Professional Documents
Culture Documents
ig
𝟐 𝟓 𝐜𝐨𝐬(𝟗𝟎° +𝜽) 𝐬𝐞𝐜(−𝜽) 𝐭𝐚𝐧(𝟏𝟖𝟎° +𝜽)
1. If 𝑨 = [ ] , then 𝑨−𝟏 is 7. 𝐬𝐞𝐜(𝟑𝟔𝟎° −𝜽) 𝐬𝐢𝐧(𝟏𝟖𝟎° +𝜽) 𝐜𝐨𝐭(𝟗𝟎° −𝜽) =
𝟏 𝟑
ch
3 5 −3 5
A) [ ] B) [ ] A) sin 𝜃 B) −1 C) cos 𝜃 D) 1
1 2 1 −2
oa
3 −1 𝟑 −𝟓
C) [ ] D) [ ].
−5 2 −𝟏 𝟐
8.To find the value of sin20°sin40° sin60°sin80°
eC
A)1/8 B) 1/16 C) 3/16 D)0
𝟑 𝟏
2. Characteristic roots of the matrix [ ]
𝟐 𝟒
are
lin
9.x and y intercepts of the line 5x-3y+15=0 are
A) 𝟐 𝐚𝐧𝐝 𝟓 B) 2 and − 5
respectively
C) −2 and 5 D) 1 and 2 .
On
A) 3,-5 B) -3,5 C) 5,3 D) 5,-3
1 5 6 3
C) [ ] D) [ ]
3 6 5 1 11.To find the equation of the line passing
ET
𝐬𝐢𝐧𝟐 𝜽 𝐜𝐨𝐬 𝟐 𝜽 12. 127. If the slope of the two lines are
5.Simplified form of − 𝟏−𝐬𝐢𝐧 𝜽 is
em
𝟏−𝐜𝐨𝐬 𝜽 𝟐 𝟓
and − then the angle between them is
𝟓 𝟐
A) sin 𝜃 + cos 𝜃
A) 0° B) 30° C) 60° D) 𝟗𝟎°
B) sin 𝜃 − cos 𝜃
ad
𝟏 1
𝟑 ° °
A) B) 𝑥 2 +1
6. If 𝐜𝐨𝐬 𝜽 = 𝟓 and 𝟐𝟕𝟎 < 𝜽 < 𝟑𝟔𝟎 then 𝒙𝟐 −𝟏
𝑥+1 𝑥−1
𝐬𝐞𝐜 𝜽+𝐜𝐨𝐬𝐞𝐜 𝜽−𝐜𝐨𝐭 𝜽 C) √𝑥−1 D) √𝑥+1 .
𝟑𝟒 1
A) B) 1 C) 0 D) − 35 .
𝟑𝟓
ND Academy DCET 2023 Online Coaching Page 1
DCET 2023 MODEL QP SET-1 MCQ’S - 100 MARKS
ig
𝝅
14.Second derivative of 𝒚 = 𝐥𝐨𝐠(𝐬𝐢𝐧 𝒙 + 𝐜𝐨𝐬 𝒙) is
20. ∫𝟎𝟐 √𝟏 + 𝐬𝐢𝐧 𝟐𝒙 𝒅𝒙 =
ch
𝝅
A) − 𝐬𝐞𝐜 𝟐 (𝟒 − 𝒙) B) tan2 𝑥 𝜋
A) 1 B) 𝟐 C) 0 D) 2
C) sin 𝑥 − cos 𝑥 D) 1
oa
21.Earthing is necessary to give protection
against
𝒅𝒚
If 𝒚 = 𝐥𝐨𝐠(𝐥𝐨𝐠 𝟑𝒙) , then = a) Danger of electric shock
eC
15. 𝒅𝒙
b) Voltage fluctuation
1 1 c) Overloading
A) B) 3𝑥 log 3𝑥
log 3𝑥
𝟏 3
d) High temperature of the conductors
C) D)
lin
𝒙 𝐥𝐨𝐠 𝟑𝒙 𝑥 log 3𝑥
22. Personal Protective Equipment is required
when -
On
a)Employers su1fer an injury
16. Equation of the normal to the curve
b)The employees suffer an injury
𝒚 = 𝟒𝒙𝟑 + 𝟑𝒙𝟐 + 𝟒 at (−𝟏, 𝟑) is c)An employee asks 1or it
A) 6𝑥 + 𝑦 = 17 B) 𝒙 + 𝟔𝒚 = 𝟏𝟕
23 d)Engineering, work practices, and
administrative controls don't offer enough
C) 6𝑥 − 𝑦 = 17 D) 𝑥 − 6𝑦 = 17 safety from risks.
20
d) None
18. ∫ 𝒙 𝐬𝐢𝐧 𝒙 𝒅𝒙 =
24. The condition for the validity of Ohm's law
A) −𝑥 cos 𝑥 − sin 𝑥 + 𝑐
Is
B) 𝑥 sin 𝑥 + cos 𝑥 + 𝑐
y
that the
C) 𝑥 cos 𝑥 + sin 𝑥 + 𝑐
em
13
B) 𝜋 cubic units
3
𝟐𝟔
ND
C) 0 D) 𝝅 cubic units
𝟑
ig
25. A fuse performs 30. Which supply line has highest current
a) Detection function only rating
ch
b) Circuit interruption function only a) From meter line b) From pole line
c) Both detection and interruption functions c) Sub circuit line d) Main circuit line
oa
d) None of the above
31. The storage battery generally used in
26.Identify the instrument in the figure electric
eC
shown below: power station is
a) nickel-cadmium battery
b) zinc-carbon battery
c) lead- acid battery
lin
d) none of the above
On
32.What is the working principle of a
a) Ammeter and Voltmeter Transformer?
b) Ammeter and Energy meter a)Transformer works on the principle of
c) Energy meter and Multi-meter 23 self-induction
d) Megger and Voltmeter b)Transformer works on the principle of
mutual induction
27.Identify the type of circuit c)Transformer works on the principle of ampere
20
law
d)Transformer works on the principle
restricted to
a)Closed circuit b) Open circuit a) low horsepower motors
DC
ig
35.What is the primary purpose of a UPS 42. Resources in a project refers to
(Uninterruptible Power Supply)? (A) Manpower
ch
a)To provide backup power during utility outages (B) Machinery
b)To regulate and stabilize voltage levels (C) Both a & b
oa
c)To protect connected devices from power surges (D) None of the above
and spikes
d)All of the above 43. Project performance consists of
eC
(A) Cost
36. The first two bands on the resistors are_ (B) Quality
a) Two digits (c) Both a & b
b) Decimal Multiplier (d) None of the above
lin
c) Tolerance
44. The people or groups who have something
d) All are incorrect
to gain or lose from your project’s outcome are
On
(A) Project Managers
37. What are the applications of the (B) Stakeholders
PN junction diode? (C) Team members
a) Can be used as a photodiode 23 (D) None of the above
b) Can be used as solar cell
c) Can be used as rectifiers 45.Resource requirement in project becomes
d) All of the above
constant while the project is in its _____ progress
20
stage.
38. If a BJT is to be used as a switch, it must
(A) 40 to 55% (B) 55 to 70%
operate in
(C) 70 to 80% (D) 80 to 95%
a)Cut—off mode or active mode
ET
b)Active Mode or saturation mode 46. Five dimensions that must be managed on a
c)Cut-off mode or saturation mode project
d)Cut-off mode or saturation mode or active mode
DC
41. A Project is
ND
(A) Temporary
(B) Permanent
(C) Repetitive (D) None of the above
ig
48. Project design in concerned with developing 56. Which of the following are the tools for
project _____ techniques project planning
ch
(A) Planning (A) Gantt chart (B)CPM
(B) Implementing
(C) PERT chart (D) All of these
(C) Scheduling (D) None of these
oa
57. The earliest method used for planning of
49. Which one of the following is captured in the projects was
Work Breakdown Structure (WBS)?
eC
(A) CPM (B) PERT
(A) The life cycle phases (C) Bar Chart (D) Milestone Chart
(B) The logical order of tasks
(C) The scope of the project 58. The path which moves along the activities
having total float zero, in the network diagram
lin
(D) Project costs
is called
50. Which state of project management life cycle (A) Free float (B) Critical path
On
requires the maximum time of completion.
(A) Conceptualizing (C) Total float (D) Independent float
(B) Planning
59. PERT analysis is based upon
(C) Execution
23 (A) Optimistic time
(D) Estimation (B) Pessimistic time
(C) Most likely time
(D) All of the above
20
51. New project idea can be received by a
company from
(A) Internal sources only 60. Critical path method is good for
(B) External sources only (A) Small project only
(B) Large project only
ET
53. An activity is critical if its _____ float is zero d. The process of assembling computer
(A) Total (B) Free components
(C) Independent (D) Interference
ad
ig
62. What is an algorithm? 69. What is business process automation
(BPA)?
ch
a. A programming language
b. A computer hardware component a. The manual execution of tasks ii. a
c. A set of instructions to solve a problem business process
d. A graphical user interface b. The use of technology to automate
oa
repetitive tasks and streamline
63. Which of the following is an essential step in workflows
the application development process? c. The process of outsourcing business
eC
operations to external vendors
a. Deploying the application to production d. The implementation of complex algorithms
b. Writing the user manual to analyze business data
c. Creating a project plan
lin
d. Conducting market research
70. Which organization structure promotes
64. Which application development method flexibility and collaboration by breaking
On
promotes a flexible and collaborative down functional silos and creating cross-
approach, allowing for changes and functional teams?
adjustments throughout the development a. Functional organization
process? b. Matrix organization
a. Waterfall model
23 c. Hierarchical organization
b. RAD (Rapid Application Development)
c. Lean development d. Network organization
d. Scrum
20
c. Internet Explorer
d. Adobe Photoshop
ig
c. An application that processes
73. Cloud computing means andanalyzes IoT data.
ch
a. Storing data on physical d. A software program that
servers within an controlsIoT devices.
organization’s premises
oa
b. Accessing and managing data 77. Which of the following best
over the internet using remote definescyber security?
eC
servers a. Protection of physical assets from
c. Transferring data between theft
different cloud service b. Protection of computer networks
d. Using virtual reality technology to andsystems from unauthorized
lin
interact with cloud-based access
applications c. Protection of personal data from
physical damage
On
74. What is Infrastructure-as-a-Service d. Protection of online advertisements
(IaaS)? from fraud
a. A cloud computing service model
that provides software 78. What is the purpose of phishing
applications over the internet
23
attacks in cyber safety?
b. A cloud computing service a. To spread computer viruses
model that offers virtualized b. To gain unauthorized access
20
organization.
Ac
ig
80. What is the recommended approach for 86. Ungrouped & grouped data are the
managing your online accounts and examples for?
ch
passwords? A. Quantitative & Qualitative data
a. Using the same password for all
B. Numerical & Discrete data
accounts to avoid confusion
oa
C. Continuous & descriptive data
b. Sharing your passwords with trusted
friends or family members D. Raw & processed data
c. Enabling two-factor authenticationfor
eC
enhanced security 87. Any data that we first gather is known as?
d. Saving passwords in an easily A. Grouped data B. Processed data
accessible document on your C. Classified data D. Raw data
computer
lin
88. Grouped data is also called as?
81. A data which cannot be easily measurable A. Analyzed data B. Nominal data
is a? C. Ordinal data D. Raw data
On
A. Quantitative data
B. Numerical data 89. Class interval basically represents the?
C. Discrete data
D. Qualitative data A. Length of the class
23
B. Height of the class
82. Data collection tools include? C. Width of the class
A. Interview
20
D. All of the above
B. Questionnaires
C. Survey 90. Which of the following are methods under
D. All of the above measures of dispersion?
ET
A. Range
83. Number of students in a classroom is a type B. Standard deviation
of? C. Mean deviation
DC
C. Descriptive statistics
D. Statistical data collection
Ac
ig
92. If you secure 97 percentile in an 98. What is the purpose of a loop in Python
ch
examination, it means that your position is programming?
below ____ of the total candidates who had A)To make decisions based on conditions
oa
appeared in the exam B)To repeat a set of instructions multiple times
A. 90% C)To store a collection of values
B. 97% D)To calculate complex mathematical equations
eC
C. 3%
D. None of the above 99. Which Python keyword is used to exit a
loop prematurely?
93. The range represents ____
lin
A. The highest value A) CONTINUE
B. The lowest value B) RETURN
On
C. The middle value of a class interval
C) PASS
D. Difference between highest and lowest
number D) BREAK
used for?
C)It calculates the logarithm of a number
A)Data analysis, web development, and
automation D)It generates a random number
DC
B)Hardware engineering
C)Graphic design *********************
D)Video game development
y
C)Index
D)Boolean