MCQOPTIONS
Saved Bookmarks
This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
Lehman’s Second Law (Lehman and Belady 1985) is |
| A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
| B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
| C. | Large program evolution: Program evolution is a self-regulating process. |
| D. | None of these |
| Answer» C. Large program evolution: Program evolution is a self-regulating process. | |
| 252. |
Which model in system modelling depicts the dynamic behavior of the system? |
| A. | Context Model |
| B. | Behavioral Model |
| C. | Data Model |
| D. | Object Model |
| Answer» C. Data Model | |
| 253. |
Process analysis |
| A. | Trustworthiness with which a system are transferred from one hardware environment to another |
| B. | Here one sub system encapsulates a set of procedures, which can be called by other sub-systems. |
| C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
| D. | None of these |
| Answer» D. None of these | |
| 254. |
Match the following: A- Formal mathematical transformation: B- Formal process model: C-Formal Specifications:D-Formal System development: 1- Here the formal mathema- tical representation of the system takes place. 2- It is a starting point for process analysis. It is abstract and only defines the principal process activities and deliverables. 3-Specifications expressed in a language whose vocabulary, syntax and semantics are formally defined. 4-It is more common to waterfall model, but here the development process is based on formal mathematical transformation of a system specification to an exactable program. |
| A. | A-1,B-2,C-3,D-4 |
| B. | A-4,B-2,C-3,D-1 |
| C. | A-2,B-1,C-3,D-4 |
| D. | A-1,B-3,C-2,D-4 |
| Answer» B. A-4,B-2,C-3,D-1 | |
| 255. |
Which of the following is black box testing |
| A. | Basic path testing |
| B. | Boundary value analysis |
| C. | Code path analysis |
| D. | None of the mentioned |
| Answer» C. Code path analysis | |
| 256. |
System procurement process involves |
| A. | Specifying system requirement |
| B. | Choosing suppliers |
| C. | A and B both |
| D. | None of these |
| Answer» D. None of these | |
| 257. |
If requirements are frequently changing, which model is to be selected?( |
| A. | Waterfall model |
| B. | Prototyping model |
| C. | RAD model |
| D. | Iterative enhancement model |
| Answer» C. RAD model | |
| 258. |
Embedded system |
| A. | Run on single processor |
| B. | Run on integrated group of process linked by network |
| C. | Network models |
| D. | None of these |
| Answer» B. Run on integrated group of process linked by network | |
| 259. |
Hazard avoidance |
| A. | Hazard cannot arise due system design. |
| B. | The probability of the event occurring which create a hazard. |
| C. | An assessment of the worst possible damage, which could result from a particular hazard. |
| D. | A condition with the potential for causing or contributing to an accident. |
| Answer» B. The probability of the event occurring which create a hazard. | |
| 260. |
Requirements review process is carried out to( |
| A. | Spend time in requirements gathering |
| B. | Improve the quality of SRS |
| C. | Document the requirements |
| D. | None of the above |
| Answer» C. Document the requirements | |
| 261. |
Effort is measured in terms of:( |
| A. | Person-months |
| B. | Rupees |
| C. | Persons |
| D. | Months |
| Answer» B. Rupees | |
| 262. |
Decision table are useful for describing situations in which:( |
| A. | An action is taken under varying sets of conditions. |
| B. | Number of combinations of actions is taken under varying sets of conditions |
| C. | No action is taken under varying sets of conditions |
| D. | None of the above |
| Answer» E. | |
| 263. |
Work flow model includes |
| A. | Inputs |
| B. | Out puts |
| C. | Dependencies |
| D. | All the above |
| Answer» E. | |
| 264. |
What is Cyclomatic complexity |
| A. | Black Box Testing |
| B. | White Box Testing |
| C. | Green Box Testing |
| D. | Yellow Box Testing |
| Answer» C. Green Box Testing | |
| 265. |
_________ represent derived attribute. |
| A. | Double ellipse |
| B. | Dashed ellipse |
| C. | Diamonds |
| D. | Lines |
| Answer» C. Diamonds | |
| 266. |
The worst type of cohesion is( |
| A. | Temporal cohesion |
| B. | Coincidental cohesion |
| C. | Logical cohesion |
| D. | Sequential cohesion |
| Answer» C. Logical cohesion | |
| 267. |
) A node with indegree=0 and outdegree ≠ 0 is called( |
| A. | Source node |
| B. | Destination node |
| C. | Transfer node |
| D. | None of the above |
| Answer» B. Destination node | |
| 268. |
)Cyclomatic complexity is developed by( |
| A. | B.W.Boehm |
| B. | T.J.McCabe |
| C. | B.W.Lettlewood |
| D. | Victor Basili |
| Answer» E. | |
| 269. |
Acceptance testing is also known a |
| A. | Grey box testing |
| B. | White box testing |
| C. | Alpha Testing |
| D. | Beta testing |
| Answer» E. | |
| 270. |
In Data flow (Activity model) |
| A. | It shows the software process as a set of activities each of which carries out data transformation. |
| B. | Data and associated programs are re- engineered to remove limits on the data processing. |
| C. | It is responsible for the definition, operation, protection, performance, and recovery of a database. |
| D. | Development of a database to meet a user’s requirements. |
| Answer» B. Data and associated programs are re- engineered to remove limits on the data processing. | |
| 271. |
This set of Software Engineering Multiple Choice Questions & Answers (MCQs) focuses on “Requirement Elicitation”. What is the first step of requirement elicitation? |
| A. | Identifying Stakeholder |
| B. | Listing out Requirements |
| C. | Requirements Gathering |
| D. | All of the mentioned |
| Answer» B. Listing out Requirements | |
| 272. |
Debugging is a process of |
| A. | Developing faults |
| B. | Removing faults |
| C. | Ignoring faults |
| D. | None of these |
| Answer» C. Ignoring faults | |
| 273. |
A executes the loop task first, then tests a condition and repeats the task until the condition fails. |
| A. | repeat until |
| B. | condition |
| C. | do while tests |
| D. | if then-else |
| Answer» B. condition | |
| 274. |
Agents are |
| A. | Quality measures that address how easily a system can evolve or migrate |
| B. | Piece of software that acts to accomplish tasks on behalf of its user |
| C. | A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis |
| D. | Extent to which a software system or component allows for or supports anonymous transactions |
| Answer» C. A quantitative option analysis that allows the cost of various options to be compu- ted, and options can be compared on objective basis | |
| 275. |
In software system requirements, the functional requirement for the system describes |
| A. | Services the system is expected to provide |
| B. | Factors of system development |
| C. | Reliability, response time or system capacity |
| D. | None of these |
| Answer» C. Reliability, response time or system capacity | |
| 276. |
Corrupting failure is |
| A. | Maintenance performed to correct faults in hardware or software |
| B. | A failure of software-controlled systems in convenience, but there are source systems where system failure is resulted in significant critical losses. |
| C. | Failure that corrupts system state or data |
| D. | None is true |
| Answer» D. None is true | |
| 277. |
The following is not true for client-server model |
| A. | It contains the set of stand alone servers |
| B. | A set of clients that can use services offered by servers |
| C. | A network which allows the clients to access these services |
| D. | An intersection between clients by passing the server |
| Answer» E. | |
| 278. |
In system modelingStatement-1: State-machine model is used to model the behavior of a system in response to internal and external events.Statement-2: Stimulus response model represents state transition diagram that show how system reacts to internal and external events. |
| A. | Statement-1 and 2 both correct |
| B. | Statement-1 and 2 both false |
| C. | Statement-1 is true and Statement-2 is false |
| D. | Statement-1 is false and Statement-2 is true |
| Answer» B. Statement-1 and 2 both false | |
| 279. |
Which one is not a functional requirement?( |
| A. | Efficiency |
| B. | Reliability |
| C. | Product features |
| D. | Stability |
| Answer» D. Stability | |
| 280. |
Testing done without planning and Documentation is ca |
| A. | Unit testing |
| B. | Regression testing |
| C. | Adhoc testing |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 281. |
If user participation is available, which model is to be chosen?( |
| A. | Waterfall model |
| B. | Iterative enhancement model |
| C. | Spiral model |
| D. | RAD model |
| Answer» E. | |
| 282. |
During software development, which factor is most crucial?( |
| A. | People |
| B. | Product |
| C. | Process |
| D. | Project |
| Answer» B. Product | |
| 283. |
_________represent weak entity set. |
| A. | Double ellipse |
| B. | Dashed ellipse |
| C. | Double rectangle |
| D. | Lines |
| Answer» D. Lines | |
| 284. |
Equivalence class partitioning is related to( |
| A. | Structural testing |
| B. | Black box testing |
| C. | Mutation testing |
| D. | All of the above |
| Answer» C. Mutation testing | |
| 285. |
Which of these is not project development activity? |
| A. | Planning |
| B. | Organizing |
| C. | Operating |
| D. | Tracking |
| Answer» D. Tracking | |
| 286. |
Which one is not a phase of “bath tub curve” of hardware reliability( |
| A. | Burn-in |
| B. | Useful life |
| C. | Wear-out |
| D. | Test-out |
| Answer» E. | |
| 287. |
---------- it includes the steps of maintenance phase of software. |
| A. | Maintainability |
| B. | Flexibility |
| C. | Testability |
| D. | Portability |
| Answer» B. Flexibility | |
| 288. |
Extent to which a system or component contains enough information to explain its objectives and properties is referred as |
| A. | Self-descriptiveness |
| B. | Servers |
| C. | Simplicity |
| D. | None of these |
| Answer» B. Servers | |
| 289. |
_________ attributes can be divided into subparts. |
| A. | Simple |
| B. | Composite |
| C. | Single valued |
| D. | Multivalued |
| Answer» C. Single valued | |
| 290. |
Which of the following Choices and standardizes patterns for a problem domainpromotes software reuse and, hence, quality and productivity? |
| A. | Promoting Communication |
| B. | Streamlining Documentation |
| C. | Increasing Development Efficiency |
| D. | Supporting Software Reuse |
| Answer» E. | |
| 291. |
We can define information system as a set of devices, procedures, rules but most of thework performs manually |
| A. | Formal Information system |
| B. | Manmade Information system |
| C. | Informal information system |
| D. | All of above |
| Answer» C. Informal information system | |
| 292. |
CMM stands for( |
| A. | Capacity maturity model |
| B. | Capability maturity model |
| C. | Cost management model |
| D. | Comprehensive maintenance model |
| Answer» C. Cost management model | |
| 293. |
------------- component should be designed and implemented so that it can be reused inmany different programs. |
| A. | Reusability |
| B. | Effectiveness |
| C. | Flexibility |
| D. | None of these |
| Answer» B. Effectiveness | |
| 294. |
During the development phase, the following testing approach is not adopted( |
| A. | Unit testing |
| B. | Bottom up testing |
| C. | Integration testing |
| D. | Acceptance testing |
| Answer» E. | |
| 295. |
Failure occurrences can be represented as( |
| A. | time to failure |
| B. | time interval between failures |
| C. | failures experienced in a time interval |
| D. | All of the above |
| Answer» E. | |
| 296. |
Software is defined as ____ |
| A. | Instructions |
| B. | Data Structures |
| C. | Documents |
| D. | All of the above |
| Answer» E. | |
| 297. |
COCOMO-II estimation model is based on( |
| A. | Complex approach |
| B. | Algorithm approach |
| C. | Bottom up approach |
| D. | Top down approach |
| Answer» C. Bottom up approach | |
| 298. |
Match the following : A- Maintenance control: B-Maintenance measures: C-Maintenance personnel : 1-Cost of planning and scheduling hardware preventive main- tenance, and software maintenance and upgrades, managing the hardware and software baselines, and providing response for hardware corrective maintenance. 2- Measures that address how easily a system can be repaired or changed. 3-Number ofpersonnel needed to maintain all aspects of a computer system, including the support personnel and facilities needed to support that activity. |
| A. | A-1, B-3,C-2 |
| B. | A-1,B-2,C-3 |
| C. | A-2,B-3,C-1 |
| D. | A-3,B-2,C-1 |
| Answer» C. A-2,B-3,C-1 | |
| 299. |
Project risk factor is considered in( |
| A. | Waterfall model |
| B. | Prototyping model |
| C. | Spiral model |
| D. | Iterative enhancement model |
| Answer» D. Iterative enhancement model | |
| 300. |
Evolvability is |
| A. | Trustworthiness with which a system or component can be modified to take advantage of new software or hardware technologies. |
| B. | An error of some kind or an unexpected event occurs during the execution of a program |
| C. | Here the objective of the process is to work with uses to explore their requirement and deliver a final system. |
| D. | Possible loss or harm in computing system. |
| Answer» B. An error of some kind or an unexpected event occurs during the execution of a program | |