Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

901.

The importance of software design can be summarized in a single word which is:

A. Efficiency
B. Accuracy
C. Quality
D. Complexity
Answer» D. Complexity
902.

Debugging is:

A. creating program code
B. finding and correcting errors in the program code
C. identifying the task to be computerized
D. creating the algorithm
Answer» C. identifying the task to be computerized
903.

In Design phase, which is the primary area of concern ?

A. Architecture
B. Data
C. Interface
D. All of the mentioned
Answer» E.
904.

Which tool is use for structured designing ?

A. Program flowchart
B. Structure chart
C. Data-flow diagram
D. Module
Answer» C. Data-flow diagram
905.

Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”.

A. Choose the fault class in which the following automated static analysis check would fall:”Pointer Arithmetic”.
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» B. Data Faults
906.

Which level of Static Analysis allows specific rules that apply to a program to be checked ?

A. Characteristic error checking
B. User-defined error checking
C. Assertion checking
D. All of the mentioned
Answer» C. Assertion checking
907.

Choose the fault class in which the following automated static analysis check would fall:”Non-usage of the results of functions”.

A. Storage management faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» E.
908.

Choose the fault class in which the following automated static analysis check would fall:”Variables declared but never used”.

A. Control Faults
B. Data Faults
C. Input/Output Faults
D. Interface faults
Answer» C. Input/Output Faults
909.

The records of each patient that is receiving or has received treatment resembles which security concept ?

A. Asset
B. Threat
C. Vulnerability
D. Control
Answer» B. Threat
910.

Circumstances that have potential to cause loss or harm is known as

A. Attack
B. Threat
C. Vulnerability
D. Control
Answer» C. Vulnerability
911.

What is a Range check?

A. Check that the input does not exceed some maximum size e.g. 40 characters for a name
B. Check that the input falls within a known range
C. Use information about the input to check if it is reasonable rather than an extreme value
D. None of the mentioned
Answer» C. Use information about the input to check if it is reasonable rather than an extreme value
912.

Which of the following is a bad practice of Dependable programming ?

A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned
Answer» E.
913.

Which process characteristic with respect to Dependability Engineering is mentioned by the statement: “The process should be understandable by people apart from process participants”?

A. Diverse
B. Documentable
C. Auditable
D. None of the mentioned
Answer» D. None of the mentioned
914.

Which reliability requirements are concerned with maintaining copies of the system?

A. Checking requirements
B. Recovery requirements
C. Redundancy requirements
D. Ambiguous requirements
Answer» C. Redundancy requirements
915.

At which stage of risk analysis specification, the additional security requirements take account of the technologies used in building the system and system design and implementation decisions?

A. Preliminary risk analysis
B. Life-cycle risk analysis
C. Operational risk analysis
D. All of the mentioned
Answer» C. Operational risk analysis
916.

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of ___________ with respect to security systems.

A. risk
B. control
C. attack
D. asset
Answer» C. attack
917.

An event that occurs at some point in time when the system does not deliver a service as expected by its users is called _____

A. Human error or mistake
B. System fault
C. System error
D. System failure
Answer» E.
918.

What are the two ways to view the human error of a sociotechnical system?

A. hardware and software approach
B. management and users approach
C. person and systems approach
D. all of the mentioned
Answer» D. all of the mentioned
919.

Program modularization and Source code translation are the activities of____

A. Forward engineering
B. Reverse Engineering
C. Reengineering
D. Reverse Engineering and Reengineering
Answer» D. Reverse Engineering and Reengineering
920.

________ classes are used to create the interface that the user sees and interacts with as the software is used.

A. Controller
B. Entity
C. Boundary
D. Business
Answer» D. Business
921.

_____________ & ______________ diagrams of UML represent Interaction modeling.

A. Use Case, Sequence
B. Class, Object
C. Activity, State Chart
D. All of the mentioned
Answer» B. Class, Object
922.

Which level of Entity Relationship Diagram (ERD) models all entities and relationships ?

A. Level 1
B. Level 2
C. Level 3
D. Level 4
Answer» C. Level 3
923.

________________ allows us to infer that different members of classes have some common characteristics.

A. Realization
B. Aggregation
C. Generalization
D. dependency
Answer» D. dependency
924.

The UML supports event-based modeling using ____________ diagrams.

A. Deployment
B. Collaboration
C. State chart
D. All of the mentioned
Answer» D. All of the mentioned
925.

Which of the following diagram is not supported by UML considering Data-driven modeling ?

A. Activity
B. Data Flow Diagram (DFD)
C. State Chart
D. Component
Answer» C. State Chart
926.

According to a statistical report: “over 30% of all software projects are cancelled before completion and over 70% of the remainder fail to deliver expected features”. What must be the reason for such a situation ?

A. Poor change management
B. Poor requirements management
C. Poor quality control
D. All of the mentioned
Answer» C. Poor quality control
927.

What functionality of Requirement Management Tool (RMT) is depicted by the statement: “the tool should be able to automatically detect relations between artifacts. For example information retrieval techniques, monitoring of change history, naming schemas or model transformations.”

A. Automatic Link Detection
B. Documentation Support
C. Graphical Representation
D. Automatic Link Creation and Change
Answer» B. Documentation Support
928.

Consider the following Statement: “The product should have a good human interface.”What characteristic of SRS is being depicted here ?

A. Consistent
B. Non-Verifiable
C. Correct
D. Ambiguous
Answer» C. Correct
929.

Consider the following Statement: “The data set will contain an end of file character.”What characteristic of SRS is being depicted here ?

A. Consistent
B. Non-verifiable
C. Correct
D. Ambiguous
Answer» C. Correct
930.

Consider the following Statement: “The output of a program shall be given within 10 secs of event X 10% of the time.”What characteristic of SRS is being depicted here ?

A. Consistent
B. Verifiable
C. Non-verifiable
D. Correct
Answer» C. Non-verifiable
931.

Which of the following property of SRS is depicted by the statement : “Conformity to a standard is maintained” ?

A. Correct
B. Complete
C. Consistent
D. Modifiable
Answer» C. Consistent
932.

The SRS is said to be consistent if and only if

A. its structure and style are such that any changes to the requirements can be made easily while retaining the style and structure
B. every requirement stated therein is one that the software shall meet
C. every requirement stated therein is verifiable
D. no subset of individual requirements described in it conflict with each other
Answer» E.
933.

Coad and Yourdon suggested _______ selection characteristics that should be used as an analyst considers each potential object for inclusion in the requirement analysis model.

A. 3
B. 4
C. 5
D. 6
Answer» E.
934.

________ and _________ are the two issues of Requirement Analysis.

A. Performance, Design
B. Stakeholder, Developer
C. Functional, Non-Functional
D. None of the mentioned
Answer» C. Functional, Non-Functional
935.

Who controls the FAST (Facilitated Application Specification Techniques) meeting ?

A. System Analyst
B. Scribe
C. Facilitator
D. Manager
Answer» D. Manager
936.

How is brainstorming different from JAD ? Brainstorming sessions

A. last for about 2-3 hours
B. last for about 2-3 days
C. cover the technology used for the development
D. all of the mentioned
Answer» B. last for about 2-3 days
937.

What of the following is not an output of a JAD session ?

A. Context Diagrams
B. DFDs
C. ER model
D. UML diagrams
Answer» E.
938.

Which one of the following is not an actor in JAD sessions ?

A. User
B. Tester
C. Scribe
D. Sponsor
Answer» C. Scribe
939.

“Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What kind of a requirement the system is providing ?

A. Functional
B. Non-Functional
C. Known Requirement
D. None of the mentioned
Answer» B. Non-Functional
940.

What are the four dimensions of Dependability ?

A. Usability, Reliability, Security, Flexibility
B. Availability, Reliability, Maintainability, Security
C. Availability, Reliability, Security, Safety
D. Security, Safety, Testability, Usability
Answer» D. Security, Safety, Testability, Usability
941.

Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A. Product-oriented Approach – Focus on system (or software) quality
B. Process-oriented Approach – Focus on how NFRs can be used in the design process
C. Quantitative Approach – Find measurable scales for the functionality attributes
D. Qualitative Approach – Study various relationships between quality goals
Answer» D. Qualitative Approach – Study various relationships between quality goals
942.

Which one of the following is a requirement that fits in a developer’s module ?

A. Availability
B. Testability
C. Usability
D. Flexibility
Answer» C. Usability
943.

Which three framework activities are present in Adaptive Software Development(ASD) ?

A. analysis, design, coding
B. requirements gathering, adaptive cycle planning, iterative development
C. speculation, collaboration, learning
D. all of the mentioned
Answer» D. all of the mentioned
944.

The longer a fault exists in software

A. the more tedious its removal becomes
B. the more costly it is to detect and correct
C. the less likely it is to be properly corrected
D. All of the mentioned
Answer» E.
945.

RUP stands for____________ created by a division of _________

A. Rational Unified Program, IBM
B. Rational Unified Process, Infosys
C. Rational Unified Process, Microsoft
D. Rational Unified Process, IBM
Answer» E.
946.

Four types of change are encountered during the support phase.Which one of the following is not one that falls into such category?

A. Translation
B. Correction
C. Adaptation
D. Prevention
Answer» B. Correction
947.

Which one of the following is not an Umbrella Activity that complements the five process framework activities and help team manage and control progress, quality, change, and risk.

A. Reusability management
B. Risk management
C. Measurement
D. User Reviews
Answer» E.
948.

Which of the following model has a major disadvantage in terms of the coding phase of a software life cycle model ?

A. Spiral Model
B. Waterfall Model
C. Rad Model
D. 4GT Model
Answer» E.
949.

What is a major advantage of using a 4GT Model for producing small scale products, applications or programs ?

A. Improved productivity of software engineers
B. Reduction in software development time
C. 4GT helped by CASE tools and code generators offers a credible solution to many software problems
D. None of the mentioned
Answer» C. 4GT helped by CASE tools and code generators offers a credible solution to many software problems
950.

Which of the following is not a type of a 4GL? One originating ___

A. on Lisp machine
B. on report generators
C. from database query languages
D. from GUI creators
Answer» B. on report generators