Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 338 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

101.

Network bottlenecks occur when              data sets must be transferred

A. large
B. small
C. big
D. all of the mentioned
Answer» B. small
102.

Amazon AWS Consists of following services

A. iaas
B. paas
C. saas
D. all of above
Answer» E.
103.

RDS is a type of database

A. sql
B. nonsql
C. simple storage
D. all of above
Answer» B. nonsql
104.

Dynamodb is type of storage

A. nonsql
B. sql
C. simple storage
D. all of above
Answer» B. sql
105.

Cloud                  are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» C. sals
106.

                   computing refers to applications and services that run on a distributed network using virtualized resources.

A. distributed
B. cloud
C. soft
D. parallel
Answer» C. soft
107.

The reputation for cloud computing services for the quality of those services is shared by

A. replicas
B. shards
C. tenants
D. all of the mentioned
Answer» D. all of the mentioned
108.

                       is a function of the particular enterprise and application in an on- premises deployment.

A. vendor lock
B. vendor lock-in
C. vendor lock-ins
D. none of the mentioned
Answer» C. vendor lock-ins
109.

.                  as a utility is a dream that dates from the beginning of the computing industry itself

A. model
B. computing
C. software
D. all of the mentioned
Answer» C. software
110.

Point out the wrong statement

A. applications benefit from deployment in the cloud
B. start very small and become big very fast
C. technology it is built on is evolutionary
D. none of the mentioned
Answer» D. none of the mentioned
111.

Amazon Elastic Compute Cloud (Amazon EC2) is a web service based on

A. iaas
B. paas
C. saas
D. all of the mentioned
Answer» B. paas
112.

Which of the following is essential concept related to Cloud?

A. reliability
B. productivity
C. abstraction
D. all of the mentioned
Answer» D. all of the mentioned
113.

The three major components of RFID hardware based on functionality include :

A. rfid reader
B. reader antenna
C. reader
D. all of the above
Answer» E.
114.

Types of Zigbee devices are available as follows: i. ZigBee Coordinator ii. ZigBee Router iii. ZigBee End Device iv. ZigBee Accessor

A. i, ii, iii
B. i, ii, iii, iv
C. ii, iii, iv
D. i, ii, iv
Answer» B. i, ii, iii, iv
115.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» D. radiant
116.

Process of identifying any individual

A. auditing
B. authorisation
C. authentication
D. accounting
Answer» D. accounting
117.

Process that prevents someone from denying that she accessed resource

A. accounting
B. non-repudiation
C. sniffing
D. authorisation
Answer» C. sniffing
118.

Which of the following is not a correct way to secure communication layer

A. cloud initiated communication
B. tls/ssl
C. ips(intrusion prevention system)
D. firewalls
Answer» B. tls/ssl
119.

Which of the following is not the component of IoT Endpoint

A. sensor
B. gateway
C. communication module
D. mcu
Answer» C. communication module
120.

Which of the following makes sure that data is not changed when it not supposed to be?

A. integrity
B. availability
C. confidentiality
D. accounting
Answer» B. availability
121.

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A. availability
B. accounting
C. integrity
D. confidentiality
Answer» E.
122.

When did the SCADA start?

A. 1980s
B. 1990s
C. 1970s
D. 1960s
Answer» C. 1970s
123.

RFID stands for?

A. random frequency identification
B. radio frequency identification
C. random frequency information
D. radio frequency information
Answer» C. random frequency information
124.

Which of the following is not involved in working of IoT?

A. rfid
B. sensor
C. nano tech
D. server
Answer» E.
125.

Which of these statements regarding sensors is TRUE?

A. sensors are input devices.
B. sensors can be analog as well as digital
C. sensors respond to some external stimuli.
D. all of these
Answer» E.
126.

M2M is a term introduced by

A. iot service providers
B. fog computing service providers
C. telecommunication service providers
D. none of these
Answer» D. none of these
127.

In threat modeling, what methodology used to perform risk analysis

A. dread
B. owasp
C. stride
D. dar
Answer» B. owasp
128.

Out of the following which is not element of threat modelling

A. asset
B. vulnerability
C. threat
D. time
Answer» E.
129.

Smart Dust can be used to measure the

A. temperature of the industrial lathe machine
B. heat inside a computer’s cpu
C. chemical in the soil
D. strength of a solid material
Answer» D. strength of a solid material
130.

Request field is present in which message format?

A. request message
B. response message
C. both request and response
D. neither request nor response
Answer» B. response message
131.

CoAP is specialized for

A. internet applications
B. device applications
C. wireless applications
D. wired applications
Answer» B. device applications
132.

Which layer is CoAP?

A. control layer
B. transport layer
C. service layer
D. application layer
Answer» D. application layer
133.

CoAP provides which of the following requirements?

A. multicast support and simplicity
B. low overhead and multicast support
C. simplicity and low overhead
D. multicast support, low over head, and simplicity
Answer» E.
134.

CoAP is a specialized protocol.

A. web transfer
B. power
C. application
D. resource
Answer» B. power
135.

URI and content type support is which protocol feature?

A. http
B. udp
C. coap
D. spi
Answer» D. spi
136.

Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A. ieee 802.16
B. ieee 802.3
C. ieee 802.11
D. ieee 802.15
Answer» D. ieee 802.15
137.

What is the full form of WLAN?

A. wide local area network
B. wireless local area network
C. wireless land access network
D. wireless local area node
Answer» C. wireless land access network
138.

Which of the following is not a characteristic of a ZigBee network?

A. low power consumption
B. easy installation.
C. high data rates.
D. unlicensed radio bands.
Answer» D. unlicensed radio bands.
139.

Which of the following layers are defined by the ZigBee stack?

A. transport layer
B. physical layer.
C. application support sub-layer.
D. medium access layer
Answer» E.
140.

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A. ieee 802.11.
B. ieee 802.15.1.
C. ieee 802.15.3.
D. ieee 802.15.4.
Answer» E.
141.

What is the typical range of transmission distance in a ZigBee network?

A. 5 m.
B. 50 m.
C. 500 m.
D. 5 km
Answer» C. 500 m.
142.

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. cross-site scoring scripting
B. cross-site request forgery
C. two-factor authentication
D. cross-site scripting
Answer» E.
143.

Representational State Transfer (REST) is the standard interface between

A. two machines in a lan
B. http client and user
C. http client and servers
D. none of the above
Answer» D. none of the above
144.

In 6LoWPAN address, how many bits are globally unique?

A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
Answer» D. 128 bits
145.

IEEE 802.15.4 uses which of the following for accessing the channel?

A. carrier sense multiple access (csma)
B. carrier sense multiple access with collision detection (csma-cd)
C. carrier sense multiple access with collision avoidance (csma-ca)
D. none of these
Answer» D. none of these
146.

Which of the following is not a messaging mode in CoAP?

A. confirmable
B. separate
C. direct
D. piggyback
Answer» D. piggyback
147.

Three parts of GPS include:

A. space segment
B. control segment
C. user segment
D. all of the above
Answer» E.
148.

                 is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A. cloud-physical system
B. cyber-space system
C. cyber-physical system
D. none of the above
Answer» D. none of the above
149.

                 is the degree to which nodes have a common set of connections to other nodes

A. structural hole
B. structural equivalence
C. structural cohesion
D. none of the above
Answer» D. none of the above
150.

The social circles are loosely coupled if there is                   stringency of direct contact.

A. less
B. more
C. equal
D. no
Answer» B. more