KEMBAR78
Gondar University Model Exam (ComputerScienceExitExam) PDF | PDF
0% found this document useful (0 votes)
702 views38 pages

Gondar University Model Exam (ComputerScienceExitExam) PDF

Gondar University model exam

Uploaded by

Ayana Negera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
702 views38 pages

Gondar University Model Exam (ComputerScienceExitExam) PDF

Gondar University model exam

Uploaded by

Ayana Negera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 38
Started on Wednesday, s]une 202,221 AM State Finished Completed on Wednesday, ]une2026, 3:50 AM 1 hourr9 mins s100/101.00 60.40 0utofr00.00 question raukicooutefico ‘Assume that x.y, and areint variables with x=1,y=70,2=-3, Which ofthe followingistrue after the following statements executed? p= (xh+ "y+ Shen a pew b Cpaz2 bow 4 paw ‘Thecorrectansweris ‘quesnon2 Hake 0sutots 90 ‘What wll happenin the following C-+ code snippet? int a= 100, a. qnow pointstoa b aisassignedtob © prow pointstob 4d. bisassignedtoa® ‘The correc answeris:p now point Question inks sooutefi 30 Which of te following best describes the statement“Ci+ isa case sensitive programming language’? 2. Everystatementin C++ ends with semicolon b. Allvariablesin Cv areidentifers xitExamand exttam aredistinetin + 4. Every C++ statement should include the header ileiostream h ‘The correct answer is ExitExam and extExam are distinct in C++ uesnon4, Which of the following is true about the statement a=, a. Thevalueofa and are equal b. Thevalueof isassigned to variables and thelater change on variable bwillaffect the value variable © Thevalueofisassigned to variable and theater change on variable b will not affect the value of variablea 1d. Thevalue of variable 2 is ssigned to varableband the value ofvariableb isassigned to variables ‘The correct answeris: The value ofbisassignedto variable and he later change on variable b will not affect the value afvarablea uesTons Mskicooutefia0 ‘Which one ofthe followingistruestatement about analgorithm? |4.Analgorithm should take finite amount of ime te compute ¥ b._Analgorithn may nothavea beginningandan end ‘& Ambiguous steps aeallowed inan algorithm Complex problems canaot havean algorithm The correctansweris: An algorithm should take finite amount of mete compute questions ako cuts 90 Which of te following will NOT increase an integer variable‘iby 1? be Cinisi 6 Dis E449 4 Bis ‘Thecorrectansweris ‘question? ‘What wll happen inthe folowing C++code snippet? inta=100,b=200; inttp=Ba,%q=6b A alsasignedtob = bisassignedtoa prowpointstob¥ D._ gnowpointstoa ‘Thecorrectansweris now points tob uestion inks cooutefi 30 Gen three lasses A, Band C, where clas Cis drive from class 8, which s derived from cass A those classes are public classes and found.in differen package then aclassCobjectean access 2. Protected default and publicdataonlyin Cand 8. Any data in Cand Only Protected and publicdatain and. Protected default and public data only in 4. Anydatain Cand only publicdatain Aand 8 ‘The correct answeris: Any datain Cand Only Protected and public data in A and uesnong Markicooutefic0 Ifthe methods notstave:how to invoke in the ava programminglanguage? 14. Classname methodnamed) b. Objectnamemethodnameg¥ & Methodnameo 4. Variablenamemethedname ‘The correct answeris:Objecinamemethodnamed question 10 uk cooutefnoo ‘Which ofthe following statement is correct, when an overridden method called from withina subclass? Iewillalways eefrto the version of that method defined bythe superclass CCompilesime error will occur Iewill always ceferto the version of that method defined bythe subclass ¥ 4. TheCompilerwill choose randomly the method tobe executed ‘The correct answeris: twill always efer tothe version ofthat method defined by the subclass ‘question tt inks cooutefi 30 Which ofthe following statements notirue? 8. Apublicmember ofa clas can be accessed all the packages b. Aprotected member ofa class can be accessed from its derived cass. © _Aprivate member ofa class cannot be accessed from ts derived class 4. Aprivate member ofa class cannot be accessed bythe methods ofthesame lass ‘The correct answeris A private member ofa class cannot be accessed by the methods ofthe same class ‘question 2, lect sone of the basic principles of object oriented programming that use one objectin multiple forms. a. Inheritance be. Incerface Encapsulation d. Noneof the above ‘The correctansweris: None ofthe above Question’ ako op0utots 90 Consider the program: publiecass Student { inci inesection void displayot System out printn(1D-"+ id): System outprintin Section" section)) public statievoid main(String] args Preateanabject/)) Which ofthe following isa conrect way to create an abject in the main method afthe above program? A. Student stu yew Student 0; B. Studentstud=new Student (983.2: c Studentstuds D. Studentst Student (2983.20); Your answeris incorrect ‘The correctansweris Student stud=new Student 0; question tg Mskicooutefi20 ‘Suppose we want to determine the efficiency ofthe algorithr, then how wecan measure the space factor Te count the maximum memory required by the algorithm b. Tocount theaverage memory requited bythe algorithm ‘© Tocountthe maximum disk space needed by the algorithm ‘Tocountthe minimum memory required by thealgorithrn ‘The correct answeris: Ta count the maximum memory requiredby the algorithm uEsTON TS inks soon 30 “Two main measures forthe efficiency ofan algorithm are ‘Compiexityand capacity TimeandspaceW Processor and memory 4. Dataandspace ‘The correct answerisTimeand space question 6 Incnest ‘Whats the besttime complexity we can achieve to precomputeall-pirs shortest paths ina weighted graph? > 0(@)* 8 Ofna tr) 4. 01mm) ‘The cotrectansweris: (0) ‘question Markicooutefi20 \Whatisthe time complexity of optimal binary search tree? 2. O(n) bog & om 4 Ot) ‘The correctansweris:OCogn) uesion ako on0utots 90 Which ofthe followings the space complexity fa recursive algorithm withn levels of recursion and Of) space complexity in each level? 2 ot) & o(* & Otlogn) 4. of) ‘The correctansweris: Ofogr) question tg Which ofthe followings the best case time complexity of liner search algorithm? 2 08 8 Ofna ‘tog 4 o* The correctansweris: 00) ‘uesTion20 aks sooutef90 Ifthe elements''23 and’ are inserted in a queue, what would be order forthe removal? a0 aa mae¥ 4. None ofthe above ‘The correctansweris 1234 Question 2 inks soon 30 Whatisthe disadvantage of array data structure? 2. Multiple other data structures canbe implemented using arrays. Elements are toredin contiguous memory blocks. © Theamountof memory to be allocated should be known beforehand. 4. Elements ofan array can be accessed in constant time ‘The correct answeris: The amount of 1emory to beallocated should be known beforehand ‘question 22 ‘Whats the maximum number of swaps that canbe performedin he Selection Sortalgorithm? bow don ‘Thecotrectansweris:n-+ queson 23 Incest Marko oveutts0 ‘What would be the time complexity ifusertriestoinsert the element at the end of the linked lis (head pointers known)? 2 ofogn b op © Otnlogs) ome The correct answeris: Op Eston 2g ako op0utots 90 Which data structures required to convert the infix to prefixnotation? a Stack b Queue Linked ist 4. Binarywee® ‘The correctansweris Stack ‘question 25 ‘Which one ofthe ollowingisthe process of insertingan elementin the stack? a. Insert badd © Push¥ 1d. Noneofthe above ‘Thecorrectansweris: Push uesron26 Mskicooutefia0 ‘Which ofthe following isa Divide and Conquer algorithm? |. Bubblesort b Mergeson™ &Seletion Sort Heap Sort The correct answeris: Merge Sort question 27 tsk sooutafi oo isa collection of multiple log'cally related database distributed overa computer network, 2. Data Fragmentation b. Distributed Database” © Datasllocation 4. Data Replication ‘The correct answeris Distributed Database ‘question 28 ‘Means thata transaction must execute exactlyonce completely or not at all a. olation b. Durabily © tomiciyY d. Consistency ‘The correct answeris: Atoricty queston29 Mskicooutefi20 language that used to formulate theschema of database structure ‘a. DataControl Language b. Data Definition Language ¢ Data Manipulation language ‘Transaction ont Language The correct answers: Data Definition Language ‘uestion30 tsk sooutatio0 Atablecan haveonlyone a. Foreign key b Unique Key Candidate key 4. Primary key ‘The correct answeris Primary key ‘question Ince ‘Checkpoints area partof 2. Concurrency measures% Recovery measures © uthoriation measures ‘d._ Security measures ‘The correctansweris: Recovery measures quesTon32 Mskicooutefi20 ‘When the valuesin one or more attributes being used asa foreign key must exist there must be corresponding primary key value in another table inthe database, we have created Entity Integrity Constraints b. Referential Integrity Constraint & Domain Integrity constraint 4. Transitive Dependency ‘The correct answeris:Referential rity Constraint ‘sion 33 tisk soouteti 30 Which of the followingis nota feature of DBMS? 2. Minimum Duplication and Redundancy of Data, b High Level of security © Support ACID Property 4. Single-user Access only ‘The correct answeris Single-user Access only ‘question 34 Which of the following isnota function ofthe database? 3. Manipulating data b Managing stored data & Provide Backup and recovery Analyzing code ‘The correctansweris: Analyzing cade cussion 3 Mskicooutefi20 ‘Which ofthe following is nota recovery technique? |. ARIES Algorithm: b Deferred update cImmediateupdate ‘Tworphase commit ‘The correct answeris:Two-phase commit estion 36 ako cuts 90 Which ofthe followingis not rue about OODBMS (object oriented database management system), a. Theobjectis persistent b Thekeyconceptis relation © Thekeyconceptsis objects 4. Objectidentiyis unchangeable ‘The correctansweris: The key conceptis relation ‘question? ‘Which ofthe following techniques of query optimization i uses ordering ofthe operation? a. Costestimation b. Heuristic based © DSematieQuery d._ Exhaustive search ‘The correctansweris: Heuristic based quesron 38 Mskicooutefi20 ‘Which ofthe following relationship s matched correctly with appropriate example of MANY TO-ONE? 2. [Author~Book} b. [Bulding—Location) © [Hospital-Patient} [Employee—Department] ¥ The correct answeris:(Emplayee~ Department} uestion39 ako on0utots 90 During system design system decomposition isinluenced by all except a Coupling b. Cohesion Users thinking 4. Systersfunctonaliyy ‘The correct answeris: Usersthinking ‘uesnon4o ‘The functional models represented graphically with — a. Clasediagram b. Objectdiagram © Statetranstion diagram dL Useease diagram ‘The correctansweris: Use case diagram uesron gt Mskicooutefi20 ‘Which ofthe following concept of software engineeringisfalse statement, 44. Design focuses on the developer pointof view: b.Resultofsystem analysisisa mode thatincludes a subsystem decomposition ‘© System Analysis Focuses onthe user's view afthesystem Regurernents elicitation focus onlyon the user's view fthesyster, The correct answeris: Result of system analysisis2 model that includes 2 subsystem decomposition question 42 ako on0utots 90 Which ofthe following heuristics isnot used to identity Entity objects a. Datasources b. Real-worldentiies Forms 4 Realswordactvtes® ‘The correct answeris Forms ‘question 43 “Consider system where a heat sensor detects an intrusion and alerts the security company’ What kind of arequitement the system is providing? a. Non-Funetional b. Constraints Known Requirement ‘d._Functional Requirement ¥ ‘The correct answeris Functional Requirement cursron 4g Incest Marko oveutts0 hich one ofthe followings used toldentifying Actors 4. Which usergroups execute the systems main functions? b. What kind of dependencies areexistamonguse cases % ‘& Whatinformation does the actor access? ‘What ae the tasks that the actor wants thesystem to perform? The correct answeris: Which usergroups execute the systems main functions? question 4s inks soon 30 In PHP which function sused to establish a secure connection tox MySQL database using SSLencryption? secure_connect rnysql_ss_connectO pedo connect ss10 4 mysli_sl connect” ‘The correct answeris: mysqli ssl connect cquesnon 46 Incest ‘Which avaScript function i used to display a dialog box with an alert message? a. alert b. confirma © consolelog@ 1d. prompt ® ‘The correctansweris alert curso 47 Mskicooutefia0 ‘Which avaScrpt methodisused a selectan HTML element by itsIO? a getflementByTag0 bb getElementByNamep cc _getflementdyClas) sgettlementByidoY The correctansweris-getBlement®yldQ vesting inks sooutatio0 Which language isused to add interactivity and dynamic behavior toaweb page? css Javascript hrm 4. PHP ‘The correc answeris:avaSeript cuesnon4g ‘Which ofthe following languages is primarily responsible for defining te structure and content ofa web page? 2. JavaScript bo HTML 6 oss 4. PHP ‘The correctansweris: HTML uesTon 0 Mskicooutefi20 ‘Which PHP functionis used to checkifa file or directory exists? flees check bile checkg is leo A. Mle existso¥ ‘The correctansweris: ile exists) Questions ako cuts 90 \Which PHP function is used to retrieve the umber of rows affected by an SQL query? num sows % b. affected_rows0) © gecaffected_ rows 4. row-count ‘The correct answeris affected rows ‘uestons2 ‘Which PHP superglobal array is used to retrieve information about the server and execution environment? 2. $.post bs seaver¥ © 4 SESSION ds.cer ‘The correctansweris:$_ SERVER queso 3 Mskicooutefi20 ‘Which PHP superglobal array is use to retrieve data sent from an HTML form using the POST method? a $.posTY b s.seavER & $.REQUEST 4 set The correctansweris:§_ POST Question 4 ako op0utts 90 ‘An agent ype which has condition-2ctionruleand memory to remind the current state ofthe world anit evolution s called 2. Model ased reflex b. Goalbased © Util based 4. Simplerefiex ‘The correctansweris: Model based reflex uesnonss Ince ‘Assure that you are employed asa machine learning expertat the Ministry of Education (Mol), Which machine learning technique you would apply forthe rask of describing the existing higher education institutions as frst generation, second generation and third generation, 44. Reinforcement leaening b. classification ® © Regression 4. Clustering ‘The correct answeris: Clustering quesTon 6 ukooneute90 Consider the definition of Al: "The effort to design and implementintelligent software that solves problemsby identifying best action sequence to achieve the desired goal"can be views Alas system that thinks humanly bAsystemthatacts rationally © Asystern that thinks rationally ® 4. Asystemthatacts humanly ‘The correctansweris:Asystem thatacts rationally uesiionS7 inks sooutatio0 \Whatis completeness ofsearch algorithms? 2. Provided that solution exists, che algorithm willing it b._Anestimateofhew much information the algorithm needstostore forfinding2 solution & _-Anestimate of how many search steps takes to finda solution 4. Ifthereisa ference between the quality of goal states, the agent wil find the bestone ‘The correct answeris Provided that a solution exists, the algorithm wil find uesHoN SB ‘Which one ofthe view of defining Al concerned with thought processing 2. Viewing Alasa system that act ormniscientlytoits environment b. Viewing Alasa system that thinkeitherbumanly or thinkrationally © Viewing Alasa system that actelther humanly or think ationally ‘dL Viewing Alas.asystem which has complete autonomous quesTons9 Mskicooutefi20 ‘Which one ofthe following statement isfalse Validating Al systern that think rationally can be made by using its reasoning logic Validating Al system that act rationally ean be made by ts performance Validating Al syste that thinks humanly isimpossible¥ “uring testis a mechanism to validate Alsystem that act humanly The correct answer is Validating Al system that thinks humanlyisimpossible uestion6@ taka soouteti 30 ‘Acontext ree Grammaris called ambiguous fthereexstsastring that can have? no parse tree conlyone parsetree ‘more than one parse sree” 4 Partial parsetree ‘The correct answeris: morethanone parse tree ‘question 6 Ince ‘Acontext free grammar with production rules $-aS Js equivalent tothe regular expression a afesby bo ae de ‘Thecorrectansweris: 2? quesron 62 Incest Marko ovoutls00 -Apushdown automaton employs. data structure a Linked ist ® bo Stack © Queue Hash Table The correct answeris: Stack uestion63 inks sooutefi 30 Which ofthe following Machines Equivalent for Regular grammar? Linear bounded automata Pushdown automata Turing Machine 4. Finite state automata ‘The correct answers: Finite state automata uesnoné4 lect Civena context fee grammar G={V.Y, P Sand production P.a->b Which one of the following is true? a bey b aewey © ace A. aevey) ‘The correctansweris:be (W/S)" Questions inks soon 30 Civenafniteautomata below, what wil be the egular expression that correctly represents the language accepted byt A) sn We A. altarblablabsbbras'(asb)aby” B (as"(avbjab yt ©. lasbablabsbbsaa"(arbjaby'Y D. afabfab-bbvaa'(a-biaby” Your answeris corect The correct answers (asbjablabrbbeas’ aa)" ‘uesTon 66 Hake cuts 90 enti the technique used toreplace run-time computations with compile-time computations? 2. Code hoisting ® b. Invariant computation © Peehole optimization 4. Constant folding ‘The correctansweris: Constant folding ‘uestion67 Hake 090i 90 Inwhich does the compiler translate the sourcecode? Machine code® Bothaandb Binary code 4. Bxecutablecode ‘Thecorrectansweris Bothaandd ‘question 68 Incest ‘Through which ype of grammar can synthesized atributes can be simulated? 2. Ambiguous grammar b. WRgrammar Uh grammar d. None% ‘The correct answeris-LR grammar quesron 69 Mskicooutefi20 ‘Whats regular expresionforan identifier? Lettertletter digi)™ Lectetletter | gid Lectertletter | digio"Y Lectertlettert| digit The correct answeris:Lete(let | digi” uestion70 inks sooutatio0 Whatisthe process of finding a parse ree fora tring tokens called? a. Tokenizing b Parsing Recognizing 4. Analyzing ‘Thecorrectansweris Parsing ‘queston7t ‘Whats the action of parsing the source program nto proper syntactic classes? 2. Syntaxanabsis b. Lovie analysis Interpretation analysis |. Goneralsyntaxanalyss ‘The correct answeris Lexical analyse. uesron72 Incest Marko oveutts0 Allare properties ofthe integrity goal ofa computersystem, except ‘4. Ensures there wasanauthorized modification bIncegritycan be compromised by Deception® &_ Keepresources fromactve attacks 4. Incegrity can be compromised by Disclosure The correct answeris Integrity can be compromised by Disclosure ‘vesion 73 taka sooutafi 30 ‘Assure, youwento the Ethiopian airport to catch 2 light and tld the airport personnel your name. Forsure, they would askyou some questions like your passport number and your eeservation ticket number for some praof af your identity, Then what do we al this process? a. Authentication b. Authorization 6 ecessconttol 4. all ‘The correc answeris: Authentication uesTon74 Markco outefic0 ‘Assume, youwent tothe nearby commercial bank's automatic teller machine (ATM) to withdraw money. You inserted your ATM card nto the ‘machine, and the machine asked you to enter your prsonalidentification number (PIN). Then, when you ype your password, someaneintercepts your ATM card number and which of your security goalsis compromised? a Integrity b. Authorization © Confidentiality 4. Availabily ‘Thecorrectansweris: Confidentiality ‘question 75 aks so out 30 Which attack can be used fr monitoring children’s activity? 2. Ransomwares b Adware © Worms 4. Spyware ‘The correctansweris Spyware vEsTON7E taka sooutafi 30 isatypeof date link ayer attackin TCP/IP protocol tack 8. ARP spoofing bDNSspoofing & SYNC#LOOD attack 4 Allexceptew ‘The correctansweris All exceptc ‘uesHon77 Incest Which one ofthe following statementsistrueabout wormsand Viruses 2. Viusrequiesahostto spread while Worms doesnitrequire b. Worms requires auser ation for replicate while viruses doesnt require Worms spreading speed sslowerthan Virus Spreading speed 1d. Worms requires ahestto spread whileviruses doesnt require ‘The correct answeris Virus requires hostte spread while Worms doesnt require cussion 7B Inert Marko ovoutl00 ‘Whats the bit pattern forthe fist octet ofa class-B nesworkaddress? a MOXKX, box 1 HOKKHK® A. SOXXKXXK The correct answers: 10XXXXXK, ESTION7D taka sooutafi 30 Which 0S1 model layeris responsible for flow control? 2. Application Layer b. Session Layer © Transporttayer¥ 4. Presentation Layer ‘The correct answeris:Transpor layer ‘uestonBO ‘Which of the following networking device's used in physical layer? a Huby b Router © Bridge |. Switch ‘The correctansweris: Hub uestion BY ako nous 90 Assuring that Company VW has main site and remote site The mainsite has three LANs with LAN has a0 hess, AN 2 has 6 hosts, and LAN 3 has. hosts, The remote site hastwo LANs, each with 09 hosts. Thenetwork uses privateaddreses. The Internet service provider assigned the ‘compary the netwark 200,100.50 2/26 ~~ Cm 7 Reteee Company Vwx Remote Site Router B ie —_L | oases 700 Hosts TAN 2: 60 Hosts ‘The emote site uses the network prefix 19216610 02g. What subnets and masks can you use for the LANs at the remote siteand conserveaddess space? A. 192168.1032/28 and 192 168:10.64/28 B 192168.10.64/26and192.168.10192/26 C192168.10.025and 192 168:30.128125 D._1922168:16.0/30ands92.168:10.:28/20% Your answeris incorrect ‘The correctansweris s92368so.of2sand 92168 10.328/25 ‘uesionB2 ako cuts 90 ‘The main sie uses the network prefix192. 16615 0/24 What subnets and masks can you use to provide sufficient addresses for LANS atthe main site and conserveaddress space? Internet Reteee Company VWXx Remote Site on Router B Main Site Router A —_L | oases 700 Hosts 4100 Hosts TAN 2: 60 Hosts 192:168:15.0/5 for LAN, 192 168.15 128/26 for LAN 2, and 192.168.15.192/27 for LAN B._ 192168.15.0/26 for LAN 3,192.68,5 28/26 for LAN and72.15192.0f29 for ANS. 192:168.15 0/27 for LAN 1,192 16815 128/26 for LAN 2, nd 72.15 192.025 for LAN 3% D._192:168:5 0/00 fer LAN 1,192:68.15128/60 for LAN 2 and172:15392.029 for LAN3 Your answeris incorrect. ‘The correctansweris 192.168.5.0)2 for LAN1,192.168.15.128/26 for LAN 2, nd 1921683519227 for LAN vestion 3 taka sooutafi 30 InDNS concept the process of getting IP address by using itshostname is called: a. Binding b. Forward resolution Backward resolution 4 Resolving ‘The correct answeris Forward resolution ‘question B4 Ince Let's assume that you know the domain nareof Face Book server but you dart know ts P addres. So which network troubleshooting tol you use twgetitsIPaddress? a. Nelookup® b Traceroute © Pingcommand 4. Netstat ‘The correct answeris:Netstat question BS ukooneutt0 ‘Wherewhen Network administrator should have to use the concept of Network Address translation? Network admin should use NAT Where: Global address used in the LAN b. Helshe dort know ype of P address used inthe LAN®. ‘cPrivate IPaddres isused inthe LAN, 4. Default gateway of LAN isnitconfigured ‘The correct answeris: Private Paddressisused inthe LAN ‘esTonBE taka sooutatio0 \Where/vhen we can use DHCP Services? is recommended iouse DHCP when: 2, Therearesmall number ofnetworkusers b. Networkadminwent:ouse sameend device forspecfc purpose & Numberof devicesin the networkare very complex 4. Allarecorrect, ‘The correc answer is: Number of devices inthe networkare very complex ‘question ‘Which of the following server ype i used to store, process, and respond to the lent request for webpages via httpihtps protocols 3. DNSSener bitty Server Webserver 4d. FIPserver ‘The cotrectansweris: Web Server quesTon BB Mskicooutefiao isanetworksecuity device that monitors incoming and outgoing network traffic a Proxy be Router c Frevall¥ Gateway ‘Thecorrectansweris Firewall ‘uestionBS ako cuts 90 ‘Which network nd mask would you use forthe WAN linkto save the most address space? Company Vwx Remote Site OuiKi Router 8 Main Site Router A —_| LAN - 100 Hosts LAN 2- 60 Hosts 100 Hosts TANS 28 Hosts 700 Hosts A s92368m.240129 B. rs2168.n.240/30 C 92n60.n.2g0(e7% DL w9216am.2a0)e Your answeris incorrect ‘The correctansweris sen368.240/28 quesTon gO, Muskicooutefr20 ‘Aprocess canbe terminated dueto fataleror allofthe mentioned” d._killed by another process The correct answeris:allofthe mentioned. uesToN SH ako pout 90 ‘To accessthe services of operating ster, the interfaces provided by the: assembly instructions b. system calls Ae 4. brary ‘The correct answeris system calls ‘uesnong2 ‘Which module gives control ofthe CPU to the proces elected by the shore-term scheduler? none of the mentioned b. Scheduler & Intertupt dispatcher” ‘The correctansweris: Dispatcher queson g3 Incest Marko ovoutl00 ‘Which ofthe following coneitionsrequited for deadlockto be possible? process may hold allocated resources while awaiting assignment of other resources allofthe mentioned no resource can be forcibly removed for a process holding it ‘Thecorrectansweris:allofthe mentioned EsTONSS taka soon 30 \Which scheduling algorithm allocates the CPU frst the process that requests the CPU fist? a. none ofthe mentioned priority scheduling © shortestjob scheduling 4. first-come, first-served scheduling ‘The correct answeris: first-come, rst served scheduling uesnon gs Iecnest Which one ofthe followingisnot rue? 8, kemelis made of various modules which cannot be loaded in unning operating system b. kernel isthe frst part of operating sytem to load into memory during booting _kemelisthe program shat constitutes the central core afthe operating system™® ‘dL kernel rains inthe memory during the entire computer session ‘The correct answeris:kernelis made of various modules which cannot be loaded in running operating system cuesron 6 Mskicooutefi20 ‘Aprocessor performing fetch or decading of cifferentinstruction during the execution of nother instruction scaled 2 Superscaing Parallel Computation & Noneofthe above Pipetining The correct answeris: Pipelining ‘sion 97 ako on0utts 90 ‘Aninstuction that wil jump to thenextinstuction ifthe conditions met a. Branch instruction b Jumpinstuction Returninstruction® 4. Skipinstuction ‘The correct answeris Skip instruction uesnons8 ‘Aninceruptthat is caused by register overflow attempt to divide by zero, an invalid operation code, stackeverflaw can be? Internal interrupt b. Software interupt None oftheaboue d._ External interrupt ‘The correct answeris: Internal interupt cussion gg Inert Marko ovoutl00 Computer address busis Muliiretional b Bidiectional® © Unidirectional Noneof the above The correct answeris: Unidirectional ‘uesion 100 ako cuts 90 ‘Thesimplest way to organize a computeristo have one processor egister and an instruction code format with two parts. The first par specifies the ‘operation tobe performed and the second specifies a. operand b Input address 4. output ‘The correc answeris address ‘question 101 Which ofthe following computer memory fastest? a Harddisk b. None ofthe above © Resister 4. RAM ‘The correct answeris Register

You might also like