Old Questions on Computer Science and Engineering
Interested users can download the Old Questions on Computer Science and Engineering from the links enclosed below. Download the Last 5 Years Old Questions on Computer Science and Engineering Solved along with the Answers of each question.
This Old Questions on Computer Science and Engineering may vary from the Actual paper. Use the Old Questions on Computer Science and Engineering as a reference for the exam preparation. Check the Old Questions on Computer Science and Engineering from this page.
At the bottom of this page, you will find ‘Click here links’ for downloading the Old Questions on Computer Science and Engineering. Click on the required link & download your related Old Questions on Computer Science and Engineering to make as a reference for your scheduled preparation.
Computer Science and Engineering Old Question Papers
1. Which of the following is a procedural language?
(a) Domain relational calculus
(b) Tuple relational calculus
(c) Relational algebra
(d) Query language
2. In SQL the statement select * from R, S is equivalent to
(a) Select * from R natural join S
(b) Select * from R cross join S
(c) Select * from R union join S
(d) Select * from R inner join S
3. Functional Dependencies are the types of constraints that are based on
(a) Key
(b) Key revisited
(c) Superset Key
(d) None of these
4. A query in the tuple relational calculus is expressed as
(a) {t | P() | t}
(b) {P(t) | t}
(c) {t | P(t)}
(d) All of these
5. The total participation by entities is represented in E-R diagram as
(a) Dashed line
(b) Double line
(c) Double rectangle
(d) Circle
6. A primary key combined with a foreign key creates
(a) Parent-Child relationship between the tables that connect them
(b) Many to many relationship between the tables that connect them
(c) Network model between the tables that connect them
(d) None of these
7. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called
(a) Consistent state
(b) Parallel state
(c) Atomic state
(d) Inconsistent state
8. The ____________ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.
(a) Shadow copy
(b) Shadow paging
(c) Update log records
(d) All of these
9. DML is provided for
(a) Description of logical structure of database
(b) Addition of new structures in the database system
(c) Manipulation & processing of database
(d) Definition of physical structure of database system
10. An entity set that does not have sufficient attributes to form a primary key is a
(a) Strong entity set
(b) Weak entity set
(c) Simple entity set
(d) Primary entity set
11. Which of the following is the process of increasing redundancy in the database either for convenience or to improve performance?
(a) Normalisation
(b) Optimisation
(c) Dependency
(d) Denormalisation
12. Which of the following is a top-down process?
(a) Specialisation
(b) Categorisation
(c) Generalisation
(d) None of these
13. What defines how and where data are organised in physical data storage?
(a) Internal schema
(b) Conceptual schema
(c) External schema
(d) None of these
14. What is a disjoint less constraint?
(a) It requires that an entity belongs to no more than one level entity set.
(b) The same entity may belong to more than one level.
(c) The database must contain an unmatched foreign key value.
(d) An entity can be joined with another entity in the same level entity set.
15. When R ÇS = Φ, then the cost of computing is
(a) the same as R × S
(b) greater the R × S
(c) less than R × S
(d) cannot say anything
16. A transaction is in __________ state after the final statement has been executed.
(a) partially committed
(b) active
(c) committed
(d) None of these
17. Which of the following ensures the atomicity of the transaction?
(a) Transaction management component of DBMS
(b) Application Programmer
(c) Concurrency control component of DBMS
(d) Recovery management component of DBMS
18. Wait-for graph is used for
(a) detecting view serializability
(b) detecting conflict serializability
(c) deadlock prevention
(d) deadlock detection
19. A single channel is shared by multiple signals by
(a) Analog modulation
(b) Digital modulation
(c) Multiplexing
(d) Demultiplexing
20. When 2 or more bits in a data unit has been changed during the transmission, the error is called
(a) Burst error
(b) Random error
(c) Bit error
(d) Inverted error
21. This topology requires multipoint connection
(a) Bus
(b) Ring
(c) Star
(d) Mesh
22. In computer network, nodes are
(a) the computer that originates the dat
(b) the computer that routes the data
(c) the computer that terminates the data
(d) All of these
23. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
(a) Bridge
(b) Router
(c) Firewall
(d) Switch
24. In _______ transmission, the channel capacity is shared by both communicating devices at all times.
(a) Simplex
(b) Half-duplex
(c) Full-duplex
(d) Half-simplex
25. Frequency of failure and network recovery time after a failure are measures of the _______ of a network.
(a) Performance
(b) Reliability
(c) Security
(d) None of these
More Question Set on Computer Science and Engineering
Model Question | Old Question |
Sample Papers | Mock Test |
Practice Set | Question Bank |
Important Questions | Test Papers |
Typical Questions | Selected Questions |
26. The _______ is the physical path over which a message travels.
(a) Protocol
(b) Signal
(c) Medium
(d) None of these
27. A TCP/IP application service that converts user-friendly names to IP addresses is
(a) Browser
(b) Web-server
(c) Domain name system
(d) Domain name suit
28. A computer that connect two networks is
(a) Gateway
(b) Link
(c) Hub
(d) None of these
29. In OSI model dialogue control and token management are responsibilities of
(a) Session Layer
(b) Network layer
(c) Transport layer
(d) Data link layer
30. A complex low pass signal has a bandwidth of 100kHz. What is the minimum sampling rate for this signal?
(a) 100,000
(b) 200,000
(c) 400,000
(d) 800,000
31. In CSMA/CD the transmission is deferred for a period of time called
(a) Interpacket Space
(b) Interframe Space
(c) Intermessage space
(d) Transmission delay
32. In a __________ topology, if there are n devices in a network, each device has n-1 ports for cables.
(a) Star
(b) Bus
(c) Mesh
(d) Ring
33. The name of the protocol which provides virtual terminal in TCP/IP model is.
(a) SMTP
(b) Telnet
(c) HTTP
(d) None of these
34. Coupling is a qualitative indication of the degree to which a module
(a) can be written more compactly.
(b) focuses on just one thing.
(c) is able to complete its function in a timely manner.
(d) is connected to other modules and the outside world.
35. Which of the following is a project scheduling method that can be applied to software development?
(a) PERT
(b) CMM
(c) CPM
(d) Both (a) and (c)
36. Statement and branch coverage metrics are part of
(a) Analysis Model
(b) Testing
(c) Design Model
(d) Source code
37. In DFDs, user interactions with the system is denoted by
(a) Circle
(b) Arrow
(c) Rectangle
(d) Triangle
38. What is normally considered as an adjunct to the coding step?
(a) Integration Testing
(b) Unit Testing
(c) Completion of Testing
(d) Regression Testing
39. Which one is not a size measure for software product?
(a) LOC
(b) Halstead’s program length
(c) Function Count
(d) Cyclomatic Complexity
40. The aim of software engineering is to produce software that is
(a) Fault-free
(b) Delivered on time, Delivered within budget
(c) Satisfies users’ needs
(d) All of these
41. What would be investigated during Requirements analysis?
(a) System performance, Test Scheduling, Organisational Structure
(b) Languages, Platforms, Competition
(c) System Context, User Populations, User Tasks
(d) Verification, Formal Methods, Accuracy
42. __________ is a black box testing method
(a) Boundary value analysis
(b) Basic path testing
(c) Code path analysis
(d) None of these
43. In the system concepts, the term integration
(a) Implies structure and order
(b) Refers to the manner in which each component functions with other components of the system
(c) Means that parts of computer system depends on one another
(d) Refers to the holism of systems
44. A quantitative measure of the degree to which a system, component, or process posses a given attribute
(a) Measure
(b) Measurement
(c) Metric
(d) None of these
45. If P is risk probability, L is loss, then Risk Exposure (RE) is computed as
(a) RE = P/L
(b) RE = P + L
(c) RE = P*L
(d) RE = 2* P *L
46. FP-based estimation techniques require problem decomposition based on
(a) information domain values
(b) project schedule
(c) software functions
(d) process activities
47. In the spiral model ‘risk analysis’ is performed
(a) in the first loop
(b) in the first and second loop
(c) before using spiral model
(d) in every loop
48. The model in which the requirements are implemented by category is
(a) Evolutionary Development Model
(b) Waterfall Model
(c) Prototyping
(d) Iterative Enhancement Model
49. The main design activities in the software design process are
i) System specification iii) Component design ii) interface design iv) algorithm design
(a) ii, iii and iv only
(b) i, ii and iii only
(c) i, iii and iv only
(d) All i, ii, iii and iv
50. Software instruction intended to satisfy a user’s specific processing needs are called
(a) System software
(b) Process software
(c) Documentation
(d) Application software