Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

151.

The measures of centrality include:

A. betweenness
B. closeness
C. degree
D. all of the above
Answer» E.
152.

Nodes in the network analysis graph represent the                   and the edges represent the relationships between nodes.

A. actors
B. nodes
C. users
D. both a and b
Answer» E.
153.

Which is the latest Operating System?

A. real-time os
B. desktop os
C. mainframe os
D. cloud os
Answer» E.
154.

Arrange the stages in supply chain management: i. Material and Equipment Supplies ii. Delivery of Products iii. After Sale Service and Returns iv. Planning and Coordination v. Manufacturing and Testing

A. iv, v, i, ii, iii
B. iv, i, v, iii, ii
C. iv, i, v, ii, iii
D. i, ii, iv, v, ii
Answer» D. i, ii, iv, v, ii
155.

Responsibility of OS developers to add new feature in existing OS are

A. more reliability
B. convenience and security
C. compatibility
D. all of the above
Answer» E.
156.

CometCloud supports policy based autonomic      and

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» E.
157.

Which are the three conceptual layers in CometCloud?

A. development, application, physical
B. infrastructure, dynamic, static
C. transport, network, programming
D. programming, service, infrastructure
Answer» E.
158.

In Comet, a tuple is a simple        string

A. java
B. python
C. xml
D. html
Answer» D. html
159.

Which of the following policies is not mentioned in ‘not to violate’ regarding CloudBurst?

A. deadline-based
B. budget-based
C. quality-based
D. workload-based
Answer» D. workload-based
160.

Docker can simplify both,          and

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» D. all of the above
161.

Basic approach of Docker as a company is:

A. “batteries included but removable”
B. “batteries included but non-removable”
C. “batteries but chargeable”
D. “battery less execution”
Answer» B. “batteries included but non-removable”
162.

Two main components in Docker are:

A. master, slave
B. client, server
C. client, master
D. all of the above
Answer» C. client, master
163.

Which containers are used by Docker severs?

A. windows
B. android
C. linux
D. mac
Answer» D. mac
164.

Docker is generally configured to use TCP port          while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
165.

Containers require less disk space as compared to virtual machine

A. true
B. false
Answer» B. false
166.

There is no built-in framework in Docker for testing.

A. true
B. false
Answer» B. false
167.

Docker is generally configured to use TCP port          while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» E.
168.

systems used to track and identify the location of objects in real time

A. geolocation
B. geographical information system (gis)
C. wireless application protocol (wap)
D. real-time location system (rtls)
Answer» E.
169.

Computing capabilities embedded into objects around us (mobile and stationary)

A. pervasive computing
B. ubiquitous computing (ubicom)
C. context-aware computing
D. geolocation
Answer» C. context-aware computing
170.

gateway to the Internet optimized for mobility

A. voice portal
B. wimax
C. mobile enterprise
D. mobile portal
Answer» E.
171.

automatically identifying a Web user's location

A. voice portal
B. geolocation
C. sensor network
D. wimax
Answer» C. sensor network
172.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called        tags and        readers

A. network-based positioning
B. real-time location system (rtls)
C. radio frequency identification (rfid)
D. wireless wide area network (wwan)
Answer» D. wireless wide area network (wwan)
173.

Computing capabilities embedded in the environment but typically not mobile

A. mobile portal
B. pervasive computing
C. context-aware computing
D. voice portal
Answer» C. context-aware computing
174.

A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes

A. voice portal
B. mobile portal
C. geolocation
D. sensor network
Answer» E.
175.

Vehicle mount solutions • Handheld solutions • Hands-free and voice solutions

A. mobile enterprise
B. wireless wide area network (wwan)
C. typical mobile devices used in warehouses
D. interactive voice response (ivr)
Answer» D. interactive voice response (ivr)
176.

a technology that offers Internet browsing from wireless devices

A. real-time location system (rtls)
B. wireless wide area network (wwan)
C. wireless local area network (wlan)
D. wireless application protocol (wap)
Answer» E.
177.

Calculating the location of a mobile device from signals sent by the device to base stations

A. personal area network (pan)
B. terminal-based positioning
C. pervasive computing
D. network-based positioning
Answer» C. pervasive computing
178.

a wireless technology, designed to provide Internet access across metro areas to fixed (not moving) users. It is considered wireless broadband technology

A. voice portal
B. mobile portal
C. wimax
D. geolocation
Answer» D. geolocation
179.

a website with an audio interface that can be accessed through a telephone call

A. wimax
B. geolocation
C. mobile portal
D. voice portal
Answer» E.
180.

a wireless version of the Ethernet networking standard

A. wireless wide area network (wwan)
B. wireless local area network (wlan)
C. personal area network (pan)
D. wireless application protocol (wap)
Answer» C. personal area network (pan)
181.

computer system capable of integrating, storing, editing, analyzing, sharing, and displaying geographically referenced (spatial) information

A. personal area network (pan)
B. interactive voice response (ivr)
C. real-time location system (rtls)
D. geographical information system (gis)
Answer» E.
182.

a voice system enables users to request/receive info, enter/change data through a telephone to a computerized system

A. pervasive computing
B. real-time location system (rtls)
C. personal area network (pan)
D. interactive voice response (ivr)
Answer» E.
183.

a wireless telecommunications network for device-to-device connections within a very short range

A. wireless wide area network (wwan)
B. personal area network (pan)
C. wireless local area network (wlan)
D. sensor network
Answer» C. wireless local area network (wlan)
184.

Which of the following is a specification for multicast discovery on a LAN?

A. ws-agent
B. ws-discovery
C. ws-soap
D. all of the mentioned
Answer» C. ws-soap
185.

ability to detect and react to a set of environmental variables that is described as context (which can be sensor info or users' attitudes)

A. mobile portal
B. context-aware computing
C. pervasive computing
D. network-based positioning
Answer» C. pervasive computing
186.

Calculating the location of a mobile device from signals sent by the device to base stations

A. personal area network (pan)
B. terminal-based positioning
C. pervasive computing
D. network-based positioning
Answer» C. pervasive computing
187.

delivery of m-commerce transactions to individuals in a specific location, at a specific time

A. location-based m- commerce (l- commerce)
B. context-aware computing
C. ubiquitous computing (ubicom)
D. network-based positioning
Answer» B. context-aware computing
188.

CNS stands for

A. consumption near sweet-spot
B. continuous network system
C. compact neural system
D. compound near sweet-sp0t
Answer» B. continuous network system
189.

short-range radio frequency communication technology for remotely storing and retrieving data using devices called tags and readers

A. network-based positioning
B. real-time location system (rtls)
C. radio frequency identification (rfid)
D. wireless wide area network (wwan)
Answer» D. wireless wide area network (wwan)
190.

Docker is generally configured to use TCP port while managing encrypted traffic.

A. 3306
B. 53378
C. 2375
D. 2376
Answer» E.
191.

Docker is generally configured to use TCP port while executing unencrypted traffic

A. 3306
B. 53378
C. 2375
D. 2376
Answer» D. 2376
192.

Docker can simplify both, and

A. process, state
B. behavior, aspect
C. workflows, communication
D. all of the above
Answer» D. all of the above
193.

Keywords in Docker are

A. develop, ship, run anywhere
B. create, export
C. transport, cloud
D. user, data, privacy
Answer» B. create, export
194.

SEEP stands for

A. system end to end protocol
B. static environmental execution process
C. symbolic execution and energy profiles
D. state execution and energy profiles
Answer» D. state execution and energy profiles
195.

SEEP is used in

A. energy optimization
B. multimedia
C. information leakage
D. cost reduction
Answer» B. multimedia
196.

KPI stands for

A. key practices in industry
B. key performance index
C. key performance indicators
D. key parameters in information
Answer» D. key parameters in information
197.

The cloud media services are:

A. cloud gaming
B. experiencing multi- screens
C. image processing
D. all of the above
Answer» E.
198.

CometCloud supports policy based autonomic and

A. cloudbursting
B. cloudbridging
C. none
D. both a and b
Answer» E.
199.

In Comet, a tuple is a simple string

A. java
B. python
C. xml
D. html
Answer» D. html
200.

In future, companies wont worry about the capital for large data center because of

A. saas solution
B. paas solution
C. iaas solution
D. none of the above
Answer» C. iaas solution