MCQOPTIONS
Saved Bookmarks
This section includes 245 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
is the first enemy of communication. |
| A. | noise |
| B. | clarity |
| C. | politeness |
| D. | completeness |
| Answer» B. clarity | |
| 2. |
means to impart understanding of the message. |
| A. | encoding |
| B. | receiver |
| C. | decoding |
| D. | feedback |
| Answer» D. feedback | |
| 3. |
are problems arising from expression. |
| A. | cultural barriers |
| B. | semantic problems |
| C. | wrong assumptions |
| D. | selecting perception |
| Answer» C. wrong assumptions | |
| 4. |
Cloud are standardized in order to appeal to the majority of its audience. |
| A. | svas |
| B. | slas |
| C. | sals |
| D. | none of the mentioned |
| Answer» C. sals | |
| 5. |
Security methods such as private encryption, VLANs and firewalls comes under subject area. |
| A. | accounting management |
| B. | compliance |
| C. | data privacy |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 6. |
measures the ability of a regression test selection technique to handle realistic applications. |
| A. | efficiency |
| B. | precision |
| C. | generality |
| D. | inclusiveness |
| Answer» D. inclusiveness | |
| 7. |
Selective retest techniques may be more economical than the “retest- all”technique.How many selective retest techniques are there? |
| A. | two |
| B. | three |
| C. | four |
| D. | five |
| Answer» C. four | |
| 8. |
contract is one that has automatic renewals until one party requests termination. |
| A. | uniform |
| B. | evergreen |
| C. | moderate |
| D. | on-demand |
| Answer» C. moderate | |
| 9. |
A software provides the framework from which a comprehensive plan for software development can be established. |
| A. | people |
| B. | product |
| C. | process |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 10. |
In the embedded devices and objects working under IoT are resource constrained. |
| A. | health |
| B. | industry |
| C. | home |
| D. | information system |
| Answer» E. | |
| 11. |
will enable the humans to access, control and manage the operation. |
| A. | iot |
| B. | bigdata |
| C. | network |
| D. | communication |
| Answer» B. bigdata | |
| 12. |
Unix sort command uses as its sorting technique. |
| A. | quick sort |
| B. | bucket sort |
| C. | radix sort |
| D. | merge sort |
| Answer» B. bucket sort | |
| 13. |
Prisonner’s dilemma can be related to the following: |
| A. | cooperative behaviour |
| B. | graph theory |
| C. | both (a) and (b) |
| D. | none of the mentioned |
| Answer» B. graph theory | |
| 14. |
A randomized algorithm uses random bits as input inorder to achieve a good performance over all possible choice of random bits. |
| A. | worst case |
| B. | best case |
| C. | average case |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 15. |
are used to represent activity in a network diagram. |
| A. | circles |
| B. | squares |
| C. | rectangles |
| D. | arrows |
| Answer» E. | |
| 16. |
The process determines whether exposure to a chemical can increase the incidence of adverse health effect. |
| A. | hazard identification |
| B. | exposure assessment |
| C. | toxicity assessment |
| D. | risk characterization |
| Answer» B. exposure assessment | |
| 17. |
TCP/IP model does not have layer but OSI model have this layer. |
| A. | session layer |
| B. | transport layer |
| C. | application layer |
| D. | network layer |
| Answer» B. transport layer | |
| 18. |
The spiral model has two dimensions namely and |
| A. | diagonal, angular |
| B. | radial, perpendicular |
| C. | radial, angular |
| D. | diagonal, perpendicular |
| Answer» D. diagonal, perpendicular | |
| 19. |
& are two kinds of software products. |
| A. | cad, cam |
| B. | firmware, embedded |
| C. | generic, customised |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 20. |
Which of these is not a commandment of effective communication? |
| A. | clarity in language |
| B. | listen poorly |
| C. | home communication skills |
| D. | adequate medium |
| Answer» C. home communication skills | |
| 21. |
Which of these must be avoided for effective communication? |
| A. | sharing of activity |
| B. | listening |
| C. | ambiguity |
| D. | politeness |
| Answer» D. politeness | |
| 22. |
             is the first enemy of communication. |
| A. | noise |
| B. | clarity |
| C. | politeness |
| D. | completeness |
| Answer» B. clarity | |
| 23. |
Both encoding and decoding of message are influenced by our emotions. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 24. |
When is the communication process complete? |
| A. | when the sender transmits the message |
| B. | when the message enters the channel |
| C. | when the message leaves the channel |
| D. | when the receiver understands the message. |
| Answer» E. | |
| 25. |
Communication should serve as a conflict- reduction exercise. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 26. |
In which of these problems, is the actual message lost in the abundance of transmitted information? |
| A. | selecting perception |
| B. | over communication |
| C. | under communication |
| D. | filtering |
| Answer» C. under communication | |
| 27. |
                     are problems arising from expression. |
| A. | cultural barriers |
| B. | semantic problems |
| C. | wrong assumptions |
| D. | selecting perception |
| Answer» C. wrong assumptions | |
| 28. |
               means to impart understanding of the message. |
| A. | encoding |
| B. | receiver |
| C. | decoding |
| D. | feedback |
| Answer» D. feedback | |
| 29. |
12 COMMUNICATION PLANS |
| A. | noise |
| B. | planning |
| C. | semantic problems |
| D. | wrong assumptions |
| Answer» C. semantic problems | |
| 30. |
Which of these is the external sounds present in the channels of communication? |
| A. | noise |
| B. | semantic problems |
| C. | cultural barriers |
| D. | over communication |
| Answer» B. semantic problems | |
| 31. |
                       is a function of the particular enterprise and application in an on- premises deployment. |
| A. | vendor lock |
| B. | vendor lock-in |
| C. | vendor lock-ins |
| D. | none of the mentioned |
| Answer» C. vendor lock-ins | |
| 32. |
Cloud                  are standardized in order to appeal to the majority of its audience. |
| A. | svas |
| B. | slas |
| C. | sals |
| D. | none of the mentioned |
| Answer» C. sals | |
| 33. |
The reputation for cloud computing services for the quality of those services is shared by |
| A. | replicas |
| B. | shards |
| C. | tenants |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 34. |
Which of the following captive area deals with monitoring? |
| A. | licensed |
| B. | variable but under control |
| C. | low |
| D. | all of the mentioned |
| Answer» C. low | |
| 35. |
Security methods such as private encryption, VLANs and firewalls comes under                      subject area. |
| A. | accounting management |
| B. | compliance |
| C. | data privacy |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 36. |
                 captive requires that the cloud accommodate multiple compliance regimes. |
| A. | licensed |
| B. | policy-based |
| C. | variable |
| D. | all of the mentioned |
| Answer» C. variable | |
| 37. |
Which of the following subject area deals with pay-as-you-go usage model? |
| A. | accounting management |
| B. | compliance |
| C. | data privacy |
| D. | all of the mentioned |
| Answer» B. compliance | |
| 38. |
Which structure describes units are programs or module? |
| A. | calls structure |
| B. | uses structure |
| C. | data flow |
| D. | control flow |
| Answer» E. | |
| 39. |
Which structure’s view shows the mapping of software onto hardware? |
| A. | module structure |
| B. | process structure |
| C. | physical structure |
| D. | class structure |
| Answer» D. class structure | |
| 40. |
Which structure’s view is orthogonal to the module and conceptual view? |
| A. | module structure |
| B. | process structure |
| C. | uses structure |
| D. | data flow |
| Answer» C. uses structure | |
| 41. |
Which of the following are software structures? |
| A. | module structure |
| B. | conceptual or logical structure |
| C. | process structure |
| D. | all of the mentioned |
| Answer» E. | |
| 42. |
Which structure describes units as abstraction of system’s functional requirements? |
| A. | conceptual structure |
| B. | module structure |
| C. | physical structure |
| D. | calls structure |
| Answer» B. module structure | |
| 43. |
An architecture help in evolutionary prototyping in which of the following ways? |
| A. | potential performance problem can be identified early in the product’s life cycle |
| B. | the system is executable early in the product’s life cycle |
| C. | all of the mentioned |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 44. |
Which change is accomplished by modifying a single component? |
| A. | a local change |
| B. | non local change |
| C. | architectural change |
| D. | all of the mentioned |
| Answer» B. non local change | |
| 45. |
Every possible architecture partition possible changes into which of the following categories? |
| A. | local |
| B. | non local |
| C. | architectural |
| D. | all of the mentioned |
| Answer» E. | |
| 46. |
Is it possible to make quality predictions about a system based solely on evaluation of its architecture? |
| A. | yes |
| B. | no |
| C. | may be |
| D. | none of the mentioned |
| Answer» B. no | |
| 47. |
Which of the following is correct for decisions made at life cycle level? |
| A. | decisions at all level of like cycle from high level design to coding, implementation affect system quality |
| B. | decisions at all level of like cycle from high level design to coding, implementation may or may not affect system quality |
| C. | decisions at all level of like cycle from high level design to coding,implementation does not affect system quality |
| D. | none of the mentioned |
| Answer» B. decisions at all level of like cycle from high level design to coding, implementation may or may not affect system quality | |
| 48. |
Which of the following is right dependence relationship? |
| A. | performance depends on how strongly components are coupled with other components in system |
| B. | re-usability depends on the volume and complexity of the inter-component communication and coordination |
| C. | modifiability depends on system’s modularization |
| D. | all of the mentioned |
| Answer» D. all of the mentioned | |
| 49. |
Why does architecture dictates organizational structure? |
| A. | architecture describes the structure of the system being developed which becomes engraved in the development project structure |
| B. | an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture |
| C. | architecture may not describe structure as whole |
| D. | none of the mentioned |
| Answer» B. an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture | |
| 50. |
Which lines depict that architecture defines constraints on an implementation? |
| A. | an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture |
| B. | the implementation need not be divided into prescribed components |
| C. | an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture and the implementation must be divided into prescribed components |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |