Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1294 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1001.

                     is increasingly being used in server systems to improve performance by caching frequently used data, since it provides faster access than disk, with larger storage capacity than main memory.

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» B. disk
1002.

The flash memory storage used are

A. nor flash
B. or flash
C. and flash
D. all of the mentioned
Answer» B. or flash
1003.

Which of the following requires no password travel across the internet?

A. readable system
B. manipulation system
C. challenge–response system
D. response system
Answer» D. response system
1004.

The                    is the fastest and most costly form of storage, which is relatively small; its use is managed by the computer system hardware.

A. cache
B. disk
C. main memory
D. flash memory
Answer» B. disk
1005.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?

A. round key algorithm
B. public key algorithm
C. advanced encryption standard
D. asymmetric key algorithm
Answer» D. asymmetric key algorithm
1006.

Which of the following stores several gigabytes of data but usually lost when power failure?

A. flash memory
B. disk
C. main memory
D. secondary memory
Answer» D. secondary memory
1007.

Encryption of small values, such as identifiers or names, is made complicated by the possibility of

A. dictionary attacks
B. database attacks
C. minor attacks
D. random attacks
Answer» B. database attacks
1008.

In which of the following encryption key is used to encrypt and decrypt the data?

A. public key
B. private key
C. symmetric key
D. asymmetric key
Answer» D. asymmetric key
1009.

Which of the following is not a property of good encryption technique?

A. relatively simple for authorized users to encrypt and decrypt data
B. decryption key is extremely difficult for an intruder to determine
C. encryption depends on a parameter of the algorithm called the encryption key
D. none of the mentioned
Answer» E.
1010.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

A. encryption key
B. decryption key
C. primary key
D. authorised key
Answer» C. primary key
1011.

                       is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

A. encryption
B. data mining
C. internet security
D. architectural security
Answer» B. data mining
1012.

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a                             mechanism.

A. row-level authorization
B. column-level authentication
C. row-type authentication
D. authorization security
Answer» B. column-level authentication
1013.

                               allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

A. openid
B. single-site system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» E.
1014.

The                                        is a standard for exchanging authentication and authorization information between different security domains, to provide cross- organization single sign-on.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» D. virtual private database (vpd)
1015.

A single                              further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

A. openid
B. sign-on system
C. security assertion markup language (saml)
D. virtual private database (vpd)
Answer» C. security assertion markup language (saml)
1016.

                   is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» C. cross-site scripting
1017.

A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users, is potentially vulnerable to a kind of attack called a                                        attack.

A. two-factor authentication
B. cross-site request forgery
C. cross-site scripting
D. cross-site scoring scripting
Answer» D. cross-site scoring scripting
1018.

In                                    attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

A. sql injection
B. sql
C. direct
D. application
Answer» B. sql
1019.

Each array declaration need not give, implicitly or explicitly, the information about

A. the name of array
B. the data type of array
C. the first data from the set to be stored
D. the index set of the array
Answer» D. the index set of the array
1020.

Linked lists are best suited

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
1021.

Arrays are best data structures

A. for relatively permanent collections of data
B. for the size of the structure and the data in the structure are constantly changing
C. all of the mentioned
D. none of the mentioned
Answer» B. for the size of the structure and the data in the structure are constantly changing
1022.

Finding the location of the element with a given value is:

A. traversal
B. search
C. sort
D. none of the mentioned
Answer» C. sort
1023.

The operation of processing each element in the list is known as

A. sorting
B. merging
C. inserting
D. traversal
Answer» E.
1024.

Which of the following data structure is linear data structure?

A. trees
B. graphs
C. arrays
D. none of the mentioned
Answer» D. none of the mentioned
1025.

Which of the following queries displays the sum of all employee salaries for those employees not making commission, for each job, including only those sums greater than 2500?

A. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null;
B. select job, sum(sal) from emp where comm is null group by job having sum(sal) > 2500;
C. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job;
D. select job, sum(sal) from emp group by job having sum(sal) > 2500 and comm is not null;
Answer» C. select job, sum(sal) from emp where sum(sal) > 2500 and comm is null group by job;
1026.

Which of the following data structure is not linear data structure?

A. arrays
B. linked lists
C. arrays & linked lists
D. none of the mentioned
Answer» E.
1027.

Which of the following queries are legal?

A. select deptno, count(deptno) from emp group by ename;
B. select deptno, count(deptno), job from emp group by deptno;
C. select deptno, avg(sal) from emp;
D. select deptno, avg(sal) from emp group by deptno;
Answer» E.
1028.

Which of the following rule below are categories of an index?

A. column and functional
B. multiple column and functional
C. column, multiple column and functional
D. none of the mentioned
Answer» B. multiple column and functional
1029.

The ORDER BY clause can only be used in

A. select queries
B. insert queries
C. group by queries
D. having queries
Answer» B. insert queries
1030.

How to force a log switch?

A. by using alter system log
B. by using alter system switch logfile
C. by using alter system switch logs
D. by using alter sys logfiles
Answer» C. by using alter system switch logs
1031.

DML changes are

A. insert
B. update
C. create
D. both insert and update
Answer» E.
1032.

Which schema object instructs Oracle to connect to a remotely access an object of a database?

A. sequence
B. remote link
C. database link
D. data link
Answer» E.
1033.

Which of the following object types below cannot be replicated?

A. data
B. trigger
C. view
D. sequence
Answer» E.
1034.

The                            layer, which provides a high-level view of data and actions on data.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» B. presentation
1035.

What are the portability concerns founded in Seeheim model?

A. replacing the presentation toolkit
B. replacing the application toolkit
C. replacing the dialogue toolkit
D. replacing the presentation & application toolkit
Answer» E.
1036.

Which of the following is the main task accomplished by the user?

A. compose a document
B. create a spread sheet
C. send mail
D. all of the mentioned
Answer» E.
1037.

Which among the following are the functions that any system with a user interface must provide?

A. presentation
B. dialogue
C. all of the mentioned
D. none of the mentioned
Answer» B. dialogue
1038.

The                            system is widely used for mapping from Java objects to relations.

A. hibernate
B. object oriented
C. objective
D. none of the mentioned
Answer» B. object oriented
1039.

The                              layer, which provides the interface between the business-logic layer and the underlying database.

A. business logic
B. presentation
C. user interaction
D. data access
Answer» E.
1040.

Which of the unit operation is used in Model view controller?

A. is a decomposition
B. part whole decomposition
C. all of the mentioned
D. none of the mentioned
Answer» C. all of the mentioned
1041.

Memory address refers to the successive memory words and the machine is called as

A. word addressable
B. byte addressable
C. bit addressable
D. terra byte addressable
Answer» B. byte addressable
1042.

Which of the following is true for Seeheim model?

A. presentation is abstracted from dialogue and application
B. presentation and dialogue is abstracted from application
C. presentation and application is abstracted from dialogue
D. none of the mentioned
Answer» B. presentation and dialogue is abstracted from application
1043.

Where is metadata stored in MySQL?

A. in the mysql database metadata
B. in the mysql database metasql
C. in the mysql database mysql
D. none of the mentioned
Answer» D. none of the mentioned
1044.

What is bytecode?

A. machine-specific code
B. java code
C. machine-independent code
D. none of the mentioned
Answer» D. none of the mentioned
1045.

A JSP is transformed into a(n):

A. java applet
B. java servlet
C. either 1 or 2 above
D. neither 1 nor 2 above
Answer» C. either 1 or 2 above
1046.

What MySQL property is used to create a surrogate key in MySQL?

A. unique
B. sequence
C. auto_increment
D. none of the mentioned
Answer» D. none of the mentioned
1047.

Which JDBC driver Type(s) can be used in either applet or servlet code?

A. both type 1 and type 2
B. both type 1 and type 3
C. both type 3 and type 4
D. type 4 only
Answer» D. type 4 only
1048.

How many JDBC driver types does Sun define?

A. one
B. two
C. three
D. four
Answer» E.
1049.

The Java                      specification defines an application programming interface for communication between the Web server and the application program.

A. servlet
B. server
C. program
D. randomize
Answer» B. server
1050.

How many levels of headings are in html:

A. 2
B. 7
C. 6
D. 4
Answer» D. 4