Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 245 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

is the first enemy of communication.

A. noise
B. clarity
C. politeness
D. completeness
Answer» B. clarity
2.

means to impart understanding of the message.

A. encoding
B. receiver
C. decoding
D. feedback
Answer» D. feedback
3.

are problems arising from expression.

A. cultural barriers
B. semantic problems
C. wrong assumptions
D. selecting perception
Answer» C. wrong assumptions
4.

Cloud                  are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» C. sals
5.

Security methods such as private encryption, VLANs and firewalls comes under                      subject area.

A. accounting management
B. compliance
C. data privacy
D. all of the mentioned
Answer» D. all of the mentioned
6.

measures the ability of a regression test selection technique to handle realistic applications.

A. efficiency
B. precision
C. generality
D. inclusiveness
Answer» D. inclusiveness
7.

Selective retest techniques may be more economical than the “retest- all”technique.How many selective retest techniques are there?

A. two
B. three
C. four
D. five
Answer» C. four
8.

contract is one that has automatic renewals until one party requests termination.

A. uniform
B. evergreen
C. moderate
D. on-demand
Answer» C. moderate
9.

A software                  provides the framework from which a comprehensive plan for software development can be established.

A. people
B. product
C. process
D. none of the mentioned
Answer» D. none of the mentioned
10.

In                    the embedded devices and objects working under IoT are resource constrained.

A. health
B. industry
C. home
D. information system
Answer» E.
11.

will enable the humans to access, control and manage the operation.

A. iot
B. bigdata
C. network
D. communication
Answer» B. bigdata
12.

Unix sort command uses                    as its sorting technique.

A. quick sort
B. bucket sort
C. radix sort
D. merge sort
Answer» B. bucket sort
13.

Prisonner’s dilemma can be related to the following:

A. cooperative behaviour
B. graph theory
C. both (a) and (b)
D. none of the mentioned
Answer» B. graph theory
14.

A randomized algorithm uses random bits as input inorder to achieve a                             good performance over all possible choice of random bits.

A. worst case
B. best case
C. average case
D. none of the mentioned
Answer» D. none of the mentioned
15.

are used to represent activity in a network diagram.

A. circles
B. squares
C. rectangles
D. arrows
Answer» E.
16.

The                          process determines whether exposure to a chemical can increase the incidence of adverse health effect.

A. hazard identification
B. exposure assessment
C. toxicity assessment
D. risk characterization
Answer» B. exposure assessment
17.

TCP/IP model does not have              layer but OSI model have this layer.

A. session layer
B. transport layer
C. application layer
D. network layer
Answer» B. transport layer
18.

The spiral model has two dimensions namely                            and

A. diagonal, angular
B. radial, perpendicular
C. radial, angular
D. diagonal, perpendicular
Answer» D. diagonal, perpendicular
19.

&                           are two kinds of software products.

A. cad, cam
B. firmware, embedded
C. generic, customised
D. none of the mentioned
Answer» D. none of the mentioned
20.

Which of these is not a commandment of effective communication?

A. clarity in language
B. listen poorly
C. home communication skills
D. adequate medium
Answer» C. home communication skills
21.

Which of these must be avoided for effective communication?

A. sharing of activity
B. listening
C. ambiguity
D. politeness
Answer» D. politeness
22.

             is the first enemy of communication.

A. noise
B. clarity
C. politeness
D. completeness
Answer» B. clarity
23.

Both encoding and decoding of message are influenced by our emotions.

A. true
B. false
Answer» B. false
24.

When is the communication process complete?

A. when the sender transmits the message
B. when the message enters the channel
C. when the message leaves the channel
D. when the receiver understands the message.
Answer» E.
25.

Communication should serve as a conflict- reduction exercise.

A. true
B. false
Answer» B. false
26.

In which of these problems, is the actual message lost in the abundance of transmitted information?

A. selecting perception
B. over communication
C. under communication
D. filtering
Answer» C. under communication
27.

                     are problems arising from expression.

A. cultural barriers
B. semantic problems
C. wrong assumptions
D. selecting perception
Answer» C. wrong assumptions
28.

               means to impart understanding of the message.

A. encoding
B. receiver
C. decoding
D. feedback
Answer» D. feedback
29.

12 COMMUNICATION PLANS

A. noise
B. planning
C. semantic problems
D. wrong assumptions
Answer» C. semantic problems
30.

Which of these is the external sounds present in the channels of communication?

A. noise
B. semantic problems
C. cultural barriers
D. over communication
Answer» B. semantic problems
31.

                       is a function of the particular enterprise and application in an on- premises deployment.

A. vendor lock
B. vendor lock-in
C. vendor lock-ins
D. none of the mentioned
Answer» C. vendor lock-ins
32.

Cloud                  are standardized in order to appeal to the majority of its audience.

A. svas
B. slas
C. sals
D. none of the mentioned
Answer» C. sals
33.

The reputation for cloud computing services for the quality of those services is shared by

A. replicas
B. shards
C. tenants
D. all of the mentioned
Answer» D. all of the mentioned
34.

Which of the following captive area deals with monitoring?

A. licensed
B. variable but under control
C. low
D. all of the mentioned
Answer» C. low
35.

Security methods such as private encryption, VLANs and firewalls comes under                      subject area.

A. accounting management
B. compliance
C. data privacy
D. all of the mentioned
Answer» D. all of the mentioned
36.

                 captive requires that the cloud accommodate multiple compliance regimes.

A. licensed
B. policy-based
C. variable
D. all of the mentioned
Answer» C. variable
37.

Which of the following subject area deals with pay-as-you-go usage model?

A. accounting management
B. compliance
C. data privacy
D. all of the mentioned
Answer» B. compliance
38.

Which structure describes units are programs or module?

A. calls structure
B. uses structure
C. data flow
D. control flow
Answer» E.
39.

Which structure’s view shows the mapping of software onto hardware?

A. module structure
B. process structure
C. physical structure
D. class structure
Answer» D. class structure
40.

Which structure’s view is orthogonal to the module and conceptual view?

A. module structure
B. process structure
C. uses structure
D. data flow
Answer» C. uses structure
41.

Which of the following are software structures?

A. module structure
B. conceptual or logical structure
C. process structure
D. all of the mentioned
Answer» E.
42.

Which structure describes units as abstraction of system’s functional requirements?

A. conceptual structure
B. module structure
C. physical structure
D. calls structure
Answer» B. module structure
43.

An architecture help in evolutionary prototyping in which of the following ways?

A. potential performance problem can be identified early in the product’s life cycle
B. the system is executable early in the product’s life cycle
C. all of the mentioned
D. none of the mentioned
Answer» D. none of the mentioned
44.

Which change is accomplished by modifying a single component?

A. a local change
B. non local change
C. architectural change
D. all of the mentioned
Answer» B. non local change
45.

Every possible architecture partition possible changes into which of the following categories?

A. local
B. non local
C. architectural
D. all of the mentioned
Answer» E.
46.

Is it possible to make quality predictions about a system based solely on evaluation of its architecture?

A. yes
B. no
C. may be
D. none of the mentioned
Answer» B. no
47.

Which of the following is correct for decisions made at life cycle level?

A. decisions at all level of like cycle from high level design to coding, implementation affect system quality
B. decisions at all level of like cycle from high level design to coding, implementation may or may not affect system quality
C. decisions at all level of like cycle from high level design to coding,implementation does not affect system quality
D. none of the mentioned
Answer» B. decisions at all level of like cycle from high level design to coding, implementation may or may not affect system quality
48.

Which of the following is right dependence relationship?

A. performance depends on how strongly components are coupled with other components in system
B. re-usability depends on the volume and complexity of the inter-component communication and coordination
C. modifiability depends on system’s modularization
D. all of the mentioned
Answer» D. all of the mentioned
49.

Why does architecture dictates organizational structure?

A. architecture describes the structure of the system being developed which becomes engraved in the development project structure
B. an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture
C. architecture may not describe structure as whole
D. none of the mentioned
Answer» B. an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture
50.

Which lines depict that architecture defines constraints on an implementation?

A. an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture
B. the implementation need not be divided into prescribed components
C. an implementation exhibits an architecture if it conforms to the structural decisions described by the architecture and the implementation must be divided into prescribed components
D. none of the mentioned
Answer» D. none of the mentioned