model with answer
model with answer
a.
It can be define more flexible and complex relationship.
b.
Entries with repeating groups are said to be normalized.
c.
Only view Tables are physically stored.
d.
Order of rows and columns is material.
a.
To enhance network security
b.
All
c.
To manage network traffic
d.
To improve network performance
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In IPv4 Addresses, classful addressing is replaced with ________
a.
Classful Addressing
b.
Classless Addressing
c.
Classful Advertising
d.
Classless Advertising
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which control statement is used for executing different blocks of code based on multiple
conditions?
a.
While loop statement
b.
For loop statement
c.
If...else statement
d.
Switch statement
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which graph traversal algorithm is used to find the shortest path between two nodes?
a.
Dijkstra's Algorithm
b.
Depth-First Search (DFS)
c.
Kruskal's Algorithm
d.
Breadth-First Search (BFS)
Question 6
Correct
Flag question
Question text
Consider the following sequential free memory block (partition) sizes available for allocation: Block
A=100 KB, Block B=200 KB, Block C=150 KB, Block D=300 KB, and Block E=250 KB. By using the First
Fit algorithm if we allocate the following processes: P1 requires 120 KB, P2 requires 250 KB, P3
requires 180 KB. Which process goes into which memory block?
a.
P1: Block B, P2: Block E, P3: Block A
b.
P1: Block D, P2: Block E, P3: will not be allocated to any partition
c.
P1: Block B, P2: Block D, P3: Block E
d.
P1: Block A, P2: Block D, P3: Block E
Question 7
Correct
Flag question
Question text
::Employee (Emp_ Id, Emp_name, emp_salary), here the Employee is __________ and Emp_ Id,
Emp_name, emp_salary are _________.
a.
Tuple, Primary key
b.
Table, Attribute
c.
Attributes, Relation
d.
row, Column
Question 8
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
which one of the following search algorithm requires less memory?
a.
Linear Search
b.
Depth First Search
c.
Optimal Search
d.
Breadth-First Search
Question 9
Incorrect
Flag question
Question text
::A functional dependency is a relationship between/among ___________
a.
Rows
b.
Tables
c.
Attributes
d.
Entities
Question 10
Correct
Flag question
Question text
___________ is a theoretical construct of Turing machine that can simulate any other Turing machine.
a.
Multi-tape Turing machine
b.
Universal Turing machine
c.
Multi track Turing machine
d.
Semi-infinite Tape
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of pipelining in a computer architecture?
a.
To reduce the power consumption of the CPU
b.
To increase the speed of instruction execution
c.
To enhance the reliability of the system
d.
To improve the efficiency of memory access
Question 12
Correct
Question text
Push(A), Push(B), Pop(), Push(C),Pop(),Push(D),Push(E), after completion of those operations the total
number of element present in stack is_________?
a.
1
b.
2
c.
4
d.
3
Question 13
Correct
Flag question
Question text
What is the main function of the arithmetic logic unit (ALU) in a CPU?
a.
Fetch and decode instructions
b.
Perform arithmetic and logical operations
c.
Manage memory access
d.
Control the flow of execution
Question 14
Correct
Question text
Which of the following is not a common network topology?
a.
Star topology
b.
Pyramid topology
c.
Bus topology
d.
Ring topology
Question 15
Correct
Flag question
Question text
Which of the following is a data link protocol?
a.
all of the mentioned
b.
hdlc
c.
ethernet
d.
point to point protocol
Question 16
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which of the following tasks is an example of unsupervised learning?
a.
Predicting the price of a house based on the number of rooms
b.
Customer segmentation based on their purchasing behavior
c.
Predicting the age of a person based on their social media activity
d.
Classifying emails into spam or non-spam categories
Question 17
Correct
Flag question
Question text
What differs deep learning from traditional machine learning approaches?
a.
Deep learning is only suitable for classification tasks.
b.
Deep learning is subfield of AI
c.
Deep learning does not require labeled data for training.
d.
Deep learning models have multiple number of layers which enable them to automatically learn
feature extraction and selection.
Question 18
Correct
Question text
Which of the following is a characteristic of a non-deterministic finite automaton (NFA)?
a.
An NFA requires a stack to store its state transitions.
b.
An NFA can only recognize regular languages.
c.
An NFA can have multiple possible transitions for a given input symbol and current state.
d.
An NFA can recognize context-free languages.
Question 19
Incorrect
Flag question
Question text
What is the main function of the branch prediction mechanism in a CPU?
a.
To improve the accuracy of branch instructions
b.
To enhance the overall performance of the CPU
c.
To reduce the number of branch instructions
d.
To minimize the impact of branch mispredictions
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
_________is the minimum number of steps that can executed for the given parameters?
a.
Worst case
b.
Average case
c.
Best case
d.
Time complexity
Question 21
Incorrect
Flag question
Question text
Which of the following is a characteristic of CISC (Complex Instruction Set Computer) architecture?
a.
Longer instruction execution time
b.
Fewer registers
c.
Simpler instruction set
d.
Variable-length instructions
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Mr.Akubazgi is teaching an introductory computer security course and is trying to explain the
terminology to students. What is the term for a person who uses tools to hack without
understanding the underlying technology?
a.
A script kiddy
b.
A white hat hacker
c.
A gray hat hacker
d.
A novice
Question 23
Correct
Flag question
Question text
::Checkpoints are a part of____ measures.
a.
Concurrency
b.
Security
c.
Recovery
d.
Authorization
Question 24
Correct
Question text
Which of the following is a key application of context-free grammars?
a.
Network security.
b.
Natural language processing.
c.
Image processing.
d.
Database management.
Question 25
Correct
Flag question
Question text
Which operator is used for assignment in C++?
a.
=
b.
+=
c.
==
d.
/=
Question 26
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
Which one of the following algorithms is not applicable for digital signature?
a.
RSA
b.
Elliptic Curve
c.
Diffie-Hellman
d.
DSS
Question 27
Correct
Flag question
Question text
Three or more devices share a link in ________ connection.
a.
Multipoint
b.
Point to point
c.
Unipoint
d.
Simplex
Question 28
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
How can you pass the value of a function by value in C++?
a.
By using the "return" statement in the function
b.
By assigning the value to a global variable
c.
By passing the value directly as a function argument
d.
By declaring a pointer variable as a function parameter
Question 29
Correct
Flag question
Question text
What is the purpose of an Intrusion Detection System (IDS) in computer security?
a.
To prevent unauthorized access to a network
b.
To detect and alert on suspicious network activities
c.
To recover data after a system failure or disaster
d.
To encrypt data during transmission
e.
To encrypt data during transmission
Question 30
Correct
Question text
What is the main function of a network switch?
a.
To connect multiple network devices
b.
To provide internet access
c.
To enhance network security
d.
To manage network traffic
Question 31
Correct
Remove flag
Question text
::Most backup and recovery commands in _____ are executed by server sessions.
a.
Recovery Manager
b.
Backup Manager
c.
Backup and Recovery Manager
d.
Database Manager
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which loop statement is guaranteed to execute its body at least once?
a.
For loop statement
b.
Do...while statement
c.
If...else statement
d.
Switch statement
Question 33
Correct
Flag question
Question text
::Which of the following is not a recovery technique?
a.
Deferred update
b.
Recovery management
c.
Two-phase commit
d.
Immediate update
Question 34
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
Merge sort is a stable algorithm. What does "stable" mean in the context of sorting algorithms?
a.
The algorithm has a predictable time complexity.
b.
The algorithm maintains the relative order of elements with equal values.
c.
The algorithm is guaranteed to terminate.
d.
The algorithm is efficient for large input sizes.
Question 35
Incorrect
Remove flag
Question text
If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of
the circuit using Time Division Multiplexing (TDM)?
a.
500bps
b.
32kbps
c.
32bps
d.
500kbps
Question 36
Incorrect
Question text
Which of the following is not a type of memory hierarchy in a computer system?
a.
Virtual memory
b.
Cache memory
c.
Magnetic tape
d.
Registers
Question 37
Correct
Flag question
Question text
Which function is called in a pop() function?
a.
IsFull()
b.
IsEmpty()
Question 38
Correct
Flag question
Question text
What is the major characteristic of a computer virus?
a.
It steals sensitive data from a system
b.
It encrypts files and demands ransom for their release
c.
It spreads through email attachments
d.
It replicates by attaching itself to other files
e.
It spreads through network connections
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The attacker using a network of compromised devices is known as _____________
a.
Internet
b.
Botnet
c.
Telnet
d.
D-net
Question 40
Correct
Flag question
Question text
If you are asked to construct a finite automaton that accepts strings of the form “abn where n>=0”,
which of the following statement about the finite automata is false?
a.
The accepting state is q1
b.
The accepting state is q2
c.
None
d.
The initial state is q0
Question 41
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of system backups in administering systems?
a.
To recover data in the event of data loss or system failure
b.
To encrypt data during transmission
c.
To prevent unauthorized access to a system
d.
To develop software applications
e.
To monitor and detect suspicious activities or attacks
Question 42
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What makes Naive Bayes "naive"?
a.
It uses a single-layer neural network architecture.
b.
It is not suitable for classification tasks.
c.
It relies heavily on labeled data for training.
d.
It assumes that all features are independent of each other.
Question 43
Correct
Flag question
Question text
Which of the following is a network monitoring tool?
a.
All
b.
Nmap
c.
Nagios
d.
Wireshark
Question 44
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Assume there is aline of patients waiting for a servic from a clinic. Seriously sick patients should get a
service first, Whicg data structure is the most appropriate for the given type of real world problem?
a.
Queue
b.
Tree
c.
Priority Queue
d.
Stack
Question 45
Correct
Flag question
Question text
Which of the following is an equivalent the recurrence relation for T(n)=T(n-1)+2n-1?
a.
T(n)=T(n-1)+O(n-1)
b.
T(n)=T(n-1)+O(2n)
c.
T(n)=T(n-1)+O(1)
d.
T(n)=T(n-1)+O(n)
Question 46
Correct
Question text
Which resource is typically time multiplexed in an operating system?
a.
Compact Disk
b.
Network
c.
CPU
d.
Memory
Question 47
Correct
Flag question
Question text
What is the primary goal of a denial-of-service (DoS) attack?
a.
To modify or tamper with data on the transmission
b.
To disrupt or disable the availability of a service
c.
To gain unauthorized access to a network
d.
To intercept the data on the transmission
e.
To steal sensitive data from a system
Question 48
Correct
Question text
Which concept allows you to store the memory address of a variable in C++?
a.
Strings
b.
Arrays
c.
Pointers
d.
Structures
Question 49
Correct
Flag question
Question text
Which compiler runs on one machine and generates code for multiple machines?
a.
Onepass compiler
b.
Cross compiler
c.
Multipass compiler
d.
Optimizing compiler
Question 50
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Which of the following best describes the halting problem for Turing machines?
a.
The halting problem refers to the problem of determining whether a given Turing machine will
eventually halt or run indefinitely on a specific input.
b.
The halting problem refers to the problem of determining whether a given Turing machine can
recognize context-free languages.
c.
The halting problem refers to the problem of determining whether a given Turing machine can
simulate other computational models.
d.
The halting problem refers to the problem of determining whether a given Turing machine can solve
any computational problem.
Question 51
Correct
Flag question
Question text
What is the primary purpose of virtual memory in a computer system?
a.
All
b.
To provide a mechanism for memory protection
c.
To improve the performance of memory access
d.
To increase the available physical memory
Question 52
Correct
Flag question
Question text
::_______is the process of defining a set of subclasses of an entity type.
a.
Abstraction
b.
Generalization
c.
Aggregation
d.
Specialization
Question 53
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the main function of a router in a network?
a.
To connect multiple networks
b.
All
c.
To provide internet access
d.
To manage network traffic
Question 54
Correct
Question text
Which phase of the compiler checks the grammar of the programming?
a.
Code optimization
b.
Syntax Analysis
c.
Semantic analysis
d.
Code generation
Question 55
Correct
Flag question
Question text
Which of the following is NOT an objective of software security assurance?
a.
Protecting software from physical damage or theft
b.
Ensuring the confidentiality and integrity of software
c.
Protecting develop and implement robust software
d.
Verifying that software meets security requirements
e.
Detecting and preventing vulnerabilities in software
Question 56
Correct
Question text
::which one og the following is Composite attribute?
a.
Marriage status
b.
Name
c.
Age
d.
weight
Question 57
Correct
Flag question
Question text
Which one of the following is an attack on availability?
a.
Snooping
b.
Spoofing
c.
Delay
d.
Masquerading
Question 58
Correct
Mark 1.00 out of 1.00
Remove flag
Question text
Which of the following regular expressions represents the language that accepts strings over the
alphabet {0, 1} where the string contains at least one '0' and at least one '1'?
a.
0+1
b.
0+1+
c.
0*10*
d.
0*1*
Question 59
Correct
Flag question
Question text
Which of the following statements accurately describes the concept of a Turing machine's transition
function?
a.
The transition function defines the initial state of the Turing machine.
b.
The transition function determines the number of steps the Turing machine can perform before
halting.
c.
The transition function determines the input symbols that are accepted by the Turing machine.
d.
The transition function specifies the rules for changing the internal state and tape contents of the
Turing machine.
Question 60
Correct
Flag question
Question text
The elements are removed from a stack in________order?
a.
Sequential
b.
Hierarchical
c.
Linear
d.
Reverse
Question 61
Correct
Mark 1.00 out of 1.00
Remove flag
Question text
What is the purpose of a digital certificate in computer security?
a.
To encrypt data during transmission
b.
To protect against viruses and malware
c.
To authenticate the identity of users
d.
To monitor network traffic for suspicious activities
e.
To authenticate the identity of a website or entity
Question 62
Correct
Flag question
Question text
::In 2NF, which form of dependency is removed?
a.
Partial
b.
Associative
c.
Transitive
d.
Functional
Question 63
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
::What does the following relational algebra expression do? σ CGPA<= 3.5(Student)
a.
Finds all the tuples in student relation
b.
Finds all the tuples in student table where the CGPA is less than or equal to 3.5.
c.
Retrieve the CGPA attribute in Student where the CGPA is Less than or equal to 3.5.
d.
All are answer
Question 64
Incorrect
Question text
Which algorithm design technique is used to solve problems by storing and reusing the results of
subproblems?
a.
Greedy approach
b.
Divide and Conquer
c.
Dynamic Programming
d.
Backtracking
Question 65
Correct
Flag question
Question text
What is the responsibility of the operating system in allocating resources to various applications?
a.
A multiplexer
b.
A resource manager
c.
A virtual machine
d.
An extended machine
Question 66
Correct
Question text
Which traversal visits the parent node after its left and right children?
a.
Level order traversal
b.
Preorder traversal
c.
Inorder traversal
d.
Postorder traversal
Question 67
Incorrect
Flag question
Question text
Which network protocol is used for secure file transfer?
a.
SSH
b.
SSH and SFTP
c.
SFTP
d.
HTTPS
Question 68
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In Naive Bayes classification, how is the probability of a class calculated?
a.
By considering the joint prior frequencey of all features given in the dataset
b.
By using a decision tree algorithm
c.
By random selection of classes
d.
By averaging the feature values in each class
Question 69
Incorrect
Remove flag
Question text
What is the purpose of the symbol table in a compiler?
a.
To store the names and attributes of variables and functions
b.
S All
c.
To perform type checking
d.
To optimize the generated code
Question 70
Correct
Mark 1.00 out of 1.00
Flag question
Question text
::Which of the following protocols ensures conflict serializability and safety from deadlocks?
a.
Timestamp ordering protocol
b.
None of the mentioned
c.
Two-phase locking protocol
d.
Graph-based protocol
Question 71
Incorrect
Flag question
Question text
Which one of the following approaches define AI is “The art of creating machines that perform
functions that require intelligence when performed by people.”
a.
Acting rationally
b.
Thinking rationally
c.
Acting humanly
d.
Thinking humanly
Question 72
Correct
Question text
Communication channel is shared by all the machines on the network in ________
a.
anycast network
b.
unicast network
c.
broadcast network
d.
multicast network
Question 73
Correct
Flag question
Question text
The output of Kruskal and Prims algorithm is
a.
Spanning tree
b.
Minimum spanning tree
c.
None of these
d.
Maximum spanning tree
Question 74
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
What is the purpose of the address operator (&) in C++?
a.
To assign a value to a variable
b.
To declare a variable
c.
To obtain the memory address of a variable
d.
To access the value of a variable
Question 75
Correct
Flag question
Question text
::In relational model terminology,_____ is a set of allowable values for one or more attributes.
a.
domain
b.
range
c.
tuple
d.
relation
Question 76
Correct
Mark 1.00 out of 1.00
Remove flag
Question text
Consider a program P that consists of two source modules M1 and M2 contained in two different
files. If M1 contains a reference to a function defined in M2 the reference will be resolved
at__________________.
a.
Compile time
b.
Load time
c.
Link time
d.
Edit time
Question 77
Correct
Flag question
Question text
Which of the following is a type of interrupts in a computer system?
a.
Hardware interrupt
b.
Software interrupt
c.
Timer interrupt
d.
All
Question 78
Incorrect
Question text
Which one is a violation against confidentiality?
a.
Ayele registers the domain name "HaramayaUniversity.com" and refuses to let the publishing house
buy or use that domain name.
b.
Bekele crashes Tolosa's system.
c.
Bekele changes the amount of Abebech's check from $100 to $1000.
d.
Chala copies Abebe's homework.
Question 79
Correct
Flag question
Question text
Network congestion occurs _________
a.
in case of traffic overloading
b.
in case of transfer failure
c.
when a system terminates
d.
when connection between two nodes terminates
Question 80
Incorrect
Question text
Which operator is used to increment a variable by a specific value in C++?
a.
*=
b.
=
c.
+=
d.
++
Question 81
Correct
Flag question
Question text
Which of the following standard algorithms is not a Greedy algorithm?
a.
Dijkstra's shortest path algorithm
b.
Huffman Coding
c.
Kruskal algorithm
d.
Floyed warshal Algorithm
Question 82
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which subfield of AI is used for visual perception ?
a.
Computer vision
b.
Reinforcement learning
c.
Speech recognition
d.
Natural language processing
Question 83
Correct
Flag question
Question text
The PEAS in the task environment is about____________.
a.
Performance, Actuator, Sensor, Environment
b.
Peer, Environment, Actuator, Sensor
c.
Perceiving, Environment, Actuator, Sensor
d.
Performance, Environment, Actuator, Sensor
Question 84
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following cases doesn‟t exist in complexity theory?
a.
Worst case
b.
Tight case
c.
Average case
d.
Best case
Question 85
Correct
Flag question
Question text
From the following algorithm design techniques which one is used to find all the pairs of shortest
distances in a graph?
a.
Greedy
b.
Backtracking
c.
Dynamic programming
d.
Divide and Conquer
Question 86
Correct
Question text
What is the purpose of a bus in a computer system?
a.
To transmit data between components
b.
To control the flow of instructions
c.
To connect the CPU to input/output devices
d.
All
Question 87
Incorrect
Flag question
Question text
In a system using virtual memory, the physical memory is divided into ________and the virtual address
space is divided into equally-sized partitions called_______.
a.
Segment, Page
b.
Page, Segment
c.
Page frames, Pages
d.
Pages, Page frames
Question 88
Correct
Question text
Mr.Tadesse is explaining various malware types to new technical support personnel. He is explaining
to them the various types of malwares so that they can recognized them. What type of malware is a
key logger?
a.
Virus
b.
Buffer overflow
c.
Trojan horse
d.
Spyware
Question 89
Correct
Flag question
Question text
Which of the following is a type of code optimization performed by a compiler?
a.
Loop unrolling
b.
All
c.
Common subexpression elimination
d.
Register allocation
Question 90
Correct
Question text
::In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti)<W-
timestamp(Q), then
a.
Read operation is rejected
b.
Write operation is executed
c.
Write operation is rejected
d.
Read operation is executed
Question 91
Incorrect
Flag question
Question text
::The ___________ operation, in a relation that includes all tuples that are in both R and S tables.
a.
Intersection
b.
Set-difference
c.
Difference
d.
Union
Question 92
Correct
Question text
How is a single channel shared by multiple signals in a computer network?
a.
digital modulation
b.
multiplexing
c.
analog modulation
d.
phase modulation
Question 93
Correct
Flag question
Question text
Which loop statement is used when the number of iterations is not known in advance?
a.
While loop statement
b.
Switch statement
c.
For loop statement
d.
If...else statement
Question 94
Correct
Mark 1.00 out of 1.00
Flag question
Question text
::Which one of the followings is false about first normal forms?
a.
There are no transitive dependencies between a primary key and non-primary key attributes.
b.
It is used to disallow the multivalued attributes
c.
Composite attributes cannot be used in 1NF
d.
The only attribute values allowed are atomic values
Question 95
Correct
Flag question
Question text
Which control structure is used to repeat a set of statements as long as a condition is true?
a.
While loop statement
b.
If...else statement
c.
For loop statement
d.
Switch statement
Question 96
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Consider the following reference string: 1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5. Apply the FIFO page
replacement algorithm with a frame size of 3. How many page faults occur?
a.
9
b.
12
c.
11
d.
10
Question 97
Correct
Flag question
Question text
Which of the following routing algorithms can be used for network layer design?
a.
distance vector routing
b.
shortest path algorithm
c.
link state routing
d.
all
Question 98
Incorrect
Question text
What is the term for the part of the operating system responsible for managing the memory
hierarchy in a computer system?
a.
Memory abstraction unit
b.
Memory Manager
c.
Translation Lookaside Buffer
d.
Memory Management Unit
Question 99
Correct
Flag question
Question text
::Which of the following is true according to EER concept?
a.
The set of subclasses that forms a generalization is defined on the basis of some distinguishing
characteristics.
b.
Subclass member is the same as the entity in the super class, but in a distinct specific role.
c.
Subclass cannot participate in specific relationship types.
d.
Super class inherits all the attributes of the entity as the member of the subclass.
Question 100
Incorrect
Question text
What are identifiers in C++?
a.
Words used to define variables and constants
b.
Reserved words with predefined meanings in C++
c.
Words used to identify elements in a C++ program
d.
User-defined words used for program documentation
Question 101
Correct
Flag question
Question text
Which of the following is a common method for securing wireless networks?
a.
Plan and implement strong security policy
b.
All
c.
Enabling MAC filtering
d.
Regularly updating network router firmware
e.
Using strong encryption algorithms
Question 102
Correct
Question text
ICMP is primarily used for __________
a.
error and diagnostic functions
b.
forwarding
c.
addressing
d.
routing
Question 103
Incorrect
Flag question
Question text
Among the reasons that lead to deadlock in operating systems, which one is used to solve the inter-
process communication problem?
a.
Mutual exclusion
b.
Hold and Wait Condition
c.
Circular wait
d.
No preemption
Question 104
Correct
Question text
What is the term for an endpoint of an inter-process communication flow across a computer
network?
a.
pipe
b.
socket
c.
port
d.
machine
Question 105
Correct
Remove flag
Question text
What are the Methods to move data through a network of links and switches?
a.
Line switching and bit switching
b.
Packet switching and Circuit switching
c.
Packet switching and Line switching
d.
Circuit switching and Line switching
Question 106
Incorrect
Question text
Which of the following binary tree is filled level by level (Left to Right)?
a.
BST
b.
Complete binary tree.
c.
Balanced binary tree.
d.
Full binary tree.
Question 107
Incorrect
Flag question
Question text
::Which type of end users used canned transaction queries?
a.
Naive
b.
Casual
c.
Standalone
d.
Sophisticated
Question 108
Correct
Mark 1.00 out of 1.00
Flag question
Question text
::_____ is the process of transforming data into an unreadable form to anyone who does not know
the key.
a.
Data security
b.
Data encryption
c.
Database security management
d.
Data authentication
Question 109
Correct
Flag question
Question text
The time complexity of recurrence relation T(n)=3T(n-1)+n is ?
a.
O(n^3)
b.
O(2^n)
c.
O(3^n)
d.
O(n^2n)
Question 110
Correct
Question text
In tree Data structure, if a node has no parrent node, then the node is_______?
a.
Root Node
b.
Parent Node
c.
Internal Node
d.
External Node
Question 111
Incorrect
Flag question
Question text
A technique that allows a file to appear in more than one directory is called______.
a.
Mounting
b.
Merging
c.
Symbolizing
d.
Linking
Question 112
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the main function of the control unit in a computer system?
a.
Coordinate the flow of information between components
b.
Perform arithmetic and logical operations
c.
Manage memory access
d.
Fetch and execute instructions
Question 113
Incorrect
Flag question
Question text
In First order predicate logic a Statement contains______.
a.
Predicate and Preposition
b.
Predicate and Subject
c.
Subject and an Object
d.
True/False statement
Question 114
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The ____________ translates internet domain and host names to IP address.
a.
routing information protocol
b.
domain name system
c.
network time protocol
d.
internet relay chat
Question 115
Correct
Flag question
Question text
What is the primary aim of a computer threat such as ransomware?
a.
Gaining unauthorized access to a network
b.
Encrypting files and demanding ransom for their release
c.
Disrupting or disabling the availability of a service
d.
Stealing sensitive data from a system
e.
Intercept the data on the transmission
Question 116
Correct
Question text
Which type of Turing machien has two taps, one tape read-only and the other read-write tape?
a.
Multi-dimensional Turing Machien
b.
Multi-head Turing Machien
c.
Offline Turing machien
d.
Non-deterministic Turing machien
Question 117
Correct
Flag question
Question text
What is the rule in access control?
a.
Grant standard access for all users
b.
Grant the least access job requirements allow
c.
Strictly limited access for most users
d.
Grant the most access you can securely give
Question 118
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
Which algorithm is commonly used for parsing in a compiler?
a.
Depth-first search
b.
Breadth-first search
c.
LR(1) parsing
d.
LL(1) parsing
Question 119
Correct
Flag question
Question text
::_____ is an alternative to log-based recovery.
a.
Crash recovery
b.
Shadow paging
c.
Disk recovery
d.
Dish shadowing
Question 120
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In problem solving using search the representation of internal state is ______.
a.
Information Retrieval
b.
Mining of data
c.
Atomic
d.
Factored
Question 121
Correct
Flag question
Question text
Which statement about the round-robin scheduling algorithm is false?
a.
Characterized by using a quantum number for scheduling
b.
Characterized by its non-preemptive nature
c.
It's the fairest algorithm and most widely used algorithm
d.
Has higher context switch overhead
Question 122
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of the code generation phase in a compiler?
a.
To perform memory allocation
b.
To handle runtime errors
c.
To optimize the generated code
d.
To translate the intermediate representation into machine code
Question 123
Correct
Flag question
Question text
Which of the following is a type of parser used in a compiler?
a.
All
b.
GLR parser
c.
Shift-reduce parser
d.
Recursive descent parser
Question 124
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the purpose of a function in programming?
a.
To declare variables
b.
To perform arithmetic operations
c.
To define the program's structure
d.
To encapsulate a set of instructions for reuse
Question 125
Incorrect
Flag question
Question text
::A transaction A holds shared lock X. If transaction B also requests for shared lock on X___
a.
It will result in a deadlock situation
b.
It„ll be granted as soon as released by A
c.
It will immediately be rejected
d.
It will immediately be granted
Question 126
Correct
Mark 1.00 out of 1.00
Remove flag
Question text
Which type of agent is most suitable for dynamic and unknown environments where the state of the
world changes frequently?
a.
Learning agent
b.
Rational agent
c.
Reflex agent
d.
Goal-based agent
Question 127
Incorrect
Flag question
Question text
What is the primary purpose of a firewall in a network?
a.
To manage user accounts
b.
To enhance network security
c.
To block unauthorized access to the network
d.
To improve network performance
Question 128
Incorrect
Question text
What is the primary purpose of a Virtual Private Network (VPN)?
a.
To provide remote access to a network
b.
To enhance network security
c.
All
d.
To improve network performance
Question 129
Incorrect
Remove flag
Question text
::Which of the following is incorrect about constraints on generalization and specialization?
a.
A double line is used to display a total specialization.
b.
In disjoint constraints the same entity may be a member of more than one subclass of the
specialization.
c.
In disjoint constraints an entity can be a member of at least one of the subclasses of the
specialization.
d.
In total specialization every entity in the super class must be a member of at least one subclass in the
specialization.
Question 130
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which protocol is used for dynamic IP address assignment in a network?
a.
DNS
b.
FTP
c.
SNMP
d.
DHCP
Question 131
Incorrect
Remove flag
Question text
__________ represents the class of problems that are at least as hard as the hardest problems in NP?
a.
PSPACE
b.
NP Complete
c.
EXP
d.
NP Hard
Question 132
Correct
Question text
What is the role of the lexical analyzer in a compiler?
a.
To perform type checking
b.
To perform syntax analysis
c.
To generate the parse tree
d.
To identify the basic language constructs (tokens)
Question 133
Correct
Flag question
Question text
What is the Turing Test in the context of AI?
a.
A test to measure a machine's processing power
b.
A test to evaluate the speed of AI algorithms
c.
A test to measure a machine ability to exhibit intelligent behavior indistinguishable from that of a
human
d.
A test for computer hardware performance
Question 134
Incorrect
Question text
::In which the database can be restored up to the last consistent state after the system failure?
a.
Recovery
b.
None
c.
Backup
d.
Both
Question 135
Incorrect
Flag question
Question text
::The deadlock state can be changed back to the stable state by using _____________ statement.
a.
Deadlock
b.
Commit
c.
Savepoint
d.
Rollback
Question 136
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
From the following sorting algorithms which has the lowest worst case complexity?
a.
Merge sort
b.
Quick sort
c.
Selection sort
d.
Bubble sort
Question 137
Correct
Remove flag
Question text
::For a backup/restore system, _____ is a prerequisite for service in an enterprise.
a.
Filter
b.
Recovery
c.
Scalability
d.
Security
Question 138
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is not a built-in data type in C++?
a.
Float
b.
Int
c.
String
d.
char
Question 139
Correct
Flag question
Question text
Size of large data files can be reduced to save storage space. Which algorithm is appropriate to
reduce size of large data files?
a.
Prims Algorithm
b.
Merge Sort algorithm
c.
Heap Sort Algorithm
d.
Huffman Encoding algorithm
Question 140
Incorrect
Question text
What is the average time complexity for search, insertion, and deletion operations in a hash table
with a good hash function and no collisions?
a.
O(1)
b.
O(n log n)
c.
O(log n)
d.
O(n)
Question 141
Correct
Flag question
Question text
Which of the following is a characteristic of RISC (Reduced Instruction Set Computer) architecture?
a.
Fewer registers
b.
Longer instruction execution time
c.
Complex instruction set
d.
Simpler instruction set
Question 142
Incorrect
Question text
Which of the following problems are solved in polynomial time by deterministic Turing machine?
a.
Quick sort
b.
Traveling salesman problem
c.
Graph coloring
d.
Satisfiability Problem
Question 143
Correct
Flag question
Question text
What is the purpose of the semantic analysis phase in a compiler?
a.
To handle runtime errors
b.
To generate the intermediate representation
c.
To optimize the generated code
d.
To perform type checking and type conversion
Question 144
Incorrect
Mark 0.00 out of 1.00
Remove flag
Question text
::____ deals with soft errors, such as power failures.
a.
Failure recovery
b.
System recovery
c.
Media recovery
d.
Database recovery