Short Questions (60*1=60 Marks)
1. Which of the following is an output device?
2. __________ memory stores frequently accessed data and instructions, enabling faster processing.
3. Which of the following is an application software?
4. Which of the following represents the largest computer network?
5. A protocol that defines how files are exchanged on the web is called _______.
6. Which of the following file types does not represent an image?
7. The process to gather software requirements from a client, analyze and document them is known as ____.
8. What is reference architecture?
9. Which of the following testing is sometimes called Acceptance testing?
10. What is the purpose of representing system behavior in OOAD?
11. In object-oriented design, what does visibility refer to?
12. How are relationships between classes represented when mapping design to code?
13. ______ only mentions what operations are to be performed but not how these operations will be implemented.
14. While exception handling, ______ block is used to enclose one or more statements that might throw an exception.
15. A variable whose value is the address of another variable is called as ……
16. Which of the following represents function overloading?
17. In C programming language, %u is used to indicate the format for ……….
18. The main benefit of the C++ Standard Template Library (STL) is that it provides a way to write generic, reusable code that can be applied to …………
19. ……………….. level is where the model becomes compatible and executable code
20. What is the hash function used in the division method?
21. Redundancy is reduced in a database table by using the ------------ form.
22. It is advisable to store the -------- before applying the actual transaction to the database.
23. To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.
24. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
25. In 8086 microprocessors, there are ………….. addressing modes.
26. The main function of a ……….. is to transfer data between memory and an auxiliary device directly, without involving the CPU.
27. There are …………. software interrupt types in 8086 microprocessors.
28. The instruction which performs logical operation in 8086 microprocessors is ……..
29. As a part of memory management, pages are replaced which would not be used for the longest duration of time in the future with ………… algorithm.
30. In ………. Mode, the entire data is transferred before CPU takes control of the buses back from direct memory access (DMA) controller.
31. During asymptotic analysis, the big-O notation (O) is used to denote ………..
32. Choose the sorting algorithm which is preferable in terms of average case time complexity …………..
33. ………… is an algorithmic approach which develops a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit.
34. …………. is a program residing in a ROM, which is automatically executed by the processor to read the hard drive's boot sector and load the computer’s operating system.
35. Macro processor replaces each macro instruction with the corresponding group of source language statements. This is known as ……….
36. During socket programming, ……… announces willingness to accept connections.
37. In which type of environment, the next state of the environment is completely determined by the current state and the action taken by the agent?
38. Which searching technique is guaranteed to find the optimal solution in a state space search problem, assuming no path costs?
39. What is the main goal of the resolution algorithm in inference?
40. What is the main goal of natural language understanding (NLU)?
41. What is fuzzy learning in machine learning?
42. Which neural network architecture is commonly used for processing sequential data, such as time series or natural language?
43. For a Java source file named “First.java”, which of the following files represent bytecode?
44. For the button source object, its appropriate listener interface is ………..
45. Each time when a servlet is called, which method is called first?
46. Main design aim of XML is to …….. and ……. data.
47. Which of the following method does not fall into CRUD operation?
48. Which of the following is used to call a stored procedure?
49. The ………. scheduling algorithm schedules periodic tasks using a static priority policy by considering the priorities.
50. A real-time operating system is characterized by …………
51. ……………. is characterized by services and applications, which run over a distributed network utilizing virtualized resources.
52. …………. acts as the ‘glue’ between the client and server applications, respectively, and that Object Request Broker (ORB).
53. Which of the following is a type of cloud computing service?
54. If timestamps of two or more events are the same, then the events are called to be …….
55. Standard dimensions (mm x mm) of A3 drawing sheet is
56. Which of the following methods of charging depreciation of an asset has increased amount of depreciation as the age of the asset increases?
57. The process of optimizing the project’s limited resources without extending the project duration is known as
58. The process of composing/raising the required fund from different sources such as equity, preferred stock, bond, and debenture is known as
59. In which of the following societies, people used to seek their existence on growing plants for their cattle and domestic animals?
60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions shall be …………………….. in the Council.
Last updated