1. Which one of the following is the first step in project planning?
A. Determine the budget
B. Determine project constraints
C. Inspect the deliverables
D. Establish the objectives and scope
ANSWER: D
2. Which from the following represents the correct project cycle?
A. Planning→Initiating→Executing→Closing
B. Planning→Executing→Initiating→Closing
C. Initiating→Planning→Executing→Closing
D. Initiating→Executing→Planning→Closing
ANSWER: C
3. Which one of the following is a project performance measurement technique that
integrates scope, time, and cost data?
A. Earned-value management
B. Project management
C. Cost variance
D. Schedule variance
ANSWER: A
4. Which one of the following is reducing the impact of a risk event by reducing the
probability of its occurrence?
A. Risk Mitigation
B. Risk Avoidance
C. Risk Transfer
D. Risk Acceptance
ANSWER: A
5. Which one of the refers the people involved in or affected by project activities and
include the project sponsor, project manager, project team, users, suppliers, and even
opponents of the project?
A. Project Management
B. Stakeholders
C. Project teams
D. System boundary
ANSWER: B
6. Which one of the following may not cause of project failure?
A. Bad Communications
B. Lack of qualified resources
C. Scope creep
D. Adequate planning
ANSWER: D
7. Which one of the following is not the tool and techniques of quality control?
A. Pareto analysis
B. Quality control charts
C. Testing
D. Stakeholder Analysis
ANSWER: D
8. Which one of the following is the application of knowledge, skills, tools, and techniques
to project activities to meet project requirements?
A. Project
B. IT project
C. Project management
D. Stakeholders
ANSWER: C
9. Which of the following command(s) do we use to compile and execute java program
from the console (command) prompt respectively?
A. java, javac
B. java, execute
C. javac, java
D. javac, execute
ANSWER: B
10. Which of the following are invalid identifiers?
A. _helloworld
B. hIghValue
C. Special$value
D. %test
ANSWER: D
11. Among the following which one is not a feature of Java?
A. Portable
B. Structured
C. Distributed
D. High Performance
ANSWER: D
12. Which loop always executes its body at least once, even though the condition is not true:
A. for
B. do-while
C. while
D. continue
ANSWER: B
13. what is the value of normal priority in thread execution?
A. 7
B. 5
C. 6
D. 9
ANSWER: B
14. What is the name of the method used to start a thread execution?
A. resume()
B. run()
C. start()
D. init()
ANSWER: C
15. how do you determine the numbers of elements in the following array? int students[] =
new int [5];
A. students.length
B. students.length()
C. students.size
D. students.size()
ANSWER: A
16. which one of the following create an empty two-dimensional array with dimension 3x3?
A. int [][] blue= new int [3,3];
B. int [][] blue= new int [3],[3];
C. int [][] blue= new int [3][3];
D. int [][] blue= new int [3x3];
ANSWER: C
17. Which of the following allows the creation of hierarchical classifications?
A. Interface
B. Inheritance
C. Package
D. Polymorphism
ANSWER: B
18. Which of the following keywords is used to prevent inheritance?
A. final
B. catch
C. extends
D. super
ANSWER: A
19. Which of the following is not true about OOP concept?
A. Encapsulation
B. Polymorphism
C. Exception
D. Abstraction
ANSWER: C
20. Which one of the following is not true about Object-Oriented programming
paradigm?
A. Allows the programmer to represent real-world scenarios using objects.
B. Objects communicate with each other by passing messages.
C. There are access specifies in OOP.
D. It follows “Bottom-Up Approach”
ANSWER: C
21. What kind of transmission medium is most appropriate to carry data in a computer
network that is exposed to electrical interferences?
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwave
ANSWER: B
22. Which one of the following is the most common internet protocol?
A. HTML
B. NetBEUI
C. TCP/IP
D. IPX/SPX
ANSWER: C
23. Which one of the following is not true functions of Datalink-layer?
A. Framing
B. Physical Addressing
C. Flow control
D. Service point addressing
E. Access Control
ANSWER: D
24. Which one of the following is not true about parallel transmission of data?
A. In parallel transmission, all the bits of data are transmitted simultaneously on separate
communication lines.
B. Parallel transmission is used for short distance communication.
C. Less costly than serial transmission
D. Faster than serial transmission.
E. Data can be transmitted in less time.
ANSWER: C
25. The maximum length (in bytes) of an IPv4 datagram is?
A. 32
B. 1024
C. 65535
D. 512
ANSWER: C
26. Which of the following statements could be valid with respect to the ICMP (Internet
Control Message Protocol)?
A. It reports all errors which occur during transmission.
B. A redirect message is used when a router notices that a packet seems to have been routed
wrongly.
C. It informs routers when an incorrect path has been taken.
D. The "destination unreachable" type message is used when a router cannot locate the
destination
ANSWER: A
27. Which one of the following OSI layer helps to uniquely hosts beyond the subnets and
define the path which the packet will follow or be route to reach the destination?
A. Transport layer
B. Data link Layer
C. Network Layer
D. Physical layer
ANSWER: C
28. Which one of the following is NOT true session layer functionalities?
A. Establishment, maintaining and ending a session
B. Dialog control
C. Data compression
D. Data synchronization
ANSWER: C
29. Which one of the following is distance vector routing protocol?
A. OSPF
B. IS-IS
C. RIP
D. BGP
ANSWER: C
30. Which one of the following is Not true about Routing Information Protocol?
A. Sends packets every 30 seconds or faster.
B. Runs over UDP.
C. Metric = hop count
D. max. hop count =16
E. It is running on large networks
ANSWER: E
31. Which one of the following types of domain created by VLANs?
A. Broadcast Domain
B. Hub domain
C. Metropolitan domain
D. Limited Domain
ANSWER: A
32. To configure the VLAN trunking protocol to communicate VLAN information between
two switches, what two requirements must be met?
A. Each end of the trunk link must be set to the IEEE 802.1e encapsulation.
B. The VTP management domain name of both switches must be set the same and one
configure as a VTP server
C. All ports on both the switches must be set as access ports.
D. A rollover cable is required to connect the two switches together.
ANSWER: B
33. Which one of the following display the current ip address and the layer1 and 2 status of
the interfaces?
A. Show versions ,show protocols
B. Show protocols, show controller, show ip interfaces
C. Show protocols, show ip interfaces, show interfaces
D. Show versions, show ip interfaces, show interfaces
ANSWER: C
34. Which one of the following command used to delete all content of NVRAM on the
router ?
A. delete NVRAM
B. delete startup-config
C. erase NVRAM
D. erase start
ANSWER: D
35. Which one of the following command will configure all default VTY on the router?
A. Router#line vty 0 4
B. Router(config)#line vty 0 4
C. Router(config)#line console 0 4
D. Router(config)#line vty all
ANSWER: B
36. Which one of the following is Not true about A distributed database system?
A. It consists loosely coupled sites that share physical component
B. Database systems that run on each site are independent of each other
C. Transactions may access data at one or more sites
ANSWER: A
37. For the efficient recovery the transaction table must include all of the following except
A. An entry for each active transaction
B. transaction ID, transaction status
C. Log Sequence Number of the most recent log record for the transaction.
D. Page ID
ANSWER: D
38. Which one of the following is not True about homogeneous distributed database?
A. some sites have identical software
B. Are aware of each other and agree to cooperate in processing user requests.
C. Each site surrenders part of its autonomy in terms of right to change schemas or
software
D. Appears to user as a single system
E. Different sites may use different schemas and software
ANSWER: E
39. Only one write lock on X can exist at any time and no shared lock can be applied by any
other transaction on X. this locking techniques referred as
A. Confision matrix mode
B. read lock mode
C. Shared lock mode
D. exclusive locking mode
ANSWER: D
40. Which one of the following estimates and compares the costs of executing a query using
different execution strategies and chooses the strategy with the lowest cost estimate?
A. Cost-based query optimization
B. Heuristic query optimization
C. Semantic Query Optimization
D. Rule-based query optimization
ANSWER: A
41. The security problem associated with databases is that of controlling the access to a
statistical database, which is used to provide statistical information or summaries of
values based on various criteria. The database security countermeasures to in handle this
problem is called__
A. Flow control
B. Inference control
C. Access control
D. Data Encryption
ANSWER: B
42. Which one of the following is database security action used to control mandatory
authorization?
A. Account creation
B. Privilege granting
C. Privilege revocation
D. Security level assignment
ANSWER: D
43. If the recover manager want to keeps the track of the operation that the signal of the
transaction has ended unsuccessfully, so that any changes or effects that the transaction
may have applied to the database must be undone. What will the recover manager do?
A. Rollback
B. commit_transaction
C. Redo
D. Undo
ANSWER: A
44. What is the name of the indexing if it is created based on the tables primary key ?
A. Primarary indexing
B. Foreign indexing
C. Alternate indexing
D. Composite indexing
ANSWER:A
45. Maximium children of a B-tree of order m will be?
A. m/2
B. m-1
C. m
D. m+1
ANSWER: C
46. Which one of the following is the eassest and simple design of file organization methods?
A. Sequential file organization
B. Heap file organization
C. Hash file organization
D. B++ tree
ANSWER: A
47. Which one of the following tag used to create a hyperlink in HTML?
A. <a href = "www.example.com"> example.com </a>
B. <a url = "www. example.com" example.com /a>
C. <a link = "www. example.com"> example.com </a>
D. <a> www. example.com < example.com /a>
ANSWER: A
48. Which one of the following tag used to insert an image in HTML?
A. <img href = "jtp.png" />
B. <img url = "jtp.png" />
C. <img link = "jtp.png" />
D. <img src = "jtp.png" />
ANSWER: D
49. Which components of internet is a set of functions that need to be followed in order to
fetch the desired data?
A. Server
B. Client
C. Protocol
D. Transmission Media
ANSWER: C
50. Which type of CSS is used in the below code? <p style = "border:2px solid red;">
A. Inline CSS
B. Internal CSS
C. External CSS
D. Embedded CSS
ANSWER: A
51. Which of the following is the correct way to create a list using the lowercase letters?
A. <ol alpha = "a" >
B. <ol type = "a">
C. <ol letter = "a">
D. <ol letter = "lowercase">
ANSWER: B
52. A program in HTML can be rendered and read by –
A. Web browser
B. Server
C. Interpreter
D. Compiler
ANSWER: A
53. In HTML5, which of the following tag is used to initialize the document type?
A. <Doctype HTML>
B. <\Doctype html>
C. <Doctype>
D. <!DOCTYPE html>
ANSWER: D
54. Function returns the number of rows retrieved by a SELECT query and It takes one
argument which is the query result variable?
A. mysqli_connect()
B. mysqli_querry()
C. mysqli_fetch_array()
D. mysqli_num_rows()
ANSWER: C
55. Variable name in PHP starts with
A. <?
B. $
C. &
D. #
ANSWER: B
56. Which of the following is the default file extension of PHP?
A. .php
B. .hphp
C. .xml
D. .html
ANSWER: A
57. Which of the following is the correct way of defining a variable in PHP?
A. $variable name = value;
B. $variable_name = value;
C. $variable-name = value
D. $variable name as value;
ANSWER: B
58. What is the use of fopen() function in PHP?
A. The fopen() function is used to open folders in PHP
B. The fopen() function is used to open remote server
C. The fopen() function is used to open files in PHP
D. The fopen() function is used to open functions
ANSWER: C
59. Which one of the following is the use of isset() function in PHP?
A. The isset() function is used to check whether variable is set with value or not
B. The isset() function is used to check whether the variable is free or not
C. The isset() function is used to check whether the variable is string or not
D. The isset() function is used to check the variable data type
ANSWER: A
60. Which of the following function is used to set cookie in PHP?
A. createcookie()
B. makecookie()
C. setcookie()
D. cookies_set()
ANSWER: D
61. Which of the following is the correct way to create an array in PHP?
A. $season = array["summer" , "winter" , "spring" , "autumn"];
B. $season = array("summer" , "winter" , "spring" , "autumn");
C. $season = "summer" , "winter" , "spring" , "autumn";
D. Array : name =season; values ("summer" , "winter" , "spring" , "autumn");
ANSWER: B
62. Which one of the following is not true about the GET method?
A. restricted to send upto 1024 characters only.
B. PHP provides $_GET to access all the sent information using GET method
C. GET method produces a long string that appears in the server logs
D. GET method is used to send ASCII and binary data only.
ANSWER: D
63. Which one of the following is disadvantages of RAD?
A. Require only very highly skilled developers.
B. Reduce development time
C. Progress can be measured
D. Encourage customer feedback
ANSWER: A
64. Which .NET design principle state applications built on the .NET framework can be
made to work on any windows platform?
A. Portability
B. Security
C. Interoperability
D. Memory management
ANSWER: C
65. The starting point of a program written in c# is?
A. main() method
B. Class
C. Content of the body
D. The namespace
ANSWER: D
66. An abstraction of a data communication channel that connects two devices or
applications is called__
A. Class
B. Methods
C. Stream
D. Constructors
ANSWER: C
67. Which one of the following function reads one line of text and returns a string?
A. ReadToEnd()
B. ReadLine()
C. Write()
D. WriteLine()
ANSWER: B
68. Which one of the following is the correct and proper name of a variable in c#?
A. 1name
B. While
C. _name
D. Person?
ANSWER: C
69. Which one of the following is not a data type in c#?
A. int
B. bool
C. if
D. char
ANSWER: C
70. Which one of the following is a template for creating objects?
A. Array
B. Class
C. Method
D. Interface
ANSWER: C
71. For which of the following Android is mainly developed?
A. Servers
B. Desktops
C. Laptops
D. Mobile devices
ANSWER: D
72. Which of the following virtual machine is used by the Android operating system?
A. JVM
B. Dalvik virtual machine
C. Simple virtual machine
ANSWER: B
73. Android is based on which of the following language?
A. Java
B. C++
C. C
ANSWER: A
74. Which of the following kernel is used in Android?
A. MAC
B. Windows
C. Linux
D. Redha
ANSWER: C
75. We require an AVD to create an emulator. What does AVD stand for?
A. Android Virtual device
B. Android Virtual display
C. Active Virtual display
D. Active Virtual device
ANSWER: A
76. What is the use of content provider in Android?
A. For storing the data in the database
B. For sharing the data between applications
C. For sending the data from an application to another application
ANSWER: C
77. What is contained in manifest.xml?
A. Source code
B. List of strings used in the app
C. Permission that the application requires
ANSWER: C
78. All layout classes are the subclasses of -
A. android.view.View
B. android.view.ViewGroup
C. android.widget
ANSWER: B
79. Which of the following android library provides access to the database?
A. android.content
B. android.database
C. android.api
ANSWER: B
80. The resolutions of the pictures are accommodation _________on display screen.
A. Aspect ration
B. Pixels
C. Size
ANSWER: B
81. A technique used by penetration testers to compromise any system within a network for
targeting other systems is called_
A. Hacking
B. Exploiting
C. Cracking
D. Pivoting
ANSWER: D
82. Security bugs are known as _
A. Security defect
B. Security problems
C. System defect
D. Software error
ANSWER: A
83. Which one of the following is a timeframe from the loophole in security was introduced
or released till the time when the bug was fixed?
A. Time-frame of vulnerability
B. Window of vulnerability
C. Time-lap of vulnerability
D. Entry-door of vulnerability
ANSWER: B
84. The existence of the weakness in a system or network is called
E. Threat
F. Vulnerability
G. Exploit
H. Attack
ANSWER: B
85. Which one of the following is true about a complementary metal oxide semiconductor
(CMOS) battery?
A. store information your computer needs when it boots up, such as hard disk types,
keyboard and display type, chip set
B. It characterized by high noise immunity and low static power consumption
C. The information stored in CMOS is required by your computer´s Basic Input/output
System, or BIOS
D. Responsible for activating and controlling the operations of other units of a
computer system
ANSWER: D
86. What is the term for a temporary storage area that compensates for differences in data
rate and data flow between devices?
A. Buffer
B. Bus
C. Channel
D. Modem
ANSWER: A
87. Which of the following is an input device?
A. Plotter
B. Printer
C. VDU
D. Mouse
ANSWER: D
88. The communication path way or the set of wires that carry special information to or from the
CPU to other component of computer system.
A. chipset
B. Memory unit
C. Buses
D. BIOS
ANSWER: C
89. The central processing unit is located in the _____.
A. Hard disk
B. System unit
C. Memory unit
D. Monitor
ANSWER: B
90. Which of the following is a non-volatile memory chip?
A. EEPROM
B. RAM
C. DRAM
D. SRAM
ANSWER: A
91. Which of following statements are wrong about Thread in java?
A. start () method is used to start a thread function
B. run () method is used to start a thread process before start the () method in special case
C. The thread can be created using only the runnable interface
D. The thread can be made of a class that extends to the Thread class
ANSWER: B
92. Which of these keywords is used to start an exception block in java?
A. Check
B. Throw
C. Catch
D. Try
ANSWER: D
93. Which one of the following refers arrays in java?
A. Object References
B. Objects
C. Primitive Data type
ANSWER: B
94. Which one of the following is a failure to place information about a new database entry
into all the places in the database where information about that new entry needs to be
stored.
A.Deletion anomalies
B.Insertion anomalies
C.Modification anomalies
D.Dependency
ANSWER: B
95. Which one of the following is system development approach in which users have an
equal voice in determining system requirements and in approving system design?
A. Spiral
B. Prototyping
C. Waterfall
D. Iterative
ANSWER: B
96. Which one of the following is the process of breaking down a system into its smaller
components?
A. Normalization
B. Decomposition
C. Synchronization
D. Implementation
ANSWER: B
97. Which one of the following refers to that the subsystems are dependent on each other?
A. Cohesion
B. Coupling
C. Inheritance
D. Polymorphism
ANSWER: B
98. Which one of the following is the second phase of the systems development life cycle?
A. Design
B. Implementation
C. Maintenance.
D. Analysis
ANSWER: D
99. Which one of the following are diagrams used to analyze the system’s high-level
requirements using Actors and relationships?
A. Activity diagram
B. Sequence diagram
C. Use case diagram
D. Class diagram
ANSWER: C
100. Which one of the following device is readdress outgoing packets and providing
security, the data cache can also improve client response time and reduce Internet
traffic by providing frequently used pages to clients from a local source. it is a system
that isolates internal networks from the Internet by downloading and storing Internet
files on behalf of internal clients.
A. NAT
B. IPsec
C. Internet Proxy
D. Gateways
ANSWER: D
19
20