BE Information Technology 0
BE Information Technology 0
52. What does K refers in the K-Means algorithm which is a non-hierarchical clustering
approach?
a. Complexity
b. Fixed value
c. No of iterations
d. Number of clusters
53. What is the final resultant cluster size in Divisive algorithm, which is one of the hierarchical
clustering approaches?
a. Zero
b. Two
c. Three
d. Singleton
54. Hierarchical agglomerative clustering is typically visualized as?
a. Dendrogram
b. Binary trees
c. Block diagram
d. Graph
55. Which statement about outliers is true?
a. Outliers should be part of the training dataset but should not be present in the test data.
b. Outliers should be identified and removed from a dataset.
c. The nature of the problem determines how outliers are used
d. Outliers should be part of the test dataset but should not be present in the training data.
56. The concept of core, border and noise points fall into which category?
a. DBSCAN
b. DENCLUE
c. Subspace clustering
d. Grid based
57. Which clustering technique start with as many clusters as there are records, with each cluster
having only one record?
a. Divisive.
b. Agglomerative.
c. Partition.
d. Numeric.
58. In which algorithm each cluster is represented by the center of gravity of the cluster?
a. K-medoid.
b. K-means.
c. Divisive.
d. Agglomerative.
59. The goal of _____ is to discover both the dense and sparse regions of a data set?
a. Association rule.
b. Classification.
c. Clustering.
d. Genetic Algorithm.
60. Which algorithm is hierarchical clustering algorithm?
a. BIRCH.
b. DBSCAN
c. PAM.
d. CURE.
Question No Ans
1 b
2 b
3 c
4 c
5 d
6 d
7 d
8 b
9 c
10 a
11 c
12 c
13 b
14 a
15 a
16 a
17 a
18 b
19 a
20 c
21 c
22 a
23 d
24 a
25 b
26 a
27 d
28 b
29 b
30 a
31 c
32 b
33 d
34 b
35 a
36 d
37 b
38 d
39 d
40 d
41 b
42 d
43 a
44 d
45 d
46 d
47 a
48 c
49 d
50 b
51 d
52 d
53 d
54 a
55 c
56 a
57 b
58 b
59 c
60 b
Model Question Paper
Subject : Data warehousing & Mining
Class : BE
Semester : VIII
Total Questions : 60
-----------------------------------------------------------------------------------------------------------------------------------
Answer- A
Answer- D
Answer - B
Answer - C
5. The following is true of three-tier data warehouses:
A) Once created, the data marts will keep on being updated from the data warehouse at
periodic times.
B) Once created, the data marts will directly receive their new data from the
Operational databases.
C) The data marts are different groups of tables in the data warehouse.
D) A data mart becomes a data warehouse when it reaches a critical size
Answer : A
6. The core of the multidimensional model is the ................................., which consists of a large
set of facts and a number of dimensions.
A) Multidimensional cube
B) Dimensions cube
C) Data cube
D) Data model
Answer- C
A) Data Characterization
B) Data Classification
C) Data discrimination
D) None of above
Answer- B
A) Data Characterization
B) Data Classification
C) Data discrimination
D) Data selection
Answer- A
9. Star schema have what type of relationship between fact table and dimension.
A) Many–to-many
B) One-to-one
C) One-to many
D) All of above
Answer- C
10. Which schema has normalized form to reduce redundancy in data warehouse design
A) Star schema
B) Snowflake schema
C) Fact constellation schema
D) All of above
Answer- B
11. Data warehouse contains data that is never found in the operational
environment.
A) Normalized.
B) Informational.
C) Summary.
D) Denormalized.
Answer : C
Answer: A
ANSWER: B
ANSWER: C
Answer: D
Answer: B
Answer: B
Answer: D
Answer: A
Answer: B
21. Converting data from different sources into a common format for processing is called as
.
A. selection.
B. preprocessing.
C. transformation.
D. interpretation.
Answer: C
Answer: B
23. predicts future trends & behaviors, allowing business managers to make
proactive,
knowledge-driven decisions.
A. Data warehouse.
B. Data mining.
C. Datamarts.
D. Metadata.
Answer: B
Answer: D
Answer: C
26. The value that says that transactions in D that support X also support Y is called
.
A. confidence.
B. support.
C. support count.
D. None of the above.
Answer: A
Answer: C
Answer: B
29. The step eliminates the extensions of (k-1)-item sets which are not found to be
frequent, frombeing considered for counting support.
A. Candidate generation.
B. Pruning.
C. Partitioning.
D. Itemset eliminations.
Answer: B
Answer: B
31. The goal of is to discover both the dense and sparse regions of a data set.
A. Association rule.
B. Classification.
C. Clustering.
D. Genetic Algorithm.
Answer: C
32. All set of items whose support is greater than the user-specified minimum support are
called as
.
A. border set.
B. frequent set.
C. maximal frequent set.
D. lattice.
Answer: B
Answer: C
34................................ is a comparison of the general features of the target class data objects
against the general features of objects from one or multiple contrasting classes.
A) Data Characterization
B) Data Classification
C) Data discrimination
D) Data selection
Answer: C
Answer: D
36. The ............................. exposes the information being captured, stored, and managed by
operational systems.
A) top-down view
Answer: C
37. The ................... allows the selection of the relevant information necessary for the data
warehouse.
A) top-down view
Answer: A
Answer: C
39. Data transformation includes .
A. a process to change data from a detailed level to a summary level.
B. a process to change data from a summary level to a detailed level.
C. joining data from one source into various sources of data.
D. separating data from one source into various sources of data.
Answer: A
Answer: D
41. . are designed to overcome any limitations placed on the warehouse by the
nature of the relational data model.
A. Operational database.
B. Relational database.
C. Multidimensional database.
D. Data repository.
Answer: C
Answer: D
Answer: B
Answer: B
Answer: B
46. A directory to help the DSS analyst locate the contents of the data warehouse is seen in
.
A. Current detail data.
B. Lightly summarized data.
C. Metadata.
D. Older detail data.
Answer: C
Answer: A
Answer: C
54. The process of viewing the cross-tab (Single dimensional) with a fixed value of one
attribute is
a) Slicing
b) Dicing
c) Pivoting
d) Both Slicing and Dicing
Answer: A
55. The operation of moving from finer-granularity data to a coarser granularity (by means of
aggregation) is called a _
a) Rollup
b) Drill down
c) Dicing
d) Pivoting
Answer: A
56. Data that can be modeled as dimension attributes and measure attributes are called
data.
a) Multidimensional
b) Single dimensional
c) Relational
d) Operational
Answer: A
57. is the most well known association rule algorithm and is used in
most commercial products.
A. Apriori algorithm.
B. Partition algorithm.
C. Distributed algorithm.
D. Pincer-search algorithm.
Answer: A
Answer: A
59. If T consist of 500000 transactions, 20000 transaction contain bread, 30000 transaction
contain jam,
10000 transaction contain both bread and jam. Then the support of bread and jam is
.
A. 2%
B. 20%
C. 3%
D. 30%
Answer: A
60. If T consist of 500000 transactions, 20000 transaction contain bread, 30000 transaction contain jam,
10000 transaction contain both bread andjam. Thenthe confidence ofbuying bread with jamis .
A. 33.33%
B. 66.66%
C. 45%
D. 50%
Answer: D
Model Question Paper
Class: BE CSE
Semester: VIII
1.Which of the following features usually applies to data in a data warehouse?
A.Once created, the data marts will keep on being updated from the data warehouse at
periodic times
B.Once created, the data marts will directly receive their new data from the operational
databases
C.The data marts are different groups of tables in the data warehouse
D.A data mart becomes a data warehouse when it reaches a critical size
Ans: A
6.OLTP means__________
Ans-B
8.The generic two-level data warehouse architecture includes which of the following?
10.OLAP means__________
Ans-A
11.A star schema has what type of relationship between a dimension and fact table?
A. Many-to-many
B. One-to-one
C. One-to-many
D. All of the above.
Ans: C
A. Completely demoralized
B. Partially demoralized
C. Completely normalized
D. Partially normalized
Ans: C
18.Data in the data warehouse are loaded and refreshed from operational systems.
A. True
B. False
Ans: A
A. True
B. False
Ans: B
A.True
B.False
Ans: A
21.Data that can be modeled as dimension attributes and measure attributes are
called _______ data.
A,Multidimensional
B. Singledimensional
C. Measured
D.Dimensional
Ans:A
Ans:A
A. Data Mining.
B. Data Warehousing.
C. Web Mining.
D. Text Mining
Ans-B
25.Data mining is
D. None of these
Ans:A
31.What is noise?
A. component of a network
B.context of KDD and data mining
C.aspects of a data warehouse
D.None of these
Ans:B
32.Data mining is a tool for allowing users to find the hidden relationships in data.
A.True
B.False
Ans:A
37.Datawarehouse is______
A.Subject-Oriented
B.Time-varient
C.integrated
D.All of the above
Ans:A
A. Data warehouse.
B. Data Mining
C. Datmarts
D. Metadata
Ans:B
A. It mines all frequent patterns through pruning rules with lesser support
B. It mines all frequent patterns through pruning rules with higher support
C. Both a and b
Ans: A
A. Hash-based techniques
B. Transaction Reduction
C. Partitioning
Ans: C
C. Outlier Detection
D. Intrusion Detection
Ans: B
Ans: C
48.What is association rule mining?
Ans: C
D. Superset of both closed frequent item sets and maximal frequent item sets
And: D
B. Pruning
C. Candidate generation
D. Number of iterations
Ans: C
And: C
A. Classification
B. Regression
C. Association analysis
D. Outlier analysis
Ans-C
A. Frequent itemset
B. Subsequences
C. Substructures
Ans-D
A. Association
B. Correlation
D. Grouping
Ans -C
56.Rule interesting measures______
A. Support
B. Confidence
D. Pattern
Ans-C
A. 1994
B. 1995
C. 1993
D. 1997
Ans-A
A. Join step
B. Prune step
Ans-C
59.Cluster is
D .None of these
Ans-A
60. A good clustering method will produce high quality clusters with
Ans-C
Model Question Paper
Class: BE CSE& IT
Semester: VIII
1.Which of the following features usually applies to data in a data warehouse?
A.Once created, the data marts will keep on being updated from the data warehouse at
periodic times
B.Once created, the data marts will directly receive their new data from the operational
databases
C.The data marts are different groups of tables in the data warehouse
D.A data mart becomes a data warehouse when it reaches a critical size
Ans: A
6.OLTP means__________
Ans-B
8.The generic two-level data warehouse architecture includes which of the following?
10.OLAP means__________
Ans-A
11.A star schema has what type of relationship between a dimension and fact table?
A. Many-to-many
B. One-to-one
C. One-to-many
D. All of the above.
Ans: C
A. Completely demoralized
B. Partially demoralized
C. Completely normalized
D. Partially normalized
Ans: C
18.Data in the data warehouse are loaded and refreshed from operational systems.
A. True
B. False
Ans: A
A. True
B. False
Ans: B
A.True
B.False
Ans: A
21.Data that can be modeled as dimension attributes and measure attributes are
called _______ data.
A,Multidimensional
B. Singledimensional
C. Measured
D.Dimensional
Ans:A
Ans:A
A. Data Mining.
B. Data Warehousing.
C. Web Mining.
D. Text Mining
Ans-B
25.Data mining is
D. None of these
Ans:A
31.What is noise?
A. component of a network
B.context of KDD and data mining
C.aspects of a data warehouse
D.None of these
Ans:B
32.Data mining is a tool for allowing users to find the hidden relationships in data.
A.True
B.False
Ans:A
37.Datawarehouse is______
A.Subject-Oriented
B.Time-varient
C.integrated
D.All of the above
Ans:A
A. Data warehouse.
B. Data Mining
C. Datmarts
D. Metadata
Ans:B
A. It mines all frequent patterns through pruning rules with lesser support
B. It mines all frequent patterns through pruning rules with higher support
C. Both a and b
Ans: A
A. Hash-based techniques
B. Transaction Reduction
C. Partitioning
Ans: C
C. Outlier Detection
D. Intrusion Detection
Ans: B
Ans: C
48.What is association rule mining?
Ans: C
D. Superset of both closed frequent item sets and maximal frequent item sets
And: D
B. Pruning
C. Candidate generation
D. Number of iterations
Ans: C
And: C
A. Classification
B. Regression
C. Association analysis
D. Outlier analysis
Ans-C
A. Frequent itemset
B. Subsequences
C. Substructures
Ans-D
A. Association
B. Correlation
D. Grouping
Ans -C
56.Rule interesting measures______
A. Support
B. Confidence
D. Pattern
Ans-C
A. 1994
B. 1995
C. 1993
D. 1997
Ans-A
A. Join step
B. Prune step
Ans-C
59.Cluster is
D .None of these
Ans-A
60. A good clustering method will produce high quality clusters with
Ans-C
Model Question Paper
Subject SOFTWARE METRICS AND QUALITY ASSURANCE
Class : BE
Semester : VIII
a. Condition testing
b. Loop testing
Answer: d
2) Which of the following is software metric that provides a quantitative measure of the
logical complexity of a program?
a. Cyclomatic Complexity
b. LOC
c. Function Point
Answer : a
1 P.T.O.
3) A graphical technique for finding if changes and variation in metrics data are
meaningful is known as
c. Control Chart
Answer :c
a. Product Metrics
b. Process Metrics
c. Project Metrics
Answer :c
c. number of function
Answer :a
2
6) Loop Testing methodology includes which of the following.
a. simple loops
b. Nested loops
c. Concatenated loops.
Answer :d
a. Quality
b. Complexity
c. Reliability
Answer :d
b. Execution Speed
c. Defect reported
d All of these
Answer :a
3 P.T.O.
9) Which of the following is an example of QA
a. validation
b. Software testing
c. verification
d. Documentation
Answer :c
Answer :b
a. Equivalence Partitioning
Answer :b
12) Equivalence partitioning and boundary value analysis techniques are used only
during system testing
a. True
b. False
Answer :b
4
13) Which of the followings is/are not a Specification Based Technique?
a. Cause-Effect Table
c. Decision Coverage
Answer :c
Answer :d
a. CMMI
b. Agile
c. Prototyping
d. V model
Answer :a
5 P.T.O.
16) Which of the following is not an information domain required for determining
function point in FPA?
d) Number of errors
Answer :d
c) Both E and D
Answer :c
a) testing
c) warranty work
d) complaint resolution
Answer :a
6
19) Which of the following are advantage of using LOC (lines of code) as a size- oriented
metric?
Answer :a
d. b and c
Answer :d
21) Which metric gives the idea about the contents on a web page ?
a. Word Token
b. Word Count
c. Word Size
d. Word Length
Answer :b
7 P.T.O.
22) Number of dynamic web pages provides an idea about________ for a web page that is
to be built.
a. Size
b. Complexity
c. Effort
Answer :b
a. Booch
b. Boehm
c. Albrecht
d. Jacobson
Answer :c
24) How many Information Domain Values are used for Function Point Computation?
a. three
b. four
c. five
d. six
Answer :c
8
25) Function Point Computation is given by the formula
Answer :b
Answer :b
9 P.T.O.
29) Which of the following is not categorized under Component-Level Design Metrics?
a. Complexity Metrics
b. Cohesion Metrics
c. Morphology Metrics
d. Coupling Metrics
Answer :c
30) From the following methods which size of the software product can be calculated?
10
34) How is reliability and failure intensity related to each other?
a. direct relation
b. inverse relation
c. no relation
d. none of the mentioned
Answer :b
35) How many product quality factors are proposed in McCall quality model?
a. 2
b. 3
c. 11
d. 8
Answer :b
36) Which one of the following is not a software quality model?
a. ISO 9000
b. McCall model
c. Boehm model
d. ISO 9126
Answer :a
37) What is MTTF?
a. Maximum time to failure
b. Mean time to failure
c. Minimum time to failure
d. None of the mentioned
Answer :b
38) The CMM model is a technique to
a. automatically maintain the software reliability
b. Improve the software process.
c. test the software
d. all of the mentioned
Answer :b
11 P.T.O.
39) Which level of CMM is for process management?
a. Initial
b. Repeatable
c. Defined
d. Optimizing
Answer :d
40) SCM stands for
a. Software Control Management
b. Software Configuration Management
c. Software Concept Management
d. None of the mentioned
Answer :b
41) Which of the following is not a main phase in Configuration Management (CM)
Process?
a. CM Planning
b. Executing the CM process
c. CM audits
d. None of the mentioned
Answer :d
42) What are one or more software configuration items that have been formally
reviewed and agreed upon and serve as a basis for further development?
a. Baseline
b. Cumulative changes
c. CM
d. Change Control
Answer :a
43) Which of the following is a example of Configuration Items ?
a. SCM procedures
b. Source code
c. Software design descriptions
d. All of the mentioned
Answer :b
12
44) Quality Management in software engineering is also known as
a. SQA
b. SQM
c. SQI
d. SQA and SQM
Answer :a
45) Quality also can be looked at in terms of user satisfaction which includes
a. A compliant product
b. Good quality output
c. Delivery within budget and schedule
d. All of the mentioned
Answer :d
46) Non-conformance to software requirements is known as
a. Software availability
b. Software reliability
c. Software failure
d. None of the mentioned
Answer :c
47) What kind of quality cost is incurred when an error is detected in a product prior to
shipment?
a. Prevention
b. Internal Failure
c. External Failure
d. Appraisal
Answer :b
48) According to ISO 9001, inspection and testing comes under which management
responsibility?
a. Process control
b. Document control
c. Control of nonconforming products
d. Servicing
Answer :a
13 P.T.O.
49) Line of code (LOC) can be used to normalize quality and/or productivity measure for
_______.
a. Extended function point metrics
b. Function point metrics.
c. Size oriented metrics.
d. d. None of the above.
Answer :c
50) Measure of reliability is given by ______.
a. Mean Time between successes.
b. Mean reliable
c. Mean Time between failures (MTBF).
d. MTTR
Answer :c
51) A COCOMO model is ________.
a. Common Cost Estimation Model.
b. Constructive Cost Estimation Model.
c. Complete Cost Estimation Model.
d. Comprehensive Cost Estimation Model
Answer :b
52) Cost of Production = Right The First time cost (RTF +-----------).
a. Cost of Deployment
b. Cost of Quality
c. Cost of maintenance
d. Cost of Production
Answer :b
53) Which is the Estimation Software size should be known?
a. Time estimation
b. Effort estimation
c. Cost estimation
d. Software size estimation
Answer :b
14
54) Object inherits a class is known as _____ .
a. Maintenance
b. Operations
c. Transitional
d. Development
Answer :b
55) In the Empirical Estimation Technique which model is developed by Barry W.
Boehm?
a. Putnam model
b. COCOMO
c. Both A & B
d. None of the above
Answer :b
56) What is a special set of ISO guidelines that developed to help the interpret standard
for the use in software process?
a. ISO 9001-2000
b. ISO 9001-2001
c. ISO 9000-3
d. ISO 9000-4
Answer :c
57) What is the correctness, completeness, and consistency of the requirements model
will have a strong influence on the quality of all work products that follow?
a. Requirement quality
b. Design quality
c. Code quality
d. Quality control effectiveness
Answer :a
15 P.T.O.
58) Which quality deals with the maintaining the quality of the software product?
a. Quality assurance
b. Quality control
c. Quality Efficiency
d. None of the above
Answer :b
59) Which is focused towards the goal of the organization?
a. Feasibility study
b. Requirement gathering
c. Software requirement specification
d. Software requirement validation
Answer :a
60) What is the project and process level that provides the Quality Metric benefit?
a. Defect amplification
b. Defect removal efficiency
c. Measuring quality
d. All mentioned above
Answer :b
16
Model Question Paper
Subject: Elective III: iPhone Programming (178154 & 228154)
Class: BE
Semester: VIII
AUIKit Framework
B Foundation Framework
CAppKit Framework
Ans.: C
Q2. Single inheritance, Multiple inheritance, and Aggregation comes under _______
A Hierarchy
B Modularity
C Typing
Ans.: A
A James Gosling
B Brad Cox
C Bjarne Stroustrup
D Dennis Ritchie
Ans.: B
Q4. Meaning of iOS is?
A Integrated operating
D None of above
Ans.: C
A1
B3
C2
D4
Ans.: D
(A) UIButton->UIControl->UIView->NSObject->UIResponder
(B) UIButton->UIControl->UIView->UIResponder->NSObject
(C) UIControl->UIButton->UIView->UIResponder->NSObject
Ans.: B
A file permissions
B file ownership
Ans.: D
Q8. The application has not been launched or was running but terminated by the device.
Determine the current state of App.
B Suspended state
C Background state
D Inactive state
Ans.: A
B Mobile phone
D Music player
Ans.: B
A MySQL
B Apache
C SQLite
D Oracle
Ans.: C
A [NSObject description]
B [NSObjecttoString]
C [NSObjectstringWithFormat]
D [NSObjectgetDescription]
Ans.: A
Q12. The __________ is used as an index into the page table.
A frame bit
B frame offset
C page number
D page offset
Ans.: C
Q13. The iphone has a feature that activates when you rotate device from portrait to
landscape
A Accelerometer
B Rotator
C Shadow detector
D Special Sensor
Ans.: A
Q14. What is the programming style of the object oriented conceptual model?
B Invariant relationships
D Algorithms
Ans.:C
Q15. In which of the following mechanisms, types of all variables and expressions are
fixed at compilation time.
A Weak Typing
C Strong Typing
Ans.: B
Q16. The data structure used for file directory is called ____________
A mount table
B process table
C file table
D hash table
Ans.: D
B file-organisation module
Ans.: C
Q18. Which of the following iOS frameworks is a commonly used third party Library?
AAVFoundation.framework
B CFNetwork.framework
C Audiotoolbox.framework
D AFNetwork.framework
Ans.: D
B Only NSStrings do
C Yes
Ans.: A
Q20. What is that concept in type theory in which a single name may denote objects of
many different classes that are related by some common super class referred to ______
A Polymorphism
B Monomorphism
C Type Checking
D Generalization
Ans.: A
A allocate the space in file system & make an entry for new file in directory
Ans.: A
Ans.: A
Ans.: C
Q24. Which data type of objective – C has %i as NSLog conversion characters
(A) Float
(B) Char
(C) Int
(D) Number
Ans.: C
C General-purpose language
Ans.: D
Ans.: D
Q27. Objective -C source code 'implementation' program files usually have file extension
A .m
B .c
C .objc
D .mm
Ans.: A
Q28. Swift language is
Ans.: B
C bool, 0 and 1
Ans.: B
@end
@endClass
@end
@end
Ans.: A
Q31. To install XCode which url is preferred to use?
(A) http://developer.xcode.com/downloads
(B) http://developer.objectivec.com/downloads
(C) http://developer.apple.com/downloads
(D) http://developer.iphoneprogramming.com/downloads
Ans.: C
Ans.: A
Ans.: C
Programming is fun!
Ans.: A
Ans.: B
(A) NSRoot
(B) NSResponder
(C) NSObject
(D) NSString
Ans.: C
Q37. Select correct way of compiling Objective-C source file named main.m using a
Terminal on Mac OSX
Ans.: C
Q38. Source Editor of XCode is
(D) All
Ans.: D
Q39. Which feature of XCode displays Shortened API documentation while you're
programming?
Ans.: B
Q40. Leading minus sign ( - ) tells the Objective-C compiler that the method is
Ans.: B
Q41. Select correct way creating instance myFraction of Class named Fraction
Ans.: D
Q42. Methods that set the values of instance variables are often collectively referred to as
(A) Reader
(B) Getter
(C) Setter
(D) Writer
Ans.: C
(C) Yes
Ans.: A
(A) easy way for us to modularize the definition of a class into groups
Ans.: C
Q45. Which data type is known for generic object type and achieves dynamic binding in
objective-C?
(A) id
(B) String
(C) Array
(D) Dictionary
Ans.: A
Q46. Object-oriented programming groups operations and data into modular units called
(A) Functions
(B) Macros
(C) Objects
(D) Structure
Ans.: C
Ans.: D
Q48. Foundation framework, UIKit and Core data constitute which layer in Framework
layers?
(C) Cocoa
(D)MAC OS X Kernel
Ans.: B
(A) Protocol
(C) Category
Ans.: A
Q50. The object whose contents cannot be changed are called as
(A) Modifiable
(B) Mutable
(C) Variable
(D) Immutable
Ans.: D
Ans.: C
Ans.: B
Q53. The frameworks that provide the support for our MAC OS X applications is
(A) Cocoa
(D) JRE
Ans.: A
Q54. For OpenGL ES graphics-based applications such as games which iOS template can be
used from new project window?
(A) Master-Detail
Ans.: B
(A) Xcode
Ans.: D
(A) Cocoa
(D) JRE
Ans.: B
Ans.: D
Q58. #define FALSE 0
Ans.: C
Q59. For the code snippet what will be the value stored inside compareResult?
NSComparisonResultcompareResult;
(A) NSOrderedAscending
(B) NSOrderedSame
(C) NSOrderedDescending
(D) Error
Ans.: A
(A) XCode can be installed directly on Microsoft Windows OS using usual windows installer.
Ans.: C
Model Question Paper
Subject: Compiler Design
Branch: Data Warehousing & Mining
Class: BE
Semester: VIII
Q4. The important aspect of the data warehouse environment is that data found within the
data warehouseis___________.
A. subject-oriented.
B. time-variant.
C. integrated.
D. All of the above.
ANS: D
ANS: D
ANS: D
Q11. Bill Inmon has estimated ___________of the time required to build a data warehouse,
is consumed inthe conversion process.
A. 10 percent.
B. 20 percent.
C. 40 percent
D. 80 percent.
ANS: D
Q14. In Binning, we first sort data and partition into (equal-frequency) bins and then which
of the following is not a valid step Select one:
A. smooth by bin boundaries
B. smooth by bin median
C. smooth by bin means
D. smooth by bin values
ANS: D
.
Q15. The core of the multidimensional model is the ....................... , which consists of a
large set of facts and a number of dimensions.
A. Multidimensional cube
B. Dimensions cube
C. Data cube
D. Data model
Ans: C
Q18. ............................. is a comparison of the general features of the target class data
objects against the general features of objects from one or multiple contrasting classes?
A. Data Characterization
B. Data Classification
C. Data discrimination
D. Data selection
ANS: A
Q 20. The core of the multidimensional model is the ………………….. , which consists of a large
set of facts and a number of dimensions.
A. Multidimensional cube
B. Dimensions cube
C. Data cube
D. Data model
ANS: C
Q24. ...................... is an essential process where intelligent methods are applied to extract
data patterns?
A. Data warehousing
B. Data mining
C. Text mining
D. Data selection
ANS: B
Q27. ............................. is a comparison of the general features of the target class data
objects against the general features of objects from one or multiple contrasting classes.
A. Data Characterization
B. Data Classification
C. Data discrimination
D. Data selection
ANS: C
Q 29. Next step after data selection in the process of knowledge discovery is:
A. Data cleaning
B. Data integration
C. Pattern evaluation
D. Data transformation
ANS: D
A. A component of a network
B. In the context of KDD and data mining, this refers to random errors in a database table.
C. One of the defining aspects of a data warehouse
D. None of these
Ans: B
A. 2
B. 10
C. 4
D. 7
ANS: D
Q 35. State various methods of Integrating Data Mining System with A DB/DW System.
A Loose coupling
B. No coupling
C. Tight coupling
D All of Above
Ans: D
Q 36. In _______scheme, the data mining system does not utilize any of the database or
data warehouse functions.
A Tight coupling
B. No coupling
C. Semi-tight coupling
D Loose coupling
Ans: B
Q 38.In clustering, the objects are grouped on the principle of__________ intraclass
similarity
A. Maximizing
B. Minimizing
C. Both A & B
D. None of the above
Ans: A
Q58. Data that are not of interest to the data mining task is called as ______.
A. missing data.
B. changing data.
C. irrelevant data.
D. noisy data.
Ans: C
Q59. All set of items whose support is greater than the user-specified minimum support are
called as _____________.
A. border set.
B. frequent set.
C. maximal frequent set.
D. lattice.
Ans: B
Q60. The _______ step eliminates the extensions of (k-1)-itemsets which are not found to
be frequent, from being considered for counting support.
A. Candidate generation.
B. Pruning.
C. Partitioning.
D. Itemset eliminations.
Ans: B
Model Question Paper
Subject: Internet Security
Class : BE
Semester : VIII
Unit- I
Sr.
Questions
No.
1 _______ is the practice and precautions taken to protect valuable information from unauthorized
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
Answer: c
2 Anti-virus software only protects an organization from_________________.
a) Malicious programs
b) An intruder
c) Both a and b
d)None of the above
Answer: a
3 Firewalls are _______________ devices for the network and can assist in protecting an
organization’s internal network from external attacks.
a) Access control
b) Anti-Virus software
c) Both a and b
d) None of the above
Answer: a
4 Smart cards are considered in which authentication system?
a) Something you know
b) Something you have
c) Something you are
d) None of the above.
Answer: b
5 Biometrics is considered in which authentication system?
a) Something you know
b) Something you have
c) Something you are
d) None of the above.
Answer: c
6 An access attack is an attack against the ___________________ of the information.
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
Answer: a
7 Snooping is a type of _____________ attack.
a) Access attack
b) Modification attack
c) Denial of service attack
d) Repudiation attack
Answer: a
8 When someone listens in on a conversation that they are not a part of, that is __________
a) Snooping
b) Eavesdropping
c) Masquerading
d) Denying an Event
Answer: b
9 A modification attack is an attack against the integrity of the information.
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
Answer: b
10 _________________ is an attempt to act like or impersonate someone else or some other system.
a) Masquerading
b) Denying an Event
c) Snooping
d) Eavesdropping
Answer: a
11 When _________ attack is made, information that did not previously exist is added.
a) Insertion
b) Changes
c) Deletion
d) None of the above
Answer: a
12 ___________________attacks are attacks that deny the use of resources to legitimate users of the
system, information, or capabilities.
a) Access attack
b) Modification attack
c) Denial of service attack
d) Repudiation attack Denial-of-service
Answer: c
13 A DoS attack against information causes that information to be unavailable is
__________________________.
a) Denial of Access to Applications
b) Denial of Access to Systems
c) Denial of Access to Information
d) Denial of Access to Communications
Answer: c
14 Repudiation is an attack against the _________________ of the information.
a) Confidentiality
b) Integrity
c) Availability
d) Accountability
Answer: d
15 The information after it has been obfuscated by the encryption algorithm is known as
______________.
a) Plain Text
b) Clear Text
c) Cipher Text
d) None of the above
Answer: c
16 The process of changing the plaintext into cipher text.
a) Encryption
b) Decryption
c) Both a and b
d) None of the above
Answer: a
17 The process of changing the cipher text into plaintext.
a) Encryption
b) Decryption
c) Both a and b
d) None of the above
Answer: b
18 Private key encryption is also known as _____________________ encryption.
a) Symmetric key
b) Asymmetric key
c) Both a and b
d) None of the above
Answer: a
19 Public key encryption is also known as _____________________ encryption.
a) Symmetric key
b) Asymmetric key
c) Both a and b
d) None of the above
Answer: b
20 ____________ is looking through information files in the hopes of finding something
interesting.
a) Snooping
b) Eavesdropping
c) Masquerading
d) Denying an Event
Answer: a
Unit- II
Sr.
Question
No.
An individual who breaks into computers.
a) Hacker
b) Virus
1
c) Worms
d) None of the above
Answer: a
Hacker are motivated by ____________
a) Challenge
b) Greed
2
c) Malicious Intent
d) All of the above
Answer: d
Which one is the Historical Hacking Techniques?
a) Open Sharing
b) IP Spoofing
3
c) Sniffing switched network
d) None of the above
Answer: a
Social Engineering is a type of ________________ Hacking technique.
a) Historical Hacking Technique
b) Advanced hacking technique
4
c) Both a and b
d) None of the above
Answer: a
___________________ require quite a bit of expertise to find and exploit.
a) Buffer overflows
b) Social Engineering
5
c) Bad Password
d) None of the above
Answer: a
Sniffing switched network is a type of ______________ hacking technique.
a) Historical Hacking Technique
b) Advanced hacking technique
6
c) Both a and b
d) None of the above
Answer: b
Policy defines how security should be within an organization.
a) True
7
b) False
Answer: a
____________________ defines what sensitive information is within the organization and how
that information should be protected.
a) Information Policy
b) Security Policy
8
c) Computer use policy
d) Internet use policy
Answer: a
9 _____________ defines the technical requirements for security on computer systems and network
equipment.
a) Information Policy
b) Security Policy
c) Computer use policy
d) Internet use policy
Answer: b
Which policy defines who may use computer systems and how they may be used?
a) Information Policy
b) Security Policy
10
c) Computer use policy
d) Internet use policy
Answer: c
The _______________ policy defines appropriate uses of the Internet.
a) Information Policy
b) Security Policy
11
c) Computer use policy
d) Internet use policy
Answer: d
If an organization chooses to define a specific mail policy it should take into account internal issues
as well as external issues.
12 a) True
b) False
Answer: a
User Management Procedures includes :
a) New Employee Procedure
b) Transferred Employee Procedure
13
c) Employee Termination Procedure
d) All of the above
Answer: d
The _____________________ procedure defines how Security and System Administration will
work together to secure the organization’s systems.
a) System administration
14 b) User Management Procedures
c) Security Policy
d) Computer use policy
Answer: a
An Incident Response Procedure (IRP) defines how the organization will react when a computer
security incident occurs.
15 a) True
b) False
Answer: a
The __________________ defines the steps that will be taken to modify the state of the
organization’s computer systems.
a) Disaster Recovery Plans
b) configuration management procedure
c) User Management Procedures
16 d) Security Policy
Answer: b
Unit-III
Sr.
Question
No
1) Information security is a Proactive process to manage risk.
a) True
b) False
Answer: a
2) How many key phases in process of information security.
a) Five,
b) Four,
c) Six,
d) Three
Answer: a
3) In message authentication process , the hash function value is called as:
a) Message Field,
b) Message Digest,
c) Message Score,
d) Message Leap
Answer: b
ii. It is very difficult to construct two pieces of information that provide the same
checksum when run through the function.
a) Only (i),
b) only (ii),
c) both (i) and (ii),
d) none of the above
Answer: c
5) The intrusion detection system’s has major components are ___________.
a) Analysis Engine
b) Event provider
c) Alert Database
Answer: d
Answer: c
b) Non-repudiation,
c) Data Integrity,
Answer: d
Answer: c
13) An IPS responds to network attacks by blocking traffic and resetting connections
a) True
b) False
Answer: a
Answer: a
Answer: a
b) 100bits,
c) 64bits,
d) 128-bit
Answer: d
Answer: c
19) The audit function ensures that controls are Configured correctly with regard to policy.
a) True
b) False
Answer: a
20) A digital signature is required______________________.
i. to tie an electronic message to the sender’s identity
ii. for non-repudiation of communication by a sender
iii. to prove that a message was sent by the sender in a court of law
iv. in all e-mail transactions
a) i and ii,
b) i, ii and iii,
c) i, ii, iii, and iv,
d) ii, iii, iv
Answer: b
Model Question Paper
Computer Engineering
MCQ Bank for I-phone Programming (178154)Semester: VIII
1. Objective C programming is
A. Structural language
B. Object oriented language
C. Procedure language
D. None of the above.
Ans: B
4. Mac OS is developed by
A. IBM
B. Motorola
C. Apple
D. INTEL
Ans: C
5. Xcode is provided by
A. Motorola
B. Apple
C. IMA
D. INTEL
Ans: B
19. The iphone has a feature that activates when you rotate the
device from portrait to landscape.
A. Rotator
B. Special sensor
C. Accelerometer
D. Shadow Detector
Ans: C
24. A Framework is
A. Similar to API.
B. UI Interface.
C. Core Application Kit.
D. SDK.
Ans: A
Ans: B
30.Which of the following iOS frameworks is a commonly used third
party Library?
A. AVFoundation.framework
B. Audiotoolbox.framework
C. AFNetwork.framework
D. CFNetwork.framework
Ans: C
31.The application has not been launched or was running but
terminated by the device. Determine the current state of App.
A. Suspended state
B. Background state
C. Inactive state
D. Not running state
Ans: D
A. iOS 2.0
B. iOS 3.0
C. iOS 4.0
D. iOS 6.0
Ans:B.
34.Multitasking in iOS was introduced in which version?
A. iOS 2.0
B. iOS 4.0;
C. iOS 6.0;
D. iOS 7.0
Ans:B.
Ans: D
47. What is the name of the type of SQL Database that iOS
Supports?
A. SQL
B. NoSql
C. SQLite
D. MySql
Ans: C
53. True or False? A method and a variable can have the same
name in Objective-C.
A. False
B. True
Ans: B
54. Can you call C++ code from objective C environment?
A. Yes, from any .mm file
B. Yes, from any .m file
C. No, it is not possible
Ans: A
___________________________________________________________________________
1) -------------------- is where attacker exploits the good nature of an employee to get the
employee to reveal sensitive information.
A) Masquerading
B) Social Engineering
C) Impersonation
D) Good Samaritan
Ans: B
A) Spyware
B) Shoulder Surfing
C) Trojan
D) Social Engineering
Ans:A
3)_______ of information means, only authorized users are capable of accessing the information.
A) Confidentiality
B) Integrity
C) Non-repudiation
D) Availability
Ans: D
4) From the options below, which of them is not a threat to information security?
A) Disaster
B) Eavesdropping
C) Information leakage
Ans:D
A) Decryption
B) Encryption
C) Network Security
D) Information Hiding
Ans:B
6)DES follows
A) Hash Algorithm
B) Caesars Cipher
D) SP Networks
Ans:C
7)Which of the following is not a control category in a physical security program?
Ans:D
8)The ________ method provides a one-time session key for two parties.
A)AES
B) RSA
C) DES
D) Diffie-Hellman
Ans:D
9)What is a mantrap?
Ans:C
A) (p)/(q)
B) (p)(q)
C) (p-1)(q-1)
D) (p+1)(q+1)
Ans:C
A) Masquerade
B) Modification of message
C) Denial of service
D) Traffic analysis
Ans:D
12)A computer ________ is a malicious code which self-replicates by copying itself to other
programs.
A) program
B) virus
C) application
D) worm
Ans:B
13) ___________ is widely used today for protecting data in transit in a variety of applications
such as data transfer on the Internet, and on cellular phone networks.
A) Encryption
B) Data mining
C) Internet Security
D) Architectural security
Ans:A
A) Biometric verification
C) 2-factor authentication
Ans:D
15)Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
A) network security
B) physical security
C) database security
D) wireless security
Ans:B
A) Caesar cipher
D) Playfair cipher
Ans:C
17)Which Of The Following Is An Independent Malicious Program That Need Not Any Host
Program?
A) Trap Doors
B) Trojan Horse
C) Virus
D) Worm
Ans:D
A) Identification
B) Authentication
C) Access control
D) Lock
Ans:D
19)For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the
cipher text.
A) C=80
B) C=92
C) C=56
D) C=23
Ans:A
A) Signage
B)Firewalls
C) Procedures
D) Passwords
Ans:C
Ans:A
A) Brute-force
B) Social Engineering
C) Viruses
D) Spoofing
Ans:A
23)_______ is the oldest phone hacking techniques used by hackers to make free calls
A) Phishing
B) Spamming
C) Phreaking
D) Cracking
Ans:C
24)_________ are the special type of programs used for recording and tracking user’s keystroke.
A) Keylogger
B) Trojans
C) Virus
D) Worms
Ans:A
25)___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
A) Automated apps
B) Database software
C) Malware
D) Worms
Ans:C
A) IP hacking
B) IP spooling
C) IP spoofing
D) IP tracking
Ans:C
A) Identification
B) Authentication
C) Access Control
D) Lock
Ans:D
A) User ID
B) Password
C) OTP
D) Fingerprint
Ans:A
29)In a _____________ attack, the extra data that holds some specific instructions in the
memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
A) Phishing
B) MiTM
C) Buffer-overflow
D) Clickjacking
Ans:C
30)A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
C) hacking techniques
D) ethics to talk to seniors
Ans:A
A) Threats
B) Vulnerabilities
C) Consequences
Ans:D
32)__________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
A) Social ethics
B) Ethics in cyber-security
C) Corporate ethics
Ans:D
33)The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A) Ethical hacking
B) Unethical hacking
C) Fixing bugs
D) Internal data-breach
Ans:A
34)___________ is a special form of attack using which hackers’ exploit – human psychology.
B) Insecure network
C) Social Engineering
D) Reverse Engineering
Ans:C
35)An attacker may use automatic brute forcing tool to compromise your __________
A) username
B) employee ID
C) system / PC name
D) password
Ans:D
36)_____________ will encrypt all your system files and will ask you to pay a ransom in order
to decrypt all the files and unlock the system.
A) Scareware
B) Ransomware
C) Adware
D) Spyware
Ans:B
Ans:A
A) IP hacking
B) IP spooling
C) IP spoofing
D) IP tracking
Ans:C
A) Fetching passwords
B) Email texts
Ans:D
A) Threats
B) Vulnerabilities
C) Consequences
A) Must not
B) Can
C) Cannot
D) Should not
Ans:B
C) both A and B
Ans:C
(i)The function is one-way. In other words, the function creates a checksum from the information
but you cannot create the information from the checksum.
(ii)It is very difficult to construct two pieces of information that provide the same checksum
when run through the function.
A) only (i)
B) only (ii)
A) Zone based
D) Level based
Ans:B
45)When a hash function is used to provide message authentication, the hash function value is
referred to as
A) Message Field
B) Message Digest
C) Message Score
D) Message Leap
Ans:B
A) Authentication
B) Non-repudiation
C) Data Integrity
Ans:D
Ans:B
A) Five
B)Four
C) Six
D)Three
Ans:A
Ans:D
50)When a hash function is used to provide message authentication, the hash function value is
called to as:
A) Message Field
B) Message Digest
C) Message Score
D)Message Leap
Ans:B
A) audit
B) training
C) policy
D) implementation
Ans:A
A) authentication
B) nonrepudiation
C) both A & B
D) Neither A nor B
Ans:C
A) Analysis Engine
B) Event provider
C) Alert Database
Ans:D
54)Which of the following are the basic types of Host based IDS(HIDS sensors)
A) Log analyzers
C) Signature-based sensors
D) All of above
Ans:D
Ans:D
56)------------- policy identifies the sensitive information and how sensitive information should
be handled, stored, transmitted and destroyed.
A) Information
B) Security
C) Backup
D) none of above
Ans:A
Ans:C
58)The audit function ensures that controls are ¬¬________________correctly with regard to
policy.
A) Configured
B) Trained
C) both A and B
Ans:A
A) Assessment
B) Audit
C) Training
D) Policy
Ans:B
Ans:D
Model Question Paper
Class: BE IT
Semester: VIII
1._______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
A.Network Security
B. Database Security
C. Information Security
D. Physical Security
Ans:C
2.From the options below, which of them is not a threat to information security?
A.Disaster
B.Eavesdropping
C. Information leakage
D.Unchanged default password
Ans:D
5. Message ________ means that the sender and receiver expect privacy
A. confidentiality
B. integrity
C.authentication
D.none of the above
Ans:A
6. Message_____ meansthat the data must arrive at the receiver exactly as sent
A. confidentiality
B. integrity
C.authentication
D.none of the above
Ans:B
Ans:D
Ans:D
Ans:C
Ans – B
C.Program
D.None of These
Ans-A
Ans:A
Ans:A
18. A person who enjoys learning details about computers and how to enhance their
capabilities.
A. Cracker
B. Hacker
C. App controller
D. Site controller
Ans:B
Ans:D
20. . An attack in which the site is not capable of answering valid request.
A. Smurfing
B. Denial of service
C. E-mail bombing
D.Ping storm
Ans:B
Ans:B
Ans:C
Ans:B
24. Attack in which a user creates a packet that appears to be something else.
A. Smurfing
B. Trojan
C. E-mail bombing
D. Spoofing
Ans:D
Ans:B
Ans:D
27. In public key cryptography, a key that decrypts the message.
A.public key
B. unique key
C. private key
D security key
Ans:C
Ans:A
29. Under DES, the data encryption standard took a 64-bit block of data and
subjected it to ______ levels of encryption.
A. 64
B. 8
C. 16
D. 4
Ans:C
Ans:B
31.One of the most obvious places to put an IDS sensor is near the firewall. Where
exactly in relation to the firewall is the most productive placement?
A. Inside the firewall
C. Both
Ans-A
A.Buffer overflows
C.Race conditions
Ans-D
A. Zone based
D.Level based
Ans-B
A.Assessment
B.Policy
C.Training
D.Audit
Ans-D
Ans-A
A. Assessment
B. Policy
C. Training
D. Audit
Ans-A
37..From the options below, which of them is not a threat to information security?
A.Disaster
B.Eavesdropping
C. Information leakage
Ans-D
A flood
Ans-A
42. For RSA to work, the value of P must be less than the value of____
A.p
B.q
C.n
D.r
Ans:C
Ans:A
Ans:A
58. One commonly used public-key cryptography method is the ______ algorithm.
A. RSS
B. RAS
C RSA
D. RAA
Ans:C
Ans:B
Ans:A
MODEL QUESTION PAPER
Subject : Data Warehousing & Mining [ 178113 ]
Semester : VIII
Total: 60 Questions with answers
19) Data that are not of interest to the data mining task is called as ______.
(A) missing data.
(B) changing data.
(C) irrelevant data.
(D) noisy data.
Answer: (C)
22) To identify the truly interesting patterns representing knowledge based on some
interestingness measures is........................
(A) Pattern Extraction
(B) Pattern Analysis
(C) Pattern Modification
(D) Pattern Evaluation
Answer: (D)
37) ________is the most well-known association rule mining algorithm and is used in most
commercial products.
(A) Apriori algorithm.
(B) Partition algorithm.
(C) Distributed algorithm
(D) Pincer-search algorithm
Answer: (A)
38) Rule based classification algorithms generate _________ rule to perform the classification.
(A) IF-THEN
(B) While
(C) Do While
(D) Switch
Answer: (A)
41) Data mining is the application of specific________ for extracting ________ from data.
(A) Data warehouse, transactions
(B) Data mart , valuable
(C) Algorithms, Patterns
(D) Database , Knowledge
Answer: (C)
42) Multiple fact tables share dimension tables is____________
(A) STAR Schema
(B) Snowflake Schema
(C) Flat Relational Schema
(D) Fact Constellation Schema
Answer: (D)
43) Street --> City --> State--> Country This exhibits OLAP operation
_____________________
(A) Roll UP
(B) Drill Down
(C) Dice
(D) Slice
Answer: (A)
47) where data relevant to the analysis task are retrieved from the database
(A) Data replication
(B) Data Manipulation
(C) Data Selection
(D) Data Extraction
Answer: (C)
54) The algorithms that are controlled by human during their execution is _______ algorithm.
(A) unsupervised
(B) incremental
(C) batch learning
(D) supervised
Answer: (D)
55) What is true about next two statements 1)-HOLAP contains ROLAP Technology 2)-
HOLAP contains MOLAP technology
(A) only 1 is true
(B) only 2 is true
(C) both are true
(D) both are flase
Answer: (C)
56) Which of the following does not supports multidimensional data view
(A) Star Schema
(B) Snowflake Schema
(C) Fact Constellation Schema
(D) Flat Relational Schema
Answer: (D)
60) What is true about next a&b statements a) drill across is not OLAP operation b) drill across
involves multiple fact tables
(A) a is true b is false
(B) a is false b is true
(C) both a and b are true
(D) both a and b are false
Answer: (B)
MODEL QUESTION PAPER
Subject:-Software Metrics & Quality Assurance (178141)
Class: B.E
Semester-VIII
Q1. Which of the following does not affect the software quality and organizational performance?
A) Market
B) Product
C) Technology
D) People
Ans:- A
Ans: D
Ans: A
Ans: D
Q5. In size oriented metrics, metrics are developed based on the ___________________
A) Number Of Functions
B) Number Of User Inputs
C) Number Of Lines Of Code
D) Amount Of Memory Usage
Ans: C
Q. 6. Usability can be measured in terms of:
A) Intellectual Skill To Learn The System
B) Time Required To Become Moderately Efficient In System Usage
C) Net Increase In Productivity
D) All of The Mentioned
Ans: D
Ans: C
Q8. Which of the following is not an information domain required for determining function point in
FPA ?
A) Number of User Input
B) Number of User Inquiries
C) Number of External Interfaces
D) Number of Errors
Ans: D
Q9. A graphical technique for finding if changes and variation in metrics data are meaningful is known
as
A) DRE (Defect Removal Efficiency)
B) Function Points Analysis
C) Control Chart
D) All Of The Mentioned
Ans: C
Ans: C
Q11. Which metric gives the idea about the contents on a web page ?
A) Word Token
B) Word Count
C) Word Size
D) Word Length
Ans: B
Q12. How is the complexity of a web page related to link count ?
A) Directly
B) Indirectly
C) No Relation
D) All of The Mentioned
Ans: A
Q13. Number of dynamic web pages provides an idea about________ for a web page that is to be
built.
A) Size
B) Complexity
C) Effort
D) All of The Mentioned
Ans: D
Q14. Which of the following web engineering metric measures the extent of relatedness between two
or more web pages ?
A) Number of Static Content Objects
B) Number of Dynamic Content Objects
C) Web Page Similarity
D) Number of Internal Page Links
Ans: C
Q15. Which of the following is not a classification of the web engineering metric, Web Page
Similarity ?
A) Content Based
B) Link Based
C) Usage Based
D) Traffic Based
Ans: D
Q16. Link based measures rely on ___________ structure of a web graph to obtain related pages.
A) Embedded
B) Hyperlink
C) Dynamic
D) All of The Mentioned
Ans: B
Ans: C
Q18. Which of the following is not a metric for design model?
A) Interface Design Metrics
B) Component-Level Metrics
C) Architectural Metrics
D) Complexity Metrics
Ans: D
Ans: B
Ans: C
Q21. How many Information Domain Values are used for Function Point Computation?
A) Three
B) Four
C) Five
D) Six
Ans: C
Ans: B
Ans: A
Q24. Structural complexity of a module i is given as S(i) = f*f (i). What does f symbolizes here?
A) “Fan Check-Out” Of Module I
B) “Fan Check-In” Of Module I
C) “Fan In” Of Module I
D) “Fan Out” Of Module I
Ans: D
Ans: B
Ans: A
Q27. The amount of time that the software is available for use is known as
A) Reliability
B) Usability
C) Efficiency
D) Functionality
Ans: A
Q28. Usability in metric analysis is defined as the degree to which the software
A) Stated Needs
B) Is Easy To Use
C) Makes Optimal Use of System Resources
D) None of the Mentioned
Ans: B
Ans: A
Q30. Cost and schedule are a part of
A) Product Metrics
B) Process Metrics
C) Project Metrics
D) All of the Mentioned
Ans: C
Ans: C
Q32. Which of the following is not categorized under Product Operation of McCall’s Software Quality
Factors?
A) Flexibility
B) Reliability
C) Usability
D) Integrity
Ans: A
Q33. The arc-to-node ratio is given as r = a/n. What does ‘a’ represent in the ratio?
A) Maximum Number Of Nodes At Any Level
B) Longest Path From The Root To A Leaf
C) Number Of Modules
D) Lines Of Control
Ans: D
Q34. Which of the following is not categorized under Component-Level Design Metrics?
A) Complexity Metrics
B) Cohesion Metrics
C) Morphology Metrics
D) Coupling Metrics
Ans: C
Ans: B
Q36. MTTC falls the category of
A) Correctness
B) Integrity
C) Maintainability
D) All of the Mentioned
Ans: C
Q37. Identify the correct option with reference to Software Quality Metrics.
A) Integrity = [Sigma(1 – Threat)] * (1 – Security)
B) Integrity = [1 – Sigma(Threat)] * (1 – Security)
C) Integrity = [1 – Threat * Sigma(1 – Security)].
D) Integrity = Sigma[1 – Threat * (1 – Security)].
Ans: D
Ans: D
Ans: C
Q40. The process each manager follows during the life of a project is known as
A) Project Management
B) Manager Life Cycle
C) Project Management Life Cycle
D) All of the Mentioned
Ans: C
Ans: D
Q42. Which of the following is/are main parameters that you should use when computing the costs of
a software development project?
A) Travel And Training Costs
B) Hardware And Software Costs
C) Effort Costs (The Costs Of Paying Software Engineers And Managers)
D) All Of The Mentioned
Ans: D
Ans: B
Q44. Which of the following is incorrect activity for the configuration management of a software
system?
A) Internship Management
B) Change Management
C) Version Management
D) System Management
Ans: A
Ans: B
Q46. Which of the following costs is not part of the total effort cost?
A) Costs of Networking And Communications
B) Costs of Providing Heating And Lighting Office Space
C) Costs of Lunch Time Food
D) Costs of Support Staff
Ans: C
Ans: A
Q48. A _________ is developed using historical cost information that relates some software metric to
the project cost.
A) Algorithmic Cost Modelling
B) Expert Judgement
C) Estimation by Analogy
D) Parkinson’s Law
Ans: A
Q49. Which technique is applicable when other projects in the same analogy application domain have
been completed?
A) Algorithmic Cost Modelling
B) Expert Judgement
C) Estimation by Analogy
D) Parkinson’s Law
Ans: C
Q50. Which model assumes that systems are created from reusable components, scripting or database
programming?
A) An Application-Composition Model
B) A Post-Architecture Model
C) A Reuse Model
D) An Early Design Model
Ans: A
Q51. Which of the following states that work expands to fill the time available.
A) CASE Tools
B) Pricing To Win
C) Parkinson’s Law
D) Expert Judgement
Ans: C
Q52. Which model is used during early stages of the system design after the requirements have been
established?
A) An Application-Composition Model
B) A Post-Architecture Model
C) A Reuse Model
D) An Early Design Model
Ans: D
Q53. Which of the following uses empirically derived formulas to predict effort as a function of LOC
or FP?
A) FP-Based Estimation
B) Process-Based Estimation
C) COCOMO
D) Both FP-Based Estimation And COCOMO
Ans: D
Ans: A
Q55. Which version of COCOMO states that once requirements have been stabilized, the basic
software architecture has been established?
A) Early Design Stage Model
B) Post-Architecture-Stage Model
C) Application Composition Model
D) All of the Mentioned
Ans: A
Ans: D
Ans: D
Q58. Choose the correct option in terms of Issues related to professional responsibility
A) Confidentiality
B) Intellectual Property Rights
C) Both Confidentiality & Intellectual Property Rights
D) Managing Client Relationships
Ans: C
Q59. Efficiency in a software product does not include ________
A) Responsiveness
B) Licensing
C) Memory Utilization
D) Processing Time
Ans: B
Ans: C
MODEL QUESTION PAPER
Class: BE
Semester: VIII
Q1. In 1997, researchers in AT&T Bell Labs conceived the idea of ________ phones.
A Cellular.
B Mobile.
C CDMA.
D GSM.
Ans.: A
A CDMA.
B Spread Spectrum.
C GPRS.
D GSM.
Ans.: B
A Computing.
B Data.
C Address Book.
D Information.
Ans.: A
Q4. The device for mobile computing can be either computing or a _________device.
A Mobile.
B Computing.
C Communication.
D Computer
Ans.: C
A Two.
B Three.
C One.
D Four.
Ans.: A
Q6. Wireline networks are generally _________ network and cover wide areas.
A Public.
B Private
C Gobal.
D Network.
Ans.: A
A Wired.
B Wireless.
C Co-axial.
D Fibre.
Ans.: B
Q8. Any software layered between a user application and operating system is a __________.
A Middleware.
B Database Middleware.
D RPC Middleware.
Ans.: A
Q9. Which of the following is the world's first cellular system to specify digital modulation
and network level architecture.
A GSM.
B AMPS.
C CDMA.
D IS-54.
Ans.: A
Ans.: B
A ITU.
B AT&T.
C ETSI.
D USDC
Ans.: C
Q. 12 Which of the following does not come under the teleservices of GSM.
Ans.: D
A Emergency calling.
B Packet switched protocols.
C Call diversion.
Ans.: C
A Register.
B Flip flop.
C SIM.
D SMS.
Ans.: C
A SIM.
C SMS.
Ans.: B
Q. 16 Which of the following does not come under subsystem of GSM architecture.
A BSS
B NSS
C OSS
D Channel
Ans.: D
A BSS
B NSS
C OSS
D MSC
Ans.: B
Q. 18 Which of the following subsystem provides radio transmission between mobile station
and MSC.
A BSS
B NSS
C OSS
D BSC
Ans.: A
A TDMA.
B CDMA.
C FDMA.
D None of these.
Ans.: B
A Cell.
B Tessellate.
C Mobile Station.
D None of these.
Ans.: A
A Environmental condition.
B Social conditions
C Political condition.
D None of these.
Ans.: A
Q. 22 World’s first cellular system was developed by__________
D Qualcomm
Ans.: A
A Piconet.
B Adhoc piconet.
C Scatter net.
Ans.: D
Q. 24 Which of the following wireless technology is used for exchanging data between a
variety of fixed and mobile devices over a very short diameter?
A An Mobile technology.
B Bluetooth technology.
C Ad hoc Computing
Ans.: B
A Slaves.
B Parked.
C Standby.
D None of these.
Ans.: A
A Mobility.
B Portability.
C Wireless connectivity.
Ans.: D
A Hexagon.
B Circular.
C Square.
D None of these.
Ans.: A
A Education.
B Sports.
C Games.
Ans.: D
A Low Security.
B Ad hoc Networking.
C Shared Medium.
Ans.: D
A FHSS.
B GSM.
C GPRS.
D UMTS.
Ans.: A
Ans.: B
A simplex communication
D no communication
Ans.: C
Ans.: A
Ans.: D
Ans.: B
B 2128
C 232
D 28
Ans.: B
Q. 37 In IPv6, real-time audio or video, particularly in digital form, requires resources such
as __________
A Fixed Bandwidth
B Variable Bandwidth
C High Bandwidth
D Low Bandwidth
Ans.: C
A 10 bytes.
B 25 bytes.
C 30 bytes.
D 40 bytes.
Ans.: D
A display()
B paint()
C displayApplet()
D PrintApplet()
Ans.: B
D None of these.
Ans.: B
A GSM only
B IS-136 only
D PDC
Ans.: C
B Mobile Internet
C Mobility In Network
Ans.: A
Q. 43 The process of transferring a mobile station from one base station to another
is___________
A MSC
B Roamer
C Hand off
D Forward channel
Ans.: C
B CDMA/FDD
Ans.: D
A UMTS
B DECT
C DCS-1800
D ETACS
Ans.: A
A TDMA
B FDMA
C FDD
D TDD
Ans.: C
Ans.: D
A Cross talk
B Missed calls
C Blocked calls
D All of the above
Ans.: D
C Obstacles
Ans.: D
Ans.: A
B Large bandwidth
C Multiple users
Ans.: D
A DPSK
B FSK
C ASK
D QPSK
Ans.: A
B ASK
C BPSK
D QPSK
Ans.: C
Q. 54 WAP is a _______.
B Common Protocol.
C Both A and B.
D Transport protocol.
Ans.: A
B Multipath fading
Ans.: B
A Signal
B Frequency
C Phase
D Amplitude
Ans.: B
Q. 57 DSSS system spreads the baseband signal by ________ the baseband pulses with a
pseudo noise sequence.
A Adding
B Subtracting
C Multiplying
D Dividing
Ans.: C
A 9.6 KBPS
B 9.7 KBPS
C 9.8 KBPS
D 9.9 KBPS
Ans.: A
Q. 59 In cellular telephony, Interim Standard 95 (IS-95), the forward channel uses the
technique___________.
A CDMA
B DSSS
C FHSS
D FDMA
Ans.: A
A Signaling
B Scrambling
C Framing
D Searching
Ans.: B
Model Question Paper
Subject: Data Warehousing & Mining
Class: BE
Semester: VIII
D None of these
Ans.: A
D None of these
Ans.: B
Afive tier
B four tier
C three tier
D eight tier
Ans.: C
Asnowflake schema
B star schema
Cgalaxy schema
DFact constellation
Ans.: A
Cboth A and B
Ans.: C
B Set of columns in a database table that can be used to identify each record
within this table uniquely
DNone of these
Ans.: A
Ans.: B
ARead only
B Write only
Cboth
Dhaving no access
Ans.: C
Ans.: C
AROLAP
B MOLAP
CHOLAP
Ans.: D
AClustering
B Binning
CRegression
Ans.: D
ASmoothing of data
B Generalization of data
CNormalization of data
Ans.: D
AHistograms
Cboth A and B
DNone of these
Ans.: C
ADistributive
B Algebraic
CHolistic
DSelective
Ans.: D
Q15. Which of the following is not Discretization and Concept Hierarchy
Generation methods for Numerical Data?
AEntropy-Based Discretization
CCluster Analysis
DZ-Score
Ans.: D
B systematically organizes
Ans.: D
Ans.: A
Ans.: A
A OLTP
B OLAP
CHOLAP
DMOLAP
Ans.: A
ADataWarehouses
B Transactional Databases
CObject-Relational Databases
Ans.: D
AConcept/Class Description
Ans.: D
ACluster of data
CRegression of values
Ans.: B
ALoose coupling
CTight coupling
Ans.: D
Ans.: D
Ans.: B
Anumeric prediction
B clustering
C relevance analysis
Ans.: A
Ans.: C
Apie charts
B Bar charts
C curves
Ans.: D
Q30. Which of the following are/is issues relating to the diversity of database
types?
C both A and B
D None of these
Ans.: C
AIF-THEN rules
B Decision tree
C K-means
D Neural network
Ans.: D
C Both A and B
D Evolution Analysis
Ans.: C
C Both A and B
D Z-Score
Ans.: C
Ans.: B
CDescriptive mining tasks characterize the general properties of the data in the
database.
Ans.: A
AIt is a comparison of the general features of targeting class data objects with
the general features of objects from one or a set of contrasting classes.
CThe user may like to compare the general features of software products
whose sales increased by 10% in the last year with those whose sales
decreased by about 30% in the same duration.
CDescriptive mining tasks characterize the general properties of the data in the
database.
Ans.: A
AThe process of finding a model that describes and distinguishes data classes
or concepts for the purpose of being able to use the model to predict the class
of objects whose class label is unknown.
CDescriptive mining tasks characterize the general properties of the data in the
database.
Ans.: A
B In many cases class labelled data may simply not exist at the beginning.
AA database may contain data objects that do not comply with the general
behaviour or model of the data.
CBad clusters
Ans.: A
Ans.: A
ASoftware
B store layouts
Coffice plan
Dhouse plan
Ans.: B
Ans.: A
Afrequent pattern
B associations
Ccorrelations
Ans.: D
B cross-marketing
Ccatalog design
Ans.: D
Ans.: C
Ans.: A
ALevel-by-level independent
Ans.: D
AHash-based technique
B Partitioning
CSampling
Ans.: D
Ans.: A
Ans.: D
Apartitioning the data to find candidate itemsets and used that requires just
two database scans to mine the frequent itemsets
Ctransform data
Ans.: A
Cpick a random sample S of the given data D, and then search for frequent
itemsets in S instead of D
Ans.: C
as association or correlation.
CThese specify the desired dimensions (or attributes) ofthe data, or levels of
the concept hierarchies, to be used in mining.
DThese specify thresholds on statistical measures of ruleinterestingness, such
as support, confidence, and correlation.
Ans.: A
CThese specify the desired dimensions (or attributes) ofthe data, or levels of
the concept hierarchies, to be used in mining.
Ans.: D
CThese specify the desired dimensions (or attributes) ofthe data, or levels of
the concept hierarchies, to be used in mining.
Ans.: B
Ans.: C
ARule constraints
B Cluster Constraints
CClassification Constraints
DMining constraints
Ans.: A
ARule constraints
B Dimension/level constraints
C. Data constraints
DPredication Constraints
Ans.: A
AJoin step
B Prune step
Cboth A & B
1
8) attribute or entity.
A. True A
B. False
Indirect measurement of an attribute of an entity involves no other
attribute or entity.
9) A. True B
B. False
Which of the following is not the type of measurement scale?
A. Nominal
10) B. Ordinal D
C. Interval
D. Control
Which of the following is powerful measurement scale
A. Nominal
11) B. Ordinal D
C. Interval
D. Absolute
True Zero element is present in which type of measurement scale?
A. Nominal
12) B. Ordinal C
C. Ratio
D. Absolute
All arithmetic operations are applied to which type of measurement scale?
A. Nominal
13) B. Ordinal C
C. Ratio
D. Absolute
Only addition and subtraction operations are applied to which type of
measurement scale?
14) A. Nominal D
B. Ordinal
C. Ratio
D. Interval
2
A. Process
17) B. Product A
C. Resources
D. None of the above
Classifying software metrics does not covers
A. Process
18) B. Product D
C. Resources
D. People
Which of the following is not the external attribute of product
A. Quality
19) B. Reliability D
C. Productivity
D. Software Size
Which of the following is the internal attribute of product
A. Quality
20) B. Reliability D
C. Productivity
D. Software Size
Which of the following is not the aspect of software size?
A. Length
21) B. Functionality D
C. Complexity
D. Quality
Which of the following is not the internal attribute of product?
A. Size
22) B. Structure C
C. Quality
Which of the following is not the type of reuse?
A. Reuse Verbatim
23) B. Slightly Modified D
C. Extensively Modified
D. Complete
3
A. External Input
26) B. Temporary File B
C. External File
D. External Output
What is the function point FP if UFC=63and FP=0.93?
A. 60
27) B. 59.58 B
C. 58.59
D. 61
COCOMO stands for Constructive Cost Model
A. True A
28) B. False
Full form of COCOMO is
A. Constructive Cost Model
29) B. Cost Constructive Model A
C. Cost Quality Model
D. none of the above
Which of the following is not the measures of Demarco's Approach
A. Function Bang
30) B. Data Bang C
C. Cost Bang
D. None of the above
Which of the following is not the type of complexity?
A. Problem Complexity
31) B. Algorithmic Complexity D
C. Structural Complexity
D. Quality Complexity
Which of the following is not the aspect of structure?
A. Control Flow Structure
32) B. Data Flow Structure D
C. Data Structure
D. None of the above
The node whose out degree is more than 1 is called as
A. Predicated Node
33) B. Procedural Node A
C. Data Node
D. None of the above
Which of the following is not related to operations of flowgraph
A. SequencingB. Nesting C
34) C. Replacement D. None of the above
4
A. Size
36) B. Depth D
C. Width
D. All of the above
Which of the following is not the type of coupling
A. Data Coupling
37) B. Stamp Coupling D
C. Control Coupling
D. Logical Coupling
Which of the following is not the type of cohesion
A. Functional
38) B. Sequential C
C. Control
D. Logical
39)
Above formula used for B
A.Control Flow Structure
B.Tree Impurity Measure
C.Calculation of UFP & TFP
D.None of these
Software quality assurance consists of the auditing and reportingfunctions
40) of management A
a) True
b) False
Which of the following is the task of project indicators:
A.help in assessment of status of ongoing project
41) B.track potential risk C
C.help in assessment of status of ongoing project & track potential risk
D.none of the mentioned
Who identifies, documents, and verifies that corrections have been made
to the software?
42) A.Project manager C
B.Project team
C.SQA group
D.All of the mentioned
5
A.Equipment calibration and maintenance
45) B.Formal technical reviews A
C.Test equipment reviews
D. Quality planning reviews
Select what is the primary objective of formal technical reviews to find
during the process so that after the release of the software they do not
become the defect…
46) A.failure C
B.faults
C.errors
D.none of the mentioned
Select the option which is not an appraisal in SQA?
A.inter-process inspection
47) B.maintenance D
C.testing
D.quality planning
Which phase is considered as software architecture phase..
A.Design
48) B.Implementation A
C.Development
D.Requirement gathering
In which phase the defect is less costly…
A.Coding
49) B.Design C
C.Requirements Gathering
D. Implementation
Select which measurement taken by the two people are same refers to the
term which is called as…
A.Reliability A
50) B.Validity
C.Calibration
D.Ease of use and simplicity
The effort required for modifying an operational program.
A.Availability
51) B.Maintainability D
C.Portability
D.Flexibility
To achieve the software Quality is easily adaptable only with
programming skills?
52) A.True B
B.False
How many levels in the Process Maturity Model
A.6
53) B.5 B
C.4
D. 3
Which one is the level-2 in the process maturity
6
A.Defined
54) B.Ad-hoc C
C.Repeatable
D. Managed
What is the long form of MTTR
A.Mean time to restore
55) B.Major time to repair D
C.Minimum time to restore
D.Mean time to repair
What is the full form of LOC
A.Lines of Constraints
56) B.Legal of Code D
C.Length of Code
D. Lines of Code
What is the formula of Function Point Calculation (FP)
A.FP = UFC * TCF
57) B.FP = UFC - TCF A
C.FP = UFC + TCF
D. FP = UFC / TCF
Which one is the level-5 in the process maturity
A.Defined
58) B.Optimizing C
C.Repeatable
D. Managed
What is the long form of MTTF
A.Major Time Between Failures
59) B.Mean Time Between Failures B
C.Mean Time Between Fault
D.Minimum Time Between Failures
Which one is the level-3 in the process maturity
A.Defined
60) B.Optimizing D
C.Repeatable
D. Defined
***
7
Model Question Paper
Subject: iPhone Programming
Class: BE
Semester: VIII
BAppKit Framework
CFoundation Framework
DCoreMotion Framework
Ans.: B
DNone of Them
Ans.: B
Q3. The application has not been launched or was running but terminated by
the device.Determine the current state of App.
ASuspended state
BBackground state
CInactive state
Ans.: D
Q4. Flash Applications is supported in iPhone browsers.Is it true?
AYes
BNo
DSupports partially
Ans.: A
AiOS 2.0
BiOS 3.0
CiOS 4.0
DiOS 6.0
Ans.: B
Aassign
Bnon-atomic
Catomic
DNone of them
Ans.: C
AiOS 2.0
BiOS 4.0
CiOS 6.0
DiOS 7.0
Ans.: B
AMySQL
BSQLite
CApache
DOracle
Ans.: A
ARecord Videos
BZoom
CAuto Focus
Ans.: D
DDreamweaver
Ans.: B
ALayout file
BManifest file
CStrings XML
DR file
Ans.: A
Q12.The Iphone has a feature that activates when you rotate the device from
portrait to landscape.
ARotator
BAccelerometer
CShadow detector
DSpecial Sensor
Ans.: B
Ans.: C
A%g
B%c
C%lg
D%nf
Ans.: A
ARelational
BAssignment
Cconditional
Dunary
Ans.: A
Q16. Which of the data types has the size that is variable?
Aint
Bstruct
Cfloat
Ddouble
Ans.: B
AThis is the general type for any kind of object regardless of class
Ans.: A
A“foo”
B#”foo”
C@”foo”
D$”foo”
Ans.: C
Ans.: A
AYes
DOnly NSStrings do
Ans.: C
DByte manipulation
Ans.: B
Ainterface
Bimplementation
Cautorelease
DNSLog
Ans.: A
Bimplementation
Cautorelease
DNSLog
Ans.: B
DIt is the function that system uses to run the program after main
Ans.: B
Ans.: B
Ans.: D
Q27. Command to find the broadcast address from router
Ashow running-config
Bshow startup-config
Cshow interfaces
Dshow protocols
Ans.: C
BIt is the language most preferred by developer to write programs for apple
Ans.: A
BIt is the language most preferred by developer to write programs for apple
Ans.: B
BIt is the language most preferred by developer to write programs for apple
CIt is the application
Ans.: C
ASource File
CFramework
Ans.: D
AC#
BAndroid
C OS X
D C++
Ans.: C
AAppMain
BAppDelegate
CUIMain
DNone of these.
Ans.: B
Ans.: D
DNone of these
Ans.: B
Q36. Name the application thread from where UIKit classes should be used?
Ans.: D
Q37. A special C data type that encapsulates other pieces of data into a single
cohesive unit is called?
Adouble
Bchar
Cint
Dstruct
Ans.: D
Q38. Which of the following is used to design GUI of Apps (Inbuilt feature of
the iPhone SDK) ?
ASimulator
BInstruments
CInterface Builder
DNone of these
Ans.: C
A5
B3
C2
D4
Ans.: C
A1280X720
B768X1024
C720X1280
D1024X768
Ans.: D
DNone of above
Ans.: B
Q43. Which are the app specific objects that stores the app's content?
BClass Objects
DDelegates
Ans.: A
BDocument Of Model
CData Of Model
Ans.: D
Cdeletes a variable
Dcreates a getter and a setter for the variable
Ans.: D
AGoogle
BMicrosoft
COracle
DApple
Ans.: D
AC++
BC
CJava
Ans.: D
AGPL
BBSD
CMPL
DProprietary
Ans.: D
A 3.1
B 8.4
C 2.0
D 5.0
Ans.: B
ATouchwiz
BMobiface
CCocoa
Ans.: C
AOne generation
BThree generations
CFour generations
DTwo generations
Ans.: C
ABill Gates
BSteve Jobs
CSteve Ballmer
DBarack Obama
Ans.: B
AIphone 3.2
BIphone 4.0
CIphone 5.0
DIphone 2.4
Ans.: B
Q54. When the activity is not in focus, but still visible on the screen it is in?
Arunning state
BPaused state
Cstopped state
Ddestroyed state
Ans.: B
ADigital Photos
BVideo Calls
CTaking Videos
DEditing Photos
Ans.: B
AStarting state
BRunning state
CLoading state
DInexistent state
Ans.: A
Q57. Which of the following commands displays the syntax for the clock
command?
Acl?
Bclock?
Cclock ?
Dcl ?
Ans.: C
Ans.: D
Aassign
Bnon-atomic
Catomic
DNone of them
Ans.: C
A 1984
B 1985
C 1986
D 1987
Ans.: C
Model Question Paper
Subject: Data Warehousing & Mining
Branch: Computer
Class: BE
Semester: VIII
Q10. Which of the following process includes data cleaning, data integration,
data transformation, data selection, data mining, pattern evaluation and
knowledge presentation?
A. KDD process
B. ETL process
C. KTL process
Ans.: A
D. Implementation level
Ans.: B
Ans.: A
Ans.: A
A. Spatial databases,
B. Time-series databases,
C. Both a & b
D. None of these
Ans.:C
A. Data warehouse
C. ETL
D. Business intelligence
Ans.: B
Ans.: C
Ans.: B
Ans.: D
B. Outliers should be part of the training dataset but should not be present in
the test data.
C. Outliers should be part of the test dataset but should not be present in the
training data.
Ans.: D
D. None of these
Ans.: B
B. Networked data
D. All of These
Ans.: D
A. Data selection
B. Data discrimination
C. Data Classification
D. Data Characterization
Ans.: D
Q31. Data mining is a tool for allowing users to find the hidden relationships
in data.
A. TRUE
B. FALSE
Ans.: A
A. data analysis
B. data manipulation’
C. data mining
D. none of these
Ans.: C
A. kingdom
B. tree
C. classification
D. array
Ans.: C
Q34. Group of similar objects that differ significantly from other objects is
named as …
A. classification
B. cluster
C. community
D. none of these
Ans.: B
A. A subdivision of a set
B. A measure of the accuracy
D. All of these
Ans.: A
Ans.: A
Ans.: B
Q38. Cluster is
D. None of these
Ans.: A
D. None of these
Ans.: C
A. i, ii and iv only
Ans.: D
A. A -> B
B. B -> A
C. A -> D
D. D -> A
Ans.: C
Q44. All set of items whose support is greater than the user-specified
minimum support are called as _____________.
A. border set.
B. frequent set.
C. maximal frequent set.
D. lattice.
Ans.: B
A. Support criteria
B. Confidence criteria
Ans.: A
Q52. The minimum support is 60% and the minimum confidence is 80%.
Trans_id Itemlist
T1 {F, A, D, B}
T2 {D, A, C, E, B}
T3 {C, A, B, E}
T4 {B, A, D}
C. {A}, {B}
Ans.: C
A. Binary attribute.
B. Single attribute.
C. Relational database.
D. Multidimensional attribute.
Ans.: A
A. If a set cannot pass a test, all of its supersets will fail the same test as well
C. If a set can pass a test, all of its supersets will fail the same test as well
Ans.: B
Q57. The basic idea of the apriori algorithm is to generate________ item sets
of a particular size & scans the database.
A. candidate.
B. primary.
C. secondary.
D. superkey.
Ans.: A
Q58. ________is the most well known association rule algorithm and is used
in most commercial products.
A. Apriori algorithm.
B. Partition algorithm.
C. Distributed algorithm.
D. Pincer-search algorithm
Ans.: A
Ans.: B
Class: BE
Semester: VIII
ACertificate_extension
BCertificate_creation
CCertificate_exchange
DCertificate_type
Ans.: D
A Trap Doors
B Trojan Horse
C Virus
D Worm
Ans.: D
ASpyware
BShoulder Surfing
CTrojan
DSocial Engineering
Ans.: A
Q4. From the options below, which of them is not a threat to information
security?
ADisaster
BEavesdropping
CInformation leakage
Ans.: D
Ans.: C
Q6. _____ platforms are used for safety and protection of information in the
cloud.
CAWS
DOne Drive
Ans.: A
Ans.: D
Q8. Which data communication method is used to send data over a serial
communication link?
Asimplex
Bhalf duplex
Cfull duplex
Dall of these
Ans.: C
Ans.: A
Ain-service expansion
Dunlimited distance
Ans.: A
B(p)(q)
C(p-1)(q-1)
D(p+1)(q+1)
Ans.: C
AEncryption
BData mining
CInternet Security
DArchitectural security
Ans.: A
Q13. In which of the following encryption key is used to encrypt and decrypt
the data?
APublic key
BPrivate key
CSymmetric key
DAsymmetric key
Ans.:C
ADictionary attacks
BDatabase attacks
CMinor attacks
DRandom attacks
Ans.: A
A12
B18
C9
D16
Ans.: D
ACaesar cipher
DPlayfair cipher
Ans.: C
Q17. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which
of the following is the property of ‘p’ and ‘q’?
Ans.: C
BEncryption
CNetwork Security
D Information Hiding
Ans.: B
Q19. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where
message=5 and find the cipher text.
AC=80
BC=92
CC=56
DC=23
Ans.: A
ASender
BReceiver
Ans.: B
AMIT
BStanford University
CCalifornia
DBell’s Lab
Ans.: A
Q22. What is the ethics behind training how to hack a system?
ATo think like hackers and know how to defend such attacks
Ans.: A
APhishing
BSpamming
CPhreaking
DCracking
Ans.: C
Aa good
Bnot so good
Da bad
Ans.: D
AAutomated apps
BDatabase software
CMalware
DWorms
Ans.: C
Q26. A penetration tester must identify and keep in mind the ___________ &
___________ requirements of a firm while evaluating the security postures.
Chacking techniques
Ans.: A
AIdentification
BAuthentication
CAccess Control
DLock
Ans.: D
AUser ID
BPassword
COTP
DFingerprint
Ans.: A
AAuthentication
BIdentification
CValidation
DVerification
Ans.: A
Q30. Security features that control that can access resources in the OS.
AAuthentication
BIdentification
CValidation
DAccess control
Ans.: D
APhishing
BSoliciting
CDoS attacks
DStalking
Ans.: C
Q32. __________ is the branch of cyber security that deals with morality and
provides different theories and a principle regarding the view-points about
what is right and wrong.
ASocial ethics
BEthics in cyber-security
CCorporate ethics
Ans.: D
Q33. ________ helps to classify arguments and situations, better understand
a cyber-crime and helps to determine appropriate actions.
ACyber-ethics
BSocial ethics
CCyber-bullying
DCorporate behaviour
Ans.: A
Q34. The legal risks of ethical hacking include lawsuits due to __________ of
personal data.
AEthical hacking
BUnethical hacking
CFixing bugs
DInternal data-breach
Ans.: A
AData-hack
BData-stealing
CDatabase altering
DData breach
Ans.: D
DExfiltration
Ans.: C
Q37. What types of data are stolen by cyber-criminals in most of the cases?
Ans.: A
Q38. ___________ will give you an USB which will contain ___________ that
will take control of your system in the background.
AAttackers, Trojans
DAttackers, antivirus
Ans.: A
Q39. _____________ will encrypt all your system files and will ask you to pay
a ransom in order to decrypt all the files and unlock the system.
AScareware
BRansomware
CAdware
DSpyware
Ans.:B
Q40. An attacker may use automatic brute forcing tool to compromise your
__________
Ausername
Bemployee ID
Csystem / PC name
Dpassword
Ans.: D
AProactive
BReactive
Cboth A and B
Ans.: A
AFive
BFour
CSix
DThree
Ans.: A
Bonly (ii)
Ans.: C
AMessage Field
BMessage Digest
CMessage Score
DMessage Leap
Ans.: B
A160 bits
B100bits
C64bits
D128-bit
Ans.: D
AAuthentication
BNon-repudiation
CData Integrity
DAll of the these
Ans.: D
A160 bits
B512 bits
C628 bits
D820 bits
Ans.: A
Aprivate-key system
Bshared-key system
Cpublic-key system
Ans.: C
AReplaced
BOver view
CChanged
DLeft
Ans.: C
Ans.: C
Dii, iii, iv
Ans.: B
Aauthentication
Bnonrepudiation
Cboth A & B
DNeither A nor B
Ans.: C
Q53. What are the major components of the intrusion detection system?
AAnalysis Engine
BEvent provider
CAlert Database
DAll of the these
Ans.: D
AZone based
DLevel based
Ans.: B
Ans.: D
Ans.: D
Ans.: C
Ans.: D
Cboth A and B
Ans.: C
AConfigured
BTrained
Cboth A and B
Ans.: A
Model Question Paper
Subject: Mobile Computing
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A.SIM
B. HLR
C. ELR
D. VLR
Ans.: A
Ans.: A
A. Cell
B. Tessellate
C. Mobile station
A. Environmental conditions
B. Social conditions
C. Political conditions
Ans.: A
A. Handover
B. Infrastructure
C. Frequency planning
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Telephony
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth Technology
C Ad hoc computing
Ans.: B
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
A. Wired LAN
B. Wireless LAN
Ans.: B
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
A. Flexibility
B. Ease of use
C. Robustness
Ans.: D
Ans.: D
B. Parked
C. Standby
Ans.: A
A. Mobility
B. Portability
C. Wireless connectivity
Ans.: D
A. GSM
B. GPRS
C. CDMA
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
Ans.: C
Q19. Group of cells without overlapping gaps is called ——
A. Cell
B. Tessellate
C. Mobile station
Ans.: B
A. Hexagon
B. Circular
C. Square
Ans.: A
A. Education
B. Sports
C. Games
Ans.: D
A. Low Security
B. Ad hoc Networking
C. Shared medium
A. Piconet
B. Ad hoc piconet
C. Scatter net
Ans.: C
B. Ad-hoc networking
Ans.: D
A. Master
B. Parked
C. Standby
D. Slave
Ans.: D
B. Mobile Portal
C. Location-Based Commerce (L-Commerce)
D. Mobile Computing
Ans.: A
Ans.: D
A. Wireless
B. Hotspot
C. Voice Portal
D. Bluetooth
Ans.: D
A. Mobile Wallet
B. Mobile Computing
C. Pervasive Computing
D. Mobile Portal
Ans.: B
Q30.Phones the provide two-way radio communications over a cellular
network of base stations with seamless handoffs
A. Bluetooth
B. Infrared
C. Cellular Phones
D. Mobile Wallet
Ans.: C
A. UMTS
B. DECT
C. DCS-1800
D. ETACS
Ans.: A
Q32. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A.GSM
B. AMPS
C. CDMA
D. IS-54
Ans.: A
Ans.: B
A. ITU
B. AT & T
C. ETSI
D. USDC
Ans.: C
A. Emergency calling
C. Call diversion
Ans.: C
B. Flip flop
C. SIM
D. SMS
Ans.: C
Q37. Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: A
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: B
A. BSS
B. NSS
C. OSS
D. BSC
Ans.: C
B. BSS
C. NSS
D. VLR
Ans.: C
A. ANSI
B. ETSI
C. 3GPP
D. UMTS
Ans.: C
Q43. Which is the main protocol that transfers packets in a GPRS Core
network?
A. GTP
B. SSTP
C. SCTP
D. None
Ans.: A
A. Ga
B. Gb
C. Gc
D. Gd
Ans.: B
Q46. What is the interface between SGSN and GGSN in a GPRS network?
A. Ga
B. Gb
C. Gn
D. Gd
Ans.: C
Q47. What is the interface between GGSN and Inter-PLMN GPRS network?
A. Ga
B. Gb
C. Gp
D. Gd
Ans.: C
Q48. What is the interface between GGSN and External Packet Network(
Internet ) in a GPRS structure?
A. Ga
B. Gb
C. Gp
D. Gi
Ans.: D
Q49. What is the interface between SGSN and MSC/VLR in a GPRS network?
A. Gs
B. Gb
C. Gp
D. Gd
Ans.: A
B. IP
D.None
Ans.: C
Ans.: B
A.56-115kbps
B.9-256kbps
C.64-128kbps
D.None
Ans.: A
C. IP - Internet Protocol
D. All
Ans.: D
Q56. GPRS uses which unused channels for transportation of Data in general?
A.SDCCH
B.BCCH
C.TCH
D.SCH
Ans.: C
A.SGSN
B.GGSN
D.None
Ans.: C
Q58. What are the main parts of a Mobile Station in a GSM Network?
C.Both A and B
D.None
Ans.: C
Q59. What are the three main parts of a GSM Architecture or Structure?
A. Mobile Station
Ans.: D
A.IMEI
B.SIM
C.IMSI
D.None
Ans.: A
Model Question Paper
Subject: Cloud Computing
Class: BE IT
Semester: VIII
1) In Cloud computing abstracts the details of system implementation from users and developers,
This Concept is known as ___________
(A)Abstraction
(B) Encapsulation
(C) Hiding
(D)Inheritance
Ans. A
2) Which of the following cloud concept is related to pooling and sharing of resources?
((A) Polymorphism
(B) Abstraction
(C) Virtualization
Ans. C
(C) Google
Ans. D
4) The __________ model originally did not require a cloud to use virtualization to pool
resources.
(A) NIST
(B)NEFT
(C)NIT
(D)None of these
Ans. A
5) The ------------ model originally did not require a cloud to use virtualization to pool resources.
(A) NEFT
(B) NIST
(C) NIT
Ans. B
(A) 1
(B) 2
(C) 3
(D) 4
Ans. D
(A) Deployment
(B) Service
(C) Application
Ans. A
8) Which of the following is deployment model?
(A) public
(B) private
(C) hybrid
Ans. D
(A) Autonomous
(B) Public
(C) Private
(D) Hybrid
Ans. A
10) --------------- cloud is one where the cloud has been organized to serve a common function or
purpose.
(A) Public
(B) Private
(C) Community
Ans. C
11) --------- model consists of the particular types of services that you can access on a cloud
computing platform.
(A) Service
(B) Deployment
(C) Application
Ans. A
12) SaaS stands for?
Ans. A
13) A service that concentrates on hardware follows the ----------- as a Service model.
(A) IaaS
(B) CaaS
(C) PaaS
Ans. A
(A) 4
(B) 3
(C) 2
(D)1
Ans. A
15) In ------- a client can provision computer resources without the need for interaction with
cloud service provider personnel.
Ans. A
16) _______ model attempts to categorize a cloud network based on four dimensional factors.
Ans. A
17) Which of the following is the most important area of concern in cloud computing?
(A) Security
(B) Storage
(C) Scalability
Ans. A
(A) Hadoop
(B) Intranet
Ans. A
19) The ---------- is something that you can obtain under contract from your vendor.
(A) PoS
(B) QoS
(C) SoS
Ans. B
20) Which of the following is given by Cloud Cube Model's ownership dimension
(A) Proprietary
(B) Owner
Ans. B
(A) Modular
(B) Stateless
Ans. C
(B) GoGrid
(C) Rackspace
Ans. D
(A) VGM
(B) VMc
(C) VMM
Ans. C
24) _________ is designed specifically to run connected to the cloud as a dedicated cloud client.
(A) Harvera Tablet OS
(C)Jolicloud Netbook OS
Ans. C
25) ----------- hypervisor virtual machine that includes a a NetBeans Integrated Development
Environment (IDE)
(B) VGM
(C) VMc
Ans. A
26) ------------ services offer all the hosted hardware and software needed to build and deploy
Web applications.
Ans. D
(A) HTML
(B) JavaScript
Ans. C
(B) Gbridge
Ans. B
29) Applications such as a Web server or database server that can run on a virtual machine image
are referred to as
(A) HTML
(C) Applications
Ans. B
30) ------- offers virtual appliances, including ones based on Windows, all of which run on
VMware Player.
(A) Bagvapp
(B) HelpdeskLive
(C) Jcinacio
Ans. A
(A) Imaging
(B) Parallels
(C) QEMU
Ans. C
32) Which of the following lets a Web service advertise itself in terms of a collection of
endpoints?
(A) WSDL
(B) VMc
(C) SOAP
Ans. A
33) Which of the following is a virtual machine technology now owned by Oracle that can run
various operating systems?
(A) Vmachines
(B) VirtualBox
(C) ThoughtPolice
Ans. B
34) -------- hosts a variety of appliances that includes Linux distros, server software, and other
products.
(A) Jumpbox
(B) Parallels
(C) Ken
(D) API
Ans. B
(A) Jumpbox
(B) ThoughtPolice
(C) Parallels
(A) WS-Addressing
(B) WS-Discovery
(C) WS-Eventing
(D) WS-Federation
Ans. B
(A) Imaging
(B) Parallels
(C) QEMU
Ans. C
(A) SSL
(B) FTPS
(C) IPsec
Ans. D
Ans. C
40) Which OS incorporates a sandbox architecture for running applications and also performs
automatic updates.
(B) Chromium OS
(C) Windows
Ans. B
(A) SaaS
(B) IaaS
(C) PaaS
Ans. D
42) ---------- is a complete operating environment with applications, management, and the user
interface.
(A) IaaS
(B) SaaS
(C) PaaS
Ans. B
43) Which of the following is most refined and restrictive service model?
(A) IaaS
(B) CaaS
(C) PaaS
Ans. C
44) -------- as a Service is a cloud computing infrastructure that creates a development
environment upon which applications may be build.
(A) Infrastructure
(B) Service
(C) Platform
Ans. C
45) --------- as a Service is a hosted application that is the cloud equivalent of a traditional
desktop application.
(A) Software
(B) Platform
(C) Analytics
(D) Compliance
Ans. A
46) Which of the following model allows vendor to provide security as part of the Service Level
Agreement?
(A) SaaS
(B) PaaS
(C) IaaS
Ans. A
47) _______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
(A) PaaS
(B) IaaS
(C) CaaS
(B) Gmail
Ans. A
49) How many types of virtual private server instances are partitioned in an IaaS stack?
(A) one
(B) two
(C) three
Ans. C
(B) Azure
(C) Cloudera
Ans. A
51) Pods are aggregated into pools within an IaaS region or site called an ----------- zone.
(A) restricted
(B) unavail
(C) availability
Ans. C
52) ____________ offering provides the tools and development environment to deploy
applications on another vendor’s application.
(A) PaaS
(B) IaaS
(C) CaaS
Ans. B
(A) IaaS
(B) CaaS
(C) PaaS
Ans. C
54) _______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware
assets.
a. IaaS
b. SaaS
c. PaaS
Ans. A
Ans. B
56) Which of the following attribute should be unique?
(A) identity
(C) Mashup
Ans. B
57) ________ is one of the more expensive and complex areas of network computing.
Ans. C
(B) Provisioning
Ans. D
59) Which of the following allows a distributed ID system to write and enforce custom policy
expressions?
(A) XACML
(B) XML
(C) SOAP
Ans. A
60) Which of the following is a man-in-the-middle type of service?
(A) CaaS
(B) IaaS
(C) AaaS
Ans. A
Model Question Paper
Branch: IT
Class: BE
Semester: VIII
B With cloud computing, you can start very small and become big very fast
Ans.: A
Q2. Which of the following cloud concept is related to pooling and sharing of
resources?
A Polymorphism
BAbstraction
CVirtualization
Ans.: C
ATrue
BFalse
CMay be
DCan’t Say
Ans.: A
A Distributed
B Cloud
C Soft
D Parallel
Ans.: B
Q5. The ------------ model originally did not require a cloud to use virtualization
to pool resources.
ANEFT
B NIST
CNIT
Ans.: B
A Cloud Square
B Cloud Cube
C Cloud Service
Ans.: B
C Data centers have been sited to optimize the overall system latency
Ans.: C
A public
B private
C hybrid
Ans.: D
A Software as a service
D System as a service
Ans.: A
Q10. The ------- cloud infrastructure is operated for the exclusive use of an
organization.
A Public
B Private
C Community
Ans.: B
Q11. --------------- cloud is one where the cloud has been organized to serve a
common function or purpose.
A Public
B Private
C Community
Ans.: C
Q12. --------- model consists of the particular types of services that you can
access on a cloud computing platform.
A Service
B Deployment
C Application
Ans.: A
AIaaS
BCaaS
CPaaS
Ans.: A
AService
BApplication
CDeployment
Ans.: A
Q15. In ------- a client can provision computer resources without the need for
interaction with cloud service provider personnel.
AOn-demand self-service
Ans.: A
A Google
B Amazon
C Blackboard
D Microsoft
Ans.: C
Q17. Which of the following benefit is related to create resources that are
pooled together in a system that supports multi-tenant usage?
A On-demand self-service
C Resource pooling
Ans.: C
Q18. The ---------- is something that you can obtain under contract from your
vendor.
APoS
BQoS
CSoS
Ans.: B
Astateless
Bstateful
Creliable
D4
Ans.: A
Q20. Which of the following is the most important area of concern in cloud
computing?
A Security
B Storage
C Scalability
Ans.: A
Q21. Which of the following provider rely on the virtual machine technology to
deliver servers?
ACaaS
BAaaS
CPaaS
DIaaS
Ans.: D
A Modular
B Stateless
C Both A and B
Ans.: C
BGoGrid
CRackspace
Ans.: D
A Service-oriented architecture
C Web-application frameworks
Ans.: A
Q25. Which of the following component is called hypervisor?
A VGM
BVMc
C VMM
Ans.: C
A Sun xVM
B VGM
C VMc
Ans.: A
Q27. ----------- services offer all the hosted hardware and software needed to
build and deploy Web applications.
Ans.: D
Q28. Many platforms offer user interface development tools based on
A HTML
B JavaScript
C Both A and B
Ans.: C
Ans.: C
A DCOM
B CORBA
C Both A and B
Ans.: C
Q31. ------- offers virtual appliances, including ones based on Windows, all of
which run on VMware Player.
A Bagvapp
B HelpdeskLive
C Jcinacio
Ans.: A
A Imaging
B Parallels
C QEMU
Ans.: C
Q33. Amazon Machine Images are virtual appliances that have been packaged
to run on the grid of -------- nodes.
A Ben
B Xen
C Ken
D Zen
Ans.: B
Q34. Which of the following is a virtual machine technology now owned by
Oracle that can run various operating systems?
A Vmachines
B VirtualBox
C ThoughtPolice
Ans.: B
Q35. -------- hosts a variety of appliances that includes Linux distros, server
software, and other products.
A Jumpbox
B Parallels
C Ken
D API
Ans.: B
A Jumpbox
B ThoughtPolice
C Parallels
Ans.: A
Q37. --------- is a specification for multicast discovery on a LAN
A WS-Addressing
B WS-Discovery
C WS-Eventing
D WS-Federation
Ans.: B
A SSL
B FTPS
C IPsec
Ans.: D
A Microsoft RDP
B Citrix ICA
C Both A and B
Ans.: C
A Jolicloud Netbook OS
B Chromium OS
C Windows
Ans.: B
ASaaS
BIaaS
CPaaS
Ans.:D
AIaaS
BSaaS
CPaaS
Ans.:B
Q43. Which of the following is most refined and restrictive service model?
AIaaS
B CaaS
C PaaS
D All of the mentioned
Ans.:C
AInfrastructure
BService
CPlatform
Ans.:C
ASoftware
B Platform
C Analytics
D Compliance
Ans.:A
AGoogle Maps
BGmail
CGoogle Earth
Q47. SaaS supports multiple users and provides a shared data model through
_________ model.
A single-tenancy
B multi-tenancy
C multiple-instance
Ans.:B
A XACML
B XML
C SOAP
Ans.: A
Q49. How many types of virtual private server instances are partitioned in an
IaaS stack?
A one
B two
C three
Ans.:C
B Azure
CCloudera
Ans.:A
APaaS
BIaaS
CCaaS
Ans.:B
Q52. Which of the following is the most complete cloud computing service
model?
APaaS
BIaaS
CCaaS
DSaaS
Ans.:D
Q53. In SaaS which of the following aspect of the service is abstracted away?
A Data escrow
B User Interaction
C Adoption drivers
Ans.:B
A closed
B free
C open
Ans.:C
Q55. Pods are aggregated into pools within an IaaS region or site called an ------
----- zone.
A restricted
Bunavail
C availability
Ans.: C
APaaS
BIaaS
CCaaS
DSaaS
Ans.:D
Q57. ---------- is one of the more expensive and complex areas of network
computing.
A Multi-Factor Authentication
B Fault tolerance
C Identity protection
Ans.:C
A Identity governance
B Provisioning
Ans.:D
ACaaS
BIaaS
CAaaS
Ans.:A
Q60. Amazon Web Services offers a classic Service Oriented Architecture (SOA)
approach to ______________
AIaaS
BSaaS
CPaaS
Ans.:C
Model Question Paper
Subject: CNS
Branch: IT
Class: BE
Semester: VIII
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q1. In symmetric-key cryptography, the key locks and unlocks the box is
A same
B shared
C private
D public
Ans.: A
A secret key
B private key
C public key
D All of them
Ans.: D
a. Corrupting Data
b. Secret Writing
c. Open Writing
d. Closed Writing
Ans: b
Q4. The relationship between characters in the plaintext to a character is
a. many-to-one relationship
b. one-to-many relationship
c. many-to-many relationship
d. None
Ans.: b
a. Caesar cipher
b. Data Encryption Standard (DES)
c. Diffie Hellman cipher
d. Playfair cipher
a. Data Confidentiality
b. Data Integrity
c. Authentication
d. None of the above
a. Masquerade
b. Modification of message
c. Denial of service
d. Traffic analysis
Answer: d) Traffic analysis
Q8. Which of the following options correctly defines the Brute force attack?
a. Brutally forcing the user to share the useful information like pins and
passwords.
b. Trying every possible key to decrypt the message.
c. One entity pretends to be some other entity
d. The message or information is modified before sending it to the receiver.
a. An integer values
b. A square matrix
c. An array of characters (i.e. a string)
d. All of the above
Ans.: a
Ans.: b
Q12Data which is easily readable & understandable without any special algorithm or method is
called _________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
Ans.: b
Ans.: a
Ans.: a
Q15. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TLS)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Ans.: b
Q16. _________________ is the process or mechanism used for converting ordinary plain text
into garbled non-human readable text & vice-versa.
a) Malware Analysis
b) Exploit writing
c) Reverse engineering
d) Cryptography
Ans.: d
Ans.: b
Ans.: c
Q19. Cryptographic algorithms are based on mathematical algorithms where these algorithms
use ___________ for a secure transformation of data.
a) secret key
b) external programs
c) add-ons
d) secondary key
Ans.: a
Ans.: d
Ans.: a
Q22. . Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) dsa algorithm
Ans.: c
b) Transposition
c) Product cipher
d) Caesar cipher
Ans.: b
Q24. Public key encryption is advantageous over Symmetric key Cryptography because of
a) Speed
b) Space
c) Key exchange
d) Key length
Ans.: c
b) 56
c) 48
d) 64
Ans.: b
Ans.: a
Ans.: c
b) 02
c) 04
d) 01
Ans.: b
b) Passwords
c) Smart cards
d) Pin
Ans.: a
Q30. _______ is based on the idea of hiding the relationship between the cipher text and the Key
a) Diffusion
b) Confusion
d) None of these
Ans.: b
b) 32
c) 12
d) 16
Ans.: d
Q32. What does IDEA stand for in the world of cryptography?
or
The IDEA word in the IDEA algorithm is the abbreviation for which of the
following?
Answer: c.
Q33. How many sub-keys in the total are used by the IDEA for encrypting the
plain text into ciphertext?
a. 64 sub- keys
b. 48 sub- keys
c. 52 sub- keys
d. Only one key and no subkeys
Answer: c.
a. Avalanche effect
b. Completeness
c. Both a. and b.
d. None of the above
Answer: c.
Q35. All the below-stated processes are performed in the AES (Advanced
Encryption Standard) Algorithm. Which of the following process(s) are not
performed in the final round of the AES?
a. Substitution bytes
b. Shift rows
c. Mix columns
d. Add round key
Answer: c.
Ans.: b
Ans.: a
Ans.: a
Q39. Under DES, the data encryption standard took a 64-bit block of data and subjected it to
______ levels of encryption.
a) 64
b) 8
c) 16
d) 4
Ans.: c
Q40. Data Encryption Standard. It was created in ______and went into operation from 1990s.
a. 1977
b. 1978
c. 1979
d. 1980
Ans.: a
Q41. The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication
b) Data Integrity
c) Data confidentiality
Ans.: d
b) Cannot
c) Can
d) Should not
Ans.: c
c) Components of cryptography
Ans.: c
Q44. The _____ mode of IPsec, take the whole IP packet to form secure communication between
two gateways
a) Transport
b) Tunnel
Ans.: b
Q45. Man in the middle attack can endanger the security of Diffie Hellman method if two parties are
not
a) Joined
b) Authenticated
c) Submitted
d) Shared
Ans.: b
Q46.In public key cryptosystem _____ keys are used for encryption and decryption.
a) Same
b) Different
c) Encryption Keys
d) None of the mentioned
Ans.:b
Q47. In public key cryptosystem which is kept as public?
a) Encryption keys
b) Decryption keys
Ans.:a
Ans.:c
Ans.:c
Q50. Private key algorithm is used for _____ encryption and public key algorithm is used for
_____ encryption.
a) Messages, session key
b) Session key, messages
c) Can be used for both
d) None of the mentioned
Ans.:a
Q51. Which algorithm can be used to sign a message?
a) Public key algorithm
b) Private key algorithm
c) Public & Private key algorithm
d) None of the mentioned
Ans.:a
Ans.:a
Q53. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following
is the property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder
Ans.:c
Ans.:c
Q55. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime
to Ф(n).
a) True
b) False
Ans.:b
B. RSA
C.DES
D.AES
Ans.:a
Ans.:d
Q58. In ………………. Mode, the authentication header is inserted immediately after the IP
header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B
Ans.:a
Ans.:a
Ans.:b
Name of College: Gangamai College of Engineering.
Subject: Data Warehouse and Mining (DWM).
Branch: Computer Engineering.
Class: BESemester: VIII
1
Q5.__________ is the heart of the warehouse.
A.Data mining database servers.
B. Data warehouse database servers.
C. Data mart database servers.
D. Relational data base servers.
Ans.: B
Q6.A data mart is designed to optimize the performance for well-defined and predicable
uses.
A. True
B. False
Ans.: A
Q10.What is noise?
A. Component of a network
B. Context of KDD and data mining
2
C. Aspects of a data warehouse
D. None of these
Ans.:B
Q12.The important aspect of the data warehouse environment is that data found within
the data warehouseis___________.
A. subject-oriented.
B. time-variant.
C. integrated.
D. All of the above.
Ans.: D
Q13.A ________ system is market-oriented and is used for data analysis by knowledge
workers, including managers, executives, and analysts.
A. OLAP
B. OLTP
C. Both of the above
D. None of the above.
Ans.: A
Q15.________ are responsible for running queries and reports against data warehouse
tables.
3
A. Hardware.
B. Software.
C. End users.
D. Middle ware.
Ans.: C
4
A. ETL from operation systems to strategic system
B. Large scale transaction processing
C. Storing large volumes of data
D. Decision support
Ans.: D
Q21.When you ________ the data, you are aggregating the data to a higher level.
A. Slice
B. Roll up
C. Accumulate
D. Drill down
Ans.: B
5
Q25. ____________predicts future trends & behaviors, allowing business managers to
make proactive,
knowledge-driven decisions.
A. Data warehouse.
B. Data mining.
C. Datamarts.
D. Metadata.
Ans.: B
6
Q30.Successful data warehousing requires that a formal program in total quality
management (TQM) be implemented.
A. True
B.False
Ans.: A
Q31. The core of the multidimensional model is the _______ , which consists of a large set of
facts and a number of dimensions.
A. Multidimensional cube
B. Dimensions cube
C. Data cube
D. Data model
Ans.: C
Q33.Data mining is a tool for allowing users to find the hidden relationships in data.
A. True
B. False
Ans.: A
Q34.What are the two main objectives associated with data mining?
A. To explain some observed event or condition
B. To confirm that data exists
C. To analyze data for expected relationships
D. To find hidden patterns and trends
Ans.: D
7
Q36.._______ is an essential process where intelligent methods are applied to extract
data patterns.
A. Data warehousing
B. Data mining
C. Text mining
D. Data selection
Ans.: B
Q37.. Data mining can also applied to other forms such as ______
i) Data streamsii) Sequence data
iii) Networked dataiv) Text datav) Spatial data
A. i, ii, iii and v only
B. ii, iii, iv and v only
C. i, iii, iv and v only
D. All i, ii, iii, iv and v
Ans.: D
8
Q39.. Strategic value of data mining is_________
A. cost-sensitive
B. work-sensitive
C. time-sensitive
D. technical-sensitive.
Ans.: C
9
Q44.Reduce amount of time and memory required by data mining algorithms--------
A. Target Data
B. Data sampling
C. Data aggregation
D. Data reduction
Ans.: D
Q46.. What techniques can be used to improve the efficiency of Apriori algorithm?
A. Hash-based techniques
B. Transaction Reduction
C. Partitioning
D. All of the above
Ans.: D
10
Q49.. What is the relation between candidate and frequent item sets?
A. A candidate itemset is always a frequent itemset
B. A frequent itemset must be a candidate itemset
C. No relation between the two
D. Both are same
Ans.: B
11
Q54.Why is correlation analysis important?
A. To make apriori memory efficient
B. To weed out uninteresting frequent itemsets
C. To find large number of interesting itemsets
D. To restrict the number of database iterations
Ans.: B
Q58.A ______ system is market-oriented and is used for data analysis by knowledge
workers, including managers, executives, and analysts.
A) OLAP
B) OLTP
C) Both of the above
D) None of the above
Ans.: A
12
Q59.Data cleaning routine attempt to fill I missing values, ___ and correct
inconsistencies.
A. smooth out noise
B.remove error
C. variance
D. none of above
Ans.: A
13
Model Question Paper
Subject: Data Warehousing and Mining
Branch : Computer Engineering /Information Technology
Class : BE
Semester : VIII
Unit I
Q1. ......................... is a subject-oriented, integrated, time-variant, nonvolatile collection or
data in support of management decisions.
A) Data Mining
B) Data Warehousing
C) Document Mining
D) Text Mining
Answer:B) Data Warehousing
Q2. Which of the following is not a component of a data warehouse?
A) Metadata
B) Current detail data
C) Lightly summarized data
D) Component Key
Answers: D) Component Key
Q3. Which of the following is not a kind of data warehouse application?
A) Information processing
B) Analytical processing
C) Data mining
D) Transaction processing
Answers: D) Transaction processing
Q4. A data warehouse is ......................
A) updated by end users.
B) contains numerous naming conventions and formats
C) organized around important subject areas
D) contain only current data
Answer :C) organized around important subject areas
Q5. Data warehouse contains ................ data that is never found in the operational
environment.
A) normalized
B) informational
C) summary
D) denormalized
Answer: C) summary
Q6. ................... are responsible for running queries and reports against data warehouse
tables.
A) Hardware
B) Software
C) End users
D) Middle ware
Answer: C) End users
Q7. The full form of OLAP is
A) Online Analytical Processing
B) Online Advanced Processing
C) Online Advanced Preparation
D) Online Analytical Performance
Answer: A) Online Analytical Processing
Q8. ........................ is a good alternative to the star schema.
A) Star schema
B) Snowflake schema
C) Fact constellation
D) Star-snowflake schema
Answer: C) Fact constellation
Q9. Fact tables are which of the following
A) Completely denormalized
B) Partially denormalized
C) Completely normalized
D) Partially normalized
Answer: C) Completely normalized
Q10.A star schema has what type of relationship between a dimension and fact table?
A) Many-to-many
B) One-to-one
C) One-to-many
D) All of the above.
Answer: C) One-to-many
Q11.Among the followings which is not a characteristic of Data Warehouse?
A) Integrated
B) Volatile
C) Time-variant
D) Subject oriented
Answer: B) Volatile
Q12. The type of relationship in star schema is ...............
A) many to many
B) one to one
C) one to many
D) many to one
Answers: C) one to many
Q13. Which of the following method(s) is(are) used to handle the missing value in dataset.
A) Ignore the tuple or Fill in the missing value manually
B) Use the attribute mean for all samples belonging to the same class as the given tuple
C) Use a global constant to fill in the missing value or Use the attribute mean to fill in the
missing value
D) All of the above
Answer: D) All of the above
Q14. Which of the following is/are data smoothing technique(s)
A) Binning
B) Regression
C) Clustering
D) All of the above
Answer: D) All of the above
Q15.Which of the following is/are data transformation technique(s)
A) Smoothing
B) Aggregation
C) Generalization , Normalization and Attribute construction
D) All of the above
Answer: D) all of above
Q16.The methods for data normalization is/are
A) Min Max
B) Z-score
C) Decimal Scaling
D) All of the above
Answer: D) All of the above
Q17. ……………can be used to reduce the data by collecting and replacing low level
concepts with higher level concepts.
A) Concept Hierarchy
B) Z-Score
C) Min Max
D) None of the Above
Answer:A) Concept Hierarchy
Q18. ……………can be used to reduce the data by collecting and replacing low level
concepts with higher level concepts.
A) Decimal Scaling
B) Z-Score
C) Min Max
D) None of the Above
Answer: D) None of the Above
Q19. Which of the following is not data smoothing technique
A) Binning
B) Regression
C) Clustering
D) None of the above
Answer: D) None of the above
Q20.The star schema is composed of __________ fact table
A) Four
B) Three
C) Two
D) One
Answer: D) One
Unit II
Q1. ...................... is an essential process where intelligent methods are applied to extract data
patterns.
A) Data warehousing
B) Data mining
C) Text mining
D) Data selection
Answer: B) Data Mining
Q2. Data that are not of interest to the data mining task is called as ______.
A)Missing data
B)Changing data
C)Irrelevant data
D)Noisy data
Answer: C)Irrelevant data
Q3. Data mining can also applied to other forms such as ................
A) Data streams
B) Sequence data
C) Text data
D) All of the above
Answer: D) All of the above
Q4. Which of the following is not a data mining functionality?
A) Characterization and Discrimination
B) Classification and regression
C) Selection and interpretation
D) Clustering and Analysis
Answer: C) Selection and interpretation
Q5. The full form of KDD is ..................
A) Knowledge Database
B) Knowledge Discovery Database
C) Knowledge Data House
D) Knowledge Data Definition
Answer: B) Knowledge Discovery Database
Q6 . The output of KDD is .............
A) Data
B) Information
C) Query
D) Useful information
Answer: D) Useful information
Q7. Which of following is NOT a stage of KDD(Knowledge Discovery from
Database) process?
A)Data Mining
B)Data Selection
C) Data integration
D)Correlation
Answer: D)Correlation
Q8. Which of following is/are a step(s) of KDD(Knowledge Discovery from
Database) process?
A)Data Mining
B)Data Selection
C)Data integration
D)All of the above
Answer: D)All of the above
Q9. Which of the following process includes data cleaning, data integration, data selection,
data transformation, data mining, pattern evolution and knowledge presentation?
A) KDD process
B) ETL process
C) KTL process
D) None of the above
Answer: A) KDD Process
Q10. Which of the following process includes data cleaning, data integration, data selection,
data transformation, data mining, pattern evolution and knowledge presentation?
A) MTX process
B) ETL process
C) KTL process
D) None of the above
Answer: D) None of the above
Unit III
Page 1 of 9
7. In ______________ a fact table in the middle connected to a set of dimension tables.
A. Star schema
B. Snowflake schema
C. Fact constellations
D. None of the above
Ans.: A
8. An aggregate function is ___________ if it can be computed in a distributed Manner.
A. Holistic
B. Distributive
C. Algebraic
D. Nonholistic
Ans.: B
9. _____________is a visualization operation that rotates the data axes in view in order to
provide an alternative presentation of the data.
A. Roll-up
B. Drill-down
C. Pivot
D. Slice and dice
Ans.: C
10. Number of records accessed by OLTP is in _________________.
A. Thousands
B. Millions
C. Tens
D. Hundreds
Ans.: C
11. _________________includes fact tables and dimension tables.
A. Data source view
B. Business query view
C. Top-down view
D. Data warehouse view
Ans.: D
12. ______________may be detected by clustering.
A. Noise
B. Outliers
C. Both A and B
D. None of the above
Ans.: B
13. DB Design in OLAP is____________________.
A. Application-oriented
B. Object-oriented
C. Subject-oriented
D. ER based oriented
Ans.: C
Page 2 of 9
14. Multiple fact tables share dimension tables, viewed as a collection of stars, therefore called
as ___________________.
A. Star schema
B. Snowflake schema
C. Fact constellations
D. None of the above
Ans. C
15. Number of records accessed by OLAP is in ___________.
A. Hundreds
B. Thousands
C. Millions
D. Tens
Ans.: C
16. ______________says that there can be no missing values between the lowest and highest
values for the attribute, and that all values must also be unique.
A. A unique rule
B. A null rule
C. A consecutive rule
D. None of the above
Ans.: C
17. ____________methods smooth a sorted data value by consulting its “neighborhood,” that
is, the values around it.
A. Regression
B. Non-regression
C. Binning
D. Clustering
Ans.: C
18. _____________obtains a reduced representation of the data set that is much smaller in
volume yet produces the same analytical results.
A. Data Transformation
B. Data Integration
C. Data Cleaning
D. Data Reduction
Ans.: D
19. ____________is a random error or variance in a measured variable.
A. Outlier
B. Noise
C. Both A and B
D. None of the above
Ans.: B
20. Principal components analysis is also called as____________________.
A. P-L Method
B. P-A Method
C. P-C Method
D. K-L Method
Ans.: D
Page 3 of 9
21. ______________means that a DM system is smoothly integrated into the DB/DW system.
A. No coupling
B. Loose coupling
C. Tight coupling
D. Semitight coupling
Ans.: C
22. _____________refers to extracting or mining knowledge from large amounts of data.
A. Data Mining
B. Data Warehouse
C. Both A and B
D. None of the above
Ans.: A
23. In _________________multiple data sources may be combined.
A. Data Cleaning
B. Data Selection
C. Data Integration
D. Data Transformation
Ans.: C
24. The next stage to data mining in KDD process is____________________.
A. Data Selection
B. Knowledge Presentation
C. Data Transformation
D. Pattern Evaluation
Ans.: D
25. _________is the domain knowledge that is used to guide the search or evaluate the
interestingness of resulting patterns.
A. Pattern evaluation module
B. Data mining engine
C. Knowledge base
D. User interface
Ans.: C
26. ________________________can be designed to support ad hoc and interactive data mining.
A. Data warehouse query language
B. Data mining query language
C. Data control query language
D. Data Definition query language
Ans.: B
27. _______________is the process of finding a model (or function) that describes and
distinguishes data classes or concepts.
A. Classification
B. Prediction
C. Both of the above
D. None of the above
Ans.: A
Page 4 of 9
28. _____________tasks perform inference on the current data in order to make predictions.
A. Descriptive Mining
B. Predictive Mining
C. Both of the above
D. None of the above
Ans.: B
29. ___________________is used to summarized the general characteristics of a target class of
data.
A. Data Classification
B. Data discrimination
C. Data Characterization
D. Data selection
Ans.: C
30. The output of KDD is ___________.
A. Data
B. Information
C. Query
D. Useful information
Ans.: D
31. ________________where visualization and knowledge representation techniques are used
to present the mined knowledge to the user.
A. Pattern evaluation
B. Data mining
C. Knowledge Presentation
D. User interface
Ans.: C
32. ___________________is a comparison of the general features of the target class data
objects with the general features of objects from one or set comparative classes.
A. Data characterization
B. Data classification
C. Data discrimination
D. Data selection
Ans.: C
33. ________________means that a DM system will not utilize any function of a DB or DW
system.
A. Tight coupling
B. Loose coupling
C. Semitight coupling
D. No coupling
Ans.: D
34. _______________tasks characterizes the general properties of the data in the database.
A. Descriptive mining
B. Predictive mining
C. Both of the above
D. None of the above
Ans.: A
Page 5 of 9
35. ____________routines work to “clean” the data by filling in missing values, smoothing noisy
data.
A. Data Transformation
B. Data Integration
C. Data Cleaning
D. Data Reduction
Ans.: C
36. ______________________________specifies the portions of the database or the set of data
in which the user is interested.
A. The interestingness measures and thresholds for pattern evaluation
B. The expected representation for visualizing the discovered patterns
C. The kind of knowledge to be mined
D. The set of task-relevant data to be mined
Ans.: D
37. __________________ can be designed to incorporate primitives, allowing users to flexibly
interact with data mining systems.
A. Data warehouse query language
B. Data mining query language
C. Data control query language
D. Data Definition query language
Ans.: B
38. ______________is the task of discovering interesting patterns from large amounts of data,
which can be stored in databases, data warehouses, or other information repositories.
A. Databases
B. Data warehouse
C. Data mining
D. Task Primitives
Ans.: C
39. The next stage to data integration in KDD process is____________________.
A. Data Cleaning
B. Pattern Evaluation
C. Data Selection
D. Data Transformation
Ans.: C
40. _______________where data are consolidated into forms appropriate for mining by
performing summary or aggregation operations.
A. Pattern evaluation
B. Data transformation
C. Data integration
D. Data reduction
Ans.: B
41. ________________________is an example of frequent itemset mining.
A. Intrusion Detection
B. Social Network Analysis
C. Outlier Detection
D. Market Basket Analysis
Ans.: D
Page 6 of 9
42. Association rule is consider__________________________________________.
A. If it only satisfies min_support
B. If it only satisfies min_confidence
C. If it satisfies both min_support and min_confidence
D. There are other measures to check so
Ans.: C
43. Confidence (A B) is calculated as_____________________________.
A. Support_count (A ∪ B) / Support_count (B)
B. Support_count (A ∩ B) / Support_count (A)
C. Support_count (A ∩ B) / Support_count (B)
D. Support_count (A ∪ B) / Support_count (A)
Ans.: D
44. Apriori algorithm is used for ___________________________________.
A. To mines all frequent patterns through pruning rules with lesser support
B. To mines all frequent patterns through pruning rules with higher support
C. Both A and B
D. None of the above
Ans.: A
45. ___________________specify the desired dimensions of the data, or levels of the concept
hierarchies, to be used in mining.
A. Data constraints
B. Interestingness constraints
C. Knowledge type constraints
D. Dimension constraints
Ans.: D
46. Association rule mining means _________________________________.
A. Same as frequent itemset mining
B. Finding of strong association rules using frequent itemsets
C. Using association to analyse correlation rules
D. None of the above
Ans.: B
47. Correlation analysis is considered as important _________________________________.
A. To make apriori memory efficient
B. To weed out uninteresting frequent itemsets
C. To find large number of interesting itemsets
D. To restrict the number database iterations
Ans.: B
48. Apriori algorithm is work on which principle?
A. If a rule is infrequent, its specialized rules are also infrequent
B. If a rule is infrequent, its generalized rules are also infrequent
C. Both A and B
D. None of the above
Ans.: A
Page 7 of 9
49. Performance of Apriori algorithm is improved by________________________.
A. Hash-based techniques
B. Transaction Reduction
C. Partitioning
D. All of the above
Ans.: D
50. Association rules generated from mining data at multiple levels of abstraction are
called______________________________.
A. Hybrid-dimesnsional association rules
B. Single level association rules
C. Multilevel association rules
D. Multidimensional association rules
Ans.: C
51. Support (A) is calculated as_________________________________________.
A. Total number of transactions containing A
B. Total Number of transactions not containing A
C. Number of transactions containing A / Total number of transactions
D. Number of transactions not containing A / Total number of transactions
Ans.: C
52. ___________________specify the set of task-relevant data.
A. Interestingness constraints
B. Data constraints
C. Knowledge type constraints
D. Dimension constraints
Ans.: B
53. The Apriori algorithm is a _________________________________________.
A. seminal algorithm for mining frequent itemsets for nonboolean association rules.
B. seminal algorithm for mining frequent itemsets for constraint based association rules.
C. seminal algorithm for mining frequent itemsets for Boolean association rules.
D. seminal algorithm for mining non-frequent itemsets for Boolean association rules.
Ans. C
54. _______________________mining allows users to focus the search for rules by providing
metarules and additional mining constraints.
A. Quantitative association rules
B. Multilevel association rules
C. Constraint-based rule
D. Association Rule
Ans.: C
55. In Apriori property__________________________________________.
A. All empty subsets of a frequent itemset must also be frequent.
B. All nonempty subsets of a nonfrequent itemset must also be frequent.
C. All nonempty subsets of a frequent itemset must also be nonfrequent.
D. All nonempty subsets of a frequent itemset must also be frequent.
Ans.: D
Page 8 of 9
56. An itemset X is a closed frequent itemset in set S.
A. if S is both closed and frequent in X.
B. if X is both closed and nonfrequent in S.
C. if X is both nonclosed and frequent in S.
D. if X is both closed and frequent in S.
Ans. D
57. What step should be taken if support is reduced?
A. Number of frequent itemsets remains same
B. Some itemsets will become infrequent while others will become frequent
C. Some itemsets will add to the current set of frequent itemsets
D. None of the above
Ans.: C
58. The lift between the occurrence of A and B i.e lift (A, B) can be measured by_____________.
A. P(B ∪ A) / P(A)P(B)
B. P(B ∩ A) / P(B)P(A)
C. P(A ∪ B) / P(A)P(B)
D. P(A ∩ B) / P(A)P(B)
Ans.: C
59. In which of the following the same minimum support threshold is used when mining at each
level of abstraction.
A. Using reduced minimum support at lower levels
B. Using item or group-based minimum support
C. Using uniform minimum support for all levels
D. None of the above
Ans.: C
60. ________________specify the type of knowledge to be mined, such as association or
correlation.
A. Data constraints
B. Interestingness constraints
C. Knowledge type constraints
D. Dimension constraints
Ans.: C
Page 9 of 9
Model Question Paper
Class: BE COMP
Semester: VIII
Ans. B
D). none.
Ans. A
4. The core of the multidimensional model is the which consists of a large set
of facts and a number of dimensions.
Ans. C
6. Data that can be modelled as dimension attributes and measure attributes are called
data.
A). Multidimensional
B).Single dimensional
C). Measured
D).Dimensional
Ans. A
A). DBMS
B). RDBMS
C). Sybase
Ans. D
8. supports basic OLAP operations, including slice and dice, drill-down, roll-up
and pivoting.
Ans. B
9. is a good alternative to the star schema.
A. Star schema.
B. Snowflake schema.
C. Fact constellation.
D. Star-snowflake schema.
ANSWER: C
10. Routines work to clean the data by filling in missing values, smoothing
noisy data, identifying or removing outliers and resolving inconsistencies.
Ans. B
B). ER Model
C). Extended ER
D) All of these
Ans. A
A). One.
B). Two.
C). Three.
D). Four.
Ans. A
C). Operational.
D). Informational.
Ans. C
Ans. C
ANSWER: B
C). Joining data from one source into various sources of data.
D). Separating data from one source into various sources of data.
Ans. A
Ans. B
Ans. A
Ans. B
A). Recovery.
Ans. B
21. Data marts that incorporate data mining tools to extract sets of data are called .
Ans. B
A). Entities.
B). Facts.
C). Keys.
D). Units of measures.
Ans. B
A). Data.
B). Information.
C). Query.
D). Process.
Ans. A
24. The important aspect of the data warehouse environment is that data found within the
data warehouse is .
A. Subject-oriented.
B. Time-variant.
C. Integrated.
D. All of the above.
ANSWER: D
A). Selection.
B). pre-processing.
C). Transformation.
D). Interpretation.
Ans. B
Ans. A
Ans. B
28. defines the structure of the data held in operational databases and
used by operational applications.
A. User-level metadata.
B. Data warehouse metadata.
C. Operational metadata.
D. Data mining metadata.
ANSWER: C
Ans.B
30. Which of the following are general characteristics or features of a target class of data?
C).Data Classification
Ans. C
A). Predicting the future stock price of a company using historical records
B). Monitoring and predicting failures in a hydropower plant
Ans. C
D. compact.
ANSWER: A
34. predicts future trends & behaviors, allowing business managers to make
proactive, knowledge-driven decisions.
D). Metadata.
Ans. B
Ans. D
A). Selection.
B). Retrieving.
C). Discovery.
D). Coding.
Ans. C
A). knowledge.
B). information.
C). data.
D). algorithm
Ans. A
38. analysis divides data into groups that are meaningful, useful, or both.
A. Cluster.
B. Association.
C. Classification.
D. Relation
Ans. A
43. The term that is not associated with data cleaning process is .
A. Domain consistency.
B. Deduplication.
C. Disambiguation.
D. Segmentation.
ANSWER: D
48. The main organizational justification for implementing a data warehouse is to provide
.
A. cheaper ways of handling transportation.
B. decision support.
C. storing large volume of data.
D. access to data.
ANSWER: C
51. are responsible for running queries and reports against data warehouse tables.
A. Hardware.
B. Software.
C. End users.
D. Middle ware.
ANSWER: C
52. The most common source of change data in refreshing a data warehouse is .
A. queryable change data.
B. cooperative change data.
C. logged change data.
D. snapshot change data.
ANSWER: A
ANSWER: B
Model Question Paper
Subject: Data Warehousing & Mining
Class: BE IT
Semester: VIII
Ans. B
D). none.
Ans. A
3) The core of the multidimensional model is the ___________ which consists of a large set of
facts and a number of dimensions.
Ans. C
4) Data that can be modelled as dimension attributes and measure attributes are called _______
data.
A). Multidimensional
B).Single dimensional
C). Measured
D).Dimensional
Ans. A
A). DBMS
B). RDBMS
C). Sybase
Ans. D
6) __________supports basic OLAP operations, including slice and dice, drill-down, roll-up and
pivoting.
Ans. B
7) _____________ Routines work to clean the data by filling in missing values, smoothing noisy
data, identifying or removing outliers and resolving inconsistencies.
B). ER Model
C). Extended ER
D) All of these
Ans. A
A). One.
B). Two.
C). Three.
D). Four.
Ans. A
C). Operational.
D). Informational.
Ans. C
Ans. C
12) Data transformation includes __________.
C). Joining data from one source into various sources of data.
D). Separating data from one source into various sources of data.
Ans. A
13) Dimensionality reduction reduces the data set size by removing ____________.
Ans. B
Ans. A
Ans. B
Ans. B
17) Data marts that incorporate data mining tools to extract sets of data are called ______.
Ans. B
A). Entities.
B). Facts.
C). Keys.
Ans. B
A). Data.
B). Information.
C). Query.
D). Process.
Ans. A
A). Selection.
B). pre-processing.
C). Transformation.
D). Interpretation.
Ans. B
Ans. A
Ans. B
Ans.B
24)Which of the following are general characteristics or features of a target class of data?
Ans. C
A). Predicting the future stock price of a company using historical records
Ans. C
knowledge-driven decisions.
D). Metadata.
Ans. B
Ans. D
28) Data mining is used to refer ______ stage in knowledge discovery in database.
A). Selection.
B). Retrieving.
C). Discovery.
D). Coding.
Ans. C
A). knowledge.
B). information.
C). data.
D). algorithm
Ans. A
30) _______analysis divides data into groups that are meaningful, useful, or both.
A. Cluster.
B. Association.
C. Classification.
D. Relation
Ans. A
A). Borland C.
B). Weka.
D). Visual C.
Ans. B
Ans. C
A). Cost-sensitive
B). Work-sensitive
C). Time-sensitive
D). Technical-sensitive
Ans. C
34) ________is the collection of tables, each of which is assigned a unique name.
Ans. A
B).Legacy Database
Ans. D
C) Characterization
D) Discrimination
Ans. A
C) Characterization
D) Discrimination
Ans. B
A). Classification
B). Prediction
D) Query
Ans. C
39)________ is the process of finding a model that describes and distinguishes data classes or
concept.
A). Classification
B). Data
D) Query
Ans. A
40) A database may contain data objects that do not comply with the general bahavior or model
of the data. These data objects are______
A). Cluster
B). Outliers
C). Evolution
D) Classification
Ans. B
A).It mines all frequent patterns through pruning rules with lesser support
B).It mines all frequent patterns through pruning rules with higher support
C).Both a and b
Ans. A
A).Hash-based techniques
B).Transaction Reduction
C).Partitioning
Ans. D
Ans. C
C).Outlier Detection
D).Intrusion Detection
Ans. B
Ans. C
Ans. B
A).An itemset for which at least one proper super-itemset has same support
Ans. B
49) What are maximal frequent itemsets?
Ans. A
C).Some itemsets will become infrequent while others will become frequent
Ans. B
Ans. D
Ans. B
Ans. C
A).A frequent itemset 'P' is a proper subset of another frequent itemset 'Q'
Ans. C
55) Which of the following is not null invariant measure(that does not considers null
transactions)?
A).all_confidence
B).max_confidence
C).cosine measure
D).lift
Ans. D
Ans. C
D).Superset of both closed frequent item sets and maximal frequent item sets
Ans. D
B).Pruning
C).Candidate generation
D).Number of iterations
Ans. C
A).Data
B).Knowledge
C).Rules
D).Model
Ans. B
A). Outliers should be part of the training dataset but should not be present in the test data.
D).Outliers should be part of the test dataset but should not be present in the training data.
Ans. C
Model Question Paper
Subject: Data Warehousing& Mining
Branch:Computer Engineering
Class: BE
Semester: VIII
Ans.: C
Q2In a star schema, only __________join defines the relationship between the fact table and
any dimension tables.
A. Single
B. Double
C. Cross
D. Base
Ans.: A
Q3.Data mining is the application of specific________ for extracting ________ from data.
Ans.: C
A. Data Mining.
B. Data Warehousing.
C. Web Mining.
D. Text Mining
Ans.: B
A. Read only.
B. Write only.
C. Read write only
D. D. none.
Ans.: A
Ans.: A
Q7. The important aspect of the data warehouse environment is that data found within the
data warehouse is___________
A. Subject-oriented.
B. Time-variant.
C. Integrated.
D. All of the above.
Ans.: D
Ans.: B
Q11.Data that are not of interest to the data mining task is called as ______.
A. missing data.
B. changing data.
C. irrelevant data.
D. noisy data.
Ans.: C
Q12. In Which Data Warehouse Schema some dimension tables are normalized?
A. Star Schema
B. Snowflake Schema
C. ER Schema
D. OLTP Schema
Ans.: B
A. Data Cleaning
B. Data Normalization
C. Data Visualization
D. Data Reduction
Ans.: C
A. FTP
B. SMTP
C. OLTP
D. OLAP
Ans.: C
Ans.: C
Q16.Operation of moving from higher level summarized data to lower level detailed data in
data cube is known as ___________
A. Roll up
B. Drill down
C. Pivot
D. Dice
Ans.: B
A. Multidimensional Database
B. Single Dimensional Data Model
C. Transactional Data model
D. A type of database
Ans.: A
A. Categorical Data
B. Boolean Values
C. Numeric Measures
D. Data types
Ans.: C
Ans.: A
Ans.: A
Q21. How does roll-up operation affect the size of data cube?
Ans.: B
A. eliminating noise
B. find missing values
C. identifying redundant attributes
D. data partitioning
Ans.: C
Q23What is noise?
Ans.: C
A. Clustering
B. Classification
C. Association mining
D. Regression.
Ans.: C
A. It mines all frequent patterns through pruning rules with lesser support
B. It mines all frequent patterns through pruning rules with higher support
C. Both a and b
D. None of the above
Ans.: A
Ans.: B
Ans.: B
Ans.: D
A. Candidate generation.
B. Itemset generation.
C. Pruning.
D. Partitioning.
Ans.: A
Ans.: C
Q36.Data transformation is data mining strategy, In __________ low-level data are replaced
with high-level data by using concept hierarchies climbing.
A. Generalization
B. Adoption
C. Characterization
D. Association
Ans.: A
Q37. Rule based classification algorithms generate _________ rule to perform the
classification.
A. if-then.
B. while.
C. do while.
D. switch..
Ans.: A
A. sum
B. Divide
C. Characterize
D. Tabularize
Ans.: B
Q39. __________ mining tasks characterize the general properties of the data in the database.
A. Predictive
B. Descriptive
C. Assertive
D. Productive
Ans.: B
Ans.: A
Q41.............................. is the process of finding a model that describes and distinguishes data
classes or concepts.
A. Data Reduction
B. Data Classification
C. Data Association
D. Data selection
Ans.: B
A. Borland C
B. Weka
C. Visual C
D. Autocad
Ans.: B
Q43. ............................. is a comparison of the general features of the target class data objects
against the general features of objects from one or multiple contrasting classes.
A. Data Characterization
B. Data Classification
C. Data discrimination
D. Data selection
Ans.: C
Ans.: B
Ans.: C
A. Information processing
B. Analytical processing
C. Data mining
D. Transaction processing
Ans.: D
A. root node
B. decision tree
C. siblings
D. branches
Ans.: B
Q48. The granularity of the fact is the _____ of detail at which it is recorded.
A. transformation.
B. summarization.
C. level.
D. transformation and summarization.
Ans.: C
A. nominal
B. ordinal
C. interval
D. multiple
Ans.: D
A. Fact
B. Dimension
C. Helper.
D. All the above.
Ans.: D
Q.52________is the most well-known association rule mining algorithm and is used in most
commercial products.
A. Apriori algorithm.
B. Partition algorithm.
C. Distributed algorithm.
D. Pincer-search algorithm.
Ans : A
Q.54 In the K-means clustering algorithm the distance between cluster centroid to
Ans: B
A. A closed itemset
B. A frequent itemset
C. An itemset which is both closed and frequent
D. None of the above
Ans : C
Ans B
Q. 59 Binning is top down splitting technique, based on specific number of bins. Binning is a
_________ discretization technique.
A. supervised
B. reinforced
C. ReLU
D. unsupervised
Ans : D
Q. 60 Apriori is a classic algorithm for mining frequent items for ________ association rule.
A. Rapid
B. Hierarchical
C. Boolean
D. Cluster
Ans : C
Model Question Paper
Branch: CSE
Class: BE
Semester: VIII
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
a. Sim
b. HLR
c. ELR
d. VLR
Ans.: a
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Ans.: a
Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?
a. GSM
b. GPRS
c. CDMA
d. None of the above
Ans.: c
Q4. Which of the following allow the use of entire bandwidth simultaneously?
a. TDMA
b. FDMA
c. CDMA
d. None of the above
Ans.: c
a. Cell
b. Tessellate
c. Mobile station
d. None of the above
Ans.: a
a. Environmental conditions
b. Social conditions
c. Political conditions
d. None of the above
Ans.: a
a. Handover
b. Infrastructure
c. Frequency planning
d. All of the above
Ans.: d
Q8. In a cellular system, the same frequency is used for other users using the
technique ———-
a. Frequency planning
b. Frequency hopping
c. Frequency reuse
d. None of the above
Ans.: c
Q9. Which of the following provides packet mode data transfer service over
the cellular network system?
a. GSM
b. GPRS
c. TCP
d. None of the above
Ans.: b
Q10. Which of the following services/ services are defined by the GSM?
a. Bearer
b. Supplementary
c. Tele
d. All of the above
Ans.: d
a. Piconet
b. Ad hoc piconet
c. Scatter net
d. All of the above
Ans.: d
Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
a. Mobile technology
b. Bluetooth technology
c. Ad hoc computing
d. None of the above
Ans.: b
a. Master
b. Parked
c. Standby
d. Slave
Ans.: a
Q14. Which of the following uses high-frequency radio waves instead of cables
for connecting the devices in LAN?
a. Wired LAN
b. Wireless LAN
c. Fiber made LAN
d. None of the above
Ans.: b
a. IEEE 802.2
b. IEEE 802.11
c. IEEE 802.5
d. IEEE 802.15
Ans.: b
a. Flexibility
b. Ease of use
c. Robustness
d. All of the above
Ans.: d
a. Slow speed
b. Noise
c. More effort for Security
d. All of the above
Ans.: d
Q18. In the distributed system a client gives the request, and the server provides—
-
a. Data
b. Service
c. Information
d. All of the above
Ans.: b
a. Slaves
b. Parked
c. Standby
d. None of the above
Ans.: a
a. Migration of data
b. Concurrent access to data
c. Replication of data
d. All of the above
Ans.: d
Q21. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
Ans.: b
Ans.: a
Q23. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Ans.: d
a. Swiss
b. English
c. German
d. Danish
Ans.: d
Q25. What is one of the features that make Bluetooth different from other wireless
technologies?
Ans.: d
Ans.: a
a. static
b. low
c. high
d. fixed
Ans.: b
Ans.: b
Ans.: c
Q30. Which of the following is NOT a device that is likely to use Bluetooth
technology?
a. toy
b. high-speed router
c. PDA
d. cell phone
Ans.: b
Q31. Which among the following features is present in IPv6 but not in IPv4?
a) Fragmentation
b) Header checksum
c) Options
d) Anycast address
Ans.: d
Ans.: b
Q33. Devices that provide the connectivity to a WiMAX network are known as
_________
a) subscriber stations
b) base stations
c) gateway
d) switch stations
Ans.: a
Ans.: b
Ans.: b
Q36. Which of the following frequencies is not used in WiMAX for communication?
a) 2.3 GHz
b) 2.4 GHz
c) 2.5 GHz
d) 3.5 GHz
Ans.: b
Ans.: b
a. Wireless fidelity
b. Wireless Flexibility
c. Wide Fidelity
d. WAN Flexibility
Ans.: a
Q40. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
Ans.: c
Q41. Which of the following is the world’s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
Ans.: a
Ans.: b
Ans.: c
Q44. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
Ans.: d
Ans.: c
Q46. Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Ans.: c
Q47. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Ans.: b
Q48. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Ans.: d
Q49. Which of the following subsystem provides radio transmission between mobile
station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC
Ans.: a
Ans.: b
Ans.: c
A) BTS
B) BSS
C) NSS
D) VLR
Ans.: c
A) ANSI
B) ETSI
C) 3GPP
D) UMTS
Ans.: c
A) 2G
B) 3G
C) 2G and /or 3G
D) 4G
Ans.: c
A) MAP
B) CAP
C) Frame Relay
Ans.: D
D) None
Ans.: b
A) 56-115kbps
B) 9-256kbps
C) 64-128kbps
D) None
Ans.: a
A) 1G
B) 2G
C) 3G
D) 4G
Ans.: b
C) IP - Internet Protocol
D) All
Ans.: D
A) False
B) True
Ans.: a
Name of College: Gangamai College of Engineering, Nagaon Dist Dhule
Subject: Mobile Computing
Branch: Computer
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A. Sim
B. HLR
C. VLR
D. ELR
Ans.: A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Ans.: C
Q5. Cellular System or having small cells needs ——–
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Ans.: D
Q8. Bluetooth Technology supports
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
Q11. Most WLANs are based upon the standard—-
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
Q12. Which of the following is/are the advantages of a wireless LAN?
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Ans.: D
Q13. Disadvantages of WLANs include —–
A. Slaves
B. Parked
C. Standby
D. None of the above
Ans.: A
Q15. Mobile Computing allows transmission of data, from one wireless-
enabled device to another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Ans.: C
Q16. The most important feature/s of mobile computing technology is/are —-
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D
Q17. Which of the following is the base of most mobile communications?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Ans.: C
Q19. Important mobile computing application/s is/are —–
A. Education
B. Sports
C. Games
D. All of the above
Ans.: D
Q20. Challenges of mobile computing include ———
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Ans.: D
Q21. Which of the following services/service are defined within the bearer
services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Ans.: D
Q22. The overlapping portion of two piconets is called——–
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: C
Q23. Bluetooth technology is used for —-
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Ans.: D
Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A
Ans.: B
Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
Ans.: A
Ans.: B
Q.36 __________ supports the operation and maintenance of GSM.
A. BSS
B. NSS
C. OSS
D. MSC
Ans.: C
Ans.: A
A. MSC
B. Roamer
C. Hand off
D. Forward channel
Ans.: C
Q.54 In Handoff
Ans.: D
Q.55 In a wireless communication, base station is connected to central hub
called _______
A. PSTN
B. MSC
C. CO
D. PBX
Ans.: B
Q.56 PSTN stands for ________
A. Public switched telephone network
B. Personal switched telephone network
C. Personal switched telephone node
D. Public switched telephone node
Ans.: A
Q.57 In public switched telephone network, LATA stands for ______
A. Local access and transport area
B. Land area and transport area
C. Local access and telephone access
D. Local area and telephone access
Ans.: A
Q.58 Connection oriented services are also called __________
A. Datagram services
B. Virtual circuit routing
C. Connectionless services
D. Routing service
Ans.: B
Q.59 ISDN is based on the concept of __________
A. SS7
B. CCS
C. ARDIS
D. CDPD
Ans.: B
Q.60 ______ is used for transmission of packets in the cellular switched
architecture.
A. Packet switching techniques
B. Circuit switching techniques
C. Packet and circuit switched technique
D. Datagram technique
Ans.: A
Model Question Paper
Subject: Mobile Computing
Class: BE
Semester: VIII
Q1. “Mr. Watson, come here, I want to see you” was a first ever voice call by
A) Joseph Henry
B) F. B. Morse
C) Alexander G. Bell
D) Harald Blatand
Ans. C
A) Parallel Computing
B) Genetic Computing
C) Nomadic Computing
D) All of these
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
Q5. PDA is a
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. A
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. B
Q12. Rendering is a
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) User/Device
Ans. C
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
A) Bearer Network
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
B) Bearer Gateway
C) Middleware Gateway
D) Content Service
Ans. D
A) Bank Transactions
B) Wallet
D) News
Ans. B
A) Wallet
B) Diary
D) News
Ans. C
A) One
B) Two
C) Three
D) Four
Ans. C
A) One
B) Two
C) Three
D) Four
Ans. C
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. A
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. B
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. B
A) Tire1
B) Tire2
C) Tire3
D) Tire4
Ans. C
B) Tire2
C) Tire3
D) Tire4
Ans. C
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Presentation Tier
B) Application Tier
C) Data Tier
D) None of these
Ans. A
A) Identity
B) Security
C) Activity
D) Social Situation
Ans. B
A) URI
B) URL
C) A & B
D) None of these
Ans. A
A) WiFi
B) GSM
C) CDMA
D) All of these
Ans. D
A) Joseph Henry
B) F. B. Morse
C) Alexander G. Bell
D) Harald Blatand
Ans. D
A) 2.2 GHz
B) 2.4 GHz
C) 2.6 GHz
D) 2.8 GHz
Ans. B
B) 512 KBps
C) 1 Mbps
D) 1 MBps
Ans. C
A) Two
B) Four
C) Six
D) Eight
Ans. C
B) Animal Tagging
C) Retail Store
D) Matchmaking
Ans. D
A) 802.3
B) 802.11
C) 802.16
D) 802.22
Ans.C
A) Discovery
B) Registration
C) Tunnelling
D) None of these
Ans. C
A) 1982
B) 1987
C) 1989
D) 1990
Ans. A
A) FDMA
B) TDMA
C) A & B
D) None of these
Ans. C
A) BSC
B) MSC
C) PLMN
D) LA
Ans. C
A) MS
B) BSC
C) MSC
D) LA
Ans. D
B) BSC
C) MSC
D) OMC
Ans. C
A) IMEI
B) IMSI
C) TMSI
D) MSRN
Ans. A
D) None of these
Ans. C
A) EIR
B) SIM Card
C) Memory Card
D) None of these
Ans. A
A) EIR
B) SIM Card
C) Memory Card
D) None of these
Ans. B
Q50. In the Mobile phone handset, one can type.......to see the IMEI number(s).
A) #*06*
B) *#06#*
C) *#06#
D) #*06*#
Ans. C
A) 120
B) 125
C) 130
D) 132
Ans. B
A) 12
B) 14
C) 15
D) 16
Ans. C
A) 12
B) 14
C) 15
D) 16
Ans. C
B) A5
C) A8
D) None of these
Ans. A
A) A3
B) A5
C) A8
D) None of these
Ans. C
A) A3
B) A5
C) A8
D) None of these
Ans. B
A) Reliability
B) Security
C) Delay
D) Throughput
Ans. B
A) MS
B) BSS
C) SGSN
D) LA
Ans. D
A) GSM
B) CDMA
C) A & B
D) None of these
Ans. A
A) 1G
B) 2G
C) 2.5G
D) 3G
Ans. C
Model Question Paper
Subject: MOBILE COMPUTING
Semester: VIII
A. Bearer Mobility.
B. Session Mobility
C. Host mobility.
D. All
Ans.: D
A. Interface.
B. Mobility.
C. Network.
D. All
Ans.: A
A.Cell
B. Tessellate
C. Mobile station
D. None of the above
Answer A.
B. Software Quality.
C. Frequency.
D. All
Answer B.
D. Physical Location.
Answer C.
A. Software.
B. Equipment.
D. None.
Answer A
B.TRAI
C.ICT
D.CEPT
Answer B
A. Physical office
B. Mobile office
C. Both A and B
D. None
Answer B
Q.9 Standards is a
A. Guideline
B. Rules
C. Criteria
D All
Answer D
B. FDMA
D. UMTS
Answer C
Q.11 Mobile Computing allows transmission of data, from one wireless-enabled device to
another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Answer C
A. Mobility
B. Portability
C . Wireless connectivity
D. All of the above
Answer D
A.Hexagon
B.Circular
C. Square
D.None of the above
Answer A
Q.14 Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer A
Q.15 In which of the following Codes with specific characteristics can be applied to the
transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer C
A. End User.
B. Security.
C. Memory.
D . All
Answer A
A. Distribution of Traffic.
B. Local switching.
C. Exchanges.
D .All
Answer D.
C. Format
D. None
Answer B
Q.19 Three Tier architecture for mobile computing these tiers are Presentation Tier, application
Tier and
A. Session Tier
B. Physical Tier
C. Data Tier
D None
Answer C
Q.20 Which of the following uses high-frequency radio waves instead of cables for connecting
the devices in LAN?
A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above
Answer B
Q.21 EIR is a
D None.
A. Piconet
C .Scatter net
Answer D
Q.23. Which of the following wireless technology is used for exchanging data between a variety
of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Answer B
A. Master
B. Parked
C. Standby
D. Slave
Answer A
A. Bluetooth
B. Wifi
C. Lifi
D. None
Answer A
Answer B
Q.27 Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM
Answer A
Answer B
Q.29. which of the following statement about radio frequency Identification (RFID) is not true?
B. RFID systems use tiny tags with embedded microchips containing data about an item and its
location
C. RFID systems provide a powerful technology for tracking the movement of goods throughout
the supply chain
D .Companies may be required to upgrade hardware and software to accommodate the massive
amounts data that are being produced by RFID systems.
Answer A.
Answer B
Answer A
Answer B
Q.33. Which of the following is the world’s first cellular system to specify digital modulation
and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
Answer A
Answer B
Answer C
Q.36 Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Answer B
Answer B
Q.38 Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Answer C
Q.39 The process of transferring a mobile station from one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel
Answer C
Q.40 Hexagon shape is used for radio coverage for a cell because
a. It uses the maximum area for coverage
b. Fewer number of cells are required
c. It approximates circular radiation pattern
d. All of the above
Answer D
Q.41 Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Answer D
Answer: d
Q.43 What is handoff?
a) Forward channel
b) Switching technique
c) Roamer
d) Guard channel
Answer: B
Q.44 who has the responsibility of billing and system maintenance function in cellular system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system
Answer: C
Answer:D
D. NONE
Answer: B
Q.47Main reasons for a handover in GSM are
D.ALL
Answer:A
D.NONE
Answer:C
Answer:A
Answer:B
Answer:D
Answer:D
Answer:C
Answer:A
Q.55 Bluetooth uses __________
a) frequency hopping spread spectrum
b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing
Answer:A
Answer:C
Answer:C
Q.58Which of the following priority handoff method decrease the probability of forced
termination of a call due to lack of available channels?
a) Queuing
b) Guard channel
c) Cell dragging
d) Near far effect
Answer:A
Answer:A
Q.60 Which of the following comes under supplementary ISDN services?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
Answer: C
Model Question Paper
SMQA
Department of Computer Engineering
Year 2019-20
Class :- BE
Subject:- Software Metrics and Quality Assurance
Ans. C
Ans. A
Ans. B
Ans. B
Ans. D
Ans. C
Ans. D
Ans. B
Ans. B
Ans. B
Ans. C
Ans. A
Ans. C
Ans. A
Ans. C
Ans. D
Ans. B
Ans. C
Ans. A
Ans. C
Q.22 Estimators compare proposed project with one or more past projects
A. Expert Opinion
B. Analogy
C. Decomposition
D. Models
Ans. B
Ans. A
Ans. A
Ans. B
Ans. B
Ans. D
Q.28 Tree impurity of Tree is
A. 0
B. 1
C. Greater than 1
D. None of Above
Ans. A
Ans. D
Q.30 Modules are related only by the fact that they must occur within same timespan
A. Sequential Cohesion
B. Communicational Cohesion
C. Procedural Cohesion
D. Temporal Cohesion
Ans. D
Ans. D
Q.32 It is the extent to which its individual components are needed to perform the
same task
A. Coupling
B. Cohesion
C. Both of Above
D. None of Above
Ans. B
Ans. A
Ans. C
Ans. C
Ans. C
Ans. C
Q.38 In this software testing life cycle phase, real time validation of product and
finding bugs operations are carried out
A. Test Planning
B. Test Case Designing
C. Test Environment Set Up
D. Test Execution
Ans. D
Q.39 Matrix, reports and results are documented after completion of testing
A. Requirement analysis
B. Test Planning
C. Test Case Designing
D. Test Closure
Ans. D
Q.40 Testing will be carried out simultaneously on different machine with different
OS platform combination
A. Manual Testing
B. Automation Testing
C. Both of Above
D. None of Above
Ans. B
Q.41 Testing will be used when need to execute the set of test cases tests repeatedly.
A. Manual Testing
B. Automated Testing
C. Both of Above
D. None of Above
Ans. B
Q.42 Test scripts are developed and testing is performed using scripts in
A. Manual Testing
B. Automated Software Testing
C. Both of Above
D. None of Above
Ans. B
Ans. C
Ans. D
Ans. C
Ans. D
Ans. D
Ans. C
Q.49 Testing Tool is used to validate web application across different browsers and
platforms
A. Selenium IDE
B. Selenium 3
C. Selenium Grid
D. All of Above
Ans. D
Q.50 Level of CMM includes defect prevention, test process optimization and quality
control
A. Managed
B. Defined
C. Measured
D. Optimization
Ans. D
Q.51 Level of CMM includes test planning, test monitoring and control, test
environment
A. Initial
B. Managed
C. Defined
D. Measured
Ans. B
Ans. A
Q.53 Standard applies to those organizations which do not design products but are
only involved in production
A. ISO 9001
B. ISO 9002
C. ISO 9003
D. None of Above
Ans. B
Q.54 Standard applies to those organizations that are involved in only installation and
testing of the products
A. ISO 9001
B. ISO 9002
C. ISO 9003
D. None of Above
Ans. C
Ans. B
Ans. A
Ans. D
Q.58 M'=aM is
A. Admissible Transformation
B. Affine Transformation
C. Both of Above
D. None of Above
Ans. A
Q.59 M=aM'+b is
A. Admissible Transformation
B. Affine Transformation
C. Both of Above
D. None of Above
Ans. B
Q.60 Measurement in SMQA includes
A. Requirements are complete, Design is High Quality
B. Code is ready to be tested, Product is ready for delivery
C. Budget will be exceeded
D. All of Above
Ans. D
Model Question Paper
Subject: Data Warehouse and Mining (DWM).
Branch: Computer Engineering.
Class: BESemester: VIII
1
Q5.__________ is the heart of the warehouse.
A.Data mining database servers.
B. Data warehouse database servers.
C. Data mart database servers.
D. Relational data base servers.
Ans.: B
Q6.A data mart is designed to optimize the performance for well-defined and predicable
uses.
A. True
B. False
Ans.: A
2
Q10.What is noise?
A. Component of a network
B. Context of KDD and data mining
C. Aspects of a data warehouse
D. None of these
Ans.:B
Q12.The important aspect of the data warehouse environment is that data found within
the data warehouseis___________.
A. subject-oriented.
B. time-variant.
C. integrated.
D. All of the above.
Ans.: D
Q13.A ________ system is market-oriented and is used for data analysis by knowledge
workers, including managers, executives, and analysts.
A. OLAP
B. OLTP
C. Both of the above
D. None of the above.
Ans.: A
3
Q15.________ are responsible for running queries and reports against data warehouse
tables.
A. Hardware.
B. Software.
C. End users.
D. Middle ware.
Ans.: C
4
Q20. The main organizational justification for implementing a data warehouse is to
provide?
A. ETL from operation systems to strategic system
B. Large scale transaction processing
C. Storing large volumes of data
D. Decision support
Ans.: D
Q21.When you ________ the data, you are aggregating the data to a higher level.
A. Slice
B. Roll up
C. Accumulate
D. Drill down
Ans.: B
5
Q25. ____________predicts future trends & behaviors, allowing business managers to
make proactive,
knowledge-driven decisions.
A. Data warehouse.
B. Data mining.
C. Datamarts.
D. Metadata.
Ans.: B
6
Q30.Successful data warehousing requires that a formal program in total quality
management (TQM) be implemented.
A. True
B.False
Ans.: A
Q31. The core of the multidimensional model is the _______ , which consists of a large set of
facts and a number of dimensions.
A. Multidimensional cube
B. Dimensions cube
C. Data cube
D. Data model
Ans.: C
Q33.Data mining is a tool for allowing users to find the hidden relationships in data.
A. True
B. False
Ans.: A
Q34.What are the two main objectives associated with data mining?
A. To explain some observed event or condition
B. To confirm that data exists
C. To analyze data for expected relationships
D. To find hidden patterns and trends
Ans.: D
7
Q36.._______ is an essential process where intelligent methods are applied to extract
data patterns.
A. Data warehousing
B. Data mining
C. Text mining
D. Data selection
Ans.: B
Q37.. Data mining can also applied to other forms such as ______
i) Data streamsii) Sequence data
iii) Networked dataiv) Text datav) Spatial data
A. i, ii, iii and v only
B. ii, iii, iv and v only
C. i, iii, iv and v only
D. All i, ii, iii, iv and v
Ans.: D
8
Q39.. Strategic value of data mining is_________
A. cost-sensitive
B. work-sensitive
C. time-sensitive
D. technical-sensitive.
Ans.: C
9
Q44.Reduce amount of time and memory required by data mining algorithms--------
A. Target Data
B. Data sampling
C. Data aggregation
D. Data reduction
Ans.: D
Q46.. What techniques can be used to improve the efficiency of Apriori algorithm?
A. Hash-based techniques
B. Transaction Reduction
C. Partitioning
D. All of the above
Ans.: D
10
Q49.. What is the relation between candidate and frequent item sets?
A. A candidate itemset is always a frequent itemset
B. A frequent itemset must be a candidate itemset
C. No relation between the two
D. Both are same
Ans.: B
11
Q54.Why is correlation analysis important?
A. To make apriori memory efficient
B. To weed out uninteresting frequent itemsets
C. To find large number of interesting itemsets
D. To restrict the number of database iterations
Ans.: B
Q58.A ______ system is market-oriented and is used for data analysis by knowledge
workers, including managers, executives, and analysts.
A) OLAP
B) OLTP
C) Both of the above
D) None of the above
Ans.: A
12
Q59.Data cleaning routine attempt to fill I missing values, ___ and correct
inconsistencies.
A. smooth out noise
B.remove error
C. variance
D. none of above
Ans.: A
13
Model Question Paper
Branch: Computer
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for
the GSM system in mobile computing?
A. Sim
B. HLR
C. VLR
D. ELR
Ans.: A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Ans.: A
Q3. In which of the following Codes with specific characteristics can be applied
to the transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Ans.: C
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Ans.: D
Q6. Which of the following provides packet mode data transfer service over
the cellular network system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Ans.: B
Q7. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: D
Q9. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Ans.: B
Q10. In Bluetooth which of the following device decides hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Ans.: A
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Ans.: B
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Ans.: D
Ans.: D
A. Slaves
B. Parked
C. Standby
D. None of the above
Ans.: A
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Ans.: C
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Ans.: D
A. GSM
B. GPRS
C. CDMA
D. None of the above
Ans.: A
Q18. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Ans.: C
A. Education
B. Sports
C. Games
D. All of the above
Ans.: D
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Ans.: D
Q21. Which of the following services/service are defined within the bearer
services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Ans.: D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Ans.: C
A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these
Ans.: C
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Ans.: D
Q.26. Which of the following is the world’s first cellular system to specify
digital modulation and network level architecture?
A. GSM
B.AMPS
C.CDMA
D.IS-54
Ans.: A
Ans.: C
Q.29 Which of the following does not come under the tele-services of GSM?
A. Standard mobile telephony
B. Mobile originated traffic
C. Base originated traffic
D. Packet switched traffic
Ans.: D
Ans.: C
Ans.: C
Ans.: B
Q.33 Which of the following does not come under subsystem of GSM
architecture?
A. BSS
B. NSS
C. OSS
D. Channel
Ans.: D
Ans.: A
Ans.: B
Ans.: C
Ans.: A
A. UDP
B. HSP
C. ITC
D. L2CAP
Ans.: D
Q.40 Network layer at source is responsible for creating a packet from data
coming from another ________
A. Station
B. Link
C. Node
D. Protocol
Ans.: D
Ans.: C
Q.43 Which protocol is commonly used to retrieve email from a mail server?
A. FTP
B. IMAP
C. HTML
D. TELNET
Ans.: B
Ans.: C
Q.45 IEEE 802.11 defines basic service set as building block of a wireless
___________
A. LAN
B. WAN protocol
C. MAN
D. ALOHA
Ans.: A
Ans.: A
Ans.: A
A. 216
B. 2128
C. 232
D. 28
Ans.: B
Ans.: A
Ans.: B
Q.53 The process of transferring a mobile station from one base station to
another is_________________
A. MSC
B. Roamer
C. Hand off
D. Forward channel
Ans.: C
Q.54 In Handoff
A. Process of transferring the call to the new base station
B. Transfers the call
C. New channel allocation is done
D. All of the above
Ans.: D
Ans.: B
Ans.: A
Ans.: B
Ans.: B
Ans.: A
Name of College: Gangamai College Of Engineering,Nagaon,Dhule-05
Class: BE
Semester: VIII
Q2. Which of the following does not affect the software quality
and organizational performance?
A Market
B
Product
C
Technology
D People
Ans.:
Market
Q3. The intent of project metrics is:
A minimization of development
schedule B for strategic purposes
C assessing project quality on ongoing basis
Ans.: Efficiency
A number of
Functions B number
of user inputs
C number of lines of code
Ans.: Testing
Q12. Function Points in software engineering was first
proposed by A Booch
B Boehm
C
Albrecht
D
jacobson
Ans.: Albrecht
Q13. How many Information Domain Values are used for Function
Point Computation?
A3
B4
C5
D6
Ans.: 5
A Software Mature
Indicator B Software
Maturity Index
C Software Mature Index
Q18. The amount of time that the software is available for use is
known as A Reliability
B Usability
C
Efficiency
D Functionality
Ans.: Reliability
A
Reliability
B Usability
C
Efficiency
D Functionality
Ans.: Functionality
A
Cohesion
B
Coupling
C None of
these D All of
these Ans.:
Coupling
Q23. Which of the following is the best type of module
coupling? A Control coupling
B Stamp
coupling C Data
coupling
D Content coupling
Q27. A software engineer must design the modules with the goal
of high cohesion and low coupling.
A
True
B
False
Ans.: True
A Logical cohesion
B Temporal
cohesion C
Functional cohesion
D Coincidental Cohesion
C Failure Mode
analysis D none of
these
Ans.: None of these
C
Programmers
D None of
these Ans.:
Software
Q32. Who identifies, documents, and verifies that corrections have been
made to the software?
A Project
Manager B
Project Team
C SQA
group D All
of these
Ans.: SQA group
A Error
B Equivalent
failure C Failure
cause
D None of these
Ans.: Errors
Q34. Software quality assurance consists of the auditing and
reporting functions of management.
A
True
B
False
Ans.: True
Q35. How is reliability and failure intensity related to each
other? A Direct relation
B Inverse
relation C No
relation
D None of these
A Maximum time to
failure B mean time to
failure
C minimum time to
failure D none of these
Ans.: Mean time to failure
B
Efficiency
C Quality
D Speed
Ans.: Time
A Useful -
life B Burn -
in
C Wear -
out D Time
Ans.: Time
Q42. Which of the following costs is not part of the total effort
cost? A Costs of networking and communications
B Costs of providing heating and lighting office
space C Costs of lunch time food
D Costs of support staff
A
True
B
False
Ans.: True
Q46. The empirical data that support most estimation models are
derived from a vast sample of projects.
A
True
B
False
Ans.: False
B Post-architecture-stage
model C Application
composition model D All of the
mentioned
B Time
C Schedule
D None of these
A Relative Application
Development B Rapid
Application Development
C Rapid Application Document
D None of these
C Prototype Refinement
D Engineer product
Ans.: Coding
D 6 phases
Ans.: 5 phases
Q57. Which model can be selected if user is involved in all the phases
of SDLC? A Waterfall Model
B Prototyping
Model C RAD
Model
D both Prototyping Model & RAD Model
Ans.: RAD Model
C
SMTP
D SFTP
Ans.: SMTP
Q60. TSL (Transport Layer Security) is a cryptographic protocol
used for securing HTTP/HTTPS based connection.
A
True
B
False
Ans.: True
Model Question Paper
Class: BE
Semester: VIII
Q2. Which of the following does not affect the software quality
and organizational performance?
A Market
B
Product
C
Technology
D People
Ans.:
Market
Q3. The intent of project metrics is:
A minimization of development
schedule B for strategic purposes
C assessing project quality on ongoing basis
Ans.: Efficiency
A number of
Functions B number
of user inputs
C number of lines of code
Ans.: Testing
Q12. Function Points in software engineering was first
proposed by A Booch
B Boehm
C
Albrecht
D
jacobson
Ans.: Albrecht
Q13. How many Information Domain Values are used for Function
Point Computation?
A3
B4
C5
D6
Ans.: 5
A Software Mature
Indicator B Software
Maturity Index
C Software Mature Index
Q18. The amount of time that the software is available for use is
known as A Reliability
B Usability
C
Efficiency
D Functionality
Ans.: Reliability
A
Reliability
B Usability
C
Efficiency
D Functionality
Ans.: Functionality
A
Cohesion
B
Coupling
C None of
these D All of
these Ans.:
Coupling
Q23. Which of the following is the best type of module
coupling? A Control coupling
B Stamp
coupling C Data
coupling
D Content coupling
Q27. A software engineer must design the modules with the goal
of high cohesion and low coupling.
A
True
B
False
Ans.: True
A Logical cohesion
B Temporal
cohesion C
Functional cohesion
D Coincidental Cohesion
C Failure Mode
analysis D none of
these
Ans.: None of these
C
Programmers
D None of
these Ans.:
Software
Q32. Who identifies, documents, and verifies that corrections have been
made to the software?
A Project
Manager B
Project Team
C SQA
group D All
of these
Ans.: SQA group
A Error
B Equivalent
failure C Failure
cause
D None of these
Ans.: Errors
Q34. Software quality assurance consists of the auditing and
reporting functions of management.
A
True
B
False
Ans.: True
Q35. How is reliability and failure intensity related to each
other? A Direct relation
B Inverse
relation C No
relation
D None of these
A Maximum time to
failure B mean time to
failure
C minimum time to
failure D none of these
Ans.: Mean time to failure
B
Efficiency
C Quality
D Speed
Ans.: Time
A Useful -
life B Burn -
in
C Wear -
out D Time
Ans.: Time
Q42. Which of the following costs is not part of the total effort
cost? A Costs of networking and communications
B Costs of providing heating and lighting office
space C Costs of lunch time food
D Costs of support staff
A
True
B
False
Ans.: True
Q46. The empirical data that support most estimation models are
derived from a vast sample of projects.
A
True
B
False
Ans.: False
B Post-architecture-stage
model C Application
composition model D All of the
mentioned
B Time
C Schedule
D None of these
A Relative Application
Development B Rapid
Application Development
C Rapid Application Document
D None of these
C Prototype Refinement
D Engineer product
Ans.: Coding
D 6 phases
Ans.: 5 phases
Q57. Which model can be selected if user is involved in all the phases
of SDLC? A Waterfall Model
B Prototyping
Model C RAD
Model
D both Prototyping Model & RAD Model
Ans.: RAD Model
C
SMTP
D SFTP
Ans.: SMTP
Q60. TSL (Transport Layer Security) is a cryptographic protocol
used for securing HTTP/HTTPS based connection.
A
True
B
False
Ans.: True
Model Question Paper
Subject: Internet Security
Branch: Information Tech.
Class: BE
Semester: VIII
Internet Security A
N
UNIT- I S
1) The Certificate request Massage Includes Two Parameters, One of Which D
Is-
A) Disaster B) Eavesdropping
C) Information leakage D) Unchanged default password
5) What is a mantrap? C
1 P.T.O.
7) Which of the following is not a control category in a physical security D
program?
A) in-service expansion
B) unlimited number of stations
C) both (a) and (b)
D) unlimited distance
11) In RSA, Ф(n) = _______ in terms of p and q. C
A) 12 B) 18 C) 9 D) 16
2
16) Which of the following is not a type of symmetric-key cryptography C
technique?
UNIT- II
a) a good
b) not so good
c) very good social engineering practice
d) a bad
3 P.T.O.
23) ___________ has now evolved to be one of the most popular automated C
tools for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
24) Leaking your company data to the outside network without prior permission of A
senior authority is a crime.
a) True
b) False
25) The legal risks of ethical hacking include lawsuits due to __________ of B
personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
26) Before performing any penetration test, through legal procedure, which key D
points listed below is not mandatory?
a) True
b) False
4
28) After performing ____________ the ethical hacker should never disclose client C
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
29) __________ is the branch of cyber security that deals with morality and D
provides different theories and a principle regarding the view-points about
what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
30) A penetration tester must identify and keep in mind the ___________ & A
___________ requirements of a firm while evaluating the security postures.
a) AttackSyllable
b) AttackBrute Forcing
c) AttacksHybrid
d) All of the above
33) What is the primary goal of ethical hacker? C
a) Avoiding detection
b) Testing security controls
c)Resolving security vulnerabilities
d)Determining return on investment for security measures
5 P.T.O.
34) What is the first phase of hacking? D
a) Maintaining access
b) Gaining access
c) Reconnaissance
d) Scanning
35) Which type of hacker represents the highest risk to your network? D
a) Black-hat hackers
b) Grey-hat hackers
c) Script kiddies
d) Disgruntled employees
36) Hacking for a cause is called? A
a) Hacktivism
b) Black-hat hacking
c). Active hacking
d)Activism
37) When a hacker attempts to attack a host via the internet it is known as what type B
of attack?
a) Local access
b) Remote attack
c) Internal attack
d) Physical access
38) Which are the four regional internet registries? D
a) 53
b) 443
c) 80
d) 21
40) Leaking your company data to the outside network without prior permission of A
senior authority is a crime.
a) True
b) False
UNIT- III
6
41) What are the major components of the intrusion detection system? D
a) Analysis Engine
b) Event provider
c) Alert Database
d) All of the mentioned
42) What are the different ways to classify an IDS? D
a) anomaly detection
b) signature-based misuse
c) stack based
d) all of the mentioned
43) What are the different ways to classify an IDS? B
a) Zone based
b) Host & Network based
c) Network & Zone based
d) Level based
44) What are the characteristics of anomaly-based IDS? A
7 P.T.O.
48) What are the characteristics of Host based IDS? D
a) Attack verification
b) System specific activity
c) No additional hardware required
d) All of the mentioned
51) What are characteristics of stack-based IDS? A
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
c) It is programmed to interpret a certain series of packets
d) It models the normal usage of network as a noise characterization
52) What are characteristics of Network-based IDS? A
8
54) Which one of the following is not an application hash functions? B
a) True
b) False
57) The main difference in MACs and digital signatures is that, in digital signatures the B
hash value of the message is encrypted with a user’s public key.
a) True
b) False
58) Message authentication code is also known as C
a) key code
b) hash code
c) keyed hash function
d) message key hash function
59) When a hash function is used to provide message authentication, the hash B
function value is referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
60) What are the different ways to intrude? D
a) Buffer overflows
b) Unexpected combinations and unhandled input
c) Race conditions
d) All of the mentioned
**********
9 P.T.O.
Name of College: Gangamai College of Engineering, Nagaon Dist
Dhule
Subject: Internet Security
Branch: Information Tech.
Class: BE
Semester: VIII
Internet Security A
N
UNIT- I S
1) The Certificate request Massage Includes Two Parameters, One of Which D
Is-
A) Disaster B) Eavesdropping
C) Information leakage D) Unchanged default password
5) What is a mantrap? C
1 P.T.O.
6) _____ platforms are used for safety and protection of information in the A
cloud.
A) in-service expansion
B) unlimited number of stations
C) both (a) and (b)
D) unlimited distance
11) In RSA, Ф(n) = _______ in terms of p and q. C
2
14) Encryption of small values, such as identifiers or names, is made A
complicated by the possibility of __________
A) 12 B) 18 C) 9 D) 16
16) Which of the following is not a type of symmetric-key cryptography C
technique?
UNIT- II
3 P.T.O.
22) Performing a shoulder surfing in order to check other’s password is D
____________ ethical practice.
a) a good
b) not so good
c) very good social engineering practice
d) a bad
23) ___________ has now evolved to be one of the most popular automated C
tools for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
24) Leaking your company data to the outside network without prior permission of A
senior authority is a crime.
a) True
b) False
25) The legal risks of ethical hacking include lawsuits due to __________ of B
personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
26) Before performing any penetration test, through legal procedure, which key D
points listed below is not mandatory?
4
27) An ethical hacker must ensure that proprietary information of the firm does not A
get leaked.
a) True
b) False
28) After performing ____________ the ethical hacker should never disclose client C
information to other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
29) __________ is the branch of cyber security that deals with morality and D
provides different theories and a principle regarding the view-points about
what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking
30) A penetration tester must identify and keep in mind the ___________ & A
___________ requirements of a firm while evaluating the security postures.
a) AttackSyllable
b) AttackBrute Forcing
c) AttacksHybrid
d) All of the above
5 P.T.O.
33) What is the primary goal of ethical hacker? C
a) Avoiding detection
b) Testing security controls
c)Resolving security vulnerabilities
d)Determining return on investment for security measures
34) What is the first phase of hacking? D
a) Maintaining access
b) Gaining access
c) Reconnaissance
d) Scanning
35) Which type of hacker represents the highest risk to your network? D
a) Black-hat hackers
b) Grey-hat hackers
c) Script kiddies
d) Disgruntled employees
36) Hacking for a cause is called? A
a) Hacktivism
b) Black-hat hacking
c). Active hacking
d)Activism
37) When a hacker attempts to attack a host via the internet it is known as what type B
of attack?
a) Local access
b) Remote attack
c) Internal attack
d) Physical access
38) Which are the four regional internet registries? D
a) 53
b) 443
c) 80
d) 21
6
40) Leaking your company data to the outside network without prior permission of A
senior authority is a crime.
a) True
b) False
UNIT- III
41) What are the major components of the intrusion detection system? D
a) Analysis Engine
b) Event provider
c) Alert Database
d) All of the mentioned
42) What are the different ways to classify an IDS? D
a) anomaly detection
b) signature-based misuse
c) stack based
d) all of the mentioned
43) What are the different ways to classify an IDS? B
a) Zone based
b) Host & Network based
c) Network & Zone based
d) Level based
44) What are the characteristics of anomaly-based IDS? A
7 P.T.O.
46) What are the characteristics of signature-based IDS? A
a) Attack verification
b) System specific activity
c) No additional hardware required
d) All of the mentioned
51) What are characteristics of stack-based IDS? A
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
c) It is programmed to interpret a certain series of packets
d) It models the normal usage of network as a noise characterization
8
52) What are characteristics of Network-based IDS? A
a) True
b) False
57) The main difference in MACs and digital signatures is that, in digital signatures the B
hash value of the message is encrypted with a user’s public key.
a) True
b) False
58) Message authentication code is also known as C
a) key code
b) hash code
c) keyed hash function
d) message key hash function
9 P.T.O.
59) When a hash function is used to provide message authentication, the hash B
function value is referred to as
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
60) What are the different ways to intrude? D
a) Buffer overflows
b) Unexpected combinations and unhandled input
c) Race conditions
d) All of the mentioned
**********
10
Model Question Paper
Subject: Software Metrics and Quality Assurance
Class: BE
Semester: VIII
Ans.: B
A. Requirement analysis.
B. Risk management.
C. Quality management.
D. Configuration management.
Ans.: B
Q4.The tools that support different stages of software development life cycle
are called
A. CASE Tools
B. CAME tools
C. CAQE tools
D. CARE tools
Ans.: A
A. Indirect measures
B. Direct measures
C. Coding
D. None of the above
Ans.: A
Q9.Which of the following costs is not part of the total effort cost?
A. Costs of networking and communications
B. Costs of providing heating and lighting office space
D. Costs of lunch time food
D. Costs of support staff
Ans.: C
Q10.What is related to the overall functionality of the delivered software?
A. Function-related metrics
B. Product-related metrics
C. Size-related metrics
D. None of the mentioned
Ans.: A
Q11. Function Points in software engineering was first proposed by
A. Booch
B. Boehm
C. Albrecht
D.Jacobson
Ans.: C
Q12.How many Information Domain Values are used for Function Point
Computation?
A. three
B. four
C. five
D. six
` Ans.: C
Ans.: C
Q19. Percentage of modules that were inspected is a part of
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans.: B
Q20.Line of code(LOC) can be used to normalize quality and/or productivity
measure for?
A. Extended function point metrics
B. Function point metrics.
C. Size oriented metrics.
D. None of the above.
Ans.: C
A. Behavioral Testing
B. Flow Testing
C. Data Testing
D. None of the above
Ans.: A
Q24. Test cases are designed during which of the following stages?
A. Test recording
B. Test configuration
C. Test planning
D. Test specification
Ans.: D
Q42.As a software manager, when you will decide the number of people
required for a software project?
Q46.What is QA?
A. It is the measurement of degree to which a product satisfies the need
B. Any systematic process used to ensure quality in the process
C. Process of identifying defects
D. It is a corrective tool
Ans.: B
Q59.The cost incurred in first time reviews and testing is called ---------
A. Red money
B. Green money
C.Blue money
Ans : C
Q60.Continual (Continuous) improvement cycle is based on systematic
sequence of -------------- activities.
A. SDLC
B. PDCA
C. waterfall model
Ans : B.
Model Question Paper
Subject :SMQA ( Software Metric and Quality and Assurance )
Class : BE
Semester : VIII
Q1. Which requirements are the foundation from which quality is measured?
a) Hardware
b) Software
c) Programmers
d) None of the mentioned
a) Length
b) Functionality
c) Reuse
d) All of Above
Q3. Measurement can be called as ________________
a) Quantization
b) Quantification
c) Qualification
d) None of Above
Q6. As software engineering focuses on implementing the software in controlled and scientific way.
a) True
b) False
a) COCOMO
b) Putnam
c) Albrecht’s function point model
d) All of above
a) True
b) False
i) Nominal scale ii) Ordinal scale iii) Internal scale iv) Ratio scale v) Obsolete scale
a) (I,ii,iii)
b) (ii,iii,v)
c) (i,ii,iv)
d) (I,ii,iv,v)
Q.15 The quality of any measurement program is clearly dependent on careful data collection.
a) True
b) False
Q16.Software metrics is a term that embraces many activities. Which are these?:
a) Cost and effort estimation models and measures
b) Data collection
c) Quality models and measures
d) All of above
e) None of above
Q18. Line of code(LOC) of the product comes under which type of measures?
a.Indirect measures
b. Direct measures
c. Coding
d. None of the above
a) Effort
b) Productivity
c) Cost
d) All of above
a) Length
b) Functionality
c) Complexity
d) All of above
Q25. Structured Analysis and Structured Design (SA/SD) is diagrammatic notation which is
design to :
a) help people understand the system.
b) improve quality and reduce the risk of System failure.
c) Basically the approach of SA/SD is based on the Data Flow Diagram.
d) All of above
a) Control graph
b) Bipartite Graph
c) Directed graph
d) None of above
a) Program Statement
b) Control Flow
c) Loop
d) None of above
Q28.In-degreeof the node is the:
a) Logarithm of degree
b) number of arcs arriving at the node
c) number of values arriving at the node
d) All of above
Q30. Coupling is :
a) True
b) False
Q33. DFD depicts the behavior of data when it interacts with the system.
a) Pattern
b) Behavior
c) No. of instructions
d) None
Q34.
Above Flow graph indicate the statement:
a) If X then A
b) IF A then X
c)IF A then true
d) IF X then true
Q35.
a) If A then x else y
b) If x and y then A
c) If A then y else x
d) None
a) i), iii)
b) ii), iii)
c) i), ii)
d) ii,iv)
Q37. X and y communicate by parameters, where each parameter is either a single data element or
a homogeneous set of data items that incorporate no control element. This type of coupling is
________________.
a) No coupling relation
b) Stamp Coupling
c) Common Coupling
d) Data Coupling
Q38. If the modules performs more than one function, and they are unrelated then it is ______
cohesion.
a)Temporal
b) Logical
c) Coincidental
d) None
a)R(t)=1-F(t)
b) R(t)=F(t)-1
c) R(t)=1+F(t)
d) None of Above
Q43. Which Model is basic model of reliability from which various reliability models are derived :
a)DeMarcho Model
b) LittleWood Model
c) Jelinski-Moranda (J-M) Model
d) All of above
Q47. The mean time to failure (MTTF) is the mean of the probability density function.
a)True
b) False
Q48. In morphology size metric is measured by size=n+a. Where n= ________ and a=_______.
a)MTBF=MTTF-MTTR
b) MTBF = MTTF + MTTR
c) MTBF=MTTR-MTTF
d) None of above
a)True
b) False
Q53. Mean Time To Repair (MTTR) is the time needed to repair a failed hardware module.
a) True
b) False
a)Radar System
b) Medical System
c) Weather forecasting system
d) All of above
Q56. A is taller than B iff M(A) > M(B).This statement implies that when ever A is taller than B then
M(A) must be bigger number that M(B).
a)True
b) False
Q58. Measurement is the process by which numbers or symbols are assigned to attributes of
entities in the real world.
a)True
b) False
Q59. To count FP we first computer the UFC (Unadjusted function point count)
a)True
b) False
a)Response Time
b) Computational
c) Algorithmic complexity
d) All of above
Answer Key
1. b
2. d
3. b
4. d
5. d
6. a
7. d
8. d
9. b
10. d
11. d
12.a
13.c
14.d
15.a
16. c
17. c
18.b
19. c
20.a
21.d
22.d
23. a
24.d
25.d
26. c
27. a
28.b
29.a
30. a
31. c
32. a
33. b
34.b
35. a
36.c
37.d
38. c
39. a
40.b
41.a
42. a
43. c
44. b
45.a
46.a
47.a
48.a
49.b
50. a
51.d
52. a
53. a
54.c
55. d
56. a
57. d
58.a
59.a
60.d
Model Question Paper
SUBJECT: SOFTWARE METRICS AND QUALITY ASSURANCE
___________________________________________________________________________
UNIT I
Q6. The order in which participants complete a task is an example of what level of
measurement?
A. Ordinal
B. Ratio
C. Interval
D. Nominal
Ans.: A
Q7. What level of measurement would be used if participants were asked to choose their
favourite picture from a set of six?
A. Ordinal
B. Nominal
C. Ratio
D. Interval
Ans.: B
Q8. If the grading of diabetes is classified as mild, moderate and severe the scale of
measurement used is:
A. Interval
B. Nominal
C. Ordinal
D. Ratio
Ans.: C
Q9. The quantity or quality is measured using which of the following measurement?
A. Direct Measurement:
B. Indirect Measurement:
C. Both a and b
D. Controlling
Ans.: C
Q12. A measure must specify the ____and _______as well as the rules for performing the
mapping
A binary relation, domain
B domain, number
C domain ,range
D empirical relation, range
Ans.: C
Ans.: D
Q14. A abstraction of reality, allowing us to strip away details and view an entity or concept
from a particular perspective is called as
A. Method
B. Function.
C. Model.
D. document
Ans.: C
Q15. Direct measurement---
Q16. A mathematical model together with a set of prediction procedures for determining
unknown parameters is known as
A. Calculation System
B. Database system.
C. Prediction system.
D. Power System
Ans.: C
A. Nominal
B. Ordinal
C. Interval
D. Absolute
Ans.: D
Q18. Which of the following comes under the Control Structure Testing?
A. Condition testing
B. Loop testing
C. Data Flow Testing
D. All of the above
Ans: D
Q19. A graphical technique for finding if changes and variation in metrics data are
meaningful is known as
C. Control Chart
D. All of the mentioned
Ans: C
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans: C
UNIT II
Q21. Which of the following is not an information domain required for determining function
point?
A. Number of user Input
B. Number of user Inquiries
C. Number of external Interfaces
D. Number of errors
Ans.: D
Q22. Which of these the advantage using LOC (lines of code) as a size oriented metrics?
A. LOC is easily computed
B. LOC is language dependent measure
C. LOC is language measurement.
D. LOC is computed before design is completed.
Ans.: A
Q23. Line of code (LOC) can be used to normalize quality and/or productivity measure for
------------.
A. Extended function point metrics
B. Function point metrics.
C. Size oriented metrics.
D. None of the above.
Ans.: C
Q24. In size oriented metrics, metrics are developed based on the ----------------- .
A. number of Functions
B. number of user inputs
C. number of lines of code
D. amount of memory usage
Ans.: C
Q25. Function oriented metric were first proposed by ___________ and he suggested a
measure called the __________ .
A. Barry Boehm, KLOC.
B. Barry Boehm, Function point.
C. Albrecht, Function point.
D. Albrecht, KLOC.
Ans.: C
A. validation
B. Software testing
C. verification
D. Documentation
Ans.: C
Ans.: B
Q.28 Which of the following is not an information domain required for determining function
point in FPA?
A. Booch
B. Boehm
C. Albrecht
D. Jacobson
Ans.: C
Q.30 Function Point Computation is given by the formula
Ans.: A
Q.32 Which of the following is not categorized under Component-Level Design Metrics?
A. Complexity Metrics
B. Cohesion Metrics
C. Morphology Metrics
D. Coupling Metrics
Ans.: C
Q.33 From the following methods which size of the software product can be calculated?
Ans.: B
Q.35Advantage of using function point(FP) as measure of the functionality delivered by a
software application?
D. Both b and c
Ans.: D
Q.36 Which metric gives the idea about the contents on a web page ?
A. Word Token
B. Word Count
C. Word Size
D. Word Length
Ans.: C
Q.37 Number of dynamic web pages provides an idea about________ for a web page that is
to be built.
A. Size
B. Complexity
C. Effort
D. All of the mentioned
Ans.: B
Q.38 How many Information Domain Values are used for Function Point Computation?
A. Three
B. Four
C. Five
D. Six
Ans.: C
Q.39. Which of the following is not categorized under Product Operation of McCall’s
Software Quality Factors?
A. Flexibility
B. Reliability
C. Usability.
D. Integrity
Ans.: A
Q.40 Software size can be calculated by
A. Length
B. Functionality
C. Complexity
D. All of above
Ans: D
UNIT III
Q42. Which of the following does not affect the software quality and organizational
performance?
A. Market
B. Product
C. Technology
D. People
Ans.: A
Q43. Which of the following is not a direct measure of software engineering process?
A. Efficiency
B. Cost
C. Effort Applied
D. All of the mentioned
Ans.: A
Q45. Which requirements are the foundation from which quality is measured?
A. Hardware
B. Software
C. Programmers
D. None of the above
Ans .: D
Q 48. Which of the following approaches are used to achieve reliable systems?
A. Fault prevention
B. Fault removal
C. Fault tolerance
D. All of the above
Ans .: D
Q 49. Failure In Time (FIT) is another way of reporting
A. MTTR
B. MTTF
C. MTSF
D. MTBF
Ans .: D
Q 50. Which one of the following is not parametric reliability growth model?
A. Jelinski moranda
B. Little wood
C. Albrecht function point
D. All of above
Ans .: C
Q 52. In ISO 9126, time behaviour and resource utilization are a part of
A. Maintainability
B. Portability
C. Efficiency
D. Usability
Ans .: C
Q 57. The amount of time that the software is available for use is known as
A. Reliability
B. Usability
C. Efficiency
D . Functionality
Ans .: A
Q 58. Usability in metric analysis is defined as the degree to which the software-------.
A. stated needs
B. is easy to use
C. makes optimal use of system resources
D. none of the mentioned
Ans .: B
Q 59. Which of the following is not categorized under Product Operation of McCall’s
Software Quality Factors?
A. Flexibility
B. Reliability
C. Usability
D. Integrity
Ans .: A
___________________________________________________________________________
UNIT I
Q7. What level of measurement would be used if participants were asked to choose their
favourite picture from a set of six?
A. Ordinal
B. Nominal
C. Ratio
D. Interval
Ans.: B
Q8. If the grading of diabetes is classified as mild, moderate and severe the scale of
measurement used is:
A. Interval
B. Nominal
C. Ordinal
D. Ratio
Ans.: C
Q9. The quantity or quality is measured using which of the following measurement?
A. Direct Measurement:
B. Indirect Measurement:
C. Both a and b
D. Controlling
Ans.: B
Q12. A measure must specify the ____and _______as well as the rules for performing the
mapping
A binary relation, domain
B domain, number
C domain ,range
D empirical relation, range
Ans.: C
Ans.: C
Q14. A abstraction of reality, allowing us to strip away details and view an entity or concept
from a particular perspective is called as
A. Method
B. Function.
C. Model.
D. document
Ans.: C
Q15. Direct measurement---
Q16. A mathematical model together with a set of prediction procedures for determining
unknown parameters is known as
A. Calculation System
B. Database system.
C. Prediction system.
D. Power System
Ans.: C
A. Nominal
B. Ordinal
C. Interval
D. Absolute
Ans.: D
Q21. Which of the following is not an information domain required for determining function
point?
A. Number of user Input
B. Number of user Inquiries
C. Number of external Interfaces
D. Number of errors
Ans.: D
Q22. Which of these the advantage using LOC (lines of code) as a size oriented metrics?
A. LOC is easily computed
B. LOC is language dependent measure
C. LOC is language measurement.
D. LOC is computed before design is completed.
Ans.: A
Q23. Line of code (LOC) can be used to normalize quality and/or productivity measure for
------------.
A. Extended function point metrics
B. Function point metrics.
C. Size oriented metrics.
D. None of the above.
Ans.: C
Ans.: B
Q.25 what is the Full form of TCF?
Q.26 which of the following methods is used for size of the software product.
A. Three
B. Four
C. Five
D. Six
Ans.: C
Q.28. Which of the following is not categorized under Product Operation of McCall’s
Software Quality Factors?
A. Flexibility
B. Reliability
C. Usability.
D. Integrity
Ans.: A
Q.29 Software size can be calculated by
A. Length
B. Functionality
C. Complexity
D. All of above
Ans: D
Q.31 There are legitimate operations we can use to build new flow graphs from old
A. Sequencing
B. Nesting
C. Sequencing and Nesting
D. Sequencing ,Nesting and Directed graph
Ans: C
Q.33 ________the extent to which modules are reused within the same product
A. internal use
B. internal reuse
C. Internal design reuse
D. internal module based reuse
Ans: B
Q.35 -------------of a module is the extent to which its individual components are needed to
perform the same task.
A. Coupling
B. relation
C. cohesion
D. information Flow
Ans: C
UNIT III
Q 41. Which of the following does not affect the software quality and organizational
performance?
A. Market
B. Product
C. Technology
D. People
Ans.: A
Q 42. Which requirement is the foundation from which quality is measured?
A. Hardware
B. Software
C. Programmers
D. None of the above
Ans .: D
Q 43. -----------------is the probability of failure between time o and t.
A. Hazard rate function
B. reliability function
C. Survival function
D. None of the above
Ans.: D
Q 44. Which one is not a software quality model?
A. ISO 9000
B. McCall model
C. Boehm model
D. ISO 9126
Ans.: A
Q 47. Which of the following approaches are used to achieve reliable systems?
A. Fault prevention
B. Fault removal
C. Fault tolerance
D. All of the above
Ans .: D
Q 49. Which one of the following is not parametric reliability growth model?
A. Jelinski moranda
B. Little wood
C. Albrecht function point
D. All of above
Ans .: C
Q 51. In ISO 9126, time behaviour and resource utilization are a part of
A. Maintainability
B. Portability
C. Efficiency
D. Usability
Ans .: C
Q 56. The amount of time that the software is available for use is known as
A. Reliability
B. Usability
C. Efficiency
D . Functionality
Ans .: A
Q 57. Failure occurrences can be represented as
A. time to failure
B. time interval between failures
C. failures experienced in a time interval
D. All of the Above
Ans .: D
Q 58 In --------------,Components get failed due to physical wear.
A. hardware reliability
B. software reliability
C. probability density function
D. none of above
Ans .: A
Q 59.Defect density = no of known defects / product size
A. true
B. false
C. probability on place sof product size
D. probability on place of no of known defects
Ans .: A
Q 60.It describes uncertainty about when the component will fail.
A. cdf
B. mttf
C. pdf
D. rf
Ans .:C
Model Question Paper
Class: BE
Semester: VIII
Ans: D
Ans: B
Ans: B
Q4. Degree to which design specifications are followed in manufacturing the product is called
A. Quality Control
B. Quality of conformance
C. Quality Assurance
D. None of the mentioned
Ans: B
Q5. Which of the following is not included in External failure costs?
A. testing
B. help line support
C. warranty work
D. complaint resolution
Ans: A
Q6. Who identifies, documents, and verifies that corrections have been made to the software?
A. Project manager
B. Project team
C. SQA group
D. All of the mentioned
Ans: C
Ans: C
Q8. The primary objective of formal technical reviews is to find _________ during the process
so that they do not become defects after release of the software.
A. errors
B. equivalent faults
C. failure cause
D. none of the mentioned
Ans: A
A. quality planning
B. formal technical reviews
C. test equipment
D. equipment calibration and maintenance
Ans:D
Ans: C
Q11.Which of the following does not affect the software quality and organizational
performance?
A. Market
B. Product
C. Technology
D. People
Ans: A
Ans: D
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans: C
Ans: C
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans: A
Q16. Which of the following is not categorized under Product Operation of McCall’s Software
Quality Factors ?
A. Flexibility
B. Reliability
C. Usability
D. Integrity
Ans: A
A. Complexity Metrics
B. Cohesion Metrics
C. Morphology Metrics
D. Coupling Metrics
Ans: C
A. correctness
B. integrity
C. maintainability
D. all of the mentioned
Ans: C
Q 19.The arc-to-node ratio is given as r = a/n. What does ‘a’ represent in the ratio ?
Ans: D
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans: B
Ans: D
A. stated needs
B. is easy to use
C. makes optimal use of system resources
D. none of the mentioned
Ans: B
Q23.The amount of time that the software is available for use is known as_________________?
A. Reliability
B. Usability
C. Efficiency
D. Functionality
Ans: A
Ans: B
Q 28.How many Information Domain Values are used for Function Point Computation ?
A. three
B. four
C. five
D. six
Ans: C
Q 29.Mean Time To Repair (MTTR) is the time needed to repair a failed hardware module.
A. True
B. False
Ans: A
Ans: A
Q 31.Structural complexity of a module i is given as S(i) = f*f (i). What does f symbolizes here ?
Ans: D
Ans: B
A. Analysis Model
B. Testing
C. Design Model
D. Source Code
Ans: B
Q 34.Which of the following is not a classification of the web engineering metric, Web Page
Similarity ?
A. Content based
B. Link based
C. Usage based
D. Traffic based
Ans: D
Q 36.Which metric gives the idea about the contents on a web page?
A. Word Token
B. Word Count
C. Word Size
D. Word Length
Ans: B
Q 37.Number of dynamic web pages provides an idea about____________ for a web page that is
to be built?
A. size
B. complexity
C. effort
D. all of the mentioned
Ans: D
Q 38.Link based measures rely on _____________ structure of a web graph to obtain related
pages?
A. Embedded
B. Hyperlink
C. Dynamic
D. All of the mentioned
Ans: B
Q 39.Which of the following web engineering metric measures the extent of relatedness between
two or more web pages?
Ans: C
Q 40.Usability can be measured in terms of_________________?
Ans: D
Q 42.Which of the following does not affect the software quality and organizational performance
?
A. Market
B. Product
C. Technology
D. People
Ans: A
Q 44.A graphical technique for finding if changes and variation in metrics data are meaningful is
known as_________________?
A. DRE (Defect Removal Efficiency)
B. Function points analysis
C. Control Chart
D. All of the mentioned
Ans: C
Q 45.In size oriented metrics, metrics are developed based on the _____________________?
A. number of Functions
B. number of user inputs
C. number of lines of code
D. amount of memory usage
Ans: C
Ans: C
Q 49.Which of the following is not an information domain required for determining function
point in FPA ?
A. Number of user Input
B. Number of user Inquiries
C. Number of external Interfaces
D. Number of errors
Ans: D
Q 50. How many product quality factors are proposed in McCall quality model?
a) 2
b) 3
c) 11
d) 8
Ans: B
Ans: A
Ans: B
Ans: A
Q 54. Suitability, Accuracy, Interoperability, and security are what type quality attribute of ISO
9126 ?
a) Reliability
b) Efficiency
c) Functionality
d) Usability
Ans: C
Q 55. Time Behavior and Resource Behavior fall under which quality attribute of ISO 9126?
a) Reliability
b) Efficiency
c) Functionality
d) Usability
Ans: B
Ans: D
Ans: B
Q 58. Which of the following is not a phase of “bathtub curve” of hardware reliability?
a) Useful Life
b) Burn-in
c) Wear-out
d) Time
Ans: D
Ans: D
Q 60. In ISO 9126, time behavior and resource utilization are a part of
a) maintainability
b) portability
c) efficiency
d) usability
Ans: C
Model Question Paper
Computer Engineering
MCQ Bank for Software Metrics and Quality Assurance
(178141) Semester: VIII
Q1.One of the most important attribute for software product metrics is that it should be:
A.Easy to compute
B.Qualatative in nature
C Reliable overtime
D.Widely applicable
Ans: A.Easy to compute
Q.2.Number of errors found per person hours expended is an example of
a____________________?
A. measurement
B. Measure
C. Metric
Ans: C. Metric
Q.3. Software ...... is a standard of measure that contains many activities which involve
some degree of measurement
A.quality
B.quantity
C.metrics
D.measurement
Ans: C.metrics
A Control-flow structure
B Data Flow
C Structure
D Data Structure
AProduct Metric
B. Process Metric
C. Project Metric
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned
Ans: C. Project Metrics
A. Complexity Metrics
B. Cohesion Metrics
C. Morphology Metrics
D. Coupling Metrics
Ans:CMorphology Metrics
A Project metrics
B Process Metrics
C Product Metrics
A. Product Metrics
B. Process Metrics
C. Project Metrics
D. All of the mentioned.
Ans: B. Process Metrics
A. stated needs
B. is easy to use
C. makes optimal use of system resources
D. none of the mentioned.
A Booch
B. Boehm
C. Albrecht
D. Jacobson
Ans: C. Albrecht
Q13The amount of time that the software is available for use is known
as_________________?
A.Reliability
B. Usability
C. Efficiency
D. Functionality
Ans:A Reliability
Q.15 How many Information Domain Values are used for Function Point Computation ?
A. three
B. four
C. five
D. Six
Ans: C. Five
AEfficiency
B. Cost
C. Effort Applied
D. All of the mentioned
Ans: A. Efficiency
Q.19Structural complexity of a module i is given as S(i) = f*f (i). What does f symbolizes
here ?
Q.22.Which of the following is not an information domain required for determining function
point in FPA ?
Ans:C. help in assessment of status of ongoing project & track potential risk
Q.24. Which of the following is not included in failure costs?
A) rework
B) repair
C) failure mode analysis
D) none of the mentioned
Ans: D) none of the mentioned
Q,25. Which of the following is not a SQA plan for a project?
A) evaluations to be performed
B) amount of technical work
C) audits and reviews to be performed
D) documents to be produced by the SQA group
Ans: B) amount of technical work
Q.26. Which of the following is not an appraisal cost in SQA?
A) inter-process inspection
B) maintenance
C) quality planning
D) testing
Ans: C) quality planning
Q.27. Degree to which design specifications are followed in manufacturing the product is
called
A) Quality Control
B) Quality of conformance
C) Quality Assurance
D) None of the mentioned
Ans: B) Quality of conformance
Q.28. Which of the following is not included in External failure costs?
A) testing
B) help line support
C) warranty work
D) complaint resolution
Ans: A) testing
Q.29. Which requirements are the foundation from which quality is measured?
A) Hardware
B) Software
C) Programmers
D) None of the mentioned
Ans: B) Software
Q.30. Who identifies, documents, and verifies that corrections have been made to the
software?
A) Project manager
B) Project team
C) SQA group
D) All of the mentioned
Ans: C) SQA group
Q.31. The primary objective of formal technical reviews is to find _________ during the
process so that they do not become defects after release of the software.
A) errors
B) equivalent faults
C) failure cause
D) none of the mentioned
Ans: A) errors
Q.32. Software quality assurance consists of the auditing and reporting functions of
management.
A) True
B) False
Ans: A) True
A. design
B. execution
C. planning
D. Check Exit criteria completion
Ans:C. Planning
Q.38. How is reliability and failure intensity related to each other?
A) direct relation
B) inverse relation
C) no relation
D) none of the mentioned
Ans: B) inverse relation
Q.39 Which of the following does not affect the software quality and organizational
performance ?
A. Market
B. Product
C. Technology
D. People
Ans: A. Market
A. Quality
B. Complexity
C. Reliability
D. All of the above
A) Function-related metrics
B Product-related metrics
C) Size-related metrics
D) None of the mentioned
Ans: A) Function-related metrics
Q.50 Which of the following costs is not part of the total effort cost?
A) Costs of networking and communications
B) Costs of providing heating and lighting office space
C) Costs of lunch time food
D) Costs of support staff
Ans: C) Costs of lunch time food
Q.51. Which of the following are parameters involved in computing the total cost of a
software development project?
A) Hardware and software costs
B) Effort costs
C) Travel and training costs
D) All of the mentioned
Ans: D) All of the mentioned
Q.52.Which one of the following is not a s/w process quality:
A)Productivity
B)portability
C)Timelyness
D)Visibility
Ans: B)portability
Q.53.Choose an internal software quality from below
A) scalability
B)usability
C) reusability
D)Realiability
Ans: C) reusability
Q.54.Which of the following is not a direct measure of SE process?
A. Efficiency
B. Cost
C. Effort Applied
D. All of the above
Ans : A Efficiency
Q.55.What is the project &process level that provides the Quality Metric Benefit:
A)Defect amplification
B)Defect removal efficiency
C) Measuring quality
D)all the above
Ans: B)Defect removal efficiency
Q. 56.Checking Quality of sw in both simulated and live environments is known as:
A)Usability
B)Reusability
C)Checking
D)validation
Ans: D)validation
Q.57 It is often difficult to estimate size at an early stage in a project when only a
specification is available
A) True
B) False
Answer: A) True
Answer:B project
Q.59.Many s/w metrics can only be assessed by measuring hard Factors
A)True
B)False’
Ans:A)True
Q.60. Reliability in software system can be achieved using which of the following strategies.
i) Fault Avoidance ii) Fault Tolerance
iii) Fault Detection iv) Fault Deletion
EXTRA:
Class: BE
Semester: VIII
Q1. Which of the following stores all the user-related data that is relevant for the
GSM system in mobile computing?
1. Sim
2. HLR
3. ELR
4. VLR
Answer 1
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer 1
Q3. In which of the following Codes with specific characteristics can be applied to
the transmission?
1. GSM
2. GPRS
3. CDMA
4. None of the above
Answer 3
Q4. Which of the following allow the use of entire bandwidth simultaneously?
1. TDMA
2. FDMA
3. CDMA
4. None of the above
Answer 3
1. Cell
2. Tessellate
3. Mobile station
4. None of the above
Answer 1
1. Environmental conditions
2. Social conditions
3. Political conditions
4. None of the above
Answer 1
1. Handover
2. Infrastructure
3. Frequency planning
4. All of the above
Answer 4
Q8. In a cellular system, the same frequency is used for other users using the
technique ———-
1. Frequency planning
2. Frequency hopping
3. Frequency reuse
4. None of the above
Answer 3
Q9. Which of the following provides packet mode data transfer service over the
cellular network system?
1. GSM
2. GPRS
3. TCP
4. None of the above
Answer 2
Q10. Which of the following services/ services are defined by the GSM?
1. Bearer
2. Supplementary
3. Tele
4. All of the above
Answer 4
1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 4
Q12. Which of the following wireless technology is used for exchanging data
between a variety of fixed and mobile devices over a very short diameter?
1. Mobile technology
2. Bluetooth technology
3. Ad hoc computing
4. None of the above
Answer 2
1. Master
2. Parked
3. Standby
4. Slave
Answer 1
Q14. In which of the following the total available bandwidth is split into many
channels of smaller bandwidth plus guard spaces between the channels?
1. FHSS
2. DSSS
3. Both a and b
4. None of the above
Answer 1
Q15. In which of the following a single data stream is split across several separate
narrowband channels at different frequencies to reduce interference and crosstalk.
1. OFDM
2. GSM
3. GPRS
4. UMTS
Answer 1
Q16. Which of the following uses high-frequency radio waves instead of cables for
connecting the devices in LAN?
1. Wired LAN
2. Wireless LAN
3. Fiber made LAN
4. None of the above
Answer 2
1. IEEE 802.2
2. IEEE 802.11
3. IEEE 802.5
4. IEEE 802.15
Answer 2
1. Flexibility
2. Ease of use
3. Robustness
4. All of the above
Answer 4
1. Slaves
2. Parked
3. Standby
4. None of the above
Answer 1
Answer 4
Q 22 In the distributed system a client gives the request, and the server provides—-
1. Data
2. Service
3. Information
4. All of the above
Answer 2
1. Migration of data
2. Concurrent access to data
3. Replication of data
4. All of the above
Answer 4
Q24. Features of CODA is/are
Answer 4
1. CODA
2. Ficus
3. Rover
4. None of the above
Answer 2
1. Connected
2. Loosely connected
3. Disconnected
4. All of the above
Answer 3
Q27. Which of the following are objects that can be dynamically loaded into a
client computer from a server (or vice-versa) to reduce client-server
communication?
Q28 Which of the following allows for non-blocking RPCs even when a host is
disconnected?
Answer 1
1. Consistency
2. Availability
3. ACID Property
4. All of the above
Answer 3
Q 30. The ability of a system to perform its function correctly even in the presence
of internal faults is called
1. Fault tolerance
2. Recovery
3. Both a and b
4. None of the above
Answer 3
1. congestion control
2. Flow control mechanisms
3. guarantees in-order delivery of data
4. All of the above
Answer 4
Q32. TCP supports many of the Internet’s most popular application protocols and
resulting applications, including
Answer 4
Q 33. Which of the following segments a TCP connection into a fixed part and a
wireless part?
1. Indirect TCP
2. Direct TCP
3. Both a and b
4. None of the above
Answer 1
1. Fast transmission
2. Congestion control
3. Error control
4. All of the above
Answer 4
1. To buffer data close to the mobile host to perform fast local retransmission
in case of packet loss.
2. Congestion control
3. Flow control
4. None of the above
Answer 1
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets
Answer 2
Answer 4
Answer 1
1. Buffering packets
2. Congestion control
3. Selective retransmission
4. All of the above
Answer 3
Q40. Which of the following combine packets for connection establishment and
connection release with user data packets?
Answer 1
1. Any device
2. Wired device
3. Wireless-enabled device
4. None of the above
Answer 3
1. Mobility
2. Portability
3. Wireless connectivity
4. All of the above
Answer 4
1. GSM
2. GPRS
3. CDMA
4. None of the above
Answer 1
Q44. Which of the following allow the use of only some part of bandwidth?
1. TDMA
2. FDMA
3. Both a and b
4. None of the above
Answer 3
1. Cell
2. Tessellate
3. Mobile station
4. None of the above
Answer 2
1. Hexagon
2. Circular
3. Square
4. None of the above
Answer 1
1. Education
2. Sports
3. Games
4. All of the above
Answer 4
Q48. Challenges of mobile computing include ———
1. Low Security
2. Ad hoc Networking
3. Shared medium
4. All of the above
Answer 4
1. Cell
2. Radius
3. Tessellate
4. None of the above
Answer 1
Q50. Which of the following services/service are defined within the bearer
services?
1. Data transmission
2. Forward error correction
3. Flow control
4. All of the above
Answer 4
1. Piconet
2. Ad hoc piconet
3. Scatter net
4. All of the above
Answer 3
Q52. Bluetooth technology is used for —-
Answer 4
Q53. In Bluetooth which of the following device follow the hopping sequence?
1. Master
2. Parked
3. Standby
4. Slave
Answer 4
Q54. Which of the following system takes a user bitstream and perform an (XOR)?
The result is either the sequence 0110101 (if the user bit equals 0) or its
complement 1001010 (if the user bit equals 1).
1. FHSS
2. DSSS
3. Both a and b
4. None of the above
Answer 2
1. FHSS
2. GSM
3. GPRS
4. UMTS
Answer 1
1. IEEE 802.11
2. WiFi
3. Both a and b
4. None of these
Answer 3
1. Flexibility
2. Robustness
3. Less cost
4. All of the above
Answer 4
1. Slow speed
2. Noise
3. More effort for Security
4. All of the above
Answer 4
1. Hopping pattern
2. Frequency reuse
3. Channels
4. All of the above
Answer 4
Q60. In a Distributed File System, clients access files provided by
1. Other clients
2. Server
3. Access point
4. None of these
Answer 2
Model Question Paper
Subject:-Mobile Computing
Branch:-Computer Engineering
Class:-B.E.
Semester:- VIII
Q1. Which of the following stores all the user-related data that is relevant for the GSM system in mobile
computing?
A. Sim
B. HLR
C. ELR
D. VLR
Answer A
Q2. Which of the following stores Mobile Subscriber ISDN number – MSISDN?
Answer A
Q3. In which of the following Codes with specific characteristics can be applied to the transmission?
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer C
Q4. Which of the following allow the use of entire bandwidth simultaneously?
A. TDMA
B. FDMA
C. CDMA
D. None of the above
Answer C
Answer A
A. Environmental conditions
B. Social conditions
C. Political conditions
D. None of the above
Answer A
A. Handover
B. Infrastructure
C. Frequency planning
D. All of the above
Answer D
Q8. In a cellular system, the same frequency is used for other users using the technique ———-
A. Frequency planning
B. Frequency hopping
C. Frequency reuse
D. None of the above
Answer C
Q9. Which of the following provides packet mode data transfer service over the cellular network
system?
A. GSM
B. GPRS
C. TCP
D. None of the above
Answer B
Q10. Which of the following services/ services are defined by the GSM?
A. Bearer
B. Supplementary
C. Tele
D. All of the above
Answer D
A. Piconet
B. Ad hoc piconet
C. Scatter net
D. All of the above
Answer D
Q12. Which of the following wireless technology is used for exchanging data between a variety of fixed
and mobile devices over a very short diameter?
A. Mobile technology
B. Bluetooth technology
C. Ad hoc computing
D. None of the above
Answer B
A. Master
B. Parked
C. Standby
D. Slave
Answer A
Q14. In which of the following the total available bandwidth is split into many channels of smaller
bandwidth plus guard spaces between the channels?
A. FHSS
B. DSSS
C. Both a and b
D. None of the above
Answer A
Q15. In which of the following a single data stream is split across several separate narrowband channels
at different frequencies to reduce interference and crosstalk.
A. OFDM
B. GSM
C. GPRS
D. UMTS
Answer A
Q16. Which of the following uses high-frequency radio waves instead of cables for connecting the
devices in LAN?
A. Wired LAN
B. Wireless LAN
C. Fiber made LAN
D. None of the above
Answer B
A. IEEE 802.2
B. IEEE 802.11
C. IEEE 802.5
D. IEEE 802.15
Answer B
A. Flexibility
B. Ease of use
C. Robustness
D. All of the above
Answer D
Answer D
Q20. In piconet devices connected with the master is called
A. Slaves
B. Parked
C. Standby
D. None of the above
Answer A
Answer D
Q 22 In the distributed system a client gives the request, and the server provides—-
A. Data
B. Service
C. Information
D. All of the above
Answer B
A. Migration of data
B. Concurrent access to data
C. Replication of data
D. All of the above
Answer B
Answer D
A. CODA
B. Ficus
C. Rover
D. None of the above
Answer B
A. Connected
B. Loosely connected
C. Disconnected
D. All of the above
Answer C
Q27. Which of the following are objects that can be dynamically loaded into a client computer from a
server (or vice-versa) to reduce client-server communication?
Answer 1
Q28 Which of the following allows for non-blocking RPCs even when a host is disconnected?
Answer A
A. Consistency
B. Availability
C. ACID Property
D. All of the above
Answer C
Q 30. The ability of a system to perform its function correctly even in the presence of internal faults is
called
A. Fault tolerance
B. Recovery
C. Both a and b
D. None of the above
Answer C
Q 31. TCP is a reliable protocol that incorporates
A. congestion control
B. Flow control mechanisms
C. guarantees in-order delivery of data
D. All of the above
Answer D
Q32. TCP supports many of the Internet’s most popular application protocols and resulting
applications, including
Answer D
Q 33. Which of the following segments a TCP connection into a fixed part and a wireless part?
A. Indirect TCP
B. Direct TCP
C. Both a and b
D. None of the above
Answer A
A. Fast transmission
B. Congestion control
C. Error control
D. All of the above
Answer D
A. To buffer data close to the mobile host to perform fast local retransmission in case of packet
loss.
B. Congestion control
C. Flow control
D. None of the above
Answer A
Q 36. I-TCP and Snooping TCP does not help much if a mobile host gets
Answer B
Answer D
Answer A
A. Buffering packets
B. Congestion control
C. Selective retransmission
D. All of the above
Answer C
Q40. Which of the following combine packets for connection establishment and connection release
with user data packets?
Answer A
Q41. Mobile Computing allows transmission of data, from one wireless-enabled device to another —-
A. Any device
B. Wired device
C. Wireless-enabled device
D. None of the above
Answer C
A. Mobility
B. Portability
C. Wireless connectivity
D. All of the above
Answer D
A. GSM
B. GPRS
C. CDMA
D. None of the above
Answer A
Q44. Which of the following allow the use of only some part of bandwidth?
A. TDMA
B. FDMA
C. Both a and b
D. None of the above
Answer C
A. Cell
B. Tessellate
C. Mobile station
D. None of the above
Answer B
A. Hexagon
B. Circular
C. Square
D. None of the above
Answer A
Q47. Important mobile computing application/s is/are —–
A. Education
B. Sports
C. Games
D. All of the above
Answer D
A. Low Security
B. Ad hoc Networking
C. Shared medium
D. All of the above
Answer D
A. Cell
B. Radius
C. Tessellate
D. None of the above
Answer A
Q50. Which of the following services/service are defined within the bearer services?
A. Data transmission
B. Forward error correction
C. Flow control
D. All of the above
Answer D
1. Piconet
2. Ad hoc piconet
3. Scatter net
Answer C
Q52. Bluetooth technology is used for —-
Answer D
Q53. In Bluetooth which of the following device follow the hopping sequence?
A. Master
B. Parked
C. Standby
D. Slave
Answer D
Q54. Which of the following system takes a user bitstream and perform an (XOR)? The result is either
the sequence 0110101 (if the user bit equals 0) or its complement 1001010 (if the user bit equals 1).
A. FHSS
B. DSSS
C. Both a and b
D. None of the above
Answer B
A. FHSS
B. GSM
C. GPRS
D. UMTS
Answer A
A. IEEE 802.11
B. WiFi
C. Both a and b
D. None of these
Answer C
Q57. The advantages of WLANs are —–
A. Flexibility
B. Robustness
C. Less cost
D. All of the above
Answer D
A. Slow speed
B. Noise
C. More effort for Security
D. All of the above
Answer D
A. Hopping pattern
B. Frequency reuse
C. Channels
D. All of the above
Answer D
A. Other clients
B. Server
C. Access point
D. None of these
Answer B