0% found this document useful (0 votes)
559 views12 pages

Be It Question

This document contains a sample exam for an Information Technology certification with 45 multiple choice questions covering topics in IT, computer science, programming, networking, electronics, and engineering. The questions range in difficulty from basic concepts to more advanced topics and assess knowledge across these technical domains.

Uploaded by

sheham ihjam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
559 views12 pages

Be It Question

This document contains a sample exam for an Information Technology certification with 45 multiple choice questions covering topics in IT, computer science, programming, networking, electronics, and engineering. The questions range in difficulty from basic concepts to more advanced topics and assess knowledge across these technical domains.

Uploaded by

sheham ihjam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Nepal Engineering Council Registration Examination

Model Question for Information Technology (AItE)

Section A (60*1 = 60)

1. Decibel relation for power gain is:


𝑉2 𝑍
a) 𝑁𝑑𝐵 = 20 𝑙𝑜𝑔10 (𝑉22 ) + 20 𝑙𝑜𝑔10 (𝑍1 )
1 2
𝑉22 𝑍1
b) 𝑁𝑑𝐵 = 10 𝑙𝑜𝑔10 (𝑉 2 ) + 10 𝑙𝑜𝑔10 (𝑍 )
1 2
𝑉2 𝑍2
c) 𝑁𝑑𝐵 = 20 𝑙𝑜𝑔10 (𝑉 ) + 10 𝑙𝑜𝑔10 (𝑍 )
1 1
𝑉2 𝑍2
d) 𝑁𝑑𝐵 = 10 𝑙𝑜𝑔10 (𝑉 ) + 10 𝑙𝑜𝑔10 (𝑍 )
1 1

2. Maximum power that can be transfer from source to load is:


a) 25%
b) 75%
c) 50%
d) 100%
𝑅
3. Power factor has maximum value of:
𝑍
a) 0.0
b) 0.5
c) 1.0
d) 1.5

4. EEPROM has drain and floating gate gap of …..


a) 5 nm
b) 10 nm
c) 12 nm
d) 15 nm

5. Heisenberg principle of uncertainty says:


a) Signal of 10Hz can be generated.
b) Signal of 10MHz can be generated.
c) Signal of 100MHz can be generated.
d) Signal of band 100MHz-105MHz can be generated

6. UHF frequency signal can be amplified using:


a) Class A amplifier
b) Class AB amplifier
c) Class C amplifier
d) Class B amplifier

7. Two’s complement of 00011011 is:


a) 11100100
b) 11100101
c) 11000101
d) 11110001

Page 1
8. Elementary building block of combinational circuit is:
a) Logic gate
b) Flip-flop
c) Both logic gate and flip-flop
d) Memory

9. Synchronous circuit that changes its state at specific clock signal is:
a) Event driven
b) Clock driven
c) Pulse driven
d) Frequency driven

10. Bandwidth of microprocessor represents:


a) Clock speed
b) Width of internal bus
c) Number of bit processed/instruction
d) Number of bit processed/sec

11. PPI 8255 has internal bus of size:


a) 4 bit
b) 8 bit
c) 16 bit
d) 32 bit

12. Interrupt Service Route (ISR) executes


a) Before execution of current instructions
b) With pause of current instructions
c) After execution of current instructions
d) With execution of no instruction

13. What is the purpose of the "printf ()" function in C programming?


a) To print output to the console
b) To read input from the console
c) To perform arithmetic operations
d) To declare variables

14. What is the purpose of the "rewind ()" function in C programming?


a) To move the file pointer to the end of the file
b) To move the file pointer to the beginning of the file
c) To read data from a file
d) To write data to a file

15. Which of the following access specifiers in C++ allows access to class members only
within the class?
a) Public
b) Private
c) Protected
d) Friend

Page 2
16. What is the purpose of a constructor in C++?
a) To create data members of a class
b) To overload operators in a class
c) To initialize data members of a class
d) To free memory used by an object

17. Which of the following is true about pure virtual functions in C++?
a) They have a function body
b) They can be called directly
c) They can only be declared in the derived class
d) They can only be declared in the base class

18. What is the purpose of the try block in C++ exception handling?
a) To catch exceptions that are thrown by the program
b) To declare the variables that are used in the catch block
c) To handle errors that are caught by the program
d) To define the exceptions that are thrown by the program

19. Which of the following is not an addressing mode?


a) Direct addressing mode
b) Indirect addressing mode
c) Inverted addressing mode
d) Indexed addressing mode

20. Which of the following is a fundamental principle of cache memory design?


a) Increasing the cache size always improves performance
b) A direct mapping function is always better than an associative mapping function
c) The least recently used replacement algorithm is always the best choice
d) The cache should store frequently used data to reduce memory access time

21. Which of the following is not a characteristic of multiprocessors?  it should be related


to 4.3
a) Enhanced reliability
b) Reduced complexity
c) Sharing of resources
d) Increased throughput

22. What is an application-specific instruction-set processor (ASIP)?


a) A processor that is optimized for a specific application
b) A processor that can run any application
c) A processor that is designed for general-purpose computing
d) A processor that can be programmed by the user

23. What is the purpose of a watchdog timer in an RTOS?


a) To control the execution of tasks
b) To synchronize I/O operations

Page 3
c) To monitor the system and detect faults
d) To schedule tasks based on their priority

24. What does VHDL stand for?


a) Very High Definition Logic
b) Very High-level Design Language
c) Virtual Hardware Description Language
d) Vector High-level Design Logic

25. Which networking device operates at the data link layer of the OSI model and filters
traffic based on MAC addresses?
a) Hub
b) Router
c) Switch
d) Bridge

26. Which error detection and correction technique involves adding redundant bits to the
data being transmitted?
a) Parity check
b) Checksum
c) Hamming code
d) CRC

27. Which routing algorithm is used by the Open Shortest Path First (OSPF) protocol?
a) Distance vector
b) Link state
c) Path vector
d) Hierarchical

28. Which protocol at the transport layer provides reliable, connection-oriented data
transfer?
a) UDP
b) FTP
c) TCP
d) ICMP

29. Which protocol is used for email transfer?


a) HTTP
b) FTP
c) SNMP
d) SMTP

30. Which type of network security device is used to monitor and filter incoming and
outgoing network traffic?
a) Antivirus software
b) Intrusion detection system (IDS)

Page 4
c) Firewall
d) Virtual private network (VPN)

31. What is the value of tangential component of electric field in a dielectric-conductor


boundary (interface)?
a) Zero
b) Infinite
c) One
d) Three

32. Which of the following statements are true regarding Bio-Savart’s Law?
a) Magnetic field directly proportional to Cross sectional area of conductor.
b) Bio-Savart’s Law deals with Electric field.
c) Magnetic field directly proportional to Current through the conductor.
d) Electric field directly proportional to Current through the conductor.

33. For a plane wave Propagation in an unbound medium (free Space) the minimum angle
between electric field and magnetic field vector is …..
a) 0°
b) 30°
c) 90°
d) 180°

34. What is the radiation pattern of an isotropic radiator?


a) Doughnut
b) Sphere
c) Hemisphere
d) Circular

35. Which of the following is not true with respect to antenna?


a) Lower Frequencies are radiated near the end of transmission line.
b) Horn antennas are used to feed parabolic disk Antenna.
c) Yogi-Uda antennas have high bandwidth and low gain.
d) Higher frequencies are radiated near the feed point.

36. The path loss in free space propagation is proportional to ………..


[Option]
a) Square of distance
b) Inverse of the distance
c) Logarithm of the distance
d) Proportional to the distance

37. ……………….. level is where the model becomes compatible and executable code
a) Abstract level
b) Application level
c) Implementation level
d) All of the above

Page 5
38. What is the hash function used in the division method?
a) h(k) = k/m
b) h(k) = k mod m
c) h(k) = m/k
d) h(k) = m mod k

39. Redundancy is reduced in a database table by using the ------------ form.


a) Abnormal
b) Normal
c) Special
d) Exactly

40. It is advisable, to store the -------- before applying the actual transaction to the database.
a) Data
b) Logs
c) Receive
d) Record

41. To enforce ………………….. two functions are provided enter-critical and exit-critical,
where each function takes as an argument the name of the resource that is the subject of
competition.
a) Mutual Exclusion
b) Synchronization
c) Deadlock
d) Starvation

42. If you wanted to require that a user enter an Administrator password to perform
administrative tasks, what type of user account should you create for the user?
a) Administrator User account
b) Standard User account
c) Power User account
d) Authenticated User account

43. The process to gather the software requirements from client, analyze and document them
is known as ___________________.
a) Feasibility Study
b) Requirement Gathering
c) Requirement Engineering
d) System Requirements Specification

44. What is reference architecture?


a) It is a reference model mapped onto software components
b) It provided data flow with comments
c) It provides data flow with pieces
d) It is a reference model mapped onto software components & data flow with comments

Page 6
45. Which access specifier is used to make the members of a class accessible only within the
same class?
a) public
b) private
c) protected
d) public and protected

46. What is operator overloading in C++?


a) Defining a new operator.
b) Overriding an existing operator.
c) Changing the behaviour of an existing operator.
d) Changing the behaviour of new operator.

47. What is the difference between ifstream and ofstream in C++?


a) ifstream is used for input, while ofstream is used for output.
b) ofstream is used for input, while ifstream is used for output.
c) both are used as input.
d) both are used as output

48. What is a class template in C++?


a) A class that can be used to create objects of different types.
b) A function that can be used to create objects of different types.
c) A variable that can be used to create objects of different types.
d) A character that can be used to create objects of different types.

49. Which of the following is not a medium of transmission?


a) Microwave system
b) Wire
c) Free space
d) Fiber optic cable

50. Actual radio coverage of a cell is called __________


a) Fingerprint
b) Footprint
c) Imprint
d) Matrix

51. Rake Receiver does….


a) Forward Error Correction
b) Backward Error Correction
c) Resembles equalizer
d) Resembles equalizer and Counter effects multipath fading

52. The bit rate of personal communication is __________


a) 300 to 9600 bits/sec
b) 300 to 3400 bits/sec
c) 400 to 9600 bits/sec
d) 400 to 3500 bits/sec

Page 7
53. The ATM is an example for _____________ circuit network.
a) Datagram subnet
b) Virtual circuit subnet
c) Packet subnet
d) Volume subnet

54. Which agency sets the standards for telecommunications internationally?


a) International Telecommunication Union (ITU)
b) International Centre for Telecommunication Science (ICTS)
c) International Telecommunication Protocol (ITP)
d) Integrated Telecommunication of the United Nations (ITUN)

55. Standard dimensions (mm x mm) of A3 drawing sheet is


a) 11.69 × 16.54
b) 29.7 × 42
c) 297 × 420
d) 420 × 280

56. Which of the following methods of charging depreciation of an asset has increased
amount of depreciation as the age of asset increases
a) sum-of-year digit
b) sinking fund
c) diminishing balance
d) straight line

57. The process of optimizing the project’s limited resources without extending the project
duration is known as
a) project crashing
b) resource levelling
c) resource smoothing
d) networking

58. The process of composing/raising the required fund from different sources such as
equity, preferred stock, bond and debenture is known as
a) capital structure planning
b) project financing
c) capital budgeting decision
d) deducing earning per share

59. In which of the following society, people used to seek their existence on growing plants
for their cattle and domestic animals
a) pastoral society
b) tribal society
c) horticultural society

Page 8
d) agricultural society

60. According to Nepal Engineering Council Act, 2055 (Revised, 2079), all engineering
academic institutions shall be …………………….. in the Council.
a) affiliated
b) united
c) recognized
d) associated

Section-B (20*2 = 40)

40
61. A 10 μH inductor, π2 pF capacitor and a 628 Ω resistor are connected to form a series
RLC circuit. Calculate Q-factor of this circuit at resonant frequency.
a) 1.0142x10-6
b) 2.50
c) 1.0142x10-9
d) 2.50x10-3

62. A 400 mH coil of negligible resistance is connected to an AC circuit in which an


effective current of 6 mA is flowing. Find out the voltage across the coil if the frequency
is 1000 Hz.
a) 15.07V
b) 15079.67 V
c) 150.79 V
d) 15079 V

63. Convert (312)8 into decimal:


a) (200)10
b) (202)10
c) (204)10
d) (206)10

64. A microcontroller is running a program with a clock frequency of 8 MHz. The


microcontroller receives an interrupt request from an external device that requires 20
cycles to service. What is the time required to service the interrupt?
a) 2.5 µs
b) 20 ns
c) 40 ns
d) 160 ns

65. What is the output of the following code snippet?


int x = 7;
int y = 11;
Printf ("%d", ++x%y);
a) 7

Page 9
b) 9
c) 8
d) 4

66. Which of the following correctly defines a default argument in a function in C++?
a) void function (int x = 0, int y);
b) void function (int x, int y = 0, in z);
c) void function (int x = 0, int y, int z);
d) void function (int x, int y=0, int z = 0);

67. Which of the following is a mode of transfer in I/O operations that enables the CPU to
perform other tasks while the data transfer is taking place?
a) Programmed I/O
b) Interrupt-driven I/O
c) Direct memory access (DMA)
d) Memory-mapped I/O

68. What is the main difference between a real-time operating system (RTOS) and a general-
purpose operating system (GPOS)?
a) RTOS is designed for time-critical applications, while GPOS is not
b) RTOS is more complex than GPOS
c) RTOS has more features than GPOS
d) RTOS can run on any type of hardware, while GPOS is designed for specific
hardware configurations

69. What is the purpose of Address Resolution Protocol (ARP)?


a) To convert IP addresses to MAC addresses
b) To convert MAC addresses to IP addresses
c) To route packets between networks
d) To detect and correct errors in data transmission

70. Which network layer protocol is used to fragment and reassemble packets that are too
large to be transmitted over the network?
a) IP
b) ARP
c) ICMP
d) TCP

71. Five Equal Capacitors are connected in series have a resultant capacitance of 4µF. When
these are Put in parallel and Charged to 400 V, the total Energy stored is:
a) 16 J
b) 8 J
c) 4 J
d) 2 J

Page 10
72. A 100 µF Capacitor rated for 400 V, 50 Hz has tanδ = 0.01. What will be the rated
dielectric loss?
a)100.5 W
b) 50.2 W
c) 10 W
d) 222 W

73. What does the following function do for a given Linked List with first node as head?
void fun1(struct node* head)
{
if (head == NULL)
return;
fun1(head->next);
printf("%d ", head->data);
}

a) Prints all nodes of linked lists


b) Prints all nodes of linked list in reverse order
c) Prints alternate nodes of Linked List
d) Prints alternate nodes in reverse order

74. Consider the following three processes in the FCFS. What is the average waiting time?
Process ID. Brust-time Arrival-time
P1 3 3
P2 6 6
P3 9 9
a) 2
b) 3
c) 4
d) 5

75. What kind of support is provided by the Code Generation CASE tool?
a) Cross referencing queries and requirements tracing
b) Transformation of design records into application software
c) Compiling, interpreting or applying interactive debugging code
d) Transformation of design records into application software AND Compiling,
interpreting or applying interactive debugging code

76. What is the output of the following C code?


int x = 10, y = 20;
int *p = &x, *q = &y;
*p = *q;
*q = 30;

a) x = 10, y = 20
b) x = 20, y = 30
c) x = 30, y = 20

Page 11
d) x = 30, y = 30

77. A spectrum of 30 MHz is allocated to a cellular system, which uses two 25 KHz simplex
channels to provide full duplex voice channels. What is the number of channels available
per cell for 4-cell reuse factor?
a) 150 channels
b) 600 channels
c) 50 channels
d) 85 channels

78. A rate ½ convolution code with dfref = 10 is used to encode a data resequencing
occurring at a rate of 1 Kbps. The modulation is binary PSK. The DS spread spectrum
sequence has a chip rate of 10 MHz The coding gain is ………..
a) 9 dB
b) 7 dB
c) 12 dB
d) 24 dB

79. Effective monthly interest rate will be …………., if nominal interest rate of 10%
accounted for continuous compounding
a) 1%
b) 0.84%
c) 1.2%
d) 2%

80. By considering following activities of a project, the project duration will be


Activity A B C D E
Immediate predecessors - - - C A, B, D
Duration (days) 4 5 3 7 5
a) 9 days
b) 10 days
c) 15 days
d) 24 days

Page 12

You might also like