128
71k

170+ Estimation, Costing and Valuation Engineering Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Civil Engineering .

101.

Average number of blocks required for a two-roomed house is about 2500.

A. true
B. false
Answer» A. true
Explanation: more recently, an improved version has been designed and marketed by aeroweld industries, b-9 hal industrial estate, bangalore – 560 037. the size of the blocks is 30.5 cm x 14.4 cm x 10 cm or 23 cm
102.

Before applying water proof mud plaster, the joints should not be scrapped.

A. true
B. false
Answer» B. false
Explanation: before applying water proof mud plaster, the joints should be scrapped and wall surface should be cleaned and made damp by sprinkling water and then plaster should e applied.
103.

For preparation of subgrade the existing subgrade should be dressed to a camber of 1 in 24 to 1 in 32.

A. true
B. false
Answer» A. true
Explanation: it is watered and allowed to soak for the night if necessary, and rolled with 8 to 10 tonne road roller. the density of the compacted soil should not be less than 1.8 gm /c.c. up to at least 6” depth.
104.

For making bund ordinary mud wall gonda ( bund) about 8” * 6” shall be made on the sides.

A. true
B. false
Answer» A. true
Explanation: bunding, also called a bund wall, is a constructed retaining wall around storage “where potentially polluting substances are handled, processed or stored, for the purposes of containing any unintended escape of material from that area until such time as remedial action can be taken.
105.

A written report is more formal than an oral report.

A. true
B. false
Answer» A. true
Explanation: the statement is true. a written report is more formal in nature than an oral report and it removes almost every flaw inherent in an oral report.
106.

Which of these is usually written in a form of a memorandum?

A. informal reports
B. formal reports
C. professional reports
D. business reports
Answer» A. informal reports
Explanation: written reports can be of two types. they are: formal reports and informal reports. informal reports are normally written in the form of a memorandum or a letter.
107.

Which of these is not a formal report?

A. informational
B. informal
C. interpretative
D. routine
Answer» B. informal
Explanation: formal reports can be classified into three different types. they are : informational, interpretative and routine.
108.

Into which of these types are formal reports not classified?

A. informational
B. interpretative
C. oral
D. routine
Answer» C. oral
Explanation: formal reports are written reports. they can be classified into three types : informational, interpretative and routine.
109.

Which of these reports provide information without any evaluation?

A. informational
B. interpretative
C. routine
D. progress
Answer» A. informational
Explanation: informational reports accumulate and provide information without any assessment or evaluation. they do not make any recommendations they do not give any findings.
110.

               report provides rational findings.

A. informative
B. interpretative
C. routine
D. progress
Answer» B. interpretative
Explanation: interpretative reports do not merely provide data. they assess this data and provide rational findings and worthwhile recommendations.
111.

Interpretative reports are also known as

A. recommendation reports
B. routine reports
C. progress reports
D. informal reports
Answer» A. recommendation reports
Explanation: the correct statement is: interpretative reports are also known as recommendation reports. they assess the data and provide rational findings and worthwhile recommendations.
112.

Which of these reports are written for recording information?

A. informational
B. interpretative
C. routine
D. recommendation
Answer» C. routine
Explanation: routine reports are normally written for recording information which is required at periodic intervals. in most cases there may be printed forms where relevant gaps have to be filled with acquired data.
113.

Which of these is not mentioned in a progress report?

A. name of project
B. right choice of instruments
C. nature of work
D. amount of work left
Answer» B. right choice of instruments
Explanation: a progress report should contain information like: name of project, nature of project, extent of work to be completed, amount of work left, etc..
114.

Which of these reports involves the checking of a piece of equipment to see if it’s still in working condition?

A. progress report
B. laboratory report
C. inspection report
D. inventory report
Answer» C. inspection report
Explanation: an inspection report is made when: an equipment is inspected to establish whether or not it is in working condition.
115.

Box culverts can be defined as a passage for water over a natural ground having a deck slab over it as path way for vehicles.

A. true
B. false
Answer» B. false
Explanation: slab culvert- a passage for water over a natural ground having a deck slab over it as path way for vehicles.
116.

The process of removing culverts, which is becoming increasingly prevalent, is known as

A. outlighting
B. culverting
C. daylighting
D. inlighting
Answer» C. daylighting
Explanation: in urban design and urban planning, daylighting is the redirection of a stream into an above-ground channel.
117.

An                    culvert is normally a low profile culvert. It allows them to be installed without disturbing the causeway as it will span over the entire drainage width.

A. box
B. rectangle
C. arch
D. circular
Answer» C. arch
Explanation: they are normally made of metal, stone masonry or rcc. they are installed easily, and you don’t need to use expensive water diversion structures to install it. common shapes include semicircular arch, elliptical arch, and concrete box culverts.
118.

Which of the following is not a type of cyber crime?

A. data theft
B. forgery
C. damage to data and systems
D. installing antivirus for protection
Answer» D. installing antivirus for protection
Explanation: cyber crimes are one of the most threatening terms that is an evolving phase. it is said that major percentage of the world war iii will be based on cyber-attacks by cyber armies of different countries.
119.

Cyber-laws are incorporated for punishing all criminals only.

A. true
B. false
Answer» B. false
Explanation: cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber crimes and tie the hands of citizens from doing illicit digital
120.

Which of the following is not a type of peer-to-peer cyber-crime?

A. phishing
B. injecting trojans to a target victim
C. mitm
D. credit card details leak in deep web
Answer» D. credit card details leak in deep web
Explanation: phishing, injecting trojans and worms to individuals comes under peer-to- peer cyber crime. whereas, leakage of credit card data of a large number of people in deep web comes under computer as weapon cyber- crime.
121.

Which of the following is not an example of a computer as weapon cyber-crime?

A. credit card fraudulent
B. spying someone using keylogger
C. ipr violation
D. pornography
Answer» B. spying someone using keylogger
Explanation: ddos (distributed denial of service), ipr violation, pornography are mass attacks done using a computer. spying
122.

Which of the following is not done by cyber criminals?

A. unauthorized account access
B. mass attack using trojans as botnets
C. email spoofing and spamming
D. report vulnerability in any system
Answer» D. report vulnerability in any system
Explanation: cyber-criminals are involved in activities like accessing online accounts in unauthorized manner; use trojans to attack large systems, sending spoofed emails. but cyber-criminals do not report any bug is found in a system, rather they exploit the bug for their profit.
123.

What is the name of the IT law that India is having in the Indian legislature?

A. india’s technology (it) act, 2000
B. india’s digital information technology (dit) act, 2000
C. india’s information technology (it) act, 2000
D. the technology act, 2008
Answer» C. india’s information technology (it) act, 2000
Explanation: the indian legislature thought of adding a chapter that is dedicated to cyber law. this finally brought india’s information technology (it) act, 2000 which deals with the different cyber-crimes and their associated laws.
124.

In which year India’s IT Act came into existence?

A. 2000
B. 2001
C. 2002
D. 2003
Answer» A. 2000
Explanation: on 17th oct 2000, the indian legislature thought of adding a chapter that is dedicated to cyber law, for which india’s
125.

The Information Technology Act -2000 bill was passed by K. R. Narayanan.

A. true
B. false
Answer» B. false
Explanation: the bill was passed & signed by dr. k. r. narayanan on 9th may, in the year 2000. the bill got finalised by head officials along with the minister of information technology, dr. pramod mahajan.
126.

Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.

A. 65
B. 65-d
C. 67
D. 70
Answer» A. 65
Explanation: when a cyber-criminal steals any computer documents, assets or any software’s source code from any organization, individual, or from any other means then the cyber crime falls under section 65 of it act, 2000.
127.

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

A. 6 months of imprisonment and a fine of rs. 50,000
B. 1 year of imprisonment and a fine of rs. 100,000
C. 2 years of imprisonment and a fine of rs. 250,000
D. 3 years of imprisonment and a fine of rs. 500,000
Answer» D. 3 years of imprisonment and a fine of rs. 500,000
Explanation: the punishment in india for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means is 3 years of imprisonment and a fine of rs. 500,000.
128.

What is the updated version of the IT Act, 2000?

A. it act, 2007
B. advanced it act, 2007
C. it act, 2008
D. advanced it act, 2008
Answer» C. it act, 2008
Explanation: in the year 2008, the it act, 2000 was updated and came up with a much broader and precise law on different computer-related crimes and cyber offenses.
129.

In which year the Indian IT Act, 2000 got updated?

A. 2006
B. 2008
C. 2010
D. 2012
Answer» B. 2008
Explanation: in the year 2008, the it act, 2000 was updated and came up with a much broader and precise law on different computer-related crimes and cyber offenses.
130.

What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?

A. cracking or illegally hack into any system
B. putting antivirus into the victim
C. stealing data
D. stealing hardware components
Answer» A. cracking or illegally hack into any system
Explanation: under section 66 of it act, 2000 which later came up with a much broader and precise law says that cracking or illegally hacking into any victim’s computer is a crime. it covers a wide range of cyber- crimes under this section of the it act.
131.

Quotations are letters of enquiry.

A. true
B. false
Answer» A. true
Explanation: the statement is true. quotations are letters of enquiry in which an organisation or an individual asks another organisation or individual to quote its or his rates and terms of payment for the goods intended to be purchased.
132.

Where is the name of the company inviting mentioned in an invitation of quotation?

A. top left corner
B. bottom left corner
C. top right corner
D. bottom right corner
Answer» C. top right corner
Explanation: the name of the company inviting is mentioned in the top right corner on an invitation of quotation along with the address and date.
133.

Where is the name of the company which is invited mentioned?

A. top left corner
B. top right corner
C. bottom left corner
D. bottom right corner
Answer» A. top left corner
Explanation: the name of the company which is invited is mentioned in the top left corner in an invitation of quotation below the address of the inviting party.
134.

Where is the courteous leave-taking mentioned in an invitation of quotation?

A. top left
B. bottom right
C. top right
D. bottom left
Answer» B. bottom right
Explanation: the courteous leave-taking is mentioned in the bottom right corner along with signature and designation.
135.

Quotations are friendly letters.

A. true
B. false
Answer» B. false
Explanation: the statement is false. quotations are letters of enquiry and thus are business letters. it is normal to invite quotations from a large number of sellers.
136.

A tender is advertised in              

A. newspapers
B. business environment
C. domestic markets
D. sellers
Answer» A. newspapers
Explanation: there is a difference between quotations and tenders. a tender is advertised in newspapers, magazines, etc..
137.

7 DRAFTING MODEL TENDERS , E-TENDERING- DIGITAL SIGNATURE CERTIFICATES- ENCRYPTING - DECRYPTING

A. date
B. notice number
C. sign
D. designation
Answer» C. sign
Explanation: a tender does not have the sign of the authority mentioned in it. it only has the designation mentioned.
138.

Where is the designation of the authority giving the tender mentioned?

A. top center
B. bottom left
C. bottom right
D. top left
Answer» C. bottom right
Explanation: the name of the authority is mentioned in the bottom right corner along with the organization’s name and branch.
139.

Where is the name of the organization mentioned in the tender?

A. top left
B. top center
C. top right
D. bottom center
Answer» B. top center
Explanation: the name of the organization along with tender notice number and date is mentioned in the top center in bold in the beginning.
140.

Which of these is mentioned in a tender?

A. notice number
B. signature
C. address of the tenderer
D. courteous leave-taking
Answer» A. notice number
Explanation: in the top center, the name and address of the organisation is mentioned along with the tender notice number and the date.
141.

The core of reverse engineering is an activity called

A. restructure code
B. directionality
C. extract abstractions
D. interactivity
Answer» C. extract abstractions
Explanation: the engineer must evaluate the old program and extract a meaningful specification of the processing that is performed, the user interface that is applied, and the program data structures or database that is used.
142.

Forward engineering is also known as

A. extract abstractions
B. renovation
C. reclamation
D. both renovation and reclamation
Answer» D. both renovation and reclamation
Explanation: forward engineering, also called renovation or reclamation , not only recovers design information from existing software, but uses this information to alter or reconstitute the existing system in an effort to improve its overall quality.
143.

Reverse engineering techniques for internal program data focus on the definition of classes of objects.

A. true
B. false
Answer» A. true
Explanation: this is accomplished by examining the program code with the intent of grouping related program variables.
144.

Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:

A. build an initial object model
B. determine candidate keys
C. refine the tentative classes
D. discover user interfaces
Answer» D. discover user interfaces
Explanation: once information defined in the preceding steps is known, a series of transformations can be applied to map the old database structure into a new database structure.
145.

Reverse engineering and Re-engineering are equivalent processes of software engineering.

A. true
B. false
Answer» B. false
Explanation: re engineering is a process of analysis and change whereby a system is modified by first reverse engineering and then forward engineering.
146.

Which of the following is not an objective of reverse engineering?

A. to reduce maintenance effort
B. to cope with complexity
C. to avoid side effects
D. to assist migration to a case environment
Answer» D. to assist migration to a case environment
Explanation: reverse engineering helps us to detect side effects rather than avoiding them.
147.

A voluntary arrangement between two or more parties that is enforceable by law as a binding legal agreement is known as

A. job
B. loan
C. contract
D. mutual fund
Answer» C. contract
Explanation: a contract arises when the parties agree that there is an agreement. formation of a contract generally requires an offer, acceptance, consideration, and a mutual intent to be bound. each party to a contract must have capacity to enter the agreement.
148.

What is the type of mistake which occurs when only one party to a contract is mistaken as to the terms or subject-matter?

A. mutual mistake
B. unilateral mistake
C. bilateral mistake
D. individual mistake
Answer» B. unilateral mistake
Explanation: the courts will uphold such a contract unless it was determined that the non-mistaken party was aware of the mistake and tried to take advantage of the mistake. it is also possible for a contract to be void if there was a mistake in the identity of the contracting party. an example is in lewis v.
149.

How are final contracts signed in modern business?

A. e-signatures
B. document scanning
C. thump impression
D. shaking hands
Answer» A. e-signatures
Explanation: electronic signatures, or e- signatures, have become crucial for businesses as they seek to increase the speed of time-to-signature, e-signatures are legally binding and have the same legal status as a written signature, as long as it fulfills the requirements of the regulation it was created under.
150.

Which tender allows anyone to submit a tender to supply the goods or services that are required?

A. framework tendering
B. selective tendering
C. open tendering
D. close tendering
Answer» C. open tendering
Explanation: on larger projects, there may then be a pre-qualification process that produces a short-list of suitable suppliers who will be invited to prepare tenders. this sort of pre-qualification process is not the same as

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.