[go: up one dir, main page]

0% found this document useful (0 votes)
44 views10 pages

Model Exam - With Answer

The document contains a series of multiple-choice questions related to computer science topics, including UNIX/Linux shell scripting, software development, database management, programming languages, and networking. Each question has four answer options, and the document appears to be a test or quiz format for assessing knowledge in these areas. It covers a wide range of subjects, indicating a comprehensive evaluation of the respondent's understanding of computer science concepts.

Uploaded by

kirubel solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views10 pages

Model Exam - With Answer

The document contains a series of multiple-choice questions related to computer science topics, including UNIX/Linux shell scripting, software development, database management, programming languages, and networking. Each question has four answer options, and the document appears to be a test or quiz format for assessing knowledge in these areas. It covers a wide range of subjects, indicating a comprehensive evaluation of the respondent's understanding of computer science concepts.

Uploaded by

kirubel solomon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______1. In UNIX/LINUX shell scripting, if x =10, then what will be the value of x$x$?
A. undefined B. erroneous C. 100 D. x10
_______2. Software patch is defined as ______________
A. Daily or routine Fix B. Emergency Fix C. Required or Critical Fix D. None
_______3. Which statement is used to move the control to the start of loop body.
A. Continue B. Switch. C. Break D. None.
_______4. Which of the following is true about the techniques in a database transaction recovery?
A. If a transaction does not modify the database until it has committed, it is said to use the
Deferred-modification technique.
B. If database modifications occur while the transaction is still active, the transaction is said to
use the Immediate-modification technique.
C. Undo modification a technique in which a log record sets the data item specified in the log
record to the old value.
D. All of the above is correct.
_______5. Which of the following is not part of a Complete URL?
A. Path B. Resource Name. C. Browser D. Protocol.
_______6. In the for statement this expression is executed only once.
A. Test B. Initialization. C. Validation D. None of these.
_______7. Regardless of application area, project size, or complexity, software development work may be
divided into three generic phases: the__________ phase, which focuses on what, the_________
phase, which focuses on how, and the_________ phase, which focuses on change.
A. Definition, development, support C. Support, development, definition
B. Definition, support, development D. Development, support, definition
_______8. C++ has …… types of constant.
A. 2 B. 4. C.10 D. 1.
_______9. What does the compound condition use to join two conditions.
A. Relational operator B. Relational result. C. Logical operator D. Similarity Operator.
_______10. Database normalization typically?
B. Reduces number of tables C. Reduces data constraints.
C. Reduces database size D. Reduces database name.
_______11. Which attribute of tag defines the url of the image to be loaded?
A. Hspace B. Vspace. C. src D. Width.

1 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______12. Which is the correct method to create java frame.


A. Javaframe = new javaframe(“frame”); C. Jframe = new jframe(“frame”);
B. Frame = new frame(“frame”); D. None of the above.
_______13. Row number and column number in a multidimensional array start with.
A. -1 B. 0 C. 1 D. 2
_______14. _________ is a software development life cycle model that is chosen if the development team
has less experience on similar projects.
A. Spiral. B. Iterative Enhancement Model. C. RAD. D. Waterfall.
_______15. A deadlock exists in the system if and only if the wait-for graph contains a _______?
A. Cycle B. Bi-direction. C. Direction D. Rotation.
_______16. What is the default value of byte, short, int or long data type elements of an array in java?
A. -1 B. 0 C. 1 D. Garbage value
_______17. Href is _______________
A. a tag of a Tag C. a value of a Tag.
B. an attribute of a Tag D. stands for Hyperlink Repeats Electronic Filling.
_______18. Which of the following can be considered as characteristics of transactions?
A. Atomicity B. Isolation. C. Consistency D. All.
_______19. Objects communicate through.
A. Messages B. Interface C. Stimuli D. All
_______20. Which of the following is not suitable for accommodating any change.
A. RAD Model. B. Waterfall Model. C. Build & Fix Model. D. Prototyping.
_______21. Derived class inherits all the characteristics of the.
A. Constructor B. Base Class C. Destructor D. Child Class
_______22. In Which Loop, Condition Comes After The Body Of The Loop.
A. While Loop B. Do-while Loop. C. For Loop D. Nested Loop.
_______23. Which of the following command used to delete a database.
A. Delete database database_name C. Delete database_name.
B. drop database database_name D. drop database_name.
_______24. If no access modifier is used, then which modifier is considered by default.
A. Public B. Private C. Protected D. Centered

2 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______25. The incorrect activity among the following for the configuration management of a software
system is ________.
A. Version management. C. Change management.
B. System management. D. Customer management.
_______26. Main method is written in.
A. Class B. Package C. Object D. Interface
_______27. Which javascript event handler pertains to actions enabled by mouse clicks.
A. Oninput B. Onclick. C. Onchange D. Ondrag.
_______28. Which of the following is the lowest-level operator to access data.
A. Index Search B. Linear Search. C.File Scan D. Access paths.
_______29. Which of the following schemas does define a view or views of the database for particular users?
A. Physical schema B. Conceptual schema. C. External schema D. Internal schema.
_______30. A technique for direct search and that takes O (1) time to find a data is?
A. Linear Search B. Tree Search. C. Binary Search D. Hashing.
_______31. A Computer Network Consists Of Except?
A. Protocol B. Ieee. C. Medium D. Interface.
_______32. A table on the many side of a one to many or many to many relationship must?
A. Be in Second Normal Form (2NF) C. Be in Third Normal Form (3NF).
B. Have a composite key D. Have a single attribute key.
_______33. An entity in A is associated with at most one entity in B, and an entity in B is associated with at
most one entity in A. This is called as
A. One-to-many C. Be in Third Normal Form (3NF).
B. One-to-one D. Have a single attribute key.
_______34. Leaving one 3g base station and joining another base station of 3g technology is referred as
A. Propagation C. Vertical Hand Off/ Handshake.
B. Termination D. Horizontal Hand Off/ Handshake.
_______35. SELECT * FROM employee WHERE dept_name="Comp Sci";
In the SQL given above there is an error. Identify the error.
A. Dept_name B. Employee. C. “Comp Sci” D. From.

3 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______36. A loop of computers is formed in _____ topology by connecting a computer to another.


A. Star B. Bus. C. Ring D. Form.
_______37. Attributes of good software is ____________.
B. Development C. Functionality.
C. Maintainability & functionality D. Maintainability.
_______38. Rj-45 Connector Is Used With ________ Cable.
A. UTP B. Optic Fiber. C. Co-Axial D. All.
_______39. Which of the following are CASE tools?
A. Central Repository C. Integrated Case Tools.
B. Upper Case Tools D. All of the mentioned.
_______40. Change in the shape of signal due various factors is referred as.
A. Attenuation B. Distortion. C. Noise D. Cross.
_______41. Dedicated Hardware / Physical Path Is Required In.
A. Circuit Switching C. Data Gram Switching.
B. Packet Switching D. Message Switching.
_______42. Different types of data are divided into time slices to be transmitted on single medium?
B. TDM B. Domain Based. C. FDM D. Medium.
_______43. You have been asked to create a subnet that supports 24 hosts. What subnet mask you use?
A. 255.255.255.224 B. 255.255.255.248. C. 255.255.255.240 D. 255.255.255.252.
_______44. In a fully connected mesh network with 10 computers, how many total number of cables are
required and how many number of ports are required for each device
A. 40 cables, 9 ports C. 45 cables, 9 ports.
B. 45 cables, 10 ports D. 50 cables, 10 prts.
_______45. Which one of the following expressions does NOT represent exclusive NOR of x and y?
A. xy+x'y' B. x'⊕y C. x⊕y' D. x'⊕y'
_______46. The simplified SOP (Sum Of Product) form of the boolean expression:
(P + Q' + R') . (P + Q' + R). (P + Q + R') is?

A. (P'.Q + R') B. (P'.Q + R) C. (P + Q'.R') D. (P.Q + R)

4 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______47. A processor that has carry, overflow and sign flag bits as part of its program status word (PSW)
performs addition of the following two 2’s complement numbers 01001101 and 11101001. After
the execution of this addition operation, the status of the carry, overflow and sign flags,
respectively will be.
A. 1, 1, 0 B. 0, 1, 0 C. 1, 0, 0 D. 1, 0, 1
_______48. Definition of a language L with alphabet {a} is given as following.
L={|ank|k>0, and n is a positive integer constant}
What is the minimum number of states needed in DFA to recognize L?
A. k+1 B. 2(n+1) C.n+1 D. 2[Tex](k+1)[/Tex]
_______49. Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the
minimum number of states in a non-deterministic finite automaton that accepts L?
A. n-1 B. n+1 C. n D. 2n-1
_______50. Which one of the following languages over the alphabet {0,1} is described by the regular
expression: (0+1)*0(0+1)*0(0+1)* ?
A. The set of all strings containing the substring 00.
B. The set of all strings containing at most two 0’s.
C. The set of all strings containing at least two 0’s.
D. The set of all strings that begin and end with either 0 or 1.
_______51. Which one of the following is incorrect about Map data structure?
A. Cannot be traversed C. Allow duplicate values.
B. Allow duplicate keys D. all of them are correct
_______52. A register used to indicate the condition of the microprocessor is?
A. FLAG B. DI. C. SI D. EIP
_______53. Which one of the following testing required knowledge about internal structure, design and
implementation of the system?
A. Beta testing B. Alpha testing. C. White box testing D. Black box Testing
_______54. A TCP/IP protocol for mapping an Internet Protocol address (IP address) to a physical machine
address (MAC) that is recognized in the local network.
A. Internet Control Messaging Protocol C. Revers Address Resolution Protocol.
B. Domain Name System D. Address Resolution Protocol.
_______55. The function of protocols in transport layer (TCP and UDP) includes following except,
A. Addressing packets. C. Provide flow control.
B. Establish end-to-end operations D. Segment upper-layer application data.

5 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______56. Which of the following data model that require a complex array of pointers that thread through
set of records?
A. Relational Data Model. C. Network data model.
B. Hierarchical Data model. D. None.
_______57. Permissions of a file are represented by which of the following characters?.
A. x,w,e B. e,x,w C. e,w,x D. r,w,x
_______58. 6) Android is based on which of the following language?
A. Java. B. C++. C. PROLOG. D. C.
_______59. The application area of AI which focus on recognize objects based on patterns in the same way
as the human visual system does.
A. Speech recognition. B. Robotics. C. Computer vison. D. Expert System.
_______60. Given an IP Address 172.16.28.252 with the subnet mask of 255.255.240.0 what is the correct
network address?
A. 172.16.24.0 B. 172.16.28.0 C. 172.16.0.0 D. 172.16.16.0
_______61. A user notices that the PC behaves a bit differently from the organization group policies. The
user believes that the group policy settings may have been applied incorrectly and wants to verify
the settings. What is the best Windows command to select to do the job?
A. tasklist B. gpresult C. cls D. DISM
_______62. A user visits a trusted website. The website sends the user a link via email to the default browser
window. When the user clicks on the link, a message appears stating that there is a problem with
the website’s security certificate. Why has this occurred?
A. the browser has identified it as a malware.
B. the CRLs of the browser have not been updated.
C. the antivirus has flagged this as a known virus.
D. the pop-up windows on the browser have been disabled.
_______63. One of the following is responsible for receiving and transmitting the signals across the physical
media.
A. Physical layer B. Application Layer C. Application Layer D. Transport Layer
_______64. Which method is used to select an HTML element by its ID in JavaScript?.
A. querySelector() C. getElementsByClassName()
B. getElementsByTagName() D. getElementById()
_______65. Which of the following android component displays the part of an activity on screen?
A. Manifest B. Intent C. Fragment D. View

6 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______65. Which of the following is a tool used for processing and analyzing Big Data?
A. PostgreSQL B. MySQL C. Oracle D. Hadoop
_______66. Which of the following is an essential process in which the intelligent methods are applied to
extract data patterns?
A. Data Mining B. Text Mining C. Data Selection D. Warehousing
_______67. The objective of an Information Security includes all except
A. Confidentiality B. Availability C. Integrity D. None
_______68. Which of the following is defined as an attempt to steal, spy, damage or destroy computer
systems, networks, or their associated information?
A. Digital hacking B. Cyber-attack C. Cryptography D. Computer security
_______69. Which of the following is not a diagram studied in Requirement Analysis?
A. Activity Diagram B. State Transition Diagram C. Use Case D. ER Diagram
_______70. Which of the following is used to allocate memory size dynamically?
A. int num = malloc(int); C. int* num = malloc(sizeof(int));
B. int num = new int; D. int* num = new int();
_______71. Testing wherein we subject the target of the test, to varying workloads to measure and evaluate
the performance behaviors and ability of the target and of the test to continue to function properly
under these different workloads?
A. Usability Testing B. Load Testing C. Volume Testing D. Stress Testing
_______72. The binary search method needs no; more than _____ comparisons.
A. [Iog2n]+1 B. [Iog2n]+2 C. Iog2n D. [Iog2n]-1
_______73. The algorithm should be effective which means it must have ______.
A. Complex primitive B. Basic steps C. Basic primitive D. Complex steps
_______74. In C++, which data type is used to create a variable that should store text?
A. myString B. String C. Txt D. string
_______75. In C++, Which header file lets us work with input and output objects?
A. #include <iostream> C. #include <inputstr>
B. #include <iosstring> D. #include <stream>
_______76. In C++, Which method can be used to find the highest value of x and y?
A. max(x,y) C. maxNum(x,y)
B. maximum(x,y) D. largest(x,y)

7 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______77. using C++, How do you create a reference variable of an existing variable?
A. With the REF word C. With the * operator
B. With the & operator D. With the ref word
_______78. Which of the following is true about inheritance in Java?
1) Private methods are final.
2) Protected members are accessible within a package and inherited classes outside the package.
3) Protected methods are final.
4) We cannot override private methods.
A. 1, 2 and 4 C. 1, 2 and 3
B. Only 1 and 2 D. 2, 3 and 4
_______79. We can make a class abstract by
A. Declaring it abstract using the virtual keyword.
B. Making at least one member function as virtual function.
C. Making at least one member function as pure virtual function.
D. Making all member function const
_______80. The built-in base class in Java, which is used to handle all exceptions is.
A. Raise B. Error C. Exception D. Throwable
_______81. Which of the following is a self-adjusting or self-balancing Binary Search Tree.
A. Splay Tree B. Red Black Tree C. AVL Tree D. All of the above
_______82. Consider three processes (process id 0, 1, 2 respectively) with compute time bursts 2-, 4- and 8-
time units. All processes arrive at time zero. Consider the longest remaining time first (LRTF)
scheduling algorithm. In LRTF ties are broken by giving priority to the process with the lowest
process id. The average turn around time is:
A. 13 units B. 15 units C. 14 units D. 16 units
_______83. Which of the following is major part of time taken when accessing data on the disk?
A. Settle time B. Seek time C. Rotational latency D. Waiting time
_______84. AI is a field of computer science that aims to
A. make humans more intelligent C. improve the security
B. develop intelligent machines D. mine the data
_______85. Type of cybercrime in which a person (or victim) is being followed continuously by another
person or group of several people through electronic means to harass the victim.
A. Phishing B. Stalking C. Bulling D. Identity theft

8 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______86. What is the goal of Artificial Intelligence?


A. To solve artificial problems C. To extract scientific causes
B. To explain various sorts of intelligence D. To solve real-world problems
_______87. Which of the following usually observe each activity on the internet of the victim, gather all
information in the background, and send it to someone else?
A. Malware B. Adware C. Spyware D. Spam
_______88. Which of the following is not the commonly used programming language for Artificial
Intelligence?
A. Perl B. PROLOG C. Java D. LISP
_______89. kind of cyber attack in which one tries to make a machine unavailable for its intended users.
A. Dos Attack B. Soliciting C. Phishing D. Stalking
_______90. It can be a software program or a hardware device that filters all data packets coming through
the internet, a network, etc. it is known as the_______:
A. Antivirus B. Cookies C. Firewall D. Malware
_______91. A data structure is said to be ______ if its elements form a sequence.
A. Bipolar B. Linear C. Scalar D. Polar
_______92. How can we make an e-mail link?
A. <a href=”xxx@yyy”> C. <mail>xxx@yyy</mail>
B. <mail href=”xxx@yyy”> D. <a href=”mailto:xxx@yyy”>
_______93. To create a combo box (drop down box) which tag will we use?
A. <select> B. <list> C. <input type=”dropdown”> D. All
_______94. Marquee is a tag in HTML to?
A. mark the list of items to maintain inqueue C. display text with scrolling effect
B. mark the text so that it is hidden in browser D. none of above
_______95. What is the full name of FAT?
A. File attribute table C. Font attribute table
B. File allocation table D. Format allocation table
_______96. BIOS is used by________
A. operating system C. interpreter
B. compiler D. application software

9 Final Exit Model 01


Name____________________________________ ID________________ Sect_____________ Time 3:00 hr

_______97. The ability to query data, as well as insert, delete, and alter tuples, is offered by____
A. TCL (Transaction Control Language) C. DDL (Data Definition Language)
B. DCL (Data Control Language) D. DML (Data Manipulation Language)
_______98. One of the following is not correctly matched.
A. 2210 = (10110)2 C. 258 = (11001)2
B. (22)10 = (00100010) BCD D. 7210 = (110)8
_______99. What will be the output of the following code snippet for 1->2->3->4->5?
int List(ListNode* head)
{
while(head != NULL) {
cout << head -> data << " ";
head = head -> next;}
}

A. 1 2 3 4 5 C. 5 4 3 2 1
B. 1 3 5 2 4 D. 2 4 1 3 5
_______100. What is the output of the following script?
int i=9;
for(int i=0;i<2;i++)
{
for(int j=0;j<5;j++)
{
cout<<i<<" "<<j<<" ";
break;
}
}
A. 0 0 C. 0 0 1 1
B. 0 0 1 0 D. 0 1 1 1

10 Final Exit Model 01

You might also like