Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

651.

)CMM model is a technique to(

A. Improve the software process
B. Automatically develop the software
C. Test the software
D. All of the above
Answer» B. Automatically develop the software
652.

Cities, states and country can be defined as

A. Subsystem – Cities, states: System – country
B. Subsystem – state :System– country, cities
C. Subsystem – Country: System– cities, state
D. Subsystem– Country, state: System– Cities
Answer» B. Subsystem – state :System– country, cities
653.

Quality plan describes

A. Quality procedure and standards
B. Approaches, resources and schedules
C. Configuration management and structure
D. None of these
Answer» B. Approaches, resources and schedules
654.

The most desirable form of cohesion is(

A. Logical cohesion
B. Procedural cohesion
C. Functional cohesion
D. Temporal cohesion
Answer» D. Temporal cohesion
655.

In Data reduction

A. Here data-flow diagram show, how data is processed at different stages in the system.
B. It registers all/ selected activities of a computer system.
C. Technique used to transform raw data into a more useful form.
D. Data is shifted to modern data base management system.
Answer» D. Data is shifted to modern data base management system.
656.

Relational schemas and other metadata about relations are stored in a structure called the____________

A. Metadata
B. Catalog
C. Log
D. Data Dictionary
Answer» E.
657.

Attribute-based identification is

A. Here each component has a unique name and an associated set of attribute, which differs for each version of component
B. Extent to which a software system records information concerning transactions performed against the system.
C. Extent to which a system or component is operational and accessible when required for use
D. They are used to describe the over all behavior of the system. Auditable is
Answer» B. Extent to which a software system records information concerning transactions performed against the system.
658.

Spiral development involves

A. Risk assessment
B. Reduction of risk
C. A and B both
D. None of these
Answer» D. None of these
659.

--------means that parts of the organization depend on one another

A. Interaction
B. Interdependence
C. Integration
D. Central Objective
Answer» C. Integration
660.

Lehman’s Fourth Law (Lehman and Belady 1985) is

A. Organizational stability: Over a program’s lifetime, its rate of development is approximately constant and independent of the resources devoted to system development.
B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
C. Large program evolution: Program evolution is a self-regulating process.
D. None of these
Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
661.

Software engineering needed for building -----------systems in a timely manner with highquality.

A. Software
B. Hardware
C. Process
D. All of above
Answer» B. Hardware
662.

Sensor component

A. Causes changes in system environment
B. Communicate with other components
C. Collects information from system environment
D. Coordinate the operation of other components.
Answer» D. Coordinate the operation of other components.
663.

A clearly defined objective, entry and exit conditions which is normally is atomic is referred as

A. Active objects
B. Activity
C. Adaptability
D. None of these
Answer» C. Adaptability
664.

Iterative model includes

A. Waterfall model
B. Sequential model
C. Incremental development
D. Random model
Answer» E.
665.

System architecture model identifies

A. Hardware components
B. Software components
C. Virtual components and software components
D. Hardware and software components both
Answer» E.
666.

Enduring requirements

A. Emerges due to user’s understanding of system develops, during system development
B. Requirements derived from the core activity of the organization and directly related to the domain of the system*
C. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system.
D. None of these.
Answer» C. Extent to which a system allowed the user to intentionally or unintentionally introduce errors into or misuse the system.
667.

Cost estimation is

A. Process of estimating the costs associated with software development projects that include the effort, time, and labor required.
B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth.
C. Overall cost of operating a computer system that includes the costs associated with personnel / training / system operations.
D. Overall cost of a computer system to an organization that includes the costs associated with operating/ maintaining the system, and the lifetime of operational use of the system.
Answer» B. Overall cost of maintaining a computer system that includes the costs associated with personnel/training/ maintenance of hardware and software/ requirements growth.
668.

Concept of software engineering is applicable to(

A. FORTRAN language only
B. Pascal language only
C. ‘C’ language only
D. All of the above
Answer» E.
669.

Sub system is

A. Dependent system
B. Independent system
C. Component
D. None of these
Answer» C. Component
670.

System analyst consist of following tasks:

A. Problem identification
B. Problem understanding
C. Analysis Problem
D. All of the above
Answer» B. Problem understanding
671.

Floating point process is a

A. Communication component
B. Computation component
C. Coordination component
D. Sensor component
Answer» C. Coordination component
672.

Beta testing is done a

A. User’s end
B. Developer’s end
C. User’s & Developer’s end
D. None of the mentioned
Answer» B. Developer’s end
673.

Match the following : A-Control metrics : B- Process metrics: C- Control: D-Correctness: 1- They are associated with software process. 2- They are associated with software products. 3- Protective measure that reduces system vulnerability. 4- Extent to which a system or component is free from faults in its specification, design, and implementation

A. A-1, B-2,C-3,D-4
B. A-4,B-3,C-2,D-1
C. A-3, B-2,C-1,D-4
D. None is true
Answer» B. A-4,B-3,C-2,D-1
674.

Why is Requirements Elicitation a difficult task?

A. Problem of scope
B. Problem of understanding
C. Problem of volatility
D. All of the mentioned
Answer» E.
675.

Exhaustive testing

A. always possible
B. practically possible
C. impractical but possible
D. impractical and impossible
Answer» D. impractical and impossible
676.

Here the state of the object changes by internal operations executing within the object itself. And also object continually executes and operations never suspend itself is referred as

A. Active objects
B. Activity
C. Adaptability
D. None of these
Answer» B. Activity
677.

Each maturity model is CMM has(

A. One KPA
B. Equal KPAs
C. Several KPAs
D. no KPA
Answer» D. no KPA
678.

In Broadcast models

A. The low-level components of a system are integrated and tested before the higher-level components have been developed.
B. The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested
C. An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it.
D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels.
Answer» D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels.
679.

RAD stands f

A. Relative Application Development
B. Rapid Application Development
C. Rapid Application Document
D. None of the mentioned
Answer» C. Rapid Application Document
680.

) Beta testing is carried out by(

A. Users
B. Developers
C. Testers
D. All of the above
Answer» B. Developers
681.

-------------- The functional independence of program componets.

A. Error tolerance
B. Training
C. Modularity
D. Simplicity
Answer» D. Simplicity
682.

Safety validation is

A. Associated with the role of people involved in software process and the activities for which they are responsible.
B. The most effective technique for demonstrating the safety of a system is proof by contradiction.
C. It is concerned with establishing a confidence level in the system that might vary from low to high
D. None of these
Answer» D. None of these
683.

Each entity has a set of _____________

A. Entity
B. Attribute
C. Row
D. None
Answer» C. Row
684.

-------------is a unit that is part of a larger system that means a larger system divided intosubparts the subpart is known as --------------

A. Execution Information system(EIS)
B. Integrated system
C. Subsystem
D. Transaction processing system
Answer» D. Transaction processing system
685.

Cost estimation for a project may include(

A. Software Cost
B. Hardware Cost
C. Personnel Costs
D. All of the above
Answer» E.
686.

Which of the following Requirement Elicitation Techniques is applicable to messy, changingand ill-defined problem situations?

A. Quality Function Deployment (QFD)
B. Prototyping
C. Soft Systems Methodology (SSM)
D. Controlled Requirements Expression (CORE)
Answer» D. Controlled Requirements Expression (CORE)
687.

If project is the enhancement of existing system, which model is best suited?(

A. Waterfall model
B. Prototyping model
C. Iterative enhancement model
D. Spiral model
Answer» D. Spiral model
688.

) In Basic execution time model, additional number of failures required to achieve a failure intensity objective is expressed as(

A. 0/λ0(λP - λF)
B. ) 0/λ0(λF – λP)
C. λ0 0(λF – λP)
D. λ0/ 0 (λP - λF)
Answer» B. ) 0/λ0(λF – λP)
689.

Which of the property of software modularity is incorrect with respect to benefitssoftware modularity?

A. Modules are robust
B. Module can use other modules
C. Modules Can be separately compiled and stored in a library
D. Modules are mostly dependent
Answer» E.
690.

structured design was developed by ----- and --------------------.

A. ED Yourdon and Larry constatine
B. By codd
C. All of these
D. None of these
Answer» B. By codd
691.

---------- The degree to which full implementation of required function has been achieved.

A. Error tolerance
B. Training
C. Completeness
D. Simplicity
Answer» D. Simplicity
692.

CASE Workbench

A. A measure of the amount of work a system can perform
B. It provides automated support for software process.
C. Support individual process tasks
D. Set of tools to support a particular phase of software process such as design, implementation or testing
Answer» B. It provides automated support for software process.
693.

Fail safe is

A. Trustworthiness with which a system or component can be modified to increase its storage or functional capacity
B. Pertaining to a system/component that automatically places itself in a safe operating mode in the event of a failure.
C. Pertaining to a system or component that continues to provide partial operational capability in the event of certain failures.
D. None of these
Answer» E.
694.

) A decision table has(

A. Four portions
B. Three portions
C. Five portions
D. Two portions
Answer» B. Three portions
695.

Capacity is

A. A measure of the amount of work a system can perform
B. It provides automated support for software process.
C. Support individual process tasks
D. Set of tools to support a particular phase of software process such as design, implementation or testing.
Answer» B. It provides automated support for software process.
696.

Hazard

A. Hazard cannot arise due system design.
B. The probability of the event occurring which create a hazard.
C. An assessment of the worst possible damage, which could result from a particular hazard.
D. A condition with the potential for causing or contributing to an accident.
Answer» E.
697.

In ISO 9126, each characteristic is related to(

A. one attributes
B. two attributes
C. three attributes
D. four attributes
Answer» B. two attributes
698.

DFD stands for(

A. Data Flow design
B. Descriptive functional design
C. Data flow diagram
D. None of the above
Answer» D. None of the above
699.

This set of Basic Software Engineering Questions and Answers focuses on “FunctionOriented Software Design”. 1. Choose the option that does not define Function Oriented Software Design.

A. It consists of module definitions
B. Modules represent data abstraction
C. Modules support functional abstraction
D. None of the mentioned
Answer» C. Modules support functional abstraction
700.

) In Basic execution time model, failure intensity is given by(

A. λ(µ)=λ0(1-µ2 / V0)
B. λ(µ)=λ0(1-µ / V0)
C. λ(µ)=λ0(1-V0/ µ2)
D. λ(µ)=λ0(1- V0/ µ)
Answer» C. λ(µ)=λ0(1-V0/ µ2)