AAU Exit Exam Model
AAU Exit Exam Model
14. For a binary relationships set R between entity sets A and B, the
number of entities to which another entity can be associated is expressed
by:
- a. Cardinality Ratio
- b. Limited Ratio
- c. Degree Ratio
- d. Participation Constraints
16. Which one of the following pairs of algorithms has equal cost in terms
of time and space complexity under equal success function cost?
- a. A* and BFS
- b. DFS and UCS
- c. UCS and BFS
- d. DFS and BFS
21. Which one of the following is not a function of the operating system?
- a. Runs software utilities and programs
- b. Translates high-level programming language into machine code
- c. Manages computer system resources
- d. Makes the computer system convenient to use
22. The address that needs to be looked up in order to deliver a message
to the appropriate application software running on a host is:
- a. Port
- b. CRC
- c. MAC
- d. IP
27. When a thread is running, it can return directly to the READY state by
which of the following means?
- a. By encountering a yield command in a program;
- b. By encountering a sleep command in a program;
- c. By encountering a wait command in a program;
- d. By becoming blocked as a result of an output device being
unavailable.
31. Which one of the following sentences best describes the current
explosion of data?
a. Too much knowledge and too much data
b. Too much data and too much opportunity
c. Distributed knowledge and distributed data
d. Too much data, too little knowledge
33. An Attribute takes a __________ value when an entity does not have a
value for it.
a. Not Applicable
b. Null
c. 0
d. Zero
34. Which of the following sorting algorithms provide the best time
complexity in the worst-case scenario?
a. Merge sort
b. Selection sort
c. Quick sort
d. Bubble sort
36. The safe and sound arrival of data is verified using __________ in TCP
in order to achieve reliable transport.
a. Acknowledgment
b. Bits
c. Buffer
d. Frame
37. During which activity in the fundamental test process are tests designed
and executed?
a. Test Analysis and Design
b. Test Implementation and Execution
c. Test Planning and Control
d. Test Closure
38. Which data structure allows deleting data elements from the front and
inserting at the rear?
a. Dequeues
b. Binary search tree
c. Queues
d. Stacks
39. What effect does the achievement of quality attributes have on a
software product?
a. The achievement of quality attribute will always have a negative effect
b. It is non-deterministic
c. The achievement of quality attribute will always have a positive effect
d. The achievement of quality attribute will have a positive as well as
negative effect
41. What layer functions as the basis for dialog control and
synchronization?
a. Network Layer
b. Session Layer
c. Data Link Layer
d. Transport Layer
42. What is the term used for a collection of large, complex data sets that
cannot be processed using traditional data processing tools?
a. Wisdom
b. Tiny data
c. Big data
d. Information
48. Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user's system?
a. DDos and Drive-by Downloads
b. Malware & Malvertising
c. Phishing and Password attacks
d. All of the above
50. What type of CSS is generally recommended for designing large web
pages?
a. Embedded
b. External
c. Inline
d. Internal
51. What is the time complexity of the following code snippet in C++?
void solve() {
string s = "scaler";
int n = s.size();
for(int i = 6; i < n; i++) {
s = s + s[i];
}
cout << s << endl;
}
a. O(logn)
b. O(1)
c. O(n)
d. O(n^2)
52. The process to gather the software requirements from clients, analyze
and document is known as:
a. User engineering process
b. Requirement engineering process
c. Requirement elicitation process
d. Software engineering process
53. Which one of the following refers to the technique used for verifying the
integrity of the message?
a. Protocol
b. Digital signature
c. Decryption algorithm
d. Message digest
56. What must be enabled in order for a RESTful web service to receive
invocations from different domains, subdomains, or ports?
a. Cache control
b. Headers
c. CORS
d. SSL
57. Java's garbage collector carries out which of the following functions?
a. It frees up locations in memory that are no longer in use
b. It disposes of an applet once a web page is no longer visible
c. It disposes of a frame
d. It terminates a thread
62. For a binary relationship set R between entity sets A and B, the
Mapping Cardinality is ONE TO ONE if:
a. An Entity in A is associated with any number (zero or more) of entities in
B, and an entity in B is associated with any number (zero or more) of
entities in A
b. An Entity in A is associated with any number (zero or more) of entities in
B, an entity in B, however, can be associated with at most one entity in A
c. An Entity in A is associated with at most one entity in B, and an entity in
B is associated with at most one entity in A
d. An Entity in A is associated with at most one entity in B, and an entity in
B, however, can be associated with any number (zero or more) of entities in
A
63. Which of the following is just opposite to the Security through obscurity
principle?
a. Least common mechanism
b. Work factor
c. Least privileges
d. Open design
64. Which of the following statements about local search algorithms is true?
a. The time complexity of local search algorithms is independent of the size
of the problem
b. Local search algorithms are typically used for solving convex
optimization problems
c. Local search algorithms always guarantee to find the globally optimal
solution
d. The quality of the solution found by local search algorithms depends
heavily on the starting point and the choice of the neighborhood function
65. What keyword is used to declare an asynchronous function in
Javascript?
a. future
b. syne
c. await
d. async
74. Data generated for one use case may not be applicable to another use
case. This describes which characteristic of Big Data?
a. Velocity
b. Value
c. Veracity
d. Validity
75. A software system that manages a hotel booking system has been
updated with a new feature that allows users to view room availability in
real-time. A tester has been assigned to verify that existing functionality,
such as the ability to book rooms and make payments, has not been
adversely affected by the new feature. What type of testing is the tester
performing?
a. Integration testing
b. User acceptance testing
c. Functional testing
d. Regression testing
76. What is the difference between Dijkstra’s Algorithm and Uniform Cost
Search (UCS)?
a. Uniform Cost Search finds the optimal solution while Dijkstra’s Algorithm
does not
b. Dijkstra’s Algorithm is optimal, but not UCS
c. Dijkstra’s Algorithm first collects them into a Queue but UCS discover
them as they come
d. Dijkstra’s Algorithm discovers nodes as they come while UCS first
collects them in a Queue
82. A software testing professional has been asked to test a new feature for
a client. However, the tester realizes that the feature is not working properly
and may cause harm to the end-users. The client insists that the feature is
released as scheduled, even though the tester has recommended further
testing. What ethical principle from the ISTQB Code of Ethics should the
tester follow in this situation?
a. Honesty
b. Fairness
c. Responsibility
d. Respect
83. A software system that manages a hotel booking system has been
updated with a new feature that allows users to view room availability in
real-time. A tester has been assigned to verify that existing functionality,
such as the ability to book rooms and make payments, has not been
adversely affected by the new feature. What type of testing is the tester
performing?
a. User acceptance testing
b. Functional testing
c. Regression testing
d. Integration testing
84. _________ involves the team as a unit moving the ball down the field in
what would appear to be an ad hoc manner.
a. RAD
b. DSDM
c. Evolutionary Waterfall
d. SCRUM
88. Which one of the following memory management schemes is not used
for mapping logical address into physical address?
a. Segmentation
b. Paging with segmentation
c. Swapping
d. Paging