Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 347 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

In a feed- forward networks, the conncetions between layers are ___________ from input tooutput.

A. bidirectional.
B. unidirectional.
C. multidirectional.
D. directional.
Answer» C. multidirectional.
2.

The ___________is a long, single fibre that originates from the cell body.

A. axon.
B. neuron.
C. dendrites.
D. strands.
Answer» B. neuron.
3.

Query tool is meant for __________.

A. data acquisition.
B. information delivery.
C. information exchange.
D. communication.
Answer» B. information delivery.
4.

___________ training may be used when a clear link between input data sets and target output valuesdoes not exist.

A. competitive.
B. perception.
C. supervised.
D. unsupervised.
Answer» E.
5.

Data scrubbing is _____________.

A. a process to reject data from the data warehouse and to create the necessary indexes.
B. a process to load the data in the data warehouse and to create the necessary indexes.
C. a process to upgrade the quality of data after it is moved into a data warehouse.
D. a process to upgrade the quality of data before it is moved into a data warehouse
Answer» E.
6.

A predictive model makes use of ________.

A. current data.
B. historical data.
C. both current and historical data.
D. assumptions.
Answer» C. both current and historical data.
7.

RBF hidden layer units have a receptive field which has a ____________; that is, a particular inputvalue at which they have a maximal output.

A. top.
B. bottom.
C. centre.
D. border.
Answer» D. border.
8.

The RSES system was developed in ___________.

A. poland.
B. italy.
C. england.
D. america.
Answer» B. italy.
9.

__________ is used to proceed from very specific knowledge to more general information.

A. induction.
B. compression.
C. approximation.
D. substitution.
Answer» B. compression.
10.

Synapse is

A. A class of graphic techniques used to visualize the contents of a database
B. The division of a certain space into various areas based on guide points.
C. A branch that connects one node to another
D. None of these
Answer» D. None of these
11.

The dimension tables describe the _________.

A. entities.
B. facts.
C. keys.
D. units of measures.
Answer» C. keys.
12.

Bill Inmon has estimated___________of the time required to build a data warehouse, is consumed inthe conversion process.

A. 10 percent.
B. 20 percent.
C. 40 percent
D. 80 percent.
Answer» E.
13.

Metadata contains atleast _________.

A. the structure of the data.
B. the algorithms used for summarization.
C. the mapping from the operational environment to the data warehouse.
D. all of the above.
Answer» E.
14.

The data from the operational environment enter _______ of data warehouse.

A. current detail data.
B. older detail data.
C. lightly summarized data.
D. highly summarized data.
Answer» B. older detail data.
15.

Massively parallel machine is

A. A programming language based on logic
B. A computer where each processor has its own operating system, its own memory, and its own hard disk
C. Describes the structure of the contents of a database.
D. None of these
Answer» C. Describes the structure of the contents of a database.
16.

Converting data from different sources into a common format for processing is called as________.

A. selection.
B. preprocessing
C. transformation
D. interpretation
Answer» D. interpretation
17.

Effect of one attribute value on a given class is independent of values of other attribute is called_________.

A. value independence.
B. class conditional independence.
C. conditional independence.
D. unconditional independence.
Answer» B. class conditional independence.
18.

Bill Inmon has estimated___________of the time required to build a data warehouse, is consumedin the conversion process.

A. 10 percent.
B. 20 percent.
C. 40 percent
D. 80 percent.
Answer» E.
19.

Genetic algorithms are search algorithms based on the mechanics of natural_______.

A. systems.
B. genetics.
C. logistics.
D. statistics.
Answer» C. logistics.
20.

________is a generalization of Manhattan, Euclidean and Max Distance

A. euclidean distance
B. minkowski distance
C. manhattan distance
D. jaccard distance
Answer» C. manhattan distance
21.

Which small logical units do data warehouses hold large amounts of information?

A. data storage
B. data marts
C. access layers
D. data miners
Answer» C. access layers
22.

Key is referred to

A. Non-trivial extraction of implicit previously unknown and potentially useful information from dat(A)
B. Set of columns in a database table that can be used to identify each record within this table uniquely
C. collection of interesting and useful patterns in a database
D. none of these
Answer» C. collection of interesting and useful patterns in a database
23.

SOMs are used to cluster a specific _____________ dataset containing information about thepatient's drugs etc.

A. physical.
B. logical.
C. medical.
D. technical.
Answer» D. technical.
24.

____________ of data means that the attributes within a given entity are fully dependent on theentire primary key of the entity.

A. additivity.
B. granularity.
C. functional dependency.
D. dependency.
Answer» D. dependency.
25.

Classification rules are extracted from _____________.

A. root node.
B. decision tree.
C. siblings.
D. branches.
Answer» C. siblings.
26.

Investment analysis used in neural networks is to predict the movement of _________ fromprevious data.

A. engines.
B. stock.
C. patterns.
D. models.
Answer» C. patterns.
27.

Rule based classification algorithms generate ______ rule to perform the classification.

A. if-then.
B. while.
C. do while.
D. switch.
Answer» B. while.
28.

GAs were developed in the early _____________.

A. 1970.
B. 1960.
C. 1950.
D. 1940.
Answer» B. 1960.
29.

Data that are not of interest to the data mining task is called as ______.

A. missing data.
B. changing data.
C. irrelevant data.
D. noisy data.
Answer» D. noisy data.
30.

Cardinality of an attribute is

A. It is a memory buffer that is used to store data that is needed frequently by an algorithm in order to minimize input/ output traffic
B. The number of different values that a given attribute can take
C. A mathematical conception of space where the location of a point is given by reference to its distance from two or three axes intersecting at right angles
D. None of these
Answer» C. A mathematical conception of space where the location of a point is given by reference to its distance from two or three axes intersecting at right angles
31.

Dimensionality reduction reduces the data set size by removing ____________.

A. relevant attributes.
B. irrelevant attributes.
C. derived attributes.
D. composite attributes.
Answer» C. derived attributes.
32.

Decision support systems (DSS) is

A. A family of relational database management systems marketed by IBM
B. Interactive systems that enable decision makers to use databases and models on a computer in order to solve ill- structured problems
C. It consists of nodes and branches starting from a single root node. Each node represents a test, or decision.
D. None of these
Answer» C. It consists of nodes and branches starting from a single root node. Each node represents a test, or decision.
33.

Vector

A. It do not need the control of the human operator during their execution.
B. An arrow in a multi-dimensional space. It is a quantity usually characterized by an ordered set of scalars.
C. The validation of a theory on the basis of a finite number of examples.
D. None of these
Answer» C. The validation of a theory on the basis of a finite number of examples.
34.

________________ is a data transformation process.

A. comparison.
B. projection.
C. selection.
D. filtering.
Answer» E.
35.

_______________ helps to integrate, maintain and view the contents of the data warehousing system.

A. business directory.
B. information directory.
C. data dictionary.
D. database.
Answer» C. data dictionary.
36.

The most common source of change data in refreshing a data warehouse is _______.

A. queryable change data.
B. cooperative change data.
C. logged change data.
D. snapshot change data.
Answer» B. cooperative change data.
37.

Falsification is

A. Modular design of a software application that facilitates the integration of new modules
B. Showing a universal law or rule to be invalid by providing a counter example
C. A set of attributes in a database table that refers to data in another table
D. None of these
Answer» C. A set of attributes in a database table that refers to data in another table
38.

After the pruning of a priori algorithm, _______ will remain.

A. only candidate set.
B. no candidate set.
C. only border set.
D. no border set.
Answer» C. only border set.
39.

GA was introduced in the year __________.

A. 1955.
B. 1965.
C. 1975.
D. 1985.
Answer» D. 1985.
40.

_____________ is a complex chemical process in neural networks.

A. receiving process.
B. sending process.
C. transmission process.
D. switching process.
Answer» D. switching process.
41.

A link is said to be _________ link if it is between pages with different domain names.

A. intrinsic.
B. transverse.
C. direct.
D. contrast.
Answer» C. direct.
42.

The problem of dimensionality curse involves ___________.

A. the use of some attributes may interfere with the correct completion of a data mining task.
B. the use of some attributes may simply increase the overall complexity.
C. some may decrease the efficiency of the algorithm.
D. all of the above.
Answer» E.
43.

Prediction can be viewed as forecasting a_________value.

A. non-continuous.
B. constant.
C. continuous.
D. variable.
Answer» D. variable.
44.

Itemsets in the ______ category of structures have a counter and the stop number with them.

A. dashed.
B. circle.
C. box.
D. solid.
Answer» B. circle.
45.

Subject orientation

A. The science of collecting, organizing, and applying numerical facts
B. Measure of the probability that a certain hypothesis is incorrect given certain observations.
C. One of the defining aspects of a data warehouse, which is specially built around all the existing applications of the operational dat(A)
D. None of these
Answer» D. None of these
46.

The KDD process consists of ________ steps.

A. three.
B. four.
C. five.
D. six.
Answer» D. six.
47.

The basic idea of the apriori algorithm is to generate________ item sets of a particular size & scansthe database.

A. candidate.
B. primary.
C. secondary.
D. superkey.
Answer» B. primary.
48.

The first phase of A Priori algorithm is _______.

A. candidate generation.
B. itemset generation.
C. pruning.
D. partitioning.
Answer» B. itemset generation.
49.

MDDB stands for ___________.

A. multiple data doubling.
B. multidimensional databases.
C. multiple double dimension.
D. multi-dimension doubling.
Answer» C. multiple double dimension.
50.

____________ are a different paradigm for computing which draws its inspiration fromneuroscience.

A. computer networks.
B. neural networks.
C. mobile networks.
D. artificial networks.
Answer» C. mobile networks.