Blog

It is a blog

Important Old Questions Collection of all technical subjects Computer Engineer IT Officer


Software Engineering

What is SCM? Discuss key objectives and activities involved in SCM? Highlight the benefits and challenges of implementing SCM in large scale software projects. List some common tools used for SCM in software industry.

What is the JVM? Explain its architecture and discuss how it enables platform independence in Java programming. Write a Java program to reverse an input string.

Discuss the working principle of blockchain and its applications.

Differentiate between functional and non-functional requirements with examples. Explain the steps followed in software requirement engineering.

Explain the importance of software process in software development with a real world example.

Explain how programming standards and procedures are maintained during software development process.

What is OOAD? Explain its key principles with real world examples. Discuss different testing techniques and their importance in software engineering.

Explain the concept of prototyping in System Analysis and Design. Discuss the advantages and disadvantages of using prototyping as a development methodology.

Risk-driven project management.

Devise two test cases each of unit testing and integration testing for a user login system.

Compare between verification and validation. Also, explain with examples, how the various types of testing help to ensure the quality of a software system.

Differentiate between black box testing and white box testing.

Give an introducton to software engineering and explain its stages.

Mention four features of OOP with examples.

What is the significance of software maintainance. Differentiate between unit testing and integration testing. Explain how regression testing is critical during the software maintainance phase.

What is ERP? Explain its importance.

Compare OOAD with structured analysis and design. Discuss different activities involved in each of the phases of the object oriented development life cycle.

What is Software Quality Assurance? Types of software maintenance. Give some design principles for maintainability.

With a neat diagram explain the components of a Linux system.

Explain about different metrics for software project size estimation. Discuss cyclomatic complexity with suitable examples.

Spiral model advantages and disadvantages. Benefits and problems of software reuse? State the factors that need to be taken care while reusing software.

Explain the agile software development cycle model in detail.

How do SEI-CMM standards differ from that of ISO standards? Explain in detail about all the levels in SEI-CMM? Compare and contrast unit and integration testing.

Explain the process of software development and implementation.

Types of software cost estimation model with examples.

What is software process?

Explain the versioning process in the context of Configuration Management with all the associated components in software development industry.

SQA Activities. SEI-CMM’s five levels of maturity for software process.

Explain single tier, two tier and multi-tier client server architecture with suitable example.

Explain SOAP, WSDL and REST with their applications.

Risk management plan to reduce staff turnover.

Explain about Joint Application Development and its purpose in system development process. Mention the roles of various JAD group members in the development of information system.

Compare and contrast service oriented architecture and micro services architecture.

Explain the various phases of SDLC in brief.

What does it mean by cohesion and coupling in object oriented system design? explain three types of cohesion and coupling with examples.

Briefly explain various risk factors involved in software development.

Explain the core components under android application architecture.

Software development methodology for ERP.

What are software quality measures? Why SQA is important? Explain. What are the building blocks of UML? Explain with suitable examples and notations.

Explain how AJAX works? What are the applications of XML?

Explain spiral software development model. When do you prefer this model? Analyze.

Distinguish betweeen waterfall model and prototyping model. Discuss functional and non-functional requirement.

What is software reengineering? Explain its process.

Explain the roles of system analyst.

What is integration testing? Differentiate between top down and bottom up integration testing.

A university wants to automate its admission system. You are appointed as the systems analyst to study the existing manual system.

In this context, answer the followings: a) Describe how you would apply each phase of the System Development Life Cycle (SDLC) to this problem. b) Identify the functional and non-functional requirements of the system. c) Suggest the most suitable SDLC model and justify your choice.

Consider you are hired as team member to develop SRS document for developing MIS of any government organization. Develop sample SRS document analyzing all requirements. 10 marks

Data Structures And Algorithms

You are given an unbalanced binary search tree. Reconstruct it into a balanced binary search tree to optimize search time. Describe an algorithm to flatten the BST to a sorted array, then build a balanced BST. Implement the algorithm and analyze its time and space complexity.

Solve the 0-1 Knapsack problem using dynamic programming for a set of values and weights. Explain the memorization table used.

What is minimum spanning tree? Explain with an example. Explain in detail about Kruskal’s algorithm for finding MST from a graph along with its algorithm and an example.

Explain the types of linear data structures with example.

Why is linked list also known as dynamic list? Explain the importance of hashing. Discuss linear probing and double hashing. 2+2+6=10

Explain why a liner data structure is important and necessary.

Compare and contrast between breadth first search and depth first search in graph data structure with suitable example.

What is Abstract Data Type? With appropriate examples, distinguish between stacks and queues.

Illustrate how binary search works.

Define growth of functions. How do you measure it? Explain with appropriate examples.

Given a list of unsorted integers, implement and analyze a divide-and-conquer based sorting algorithm(like merge sort). Provide its time complexity and recursion trace.

What is the fundamental difference between tree and graph? How do you traverse over a binary tree? Explain with a suitable example.

Define dynamic programming. Explain the types of priority queues with example.

How do you create a linked list for data structur? Elaborate with program code how stack data type can be created and used with linked list.

Write algorithms for implementation of stacks and queues using singly linked list.

Define tree. Discuss the use of binary tre, balancing tree, AVL tree, and splay tree with diagram under data structure and algorithm.

Write a program to implement insertion sort.

Describe any two types of sorting algorithms. Differentiate between B-tree and Red Black tree.

Write the program for factorial using recursion.

Differentiate between hash based indexing and tree based indexing.

I am working on solutions of all these questions. I will publish once I am done. Follow my youtube channel to stay updated.

Database Managment System

Why do we need crash recovery in DBMS? Explain.

What do you understand by Deadlocks in Distributed Database System? How can it be prevented?

Discuss the demerits of RDBMS. 10 marks

A college library management system has different types of user, such as, students, staff, teachers. Each user-type has different book transaction privileges. User can only view the list of available books that is, users cannot access to the any type of data manipulation. The process of book transaction, the number of days and the fine-rate is all managed by the library administrator only.

i) For the system described above draw the ERD, context diagram and level-1 DFD.

ii) Design the normalized database for the library management system mentioned above.

iii) Analyze the cost benefit in the design of the system. Also determine the total data volume required for the system.

What do you mean by normalization of database? Normalize any relational database using 3NF and write differences between BCNF and 3NF. 10 marks

Write short notes on : DDL and DML in database concept.

Suppose you are developing a system to automate the Exam Management System for public service commission, PSC has decide to publish “manage applicant form” “take examination” , and “publish result” for different services (like computer engineer, administrative officers, doctors) The system has to facilitate all processes which includes registration and enrollment of applicants, examination procedure, result processing and result publication. i) Perform a requirement analysis with necessary assumption wherever necessary. 6 marks ii) What is the possible ER-diagram for this system. 10 marks iii) What could be the limitation of the system and other non-technical requirement for successful implementation? 4 marks

What are the different popular schemas that are being used in building data warehouse? Explain any three type with appropriate sample to clarify the differences among these schemas. 10 marks

What is a weak entity set? How is a weak entity set associated with strong entity sest in ER diagram? Explain with a suitable example. Differentiate between DDL, DML, and DCL. 10 marks

What is functional dependency? Explain its importance in relational database design.

What is ER diagram? Mention its uses.

What do you mean by schedule in the context of concurrent execution of transactions in RDBMS? What is serializable schedule? Discuss the various type of serialization with the suitable example. 3+2+5=10

What are weak entity set? How is a weak entity set ssociated with strong entity set in ER diagram? Expain with suitable example. Differentiate between DDL, DML and DCL. 2+4+4=10

Explain the integrity constraints with an example.

Describe the 2PL concurrency control protocol.

Explain the use of Entity Relationship Diagram(ERD) with suitable examples. 10

What is data independence in DBMS? Differentiate between logical data independence and physical data independence? 1+4=5

Construct an E-R diagram to record the marks that students get in different exams of different course offerings. 5

Explain the role of a database administrator. 5

Explain distributed and object oriented database system. What are the necessary conditions for decomposing a relational database into two tables? Why is normalization needed? Elaborate. 10

Answer the following.

a) Define normalization with its objectives.

b) Normalize the following data model upto 3NF showing all possible schema in each normal form:

OrderNum, OrderDate, OrderTotal, CustNum, CustName, CustAdd, ((ProdNum, ProdName, QtyOrder, ProdPrice, prodTotal)) [fields within bracket represent repeating fields]

c) After the data model is normalized upto 3NF, from the outcome schema, write the queries in relational algebra and SQL to find out the name of customer who has ordered the “Carpet”.

Explain ACID property of transaction in DBMS. How do they ensure reliable and consistent transaction processing in a dataase?

Answer the following:

a) What are the steps involved in query processing? Explain the significance of materialized views.

b) Briefly describe two phase locking protocol for concurrency control.

What do you mean by schedule in the context of concurrent execution of transactions in RDBMS? What is the serializable schedule? Discuss the various types of serializability with a suitable example. 3+2+5=10

Explain about DDL, DML, DCL with examples in DBMS. 10

What is database normalization? Explain 1NF, 2NF, 3NF and BCNF with suitable examples highlighting the problems each of them eliminates. 2+8=10

What is the purpose of normalization in database management system? What is a data model? Explain with its types. 10

What are the recovery techniques used to recover from database crash? Explain.

Why is there a need for normalization in databases? Explain 1NF, 2NF, 3NF, and BCNF normalization in DBMS. Why is concurrency control needed? Explain lost update, inconsistent retrievals and uncommitted dependency anomalies. 1+4+1+4=10

What is data independence? Explain the difference between physical and logical data independence. 1+4=5

What is a weak entity set? How is a weak entity set associated with strong entity set in ER diagram? Explain with a suitable example. Differentiate between DDL, DML and DCL. 2+4+4=10

Differentiate between 3NF and BCNF with a proper example. 5

What is functional dependency? Explain normalization with 1NF, 2NF and 3NF using suitable examples. 3+7=10

How are multi level indexex constructed using B trees and B+ trees in indexing of DBMS? Explain. 10

What do you understand by transaction management and concurrency control in database? Explain different types of crash recovery techniques used in database. 5+5=10

Discuss the differences between the candidate keys and the primary key of relation. What is meant by a foreign key? How do foreign keys of relations relate to candidate keys? Illustrate with examples. 4+2+4=10

What is normalization? Why is it needed? How can you say that the table is in second and third normal form? Explain with an example. 2+2+6=10

Answer the following: 5+5=10

a) Explain the integrity constraints with an example.

b) Describe the 2PL concurrency control protocol.

What are the steps involved in query processing? Explain the significance of materialized views. Describe briefly two phase locking protocol for concurrency control. 2+3+5=10

Explain the challenges and practices of database security. 5

Explain cost based query optimization with example. 6

Based on the following tables: Employee(Em_no, Name,Em_city) Company(Em_no,Company_name,Salary) i) Write a SQL query to display Employee name and Company name ii) Write a SQL query to display Employee name, Employee city, Company name and Salary of all the employeees whose salary>11000 iii) Write a query to display all the employees working in “ABC” company.

Operating system

Define mutual exclusion and explain its role in a concurrent system. 5

What is process scheduling in an operating system? Compare the scheduling algorithms:

  • first-come first-serve
  • shortest job next
  • round-robin
  • priority scheduling 2+8

Define deadlock and ways to prevent deadlock. 5

Explain the concept of starvation in relation to priority scheduling algorithm. With a suitable example, state the approach to overcome the problem of starvation. 5

Explain in detail the various page replacement algorithms with examples. 10

What is operating system? Describe its functions and classifications. 2+4+4

Explain the differences among short-term, medium-term and long-term scheduling with examples. 10

Describe race condition with an example. Define semaphore and explain the major operations in semaphore. Can semaphores be used in distributed system? Explain why or why not. 3+4+3

Discuss the operating system functions and services in detail.

What are common operating system security threats.

Authentication and Authorization in operating system? Explain access control list and role based access control(RBAC) along with their uses in managing secure user access.

FCFS,SJF numerical with gantt chart and Turn Around Time calculation

What is memory management in operating system? Explain the paging technique of memory management.

What is virtual memory technique? Explain the process of conversion of logical address to physical address in paging scheme with a suitabl eexample. 3+7

Explain various deadlock avoidance methods with examples.

Define process and threads. Explain the uses of process and threads in operating system with proper diagram. 2+8

Digital logic

Differentiate between combinational and sequential circuits in digital logic with suitable examples. Also explain the operation of NAND gate using a truth table.

Define synchronous counter. Explain its working principle by drawing its functional diagram. 2+8=10

Illustrate the difference between D and T flip-flop with its characteristic equations.

(V.V.IMP) Differetiate between synchronous counter and asynchronous counter.

(V.IMP) Explain ripple counter with its truth table and timing diagram. 7

Design a 3-bit asynchronous up counter using T-flip flop. Explain JK flip flop with its characteristics equation, characteristics table and logic diagram. 8

Explain 4 to 2 priority encoder along with its truth table, logical expression and logic circuit.

What are the various types of state encoding techniques? Explain. 5

Implement Half adder using only NAND gates. 5

Explain the operation of parallel in serial out shift register with clear circuit and timing diagram. 5

Implement XOR gate using NAND gates only. Implement the full adder using two half adders. (V.IMP) Draw the circuit diagram and explain the operation of edge triggered RS flip-flop. 3+3+4=10

What is asynchronous machine? Write down.

Design a mod-5 synchronous counter using JK flip flop. 10

Define pair, quad, and octet in k-map and explain their effect on minimization of logic expression. 3+2=5

With a neat circuit diagram and truth table, describe how a basic SR flip-flop works.

Define number system. Discuss various types of number system and their conversion with suitable example. 2+4+4=10

Compare and contrast the architecture and applications of different types of programmable logic devices in digital circuit design. 5

Computer Organization and Architecture

What is instruction format? 2

(V.IMP) Explain the differences between cache memory and main memory. Also describe the mapping techniques(with advantages and disadvantages) used in cache memory(direct, associative and set associative). 4+6=10

What is cache memory? How does it improve system performance?

Explain overlapped register window of RISC CPU with a required diagram.

(V.IMP) Explain the advantages and disadvantages of RISC and CISC architecture in terms of instruction execution, performance and complexity. Describe the concept of pipelining in CPU architecture. Explain how pipelining improves instruction throughput. 4+3+3=10

What are the steps involved in an instruction cycle? Explain 4

Highlight the importance of cache in a CPU. 3

(V.IMP) Differentiate between I/O programming and memory mapped I/O. 5

(V.IMP) What is pipelining in computer system and architecture? Explain the merits and demerits of pipelining. 10

How can parallel processing be achieved in pipelining? 4

Describe the various types of computers based on size and computing power. Compare the speed and capacity of various types of memory. 10

What is the difference between parallellism and pipelining in CPU? Explain.

Compare the Von Neumann and Harvard Architecture of computers.

Explain the types of parallel processing. Also, describe how L1 and L2 cpu cache work together to increase CPU performance. 5+5=10

Explain the importance of pipelining in high speed applications. Illustrate the behavior of pipelining using space-time diagram. A non-pipelined system takes 50ns to process a task. The same task can be processed in a six segment pipeline with a clock of 10ns. Find the speed up ratio of the pipeline for 100 tasks. 2+3+5=10

“Pipelining is a technique to speedup processing of a processor.” Justify this statement with a suitable examaple. Explain about cluster configurations. 6+4=10

Explain the working of microprogrammed control unit with a suitable diagram. 3+2=5

What does interrupt in computer architecture mean? Explain the wroking mechanism of DMA. 2+5=7

Distinguish between parallel and distributed computing. 4

Describe the instruction set design considerations for multitasking machines. Explain the role of privileged instructions in multitasking systems. Explain how the instruction set architecture can be optimized to maximize pipeline efficiency and minimized hazards. 4+3+3=10

(V.IMP) Discuss the meaning and purpose of addressing modes in computer architecture. Explain various types of addressing modes with examples. 4+6=10

Role of DMA in data transfer and how it improves performance over traditional I/O.

Pipeline hazards with its effects.

C,C++,Java,Programming

Discuss the development of computer programming languages including their types and the role of assemblers, compilers and interpreters.

What is recursion? Why do we need recursion? Write a code in C++ to calculate the factorial of a number using recursive function. 2+3+5

Answer the followings: 4+(2+2+2)=10

a) Explain the differences between structural and object-oriented programming using examples from C and C++.

b) A C program uses a struct to manage car data(model, year, max speed) with separate input/display functions. Redesign it in C++ using OOP:

i) Create a Car class with private members for model, year and speed, a constructor and a display() method.

ii) Derive a SportsCar class adding a private top_speed member and also override the display() method.

iii) Add evaluatePerformance() in SportsCar to print “High Performance Vehicle” if top_speed>=200km/h, else “Standard Performance Vehicle”.

Look at the following code snippet in C and choose the correct answer:

int x=9; if(x%2==0){ printf(“The post-increment is: %d\n”,x++); } if(x%3==0){ printf(“\nThe pre-decrement is:%d”,—x); } A) The post-increment is:10

B) The pre-decrement is:8

C) The post-increment is:9

D) The pre-decrement is:9

Explain the concept of virtual machines in programming languages. How do they contribute to code executing efficiency? Describe. 5

Explain how loop optimizations are different from local optimizations.

How does the object oriented programming differ from structured programming? With example, explain the multiple inheritance and function overloading in OOP. Also, list the operators which cannot be overloaded. 3+5+2=10

Answer the following:

a) Write a C program to add two 3x3 matrices and explain briefly. 5

b) Why is inheritance required in OOP? Explain different types of inheritances with suitable diagrams. 1+4

What is code generation? What are the benefits and limitations of code generation? How can the limitations be addressed to make code generation a practically valuable tool? 2+4+4=10

(V.IMP) How does ambiguity arise in Multipath inheritance? How can you remove this type of ambiguity? Illustrate it with suitable example. 4+6=10

(V.IMP) Write down the impotance of inheritance in CPP. Explain constructor and destructor call sequence in single and multiple inheritance in CPP. How can we resolve ambiguity in multiple inheritance in CPP? 2+4+4=10

(V.IMP) Explain the features of object oriented programming language that makes it better than the structured programming language. Differentiate between multitasking and multiprocessing. 6+4=10

Describe the significance of inheritance and polymorphism in OOP. 6

(V.IMP) Differentiate between object oriented programming and structural programming. 10

Explain the concept of inheritance with an example. What is the difference between multiple and multilevel inheritance. 3+2

Explain the characteristics of various generations of computers. When and which generation of computer was first brought into Nepal and for what purpose? 8+2=10

Define the control structures in programming language. Elaborate various control structures with example. 2+8=10

Explain the importance of operator overloading. State the rules for overloading operators. What are the differences between a C++ structure and C++ class in terms of encapsulation and inheritance? Explain abstract class with an example. 2+4+2+2=10

Explain the different levels of programming language. What are the advantages and disadvantages of moving from low level to high level language? 5

Explain constructor and desctructror call sequence in single and multiple inheritance in C++. 4

What is structure? How is it different from array? Explain.

Computer Network

Explain the congestion control and congestion avoidance in detail and also explain briefly the Diffie-Hellman key exchange with an example. 10+10=20

OSI vs TCP/IP model. 6

Discuss about classless inter domain routing(CIDR) along with example. 5

Make a comparative study between OSI and TCP/IP model. Suggest which one is better. 5

Discuss about message authentication and hash functions. 5

Explain the concept of Kerberos authentication and describe the key components involved in the Kerberos protocol. 5

Why are OSI layers required? Draw the block diagram and explain it briefly. 1+4

(V.IMP) Differentiate between IPV4 and IPV6. Briefly expalin IPV6 system with diagram. 2+3

What is IP addressing/ How can IP address be classified?1+4

View posts by tag