McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Civil Engineering .
101. |
Average number of blocks required for a two-roomed house is about 2500. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: more recently, an improved version has been designed and marketed by aeroweld industries, b-9 hal industrial estate, bangalore – 560 037. the size of the blocks is 30.5 cm x 14.4 cm x 10 cm or 23 cm |
102. |
Before applying water proof mud plaster, the joints should not be scrapped. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: before applying water proof mud plaster, the joints should be scrapped and wall surface should be cleaned and made damp by sprinkling water and then plaster should e applied. |
103. |
For preparation of subgrade the existing subgrade should be dressed to a camber of 1 in 24 to 1 in 32. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: it is watered and allowed to soak for the night if necessary, and rolled with 8 to 10 tonne road roller. the density of the compacted soil should not be less than 1.8 gm /c.c. up to at least 6” depth. |
104. |
For making bund ordinary mud wall gonda ( bund) about 8” * 6” shall be made on the sides. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: bunding, also called a bund wall, is a constructed retaining wall around storage “where potentially polluting substances are handled, processed or stored, for the purposes of containing any unintended escape of material from that area until such time as remedial action can be taken. |
105. |
A written report is more formal than an oral report. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: the statement is true. a written report is more formal in nature than an oral report and it removes almost every flaw inherent in an oral report. |
106. |
Which of these is usually written in a form of a memorandum? |
A. | informal reports |
B. | formal reports |
C. | professional reports |
D. | business reports |
Answer» A. informal reports | |
Explanation: written reports can be of two types. they are: formal reports and informal reports. informal reports are normally written in the form of a memorandum or a letter. |
107. |
Which of these is not a formal report? |
A. | informational |
B. | informal |
C. | interpretative |
D. | routine |
Answer» B. informal | |
Explanation: formal reports can be classified into three different types. they are : informational, interpretative and routine. |
108. |
Into which of these types are formal reports not classified? |
A. | informational |
B. | interpretative |
C. | oral |
D. | routine |
Answer» C. oral | |
Explanation: formal reports are written reports. they can be classified into three types : informational, interpretative and routine. |
109. |
Which of these reports provide information without any evaluation? |
A. | informational |
B. | interpretative |
C. | routine |
D. | progress |
Answer» A. informational | |
Explanation: informational reports accumulate and provide information without any assessment or evaluation. they do not make any recommendations they do not give any findings. |
110. |
report provides rational findings. |
A. | informative |
B. | interpretative |
C. | routine |
D. | progress |
Answer» B. interpretative | |
Explanation: interpretative reports do not merely provide data. they assess this data and provide rational findings and worthwhile recommendations. |
111. |
Interpretative reports are also known as |
A. | recommendation reports |
B. | routine reports |
C. | progress reports |
D. | informal reports |
Answer» A. recommendation reports | |
Explanation: the correct statement is: interpretative reports are also known as recommendation reports. they assess the data and provide rational findings and worthwhile recommendations. |
112. |
Which of these reports are written for recording information? |
A. | informational |
B. | interpretative |
C. | routine |
D. | recommendation |
Answer» C. routine | |
Explanation: routine reports are normally written for recording information which is required at periodic intervals. in most cases there may be printed forms where relevant gaps have to be filled with acquired data. |
113. |
Which of these is not mentioned in a progress report? |
A. | name of project |
B. | right choice of instruments |
C. | nature of work |
D. | amount of work left |
Answer» B. right choice of instruments | |
Explanation: a progress report should contain information like: name of project, nature of project, extent of work to be completed, amount of work left, etc.. |
114. |
Which of these reports involves the checking of a piece of equipment to see if it’s still in working condition? |
A. | progress report |
B. | laboratory report |
C. | inspection report |
D. | inventory report |
Answer» C. inspection report | |
Explanation: an inspection report is made when: an equipment is inspected to establish whether or not it is in working condition. |
115. |
Box culverts can be defined as a passage for water over a natural ground having a deck slab over it as path way for vehicles. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: slab culvert- a passage for water over a natural ground having a deck slab over it as path way for vehicles. |
116. |
The process of removing culverts, which is becoming increasingly prevalent, is known as |
A. | outlighting |
B. | culverting |
C. | daylighting |
D. | inlighting |
Answer» C. daylighting | |
Explanation: in urban design and urban planning, daylighting is the redirection of a stream into an above-ground channel. |
117. |
An culvert is normally a low profile culvert. It allows them to be installed without disturbing the causeway as it will span over the entire drainage width. |
A. | box |
B. | rectangle |
C. | arch |
D. | circular |
Answer» C. arch | |
Explanation: they are normally made of metal, stone masonry or rcc. they are installed easily, and you don’t need to use expensive water diversion structures to install it. common shapes include semicircular arch, elliptical arch, and concrete box culverts. |
118. |
Which of the following is not a type of cyber crime? |
A. | data theft |
B. | forgery |
C. | damage to data and systems |
D. | installing antivirus for protection |
Answer» D. installing antivirus for protection | |
Explanation: cyber crimes are one of the most threatening terms that is an evolving phase. it is said that major percentage of the world war iii will be based on cyber-attacks by cyber armies of different countries. |
119. |
Cyber-laws are incorporated for punishing all criminals only. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber crimes and tie the hands of citizens from doing illicit digital |
120. |
Which of the following is not a type of peer-to-peer cyber-crime? |
A. | phishing |
B. | injecting trojans to a target victim |
C. | mitm |
D. | credit card details leak in deep web |
Answer» D. credit card details leak in deep web | |
Explanation: phishing, injecting trojans and worms to individuals comes under peer-to- peer cyber crime. whereas, leakage of credit card data of a large number of people in deep web comes under computer as weapon cyber- crime. |
121. |
Which of the following is not an example of a computer as weapon cyber-crime? |
A. | credit card fraudulent |
B. | spying someone using keylogger |
C. | ipr violation |
D. | pornography |
Answer» B. spying someone using keylogger | |
Explanation: ddos (distributed denial of service), ipr violation, pornography are mass attacks done using a computer. spying |
122. |
Which of the following is not done by cyber criminals? |
A. | unauthorized account access |
B. | mass attack using trojans as botnets |
C. | email spoofing and spamming |
D. | report vulnerability in any system |
Answer» D. report vulnerability in any system | |
Explanation: cyber-criminals are involved in activities like accessing online accounts in unauthorized manner; use trojans to attack large systems, sending spoofed emails. but cyber-criminals do not report any bug is found in a system, rather they exploit the bug for their profit. |
123. |
What is the name of the IT law that India is having in the Indian legislature? |
A. | india’s technology (it) act, 2000 |
B. | india’s digital information technology (dit) act, 2000 |
C. | india’s information technology (it) act, 2000 |
D. | the technology act, 2008 |
Answer» C. india’s information technology (it) act, 2000 | |
Explanation: the indian legislature thought of adding a chapter that is dedicated to cyber law. this finally brought india’s information technology (it) act, 2000 which deals with the different cyber-crimes and their associated laws. |
124. |
In which year India’s IT Act came into existence? |
A. | 2000 |
B. | 2001 |
C. | 2002 |
D. | 2003 |
Answer» A. 2000 | |
Explanation: on 17th oct 2000, the indian legislature thought of adding a chapter that is dedicated to cyber law, for which india’s |
125. |
The Information Technology Act -2000 bill was passed by K. R. Narayanan. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: the bill was passed & signed by dr. k. r. narayanan on 9th may, in the year 2000. the bill got finalised by head officials along with the minister of information technology, dr. pramod mahajan. |
126. |
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. |
A. | 65 |
B. | 65-d |
C. | 67 |
D. | 70 |
Answer» A. 65 | |
Explanation: when a cyber-criminal steals any computer documents, assets or any software’s source code from any organization, individual, or from any other means then the cyber crime falls under section 65 of it act, 2000. |
127. |
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? |
A. | 6 months of imprisonment and a fine of rs. 50,000 |
B. | 1 year of imprisonment and a fine of rs. 100,000 |
C. | 2 years of imprisonment and a fine of rs. 250,000 |
D. | 3 years of imprisonment and a fine of rs. 500,000 |
Answer» D. 3 years of imprisonment and a fine of rs. 500,000 | |
Explanation: the punishment in india for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means is 3 years of imprisonment and a fine of rs. 500,000. |
128. |
What is the updated version of the IT Act, 2000? |
A. | it act, 2007 |
B. | advanced it act, 2007 |
C. | it act, 2008 |
D. | advanced it act, 2008 |
Answer» C. it act, 2008 | |
Explanation: in the year 2008, the it act, 2000 was updated and came up with a much broader and precise law on different computer-related crimes and cyber offenses. |
129. |
In which year the Indian IT Act, 2000 got updated? |
A. | 2006 |
B. | 2008 |
C. | 2010 |
D. | 2012 |
Answer» B. 2008 | |
Explanation: in the year 2008, the it act, 2000 was updated and came up with a much broader and precise law on different computer-related crimes and cyber offenses. |
130. |
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? |
A. | cracking or illegally hack into any system |
B. | putting antivirus into the victim |
C. | stealing data |
D. | stealing hardware components |
Answer» A. cracking or illegally hack into any system | |
Explanation: under section 66 of it act, 2000 which later came up with a much broader and precise law says that cracking or illegally hacking into any victim’s computer is a crime. it covers a wide range of cyber- crimes under this section of the it act. |
131. |
Quotations are letters of enquiry. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: the statement is true. quotations are letters of enquiry in which an organisation or an individual asks another organisation or individual to quote its or his rates and terms of payment for the goods intended to be purchased. |
132. |
Where is the name of the company inviting mentioned in an invitation of quotation? |
A. | top left corner |
B. | bottom left corner |
C. | top right corner |
D. | bottom right corner |
Answer» C. top right corner | |
Explanation: the name of the company inviting is mentioned in the top right corner on an invitation of quotation along with the address and date. |
133. |
Where is the name of the company which is invited mentioned? |
A. | top left corner |
B. | top right corner |
C. | bottom left corner |
D. | bottom right corner |
Answer» A. top left corner | |
Explanation: the name of the company which is invited is mentioned in the top left corner in an invitation of quotation below the address of the inviting party. |
134. |
Where is the courteous leave-taking mentioned in an invitation of quotation? |
A. | top left |
B. | bottom right |
C. | top right |
D. | bottom left |
Answer» B. bottom right | |
Explanation: the courteous leave-taking is mentioned in the bottom right corner along with signature and designation. |
135. |
Quotations are friendly letters. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: the statement is false. quotations are letters of enquiry and thus are business letters. it is normal to invite quotations from a large number of sellers. |
136. |
A tender is advertised in |
A. | newspapers |
B. | business environment |
C. | domestic markets |
D. | sellers |
Answer» A. newspapers | |
Explanation: there is a difference between quotations and tenders. a tender is advertised in newspapers, magazines, etc.. |
137. |
7 DRAFTING MODEL TENDERS , E-TENDERING- DIGITAL SIGNATURE CERTIFICATES- ENCRYPTING - DECRYPTING |
A. | date |
B. | notice number |
C. | sign |
D. | designation |
Answer» C. sign | |
Explanation: a tender does not have the sign of the authority mentioned in it. it only has the designation mentioned. |
138. |
Where is the designation of the authority giving the tender mentioned? |
A. | top center |
B. | bottom left |
C. | bottom right |
D. | top left |
Answer» C. bottom right | |
Explanation: the name of the authority is mentioned in the bottom right corner along with the organization’s name and branch. |
139. |
Where is the name of the organization mentioned in the tender? |
A. | top left |
B. | top center |
C. | top right |
D. | bottom center |
Answer» B. top center | |
Explanation: the name of the organization along with tender notice number and date is mentioned in the top center in bold in the beginning. |
140. |
Which of these is mentioned in a tender? |
A. | notice number |
B. | signature |
C. | address of the tenderer |
D. | courteous leave-taking |
Answer» A. notice number | |
Explanation: in the top center, the name and address of the organisation is mentioned along with the tender notice number and the date. |
141. |
The core of reverse engineering is an activity called |
A. | restructure code |
B. | directionality |
C. | extract abstractions |
D. | interactivity |
Answer» C. extract abstractions | |
Explanation: the engineer must evaluate the old program and extract a meaningful specification of the processing that is performed, the user interface that is applied, and the program data structures or database that is used. |
142. |
Forward engineering is also known as |
A. | extract abstractions |
B. | renovation |
C. | reclamation |
D. | both renovation and reclamation |
Answer» D. both renovation and reclamation | |
Explanation: forward engineering, also called renovation or reclamation , not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system in an effort to improve its overall quality. |
143. |
Reverse engineering techniques for internal program data focus on the definition of classes of objects. |
A. | true |
B. | false |
Answer» A. true | |
Explanation: this is accomplished by examining the program code with the intent of grouping related program variables. |
144. |
Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model: |
A. | build an initial object model |
B. | determine candidate keys |
C. | refine the tentative classes |
D. | discover user interfaces |
Answer» D. discover user interfaces | |
Explanation: once information defined in the preceding steps is known, a series of transformations can be applied to map the old database structure into a new database structure. |
145. |
Reverse engineering and Re-engineering are equivalent processes of software engineering. |
A. | true |
B. | false |
Answer» B. false | |
Explanation: re engineering is a process of analysis and change whereby a system is modified by first reverse engineering and then forward engineering. |
146. |
Which of the following is not an objective of reverse engineering? |
A. | to reduce maintenance effort |
B. | to cope with complexity |
C. | to avoid side effects |
D. | to assist migration to a case environment |
Answer» D. to assist migration to a case environment | |
Explanation: reverse engineering helps us to detect side effects rather than avoiding them. |
147. |
A voluntary arrangement between two or more parties that is enforceable by law as a binding legal agreement is known as |
A. | job |
B. | loan |
C. | contract |
D. | mutual fund |
Answer» C. contract | |
Explanation: a contract arises when the parties agree that there is an agreement. formation of a contract generally requires an offer, acceptance, consideration, and a mutual intent to be bound. each party to a contract must have capacity to enter the agreement. |
148. |
What is the type of mistake which occurs when only one party to a contract is mistaken as to the terms or subject-matter? |
A. | mutual mistake |
B. | unilateral mistake |
C. | bilateral mistake |
D. | individual mistake |
Answer» B. unilateral mistake | |
Explanation: the courts will uphold such a contract unless it was determined that the non-mistaken party was aware of the mistake and tried to take advantage of the mistake. it is also possible for a contract to be void if there was a mistake in the identity of the contracting party. an example is in lewis v. |
149. |
How are final contracts signed in modern business? |
A. | e-signatures |
B. | document scanning |
C. | thump impression |
D. | shaking hands |
Answer» A. e-signatures | |
Explanation: electronic signatures, or e- signatures, have become crucial for businesses as they seek to increase the speed of time-to-signature, e-signatures are legally binding and have the same legal status as a written signature, as long as it fulfills the requirements of the regulation it was created under. |
150. |
Which tender allows anyone to submit a tender to supply the goods or services that are required? |
A. | framework tendering |
B. | selective tendering |
C. | open tendering |
D. | close tendering |
Answer» C. open tendering | |
Explanation: on larger projects, there may then be a pre-qualification process that produces a short-list of suitable suppliers who will be invited to prepare tenders. this sort of pre-qualification process is not the same as |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.