Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 289 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following term is best defined by the statement “In a distributed system, several processes may operate at the same time on separate computers on the network.”?

A. concurrency
B. openness
C. resource sharing
D. fault tolerance
Answer» B. openness
2.

to produce NGrams of the desired length.

A. shnglefil
B. shinglefilter
C. singlefilter
D. collfilter
Answer» C. singlefilter
3.

depend on there being a clear separation between the presentation of information and the computations that create and process that information.

A. master-slave architectures
B. client–server systems
C. two-tier client–server architecture
D. both master-slave architectures and client–server systems
Answer» C. two-tier client–server architecture
4.

In cluster analysis of microarray data– A node is created between the                    scoring pair, and the gene expressed profiles of these two genes are averaged and the joined elements are weighted by the                     of elements they contain.

A. lowest, frequency
B. average, sequence
C. lowest, number
D. highest, number
Answer» E.
5.

Two forces whose magnitudes are in ratio of 3:5 give a resultant of 35N. If the angle of inclination is 60°, calculate the magnitude of each force.

A. 15n and35n
B. 15n and 25n
C. 10n and 15n
D. 20n and 5n
Answer» C. 10n and 15n
6.

approach of a relationship between the systems.

A. master-slave
B. asynchronous
C. synchronous
D. isochronous
Answer» B. asynchronous
7.

TCP/IP model was developed            the OSI model.

A. prior to
B. after
C. simultaneous to
D. with no link to
Answer» B. after
8.

A search key containing more than one attribute is referred to as a                     search key.

A. simple
B. composite
C. compound
D. secondary
Answer» C. compound
9.

What’s the role of lyaopunov fuction?

A. to determine stability
B. to determine convergence
C. both stability & convergence
D. none of the mentioned
Answer» B. to determine convergence
10.

The                         of all the variables in direct or complemented from is a maxterm.

A. addition
B. product
C. moduler
D. subtraction
Answer» B. product
11.

Under multiprogramming, turnaround time for short jobs is usually                   and that for long jobs is slightly

A. lengthened; shortened
B. shortened; lengthened
C. shortened; shortened
D. shortened; unchanged
Answer» C. shortened; shortened
12.

A search algorithm takes                     as an input and returns                  as an output.

A. input, output
B. problem, solution
C. solution, problem
D. parameters, sequence of actions
Answer» C. solution, problem
13.

Firefox uses                    rendering engine.

A. webkit
B. gecko
C. trident
D. presto
Answer» C. trident
14.

The                is a touring problem in which each city must be visited exactly once. The aim is to find the shortest tour.

A. finding shortest path between a source and a destination
B. travelling salesman problem
C. map coloring problem
D. depth first search traversal on a given map represented as a graph
Answer» C. map coloring problem
15.

At this point, ‘*’ is encountered. What has to be done?

A. 5*4=20 is pushed into the stack
B. * is pushed into the stack
C. 2*3=6 is pushed into the stack
D. * is ignored
Answer» B. * is pushed into the stack
16.

TCP/IP model does not have               layer but OSI model have this layer.

A. session layer
B. transport layer
C. application layer
D. network layer
Answer» B. transport layer
17.

A                     is a decision support tool that uses a tree-like graph or model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility.

A. decision tree
B. graphs
C. trees
D. neural networks
Answer» B. graphs
18.

An                           consists of a search-key value and pointers to one or more records with that value as their search-key value.

A. index entry
B. index hash
C. index cluster
D. index map
Answer» B. index hash
19.

In ordered indices the file containing the records is sequentially ordered, a                         is an index whose search key also defines the sequential order of the file.

A. clustered index
B. structured index
C. unstructured index
D. nonclustered index
Answer» B. structured index
20.

A key of type                         is generated which is used later to join ngrams with their heads and tails in the reducer phase.

A. gramkey
B. primary
C. secondary
D. none of the mentioned
Answer» B. primary
21.

Mahout provides                           libraries for common and primitive Java collections.

A. java
B. javascript
C. perl
D. python
Answer» B. javascript
22.

The generalization of cross-tab which is represented visually is                           which is also called as data cube.

A. two dimensional cube
B. multidimensional cube
C. n-dimensional cube
D. cuboid
Answer» B. multidimensional cube
23.

data.

A. multidimensional
B. singledimensional
C. measured
D. dimensional
Answer» B. singledimensional
24.

In a                 clustering index, the index record contains the search-key value and a pointer to the first data record with that search- key value and the rest of the records will be in the sequential pointers.

A. dense
B. sparse
C. straight
D. continuous
Answer» B. sparse
25.

does not restrict contributions to Hadoop based implementations.

A. mahout
B. oozie
C. impala
D. all of the mentioned
Answer» B. oozie
26.

A                   value is represented by a

A. numerical logic
B. boolean algebra
C. arithmetic logic
D. boolean number
Answer» D. boolean number
27.

Orders are processed in the sequence they arrive if                rule sequences the jobs.

A. earliest due date
B. slack time remaining
C. first come, first served
D. critical ratio
Answer» D. critical ratio
28.

approach is used.

A. load configuration
B. fifo
C. bankers algorithm
D. round robin
Answer» E.
29.

The purpose of fisher.test() is                test for contingency table.

A. chisq
B. fisher
C. prop
D. stem
Answer» C. prop
30.

In cluster analysis of microarray data– For n genes, the process is repeated                   times until a single element remains.

A. n2
B. n
C. n-1
D. n-4
Answer» D. n-4
31.

Starting position of an object is represented as x=5.1±0.2m and finishing position as y=6.9±0.3m. What will be the displacement and error in displacement?

A. displacement = 1m, error = 0.5m
B. displacement = 2m, error = 0.36m
C. displacement = 1.8m, error = 0.36m
D. displacement = 1.5m, error = 0.4m
Answer» D. displacement = 1.5m, error = 0.4m
32.

Transmission data rate is decided by

A. network layer
B. physical layer
C. data link layer
D. transport layer
Answer» C. data link layer
33.

Which layer provides the services to user?

A. application layer
B. session layer
C. presentation layer
D. physical layer
Answer» B. session layer
34.

Which layer is responsible for process to process delivery in a general network model?

A. network layer
B. transport layer
C. session layer
D. data link layer
Answer» C. session layer
35.

TCP/IP model was developed            the OSI model.

A. prior to
B. after
C. simultaneous to
D. with no link to
Answer» B. after
36.

TCP/IP model does not have               layer but OSI model have this layer.

A. session layer
B. transport layer
C. application layer
D. network layer
Answer» B. transport layer
37.

While solving a system of linear equations, which of the following will be the order of the decomposed matrices; L and U?

A. order of l = 3x1, order of u = 1x3
B. order of l = 3x2, order of u = 2x3
C. order of l = 3x3, order of u = 3x3
D. order of l = 3x4, order of u = 4x3
Answer» D. order of l = 3x4, order of u = 4x3
38.

Which layer is used to link the network support layers and user support layers?

A. session layer
B. data link layer
C. transport layer
D. network layer
Answer» D. network layer
39.

What is the condition applied in factorization method?

A. matrix should not be singular
B. back substitution should be done
C. there must exist a diagonal matrix form of the given matrix
D. all principal minors of the matrix should be non-singular
Answer» E.
40.

Errors may occur in performing numerical computation on the computer due to which of the following reasons?

A. rounding errors
B. power fluctuation
C. operator fatigue
D. back substitution
Answer» B. power fluctuation
41.

What is the other name for factorization method?

A. doolittle’s method
B. lin bairstow method
C. muller’s method
D. decomposition method
Answer» B. lin bairstow method
42.

What is the principle of factorization?

A. there exists no inverse for a singular matrix
B. determinant of an identity matrix is one
C. every square matrix can be expressed as a product of a lower triangular matrix and upper triangular matrix
D. every matrix can be expressed as a sum of a skew symmetric and a symmetric matrix
Answer» D. every matrix can be expressed as a sum of a skew symmetric and a symmetric matrix
43.

Which of the following step is not involved in the factorization process?

A. converting the given system to matrix form
B. the matrix is decomposed into the product of lower and upper triangular matrix
C. finding the unknowns using matrix multiplication
D. elimination of unknowns using back substitution
Answer» E.
44.

The LU method of factorization was introduced by the mathematician

A. alan tango
B. david hilbert
C. g. w. leibniz
D. alex grothendieck
Answer» B. david hilbert
45.

integrated into the process that is used to create vectors from sequence files of text keys and values.

A. lbr
B. lcr
C. llr
D. lar
Answer» D. lar
46.

unique ngrams or ngram fragments across multiple documents.

A. colloccombiner
B. collocreducer
C. collocmerger
D. none of the mentioned
Answer» B. collocreducer
47.

A key of type                         is generated which is used later to join ngrams with their heads and tails in the reducer phase.

A. gramkey
B. primary
C. secondary
D. none of the mentioned
Answer» B. primary
48.

                          to produce NGrams of the desired length.

A. shnglefil
B. shinglefilter
C. singlefilter
D. collfilter
Answer» C. singlefilter
49.

identification algorithm which scores collocations using log-likelihood ratio.

A. collocation
B. compaction
C. collection
D. none of the mentioned
Answer» B. compaction
50.

                    does not restrict contributions to Hadoop based implementations.

A. mahout
B. oozie
C. impala
D. all of the mentioned
Answer» B. oozie