KEMBAR78
Computer Science Exit Exam Model Questions | PDF | Computer Network | String (Computer Science)
0% found this document useful (0 votes)
365 views14 pages

Computer Science Exit Exam Model Questions

The document contains a series of model questions for a Computer Science Exit Exam, covering various topics such as compiling processes, networking, database management, programming languages, algorithms, and data structures. Each question presents multiple-choice answers, testing knowledge on theoretical concepts and practical applications in computer science. The questions are designed to assess the understanding of key principles and practices in the field.

Uploaded by

kiracherub866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
365 views14 pages

Computer Science Exit Exam Model Questions

The document contains a series of model questions for a Computer Science Exit Exam, covering various topics such as compiling processes, networking, database management, programming languages, algorithms, and data structures. Each question presents multiple-choice answers, testing knowledge on theoretical concepts and practical applications in computer science. The questions are designed to assess the understanding of key principles and practices in the field.

Uploaded by

kiracherub866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Science Exit Exam Model Questions

1. Which phase of the compiling process is considered as a final phase in the process?
a. Code generation
b. Semantic analysis
c. Code optimization
d. Intermediate code generation
2. A process is terminated by the operating system due to a reference to non-existing memory.
Which one of the following best explains the process termination?
a. Terminated by another process.
b. Fatal exit
c. Error exit ??
d. Normal exit
3. Which quantifier can be used for some portion of the universe?
a. ^
b. ∀
c. →
d. ∃
4. What will be the output of the following JavaScript statement? Math.sqrt(36)
a. 1
b. 36
c. 6
d. 30
5. Which one of the following is different from the other based on its role in computer
networking?
a. Wireless access point
b. Networking printer
c. Hubs
d. Routers
6. _____ is a network architecture characteristic that states a network can expand quickly to
address needs of new users and application without having impact on the services delivered
to existing users.
a. Quality of service
b. Fault tolerance
c. Security
d. Scalability
7. A database management system (DBMS) has __________ to control locks.
a. Query Optimizer
b. Lock Manager
c. Lock table
d. Query processor
8. Which statement is false about universal hashing technique?
a. Single fixed hash function technique is better than universal hashing technique in
terms of collision reduction. ???
b. Universal hashing reduces the chance of data collision.
c. In universal hashing a hash function is selected randomly from set of hash functions for
each key.
d. In universal hashing a hash function is selected from set of hash functions independent
of keys.
9. If you plan a software test to be done by clients to demonstrate that the system satisfies their
requirements, which phase of software testing is appropriate?
a. Acceptance testing
b. Unit testing
c. Integration testing
d. System testing
10. Which one of the following is not an example of scripting languages?
a. C++
b. Perl
c. PHP
d. Python
11. An interface that has multiple lines connecting input/output module and peripheral device and
assures multiple bits to be transferred at the same time is:
a. Bus interface
b. Parallel interface
c. One line interface
d. Serial interface
12. Which network type is the largest as compared to the rest?
a. Wide Area Network
b. The Internet
c. Metropolitan Area Network
d. Local Area Network
13. Which one of the following is a security service enforced to protect discloser of information,
which can be restored in file or being on transmission, from unauthorized entities?
a. Availability
b. Authentication
c. Integrity
d. Confidentiality
14. Which statement is false about programming language generation?
a. Assembly language is machine independent.
b. Machine language can be executed without translation.
c. Fifth generation programming languages need very powerful hardware and software.
d. Assembly language should be translated to machine language before execution.
15. Which concept refers to extending specialized classes from generalized classes in object-oriented
programming?
a. Overriding
b. Data field Encapsulation
c. Inheritance
d. Overloading
16. Which on of the following is false about project planning stage?
a. Project planning is one-time task in software development life cycle.
b. Cost estimation is done during project planning.
c. Risk analysis is done during project planning.
d. Preparing time schedule is done during project planning.
17. Which one of the following is true about functions in JavaScript?
a. Function names can contain spaces.
b. There is no limit to the number of function parameters that a function may contain.
c. Function names can begin with digits.
d. Function names are not case-sensitive.
18. Which type of variable can be accessed throughout our C++ program scope?
a. Static
b. Automatic
c. Local
d. Global
19. Which branch of study deals with whether a problem can be solved or not, regardless of the
resource required?
a. Set theory.
b. Complexity theory.
c. Computability theory.
d. Automata theory.
20. Which one of the following is a step in problem solving that lists the actions and states that the
agent has to consider provided a goal?
a. Execute
b. Search
c. Problem formulation
d. Goal formulation
21. Which one of data updates best describes the following statement? “All modified data items in
the cache is written either after transaction ends its execution or after a pre-determined number
of transactions have concluded their execution”
a. Immediate update
b. In-place update
c. Shadow update
d. Deferred update
22. ____ is the whole thing that an agent has observed so far concerning the existing scenario in the
environment.
a. Perception
b. Action
c. Performance measure
d. Knowledge
23. Size of large data files can be reduced to save storage disk space. Which algorithm is appropriate
to reduce size of large files?
a. Prim’s algorithm
b. Merge sort algorithms
c. Huffman encoding algorithm
d. Heap sort algorithm
24. Which one of the following is correct for the statement below? “When two transactions that
access the same database items have their operations interleaved in a way that makes the value
of some database item incorrect”.
a. It is an incorrect summary problem.
b. It is a lost update problem.
c. It is a dirty read problem.
d. It is a temporary read problem.
25. Which one of the following computers can be more secured compared to the rest?
a. A computer connected to the internet and the latest anti-virus installed on it.
b. A computer connected to the internet having strong intrusion detection.
c. A computer that is not connected to the internet.
d. A computer connected to the internet with the latest firewall system.
26. Which one of the following is true about java and JavaScript?
a. Both are object-oriented languages. ???
b. There are more features in JavaScript than java.
c. JavaScript can be used in extremely sophisticated applications.
d. JavaScript is compiled and interpreted in source code form.
27. Which one of the following is a two-level cache having an internal and external caches?
a. Single level cache.
b. Multilevel cache.
c. Split cache.
d. Unified cache.
28. Which one of the following is not correct about POP3 and SMTP?
a. Both are application layer protocols.
b. Both are network layer protocols.
c. A sender can receive emails using POP3.
d. A sender can send email using SMTP.
29. Look at the following PHP line: $list= array (20,12,23,19,18); what is the index of data value 19?
a. 2
b. 0
c. 1
d. 3
30. Which one of the following is responsible for separating some machines from the rest to shield
them from attacks?
a. Router
b. Firewall
c. Network operating system
d. Switch
31. At which layer of the OSI model devices such as bridges, switches and network interface cards
are used?
a. Physical layer
b. Network layer
c. Application layer
d. Data link layer
32. Suppose you are administering a network and would like to know whether a computer upstairs is
connected to the network or not. Therefore, which command would you use?
a. DHCP discover.
b. ping
c. nslookup
d. tranceroute
33. Which one of the following algorithms can be used to extract minimum spanning tree from input
graph?
a. Merge sort algorithm
b. Dijkstra’s algorithm
c. Prim’s algorithm
d. Huffman encoding algorithm.
34. In a tree data structure, if a node has no parent node, then the node is _________
a. Parent node
b. External node
c. Internal node
d. Root node
35. Which one of the following phases is done before semantic analysis phase of compiling process?
a. Code optimization
b. Code generation
c. Syntax analysis
d. Intermediate code generation
36. A university owns a number of private local area and wide area networks, which are designed for
an access by its academic staff, students and administrative workers, which term best describes
the university’s network?
a. Wide area network
b. Metropolitan area network
c. The internet
d. Local area network
37. Which one of the following lists of environments is the hardest for an agent?
a. Fully observable, sequential, deterministic
b. Deterministic, fully observable, static
c. Partially observable, static, continuous
d. Sequential, non-deterministic, dynamic
38. Given input alphabet ∑ = {a,b,c,d} and an empty string λ. Then, which one the following is true
about ∑* ?
a. ∑* = ∑1U∑2U∑3U∑4
b. ∑* = ∑+
c. ∑* = ∑+ U{ λ) ??
d. ∑* = {λ}
39. Which one of the following is false about string in Java?
a. In Java a string is treated as object.
b. We can create a String object using array of characters.
c. We can create a String object using String literal.
d. Content of a string can be changed once the string is created.
40. Which one of the following is evaluating the degree of success of an agent?
a. Performance measure
b. Knowledge
c. Perception
d. Action
41. For an input graph, depth first traversal algorithm uses ________ data structures to traverse.
a. Queue
b. Tree
c. Priority queue
d. Stack
42. Consider the following fragment of C++ code.

const int x = 8;
const int y= 16;
if(x > y)
{
int z = x+y;
}
For codes like the above one, which technique of code optimization is appropriate?
a. Dead code elimination
b. Arithmetic simplification
c. Code motion
d. Compile time evaluation
43. Which one of the following is not delimiter of PHP code?
a. <script Language=”PHP”> ……………………………. </script>
b. <? ………………. ?>
c. <?php ……………….. ?>
d. <caption> ………………………….</caption>
44. Which one of the following best explains attackers who are motivated by financial gain and
perform sabotage, an IP theft and secrets of a rival company?
a. Stealer
b. Competitor
c. Activist
d. Hactivist
45. _____ is set of attributes that can be seen by a program and can have direct impact on the
logical execution of a program.
a. Organization
b. Flow control
c. Architecture
d. Arrangement
46. Which network security issue shows the level of weakness in networks and devices?
a. Availability
b. Vulnerability
c. Treat
d. Attack
47. If you want to allow subclasses to access data fields or methods defined in the super-class, but
not to allow non-subclasses to access these data fields and methods, which access modifiers is
appropriate?
a. Default
b. Public
c. Protected
d. Private
48. Which one of the following is false about arrays in C++?
a. An array is a collection of similar data objects
b. We can access elements of arrays without using index number
c. We use [] square bracket at the time of array declaration.
d. Size of an array should be constant at the time of array declaration.
49. What is the time complexity order of binary searching algorithm?
a. O(n)
b. O(n3)
c. O(1)
d. O(log2n)
50. What is the output of the following C++ fragment code?
int a, b;
a=13;
b=9;
while((20 && 0) &&(a>b))
{
cout<<” Plants are our life ”;
}
a. It displays message “Plants are our life” 20 times.
b. No message will be displayed.
c. It displays message “Plants are our life” infinitely.
d. It displays message “Plants are our life’ 4 times.
51. What is the out put of the following C++ fragment code?
int a=6, b= 8;
int x = 2, y = 4;
int c = (x > y ? (a--, x): (b--, y));
cout<<”a=”<<a;
cout<<” b=”<<b;
cout<<” c= “<<c;
a. a= 5 b= 7 c=2
b. a= 6 b= 8 c=4
c. a= 6 b= 7 c=4
d. a= 5 b= 8 c=4
52. Advancement of operating system is closely tied to computer architectures, therefore has passed
through different generations. Which one of the following generation and advancement is
wrongly coupled?
a. Fourth generation -> real time systems
b. First generation -> single user
c. Second generation -> multiprogramming
d. Third generation -> batch system
53. What is the output of the following Java fragment code?
int n= 6, m=15, p=3;
n -=m;
n *= p;
System.out.println(n);
a. 24
b. -27
c. 27
d. 8
54. A computer expert would like to know the number of processes that are completed per hour to
assess the performance of a machine. Therefore, which one of the following best describes the
expert’s assessment?
a. System throughput
b. Response time
c. Waiting time
d. Turnaround time
55. Given input alphabet ∑ = {a, b, c , d} and an empty string λ. Then, which one the following is
equivalent to ∑0 ?
a. ∑*
b. ∑
c. { λ)
d. ∑+
56. Which one of the following is not correct about threads?
a. Threads have registers to hold its working memory
b. It is a group of processes. ??
c. Threads have program counters.
d. Threads are the entities scheduled for execution on the CPU.
57. What is the time complexity of quick sort algorithm?
a. O(n2)
b. O(2n)
c. O(n log2n)
d. O(n)
58. Which one of the following is not correct for the figure shown in question 27?
a. P1 is waiting for a resource held by p1
b. P2 cannot be executed until P1 finishes
c. P3 cannot be executed until p4 finishes
d. P1 is waiting for a resource held by p2
59. Given the schemas: BOOK(Book_id, Title, Publsher_name) BOOK_AUTHOR (Book_id,
Author_name), PUBLISHER (Name, Address, Phone). Which one of the following SQL is correct to
delete the publisher named as ‘xwz’ from the PUBLISHER table?
a. DELETE FROM PUBLISHER WHERE Name = ‘xwz’ ??
b. DELETE FROM BOOK_AUTHOR WHERE Address = ‘xwz’
c. DELETE FROM PUBLISHER wHERE Address = ‘xwz’
d. DELETE FROM BOOK WHERE Name = ‘xwz’
60. Which one of the following is valid statement regarding PHP variables?
a. $test = ‘Computer;
b. $test = “this is ‘Computer Science’”
c. Test = 5;
d. $test = 9.5
61. Assume there is a line of patients waiting for a service from a clinic. Seriously sick patients
should get services first. Which data structures is the most appropriate for the given type of real-
world problem?
a. Queue
b. Priority Queue
c. Tree
d. Stack
62. What is the output of the following fragment of C++ code?
for (int n= 1; n<=18;n=n+2)
{
if(n%7 != 0){
cout<<n<<” “;
else
break;
}
a. 1 3 5 7 9 11 13 15 17
b. 3 5 7
c. 1 3 5
d. 1 2 3 4 5 6
63. Which phase of software development process refers to modifications of software to reflect
changing customer and market requirements?
a. Validation
b. Evolution
c. Specification
d. Development
64. Which layer uses port number to identify applications?
a. Network layer
b. Physical layer
c. Transport layer
d. Application layer
65. Which one of the following is not a single level ordered index?
a. Secondary index
b. Primary index
c. Multilevel index
d. Clustering index
66. After deep analysis if your software requires major change to the architecture of the system,
which strategy of software change should be applied?
a. Preventative maintenance
b. Software reengineering
c. Architectural transformation
d. Software maintenance
67. Assume you have a universe of key U. which one is false statement regarding Direct Address
table and hash Table data structures?
a. If universe U is very large, Hash table is better that Direct Address Table
b. Hash table allocate one separate memory slot for each key in the universe U
c. There is one to one correspondence between the universe U and memory slots in the
Direct Address table
d. Direct Address table doesn’t use hash function to map keys
68. Which type of Turing machine has tapes, one tape read-only and the other read-write tape?
a. Off-line Turing machine
b. Multi-dimensional Turing machine??
c. Non-deterministic Turing machine
d. Multi-head Turing machine
69. What will be the output of the following JavaScript statement? Math.floor(5.9)
a. 9
b. 5
c. 6
d. 11.8
70. Suppose you have received a message from your friend, but the message is scrambled for the
sake of security. Your friend has used a program to encode messages into scrambled text. In
order to read the message which program would you use?
a. Ciphertext
b. Encryption program
c. Secret key
d. Decryption program
71. What is the output of the following Java fragment code?
Int[] list = new int[4];
Int sum = 0;
For(int i=0; i<list.length; i++)
{
List[i] =I * 3;
Sum+= list[i];
}
System.out.print(sum);
a. 3
b. 18
c. 36
d. 6
72. Which one of the following is not correct about packet and circuit switching?
a. In Packet switching and end-to-end connection has to be established.
b. Packet switching is more efficient than circuit switching.
c. In circuit switching a channel is dedicatedly used.
d. In packet switching messages are sent in small blocks.
73. Which one of the following is correct for the statement below? “A problem that occurs when
one transaction updates a database item and then the transaction fails for some reason and the
updated item is accessed by another transaction before it is changed back to its original value”.
a. It is a temporary read problem.
b. It is an incorrect summary problem.
c. It is dirty read.
d. It is a lost update problem.
74. Which one of the following is not correct about transaction failure?
a. Transactions fail if disk blocks lose their data.
b. Transaction fail If logical errors are detected.
c. Catastrophes can be cause of transaction failure.
d. Concurrency control enforcement avoids transaction failure.
75. Assume you have a weighted graph G with a set of vertices V and set of edges E. which one of
the following problem is an optimization problem on the graph?
a. A vertex p∈V reachable from vertex q∈V graph G.
b. Traverse all vertices in graph G.
c. Find minimum spanning tree from graph G.
d. How many cycles are there in graph G.
76. Which one of the following is not true about fan trap in Entity Relationship Diagram?
a. It occurs when there is no pathway between related entities.??
b. Highly likely exit when more than two one-to-many relationships fan out from an entity.
c. It can be resolved by readjusting the model so that no one -to-many relationship fanning
out from an entity.
d. When there is ambiguous pathway between some entity occurrences in related entity
types.
77. Which one of the following is correct about human role in system administration?
a. Ethics is not a requirement to manage computers.
b. It doesn’t need organizational skills.
c. It requires patience, understanding and knowledge.
d. System administration is not expected to have skill and confidence.
78. Which one is a method used to obtain the meaning of encrypted information without access to
secret key?
a. Encryption
b. Decryption
c. Cryptography
d. Crypto-analysis
79. Among the following which one best describes a database management system (DBMS)?
a. It can assist process images.
b. It is responsible for creating and maintaining a database.??
c. It can help users to manage computers activity.
d. It can assist you to process documents.
80. Linked list data structure is _________ type of data structure.
a. Non-linear data structure.
b. Fixed size data structure,
c. Static data structure.
d. Dynamic data structure.
81. Which deadlock prevention mechanism don’t require timestamp?
a. Wound-wait
b. Wait-wait
c. No-wait??
d. Wait-die
82. What is the purpose of an opcode that is indicated in the figure below?

a. It determines the operation to be done.


b. It holds the source address of an operand.
c. It holds the destination address of an operand.
d. It holds the next instruction reference.
83. Which one of the following is not correct about computer architecture and organization?
a. An organization can last for a long time as an architecture does.
b. An architecture can be used for long time encompassing different computer models.
c. Manufacturers offer computers with the same architecture but different organization.
d. An architecture can remain for a long time, but its organization can change.
84. Which one of the following is used for purposes of syntax analysis?
a. Parser
b. Loader
c. Linker
d. Scanner
85. Which one of the following does not show non-functional requirement of software systems?
a. Displaying information
b. Reliability
c. Response time
d. Memory requirement
86. Among phases of compiling process, in which phase a sequence of characters are converted in to
a sequence of tokens?
a. Lexical analysis
b. Semantic analysis
c. Syntax analysis
d. Code optimization
87. Let grammar G = ({S}, {a,b},S,P), where {S} is set of variables, {a,b} is set of terminal symbols, S is
start variable and P is set of productions. Then which one of the following is not an element of
the language (L) which is generated from G. Given:
P: S aSb,
S λ
a. λ
b. ab
c. aabb
d. a
88. Which one of the following is true about frames in HTML?
a. Load on the server is not affected, if there are a large number of frames in a page.
b. All browsers support frames
c. Frames are not difficult to handle for search engines.
d. Frames allows parts of the page to remain stationary while another parts scroll.
89. In which situation that using database management system (DBMS) becomes costly and not
recommended to use it?
a. In embedded systems having too small storage space.
b. In situations where more that one users should access the database.
c. To control redundancy
d. To deny access to unauthorized users
90. Which one of the following is asynchronous in message communications
a. Non-block receive
b. Direct message
c. Blocking receive
d. Blocking end
91. Suppose you have developed a self-driving car equipped with relevant sensors and camera that
helps it to see the road and drive sensing traffic lights, pedestrian and signs. Its sensors are able
to detect the environment but not all the aspects. Hence, in which environment is your car
acting?
a. Stochastic
b. Fully observable
c. Partially observable
d. Discrete
92. Assume you make modifications to your software. Then you want to make sure that the
modification has not had introduced new errors. Which software testing level is required?
a. Dynamic testing
b. Regression testing
c. Beta testing
d. Static testing
93. Which one of the following is the smallest heading tag?
a. <H3>
b. <H1>
c. <H4>
d. <H6>
94. Which does of the program data independence in the database approach entails for?
a. The application may be affected when data changes
b. Programs can create redundant data independently
c. Data and applications are defined separately
d. Both program and data are defined together
95. Which statement is true about pop() operation of stack data structures?
a. Pop() inserts new element at the beginning/bottom of stack
b. Pop() inserts new element at the middle of stack
c. Pop() inserts the end/top element but it doesn’t delete that element
d. Pop() removes the end/top element from stack
96. Which asymptotic notation describes worst case analysis?
a. f(n) = θ(theta)
b. f(n) = little-ω (little omega)
c. f(n) = little-oh
d. f(n) = Ω(big omega) ???
97. Which one of the following is correct way creating String object?
a. String m = ‘Computer Science’;
b. String m = new String(“Exit Exam’);
c. String m = ‘H’ , ‘e’, ‘l’, ’l’, ‘o’;
d. String m = new String(‘Technology’);
98. Which one of the following is measure taken, to ensure information and information systems
availability, integrity, authentication and confidentiality?
a. Information security
b. Wiretapping
c. Information assurance
d. Interception
99. Which one of the following registers hold the address of the next pair of instructions to be
fetched from memory?
a. Program counter
b. Memory buffer register
c. Instruction buffer register
d. Memory address register
100. Which asymptotic notation describes average case analysis?
a. f(n) = θ(theta)
b. f(n) = Big-Oh
c. f(n) = little-ω (little omega)
d. f(n) = Ω(big omega)

You might also like