Short Questions (60*1=60 Marks)

1. Which of the following is an output device?

  1. ROM

  2. Joystick

  3. Mouse

  4. Printer

Show me the answer

Answer:

4) Printer

Explanation:

Output devices are hardware that communicate the results of computer processes to the user.

  • Printer: Produces physical output, like documents or images.

  • ROM: A type of memory, not an output device.

  • Joystick and Mouse: Input devices.

2. __________ memory stores frequently accessed data and instructions, enabling faster processing.

  1. Cache

  2. RAM

  3. ROM

  4. SSD

Show me the answer

Answer:

1) Cache

Explanation:

Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to the processor. It temporarily stores frequently accessed data to improve processing speed.

3. Which of the following is an application software?

  1. MS Windows 10

  2. Ubuntu 20.04

  3. MS Windows XP

  4. MS Word

Show me the answer

Answer:

4) MS Word

Explanation:

Application software is designed for end-users to perform specific tasks.

  • MS Word: A word processing application software.

  • MS Windows 10, Ubuntu 20.04, and MS Windows XP: Operating systems, not application software.

4. Which of the following represents the largest computer network?

  1. LAN

  2. MAN

  3. Internet

  4. WAN

Show me the answer

Answer:

3) Internet

Explanation:

The Internet is the largest global network connecting millions of private, public, academic, business, and government networks.

  • LAN: Local Area Network, limited to a small area.

  • MAN: Metropolitan Area Network, spans a city or campus.

  • WAN: Wide Area Network, larger than LAN and MAN but smaller than the Internet.

5. A protocol that defines how files are exchanged on the web is called _______.

  1. FTP

  2. SSH

  3. DHCP

  4. HTTP

Show me the answer

Answer:

4) HTTP

Explanation:

HTTP (HyperText Transfer Protocol) defines the rules for transferring files like text, images, and videos over the web.

  • FTP: File Transfer Protocol for transferring files between systems.

  • SSH: Secure Shell, used for secure access to remote computers.

  • DHCP: Dynamic Host Configuration Protocol, used for IP address management.

6. Which of the following file types does not represent an image?

  1. .tif

  2. .jpeg

  3. .png

  4. .gif

Show me the answer

Answer:

1) .tif

Explanation:

.tif is primarily used for scanned documents and is often associated with image formats, but it is less commonly used for general-purpose images compared to .jpeg, .png, and .gif.

7. The process to gather software requirements from a client, analyze and document them is known as ____.

  1. Feasibility Study

  2. Requirement Gathering

  3. Requirement Engineering

  4. System Requirements Specification

Show me the answer

Answer:

3) Requirement Engineering

Explanation:

Requirement Engineering involves gathering, analyzing, and documenting the client's needs and requirements for the software development process.

  • Feasibility Study: Determines whether a project is viable.

  • Requirement Gathering: A subset of Requirement Engineering focused on collecting requirements.

  • Project Analysis: Broader term that may include various project management tasks.

8. What is reference architecture?

  1. It is a reference model mapped onto software components

  2. It provides data flow with comments

  3. It provides data flow with pieces

  4. It is a reference model mapped onto software components & data flow with comments

Show me the answer

Answer:

4) It is a reference model mapped onto software components & data flow with comments

Explanation:

Reference architecture is a standardized, high-level architecture model that provides guidelines for designing systems, including software components and their data flows, often accompanied by explanatory comments.

9. Which of the following testing is sometimes called Acceptance testing?

  1. White-box testing

  2. Grey box testing

  3. Alpha testing

  4. Beta testing

Show me the answer

Answer:

4) Beta testing

Explanation:

Beta testing is often considered a form of acceptance testing because it involves real users testing the software to determine if it meets their requirements and expectations before it is released to the public.

  • Alpha testing: Conducted internally by developers.

  • White-box testing: Focuses on testing the internal workings of the software.

  • Grey-box testing: A combination of black-box and white-box testing.

10. What is the purpose of representing system behavior in OOAD?

  1. To document system architecture and components

  2. To identify potential risks and challenges

  3. To understand and model the dynamic aspects of the system

  4. To create user interfaces and interactions

Show me the answer

Answer:

3) To understand and model the dynamic aspects of the system

Explanation:

In Object-Oriented Analysis and Design (OOAD), representing system behavior is critical for modeling the dynamic aspects, such as object interactions and state changes, during the system's operation.

11. In object-oriented design, what does visibility refer to?

  1. The physical appearance of an object.

  2. The accessibility of class members from other parts of the program.

  3. The process of creating instances of classes.

  4. The relationship between classes in a system.

Show me the answer

Answer:

2) The accessibility of class members from other parts of the program

Explanation:

In OO design, visibility refers to the scope and access control of class members (fields, methods), determining whether they are public, private, or protected, and how they can be accessed from outside the class.

12. How are relationships between classes represented when mapping design to code?

  1. Through inheritance and implementation of interfaces.

  2. Through the use of composition and aggregation.

  3. Through static method calls and global variables.

  4. Through conditional statements and loops.

Show me the answer

Answer:

2) Through the use of composition and aggregation

Explanation:

In object-oriented design, relationships between classes are often represented using composition (a "has-a" relationship) and aggregation (a weaker "has-a" relationship), which map to class interactions in code.

13. ______ only mentions what operations are to be performed but not how these operations will be implemented.

  1. Function

  2. Abstract Data Types

  3. Class

  4. Object

Show me the answer

Answer:

2) Abstract Data Types

Explanation:

Abstract Data Types (ADT) define operations that can be performed on data but do not specify the internal implementation details. They focus on the "what" rather than the "how".

14. While exception handling, ______ block is used to enclose one or more statements that might throw an exception.

  1. try

  2. catch

  3. throw

  4. finally

Show me the answer

Answer:

1) try

Explanation:

The try block is used to enclose the code that might throw an exception. If an exception occurs, it is handled by the catch block. The finally block is used for cleanup tasks, and throw is used to explicitly throw an exception.

15. A variable whose value is the address of another variable is called as ……

  1. keyword

  2. constant

  3. pointer

  4. identifier

Show me the answer

Answer:

3) pointer

Explanation:

A pointer is a variable that holds the memory address of another variable. It is used to refer to the location of a value rather than the value itself.

16. Which of the following represents function overloading?

  1. void add ( int a, int b), void add( double a, double b)

  2. int add_int ( int a, int b), float add_float( float a, float b)

  3. add ( int a, int b), add_int ( int a, int b)

  4. void add ( int a, int b), void add_int ( int a, int b)

Show me the answer

Answer:

1) void add ( int a, int b), void add( double a, double b)

Explanation:

Function overloading occurs when multiple functions have the same name but differ in parameters (either in type or number of arguments). Option 1 is an example of function overloading because both functions share the same name "add" but take different parameter types (int vs. double).

17. In C programming language, %u is used to indicate the format for ……….

  1. short int

  2. long int

  3. int

  4. unsigned int

Show me the answer

Answer:

4) unsigned int

Explanation:

The %u format specifier is used to print an unsigned int (a positive integer) in C. It is used when working with values that cannot be negative.

18. The main benefit of the C++ Standard Template Library (STL) is that it provides a way to write generic, reusable code that can be applied to …………

  1. override functions

  2. different data types.

  3. same data type.

  4. overloaded functions.

Show me the answer

Answer:

2) different data types.

Explanation:

The C++ Standard Template Library (STL) allows developers to write generic code that works with different data types through templates. This promotes code reuse and flexibility across various data types.

19. ……………….. level is where the model becomes compatible and executable code

  1. Abstract level

  2. Application level

  3. Implementation level

  4. All of the above

Show me the answer

Answer:

3) Implementation level

Explanation:

The Implementation level is where the model is translated into executable code, making it functional and compatible with the execution environment. This is the stage where design concepts become tangible software.

20. What is the hash function used in the division method?

  1. h(k) = k/m

  2. h(k) = k mod m

  3. h(k) = m/k

  4. h(k) = m mod k

Show me the answer

Answer:

2) h(k) = k mod m

Explanation:

In the division method for hashing, the hash function is h(k) = k mod m, where k is the key, and m is the size of the hash table. This method computes the remainder when dividing the key by the table size.

21. Redundancy is reduced in a database table by using the ------------ form.

  1. Abnormal

  2. Normal

  3. Special

  4. Exactly

Show me the answer

Answer:

2) Normal

Explanation:

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. This involves dividing a database into smaller tables and ensuring each table contains data only relevant to a single subject.

22. It is advisable to store the -------- before applying the actual transaction to the database.

  1. Data

  2. Logs

  3. Receive

  4. Record

Show me the answer

Answer:

2) Logs

Explanation:

It is advisable to store logs before applying transactions to a database. This helps to track the changes made to the data and ensures that any changes can be undone or retraced in case of an error or system failure.

23. To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.

  1. Mutual Exclusion

  2. Synchronization

  3. Deadlock

  4. Starvation

Show me the answer

Answer:

1) Mutual Exclusion

Explanation:

Mutual Exclusion ensures that multiple processes do not access shared resources simultaneously, preventing conflicts and data inconsistencies. The enter-critical and exit-critical functions are used to control access to the critical section of code.

24. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?

  1. Administrator User account

  2. Standard User account

  3. Power User account

  4. Authenticated User account

Show me the answer

Answer:

1) Administrator User account

Explanation:

An Administrator User account allows a user to perform administrative tasks that require elevated privileges, such as installing software, changing system settings, and managing user accounts.

25. In 8086 microprocessors, there are ………….. addressing modes.

  1. 11

  2. 5

  3. 8

  4. 13

Show me the answer

Answer:

2) 5

Explanation:

The 8086 microprocessor supports 5 addressing modes, which allow the CPU to access operands in different ways, such as through direct, indirect, or indexed addressing.

26. The main function of a ……….. is to transfer data between memory and an auxiliary device directly, without involving the CPU.

  1. DMA controller

  2. Asynchronous Transmission

  3. Synchronous Transmission

  4. Parallel Interface

Show me the answer

Answer:

1) DMA controller

Explanation:

A DMA (Direct Memory Access) controller allows data to be transferred between memory and peripheral devices without CPU involvement, which improves system performance by reducing CPU workload.

27. There are …………. software interrupt types in 8086 microprocessors.

  1. 128

  2. 256

  3. 200

  4. 512

Show me the answer

Answer:

2) 256

Explanation:

The 8086 microprocessor supports 256 software interrupt types (interrupt vectors 00h to FFh), which are used to handle various system-level and application-level interrupt requests.

28. The instruction which performs logical operation in 8086 microprocessors is ……..

  1. XOR

  2. AAD

  3. JMP

  4. CLC

Show me the answer

Answer:

1) XOR

Explanation:

The XOR instruction performs a logical exclusive OR operation between two operands, which is commonly used in bitwise logical operations in the 8086 microprocessor.

29. As a part of memory management, pages are replaced which would not be used for the longest duration of time in the future with ………… algorithm.

  1. First in first out

  2. Optimal page replacement

  3. Least recently used

  4. Most recently used

Show me the answer

Answer:

2) Optimal page replacement

Explanation:

The Optimal page replacement algorithm replaces the page that will not be used for the longest period of time in the future. This algorithm aims to minimize page faults but is not feasible for implementation due to the requirement of future knowledge.

30. In ………. Mode, the entire data is transferred before CPU takes control of the buses back from direct memory access (DMA) controller.

  1. Cycle stealing mode

  2. Burst mode

  3. Interleaving mode

  4. Non-interleaving mode

Show me the answer

Answer:

2) Burst mode

Explanation:

In Burst mode, the DMA controller transfers the entire block of data in one go without interruption, after which the CPU takes control of the buses.

31. During asymptotic analysis, the big-O notation (O) is used to denote ………..

  1. Average case

  2. Best case

  3. Worst case

  4. Optimal case

Show me the answer

Answer:

3) Worst case

Explanation:

Big-O notation is used to describe the upper bound or worst-case time complexity of an algorithm. It helps in understanding how the algorithm performs under the most challenging conditions.

32. Choose the sorting algorithm which is preferable in terms of average case time complexity …………..

  1. Insertion

  2. Selection

  3. Bubble

  4. Quick

Show me the answer

Answer:

4) Quick

Explanation:

Quick Sort is generally preferred for sorting in terms of average case time complexity as it has an average time complexity of O(n log n), which is faster than the other options.

33. ………… is an algorithmic approach which develops a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit.

  1. Greedy approach

  2. Searching approach

  3. Divide and conquer approach

  4. Backtracking approach

Show me the answer

Answer:

1) Greedy approach

Explanation:

The Greedy approach solves problems by selecting the best option available at the moment, without worrying about future consequences, aiming for an optimal solution.

34. …………. is a program residing in a ROM, which is automatically executed by the processor to read the hard drive's boot sector and load the computer’s operating system.

  1. Linker

  2. Bootloader

  3. Program linker

  4. Macro processor

Show me the answer

Answer:

2) Bootloader

Explanation:

The Bootloader is a small program stored in ROM that initializes the system and loads the operating system from storage into memory at startup.

35. Macro processor replaces each macro instruction with the corresponding group of source language statements. This is known as ……….

  1. Macro linking

  2. Macro execution

  3. Macro call

  4. Macro expansion

Show me the answer

Answer:

4) Macro expansion

Explanation:

Macro expansion refers to the process of replacing a macro instruction with the corresponding group of source language statements as defined in the macro definition.

36. During socket programming, ……… announces willingness to accept connections.

  1. Accept

  2. Bind

  3. Socket

  4. Listen

Show me the answer

Answer:

4) Listen

Explanation:

The listen function is used in socket programming to announce that the server is ready to accept incoming connection requests from clients.

37. In which type of environment, the next state of the environment is completely determined by the current state and the action taken by the agent?

  1. Observable environment

  2. Deterministic environment

  3. Episodic environment

  4. Static environment

Show me the answer

Answer:

2) Deterministic environment

Explanation:

In a deterministic environment, the future state of the environment is completely predictable, based solely on the current state and the action taken by the agent.

38. Which searching technique is guaranteed to find the optimal solution in a state space search problem, assuming no path costs?

  1. Depth-first search (DFS)

  2. Breadth-first search (BFS)

  3. Hill climbing

  4. A* search

Show me the answer

Answer:

2) Breadth-first search (BFS)

Explanation:

Breadth-first search (BFS) is guaranteed to find the optimal solution when there are no path costs, as it explores all states level by level.

39. What is the main goal of the resolution algorithm in inference?

  1. To derive new logical axioms

  2. To simplify logical expressions

  3. To prove the satisfiability or un-satisfiability of a given set of logical statements

  4. To find contradictions in the knowledge base

Show me the answer

Answer:

3) To prove the satisfiability or un-satisfiability of a given set of logical statements

Explanation:

The resolution algorithm is used in logic-based inference systems to prove whether a set of logical statements is satisfiable or unsatisfiable by deriving contradictions.

40. What is the main goal of natural language understanding (NLU)?

  1. Translating text from one language to another

  2. Generating human-like responses to user queries

  3. Analyzing and interpreting the meaning of natural language text

  4. Extracting entities and their relationships from a text

Show me the answer

Answer:

3) Analyzing and interpreting the meaning of natural language text

Explanation:

Natural Language Understanding (NLU) aims to analyze and interpret the meaning of text written in natural language, enabling machines to comprehend human communication.

41. What is fuzzy learning in machine learning?

  1. A type of learning algorithm that uses fuzzy logic to handle uncertain or imprecise data

  2. A learning technique that focuses on training neural networks with fuzzy inputs

  3. A method that uses fuzzy inference to make predictions based on labelled data

  4. A learning approach that emphasizes the use of fuzzy clustering algorithms

Show me the answer

Answer:

1) A type of learning algorithm that uses fuzzy logic to handle uncertain or imprecise data

Explanation:

Fuzzy learning applies fuzzy logic to deal with uncertain or imprecise data, enabling machines to model and handle ambiguity in real-world problems.

42. Which neural network architecture is commonly used for processing sequential data, such as time series or natural language?

  1. Feed-forward neural network (FNN)

  2. Self-organizing map (SOM)

  3. Radial basis function network (RBFN)

  4. Recurrent neural network (RNN)

Show me the answer

Answer:

4) Recurrent neural network (RNN)

Explanation:

Recurrent Neural Networks (RNNs) are specifically designed to handle sequential data, making them ideal for time series and natural language processing tasks.

43. For a Java source file named “First.java”, which of the following files represent bytecode?

  1. First.java

  2. First.class

  3. First.exe

  4. First.bin

Show me the answer

Answer:

2) First.class

Explanation:

When a Java source file is compiled, the bytecode is saved with a .class extension. This bytecode can then be run on any platform with a compatible Java Virtual Machine (JVM).

44. For the button source object, its appropriate listener interface is ………..

  1. ItemListener

  2. MouseListener

  3. ActionListener

  4. WindowListener

Show me the answer

Answer:

3) ActionListener

Explanation:

The ActionListener interface is used for handling button clicks or action events in Java. It captures actions like pressing a button or selecting a menu item.

45. Each time when a servlet is called, which method is called first?

  1. start()

  2. init()

  3. run()

  4. service()

Show me the answer

Answer:

2) init()

Explanation:

The init() method is called first when a servlet is loaded, and it is used for initializing the servlet before it handles any client requests.

46. Main design aim of XML is to …….. and ……. data.

  1. store, style

  2. design, transport

  3. store, transport

  4. design, style

Show me the answer

Answer:

3) store, transport

Explanation:

XML (Extensible Markup Language) is designed primarily to store and transport data, providing a way to structure and exchange information between different systems.

47. Which of the following method does not fall into CRUD operation?

  1. create

  2. delete

  3. update

  4. init

Show me the answer

Answer:

4) init

Explanation:

init() is a method in servlets for initialization, not a CRUD (Create, Read, Update, Delete) operation. CRUD operations involve managing data, while init() initializes the servlet.

48. Which of the following is used to call a stored procedure?

  1. Statement

  2. PreparedStatement

  3. CrudeStatement

  4. CallableStatement

Show me the answer

Answer:

4) CallableStatement

Explanation:

CallableStatement is used to call stored procedures in a database. It allows calling functions or procedures in SQL from a Java application.

49. The ………. scheduling algorithm schedules periodic tasks using a static priority policy by considering the priorities.

  1. Round robin

  2. Shortest job first

  3. First come first serve

  4. Rate monotonic

Show me the answer

Answer:

4) Rate monotonic

Explanation:

Rate monotonic scheduling is a fixed priority algorithm for scheduling periodic tasks, where tasks with shorter periods are given higher priorities.

50. A real-time operating system is characterized by …………

  1. all processes have the same priority.

  2. all tasks must be serviced by its deadline period.

  3. sometimes the deadline may be missed when ensuring a high level of accuracy.

  4. The Kernel is not required.

Show me the answer

Answer:

2) all tasks must be serviced by its deadline period.

Explanation:

A real-time operating system (RTOS) ensures that tasks are completed within a defined time frame or deadline, which is a key characteristic for time-sensitive applications.

51. ……………. is characterized by services and applications, which run over a distributed network utilizing virtualized resources.

  1. Parallel computing

  2. Distributed computing

  3. Client server computing

  4. Cloud computing

Show me the answer

Answer:

2) Distributed computing

Explanation:

Distributed computing involves services and applications running over a distributed network, using virtualized resources across multiple machines or locations.

52. …………. acts as the ‘glue’ between the client and server applications, respectively, and that Object Request Broker (ORB).

  1. ORB interface

  2. Dynamic invocation interface

  3. Object adapter

  4. CORBA IDL stubs and skeletons

Show me the answer

Answer:

3) Object adapter

Explanation:

The Object adapter in CORBA acts as the 'glue' between the client and server applications by managing the communication and interaction between the objects in the distributed environment.

53. Which of the following is a type of cloud computing service?

  1. Software-as-a-Service (SaaS)

  2. Software-as-a-Server (SaaS)

  3. Service-as-a-Server (SaaS)

  4. Service-as-a-Software (SaaS)

Show me the answer

Answer:

1) Software-as-a-Service (SaaS)

Explanation:

SaaS (Software-as-a-Service) is a cloud computing service model where software applications are hosted on the cloud and made available to users over the internet.

54. If timestamps of two or more events are the same, then the events are called to be …….

  1. non-monotonic

  2. monolithic

  3. monotonic

  4. concurrent

Show me the answer

Answer:

4) concurrent

Explanation:

When two or more events have the same timestamp, they are considered concurrent, meaning that they occur at the same time but not necessarily in any specific order.

55. Standard dimensions (mm x mm) of A3 drawing sheet is

  1. 11.69 × 16.54

  2. 29.7 × 42

  3. 297 × 420

  4. 420 × 280

Show me the answer

Answer:

3) 297 × 420

Explanation:

The standard dimensions of an A3 drawing sheet are 297 mm × 420 mm. This is part of the ISO 216 standard for paper sizes.

56. Which of the following methods of charging depreciation of an asset has increased amount of depreciation as the age of the asset increases?

  1. sum-of-year digit

  2. sinking fund

  3. diminishing balance

  4. straight line

Show me the answer

Answer:

3) diminishing balance

Explanation:

The diminishing balance method of depreciation charges a larger amount of depreciation in the earlier years of the asset's life, with the amount decreasing over time.

57. The process of optimizing the project’s limited resources without extending the project duration is known as

  1. project crashing

  2. resource levelling

  3. resource smoothing

  4. networking

Show me the answer

Answer:

3) resource smoothing

Explanation:

Resource smoothing is the process of adjusting the project’s resource usage to optimize the allocation without changing the project’s duration. It ensures that resources are used efficiently within the available limits.

58. The process of composing/raising the required fund from different sources such as equity, preferred stock, bond, and debenture is known as

  1. capital structure planning

  2. project financing

  3. capital budgeting decision

  4. deducing earning per share

Show me the answer

Answer:

1) capital structure planning

Explanation:

Capital structure planning refers to the process of determining the best mix of financing for a company, which includes raising funds from different sources like equity, bonds, and debentures.

59. In which of the following societies, people used to seek their existence on growing plants for their cattle and domestic animals?

  1. pastoral society

  2. tribal society

  3. horticultural society

  4. agricultural society

Show me the answer

Answer:

3) horticultural society

Explanation:

Horticultural societies focus on the cultivation of plants primarily for subsistence. They often grow plants to feed themselves and their livestock, unlike agricultural societies, which use large-scale farming practices.

60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions shall be …………………….. in the Council.

  1. affiliated

  2. united

  3. recognized

  4. associated

Show me the answer

Answer:

3) recognized

Explanation:

According to the Nepal Engineering Council Act, engineering academic institutions must be recognized by the Council to ensure they meet the required standards for engineering education.

Last updated