CBSE NET COMPUTER SCIENCE AUGUST 2016 PAPER 2 (RE-TEST) PART-5


Pages : 1 2 3 4 5


  1. Which of the following is used to determine the specificity of requirements ?

(A) n1/n2 (B) n2/n1

(C) n1+n2 (D) n1–n2

Where n1 is the number of requirements for which all reviewers have identical interpretations, n2 is number of requirements in a specification.

Answer: A

Dont confuse with A and B

August 2016 retest paper 2 CBSE net


  1. The major shortcoming of waterfall model is

(A) the difficulty in accommodating changes after requirement analysis.

(B) the difficult in accommodating changes after feasibility analysis.

(C) the system testing.

(D) the maintenance of system.

Answer: A

Explanation:

The main drawback of the waterfall model is the difficulty of accommodating change after the process is underway. In principle, a phase has to be complete before moving onto the next phase. Waterfall model problems include:

1) Difficult to address change

Inflexible partitioning of the project into distinct stages makes it difficult to respond to changing customer requirements. Therefore, this model is only appropriate when the requirements are well-understood and changes will be fairly limited during the design process. Few business systems have stable requirements.

2) Very few real-world applications

The waterfall model is mostly used for large systems engineering projects where a system is developed at several sites. In those circumstances, the plan-driven nature of the waterfall model helps coordinate the work.


  1. The quick design of a software that is visible to end users leads to …………

(A) iterative model (B) prototype model

(C) spiral model (D) waterfall model

Answer: B

Explanation:

Prototype model: The basic idea here is that instead of freezing the requirements before a design or coding can proceed, a throwaway prototype is built to understand the requirements. This prototype is developed based on the currently known requirements. By using this prototype, the client can get an “actual feel” of the system, since the interactions with prototype can enable the client to better understand the requirements of the desired system. Prototyping is an attractive idea for complicated and large systems for which there is no manual process or existing system to help determining the requirements.

Waterfall model is the simplest model of software development paradigm. It says the all the phases of SDLC will function one after another in linear manner.

Iterative model leads the software development process in iterations. It projects the process of development in cyclic manner repeating every step after every cycle of SDLC process.

V-model‘ is also used by many of the companies in their product. ‘V-model’ is nothing but ‘Verification’ and ‘Validation’ model. In ‘V-model’ the developer’s life cycle and tester’s life cycle are mapped to each other. In this model testing is done side by side of the development.

Likewise ‘Incremental model’, ‘RAD model’, ‘Iterative model’ and ‘Spiral model’ are also used based on the requirement of the customer and need of the product.

Big Bang Model





This model is the simplest model in its form. It requires little planning, lots of programming and lots of funds. This model is conceptualized around the big bang of universe.


  1. For a program of k variables, boundary value analysis yields ………….. test cases.

(A) 4k – 1 (B) 4k

(C) 4k + 1 (D) 2k – 1

Answer: C

Explanation:

boundary value analysis 4n+1

Robusness testing 6n+1

worst case testing 5n


  1. The extent to which a software performs its intended functions without failures, is termed as

(A) Robustness (B) Correctness

(C) Reliability (D) Accuracy

Answer: C

Explanation:

Reliability is the probability of failure-free operation of a system over a specified time within a specified environment for a specified purpose

Robustness is the ability of a computer system to cope with errors during execution and cope with erroneous input.

Correctness of an algorithm is asserted when it is said that the algorithm is correct with respect to a specification

Accuracy of a measurement system is the degree of closeness of measurements of a quantity to that quantity’s true value


  1. An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as …………..

(A) Denial of service attack (B) Masquarade attack

(C) Simple attack (D) Complex attack

Answer: A

Explanation:

Simple And Complex Attack-:Heard first time of this type of attack,classification is actually active and passive attack.

Denial of service attack-:Not Giving/allowing Legitimate user to access /use his resources which he is supposed to use.

Masquarade attack-:Using fake identity to gain unauthorized access.

Given Question is a type of Man in the middle attack.


  1. …………….. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions.

(A) Data mining (B) Web mining

(C) Data warehouse (D) Database Management System

Answer: C

Explanation:

DATA WAREHOUSE is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions.a large store of data accumulated from a wide range of sources within a company and used to guide management decisions.


  1. In Data mining, classification rules are extracted from …………..

(A) Data (B) Information

(C) Decision Tree (D) Database

Answer: C

Explanation:

A decision tree is a graph that uses a branching method to illustrate every possible outcome of a decision.

Decision trees can be drawn by hand or created with a graphics program or specialized software. Informally, decision trees are useful for focusing discussion when a group must make a decision and classification rules are extracted from Decision tree


  1. Discovery of cross sales opportunities is called as ……………

(A) Association (B) Visualization

(C) Correlation (D) Segmentation

Answer: A

Explanation:

Cross-selling is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways. Elements that might influence the definition might include the size of the business, the industry sector it operates within and the financial motivations of those required to define the term.

The objectives of cross-selling can be either to increase the income derived from the client or to protect the relationship with the client or clients. The approach to the process of cross-selling can be varied.


  1. In Data mining, ………….. is a method of incremental conceptual clustering.

(A) STRING (B) COBWEB

(C) CORBA (D) OLAD

Answer: B

Explanation:

Conceptual clustering is a machine learning paradigm for unsupervised classification developed mainly during the 1980s. It is distinguished from ordinary data clustering by generating a concept description for each generated class. Most conceptual clustering methods are capable of generating hierarchical category structures; see Categorizationfor more information on hierarchy. Conceptual clustering is closely related to formal concept analysis, decision tree learning, and mixture model learning.

A fair number of algorithms have been proposed for conceptual clustering. Some examples are given below:


  • CLUSTER/2 (Michalski & Stepp 1983)
  • COBWEB (Fisher 1987)
  • CYRUS (Kolodner 1983)
  • GALOIS (Carpineto & Romano 1993),
  • GCF (Talavera & Béjar 2001)
  • INC (Hadzikadic & Yun 1989)
  • ITERATE (Biswas, Weinberg & Fisher 1998),
  • LABYRINTH (Thompson & Langley 1989)
  • SUBDUE (Jonyer, Cook & Holder 2001).
  • UNIMEM (Lebowitz 1987)
  • WITT (Hanson & Bauer 1989),

More general discussions and reviews of conceptual clustering can be found in the following publications:

  • Michalski (1980)
  • Gennari, Langley, & Fisher (1989)
  • Fisher & Pazzani (1991)
  • Fisher & Langley (1986)
  • Stepp & Michalski (1986)

source: wikipedia
Pages : 1 2 3 4 5


 

Leave a comment