Short Questions (60*1=60 Marks)
1. Which of the following is an output device?
ROM
Joystick
Mouse
Printer
2. __________ memory stores frequently accessed data and instructions, enabling faster processing.
Cache
RAM
ROM
SSD
3. Which of the following is an application software?
MS Windows 10
Ubuntu 20.04
MS Windows XP
MS Word
4. Which of the following represents the largest computer network?
LAN
MAN
Internet
WAN
5. A protocol that defines how files are exchanged on the web is called _______.
FTP
SSH
DHCP
HTTP
6. Which of the following file types does not represent an image?
.tif
.jpeg
.png
.gif
7. The process to gather software requirements from a client, analyze and document them is known as ____.
Feasibility Study
Requirement Gathering
Requirement Engineering
System Requirements Specification
8. What is reference architecture?
It is a reference model mapped onto software components
It provides data flow with comments
It provides data flow with pieces
It is a reference model mapped onto software components & data flow with comments
9. Which of the following testing is sometimes called Acceptance testing?
White-box testing
Grey box testing
Alpha testing
Beta testing
10. What is the purpose of representing system behavior in OOAD?
To document system architecture and components
To identify potential risks and challenges
To understand and model the dynamic aspects of the system
To create user interfaces and interactions
11. In object-oriented design, what does visibility refer to?
The physical appearance of an object.
The accessibility of class members from other parts of the program.
The process of creating instances of classes.
The relationship between classes in a system.
12. How are relationships between classes represented when mapping design to code?
Through inheritance and implementation of interfaces.
Through the use of composition and aggregation.
Through static method calls and global variables.
Through conditional statements and loops.
13. ______ only mentions what operations are to be performed but not how these operations will be implemented.
Function
Abstract Data Types
Class
Object
14. While exception handling, ______ block is used to enclose one or more statements that might throw an exception.
try
catch
throw
finally
15. A variable whose value is the address of another variable is called as ……
keyword
constant
pointer
identifier
16. Which of the following represents function overloading?
void add ( int a, int b), void add( double a, double b)
int add_int ( int a, int b), float add_float( float a, float b)
add ( int a, int b), add_int ( int a, int b)
void add ( int a, int b), void add_int ( int a, int b)
17. In C programming language, %u is used to indicate the format for ……….
short int
long int
int
unsigned int
18. The main benefit of the C++ Standard Template Library (STL) is that it provides a way to write generic, reusable code that can be applied to …………
override functions
different data types.
same data type.
overloaded functions.
19. ……………….. level is where the model becomes compatible and executable code
Abstract level
Application level
Implementation level
All of the above
20. What is the hash function used in the division method?
h(k) = k/m
h(k) = k mod m
h(k) = m/k
h(k) = m mod k
21. Redundancy is reduced in a database table by using the ------------ form.
Abnormal
Normal
Special
Exactly
22. It is advisable to store the -------- before applying the actual transaction to the database.
Data
Logs
Receive
Record
23. To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.
Mutual Exclusion
Synchronization
Deadlock
Starvation
24. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
Administrator User account
Standard User account
Power User account
Authenticated User account
25. In 8086 microprocessors, there are ………….. addressing modes.
11
5
8
13
26. The main function of a ……….. is to transfer data between memory and an auxiliary device directly, without involving the CPU.
DMA controller
Asynchronous Transmission
Synchronous Transmission
Parallel Interface
27. There are …………. software interrupt types in 8086 microprocessors.
128
256
200
512
28. The instruction which performs logical operation in 8086 microprocessors is ……..
XOR
AAD
JMP
CLC
29. As a part of memory management, pages are replaced which would not be used for the longest duration of time in the future with ………… algorithm.
First in first out
Optimal page replacement
Least recently used
Most recently used
30. In ………. Mode, the entire data is transferred before CPU takes control of the buses back from direct memory access (DMA) controller.
Cycle stealing mode
Burst mode
Interleaving mode
Non-interleaving mode
31. During asymptotic analysis, the big-O notation (O) is used to denote ………..
Average case
Best case
Worst case
Optimal case
32. Choose the sorting algorithm which is preferable in terms of average case time complexity …………..
Insertion
Selection
Bubble
Quick
33. ………… is an algorithmic approach which develops a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit.
Greedy approach
Searching approach
Divide and conquer approach
Backtracking approach
34. …………. is a program residing in a ROM, which is automatically executed by the processor to read the hard drive's boot sector and load the computer’s operating system.
Linker
Bootloader
Program linker
Macro processor
35. Macro processor replaces each macro instruction with the corresponding group of source language statements. This is known as ……….
Macro linking
Macro execution
Macro call
Macro expansion
36. During socket programming, ……… announces willingness to accept connections.
Accept
Bind
Socket
Listen
37. In which type of environment, the next state of the environment is completely determined by the current state and the action taken by the agent?
Observable environment
Deterministic environment
Episodic environment
Static environment
38. Which searching technique is guaranteed to find the optimal solution in a state space search problem, assuming no path costs?
Depth-first search (DFS)
Breadth-first search (BFS)
Hill climbing
A* search
39. What is the main goal of the resolution algorithm in inference?
To derive new logical axioms
To simplify logical expressions
To prove the satisfiability or un-satisfiability of a given set of logical statements
To find contradictions in the knowledge base
40. What is the main goal of natural language understanding (NLU)?
Translating text from one language to another
Generating human-like responses to user queries
Analyzing and interpreting the meaning of natural language text
Extracting entities and their relationships from a text
41. What is fuzzy learning in machine learning?
A type of learning algorithm that uses fuzzy logic to handle uncertain or imprecise data
A learning technique that focuses on training neural networks with fuzzy inputs
A method that uses fuzzy inference to make predictions based on labelled data
A learning approach that emphasizes the use of fuzzy clustering algorithms
42. Which neural network architecture is commonly used for processing sequential data, such as time series or natural language?
Feed-forward neural network (FNN)
Self-organizing map (SOM)
Radial basis function network (RBFN)
Recurrent neural network (RNN)
43. For a Java source file named “First.java”, which of the following files represent bytecode?
First.java
First.class
First.exe
First.bin
44. For the button source object, its appropriate listener interface is ………..
ItemListener
MouseListener
ActionListener
WindowListener
45. Each time when a servlet is called, which method is called first?
start()
init()
run()
service()
46. Main design aim of XML is to …….. and ……. data.
store, style
design, transport
store, transport
design, style
47. Which of the following method does not fall into CRUD operation?
create
delete
update
init
48. Which of the following is used to call a stored procedure?
Statement
PreparedStatement
CrudeStatement
CallableStatement
49. The ………. scheduling algorithm schedules periodic tasks using a static priority policy by considering the priorities.
Round robin
Shortest job first
First come first serve
Rate monotonic
50. A real-time operating system is characterized by …………
all processes have the same priority.
all tasks must be serviced by its deadline period.
sometimes the deadline may be missed when ensuring a high level of accuracy.
The Kernel is not required.
51. ……………. is characterized by services and applications, which run over a distributed network utilizing virtualized resources.
Parallel computing
Distributed computing
Client server computing
Cloud computing
52. …………. acts as the ‘glue’ between the client and server applications, respectively, and that Object Request Broker (ORB).
ORB interface
Dynamic invocation interface
Object adapter
CORBA IDL stubs and skeletons
53. Which of the following is a type of cloud computing service?
Software-as-a-Service (SaaS)
Software-as-a-Server (SaaS)
Service-as-a-Server (SaaS)
Service-as-a-Software (SaaS)
54. If timestamps of two or more events are the same, then the events are called to be …….
non-monotonic
monolithic
monotonic
concurrent
55. Standard dimensions (mm x mm) of A3 drawing sheet is
11.69 × 16.54
29.7 × 42
297 × 420
420 × 280
56. Which of the following methods of charging depreciation of an asset has increased amount of depreciation as the age of the asset increases?
sum-of-year digit
sinking fund
diminishing balance
straight line
57. The process of optimizing the project’s limited resources without extending the project duration is known as
project crashing
resource levelling
resource smoothing
networking
58. The process of composing/raising the required fund from different sources such as equity, preferred stock, bond, and debenture is known as
capital structure planning
project financing
capital budgeting decision
deducing earning per share
59. In which of the following societies, people used to seek their existence on growing plants for their cattle and domestic animals?
pastoral society
tribal society
horticultural society
agricultural society
60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions shall be …………………….. in the Council.
affiliated
united
recognized
associated
Last updated