2015 Exit Exam modal
2015 Exit Exam modal
Introduction
The Ministry of Education of Ethiopia has announced the implementation of exit exam
for all undergraduate program students (public and private), beginning with the
2022/2023 academic year, in order to improve the quality of graduates produced by
higher learning institutions. The exit exam aimed at checking whether students have
acquired the required knowledge, skills and attitudes or not. To implement this, it
requires determining competency areas for a specific program, which is already
completed. Based on the competency areas prepared, it needs to plan the construction
of tests.
1|Page
Choose the best answer from the given alternatives (100pts)
1. Which one of the following is not true about SDLC?
A. It is a conceptual model that describes the stages involves in system development.
B. It enables to create high quality software as quickly, safely and cost
C. It involves mostly 5-7 phases of stages.
D. None
2. In which one of the following phase of SDLC, you meet customers or prospective customers,
analyzing market requirements and features that are in demand. You also find out if there is a
real need in the market for the software product you are trying to develop.
A. Planning C. Analysis and design
B. Requirement Gathering D. Implementation
3. Which one of the following is not true about UML?
A. Is a graphical language for visualizing, specifying, constructing, and documenting the
artifacts of a software-intensive system?
B. It offers a standard way to write a system's blueprints.
C. UML is a programming language used to model technical and graphical specification.
D. None
4. Which one of the following diagram is used to analyze the system’s high-level requirements using
actors and relationships?
A. Activity diagram C. Use case diagram
B. Sequence diagram D. Class diagram
5. Which one of the following UML diagrams is not behavioral diagram?
A. Activity diagram C. Use case diagram
B. Sequence diagram D. Class diagram
6. Which SDLC modeling technique arranges all the phases sequentially so that each new phase
depend upon the outcome the previous phase and the system is ready only after the last phase is
over?
A. Agile C. Spiral
B. Waterfall D. Iterative
2|Page
7. Which one of the following modeling technique is a way of breaking down the software
development of a large application into smaller pieces?
A. Agile C. Spiral
B. Waterfall D. Iterative
8. Which one the following is correctly matched according to the sections of a class in a class
diagram?
A. Upper section – class name
B. Middle section – methods name
C. Lower section – attributes name
D. ALL
9. Which one of the following protocol is used for communicating over a network and designed
explicitly as addressing protocol which divides any message into series of packets?
A. HTTP C. FTP
B. TCP/IP D. DHCP
12. Which one of the following is the correct sequence of tags in the structure of html
document?
A. body, head, html, title C. html, head, title, body
B. title, head, body, html D. head, body, html, title
13. Which of the following is the correct way to create a hyperlink in html?
A. <a href = “second.html”>SECOND</a>
3|Page
B. <hyperlink href= “second.html”>SECOND</hyperlink>
C. <a src= “second.html”>SECOND</a>
D. <link = “second.html” name= “SECOND”>
14. Which one the following is the correct about CSS syntax?
A. Selector {property= “value”}
B. Selector {property: value;}
C. Selector “property=value”
D. Selector {property: value}
15. Which of the following is the correct way to use external CSS in the html head section?
A. <link rel="stylesheet" type="text/css" src=“mycss.css">
B. <external rel="stylesheet" type="text/css" src=“mycss.css">
C. <link rel="stylesheet" type="text/css" href=“mycss.css">
D. <style rel="stylesheet" type="text/css" href=“mycss.css">
16. Which of the following is the correct way to use external JavaScript code in the html head
section?
A. <script type="text/javascript" src="filename.js" ></script>
B. <javaScript type="text/javascript" href= “filename.js”>
C. <link src= “filename.js type="text/javascript"” >javaScript</link>
D. <script type;text/javascript; , src:filename.js;></script>
17. Which following program is run on a web server to generate dynamic web pages by creating
a unique experience for each user?
A. Client-side scripts C. Front end scripts
B. Server-side scripts D. Cascading scripts
18. Which one of the following is not the functionalities of server-side scripts.
A. Manage data in a database
B. Send and receive cookies
C. Encrypt and validate data
D. Build Application Programming Interfaces (APIs)
19. Which one of the following is not true about PHP?
A. PHP documents end with the extension .php.
B. A PHP document will output only HTML.
4|Page
C. PHP stands for Hypertext Preprocessor.
D. It is a server-side scripting language that is embedded in HTML.
20. Which of the following is the correct way of defining a variable in PHP?
A. $var variable_name = value; C. $variable_name = value
B. $variable_name = value; D. $variable name as value;
21. Which one of the following is true about POST method?
A. POST requests are cached
B. POST requests remain in the browser history
C. POST requests can be bookmarked
D. POST requests have restrictions on data length
22. Which one of the following function is used to connect with MySQL database.
A. mysqli_connect() C. mysqli_error()
B. mysqli_close() D. mysqli_db()
23. Which one of the following is featuring of OOPS described the reusability of code?
A. Abstraction C. Polymorphism
B. Encapsulation D. Inheritance
24. Which of the following is not true about OOP concept?
A. Encapsulation C. Exception
B. Polymorphism D. Abstraction
25. Which of the following definition best describes the concept of polymorphism?
A. It is the ability to process the many messages and data in one way
B. It is the ability to process the undefined messages or data in at least one way
C. It is the ability to process the message or data in more than one form
D. It is the ability to process the message or data in only one form
26. Which one of the following is not true about Object-Oriented programming paradigm?
A. Allows the programmer to represent real-world scenarios using objects.
B. Objects communicate with each other by passing messages.
C. There are access specifiers in OOP.
D. It follows “Bottom-Up Approach”
27. Which of the following declaration of for loop statements is not valid?
5|Page
A. for ( int i = 99; i >= 0; i / 9 )
B. for ( int i = 7; i <= 77; i += 7 )
C. for ( int i = 20; i >= 2; - -i )
D. for ( int i = 2; i <= 20; i = 2* i )
28. What will be the output of the following program?
int values[ ] = {1,2,3,4,5,6,7,8,9,10};
for(int i=0;i< Y; ++i)
System.out.println(values[i]);
A. 1 C. 10
B. 12345678910 D. error
29. Which one of the following is byte code in java?
A. Code generated by java compiler
B. Block of codes written in java class
C. Extension of java code
D. Name of a library that contain bytes
30. Which one of the following is a template for creating different objects?
A. Array C. Method
B. Class D. Interface
31. Which one of the following is true about Rapid Application Development (RAD)?
A. Uses minimal planning in favor of rapid prototyping
B. Is a methodology that focuses on developing applications rapidly through frequent
iterations and continuous feedback
C. Provides Prototyping and early, reiterative user testing of designs
D. It reduced development time
E. All
32. Which one of the following is not true about .NET?
A. Is a software framework which is designed and developed by Microsoft.
B. It’s a programming language
C. .NET Framework supports more than 60 programming languages
D. Consists of developer tools, programming languages, and libraries to build
desktop and web applications.
6|Page
33. Which one of the following is the runtime environment that manages and executes the code
written in any .NET programming language.
A. Common language runtime
B. Framework Class Library
C. Base class library
D. .ADO
34. The CLR compiles the source code of applications developed using .NET compliant
languages into ____ _.
A. Source code C. Bytecode
B. MSIL D. Machine code
35. Every code written in C# have the extension of____.
A. .cpp C. .cs
B. .cc D. .c#
36. Which one the following is not element of GUI in event-driven programming?
A. Button B. Dialog boxes C. Event D. Menu
37. What is the outcome of the following configuring the router?
R1(config)#line vty 0 4
R1(config)#password checkit
R1(config)#login
A. Creating local user account for logging into a router or switch
B. Requires checkit to be entered before configuration can be saved
C. Set the password to be used for connecting to this router via telnet
D. Assure that the password is entered before entering user EXEC mode
38. Where the start-up configuration does is stored when configuring switch or router?
A. Startup config.txt B. DRAM C. NVRAM D. ROM
39. The default administrative distance of RIP’S is equal to
A. 15 B. 128 C. 120 D. 30
40. Which one of the following command used to display RIP routing updates?
A. Debug ip rip B. Show ip rip C. en ip rip D. exit ip rip
7|Page
41. A router with a valid operating system contains a configuration file stored in NVRAM. The
configuration file has an enable secret password but no console password. When the router
boots up, which mode will display?
A. global configuration mode
B. setup mode
C. Oprivileged EXEC mode
D. user EXEC mode
42. Which command is used to encrypt all passwords in a router configuration file?
A. Router_A (config)# enable secret <password>
B. Router_A (config)# service password-encryption
C. Router_A (config)# enable password <password>
D. Router_A (config)# encrypt password
43. Why it is difficult to routing loops to occur in the network in the link-state routing?
A. Routers use to hold down times to prevent routing loops.
B. Each router builds complete and synchronized views of the networking
C. E ach router builds a simple view of the network based on hop count.
D. Routers flood the network with LSAs to discover routing loops
44. Which one of the following statement is true about VLAN configuration?
A. The switch must be in the VTP server or Transparent mode before you can configure a
VLAN
B. The switch must be in the config-vlan mode before you configure an extended Vlan
C. Dynamic inter-VLAN routing is supported on the VLAN2 through VLAN 4064
D. Aswitch in VTP transparent mode save the VLAN database to the running configuration
only.
45. Which one of the following is a relational database technology that’s used most often when
the developer requires an embedded database in a small android application system?
A. SQLAppLite B. MySqlite C. SQLite D. ODBLite
46. Which one of the following is an expression in an android app’s manifest file that specifies the
type of intents that the component would like to receive?
A. bindService B. Intent filter C. Intent Service D. StartActivity
47. SQLiteOpenHelper class provides the functionality to create a database and calls a function that
can be overridden by the derived class and its constructor accepts all the following arguments
Except.
A. Version B. Context C. Factory D. Name E. Service
8|Page
48. If the service is designed with a client-server interface, you can bind to the service from an-
other component by passing an Intent to .
A, startService() B, bindService() C, startActivity() D, onActivityResult()
49. Which one of the following is asynchronous messages which allow application
components to request functionality from other Android components and allows you to
interact with components from the same applications as well as with components
contributed by other applications.
A. Service B. Activity C. Intent D. SQLite Database
50. Which one of the following is a core android library that provides applications with access to
standard operating system services including messages, system services and inter-process
communication?
A. android.content B. android.os C. android.app D. database
51. Which one of the following is the component of the android application help to play music in
the background while the user is in a different application?
A. Activities B. Content Providers C. Fragments D. services E. Broadcast Receivers
52. Which one of the following software is not categorized into mobile operating system?
9|Page
55. Which one of the following can be taken as source of Electromagnetic Interference?
A. Human body B. climate C. Natural event D. all
56. Power Protection Devices that constantly supplies power to the computer during blackouts &
brownouts and Gives the user of the computer enough time to safely shutdown the computer.
A. Uninterruptible Power Supply C. Standby Power Supply
B. surge suppressor D. ALL
57. Which one of the following is odd from other?
A. Review security, software, and driver updates.
B. Update virus definition files.
C. Scan for viruses and spyware.
D. Remove unwanted programs.
E. Repair or replace any components that show signs of excess wear
58. Which one of the following correct about troubleshooting process
A. Establish a theory of probable cause Identify the problemtest the theory
to determine causeEstablish a plan of action to resolve the problem and
implement thesolution verify full system functionalitydocument funding.
B. Establish a theory of probable causeIdentify the problem test the theory to
determine cause verify full system functionality Establish a plan of action to
re- solve the problem and implement the solution document funding.
C. Identify the problem Establish a theory of probable causetest the theory to
determine cause Establish a plan of action to resolve the problem and implement
thesolutionverify full system functionalitydocument funding.
D. Identify the problemEstablish a plan of action to resolve the problem and
implement the solution Establish a theory of probable cause test the theory to
deter-mine causeverify full system functionalitydocument funding.
59. Which one of the following is not cause the CPU to go fail?
A. High voltage spike B. Age C. Voltage regulator D. over clocking
10 | P a g e
60. Which one of the following is functions of Primary Memory:
A. It holds the OS instructions while the computer is booting.
B. It temporarily holds the input instructions from the input devices while the data is
being input and processed.
C. It stores the results temporarily until it is transferred to the respective output devices.
D. All of the above
61. Which one of the following is the require consideration when upgrading RAM module?
A. How much RAM does the system currently have?
B. How much RAM can the system use?
C. Which type and speed of RAM does the system have?
D. All of the above.
62. All of the following are importance of Multiple Partitions of disk except
A. Install more than one OS on your hard disk;
B. Make the most efficient use of your available disk space;
C. Physically separate disk so that it is easy to find files and back up data.
D. Make your files as secure as possible;
63. Which one of the following not functions of file system
A. Fetch instruction for execution may need operands from memory.
B. tracking allocated and free space,
C. maintaining directories and file names,
D. Tracking where each file is physically stored on the disk.
E. None of the above
64. Which one of the following keys is used to establish a relationship between two tables?
(Choose two.)
A. candidate B. foreign C. super key D. local E. primary
65. Which one of the following are characteristics of file based data management system?
A. Decentralized
B. Each program defines and manages its own data.
C. Redundancy of data
D. Doesn’t use programming language
E. All are correct except D
11 | P a g e
66. Which one of the following is DBMS facility which helps the database administrator to control the
database access and usage?
A. Data manipulation language
B. Data definition language
C. Data control language
D. Data dictionary
67. Which one of the following is correctly matched?
A. Conceptual design-> description of the data, data type, relationship between data
and constraints on the data
B. Logical design -> with selected data model
C. Physical design -> internal storage and file structure will be considered
D. None
68. Which of the following is correctly describes the meaning of terminology associated?
A. Network data model – relationship between parent and child is one-to-many
B. Hierarchical data model - relationship between parent and child is one-to-many
C. Relational data model - Stores information or data in the form of tables
D. B and C are correct
69. Which of the following is not advantage of normalization in logical design of database
A. Increasing access speed
B. Avoiding duplicate data
C. Minimize insert, update and delete anomalies
D. All are correct
70. Which one of the following attribute type can get its value by calculating from other attributes?
A. Composite B. Derived C. Simple D. Multi-valued
71. If A and B are attributes in table R, the expression A B shows
A. If we know A then we know B
B. If we know B then we know A
C. A is functionally dependent on B
D. B is functionally dependent on A
E. A and D are correct
72. Which one of the following does not causes conflict?
A. read(Q),read(Q).
B. read(Q),write(Q).
C. write(Q),read(Q).
D. write(Q),write(Q).
12 | P a g e
73. Which one of the following is purpose of concurrency control in the database transaction?
A. To leave the database in inconsistent state
B. To resolve read-write and write-write conflicts.
C. To enforce Isolation
D. B and C
74. When do we say the database transaction is well-formed transaction?
A. Not lock an already locked data items and it must not try to unlock a free data item.
B. Lock the data item before it reads or writes
C. Lock already locked item
D. A and B
75. Which one of the following statement is CORRECT about lock manager approach to handle
conflict based on timestamp?
A. In wait-die, an older transaction is allowed to wait on a younger transaction
B. In wound-wait, A younger transaction is allowed to wait on an older one
C. The lower the timestamp, the higher the transaction's priority
D. All
76. Assume A1 created two base relations EMPLOYEE and DEPARTMENT. Which one of
the following is possible in the above assumption?
A. A1 will be the owner of the objects
B. Al can grant privilege on the two relations
C. Al can revoke privilege granted on these two relations
D. All
77. Which one of the following SQL statement used to GRANT UPDATE ON EMPLOYEE
(SALARY) TO A4;
A. Grantee is A4 C. Granted privilege Update
B. Grantor is A4 D. A and C
78. If there is user for a DBMS, one of the following can be true
A. Authentication is checked next to Authorization
B. Authorization is checked next to Authentication
C. Both are checked at the same time
D. Authorization is related to level of the user
79. Which one of the following determines the measure of query cost?
A. Average block seek cost C. Average block write cost
B. Average block read cost D. All of the above
13 | P a g e
80. Which one of the following not uses of redirect request of servlet?
A. Redirects to indicated URL
B. Immediately terminate the current program
C. Use relative path to locate resources
D. None
81. Which of the following code retrieves the value of a request parameter?
A. Header.getParameter(name);
B. response.getParameter(name);
C. request.getParameter(name);
D. None of the above
82. When does doGet () method of servlet gets called?
A. A GET request results from a normal request for a URL
B. The service() method checks the HTTP request type as GET and calls doGet()
method
C. A and B
D. None of the above
F. A and C
83. Which 0ne of the following is true about destroy () method of java servlet life cycle?
A. Called when service is initiated
B. Called whenever request is received
C. Called when server shut down
D. Band C
84. Which one of the following correctly ordered?
A. Java application-> JDBC->Driver->Database
B. JDBC->Driver->Database ->Java application
C. Database ->Java application-> Driver-> JDBC
D. None
85. Which one of the following is parameter of socket object on the client side?
A. Port number B. Ip addresses C. Socket and Server D. A and B
86. Which one of the following can cause the thread to be blocked?
A. When join method is invoked
B. When sleep method is invoked
C. When wait method is invoked
D. All of the above
87. When two or more threads are accessing a common resource (method) in a way that causes a
conflict. This problem, known as a and managed by _ consecutively
A. Race condition , using synchronized keyword to the method
B. Sleep, wait keyword to the method
C. Join, lock keyword to the method
D. None of the above
14 | P a g e
88. Which type of hacker represents the highest risk to your network?
A. Black-hat hackers
B. Grey-hat hackers
C. Script kiddies
D. Disgruntled employees
89. A digital signature is a mathematical technique which validates
A. Authenticity B. Integrity C. Non-repudiation D. All of the above
90. Which term refers that change must be done by authorized entity through authorized way.
A. Confidentiality C. Authentication
B. Integrity D. Nonrepudiation
91. What we call the existence of weakness in a system or network?
A. Attack C. Vulnerability
B. Exploit D. Threat
92. Which of the following can minimize the chance of data disclosure?
A. Steganography C. Cryptography
B. Chorography D. Authentication
93. The purposes of a protocol are how it is communicated, defines what is communicated, and
when it is communicated. The protocol elements that work respectively are
A. Syntax, semantics, and timing C. syntax, timing and semantics,
B. semantics, timing, and syntax D. semantics, syntax and timing
94. which one of the following network transmission media bits are transmitted as a pulse of
light
A. Twisted pair cable B. Coaxial C. Fiber optic D. Radio wave
95. Which one of the following is transmission mode can transmit data in both direction but
transmits in only one direction at a time
A. Semi-duplex B. Simplex C. Full duplex D. Half Duplex
96. Which one of the following layer in the TCP/IP stack is equivalent to the transport layer of
the OSI model?
A. Network access B. Internet C. Host-to-Host D. Application
97. Assume you want to implement mechanism that automate the IP configuration, including ip
address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?
A. HTTP B. ARP C. FTP D. DHCP
15 | P a g e
98. Which one of the following OSI layer helps to uniquely hosts beyond the subnets and define
the path which the packet will follow or be route to reach the destination?
A. Transport layer B. Data link Layer C. Network Layer D. Physical layer
99. Which one of the following protocol is not application layer protocol?
A. DNS D. HTTP
B. SMTP E. Telnet
C. UDP
100. In OSI model, which one of the following layer transforms information from machine
format into that understandable by user?
A. Application layer B. session layer C. presentation layer D. physical layer
16 | P a g e