MCQOPTIONS
 Saved Bookmarks
				This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 901. | 
                                    The importance of software design can be summarized in a single word which is: | 
                            
| A. | Efficiency | 
| B. | Accuracy | 
| C. | Quality | 
| D. | Complexity | 
| Answer» D. Complexity | |
| 902. | 
                                    Debugging is: | 
                            
| A. | creating program code | 
| B. | finding and correcting errors in the program code | 
| C. | identifying the task to be computerized | 
| D. | creating the algorithm | 
| Answer» C. identifying the task to be computerized | |
| 903. | 
                                    In Design phase, which is the primary area of concern ? | 
                            
| A. | Architecture | 
| B. | Data | 
| C. | Interface | 
| D. | All of the mentioned | 
| Answer» E. | |
| 904. | 
                                    Which tool is use for structured designing ? | 
                            
| A. | Program flowchart | 
| B. | Structure chart | 
| C. | Data-flow diagram | 
| D. | Module | 
| Answer» C. Data-flow diagram | |
| 905. | 
                                    Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”. | 
                            
| A. | Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”. | 
| B. | Data Faults | 
| C. | Input/Output Faults | 
| D. | Interface faults | 
| Answer» B. Data Faults | |
| 906. | 
                                    Which level of Static Analysis allows specific rules that apply to a program to be checked ? | 
                            
| A. | Characteristic error checking | 
| B. | User-defined error checking | 
| C. | Assertion checking | 
| D. | All of the mentioned | 
| Answer» C. Assertion checking | |
| 907. | 
                                    Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”. | 
                            
| A. | Storage management faults | 
| B. | Data Faults | 
| C. | Input/Output Faults | 
| D. | Interface faults | 
| Answer» E. | |
| 908. | 
                                    Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”. | 
                            
| A. | Control Faults | 
| B. | Data Faults | 
| C. | Input/Output Faults | 
| D. | Interface faults | 
| Answer» C. Input/Output Faults | |
| 909. | 
                                    The records of each patient that is receiving or has received treatment resembles which security concept ? | 
                            
| A. | Asset | 
| B. | Threat | 
| C. | Vulnerability | 
| D. | Control | 
| Answer» B. Threat | |
| 910. | 
                                    Circumstances that have potential to cause loss or harm is known as | 
                            
| A. | Attack | 
| B. | Threat | 
| C. | Vulnerability | 
| D. | Control | 
| Answer» C. Vulnerability | |
| 911. | 
                                    What is a Range check? | 
                            
| A. | Check that the input does not exceed some maximum size e.g. 40 characters for a name | 
| B. | Check that the input falls within a known range | 
| C. | Use information about the input to check if it is reasonable rather than an extreme value | 
| D. | None of the mentioned | 
| Answer» C. Use information about the input to check if it is reasonable rather than an extreme value | |
| 912. | 
                                    Which of the following is a bad practice of Dependable programming ? | 
                            
| A. | Limit the visibility of information in a program | 
| B. | Check array bounds | 
| C. | Check all inputs for validity | 
| D. | None of the mentioned | 
| Answer» E. | |
| 913. | 
                                    Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants”? | 
                            
| A. | Diverse | 
| B. | Documentable | 
| C. | Auditable | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 914. | 
                                    Which reliability requirements are concerned with maintaining copies of the system? | 
                            
| A. | Checking requirements | 
| B. | Recovery requirements | 
| C. | Redundancy requirements | 
| D. | Ambiguous requirements | 
| Answer» C. Redundancy requirements | |
| 915. | 
                                    At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions? | 
                            
| A. | Preliminary risk analysis | 
| B. | Life-cycle risk analysis | 
| C. | Operational risk analysis | 
| D. | All of the mentioned | 
| Answer» C. Operational risk analysis | |
| 916. | 
                                    A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems. | 
                            
| A. | risk | 
| B. | control | 
| C. | attack | 
| D. | asset | 
| Answer» C. attack | |
| 917. | 
                                    An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____ | 
                            
| A. | Human error or mistake | 
| B. | System fault | 
| C. | System error | 
| D. | System failure | 
| Answer» E. | |
| 918. | 
                                    What are the two ways to view the human error of a sociotechnical system? | 
                            
| A. | hardware and software approach | 
| B. | management and users approach | 
| C. | person and systems approach | 
| D. | all of the mentioned | 
| Answer» D. all of the mentioned | |
| 919. | 
                                    Program modularization and Source code translation are the activities of____ | 
                            
| A. | Forward engineering | 
| B. | Reverse Engineering | 
| C. | Reengineering | 
| D. | Reverse Engineering and Reengineering | 
| Answer» D. Reverse Engineering and Reengineering | |
| 920. | 
                                    ________ classes are used to create the interface that the user sees and interacts with as the software is used. | 
                            
| A. | Controller | 
| B. | Entity | 
| C. | Boundary | 
| D. | Business | 
| Answer» D. Business | |
| 921. | 
                                    _____________ & ______________ diagrams of UML represent Interaction modeling. | 
                            
| A. | Use Case, Sequence | 
| B. | Class, Object | 
| C. | Activity, State Chart | 
| D. | All of the mentioned | 
| Answer» B. Class, Object | |
| 922. | 
                                    Which level of Entity Relationship Diagram (ERD) models all entities and relationships ? | 
                            
| A. | Level 1 | 
| B. | Level 2 | 
| C. | Level 3 | 
| D. | Level 4 | 
| Answer» C. Level 3 | |
| 923. | 
                                    ________________ allows us to infer that different members of classes have some common characteristics. | 
                            
| A. | Realization | 
| B. | Aggregation | 
| C. | Generalization | 
| D. | dependency | 
| Answer» D. dependency | |
| 924. | 
                                    The UML supports event-based modeling using ____________ diagrams. | 
                            
| A. | Deployment | 
| B. | Collaboration | 
| C. | State chart | 
| D. | All of the mentioned | 
| Answer» D. All of the mentioned | |
| 925. | 
                                    Which of the following diagram is not supported by UML considering Data-driven modeling ? | 
                            
| A. | Activity | 
| B. | Data Flow Diagram (DFD) | 
| C. | State Chart | 
| D. | Component | 
| Answer» C. State Chart | |
| 926. | 
                                    According to a statistical report: “over 30% of all software projects are cancelled before completion and over 70% of the remainder fail to deliver expected features”. What must be the reason for such a situation ? | 
                            
| A. | Poor change management | 
| B. | Poor requirements management | 
| C. | Poor quality control | 
| D. | All of the mentioned | 
| Answer» C. Poor quality control | |
| 927. | 
                                    What functionality of Requirement Management Tool (RMT) is depicted by the statement: “the tool should be able to automatically detect relations between artifacts. For example information retrieval techniques, monitoring of change history, naming schemas or model transformations.” | 
                            
| A. | Automatic Link Detection | 
| B. | Documentation Support | 
| C. | Graphical Representation | 
| D. | Automatic Link Creation and Change | 
| Answer» B. Documentation Support | |
| 928. | 
                                    Consider the following Statement: “The product should have a good human interface.”What characteristic of SRS is being depicted here ? | 
                            
| A. | Consistent | 
| B. | Non-Verifiable | 
| C. | Correct | 
| D. | Ambiguous | 
| Answer» C. Correct | |
| 929. | 
                                    Consider the following Statement: “The data set will contain an end of file character.”What characteristic of SRS is being depicted here ? | 
                            
| A. | Consistent | 
| B. | Non-verifiable | 
| C. | Correct | 
| D. | Ambiguous | 
| Answer» C. Correct | |
| 930. | 
                                    Consider the following Statement: “The output of a program shall be given within 10 secs of event X 10% of the time.”What characteristic of SRS is being depicted here ? | 
                            
| A. | Consistent | 
| B. | Verifiable | 
| C. | Non-verifiable | 
| D. | Correct | 
| Answer» C. Non-verifiable | |
| 931. | 
                                    Which of the following property of SRS is depicted by the statement : “Conformity to a standard is maintained” ? | 
                            
| A. | Correct | 
| B. | Complete | 
| C. | Consistent | 
| D. | Modifiable | 
| Answer» C. Consistent | |
| 932. | 
                                    The SRS is said to be consistent if and only if | 
                            
| A. | its structure and style are such that any changes to the requirements can be made easily while retaining the style and structure | 
| B. | every requirement stated therein is one that the software shall meet | 
| C. | every requirement stated therein is verifiable | 
| D. | no subset of individual requirements described in it conflict with each other | 
| Answer» E. | |
| 933. | 
                                    Coad and Yourdon suggested _______ selection characteristics that should be used as an analyst considers each potential object for inclusion in the requirement analysis model. | 
                            
| A. | 3 | 
| B. | 4 | 
| C. | 5 | 
| D. | 6 | 
| Answer» E. | |
| 934. | 
                                    ________ and _________ are the two issues of Requirement Analysis. | 
                            
| A. | Performance, Design | 
| B. | Stakeholder, Developer | 
| C. | Functional, Non-Functional | 
| D. | None of the mentioned | 
| Answer» C. Functional, Non-Functional | |
| 935. | 
                                    Who controls the FAST (Facilitated Application Specification Techniques) meeting ? | 
                            
| A. | System Analyst | 
| B. | Scribe | 
| C. | Facilitator | 
| D. | Manager | 
| Answer» D. Manager | |
| 936. | 
                                    How is brainstorming different from JAD ? Brainstorming sessions | 
                            
| A. | last for about 2-3 hours | 
| B. | last for about 2-3 days | 
| C. | cover the technology used for the development | 
| D. | all of the mentioned | 
| Answer» B. last for about 2-3 days | |
| 937. | 
                                    What of the following is not an output of a JAD session ? | 
                            
| A. | Context Diagrams | 
| B. | DFDs | 
| C. | ER model | 
| D. | UML diagrams | 
| Answer» E. | |
| 938. | 
                                    Which one of the following is not an actor in JAD sessions ? | 
                            
| A. | User | 
| B. | Tester | 
| C. | Scribe | 
| D. | Sponsor | 
| Answer» C. Scribe | |
| 939. | 
                                    “Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What kind of a requirement the system is providing ? | 
                            
| A. | Functional | 
| B. | Non-Functional | 
| C. | Known Requirement | 
| D. | None of the mentioned | 
| Answer» B. Non-Functional | |
| 940. | 
                                    What are the four dimensions of Dependability ? | 
                            
| A. | Usability, Reliability, Security, Flexibility | 
| B. | Availability, Reliability, Maintainability, Security | 
| C. | Availability, Reliability, Security, Safety | 
| D. | Security, Safety, Testability, Usability | 
| Answer» D. Security, Safety, Testability, Usability | |
| 941. | 
                                    Choose the incorrect statement with respect to Non-Functional Requirement(NFR) | 
                            
| A. | Product-oriented Approach – Focus on system (or software) quality | 
| B. | Process-oriented Approach – Focus on how NFRs can be used in the design process | 
| C. | Quantitative Approach – Find measurable scales for the functionality attributes | 
| D. | Qualitative Approach – Study various relationships between quality goals | 
| Answer» D. Qualitative Approach – Study various relationships between quality goals | |
| 942. | 
                                    Which one of the following is a requirement that fits in a developer’s module ? | 
                            
| A. | Availability | 
| B. | Testability | 
| C. | Usability | 
| D. | Flexibility | 
| Answer» C. Usability | |
| 943. | 
                                    Which three framework activities are present in Adaptive Software Development(ASD) ? | 
                            
| A. | analysis, design, coding | 
| B. | requirements gathering, adaptive cycle planning, iterative development | 
| C. | speculation, collaboration, learning | 
| D. | all of the mentioned | 
| Answer» D. all of the mentioned | |
| 944. | 
                                    The longer a fault exists in software | 
                            
| A. | the more tedious its removal becomes | 
| B. | the more costly it is to detect and correct | 
| C. | the less likely it is to be properly corrected | 
| D. | All of the mentioned | 
| Answer» E. | |
| 945. | 
                                    RUP stands for____________ created by a division of _________ | 
                            
| A. | Rational Unified Program, IBM | 
| B. | Rational Unified Process, Infosys | 
| C. | Rational Unified Process, Microsoft | 
| D. | Rational Unified Process, IBM | 
| Answer» E. | |
| 946. | 
                                    Four types of change are encountered during the support phase.Which one of the following is not one that falls into such category? | 
                            
| A. | Translation | 
| B. | Correction | 
| C. | Adaptation | 
| D. | Prevention | 
| Answer» B. Correction | |
| 947. | 
                                    Which one of the following is not an Umbrella Activity that complements the five process framework activities and help team manage and control progress, quality, change, and risk. | 
                            
| A. | Reusability management | 
| B. | Risk management | 
| C. | Measurement | 
| D. | User Reviews | 
| Answer» E. | |
| 948. | 
                                    Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ? | 
                            
| A. | Spiral Model | 
| B. | Waterfall Model | 
| C. | Rad Model | 
| D. | 4GT Model | 
| Answer» E. | |
| 949. | 
                                    What is a major advantage of using a 4GT Model for producing small scale products, applications or programs ? | 
                            
| A. | Improved productivity of software engineers | 
| B. | Reduction in software development time | 
| C. | 4GT helped by CASE tools and code generators offers a credible solution to many software problems | 
| D. | None of the mentioned | 
| Answer» C. 4GT helped by CASE tools and code generators offers a credible solution to many software problems | |
| 950. | 
                                    Which of the following is not a type of a 4GL? One originating ___ | 
                            
| A. | on Lisp machine | 
| B. | on report generators | 
| C. | from database query languages | 
| D. | from GUI creators | 
| Answer» B. on report generators | |