Old Questions on Computer Science and Engineering

Interested users can download the Old Questions on Computer Science and Engineering from the links enclosed below. Download the Last 5 Years Old Questions on Computer Science and Engineering Solved along with the Answers of each question.

Old Questions on Computer Science and Engineering
This Old Questions on Computer Science and Engineering may vary from the Actual paper. Use the Old Questions on Computer Science and Engineering as a reference for the exam preparation. Check the Old Questions on Computer Science and Engineering from this page.

At the bottom of this page, you will find ‘Click here links’ for downloading the Old Questions on Computer Science and Engineering. Click on the required link & download your related Old Questions on Computer Science and Engineering to make as a reference for your scheduled preparation.

Computer Science and Engineering Old Question Papers

1. Which of the following is a procedural language?
(a) Domain relational calculus
(b) Tuple relational calculus
(c) Relational algebra
(d) Query language

2. In SQL the statement select * from R, S is equivalent to
(a) Select * from R natural join S
(b) Select * from R cross join S
(c) Select * from R union join S
(d) Select * from R inner join S

3. Functional Dependencies are the types of constraints that are based on
(a) Key
(b) Key revisited
(c) Superset Key
(d) None of these

4. A query in the tuple relational calculus is expressed as
(a) {t | P() | t}
(b) {P(t) | t}
(c) {t | P(t)}
(d) All of these

5. The total participation by entities is represented in E-R diagram as
(a) Dashed line
(b) Double line
(c) Double rectangle
(d) Circle

6. A primary key combined with a foreign key creates
(a) Parent-Child relationship between the tables that connect them
(b) Many to many relationship between the tables that connect them
(c) Network model between the tables that connect them
(d) None of these

7. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called
(a) Consistent state
(b) Parallel state
(c) Atomic state
(d) Inconsistent state

8. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.
(a) Shadow copy
(b) Shadow paging
(c) Update log records
(d) All of these

9. DML is provided for
(a) Description of logical structure of database
(b) Addition of new structures in the database system
(c) Manipulation & processing of database
(d) Definition of physical structure of database system

10. An entity set that does not have sufficient attributes to form a primary key is a
(a) Strong entity set
(b) Weak entity set
(c) Simple entity set
(d) Primary entity set

11. Which of the following is the process of increasing redundancy in the database either for convenience or to improve performance?
(a) Normalisation
(b) Optimisation
(c) Dependency
(d) Denormalisation

12. Which of the following is a top-down process?
(a) Specialisation
(b) Categorisation
(c) Generalisation
(d) None of these

13. What defines how and where data are organised in physical data storage?
(a) Internal schema
(b) Conceptual schema
(c) External schema
(d) None of these

14. What is a disjoint less constraint?
(a) It requires that an entity belongs to no more than one level entity set.
(b) The same entity may belong to more than one level.
(c) The database must contain an unmatched foreign key value.
(d) An entity can be joined with another entity in the same level entity set.

15. When R ÇS = Φ, then the cost of computing is
(a) the same as R × S
(b) greater the R × S
(c) less than R × S
(d) cannot say anything

16. A transaction is in __________ state after the final statement has been executed.
(a) partially committed
(b) active
(c) committed
(d) None of these

17. Which of the following ensures the atomicity of the transaction?
(a) Transaction management component of DBMS
(b) Application Programmer
(c) Concurrency control component of DBMS
(d) Recovery management component of DBMS

18. Wait-for graph is used for
(a) detecting view serializability
(b) detecting conflict serializability
(c) deadlock prevention
(d) deadlock detection

19. A single channel is shared by multiple signals by
(a) Analog modulation
(b) Digital modulation
(c) Multiplexing
(d) Demultiplexing

20. When 2 or more bits in a data unit has been changed during the transmission, the error is called
(a) Burst error
(b) Random error
(c) Bit error
(d) Inverted error

21. This topology requires multipoint connection
(a) Bus
(b) Ring
(c) Star
(d) Mesh

22. In computer network, nodes are
(a) the computer that originates the dat
(b) the computer that routes the data
(c) the computer that terminates the data
(d) All of these

23. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
(a) Bridge
(b) Router
(c) Firewall
(d) Switch

24. In _______ transmission, the channel capacity is shared by both communicating devices at all times.
(a) Simplex
(b) Half-duplex
(c) Full-duplex
(d) Half-simplex

25. Frequency of failure and network recovery time after a failure are measures of the _______ of a network.
(a) Performance
(b) Reliability
(c) Security
(d) None of these

More Question Set on Computer Science and Engineering

Model Question Old Question
Sample Papers Mock Test
Practice Set Question Bank
Important Questions Test Papers
Typical Questions Selected Questions

26. The _______ is the physical path over which a message travels.
(a) Protocol
(b) Signal
(c) Medium
(d) None of these

27. A TCP/IP application service that converts user-friendly names to IP addresses is
(a) Browser
(b) Web-server
(c) Domain name system
(d) Domain name suit

28. A computer that connect two networks is
(a) Gateway
(b) Link
(c) Hub
(d) None of these

29. In OSI model dialogue control and token management are responsibilities of
(a) Session Layer
(b) Network layer
(c) Transport layer
(d) Data link layer

30. A complex low pass signal has a bandwidth of 100kHz. What is the minimum sampling rate for this signal?
(a) 100,000
(b) 200,000
(c) 400,000
(d) 800,000

31. In CSMA/CD the transmission is deferred for a period of time called
(a) Interpacket Space
(b) Interframe Space
(c) Intermessage space
(d) Transmission delay

32. In a __________ topology, if there are n devices in a network, each device has n-1 ports for cables.
(a) Star
(b) Bus
(c) Mesh
(d) Ring

33. The name of the protocol which provides virtual terminal in TCP/IP model is.
(a) SMTP
(b) Telnet
(c) HTTP
(d) None of these

34. Coupling is a qualitative indication of the degree to which a module
(a) can be written more compactly.
(b) focuses on just one thing.
(c) is able to complete its function in a timely manner.
(d) is connected to other modules and the outside world.

35. Which of the following is a project scheduling method that can be applied to software development?
(a) PERT
(b) CMM
(c) CPM
(d) Both (a) and (c)

36. Statement and branch coverage metrics are part of
(a) Analysis Model
(b) Testing
(c) Design Model
(d) Source code

37. In DFDs, user interactions with the system is denoted by
(a) Circle
(b) Arrow
(c) Rectangle
(d) Triangle

38. What is normally considered as an adjunct to the coding step?
(a) Integration Testing
(b) Unit Testing
(c) Completion of Testing
(d) Regression Testing

39. Which one is not a size measure for software product?
(a) LOC
(b) Halstead’s program length
(c) Function Count
(d) Cyclomatic Complexity

40. The aim of software engineering is to produce software that is
(a) Fault-free
(b) Delivered on time, Delivered within budget
(c) Satisfies users’ needs
(d) All of these

41. What would be investigated during Requirements analysis?
(a) System performance, Test Scheduling, Organisational Structure
(b) Languages, Platforms, Competition
(c) System Context, User Populations, User Tasks
(d) Verification, Formal Methods, Accuracy

42. __________ is a black box testing method
(a) Boundary value analysis
(b) Basic path testing
(c) Code path analysis
(d) None of these

43. In the system concepts, the term integration
(a) Implies structure and order
(b) Refers to the manner in which each component functions with other components of the system
(c) Means that parts of computer system depends on one another
(d) Refers to the holism of systems

44. A quantitative measure of the degree to which a system, component, or process posses a given attribute
(a) Measure
(b) Measurement
(c) Metric
(d) None of these

45. If P is risk probability, L is loss, then Risk Exposure (RE) is computed as
(a) RE = P/L
(b) RE = P + L
(c) RE = P*L
(d) RE = 2* P *L

46. FP-based estimation techniques require problem decomposition based on
(a) information domain values
(b) project schedule
(c) software functions
(d) process activities

47. In the spiral model ‘risk analysis’ is performed
(a) in the first loop
(b) in the first and second loop
(c) before using spiral model
(d) in every loop

48. The model in which the requirements are implemented by category is
(a) Evolutionary Development Model
(b) Waterfall Model
(c) Prototyping
(d) Iterative Enhancement Model

49. The main design activities in the software design process are
i) System specification iii) Component design ii) interface design iv) algorithm design
(a) ii, iii and iv only
(b) i, ii and iii only
(c) i, iii and iv only
(d) All i, ii, iii and iv

50. Software instruction intended to satisfy a user’s specific processing needs are called
(a) System software
(b) Process software
(c) Documentation
(d) Application software