Short Questions (60*1=60 Marks)
1. Decibel relation for power gain is:
Show me the answer
2. Maximum power that can be transferred from source to load is:
- 25%
- 75%
- 50%
- 100%
Show me the answer
3. Power factor has maximum value of:
- 0.0
- 0.5
- 1.0
- 1.5
Show me the answer
4. EEPROM has a drain and floating gate gap of:
- 5 nm
- 10 nm
- 12 nm
- 15 nm
Show me the answer
5. Heisenberg principle of uncertainty says:
- Signal of 10Hz can be generated.
- Signal of 10MHz can be generated.
- Signal of 100MHz can be generated.
- Signal of band 100MHz-105MHz can be generated.
Show me the answer
Answer:
4) Signal of band 100MHz-105MHz can be generated
Explanation:
According to the Heisenberg Uncertainty Principle:
- The uncertainty in time and frequency is related as:
- This implies that precise signals cannot be generated at a single frequency, but rather within a band of frequencies. Hence, a signal band of 100MHz-105MHz is feasible.
6. UHF frequency signal can be amplified using:
- Class A amplifier
- Class AB amplifier
- Class C amplifier
- Class B amplifier
Show me the answer
Answer:
3) Class C amplifier
Explanation:
- UHF (Ultra-High Frequency) signals operate in the range of 300 MHz to 3 GHz.
- Class C amplifiers are specifically designed for high-frequency applications like UHF due to their high efficiency and narrowband operation.
- These amplifiers are commonly used in RF transmitters.
7. Two’s complement of 00011011 is:
- 11100100
- 11100101
- 11000101
- 11110001
Show me the answer
8. Elementary building block of combinational circuit is:
- Logic gate
- Flip-flop
- Both logic gate and flip-flop
- Memory
Show me the answer
9. Synchronous circuit that changes its state at specific clock signal is:
- Event driven
- Clock driven
- Pulse driven
- Frequency driven
Show me the answer
10. Bandwidth of microprocessor represents:
- Clock speed
- Width of internal bus
- Number of bits processed per instruction
- Number of bits processed per second
Show me the answer
Answer:
3) Number of bits processed per instruction
Explanation:
- The bandwidth of a microprocessor refers to the number of bits it can process in a single instruction.
- For instance, an 8-bit microprocessor processes 8 bits per instruction.
- This is determined by the architecture and design of the processor.
11. PPI 8255 has internal bus of size:
- 4 bit
- 8 bit
- 16 bit
- 32 bit
Show me the answer
12. Interrupt Service Route (ISR) executes:
- Before execution of current instructions
- With pause of current instructions
- After execution of current instructions
- With execution of no instruction
Show me the answer
13. What is the purpose of the “printf()
” function in C programming?
- To print output to the console
- To read input from the console
- To perform arithmetic operations
- To declare variables
Show me the answer
14. What is the purpose of the “rewind()
” function in C programming?
- To move the file pointer to the end of the file
- To move the file pointer to the beginning of the file
- To read data from a file
- To write data to a file
Show me the answer
Answer:
2) To move the file pointer to the beginning of the file
Explanation:
- The
rewind()
function resets the file pointer to the start of a file. - This is useful when you need to re-read the file from the beginning without closing and reopening it.
- Example:
rewind(filePointer);
resets the file pointer offilePointer
.
15. Which of the following access specifiers in C++ allows access to class members only within the class?
- Public
- Private
- Protected
- Friend
Show me the answer
16. What is the purpose of a constructor in C++?
- To create data members of a class
- To overload operators in a class
- To initialize data members of a class
- To free memory used by an object
Show me the answer
17. Which of the following is true about pure virtual functions in C++?
- They have a function body
- They can be called directly
- They can only be declared in the derived class
- They can only be declared in the base class
Show me the answer
Answer:
4) They can only be declared in the base class
Explanation:
- A pure virtual function is a function declared in the base class with no definition and is meant to be overridden by derived classes.
- It is used to create abstract classes and enforce that derived classes implement the function.
- Example:
virtual void function() = 0;
18. What is the purpose of the try block in C++ exception handling?
- To catch exceptions that are thrown by the program
- To declare the variables that are used in the catch block
- To handle errors that are caught by the program
- To define the exceptions that are thrown by the program
Show me the answer
19. Which of the following is not an addressing mode?
- Direct addressing mode
- Indirect addressing mode
- Inverted addressing mode
- Indexed addressing mode
Show me the answer
20. Which of the following is a fundamental principle of cache memory design?
- Increasing the cache size always improves performance
- A direct mapping function is always better than an associative mapping function
- The least recently used replacement algorithm is always the best choice
- The cache should store frequently used data to reduce memory access time
Show me the answer
Answer:
4) The cache should store frequently used data to reduce memory access time
Explanation:
- The main goal of cache memory is to store frequently accessed data to improve processing speed.
- Storing frequently used data in the cache reduces the time spent accessing slower main memory.
- A good cache design ensures that commonly used data is readily available.
21. Which of the following is not a characteristic of multiprocessors?
- Enhanced reliability
- Reduced complexity
- Sharing of resources
- Increased throughput
Show me the answer
Answer:
2) Reduced complexity
Explanation:
- Multiprocessor systems generally increase complexity as they require mechanisms for synchronization, communication, and resource management.
- While multiprocessors improve reliability, throughput, and resource sharing, they also introduce design complexities that need to be handled carefully.
22. What is an application-specific instruction-set processor (ASIP)?
- A processor that is optimized for a specific application
- A processor that can run any application
- A processor that is designed for general-purpose computing
- A processor that can be programmed by the user
Show me the answer
Answer:
1) A processor that is optimized for a specific application
Explanation:
- An ASIP is a type of processor that is specifically tailored to accelerate particular applications or tasks.
- These processors combine the advantages of custom hardware and programmable processors, making them efficient for targeted uses.
- Examples include processors optimized for signal processing, cryptography, or other domain-specific tasks.
23. What is the purpose of a watchdog timer in an RTOS?
- To control the execution of tasks
- To synchronize I/O operations
- To monitor the system and detect faults
- To schedule tasks based on their priority
Show me the answer
Answer:
3) To monitor the system and detect faults
Explanation:
- A watchdog timer in an RTOS is used to detect and recover from faults by monitoring the system.
- If the system becomes unresponsive or stuck, the watchdog timer triggers a reset to restore normal operation.
- This mechanism helps ensure system reliability, especially in embedded and real-time systems.
24. What does VHDL stand for?
- Very High Definition Logic
- Very High-level Design Language
- Virtual Hardware Description Language
- Vector High-level Design Logic
Show me the answer
25. Which networking device operates at the data link layer of the OSI model and filters traffic based on MAC addresses?
- Hub
- Router
- Switch
- Bridge
Show me the answer
26. Which error detection and correction technique involves adding redundant bits to the data being transmitted?
- Parity check
- Checksum
- Hamming code
- CRC
Show me the answer
27. Which routing algorithm is used by the Open Shortest Path First (OSPF) protocol?
- Distance vector
- Link state
- Path vector
- Hierarchical
Show me the answer
28. Which protocol at the transport layer provides reliable, connection-oriented data transfer?
- UDP
- FTP
- TCP
- ICMP
Show me the answer
Answer:
3) TCP
Explanation:
- TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable data transfer by establishing a connection between sender and receiver before transmitting data.
- It guarantees data delivery and maintains the order of packets through sequence numbers and acknowledgments.
29. Which protocol is used for email transfer?
- HTTP
- FTP
- SNMP
- SMTP
Show me the answer
30. Which type of network security device is used to monitor and filter incoming and outgoing network traffic?
- Antivirus software
- Intrusion detection system (IDS)
- Firewall
- Virtual private network (VPN)
Show me the answer
Answer:
3) Firewall
Explanation:
- A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
- It acts as a barrier between trusted internal networks and untrusted external networks, such as the internet, preventing unauthorized access.
31. What is the value of tangential component of electric field in a dielectric-conductor boundary (interface)?
- Zero
- Infinite
- One
- Three
Show me the answer
32. Which of the following statements are true regarding Bio-Savart’s Law?
- Magnetic field directly proportional to cross-sectional area of conductor.
- Bio-Savart’s Law deals with electric field.
- Magnetic field directly proportional to current through the conductor.
- Electric field directly proportional to current through the conductor.
Show me the answer
Answer:
3) Magnetic field directly proportional to current through the conductor.
Explanation:
- Bio-Savart’s Law relates to the magnetic field generated by an electric current in a conductor.
- The magnetic field is directly proportional to the current and the geometry of the conductor.
- The cross-sectional area does not directly affect the magnetic field in Bio-Savart’s Law.
- The law does not deal with electric fields, but with magnetic fields generated by electric currents.
33. For a plane wave propagation in an unbound medium (free space), the minimum angle between electric field and magnetic field vector is …..
- 0°
- 30°
- 90°
- 180°
Show me the answer
34. What is the radiation pattern of an isotropic radiator?
- Doughnut
- Sphere
- Hemisphere
- Circular
Show me the answer
35. Which of the following is not true with respect to antenna?
- Lower Frequencies are radiated near the end of the transmission line.
- Horn antennas are used to feed parabolic disk Antenna.
- Yagi-Uda antennas have high bandwidth and low gain.
- Higher frequencies are radiated near the feed point.
Show me the answer
Answer:
3) Yagi-Uda antennas have high bandwidth and low gain.
Explanation:
- Yagi-Uda antennas have relatively high gain and are known for their narrow bandwidth.
- The other statements are correct:
- Lower frequencies are typically radiated near the end of the transmission line.
- Horn antennas are used for feeding parabolic antennas.
- Higher frequencies are indeed radiated near the feed point of the antenna.
36. The path loss in free space propagation is proportional to ………..
- Square of the distance
- Inverse of the distance
- Logarithm of the distance
- Proportional to the distance
Show me the answer
37. ……………….. level is where the model becomes compatible and executable code
- Abstract level
- Application level
- Implementation level
- All of the above
Show me the answer
38. What is the hash function used in the division method?
- h(k) = k/m
- h(k) = k mod m
- h(k) = m/k
- h(k) = m mod k
Show me the answer
39. Redundancy is reduced in a database table by using the ------------ form.
- Abnormal
- Normal
- Special
- Exactly
Show me the answer
40. It is advisable, to store the -------- before applying the actual transaction to the database.
- Data
- Logs
- Receive
- Record
Show me the answer
41. To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.
- Mutual Exclusion
- Synchronization
- Deadlock
- Starvation
Show me the answer
42. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
- Administrator User account
- Standard User account
- Power User account
- Authenticated User account
Show me the answer
43. The process to gather the software requirements from client, analyze and document them is known as ___________________.
- Feasibility Study
- Requirement Gathering
- Requirement Engineering
- System Requirements Specification
Show me the answer
44. What is reference architecture?
- It is a reference model mapped onto software components
- It provided data flow with comments
- It provides data flow with pieces
- It is a reference model mapped onto software components & data flow with comments
Show me the answer
45. Which access specifier is used to make the members of a class accessible only within the same class?
- public
- private
- protected
- public and protected
Show me the answer
Answer:
2) private
Explanation:
- The private access specifier restricts access to class members, allowing them to be used only within the class.
- This means other classes or functions can’t access or modify these members directly.
- It’s a common practice to use private for data encapsulation and hiding implementation details.
46. What is operator overloading in C++?
- Defining a new operator.
- Overriding an existing operator.
- Changing the behaviour of an existing operator.
- Changing the behaviour of new operator.
Show me the answer
Answer:
3) Changing the behaviour of an existing operator.
Explanation:
- Operator overloading allows redefining the functionality of existing operators (e.g.,
+
,-
, etc.) for user-defined types. - For example, you can overload the
+
operator to add two objects of a custom class. - It makes user-defined classes behave like built-in types in expressions.
47. What is the difference between ifstream and ofstream in C++?
- ifstream is used for input, while ofstream is used for output.
- ofstream is used for input, while ifstream is used for output.
- both are used as input.
- both are used as output.
Show me the answer
48. What is a class template in C++?
- A class that can be used to create objects of different types.
- A function that can be used to create objects of different types.
- A variable that can be used to create objects of different types.
- A character that can be used to create objects of different types.
Show me the answer
Answer:
1) A class that can be used to create objects of different types.
Explanation:
- A class template in C++ allows the definition of a class blueprint that works with any data type.
- This enables the creation of objects for various data types without duplicating code.
- For example, you can define a class for a generic container that works with integers, floats, or any custom data type.
49. Which of the following is not a medium of transmission?
- Microwave system
- Wire
- Free space
- Fiber optic cable
Show me the answer
Answer:
3) Free space
Explanation:
- Free space is not a medium of transmission. It refers to the environment in which transmission occurs, not a physical medium like wire, microwave, or fiber optics.
- In communication systems, free space is used to describe the propagation environment, but the medium itself must be physical (like a wire or fiber).
50. Actual radio coverage of a cell is called __________
- Fingerprint
- Footprint
- Imprint
- Matrix
Show me the answer
51. Rake Receiver does….
- Forward Error Correction
- Backward Error Correction
- Resembles equalizer
- Resembles equalizer and Counter effects multipath fading
Show me the answer
Answer:
4) Resembles equalizer and Counter effects multipath fading
Explanation:
- The Rake Receiver is used in wireless communication to counteract the effects of multipath fading.
- It combines multiple received signals (rays) with different time delays to improve the overall signal quality.
- It acts as an equalizer by adjusting for multipath interference.
52. The bit rate of personal communication is __________
- 300 to 9600 bits/sec
- 300 to 3400 bits/sec
- 400 to 9600 bits/sec
- 400 to 3500 bits/sec
Show me the answer
53. The ATM is an example for _____________ circuit network.
- Datagram subnet
- Virtual circuit subnet
- Packet subnet
- Volume subnet
Show me the answer
Answer:
2) Virtual circuit subnet
Explanation:
- ATM (Asynchronous Transfer Mode) uses a virtual circuit subnet for data transmission.
- In virtual circuit networks, a predefined path is established between the sender and receiver before data transfer.
- The ATM uses this method to ensure that data packets travel along the same path throughout the communication, which allows for more efficient data transfer.
54. Which agency sets the standards for telecommunications internationally?
- International Telecommunication Union (ITU)
- International Centre for Telecommunication Science (ICTS)
- International Telecommunication Protocol (ITP)
- Integrated Telecommunication of the United Nations (ITUN)
Show me the answer
Answer:
1) International Telecommunication Union (ITU)
Explanation:
- The ITU is the specialized agency of the United Nations responsible for setting global telecommunications standards.
- It works to ensure the efficient use of telecommunication networks and promotes international cooperation in this field.
- It also allocates global radio-frequency spectrum and satellite orbits.
55. Standard dimensions (mm x mm) of A3 drawing sheet is
- 11.69 × 16.54
- 29.7 × 42
- 297 × 420
- 420 × 280
Show me the answer
56. Which of the following methods of charging depreciation of an asset has increased amount of depreciation as the age of asset increases
- Sum-of-year digit
- Sinking fund
- Diminishing balance
- Straight line
Show me the answer
Answer:
3) Diminishing balance
Explanation:
- Diminishing balance method calculates depreciation at a fixed percentage of the asset’s declining book value each year.
- As the asset’s value decreases over time, the depreciation expense increases because it is calculated on the remaining book value.
- This method results in higher depreciation costs in the earlier years of the asset’s life and decreases over time.
57. The process of optimizing the project’s limited resources without extending the project duration is known as
- Project crashing
- Resource levelling
- Resource smoothing
- Networking
Show me the answer
Answer:
3) Resource smoothing
Explanation:
- Resource smoothing aims to optimize the use of available resources without extending the project duration.
- It adjusts the resource usage to ensure that resources are allocated in a balanced manner over time while keeping the project end date unchanged.
- It does not involve adding additional resources or changing the project’s timeline.
58. The process of composing/raising the required fund from different sources such as equity, preferred stock, bond and debenture is known as
- Capital structure planning
- Project financing
- Capital budgeting decision
- Deducing earning per share
Show me the answer
Answer:
2) Project financing
Explanation:
- Project financing involves raising funds for a specific project through various sources like equity, bonds, debentures, and preferred stock.
- It focuses on obtaining financial resources needed for project execution, ensuring that the right mix of capital sources is used.
59. In which of the following society, people used to seek their existence on growing plants for their cattle and domestic animals
- Pastoral society
- Tribal society
- Horticultural society
- Agricultural society
Show me the answer
Answer:
3) Horticultural society
Explanation:
- Horticultural society is based on the cultivation of plants for food and resources, often supporting domestic animals as well.
- People in this society primarily focus on growing crops like fruits, vegetables, and other plants that serve both human and livestock needs.
60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions shall be …………………….. in the Council.
- Affiliated
- United
- Recognized
- Associated
Show me the answer
Answer:
3) Recognized
Explanation:
- According to the Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions in Nepal must be recognized by the Council.
- Recognition ensures that the institutions meet the necessary academic standards and are authorized to offer engineering education.