Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 1167 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

351.

In McCall’s software quality factors, Product revision phase ----not contains.

A. Maintainability
B. Flexibility
C. Testability
D. Portability
Answer» B. Flexibility
352.

White Box techniques are also classified a

A. Design based testing
B. Structural testing
C. Error guessing technique
D. None of the mentioned
Answer» C. Error guessing technique
353.

Reliability of software is usually estimated at(

A. Analysis phase
B. Design phase
C. Coding phase
D. Testing phase
Answer» E.
354.

Lehman’s First Law (Lehman and Belady 1985) is

A. Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment.
B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
C. Large program evolution: Program evolution is a self-regulating process.
D. None of these
Answer» B. Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure.
355.

System requirements are

A. The set of system services and constraints in details
B. System functions that restricts the use of objects to certain users.
C. Purposeful collection of interrelated components that work together to achieve some objective.
D. None of these
Answer» B. System functions that restricts the use of objects to certain users.
356.

Software reliability is defined with respect to(

A. time
B. speed
C. quality
D. None of the above
Answer» B. speed
357.

The Unified Modeling Language (UML) has become an effective standard for software modelling. How many different notations does it have?

A. 3
B. 4
C. 6
D. 9
Answer» E.
358.

A node with indegree ≠ 0 and out degree=0 is called(

A. Source node
B. Predicate node
C. Destination node
D. None of the above
Answer» D. None of the above
359.

Which one is not a type of requirements?(

A. Known requirements
B. Unknown requirements
C. Undreamt requirements
D. Complex requirements
Answer» E.
360.

The worst type of coupling is(

A. Content
B. Common
C. External
D. Data coupling
Answer» B. Common
361.

Human error is

A. It is concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.
B. Extent to which a software product fulfills its purpose without wasting user’s time/ energy/degrading their morale.
C. Human behavior that results in the introduction of faults into a system.
D. None of these
Answer» D. None of these
362.

RAD stands for(

A. Rapid application development
B. Relative application development
C. Ready application development
D. Repeated application development
Answer» B. Relative application development
363.

It is the ability of software system to product their various components againstunauthorized access and modification.

A. Correctness
B. Reliability
C. Usability
D. Integrity
Answer» E.
364.

System security is

A. The set of system services and constraints in details
B. System functions that restricts the use of objects to certain users
C. Purposeful collection of interrelated components that work together to achieve some objective.
D. None of these
Answer» C. Purposeful collection of interrelated components that work together to achieve some objective.
365.

Which of the following is a complementary approach to function-oriented approach?

A. Object oriented analysis
B. Object oriented design
C. Structured approach
D. Both Object oriented analysis and design
Answer» E.
366.

Aperiodic stimuli is

A. It supports system modeling during the analysis and design stages of the software process
B. Organization responsible for approving U.S. standards
C. Stimuli that occurs irregularly
D. Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services
Answer» D. Formalized set of software calls and routines that can be referenced by an application program in order to access supporting system or network services
367.

--------- it include system be used if it developed and implemented.

A. Technical feasibility
B. Economic feasibility
C. Operational feasibility
D. None of above
Answer» B. Economic feasibility
368.

Waterfall model is not suitable for(

A. small projects
B. accommodating change
C. complex projects
D. none of the above
Answer» C. complex projects
369.

Bottom-up testing

A. The low-level components of a system are integrated and tested before the higher-level components have been developed.
B. The testing process starts with modules at lower levels in the hierarchy and works up the hierarchy of modules until the final module is tested.
C. An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it.
D. Control starts of the top of a sub routine hierarchy and through sub routine calls passes to lower levels.
Answer» C. An event driven control system, where an event is broadcasted to each sub- system and any sub-system that can handle that event responds to it.
370.

Failure of schedule is

A. People risk
B. Organizational risk
C. Estimation risk
D. Requirement risk
Answer» D. Requirement risk
371.

The                 is represented as two processing boxes connected by an line (arrow) of control.

A. repetition
B. sequence
C. condition
D. none of the mentioned
Answer» C. condition
372.

Procedural interface

A. Trustworthiness with which a system are transferred from one hardware environment to another
B. Here one sub system encapsulates aset of procedures, which can be called by other sub-systems.
C. It is concerned with studying existing process to understand the relationship between different parts of the process.
D. None of these
Answer» C. It is concerned with studying existing process to understand the relationship between different parts of the process.
373.

) For a function of two variables, how many cases will be generated by robustness testing?(

A. 9
B. 13
C. 25
D. 42
Answer» C. 25
374.

Risk analysis process is

A. Here each identified risk is analyzed and prioritized
B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
C. The anticipate risks which night affect the project schedule or the quality of the software being developed and to take action to avoid these risks.
D. None of these
Answer» B. It begins after all hazards are identified. For each hazard, the outcome of the risk assessment process is a statement of acceptability.
375.

Truthfulness with which software satisfies differing system constraints and user needs is

A. Active objects
B. Activity
C. Adaptability
D. None of these
Answer» D. None of these
376.

Requirement Engineering process does not involves

A. Feasibility study
B. Requirement elicitation and an analysis
C. Requirement validation and management
D. Data processing
Answer» E.
377.

)Which one is not a size measure for software(

A. LOC
B. Function Count
C. Cyclomatic Complexity
D. Halstead’s program length
Answer» D. Halstead’s program length
378.

CASE Tool is(

A. Computer Aided Software Engineering
B. Component Aided Software Engineering
C. Constructive Aided Software Engineering
D. Computer Analysis Software Engineering
Answer» B. Component Aided Software Engineering
379.

Digital-analog converter that converter digital input into analog output is a

A. Communication component
B. Computation component
C. Sensor component
D. Interface component
Answer» E.
380.

Which one is not the non-functional activity ?

A. Reliability
B. Performance
C. Coordination
D. Maintainability
Answer» D. Maintainability
381.

Software process is

A. A set of activities and associated results that produce a software product
B. It is concerned with re-implementing legacy system to make them more maintainable.
C. It is the official statement of what is required of the system developers; it includes uses requirements for a system and detailed specification of the system requirements
D. None of these.
Answer» B. It is concerned with re-implementing legacy system to make them more maintainable.
382.

___________ and ____________ are the two viewpoints discussed in ControlledRequirements Expression (CORE)

A. Functional, Non-Functional
B. User, Developer
C. Known, Unknown
D. All of the mentioned
Answer» B. User, Developer
383.

Safety is

A. Avoiding catastrophic moment
B. Ease with which a system or component are modified to fit the problem area.
C. It is a bounded area of responsibility.
D. None of these
Answer» B. Ease with which a system or component are modified to fit the problem area.
384.

An object-oriented model of system architecture structures the system into a set of loosely coupled objects with well-defined interfaces.

A. Object design models
B. Object interface design
C. Object oriented models
D. None of these
Answer» D. None of these
385.

For a function of n variables robustness testing of boundary value analysis yields:(

A. 4n+1
B. 4n+3
C. 6n+1
D. None of the above
Answer» D. None of the above
386.

What is Analysis model?

A. Understanding of design problem
B. Representation of design problem solution
C. Representation of design problem
D. All of the mentioned
Answer» D. All of the mentioned
387.

A software engineer must design the modules with the goal of high cohesion and lowcoupling.

A. True
B. False
C. all
D. none
Answer» B. False
388.

The system failure due to power failure is considered under

A. Hardware reliability
B. Software reliability
C. Operation reliability
D. None of these
Answer» B. Software reliability
389.

Maximum possible value of reliability is(

A. 100
B. 10
C. 1
Answer» D.
390.

Analyst used --------- method to collect information from person by asking standardquestion to person or group of person.

A. Interviews
B. Questionnaires.
C. Record inspection or view
D. Observations
Answer» B. Questionnaires.
391.

This module gets data from super-ordinates, process that data and again forward It tosuper-ordinate modules, These modules are used for processing purpose.

A. Afferent modules
B. Efferent modules
C. Co-ordinate modules
D. Transform modules.
Answer» E.
392.

Why there is a need for Software management?

A. Software development is complex and expensive
B. It is done with few people with fixed skills and abilities
C. It is not time consuming
D. None of the mentioned
Answer» B. It is done with few people with fixed skills and abilities
393.

Unit testing process is

A. Software designing process
B. Software operating process
C. Software validation process
D. Software decomposition process
Answer» D. Software decomposition process
394.

------------------system operates continuously to keep management abreast of what ishappening in all major areas

A. Execution Information system(EIS)
B. Integrated system
C. Subsystem
D. Transaction processing system
Answer» B. Integrated system
395.

Which is NOT the part of operating procedure manuals?(

A. User manuals
B. Operational manuals
C. Documentation manuals
D. Installation manuals
Answer» D. Installation manuals
396.

ER diagram is a ------------t

A. Design
B. Coding
C. Testing
D. None of above
Answer» B. Coding
397.

Regression testing is primarily related to:(

A. Functional testing
B. Data flow testing
C. Development testing
D. Maintenance testing
Answer» E.
398.

System operation takes place after

A. System specification
B. System design
C. System installation
D. System decomposition
Answer» D. System decomposition
399.

)The number of clauses used in ISO 9001 are(

A. 15
B. 25
C. 20
D. 10
Answer» D. 10
400.

Validation plan describes

A. Quality procedure
B. Schedule procedure
C. Management procedure
D. None of these
Answer» C. Management procedure