Quiznetik

Estimation, Costing and Valuation Engineering | Set 2

1. Average number of blocks required for a two-roomed house is about 2500.

Correct : A. true

2. Before applying water proof mud plaster, the joints should not be scrapped.

Correct : B. false

3. For preparation of subgrade the existing subgrade should be dressed to a camber of 1 in 24 to 1 in 32.

Correct : A. true

4. For making bund ordinary mud wall gonda ( bund) about 8” * 6” shall be made on the sides.

Correct : A. true

5. A written report is more formal than an oral report.

Correct : A. true

6. Which of these is usually written in a form of a memorandum?

Correct : A. informal reports

7. Which of these is not a formal report?

Correct : B. informal

8. Into which of these types are formal reports not classified?

Correct : C. oral

9. Which of these reports provide information without any evaluation?

Correct : A. informational

10. report provides rational findings.

Correct : B. interpretative

11. Interpretative reports are also known as

Correct : A. recommendation reports

12. Which of these reports are written for recording information?

Correct : C. routine

13. Which of these is not mentioned in a progress report?

Correct : B. right choice of instruments

14. Which of these reports involves the checking of a piece of equipment to see if it’s still in working condition?

Correct : C. inspection report

15. Box culverts can be defined as a passage for water over a natural ground having a deck slab over it as path way for vehicles.

Correct : B. false

16. The process of removing culverts, which is becoming increasingly prevalent, is known as

Correct : C. daylighting

17. An                    culvert is normally a low profile culvert. It allows them to be installed without disturbing the causeway as it will span over the entire drainage width.

Correct : C. arch

18. Which of the following is not a type of cyber crime?

Correct : D. installing antivirus for protection

19. Cyber-laws are incorporated for punishing all criminals only.

Correct : B. false

20. Which of the following is not a type of peer-to-peer cyber-crime?

Correct : D. credit card details leak in deep web

21. Which of the following is not an example of a computer as weapon cyber-crime?

Correct : B. spying someone using keylogger

22. Which of the following is not done by cyber criminals?

Correct : D. report vulnerability in any system

23. What is the name of the IT law that India is having in the Indian legislature?

Correct : C. india’s information technology (it) act, 2000

24. In which year India’s IT Act came into existence?

Correct : A. 2000

25. The Information Technology Act -2000 bill was passed by K. R. Narayanan.

Correct : B. false

26. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.

Correct : A. 65

27. What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

Correct : D. 3 years of imprisonment and a fine of rs. 500,000

28. What is the updated version of the IT Act, 2000?

Correct : C. it act, 2008

29. In which year the Indian IT Act, 2000 got updated?

Correct : B. 2008

30. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?

Correct : A. cracking or illegally hack into any system

31. Quotations are letters of enquiry.

Correct : A. true

32. Where is the name of the company inviting mentioned in an invitation of quotation?

Correct : C. top right corner

33. Where is the name of the company which is invited mentioned?

Correct : A. top left corner

34. Where is the courteous leave-taking mentioned in an invitation of quotation?

Correct : B. bottom right

35. Quotations are friendly letters.

Correct : B. false

36. A tender is advertised in

Correct : A. newspapers

37. 7 DRAFTING MODEL TENDERS , E-TENDERING- DIGITAL SIGNATURE CERTIFICATES- ENCRYPTING - DECRYPTING

Correct : C. sign

38. Where is the designation of the authority giving the tender mentioned?

Correct : C. bottom right

39. Where is the name of the organization mentioned in the tender?

Correct : B. top center

40. Which of these is mentioned in a tender?

Correct : A. notice number

41. The core of reverse engineering is an activity called

Correct : C. extract abstractions

42. Forward engineering is also known as

Correct : D. both renovation and reclamation

43. Reverse engineering techniques for internal program data focus on the definition of classes of objects.

Correct : A. true

44. Which of the following steps may not be used to define the existing data model as a precursor to re-engineering a new database model:

Correct : D. discover user interfaces

45. Reverse engineering and Re-engineering are equivalent processes of software engineering.

Correct : B. false

46. Which of the following is not an objective of reverse engineering?

Correct : D. to assist migration to a case environment

47. A voluntary arrangement between two or more parties that is enforceable by law as a binding legal agreement is known as

Correct : C. contract

48. What is the type of mistake which occurs when only one party to a contract is mistaken as to the terms or subject-matter?

Correct : B. unilateral mistake

49. How are final contracts signed in modern business?

Correct : A. e-signatures

50. Which tender allows anyone to submit a tender to supply the goods or services that are required?

Correct : C. open tendering

51. involves the preparation of tenders based on a typical or notional bill of quantities or schedule of works.

Correct : D. serial tendering

52. tendering is used when all the information necessary to calculate a realistic price is available when tendering commences.

Correct : A. single-stage

53. An invitation to tender might not include?

Correct : A. holiday packages

54. Mutual mistake occurs when both parties of a contract are mistaken as to the terms.

Correct : B. true

55. In Schedule contract the contractor undertakes the execution or construction of specific work with all its contingencies, to complete it in all respect within a specified time for a fixed amount.

Correct : A. false

56. A pumping set with a motor has been installed in a building at a cost of Rs.2500.00. Assuming the life of the pump as 15 years, work out the amount of annual instalment of sinking fund required to be deposited to accumulate the whole amount of 4% compound interest.

Correct : B. rs.125

57. In this method, it is assumed that the property will lose its value by a constant percentage of its value at the beginning of every year. This method is called?

Correct : C. straight line method

58. Obsolescence is the annual periodic payments for repayments of the capital amount invested by a party.

Correct : B. false

59. Scrap value is the net annual letting value of a property, which is obtained after deducting the amount of yearly repairs from the gross income.

Correct : B. false

60. Approximate cost of a hostel building for 100 students @Rs.10000/- per student works out as Rs. 10 lakhs.

Correct : A. true

61. Cube rate estimate is less accurate as compared to the plinth area estimate as the height of the building is also compared.

Correct : B. true

62. For storeyed building plinth area estimate is not prepared for each storey separately.

Correct : B. false

63. In this method approx. total length of walls is found in running metre and this total length multiplied by the rate per running metre of wall gives a fairly accurate cost.

Correct : C. approximate quantity method estimate

64. What will be the co-efficient of passive earth pressure, at a depth of 8m in cohesion less soil sand with an angle of internal friction of 30° when the water rises to the ground level?

Correct : C. 3

65. Which model is used to compute the effort required to integrate reusable components or program code that is automatically generated by design or program translation tools?

Correct : C. a reuse model

66. What is the full form of ITA-2000?

Correct : D. information technology act -2000

67. In reverse engineering process, what refers to the sophistication of the design information that can be extracted from the source code?

Correct : C. abstraction level

68. In reverse engineering, what refers to the level of detail that is provided at an abstraction level?

Correct : B. completeness

69. Reverse engineering is the process of deriving the system design and specification from its

Correct : C. source code

70. Much of the information necessary to create a behavioral model can be obtained by observing the external manifestation of the existing

Correct : B. interface

71. Extracting data items and objects, to get information on data flow, and to understand the existing data structures that have been implemented is sometimes called

Correct : A. data analysis