Practice Questions

Software Engineering Multiple Choice Questions and Answers

Software Engineering Multiple Choice Questions and Answers
Want to Share...
Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestShare on Reddit

1. Ether LAN uses
(a) Polar encoding
(b) differential manchester encoding
(c) manchester encoding
(d) NRZ
Ans: (c)

2. If a file is to be moved from main memory to a disk, the directory file would be modified by the
(a) supervisor
(b) file manager
(c) I/O manager
(d) command processor
Ans: (b)

3. Which type of design problem in file system ?
(a) How the file system should look to the user
(b) Algorithm and data structure must be created to map the logical file system onto the secondary storage device
(c) Both (a) and (b)
(d) None of these
Ans: (c)

Related: GATE (CS) Sample Paper

4. Which company develops the TCP/IP protocol for networking ?
(a) IBM
(b) DEC
Ans: (d)

5. Slotted ALOHA
(a) divide time into discrete intervals
(b) require global time synchronization
(c) both (a) and (b)
(d) none of these

Ans: (c)

6. A file organization component of a VSAM file is
(a) relative record data set
(b) keyed sequential data set
(c) entry sequential data set
(d) all of these

Ans: (d)

7. If a designer wants to design a point-to-point subnetwork with 10 routers of full duplex line, then total number of
lines among them would be
(a) 10
(b) 20
(c) 45
(d) 90
Ans: (d)

8. What is the maximum burst length on an 155.52 Mbps ATM ABR connection whose PCR value 200,000 and whose
L value is 25 msec ?
(a) 9 cells
(b) 12 cells
(c) 15 cells
(d) 18 cells
Ans: (b)

9. IP address can be used to specify a broadcast and map to hardware broadcast if available. By conversion broadcast
address has hosted with all bits
(a) 0
(b) 1
(c) both (a) and (b)
(d) none of these
Ans: (b)

10. Which of the following TCP/IP protocol is used to monitor IP gateway and the networks to which they attach ?
(a) SGMP
(b) SUMP
(c) FTP
(d) both (a) and (b)
Ans: (d)

Related: GATE Syllabus

11. End – to – end connectivity is provided from host – to – host in the
(a) network layer
(b) transport layer
(c) session layer
(d) none of these
Ans: (b)

12. What is the elapsed time of P if F contains unblocked records and P does not use buffering ?
(a) 12 sec
(b) 14 sec
(c) 17 sec
(d) 21 sec
Ans:` (c)

13. A desirable property of module is
(a) independency
(b) low cohesiveness
(c) high coupling
(d) multifunctional
Ans: (a)

14. Gateways can function all the way upto
(a) transport layer
(b) session layer
(c) presentation layer
(d) application layer
Ans: (d)

15. Which of the following is not relevant to networking ?
(a) Low-end stand alone hubs
(b) Stackable hubs
(c) Mesh network
(d) Bus hubs
Ans: (d)

16. A help system in an application program is used
(a) make it easy to switch from one mode to another
(b) display menus to prompt the users with choices of available commands
(c) display explanatory information
(d) all of these
Ans: (c)

17. Which one of the following is not a class of LAN ?
(a) Broad band
(c) Token bus
(d) Token ring
Ans: (a)

18. Different computers are connected to a LAN by a cable and
(a) modem
(b) interface card
(c) special wires
(d) telephone lines
Ans: (b)

19. Unmodulated signal coming from a transmitter is known as
(a) carrier signal
(b) baseband signal
(c) primary singal
(d) none of these
Ans: (b)

20. Bit stuffing refers to
(a) inserting a ‘0’ in user stream to differentiate it with a flag
(b) inserting a ‘0’ in flag stream to aviod ambiguity
(c) appending a nibble to the flag sequence
(d) appending a nibble to the use data stream
Ans: (a)

21. A network that contains multiple hubs in most likely configured in which topology ?
(a) Mesh
(b) Tree
(c) Bus
(d) Star
Ans: (b)

22. Real-time displays
(a) are used only for capacity planning
(b) are most useful for showing performance problems
(c) are useless for capacity planning
(d) cannot show the system paging rate
Ans: (b)

23. In Ethernet CSMA/CA, the special bit sequence transmitted by media access management collision handling is
(a) preamble
(b) postamble
(c) jam
(d) none of these
Ans: (c)

24. A program P calls two subprograms P1 and P2 P1 can fail 50% times and P2 can fail 40% times. Then, P can fail
(a) 50 %
(b) 60 %
(c) 10 %
(d) 70 %

Ans: (d)

25. A 3000 Hz bandwidth noisy channel transmits bits with a signal to thermal noise ratio of 30 dB. What is the
maximum data rate of the channel ?
(a) 30 kbps
(b) 90 kbps
(c) 60 kbps
(d) none of these
Ans: (a)

26. In stop-and-wait ARQ, if data I has an error, then receiver sends which frame ?
(a) NAK 0
(b) NAK 1
(c) NAK 2
(d) NAK
Ans: (d)

27. Machine language programs
(a) consist of long sequences of binary numbers
(b) can express the same meaning in fewer statements tha can BASIC programs
(c) both (a) and (b)
(d) none of these
Ans: (a)


28. The most difficult problem with co-processors is
(a) finding suitable applications
(b) keeping all processors busy
(c) managing shared resources
(d) cost
Ans: (b)

29. Business application programs include
(a) tax planning and preparation program
(b) drill-and practice programs
(c) expert systems
(d) all of these
Ans: (a)

30. Adaptive or dynamic directory used in packet routing changes
(a) within each user session
(b) with easch user session
(c) at system generation time only
(d) both (a) and (b)
Ans: (a)

31. Imagine that you have trained your St. Bernard, Bernie, to carry a box of three 8 mm Exabyte instead of a flask of
brandy (When your disk fills up, you consider that an emergency). These tapes each contain 7 gigabytes. The dog
can travel to your side, wherever you may be, at 18 khm/hour. For what range of distances does Bernie have a x
higher data rate than a 155 Mbps ATM line ?
(a) x < 2.4
(b) x < 4.2
(c) x < 5.4
(d) x < 7.2
Ans: (c)

32. Trap door
(a) could be included in a complier
(b) pose a difficult problem because, to detect them
(c) both (a) and (b)
(d) none of these

Ans: (c)

33. Threat monitoring technique is
(a) the system can check for suspicious patterns of activity in an attempt to detect a security violation
(b) a time sharing a system that counts the number of incorrect passwords given
(c) both (a) and (b)
(d) none of these
Ans: (c)

34. Which of the following refers to the associative memory ?
(a) Address of the data is generated by the CPU
(b) Address of the data is supplied by the users
(c) There is no need for an address ie the data is used as an address
(d) Data are accessed sequentially
Ans: (c)

35. A hydra
(a) subsystem is built on top of its protection kernel and may require protection of its own components
(b) is memory management device
(c) is used in interfacing
(d) all of these

Ans: (a)

About the author

A P Singh

Leave a Comment