0% found this document useful (0 votes)
70 views22 pages

Information Technology V1

Uploaded by

zinabuu7263
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views22 pages

Information Technology V1

Uploaded by

zinabuu7263
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Information Technology Exit Exam Version 1.

0/2023

1. Which one of the following is NOT a guided transmission media?


A. Twisted pair cables
B. Coaxial
C. Fiber optic
D. Wireless

2. Which data communication component sends a message to the receiver?


A. Message
B. Sender
C. Receiver
D. Protocol

3. Which one of the following is the top most layer of OSI Reference Model?
A. Application layer
B. physical layer
C. session layer
D. transport layer

4. Which one of the following is NOT correct about IP addressing classes?


A. class C addresses is always between 192 and 223
B. class D addresses is always between 192 and 223
C. class A addresses is always between 0 and 127
D. class B addresses is always between 128 and 191

5. If you want to calculate subnetting using the given IP address 192.168.100.154/27, what
will be the First IP address?
A. 192.168.100.128
B. 192.168.100.129
C. 192.168.100.158
D. 192.168.100.159

6. Assume you are network administrator at Wolkite satellite campus, if you face a
problems of LAN switch is not forwarding packets in the Data Center Room, What is the
possible Problem?
A. Either the Data center switch is not properly configured or the power is unplugged.
B. Either switch from other Room will down and UN plugged power.
C. The incoming line Cate 6e cable wills cross talk.
D. There is the problem of distortion from registrar network.
Information Technology Exit Exam Version 1.0/2023

7. On redundant system, you need to resolve network administration issues that results the
loss of a database file, what is the best solution to make your file to be normal?
A. Back up
B. Restore
C. format
D. reset

8. which one of the following is NOT the minimum requirements to install windows server
2012?
A. Processor speed: 1.4 GHz
B. Disk space: 32 GB
C. Screen size 18 inch
D. Memory (RAM): 512 MB

9. Mr. Misker is a server administrator of CISCO COMPANY. However, there are a


number of computers which is very challenging for him to give an IP address manually.
What is the best solution?
A. Configuring Remote desk top
B. Configuring DHCP
C. Configuring DNS
D. Configuring File Server

10. Which one of the following is a container object in Active directory domain services
which is primarily used to help with group policy application and the delegation of
permissions of other Active directory domain services objects? (understanding)
A. Organizational Units (OUs)
B. User Account Management
C. Dynamic host configuration protocol
D. Delegation

11. Assume that you want to share a folder on the network for specific group of users. What
is the next step you should take to ensure proper security and access control for the
shared folder?
A. Assign read only permission to all users to prevent accidental deletion.
B. Configure both share level and NTFS permissions to control access to the folder.
C. Share the folder with everyone in the network for ease of access.
D. Create a new user group for each user and assign specific permission.
Information Technology Exit Exam Version 1.0/2023

12. What specific setting should be configured in the group policy, if you are network
administrator and wants to configure a group policy that forces all users to change their
passwords every 35 days?
A. Password complexity requirements
B. Maximum password age
C. Password history
D. Minimum password length

13. When Mr.Asefw applies hardware diagnostics and troubleshooting procedures, He gets a
system notification of battery Low message; what does this alert indicates?
A. A failure of CMOS
B. A failure of Mother board
C. A failure of RAM
D. A failure of CPU

14. What could be the problem, if a computer emits a series of beeps during a startup?
A. Hard drive failure
B. Monitor connection issue
C. RAM module problem
D. Keyboard malfunction

15. What should be the appropriate action to be taken when a computer monitor displays
distorted images and colors?
A. Install additional RAM
B. Replace the graphics card
C. Replacing the motherboard
D. Update the USB driver

16. When you are installing AGP card in your functional computer but there is a system error
and application crashes, to ensure reliable computer operation and solve the problem,
what should you do?
A. Install another NIC in computer and restart it
B. Remove the installed AGP card from the computer and restart it
C. Install another operating system and restart the computer
D. Install another application software and restart the computer
Information Technology Exit Exam Version 1.0/2023

17. Suppose you are a computer expert, your client says the computer displays “NTLDR is
missing”, what is the possible solution for the detected problem?
A. Repairing the operating system.
B. Upgrading BIOS
C. Upgrading device drivers
D. Removing application software

18. Which one of the following is NOT Scenario for Initiating software development?
A. Real problem on the day-to-day task
B. Looking for effectiveness and efficiency
C. Sensing new opportunities and technologies
D. maximize complexity

19. Types of qualitative requirements that describe what should have?


A. Non-Functional requirements
B. Constraints
C. Functional requirements
D. Pseudo requirements

20. Assume you want to analyses an inventory system of an organization, which type of
UML should be applied?
A. Essential use case diagram
B. Business rule
C. Activity diagram
D. DFD diagram

21. Assume you have to analyze a library management system in order to prepare an object-
oriented design, which steps of UML diagram will you use?
A. Use case diagram – Sequence diagram – Class diagram – deployment diagram
B. deployment diagram - Use case diagram – Sequence diagram – Class diagram
C. Class diagram – Sequence diagram – Use case diagram- deployment diagram
D. Class diagram– Use case diagram- deployment diagram– Sequence diagram
Information Technology Exit Exam Version 1.0/2023

22. Assume you have the CRC given figure. Which one of the following is correct about
Class Responsibility Collaborator respectively?

A. Student, seminar and Address is Class Responsibility Collaborator


B. Seminar, Student, and name is Class Responsibility Collaborator
C. Student, seminar and Id is Class Responsibility Collaborator
D. Student, Address, and Seminar is Class Responsibility Collaborator

23. Which one is the correct order in Software Development Life Cycle?
A. Requirements gathering Design  Systems analysis ImplementationTesting
B. Requirements gatheringSystems analysis  Testing Implementation Design
C. Systems analysis Design Implementation Requirements gathering Testing
D. Requirements gatheringSystems analysis Design ImplementationTesting

24. Which one of the following is the main Memory that is used to store data and instructions
temporarily?
A. RAM (Random Access Memory)
B. ROM (Read Only Memory)
C. Cache Memory
D. External Hard disk

25. Which one of the following attributes does NOT have a direct impact on the execution of
a program?
A. Instruction sets
B. Data representation
C. Utility Software
D. Memory addressing techniques

26. Which one of the following is a combinational logic circuit with two inputs and two
outputs, and designed to add two single bit binary numbers?
A. Half Adders
B. Full adder
C. NOR gates
D. Encoders
Information Technology Exit Exam Version 1.0/2023

27. Which one of the following does NOT describe Binary number?
A. Low voltage represents binary 0 and high voltage represents binary 1
B. Computer the data is represented in binary format
C. The transistors are made to operate on a one state
D. Binary numbers are based on the concept of ON or OFF

28. Which one of the following is a fastest memory that can reduce the total program
execution time of the CPU?
A. Main Memory
B. Cache Memory
C. Memory address map
D. Memory Hierarchy

29. What is the output of the given C++ code?


int main()
{ int age =88;
//int Age=80;
cout <<"Age: " << age << endl;
return 0;
}
A. age: 88
B. Age: 88
C. Age: 80:
D. Age: 80:;
Information Technology Exit Exam Version 1.0/2023

30. What is the output of the given C++ code?


#include <iostream>
#include <iostream>
using namespace std;
int main() {
int num;
num = 4;
cout<< " number:" <<num<<endl;
cout<< " number:" <<++num<<endl;
cout<< " number:" << num<<endl;
return 0;
}

A. number:4 number:5 number:6


B. number:4
number:5
number:5
C. number:4 number:4 number:5
D. number:5
number:6
number:6

31. Which one of the following refers part of one or more subprograms in C++?
A. Functions
B. Comment
C. Token
D. Literal

32. Which one of the following is an INVALID identifier in C++?


A. _abC
B. float
C. xyz9
D. xy_12

33. What will be the output of the following statement when it is executed with in the main
function? { cout<<(5<4)&&(4>5)); }
A. 5
B. 1
C. 4
D. 0
Information Technology Exit Exam Version 1.0/2023

34. What is the output of the given C++ code?


#include <iostream>
using namespace std;
int main() {
int day [] = {10, 2, 77, 40, 6};
int n, result=0;
for ( n=0 ; n<5 ; n++ ) {
result += day[n];
}
cout << result;
return 0;
}
A. 89
B. 129
C. 135
D. 119

35. From the CIA triad of information security, which one of the following ensures that
authorized parties are able to access the information when needed?
A. Confidentiality
B. Integrity
C. Availability
D. Utility

36. Protecting your user login password using hash algorithm in the database table is an
example to which type of security component?
A. Confidentiality
B. Integrity
C. Availability
D. Utility

37. Which one of the following information security threats refers gaining access to a
network and inserting a program or utility that creates an entrance for an attacker?
A. Social engineering
B. Back door Attacks
C. Brute Force Attach
D. Snooping attacks
Information Technology Exit Exam Version 1.0/2023

38. Which one of the following information security mechanisms is used to trace which
clients accessed what, and which part of information?
A. Encryption
B. Authentication
C. Authorization
D. Auditing

39. What is the type of cryptography is used, if encryption and decryption of information is
done using the same key?
A. Simple cryptography
B. Complex cryptography
C. Symmetric cryptography
D. Asymmetric cryptography

40. What is DBMS (database management system)?


A. It is collection of data the enable users to analyses and uses it.
B. It is a program that enable users to create and maintain a database.
C. It is an organized collection of data that can be accessed, updated, and managed.
D. It is an information retrieving and accessing method where data is converted into
information.

41. Which one of the following refers a collection of interrelated data?


A. DBMS
B. RDBMS
C. Database
D. File

42. In E-R modeling, which one of the following diagrams is used to represent a
relationship?
A. Rectangle
B. Oval
C. Diamond
D. Underlined Oval
Information Technology Exit Exam Version 1.0/2023

43. Which one of the following is a correct comparison between primary key attributes and
foreign key attributes of databases?
A. Both primary key and foreign key attributes are used to identify a unique record from
a database table.
B. Foreign key attribute is an attribute used to identify a single record and a primary key
is used to establish a relationship in a many to one cardinality ratios.
C. Primary keys are dependent on foreign key in such a way copied from foreign key.
D. Foreign keys are used to establish a relationship of database in such a way primary
keys are copied and used in a one-to-many relationship types.

44. What is the correct way of inserting a record into a database table called STUDENT for
SQL server database?
A. Insert into STUDENT (student_id, name) values (“1751”,” Alex”);
B. Insert in STUDENT (student_id, name) values (“1751”,” Alex”);
C. Insert values (“1751”,” Alex”) into STUDENT (student_id, name);
D. Insert into values (“1751”,” Alex”) in STUDENT (student_id, name);
Answer:A
45. Assume you have database called TVTI and one of the tables is STUDENT, what will be
the effect of the below SQL COMMAND when running it in an SQL Server database?
Use TVTI;
Delete from STUDENT;
A. A single student recorded will be deleted from the database table STUDENT.
B. All records the students will be deleted from the table STUDENT.
C. A single record will be updated from the database table STUDENT
D. All records of the student will be updated by a new record.

46. Which one of the following is a blue print for objects?


A. Object
B. Class
C. Inheritance
D. Polymorphism

47. In Java programming, which one of the following is a correct form of variable
declaration?
A. int float;
B. int 6tvet;
C. int mols&;
D. int $num;
Information Technology Exit Exam Version 1.0/2023

48. What will be the output of the following java programming code snippet?
boolean x=true;
boolean y=false;
System.out.println(x||y);
A. true
B. false
C. x||y
D. error

49. In object-oriented programming, state and behaviors of an object is converted to


__________and __________ in the class definition respectively.
A. Instance variable declaration and method declaration
B. Object instantiation and object declaration
C. Functions and object instantiation
D. Class name and main function

50. In object-oriented programming, which one of the following is true about java
constructors?
A. Constructors are special methods that have the same name with the class.
B. In java programming constructors should always be defined by the name constructor.
C. Constructors are function that should be defined without parameters.
D. Constructors are function should be defined with return type.
Information Technology Exit Exam Version 1.0/2023

51. Which of the following statement is true about the following code snippet programmed
as solutions to solve a simple mathematical geometry?
class rectangle {
double width,height;
rectangle (double w,double h){
width=w;
height=h;
}
void calArea(){}
double calcPerimeter(){}

}//end of class rectangle


class square extends rectangle {
square (double d){
super(d,d);
}
}// end of sub class square
A. The program has a constructor called rectangle.
B. The program doesn’t have constructor.
C. The function calcPerimeter doesn’t return anything.
D. Class rectangle is child class and, class square is super class.

52. Which one of the following is the future of mobile computing?


A. Sensor
B. Ubiquitous computing
C. Distributed computing
D. Centralized computing

53. Which one of the following refers transmitting and receiving voice and data using
electromagnetic waves in open space?
A. Wireless communication
B. EM wave generation
C. Ubiquitous computing
D. Internet of things (IOT)

54. Which file is used to define the layout of an Android activity?


A. .java file
B. .xml file
C. .txt file
D. .html file
Information Technology Exit Exam Version 1.0/2023

55. Which attribute is used to specify the font size of a TextView in Android XML?
A. font_size
B. text_size
C. size
D. font

56. Assume you have a Button for your android user interface, if you want to apply a click
event using anonymous inner class method what are the steps that you will follow.
A. Register the button on set OnclickListner method and define the event handler
method of onClick().
B. Register the button on setOnLongClickListner method and define the event handler
method of onClick().
C. Register the button on setOnFocusChangeLestner method and define the event
handler method of onFocusChange().
D. Register the button on setOnItemSelectedListener method and define the event
handler method of OnItemSelected().

57. Which one of the following statements describes HTTP protocol?


A. It is used for retrieving e-mail messages from a e-mail server.
B. It is used for moving files from one machine to another.
C. It is used to transmit web pages across the Internet.
D. It is used for sending e-mail messages.

58. If you want to create a hyperlink on a text that links to html file called “products.html”,
which one of the following is the correct code?
A. <a href="products.html"> our products </a>
B. <a hyperlink =”products .html”> our products </a>
C. <a link=”products.html”> our products </a>
D. <a src=”products.html”> our products </a>

59. Assume you are developing a webpage and you want to include descriptive information
about the website using the Meta tags. Where is the correct place to include the Meta
tags?
A. Inside the <Body> Tag
B. Inside the <Head> Tag
C. Inside the <HTML> Tag
D. Inside the <Title> Tag

60. From the given alternatives, which input type enforces the user to insert information on
the username field?
Information Technology Exit Exam Version 1.0/2023

A. <input type="text" name="username" min=5 max= 10 >


B. <input type="text" name="username" autofocus>
C. <input type="text" name="username" required>
D. <input type="text" name="username” enforce>

61. What is the correct way to create a paragraph with a font size=40, color=red and with a
Times New Roman font in CSS?
A. <font size="50" face=" Times New Roman " color="red"> This paragraph</font>
B. <p style="font-family: Times New Roman;color:red;font-size:50px;"> This
paragraph</p>
C. <p size="50" face=" Times New Roman " color="red"> This paragraph</font>
D. <p font-family: Times New Roman color:red font-size:50px > This paragraph</p>

62. A web developer wants to create a registration form and apply validation in each form
element to accept only the required information, which language he can use?
A. Cascading style sheets
B. JavaScript
C. C++
D. HTML

63. Which one of the following statements is wrong about PHP?


A. PHP is a server-side scripting language
B. PHP can generate dynamic page content
C. PHP files can contain text, HTML, CSS, JavaScript
D. PHP is a client-side scripting language

64. Consider the following PHP code:

$result=20;
$num1 = 10;
$num2 = 5;
$result = $num1 + $num2;
What is the value of the $result variable after executing this code?
A. 5
B. 10
C. 15
D. "10 + 5"

65. Consider the following PHP code: What will be the output of this code if $score is 85?
Information Technology Exit Exam Version 1.0/2023

if ($score >= 90)


{
$grade = "A";
} elseif ($score >= 80)
{
$grade = "B";
}
elseif ($score >= 70)
{
$grade = "C";
}
else
{
$grade = "D";
}
echo "Grade: $grade";
A. Grade: A
B. Grade: B
C. Grade: C
D. Grade: D

66. What is form validation, and why is it essential in web development?


A. Form validation ensures that web forms are visually appealing and user-friendly.
B. Form validation is the process of encrypting data transmitted from web forms.
C. Form validation ensures that user input in web forms meets specific criteria.
D. Form validation ensures that web forms are accessible on various devices and browsers.

67. Which of the following is a commonly used method for connecting to a MySQL database
in PHP, allowing the execution of SQL queries?
A. mysqli_connect()
B. mysqli_query()
C. mysqli_close()
D. mysql_connect()

68. Which one of the following is a category of Media that is based on how humans perceive
information like Visual media and auditory media?
A. Presentation media
B. Representation media
C. Perception media
D. Transmission media
Information Technology Exit Exam Version 1.0/2023

69. From the different elements of a multimedia, which one of the following is considered as
a static media?
A. Video
B. Graphic
C. Animation
D. Audio

70. A client wants to enlarge or zoom an image using an image editing application; however,
the image immediately becomes blurred. What would be the possible problem?
A. The image has a lower resolution
B. The image has a large file size
C. The image has a higher resolution
D. The image has a wrong file format

71. A company wants audio editing tools, which include multitrack productions and sound
file editing, along with digital signal processing effects. Which application would be most
suitable for this purpose?
A. Adobe Audition
B. Macromedia Flash
C. Macromedia Authorware
D. Adobe Premiere

72. A client experienced a difficulty in opening a file with a file extension called “.AVI”. As
a technician analyze the problem and select your possible recommendation?
A. I will check if a word processing application is installed on the device.
B. I will check if a Video player application is installed on the device.
C. I will check if an audio player application is installed on the device.
D. I will check if a picture opening application is installed on the device.

73. From the given alternatives, which one is a program that acts as an intermediary between
a user of a computer and the computer hardware?
A. Driver
B. Operating system
C. Application Software
D. Utility software
Information Technology Exit Exam Version 1.0/2023

74. Which component of an operating system is responsible for Allocating time & memory to
programs and handles the file store & communication in response to system calls?
A. File system
B. Shell
C. Kernel
D. Compiler

75. From the alternatives examples that a CPU Scheduling decision may take place, which
one of them can be an example for non-preemptive or cooperative scheduling scheme?
A. When a process switches from running to waiting state
B. When a process switches from running to ready state
C. When a process switches from waiting to ready state
D. None of the Above

76. Which of the following statements best describes an operating system concept called
“Deadlock”?
A. It is a blocking of processes that compete for system resources.
B. It is a situation where several processes access shared data concurrently.
C. It is a process to allocate memory resources to running programs.
D. It is a situation happened when a memory overflow occurred.

77. Which one of the following is a memory-management technique that states a process can
be exchanged temporarily out of memory to a backing store and then brought back into
memory for continued execution?
A. Continuous Memory Allocation
B. Swapping
C. Paging
D. Segmentation

78. Which one of the following is NOT true about the .Net framework?
A. It is a software framework that runs primarily on Microsoft Windows.
B. It is providing a common platform to Execute programming languages
C. Run the applications developed in various programming languages
D. It is platform Independent.
Information Technology Exit Exam Version 1.0/2023

79. Which one of the following window components is used to accept a text input from a
user?
A. Text box
B. Check box
C. Radio button
D. Label

80. In C# programing, how much is the size to the data type of integer?
A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 32 bytes

81. Which one of the following alternatives progresses from the narrowest to the broadest
levels of curriculum?
A. Experiential Curriculum–Societal Curriculum–Institutional Curriculum–
Instructional Curriculum
B. Experiential Curriculum – Instructional Curriculum – Institutional Curriculum–
Societal Curriculum
C. Instructional curriculum– Experiential Curriculum– Instructional Curriculum–
Societal Curriculum
D. Societal Curriculum– Institutional Curriculum – Instructional Curriculum –
Experiential Curriculum

82. If teacher ‘A’ decides to make some of the students repeat a course as a result of their low
performance, which of the following can best describe his action?
A. The teacher used ways to obtain information in a quantitative form
B. The teacher used to make observation and assigning a number value.
C. The teacher used judgment about the value of a student’s performance.
D. The teacher used immoral reference method of assessment.

83. One is correctly stated about learning, identify which?


A. Learning is not directly observable but manifests in the activities of the individual
B. Learning can be changes due to illness, fatigue and maturation
C. Learning is a passive process
D. Biological factors like hormonal changes are basic principles of learning.
Information Technology Exit Exam Version 1.0/2023

84. Mr. Hadgu always introduces learning outcomes before starting teaching students. By
doing this, which principle of teaching is Mr. Hadgu applying? The principle of:
A. recognizing individual differences in teaching
B. linking/connecting school learning activities to social life
C. communicating the objectives of the lesson
D. the leading role of the teacher and the independent activities of the learner

85. Which foundation of curriculum provides the theories and principles that help teachers
understand the factors that influence teacher-student behavior within the context of
curriculum implementation?
A. Historical foundation
B. Psychological foundation
C. Sociological foundation
D. Philosophical foundation

86. One is the advantage of using true/false test items during the test construction.
A. Enable to recognize cause – and – effect relationships.
B. Limited to learning outcomes in the knowledge area.
C. It is susceptible to guessing with a fifty-fifty chance of the examinee.
D.It is relatively easy to score and construct the items.

87. The scope of Educational Psychology deals about classroom climate, group dynamics
help to make guidance and counselling in the certain scope is
A. Learning situation
B. The learner
C. The learning processes
D. The teacher

88. Which one of the following is true about teacher-centered methods of teaching?
A. They promote deep learning
B. They appeal to the needs and interests of diverse students
C. They are suitable when there is a large content to be covered in a short time
D. They are appropriate when the objective is to promote creative thinking
Information Technology Exit Exam Version 1.0/2023

89. ‘’The learning situation (what goes on in the TVET classrooms) should look like the
situation in which learning is to be used in the industry’’ This description goes to which
of the following criteria of content selection?
A. Relevance
B. Learnability
C. Continuity
D. Suitability

90. When an organization gives an exam and wants to organize the students in their
appropriate group or class, which type of evaluation is the organization using?
A. Formative Evaluation
B. Placement Evaluation
C. Summative evaluation
D. Diagnostic Evaluation

91. If a student studies hard to obtain better grades, getting prize and incentives, which type
of motivation guides his action?
A. Intrinsic motivation
B. Attribution theory of motivation
C. Extrinsic motivation
D. Drive- reduction theory of motivation

92. Which one of the following is correct about the relationship between occupational
standard (OS) and training standard (TS)?
A. Training standards are employment specifications
B. Occupational standards must follow Training standard
C. Occupational standard needs to be derived or developed from unit of instruction
D. Occupational standard reflects the specific job for which a student is to be prepared

93. Which one of the following is a non-projected two-dimensional media?


A. Photographs
B. Holograms
C. Models
D. Mock-ups
Information Technology Exit Exam Version 1.0/2023

94. Of the lists given below one contains the levels of Affective domain. Which?
A. Knowledge, Comprehension, Application, analysis, evaluation, & creation
B. Receiving, Responding, Valuing, organizing, &characterization
C. Imitation, Manipulation, Precision, articulation, & naturalization
D. Naturalization, Evaluating, Analyzing, organization, Synthesis

95. Which one is not true about behavioral learning theory?


A. Learning takes place regardless of mental process
B. Learning is a matter of association
C. Learning indicates change in performance
D. Learners are active processors of information

96. Which one of the following is not true about instructional plan?
A. It helps to ensure subject mastery
B. It develops teacher’s confidence
C. It eases the burden of the teacher
D. It ensures wise usage of time

97. According to the Systematic Curriculum and Instructional Development (SCID) model of
curriculum development by Norton (1992), the Development stage/phase consists of the
following activities
A. Development, analysis, design, implementation, & evaluation
B. Design, development, analysis, implementation, & evaluation
C. Analysis, design, development, implementation, & evaluation
D. Evaluation, development, analysis, design, & implementation

98. Which one of the following is not a common problem for a teacher made test?
A. It is well-intended to measure what they are supposed to measure.
B. It represents sample of the whole topic they taught.
C. It is prepared appropriately according to difficulty levels.
D. It is focused on special group of students excluding others.

99. According to Abraham Maslow, food, rest, and pain avoidance are categorized under
A. Physiological needs
B. Safety needs
C. Esteem needs
D. Self-actualization needs
Information Technology Exit Exam Version 1.0/2023

100. To which of Bloom’s hierarchy of the cognitive domain does the objective below belong to?
Objective: “At the end of this lesson, the student will be able to determine whether using
teacher centered teaching methods or learner-centered teaching methods would be more
appropriate for increasing student learning.”
A. Comprehension
B. Analysis
C. Evaluation
D. Application

You might also like