>
questions
List of practice Questions
Turnbuckle joint is not used in _____.
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Joints
In flange pipe joint, both flanges with gasket in between them are connected together by____.
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Joints
Match List - I with List - II.
List - I
List -II
(Solids)
(Their Features)
(A) Prism
(I) Base is a circle.
(B) Pyramid
(II) Two similar ends and rectangular faces.
(C) Cone
(III) Two circular faces and one curved surface.
(D) Cylinder
(IV) One base and slant triangular faces.
Choose the
correct
answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Faces, Edges And Vertices
Match List - I with List - II.
List - I
List -II
(Solids)
(Their Features)
(A)Angle of Line indicating Isometric lengths with base line
(I)
\(15\degree\)
(B) Angle of line showing true lengths with base line.
(II)
\(30\degree\)
(C) Angle between lines showing isometric lengths and true lengths.
(III)
\(45\degree\)
(D) Angle of projectors with base line.
(IV)
\(90\degree\)
Choose the
correct
answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Isometric Projection
In conventional representation of external V-Thread, root is represented by _______ in its front view.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Threads
In the top view of a vertical stud, two complete and one broken circle is shown in
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Technical Drawing
It is a cylindrical piece of metal having threads at both ends and non threaded portion of square cross-section at the centre.
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Metrology and Inspection
The head thickness of a Snap head rivet is ____.(Where d is rivet diameter)
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Rivet
Two continous thick circles are shown in the top view of vertical _________.
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
View factors
The shape of cotter is _____.
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Shape Factor
Open bearing is useful for shafts rotating at
CUET (UG) - 2023
CUET (UG)
Engineering Graphics
Shafts
Number of Triangles in given figure:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Classification of Triangles
The radius taken to draw crest/root in knuckle thread is________, where 'P' is the pitch of thread.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Threads
Both crest and root are round in
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Threads
Chamfering of head of a bolt is done to
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Sub-surface investigations
The size of chamfer circle is taken as _____ in square/hexagonal headed bolt and nut with nominal diameter ́d'.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Equation of Circle
Choose the incorrect statement in case of plain washer:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Efficiency of Screws
A solid without any edge or vertex when visualized from any direction appears as a circle is
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Direction and Distance
The only difference between isometric view and isometric projection of a cube is its
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Isometric Projection
Which of the following function will display the average of each row of a dataframe named df?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
types of functions
Consider an example(s):
A person is listening into the transmissions on a LAN between two workstations or tuning into transmissions between a wireless handset and a base station.
The above situation(s) is the example of :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Networking
Nimish has stolen a credit card. He has used the card at petrol pump for fuel refilling in his car what type of offence it is :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Contract Law
Match List - I with List - II.
List - I
List -II
(A) Phishing
(I) Code redirects user to fake website without user knowing
(B) Spyware
(II) Alters or deletes data
(C) Pharming
(III) Fake email replicates well known organization
(D) Viruses
(IV) Monitors information by monitoring key presses on a user's keyboard
Choose the
correct
answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Basics of Internet
Methods of Malware identification used by Antivirus is?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Network Security
___is used to represent the hidden edges of an object.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
National Symbols and Flag Code
Prev
1
...
3706
3707
3708
3709
3710
...
7167
Next