COMPUTER SCIENCE - PAGE 13
1.The primary objective of cost-benefit analysis is
1. To find out direct and indirect cost of developing the information system
2. To determine the tangible benefits of the information system
3. To determine if it is economically worthwhile to invest in developing the information system
4. To determine the intangible benefits of the information system
Ans: 3
2. The tangible benefits in the following list are
( I ). savings due to reducing investment
( II ). savings due to sending bills faster and consequent early collection
( III ). providing better service to the customers
( IV). improving quality of company's products.
1. i and ii
2. ii and iii
3. iii and iv
4. i and iii
Ans: 1
3. In order to understand the working of an organization for which a computer based system is being designed, an analyst must
1. Look at only current work and document flow in the organization
2. Discuss with top level and middle level management only
3. Interview top, middle, line managers and also clerks who will enter data and use the system
4. Only clerical and middle level staff who have long experience in the organization and will be users of the system
Ans: 3
4. Changing an operational information system is
1. Impossible
2. Expensive And Done Selectively
3. Never Required
4. Usually Done
Ans: 2
5. By polymorphism of a subsystem we mean
1. It should be reusable
2. It should have polymorphic data types
3. It should accept generic commands and interpret appropriately
4. It should morph polygons
Ans: 3
6. Inheritance in object-oriented system is used to
1. Create new classes from existing classes
2. Add new operations to existing operations
3. Add new attributes to existing attributes
4. Add new states to existing states
Ans: 1
7. System design is carried out
1. As soon as system requirements are determined
2. Whenever a system analyst feels it is urgent
3. After final system specifications are approved by the organization
4. Whenever the user management feels it should be done
Ans: 3
8. A metric used to measure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as
1. Process metric
2. Product Metric
3. Test metrics
4. none
Ans: 1
9. A Plan to overcome the risk called as
1. Migration Plan
2. Master plan
3. Maintenance plan
4. Mitigation plan
Ans: 4
10. Splitting project into tasks and estimate time and resources required to complete each task called as
1. Project scheduling
2. Project tracking
3. Both
4. None
Ans: 1
11. Risk tables are sorted by
1. Probability and cost
2. Probability and impact
3. Probability and size
4. Probability and exposure
Ans: 2
12. Optimization, Defect Prevention and Quality Control. Its come under the
1. CMM Level 2
2. CMM Level 3
3. CMM Level 4
4. CMM Level 5
Ans: 4
13. Which of the following are characteristics of testable software
1. Observability
2. Simplicity
3. Stability
4. All of the above
Ans: 4
14. The cyclomatic complexiy metric provides the designer with information regarding the number of
1. Cycles in the program
2. Errors in the program
3. Independent logic paths in the program
4. Statements in the program
Ans: 3
15. Which of these techniques is not useful for partition testing at the class level
1. Attribute-based partitioning
2. Category-based partitioning
3. Equivalence class partitioning
4. State-based partitioning
Ans: 3
16. Real-time applications add a new and potentially difficult element to the testing mix
1. Performance
2. Reliability
3. Security
4. Time
Ans: 4
17. The most common reason for the presence of a large number of bugs in a software product is
1. Incompetence of the developer
2. Incompetence of the tester
3. Bad requirements
4. Wrong use of tools and techniques
Ans: 4
18. Which of the following does not form a part of a workbench?
1. Standards
2. Quality attributes
3. Quality control
4. Procedures
Ans: 2
19. Modifying existing standards to better match the need of a project or environment is
1. Definition
2. Standard for a standard
3. Tailoring
4. Customization
Ans: 3
20. Which of the items listed below is not one of the software engineering layers?
1. Process
2. Manufacturing
3. Methods
4. Tools
Ans: 2
21. Which of these is not a characteristic of Personal Software Process?
1. Emphasizes personal measurement of work product
2. Practitioner requires careful supervision by the project manager
3. Individual practitioner is responsible for estimating and scheduling
4. Practitioner is empowered to control quality of software work products
Ans: 2
22. Effective software project management focuses on four P's which are
1. People, performance, payoff, product
2. People, product, performance, process
3. People, product, process, project
4. People, process, payoff, product
Ans: 3
23. The first step in project planning is to
1. Determine the budget
2. Select a team organizational model
3. Determine the project constraints
4. Establish the objectives and scope
Ans: 4
24. The best project team organizational model to use when tackling extremely complex problems is the
1. Closed paradigm
2. Open paradigm
3. Random paradigm
4. Synchronous paradigm
Ans: 2
25. Which of these software characteristics are used to determine the scope of a software project?
1. Context, lines of code, function
2. Context, function, communication requirements
3. Information objectives, function, performance
4. Communications requirements, performance, information objectives
Ans: 3
1. To find out direct and indirect cost of developing the information system
2. To determine the tangible benefits of the information system
3. To determine if it is economically worthwhile to invest in developing the information system
4. To determine the intangible benefits of the information system
Ans: 3
2. The tangible benefits in the following list are
( I ). savings due to reducing investment
( II ). savings due to sending bills faster and consequent early collection
( III ). providing better service to the customers
( IV). improving quality of company's products.
1. i and ii
2. ii and iii
3. iii and iv
4. i and iii
Ans: 1
3. In order to understand the working of an organization for which a computer based system is being designed, an analyst must
1. Look at only current work and document flow in the organization
2. Discuss with top level and middle level management only
3. Interview top, middle, line managers and also clerks who will enter data and use the system
4. Only clerical and middle level staff who have long experience in the organization and will be users of the system
Ans: 3
4. Changing an operational information system is
1. Impossible
2. Expensive And Done Selectively
3. Never Required
4. Usually Done
Ans: 2
5. By polymorphism of a subsystem we mean
1. It should be reusable
2. It should have polymorphic data types
3. It should accept generic commands and interpret appropriately
4. It should morph polygons
Ans: 3
6. Inheritance in object-oriented system is used to
1. Create new classes from existing classes
2. Add new operations to existing operations
3. Add new attributes to existing attributes
4. Add new states to existing states
Ans: 1
7. System design is carried out
1. As soon as system requirements are determined
2. Whenever a system analyst feels it is urgent
3. After final system specifications are approved by the organization
4. Whenever the user management feels it should be done
Ans: 3
8. A metric used to measure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as
1. Process metric
2. Product Metric
3. Test metrics
4. none
Ans: 1
9. A Plan to overcome the risk called as
1. Migration Plan
2. Master plan
3. Maintenance plan
4. Mitigation plan
Ans: 4
10. Splitting project into tasks and estimate time and resources required to complete each task called as
1. Project scheduling
2. Project tracking
3. Both
4. None
Ans: 1
11. Risk tables are sorted by
1. Probability and cost
2. Probability and impact
3. Probability and size
4. Probability and exposure
Ans: 2
12. Optimization, Defect Prevention and Quality Control. Its come under the
1. CMM Level 2
2. CMM Level 3
3. CMM Level 4
4. CMM Level 5
Ans: 4
13. Which of the following are characteristics of testable software
1. Observability
2. Simplicity
3. Stability
4. All of the above
Ans: 4
14. The cyclomatic complexiy metric provides the designer with information regarding the number of
1. Cycles in the program
2. Errors in the program
3. Independent logic paths in the program
4. Statements in the program
Ans: 3
15. Which of these techniques is not useful for partition testing at the class level
1. Attribute-based partitioning
2. Category-based partitioning
3. Equivalence class partitioning
4. State-based partitioning
Ans: 3
16. Real-time applications add a new and potentially difficult element to the testing mix
1. Performance
2. Reliability
3. Security
4. Time
Ans: 4
17. The most common reason for the presence of a large number of bugs in a software product is
1. Incompetence of the developer
2. Incompetence of the tester
3. Bad requirements
4. Wrong use of tools and techniques
Ans: 4
18. Which of the following does not form a part of a workbench?
1. Standards
2. Quality attributes
3. Quality control
4. Procedures
Ans: 2
19. Modifying existing standards to better match the need of a project or environment is
1. Definition
2. Standard for a standard
3. Tailoring
4. Customization
Ans: 3
20. Which of the items listed below is not one of the software engineering layers?
1. Process
2. Manufacturing
3. Methods
4. Tools
Ans: 2
21. Which of these is not a characteristic of Personal Software Process?
1. Emphasizes personal measurement of work product
2. Practitioner requires careful supervision by the project manager
3. Individual practitioner is responsible for estimating and scheduling
4. Practitioner is empowered to control quality of software work products
Ans: 2
22. Effective software project management focuses on four P's which are
1. People, performance, payoff, product
2. People, product, performance, process
3. People, product, process, project
4. People, process, payoff, product
Ans: 3
23. The first step in project planning is to
1. Determine the budget
2. Select a team organizational model
3. Determine the project constraints
4. Establish the objectives and scope
Ans: 4
24. The best project team organizational model to use when tackling extremely complex problems is the
1. Closed paradigm
2. Open paradigm
3. Random paradigm
4. Synchronous paradigm
Ans: 2
25. Which of these software characteristics are used to determine the scope of a software project?
1. Context, lines of code, function
2. Context, function, communication requirements
3. Information objectives, function, performance
4. Communications requirements, performance, information objectives
Ans: 3
26. Arrange the following memory units of data in ascending order. giga, tera, kilo, mega
1) mega, tera, giga, kilo
2) kilo, mega, giga, tera
3) kilo, mega, tera, giga
4) kilo, tera, mega, giga
Ans: 2
27. Which of the following is the shortcut key to rename a folder in windows operating system ?
1) f1
2) f4
3) f2
4) f7
Ans: 3
28. Which of the following is a volatile memory ?
1) rom
2) ram
3) programmable rom
4) erasable prom
Ans: 2
29. What is the full form of ascii ?
1) american standard code for information interchange
2) american standard code for information internet
3) automatic simple code for information intranet
4) australian standard code for information interconversion
Ans: 1
30. Which of the following is not a web browser ?
1) opera
2) safari
3) firefox
4) acrobat reader
Ans: 4
31. What is the full form of bcc in the context of e-mail composition ?
1) bold carbon copy
2) blind carbon copy
3) blocked copy content
4) blue copy content
Ans: 2
32. Which is not an internetworking device?
1) hub
2) bridge
3) switch
4) usb
Ans: 4
33. Which of the following is a database management software ?
1) mysql
2) db2
3) ms-access
4) all of these.
Ans: 4
34. Which of the following is valid formula in ms excel 2010 ?
1) =a1+a2
2) =add a1+a2
3) a1+a2
4) sum a1 & a2
Ans: 1
35. In ms excel 2010 , shortcut key to prepare chart from selected cells is :
1) f2
2) f4
3) f11
4) f6
Ans: 3
1) mega, tera, giga, kilo
2) kilo, mega, giga, tera
3) kilo, mega, tera, giga
4) kilo, tera, mega, giga
Ans: 2
27. Which of the following is the shortcut key to rename a folder in windows operating system ?
1) f1
2) f4
3) f2
4) f7
Ans: 3
28. Which of the following is a volatile memory ?
1) rom
2) ram
3) programmable rom
4) erasable prom
Ans: 2
29. What is the full form of ascii ?
1) american standard code for information interchange
2) american standard code for information internet
3) automatic simple code for information intranet
4) australian standard code for information interconversion
Ans: 1
30. Which of the following is not a web browser ?
1) opera
2) safari
3) firefox
4) acrobat reader
Ans: 4
31. What is the full form of bcc in the context of e-mail composition ?
1) bold carbon copy
2) blind carbon copy
3) blocked copy content
4) blue copy content
Ans: 2
32. Which is not an internetworking device?
1) hub
2) bridge
3) switch
4) usb
Ans: 4
33. Which of the following is a database management software ?
1) mysql
2) db2
3) ms-access
4) all of these.
Ans: 4
34. Which of the following is valid formula in ms excel 2010 ?
1) =a1+a2
2) =add a1+a2
3) a1+a2
4) sum a1 & a2
Ans: 1
35. In ms excel 2010 , shortcut key to prepare chart from selected cells is :
1) f2
2) f4
3) f11
4) f6
Ans: 3
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15