Friday, 23 September 2016

CBSE UGC NET Computer Science Paper II August 2016 (Re-test) - Part 5

41.       Which of the following is used to determine the specificity of requirements ?
(A) n1/n2                        (B) n2/n1
(C) n1+n2           (D) n1–n2
Where n1 is the number of requirements for which all reviewers have identical interpretations, n2 is number of requirements in a specification.
Answer: A
42.       The major shortcoming of waterfall model is
(A) the difficulty in accommodating changes after requirement analysis.
(B) the difficult in accommodating changes after feasibility analysis.
(C) the system testing.
(D) the maintenance of system.
Answer: A
43.       The quick design of a software that is visible to end users leads to ............
(A) iterative model       (B) prototype model
(C) spiral model           (D) waterfall model
Answer: B
44.       For a program of k variables, boundary value analysis yields .............. test cases.
(A) 4k – 1           (B) 4k
(C) 4k + 1          (D) 2k – 1
Answer: C
45.       The extent to which a software performs its intended functions without failures, is termed as
(A) Robustness                        (B) Correctness
(C) Reliability               (D) Accuracy
Answer: C

46.       An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as ..............
(A) Denial of service attack    (B) Masquarade attack
(C) Simple attack                     (D) Complex attack
Answer: A
47.       ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions.
(A) Data mining           (B) Web mining
(C) Data warehouse   (D) Database Management System
Answer: C
48.       In Data mining, classification rules are extracted from ..............
(A) Data                         (B) Information
(C) Decision Tree        (D) Database
Answer: C
49.       Discovery of cross sales opportunities is called as ...............
(A) Association                        (B) Visualization
(C) Correlation             (D) Segmentation
Answer: A
50.    In Data mining, .............. is a method of incremental conceptual clustering.
(A) STRING      (B) COBWEB
(C) CORBA       (D) OLAD
Answer: B

Pages   2   3   4   5 

0 comments:

Post a Comment

UGC NET Computer Science

Computer GK App