41. if S1 is total number of modules defined in the program architecture , S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is :
(1) 1+S3/S1
(2) 1-S3/S1
(3) 1+ S1/S3
(4) 1-S1/S3
Answer : 2
42. The _____ Model is preferred for software development when the requirement are not clear.
(1) Rapid Application development
(2) Rational Unified Process
(3) Evolutionary Model
(4) Waterfall Model
Answer : 3
43. Which of the following is not included in waterfall model?
(1) Requirement Analysis
(2) Risk Analysis
(3) Design
(4) Coding
Answer : 2
44. The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is :
(1) P+1
(2) P-1
(3) P-2
(4) P+2
Where P is number of predicate nodes in flow graph V(G).
Answer : 1
45. The extent to which a software tolerance the unexpected problems, is termed as
(1) Accuracy
(2) Reliability
(3) Correctness
(4) Robustness
Answer : 4
46. An attacker sits between customer and banker , and captures the information from the customer and retransmits to the banker by altering the information . This attack is called as ______.
(1) Masquerade Attack
(2) Replay attack
(3) Passive Attack
(4) Denial of Service Attack
Answer : 2
47. Consider the following two statements:
(A) Business intelligence and Data warehousing is used for forecasting and data mining.
(B) Business intelligence and Data warehouse is used for analysis of large volume of sales data.
Which one of the following option I correct
(1) (A) is true, (B) is false
(2) Both (A) and (B) are true
(3) (A) is false, (B) is true
(4) Both (A) and (B) are false
Answer : 2
48. Pipelining improves performance by :
(1) Decreasing instruction latency
(2) Eliminating data hazards
(3) Exploiting instruction level parallishm
(4) decreasing the cache rate.
Answer : 3
49. Consider the following two statement :
(A) Data scrubling is a process to upgrade the quality of data , before it is moved into Data warehouse
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which of the following options is correct
(1) (A) is true, (B) is false
(2) (A) is false, (B) is true
(3) Both (A) and (B) are false
Answer : 1
50. Given the following statements
(A) Strategic value of data mining is time stamping.
(B) Information collection is an expensive process in building an expert system.
Which of the following options is correct
(1) Both (A) and (B) are false
(2) Both (A) and (B) are true
(3) (A) is true, (B) is false
(4) (A) is false, (B) is true
Answer : 2
(1) 1+S3/S1
(2) 1-S3/S1
(3) 1+ S1/S3
(4) 1-S1/S3
Answer : 2
42. The _____ Model is preferred for software development when the requirement are not clear.
(1) Rapid Application development
(2) Rational Unified Process
(3) Evolutionary Model
(4) Waterfall Model
Answer : 3
43. Which of the following is not included in waterfall model?
(1) Requirement Analysis
(2) Risk Analysis
(3) Design
(4) Coding
Answer : 2
44. The cyclomatic complexity of a flow graph V(G), in terms of predicate nodes is :
(1) P+1
(2) P-1
(3) P-2
(4) P+2
Where P is number of predicate nodes in flow graph V(G).
Answer : 1
45. The extent to which a software tolerance the unexpected problems, is termed as
(1) Accuracy
(2) Reliability
(3) Correctness
(4) Robustness
Answer : 4
46. An attacker sits between customer and banker , and captures the information from the customer and retransmits to the banker by altering the information . This attack is called as ______.
(1) Masquerade Attack
(2) Replay attack
(3) Passive Attack
(4) Denial of Service Attack
Answer : 2
47. Consider the following two statements:
(A) Business intelligence and Data warehousing is used for forecasting and data mining.
(B) Business intelligence and Data warehouse is used for analysis of large volume of sales data.
Which one of the following option I correct
(1) (A) is true, (B) is false
(2) Both (A) and (B) are true
(3) (A) is false, (B) is true
(4) Both (A) and (B) are false
Answer : 2
48. Pipelining improves performance by :
(1) Decreasing instruction latency
(2) Eliminating data hazards
(3) Exploiting instruction level parallishm
(4) decreasing the cache rate.
Answer : 3
49. Consider the following two statement :
(A) Data scrubling is a process to upgrade the quality of data , before it is moved into Data warehouse
(B) Data scrubling is a process of rejecting data from data warehouse to create indexes.
Which of the following options is correct
(1) (A) is true, (B) is false
(2) (A) is false, (B) is true
(3) Both (A) and (B) are false
Answer : 1
50. Given the following statements
(A) Strategic value of data mining is time stamping.
(B) Information collection is an expensive process in building an expert system.
Which of the following options is correct
(1) Both (A) and (B) are false
(2) Both (A) and (B) are true
(3) (A) is true, (B) is false
(4) (A) is false, (B) is true
Answer : 2
No comments:
Post a Comment