
Answer» B. Effectiveness
294.

During the development phase, the following testing approach is not adopted(

A. Unit testing
B. Bottom up testing
C. Integration testing
D. Acceptance testing
Answer» E.
295.

Failure occurrences can be represented as(

A. time to failure
B. time interval between failures
C. failures experienced in a time interval
D. All of the above
Answer» E.
296.

Software is defined as ____

A. Instructions
B. Data Structures
C. Documents
D. All of the above
Answer» E.
297.

COCOMO-II estimation model is based on(

A. Complex approach
B. Algorithm approach
C. Bottom up approach
D. Top down approach
Answer» C. Bottom up approach
298.

Match the following : A- Maintenance control: B-Maintenance measures: C-Maintenance personnel : 1-Cost of planning and scheduling hardware preventive main- tenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Measures that address how easily a system can be repaired or changed. 3-Number ofpersonnel needed to maintain all aspects of a computer system, including the support personnel and facilities needed to support that activity.

A. A-1, B-3,C-2
B. A-1,B-2,C-3
C. A-2,B-3,C-1
D. A-3,B-2,C-1
Answer» C. A-2,B-3,C-1
299.

Project risk factor is considered in(

A. Waterfall model
B. Prototyping model
C. Spiral model
D. Iterative enhancement model
Answer» D. Iterative enhancement model
300.

Evolvability is

A. Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies.
B. An error of some kind or an unexpected event occurs during the execution of a program
C. Here the objective of the process is to work with uses to explore their requirement and deliver a final system.
D. Possible loss or harm in computing system.
Answer» B. An error of some kind or an unexpected event occurs during the execution of a program