Computer Exit Exam quesitions with Anaswer
Computer Exit Exam quesitions with Anaswer
FACULTY OF INFORMATICS
DEPARTMENT OF COMPUTER SCIENCE
Name_______________________________
Section,
_____________________________
GENERAL DIRECTIONS:
1. Make sure that the exam paper contains 13 pages including the cover page and answer
sheet.
2. Read the instructions carefully for each part of the exam and attempt accordingly.
5. Any action taken by exam invigilator during exam time will not be compromised
8. Please write your name on both question paper and answer sheet.
1
Part II: Multiple Choice Items (100 Points)
Instructions: This item of the exam contains 100 multiple choice questions, each worth
1 point. Choose the best answer from the given alternatives & write the choice of the
correct letter on the answer sheet provided. (1 point each)
1. Which one of the following is concerned with the meaning of a sentence in knowledge representation?
A. Structure C. Semantics
B. Computational aspect D. Syntax
2. Which one of the following is an attack performed by wiretapping a network and illicitly copy files and
programs?
A. Interception C. Interruption
B. Fabrication D. Modification
3. If a company wants to develop a software for its use, and if the company wants partial functionality to
be delivered to end users without unreasonable delay. Which software development process model is
appropriate for such requirement?
A. Waterfall C. Spiral
B. Incremental D. Evolutionary
4. Which one of the following cannot affect proper functioning of a system?
A. Improperly placed heater C. Lightning strikes
B. Humidity D. UPS(uninterruptible power supply)
5. _______ is the process of selecting appropriate query execution strategy?
A. Query graph C. Query tree
B. Query optimization D. Query processing
6. Let KPRIV-A and KPUB-A be private and public keys for Awgichew and KPRIV-M and KPUB-M
are private and public keys for Meron respectively. If Awgichew would like to send secured message
to Meron, which one of the following scenario is not correct if they are using asymmetric keys?
A. Awgichew uses Meron’s private key KPRIV-M to encrypt his plain text
B. Awgichew uses his KPUB-A to encrypt his plain text
C. Meron can decode the encrypted text using her KPRIV-M
D. Meron can decode the scrambled text using her KPUB-M
7. Which one of the following agents works by searching and matching the rules defined by percent and
stored internal state?
A. Model-based reflex agent C. Simple reflex agent
B. Goal-based agent D. Utility based agent
8. Which symbol is used to write a single line comment in JavaScript?
A. <? C. //
B. <!----------------> D. &&
9. Which one of the following is correct about symmetric and asymmetric keys?
A. Both are authentication methods
B. Symmetric key requires the sender and receiver to have a public and private key
2
C. Asymmetric key requires the sender and receiver to have a public and private key
D. Both are recovery methods
10. If you want to test individual sub-systems of software, which phase of software testing is appropriate?
A. Integration testing C. System testing
B. Unit testing D. Acceptance testing
11. Suppose you are administrating the network. You would like to know list of protocol on use, the foreign
address and port numbers, the local address and port number and the state of the connection. Which
command would you use to accomplish that?
A. traceroute C. netstart
B. ipconfig D. nslookup
12. When we use a hash table data structure, our hash function should map the expected inputs (keys) as
evenly as possible over its output range(indexes). This property of good hash function is known
as______.
A. Uniformity C. Continuity
B. Determinism D. Data normalization
13. In an array implementation of binary heap tree, if a node is stored as index i, then its right child will be
stored as index_______
A. 2*i+1 C. (i+1)/2
B. i/2 D. 2*i
14. Which one of the following is false about sequential and binary searching algorithm?
A. Binary searching algorithm can work on list of data which is stored in descending order
B. Sequential and binary searching algorithm are not equal in terms of memory efficiency
C. Sequential searching algorithm can work on sorted and unsorted list of data
D. Considering worst case analysis binary searching algorithm is faster than sequential searching on
sorted data.
15. Which of the following term refers to the number of symbols composing a string?
A. Length C. Alphabet
B. Symbols D. Word
16. ________ is a way of combining analogue or digital signals into one single over a common or shared
medium.
A. Point-to-point C. Synchronization
B. Broadcasting D. Multicasting
17. Which generation’s programming languages are used in Artificial intelligence and Expert systems?
A. Fifth generation languages C. Fourth generation languages
B. Second generation languages D. Third generation languages
18. Which attribute of INPUT tag defines the number of characters that can be displayed in a text box
without scrolling?
A. SIZE C. VALUE
B. MAXLENGTH D. TYPE
19. Which characteristics of requirement specify that the requirements should be phrased so that there is
one and only one interpretation for it?
A. Correct C. Feasible
B. Unambiguous D. Verifiable
3
20. Which method can be used to divide a browser into smaller sub windows so that each sub window
displaying a different HTML document?
A. Using paragraphs C. Using images
B. Using frames D. Using tables
21. Which one of the following is not correct when mapping ER diagrams to relational tables?
A. Multi-valued attributes are mapped to new tables
B. Foreign key are used to map relationships to create relation between tables
C. Table names are directly mapped from entity names
D. Composite attribute are mapped as it is
22. Which data update allows data item to be updated the moment it is modified in cache?
A. In-Place Update C. Shadow update
B. Immediate update D. Deferred update
23. Which mutual exclusion mechanism keeps track of turns to enter the critical region using an integer
variable, which is initially-0, and another process waits until it turns to 1?
A. Lock variable C. Strict alteration
B. Disabling interrupts D. Race condition
24. If there are two languages Li = {c, dl and L2 = (e, fgh}, which one of the following is not an element
of L2 Li?
A. Fghc C. Fghe
B. Ed D. Ec
25. Given input Alphabet = (c, d) and a language (L) defined on E as L = {ed. : n > 0). Then, which one
of the following is not an element of language L?
A. Ccddd C. Ccccdddd
B. Od D. Ccdd
26. ______Uses the knowledge of the characteristics of the relational algebra operations and the
relationship between the operators to optimize the query?
A. Database approach C. Deterministic approach
B. Heuristic approach D. Hierarchical data model approach
27. Which one of the following is correct ordering in language processing system?
A. Source program ->Preprocessor -> Assembler -> Compiler Linker/Loader -> target machine code
B. Source program -> Preprocessor ->Linker/Loader -> Compiler /Assembler ->target machine code
C. Source program Compiler -> Assembler -> Preprocessor > Linker/Loader -> target machine code
D. Source program _> Preprocessor -> Compiler -> Assembler -> Linker/Loader -> target machine
code
28. Which one of the following is a wrong coupling of problem and its environment?
A. Contingency problem -> partially observable, non-deterministic
B. Multiple state problem deterministic, partially observable
C. Exploration problem -> partially observable, deterministic
D. Single state problem-> fully observable, deterministic
29. Which one of the following is responsible for controlling the flow of bits between memory and
controllers with no need for a constant intervention from the CPU?
A. Disk fragmenting B. Memo, manager
4
C. Device controller D. Direct memory access
30. A cryptographic program replaces an alphabet from a text message using its successor alphabet and
creates cipher text. Which one best describes the program?
A. Transliteration C. Transformation
B. Translation D. Substitution
31. Which one of the following messaging communication best explains the statement: “Until the
message is received, the sending process is blocked'"?
A. Blocking receive C. Non-block sending
B. Non-block receive D. Blocking send
32. Which theory provides mechanisms for classifying combinatorial problems and measuring the
computational resources necessary to solve them?
A. Computability theory C. Complexity theory
B. Set theory D. Automata theory
33. Which one of the following is correct first order logic for the statement “There is someone standing at
the door and is tall”?
A. ∀x (StandingAt (x; door ) C. ∃x ( StandingAt (x; door )^ tall(x))
B. ∀x ( StandingAt (x; door )^ tall(x)) D. ∃x ( StandingAt (x; door ) -> toll(x))
34. _______is the component of the operating system that is responsible to decide which process to run
first among ready processes.
A. Memory manager C. Disk manager
B. Inter process communication D. Scheduler
35. First design the very high level structure of the system. Then gradually work down to detailed
decisions about low-level constructs. Which design approach follows the given strategy?
A. Bottom-up C. Top-down
B. System design D. Hybrid
36. Which one of the following is false regarding Exceptions in Java?
A. We cannot create our own exception classes by extending Exception class
B. Exception class describes errors caused by your program and external circumstances
C. Runtime Exception class describes programming errors such as bad casting and numeric errors
D. All Java exception classes inherit directly or indirectly from Throwable class
37. A traditional phone call is an example of
A. Packet switching C. Broadcasting
B. Multiplexing D. Circuit switching
38. Which one of the following is false about style sheets?
A. Style sheets increase accessibility
B. Style sheets creates consistent appearance
C. Style sheets make it easy to maintain HTML pages
D. Style sheets do not reduce web page file size
39. Which one of the following is not correct about logic design?
A. It consider a particular DBMS
B. Normalization is undertaken in logical phase
C. It is based on specific data model
D. It is independent from physical considerations
5
40. Which one of the following is an attack detection mechanism?
A. Physical control C. Password
B. Audit log D. Encryption
41. Which SQL command would you use if you want to specify constraints to be applied on tuples?
A. GRANT C. REVOKE
B. SELECT D. CHECK
42. Which data management approach allows application programs to define and manage their own data?
A. Manual approach C. Hierarchical approach
B. Database approach D. Traditional file based approach
43. What is the output of the following C++ fragment code?
int p, q, n;
p = q = n = 8;
p + = n;
p / = q;
cout<<p;
A. 16 C. 24
B. 2 D. 1
44. Which database constraints are specified in the data definition language?
A. Implicit or inherent model based constraints
B. Semantic constraints
C. Application based constraints
D. Schema based constraints
45. Which one of the following is a communication pathway connecting transmitting signals in binary
digits between two or more devices?
A. Memory C. CPU
B. Register D. Bus
46. Which one of the following sorting algorithm requires large memory space to sort data?
A. Insertion sort C. Merge sort
B. Selection sort D. Quick sort
47. In which phase of the two phase locking protocol can a transaction obtain locks?
A. Release phase C. Shrinking phase
B. Roll back phase D. Growing phase
48. Which one of the following is not the task of lexical analyzer?
A. Group characters into lexemes C. Read the input characters
B. Output a sequence of tokens D. Build syntax tree
49. Which one of the following best describes for a program that seems friendly and legitimate but
contains hidden malicious codes and harms a system?
A. Trojan C. Virus
B. Malware D. Worm
50. Look at the following fragment code :
int a = 6;
int b = 5;
6
while(a>b)
{
Cout<<”computer science program”<<endl;
}
Which algorithm property is not satisfied by the above C++ code algorithm?
A. Sequential C. Finiteness
B. Feasibility D. Definiteness
51. Assume you are searching for information and typed the domain name: www.mysearchexample.com
on your browser, having an IP address 192.108.110.1. Since internet communication is based on an IP
address, the domain name has to be translated to its corresponding IP address. Which of the following
is responsible for the translation?
A. DNS C. FTP
B. SMTP D. DHCP
52. Which program puts together the entire executable object files into memory for execution or running?
A. Editor C. Linker
B. Debugger D. Loader
53. Machine language is grouped under__________ generation of programming language.
A. 2nd generation language C. 4th generation language
B. 3rd generation language D. 1st generation language
54. Which one of the following is not problem if concurrency is not controlled properly?
A. Lost update problem C. Incorrect summary
B. Consistent database D. Dirty read
55. Which one of the following is false about the role of parser in compiling process?
A. Parser builds the parse tree
B. Parser attempts to correct or recover few errors
C. Parser cannot perform context free syntax analysis
D. Parser produces appropriate error messages
56. A malicious program that once installed on your machine can collect all keystrokes including
username, password, emails, credit card numbers and other sensitive information is:
A. Rootkit C. Key logger
B. Worms D. Trojan
57. Which memory is characterized by the need for periodic change in order to maintain data storage?
A. Static RAM C. Disk
B. Dynamic RAM D. Tape
58. Which one of the following is not correct?
A. A rational agent know the result of its action, but unrealistic
B. Rational agent take action but not 100% sure of success
C. Rational agent act to achieve utmost success based on information
D. An omniscience agent takes actions for 100% sure of success
59. What should compilers of high level programming languages do to evaluate expressions?
A. Convert infix notation to postfix notation
B. Convert postfix notation to prefix notation
C. Evaluate infix notation to prefix notation
D. Convert postfix to infix notation
7
60. ________ finds the shortest path to the goal based on cost.
A. Depth first search C. Uniform cost search
B. Iterative deepening D. Breath first search
61. Which one of the following is not correct about magnetic disk?
A. Its minimum block is a sector
B. Its head is stationary during read/write
C. Its data is organized in tracks
D. It needs continuous power to keep bit contents
62. Which one of the following is not correct about networking models?
A. TCP/IP model is a protocol model
B. A reference model has no implementation specification
C. A network designer can use either of TCP/IP or OSL, or both
D. Open system interconnection (OSI) is a protocol model
63. What will be the out of the following JavaScript statement? Math.abs(-9)
A. 9 C. 1
B. -9 D. 0
64. Which one of the following is not correct about IPv4?
A. IT uses 128-bits
B. It has shortages of address space
C. It is characterized by slow routing and memory intensive
D. It uses 32-bits
65. Which one is true about the following JavaScript statement? Document.bgcolor
A. bgcolor is method C. bgcolor is property
B. document is property D. document is method
66. Which one of the following is not an example of divide and conquer algorithm?
A. Quick sort C. Merge sort
B. Binary searching D. Heap sort
67. Which data structure is the most appropriate for sharing a printer in a network environment?
A. Stack C. Full binary tree
B. Binary search tree D. Queue
68. Assuming there is a rectangle object, what getArea, getPerimeter can represent?
A. Attribute C. Data field
B. Property D. Behavior
69. Which one of the following is false about abstract classes and abstract methods?
A. We can create instances of abstract classes using the new operator
B. Implementation of abstract methods is provided by the subclasses
C. A class that contains abstract methods must be defined as abstract
D. Abstract methods are defined without implementation in the superclass
70. Look at the following PHP line:
$list = array(“outside” = > “red”,
“inside” = > “brown”,
“top” = > “black”,
“under” = > “blue”);
8
What is the index of data value black?
A. Brown C. Under
B. Outside D. Top
71. Which operator is used to create an array?
A. new C. static
B. declare D. construct
72. What is the output of the following C++ fragment code?
a:
cout<<”Graduating “;
goto b;
c:
cout<<” Year “;
goto a;
b:
cout<<”fourth “;
9
D. Cout<<c1 -> car_mode;
76. Which one of the following is false about client-side scripting?
A. Script languages are not full-featured
B. Script languages can access client’s hardware
C. Script languages have limited capabilities
D. Script languages are embedded as plain text, and interpreted by applications
77. Which one of the following is true about Queue data structure?
A. Queue data structure applies first come first served policy
B. Queue data structure uses last in first out rule
C. Queue data structure does not have efficient basic operations
D. Queue data structure cannot be implemented using linked list
78. Which one of the following is not correct about IP address and DHCP
A. An IP leased by the DHCP for a host is permanent
B. DHCP assures connectivity ever users move from location to location
C. The IP address are chosen from a predetermined range of address
D. DHCP allows a host to acquire an IP address automatically
79. Which one of the following is not a condition for two operations in a schedule to be said to conflict?
A. If they access the same item X
B. If they belong to the same transactions
C. If Write_item (X) is at least one of the operations
D. If they belong to different transactions
80. In case of any shut down during transaction before commit which of the following statement is done
automatically?
A. View C. Rollback
B. Commit D. Flashback
81. Which one of the following commands is not used for removing (or deleting) a relation forms the
SQL database?
A. Delete C. Remove
B. Drop D. UPDATE
82. A system is in a ______ state if there exists a set of transactions such that every transaction in the set
is waiting for another transaction in the set.
A. Idle C. Deadlock
B. Waiting D. Ready
83. What is a Functional Requirement?
A. specifies the tasks the program must complete
B. specifies the tasks the program should not complete
C. specifies the tasks the program must not work
D. All of the mentioned
84. _________ is a software development life cycle model that is chosen if the development team has less
experience on similar projects.
A. Iterative Enhancement Model C. Spiral
B. RAD D. Waterfall
85. In which step of SDLC actual programming of software code is done?
A. Development and Documentation B. Maintenance and Evaluation
10
C. Design D. Analysis
86. Software Debugging is known as _________________
A. identifying the task to be computerized
B. creating program code
C. creating the algorithm
D. finding and correcting errors in the program code
87. _____________ is a probabilistic algorithm where a data packet is sent by the router to any one of its
neighbors randomly.
A. Adaptive routing algorithm C. Random walks routing algorithm
B. Flooding routing algorithm D. Distributed routing algorithm
88. Which network address translation protocol solves the task of address resolution using port number?
A. Network Address Translation C. Dynamic Address Translation
B. Port Address Translation D. Static address translation
89. _____________ is responsible for converting the higher level protocol addresses to physical Network
Addresses.
A. Address Resolution Protocol (ARP) C. Bootstrap Protocol (BOOTP)
B. Reverse Address Resolution Protocol (RARP) D. Internet Control Message Protocol (ICMP)
90. Given the network address of 172.16.0.0/19, which of the following is correct?
A. It provides 8 subnets, 32 IP addresses each C. It provides 8 subnets, 30 hosts each
B. It provides 8 subnets, 8,190 hosts each D. It provides 8 subnets, 2,046 IP addresses each
91. A network device that provides the physical interface between computer and cabling is known
as________.
A. Switch C. NIC
B. Router D. Repeater
92. Which of the following is not the function of DHCP server?
A. It grants an IP address when receives a request from a client.
B. It maintains the information about client configuration parameters.
C. It maintains a database of available IP addresses.
D. It grants an IP address when sender request from a client.
93. Which one of the following is not true?
A. kernel is the program that constitutes the central core of the operating system
B. kernel is the first part of operating system to load into memory during booting
C. kernel is made of various modules which cannot be loaded in running operating system
D. kernel remains in the memory during the entire computer session
94. Which one of the following circuits requires memory to store the state of the output?
A. Combinational circuit C. Logical circuit
B. Sequential circuits D. Physical circuit
95. From the following grammars, which describes the lexical syntax?
A. Lexical Grammar
B. Context-free Grammar
C. Syntactic Grammar
11
D. Regular Grammar
12
Admas University
Faculty of Informatics
Department of Computer Science
Screening Exit Exam II
Answer Sheet
13
14