0 ratings0% found this document useful (0 votes) 702 views38 pagesGondar University Model Exam (ComputerScienceExitExam) PDF
Gondar University model exam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Started on Wednesday, s]une 202,221 AM
State Finished
Completed on Wednesday, ]une2026, 3:50 AM
1 hourr9 mins
s100/101.00
60.40 0utofr00.00
question
raukicooutefico
‘Assume that x.y, and areint variables with x=1,y=70,2=-3, Which ofthe followingistrue after the following statements executed? p= (xh+ "y+
Shen
a pew
b Cpaz2
bow
4 paw
‘Thecorrectansweris
‘quesnon2
Hake 0sutots 90
‘What wll happenin the following C-+ code snippet? int a= 100,
a. qnow pointstoa
b aisassignedtob
© prow pointstob
4d. bisassignedtoa®
‘The correc answeris:p now pointQuestion
inks sooutefi 30
Which of te following best describes the statement“Ci+ isa case sensitive programming language’?
2. Everystatementin C++ ends with semicolon
b. Allvariablesin Cv areidentifers
xitExamand exttam aredistinetin +
4. Every C++ statement should include the header ileiostream h
‘The correct answer is ExitExam and extExam are distinct in C++
uesnon4,
Which of the following is true about the statement a=,
a. Thevalueofa and are equal
b. Thevalueof isassigned to variables and thelater change on variable bwillaffect the value variable
© Thevalueofisassigned to variable and theater change on variable b will not affect the value of variablea
1d. Thevalue of variable 2 is ssigned to varableband the value ofvariableb isassigned to variables
‘The correct answeris: The value ofbisassignedto variable and he later change on variable b will not affect the value afvarablea
uesTons
Mskicooutefia0
‘Which one ofthe followingistruestatement about analgorithm?
|4.Analgorithm should take finite amount of ime te compute ¥
b._Analgorithn may nothavea beginningandan end
‘& Ambiguous steps aeallowed inan algorithm
Complex problems canaot havean algorithm
The correctansweris: An algorithm should take finite amount of mete computequestions
ako cuts 90
Which of te following will NOT increase an integer variable‘iby 1?
be Cinisi
6 Dis E449
4 Bis
‘Thecorrectansweris
‘question?
‘What wll happen inthe folowing C++code snippet?
inta=100,b=200;
inttp=Ba,%q=6b
A
alsasignedtob
=
bisassignedtoa
prowpointstob¥
D._ gnowpointstoa
‘Thecorrectansweris
now points tobuestion
inks cooutefi 30
Gen three lasses A, Band C, where clas Cis drive from class 8, which s derived from cass A those classes are public classes and found.in
differen package then aclassCobjectean access
2. Protected default and publicdataonlyin Cand 8.
Any data in Cand Only Protected and publicdatain and.
Protected default and public data only in
4. Anydatain Cand only publicdatain Aand 8
‘The correct answeris: Any datain Cand Only Protected and public data in A and
uesnong
Markicooutefic0
Ifthe methods notstave:how to invoke in the ava programminglanguage?
14. Classname methodnamed)
b. Objectnamemethodnameg¥
& Methodnameo
4. Variablenamemethedname
‘The correct answeris:Objecinamemethodnamed
question 10
uk cooutefnoo
‘Which ofthe following statement is correct, when an overridden method called from withina subclass?
Iewillalways eefrto the version of that method defined bythe superclass
CCompilesime error will occur
Iewill always ceferto the version of that method defined bythe subclass ¥
4. TheCompilerwill choose randomly the method tobe executed
‘The correct answeris: twill always efer tothe version ofthat method defined by the subclass‘question tt
inks cooutefi 30
Which ofthe following statements notirue?
8. Apublicmember ofa clas can be accessed all the packages
b. Aprotected member ofa class can be accessed from its derived cass.
© _Aprivate member ofa class cannot be accessed from ts derived class
4. Aprivate member ofa class cannot be accessed bythe methods ofthesame lass
‘The correct answeris A private member ofa class cannot be accessed by the methods ofthe same class
‘question 2,
lect
sone of the basic principles of object oriented programming that use one objectin multiple forms.
a. Inheritance
be. Incerface
Encapsulation
d. Noneof the above
‘The correctansweris: None ofthe aboveQuestion’
ako op0utots 90
Consider the program:
publiecass Student {
inci
inesection
void displayot
System out printn(1D-"+ id):
System outprintin Section" section))
public statievoid main(String] args
Preateanabject/))
Which ofthe following isa conrect way to create an abject in the main method afthe above program?
A. Student stu
yew Student 0;
B. Studentstud=new Student (983.2:
c Studentstuds
D. Studentst
Student (2983.20);
Your answeris incorrect
‘The correctansweris
Student stud=new Student 0;
question tg
Mskicooutefi20
‘Suppose we want to determine the efficiency ofthe algorithr, then how wecan measure the space factor
Te count the maximum memory required by the algorithm
b. Tocount theaverage memory requited bythe algorithm
‘© Tocountthe maximum disk space needed by the algorithm
‘Tocountthe minimum memory required by thealgorithrn
‘The correct answeris: Ta count the maximum memory requiredby the algorithmuEsTON TS
inks soon 30
“Two main measures forthe efficiency ofan algorithm are
‘Compiexityand capacity
TimeandspaceW
Processor and memory
4. Dataandspace
‘The correct answerisTimeand space
question 6
Incnest
‘Whats the besttime complexity we can achieve to precomputeall-pirs shortest paths ina weighted graph?
> 0(@)*
8 Ofna
tr)
4. 01mm)
‘The cotrectansweris: (0)
‘question
Markicooutefi20
\Whatisthe time complexity of optimal binary search tree?
2. O(n)
bog
& om
4 Ot)
‘The correctansweris:OCogn)uesion
ako on0utots 90
Which ofthe followings the space complexity fa recursive algorithm withn levels of recursion and Of) space complexity in each level?
2 ot)
& o(*
& Otlogn)
4. of)
‘The correctansweris: Ofogr)
question tg
Which ofthe followings the best case time complexity of liner search algorithm?
2 08
8 Ofna
‘tog
4 o*
The correctansweris: 00)
‘uesTion20
aks sooutef90
Ifthe elements''23 and’ are inserted in a queue, what would be order forthe removal?
a0
aa
mae¥
4. None ofthe above
‘The correctansweris 1234Question 2
inks soon 30
Whatisthe disadvantage of array data structure?
2. Multiple other data structures canbe implemented using arrays.
Elements are toredin contiguous memory blocks.
© Theamountof memory to be allocated should be known beforehand.
4. Elements ofan array can be accessed in constant time
‘The correct answeris: The amount of
1emory to beallocated should be known beforehand
‘question 22
‘Whats the maximum number of swaps that canbe performedin he Selection Sortalgorithm?
bow
don
‘Thecotrectansweris:n-+
queson 23
Incest
Marko oveutts0
‘What would be the time complexity ifusertriestoinsert the element at the end of the linked lis (head pointers known)?
2 ofogn
b op
© Otnlogs)
ome
The correct answeris: OpEston 2g
ako op0utots 90
Which data structures required to convert the infix to prefixnotation?
a Stack
b Queue
Linked ist
4. Binarywee®
‘The correctansweris Stack
‘question 25
‘Which one ofthe ollowingisthe process of insertingan elementin the stack?
a. Insert
badd
© Push¥
1d. Noneofthe above
‘Thecorrectansweris: Push
uesron26
Mskicooutefia0
‘Which ofthe following isa Divide and Conquer algorithm?
|. Bubblesort
b Mergeson™
&Seletion Sort
Heap Sort
The correct answeris: Merge Sortquestion 27
tsk sooutafi oo
isa collection of multiple log'cally related database distributed overa computer network,
2. Data Fragmentation
b. Distributed Database”
© Datasllocation
4. Data Replication
‘The correct answeris Distributed Database
‘question 28
‘Means thata transaction must execute exactlyonce completely or not at all
a. olation
b. Durabily
© tomiciyY
d. Consistency
‘The correct answeris: Atoricty
queston29
Mskicooutefi20
language that used to formulate theschema of database structure
‘a. DataControl Language
b. Data Definition Language
¢ Data Manipulation language
‘Transaction ont
Language
The correct answers: Data Definition Language‘uestion30
tsk sooutatio0
Atablecan haveonlyone
a. Foreign key
b Unique Key
Candidate key
4. Primary key
‘The correct answeris Primary key
‘question
Ince
‘Checkpoints area partof
2. Concurrency measures%
Recovery measures
© uthoriation measures
‘d._ Security measures
‘The correctansweris: Recovery measures
quesTon32
Mskicooutefi20
‘When the valuesin one or more attributes being used asa foreign key must exist there must be corresponding primary key value in another table
inthe database, we have created
Entity Integrity Constraints
b. Referential Integrity Constraint
& Domain Integrity constraint
4. Transitive Dependency
‘The correct answeris:Referential
rity Constraint‘sion 33
tisk soouteti 30
Which of the followingis nota feature of DBMS?
2. Minimum Duplication and Redundancy of Data,
b High Level of security
© Support ACID Property
4. Single-user Access only
‘The correct answeris Single-user Access only
‘question 34
Which of the following isnota function ofthe database?
3. Manipulating data
b Managing stored data
& Provide Backup and recovery
Analyzing code
‘The correctansweris: Analyzing cade
cussion 3
Mskicooutefi20
‘Which ofthe following is nota recovery technique?
|. ARIES Algorithm:
b Deferred update
cImmediateupdate
‘Tworphase commit
‘The correct answeris:Two-phase commitestion 36
ako cuts 90
Which ofthe followingis not rue about OODBMS (object oriented database management system),
a. Theobjectis persistent
b Thekeyconceptis relation
© Thekeyconceptsis objects
4. Objectidentiyis unchangeable
‘The correctansweris: The key conceptis relation
‘question?
‘Which ofthe following techniques of query optimization i uses ordering ofthe operation?
a. Costestimation
b. Heuristic based
© DSematieQuery
d._ Exhaustive search
‘The correctansweris: Heuristic based
quesron 38
Mskicooutefi20
‘Which ofthe following relationship s matched correctly with appropriate example of MANY TO-ONE?
2. [Author~Book}
b. [Bulding—Location)
© [Hospital-Patient}
[Employee—Department] ¥
The correct answeris:(Emplayee~ Department}uestion39
ako on0utots 90
During system design system decomposition isinluenced by all except
a Coupling
b. Cohesion
Users thinking
4. Systersfunctonaliyy
‘The correct answeris: Usersthinking
‘uesnon4o
‘The functional models represented graphically with —
a. Clasediagram
b. Objectdiagram
© Statetranstion diagram
dL Useease diagram
‘The correctansweris: Use case diagram
uesron gt
Mskicooutefi20
‘Which ofthe following concept of software engineeringisfalse statement,
44. Design focuses on the developer pointof view:
b.Resultofsystem analysisisa mode thatincludes a subsystem decomposition
‘© System Analysis Focuses onthe user's view afthesystem
Regurernents elicitation focus onlyon the user's view fthesyster,
The correct answeris: Result of system analysisis2 model that includes 2 subsystem decompositionquestion 42
ako on0utots 90
Which ofthe following heuristics isnot used to identity Entity objects
a. Datasources
b. Real-worldentiies
Forms
4 Realswordactvtes®
‘The correct answeris Forms
‘question 43
“Consider system where a heat sensor detects an intrusion and alerts the security company’ What kind of arequitement the system is providing?
a. Non-Funetional
b. Constraints
Known Requirement
‘d._Functional Requirement ¥
‘The correct answeris Functional Requirement
cursron 4g
Incest
Marko oveutts0
hich one ofthe followings used toldentifying Actors
4. Which usergroups execute the systems main functions?
b. What kind of dependencies areexistamonguse cases %
‘& Whatinformation does the actor access?
‘What ae the tasks that the actor wants thesystem to perform?
The correct answeris: Which usergroups execute the systems main functions?question 4s
inks soon 30
In PHP which function sused to establish a secure connection tox MySQL database using SSLencryption?
secure_connect
rnysql_ss_connectO
pedo connect ss10
4 mysli_sl connect”
‘The correct answeris: mysqli ssl connect
cquesnon 46
Incest
‘Which avaScript function i used to display a dialog box with an alert message?
a. alert
b. confirma
© consolelog@
1d. prompt ®
‘The correctansweris alert
curso 47
Mskicooutefia0
‘Which avaScrpt methodisused a selectan HTML element by itsIO?
a getflementByTag0
bb getElementByNamep
cc _getflementdyClas)
sgettlementByidoY
The correctansweris-getBlement®yldQvesting
inks sooutatio0
Which language isused to add interactivity and dynamic behavior toaweb page?
css
Javascript
hrm
4. PHP
‘The correc answeris:avaSeript
cuesnon4g
‘Which ofthe following languages is primarily responsible for defining te structure and content ofa web page?
2. JavaScript
bo HTML
6 oss
4. PHP
‘The correctansweris: HTML
uesTon 0
Mskicooutefi20
‘Which PHP functionis used to checkifa file or directory exists?
flees check
bile checkg
is leo
A. Mle existso¥
‘The correctansweris: ile exists)Questions
ako cuts 90
\Which PHP function is used to retrieve the umber of rows affected by an SQL query?
num sows %
b. affected_rows0)
© gecaffected_ rows
4. row-count
‘The correct answeris affected rows
‘uestons2
‘Which PHP superglobal array is used to retrieve information about the server and execution environment?
2. $.post
bs seaver¥
© 4 SESSION
ds.cer
‘The correctansweris:$_ SERVER
queso 3
Mskicooutefi20
‘Which PHP superglobal array is use to retrieve data sent from an HTML form using the POST method?
a $.posTY
b s.seavER
& $.REQUEST
4 set
The correctansweris:§_ POSTQuestion 4
ako op0utts 90
‘An agent ype which has condition-2ctionruleand memory to remind the current state ofthe world anit evolution s called
2. Model ased reflex
b. Goalbased
© Util based
4. Simplerefiex
‘The correctansweris: Model based reflex
uesnonss
Ince
‘Assure that you are employed asa machine learning expertat the Ministry of Education (Mol), Which machine learning technique you would
apply forthe rask of describing the existing higher education institutions as frst generation, second generation and third generation,
44. Reinforcement leaening
b. classification ®
© Regression
4. Clustering
‘The correct answeris: Clustering
quesTon 6
ukooneute90
Consider the definition of Al: "The effort to design and implementintelligent software that solves problemsby identifying best action sequence to
achieve the desired goal"can be views Alas
system that thinks humanly
bAsystemthatacts rationally
© Asystern that thinks rationally ®
4. Asystemthatacts humanly
‘The correctansweris:Asystem thatacts rationallyuesiionS7
inks sooutatio0
\Whatis completeness ofsearch algorithms?
2. Provided that solution exists, che algorithm willing it
b._Anestimateofhew much information the algorithm needstostore forfinding2 solution
& _-Anestimate of how many search steps takes to finda solution
4. Ifthereisa ference between the quality of goal states, the agent wil find the bestone
‘The correct answeris Provided that a solution exists, the algorithm wil find
uesHoN SB
‘Which one ofthe view of defining Al concerned with thought processing
2. Viewing Alasa system that act ormniscientlytoits environment
b. Viewing Alasa system that thinkeitherbumanly or thinkrationally
© Viewing Alasa system that actelther humanly or think ationally
‘dL Viewing Alas.asystem which has complete autonomous
quesTons9
Mskicooutefi20
‘Which one ofthe following statement isfalse
Validating Al systern that think rationally can be made by using its reasoning logic
Validating Al system that act rationally ean be made by ts performance
Validating Al syste that thinks humanly isimpossible¥
“uring testis a mechanism to validate Alsystem that act humanly
The correct answer is Validating Al system that thinks humanlyisimpossibleuestion6@
taka soouteti 30
‘Acontext ree Grammaris called ambiguous fthereexstsastring that can have?
no parse tree
conlyone parsetree
‘more than one parse sree”
4 Partial parsetree
‘The correct answeris: morethanone parse tree
‘question 6
Ince
‘Acontext free grammar with production rules $-aS Js equivalent tothe regular expression
a afesby
bo ae
de
‘Thecorrectansweris: 2?
quesron 62
Incest
Marko ovoutls00
-Apushdown automaton employs. data structure
a Linked ist ®
bo Stack
© Queue
Hash Table
The correct answeris: Stackuestion63
inks sooutefi 30
Which ofthe following Machines Equivalent for Regular grammar?
Linear bounded automata
Pushdown automata
Turing Machine
4. Finite state automata
‘The correct answers: Finite state automata
uesnoné4
lect
Civena context fee grammar G={V.Y, P Sand production P.a->b Which one of the following is true?
a bey
b aewey
© ace
A. aevey)
‘The correctansweris:be (W/S)"Questions
inks soon 30
Civenafniteautomata below, what wil be the egular expression that correctly represents the language accepted byt
A)
sn We
A. altarblablabsbbras'(asb)aby”
B (as"(avbjab yt
©. lasbablabsbbsaa"(arbjaby'Y
D. afabfab-bbvaa'(a-biaby”
Your answeris corect
The correct answers
(asbjablabrbbeas’ aa)"
‘uesTon 66
Hake cuts 90
enti the technique used toreplace run-time computations with compile-time computations?
2. Code hoisting ®
b. Invariant computation
© Peehole optimization
4. Constant folding
‘The correctansweris: Constant folding‘uestion67
Hake 090i 90
Inwhich does the compiler translate the sourcecode?
Machine code®
Bothaandb
Binary code
4. Bxecutablecode
‘Thecorrectansweris Bothaandd
‘question 68
Incest
‘Through which ype of grammar can synthesized atributes can be simulated?
2. Ambiguous grammar
b. WRgrammar
Uh grammar
d. None%
‘The correct answeris-LR grammar
quesron 69
Mskicooutefi20
‘Whats regular expresionforan identifier?
Lettertletter digi)™
Lectetletter | gid
Lectertletter | digio"Y
Lectertlettert| digit
The correct answeris:Lete(let
| digi”uestion70
inks sooutatio0
Whatisthe process of finding a parse ree fora tring tokens called?
a. Tokenizing
b Parsing
Recognizing
4. Analyzing
‘Thecorrectansweris Parsing
‘queston7t
‘Whats the action of parsing the source program nto proper syntactic classes?
2. Syntaxanabsis
b. Lovie analysis
Interpretation analysis
|. Goneralsyntaxanalyss
‘The correct answeris Lexical analyse.
uesron72
Incest
Marko oveutts0
Allare properties ofthe integrity goal ofa computersystem, except
‘4. Ensures there wasanauthorized modification
bIncegritycan be compromised by Deception®
&_ Keepresources fromactve attacks
4. Incegrity can be compromised by Disclosure
The correct answeris Integrity can be compromised by Disclosure‘vesion 73
taka sooutafi 30
‘Assure, youwento the Ethiopian airport to catch 2 light and tld the airport personnel your name. Forsure, they would askyou some questions
like your passport number and your eeservation ticket number for some praof af your identity, Then what do we al this process?
a. Authentication
b. Authorization
6 ecessconttol
4. all
‘The correc answeris: Authentication
uesTon74
Markco outefic0
‘Assume, youwent tothe nearby commercial bank's automatic teller machine (ATM) to withdraw money. You inserted your ATM card nto the
‘machine, and the machine asked you to enter your prsonalidentification number (PIN). Then, when you ype your password, someaneintercepts
your ATM card number and which of your security goalsis compromised?
a Integrity
b. Authorization
© Confidentiality
4. Availabily
‘Thecorrectansweris: Confidentiality
‘question 75
aks so out 30
Which attack can be used fr monitoring children’s activity?
2. Ransomwares
b Adware
© Worms
4. Spyware
‘The correctansweris SpywarevEsTON7E
taka sooutafi 30
isatypeof date link ayer attackin TCP/IP protocol tack
8. ARP spoofing
bDNSspoofing
& SYNC#LOOD attack
4 Allexceptew
‘The correctansweris All exceptc
‘uesHon77
Incest
Which one ofthe following statementsistrueabout wormsand Viruses
2. Viusrequiesahostto spread while Worms doesnitrequire
b. Worms requires auser ation for replicate while viruses doesnt require
Worms spreading speed sslowerthan Virus Spreading speed
1d. Worms requires ahestto spread whileviruses doesnt require
‘The correct answeris Virus requires hostte spread while Worms doesnt require
cussion 7B
Inert
Marko ovoutl00
‘Whats the bit pattern forthe fist octet ofa class-B nesworkaddress?
a MOXKX,
box
1 HOKKHK®
A. SOXXKXXK
The correct answers: 10XXXXXK,ESTION7D
taka sooutafi 30
Which 0S1 model layeris responsible for flow control?
2. Application Layer
b. Session Layer
© Transporttayer¥
4. Presentation Layer
‘The correct answeris:Transpor layer
‘uestonBO
‘Which of the following networking device's used in physical layer?
a Huby
b Router
© Bridge
|. Switch
‘The correctansweris: Hubuestion BY
ako nous 90
Assuring that Company VW has main site and remote site The mainsite has three LANs with LAN has a0 hess, AN 2 has 6 hosts, and LAN 3
has. hosts, The remote site hastwo LANs, each with 09 hosts. Thenetwork uses privateaddreses. The Internet service provider assigned the
‘compary the netwark 200,100.50 2/26
~~
Cm 7
Reteee Company Vwx
Remote Site
Router B
ie
—_L | oases
700 Hosts
TAN 2: 60 Hosts
‘The emote site uses the network prefix 19216610 02g. What subnets and masks can you use for the LANs at the remote siteand conserveaddess
space?
A. 192168.1032/28 and 192 168:10.64/28
B 192168.10.64/26and192.168.10192/26
C192168.10.025and 192 168:30.128125
D._1922168:16.0/30ands92.168:10.:28/20%
Your answeris incorrect
‘The correctansweris
s92368so.of2sand 92168 10.328/25‘uesionB2
ako cuts 90
‘The main sie uses the network prefix192. 16615 0/24 What subnets and masks can you use to provide sufficient addresses for LANS atthe main site
and conserveaddress space?
Internet
Reteee Company VWXx
Remote Site
on Router B
Main Site
Router A
—_L | oases
700 Hosts
4100 Hosts
TAN 2: 60 Hosts
192:168:15.0/5 for LAN, 192 168.15 128/26 for LAN 2, and 192.168.15.192/27 for LAN
B._ 192168.15.0/26 for LAN 3,192.68,5 28/26 for LAN and72.15192.0f29 for ANS.
192:168.15 0/27 for LAN 1,192 16815 128/26 for LAN 2, nd 72.15 192.025 for LAN 3%
D._192:168:5 0/00 fer LAN 1,192:68.15128/60 for LAN 2 and172:15392.029 for LAN3
Your answeris incorrect.
‘The correctansweris
192.168.5.0)2 for LAN1,192.168.15.128/26 for LAN 2, nd 1921683519227 for LANvestion 3
taka sooutafi 30
InDNS concept the process of getting IP address by using itshostname is called:
a. Binding
b. Forward resolution
Backward resolution
4 Resolving
‘The correct answeris Forward resolution
‘question B4
Ince
Let's assume that you know the domain nareof Face Book server but you dart know ts P addres. So which network troubleshooting tol you use
twgetitsIPaddress?
a. Nelookup®
b Traceroute
© Pingcommand
4. Netstat
‘The correct answeris:Netstat
question BS
ukooneutt0
‘Wherewhen Network administrator should have to use the concept of Network Address translation? Network admin should use NAT Where:
Global address used in the LAN
b. Helshe dort know ype of P address used inthe LAN®.
‘cPrivate IPaddres isused inthe LAN,
4. Default gateway of LAN isnitconfigured
‘The correct answeris: Private Paddressisused inthe LAN‘esTonBE
taka sooutatio0
\Where/vhen we can use DHCP Services? is recommended iouse DHCP when:
2, Therearesmall number ofnetworkusers
b. Networkadminwent:ouse sameend device forspecfc purpose
& Numberof devicesin the networkare very complex
4. Allarecorrect,
‘The correc answer is: Number of devices inthe networkare very complex
‘question
‘Which of the following server ype i used to store, process, and respond to the lent request for webpages via httpihtps protocols
3. DNSSener
bitty Server
Webserver
4d. FIPserver
‘The cotrectansweris: Web Server
quesTon BB
Mskicooutefiao
isanetworksecuity device that monitors incoming and outgoing network traffic
a Proxy
be Router
c Frevall¥
Gateway
‘Thecorrectansweris Firewall‘uestionBS
ako cuts 90
‘Which network nd mask would you use forthe WAN linkto save the most address space?
Company Vwx
Remote Site
OuiKi Router 8
Main Site
Router A
—_|
LAN - 100 Hosts
LAN 2- 60 Hosts
100 Hosts
TANS 28 Hosts
700 Hosts
A s92368m.240129
B. rs2168.n.240/30
C 92n60.n.2g0(e7%
DL w9216am.2a0)e
Your answeris incorrect
‘The correctansweris
sen368.240/28
quesTon gO,
Muskicooutefr20
‘Aprocess canbe terminated dueto
fataleror
allofthe mentioned”
d._killed by another process
The correct answeris:allofthe mentioned.uesToN SH
ako pout 90
‘To accessthe services of operating ster, the interfaces provided by the:
assembly instructions
b. system calls
Ae
4. brary
‘The correct answeris system calls
‘uesnong2
‘Which module gives control ofthe CPU to the proces elected by the shore-term scheduler?
none of the mentioned
b. Scheduler
& Intertupt
dispatcher”
‘The correctansweris: Dispatcher
queson g3
Incest
Marko ovoutl00
‘Which ofthe following coneitionsrequited for deadlockto be possible?
process may hold allocated resources while awaiting assignment of other resources
allofthe mentioned
no resource can be forcibly removed for a process holding it
‘Thecorrectansweris:allofthe mentionedEsTONSS
taka soon 30
\Which scheduling algorithm allocates the CPU frst the process that requests the CPU fist?
a. none ofthe mentioned
priority scheduling
© shortestjob scheduling
4. first-come, first-served scheduling
‘The correct answeris: first-come, rst served scheduling
uesnon gs
Iecnest
Which one ofthe followingisnot rue?
8, kemelis made of various modules which cannot be loaded in unning operating system
b. kernel isthe frst part of operating sytem to load into memory during booting
_kemelisthe program shat constitutes the central core afthe operating system™®
‘dL kernel rains inthe memory during the entire computer session
‘The correct answeris:kernelis made of various modules which cannot be loaded in running operating system
cuesron 6
Mskicooutefi20
‘Aprocessor performing fetch or decading of cifferentinstruction during the execution of nother instruction scaled
2 Superscaing
Parallel Computation
& Noneofthe above
Pipetining
The correct answeris: Pipelining‘sion 97
ako on0utts 90
‘Aninstuction that wil jump to thenextinstuction ifthe conditions met
a. Branch instruction
b Jumpinstuction
Returninstruction®
4. Skipinstuction
‘The correct answeris Skip instruction
uesnons8
‘Aninceruptthat is caused by register overflow attempt to divide by zero, an invalid operation code, stackeverflaw can be?
Internal interrupt
b. Software interupt
None oftheaboue
d._ External interrupt
‘The correct answeris: Internal interupt
cussion gg
Inert
Marko ovoutl00
Computer address busis
Muliiretional
b Bidiectional®
© Unidirectional
Noneof the above
The correct answeris: Unidirectional‘uesion 100
ako cuts 90
‘Thesimplest way to organize a computeristo have one processor egister and an instruction code format with two parts. The first par specifies the
‘operation tobe performed and the second specifies
a. operand
b Input
address
4. output
‘The correc answeris address
‘question 101
Which ofthe following computer memory fastest?
a Harddisk
b. None ofthe above
© Resister
4. RAM
‘The correct answeris Register