Selected Questions on Computer Science and Engineering
Interested users can download the Selected Questions on Computer Science and Engineering from the links enclosed below. Download the Last 5 Years Selected Questions on Computer Science and Engineering Solved along with the Answers of each question.
This Selected Questions on Computer Science and Engineering may vary from the Actual paper. Use the Selected Questions on Computer Science and Engineering as a reference for the exam preparation. Check the Selected Questions on Computer Science and Engineering from this page.
At the bottom of this page, you will find ‘Click here links’ for downloading the Selected Questions on Computer Science and Engineering. Click on the required link & download your related Selected Questions on Computer Science and Engineering to make as a reference for your scheduled preparation.
Computer Science and Engineering Selected Question Paper
1. An entity set that does not have sufficient attributes to form a primary key is termed a __________
(a) Strong entity set
(b) Variant set
(c) Weak entity set
(d) Variable set
2. In the __________ normal form, a composite attribute is converted to individual attributes.
(a) First
(b) Second
(c) Third
(d) Fourth
3. Empdt1(empcode, name, street, city, state,pincode).
For any pincode, there is only one city and state. Also, for given street, city and state, there is just one pincode. In normalization terms, Empdt1 is a relation in
(a) 1 NF only
(b) 2 NF and hence also in 1 NF
(c) 3NF and hence also in 2NF and 1NF
(d) BCNF and hence also in 3NF, 2NF and 1NF
4. Each modification done in database transaction are first recorded into the
(a) Hard drive
(b) Log
(c) Disk
(d) Datamart
5. Which of the following is not a Armstrong’s Axiom?
(a) Reflexivity rule
(b) Transitivity rule
(c) Pseudotransitivity rule
(d) Augmentation rule
6. The subset of super key is a candidate key under what condition?
(a) No proper subset is a super key
(b) All subsets are super keys
(c) Subset is a super key
(d) Each subset is a super key
7. Which one of the following is used to define the structure of the relation ,deleting relations and relating schemas?
(a) DML(Data Manipulation Language)
(b) DDL(Data Definition Language)
(c) Query
(d) Relational Schema
8. An attribute A of datatype varchar(20) has the value “Avi”. The attribute B of datatype char(20) has value “Reed” .Here attribute A has __________ spaces and attribute B has __________ spaces.
(a) 3, 20
(b) 20, 4
(c) 20, 20
(d) 3, 4
9. ’_ _ _ ’ matches any string of __________ three characters. ’_ _ _ %’ matches any string of at __________ three characters.
(a) Atleast, Exactly
(b) Exactly, Atleast
(c) Atleast, All
(d) All , Exactly
10. In SQL the spaces at the end of the string are removed by __________ function.
(a) Upper
(b) String
(c) Trim
(d) Lower
11. What type of join is needed when you wish to include rows that do not have matching values?
(a) Equi-join
(b) Natural join
(c) Outer join
(d) All of these
12. The attribute AGE is calculated from DATE_OF_BIRTH . The attribute AGE is
(a) Single valued
(b) Multi valued
(c) Composite
(d) Derived
13. Updates that violate __________ are disallowed.
(a) Integrity constraints
(b) Transaction control
(c) Authorization
(d) DDL constraints
14. Insert into instructor values (10211, ’Smith’, ’Biology’, 66000);
What type of statement is this?
(a) DLL
(b) DML
(c) Relational
(d) DDL
15. Fill in with correct keyword to update the instructor relation.
UPDATE instructor __________ salary= salary * 1.05;
(a) Where
(b) Set
(c) In
(d) Select
16. In relational algebra, for select operation the __________ appear in the subscript and the __________ argument appears in the parenthesis after the sigma.
(a) Predicates, relation
(b) Relation, Predicates
(c) Operation, Predicates
(d) Relation, Operation
17. DBMS periodically suspends all processing and synchronizes its files and journals through the use of
(a) Checkpoint facility
(b) Backup facility
(c) Recovery manager
(d) Database change log
18. Suppose relation R(A,B,C,D,E) has the following functional dependencies:
A → B
B → C
BC → A
A → D
E → A
D → E
Which of the following is not a key?
(a) A
(b) E
(c) B,C
(d) D
19. Which of the following is used to insert a tuple from another relation.
(a) INSERT INTO course (courseid, title, deptname, credits) VALUES (’CS-437’, ’DATABASESystems’, ’CompSci.’, 4);
(b) INSERT INTO instructor SELECT ID, name, deptname, 18000 FROM student WHERE deptname = ’Music’ AND totcred > 144;
(c) INSERT INTO course VALUES (’CS-437’, ’DATABASESystems’, ’CompSci.’, 4);
(d) None of these
20. Which of the following protocols ensures conflict serializability and safety from deadlocks?
(a) Two-phase locking protocol
(b) Time-stamp ordering protocol
(c) Graph based protocol
(d) None of these
21. If transaction Ti gets an explicit lock on the file Fc in exclusive mode, then it has an __________ on all the records belonging to that file.
(a) Explicit lock in exclusive mode
(b) Implicit lock in shared mode
(c) Explicit lock in shared mode
(d) Implicit lock in exclusive mode
22. A top to bottom relationship among the items in a database is established by a:
(a) Hierarchical Schema
(b) Relational Schema
(c) Network Schema
(d) Distributed Schema
23. The level of data abstraction which describes how the data is actually stored is:
(a) Physical level
(b) Conceptual level
(c) External level
(d) View level
24. Which layer is responsible for process to process delivery?
(a) network layer
(b) transport layer
(c) session layer
(d) data link layer
25. Which layers of the OSI model are host-to-host layers?
(a) Transport, Session, Presentation, Application
(b) Network, Transport, Session, Presentation
(c) Datalink, Network, Transport, Session
(d) Physical, Datalink, Network, Transport
More Question Set on Computer Science and Engineering
Model Question | Old Question |
Sample Papers | Mock Test |
Practice Set | Question Bank |
Important Questions | Test Papers |
Typical Questions | Selected Questions |
26. In OSI network architecture, the routing is performed by
(a) session layer
(b) application layer
(c) Network layer
(d) Transport layer
27. Which multiplexing technique transmits digital signals?
(a) FDM
(b) TDM
(c) WDM
(d) None of these
28. In __________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
(a) synchronous
(b) statistical
(c) isochronous
(d) asynchronous
29. ASK, PSK, FSK, and QAM are examples of __________ encoding.
(a) analog-to-digital
(b) analog-to-analog
(c) digital-to-analog
(d) digital-to-digital
30. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)
(a) 1200 bands
(b) 2400 bands
(c) 3600 bands
(d) 4800 bands
31. How many bits are there in the Ethernet address?
(a) 64 bits
(b) 32 bits
(c) 16 bits
(d) 8 bits
32. FTP uses __________ parallel TCP connections to transfer a file
(a) 1
(b) 2
(c) 3
(d) 4
33. Typically the TCP port used by SMTP is
(a) 25
(b) 35
(c) 50
(d) 15
34. Connection establishment in TCP is done by which mechanism?
(a) Flow control
(b) Three-Way Handshaking
(c) Forwarding
(d) Synchronization
35. Which operating mode of telnet is full duplex?
(a) default mode
(b) server mode
(c) line mode
(d) client mode
36. Which error detection method consists of just one redundant bit per data unit?
(a) CRC
(b) Checksum
(c) Simple parity check
(d) Two-dimensional parity check
37. A __________ error means that two or more bits in the data unit have changed.
(a) Burst
(b) double-bit
(c) single-bit
(d) none of these
38. Network in which every computer is capable of playing the role of client, server or both at the same time is called
(a) peer-to-peer network
(b) local area network
(c) dedicated server network
(d) wide area network
39. The __________ is the physical path over which a message travels
(a) Path
(b) Medium
(c) Protocol
(d) Route
40. A set of rules that governs data communication
(a) Protocols
(b) Standards
(c) RFCs
(d) one of these
41. When collection of various computers seems a single coherent system to its client, then it is called
(a) computer network
(b) distributed system
(c) networking system
(d) none of these
42. Two devices are in network if
(a) a process in one device is able to exchange information with a process in another device
(b) a process is running on both devices
(c) PIDs of the processes running of different devices are same
(d) none of these
43. Communication channel is shared by all the machines on the network in
(a) broadcast network
(b) unicast network
(c) multicast network
(d) none of these
44. Bluetooth is an example of
(a) personal area network
(b) local area network
(c) virtual private network
(d) none of these
45. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
(a) Bridge
(b) Firewall
(c) Router
(d) all of these
46. A list of protocols used by a system, one protocol per layer, is called
(a) protocol architecture
(b) protocol stack
(c) protocol suit
(d) none of these
47. Which one of the following extends a private network across public networks?
(a) local area network
(b) virtual private network
(c) enterprise private network
(d) storage area network
48. The number of layers in Internet protocol stack
(a) 5
(b) 7
(c) 6
(d) None of these
49. Application layer is implemented in
(a) End system
(b) NIC
(c) Ethernet
(d) None of these
50. In the OSI model, as a data packet moves from the lower to the upper layers, headers are ________
(a) Added
(b) Removed
(c) Rearranged
(d) None of these
51. Identify the statement which cannot be associated with OSI model
(a) A structured way to discuss and easier update syatem components
(b) One layer may duplicate lower layer functionality
(c) Functionality at one layer no way requires information from another layer
(d) None of these
52. Which address identifies a process on a host?
(a) physical address
(b) logical address
(c) port address
(d) specific address
53. The physical layer concerns with
(a) bit-by-bit delivery
(b) process to process delivery
(c) application to application delivery
(d) none of these
54. physical layer provides
(a) mechanical specifications of electrical connectors and cables
(b) electrical specification of transmission line signal level
(c) specification for IR over optical fiber
(d) all of these
55. The physical layer translates logical communication requests from the __________ into hardware specific operations.
(a) data link layer
(b) network layer
(c) trasnport layer
(d) application layer
56. Wireless transmission can be done via
(a) radio waves
(b) microwaves
(c) infrared
(d) all of these
57. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
(a) logical link control sublayer
(b) media access control sublayer
(c) network interface control sublayer
(d) none of these
58. The Hamming distance between equal code words is __________.
(a) 0
(b) 1
(c) N
(d) 2n
59. Which one of the following models is not suitable for accommodating any change?
(a) Build & Fix Model
(b) Prototyping Model
(c) Evolutionary Model
(d) Waterfall Model
60. Which of the following life cycle model can be chosen if the development team has less experience on similar projects?
(a) Spiral
(b) Waterfall
(c) RAD
(d) Iterative Enhancement Model
61. Choose an internal software quality from given below:
(a) scalability
(b) usability
(c) reusability
(d) reliability
62. Which one of the following is a requirement that fits in a developer’s module?
(a) Availability
(b) Testability
(c) Usability
(d) Flexibility
63. Coupling is a qualitative indication of the degree to which a module
(a) can be written more compactly
(b) focuses on just one thing
(c) is able to complete its function in a timely manner
(d) is connected to other modules and the outside world
64. In size oriented metrics, metrics are developed based on the __________
(a) number of Functions
(b) number of user inputs
(c) number of lines of code
(d) amount of memory usage
65. Which of the following risk is the failure of a purchased component to perform as expected?
(a) Product risk
(b) Project risk
(c) Business risk
(d) Programming risk
66. Which granularity level of testing checks the behavior of module cooperation?
(a) Unit Testing
(b) Integration Testing
(c) Acceptance Testing
(d) Regression Testing
67. If P is risk probability, L is loss, then Risk Exposure (RE) is computed as__________ .
(a) RE = P/L
(b) RE = P + L
(c) RE = P*L
(d) RE = 2* P *L
68. If every requirement can be checked by a cost-effective process, then the SRS is __________ .
(a) Verifiable
(b) Traceable
(c) Modifiable
(d) Complete
69. Which chart is a tool that depicts project as network diagram that is capable of graphically representing main events of project in both parallel and consecutive way?
(a) PERT chart
(b) Gantt chart
(c) Pie Chart
(d) Bar Chart
70. Which is the most important feature of spiral model?
(a) Quality management
(b) Risk management
(c) Performance management
(d) Efficiency management
71. The model in which the requirements are implemented by its category is __________ .
(a) Evolutionary Development Model
(b) Waterfall Model
(c) Prototyping
(d) Iterative Enhancement Model
72. Identify the disadvantage of Spiral Model.
(a) Doesn’t work well for smaller projects
(b) High amount of risk analysis
(c) Strong approval and documentation control
(d) Additional Functionality can be added at a later date
73. In which test design each input is tested at both ends of its valid range and just outside its valid range?
(a) Boundary value testing
(b) Equivalence class partitioning
(c) Boundary value testing AND Equivalence class partitioning
(d) Decision tables
74. Which of the following is not defined in a good Software Requirement Specification (SRS) document?
(a) Functional Requirement
(b) Nonfunctional Requirement
(c) Goals of implementation
(d) Algorithm for software implementation
75. Which of the following is not a characteristic common to all design methods?
(a) configuration management
(b) functional component
(c) notation quality assessment
(d) guidelines refinement heuristics
76. Checking quality of software in both simulated and live environments is known as
(a) Validity
(b) Usability
(c) Checking
(d) Validation
77. Which may be estimated either in terms of KLOC (Kilo Line of Code) or by calculating number of function points in the software?
(a) Time estimation
(b) Effort estimation
(c) Cost estimation
(d) Software size estimation
78. Selection of a model is based on
(a) Requirements
(b) Development team & Users
(c) Project type and associated risk
(d) All of these
79. Which two models doesn’t allow defining requirements early in the cycle?
(a) Waterfall & RAD
(b) Prototyping & Spiral
(c) Prototyping & RAD
(d) Waterfall & Spiral
80. Which one of the following is not a software process quality?
(a) Productivity
(b) Portability
(c) Timeliness
(d) Visibility
81. Purpose of process is to deliver software
(a) in time
(b) with acceptable quality
(c) that is cost efficient
(d) both ‘in time’ & ‘with acceptable quality’
82. The work associated with software engineering can be categorized into three generic phases, regardless of application area, project size, or complexity namely the__________ phase which focuses on what, the__________ phase which focuses on how and the__________ phase which focuses on change.
i. Support
ii. development
iii. definition
(a) i, ii, iii
(b) ii, i, iii
(c) iii, ii, i
(d) iii, i, ii
83. Which is one of the most important stakeholder from the following?
(a) Entry level personnel
(b) Middle level stakeholder
(c) Managers
(d) Users of the software
84. Which is the first step in the software development life cycle?
(a) Analysis
(b) Design
(c) Problem/Opportunity Identification
(d) Development and Documentation
85. In Design phase, which is the primary area of concern?
(a) Architecture
(b) Data
(c) Interface
(d) All of these
86. Architectural Design Metrics are __________ in nature.
(a) Black Box
(b) White Box
(c) Gray Box
(d) Green Box
87. The amount of time that the software is available for use is known as
(a) Reliability
(b) Usability
(c) Efficiency
(d) Functionality
88. What are attributes of good software?
(a) Software maintainability
(b) Software functionality
(c) Software development
(d) Software maintainability & functionality