[go: up one dir, main page]

0% found this document useful (0 votes)
24 views72 pages

model with answer

The document consists of a series of multiple-choice questions covering various topics in computer science, including data models, network segmentation, algorithms, and computer security. Each question is followed by options, with some marked correct or incorrect. The content is educational and assesses knowledge in computer systems and programming concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views72 pages

model with answer

The document consists of a series of multiple-choice questions covering various topics in computer science, including data models, network segmentation, algorithms, and computer security. Each question is followed by options, with some marked correct or incorrect. The content is educational and assesses knowledge in computer systems and programming concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

::which one of the following is true about Relational Data Model?

a.
It can be define more flexible and complex relationship.
b.
Entries with repeating groups are said to be normalized.
c.
Only view Tables are physically stored.
d.
Order of rows and columns is material.

What is the purpose of network segmentation in a network?

a.
To enhance network security
b.
All
c.
To manage network traffic
d.
To improve network performance

Question 3

Correct
Mark 1.00 out of 1.00

Flag question

Question text
In IPv4 Addresses, classful addressing is replaced with ________

a.
Classful Addressing
b.
Classless Addressing
c.
Classful Advertising
d.
Classless Advertising
Question 4

Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which control statement is used for executing different blocks of code based on multiple
conditions?

a.
While loop statement
b.
For loop statement
c.
If...else statement
d.
Switch statement

Question 5

Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which graph traversal algorithm is used to find the shortest path between two nodes?

a.
Dijkstra's Algorithm
b.
Depth-First Search (DFS)
c.
Kruskal's Algorithm
d.
Breadth-First Search (BFS)

Question 6
Correct

Mark 1.00 out of 1.00

Flag question

Question text
Consider the following sequential free memory block (partition) sizes available for allocation: Block
A=100 KB, Block B=200 KB, Block C=150 KB, Block D=300 KB, and Block E=250 KB. By using the First
Fit algorithm if we allocate the following processes: P1 requires 120 KB, P2 requires 250 KB, P3
requires 180 KB. Which process goes into which memory block?

a.
P1: Block B, P2: Block E, P3: Block A
b.
P1: Block D, P2: Block E, P3: will not be allocated to any partition
c.
P1: Block B, P2: Block D, P3: Block E
d.
P1: Block A, P2: Block D, P3: Block E

Question 7

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::Employee (Emp_ Id, Emp_name, emp_salary), here the Employee is __________ and Emp_ Id,
Emp_name, emp_salary are _________.

a.
Tuple, Primary key
b.
Table, Attribute
c.
Attributes, Relation
d.
row, Column
Question 8

Incorrect
Mark 0.00 out of 1.00

Remove flag

Question text
which one of the following search algorithm requires less memory?

a.
Linear Search
b.
Depth First Search
c.
Optimal Search
d.
Breadth-First Search

Question 9

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
::A functional dependency is a relationship between/among ___________

a.
Rows
b.
Tables
c.
Attributes
d.
Entities

Question 10
Correct

Mark 1.00 out of 1.00

Flag question

Question text
___________ is a theoretical construct of Turing machine that can simulate any other Turing machine.

a.
Multi-tape Turing machine
b.
Universal Turing machine
c.
Multi track Turing machine
d.
Semi-infinite Tape

Question 11

Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of pipelining in a computer architecture?

a.
To reduce the power consumption of the CPU
b.
To increase the speed of instruction execution
c.
To enhance the reliability of the system
d.
To improve the efficiency of memory access

Question 12

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Push(A), Push(B), Pop(), Push(C),Pop(),Push(D),Push(E), after completion of those operations the total
number of element present in stack is_________?

a.
1
b.
2
c.
4
d.
3

Question 13

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the main function of the arithmetic logic unit (ALU) in a CPU?

a.
Fetch and decode instructions
b.
Perform arithmetic and logical operations
c.
Manage memory access
d.
Control the flow of execution

Question 14

Correct

Mark 1.00 out of 1.00


Remove flag

Question text
Which of the following is not a common network topology?

a.
Star topology
b.
Pyramid topology
c.
Bus topology
d.
Ring topology

Question 15

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a data link protocol?

a.
all of the mentioned
b.
hdlc
c.
ethernet
d.
point to point protocol

Question 16

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
Which of the following tasks is an example of unsupervised learning?

a.
Predicting the price of a house based on the number of rooms
b.
Customer segmentation based on their purchasing behavior
c.
Predicting the age of a person based on their social media activity
d.
Classifying emails into spam or non-spam categories

Question 17

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What differs deep learning from traditional machine learning approaches?

a.
Deep learning is only suitable for classification tasks.
b.
Deep learning is subfield of AI
c.
Deep learning does not require labeled data for training.
d.
Deep learning models have multiple number of layers which enable them to automatically learn
feature extraction and selection.

Question 18

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which of the following is a characteristic of a non-deterministic finite automaton (NFA)?

a.
An NFA requires a stack to store its state transitions.
b.
An NFA can only recognize regular languages.
c.
An NFA can have multiple possible transitions for a given input symbol and current state.
d.
An NFA can recognize context-free languages.

Question 19

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
What is the main function of the branch prediction mechanism in a CPU?

a.
To improve the accuracy of branch instructions
b.
To enhance the overall performance of the CPU
c.
To reduce the number of branch instructions
d.
To minimize the impact of branch mispredictions

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text
_________is the minimum number of steps that can executed for the given parameters?

a.
Worst case
b.
Average case
c.
Best case
d.
Time complexity

Question 21

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following is a characteristic of CISC (Complex Instruction Set Computer) architecture?

a.
Longer instruction execution time
b.
Fewer registers
c.
Simpler instruction set
d.
Variable-length instructions

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Mr.Akubazgi is teaching an introductory computer security course and is trying to explain the
terminology to students. What is the term for a person who uses tools to hack without
understanding the underlying technology?

a.
A script kiddy
b.
A white hat hacker
c.
A gray hat hacker
d.
A novice

Question 23

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::Checkpoints are a part of____ measures.

a.
Concurrency
b.
Security
c.
Recovery
d.
Authorization

Question 24

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which of the following is a key application of context-free grammars?

a.
Network security.
b.
Natural language processing.
c.
Image processing.
d.
Database management.

Question 25

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which operator is used for assignment in C++?

a.
=
b.
+=
c.
==
d.
/=

Question 26

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text
Which one of the following algorithms is not applicable for digital signature?

a.
RSA
b.
Elliptic Curve
c.
Diffie-Hellman
d.
DSS

Question 27

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Three or more devices share a link in ________ connection.

a.
Multipoint
b.
Point to point
c.
Unipoint
d.
Simplex

Question 28

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text
How can you pass the value of a function by value in C++?

a.
By using the "return" statement in the function
b.
By assigning the value to a global variable
c.
By passing the value directly as a function argument
d.
By declaring a pointer variable as a function parameter

Question 29

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of an Intrusion Detection System (IDS) in computer security?

a.
To prevent unauthorized access to a network
b.
To detect and alert on suspicious network activities
c.
To recover data after a system failure or disaster
d.
To encrypt data during transmission
e.
To encrypt data during transmission

Question 30

Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is the main function of a network switch?

a.
To connect multiple network devices
b.
To provide internet access
c.
To enhance network security
d.
To manage network traffic

Question 31

Correct

Mark 1.00 out of 1.00

Remove flag

Question text
::Most backup and recovery commands in _____ are executed by server sessions.

a.
Recovery Manager
b.
Backup Manager
c.
Backup and Recovery Manager
d.
Database Manager

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which loop statement is guaranteed to execute its body at least once?

a.
For loop statement
b.
Do...while statement
c.
If...else statement
d.
Switch statement

Question 33

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::Which of the following is not a recovery technique?

a.
Deferred update
b.
Recovery management
c.
Two-phase commit
d.
Immediate update

Question 34

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text
Merge sort is a stable algorithm. What does "stable" mean in the context of sorting algorithms?

a.
The algorithm has a predictable time complexity.
b.
The algorithm maintains the relative order of elements with equal values.
c.
The algorithm is guaranteed to terminate.
d.
The algorithm is efficient for large input sizes.

Question 35

Incorrect

Mark 0.00 out of 1.00

Remove flag

Question text
If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of
the circuit using Time Division Multiplexing (TDM)?

a.
500bps
b.
32kbps
c.
32bps
d.
500kbps

Question 36

Incorrect

Mark 0.00 out of 1.00


Remove flag

Question text
Which of the following is not a type of memory hierarchy in a computer system?

a.
Virtual memory
b.
Cache memory
c.
Magnetic tape
d.
Registers

Question 37

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which function is called in a pop() function?

a.
IsFull()
b.
IsEmpty()

Question 38

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the major characteristic of a computer virus?

a.
It steals sensitive data from a system
b.
It encrypts files and demands ransom for their release
c.
It spreads through email attachments
d.
It replicates by attaching itself to other files
e.
It spreads through network connections

Question 39

Correct
Mark 1.00 out of 1.00

Flag question

Question text
The attacker using a network of compromised devices is known as _____________

a.
Internet
b.
Botnet
c.
Telnet
d.
D-net

Question 40

Correct

Mark 1.00 out of 1.00

Flag question
Question text
If you are asked to construct a finite automaton that accepts strings of the form “abn where n>=0”,
which of the following statement about the finite automata is false?

a.
The accepting state is q1
b.
The accepting state is q2
c.
None
d.
The initial state is q0

Question 41

Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of system backups in administering systems?

a.
To recover data in the event of data loss or system failure
b.
To encrypt data during transmission
c.
To prevent unauthorized access to a system
d.
To develop software applications
e.
To monitor and detect suspicious activities or attacks

Question 42

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
What makes Naive Bayes "naive"?

a.
It uses a single-layer neural network architecture.
b.
It is not suitable for classification tasks.
c.
It relies heavily on labeled data for training.
d.
It assumes that all features are independent of each other.

Question 43

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a network monitoring tool?

a.
All
b.
Nmap
c.
Nagios
d.
Wireshark

Question 44

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Assume there is aline of patients waiting for a servic from a clinic. Seriously sick patients should get a
service first, Whicg data structure is the most appropriate for the given type of real world problem?

a.
Queue
b.
Tree
c.
Priority Queue
d.
Stack

Question 45

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is an equivalent the recurrence relation for T(n)=T(n-1)+2n-1?

a.
T(n)=T(n-1)+O(n-1)
b.
T(n)=T(n-1)+O(2n)
c.
T(n)=T(n-1)+O(1)
d.
T(n)=T(n-1)+O(n)

Question 46

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which resource is typically time multiplexed in an operating system?

a.
Compact Disk
b.
Network
c.
CPU
d.
Memory

Question 47

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary goal of a denial-of-service (DoS) attack?

a.
To modify or tamper with data on the transmission
b.
To disrupt or disable the availability of a service
c.
To gain unauthorized access to a network
d.
To intercept the data on the transmission
e.
To steal sensitive data from a system

Question 48

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which concept allows you to store the memory address of a variable in C++?

a.
Strings
b.
Arrays
c.
Pointers
d.
Structures

Question 49

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which compiler runs on one machine and generates code for multiple machines?

a.
Onepass compiler
b.
Cross compiler
c.
Multipass compiler
d.
Optimizing compiler

Question 50

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
Which of the following best describes the halting problem for Turing machines?

a.
The halting problem refers to the problem of determining whether a given Turing machine will
eventually halt or run indefinitely on a specific input.
b.
The halting problem refers to the problem of determining whether a given Turing machine can
recognize context-free languages.
c.
The halting problem refers to the problem of determining whether a given Turing machine can
simulate other computational models.
d.
The halting problem refers to the problem of determining whether a given Turing machine can solve
any computational problem.

Question 51

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary purpose of virtual memory in a computer system?

a.
All
b.
To provide a mechanism for memory protection
c.
To improve the performance of memory access
d.
To increase the available physical memory

Question 52
Correct

Mark 1.00 out of 1.00

Flag question

Question text
::_______is the process of defining a set of subclasses of an entity type.

a.
Abstraction
b.
Generalization
c.
Aggregation
d.
Specialization

Question 53

Correct
Mark 1.00 out of 1.00

Flag question

Question text
What is the main function of a router in a network?

a.
To connect multiple networks
b.
All
c.
To provide internet access
d.
To manage network traffic

Question 54

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which phase of the compiler checks the grammar of the programming?

a.
Code optimization
b.
Syntax Analysis
c.
Semantic analysis
d.
Code generation

Question 55

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is NOT an objective of software security assurance?

a.
Protecting software from physical damage or theft
b.
Ensuring the confidentiality and integrity of software
c.
Protecting develop and implement robust software
d.
Verifying that software meets security requirements
e.
Detecting and preventing vulnerabilities in software

Question 56

Correct

Mark 1.00 out of 1.00


Flag question

Question text
::which one og the following is Composite attribute?

a.
Marriage status
b.
Name
c.
Age
d.
weight

Question 57

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which one of the following is an attack on availability?

a.
Snooping
b.
Spoofing
c.
Delay
d.
Masquerading

Question 58

Correct
Mark 1.00 out of 1.00
Remove flag

Question text
Which of the following regular expressions represents the language that accepts strings over the
alphabet {0, 1} where the string contains at least one '0' and at least one '1'?

a.
0+1
b.
0+1+
c.
0*10*
d.
0*1*

Question 59

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following statements accurately describes the concept of a Turing machine's transition
function?

a.
The transition function defines the initial state of the Turing machine.
b.
The transition function determines the number of steps the Turing machine can perform before
halting.
c.
The transition function determines the input symbols that are accepted by the Turing machine.
d.
The transition function specifies the rules for changing the internal state and tape contents of the
Turing machine.

Question 60
Correct

Mark 1.00 out of 1.00

Flag question

Question text
The elements are removed from a stack in________order?

a.
Sequential
b.
Hierarchical
c.
Linear
d.
Reverse

Question 61

Correct
Mark 1.00 out of 1.00

Remove flag

Question text
What is the purpose of a digital certificate in computer security?

a.
To encrypt data during transmission
b.
To protect against viruses and malware
c.
To authenticate the identity of users
d.
To monitor network traffic for suspicious activities
e.
To authenticate the identity of a website or entity

Question 62
Correct

Mark 1.00 out of 1.00

Flag question

Question text
::In 2NF, which form of dependency is removed?

a.
Partial
b.
Associative
c.
Transitive
d.
Functional

Question 63

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
::What does the following relational algebra expression do? σ CGPA<= 3.5(Student)

a.
Finds all the tuples in student relation
b.
Finds all the tuples in student table where the CGPA is less than or equal to 3.5.
c.
Retrieve the CGPA attribute in Student where the CGPA is Less than or equal to 3.5.
d.
All are answer

Question 64

Incorrect

Mark 0.00 out of 1.00


Remove flag

Question text
Which algorithm design technique is used to solve problems by storing and reusing the results of
subproblems?

a.
Greedy approach
b.
Divide and Conquer
c.
Dynamic Programming
d.
Backtracking

Question 65

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the responsibility of the operating system in allocating resources to various applications?

a.
A multiplexer
b.
A resource manager
c.
A virtual machine
d.
An extended machine

Question 66

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which traversal visits the parent node after its left and right children?

a.
Level order traversal
b.
Preorder traversal
c.
Inorder traversal
d.
Postorder traversal

Question 67

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which network protocol is used for secure file transfer?

a.
SSH
b.
SSH and SFTP
c.
SFTP
d.
HTTPS

Question 68

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
In Naive Bayes classification, how is the probability of a class calculated?

a.
By considering the joint prior frequencey of all features given in the dataset
b.
By using a decision tree algorithm
c.
By random selection of classes
d.
By averaging the feature values in each class

Question 69

Incorrect

Mark 0.00 out of 1.00

Remove flag

Question text
What is the purpose of the symbol table in a compiler?

a.
To store the names and attributes of variables and functions
b.
S All
c.
To perform type checking
d.
To optimize the generated code

Question 70

Correct
Mark 1.00 out of 1.00
Flag question

Question text
::Which of the following protocols ensures conflict serializability and safety from deadlocks?

a.
Timestamp ordering protocol
b.
None of the mentioned
c.
Two-phase locking protocol
d.
Graph-based protocol

Question 71

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which one of the following approaches define AI is “The art of creating machines that perform
functions that require intelligence when performed by people.”

a.
Acting rationally
b.
Thinking rationally
c.
Acting humanly
d.
Thinking humanly

Question 72

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Communication channel is shared by all the machines on the network in ________

a.
anycast network
b.
unicast network
c.
broadcast network
d.
multicast network

Question 73

Correct

Mark 1.00 out of 1.00

Flag question

Question text
The output of Kruskal and Prims algorithm is

a.
Spanning tree
b.
Minimum spanning tree
c.
None of these
d.
Maximum spanning tree

Question 74

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
What is the purpose of the address operator (&) in C++?

a.
To assign a value to a variable
b.
To declare a variable
c.
To obtain the memory address of a variable
d.
To access the value of a variable

Question 75

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::In relational model terminology,_____ is a set of allowable values for one or more attributes.

a.
domain
b.
range
c.
tuple
d.
relation

Question 76

Correct
Mark 1.00 out of 1.00
Remove flag

Question text
Consider a program P that consists of two source modules M1 and M2 contained in two different
files. If M1 contains a reference to a function defined in M2 the reference will be resolved
at__________________.

a.
Compile time
b.
Load time
c.
Link time
d.
Edit time

Question 77

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a type of interrupts in a computer system?

a.
Hardware interrupt
b.
Software interrupt
c.
Timer interrupt
d.
All

Question 78

Incorrect

Mark 0.00 out of 1.00


Remove flag

Question text
Which one is a violation against confidentiality?

a.
Ayele registers the domain name "HaramayaUniversity.com" and refuses to let the publishing house
buy or use that domain name.
b.
Bekele crashes Tolosa's system.
c.
Bekele changes the amount of Abebech's check from $100 to $1000.
d.
Chala copies Abebe's homework.

Question 79

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Network congestion occurs _________

a.
in case of traffic overloading
b.
in case of transfer failure
c.
when a system terminates
d.
when connection between two nodes terminates

Question 80

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
Which operator is used to increment a variable by a specific value in C++?

a.
*=
b.
=
c.
+=
d.
++

Question 81

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following standard algorithms is not a Greedy algorithm?

a.
Dijkstra's shortest path algorithm
b.
Huffman Coding
c.
Kruskal algorithm
d.
Floyed warshal Algorithm

Question 82

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which subfield of AI is used for visual perception ?

a.
Computer vision
b.
Reinforcement learning
c.
Speech recognition
d.
Natural language processing

Question 83

Correct

Mark 1.00 out of 1.00

Flag question

Question text
The PEAS in the task environment is about____________.

a.
Performance, Actuator, Sensor, Environment
b.
Peer, Environment, Actuator, Sensor
c.
Perceiving, Environment, Actuator, Sensor
d.
Performance, Environment, Actuator, Sensor

Question 84

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following cases doesn‟t exist in complexity theory?

a.
Worst case
b.
Tight case
c.
Average case
d.
Best case

Question 85

Correct

Mark 1.00 out of 1.00

Flag question

Question text
From the following algorithm design techniques which one is used to find all the pairs of shortest
distances in a graph?

a.
Greedy
b.
Backtracking
c.
Dynamic programming
d.
Divide and Conquer

Question 86

Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is the purpose of a bus in a computer system?

a.
To transmit data between components
b.
To control the flow of instructions
c.
To connect the CPU to input/output devices
d.
All

Question 87

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
In a system using virtual memory, the physical memory is divided into ________and the virtual address
space is divided into equally-sized partitions called_______.

a.
Segment, Page
b.
Page, Segment
c.
Page frames, Pages
d.
Pages, Page frames

Question 88

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Mr.Tadesse is explaining various malware types to new technical support personnel. He is explaining
to them the various types of malwares so that they can recognized them. What type of malware is a
key logger?

a.
Virus
b.
Buffer overflow
c.
Trojan horse
d.
Spyware

Question 89

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a type of code optimization performed by a compiler?

a.
Loop unrolling
b.
All
c.
Common subexpression elimination
d.
Register allocation

Question 90

Correct

Mark 1.00 out of 1.00


Flag question

Question text
::In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti)<W-
timestamp(Q), then

a.
Read operation is rejected
b.
Write operation is executed
c.
Write operation is rejected
d.
Read operation is executed

Question 91

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
::The ___________ operation, in a relation that includes all tuples that are in both R and S tables.

a.
Intersection
b.
Set-difference
c.
Difference
d.
Union

Question 92

Correct

Mark 1.00 out of 1.00


Flag question

Question text
How is a single channel shared by multiple signals in a computer network?

a.
digital modulation
b.
multiplexing
c.
analog modulation
d.
phase modulation

Question 93

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which loop statement is used when the number of iterations is not known in advance?

a.
While loop statement
b.
Switch statement
c.
For loop statement
d.
If...else statement

Question 94

Correct
Mark 1.00 out of 1.00
Flag question

Question text
::Which one of the followings is false about first normal forms?

a.
There are no transitive dependencies between a primary key and non-primary key attributes.
b.
It is used to disallow the multivalued attributes
c.
Composite attributes cannot be used in 1NF
d.
The only attribute values allowed are atomic values

Question 95

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which control structure is used to repeat a set of statements as long as a condition is true?

a.
While loop statement
b.
If...else statement
c.
For loop statement
d.
Switch statement

Question 96

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Consider the following reference string: 1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5. Apply the FIFO page
replacement algorithm with a frame size of 3. How many page faults occur?

a.
9
b.
12
c.
11
d.
10

Question 97

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following routing algorithms can be used for network layer design?

a.
distance vector routing
b.
shortest path algorithm
c.
link state routing
d.
all

Question 98

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
What is the term for the part of the operating system responsible for managing the memory
hierarchy in a computer system?

a.
Memory abstraction unit
b.
Memory Manager
c.
Translation Lookaside Buffer
d.
Memory Management Unit

Question 99

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::Which of the following is true according to EER concept?

a.
The set of subclasses that forms a generalization is defined on the basis of some distinguishing
characteristics.
b.
Subclass member is the same as the entity in the super class, but in a distinct specific role.
c.
Subclass cannot participate in specific relationship types.
d.
Super class inherits all the attributes of the entity as the member of the subclass.

Question 100

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
What are identifiers in C++?

a.
Words used to define variables and constants
b.
Reserved words with predefined meanings in C++
c.
Words used to identify elements in a C++ program
d.
User-defined words used for program documentation

Question 101

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a common method for securing wireless networks?

a.
Plan and implement strong security policy
b.
All
c.
Enabling MAC filtering
d.
Regularly updating network router firmware
e.
Using strong encryption algorithms

Question 102

Correct

Mark 1.00 out of 1.00


Flag question

Question text
ICMP is primarily used for __________

a.
error and diagnostic functions
b.
forwarding
c.
addressing
d.
routing

Question 103

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Among the reasons that lead to deadlock in operating systems, which one is used to solve the inter-
process communication problem?

a.
Mutual exclusion
b.
Hold and Wait Condition
c.
Circular wait
d.
No preemption

Question 104

Correct

Mark 1.00 out of 1.00


Remove flag

Question text
What is the term for an endpoint of an inter-process communication flow across a computer
network?

a.
pipe
b.
socket
c.
port
d.
machine

Question 105

Correct

Mark 1.00 out of 1.00

Remove flag

Question text
What are the Methods to move data through a network of links and switches?

a.
Line switching and bit switching
b.
Packet switching and Circuit switching
c.
Packet switching and Line switching
d.
Circuit switching and Line switching

Question 106

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
Which of the following binary tree is filled level by level (Left to Right)?

a.
BST
b.
Complete binary tree.
c.
Balanced binary tree.
d.
Full binary tree.

Question 107

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
::Which type of end users used canned transaction queries?

a.
Naive
b.
Casual
c.
Standalone
d.
Sophisticated

Question 108

Correct
Mark 1.00 out of 1.00
Flag question

Question text
::_____ is the process of transforming data into an unreadable form to anyone who does not know
the key.

a.
Data security
b.
Data encryption
c.
Database security management
d.
Data authentication

Question 109

Correct

Mark 1.00 out of 1.00

Flag question

Question text
The time complexity of recurrence relation T(n)=3T(n-1)+n is ?

a.
O(n^3)
b.
O(2^n)
c.
O(3^n)
d.
O(n^2n)

Question 110

Correct

Mark 1.00 out of 1.00


Flag question

Question text
In tree Data structure, if a node has no parrent node, then the node is_______?

a.
Root Node
b.
Parent Node
c.
Internal Node
d.
External Node

Question 111

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
A technique that allows a file to appear in more than one directory is called______.

a.
Mounting
b.
Merging
c.
Symbolizing
d.
Linking

Question 112

Correct
Mark 1.00 out of 1.00
Flag question

Question text
What is the main function of the control unit in a computer system?

a.
Coordinate the flow of information between components
b.
Perform arithmetic and logical operations
c.
Manage memory access
d.
Fetch and execute instructions

Question 113

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
In First order predicate logic a Statement contains______.

a.
Predicate and Preposition
b.
Predicate and Subject
c.
Subject and an Object
d.
True/False statement

Question 114

Correct
Mark 1.00 out of 1.00
Flag question

Question text
The ____________ translates internet domain and host names to IP address.

a.
routing information protocol
b.
domain name system
c.
network time protocol
d.
internet relay chat

Question 115

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the primary aim of a computer threat such as ransomware?

a.
Gaining unauthorized access to a network
b.
Encrypting files and demanding ransom for their release
c.
Disrupting or disabling the availability of a service
d.
Stealing sensitive data from a system
e.
Intercept the data on the transmission

Question 116

Correct

Mark 1.00 out of 1.00


Flag question

Question text
Which type of Turing machien has two taps, one tape read-only and the other read-write tape?

a.
Multi-dimensional Turing Machien
b.
Multi-head Turing Machien
c.
Offline Turing machien
d.
Non-deterministic Turing machien

Question 117

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the rule in access control?

a.
Grant standard access for all users
b.
Grant the least access job requirements allow
c.
Strictly limited access for most users
d.
Grant the most access you can securely give

Question 118

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text
Which algorithm is commonly used for parsing in a compiler?

a.
Depth-first search
b.
Breadth-first search
c.
LR(1) parsing
d.
LL(1) parsing

Question 119

Correct

Mark 1.00 out of 1.00

Flag question

Question text
::_____ is an alternative to log-based recovery.

a.
Crash recovery
b.
Shadow paging
c.
Disk recovery
d.
Dish shadowing

Question 120

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
In problem solving using search the representation of internal state is ______.

a.
Information Retrieval
b.
Mining of data
c.
Atomic
d.
Factored

Question 121

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which statement about the round-robin scheduling algorithm is false?

a.
Characterized by using a quantum number for scheduling
b.
Characterized by its non-preemptive nature
c.
It's the fairest algorithm and most widely used algorithm
d.
Has higher context switch overhead

Question 122

Correct
Mark 1.00 out of 1.00
Flag question

Question text
What is the purpose of the code generation phase in a compiler?

a.
To perform memory allocation
b.
To handle runtime errors
c.
To optimize the generated code
d.
To translate the intermediate representation into machine code

Question 123

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a type of parser used in a compiler?

a.
All
b.
GLR parser
c.
Shift-reduce parser
d.
Recursive descent parser

Question 124

Correct
Mark 1.00 out of 1.00
Flag question

Question text
What is the purpose of a function in programming?

a.
To declare variables
b.
To perform arithmetic operations
c.
To define the program's structure
d.
To encapsulate a set of instructions for reuse

Question 125

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
::A transaction A holds shared lock X. If transaction B also requests for shared lock on X___

a.
It will result in a deadlock situation
b.
It„ll be granted as soon as released by A
c.
It will immediately be rejected
d.
It will immediately be granted

Question 126

Correct
Mark 1.00 out of 1.00
Remove flag

Question text
Which type of agent is most suitable for dynamic and unknown environments where the state of the
world changes frequently?

a.
Learning agent
b.
Rational agent
c.
Reflex agent
d.
Goal-based agent

Question 127

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
What is the primary purpose of a firewall in a network?

a.
To manage user accounts
b.
To enhance network security
c.
To block unauthorized access to the network
d.
To improve network performance

Question 128

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
What is the primary purpose of a Virtual Private Network (VPN)?

a.
To provide remote access to a network
b.
To enhance network security
c.
All
d.
To improve network performance

Question 129

Incorrect

Mark 0.00 out of 1.00

Remove flag

Question text
::Which of the following is incorrect about constraints on generalization and specialization?

a.
A double line is used to display a total specialization.
b.
In disjoint constraints the same entity may be a member of more than one subclass of the
specialization.
c.
In disjoint constraints an entity can be a member of at least one of the subclasses of the
specialization.
d.
In total specialization every entity in the super class must be a member of at least one subclass in the
specialization.

Question 130

Correct
Mark 1.00 out of 1.00

Flag question

Question text
Which protocol is used for dynamic IP address assignment in a network?

a.
DNS
b.
FTP
c.
SNMP
d.
DHCP

Question 131

Incorrect

Mark 0.00 out of 1.00

Remove flag

Question text
__________ represents the class of problems that are at least as hard as the hardest problems in NP?

a.
PSPACE
b.
NP Complete
c.
EXP
d.
NP Hard

Question 132

Correct

Mark 1.00 out of 1.00


Flag question

Question text
What is the role of the lexical analyzer in a compiler?

a.
To perform type checking
b.
To perform syntax analysis
c.
To generate the parse tree
d.
To identify the basic language constructs (tokens)

Question 133

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the Turing Test in the context of AI?

a.
A test to measure a machine's processing power
b.
A test to evaluate the speed of AI algorithms
c.
A test to measure a machine ability to exhibit intelligent behavior indistinguishable from that of a
human
d.
A test for computer hardware performance

Question 134

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
::In which the database can be restored up to the last consistent state after the system failure?

a.
Recovery
b.
None
c.
Backup
d.
Both

Question 135

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
::The deadlock state can be changed back to the stable state by using _____________ statement.

a.
Deadlock
b.
Commit
c.
Savepoint
d.
Rollback

Question 136

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text
From the following sorting algorithms which has the lowest worst case complexity?

a.
Merge sort
b.
Quick sort
c.
Selection sort
d.
Bubble sort

Question 137

Correct

Mark 1.00 out of 1.00

Remove flag

Question text
::For a backup/restore system, _____ is a prerequisite for service in an enterprise.

a.
Filter
b.
Recovery
c.
Scalability
d.
Security

Question 138

Correct
Mark 1.00 out of 1.00
Flag question

Question text
Which of the following is not a built-in data type in C++?

a.
Float
b.
Int
c.
String
d.
char

Question 139

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Size of large data files can be reduced to save storage space. Which algorithm is appropriate to
reduce size of large data files?

a.
Prims Algorithm
b.
Merge Sort algorithm
c.
Heap Sort Algorithm
d.
Huffman Encoding algorithm

Question 140

Incorrect

Mark 0.00 out of 1.00


Remove flag

Question text
What is the average time complexity for search, insertion, and deletion operations in a hash table
with a good hash function and no collisions?

a.
O(1)
b.
O(n log n)
c.
O(log n)
d.
O(n)

Question 141

Correct

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is a characteristic of RISC (Reduced Instruction Set Computer) architecture?

a.
Fewer registers
b.
Longer instruction execution time
c.
Complex instruction set
d.
Simpler instruction set

Question 142

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text
Which of the following problems are solved in polynomial time by deterministic Turing machine?

a.
Quick sort
b.
Traveling salesman problem
c.
Graph coloring
d.
Satisfiability Problem

Question 143

Correct

Mark 1.00 out of 1.00

Flag question

Question text
What is the purpose of the semantic analysis phase in a compiler?

a.
To handle runtime errors
b.
To generate the intermediate representation
c.
To optimize the generated code
d.
To perform type checking and type conversion

Question 144

Incorrect
Mark 0.00 out of 1.00
Remove flag

Question text
::____ deals with soft errors, such as power failures.

a.
Failure recovery
b.
System recovery
c.
Media recovery
d.
Database recovery

You might also like