MCQOPTIONS
 Saved Bookmarks
				This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 651. | 
                                    )CMM model is a technique to( | 
                            
| A. | Improve the software process | 
| B. | Automatically develop the software | 
| C. | Test the software | 
| D. | All of the above | 
| Answer» B. Automatically develop the software | |
| 652. | 
                                    Cities, states and country can be defined as | 
                            
| A. | Subsystem – Cities, states: System – country | 
| B. | Subsystem – state :System– country, cities | 
| C. | Subsystem – Country: System– cities, state | 
| D. | Subsystem– Country, state: System– Cities | 
| Answer» B. Subsystem – state :System– country, cities | |
| 653. | 
                                    Quality plan describes | 
                            
| A. | Quality procedure and standards | 
| B. | Approaches, resources and schedules | 
| C. | Configuration management and structure | 
| D. | None of these | 
| Answer» B. Approaches, resources and schedules | |
| 654. | 
                                    The most desirable form of cohesion is( | 
                            
| A. | Logical cohesion | 
| B. | Procedural cohesion | 
| C. | Functional cohesion | 
| D. | Temporal cohesion | 
| Answer» D. Temporal cohesion | |
| 655. | 
                                    In Data reduction | 
                            
| A. | Here data-flow diagram show, how data is processed at different stages in the system. | 
| B. | It registers all/ selected activities of a computer system. | 
| C. | Technique used to transform raw data into a more useful form. | 
| D. | Data is shifted to modern data base management system. | 
| Answer» D. Data is shifted to modern data base management system. | |
| 656. | 
                                    Relational schemas and other metadata about relations are stored in a structure called the____________ | 
                            
| A. | Metadata | 
| B. | Catalog | 
| C. | Log | 
| D. | Data Dictionary | 
| Answer» E. | |
| 657. | 
                                    Attribute-based identification is | 
                            
| A. | Here each component has a unique name and an associated set of attribute, which differs for each version of component | 
| B. | Extent to which a software system records information concerning transactions performed against the system. | 
| C. | Extent to which a system or component is operational and accessible when required for use | 
| D. | They are used to describe the over all behavior of the system. Auditable is | 
| Answer» B. Extent to which a software system records information concerning transactions performed against the system. | |
| 658. | 
                                    Spiral development involves | 
                            
| A. | Risk assessment | 
| B. | Reduction of risk | 
| C. | A and B both | 
| D. | None of these | 
| Answer» D. None of these | |
| 659. | 
                                    --------means that parts of the organization depend on one another | 
                            
| A. | Interaction | 
| B. | Interdependence | 
| C. | Integration | 
| D. | Central Objective | 
| Answer» C. Integration | |
| 660. | 
                                    Lehman’s Fourth Law (Lehman and Belady 1985) is | 
                            
| A. | Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development. | 
| B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. | 
| C. | Large program evolution: Program evolution is a self-regulating process. | 
| D. | None of these | 
| Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. | |
| 661. | 
                                    Software engineering needed for building -----------systems in a timely manner with highquality. | 
                            
| A. | Software | 
| B. | Hardware | 
| C. | Process | 
| D. | All of above | 
| Answer» B. Hardware | |
| 662. | 
                                    Sensor component | 
                            
| A. | Causes changes in system environment | 
| B. | Communicate with other components | 
| C. | Collects information from system environment | 
| D. | Coordinate the operation of other components. | 
| Answer» D. Coordinate the operation of other components. | |
| 663. | 
                                    A clearly defined objective, entry and exit conditions which is normally is atomic is referred as | 
                            
| A. | Active objects | 
| B. | Activity | 
| C. | Adaptability | 
| D. | None of these | 
| Answer» C. Adaptability | |
| 664. | 
                                    Iterative model includes | 
                            
| A. | Waterfall model | 
| B. | Sequential model | 
| C. | Incremental development | 
| D. | Random model | 
| Answer» E. | |
| 665. | 
                                    System architecture model identifies | 
                            
| A. | Hardware components | 
| B. | Software components | 
| C. | Virtual components and software components | 
| D. | Hardware and software components both | 
| Answer» E. | |
| 666. | 
                                    Enduring requirements | 
                            
| A. | Emerges due to user’s understanding of system develops, during system development | 
| B. | Requirements derived from the core activity of the organization and directly related to the domain of the system* | 
| C. | Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. | 
| D. | None of these. | 
| Answer» C. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system. | |
| 667. | 
                                    Cost estimation is | 
                            
| A. | Process of estimating the costs associated with software development projects that include the effort, time, and labor required. | 
| B. | Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. | 
| C. | Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations. | 
| D. | Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system. | 
| Answer» B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth. | |
| 668. | 
                                    Concept of software engineering is applicable to( | 
                            
| A. | FORTRAN language only | 
| B. | Pascal language only | 
| C. | ‘C’ language only | 
| D. | All of the above | 
| Answer» E. | |
| 669. | 
                                    Sub system is | 
                            
| A. | Dependent system | 
| B. | Independent system | 
| C. | Component | 
| D. | None of these | 
| Answer» C. Component | |
| 670. | 
                                    System analyst consist of following tasks: | 
                            
| A. | Problem identification | 
| B. | Problem understanding | 
| C. | Analysis Problem | 
| D. | All of the above | 
| Answer» B. Problem understanding | |
| 671. | 
                                    Floating point process is a | 
                            
| A. | Communication component | 
| B. | Computation component | 
| C. | Coordination component | 
| D. | Sensor component | 
| Answer» C. Coordination component | |
| 672. | 
                                    Beta testing is done a | 
                            
| A. | User’s end | 
| B. | Developer’s end | 
| C. | User’s & Developer’s end | 
| D. | None of the mentioned | 
| Answer» B. Developer’s end | |
| 673. | 
                                    Match the following : A-Control metrics : B- Process metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation | 
                            
| A. | A-1, B-2,C-3,D-4 | 
| B. | A-4,B-3,C-2,D-1 | 
| C. | A-3, B-2,C-1,D-4 | 
| D. | None is true | 
| Answer» B. A-4,B-3,C-2,D-1 | |
| 674. | 
                                    Why is Requirements Elicitation a difficult task? | 
                            
| A. | Problem of scope | 
| B. | Problem of understanding | 
| C. | Problem of volatility | 
| D. | All of the mentioned | 
| Answer» E. | |
| 675. | 
                                    Exhaustive testing | 
                            
| A. | always possible | 
| B. | practically possible | 
| C. | impractical but possible | 
| D. | impractical and impossible | 
| Answer» D. impractical and impossible | |
| 676. | 
                                    Here the state of the object changes by internal operations executing within the object itself. And also object continually executes and operations never suspend itself is referred as | 
                            
| A. | Active objects | 
| B. | Activity | 
| C. | Adaptability | 
| D. | None of these | 
| Answer» B. Activity | |
| 677. | 
                                    Each maturity model is CMM has( | 
                            
| A. | One KPA | 
| B. | Equal KPAs | 
| C. | Several KPAs | 
| D. | no KPA | 
| Answer» D. no KPA | |
| 678. | 
                                    In Broadcast models | 
                            
| A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. | 
| B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested | 
| C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. | 
| D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. | 
| Answer» D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. | |
| 679. | 
                                    RAD stands f | 
                            
| A. | Relative Application Development | 
| B. | Rapid Application Development | 
| C. | Rapid Application Document | 
| D. | None of the mentioned | 
| Answer» C. Rapid Application Document | |
| 680. | 
                                    ) Beta testing is carried out by( | 
                            
| A. | Users | 
| B. | Developers | 
| C. | Testers | 
| D. | All of the above | 
| Answer» B. Developers | |
| 681. | 
                                    -------------- The functional independence of program componets. | 
                            
| A. | Error tolerance | 
| B. | Training | 
| C. | Modularity | 
| D. | Simplicity | 
| Answer» D. Simplicity | |
| 682. | 
                                    Safety validation is | 
                            
| A. | Associated with the role of people involved in software process and the activities for which they are responsible. | 
| B. | The most effective technique for demonstrating the safety of a system is proof by contradiction. | 
| C. | It is concerned with establishing a confidence level in the system that might vary from low to high | 
| D. | None of these | 
| Answer» D. None of these | |
| 683. | 
                                    Each entity has a set of _____________ | 
                            
| A. | Entity | 
| B. | Attribute | 
| C. | Row | 
| D. | None | 
| Answer» C. Row | |
| 684. | 
                                    -------------is a unit that is part of a larger system that means a larger system divided intosubparts the subpart is known as -------------- | 
                            
| A. | Execution Information system(EIS) | 
| B. | Integrated system | 
| C. | Subsystem | 
| D. | Transaction processing system | 
| Answer» D. Transaction processing system | |
| 685. | 
                                    Cost estimation for a project may include( | 
                            
| A. | Software Cost | 
| B. | Hardware Cost | 
| C. | Personnel Costs | 
| D. | All of the above | 
| Answer» E. | |
| 686. | 
                                    Which of the following Requirement Elicitation Techniques is applicable to messy, changingand ill-defined problem situations? | 
                            
| A. | Quality Function Deployment (QFD) | 
| B. | Prototyping | 
| C. | Soft Systems Methodology (SSM) | 
| D. | Controlled Requirements Expression (CORE) | 
| Answer» D. Controlled Requirements Expression (CORE) | |
| 687. | 
                                    If project is the enhancement of existing system, which model is best suited?( | 
                            
| A. | Waterfall model | 
| B. | Prototyping model | 
| C. | Iterative enhancement model | 
| D. | Spiral model | 
| Answer» D. Spiral model | |
| 688. | 
                                    ) In Basic execution time model, additional number of failures required to achieve a failure intensity objective is expressed as( | 
                            
| A. | 0/λ0(λP - λF) | 
| B. | ) 0/λ0(λF – λP) | 
| C. | λ0 0(λF – λP) | 
| D. | λ0/ 0 (λP - λF) | 
| Answer» B. ) 0/λ0(λF – λP) | |
| 689. | 
                                    Which of the property of software modularity is incorrect with respect to benefitssoftware modularity? | 
                            
| A. | Modules are robust | 
| B. | Module can use other modules | 
| C. | Modules Can be separately compiled and stored in a library | 
| D. | Modules are mostly dependent | 
| Answer» E. | |
| 690. | 
                                    structured design was developed by ----- and --------------------. | 
                            
| A. | ED Yourdon and Larry constatine | 
| B. | By codd | 
| C. | All of these | 
| D. | None of these | 
| Answer» B. By codd | |
| 691. | 
                                    ---------- The degree to which full implementation of required function has been achieved. | 
                            
| A. | Error tolerance | 
| B. | Training | 
| C. | Completeness | 
| D. | Simplicity | 
| Answer» D. Simplicity | |
| 692. | 
                                    CASE Workbench | 
                            
| A. | A measure of the amount of work a system can perform | 
| B. | It provides automated support for software process. | 
| C. | Support individual process tasks | 
| D. | Set of tools to support a particular phase of software process such as design, implementation or testing | 
| Answer» B. It provides automated support for software process. | |
| 693. | 
                                    Fail safe is | 
                            
| A. | Trustworthiness with which a system or component can be modified to increase its storage or functional capacity | 
| B. | Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure. | 
| C. | Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures. | 
| D. | None of these | 
| Answer» E. | |
| 694. | 
                                    ) A decision table has( | 
                            
| A. | Four portions | 
| B. | Three portions | 
| C. | Five portions | 
| D. | Two portions | 
| Answer» B. Three portions | |
| 695. | 
                                    Capacity is | 
                            
| A. | A measure of the amount of work a system can perform | 
| B. | It provides automated support for software process. | 
| C. | Support individual process tasks | 
| D. | Set of tools to support a particular phase of software process such as design, implementation or testing. | 
| Answer» B. It provides automated support for software process. | |
| 696. | 
                                    Hazard | 
                            
| A. | Hazard cannot arise due system design. | 
| B. | The probability of the event occurring which create a hazard. | 
| C. | An assessment of the worst possible damage, which could result from a particular hazard. | 
| D. | A condition with the potential for causing or contributing to an accident. | 
| Answer» E. | |
| 697. | 
                                    In ISO 9126, each characteristic is related to( | 
                            
| A. | one attributes | 
| B. | two attributes | 
| C. | three attributes | 
| D. | four attributes | 
| Answer» B. two attributes | |
| 698. | 
                                    DFD stands for( | 
                            
| A. | Data Flow design | 
| B. | Descriptive functional design | 
| C. | Data flow diagram | 
| D. | None of the above | 
| Answer» D. None of the above | |
| 699. | 
                                    This set of Basic Software Engineering Questions and Answers focuses on “FunctionOriented Software Design”. 1. Choose the option that does not define Function Oriented Software Design. | 
                            
| A. | It consists of module definitions | 
| B. | Modules represent data abstraction | 
| C. | Modules support functional abstraction | 
| D. | None of the mentioned | 
| Answer» C. Modules support functional abstraction | |
| 700. | 
                                    ) In Basic execution time model, failure intensity is given by( | 
                            
| A. | λ(µ)=λ0(1-µ2 / V0) | 
| B. | λ(µ)=λ0(1-µ / V0) | 
| C. | λ(µ)=λ0(1-V0/ µ2) | 
| D. | λ(µ)=λ0(1- V0/ µ) | 
| Answer» C. λ(µ)=λ0(1-V0/ µ2) | |