Model Question Computer Engineering
Model Question Computer Engineering
Page 1
8. Elementary building block of combinational circuit is:
a) Logic gate
b) Flip-flop
c) Both logic gate and flip-flop
d) Memory
9. Synchronous circuit that changes its state at specific clock signal is:
a) Event driven
b) Clock driven
c) Pulse driven
d) Frequency driven
15. Which access specifier is used to make the members of a class accessible only within the
same class?
a) public
b) private
c) protected
d) public and protected
Page 2
16. What is operator overloading in C++?
a) Defining a new operator.
b) Overriding an existing operator.
c) Changing the behaviour of an existing operator.
d) Changing the behaviour of new operator.
Page 3
a) A variable used to store a value in a digital circuit.
b) A physical wire used to transmit data in a digital circuit.
c) A function used to perform a specific task in VHDL.
d) A file used to store a specific task.
27. Which of the following is a type of routing algorithm used in the network layer?
a) Link-state routing
b) Distance-vector routing
c) Path-vector routing
d) All of the above.
28. Which protocol is responsible for error detection and correction at the transport layer?
a) TCP
b) UDP
c) ICMP
d) ARP
29. Which application layer protocol is used for sending and receiving emails?
a) HTTP
b) FTP
c) SMTP
d) POP
Page 4
32. Which of the following Machine is specific for Context free grammar?
a) Finite state automata
b) Push down automata
c) Linear bounded automata
d) Turing Machine
33. Turing machine (TM) is more powerful than FMS (Finite State Machine) because
a) tape movement is confined to one direction
b) it has no finite state
c) it has the capability to remember arbitrarily long sequences of input symbols
d) it has finite state
37. ……………….. level is where the model becomes compatible and executable code
a) Abstract level
b) Application level
c) Implementation level
d) All of the above
Page 5
40. It is advisable, to store the -------- before applying the actual transaction to the database.
a) Data
b) Logs
c) Receive
d) Record
41. To enforce ………………….. two functions are provided enter-critical and exit-critical,
where each function takes as an argument the name of the resource that is the subject of
competition.
a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation
42. If you wanted to require that a user enter an Administrator password to perform
administrative tasks, what type of user account should you create for the user?
a) Administrator User account
b) Standard User account
c) Power User account
d) Authenticated User account
43. The process to gather the software requirements from client, analyze and document them
is known as ___________________.
a) Feasibility Study
b) Requirement Gathering
c) Requirement Engineering
d) System Requirements Specification
Page 6
a) The physical appearance of an object.
b) The accessibility of class members from other parts of the program.
c) The process of creating instances of classes.
d) The relationship between classes in a system.
48. How are relationships between classes represented when mapping design to code?
a) Through inheritance and implementation of interfaces.
b) Through the use of composition and aggregation.
c) Through static method calls and global variables.
d) Through conditional statements and loops.
49. In which type of environment, the next state of the environment is completely
determined by the current state and the action taken by the agent?
a) Observable environment
b) Deterministic environment
c) Episodic environment
d) Static environment
50. Which searching technique is guaranteed to find the optimal solution in a state space
search problem, assuming no path costs?
a) Depth-first search (DFS)
b) Breadth-first search (BFS)
c) Hill climbing
d) A* search
54. Which neural network architecture is commonly used for processing sequential data,
such as time series or natural language?
Page 7
a) Feed-forward neural network (FNN)
b) Self-organizing map (SOM)
c) Radial basis function network (RBFN)
d) Recurrent neural network (RNN)
56. Which of the following methods of charging depreciation of an asset has increased
amount of depreciation as the age of asset increases
a) sum-of-year digit
b) sinking fund
c) diminishing balance
d) straight line
57. The process of optimizing the project’s limited resources without extending the project
duration is known as
a) project crashing
b) resource levelling
c) resource smoothing
d) networking
58. The process of composing/raising the required fund from different sources such as
equity, preferred stock, bond and debenture is known as
a) capital structure planning
b) project financing
c) capital budgeting decision
d) deducing earning per share
59. In which of the following society, people used to seek their existence on growing plants
for their cattle and domestic animals
a) pastoral society
b) tribal society
c) horticultural society
d) agricultural society
60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering
academic institutions shall be …………………….. in the Council.
a) affiliated
b) united
c) recognized
d) associated
Page 8
Section-B (20*2 = 40)
40
61. A 10 μH inductor, π2 pF capacitor and a 628 Ω resistor are connected to form a series
RLC circuit. Calculate Q-factor of this circuit at resonant frequency.
a) 1.0142x10-6
b) 2.50
c) 1.0142x10-9
d) 2.50x10-3
#include <iostream>
class Encapsulation {
private: int data;
Page 9
int main() {
Encapsulation obj;
std::cout << obj.getData() << std::endl;
return 0;
}
a) 0
b) Garbage value
c) Compilation error
d) Runtime error
67. What is the result of the (0x5A3D - 0x28F1) + 0xABCD in hexadecimal notation?
a) 0x8D7F
b) 0x8E7E
c) 0x8F7D
d) 0x907C
68. What is the output of the y <= (a and b) xor (not b and c); VHDL code?
a) AND gate
b) OR gate
c) XOR gate
d) NAND gate
69. What is the data rate required to transmit signal with max frequency component of
10KHz for 8 bit per symbol?
a) 80 KBPs
b) 160 KBPs
c) < 160 KBPs
d) < 80 KBPs
70. A data packet of size 1500 bytes is to be transmitted over a network crossing 2 routers in
between. Each network layer adds a header of 20 bytes. The packet is then encapsulated
by a data link layer that adds a header of 30 bytes and a trailer of 10 bytes. What is the
total size of the packet, including all headers and the data payload?
a) 1550 bytes
Page 10
b) 1560 bytes
c) 1620 bytes
d) 1680 bytes
71. Consider CFG with {S,A,B} as the non-terminal alphabet, {a,b} as the terminal
alphabet, S as the start symbol and the following set of production rules S->aB S->bA B-
>aB->bS A->aS B->aBB A-> bAA which of the following strings is generated by
grammar ?
a) aaaabb
b) aabbbb
c) aabbab
d) abbbba
72. An efficient transformation method which produces a parallel mirror image of an object
is also referred as,
a) Rotation
b) Reflection
c) Shear
d) Rotation and shear
73. What does the following function do for a given Linked List with first node as head?
void fun1(struct node* head)
{
if (head == NULL)
return;
fun1(head->next);
printf("%d ", head->data);
}
a) Prints all nodes of linked lists
b) Prints all nodes of linked list in reverse order
c) Prints alternate nodes of Linked List
d) Prints alternate nodes in reverse order
75. Which of the following statements best describes the role of a configuration management
tool in software engineering?
Page 11
a) It helps a graphical user interface for designing software architectures.
b) It helps the process of generating code from high-level models or specifications.
c) It helps track, control, and manage changes to software artifacts throughout the
development lifecycle.
d) It helps the testing and debugging software applications to ensure their correctness.
76. What is the correct order of phases in the Object-Oriented Development Cycle?
a) Analysis, Design, Implementation, Testing, Maintenance
b) Design, Analysis, Implementation, Maintenance, Testing
c) Analysis, Design, Implementation, Maintenance, Testing
d) Design, Analysis, Testing, Implementation, Maintenance
78. Which of the following activation functions is commonly used for the output layer of a
binary classification neural network?
a) Sigmoid activation function
b) Tanh activation function
c) ReLU activation function
d) Softmax activation function
79. Effective monthly interest rate will be …………., if nominal interest rate of 10%
accounted for continuous compounding
a) 1%
b) 0.84%
c) 1.2%
d) 2%
Page 12