MCQOPTIONS
Saved Bookmarks
This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
In McCall’s software quality factors, Product revision phase ----not contains. |
| A. | Maintainability |
| B. | Flexibility |
| C. | Testability |
| D. | Portability |
| Answer» B. Flexibility | |
| 352. |
White Box techniques are also classified a |
| A. | Design based testing |
| B. | Structural testing |
| C. | Error guessing technique |
| D. | None of the mentioned |
| Answer» C. Error guessing technique | |
| 353. |
Reliability of software is usually estimated at( |
| A. | Analysis phase |
| B. | Design phase |
| C. | Coding phase |
| D. | Testing phase |
| Answer» E. | |
| 354. |
Lehman’s First Law (Lehman and Belady 1985) is |
| A. | Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. |
| B. | Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. |
| C. | Large program evolution: Program evolution is a self-regulating process. |
| D. | None of these |
| Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. | |
| 355. |
System requirements are |
| A. | The set of system services and constraints in details |
| B. | System functions that restricts the use of objects to certain users. |
| C. | Purposeful collection of interrelated components that work together to achieve some objective. |
| D. | None of these |
| Answer» B. System functions that restricts the use of objects to certain users. | |
| 356. |
Software reliability is defined with respect to( |
| A. | time |
| B. | speed |
| C. | quality |
| D. | None of the above |
| Answer» B. speed | |
| 357. |
The Unified Modeling Language (UML) has become an effective standard for software modelling. How many different notations does it have? |
| A. | 3 |
| B. | 4 |
| C. | 6 |
| D. | 9 |
| Answer» E. | |
| 358. |
A node with indegree ≠ 0 and out degree=0 is called( |
| A. | Source node |
| B. | Predicate node |
| C. | Destination node |
| D. | None of the above |
| Answer» D. None of the above | |
| 359. |
Which one is not a type of requirements?( |
| A. | Known requirements |
| B. | Unknown requirements |
| C. | Undreamt requirements |
| D. | Complex requirements |
| Answer» E. | |
| 360. |
The worst type of coupling is( |
| A. | Content |
| B. | Common |
| C. | External |
| D. | Data coupling |
| Answer» B. Common | |
| 361. |
Human error is |
| A. | It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. |
| B. | Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale. |
| C. | Human behavior that results in the introduction of faults into a system. |
| D. | None of these |
| Answer» D. None of these | |
| 362. |
RAD stands for( |
| A. | Rapid application development |
| B. | Relative application development |
| C. | Ready application development |
| D. | Repeated application development |
| Answer» B. Relative application development | |
| 363. |
It is the ability of software system to product their various components againstunauthorized access and modification. |
| A. | Correctness |
| B. | Reliability |
| C. | Usability |
| D. | Integrity |
| Answer» E. | |
| 364. |
System security is |
| A. | The set of system services and constraints in details |
| B. | System functions that restricts the use of objects to certain users |
| C. | Purposeful collection of interrelated components that work together to achieve some objective. |
| D. | None of these |
| Answer» C. Purposeful collection of interrelated components that work together to achieve some objective. | |
| 365. |
Which of the following is a complementary approach to function-oriented approach? |
| A. | Object oriented analysis |
| B. | Object oriented design |
| C. | Structured approach |
| D. | Both Object oriented analysis and design |
| Answer» E. | |
| 366. |
Aperiodic stimuli is |
| A. | It supports system modeling during the analysis and design stages of the software process |
| B. | Organization responsible for approving U.S. standards |
| C. | Stimuli that occurs irregularly |
| D. | Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services |
| Answer» D. Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services | |
| 367. |
--------- it include system be used if it developed and implemented. |
| A. | Technical feasibility |
| B. | Economic feasibility |
| C. | Operational feasibility |
| D. | None of above |
| Answer» B. Economic feasibility | |
| 368. |
Waterfall model is not suitable for( |
| A. | small projects |
| B. | accommodating change |
| C. | complex projects |
| D. | none of the above |
| Answer» C. complex projects | |
| 369. |
Bottom-up testing |
| A. | The low-level components of a system are integrated and tested before the higher-level components have been developed. |
| B. | The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested. |
| C. | An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. |
| D. | Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels. |
| Answer» C. An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it. | |
| 370. |
Failure of schedule is |
| A. | People risk |
| B. | Organizational risk |
| C. | Estimation risk |
| D. | Requirement risk |
| Answer» D. Requirement risk | |
| 371. |
The is represented as two processing boxes connected by an line (arrow) of control. |
| A. | repetition |
| B. | sequence |
| C. | condition |
| D. | none of the mentioned |
| Answer» C. condition | |
| 372. |
Procedural interface |
| A. | Trustworthiness with which a system are transferred from one hardware environment to another |
| B. | Here one sub system encapsulates aset of procedures, which can be called by other sub-systems. |
| C. | It is concerned with studying existing process to understand the relationship between different parts of the process. |
| D. | None of these |
| Answer» C. It is concerned with studying existing process to understand the relationship between different parts of the process. | |
| 373. |
) For a function of two variables, how many cases will be generated by robustness testing?( |
| A. | 9 |
| B. | 13 |
| C. | 25 |
| D. | 42 |
| Answer» C. 25 | |
| 374. |
Risk analysis process is |
| A. | Here each identified risk is analyzed and prioritized |
| B. | It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. |
| C. | The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks. |
| D. | None of these |
| Answer» B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability. | |
| 375. |
Truthfulness with which software satisfies differing system constraints and user needs is |
| A. | Active objects |
| B. | Activity |
| C. | Adaptability |
| D. | None of these |
| Answer» D. None of these | |
| 376. |
Requirement Engineering process does not involves |
| A. | Feasibility study |
| B. | Requirement elicitation and an analysis |
| C. | Requirement validation and management |
| D. | Data processing |
| Answer» E. | |
| 377. |
)Which one is not a size measure for software( |
| A. | LOC |
| B. | Function Count |
| C. | Cyclomatic Complexity |
| D. | Halstead’s program length |
| Answer» D. Halstead’s program length | |
| 378. |
CASE Tool is( |
| A. | Computer Aided Software Engineering |
| B. | Component Aided Software Engineering |
| C. | Constructive Aided Software Engineering |
| D. | Computer Analysis Software Engineering |
| Answer» B. Component Aided Software Engineering | |
| 379. |
Digital-analog converter that converter digital input into analog output is a |
| A. | Communication component |
| B. | Computation component |
| C. | Sensor component |
| D. | Interface component |
| Answer» E. | |
| 380. |
Which one is not the non-functional activity ? |
| A. | Reliability |
| B. | Performance |
| C. | Coordination |
| D. | Maintainability |
| Answer» D. Maintainability | |
| 381. |
Software process is |
| A. | A set of activities and associated results that produce a software product |
| B. | It is concerned with re-implementing legacy system to make them more maintainable. |
| C. | It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements |
| D. | None of these. |
| Answer» B. It is concerned with re-implementing legacy system to make them more maintainable. | |
| 382. |
___________ and ____________ are the two viewpoints discussed in ControlledRequirements Expression (CORE) |
| A. | Functional, Non-Functional |
| B. | User, Developer |
| C. | Known, Unknown |
| D. | All of the mentioned |
| Answer» B. User, Developer | |
| 383. |
Safety is |
| A. | Avoiding catastrophic moment |
| B. | Ease with which a system or component are modified to fit the problem area. |
| C. | It is a bounded area of responsibility. |
| D. | None of these |
| Answer» B. Ease with which a system or component are modified to fit the problem area. | |
| 384. |
An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces. |
| A. | Object design models |
| B. | Object interface design |
| C. | Object oriented models |
| D. | None of these |
| Answer» D. None of these | |
| 385. |
For a function of n variables robustness testing of boundary value analysis yields:( |
| A. | 4n+1 |
| B. | 4n+3 |
| C. | 6n+1 |
| D. | None of the above |
| Answer» D. None of the above | |
| 386. |
What is Analysis model? |
| A. | Understanding of design problem |
| B. | Representation of design problem solution |
| C. | Representation of design problem |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 387. |
A software engineer must design the modules with the goal of high cohesion and lowcoupling. |
| A. | True |
| B. | False |
| C. | all |
| D. | none |
| Answer» B. False | |
| 388. |
The system failure due to power failure is considered under |
| A. | Hardware reliability |
| B. | Software reliability |
| C. | Operation reliability |
| D. | None of these |
| Answer» B. Software reliability | |
| 389. |
Maximum possible value of reliability is( |
| A. | 100 |
| B. | 10 |
| C. | 1 |
| Answer» D. | |
| 390. |
Analyst used --------- method to collect information from person by asking standardquestion to person or group of person. |
| A. | Interviews |
| B. | Questionnaires. |
| C. | Record inspection or view |
| D. | Observations |
| Answer» B. Questionnaires. | |
| 391. |
This module gets data from super-ordinates, process that data and again forward It tosuper-ordinate modules, These modules are used for processing purpose. |
| A. | Afferent modules |
| B. | Efferent modules |
| C. | Co-ordinate modules |
| D. | Transform modules. |
| Answer» E. | |
| 392. |
Why there is a need for Software management? |
| A. | Software development is complex and expensive |
| B. | It is done with few people with fixed skills and abilities |
| C. | It is not time consuming |
| D. | None of the mentioned |
| Answer» B. It is done with few people with fixed skills and abilities | |
| 393. |
Unit testing process is |
| A. | Software designing process |
| B. | Software operating process |
| C. | Software validation process |
| D. | Software decomposition process |
| Answer» D. Software decomposition process | |
| 394. |
------------------system operates continuously to keep management abreast of what ishappening in all major areas |
| A. | Execution Information system(EIS) |
| B. | Integrated system |
| C. | Subsystem |
| D. | Transaction processing system |
| Answer» B. Integrated system | |
| 395. |
Which is NOT the part of operating procedure manuals?( |
| A. | User manuals |
| B. | Operational manuals |
| C. | Documentation manuals |
| D. | Installation manuals |
| Answer» D. Installation manuals | |
| 396. |
ER diagram is a ------------t |
| A. | Design |
| B. | Coding |
| C. | Testing |
| D. | None of above |
| Answer» B. Coding | |
| 397. |
Regression testing is primarily related to:( |
| A. | Functional testing |
| B. | Data flow testing |
| C. | Development testing |
| D. | Maintenance testing |
| Answer» E. | |
| 398. |
System operation takes place after |
| A. | System specification |
| B. | System design |
| C. | System installation |
| D. | System decomposition |
| Answer» D. System decomposition | |
| 399. |
)The number of clauses used in ISO 9001 are( |
| A. | 15 |
| B. | 25 |
| C. | 20 |
| D. | 10 |
| Answer» D. 10 | |
| 400. |
Validation plan describes |
| A. | Quality procedure |
| B. | Schedule procedure |
| C. | Management procedure |
| D. | None of these |
| Answer» C. Management procedure | |