Short Questions (60*1=60 Marks)
1. Which of the following is an output device?
- ROM
- Joystick
- Mouse
- Printer
Show me the answer
2. __________ memory stores frequently accessed data and instructions, enabling faster processing.
- Cache
- RAM
- ROM
- SSD
Show me the answer
3. Which of the following is an application software?
- MS Windows 10
- Ubuntu 20.04
- MS Windows XP
- MS Word
Show me the answer
4. Which of the following represents the largest computer network?
- LAN
- MAN
- Internet
- WAN
Show me the answer
Answer:
3) Internet
Explanation:
The Internet is the largest global network connecting millions of private, public, academic, business, and government networks.
- LAN: Local Area Network, limited to a small area.
- MAN: Metropolitan Area Network, spans a city or campus.
- WAN: Wide Area Network, larger than LAN and MAN but smaller than the Internet.
5. A protocol that defines how files are exchanged on the web is called _______.
- FTP
- SSH
- DHCP
- HTTP
Show me the answer
Answer:
4) HTTP
Explanation:
HTTP (HyperText Transfer Protocol) defines the rules for transferring files like text, images, and videos over the web.
- FTP: File Transfer Protocol for transferring files between systems.
- SSH: Secure Shell, used for secure access to remote computers.
- DHCP: Dynamic Host Configuration Protocol, used for IP address management.
6. Which of the following file types does not represent an image?
- .tif
- .jpeg
- .png
- .gif
Show me the answer
7. The process to gather software requirements from a client, analyze and document them is known as ____.
- Feasibility Study
- Requirement Gathering
- Requirement Engineering
- System Requirements Specification
Show me the answer
Answer:
3) Requirement Engineering
Explanation:
Requirement Engineering involves gathering, analyzing, and documenting the client’s needs and requirements for the software development process.
- Feasibility Study: Determines whether a project is viable.
- Requirement Gathering: A subset of Requirement Engineering focused on collecting requirements.
- Project Analysis: Broader term that may include various project management tasks.
8. What is reference architecture?
- It is a reference model mapped onto software components
- It provides data flow with comments
- It provides data flow with pieces
- It is a reference model mapped onto software components & data flow with comments
Show me the answer
Answer:
4) It is a reference model mapped onto software components & data flow with comments
Explanation:
Reference architecture is a standardized, high-level architecture model that provides guidelines for designing systems, including software components and their data flows, often accompanied by explanatory comments.
9. Which of the following testing is sometimes called Acceptance testing?
- White-box testing
- Grey box testing
- Alpha testing
- Beta testing
Show me the answer
Answer:
4) Beta testing
Explanation:
Beta testing is often considered a form of acceptance testing because it involves real users testing the software to determine if it meets their requirements and expectations before it is released to the public.
- Alpha testing: Conducted internally by developers.
- White-box testing: Focuses on testing the internal workings of the software.
- Grey-box testing: A combination of black-box and white-box testing.
10. What is the purpose of representing system behavior in OOAD?
- To document system architecture and components
- To identify potential risks and challenges
- To understand and model the dynamic aspects of the system
- To create user interfaces and interactions
Show me the answer
11. In object-oriented design, what does visibility refer to?
- The physical appearance of an object.
- The accessibility of class members from other parts of the program.
- The process of creating instances of classes.
- The relationship between classes in a system.
Show me the answer
Answer:
2) The accessibility of class members from other parts of the program
Explanation:
In OO design, visibility refers to the scope and access control of class members (fields, methods), determining whether they are public, private, or protected, and how they can be accessed from outside the class.
12. How are relationships between classes represented when mapping design to code?
- Through inheritance and implementation of interfaces.
- Through the use of composition and aggregation.
- Through static method calls and global variables.
- Through conditional statements and loops.
Show me the answer
13. ______ only mentions what operations are to be performed but not how these operations will be implemented.
- Function
- Abstract Data Types
- Class
- Object
Show me the answer
14. While exception handling, ______ block is used to enclose one or more statements that might throw an exception.
- try
- catch
- throw
- finally
Show me the answer
15. A variable whose value is the address of another variable is called as ……
- keyword
- constant
- pointer
- identifier
Show me the answer
16. Which of the following represents function overloading?
- void add ( int a, int b), void add( double a, double b)
- int add_int ( int a, int b), float add_float( float a, float b)
- add ( int a, int b), add_int ( int a, int b)
- void add ( int a, int b), void add_int ( int a, int b)
Show me the answer
Answer:
1) void add ( int a, int b), void add( double a, double b)
Explanation:
Function overloading occurs when multiple functions have the same name but differ in parameters (either in type or number of arguments). Option 1 is an example of function overloading because both functions share the same name “add” but take different parameter types (int
vs. double
).
17. In C programming language, %u is used to indicate the format for ……….
- short int
- long int
- int
- unsigned int
Show me the answer
18. The main benefit of the C++ Standard Template Library (STL) is that it provides a way to write generic, reusable code that can be applied to …………
- override functions
- different data types.
- same data type.
- overloaded functions.
Show me the answer
19. ……………….. level is where the model becomes compatible and executable code
- Abstract level
- Application level
- Implementation level
- All of the above
Show me the answer
20. What is the hash function used in the division method?
- h(k) = k/m
- h(k) = k mod m
- h(k) = m/k
- h(k) = m mod k
Show me the answer
21. Redundancy is reduced in a database table by using the ------------ form.
- Abnormal
- Normal
- Special
- Exactly
Show me the answer
22. It is advisable to store the -------- before applying the actual transaction to the database.
- Data
- Logs
- Receive
- Record
Show me the answer
23. To enforce ………………….. two functions are provided enter-critical and exit-critical, where each function takes as an argument the name of the resource that is the subject of competition.
- Mutual Exclusion
- Synchronization
- Deadlock
- Starvation
Show me the answer
24. If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
- Administrator User account
- Standard User account
- Power User account
- Authenticated User account
Show me the answer
25. In 8086 microprocessors, there are ………….. addressing modes.
- 11
- 5
- 8
- 13
Show me the answer
26. The main function of a ……….. is to transfer data between memory and an auxiliary device directly, without involving the CPU.
- DMA controller
- Asynchronous Transmission
- Synchronous Transmission
- Parallel Interface
Show me the answer
27. There are …………. software interrupt types in 8086 microprocessors.
- 128
- 256
- 200
- 512
Show me the answer
28. The instruction which performs logical operation in 8086 microprocessors is ……..
- XOR
- AAD
- JMP
- CLC
Show me the answer
29. As a part of memory management, pages are replaced which would not be used for the longest duration of time in the future with ………… algorithm.
- First in first out
- Optimal page replacement
- Least recently used
- Most recently used
Show me the answer
Answer:
2) Optimal page replacement
Explanation:
The Optimal page replacement algorithm replaces the page that will not be used for the longest period of time in the future. This algorithm aims to minimize page faults but is not feasible for implementation due to the requirement of future knowledge.
30. In ………. Mode, the entire data is transferred before CPU takes control of the buses back from direct memory access (DMA) controller.
- Cycle stealing mode
- Burst mode
- Interleaving mode
- Non-interleaving mode
Show me the answer
31. During asymptotic analysis, the big-O notation (O) is used to denote ………..
- Average case
- Best case
- Worst case
- Optimal case
Show me the answer
32. Choose the sorting algorithm which is preferable in terms of average case time complexity …………..
- Insertion
- Selection
- Bubble
- Quick
Show me the answer
33. ………… is an algorithmic approach which develops a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit.
- Greedy approach
- Searching approach
- Divide and conquer approach
- Backtracking approach
Show me the answer
34. …………. is a program residing in a ROM, which is automatically executed by the processor to read the hard drive’s boot sector and load the computer’s operating system.
- Linker
- Bootloader
- Program linker
- Macro processor
Show me the answer
35. Macro processor replaces each macro instruction with the corresponding group of source language statements. This is known as ……….
- Macro linking
- Macro execution
- Macro call
- Macro expansion
Show me the answer
36. During socket programming, ……… announces willingness to accept connections.
- Accept
- Bind
- Socket
- Listen
Show me the answer
37. In which type of environment, the next state of the environment is completely determined by the current state and the action taken by the agent?
- Observable environment
- Deterministic environment
- Episodic environment
- Static environment
Show me the answer
38. Which searching technique is guaranteed to find the optimal solution in a state space search problem, assuming no path costs?
- Depth-first search (DFS)
- Breadth-first search (BFS)
- Hill climbing
- A* search
Show me the answer
39. What is the main goal of the resolution algorithm in inference?
- To derive new logical axioms
- To simplify logical expressions
- To prove the satisfiability or un-satisfiability of a given set of logical statements
- To find contradictions in the knowledge base
Show me the answer
40. What is the main goal of natural language understanding (NLU)?
- Translating text from one language to another
- Generating human-like responses to user queries
- Analyzing and interpreting the meaning of natural language text
- Extracting entities and their relationships from a text
Show me the answer
41. What is fuzzy learning in machine learning?
- A type of learning algorithm that uses fuzzy logic to handle uncertain or imprecise data
- A learning technique that focuses on training neural networks with fuzzy inputs
- A method that uses fuzzy inference to make predictions based on labelled data
- A learning approach that emphasizes the use of fuzzy clustering algorithms
Show me the answer
42. Which neural network architecture is commonly used for processing sequential data, such as time series or natural language?
- Feed-forward neural network (FNN)
- Self-organizing map (SOM)
- Radial basis function network (RBFN)
- Recurrent neural network (RNN)
Show me the answer
43. For a Java source file named “First.java”, which of the following files represent bytecode?
- First.java
- First.class
- First.exe
- First.bin
Show me the answer
44. For the button source object, its appropriate listener interface is ………..
- ItemListener
- MouseListener
- ActionListener
- WindowListener
Show me the answer
45. Each time when a servlet is called, which method is called first?
- start()
- init()
- run()
- service()
Show me the answer
46. Main design aim of XML is to …….. and ……. data.
- store, style
- design, transport
- store, transport
- design, style
Show me the answer
47. Which of the following method does not fall into CRUD operation?
- create
- delete
- update
- init
Show me the answer
48. Which of the following is used to call a stored procedure?
- Statement
- PreparedStatement
- CrudeStatement
- CallableStatement
Show me the answer
49. The ………. scheduling algorithm schedules periodic tasks using a static priority policy by considering the priorities.
- Round robin
- Shortest job first
- First come first serve
- Rate monotonic
Show me the answer
50. A real-time operating system is characterized by …………
- all processes have the same priority.
- all tasks must be serviced by its deadline period.
- sometimes the deadline may be missed when ensuring a high level of accuracy.
- The Kernel is not required.
Show me the answer
51. ……………. is characterized by services and applications, which run over a distributed network utilizing virtualized resources.
- Parallel computing
- Distributed computing
- Client server computing
- Cloud computing
Show me the answer
52. …………. acts as the ‘glue’ between the client and server applications, respectively, and that Object Request Broker (ORB).
- ORB interface
- Dynamic invocation interface
- Object adapter
- CORBA IDL stubs and skeletons
Show me the answer
53. Which of the following is a type of cloud computing service?
- Software-as-a-Service (SaaS)
- Software-as-a-Server (SaaS)
- Service-as-a-Server (SaaS)
- Service-as-a-Software (SaaS)
Show me the answer
54. If timestamps of two or more events are the same, then the events are called to be …….
- non-monotonic
- monolithic
- monotonic
- concurrent
Show me the answer
55. Standard dimensions (mm x mm) of A3 drawing sheet is
- 11.69 × 16.54
- 29.7 × 42
- 297 × 420
- 420 × 280
Show me the answer
56. Which of the following methods of charging depreciation of an asset has increased amount of depreciation as the age of the asset increases?
- sum-of-year digit
- sinking fund
- diminishing balance
- straight line
Show me the answer
57. The process of optimizing the project’s limited resources without extending the project duration is known as
- project crashing
- resource levelling
- resource smoothing
- networking
Show me the answer
58. The process of composing/raising the required fund from different sources such as equity, preferred stock, bond, and debenture is known as
- capital structure planning
- project financing
- capital budgeting decision
- deducing earning per share
Show me the answer
59. In which of the following societies, people used to seek their existence on growing plants for their cattle and domestic animals?
- pastoral society
- tribal society
- horticultural society
- agricultural society
Show me the answer
60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering academic institutions shall be …………………….. in the Council.
- affiliated
- united
- recognized
- associated