MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 1301. |
In Java, when we implement an interface method, it must be declared as : |
| A. | Private |
| B. | Protected |
| C. | Public |
| D. | Friend |
| Answer» D. Friend | |
| 1302. |
Which method is called first by an applet program? |
| A. | start() |
| B. | run() |
| C. | init() |
| D. | begin() |
| Answer» D. begin() | |
| 1303. |
The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is |
| A. | HTML page |
| B. | DOC type procedure |
| C. | Style sheet |
| D. | Stored procedure |
| Answer» D. Stored procedure | |
| 1304. |
Which is the protocol for performing RPCs between applications In a language and system independent way? |
| A. | Hyper Text Tranmission Protocol (HTTP) |
| B. | Simple Network Management Protocol (SNMP) |
| C. | Simple Object Access Protocol (SOAP) |
| D. | Simple Mail Transfer Protocol (SMTP) |
| Answer» D. Simple Mail Transfer Protocol (SMTP) | |
| 1305. |
Match the following with respect to HTML tags and usage.a. CITE 1. Italic representationb. EM 2. Represents output from programmesc. VAR 3. Represents to other sourced. SAMP 4. Argument to a programme Codes :a b c d |
| A. | 3 1 4 2 |
| B. | 2 3 1 4 |
| C. | 4 2 3 1 |
| D. | 1 3 4 1 |
| Answer» B. 2 3 1 4 | |
| 1306. |
The behavior of the document elements in XML can be defined by |
| A. | Using document object |
| B. | Registering appropriate event handlers |
| C. | Using element object |
| D. | All of the above |
| Answer» E. | |
| 1307. |
Debugger is a program that |
| A. | allows to examine and modify the contents of registers |
| B. | does not allow execution of a segment of program |
| C. | allows to set breakpoints, execute a segment of program and display contents of register |
| D. | All of the above |
| Answer» D. All of the above | |
| 1308. |
The Servlet Response interface enables a servlet to formulate a response for a client using the method ___________. |
| A. | void log(Exception e, String s) |
| B. | void destroy() |
| C. | int get ServerPort() |
| D. | void set ContextType(String type) |
| Answer» E. | |
| 1309. |
The aspect ratio of an image is defined as |
| A. | The ratio of width to its height measured in unit length |
| B. | The ratio of height to width measured in number of pixels |
| C. | The ratio of depth to width measured in unit length |
| D. | The ratio of width to depth measured in number of pixels |
| Answer» B. The ratio of height to width measured in number of pixels | |
| 1310. |
Match the following: List- I List- IIa. Tablet, Joystick i Continuous devicesb. Light Pen, Touch Screen ii. Direct devicesc. Locator, Keyboard iii. Logical devicesd. Data Globe, Sonic Pen iv. 3D interaction wirescodea b c d |
| A. | ii i iv iii |
| B. | i iv iii ii |
| C. | i ii iii iv |
| D. | iv iii ii i |
| Answer» E. | |
| 1311. |
A technique used to approximate halftones without reducing spatial resolution is known as |
| A. | Halftoning |
| B. | Dithering |
| C. | Error diffusion |
| D. | None of the above |
| Answer» C. Error diffusion | |
| 1312. |
If the Fourier transform of the function f(x, y) is F(m, n), then the Fourier transform of the function f(2x, 2y) is : |
| A. | 1/4 F(m/2 , n/2) |
| B. | 1/4 F (2m, 2n) |
| C. | 1/4 F (m, n) |
| D. | 1/4 F ( m/4 , n/4) |
| Answer» B. 1/4 F (2m, 2n) | |
| 1313. |
Which of the following is not true with respect to a trackball and/or spaceball ?I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom.II. Unlike the trackball a spaceball does not actually move.Ill. A trackball is a three dimensional positioning device while as a spaceball provides six degrees of freedom. |
| A. | I & II |
| B. | II & III |
| C. | II only |
| D. | III only |
| Answer» E. | |
| 1314. |
Which of the following statement(s) is (are) true?I. Two successive translations are additive.II. Two successive rotations are additive.III. Two successive scaling operations are multiplicative |
| A. | I & II |
| B. | only II |
| C. | II & III |
| D. | All the above |
| Answer» E. | |
| 1315. |
Given below are three basic rules:I. Squash and StretchII. Slow-in and Slow-outIII. To stage the action properlyThese rules are applied in case of : |
| A. | Rendering |
| B. | Morphing |
| C. | Animation |
| D. | All of the above |
| Answer» D. All of the above | |
| 1316. |
The Z-buffer algorithm is used for Hidden surface removal of objects. The maximum number of objects that can be handled by this algorithm shall |
| A. | Depend on the application |
| B. | Arbitrary no. of objects |
| C. | Depend on the memory availability |
| D. | Depend on the processor |
| Answer» C. Depend on the memory availability | |
| 1317. |
Which of the following points lies on the same side as the origin with reference to the line 3x + 7y= 2 ? |
| A. | (3,0) |
| B. | (1,0) |
| C. | (0.5,0.5) |
| D. | (0.5,0) |
| Answer» E. | |
| 1318. |
Which of the following categories of languages do not refer to animation languages? |
| A. | Graphical languages |
| B. | General-purpose languages |
| C. | Linear-list notations |
| D. | None of the above |
| Answer» E. | |
| 1319. |
Which level of Abstraction describes how data are stored in the data base ? |
| A. | Physical level |
| B. | View level |
| C. | Abstraction level |
| D. | Logical level |
| Answer» B. View level | |
| 1320. |
If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 ∪ R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (---> indicates functional dependency) |
| A. | (R1 ∩ R2) --> R1 or R1 ∩ R2 ---> R2 |
| B. | R1 ∩ R2 --> R1 |
| C. | R1∩ R2 --> R2 |
| D. | R1 ∩ R2 --> R1 and R1 ∩ R2 --> R2 |
| Answer» B. R1 ∩ R2 --> R1 | |
| 1321. |
The student. marks should not be greater than 100. This is |
| A. | Integrity constraint |
| B. | Referential constraint |
| C. | Overdefined constraint |
| D. | Feasible constraint |
| Answer» B. Referential constraint | |
| 1322. |
Which of the following is true ? |
| A. | A relation in BCNF is always in 3NF |
| B. | A relation in 3NF is always in BCNF |
| C. | BCNF and 3NF are same |
| D. | A relation in BCNF is not in 3NF |
| Answer» B. A relation in 3NF is always in BCNF | |
| 1323. |
GO BOTTOM and SKIP-3 commands are given one after another in a database file of 30 records. It shifts the control to |
| A. | 28th record |
| B. | 27th record |
| C. | 3rd record |
| D. | 4th record |
| Answer» C. 3rd record | |
| 1324. |
In DML, RECONNECT command cannot be used with |
| A. | OPTIONAL Set |
| B. | FIXED Set |
| C. | MANDATOR Set |
| D. | All of the above |
| Answer» C. MANDATOR Set | |
| 1325. |
Third normal form is based on the concept of ______. |
| A. | Closure Dependency |
| B. | Transitive Dependency |
| C. | Normal Dependency |
| D. | Functional Dependency |
| Answer» C. Normal Dependency | |
| 1326. |
A hash function f defined as f (key) = key mod 13, with linear probing is used to insert keys 55, 58, 68, 91, 27, 145. What will be the location of 79 ? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» E. | |
| 1327. |
Given a Relation POSITION (Posting-No, Skill), then query to retrieve all distinct pairs of posting-nos requiring skill is |
| A. | Select p.posting-No, p.posting-No from position p where p.skill = p.skill and p.posting-No < p.posting-No |
| B. | Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill |
| C. | Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No < p2.posting-No |
| D. | Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No = p2.posting.No |
| Answer» D. Select p1.posting-No, p2.posting-No from position p1, position p2 where p1.skill = p2.skill and p1.posting-No = p2.posting.No | |
| 1328. |
The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between |
| A. | DBMS & the Host record |
| B. | Host program and Host record |
| C. | Host program and DBMS |
| D. | Host program and Host language |
| Answer» D. Host program and Host language | |
| 1329. |
Working software is not available until late in the process in |
| A. | Waterfall model |
| B. | Prototyping model |
| C. | Incremental model |
| D. | Evolutionary Development model |
| Answer» B. Prototyping model | |
| 1330. |
Regression testing is primarily related to |
| A. | Functional testing |
| B. | Development testing |
| C. | Data flow testing |
| D. | Maintenance testing |
| Answer» E. | |
| 1331. |
Equivalence partitioning is a ................ testing method that divides the input domain of a program into classes of data from which test cases can be derived. |
| A. | White box |
| B. | Black box |
| C. | Regression |
| D. | Smoke |
| Answer» C. Regression | |
| 1332. |
The .................. of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of these components, and the relationship among them. |
| A. | E-R diagram |
| B. | Data flow diagram |
| C. | Software architecture |
| D. | Software design |
| Answer» D. Software design | |
| 1333. |
In function point analysis, the number of complexity adjustment factors is |
| A. | 10 |
| B. | 12 |
| C. | 14 |
| D. | 20 |
| Answer» D. 20 | |
| 1334. |
Improving processing efficiency or performance or restructuring of software to improve changeability is known as |
| A. | Corrective maintenance |
| B. | Perfective maintenance |
| C. | Adaptive maintenance |
| D. | Code maintenance |
| Answer» C. Adaptive maintenance | |
| 1335. |
Consider the following characteristics:(i) Correct and unambiguous(ii) Complete and consistent(iii) Ranked for importance and/or stability and verifiable(iv) Modifiable and TraceableWhich of the following is true for a good SRS? |
| A. | (i), (ii) and (iii) |
| B. | (i), (iii) and (iv) |
| C. | (ii), (iii) and (iv) |
| D. | (i), (ii), (iii) and (iv) |
| Answer» E. | |
| 1336. |
Equivalence class partitioning approach is used to divide the input domain into a set of equivalence classes, so that if a program works correctly for a value, then it will work correctly for all the other values in that class. This is used ................. |
| A. | to partition the program in the form of classes |
| B. | to reduce the number of test cases required |
| C. | for designing test cases in white box testing |
| D. | all of the above |
| Answer» C. for designing test cases in white box testing | |
| 1337. |
The principle, a function can always be replaced by its value ⁄ irrespective of the contexts, Without changing the meaning is called |
| A. | Unbinding |
| B. | Orthogonaeality |
| C. | Context – free |
| D. | Referential transparency |
| Answer» E. | |
| 1338. |
BNF is a meta – language for |
| A. | Specifying the syntax of a language |
| B. | Describing how programs works |
| C. | Shell programming |
| D. | Real – time programming |
| Answer» B. Describing how programs works | |
| 1339. |
Regarding software requirements specifications, the case that is hardest to “fix” is |
| A. | How user – friendly the system should be? |
| B. | How fast the software system should run? |
| C. | What the software system is to do? |
| D. | How accurate the outputs should be? |
| Answer» D. How accurate the outputs should be? | |
| 1340. |
Which of the following is case required by top – down design? |
| A. | flow charting |
| B. | step – wise refinement |
| C. | Modularity |
| D. | All of these |
| Answer» E. | |
| 1341. |
Which of the following is a dangling reference? |
| A. | Accessing a variable, that is developed but not initialized |
| B. | Accessing a storage that in already disposed at the request of the processor |
| C. | Accessing a storage that is already disposed at the request of the uses |
| D. | All of these |
| Answer» E. | |
| 1342. |
Reliability of software is dependent on: |
| A. | Number of errors present in software |
| B. | Documentation |
| C. | Testing suties |
| D. | Development Processes |
| Answer» B. Documentation | |
| 1343. |
Data structures include |
| A. | Arrays |
| B. | Exception statements |
| C. | Iteration |
| D. | Both b and c |
| Answer» B. Exception statements | |
| 1344. |
Which of these are the 5 generic software engineering framework activities ? |
| A. | Communication, planning, modelling, construction, deployment |
| B. | Communication, risk management, measurement, production, reviewing |
| C. | Analysis, designing, programming, Debugging, maintenance |
| D. | Analysis, planning, designing, programming, testing |
| Answer» B. Communication, risk management, measurement, production, reviewing | |
| 1345. |
Top-down design does not require |
| A. | step-wise refinement |
| B. | loop invariants |
| C. | flow charting |
| D. | modularity |
| Answer» C. flow charting | |
| 1346. |
A Languages grammar is determined by its |
| A. | Consistency |
| B. | Familiarity |
| C. | Syntax |
| D. | None of these |
| Answer» D. None of these | |
| 1347. |
Coupling is a measure of the strength of the interconnections between software modules. Which of the following are correct statements with respect to module coupling?P: Common coupling occurs when one module controls the flow of another module by passing it information on what to do.Q: In data coupling, the complete data structure is passed from one module to another through parameters.R: Stamp coupling occurs when modules share a composite data structure and use only parts of it. |
| A. | P and Q only |
| B. | P and R only |
| C. | Q and R only |
| D. | All of P, Q and R |
| Answer» D. All of P, Q and R | |
| 1348. |
Which of the following statements is/are FALSE with respect to software testing?S1 : White-box tests are based on specifications; better at telling whether program meets specification, better at finding errors of ommission.S2 : Black-box tests are based on code; better for finding crashes, out of bounds errors, file not closed errors.S3 : Alpha testing is conducted at the developer’s site by a team of highly skilled testers for software that is developed as a product to be used by many customers. |
| A. | Only S1 and S2 are FALSE. |
| B. | Only S1 and S3 are FALSE. |
| C. | Only S2 and S3 are FALSE. |
| D. | All of S1, S2, and S3 are FALSE. |
| Answer» B. Only S1 and S3 are FALSE. | |
| 1349. |
The COCOMO model is used for .................. |
| A. | software design |
| B. | software cost estimation |
| C. | software cost approximation |
| D. | software analysis |
| Answer» C. software cost approximation | |
| 1350. |
Relation of COCOMO model is |
| A. | E = a*(KDL) 6 |
| B. | E = a* (KDL) 5 |
| C. | E = a* (KDL) 7 |
| D. | E = a* (KDL) 3 |
| Answer» B. E = a* (KDL) 5 | |