Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. What is the main programming language code developed by eclipse?
a) C
b) JAVA
c) C++
d) C/C++

View Answer

Answer: b [Reason:] Eclipse is mostly written in Java and its primary use for development Java applications, but it may also be used to develop applications in other programming languages via plug-ins, including Ada, C, C++.

2. What does an Eclipse IDE allows?
a) Editing the program
b) Compiling the program
c) Both editing and compiling
d) Editing, building, Debugging, Compiler

View Answer

Answer: d [Reason:] An Integrated Development Environment is a software application that provides comprehensive facility to computer programmer for software development. An IDE normally consists of a source code editor, build automation tools and a debugger. Eclipse also has a compiler while some others do not provide it.

3. What is the scenario the IDE generally required?
a) Language support
b) Visual programming
c) Attitude across different platforms
d) Out system platform

View Answer

Answer: b [Reason:] Visual programming is a usage scenario in which an IDE is generally required. Visual basics allows user to create new applications by moving programming, building blocks, or code nodes to create flow chats or structure diagrams that are then compiled and interpreted.

4. What is Eclipse?
a) IDE
b) Software
c) GNU
d) Code base

View Answer

Answer: a [Reason:] An Integrated Development Environment is a software application that provides comprehensive facilities to computer programmers for software development.

5. Eclipse is used to develop documents with LaTeX.
a) True
b) False

View Answer

Answer: a [Reason:] Eclipse is used to develop documents with LaTeX, (via a TeXlipse plugin) and packages for the software Mathematica.

6. Development environment include the __________
a) Eclipse VisualAge
b) Classpath
c) Eclipse JDT
d) IcedTea

View Answer

Answer: c [Reason:] Development environment include the Eclipse Java development tools for Java and Scala, Eclipse CDT for c/c++, and eclipse PDT for PHP, among others.

7. The initial codebase is originated from ________
a) IBM VisualAge
b) Equinox
c) Borland VisualAge
d) Red Hat VisualAge

View Answer

Answer: a [Reason:] The initial codebase originated from IBM VisualAge. The Eclipse software development kit, which includes the Java development tools, is meant for Java developers.

8. SDK stands for ________
a) Software Design Kit
b) Serial Development Kit
c) Software Development Kit
d) Serial Design Kit

View Answer

Answer: c [Reason:] Eclipse software development kit is free and open source software released under the terms of the eclipse public license, although it is incompatible with the GNU General Public License.

9. It was one of the first IDE to run under ________ and it runs without problem under IcedTea.
a) GNU General Public License
b) Both GNU Classpath, GPL
c) Neither GNU nor GPL
d) GNU Classpath

View Answer

Answer: d [Reason:] It was one of the first IDE to run under GNU Classpath and it runs without problem under IcedTea.

10. ACM stands for ________
a) Architecture for Computing Machinery
b) Association for Computing Machinery
c) Association for Cloud Machinery
d) Architecture for Cloud Machinery

View Answer

Answer: b [Reason:] The Association for computing Machinery recognized Eclipse with the 2011 ACM Software Systems Award.

11. EPL stands for ________
a) Extended Public License
b) Extended Platform License
c) Eclipse Platform License
d) Eclipse Public License

View Answer

Answer: d [Reason:] The Eclipse Public License is the fundamental license under which Eclipse projects are released. Some projects require dual licensing, for which the Eclipse Distribution License is available.

12. Common Public License is re licensed under ________
a) Eclipse Public License
b) General Public License
c) Eclipse Platform
d) Eclipse plug-in

View Answer

Answer: a [Reason:] Eclipse was originally released under the Common Public License, but was later re-licensed under the Eclipse Public License. The Free Software Foundation has said licenses are free software licenses, but are incompatible with the GNU GPL.

13. UML stands for________
a) User Modeling Language
b) User Module Language
c) Unified Modeling Language
d) Unified Module Language

View Answer

Answer: c [Reason:] One of the example of plug-ins include for Unified Modeling Language, for sequence and other UML diagram, a plug in for DB Explorer, and many more.

14. The Eclipse SDK includes the Eclipse Java development tools.
a) True
b) False

View Answer

Answer: a [Reason:] The Eclipse SDK includes the Eclipse Java development tools, offering an IDE with a built-in Java incremental compiler and a full model of the Java source files.

15. Which allows for advanced refactoring technique?
a) JDK
b) SDK
c) UML
d) EPL

View Answer

Answer: b [Reason:] The Eclipse SDK includes the Eclipse Java development tools, offering an IDE with a built-in Java incremental compiler and a full model of the Java source files. This allows for advanced refactoring technique and code analysis.

Set 2

1. Publishing messages is handled through ________ Class.
a) Client()
b) Server()
c) Publish()
d) Batch()

View Answer

Answer: a [Reason:] Publishing message is handled through the client class(aliased as google-cloud-pubsub-publisherclient).

2. client() class provides ________ to create topics.
a) Software
b) Classes
c) Methods
d) Batch

View Answer

Answer: c [Reason:] client() class provides method to create topics. publish() method publishes messages to pub/sub. Publishing message is handled through the client class.

3. ________ method publishes messages to pub/sub.
a) Client()
b) Publish()
c) Server()
d) Batch()

View Answer

Answer: b [Reason:] While client() provides method to create topics, publish() method publishes messages to pub/sub.

4. How many arguments are accepted by publish()?
a) 5 arguments
b) 3 arguments
c) 1 argument
d) 2 arguments

View Answer

Answer: d [Reason:] This method accepts two positional arguments: the topic to publish to, and the body of the message.

5. Does publish() method accepts arbitrary arguments?
a) True
b) False

View Answer

Answer: a [Reason:] Publish() method also accepts arbitrary keyword arguments, which are passed along as attributes of the message.

6. The topic in the publish method is in which form?
a) Binomial form
b) Canonical form
c) Nominal form
d) Message form

View Answer

Answer: b [Reason:] The topic is passed along as a string; all topics have the canonical form of projects/{project_name}/topic/{topic_name}.

7. The message in pub/sub is an opaque blob of ________
a) Bits
b) Bytes
c) Word
d) Nibble

View Answer

Answer: b [Reason:] The message in pub/sub is an opaque blob of bytes, and as such, you must send a bytes object in python 3.

8. ________ error will show if we try to send text string instead of bytes.
a) TypeError
b) Error
c) Linker error
d) Compiler error

View Answer

Answer: a [Reason:] If we send a text string the method will raise TypeError. TypeError will show if we try to send text string instead of bytes.

9. What do we call string in python 2?
a) Str
b) Unicode
c) Strs
d) Unicades

View Answer

Answer: b [Reason:] In python 2 the text string is called as str, and in python 2 it is called as unicode.

10. When you publish a message ________ is automatically created?
a) Client
b) Server
c) Batch
d) Server

View Answer

Answer: c [Reason:] Whenever we publish a message, a batch is automatically created. This way, if you publish a large volume of messages, it reduces the number of requests made to the server.

11. When the batch is created, it begins a countdown that publish the batch once sufficient time has elapsed.
a) True
b) False

View Answer

Answer: a [Reason:] When the batch is created, it begins a countdown that publish the batch once sufficient time has elapsed.

12. What is the time elapsed after a batch is created?
a) 0.5 seconds
b) 0.05 seconds
c) 1.5 seconds
d) 1 second

View Answer

Answer: b [Reason:] When the batch is created, it begins a countdown that publish the batch once sufficient time has elapsed by default it is 0.05 seconds.

13. Every call to publish() will return a class that conforms to the __________ interface.
a) Batch
b) Client
c) Server
d) Future

View Answer

Answer: d [Reason:] Every call to publish() will return a class that conforms to the future interface. You can use this to ensure that the publish.

Set 3

1. Wind River Intelligent Device offers what?
a) Gateway security
b) Application enablement
c) Device Connectivity
d) All of the mentioned

View Answer

Answer: d [Reason:] Wind River Intelligent Device Platform XT offers: Gateway security: Secures communication channel, the data and the end device Application Enablement: Provides JAVA OSGi application environment is provided Device connectivity: Connection between devices using MQTT protocol Remote device management: Supports well established management protocol such as TR-069.

2. Pre integrated and smart connectivity enables what?
a) Long term security
b) Products life span increases
c) Saves time and cost
d) Secure remote management

View Answer

Answer: c [Reason:] Connectivity, manageability, and security are core IoT building blocks, essential for reducing device manufactures’ time-to-market, complexity, and risk. Wind River Intelligent Devices has Connectivity benefit which enables rich network option s to save development time and costs.

3. Manageability provides what?
a) Saves time and cost
b) Product life span increases
c) Long term security
d) Secure remote management

View Answer

Answer: a [Reason:] Connectivity, manageability, and security are core IoT building blocks, essential for reducing device manufactures’ time-to-market, complexity, and risk. Wind River Intelligent Devices has manageability benefit which reduces development time while increases the product‘s life span and uptime.

4. Security provides what?
a) Saves time and cost
b) Product life span increases
c) Long term security
d) Secure remote management

View Answer

Answer: c [Reason:] Connectivity, manageability, and security are core IoT building blocks, essential for reducing device manufactures’ time-to-market, complexity, and risk. Wind River Intelligent Devices has security benefit which are designed for IoT software development to protect critical data throughout the device lifecycle.

5. Wind River software.
a) True
b) False

View Answer

Answer: a [Reason:] Wind River, a wholly owned subsidiary of Intel corporation, is a world leader in delivering software for intelligent connected systems.

6. Wind River is introduced by ____________
a) IBM
b) Intel
c) Tech Mahindra
d) Syntel

View Answer

Answer: b [Reason:] Wind River is introduced by Intel.

7. Wind River provides what?
a) Safe and Secure
b) Secure remote management
c) Save time and cost
d) Product life time increases

View Answer

Answer: a [Reason:] Wind River the technology and expertise that enables the innovation and deployment of safe, secure, and reliable intelligent systems.

8. Which transportation brings new control?
a) Route Navigation
b) Industrial automation
c) Smart Energy
d) Building Automation

View Answer

Answer: d [Reason:] Building Automation bring new control, visibility, and efficiencies for reducing power consumption, ensuring safety, and providing services to new and existing buildings.

9. Which transportation brings intelligence to their operations?
a) Building Automation
b) Industrial Automation
c) Smart Energy
d) Route Navigation

View Answer

Answer: b [Reason:] Wind River helps industrial manufactures bring intelligence to their operations. Gain insights from your machine data with smart devices management.

10. Which transportation build more intelligent energy infracture?
a) Building Automation
b) Industrial Automation
c) Smart Energy
d) Route Navigation

View Answer

Answer: c [Reason:] Smart energy builds more intelligent energy infrastructure by combining traditional and emerging power sources for the delivering of cleaner, safer, and more economical energy. Perform power management tasks with finer precision and faster response time.

Set 4

1. Fog computing is also known as fogging.
a) False
b) True

View Answer

Answer: b [Reason:] Fog computing or fog networking is also known as fogging, is a architecture that uses one or more collaborative end-user clients or near-user devices to carry out a substantial amount of storage, communication, control.

2. Fog computing can be perceived in ___________ and ____________
a) Big data ad Cloud systems
b) Big data and IoT
c) Cloud systems and IoT
d) Big data, Cloud systems and IoT

View Answer

Answer: a [Reason:] Fog computing can be perceived both in large cloud systems and big data structures, making reference to the growing difficulties in accessing information objectively.

3. Fog computing has ____________ and ____________ plane.
a) Control and data
b) Control and Barcode
c) Barcode and Data
d) Data and cloud

View Answer

Answer: a [Reason:] Fog networking consists of a control plane and Data plane. For example, on the data plane, fog computing enables computing services to reside at the edge of the network as opposed to servers in a data center.

4. Which of the following computing emphasizes proximity to end user?
a) Mist computing
b) Cloud computing
c) Edge computing
d) Fog computing

View Answer

Answer: d [Reason:] Compared to cloud computing, fog computing emphasizes proximity to end user and client objectives, dense geographical distribution and local resource pooling.

5. QoS stands for ____________
a) Quality of storage
b) Quality of service
c) Quality of security
d) Quality of swarms

View Answer

Answer: c [Reason:] Quality of service is the description or measurement of the overall performance of a service, such as telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.

6. Fog supports IoT concepts?
a) True
b) False

View Answer

Answer: a [Reason:] Fog networking supports the Internet of Things concept, in which most of the devices used by humans on a daily basis will be connected to each other.

7. ____________ is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network to protect strategic military assets.
a) SPANAR
b) SPAWAR
c) APWANR
d) SPANAR

View Answer

Answer: b [Reason:] SPAWAR, is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network to protect strategic military assets, both stationary and mobile.

8. AIDC stands for ____________
a) Automated Identification Data Carriers
b) Automobile Identification Data Carriers
c) Automated Identification Data Computing
d) Automated Identification Device Carriers

View Answer

Answer: a [Reason:] ISO/IEC 20248 provides whereby the data of objects identified by edge computing using Automated Identification Data Carriers a Barcode and/or RFID tag, can be read, interpreted, verified and made available into the fog and on the edge even the AIDC tag has moved on.

9. ____________ practice of using a network of remote servers hosted on the Internet of store.
a) Mist Computing
b) Fog computing
c) Cloud computing
d) Mobile cloud computing

View Answer

Answer: c [Reason:] Cloud computing is the practice of using a network of remote servers hosted on the Internet of store, manage, and process data, rather than a local server or a personal computer.

10. Which computing can be heavy weight and dense form of computing power?
a) Mobile Cloud computing
b) Fog computing
c) Mist computing
d) Cloud computing

View Answer

Answer: d [Reason:] Cloud computing is the practice of using a network of remote servers hosted on the Internet of store, manage, and process data, rather than a local server or a personal computer. Cloud computing can be heavyweight and dense form of computing power.

11. ____________ Computing is the extension of cloud computing.
a) Mobile cloud computing
b) Mist computing
c) Fog computing
d) Cloud computing

View Answer

Answer: c [Reason:] Fog computing refers to extending cloud computing to the edge of an enterprise’s network. Fog computing facilitates the operation of computer, storage, and networking services between end devices and computing data centers.

12. ____________ computing is medium weighted.
a) Mobile cloud computing
b) Cloud computing
c) Mist computing
d) Fog computing

View Answer

Answer: d [Reason:] Fog computing is a medium weight and intermediate level of computing power.

13. ____________ are rudimentary form of computing.
a) Mist computing
b) Fog computing
c) Mobile cloud computing
d) Cloud computing

View Answer

Answer: a [Reason:] Mist computing is a rudimentary form of computing power that resides directly within the network fabric at the extreme edge of the network fabric.

14. _____________ is a lightweight computing.
a) Cloud computing
b) Mobile cloud computing
c) Mist computing
d) Fog computing

View Answer

Answer: c [Reason:] Mist computing is a lightweight and rudimentary form of computing power that resides directly within the network fabric at the extreme edge of the network fabric.

Set 5

1. Number of pins in 8051 microcontroller with ________package.
a) 40 pin with LLC
b) 60 Pin with QFP
c) 40 pin with DIP
d) 60 pin with QFP

View Answer

Answer: c [Reason:] The 8051 family members have different packages, such as DIP(Dual In Line), QFP(Quad Flap Package), LLC(Leadless Chip Carrier) they all have 40 pin that are dedicated to different functions. Especially 8051 have a Dual in Line package.

2. Does an 8051 microcontroller need external oscillator to run?
a) True
b) False

View Answer

Answer: a [Reason:] The 8051 has an on chip oscillator but requires an external oscillator clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 and XTAL2.

3. We use any other frequency source other than crystal oscillator.
a) True
b) False

View Answer

Answer: a [Reason:] A frequency source other than crustal oscillator is used. It can be a TTL oscillator, it should be connected to XTAL1 and XTAL2 id left unconnected.

4. Reset work is__________
a) To make program counter zero but values in registers values are made as zero
b) Program counter is not zero but values in registers values are made as
Zero
c) Program counter not zero but values in registers values remain same
d) To make program counter zero but values in registers values remains same

View Answer

Answer: d [Reason:] It is an input pin and active high. When we apply a high pulse it terminates all activities and it cost all the values in the register to be zero. It will also set program counter to zero.

5. What are the minimum no of cycles required for reset operation?
a) 3 cycle
b) 2 cycles
c) 1 cycles
d) 4 cycles

View Answer

Answer: c [Reason:] When power is turned on, the circuit holds the RST pin high for an amount of time that depends on the capacitor value and the rate at which it changes. To ensure a valid reset the RST pin must be held high long enough to allow the oscillator to start up plus two machine cycles.

6. PSEN stands for ________
a) Program Select Enable
b) Peripheral Store Enable
c) Program Store Enable
d) Peripheral Select Enable

View Answer

Answer: c [Reason:] This is an output pin. In an 8031-based system in which an external ROM holds the program code, this pin is connected to the OE pin of the ROM.

7. Find the machine cycle for AT89C51 if XTAL =11.0592MHz.
a) 90.42us
b) 361.68us
c) 1.085us
d) 150.145us

View Answer

Answer: b [Reason:] Machine cycle = No.of cycles/frequency Time = 1/frequency Time(ns) = 1/11.0592MHz = 90.42ns Machine cycles = 12*90.42 = 1.085us.

8. What is the operation for mode 0?
a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar
b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar
c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded into TLx each time it overflows
d) Spilt timer mode

View Answer

Answer: a [Reason:] Mode 0 is exactly same like mode 1 except that it is a 13-bit timer instead of 16-bit. The 13-bit counter can hold values between 0000 to 1FFH in Th-Tl.

9. What is the operation for mode 1?
a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar
b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar
c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded into TLx each time it overflows
d) Spilt timer mode

View Answer

Answer: b [Reason:] It is a 16-bit timer; therefore it allows value from 0000 to FFFFH to br loaded into the timer’s register TL and TH. After TH and TL are loaded with a 16-bit initial value, the timer must be started.

10. Which is the operation for mode 2?
a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar
b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar
c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded into TLx each time it overflows
d) Spilt timer mode

View Answer

Answer: c [Reason:] It is an 8 bit timer that allows only values of 00 to FFH to be loaded into the timer’s register TH. After TH is loaded with 8 bit value, 8051 gives a copy of it to TL.

11. Which is the operation for mode 3?
a) 13-bit timer mode, 8-bit timer/counter THx and TLx as 5-bit prescalar
b) 16-bit timer mode, 16-bit timer/counter THx and TLx are cascaded, no prescalar
c) 8-bit auto reload mode, 8-bit auto reload time/counter; THx holds a value which is to be reloaded into TLx each time it overflows
d) Spilt timer mode

View Answer

Answer: d [Reason:] Mode 3 is also known as a split timer mode. Timer 0 and 1 may be programmed to be in mode 0, 1 and 2 independently of similar mode for other time.

12. Function of IE1 in TCON register?
a) External interrupt 1 Edge flag. Not related to timer operations
b) External interrupt 1 Edge flag. Not related to timer operations
c) External interrupt 0 single type control bit
d) External interrupt 1 to be triggered by a falling edge signal

View Answer

Answer: a [Reason:] TCON register has 8 bits. 3rd bit has an IE1 register. This is an external interrupt.

13. 8051 controller contains how many registers?
a) 5
b) 3
c) 1
d) 2

View Answer

Answer: d [Reason:] 8051 microcontroller has 2 types of registers. They are Special Function Registers and the other is General purpose register. Each of having 128KB of memory. And GPR is a Byte addressable register and SFR is a Bit addressable register.

14. General purpose memory is called as ________
a) ROM memory
b) RAM memory
c) SRAM memory
d) EPROM memory

View Answer

Answer: b [Reason:] The general purpose memory is called as the RAM memory of the 8051 microcontroller, which is divided into 3 areas such as banks, bit-addressable area, and scratch-pad area.

15. Which timer register has both timers in it?
a) TMOD
b) TCON
c) Both TMOD and TCON
d) Neither TMOD nor TCON

View Answer

Answer: a [Reason:] In the TMOD register, lower 4 bits are set for timer0 and the upper 4 bits are set aside for timer1. In each case, the lower 2 bits are used to set the timer mode and upper 2 bits to specify the operation.