Skip to Content
Live class going on, get early discount!
LicenseComputerQuestions Setsset-1-chaitra-2080Short Questions (60*1=60 Marks)

Short Questions (60*1=60 Marks)

1. What is the formula for no-load voltage gain in a common emitter configuration?

  1. Av=RCreA_v = \frac{R_C}{r_e}
  2. Av=βRCreA_v = -\frac{\beta R_C}{r_e}
  3. Av=βRCreA_v = \frac{\beta R_C}{r_e}
  4. Av=RCreA_v = -\frac{R_C}{r_e}
Show me the answer

Answer:
2. Av=βRCreA_v = -\frac{\beta R_C}{r_e}

Explanation:
The no-load voltage gain in a common emitter configuration is given by Av=βRCreA_v = -\frac{\beta R_C}{r_e}, where β is the current gain, RC{R_C} is the collector resistance, and rer_e is the intrinsic emitter resistance.

2. What are the types of perspective projection?

  1. One-point and two-point perspective
  2. Two-point and three-point perspective
  3. One-point, two-point, and three-point perspective
  4. Only one-point perspective
Show me the answer

Answer:
3. One-point, two-point, and three-point perspective

Explanation:
Perspective projection can be classified into one-point, two-point, and three-point perspectives, depending on how many vanishing points are present.

3. In a semaphore problem, what does “18P, xV, …” represent?

  1. 18 signal operations and x wait operations
  2. 18 wait operations and x signal operations
  3. 18 processes and x variables
  4. 18 producers and x consumers
Show me the answer

Answer:
2. 18 wait operations and x signal operations

Explanation:
In semaphore terminology, P represents the wait operation, while V represents the signal operation. Therefore, “18P” indicates 18 wait operations.

4. What is the latest amendment to the Labor Act?

  1. 2072
  2. 2073
  3. 2074
  4. 2075
Show me the answer

Answer:
3. 2074

Explanation:
The latest amendment to the Labor Act was made in 2074 BS (2017 AD).

5. How many parallel TCP connections does FTP typically use?

  1. 1
  2. 2
  3. 3
  4. 4
Show me the answer

Answer:
2. 2

Explanation:
FTP typically uses two parallel TCP connections: one for control commands and the other for data transfer.

6. Which of the following is based on the principle of conservation of charge?

  1. KCL
  2. KVL
  3. Ohm’s Law
  4. Coulomb’s Law
Show me the answer

Answer:

  1. KCL

Explanation:
Kirchhoff’s Current Law (KCL) is based on the principle of conservation of electric charge.

7. What is the primary purpose of a Project Charter?

  1. To outline the project scope and objectives
  2. To define the project schedule
  3. To identify project risks
  4. To allocate project resources
Show me the answer

Answer:

  1. To outline the project scope and objectives

Explanation:
A Project Charter is a document that outlines the project’s scope, objectives, and stakeholders at a high level.

8. How many transistors are used in Class A amplifiers?

  1. 1
  2. 2
  3. 3
  4. 4
Show me the answer

Answer:

  1. 1

Explanation:
A Class A amplifier typically uses one transistor for amplification, operating in the active region for the entire input signal cycle.

9. What is the purpose of Gradient Descent?

  1. To maximize a function
  2. To minimize a function by iteratively moving in the direction of steepest descent
  3. To find the global maximum of a function
  4. To solve linear equations
Show me the answer

Answer:
2. To minimize a function by iteratively moving in the direction of steepest descent

Explanation:
Gradient Descent is an optimization algorithm used to minimize a function by iteratively moving towards the steepest descent direction, based on the gradient of the function.

10. The Waterfall model is the oldest approach for what purpose?

  1. Software engineering
  2. Software planning
  3. Hardware design
  4. Project management
Show me the answer

Answer:

  1. Software engineering

Explanation:
The Waterfall model is the oldest and most traditional approach used in software engineering for systematic and sequential software development.

11. What is the IEEE standard for wireless networks?

  1. 801.11
  2. 802.11
  3. 803.11
  4. 804.11
Show me the answer

Answer:
2. 802.11

Explanation:
The IEEE 802.11 standard defines the protocols for implementing wireless local area networks (WLANs).

12. What is Fan-out in digital circuits?

  1. Number of inputs connected without degrading voltage
  2. Number of standard loads that the output of a logic gate can drive
  3. The speed at which a logic gate can operate
  4. The power consumption of a logic gate
Show me the answer

Answer:
2. Number of standard loads that the output of a logic gate can drive

Explanation:
Fan-out is the number of standard loads that a digital logic gate can drive while maintaining specified output voltage levels.

13. What is the total number of registered professional engineers in NEC?

  1. 51
  2. 61
  3. 71
  4. 81
Show me the answer

Answer:
2. 61

Explanation:
The total number of registered professional engineers in Nepal Engineering Council (NEC) is 61.

14. What is a viewport?

  1. A virtual machine
  2. A type of computer monitor
  3. Visible area of a web page in a browser window
  4. A graphics card component
Show me the answer

Answer:
3. Visible area of a web page in a browser window

Explanation:
A viewport is the portion of a web page that is visible within the browser window, excluding scrollable content outside the frame.

15. What is a feature of the 8086 microprocessor’s internal architecture?

  1. 8-bit data bus
  2. 16-bit data bus
  3. 32-bit data bus
  4. 64-bit data bus
Show me the answer

Answer:
2. 16-bit data bus

Explanation:
The 8086 microprocessor has a 16-bit data bus, meaning it can transfer 16 bits of data simultaneously.

16. What does GUI stand for?

  1. General User Interface
  2. Graphical User Interface
  3. Global User Interaction
  4. Guided User Input
Show me the answer

Answer:
2. Graphical User Interface

Explanation:
GUI stands for Graphical User Interface, which allows users to interact with electronic devices through graphical icons and visual indicators.

17. What does an IP address contain?

  1. Only network portion
  2. Only host portion
  3. Network and host portions
  4. MAC address
Show me the answer

Answer:
3. Network and host portions

Explanation:
An IP address consists of a network portion and a host portion, used to identify devices in a network.

18. What type of value is a 230V rating on a heater?

  1. Peak value
  2. Average value
  3. RMS (Root Mean Square) value
  4. Instantaneous value
Show me the answer

Answer:
3. RMS (Root Mean Square) value

Explanation:
The 230V rating on a heater refers to its RMS voltage, which represents the effective voltage in an AC circuit.

19. Which function is typically used to classify into 3 or more classes?

  1. Sigmoid function
  2. ReLU function
  3. Softmax function
  4. Tanh function
Show me the answer

Answer:
3. Softmax function

Explanation:
The Softmax function is commonly used for multi-class classification problems, where it outputs a probability distribution over multiple classes.

20. What is a contingent project?

  1. A project with uncertain funding
  2. A project that depends on the outcome of another project
  3. A project with high risk
  4. A project with multiple stakeholders
Show me the answer

Answer:
2. A project that depends on the outcome of another project

Explanation:
A contingent project is one that is dependent on the completion or outcome of another project before it can proceed.

21. In dimensionality, what does the symbol RR typically refer to?

  1. Rational numbers
  2. Real numbers
  3. Relative numbers
  4. Random numbers
Show me the answer

Answer:
2. Real numbers

Explanation:
In dimensionality, RR generally refers to the set of Real numbers, which represents continuous values.

22. Which is considered the fastest line drawing algorithm?

  1. DDA algorithm
  2. Bresenham’s algorithm
  3. Midpoint algorithm
  4. Xiaolin Wu’s algorithm
Show me the answer

Answer:
2. Bresenham’s algorithm

Explanation:
Bresenham’s algorithm is widely considered one of the fastest and most efficient line drawing algorithms due to its use of integer calculations.

23. What shape does a unit square become after shearing?

  1. Rectangle
  2. Parallelogram
  3. Rhombus
  4. Trapezoid
Show me the answer

Answer:
2. Parallelogram

Explanation:
When a unit square undergoes shearing, it transforms into a parallelogram.

24. What is the worst-case time complexity of Shell sort?

  1. O(n)O(n)
  2. O(nlogn)O(n \log n)
  3. O(n2)O(n^2)
  4. O(n3)O(n^3)
Show me the answer

Answer:
3. O(n2)O(n^2)

Explanation:
The worst-case time complexity of Shell sort is O(n2)O(n^2) for the commonly used gap sequences.

25. What is the tenure of the registrar of NEC (Nepal Engineering Council)?

  1. 2 years
  2. 3 years
  3. 4 years
  4. 5 years
Show me the answer

Answer:
3. 4 years

Explanation:
The tenure of the registrar of the Nepal Engineering Council (NEC) is 4 years.

26. What is the objective of NEA?

  1. To regulate engineering practices in Nepal
  2. To promote development of engineering science and technology in Nepal
  3. To provide engineering education in Nepal
  4. To certify engineering projects in Nepal
Show me the answer

Answer:
2. To promote development of engineering science and technology in Nepal

Explanation:
The Nepal Engineers’ Association (NEA) aims to promote the development of engineering science and technology in Nepal.

27. Which of the following is not an application layer protocol?

  1. FTP
  2. SMTP
  3. HTTP
  4. TCP
Show me the answer

Answer:
4. TCP

Explanation:
TCP is a transport layer protocol, while FTP, SMTP, and HTTP are application layer protocols.

28. How many resonance frequencies does a crystal typically have?

  1. 1
  2. 2
  3. 3
  4. 4
Show me the answer

Answer:
2. 2

Explanation:
A crystal typically has two resonance frequencies: series and parallel resonance frequencies.

29. How many flip-flops are required for representing flags of 8085?

  1. 5
  2. 6
  3. 8
  4. 10
Show me the answer

Answer:

  1. 5

Explanation:
The 8085 microprocessor has 5 flags (Sign, Zero, Auxiliary Carry, Parity, and Carry), so it requires 5 flip-flops to represent them.

30. Warshall algorithm gives:

  1. Transitive closure
  2. Shortest distance
  3. Minimum spanning tree
  4. Topological sorting
Show me the answer

Answer:

  1. Transitive closure

Explanation:
Warshall’s algorithm computes the transitive closure of a directed graph by determining the reachability of vertices.

31. Which bias configuration is most stable?

  1. Voltage Divider
  2. CE
  3. CB
  4. CC
Show me the answer

Answer:

  1. Voltage Divider

Explanation:
The Voltage Divider Bias configuration is most stable because it provides better stabilization of the operating point against variations in β\beta or temperature.

32. SR flip-flop is called:

  1. Monostable
  2. Bistable multivibrator
  3. Astable multivibrator
  4. Schmitt trigger
Show me the answer

Answer:
2. Bistable multivibrator

Explanation:
The SR flip-flop is a type of bistable multivibrator because it has two stable states.

33. Iterative Deepening DFS space complexity is:

  1. bd/2b^{d/2}
  2. O(bd)O(bd)
  3. O(d)O(d)
  4. O(n)O(n)
Show me the answer

Answer:
3. O(d)O(d)

Explanation:
The space complexity of Iterative Deepening Depth First Search (IDDFS) is O(d)O(d), where dd is the depth of the solution.

34. ANN doesn’t have:

  1. Explanation of results
  2. Learning capability
  3. Parallel processing
  4. Fault tolerance
Show me the answer

Answer:

  1. Explanation of results

Explanation:
Artificial Neural Networks (ANN) lack transparency in their decision-making process, which means they cannot easily provide an explanation of results.

35. What is a key property of bilateral circuits?

  1. They only allow current to flow in one direction
  2. They have different impedances for different directions of current flow
  3. They have the same impedance regardless of the direction of current flow
  4. They require AC power sources to function
Show me the answer

Answer:
3. They have the same impedance regardless of the direction of current flow

Explanation:
A bilateral circuit exhibits the same impedance regardless of the direction of current flow, which makes it symmetric.

36. Signed int are present in which C++ library?

  1. std_1164
  2. std_arth
  3. cstdint
  4. iostream
Show me the answer

Answer:
3. cstdint

Explanation:
The cstdint library in C++ provides fixed-width integer types like signed int and unsigned int.

37. C++ program for loop syntax is:

  1. for (initialization; condition; increment/decrement)
  2. for (condition; initialization; increment/decrement)
  3. for (increment/decrement; condition; initialization)
  4. for (condition; increment/decrement; initialization)
Show me the answer

Answer:

  1. for (initialization; condition; increment/decrement)

Explanation:
The correct for loop syntax in C++ is for (initialization; condition; increment/decrement).

38. In a program, int *p = NULL means:

  1. pp is a null pointer
  2. Invalid assignment
  3. pp is an integer
  4. pp is a void pointer
Show me the answer

Answer:

  1. pp is a null pointer

Explanation:
int *p = NULL means that pp is a null pointer, which points to nothing.

39. If a derived class has a constructor, which of the following is true?

  1. Constructor of derived is called first and then that of base class
  2. Constructor of base class is called first and then that of derived class
  3. Only the derived class constructor is called
  4. Only the base class constructor is called
Show me the answer

Answer:
2. Constructor of base class is called first and then that of derived class

Explanation:
In C++, the base class constructor is always called first, followed by the derived class constructor.

40. Pumping Lemma is used to detect:

  1. Regular language
  2. Non-regular language
  3. CFG
  4. Recursively enumerable language
Show me the answer

Answer:
2. Non-regular language

Explanation:
The Pumping Lemma is a property used to prove that a language is non-regular by showing that no finite state automaton can recognize it.

41. Non-maskable interrupt is:

  1. TRAP
  2. INTR
  3. RST 7.5
  4. HOLD
Show me the answer

Answer:

  1. TRAP

Explanation:
TRAP is a non-maskable interrupt in the 8085 microprocessor, meaning it cannot be disabled by software.

42. In a Sequence diagram, vertical line indicates:

  1. Time
  2. Message
  3. Object
  4. Class
Show me the answer

Answer:

  1. Time

Explanation:
In a Sequence diagram, the vertical line represents time progression, while horizontal arrows indicate messages.

43. 8085 register connected to data bus:

  1. IR
  2. MBR
  3. PC
  4. MAR
Show me the answer

Answer:
2. MBR

Explanation:
The Memory Buffer Register (MBR) is directly connected to the data bus for reading or writing data.

44. IPSec mode for privacy, integrity, and authenticity:

  1. Tunnel mode
  2. Transport mode
  3. Hybrid mode
  4. Encapsulation mode
Show me the answer

Answer:

  1. Tunnel mode

Explanation:
Tunnel mode in IPSec provides privacy, integrity, and authenticity by encapsulating the entire IP packet.

45. If an SMTP server sends mail to another server, it is:

  1. SMTP client
  2. SMTP server
  3. POP3 client
  4. IMAP client
Show me the answer

Answer:

  1. SMTP client

Explanation:
When an SMTP server sends mail to another SMTP server, it acts as an SMTP client.

46. Connection-less protocol:

  1. UDP
  2. TCP
  3. HTTP
  4. FTP
Show me the answer

Answer:

  1. UDP

Explanation:
UDP is a connection-less protocol, meaning it does not establish a connection before data transmission.

47. Finite state machine has how many tuples?

  1. 4
  2. 5
  3. 6
  4. 7
Show me the answer

Answer:
3. 6

Explanation:
A Finite State Machine (FSM) is defined by 6 tuples: (Q,Σ,δ,q0,F,T)(Q, \Sigma, \delta, q_0, F, T).

48. Representation of composition of two TM languages:

  1. (TM1)(TM2)(TM_1) \cup (TM_2)
  2. TM1+TM2TM_1 + TM_2
  3. TM1TM2TM_1 * TM_2
  4. TM1TM2TM_1 \wedge TM_2
Show me the answer

Answer:
2. TM1+TM2TM_1 + TM_2

Explanation:
The composition of two Turing Machine languages is represented as TM1+TM2TM_1 + TM_2.

49. 2D transformations require:

  1. 1D plane
  2. 2D plane
  3. 3D plane
  4. 4D plane
Show me the answer

Answer:
2. 2D plane

Explanation:
2D transformations are performed on a 2D plane involving operations like translation, scaling, and rotation.

50. Binary tree of height hh has at most … nodes:

  1. 2h12^h - 1
  2. 2(h+1)12^{(h+1)} - 1
  3. 2h2^h
  4. 2(h1)2^{(h-1)}
Show me the answer

Answer:
2. 2(h+1)12^{(h+1)} - 1

Explanation:
A binary tree of height hh can have at most 2(h+1)12^{(h+1)} - 1 nodes, assuming the height is measured starting from 0.

51. Direct Access is seen in:

  1. disk
  2. RAM
  3. cache
  4. register
Show me the answer

Answer:
a) disk

Explanation:
Direct access refers to the ability to read or write data at any location in the storage device without sequentially accessing all previous data. This is seen in disk storage.

52. Incremental model is:

  1. linear + waterfall
  2. linear + RAD
  3. iterative + waterfall
  4. iterative + RAD
Show me the answer

Answer:
a) linear + waterfall

Explanation:
The incremental model combines linear and waterfall approaches, with software being developed in small, iterative steps or increments.

53. Optimization algorithms use:

  1. heuristics
  2. statistics
  3. deterministic methods
  4. brute force
Show me the answer

Answer:
a) heuristics

Explanation:
Optimization algorithms often use heuristics, which are problem-solving techniques based on experience or intuition rather than precise methods.

Question 54: Process of developing modules from sub systems:

  1. modular decomposition
  2. modular composition
  3. functional decomposition
  4. structural composition
Show me the answer

Answer:
a) modular decomposition

Explanation:
The modular decomposition process involves breaking down larger subsystems into smaller, manageable modules.

Question 55: Which UML diagram is used to model the flow of control or data in a system?

  1. UML Diagram
  2. Activity Diagram
  3. Sequence Diagram
  4. Class Diagram
Show me the answer

Answer:
b) Activity Diagram

Explanation:
The Activity Diagram in UML is used to model workflows, representing the flow of control or data between activities.

Question 56: What does the association represent in UML?

  1. Relationship between classes
  2. Inheritance between classes
  3. Dependency between objects
  4. Encapsulation of data
Show me the answer

Answer:
a) Relationship between classes

Explanation:
Association in UML represents a relationship between classes, indicating that objects of one class are connected to objects of another class.

Question 57: How many tuples does a Turing machine have?

  1. 5
  2. 6
  3. 7
  4. 8
Show me the answer

Answer:
c) 7

Explanation:
A Turing machine is formally defined by 7 tuples: (Q,Σ,δ,q0,F,T,Γ)(Q, \Sigma, \delta, q_0, F, T, \Gamma), representing its states, input alphabet, transition function, start state, final states, tape alphabet, and tape movement.

Question 58: To whom does the registrar submit annual plans and programs of council?

  1. Government
  2. PM
  3. NEC
  4. President
Show me the answer

Answer:
3) 3

Explanation:
NEC (National Education Commission): The NEC is the body responsible for national education policy, and it would be the most likely recipient of annual plans and programs related to educational governance and reform.

Question 59: Port used for HTML:

  1. 80
  2. 443
  3. 21
  4. 25
Show me the answer

Answer:
a) 80

Explanation:
Port 80 is the default port used for HTTP (HyperText Transfer Protocol), which is commonly used to serve HTML pages.

Question 60: What is taken for repetitive analysis?

  1. LCM
  2. HCF
  3. Mean
  4. Mode
Show me the answer

Answer:
a) LCM

Explanation:
LCM (Least Common Multiple) is often used for repetitive analysis, such as when determining intervals for repeating events or cycles.

Last updated on