Cs Exit Exam 1and 2 With Modified Answers
Cs Exit Exam 1and 2 With Modified Answers
A. Blocking receive
B. Blocking send
C. Direct message
D. Non-block receive
2.What is the purpose of an opcode that is as indicated in the figure below?
A. Transport layer
B. Application layer
C. Network layer
D. Physical layer
4)Which asymptotic notation describes average case analysis?
A. f(n)- Big-0h
B. f(n)=0 (thetha)
C. f(n) = & (Big omega)
D. f(n) = little w (little omega)
5. At which layer of the OSI model devices such as bridges, switches and Network
Interface cards are used?
A. Physical layer
B. Network layer
D. Application layer
6. A computer expert would like to know the number of processes that are
completed per hour to assess the performance of a machine. Therefore, which one
of the following best describes the expert's assessment?
A. Turnaround time
B. System throughput
C. Waiting time
D. Response time
7. What will be the output of the following JavaScript statement? Math.sqrt(36)
A. 6
B. 3
C. 36
D. 1
8. Which one of the following is correct about human role in system
administration?
A. Ethics is not a requirement to manage computers
B. test= 5;
C. $test= 9.5
D. $test = "Computer;
10. Which one of the following is not correct about POP3 and SMPT?
11. Which one of the following is correct for the statement below? "A problem that
occurs when one transaction updates a database item and then the transaction fails
for some reason and the updated item is accessed by another transaction before it is
changed back to its original value"
A. It is a lost update problem
B. It is an incorrect summary problem
C. It is dirty read
D. It is a temporary read problem
12. Which quantifier can be used for some portion of the universe?
A.->
B. E
C. ^
D. £
13. What will be the output of the following JavaScript statement? Math.floor(5.9)
A. 9
B. 5
C.11.8
D. 6
14. Which one of the following best explains attackers who are motivated by
financial gain and perform sabotage, an IP theft and secrets of a rival company?
A. Stealer
B. Competitor
C. Activist
D. Hacktivist
15. _____is the whole thing that an agent has observed so far concerning the
existing scenario in the environment.
A. Performance measure
B. Knowledge
C. Action
D. Perception
16. Which one of the following phases is done before semantic analysis phase of
compiling process?
A. Syntax analysis
B. Code optimization
C. Code generation
D. Intermediate code generation
C. pop () returns the end/top element but it doesn't delete that element
B. Firewall
C. Router
C. Unified cache
D. Split cache
24. Assume there is a line of patients waiting for a service from a clinic. Seriously
sick patients should get service first. Which data structure is the most appropriate
for the given type of real-world problem?
A. Stack
B. Priority Queue
C. Queue
D. Tree
25. Which one of the following is not correct about computer architecture and
organization?
A. An organization can last for long time as an architecture does
B. An architecture can be used for long time encompassing different computer
models
C. An architecture can remain for long time but its organization can change
28. Which one of the following is not correct about packet and circuit switching?
A. PHP
B. Perl
C. C++
D. Python
30. In a tree data structure, if a node has no parent node, then the node is________
A. Root node
B. Parent node
C. Internal node
D. External node
31. ______ is a network architecture characteristic that states a network can
expand quickly to address needs of new users and application without having
impact on the services delivered to existing users.
A. Fault tolerance
B. Quality of service
C. Scalability
D. Security
32. Which deadlock prevention mechanisms don't require timestamp?
A. Wound-wait
B. Wait-die
C. No-wait
D. Wait-wait
33. Which one of the following lists of environments is the hardest for an agent?
34. What does the program data independence in the database approach entails for?
B. <H1>
C. <H4>
D. <H6>
38. If you plan a software test to be done by clients to demonstrate that the system
satisfies their requirements, which phase of software testing is appropriate?
A. Unit testing
B. Integration testing
C. System testing
D. Acceptance testing
39. Which one of the following is a measure taken, to ensure information and
information systems' availability, integrity, authentication and confidentiality?
A. Interception
B. Information assurance
C. Information security
D. Wiretapping
40.Which network type is the largest as compared to the rest?
B. The internet
C. Wide Area Network
D. Local Area Network
41. For an input graph, Depth First Traversal algorithm uses data structure to
traverse?
A. Tree
B. Priority queue
C. Queue
D. Stack
42.Which branch of study deals with whether a problem can be solved at all or
not,regardless of the resources required?
A. Automata theory
B. Set theory
C. Computability theory
D. Complexity theory
43.Which one of the following algorithms can be used to extract Minimum
Spanning Tree from an input graph?
A. Huffman encoding algorithm
B. Prim's algorithm
C. Merge sort algorithm
D. Dijkstra's algorithm
44." A university owns a number of private local area and wide area
networks,which are designed for an access by its academic staff, students and
administrative workers. Which term best describes the University's network?
A. Metropolitan Area Network
A. Multilevel index
B. Primary index
C. Clustering index
D. Secondary index
46."Given the schemas:BOOK (Book_id, Title, Publisher name)
BOOK_AUTHOR (Book_id, Author _name) PUBLISHER (Name, Address,
Phone) Which one of the following SOL is correct to delete the publisher named as
'xWZ from the PUBLISHER table?
A. DELETE FROM PUBLISHER WHERE Address - XWZ
C. Encryption
D. Cryptography
48.Which one of the following is used for the purpose of syntax analysis?
A. Loader
B. Scanner
C. Linker
D. Parser
49. Suppose you have received a message from your friend but the message is
scrambled for the sake of security. Your friend has used a program to encode
messages into scrambled text, In, order to read the message which program would
you use?
A. Secret key
B. Encryption program
C. Ciphertext
D. Decryption program
50.Which one of the following computers can be most secured compared to the
rest?
A. A computer connected to the Internet and the latest anti-virus installed on it
C. In situation where more than one users should access the database
C. Execute
D. Goal formulation
57. In set of attributes that can be seen by a program and can have direct impact on
the logical execution of a program.
A. Arrangement
B. Architecture
C. Organization
D. Flow control
58.Which type of Turing machine has two tapes, one tape read-only and the other
read-write tape?
N.B An “Offline Turing Machine” has two tapes. One tape is read-only and contains the input, the other
is read-write and is initially blank. “Offline Turing machines are equivalent to Standard Turing machines”
B. Dynamic testing
C. Beta testing
D. Static testing
60."Which one of the following does not show non-functional requirement of
software systems?
A. Displaying information
B. Memory requirement
C. Reliability
D. Response time
61. If you want to allow subclasses to access data fields or methods defined in the
super-class, but not to allow non-subclasses to access these data fields and
methods, which access modifier is appropriate?
A. Private
B. Default
C. Public
D. Protected
62.Which one of the following registers hold the address of the next pair of
instructions to be fetched from memory?
A. Memory buffer register
B. Instruction buffer register
D. Program counter
63.Linked list data structure is _______type of data structure.
B. Parallel interface
C. Bus interface
D. One line
65. Look at the following PHP line: $list – array (20, 12, 23, 19, 18): What is the
index of data value 19?
A.3
B.2
C.1
D.0
66.Which phase of compiling process is considered as the final phase in the
process?
A. Code optimization
B. Code generation
C. Semantic analysis
D. Intermediate code generation
67.Which one of the following is not correct about threads?
D. Automatic
70.Which concept refers to extending specialized classes from generalized classes
in object-oriented programming?
A. Inheritance
B. Overriding
C. Overloading
D. Data field Encapsulation
71. Suppose you have developed a self-driving car equipped with relevant
sensors and camera that helps it to see the road and drive sensing traffic lights,
pedestrians P and signs. Its sensors are able to detect the environment but not all the
aspects. Hence,
in which environment is your car acting?
A. Fully observable
B. Discrete
C. Partially observable
D. Stochastic
72.Which one of the following is not correct for the figure shown in Question 27?
A. Frames allow parts of the page to remain stationary while other’s parts scroll
A. Query Processor
B. Lock Manager
C. Lock Table
D. Query Optimizer
77.Which one of the following is evaluating the degrees of success of an agent?
A. Action
B. Perception
C. Performance measure
D. Knowledge
78.Which one of the following is a security service enforced to protect discloser of
information, which can be stored in file or being on transmission, from
unauthorized entities?
A. Integrity
B. Confidentiality
C. Availability
D. Authentication
79. Assume you have a universe of Key U. Which one is false statement regarding
Direct Address table and Hash Table data structures?
A. Direct Address Table doesn't use hash function to map keys
B. If universe U is very large, Hash table is better than Direct Address table
C. Hash table allocates one separate memory slot for each key in the universe U
D. Here is one to one correspondence between keys in the universe U and memory
slots in the Direct Address table
80.Which network security issue shows the level of weakness in networks and
devices?
A. Availability
B. Vulnerability
C. Attack
D. Treat
81.What is the time complexity order of binary searching algorithm?
A. 0(1)
B. O(n)
C. O(n3)
D. O (log2n)
82. After deep analysis if your software requires major change to the architecture
of the system, which strategy of software change should be applied?
A. Architectural transformation
B. Preventative maintenance
C. Software reengineering
D. Software maintenance
83.Suppose you are administering a network and would like to know whether
a computer in the upstairs is connected to the network or not, Therefore,
w h i c h command would you use?
A. Traceroute
B. Ping
C. DHCP Discover
D. Ns lookup
84. Let a Grammar G ((S), fa, b), S, P), where [5 ) is set of variables, fa, b] is set of
terminal symbols, S is start variable and P is set of productions.
Then which one of the following is not an element of the language (L) (L) which is
generated from G. Given:
P:S >aSb.
S-ላ
A. a
B. aabb
C. ab
D. ላ
85.Size of large data files can be reduced to save storage disk space, which alg-
orithm is appropriate to reduce size of large files?
A. Merge sort algorithm
B. Heap sort algorithm
C. Prim's algorithm
D. Huffman encoding algorithm
A. f(n) little-oh
B. f(n) - little- w (little omega)
C. f(n)=ላ (thetha)
B. Network printer
C. Routers
D. Hubs
88. Advancement of operating system is closely tied to computer
architectures,therefore, has passed through different generations. Which one of the
following generation and advancement is wrongly coupled?
A. Fourth generation -> Real time systems
8 - 2 * 5 * (3 + 9 / 3) + 6 / 3
A) -150
B) -30
C) -50
D) 50
A. const
B. final
C. define
declaration?
A. int short n;
B. unsigned short n;
C. float short n;
D. short n;
A. C++
B. Java
C. Python
D. Assembly
5. Which one of the following data structures used for airlines seat reservation?
A. Array
B. Linked List
C. Queue
D. Stack
A. <p>
B. <pre>
C. <head>
D. <sub>
7. Which phases is used to the existing locks can be released, but no new locks can be
acquired?
A. Expanding phase
B. Waiting phase
C. Shrinking phase
A. Normal exit
B. Terminate exit
C. Fatal exit
D. Error exit
B. Discrete - Continuous
C. Deterministic - Stochastic
D. Static - Stochastic
10. Which HTML form tag attribute that used maximum number of characters
A. MAXLENGTH
B. TYPE
C. ACTION
D. STYLE
11. In which case a dedicated communication path between the sender and receiver has tobe
established?
A. Circuit switching
B. Packet switching
C. A and B
int x = 15, y = 2;
int z = x/y;
cout << z;
A. 7.5
B. 7
C. 3
D. 12.5
13. Which one of the following is a type of network topology in which all devices in the
network are interconnected?
A. Star Topology
B. Ring Topology
C. Mesh Topology
D. Tree Topology
14. Which of the following generation that stated for the high level languages like C++,
Java, Python?
A. 2nd generation
B. 3rd generation
C. 4th generation
15. Which of the following generation that stated for interpreted language such like SQL?
A. 4 th generation
B. 2 nd generation
C. 3 rd generation
B. DISTINCT
C. GRANT
17. Suppose you are network administrator, you want to determine the path between two
connections, often a connection to another device will have to go through multiple routers.Which
command would you use?
A. ping
B. nslookup
C. traceroute
18. Which one of the following is true about between IPv4 and IPv6?
19. Which one of the following notation is comfortable for the human programmers?
A. Infix notation
B. Prefix notation
C. Postfix notation
D. None of the above
20. Which one of the data communication that used for direct transmission?
A. Induced
B. Crosstalk
C. A and B
int p = 10;
int n = 5;
if (n > p) {
Which algorithm property is not satisfied by the above C++ coded algorithm?
A. Feasibility
B. Finiteness
C. Sequential
D. Efficiency
22. Which one of the following is true regarding constructors in Java?
23. Identifying and describing the fundamental software system abstractions and their
relationships. Establishing the overall system architecture in which phase these activities are
done?
A. System design
C. System testing
D. Implementation
24. ________ is a set of procedures that uses representational language to conclude new
A. Inference Engine
B. Explanatory facility
C. Interface
D. Knowledge Base
25. Which one of the following is a type of compiler which compiles only the changed
lines from source code and updates the object code accordingly?
A. Retargetable compiler
C. Incremental compiler
D. Parallelizing compiler
26. What is the time complexity order of push() operation of Stack data structure
A. O(n)
B. O(log2 n)
C. O(n^2)
D. O(1)
D. Greedy search
28. Which one of the following is a false reason for why we use HTML?
A. Because it works with all platforms, all browsers and all web servers
29. Writing comments in between our C++ program makes our program ________
A. Portable
B. Maintainable
C. Reliable
D. Efficient
30. Given input alphabet Σ = {a, b, c, d} and empty string λ. Then, which one of the
A. λab = ab
A. abddac
B. cad
C. abd
D. caddba
32. Which one is a space where an agent perceives and acts so that an intelligent agent
A. Environment
B. Actuator
C. Sensor
D. Search space
<script>
</script>
A. 5 is multiple of 5
B. 1 2 3 4 5 is multiple of 5 6
C. 5 is multiple of 5 6 7
D. 1 2 3 4 5 6
34. If we have two strings Z = cddc and W = ababb, then the concatenation of the two
A. ZW = cddcababb
B. ZW = cdab
C. ZW = ababbcddc
D. ZW = ca
35. XYZ Company is attacked by intruders which causing system crashes, slowing down
of the services and denying services to targeted users. Therefore, the company is attacked by?
A. Access attack
B. Viruses
C. Information gathering
D. Denial of services (DoS)
36. Which performance metrics can be used to measure the time taken to perform a read or write
operation?
A. Transfer rate
C. Fetching time
D. Access time
B. Internet protocol
C. Transmission protocol
document.write(“Hello World”);
A. write is a property
B. write is a method
C. document is a property
D. write is an object
40. If you want to make methods and data fields of classes accessible from any class in
A. protected
B. default
C. public
D. private
41. Which one of the flowing is a voluntary termination of a process?
A. Error exit
D. Fatal exit
42. Which one of the following wrongly coupled about passive (offline) and active
(online) attacks?
43. Which one of the following is not correct about symmetric key?
44. Which method can resolve collision in hashed files by proceeding from the occupied
position specified by the hash address, the program checks the subsequent positions in
A. Open addressing
B. Multiple hashing
C. Chaining
D. Cluster indexing
46. Which value of form's METHOD attribute causes a form's contents to be parsed one
element at a time
A. GET
B. INPUT
C. ACTION
D. POST
47. Which one of software testing is most time consuming test phase?
A. Unit testing
B. Acceptance testing
C. System testing
D. Integration testing
48. Which technique of code optimization shifts computations from run time to compile
time by evaluating constant expressions at compile time and replace the constant expressions by
their values?
A. Copy propagation
B. Compile time evaluation
C. Code motion
D. Dead code Elimination
49. Which one of the following is not correct about function overloading in C++?
B. Two or more overloaded functions may differ in data types of their parameters
C. Two or more overloaded functions should have the same function name
D. Two or more overloaded functions may differ only in their return types
Answer: D. Two or more overloaded functions may differ only in their return types
B. Use 128-bits
D. Support encryptions
51. Which one of the following searching strategies best explains the following statement?"The
searching agent is based on problem specific knowledge and the agent knows the distance
different state is far away from the goal".
A. Blind search
B. Informed search
C. Uninformed search
52. Which one of the following is not correct about heap files?
53. In contrary to the traditional file based approach, in the database approach:
54. Assume you are a database designer and you are given a task to specify entities,
relationships, constraints on relations and data types for the data to be stored in the
A. View level
B. Internal level
C. External level
D. Conceptual level
56. Which one of the following is false about divide and conquer or modularization
process?
A. Separate people can work on each sub-divided part
B. We can have only one unique minimum spanning tree for a graph
A. At index 35
B. At index 1
C. At index 6
D. At index 0
60. Which one of the following statement is not correct about threads and processes?
A. Both can create children
61. Which one of the following is not correct about system uniformity?
A. Non-uniform configuration minimizes a probable loss
C. In uniform configuration, if some components are poor it doesn't mean the rest are
D. Non-uniform configuration avoids putting all the resources to the same problem
A. bluesnarfing
B. phishing
D. bluejacking
A. Associative
B. Sequential
C. Random
D. Direct
B. Evolution
C. Validation
D. Specification
65. Which one of the following is not correct about Von Newmann's architecture?
66. If power went off while processing transaction, what should the DBMS do to reverse
A. Read_transaction
B. Fail transaction
C. Commit transaction
D. Rollback
67. Instead of delivering the system as a single delivery, the development and delivery is
broken down into phases with each phase delivering part of the required functionality.
A. Incremental
B. Waterfall
C. Spiral
D. Evolutionary
68. We should not use Waterfall software development process mode in situations like
69. Which one of the following is true about tree data structure?
D. There is only one unique path when we traverse from one node to another node in a
tree
70. When a process executes code that possibly changes the value of shared data, its
A. Deadlock
B. Terminated
C. Critical section
D. Blocked
71. Which characteristic of requirements specify that the requirement should be phrased so that
there is one and only one interpretation for it?
A. Unambiguous
B. Correct
C. Feasible
D. Verifiable
72. Which instruction type is used to test the value of a data word or status of
composition?
B. Test instruction
D. Branch instruction
73. Assume it is given that f(n) = 4n2, g(n) = 8n, then which asymptotic notation is
correct?
A. f(n) = Big-Oh(g(n))
B. f(n) = Little-Oh(g(n))
C. f(n) = Big-Omega(g(n))
D. f(n) = Theta(g(n))
74. Given input alphabet Σ = {a, b, c, d} which one of the following is an element of set?
A. b
B. c
C. ac
D. aabbccdd
int i = 0;
while (i <= 10) {
if(data[i] % 10 == 0) {
i = i + 2;
A. 5 15 25 35 45 55
B. 10 20 30 40 50
C. 5 10 15 20 25 30 35 40 45 50
D. No output
76) in array implementation of binary heap tree, if anode is stored at index i, then it's parent will
be stored at index - - - -?
A) ceiling((i+1) /2)
B) floor (i/2)
C) ceiling(2*i+1)
D) floor (2*i)
77) if a campany enforce mechanism that protect information and information system from
unauthorized access, use the modification and destruction to maintain integrity, confidentiality
and availability then which one the following best describe the company did?
A)compus security
B) information security
C) network security
D) hardware security
78) Look at the following HTML tag:
<address >
Abera Bekele
<\address >
Which one of the following is false about the output of the above tag
Choose the correct SQL STATEMENT to retrieve the name of publisher that published the book
authored by 'sisay'
A) SELECT name
Book_id AND
BOOK Author. Author name ='sisay'
B) SELECT name
Book_id AND
C) SELECT name
FROM BOOK,PUBLISHER ,
AUTHOR.
Publisher_name AND???
D)??
A) floor (log n)
B) ceiling (n log n)
C)floor (n/2)
D) ceiling(n/2)
81) Which SQLcomnand would you use if you want you want to give some permission to a user
A) GRANT
B)INSERT
C) REVOKE
D) CHANGE
82) if a transaction ends successfully and any changes executed by the transaction will be
saved permanently and will not be undone which database command can be used
A) rollback
B)commit transaction
C) fail transaction
D) read transaction
A)( T(n)=T(n/3) +1
B) ( T(n)=T(n/2) +n
C)( T(n)=T(n-1) +n
D) ( T(n)=T(n-2) +1
84) break down a problem into smaller subproblems, solve sub problems and then combine the
solution of subproblems these are basic steps of... Algorithm
B) bank tracking
C)Dijkstra's
D) greedy
85) assume you are a network designer and assigned to design a network for a company, the
network spans overlarge distance and it should be resilient for any failure, which is if a station
fails the communication still continue by redirecting through an other path. Which network
topology would you use for your phone design?
A)mesh topology
B)star topology
C)bus topology
D)ring topology
86) Fortran, cool, lisp, c, c++, c#, and Java are grouped under.... generation of programming
languages
87)which one of the following isnot the purpose of code optimization phase of the compiling
process
88), which transmission impairment does the effect of one transmission wire has on the other
wire
A) cross talk
B) thermal
C) impulse
D) induced
89) .. is a set of procedure that uses representational language to conclude new fact from the
existing ones
A) explanatory facility
B) interface engine
C) knowledge base
D)interface
A) humans
B) security guards
C)network hardware
D) host computer
91) A scheduler assigns CPU to a process that comes earlier than other. which algorithm does
the scheduler is using to assign resources?
D) Round Robin
93) which one of the following is not true about the web
94)which program takes one or more object files generated by compiler or assembler and
combines them into a single executable program?
A) debugger
B) linker
C)loader
D)editor
A)c++
B)java
D)c#
A) data processing
B) generic
C) real-time
D) custom
A) Data processing
B) control
C) data movement
D) component interconnection
100) if you develop software that can be easily made to work in different hardware and
operating system environments, the quality of your software has---?
A) reusability
B)correctness
C)portability
D)usability
101) Which one of the following is not correct regarding TCPandUDP protocols?
102. What will be the value of |𝑍| 𝑍if it is given that string Z = caddba?
A. 3
B. 4
C. 2
D. 12
103