.
COMPUTING (CS,IT,IS,SWE,MIS) COLLEGE
NATIONAL EXIT EXAM WORK SHEET
Term IV
September 19, 2022
Prepared by:
Name: Dr. Behayilu Mamo (PHD) in IT
Occupation: Technology College RCA and Software Engineering Instructor
Organization: Arba Minch University
Experience: Above 17 years
E-mail Address:
[email protected] Name: Zigiju Nebey (Msc in Information Technology)
Occupation: Lecturer
Organization: Habesha Technology College (F.Selam Campus)
Experience: Above 5 years
E-mail Address:
[email protected]NB:
The answer and top 10 student list for each term to be attach/send after a 1 month (Four terms
together once)
Page 1|3
NEE Sheet
.
Choose the best answer from the given alternatives
1. A collection of hyperlinked documents on the internet forms______.
A) World Wide Web (WWW) B) E-mail system
C) Mailing list D) Hypertext markup language
2. A function abc is defined as
void abc (int x=0, int y=0){
cout << x << y;
}
Which of the following function calls is/are incorrect? (Assume h, g are declared as integers)
A) abc(); B) abc(h); C) abc(g,h); D) None of the above
3. The location of a resource on the internet is given by its?
A) Protocol B) URL C) E-mail address D) ICQ
4. Which one of the following is not a network topology?
A) Star B) Ring C) Bus D) Peer to Peer
5. Which among the following feature is not in the general definition of OOPS?
A) Modularity B) Efficient Code C) Code reusability D) Duplicate or Redundant Data
6. _________indicates the process of scrambling the particular resource including data in OS security.
A) Spoofing B) Encryption C) Firewall D) Penetration
7. The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet
masks can be used for the above requirement?
A) 255.243.240 B) 255.255.0.0 C) 255.255.255.0 D) 255.255.255
8. In SQL, which command(s) is (are) used to enable/disable a database trigger?
A) Alter Trigger B) Alter Database C) Alter Table D) Modify Trigger
9. How many flip=flops are there in a flag register of 8085 microprocessor?
A) 4 B) 5 C) 7 D) 10
10. Which of the following definition is incorrect for polymorphism?
A) Polymorphism helps in redefining the same functionality
B) Polymorphism concept is the feature of object-oriented programming (OOP)
C) It always increases the overhead of function definition
D) Ease in the readability of the program
11. Which bar in windows shows you open windows?
A) The task bar B) The title bar C) The status bar D) The menu bar
12. Which one of the following is not a software process quality?
A) Visibility B) Timelines C) Productivity D) Portability
13. Which of the following is correct IPv4 address?
A) 124.201.3.1.52 B) 01.200.128.123 C) 300.142.210.64 D) 10110011.32.16.8 E) 128.64.0.0
14. __________ is not suitable for accommodating any change?
A) RAD Model B) Waterfall Model C) Build & Fix Model D) Prototyping Model
15. Which of the following IP addresses can be used as (a) loop-back addresses?
A) 0.0.0.0 B) 127.0.0.1 C) 255.255.255.255 D) 0.255.255.255
16. The statements
int a = 5;
cout << "FIRST" << (a <<2) << "SECOND";
outputs:
A) FIRST52SECOND B) FIRST20SECOND C) SECOND25FIRST D) an error message
Page 2|3
NEE Sheet
.
17. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
A) Host to host B) Application C) Internet D) Network Access
18. Which feature of OOPS described the reusability of code?
A) Abstraction B) Encapsulation C) Polymorphism D) Inheritance
19. How many types of access specifiers are provided in OOP (C++)?
A) 4 B) 3 C) 2 D) 1
20. A topology that involves Tokens.
A) Star B) Bus C) Ring D) Mesh
21. The feature by which one object can interact with another object is _____________
A) Message reading B) Message Passing C) Data transfer D) Data Binding
22. ______ is a technique that is used to send more than one call over a single line.
A) Digital transmission B) Infrared transmission
C) Digitizing D) Multiplexing
23. The following program output is:
int i=10;
void main ( ){
int i=20; A) 3010 B) 3020 C) 3030 D) Error
{
int i=30.;
cout << i << :: i ;
}
}
24. Which of the storage devices below is a primary storage device?
A. The CD ROM. B) The floppy diskette. C) The RAM. D) The hard disk
25. Agile Software Development is based on which of the following type?
A) Iterative Development B) Incremental Development
C) Both Incremental and Iterative Development D) Linear Development
26. The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine
representation differences with shared access resolution and ASCII test protocol is?
A) Network, Physical, Transport, Data link B) Network, Physical, Data link, Application
C) Network, Presentation, Data link, Application D) Network, Presentation, Physical, Transport
27. What is the binary equivalency of 26.6875?
A) 100.1011 B) 11010.1011 C) 0101.1010 D) 11010.0011
28. Interaction Diagram is a combined term for
A) Sequence Diagram + Collaboration Diagram B) Activity Diagram + State Chart Diagram
C) Deployment Diagram + Collaboration Diagram D) None of the mentioned
29. Which of the following register is not used in opcode fetch operations?
A) Program counter B) Memory address register
C) Memory data register D) Flag register
30. Data Manipulation Language (DML) is not to
A) Create information table in the Database B) Insertion of new information into the Database
C) Deletion of information in the Database D) Modification of information in the Database
Page 3|3
NEE Sheet