Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following statements about ERP system is true?

A. Most ERP software implementations fully achieve seamless integration.
B. ERP software packages are themselves combinations of seperate applications for manufacturing, materials, resource planning, general ledger, human resources, procurement and order entry.
C. Integration of ERP systems can be achieved in only one way.
D. An ERP package implemented uniformly throughout an enterprise is likely to contain very flexible connections to allow charges and software variations.
Answer» C. Integration of ERP systems can be achieved in only one way.
2.

A software system crashed 20 times in the year 2017 and for each crash, it took 2 minutes to restart. Approximately, what was the software availability in that year?

A. 96.9924%
B. 97.9924%
C. 98.9924%
D. 99.9924%
Answer» E.
3.

Software Quality Assurance(SQA) encompasses:

A. verification
B. validation
C. both verification and validation
D. none of the above
Answer» D. none of the above
4.

Software engineering primary aims on

A. Reliable software
B. Cost effective software
C. Reliable and cost effective software
D. None of these
Answer» D. None of these
5.

Reliability of software is directly dependent on

A. quality of the design
B. number of errors present
C. software engineers experience
D. user requirement
Answer» C. software engineers experience
6.

A single integrated program may contain

A. Programs that take case of all the basic accounting systems used by a business
B. Word processing, spread sheet processing, graphics and data management
C. An operating system and an application program
D. Both a and b
Answer» E.
7.

Emergency fixes known as patches are result of

A. adaptive maintenance
B. perfective maintenance
C. corrective maintenance
D. none of the above
Answer» D. none of the above
8.

Machine language programs

A. Consist of long sequence of binary numbers
B. Can express the same meaning in fever statements than can BASIC programs
C. Both a and b
D. None of these
Answer» B. Can express the same meaning in fever statements than can BASIC programs
9.

Any error whose cause cannot be identified anywhere within the software system is called …………..

A. Internal error
B. External error
C. Inherent error
D. Logic error
Answer» C. Inherent error
10.

Which one of the following is a object-oriented approaches:

A. The Booch method
B. The Rumbaugh method
C. The Coad and Yomdon method
D. All of the above
Answer» E.
11.

In transform analysis, input portion is called:

A. Afferent branch
B. Efferent branch
C. Central Transform
D. None of the above
Answer» B. Efferent branch
12.

In Software Metrics, McCABE’s cyclomatic number is given by following formula:

A. c=e-n+2p
B. c=e-n-2p
C. c=e+n+2p
D. c=e-n*2p
Answer» B. c=e-n-2p
13.

An error message produced by an interactive system should have:

A. always the error code
B. the list of mistakes done by the user displayed
C. a non-judgemental approach
D. the past records of the occurrence of the same mistake
Answer» C. a non-judgemental approach
14.

Main aim of software engineering is to produce

A. program
B. software
C. within budget
D. software within budget in the given schedule
Answer» E.
15.

The data flow Model of an application mainly shows

A. The underlining data and the relationship among them
B. Processing requirements and the flow of data
C. Decision and control information
D. Communication network structure
Answer» C. Decision and control information
16.

In ...............,modules A and B make use of a common data type, but perhaps perform different operations on it.

A. Data coupling
B. Stamp coupling
C. Control coupling
D. Content coupling
Answer» C. Control coupling
17.

A control structure use to create loops is

A. Sequence
B. Choice
C. Iteration
D. None of these
Answer» D. None of these
18.

Key process areas of CMM level 4 are also classified by a process which is

A. CMM level 2
B. CMM level 3
C. CMM level 5
D. All of the above
Answer» D. All of the above
19.

In a consistent language

A. Similar situations are handled in a similar way
B. Larger program chunks can be broken into smaller modules
C. Multiplication is always performed before addition in all expressions
D. Both a and c
Answer» B. Larger program chunks can be broken into smaller modules
20.

Problems with waterfall model are:1.    Real projects rarely follow this model proposes2.    It is often difficult for the customer3.    Working model is available only in the end4.    Developers are delayed unnecessarily

A. 1 and 4 only
B. 2 and 3 only
C. 1, 2 and 3 only
D. 1, 2, 3 and 4
Answer» E.
21.

Design phase includes

A. Data, architecture and procedural designs only
B. Architectural, Procedural and interface designs only
C. Data, architecture, interface & Procedural designs
D. All of these
Answer» D. All of these
22.

The Function Point (FP) metric is:

A. Calculated from user requirements
B. Calculated from Lines of code
C. Calculated from software’s complexity assessment
D. None of the above
Answer» D. None of the above
23.

Which of the following switching techniques is most suitable for interactive traffic ?

A. Circuit switching
B. Message switching
C. Packet switching
D. All of the above
Answer» D. All of the above
24.

IP address in B class is given by:

A. 125.123.123.2
B. 191.023.21.54
C. 192.128.32.56
D. 10.14.12.34
Answer» C. 192.128.32.56
25.

Which of the following is not a congestion policy at network layer?

A. Flow Control Policy
B. Packet Discard Policy
C. Packet Lifetime Management Policy
D. Routing Algorithm
Answer» B. Packet Discard Policy
26.

An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ?

A. 196.6 seconds
B. 19.66 seconds
C. 1.966 seconds
D. 0.1966 seconds
Answer» D. 0.1966 seconds
27.

Match the following :(a) UDP             (i) Message Transfer Protocol(b) OSPF           (ii) Bit-oriented Protocol(c) SMTP           (iii) Interior Gateway Routing Protocol(d) HDLC           (iv) Connectionless Transport ProtocolCodes :      (a)   (b)  (c)  (d)

A. (iii)  (iv)  (ii)  (i)
B. (iv)  (iii)  (ii)  (i)
C. (iv)  (iii)  (i)  (ii)
D. (iii)  (iv)  (i)  (ii)
Answer» D. (iii)  (iv)  (i)  (ii)
28.

The local area network technology used in Ethernet

A. CSMA
B. CSMA/CD
C. CSMA/CA
D. ALOHA
Answer» C. CSMA/CA
29.

The period of a signal is 100 ms. Its frequency is .............

A. 100^3 Hertz
B. 10^−2 KHz
C. 10^−3 KHz
D. 10^5 Hertz
Answer» C. 10^−3 KHz
30.

The LAPB frame structure and the frame structure of SDLC are:

A. Opposite
B. Identical
C. Reversed
D. Non-identical
Answer» C. Reversed
31.

Making sure that all the data packets of a message are delivered to the destination is ................ control.

A. Error
B. Loss
C. Sequence
D. Duplication
Answer» B. Loss
32.

If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90, 180 and 270 degrees, then modulation called

A. BPSK
B. QPSK
C. QAM
D. MSK
Answer» C. QAM
33.

A bridge has access to ............... address in the same network.

A. Physical
B. Network
C. Datalink
D. Application
Answer» B. Network
34.

.................. do not take their decisions on measurements or estimates of the current traffic and topology.

A. Static algorithms
B. Adaptive algorithms
C. Non - adaptive algorithms
D. Recursive algorithms
Answer» D. Recursive algorithms
35.

Which one of the following media is multidrop?

A. Shielded Twisted pair cable
B. Unshielded Twisted pair cable
C. Thick Coaxial cable
D. Fiber Optic cable
Answer» D. Fiber Optic cable
36.

A secure protocol for personal emails:

A. SSL
B. PGP
C. RSA
D. Kerberos
Answer» C. RSA
37.

The cost of the network is usually determined by:

A. Time complexity
B. Switching complexity
C. Circuit complexity
D. None of these
Answer» C. Circuit complexity
38.

Usually information security in a network is achieved by:

A. Layering
B. Cryptography
C. Grade of service
D. None of the above
Answer» C. Grade of service
39.

Device on one network can communicate with devices on another network via a

A. Hub/Switch
B. Utility server
C. File server
D. Gateway
Answer» E.
40.

Vignere Cipher is a kind of:

A. Stream Cipher
B. Mono alphabetic Cipher
C. Poly alphabetic Cipher
D. Block Cipher
Answer» D. Block Cipher
41.

A station in a network, forward incoming packets by placing them on its shortest output queue. What routing algorithm is being used?

A. Hot potato routing
B. Flooding
C. Static routing
D. Delta routing
Answer» B. Flooding
42.

Object Request Broker (ORB) isI. A software program that runs on the client as well as on the application server.II. A software program that runs on the client side only.III. A software program that runs on the application server, where most of the components reside.

A. I,II and III
B. I & II
C. II & III
D. I only
Answer» E.
43.

Another name of IEEE 802.11a is …………………

A. Wi-Max
B. Fast Ethernet
C. Wi-Fi
D. 802.11 g
Answer» D. 802.11 g
44.

Virtual circuit is associated with a ..................... service.

A. Connectionless
B. Error-free
C. Segmentation
D. Connection-oriented
Answer» E.
45.

Which of the following statement/s is/are true?(i) Firewalls can screen traffic going into or out of an organization.(ii) Virtual private networks can stimulate an old leased network to provide certain desirable properties.Choose the correct answer from the code given below:

A. (i) only
B. (ii) only
C. Both (i) and (ii)
D. Neither (i) nor (ii)
Answer» D. Neither (i) nor (ii)
46.

What is the baud rate of the standard 10 Mbps Ethernet ?

A. 10 megabaud
B. 20 megabaud
C. 30 megabaud
D. 40 megabaud
Answer» C. 30 megabaud
47.

The number of bits used for addressing in Gigabit Ethernet is ...................

A. 32 bits
B. 48 bits
C. 64 bits
D. 128 bits
Answer» C. 64 bits
48.

In order that a code is ‘t’ error correcting, the minimum Hamming distance should be:

A. t
B. 2t-1
C. 2t
D. 2t+1
Answer» E.
49.

What is the transmission signal coding method for a T1 carrier called ?

A. Binary
B. NRZ
C. Bipolar
D. Manchester
Answer» D. Manchester
50.

The ................ is a set of standards that defines how a dynamic web document should be written, how input data should be supplied to the program, and how the output result should be used.

A. Hyper Text Markup Language
B. File Transfer Protocol
C. Hyper Text Transfer Protocol
D. Common Gateway Interface
Answer» E.