[go: up one dir, main page]

0% found this document useful (0 votes)
24 views30 pages

AAU Exit Exam Model

The document consists of a series of multiple-choice questions covering various topics in computer science, software engineering, and cybersecurity. It includes questions on functional dependencies, software architecture, algorithms, data structures, and programming concepts. Each question presents four options, with the aim of testing knowledge in these areas.

Uploaded by

dave336h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views30 pages

AAU Exit Exam Model

The document consists of a series of multiple-choice questions covering various topics in computer science, software engineering, and cybersecurity. It includes questions on functional dependencies, software architecture, algorithms, data structures, and programming concepts. Each question presents four options, with the aim of testing knowledge in these areas.

Uploaded by

dave336h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

AAU Exit Exam Model

1. Consider a relation schema R and α ⊆ R and β ⊆ R. The functional


dependency α → β holds on relational schema R if in any legal
relation r(R), for all pairs of tuples t1 and t2 in r such that t1[α] = t2[α],
it also holds that t1[β] = t2[β]. This concept is called:
- a. Normalization
- b. Decomposition
- c. Set Theory
- d. Functional Dependency

2. Which one of the following principles of cyber security refers to the


idea that the security mechanism must be as small and simple as
possible?
- a. Fail-safe Defaults
- b. Least Privilege
- c. Economy of the Mechanism
- d. Open-Design

3. Which of the following alternatives is most suitable for supporting a


qualitative analysis of your software architecture?
- a. Team size
- b. Organizational structures
- c. Quality scenarios
- d. Log files

4. What is the maximum number of swaps that can be performed in the


Selection Sort algorithm?
- a. n-2
- b. n-1
- c. 1
- d. n

5. Which of the following statements is NOT correct?


- a. C++ is an object-oriented programming language.
- b. Java is an object-oriented programming language.
- c. The object-oriented approach does not separate the behavior of a
system from the data.
- d. Java is the only object-oriented programming language.

6. Why is it important to maintain a good relationship between software


testers and developers?
- a. To ensure that the project is completed on time
- b. To foster collaboration and communication between the two
teams
- c. To make sure that the software is defect-free
- d. To reduce the cost of the project
7. Which layer is responsible for wireless signal encoding and frequency
band definition?
- a. Application Layer
- b. Logical Link Control Layer
- c. Medium Access Layer
- d. None of the mentioned

8. Which of the following qualities can most likely be improved by using


a layered architecture?
- a. Flexibility in modifying or changing the system
- b. Runtime efficiency (performance)
- c. Flexibility at runtime (configurability)
- d. Non-repudiability

9. The software requirement specification (SRS) is said to be ____ if


and only if no subset of individual requirements described in it conflict
with each other.
- a. Consistent
- b. Verifiable
- c. Unambiguous
- d. Correct

10. Why is Software architecture so important?


- a. Communication among stakeholders
- b. Early Design decisions
- c. Transferable abstraction of a system
- d. All of the above

11. How can we stop the services in Android?


- a. By using the stopSelf() and stopService() method
- b. By using the finish() method
- c. By using system.exit() method
- d. None of the above

12. You try to analyze your architecture quantitatively. Which is the


most appropriate indicator for architectural problem areas?
- a. Missing comments.
- b. Names of public methods do not reflect their purpose.
- c. Number of test cases per component.
- d. High coupling of components.

13. Polymorphism means:


- a. Declaring all the methods of a class as public.
- b. Declaring all the attributes of a class as private.
- c. Hiding of information so that it is not accessible to other classes.
- d. Having methods or operators with the same name performing
different functions.

14. What is the use of a content provider in Android?


- a. For storing the data in the database
- b. For sharing the data between applications
- c. For sending the data from an application to another application
- d. None of the above

14. For a binary relationships set R between entity sets A and B, the
number of entities to which another entity can be associated is expressed
by:
- a. Cardinality Ratio
- b. Limited Ratio
- c. Degree Ratio
- d. Participation Constraints

16. Which one of the following pairs of algorithms has equal cost in terms
of time and space complexity under equal success function cost?
- a. A* and BFS
- b. DFS and UCS
- c. UCS and BFS
- d. DFS and BFS

17. Which is the most important feature of the spiral model?


- a. Performance management
- b. Efficiency management
- c. Risk management
- d. Quality management
18. Which of the following is the main goal of software testing as part of the
quality assurance process?
- a. To monitor the software development lifecycle.
- b. To control the cost of software development.
- c. To ensure that the software meets the specified requirements.
- d. To manage project timelines and deadlines.

19. An algorithm that calls itself directly or indirectly is known as:


- a. Recursion
- b. Sub algorithm
- c. Traversal algorithm
- d. Polish notation

20. What is supervised learning in AI?


- a. Reinforcing learning with a reward-based system
- b. Learning by observing human behavior
- c. Training a machine learning model with labeled data
- d. Training a machine learning model with unlabeled data

21. Which one of the following is not a function of the operating system?
- a. Runs software utilities and programs
- b. Translates high-level programming language into machine code
- c. Manages computer system resources
- d. Makes the computer system convenient to use
22. The address that needs to be looked up in order to deliver a message
to the appropriate application software running on a host is:
- a. Port
- b. CRC
- c. MAC
- d. IP

23. What is inter-process communication?


- a. Allows processes to communicate and synchronize their actions
when using the same address space
- b. Allows processes to communicate and synchronize their actions
without using the same address space
- c. Allows the processes to only synchronize their actions without
communication
- d. None of the above

24. What will be the output of the following code snippet?

function solve(arr, rotations) {


if(rotations == 0) return arr;
for(let i = 0; i < rotations; i++){
let element = arr.pop();
arr.unshift(element);
}
return arr;
}

- a. [1, 22, 111, 44]


- b. [111, 44, 1, 22]
- c. [22, 111, 44, 1]
- d. [44, 1, 22, 111]

25. If every requirement can be checked by a cost-effective process, then


SRS is called:
- a. Complete
- b. Traceable
- c. Verifiable
- d. Modifiable

26. The purpose of a foreign key is to identify a particular row of:


- a. Parent table and Child table
- b. Referenced table
- c. Child table
- d. All of the above

27. When a thread is running, it can return directly to the READY state by
which of the following means?
- a. By encountering a yield command in a program;
- b. By encountering a sleep command in a program;
- c. By encountering a wait command in a program;
- d. By becoming blocked as a result of an output device being
unavailable.

28. Several architecture development methods suggest a view-based


approach. Which of the following views are most often used?
- a. Context view
- b. Configuration view
- c. Building Block/Component view
- d. Physical database view
29. __________ is Accept risk occurrence but don't do anything about it.
a. Risk avoidance
b. Risk Retention
c. Risk Reduction
d. Risk transfer

30. ICMP is mostly employed for


a. IP addressing
b. Error and diagnostic functions
c. Data forwarding
d. Network routing

31. Which one of the following sentences best describes the current
explosion of data?
a. Too much knowledge and too much data
b. Too much data and too much opportunity
c. Distributed knowledge and distributed data
d. Too much data, too little knowledge

32. Which of the following is not a state in the service lifecycle?


a. Destroyed
b. Running
c. Start
d. Paused

33. An Attribute takes a __________ value when an entity does not have a
value for it.
a. Not Applicable
b. Null
c. 0
d. Zero

34. Which of the following sorting algorithms provide the best time
complexity in the worst-case scenario?
a. Merge sort
b. Selection sort
c. Quick sort
d. Bubble sort

35. Modifying the software to match changes in the ever-changing


environment is known as:
a. Perfective maintenance
b. Adaptive maintenance
c. Preventive maintenance
d. Corrective maintenance

36. The safe and sound arrival of data is verified using __________ in TCP
in order to achieve reliable transport.
a. Acknowledgment
b. Bits
c. Buffer
d. Frame

37. During which activity in the fundamental test process are tests designed
and executed?
a. Test Analysis and Design
b. Test Implementation and Execution
c. Test Planning and Control
d. Test Closure

38. Which data structure allows deleting data elements from the front and
inserting at the rear?
a. Dequeues
b. Binary search tree
c. Queues
d. Stacks
39. What effect does the achievement of quality attributes have on a
software product?
a. The achievement of quality attribute will always have a negative effect
b. It is non-deterministic
c. The achievement of quality attribute will always have a positive effect
d. The achievement of quality attribute will have a positive as well as
negative effect

40. Which of the following is a type of independent malicious program that


never required any host program?
a. Trap door
b. Trojan horse
c. Virus
d. Worm

41. What layer functions as the basis for dialog control and
synchronization?
a. Network Layer
b. Session Layer
c. Data Link Layer
d. Transport Layer

42. What is the term used for a collection of large, complex data sets that
cannot be processed using traditional data processing tools?
a. Wisdom
b. Tiny data
c. Big data
d. Information

43. __________ is the lowest level of work on the project.


a. Work product
b. Milestone
c. Task set
d. Task

44. An ER diagram can express the overall __________ of a database


graphically.
a. View Structure
b. Model Structure
c. Architectural Structure
d. Logical Structure

45. Which design makes it most difficult to identify faults?


a. Star
b. Bus
c. Mesh
d. Ring

46. Which of the following is not a contribution of big data analysis?


a. To gain competitive advantage
b. To control the volatile market
c. To satisfy customers' needs
d. None

47. What does the HTTP status code 201 indicate?


a. No content
b. Accepted
c. OK
d. Created

48. Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user's system?
a. DDos and Drive-by Downloads
b. Malware & Malvertising
c. Phishing and Password attacks
d. All of the above

49. Identify possible source(s) of unstructured data:


a. RDBMSs
b. Addis Ababa University students database
c. Twitter
d. Microsoft employee table

50. What type of CSS is generally recommended for designing large web
pages?
a. Embedded
b. External
c. Inline
d. Internal

51. What is the time complexity of the following code snippet in C++?
void solve() {
string s = "scaler";
int n = s.size();
for(int i = 6; i < n; i++) {
s = s + s[i];
}
cout << s << endl;
}
a. O(logn)
b. O(1)
c. O(n)
d. O(n^2)

52. The process to gather the software requirements from clients, analyze
and document is known as:
a. User engineering process
b. Requirement engineering process
c. Requirement elicitation process
d. Software engineering process

53. Which one of the following refers to the technique used for verifying the
integrity of the message?
a. Protocol
b. Digital signature
c. Decryption algorithm
d. Message digest

54. What is the time complexity of the binary search algorithm?


a. O(n)
b. O(1)
c. O(n^2)
d. O(log n)

55. Which of the following is not an activity lifecycle callback method?


a. onStart() method
b. onClick() method
c. onCreate() method
d. onBackPressed() method

56. What must be enabled in order for a RESTful web service to receive
invocations from different domains, subdomains, or ports?
a. Cache control
b. Headers
c. CORS
d. SSL

57. Java's garbage collector carries out which of the following functions?
a. It frees up locations in memory that are no longer in use
b. It disposes of an applet once a web page is no longer visible
c. It disposes of a frame
d. It terminates a thread

58. What will be the output of the following code snippet?


void solve() {
int a[] = {1, 2, 3, 4, 5};
int sum = 0;
for(int i = 0; i < 5; i++) {
if(i % 2 == 0) {
sum += a[i];
}
}
cout << sum << endl;
}
a. 9
b. 5
c. 6
d. 15
59. Which one of the following is true of a class that has package scope?
a. A class with package scope contains abstract methods only
b. A class that has package scope is a source file and not a class file
c. Only a class with package scope can be imported from the package
d. A class with package scope is visible only to other classes within the
same package

60. In operating system, which mechanism is used to create a process?


a. By calling a deadlock detection and recovery technique
b. Execution of a process creation system call by a running process
c. A user request to create a new process
d. System initialization

61. In Linux operating system, a process creates a child process using a


system call:
a. yield()
b. exec()
c. init()
d. fork()

62. For a binary relationship set R between entity sets A and B, the
Mapping Cardinality is ONE TO ONE if:
a. An Entity in A is associated with any number (zero or more) of entities in
B, and an entity in B is associated with any number (zero or more) of
entities in A
b. An Entity in A is associated with any number (zero or more) of entities in
B, an entity in B, however, can be associated with at most one entity in A
c. An Entity in A is associated with at most one entity in B, and an entity in
B is associated with at most one entity in A
d. An Entity in A is associated with at most one entity in B, and an entity in
B, however, can be associated with any number (zero or more) of entities in
A

63. Which of the following is just opposite to the Security through obscurity
principle?
a. Least common mechanism
b. Work factor
c. Least privileges
d. Open design

64. Which of the following statements about local search algorithms is true?
a. The time complexity of local search algorithms is independent of the size
of the problem
b. Local search algorithms are typically used for solving convex
optimization problems
c. Local search algorithms always guarantee to find the globally optimal
solution
d. The quality of the solution found by local search algorithms depends
heavily on the starting point and the choice of the neighborhood function
65. What keyword is used to declare an asynchronous function in
Javascript?
a. future
b. syne
c. await
d. async

66. Android is:


a. An operating system
b. A web server
c. A database
d. None of the above

67. Which of the following sorting algorithms is a divide-and-conquer type?


a. Bubble sort
b. Dynamic sort
c. Insertion sort
d. Quick sort

68. What is the main disadvantage of uninformed search algorithms?


a. They are not optimal
b. They are not consistent
c. They are not complete
d. They are not admissible
69. Which SQL statement gives every employee a 10% raise?
a. CHANGE Emp SET Salary=salary * 1.1
b. UPDATE Emp SET salary=salary * 1.1
c. ALTER Emp SET salary=salary * 1.1
d. MODIFY Emp SET salary=salary * 1.1

70. Convert the following binary representation into dotted-decimal form:


10000000 00001011 00000011 00011111
a. 127.12.5.34
b. 126.11.3.32
c. 126.11.5.32
d. 128.11.3.31

71. Which of the following is not desired in a good software requirement


specification (SRS) document?
a. Functional requirements
b. Goals of implementation
c. Algorithm for software implementation
d. Non-functional requirement

72. Under which of the following is Android licensed?


a. OSS
b. SourceForge
c. Apache MIT
d. None of the above
73. What is the main advantage of informed search algorithms?
a. They are admissible
b. They are optimal
c. They are complete
d. They are consistent

74. Data generated for one use case may not be applicable to another use
case. This describes which characteristic of Big Data?
a. Velocity
b. Value
c. Veracity
d. Validity

75. A software system that manages a hotel booking system has been
updated with a new feature that allows users to view room availability in
real-time. A tester has been assigned to verify that existing functionality,
such as the ability to book rooms and make payments, has not been
adversely affected by the new feature. What type of testing is the tester
performing?
a. Integration testing
b. User acceptance testing
c. Functional testing
d. Regression testing
76. What is the difference between Dijkstra’s Algorithm and Uniform Cost
Search (UCS)?
a. Uniform Cost Search finds the optimal solution while Dijkstra’s Algorithm
does not
b. Dijkstra’s Algorithm is optimal, but not UCS
c. Dijkstra’s Algorithm first collects them into a Queue but UCS discover
them as they come
d. Dijkstra’s Algorithm discovers nodes as they come while UCS first
collects them in a Queue

77. Which one of the following is it NOT possible to do in Java?


a. Implement more than one interface
b. Execute more than one thread at a time
c. Create arrays with more than two dimensions
d. Create and manipulate pointers

78. Public key system is useful because:


a. It uses two keys
b. It is an asymmetric system
c. There is no key distribution problem as the public key can be kept in a
commonly accessible database
d. The private key can be kept secret

79. What will be the output of the following code snippet?


void solve() {
int a[] = {7, 3, 5, 2, 3, 4, 5, 3};
int sum = 0;
for(int i = 0; i < 5; i++) {
if(i % 2 == 0) {
sum += *(a + i);
}
else {
sum -= *(a + i);
}
}
cout << sum << endl;
}
a. 2
b. 34
c. 45
d. 3

80. What are some of the benefits of big data applications?


a. Improved decision-making
b. Better customer understanding
c. Enhanced operational efficiency
d. All of the above

81. ___________ involves generating, collecting, disseminating, and


storing information.
a. Critical Management
b. Configuration Management
c. Concurrent Management
d. Communication Management

82. A software testing professional has been asked to test a new feature for
a client. However, the tester realizes that the feature is not working properly
and may cause harm to the end-users. The client insists that the feature is
released as scheduled, even though the tester has recommended further
testing. What ethical principle from the ISTQB Code of Ethics should the
tester follow in this situation?
a. Honesty
b. Fairness
c. Responsibility
d. Respect

83. A software system that manages a hotel booking system has been
updated with a new feature that allows users to view room availability in
real-time. A tester has been assigned to verify that existing functionality,
such as the ability to book rooms and make payments, has not been
adversely affected by the new feature. What type of testing is the tester
performing?
a. User acceptance testing
b. Functional testing
c. Regression testing
d. Integration testing

84. _________ involves the team as a unit moving the ball down the field in
what would appear to be an ad hoc manner.
a. RAD
b. DSDM
c. Evolutionary Waterfall
d. SCRUM

85. A good software requirement specification does not have the


characteristic of:
a. Completeness
b. Reliability
c. Consistency
d. Clarity

86. In which process model, a number of dependent phases are repeated


sequentially with no feedback loops?
a. Incremental
b. Evolutionary
c. Agile
d. Iterative

87. What does the ... operator do in Javascript?


a. Make a for loop execute three times
b. It is used to spread iterables to individual elements
c. It makes iterators continue with the increment interval
d. No such operator in Javascript

88. Which one of the following memory management schemes is not used
for mapping logical address into physical address?
a. Segmentation
b. Paging with segmentation
c. Swapping
d. Paging

89. Which of the following methods is used to access HTML elements


using Javascript?
a. getTagById()
b. getElementsByHTMLName()
c. getHTMLClassByName()
d. getElementsByClassName()

90. The cost of a project is computed by comparing the project to a similar


project in the same application domain is called:
a. Estimation by Analogy
b. Empirical Model
c. Expert Judgment
d. Ad Hoc Approach
91. The specific set of sequential tasks upon which the project completion
date depends or the longest full path is called:
a. Full path
b. Complete path
c. Critical path
d. Project path

92. What are the most important goals of software architecture?


a. Enable cost-effective integration and acceptance tests of the system.
b. Improve accuracy of patterns in structure and implementation
c. Enable a basic understanding of structures and concepts for the
development team and other stakeholders.
d. To help understand the completeness of requirement

93. Which of the following is contained in the src folder?


a. XML
b. Java Source code
c. Manifest
d. None of the above

94. Which of the following is NOT an objective of software testing?


a. Enhancing usability
b. Identifying defects
c. Increasing development time
d. Improving performance
95. CPU fetches the instruction from memory according to the value of:
a. Program counter
b. Program status word
c. Instruction register
d. Status register

96. What is the first step in the data-driven decision-making process?


a. Making a decision
b. Analyzing data
c. Interpreting results
d. Collecting data

97. Triple DES uses:


a. Works with 144-bit blocks of plain text and applies DES algorithm once
b. Working on 64-bit blocks of plain text and 56-bit keys by applying DES
algorithm for three rounds
c. 168-bit keys on 64-bit blocks of plain text
d. Uses 128-bit blocks of plain text and 112-bit keys and apply DES
algorithm thrice.

98. Which of the following is an example of a checked exception?


a. IOException
b. RuntimeException
c. NumberFormatException
d. NegativeArraySizeException

99. Which one is a false assumption to avoid race conditions to a problem


of critical region?
a. No process running outside its critical region may block other processes
b. Assumptions should be made about speeds or the number of CPUs.
c. No process should have to wait forever to enter its critical region
d. No two processes may be simultaneously inside the critical regions.

100. Which of the following informed search algorithms guarantees


optimality when searching for a solution, but has an exponential time
complexity in the worst-case scenario?
a. A* Search
b. Uniform Cost Search
c. Iterative Deepening A* Search
d. Greedy Best-First Search

You might also like