MCQOPTIONS
 Saved Bookmarks
				This section includes 228 Mcqs, each offering curated multiple-choice questions to sharpen your Graduate Aptitude Test (GATE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    Application in which set of linked hypertext files are present which displays information using text and limited graphics is | 
                            
| A. | system application | 
| B. | embedded application | 
| C. | engineering application | 
| D. | web application | 
| Answer» E. | |
| 2. | 
                                    Element that holds technology layers together and enables rational and timely development of computer software is | 
                            
| A. | hardware process | 
| B. | software process | 
| C. | control process | 
| D. | embedded process | 
| Answer» C. control process | |
| 3. | 
                                    Software designed to provide a specific capability for use by many different customers is termed as | 
                            
| A. | embedded software | 
| B. | scientific software | 
| C. | engineering software | 
| D. | product line software | 
| Answer» E. | |
| 4. | 
                                    A computer system that serves as a filter for access to and from other networks by a company's networked computers are | 
                            
| A. | firewall | 
| B. | audit trade | 
| C. | auditing information systems | 
| D. | controls for end user computing | 
| Answer» B. audit trade | |
| 5. | 
                                    Most important technology on world stage is | 
                            
| A. | computer hardware | 
| B. | computer software | 
| C. | automobile | 
| D. | play station | 
| Answer» C. automobile | |
| 6. | 
                                    Website design and implementation is example of technology targeted at | 
                            
| A. | application domain | 
| B. | technology domain | 
| C. | broad based | 
| D. | broad band | 
| Answer» B. technology domain | |
| 7. | 
                                    An internet like network within a company. The best fit will be | 
                            
| A. | intranets | 
| B. | extranets | 
| C. | applications of intranets | 
| D. | intranet technology resources | 
| Answer» B. extranets | |
| 8. | 
                                    Object oriented systems are built by technology targeted at | 
                            
| A. | application domain | 
| B. | broad based | 
| C. | technology domain | 
| D. | broad band | 
| Answer» D. broad band | |
| 9. | 
                                    ___________ Conducted at customers’ site. | 
                            
| A. | Alpha Testing | 
| B. | Beta Testing | 
| C. | Unit testing | 
| D. | System testing | 
| Answer» C. Unit testing | |
| 10. | 
                                    _____________ Conducted at developer’s site. | 
                            
| A. | Alpha Testing | 
| B. | Beta Testing | 
| C. | Unit testing | 
| D. | System testing | 
| Answer» B. Beta Testing | |
| 11. | 
                                    Law which states that 'functional content of E type systems (implemented in real world computing) must be continually increased to maintain user satisfaction over system's lifetime' is | 
                            
| A. | law of continuity growth | 
| B. | law of continuing change | 
| C. | law of conservation of organizational stability | 
| D. | law of self regulation | 
| Answer» B. law of continuing change | |
| 12. | 
                                    Gathering formal or informal technical feedback is called _________ | 
                            
| A. | Audit | 
| B. | Testing | 
| C. | Inspection | 
| D. | Unit testing | 
| Answer» D. Unit testing | |
| 13. | 
                                    Scrambling data during its transmission for | 
                            
| A. | encryption | 
| B. | control totals | 
| C. | disaster recovery | 
| D. | biometric controls | 
| Answer» B. control totals | |
| 14. | 
                                    Considering software characteristics, software doesn't wear out but it does | 
                            
| A. | mend | 
| B. | formed | 
| C. | deteriorate | 
| D. | generate | 
| Answer» D. generate | |
| 15. | 
                                    To reconstruct a system, which of the following key element(s) must be considered? | 
                            
| A. | Outputs and inputs | 
| B. | Control and processors | 
| C. | Feed back and environment | 
| D. | All of these | 
| Answer» E. | |
| 16. | 
                                    This is not a part of the signing on procedure. | 
                            
| A. | Identification | 
| B. | Verification | 
| C. | Execution | 
| D. | Authorization | 
| Answer» D. Authorization | |
| 17. | 
                                    Computer software is build and support by | 
                            
| A. | software engineers | 
| B. | telecommunication engineers | 
| C. | hardware engineers | 
| D. | civil engineers | 
| Answer» B. telecommunication engineers | |
| 18. | 
                                    Which of the following is (are) the characteristic (s) of a system ? | 
                            
| A. | Interaction | 
| B. | Organisation | 
| C. | Interdependence | 
| D. | All of these | 
| Answer» E. | |
| 19. | 
                                    Data structures that enable programs to adequately manipulate information are termed as | 
                            
| A. | hardware | 
| B. | software | 
| C. | bus | 
| D. | memory | 
| Answer» C. bus | |
| 20. | 
                                    When hardware component suffer from cumulative affects of dust, vibration, abuse, temperature extremes and many other environmental maladies, failure rate | 
                            
| A. | become zero | 
| B. | rises | 
| C. | falls | 
| D. | doesn't change | 
| Answer» C. falls | |
| 21. | 
                                    Which of following component wear out? | 
                            
| A. | software | 
| B. | hardware | 
| C. | bus | 
| D. | application | 
| Answer» C. bus | |
| 22. | 
                                    Law which states that 'Average effective global activity rate in evolving E-type system is invariant over product lifetime' is | 
                            
| A. | law of increasing complexity | 
| B. | law of continuing change | 
| C. | law of conservation of organizational stability | 
| D. | law of self regulation | 
| Answer» D. law of self regulation | |
| 23. | 
                                    Examination and alteration of a system to reconstitute it in a new form is termed as | 
                            
| A. | software corruption | 
| B. | software reengineering | 
| C. | software reinstallation | 
| D. | software maintenance | 
| Answer» C. software reinstallation | |
| 24. | 
                                    All computer programs falls into broad application domain which are | 
                            
| A. | 2 | 
| B. | 5 | 
| C. | 7 | 
| D. | 10 | 
| Answer» D. 10 | |
| 25. | 
                                    Intranets use Web browsers and servers, TCP/IP client/server networks, hypermedia databases at networked Web sites, and s o on. The best fit will be | 
                            
| A. | intranets | 
| B. | extranets | 
| C. | applications of intranets | 
| D. | intranet technology resources | 
| Answer» E. | |
| 26. | 
                                    Networks that link some of the internet resources of a company to the intranets of their customers or SUPPLIERS. The best fit will be | 
                            
| A. | intranets | 
| B. | extranets | 
| C. | applications of intranets | 
| D. | intranet technology resources | 
| Answer» C. applications of intranets | |
| 27. | 
                                    Establishment and use of sound engineering principles in order to obtain economically software that is reliable and works efficiently on real machines is termed as | 
                            
| A. | computer engineering | 
| B. | software engineering | 
| C. | hardware engineering | 
| D. | civil engineering | 
| Answer» C. hardware engineering | |
| 28. | 
                                    Product that software professionals built and then support over long term is | 
                            
| A. | automobile | 
| B. | computer software | 
| C. | computer hardware | 
| D. | play station | 
| Answer» C. computer hardware | |
| 29. | 
                                    Type of system application which process largely indeterminate data is | 
                            
| A. | management utilities | 
| B. | telecommunication processors | 
| C. | compilers | 
| D. | editors | 
| Answer» C. compilers | |
| 30. | 
                                    Internets are being used to improve communication and collaboration, publish and share information, and develop application to support business operations and managerial decision making. The best fit will be | 
                            
| A. | intranets | 
| B. | extranets | 
| C. | applications of intranets | 
| D. | intranet technology resources | 
| Answer» D. intranet technology resources | |
| 31. | 
                                    A person who writes a programme for running the hardware of a computer is called | 
                            
| A. | programmer | 
| B. | data processor | 
| C. | system analyst | 
| D. | system designer | 
| Answer» B. data processor | |
| 32. | 
                                    A standard for unit testing. | 
                            
| A. | IEEE 1008 | 
| B. | IEEE 1005 | 
| C. | IEEE 1009 | 
| D. | IEEE 1000 | 
| Answer» B. IEEE 1005 | |
| 33. | 
                                    Examination of the program step by step is called ______________ | 
                            
| A. | Controlling | 
| B. | Tracing | 
| C. | Stepping | 
| D. | Testing | 
| Answer» D. Testing | |
| 34. | 
                                    Where there is a need of Software Engineering? | 
                            
| A. | For Large Software | 
| B. | To reduce Cost | 
| C. | Software Quality Management | 
| D. | All of the above | 
| Answer» E. | |
| 35. | 
                                    Law which states that 'E-type evolution processes constitute multilevel, multiloop, multiagent feedback systems and must be treated as such to achieve significant improvement over any reasonable base' is | 
                            
| A. | feedback system law | 
| B. | law of continuing change | 
| C. | law of self regulation | 
| D. | law of declining quality | 
| Answer» B. law of continuing change | |
| 36. | 
                                    Foundation of software engineering is | 
                            
| A. | source layer | 
| B. | process layer | 
| C. | single layer | 
| D. | cell layer | 
| Answer» C. single layer | |
| 37. | 
                                    Instructions that when executed provide desired features, functions and performance is | 
                            
| A. | software | 
| B. | hardware | 
| C. | memory | 
| D. | bus | 
| Answer» B. hardware | |
| 38. | 
                                    The advantage of using prewritten software packages is | 
                            
| A. | eliminates writing program | 
| B. | eliminates program testing | 
| C. | saves time and cost | 
| D. | all of these | 
| Answer» E. | |
| 39. | 
                                    The graphical models showing the relationships between the system and its environment. | 
                            
| A. | System models | 
| B. | Software models | 
| C. | Class models | 
| D. | User models | 
| Answer» B. Software models | |
| 40. | 
                                    _______ is part of user documentation. | 
                            
| A. | Class diagram | 
| B. | Use case | 
| C. | Code comment | 
| D. | Installation guide | 
| Answer» E. | |
| 41. | 
                                    Another name for white-box testing is ___________ | 
                            
| A. | Control testing | 
| B. | Graybox | 
| C. | Glassbox | 
| D. | Black box | 
| Answer» D. Black box | |
| 42. | 
                                    Software is a | 
                            
| A. | logical element | 
| B. | physical element | 
| C. | mathematical element | 
| D. | control element | 
| Answer» B. physical element | |
| 43. | 
                                    Software engineering is a | 
                            
| A. | single layer technology | 
| B. | cell technology | 
| C. | wireless technology | 
| D. | layered technology | 
| Answer» E. | |
| 44. | 
                                    Law which states that 'E type systems (implemented in real world computing) must be adapted or else they become progressively less satisfactory is | 
                            
| A. | law of continuing change | 
| B. | law of increasing complexity | 
| C. | law of self regulation | 
| D. | law of conservation of organizational stability | 
| Answer» B. law of increasing complexity | |
| 45. | 
                                    RUP stands for____________ created by a division of ____________. | 
                            
| A. | Rational Unified Program, IBM | 
| B. | Rational Unified Process, Infosys | 
| C. | Rational Unified Process, Microsoft | 
| D. | Rational Unified Process, IBM | 
| Answer» E. | |
| 46. | 
                                    A system can be defined as | 
                            
| A. | a collection of people, machines, and methods organized to accomplish a set of functions | 
| B. | an integrated whole that is composed of diverse, interacting specialized structures and subfunctions | 
| C. | a group of subsystems united by some interaction or interdependence performing many duties but functioning as a single unit | 
| D. | all of these | 
| Answer» E. | |
| 47. | 
                                    The best file organization in which one has to process all data records in a file called | 
                            
| A. | Indexed | 
| B. | Sequential | 
| C. | Direct access | 
| D. | Random access | 
| Answer» C. Direct access | |
| 48. | 
                                    In a democratic team | 
                            
| A. | everyone is assigned duties that fit their individual strengths | 
| B. | one programmer is assigned responsibility for the entire software project | 
| C. | one hacker uses other people's work by purchasing libraries of re-usable programs, downloading programs from computer networks, and exchanging code with other hackers | 
| D. | none of these | 
| Answer» B. one programmer is assigned responsibility for the entire software project | |
| 49. | 
                                    A software program that is outdated or obsolete is termed as | 
                            
| A. | legacy application | 
| B. | engineering application | 
| C. | embedded application | 
| D. | open source application | 
| Answer» B. engineering application | |
| 50. | 
                                    In the system concepts the term Interdependence | 
                            
| A. | implies structure and order | 
| B. | refers to the holism of systems | 
| C. | means that parts of the computer system depend on one another | 
| D. | refers to the manner in which each component functions with other components of the system | 
| Answer» D. refers to the manner in which each component functions with other components of the system | |