TU Computer Application 2082|08|17 Assistant Professor

त्रिभुवन विश्वविद्यालय सेवा आयोग कम्प्युटर एप्लिकेशन, उपप्राध्यापक पदको खुला प्रतियोगितात्मक लिखित परीक्षा २०८१/०८/१७
पत्र: प्रथम (खण्ड : दोस्रो) KEY [A] समय: ५० मिनेट पूर्णाङ्क: ५० विषय: विषयगत ज्ञान परीक्षण
उत्तरपुस्तिकामा प्रश्नपत्रको KEY अनिवार्य रूपले उल्लेख गर्नुपर्नेछ। उल्लेख नगरेमा उत्तरपुस्तिका रद्द हुनेछ । परीक्षामा calculator, mobile प्रयोग गर्न पाइनेछैन ।
Multiple Choice Marks: 50 * 1 = 50 1. Which of the following sets of logic gates are known as universal gate? A) XOR, NAND, OR C) NOR, NAND, XNOR B) OR, NOT, XOR D) NOR, NAND 2. The main tool used in structured design is a ..... A) DFD B) Structure chart C) Program chart D) ER diagram 3. In which access should a constructor be defined so that object of the class can be created in any function? A) Any access specifier will work B) Private C) Public D) Protected 4. Which of the following tree data structures is not a balanced binary tree? A) Splay tree B) B-tree C) AVL tree D) Red-black tree 5. Software testing with actual data and in real environment is called testing. A) Alpha B) Beta C) Stress D) Regression 6. Which of the following diagrams is used for process modeling? A) Data Flow Diagram C) Class Diagram B) Entity-Relationship Diagram D) All of the above 7. What is the maximum number of possible non zero values in an adjacency matrix of a simple graph with n vertices? A) (n*(n-1))/2 B) (n^ * (n + 1) )/2 C) n*(n-1) D) n^ * (n + 1) 8. Which of the following is behavioral diagram in UML? A) Class diagram B) Object diagram C) Package diagram D) Activity diagram 9. Prototype is a ..... A) working model of the system B) mini model of existing system C) mini model of processed system D) none of the above 10. data structure is mainly used for implementing the recursive algorithm. A) Binary tree B) Linked list C) Stack D) Queue 11. Which of the following is a valid C expression? A) int num = 100,000; B) int num = 100000; C) int num = 100000 D) int $num = 10000; 12. Which of the following concepts is related with physical database design? A) Index B) Attribute C) Relationship D) Entity 13. What are the necessary conditions to cause a deadlock? A) Mutual exclusion, race condition and cache incoherency B) Blocking a process, race condition and memory overflow C) Mutual exclusion, no pre-emption, hold and fully occupied RAM D) Mutual exclusion, no pre-emption, hold and wait and circular wait 14. What is the output of the following code? void main () {int i = 1 , j=2; { int i=4, j=5; printf ("%d%d", i, j) ; } printf ("%d%d", i, j); } A) 4545 B) 1212 C) 4512 D) 1245 15. What is a vectored interrupt? A) Microprocessor automatically knows the address of ISR B) The address of the ISR need to be provided externally C) The interrupt having the highest priority D) The interrupt having the lowest priority 16...... technique helps to processor to run a program concurrently with input outp operations. A) Direct Memory Access (DMA) C) Interrupt Driven I/O B) Input Output Processor (IOP) D) Data Communication Processor (DCP) 17. Which of the following is the interval from the time of submission of a process to time of completion? A) Waiting time B) Turnaround time C) Response time D) Throughput 18. Which of the following SQL command is used to remove attributes from existing relations? A) Alter table B) Create table C) Drop table D) Create domain 19. The data structure suitable for Breadth First Traversal on a graph is ...... A) Array B) Stack C) Queue D) Tree 20. Phishing is..... attack. A) Spamming B) Identify Theft C) Impersonation D) Scanning 21. Which of the following occurs if the resources are always preempted from the sam process? A) Deadlock B) System crash C) Aging D) Starvation 22. A system analyst designs a new system by ...... A) identifying sub systems and the interfaces between sub systems B) adopting a developed system to the present environment C) developing the system as a large, single unit D) propose alternatives to the current system 23. Which of the following switching techniques requires a dedicated path between sender and receiver? A) Message switching B) Packet switching C) Circuit switching D) None of the above 24. Which of the following is not an operating system? A) Android B) Oracle C) Linux D) DOS 25. What is the size of MAC address in medium access control sub layer? A) 16 bits B) 32 bits C) 48 bits D) 64 bits 26. ..... is the time complexity to search an element in the linked list. A) O(n) B) O(1) C) O(logn) D) O(nlogn) 27. The tag used to add images to the HTML document is ......... A) <HR> B) <FONT> C) <HI> D) <IMG> 28. In 16-bit 2's complement representation, the decimal number -28 is..... A) 1000 0000 1110 0100 B) 0000 0000 1110 0100 C) 1111 1111 1110 0100 D) 1111 1111 0001 1100 29. How many opcodes are present in 8-bit microprocessor? A) 246 B) 250 C) 256 D) 278 30. Which of the following architectures is power efficient? A) CISC B) ISA C) IANA D) RISC 31. Which of the following is equivalent to p→ q? A)-p-q B)-q-p C) q→p D) -p^q 32. Which of the following describes polymorphism in object-oriented software engineering? A) The ability to create classes from existing classes B) The ability of different objects to respond to the same message in different ways C) The bundling of data and methods that operate on the data D) The ability to define multiple constructors in a class 33. Which of the following is surjective function? A) One-to-one function. B) One-to-one correspondence C) Onto function D) Identity function 34. Which of the following is used for creating the structure of the relations, deleting relations etc? A) DML B) DDL C) Query D) Relational Schema 35. ..... is not done by data link layer. A) Error control B) Flow control C) Channel coding D) Framing 36. Which of the following HTML tags is used to crate a hyperlink? A) <link> B) <a> C) <href> D) <hyperlink> 37. Which of the following is a rigid body deformation? transformation that moves objects without A) Rotation B) Scaling C) Translation D) All of the above 38. Which of the following is not a function of the database? A) Data storage B) Data integrity C) Data manipulation D) User interface optimization 39. Which of the following best describes 'encapsulation' in OOP? A) Encapsulation refers to hiding the internal state of an object and requiring a interactions to be performed through an object's methods B) Encapsulation allows a class to inherit characteristics from another classes C) Encapsulation ensures that a class has multiple forms D) Encapsulation refers to the technique of defining a class without specifying the detai of the data 40. Which of the following IP addresses are on the same subnet for the subnet masko 255.255.255.240? A) 30.30.30.30. 30.30.30.34, 30.30.30.38 B) 40.40.40.40, 40.40.40.45, 40.40.40.50 C) 50.50.50.50, 50.50.50.55, 50.50.50.60 D) 60.60.60.60, 60.60.60.65, 60.60.60.70 41. Which of the following is a flow control technique? i) Stop and wait ii) Go back N iii) Selective repeat A) only i B) only i and ii C) only ii and iii D) All i, ii and iii 42. ..... is used for tracking uncertain events. A) Sensors B) Acthators C) Filtering algorithms D) Agents 43. Which of the following algorithms is used for symmetric-key encryption? A) RSA B) AES C) DSA D) ECC 44. Which of the following is related to based on Backtracking? A) Last in first out B) First in first out C) Recursion D) LIFO and Recursion 45. Which search method takes less memory? A) Depth-First Search B) Breadth-First Search C) Linear Search D) Optimal Search 46. .. search is/are similar to minimax search. A) Depth first B) Breadth first C) Hill climbing D) Both B and C 47. Which of the following frameworks is commonly used for processing and analyzing large-scale big data? A) Tensor Flow B) Apache Hadoop C) MySQL D) MongoDB 48. Which normal form deals with multivalued dependency? A) 1NF B) 2NF C) 3NF D) 4NF 49. Forward chaining systems are driven. driven whereas backward chaining systems are..... A) goal, goal B) goal, data C) data, goal D) data, data 50. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses 255.255.255.224 subnet mask? A) 16 B) 30 C) 40 D) 50
-The End-
उत्तरपुस्तिकामा KEY अनिवार्य रुपमा लेख्नुहोला।


त्रिभुवन विश्वविद्यालय सेवा आयोग कम्प्युटर एप्लिकेशन, उपप्राध्यापक पदको खुला प्रतियोगितात्मक लिखित परीक्षा २०८२।०८।१७
पत्रः द्वितीय पूर्णाङ्कः १०० समयः ३ घण्टा विषयः विषयगत विज्ञता, अनुसन्धान तथा शिक्षण सिकाइ
प्रत्येक Section जो उत्तर छुट्टाछुट्टै उत्तरपुस्तिकामा लेख्नुपर्ने। अन्यथा उत्तरपुस्तिका रद्द हुनेछ।
Section: "A" 50 Marks
1. What is distributed database? Why is it important? Explain the transparency and its types in distributed databases. 2 + 3 + 5 2. What is the significance of using decision tree in artificial intelligence? Construct a decision tree from the data set of your choice using ID3 algorithm. Also, express the decision tree in a rule format. 2 + 6 + 2 3. Explain supervised learning with example. Differentiate supervised learning with unsupervised learning. Also, differentiate between RISC and CISC architecture. 6 + 2 + 2 4. Explain the use of normalization in database design. Compare the 1NF, 2NF, 3NF and BCNF with example. 4+6 5. What is the difference between message passing machines and shared memory machines? Which one of these is commonly implemented with either centralized or distributed memory? Explain. 5+5
Section: "B" 50 Marks
6. Why is cloud computing considered a most important service to all the organizations these days? Why is blockchain important? Explain. 7+3=10 7. Identify different problems in computer application research. What particular research method will be appropriate for computer application research? Describe. 5+5=10 8. Tribhuvan University is going to start the MCA program in different constituent campuses. There is lack of staff, faculty and infrastructure. Discuss the detail possible solution in this regard. 10 9. Identify different problems in the course structure of MCA program of Tribhuvan University. How can you improve this structure to make this program more applicable in today's world? Write. 5+5=10 10. Analyze the effectiveness of various teaching and learning methods in higher education, focusing on their impact on student engagement and learning outcomes. Discuss and evaluate traditional methods such as lectures and seminars, as well as contemporary methods like active learning, flipped classroom and online learning. 10
-The End-