0 of 80 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 80 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
which component opposes any changes in current?
A junction where two or more than two network elements meet is known as
For a polyphase system, the number of Wattmeter required to measure power is equal to ________ ?
How is the resistance of semiconductor classified?
The condition for zero phase shift in wein bridge oscillator is achieved by
What kind of design is used to avoid transformer usage?
___ is the fastest logic family. It’s used in high speed applications
A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as
In which code successive code characters differ in only one bit position?
In the execution stage the function performed is
How many pins does the 8255 PPI IC contains?
Whenever a number of devices interrupt a CPU at a time, and if the processor is able to handle them properly, it is said to have
The gets() and puts() functions are defined by
fwrite() can be only used with the files that are opened in binary mode.
The keyword friend is placed only in the
Multiple Inheritance is not supported by
Which of the following is not the manipulators?
In how many ways templates concept can be used?
The 16 bit register in 8085 is
The circuit used to store one bit of data is known as
Which of the following is the circuit board on which chips and processor are placed?
Which of the following cannot carry implicit information?
How is the protection and security for an embedded system made?
For using a process to implement a combinational circuit, which signals should be in the sensitivity list?
Which layer of the OSI model is responsible for breaking down data into smaller units for transmission over a network?
Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
In computer networking, which protocol is used to map IP network address to hardware MAC address?
User datagram protocol is called connectionless because _____________
The packet of information at the application layer is called __________
WPA2 is used for security in _______
Context sensitive Grammar can be recognized by
Language of finite automata is ___ according to Chomsky classification.
If T1 and T2 are two turing machines. The composite can be represented using the expression:
____ algorithm are classified according to whether they deal with object definitions directly or with object definitions directly or with their projected images.
Gouraud shading is also known as :
Which graphics software standard is widely used for 3D graphics and provides a platform independent API for rendering high performance interactive graphics?
Which sorting algorithm is used to sort arrays in place?
Which of the following algorithms can be used to find the shortest path between two nodes in a graph?
What are the rows of a relation referred to as ?
When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This is
A process P1 has a period of 50 and a CPU burst of t1 = 25, P2 has a period of 80 and a CPU burst of 35. The total CPU utilization is ____________
A process is thrashing if ____________
___ is known as Agile scrum methodology.
Actual programming of software code is done during the ____________ step in the SDLC.
Degree to which design specifications are followed in manufacturing the product is called
___ diagrams that helps to show dynamic aspects related to a system.
____ works as bridge between two incompatible interfaces.
Objects are executed__
Which agent deals with happy and unhappy states?
How many ways are available to solve the state-space search?
Which is not a property of representation of knowledge?
What are the two subfields of Natural language processing?
Application of machine learning methods to large databases is called___
An Artificial Neural Network Is based on?
The following is not included in the title of the drawing sheet?
The minimum interest rate expected by the company or organization while investing in a project is called
The full form of PERT is ___________
The notice shall be published in national newspaper by giving a period of at least 30 days in
Which of the following labor act is the current one for ensuring the safety and health of workers in Nepal?
CPM is a …
The voltage gain of the amplifier is 8 and the current gain is 7. The power gain of the amplifier is
At the resonant frequency, what is the phase shift for the output in a Wien Bridge oscillator?
What will be the output from a D flip-flop if D = 1 and the clock is low?
The characteristic equation of J-K flip-flop is ______________
Predict the output:
float x= 3.1496; cout << setprecision(2) << x;
What does the following code do ?
void my_recursive_function(int n) { if(n == 0) return; my_recursive_function(n-1); printf("%d ",n); } int main() { my_recursive_function(10); return 0; }
Which of the following statements are true for von Neumann architecture?
The code given below is a VHDL implementation of _________
ARCHITECTURE my_circuit OF my_logic IS BEGIN WITH ab SELECT y <= x0 WHEN “00”; x1 WHEN “01”; x2 WHEN “10”; x3 WHEN “11”; END my_circuit;
Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________
For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)
If a ‘3 x 3’ matrix shears in X direction, how many elements of it are ‘1’?
Which of the following regular expressions represents the set of strings which do not contain a substring ‘rt’ if ∑= {r, t}
What is the main difference between graph traversal and tree traversal?
m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’ and the sum of all their maximum needs is always less than m+n. In this setup, deadlock ____________
How is plan driven development different from agile development ?
_____________&_____________ are two kinds of software products.
In default logic, which of the following inference rules of the form is allowed?
DFS is ______ efficient and BFS is __________ efficient.
The ratio of area of drawing sheet A0 to the area of A2 is
Getting Rs 2000 now is equal to getting ….. in 6 years considering the rate of interest 6% per annum.