0% found this document useful (0 votes)
40 views

MIT Entrance Model Question

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

MIT Entrance Model Question

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Tribhuvan University

Institute of Science and Technology


MIT Entrance Model Question
Full Marks: 100 Time: 2 Hrs.
Pass Marks: 35
Attempt all questions. Please Tick/Encircle the correct answer. Any omission or correction
to the answers is not allowed.
_____________________________________________________________________________

Basic Mathematics

1. The system: x − y = 7; −x + y = 3 has ……….


a. one solution
b. no solution
c. infinitely many solutions
d. two solutions

2. The vectors 𝐚 = (2, 3)and𝐛 = (4, 6) are ……….


a. Linearly dependent
b. Orthogonal
c. Parallel
d. linearly independent

3. The matrix A = [1 2] is ……….


5 0
a. triangular
b. diagonal
c. nonsingular
d. symmetric

1 2
4. If A = ( ) then A−1 is ………
3 5
−1 −2
a. ( )
−3 −5

5 −2
b. ( )
−3 1

1 2
c. 1/ ( )
3 5

𝟓 −𝟐
d. ( )
−𝟑 𝟏

1 of 16
5. For all vectors a and bin a vector space V we have ……….
a. |𝐚 + 𝐛| ≤ |𝐚| + |𝐛|
b. |a + b| < |a| + |b|
c. |a + b| > |a| + |b|
d. |a + b| ≥ |a| + |b|

6. The set of positive integers with respect to addition operation is not a group as it has ……
a. identity element
b. no inverse element
c. no associative property
d. no commutative property

7. The range of 𝑦 = √𝑥 − 3 is ……….


a. (−∞, 3]
b. (0, 3)
c. [𝟎, ∞)
d. [− ∞, ∞]

𝑘 𝑘
8. If lim xx−−22 = 32, then k = ………
x→2
a. 0/0
b. 2
c. 0
d. 4

9. The absolute maximum of𝑓(𝑥) = 𝑥 3 + 3𝑥 2 on[−3, 1] is ………


a. 4
b. 0
c. 2
d. 12

b
10. The integral∫a f(x) 𝑑𝑥 = ……….
a. F(a) − F(b)
b. F(a) + F(b)
c. 𝐅(𝐛) − 𝐅(𝐚)
d. F(x) + 𝑐

3 dx
11. The integral∫0 ……..
x−3
a. converges
b. diverges
c. is not an improper integral
d. none of the above

2 of 16
12. The solution of 𝑦 ′ + 𝑦 = 0, 𝑦(0) = 1 is ………
a. e−x + c
b. ex
c. lnx
d. 𝐞−𝐱

13. The function 𝑓(𝑥) = x 3 − 12𝑥 − 5, in (−2, 2) is ……..


a. increasing
b. decreasing
c. neither increasing nor decreasing
d. none of the above

14. If z = 𝑒 𝑥𝑦 then𝑧𝑥 = ……….


a. 𝑥𝑦
b. 𝐳𝐲
c. xz
d. 𝑒 𝑥𝑦

15. The equation of the plane through the point P(−3, 0, 7) perpendicular to
n = (5, 2, −1) is……….
a. 5x − 2y −z −22 = 0
b. 5x − 2y + z + 22 = 0
c. x− 2y −z + 22 = 0
d. 5x − 2y −z + 22 = 0

Basic Statistics

16. If you are asked to choose the favorite color from the set of seven colors, what level of
measurement would be used from the following?
a. Nominal
b. Ordinal
c. Interval
d. Ratio

17. The arithmetic mean of 6 observations is 2. If a constant value is subtracted from/added


to each observation, then the arithmetic mean will ………
a. not be changed
b. be multiple of that constant value
c. be decreased/increase by that constant value
d. be reciprocal of that constant

18. If there are 20 observations each equal to 20, then the variance of this distribution is ….
a. 400
b. 20
c. 1
d. 0

3 of 16
19. A student is to be selected for scholarship from two campus –Campus A , and campus B.
The probability of selecting any one campus is 50%. The probability of selecting a
student from Campus A is 80% and that from Campus B is 20%. What is the probability
of selecting student from any campus?
a. 0.40
b. 0.5
c. 0.1
d. None of the above

20. Which of the following is true if the correlation coefficient between two variables X and
Y is -0.9?
a. There is strong correlation because of X
b. Correlation coefficient does not measure the cause and effect relationship
between the variables
c. There is strong correlation because of Y
d. None of the above statement is correct

Software Engineering

21. CMM stands for ……….


a. Capability Maturity Model
b. Configuration Maturity Model
c. Capability Maturity Machine
d. Common Maturity Model

22. Use case diagram helps in gathering ……….


a. Non functional requirement
b. Functional requirement
c. Virtual requirement
d. All of the above

23. The process of generating design specification from code is ………..


a. Reengineering
b. Reverse engineering
c. Design engineering
d. Process engineering

24. Which of the following team structure assigns leader on a adhoc basis?
a. Controlled Centralized
b. Democratic Decentralized
c. Controlled Decentralized
d. Democratic Centralized

4 of 16
25. “Are we building the product right?” resembles to ………
a. Validation
b. Alpha-testing
c. Regression-testing
d. Verification

Digital Logic

26. Which of the following is the universal gate?


a. AND
b. OR
c. NAND
d. NOT

27. Ripple counter is ……….


a. Synchronous
b. Asynchronous
c. Serial
d. Cyclic

28. Which of the following is true regarding Multiplexer?


a. One to one
b. One to many
c. Many to one
d. Many to many

29. Flip flop can be considered as ………. Element.


a. Memory
b. Cache
c. Flip
d. Race

30. What is the base of BCD?


a. 2
b. 8
c. 10
d. 16

Computer Networks

31. Which are valid ARQ?


a. Stop and wait
b. Go back
c. Selective
d. All of the above

5 of 16
32. Router lies in the ………. Layer
a. Physical
b. Data
c. Network
d. Session

33. TCP header ranges from ………. Bytes.


a. 10-20
b. 20-40
c. 40-60
d. 60-80

34. Which one of the following is true regarding IPv6?


a. Classful
b. Classless
c. Class A
d. Class C

35. Which of the following is true regarding coaxial Cable?


a. Supports high bandwidth
b. Are reliable
c. Less affected by noise or cross talk
d. All of the above

Microprocessor and Architecture

36. 8085 microprocessor consists of ………. Pins.


a. 20
b. 30
c. 40
d. 55

37. Which of the following is true regarding address bus?


a. Unidirectional
b. Bidirectional
c. Any directional
d. All of the above

38. Which sequence is valid?


a. Execute, fetch, decode
b. Fetch, execute, decode
c. Decode, fetch, execute
d. Fetch, decode, execute

6 of 16
39. Pipelining is a technique where instructions are ………
a. Overturned
b. Overlapped
c. Overwhelmed
d. Overtuned

40. Which of the following is true regarding Booth’s Algorithm?


a. Binary division
b. Binary addition
c. Binary multiplication
d. Binary Subtraction

System Analysis and Design

41. Which one of the following information system development models focuses more on
risk handling?
a. Waterfall
b. Prototyping
c. Spiral
d. RAD

42. Which one of the following is process modeling tool in structured development?
a. Class diagram
b. Data flow diagram
c. Entity relationship diagram
d. Use case diagram

43. Which one of the following is logic modeling tool in structured development?
a. Decision table
b. Decision tree
c. Entity relationship diagram
d. Both a and b

44. Which one of the following is Agile development methodology?


a. Scrum
b. Extreme Programming
c. Kanban
d. All of the above

45. User testing of a completed information system using simulated data is called
a. Alpha testing
b. Beta testing
c. Gama testing
d. Stress testing

7 of 16
Database Management System

46. Which of the following SQL command is used to remove attributes from an existing
relation?
a. Create table
b. Drop table
c. Alter table
d. Create domain

47. Which one of the following normal forms removes transitive dependency?
a. 1NF
b. 2NF
c. 3NF
d. 4NF

48. Which one of the following concepts in database management system allows
relationships between relationships?
a. Specialization
b. Generalization
c. Aggregation
d. Both a and b

49. Which one of the following is the execution order of commands in SQL query?
a. SELECT, FROM, WHERE
a. SELECT, WHERE, FROM
b. FROM, SELECT, WHERE
c. FROM, WHERE, SELECT

50. Which of the following recovery technique requires undo operation?


a. Deferred update
b. Shadow paging
c. Immediate update
d. Checkpoint

Introduction to Information Technology

51. Components that provide internal storage to the CPU are


a. Registers
b. Program Counters
c. Controllers
d. Internal chips

8 of 16
52. Which of the following is designed to control the operations of a computer?
a. System Software
b. Application Software
c. Utility Software
d. User

53. Which one of the following devices provides communication between a computer and the
outer world?
a. Compact
b. I/O
c. Drivers
d. Storage

54. A service that allows a user to log in into another computer somewhere on the Internet.
a. Telnet
b. FTP
c. e-mail
d. UseNet

55. Which one of the following is database management system?


a. Word
b. Excel
c. Power point
d. Access

Data Structure and Algorithm

56. Which of the following is a linear data structure?


a. Array
b. Binary Tree
c. Binary Search Tree
d. AVL tree

57. If the size of the stack is 10 and we try to add the 11th element in the stack then the
condition is known as ……..
a. Underflow
b. Garbage Collection
c. Overflow
d. None of the above

58. Which of the following sorting algorithms can be used to sort a random linked list with
minimum time complexity?
a. Insertion Sort
b. Quick Sort
c. Merge Sort
d. Selection Sort

9 of 16
59. How many swaps are required to sort the given array using bubble sort - { 2, 5, 1, 3, 4}
a. 4
b. 5
c. 6
d. 7

60. Which data structure is required to convert the infix to prefix notation?
a. Stack
b. Linked List
c. Binary Tree
d. Queue

Computer Graphics
61. From the given list of options, which one is the accurate and efficient line-generating
algorithm?
a. Midpoint algorithm
b. DDA algorithm
c. Bresenham’s line algorithm
d. None of the above

62. Which of the following is a Computer Graphics Curve?


a. Bezier Curves
b. Implicit Curves
c. Explicit Curves
d. All of the above

63. The three primary colors define which of these color models?
a. CMY and HSV
b. RGB and HSV
c. RGB and CMY
d. HSV and HLS

64. Geometric transformation include


a. Transition
b. Drawing
c. Scaling
d. None of the above

65. The process of positioning an object along a straight line path from one coordinate point
to another is called
a. Translation
b. Reflection
c. Shearing
d. Transformation

10 of 16
E-Commerce
66. ……… is an early form of E-commerce
a. SCM
b. EDI
c. Both of these
d. None of these

67. Which dimension of e-commerce enables commerce beyond the boundaries of the
country?
a. Richness
b. Interactivity
c. Global Reach
d. Ubiquity

68. Which is the set of rules that limits access to information?


a. Availability
b. Integrity
c. Authenticity
d. Confidentiality

69. Which type of E - Commerce is Amazon?


a. B2B
b. B2C
c. G2B
d. G2C

70. Which is the function of specifying access rights to resources related to information
security?
a. OTP
b. Pin
c. Authorization
d. Passcode

C Programming

71. Let a=4, what will be the value of variable a after executing the statement a=a<<1.
a. 1
b. 2
c. 4
d. 8
72. Consider a=4 and b=5; what will be the values of c, a, and b after executing the
statement: c=++a + b++;
a. a=5 b=6 and c=11
b. a=5 b=5 and c=10
c. a=5 b=6 and c=10
d. a=4 b=6 and c=10
11 of 16
73. Let chat c=’a’, what will be the output of following statements c=c+1; printf(“c=%c”,c);
a. c=a
b. c=b
c. c=c
d. Error

74. What will be the best size of character array for storing string of 10 characters?
a. 11
b. 10
c. 9
d. All of the above

75. Which operator is used to access content of a pointer variable?


a. Ampersand Operator
b. Indirection Operator
c. Star Operator
d. Arrow Operator

Object Oriented Programming


76. Which of the following statement is FALSE about ‘endl’?
a. It takes cursor of next line
b. It is a manipulator
c. It is an IO stream
d. It is used with cout.

77. Which of the following statement is TRUE about member variables?


a. Memory for member variables is allocated at the time of class declaration
b. Memory for member variables is allocated at the time of object creation
c. Memory for member variables is allocated at run time
d. None of the above

78. Which concept of C++ breaches data hiding principle of OOP?


a. Protected Access Specifier
b. Friend Function
c. Virtual Function
d. Abstract Class

79. We can define objects of one class within another class as member variables. What we
call this feature of OOP?
a. Encapsulation
b. Inheritance
c. Membership
d. Aggregation

12 of 16
80. How can we resolve ambiguity due to multipath inheritance in C++?
a. By using virtual base class
b. By using virtual function
c. By using friend function
d. By using scope resolution operator

Operating Systems

81. Which of the following is example of shell?


a. Command Prompt
b. Disk cleaner
c. Disk defragmenter
d. All of the above

82. Which of the following is non busy waiting technique of interprocess communication?
a. Lock variable
b. Peterson’s solution
c. Strict Alteration
d. Sleep and wakeup

83. Which of the following is not a deadlock recovery technique?


a. Ostrich Algorithm
b. Preemption
c. Rollback
d. Killing Processes

84. What will be the size of page number if virtual memory is of size 128 KB and page size
is 4 KB
a. 2 bit
b. 4 bit
c. 5 bit
d. 7 bit

85. What will be the size of bitmap for memory of size 256 KB with block size of 2 KB, if
50% memory is already occupied?
a. 256 bit
b. 128 bit
c. 64 bit
d. 32 bit

Web Technology

86. ……………… is not a heading tag in HTML.


a. H0
b. H1
c. H2
d. H3

13 of 16
87. Which of following is syntax for valid CSS selector?
a. .id1
b. #id1
c. %id1
d. $id1

88. ………………… to print statement in PHP


a. Echo
b. Print
c. Echof
d. printf

89. Which of the following is used for defining schema of XML?


a. DTD
b. XSD
c. Both a and b
d. None of above

90. Which of following is valid variable definition in PHP?


a. $x y =2;
b. $x_y=2;
c. $x_y=2
d. $x y as 2;

Artificial Intelligence

91. Greedy Best First search expands nodes in the state space based on the evaluation
function ………….
a. F(n)=g(n)
b. F(n)=h(n)
c. F(n)=h(n)+g(n)
d. F(n)=g(n)/2

92. Which agent works based set of condition action rules?


a. Simple reflex agent
b. History agent
c. Model based agent
d. Prior goal based agent

93. Which of following is valid CNF?


a. P->Q
b. (PⱽQ) ᴧ (RⱽS)
c. (PᴧQ) ⱽ (RᴧS)
d. P↔Q

14 of 16
94. In alpha beta pruning, alpha is the best choice found for …………
a. Min
b. Max
c. min max Both
d. None of above

95. Training artificial neural networks includes ……….


a. updating weights
b. updating inputs
c. updating outputs
d. updating number of input layers

Management Information System

96. Which of following is used for non-routine decision making for middle level
management?
a. Decision Support System
b. Transaction Processing System
c. Management Information System
d. Executive Support System

97. ……… is a collection of independent firms that use information technology to coordinate
their value chains to produce a product or service for a market collectively.
a. Value chain
b. Value web
c. Firm chain
d. Collective chain

98. Under the ethical principles of rules to make a decision, which of following describes “If
an action cannot be taken repeatedly, it should not be taken at any time”.
a. Golden Rule
b. Utilitarian Principle
c. Risk Aversion Principle
d. Descartes' rule of change

99. Which of following defines the supply chain management systems based on build-to-
order model?
a. Push-based model
b. Pull-based model
c. Build-to-Stock Model
d. None of above

15 of 16
100. Key performance indicators (KPIs), which are the measures proposed by
…………for understanding how well the business firm is performing along any given
dimension.
a. clerical workers
b. junior management
c. senior management
d. executives

16 of 16

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy