KEMBAR78
Cs Exit Exam 1and 2 With Modified Answers | PDF | World Wide Web | Internet & Web
0% found this document useful (0 votes)
55 views62 pages

Cs Exit Exam 1and 2 With Modified Answers

The document consists of a series of multiple-choice questions related to computer science concepts, including programming, data structures, networking, and software development. Each question presents four options, requiring the reader to select the correct answer. The content is designed for a university exit exam, assessing knowledge in various technical areas.

Uploaded by

Sime Test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views62 pages

Cs Exit Exam 1and 2 With Modified Answers

The document consists of a series of multiple-choice questions related to computer science concepts, including programming, data structures, networking, and software development. Each question presents four options, requiring the reader to select the correct answer. The content is designed for a university exit exam, assessing knowledge in various technical areas.

Uploaded by

Sime Test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

UNIVERSITY EXIT EXAM

1. Which one of the following is asynchronous in message communication?

A. Blocking receive
B. Blocking send
C. Direct message
D. Non-block receive
2.What is the purpose of an opcode that is as indicated in the figure below?

bits4 bitsbitsOpcodeOpert kerercno

A. It determines the operation to be done

B. It holds the next instruction reference

C. It holds the destination address of an operand

D. It holds the source address of an operand

3. Which layer uses port number to identify applications?

A. Transport layer
B. Application layer
C. Network layer
D. Physical layer
4)Which asymptotic notation describes average case analysis?

A. f(n)- Big-0h
B. f(n)=0 (thetha)
C. f(n) = & (Big omega)
D. f(n) = little w (little omega)
5. At which layer of the OSI model devices such as bridges, switches and Network
Interface cards are used?
A. Physical layer

B. Network layer

C. Data link layer

D. Application layer

6. A computer expert would like to know the number of processes that are
completed per hour to assess the performance of a machine. Therefore, which one
of the following best describes the expert's assessment?
A. Turnaround time

B. System throughput

C. Waiting time
D. Response time
7. What will be the output of the following JavaScript statement? Math.sqrt(36)
A. 6
B. 3

C. 36

D. 1
8. Which one of the following is correct about human role in system
administration?
A. Ethics is not a requirement to manage computers

B. It doesn't need organizational skills


C. It requires patience, understanding and knowledge

D. System administrator is not expected to have skills and confidence


9. Which one of the following is valid statement regarding PHP variables?

A. $test = "This is 'Computer science'";

B. test= 5;
C. $test= 9.5
D. $test = "Computer;
10. Which one of the following is not correct about POP3 and SMPT?

A. Both are application layer protocols


B. A sender can send email using SMTP

C. A sender can receive emails using POP3

D. Both are network layer protocols

11. Which one of the following is correct for the statement below? "A problem that
occurs when one transaction updates a database item and then the transaction fails
for some reason and the updated item is accessed by another transaction before it is
changed back to its original value"
A. It is a lost update problem
B. It is an incorrect summary problem
C. It is dirty read
D. It is a temporary read problem
12. Which quantifier can be used for some portion of the universe?
A.->
B. E
C. ^
D. £
13. What will be the output of the following JavaScript statement? Math.floor(5.9)
A. 9
B. 5
C.11.8

D. 6
14. Which one of the following best explains attackers who are motivated by
financial gain and perform sabotage, an IP theft and secrets of a rival company?
A. Stealer
B. Competitor

C. Activist
D. Hacktivist
15. _____is the whole thing that an agent has observed so far concerning the
existing scenario in the environment.
A. Performance measure

B. Knowledge

C. Action
D. Perception
16. Which one of the following phases is done before semantic analysis phase of
compiling process?
A. Syntax analysis
B. Code optimization
C. Code generation
D. Intermediate code generation

17. Which statement is false about universal hashing technique?


A. Single fixed hash function technique is better than universal hashing technique
in terms of collision reduction
B. Universal hashing reduces the chance of data collision
C. In universal hashing a hash function is selected from set of hash functions
independent of keys.
D. In universal hashing a hash function is selected randomly from set of hash
functions for each key.
18. Which one of the following is true about functions in JavaScript?

A. Function names can contain spaces


B. Function names can begin with digits
C. Function names are not case-sensitive
D. There is no limit to the number of function parameters that a function may
contain
19. Which phase of software development process refers to modification of
software to reflect changing customer and market requirements?
A. Validation
B. Development
C. Specification
D. Evolution
20. Which statement is true about pop0 operation of Stack data structures?

A. pop () inserts new element at the beginning/bottom of stack

B. pop () removes the end/top element from stack

C. pop () returns the end/top element but it doesn't delete that element

D. pop () inserts new element at the middle of stack

21. Which statement is false about programming language generations?

A. Assembly language is machine independent

B. Assembly language should be translated to machine language before execution

C. Machine language can be executed without translation


D. Fifth generation programming languages need very powerful hardware and
software
22. Which one of the following is responsible for separating some machines from
the rest to shield them from possible attacks?
A. Switch

B. Firewall

C. Router

D. Network operating system


23. Which one of the following is a two-level cache having an internal and
external caches?
A. Multilevel cache

B. Single level cache

C. Unified cache

D. Split cache
24. Assume there is a line of patients waiting for a service from a clinic. Seriously
sick patients should get service first. Which data structure is the most appropriate
for the given type of real-world problem?
A. Stack
B. Priority Queue

C. Queue
D. Tree
25. Which one of the following is not correct about computer architecture and
organization?
A. An organization can last for long time as an architecture does
B. An architecture can be used for long time encompassing different computer
models
C. An architecture can remain for long time but its organization can change

D. Manufacturers offer computer with same architecture but different organization


26. Assume you have a weighted graph G with a set of vertices V and set of edges
E. Which one of the following problems is an optimization problem on the graph?
A. Is vertex p E V reachable from vertex Q E V in graph G

B. Find minimum spanning tree from graph G

C. Traverse all vertices in graph G


D. How many cycles are there in graph G
27. Which one of the following is not correct about transaction failure?

A. Catastrophes can be cause of transaction failure

B. Transactions fail if disk blocks lose their data

C. Concurrency control enforcement avoids transaction failure

D. Transactions fail if logical errors are detected

28. Which one of the following is not correct about packet and circuit switching?

A. Packet switching is more efficient than circuit switching

B. In circuit switching a channel is dedicatedly used

C. In Packet switching and end-to-end connection has to be established

D. In packets switching messages are sent in small blocks

29. Which one of the following is not an example of scripting languages?

A. PHP
B. Perl
C. C++
D. Python
30. In a tree data structure, if a node has no parent node, then the node is________
A. Root node
B. Parent node
C. Internal node

D. External node
31. ______ is a network architecture characteristic that states a network can
expand quickly to address needs of new users and application without having
impact on the services delivered to existing users.
A. Fault tolerance
B. Quality of service
C. Scalability
D. Security
32. Which deadlock prevention mechanisms don't require timestamp?

A. Wound-wait
B. Wait-die
C. No-wait
D. Wait-wait
33. Which one of the following lists of environments is the hardest for an agent?

A. Sequential, non-deterministic, dynamic

B. Partially observable, static, continuous

C. Fully observable, sequential, deterministic

D. Deterministic, fully observable, static

34. What does the program data independence in the database approach entails for?

A. The application may be affected when data changes


B. Data and applications are defined separately
C. Both program and data are defined together
D. Programs can create redundant data independently
35. What is the output of the following Java fragment code?
int n=6, m=15, p=3;
n-=m
n*=p;
System.out.print(n);
A.-27
B. 27
C. 3
D. 24
36. What is the time complexity order of Quick sort algorithm?
A. O(n²)
B. O(2ñ)
C. O(n)
D. O(nlog2n)
37. Which one of the following is the smallest heading tag?
A.<H3>

B. <H1>

C. <H4>

D. <H6>
38. If you plan a software test to be done by clients to demonstrate that the system
satisfies their requirements, which phase of software testing is appropriate?
A. Unit testing
B. Integration testing

C. System testing

D. Acceptance testing
39. Which one of the following is a measure taken, to ensure information and
information systems' availability, integrity, authentication and confidentiality?
A. Interception
B. Information assurance

C. Information security
D. Wiretapping
40.Which network type is the largest as compared to the rest?

A. Metropolitan Area Network

B. The internet
C. Wide Area Network
D. Local Area Network
41. For an input graph, Depth First Traversal algorithm uses data structure to
traverse?
A. Tree
B. Priority queue

C. Queue
D. Stack
42.Which branch of study deals with whether a problem can be solved at all or
not,regardless of the resources required?
A. Automata theory

B. Set theory
C. Computability theory

D. Complexity theory
43.Which one of the following algorithms can be used to extract Minimum
Spanning Tree from an input graph?
A. Huffman encoding algorithm

B. Prim's algorithm
C. Merge sort algorithm

D. Dijkstra's algorithm
44." A university owns a number of private local area and wide area
networks,which are designed for an access by its academic staff, students and
administrative workers. Which term best describes the University's network?
A. Metropolitan Area Network

B. Local Area Network


C. Wide Area Network
D. The Internet
45.Which one of the following is not a single level ordered index?

A. Multilevel index
B. Primary index
C. Clustering index
D. Secondary index
46."Given the schemas:BOOK (Book_id, Title, Publisher name)
BOOK_AUTHOR (Book_id, Author _name) PUBLISHER (Name, Address,
Phone) Which one of the following SOL is correct to delete the publisher named as
'xWZ from the PUBLISHER table?
A. DELETE FROM PUBLISHER WHERE Address - XWZ

B. DELETE FROM BOOK WHERE Name = XWZ


C. DELETE FROM BOOK_AUTHOR WHERE Address = xWZ

D. DELETE FROM PUBLISHER WHERE Name =XWZ


47.Which one is a method used to obtain the meaning of encrypted information
without access to secret key?
A. Decryption
B. Crypto-analysis

C. Encryption
D. Cryptography
48.Which one of the following is used for the purpose of syntax analysis?
A. Loader

B. Scanner

C. Linker

D. Parser
49. Suppose you have received a message from your friend but the message is
scrambled for the sake of security. Your friend has used a program to encode
messages into scrambled text, In, order to read the message which program would
you use?
A. Secret key
B. Encryption program

C. Ciphertext
D. Decryption program
50.Which one of the following computers can be most secured compared to the
rest?
A. A computer connected to the Internet and the latest anti-virus installed on it

B. A computer connected to the Internet having strong intrusion detection

C. A computer connected to the Internet with the latest firewall system

D. A computer that is not connected to the Internet


51.Which one of the following is not true about fan trap in Entity Relationship
Diagram?
A. It can be resolved by readjusting the model so that no one-to-many
relationships fanning out from an entity
B. When there is ambiguous pathway between some entity occurrences in related
entity types
C. It occurs when there is no pathway between related entities
D. Highly likely exit when more than two one-to-many relationships fan out from
an entity
52.Which one of the following is false about arrays in C++ ?

A. An array is a collection of similar data objects


B. Size of an array should be constant at the time of array declaration

C. We use [] square bracket at the time of array declaration

D. We can access elements of arrays without using index number


53. In which situation that using database management system (DBMS) becomes
costly and not recommended to use it?
A. To control redundancy
B. In embedded systems having too small storage space

C. In situation where more than one users should access the database

D. To deny access to unauthorized users


54."Which one of data updates best describes the following statement? " All
modified data items in the cache is written either after transaction ends its
execution or after a pre-determined number of transactions have concluded their
execution
A. In-place update
B. Immediate update
C. Shadow update
D. Deferred update
55.Which one of the following is true about java and JavaScript?

A. JavaScript can be used in extremely sophisticated applications

B. JavaScript is compiled and interpreted in source code form

C. Both are object-oriented languages

D. There are more features in JavaScript than Java


56.Which one of the following is a step-in problem solving that lists the actions
and states that the agent has to consider provided a goal?
A. Search
B. Problem formulation

C. Execute
D. Goal formulation
57. In set of attributes that can be seen by a program and can have direct impact on
the logical execution of a program.
A. Arrangement

B. Architecture

C. Organization

D. Flow control
58.Which type of Turing machine has two tapes, one tape read-only and the other
read-write tape?
N.B An “Offline Turing Machine” has two tapes. One tape is read-only and contains the input, the other
is read-write and is initially blank. “Offline Turing machines are equivalent to Standard Turing machines”

A. Multi-dimensional Turing machine

B. Off-line Turing machine


C. Non-deterministic Turing machine

D. Multi-head Turing machine


59. Assume you make modification to your software. Then you want to make sure
that the modification has not had introduced new errors. Which software testing
level is required?
A. Regression testing

B. Dynamic testing

C. Beta testing
D. Static testing
60."Which one of the following does not show non-functional requirement of
software systems?
A. Displaying information

B. Memory requirement
C. Reliability
D. Response time
61. If you want to allow subclasses to access data fields or methods defined in the
super-class, but not to allow non-subclasses to access these data fields and
methods, which access modifier is appropriate?
A. Private

B. Default

C. Public
D. Protected
62.Which one of the following registers hold the address of the next pair of
instructions to be fetched from memory?
A. Memory buffer register
B. Instruction buffer register

C. Memory address register

D. Program counter
63.Linked list data structure is _______type of data structure.

A. Dynamic data structure


B. Non-linear data structure

C. Static data structure


D. Fixed size data structure
64. An interface that has multiple lines connecting input/output module and
peripheral device and assures multiple bits to be transferred at the same time is:
A. Serial interface

B. Parallel interface
C. Bus interface

D. One line
65. Look at the following PHP line: $list – array (20, 12, 23, 19, 18): What is the
index of data value 19?
A.3

B.2

C.1

D.0
66.Which phase of compiling process is considered as the final phase in the
process?
A. Code optimization
B. Code generation
C. Semantic analysis
D. Intermediate code generation
67.Which one of the following is not correct about threads?

A. Treads have program counters


B. It is a group of processes
C. Treads have registers to hold its working memory

D. Treads are the entities schedule for execution on the CPU

68.Which one of the following is false about project planning stage?

A. Project planning is a one-time task in software development life cycle

B. Cost estimation is done during project planning

C. Preparing time schedule is done during project planning


D. Risk analysis is done during project planning
69.Which type of variable can be accessed through out our C++ program scope?
A. Static
B. Local
C. Global

D. Automatic
70.Which concept refers to extending specialized classes from generalized classes
in object-oriented programming?
A. Inheritance
B. Overriding
C. Overloading
D. Data field Encapsulation
71. Suppose you have developed a self-driving car equipped with relevant
sensors and camera that helps it to see the road and drive sensing traffic lights,
pedestrians P and signs. Its sensors are able to detect the environment but not all the
aspects. Hence,
in which environment is your car acting?
A. Fully observable
B. Discrete
C. Partially observable
D. Stochastic
72.Which one of the following is not correct for the figure shown in Question 27?

A. PO is waiting for a resource held by P1

B. P1 is waiting for a resource held by P2

C. P2 cannot be executed until P1 finishes


D. B cannot be executed until P4 finishes
73.Which one of the following is correct way creating String object?

A. String m = 'Computer Science"


B. String m = 'H' 'e, '",'I, o';
C. String m = new String (‘Technology’):
D. String m = new String ("Exit Exam");
74.Which one of the following is true about frames in HTML?

A. Frames allow parts of the page to remain stationary while other’s parts scroll

B. All browsers support frames


C. Load on the server is not affected, if there are a large number of frames in a
page
D. Frames are not difficult to handle for search engines

75.Which one of the following is false about String in Java?

A. We can create a String object using array of characters

B. Content of a string can be changed once the string is created

C. We can create a String object using String literal

D. In Java a string is treated as object


76.A database management system (DBMS) has________to control locks.

A. Query Processor
B. Lock Manager
C. Lock Table
D. Query Optimizer
77.Which one of the following is evaluating the degrees of success of an agent?
A. Action
B. Perception
C. Performance measure

D. Knowledge
78.Which one of the following is a security service enforced to protect discloser of
information, which can be stored in file or being on transmission, from
unauthorized entities?

A. Integrity
B. Confidentiality

C. Availability
D. Authentication
79. Assume you have a universe of Key U. Which one is false statement regarding
Direct Address table and Hash Table data structures?
A. Direct Address Table doesn't use hash function to map keys
B. If universe U is very large, Hash table is better than Direct Address table

C. Hash table allocates one separate memory slot for each key in the universe U
D. Here is one to one correspondence between keys in the universe U and memory
slots in the Direct Address table
80.Which network security issue shows the level of weakness in networks and
devices?
A. Availability

B. Vulnerability

C. Attack
D. Treat
81.What is the time complexity order of binary searching algorithm?
A. 0(1)
B. O(n)
C. O(n3)

D. O (log2n)
82. After deep analysis if your software requires major change to the architecture
of the system, which strategy of software change should be applied?
A. Architectural transformation

B. Preventative maintenance
C. Software reengineering
D. Software maintenance
83.Suppose you are administering a network and would like to know whether
a computer in the upstairs is connected to the network or not, Therefore,
w h i c h command would you use?
A. Traceroute

B. Ping
C. DHCP Discover

D. Ns lookup
84. Let a Grammar G ((S), fa, b), S, P), where [5 ) is set of variables, fa, b] is set of
terminal symbols, S is start variable and P is set of productions.
Then which one of the following is not an element of the language (L) (L) which is
generated from G. Given:
P:S >aSb.

S-ላ
A. a
B. aabb
C. ab

D. ላ
85.Size of large data files can be reduced to save storage disk space, which alg-
orithm is appropriate to reduce size of large files?
A. Merge sort algorithm
B. Heap sort algorithm
C. Prim's algorithm
D. Huffman encoding algorithm

86.Which asymptotic notation describes worst case analysis?

A. f(n) little-oh
B. f(n) - little- w (little omega)

C. f(n)=ላ (thetha)

D. f(n) = n (Big omega)


87.Which one of the following is different from the other based on its role in
computer network?
A. Wireless access point

B. Network printer

C. Routers
D. Hubs
88. Advancement of operating system is closely tied to computer
architectures,therefore, has passed through different generations. Which one of the
following generation and advancement is wrongly coupled?
A. Fourth generation -> Real time systems

B. First generation-> Single user


C. Second generation > Multiprogramming
D. Third generation -> Batch system
89. Among the following, which one best describes a database management system
(DBMS)?
A. It can help users to manage computer's activity

B. It can assist process images


C. It is responsible for creating and maintaining a database

D. It can assist you to process document


90. A process is terminated by the operating system due to a reference to non-
existing memory. Which one of the following best explains the following best
explains the process termination?
A. Fatal exit
B. Normal exit
c) error exit
D) terminated by an other process
91.Which one of the following is correct for the statement below? When two
transactions that access the same database items have their operations
interleaved in a way that makes the value of some database item
incorrect"

A. It is a dirty read problem

B. It is a lost update problem

C. It is a temporary read problem

D. Itis an incorrect summary problem


1)What will be the output for the Java expression:

8 - 2 * 5 * (3 + 9 / 3) + 6 / 3

A) -150

B) -30

C) -50

D) 50

2) Which one of the following is used the constants in Java?

A. const

B. final

C. define

D. All of the above

3. Which C++ statement is equivalent to short n in variable

declaration?

A. int short n;

B. unsigned short n;

C. float short n;

D. short n;

4. Which one of the following is not high-level language?

A. C++

B. Java

C. Python
D. Assembly

5. Which one of the following data structures used for airlines seat reservation?

A. Array

B. Linked List

C. Queue

D. Stack

6. Which HTML tag is used for program listing?

A. <p>

B. <pre>

C. <head>

D. <sub>

7. Which phases is used to the existing locks can be released, but no new locks can be

acquired?
A. Expanding phase

B. Waiting phase

C. Shrinking phase

D. All of the above

8. Which one of the following exit is an involuntary actions?

A. Normal exit

B. Terminate exit

C. Fatal exit
D. Error exit

9. Which one of the following is wrongly matched?

A. Fully observable - Partially observable

B. Discrete - Continuous

C. Deterministic - Stochastic

D. Static - Stochastic

10. Which HTML form tag attribute that used maximum number of characters

without scrolling or write new line?

A. MAXLENGTH

B. TYPE

C. ACTION

D. STYLE

11. In which case a dedicated communication path between the sender and receiver has tobe
established?
A. Circuit switching

B. Packet switching

C. A and B

D. None of the above

12. What will be the output of this code?

int x = 15, y = 2;

int z = x/y;

cout << z;
A. 7.5

B. 7

C. 3

D. 12.5

13. Which one of the following is a type of network topology in which all devices in the
network are interconnected?
A. Star Topology

B. Ring Topology

C. Mesh Topology

D. Tree Topology

14. Which of the following generation that stated for the high level languages like C++,

Java, Python?

A. 2nd generation

B. 3rd generation

C. 4th generation

D. None of the above

15. Which of the following generation that stated for interpreted language such like SQL?

A. 4 th generation

B. 2 nd generation

C. 3 rd generation

D. All of the above

16. Which one of the SQL keywords to provide access?


A. REVOKE

B. DISTINCT

C. GRANT

D. None of the above

17. Suppose you are network administrator, you want to determine the path between two
connections, often a connection to another device will have to go through multiple routers.Which
command would you use?

A. ping

B. nslookup

C. traceroute

D. All of the above

18. Which one of the following is true about between IPv4 and IPv6?

A. IPv4 is 128-bit and IPv6 is 28-bit

B. IPv4 is physical address

C. IPv6 is logical address

D. IPv4 is 32-bit and IPv6 is 128-bit

19. Which one of the following notation is comfortable for the human programmers?

A. Infix notation

B. Prefix notation

C. Postfix notation
D. None of the above

20. Which one of the data communication that used for direct transmission?
A. Induced

B. Crosstalk

C. A and B

D. None of the above

21. Look at the following fragment code:

int p = 10;

int n = 5;

if (n > p) {

cout << (n+p) << endl;

Which algorithm property is not satisfied by the above C++ coded algorithm?

A. Feasibility

B. Finiteness

C. Sequential

D. Efficiency
22. Which one of the following is true regarding constructors in Java?

A. Constructors are invoked to create objects without using new operator

B. Constructors can have a return type

C. A constructor can have different name from its class name

D. Constructors play the role of initializing objects

23. Identifying and describing the fundamental software system abstractions and their
relationships. Establishing the overall system architecture in which phase these activities are
done?

A. System design

B. Requirement Analysis and definition

C. System testing

D. Implementation

24. ________ is a set of procedures that uses representational language to conclude new

fact from the existing ones.

A. Inference Engine

B. Explanatory facility

C. Interface

D. Knowledge Base

25. Which one of the following is a type of compiler which compiles only the changed

lines from source code and updates the object code accordingly?

A. Retargetable compiler

B. One pass compiler

C. Incremental compiler

D. Parallelizing compiler

26. What is the time complexity order of push() operation of Stack data structure

implemented using array?

A. O(n)
B. O(log2 n)

C. O(n^2)

D. O(1)

27. Which one of the following is uninformed searching method?


A. A* search
B. Iterative improvement

C. Breadth first search

D. Greedy search

28. Which one of the following is a false reason for why we use HTML?

A. Because it works with all platforms, all browsers and all web servers

B. Because it is quickly transferred over a network.

C. Because HTML files are flat text and very small

D. Because it is proprietary technology

29. Writing comments in between our C++ program makes our program ________

A. Portable

B. Maintainable

C. Reliable

D. Efficient

30. Given input alphabet Σ = {a, b, c, d} and empty string λ. Then, which one of the

following is false about λ?

A. λab = ab

B. For any string Z,Zraisedto0= λ


C. λ is an element of Σ +
D.| λ| = 0

31. What will be the value of

if it is given that string Z = caddba?

A. abddac

B. cad

C. abd

D. caddba

32. Which one is a space where an agent perceives and acts so that an intelligent agent

designer has to understand the type of it?

A. Environment

B. Actuator

C. Sensor

D. Search space

33. What is the output of the following fragment JavaScript?

<script>

for (n = 1; n < 7; n++) {


if (n % 5 == 0) {
document.write(n + “ is multiple of 5”);

</script>

A. 5 is multiple of 5
B. 1 2 3 4 5 is multiple of 5 6

C. 5 is multiple of 5 6 7

D. 1 2 3 4 5 6

34. If we have two strings Z = cddc and W = ababb, then the concatenation of the two

strings ZW will be?

A. ZW = cddcababb

B. ZW = cdab

C. ZW = ababbcddc

D. ZW = ca

35. XYZ Company is attacked by intruders which causing system crashes, slowing down

of the services and denying services to targeted users. Therefore, the company is attacked by?

A. Access attack

B. Viruses
C. Information gathering
D. Denial of services (DoS)

36. Which performance metrics can be used to measure the time taken to perform a read or write
operation?

A. Transfer rate

B. Memory cycle time

C. Fetching time

D. Access time

37. Which protocol of the TCP/IP is a connectionless protocol?


A. User data protocol

B. Internet protocol

C. Transmission protocol

D. The OSI reference protocol

38. Which one is true about the following JavaScript statement?

document.write(“Hello World”);

A. write is a property

B. write is a method

C. document is a property
D. write is an object

39. Which one of the following is false about scripting languages?

A. They are platform dependent

B. They are slower than other compiled codes

C. They do not need compilers and development environments

D. They have simple execution model

40. If you want to make methods and data fields of classes accessible from any class in

any package, which access modifier is appropriate?

A. protected

B. default

C. public

D. private
41. Which one of the flowing is a voluntary termination of a process?

A. Error exit

B. Killed by another process

C. Terminated by another process

D. Fatal exit
42. Which one of the following wrongly coupled about passive (offline) and active
(online) attacks?

A. Active attack->add or delete messages

B. Active attack -> traffic analysis

C. Passive attack -> monitoring traffic

D. Passive attack -> obtain message contents

43. Which one of the following is not correct about symmetric key?

A. It requires sender and receiver to share common secret key

B. Previous key cannot be used to a new key

C. Trusted third party can generate and deliver keys

D. Repetitive key change is encouraged to lime data being compromised

44. Which method can resolve collision in hashed files by proceeding from the occupied

position specified by the hash address, the program checks the subsequent positions in

order until an empty position is found?

A. Open addressing

B. Multiple hashing

C. Chaining
D. Cluster indexing

45. Which one doesn't describe loopback address?


A. It helps to refer to the host itself
B. It allows programs to access network protocols for local services

C. It is an external pseudo address

D. It is denoted by an IP address: 127.0.0.1

46. Which value of form's METHOD attribute causes a form's contents to be parsed one

element at a time

A. GET

B. INPUT

C. ACTION

D. POST

47. Which one of software testing is most time consuming test phase?

A. Unit testing

B. Acceptance testing

C. System testing

D. Integration testing

48. Which technique of code optimization shifts computations from run time to compile

time by evaluating constant expressions at compile time and replace the constant expressions by
their values?
A. Copy propagation
B. Compile time evaluation
C. Code motion
D. Dead code Elimination

49. Which one of the following is not correct about function overloading in C++?

A. Two or more overloaded functions may differ in their number of parameters

B. Two or more overloaded functions may differ in data types of their parameters

C. Two or more overloaded functions should have the same function name

D. Two or more overloaded functions may differ only in their return types

Answer: D. Two or more overloaded functions may differ only in their return types

50. As compared to IPv4, IPv6 can:

A. Handle more addresses

B. Use 128-bits

C. Route slower and memory intensive

D. Support encryptions

51. Which one of the following searching strategies best explains the following statement?"The
searching agent is based on problem specific knowledge and the agent knows the distance
different state is far away from the goal".

A. Blind search

B. Informed search
C. Uninformed search

D. Not informed search

52. Which one of the following is not correct about heap files?

A. Sorting is required to read records in particular field order

B. Linear search can be used to search necessary record


C. Record insertion is efficient

D. New records are inserted at the beginning of the file

53. In contrary to the traditional file based approach, in the database approach:

A. Programs define and access their own data

B. Store data item in multiple copies

C. Don't care about the definition of programs and data

D. Data and programs are defined independently

54. Assume you are a database designer and you are given a task to specify entities,

relationships, constraints on relations and data types for the data to be stored in the

database. At which level of the three-schema architecture would this be addressed?

A. View level

B. Internal level

C. External level
D. Conceptual level

55. Which one of the following is correct?

A. In single user systems many users can login simultaneously

B. Single user systems can allow concurrent access to the database

C. Multiuser system can allow at most one user at a time

D. In Multiuser system many users can access the system concurrently

56. Which one of the following is false about divide and conquer or modularization

process?
A. Separate people can work on each sub-divided part

B. Opportunities arise for making the component reusable

C. Each individual component is smaller, and therefore easier to understand

D. Replacing or changing a component is difficult because it affects other parts extremely.

57. Which one is true about Minimum Spanning Trees of graphs?

A. Minimum spanning tree contains all vertices from an input graph

B. We can have only one unique minimum spanning tree for a graph

C. Minimum spanning trees are graphs

D. Minimum spanning trees form cycle


58. Assume you are using Hash Table data structure having array size of 6 and your hash
function is defined as follows: h(key)= key % m, where m is size of your hash table.

Where key = 36 will be stored in your hash table?

A. At index 35

B. At index 1

C. At index 6

D. At index 0

59. Which is not correct about computers evolution?

A. Increasing component size

B. Increasing processor speed

C. Increasing I/O capacity

D. Increasing memory size

60. Which one of the following statement is not correct about threads and processes?
A. Both can create children

B. Threads within a process execute sequentially

C. Processes are not independent of one another

D. If one thread is blocked, another thread can run

61. Which one of the following is not correct about system uniformity?
A. Non-uniform configuration minimizes a probable loss

B. Uniform configuration increases predictability

C. In uniform configuration, if some components are poor it doesn't mean the rest are

D. Non-uniform configuration avoids putting all the resources to the same problem

62. Which one of the following is not a wireless attack?

A. bluesnarfing

B. phishing

C. rogue access point

D. bluejacking

63. Which access method is used in magnetic disks?

A. Associative

B. Sequential

C. Random

D. Direct

64. Which phase of software development process refers to modification of software to

reflect changing customer and market requirements?


A. Development

B. Evolution

C. Validation

D. Specification

65. Which one of the following is not correct about Von Newmann's architecture?

A. Data and instructions are stored separately

B. Modern computers are based on Von Newmann's architecture

C. Instruction execution is sequential

D. Memory content is located by its address

66. If power went off while processing transaction, what should the DBMS do to reverse

any changes made to the database

A. Read_transaction

B. Fail transaction

C. Commit transaction

D. Rollback

67. Instead of delivering the system as a single delivery, the development and delivery is

broken down into phases with each phase delivering part of the required functionality.

What type of development mode is this?

A. Incremental
B. Waterfall

C. Spiral
D. Evolutionary

68. We should not use Waterfall software development process mode in situations like

A. Plenty resources with required expertise are available freely

B. There are no ambiguous requirements

C. The project is short

D. Software requirements change quickly

69. Which one of the following is true about tree data structure?

A. Tree is static data structure

B. Tree is linear data structure

C. Tree forms cycle. In other words tree is cyclic data structure

D. There is only one unique path when we traverse from one node to another node in a
tree

70. When a process executes code that possibly changes the value of shared data, its

execution has to be mutually exclusive. Therefore, the process is in:

A. Deadlock

B. Terminated
C. Critical section

D. Blocked

71. Which characteristic of requirements specify that the requirement should be phrased so that
there is one and only one interpretation for it?

A. Unambiguous

B. Correct
C. Feasible

D. Verifiable

72. Which instruction type is used to test the value of a data word or status of

composition?

A. Data processing instruction

B. Test instruction

C. Data movement instruction

D. Branch instruction

73. Assume it is given that f(n) = 4n2, g(n) = 8n, then which asymptotic notation is

correct?

A. f(n) = Big-Oh(g(n))
B. f(n) = Little-Oh(g(n))
C. f(n) = Big-Omega(g(n))

D. f(n) = Theta(g(n))

74. Given input alphabet Σ = {a, b, c, d} which one of the following is an element of set?

A. b

B. c

C. ac

D. aabbccdd

75. What is the output of the following C++ fragment code?

int data[10] = {5,10,15,20,25,30,35,40,45,50};

int i = 0;
while (i <= 10) {

if(data[i] % 10 == 0) {

cout << data[i] << “ “;

i = i + 2;

A. 5 15 25 35 45 55
B. 10 20 30 40 50
C. 5 10 15 20 25 30 35 40 45 50

D. No output

76) in array implementation of binary heap tree, if anode is stored at index i, then it's parent will
be stored at index - - - -?

A) ceiling((i+1) /2)

B) floor (i/2)

C) ceiling(2*i+1)

D) floor (2*i)

77) if a campany enforce mechanism that protect information and information system from
unauthorized access, use the modification and destruction to maintain integrity, confidentiality
and availability then which one the following best describe the company did?

A)compus security

B) information security

C) network security

D) hardware security
78) Look at the following HTML tag:

<address >

Abera Bekele

<\address >

Which one of the following is false about the output of the above tag

A)Abera Bekele will be formatted in italics

B)Abera Bekele will be formatted in bold

C) there will line break above Abera Bekele

D) there will line break below Abera Bekele

79)Given the schemas:

BOOK (Book _ id, title, publisher_name)

BOOK_AUTHOR(Book _ Id, author _name)

PUBLISHER (name, address, phone)

Choose the correct SQL STATEMENT to retrieve the name of publisher that published the book
authored by 'sisay'

A) SELECT name

FROM Book, BOOK AUTHOR PUBLISHER

WHERE BOOK. Book_id==BOOK AUTHOR.

Book_id AND
BOOK Author. Author name ='sisay'

B) SELECT name

FROM Book, BOOK_AUTHOR,

WHERE BOOK. Book_id==BOOK AUTHOR.

Book_id AND

BOOK Author. Author name ='sisay'

C) SELECT name

FROM BOOK,PUBLISHER ,

WHERE PUBLISHER. name==BOOK.

AUTHOR.

Publisher_name AND???

D)??

80) what is the height of a complete binary tree having n nodes?

A) floor (log n)

B) ceiling (n log n)

C)floor (n/2)

D) ceiling(n/2)

81) Which SQLcomnand would you use if you want you want to give some permission to a user

A) GRANT

B)INSERT
C) REVOKE

D) CHANGE

82) if a transaction ends successfully and any changes executed by the transaction will be
saved permanently and will not be undone which database command can be used

A) rollback

B)commit transaction

C) fail transaction

D) read transaction

83) Which recurrence relation can express selection sorting algorithm

A)( T(n)=T(n/3) +1

B) ( T(n)=T(n/2) +n

C)( T(n)=T(n-1) +n

D) ( T(n)=T(n-2) +1

84) break down a problem into smaller subproblems, solve sub problems and then combine the
solution of subproblems these are basic steps of... Algorithm

A) divide and conquer

B) bank tracking

C)Dijkstra's

D) greedy

85) assume you are a network designer and assigned to design a network for a company, the
network spans overlarge distance and it should be resilient for any failure, which is if a station
fails the communication still continue by redirecting through an other path. Which network
topology would you use for your phone design?

A)mesh topology

B)star topology

C)bus topology

D)ring topology

86) Fortran, cool, lisp, c, c++, c#, and Java are grouped under.... generation of programming
languages

A) 3rd generation language

B) 4th generation language

C) 2nd generation language

D)1st generation language

87)which one of the following isnot the purpose of code optimization phase of the compiling
process

A) achieving faster execution

B) changing behavior of programs

C) producing fewer instruction

D) producing better code

88), which transmission impairment does the effect of one transmission wire has on the other
wire

A) cross talk

B) thermal
C) impulse

D) induced

89) .. is a set of procedure that uses representational language to conclude new fact from the
existing ones

A) explanatory facility

B) interface engine

C) knowledge base

D)interface

90)which one of the following not component of human computer system?

A) humans

B) security guards

C)network hardware

D) host computer

91) A scheduler assigns CPU to a process that comes earlier than other. which algorithm does
the scheduler is using to assign resources?

A) Shortest remaining time first

B)shortest job first

C)first come first served

D) Round Robin

92)which one of the following is not correct


A) off-the-shelf application are assets to be secured

B) enforcing complete security denies access

C) no security assures full access to assets

D) security is strong if authentication can be refuted

93) which one of the following is not true about the web

A) Html pages are you dynamic

B)php is web scripting language used to make web page dynamic

C) xhtml pages are static

D) Javascript is web scripting language used to make web page dynamic

94)which program takes one or more object files generated by compiler or assembler and
combines them into a single executable program?

A) debugger

B) linker

C)loader

D)editor

95)Which one of the following is true about client server model

A) php is for client programming

B) client refers to end users computer

C) client connects with server only through the the internet

D) Javascript is for server side programming

96) Which one of the following is not true process


A) process can communicate using message passing

B) cooperating process neither affect nor affected by an other process

C) cooperating process can both affect and affected by an other process

D) process can communicate using shared memory

97)which one of the following is not an example of programming language

A)c++

B)java

C)) assembly language

D)c#

98)one which type of software must act immediately

A) data processing

B) generic

C) real-time

D) custom

99) Which one of the following is not a computer function?

A) Data processing

B) control

C) data movement

D) component interconnection

100) if you develop software that can be easily made to work in different hardware and
operating system environments, the quality of your software has---?
A) reusability

B)correctness

C)portability

D)usability

101) Which one of the following is not correct regarding TCPandUDP protocols?

A) both are transport layer protocols.

B) TCP is connection oriented, while UDP is connectionless.

C) TCP is connectionless, while UDP is connection oriented.

D) both manage communication of many applications

102. What will be the value of |𝑍| 𝑍if it is given that string Z = caddba?

A. 3

B. 4

C. 2

D. 12

103

You might also like