Information Technology V1
Information Technology V1
0/2023
3. Which one of the following is the top most layer of OSI Reference Model?
A. Application layer
B. physical layer
C. session layer
D. transport layer
5. If you want to calculate subnetting using the given IP address 192.168.100.154/27, what
will be the First IP address?
A. 192.168.100.128
B. 192.168.100.129
C. 192.168.100.158
D. 192.168.100.159
6. Assume you are network administrator at Wolkite satellite campus, if you face a
problems of LAN switch is not forwarding packets in the Data Center Room, What is the
possible Problem?
A. Either the Data center switch is not properly configured or the power is unplugged.
B. Either switch from other Room will down and UN plugged power.
C. The incoming line Cate 6e cable wills cross talk.
D. There is the problem of distortion from registrar network.
Information Technology Exit Exam Version 1.0/2023
7. On redundant system, you need to resolve network administration issues that results the
loss of a database file, what is the best solution to make your file to be normal?
A. Back up
B. Restore
C. format
D. reset
8. which one of the following is NOT the minimum requirements to install windows server
2012?
A. Processor speed: 1.4 GHz
B. Disk space: 32 GB
C. Screen size 18 inch
D. Memory (RAM): 512 MB
10. Which one of the following is a container object in Active directory domain services
which is primarily used to help with group policy application and the delegation of
permissions of other Active directory domain services objects? (understanding)
A. Organizational Units (OUs)
B. User Account Management
C. Dynamic host configuration protocol
D. Delegation
11. Assume that you want to share a folder on the network for specific group of users. What
is the next step you should take to ensure proper security and access control for the
shared folder?
A. Assign read only permission to all users to prevent accidental deletion.
B. Configure both share level and NTFS permissions to control access to the folder.
C. Share the folder with everyone in the network for ease of access.
D. Create a new user group for each user and assign specific permission.
Information Technology Exit Exam Version 1.0/2023
12. What specific setting should be configured in the group policy, if you are network
administrator and wants to configure a group policy that forces all users to change their
passwords every 35 days?
A. Password complexity requirements
B. Maximum password age
C. Password history
D. Minimum password length
13. When Mr.Asefw applies hardware diagnostics and troubleshooting procedures, He gets a
system notification of battery Low message; what does this alert indicates?
A. A failure of CMOS
B. A failure of Mother board
C. A failure of RAM
D. A failure of CPU
14. What could be the problem, if a computer emits a series of beeps during a startup?
A. Hard drive failure
B. Monitor connection issue
C. RAM module problem
D. Keyboard malfunction
15. What should be the appropriate action to be taken when a computer monitor displays
distorted images and colors?
A. Install additional RAM
B. Replace the graphics card
C. Replacing the motherboard
D. Update the USB driver
16. When you are installing AGP card in your functional computer but there is a system error
and application crashes, to ensure reliable computer operation and solve the problem,
what should you do?
A. Install another NIC in computer and restart it
B. Remove the installed AGP card from the computer and restart it
C. Install another operating system and restart the computer
D. Install another application software and restart the computer
Information Technology Exit Exam Version 1.0/2023
17. Suppose you are a computer expert, your client says the computer displays “NTLDR is
missing”, what is the possible solution for the detected problem?
A. Repairing the operating system.
B. Upgrading BIOS
C. Upgrading device drivers
D. Removing application software
18. Which one of the following is NOT Scenario for Initiating software development?
A. Real problem on the day-to-day task
B. Looking for effectiveness and efficiency
C. Sensing new opportunities and technologies
D. maximize complexity
20. Assume you want to analyses an inventory system of an organization, which type of
UML should be applied?
A. Essential use case diagram
B. Business rule
C. Activity diagram
D. DFD diagram
21. Assume you have to analyze a library management system in order to prepare an object-
oriented design, which steps of UML diagram will you use?
A. Use case diagram – Sequence diagram – Class diagram – deployment diagram
B. deployment diagram - Use case diagram – Sequence diagram – Class diagram
C. Class diagram – Sequence diagram – Use case diagram- deployment diagram
D. Class diagram– Use case diagram- deployment diagram– Sequence diagram
Information Technology Exit Exam Version 1.0/2023
22. Assume you have the CRC given figure. Which one of the following is correct about
Class Responsibility Collaborator respectively?
23. Which one is the correct order in Software Development Life Cycle?
A. Requirements gathering Design Systems analysis ImplementationTesting
B. Requirements gatheringSystems analysis Testing Implementation Design
C. Systems analysis Design Implementation Requirements gathering Testing
D. Requirements gatheringSystems analysis Design ImplementationTesting
24. Which one of the following is the main Memory that is used to store data and instructions
temporarily?
A. RAM (Random Access Memory)
B. ROM (Read Only Memory)
C. Cache Memory
D. External Hard disk
25. Which one of the following attributes does NOT have a direct impact on the execution of
a program?
A. Instruction sets
B. Data representation
C. Utility Software
D. Memory addressing techniques
26. Which one of the following is a combinational logic circuit with two inputs and two
outputs, and designed to add two single bit binary numbers?
A. Half Adders
B. Full adder
C. NOR gates
D. Encoders
Information Technology Exit Exam Version 1.0/2023
27. Which one of the following does NOT describe Binary number?
A. Low voltage represents binary 0 and high voltage represents binary 1
B. Computer the data is represented in binary format
C. The transistors are made to operate on a one state
D. Binary numbers are based on the concept of ON or OFF
28. Which one of the following is a fastest memory that can reduce the total program
execution time of the CPU?
A. Main Memory
B. Cache Memory
C. Memory address map
D. Memory Hierarchy
31. Which one of the following refers part of one or more subprograms in C++?
A. Functions
B. Comment
C. Token
D. Literal
33. What will be the output of the following statement when it is executed with in the main
function? { cout<<(5<4)&&(4>5)); }
A. 5
B. 1
C. 4
D. 0
Information Technology Exit Exam Version 1.0/2023
35. From the CIA triad of information security, which one of the following ensures that
authorized parties are able to access the information when needed?
A. Confidentiality
B. Integrity
C. Availability
D. Utility
36. Protecting your user login password using hash algorithm in the database table is an
example to which type of security component?
A. Confidentiality
B. Integrity
C. Availability
D. Utility
37. Which one of the following information security threats refers gaining access to a
network and inserting a program or utility that creates an entrance for an attacker?
A. Social engineering
B. Back door Attacks
C. Brute Force Attach
D. Snooping attacks
Information Technology Exit Exam Version 1.0/2023
38. Which one of the following information security mechanisms is used to trace which
clients accessed what, and which part of information?
A. Encryption
B. Authentication
C. Authorization
D. Auditing
39. What is the type of cryptography is used, if encryption and decryption of information is
done using the same key?
A. Simple cryptography
B. Complex cryptography
C. Symmetric cryptography
D. Asymmetric cryptography
42. In E-R modeling, which one of the following diagrams is used to represent a
relationship?
A. Rectangle
B. Oval
C. Diamond
D. Underlined Oval
Information Technology Exit Exam Version 1.0/2023
43. Which one of the following is a correct comparison between primary key attributes and
foreign key attributes of databases?
A. Both primary key and foreign key attributes are used to identify a unique record from
a database table.
B. Foreign key attribute is an attribute used to identify a single record and a primary key
is used to establish a relationship in a many to one cardinality ratios.
C. Primary keys are dependent on foreign key in such a way copied from foreign key.
D. Foreign keys are used to establish a relationship of database in such a way primary
keys are copied and used in a one-to-many relationship types.
44. What is the correct way of inserting a record into a database table called STUDENT for
SQL server database?
A. Insert into STUDENT (student_id, name) values (“1751”,” Alex”);
B. Insert in STUDENT (student_id, name) values (“1751”,” Alex”);
C. Insert values (“1751”,” Alex”) into STUDENT (student_id, name);
D. Insert into values (“1751”,” Alex”) in STUDENT (student_id, name);
Answer:A
45. Assume you have database called TVTI and one of the tables is STUDENT, what will be
the effect of the below SQL COMMAND when running it in an SQL Server database?
Use TVTI;
Delete from STUDENT;
A. A single student recorded will be deleted from the database table STUDENT.
B. All records the students will be deleted from the table STUDENT.
C. A single record will be updated from the database table STUDENT
D. All records of the student will be updated by a new record.
47. In Java programming, which one of the following is a correct form of variable
declaration?
A. int float;
B. int 6tvet;
C. int mols&;
D. int $num;
Information Technology Exit Exam Version 1.0/2023
48. What will be the output of the following java programming code snippet?
boolean x=true;
boolean y=false;
System.out.println(x||y);
A. true
B. false
C. x||y
D. error
50. In object-oriented programming, which one of the following is true about java
constructors?
A. Constructors are special methods that have the same name with the class.
B. In java programming constructors should always be defined by the name constructor.
C. Constructors are function that should be defined without parameters.
D. Constructors are function should be defined with return type.
Information Technology Exit Exam Version 1.0/2023
51. Which of the following statement is true about the following code snippet programmed
as solutions to solve a simple mathematical geometry?
class rectangle {
double width,height;
rectangle (double w,double h){
width=w;
height=h;
}
void calArea(){}
double calcPerimeter(){}
53. Which one of the following refers transmitting and receiving voice and data using
electromagnetic waves in open space?
A. Wireless communication
B. EM wave generation
C. Ubiquitous computing
D. Internet of things (IOT)
55. Which attribute is used to specify the font size of a TextView in Android XML?
A. font_size
B. text_size
C. size
D. font
56. Assume you have a Button for your android user interface, if you want to apply a click
event using anonymous inner class method what are the steps that you will follow.
A. Register the button on set OnclickListner method and define the event handler
method of onClick().
B. Register the button on setOnLongClickListner method and define the event handler
method of onClick().
C. Register the button on setOnFocusChangeLestner method and define the event
handler method of onFocusChange().
D. Register the button on setOnItemSelectedListener method and define the event
handler method of OnItemSelected().
58. If you want to create a hyperlink on a text that links to html file called “products.html”,
which one of the following is the correct code?
A. <a href="products.html"> our products </a>
B. <a hyperlink =”products .html”> our products </a>
C. <a link=”products.html”> our products </a>
D. <a src=”products.html”> our products </a>
59. Assume you are developing a webpage and you want to include descriptive information
about the website using the Meta tags. Where is the correct place to include the Meta
tags?
A. Inside the <Body> Tag
B. Inside the <Head> Tag
C. Inside the <HTML> Tag
D. Inside the <Title> Tag
60. From the given alternatives, which input type enforces the user to insert information on
the username field?
Information Technology Exit Exam Version 1.0/2023
61. What is the correct way to create a paragraph with a font size=40, color=red and with a
Times New Roman font in CSS?
A. <font size="50" face=" Times New Roman " color="red"> This paragraph</font>
B. <p style="font-family: Times New Roman;color:red;font-size:50px;"> This
paragraph</p>
C. <p size="50" face=" Times New Roman " color="red"> This paragraph</font>
D. <p font-family: Times New Roman color:red font-size:50px > This paragraph</p>
62. A web developer wants to create a registration form and apply validation in each form
element to accept only the required information, which language he can use?
A. Cascading style sheets
B. JavaScript
C. C++
D. HTML
$result=20;
$num1 = 10;
$num2 = 5;
$result = $num1 + $num2;
What is the value of the $result variable after executing this code?
A. 5
B. 10
C. 15
D. "10 + 5"
65. Consider the following PHP code: What will be the output of this code if $score is 85?
Information Technology Exit Exam Version 1.0/2023
67. Which of the following is a commonly used method for connecting to a MySQL database
in PHP, allowing the execution of SQL queries?
A. mysqli_connect()
B. mysqli_query()
C. mysqli_close()
D. mysql_connect()
68. Which one of the following is a category of Media that is based on how humans perceive
information like Visual media and auditory media?
A. Presentation media
B. Representation media
C. Perception media
D. Transmission media
Information Technology Exit Exam Version 1.0/2023
69. From the different elements of a multimedia, which one of the following is considered as
a static media?
A. Video
B. Graphic
C. Animation
D. Audio
70. A client wants to enlarge or zoom an image using an image editing application; however,
the image immediately becomes blurred. What would be the possible problem?
A. The image has a lower resolution
B. The image has a large file size
C. The image has a higher resolution
D. The image has a wrong file format
71. A company wants audio editing tools, which include multitrack productions and sound
file editing, along with digital signal processing effects. Which application would be most
suitable for this purpose?
A. Adobe Audition
B. Macromedia Flash
C. Macromedia Authorware
D. Adobe Premiere
72. A client experienced a difficulty in opening a file with a file extension called “.AVI”. As
a technician analyze the problem and select your possible recommendation?
A. I will check if a word processing application is installed on the device.
B. I will check if a Video player application is installed on the device.
C. I will check if an audio player application is installed on the device.
D. I will check if a picture opening application is installed on the device.
73. From the given alternatives, which one is a program that acts as an intermediary between
a user of a computer and the computer hardware?
A. Driver
B. Operating system
C. Application Software
D. Utility software
Information Technology Exit Exam Version 1.0/2023
74. Which component of an operating system is responsible for Allocating time & memory to
programs and handles the file store & communication in response to system calls?
A. File system
B. Shell
C. Kernel
D. Compiler
75. From the alternatives examples that a CPU Scheduling decision may take place, which
one of them can be an example for non-preemptive or cooperative scheduling scheme?
A. When a process switches from running to waiting state
B. When a process switches from running to ready state
C. When a process switches from waiting to ready state
D. None of the Above
76. Which of the following statements best describes an operating system concept called
“Deadlock”?
A. It is a blocking of processes that compete for system resources.
B. It is a situation where several processes access shared data concurrently.
C. It is a process to allocate memory resources to running programs.
D. It is a situation happened when a memory overflow occurred.
77. Which one of the following is a memory-management technique that states a process can
be exchanged temporarily out of memory to a backing store and then brought back into
memory for continued execution?
A. Continuous Memory Allocation
B. Swapping
C. Paging
D. Segmentation
78. Which one of the following is NOT true about the .Net framework?
A. It is a software framework that runs primarily on Microsoft Windows.
B. It is providing a common platform to Execute programming languages
C. Run the applications developed in various programming languages
D. It is platform Independent.
Information Technology Exit Exam Version 1.0/2023
79. Which one of the following window components is used to accept a text input from a
user?
A. Text box
B. Check box
C. Radio button
D. Label
80. In C# programing, how much is the size to the data type of integer?
A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes
81. Which one of the following alternatives progresses from the narrowest to the broadest
levels of curriculum?
A. Experiential Curriculum–Societal Curriculum–Institutional Curriculum–
Instructional Curriculum
B. Experiential Curriculum – Instructional Curriculum – Institutional Curriculum–
Societal Curriculum
C. Instructional curriculum– Experiential Curriculum– Instructional Curriculum–
Societal Curriculum
D. Societal Curriculum– Institutional Curriculum – Instructional Curriculum –
Experiential Curriculum
82. If teacher ‘A’ decides to make some of the students repeat a course as a result of their low
performance, which of the following can best describe his action?
A. The teacher used ways to obtain information in a quantitative form
B. The teacher used to make observation and assigning a number value.
C. The teacher used judgment about the value of a student’s performance.
D. The teacher used immoral reference method of assessment.
84. Mr. Hadgu always introduces learning outcomes before starting teaching students. By
doing this, which principle of teaching is Mr. Hadgu applying? The principle of:
A. recognizing individual differences in teaching
B. linking/connecting school learning activities to social life
C. communicating the objectives of the lesson
D. the leading role of the teacher and the independent activities of the learner
85. Which foundation of curriculum provides the theories and principles that help teachers
understand the factors that influence teacher-student behavior within the context of
curriculum implementation?
A. Historical foundation
B. Psychological foundation
C. Sociological foundation
D. Philosophical foundation
86. One is the advantage of using true/false test items during the test construction.
A. Enable to recognize cause – and – effect relationships.
B. Limited to learning outcomes in the knowledge area.
C. It is susceptible to guessing with a fifty-fifty chance of the examinee.
D.It is relatively easy to score and construct the items.
87. The scope of Educational Psychology deals about classroom climate, group dynamics
help to make guidance and counselling in the certain scope is
A. Learning situation
B. The learner
C. The learning processes
D. The teacher
88. Which one of the following is true about teacher-centered methods of teaching?
A. They promote deep learning
B. They appeal to the needs and interests of diverse students
C. They are suitable when there is a large content to be covered in a short time
D. They are appropriate when the objective is to promote creative thinking
Information Technology Exit Exam Version 1.0/2023
89. ‘’The learning situation (what goes on in the TVET classrooms) should look like the
situation in which learning is to be used in the industry’’ This description goes to which
of the following criteria of content selection?
A. Relevance
B. Learnability
C. Continuity
D. Suitability
90. When an organization gives an exam and wants to organize the students in their
appropriate group or class, which type of evaluation is the organization using?
A. Formative Evaluation
B. Placement Evaluation
C. Summative evaluation
D. Diagnostic Evaluation
91. If a student studies hard to obtain better grades, getting prize and incentives, which type
of motivation guides his action?
A. Intrinsic motivation
B. Attribution theory of motivation
C. Extrinsic motivation
D. Drive- reduction theory of motivation
92. Which one of the following is correct about the relationship between occupational
standard (OS) and training standard (TS)?
A. Training standards are employment specifications
B. Occupational standards must follow Training standard
C. Occupational standard needs to be derived or developed from unit of instruction
D. Occupational standard reflects the specific job for which a student is to be prepared
94. Of the lists given below one contains the levels of Affective domain. Which?
A. Knowledge, Comprehension, Application, analysis, evaluation, & creation
B. Receiving, Responding, Valuing, organizing, &characterization
C. Imitation, Manipulation, Precision, articulation, & naturalization
D. Naturalization, Evaluating, Analyzing, organization, Synthesis
96. Which one of the following is not true about instructional plan?
A. It helps to ensure subject mastery
B. It develops teacher’s confidence
C. It eases the burden of the teacher
D. It ensures wise usage of time
97. According to the Systematic Curriculum and Instructional Development (SCID) model of
curriculum development by Norton (1992), the Development stage/phase consists of the
following activities
A. Development, analysis, design, implementation, & evaluation
B. Design, development, analysis, implementation, & evaluation
C. Analysis, design, development, implementation, & evaluation
D. Evaluation, development, analysis, design, & implementation
98. Which one of the following is not a common problem for a teacher made test?
A. It is well-intended to measure what they are supposed to measure.
B. It represents sample of the whole topic they taught.
C. It is prepared appropriately according to difficulty levels.
D. It is focused on special group of students excluding others.
99. According to Abraham Maslow, food, rest, and pain avoidance are categorized under
A. Physiological needs
B. Safety needs
C. Esteem needs
D. Self-actualization needs
Information Technology Exit Exam Version 1.0/2023
100. To which of Bloom’s hierarchy of the cognitive domain does the objective below belong to?
Objective: “At the end of this lesson, the student will be able to determine whether using
teacher centered teaching methods or learner-centered teaching methods would be more
appropriate for increasing student learning.”
A. Comprehension
B. Analysis
C. Evaluation
D. Application