Model Exam for EXIT EAXAM AAU
Model Exam for EXIT EAXAM AAU
Answer
1, C 2, D 3, D 4, A 5, B
6, D 7, B 8, B 9, C 10, A
Which one of the following information retrieval file structure is used to create a file with one or
more documents usually as ASCII or EBCDIC text?
A) Inverted File
B) Flat File
C) Signature File
D) PAT Trees
ANSWER: B
Consider a collection with one billion tokens (i.e., with 109 tokens). Suppose the first 1,000 of
these tokens results in a vocabulary size of 1,000 terms, and the first 100,000 tokens results in a
vocabulary size of 10,000 terms. What is the vocabulary size of the whole collection using
Heap‟s law? Assume the value of b =0.5.
A) 1,500,000
B) 1,000,000,000
C) 1000,000
D) 100,000
ANSWER: C
Only one of the following statement is correct about the difference between the Information
Retrieval system and retrieval Data base management system
A) The query specification for the data base management system is complete and that of
information retrieval system is incomplete
B) The query specification for the information retrieval system is complete and that of data base
management system is incomplete
C) The answers of data base management system is imperfect precision and recall and that of
information retrieval system is perfect precision and recall
D) Information retrieval system is partial or best match oriented and data base management
system is exact match oriented
ANSWER: A
All of the followings are disadvantages of Vector Space Model, except:
A) Index terms are assumed to be mutually independent
B) Search keywords must precisely match document terms
C) The order in which the terms appear in the document is lost in the vector space representation
D) Allows efficient implementation for large document collections.
ANSWER: D
Assume that the following four documents are given, then what would be the document that can
be retrieved for the query „Students AND Yesterday OR (NOT We AND meat)‟ according to
the Boolean Query:
Doc1: Dog eat meat yesterday
Doc2: All students are angry about exit exam
Doc3: we all need meat
Doc4: why students are angry yesterday?
A) {Doc1,Doc2, Doc3, Doc4}
B) {Doc2,Doc3}
C) {Doc1,Doc4}
D) {Doc1,Doc3}
ANSWER: C
The number of documents in the collection that contain a term t is called as ________
A) Document Index
B) Document frequency
C) Document Inverse
D) Document Incidence Matrix
ANSWER: B
In a given search engine the system retrieves 80 items, out of which 60 are relevant and 20 are
non-relevant, the total relevant document in the collection is assumed to be 100. Then based on
this information, what is the percentage of the relevant items to be retrieved and the percentage of
a system‟s ability not to retrieve non-relevant documents respectively?
A) 20%, 60%
B) 60%, 20%
C) 75%,60%
D) 60%, 75%
ANSWER: D
Preprocessing is the process of controlling the size of the vocabulary or the number of distinct
words used as index terms. Stop word removal is one step of preprocessing, why it is important to
remove stop words?
A) Because Stop words have high semantic content
B) Because stop words takes larger indices for information retrieval
C) Because we can measure better approximation of importance for text classification, text
categorization, text summarization, etc.
D) Because stop words are words those have their own meaning and they are helpful for indexing
ANSWER: C
An information retrieval system returns 20 relevant documents and 30 non relevant documents.
The total number of relevant document in the collection is 200. Based on this, what is the F-
measure, Silence and Noise for the given information retrieval systems respectively?
A) F-Measure =0.2666, Silence =1, Noise =0.734
B) F-Measure =0.16, Silence =0.9, Noise =0.6
C) F-measure =0.16, Silence =0.6, Noise =0.9
D) F-measure =0.9, Silence =0.16, Noise =0.6
ANSWER: B
Let’s say we have four documents in our corpus; i.e. D1, D2, D3, D4. The term weight of the
document with respective query weight and also the query length with document length is given
as follows. Which document is more relevant for the query or how the document can be ranked
using the cosine similarity method? [Using vector space model concept]
Term weight Document length
D1 0.8 0.2
D2 0.7 0.4
D3 0.9 0.6
D4 0.5 0.8
Query 0.6 0.5
ANSWER: A
The standard way of quantifying the similarity between two documents D1 and D2 is to compute
the _________of their vector representations.
A) Sine similarity
B) Cot similarity
C) Cosine similarity
D) Tan similarity
ANSWER: C
Which one of the following statement is not correct about the keyword based multiple word
queries?
A) A query is a set of words or phrases
B) A document is retrieved if it includes none of the query words
C) A document is retrieved if it includes any of the query words
D) Documents are ranked by the number of query words they contain
ANSWER: B
All of the following techniques are used to improve Information Retrieval effectiveness, except:
A) Using Relevance Feed back
B) Using different types of query expansion like, knowledge base query expansion and initial
search result base
C) Using filters and facets to refine the results
D) Changing the developed Information Retrieval System
ANSWER: D
Which of the following statement is incorrect?
A) If the number of total document collection for a given corpus is constant, and the number of
document frequency in the collection is decreased, then the value of inversed document
frequency is decreased
B) If the number of total document collection for a given corpus is constant, and the number of
document frequency in the collection is decreased, then the value of inversed document
frequency is increased
C) The major objective of an Information Retrieval System is minimization of human resources
required in the finding of needed information to accomplish a task.
D) In information Retrieval systems, precision and recall are the key metrics used in evaluations.
ANSWER: A
1. Both GET and POST are treated as $_GET and $_POST, they are super global, which means
that they are always accessible, regardless of scope and you can access them from any function,
class or file without having to do anything special in PHP. Which is true about them?
A. Both $_GET and $_POST are an array of variables passed to the current script via the URL
parameters.
B. Both $_GET and $_POST are an array of variables passed to the current script via the HTTP
POST method.
C. Information sent from a form with the POST method is invisible to others and has no limits on
the amount of information to send.
D. Unlike GET, POST should never be used for sending passwords or other sensitive
information.
2. Which of the following programming languages is commonly used for client-side scripting in
web development?
A. Java B.C++ C. JavaScript D. Python
3. ________ loops through a block of code once, and then repeats the loop as long as the
specified condition is true? A. while B. for C. do while D. for each
4. Which One is the correct way to define a constant in PHP?
A. define ("MY_CONSTANT", 10); B. const MY_CONSTANT = 10;
C. $MY_CONSTANT = 10; D. set_constant(MY_CONSTANT, 10);
5. Which of the following is true about PHP variables?
A. PHP variables must be declared before use
B. PHP variable names are case-insensitive
C. PHP variables start with the “$”sign
D. PHP variable names can contain spaces.
6. The________ element defines the document's body, and is a container for all the visible
contents, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
A. <head> B. <body> C. Physical D. hyperlink
7. More or less echo and print statements are the same in which both are used to output data to the
screen in PHP. The differences are small and ____________
A. echo has no return value while print has a return value of 1 so it can be used in expressions.
B. print can take multiple parameters while echo can take 2 arguments.
C. print has no return value while echo has a return value of 1 so it can be used in expressions.
D. echo has no return value while print has a return values of 2 so it can be used in expressions.
Answer: C
Answer: B
Answer: C
4. Which ERP implementation phase involves customizing the system to fit the specific
needs of the organization?
A) Planning C) Design
B) Analysis D) Configuration
Answer: D
Answer: B
Answer: B
Answer: B
A) GPS C) ERP
B) CRM D) RFID
Answer: D
9. Which term refers to the strategic coordination of traditional business functions across
business units?
A) Supply Chain Management
B) Human Resources Management
C) Financial Management
D) Customer Relationship Management
Answer: A
Answer: A
Answer: A
12. Which of the following is a common method used to ensure data integrity?
A) Encrypting data in transit
B) Using digital signatures and checksums
C) Implementing strong authentication mechanisms
D) Performing regular backups
Answer: B
A) MD5 C) SHA-256
B) SHA-1 D) CRC-32
Answer: C
A) AES D) Blowfish
B) RSA
C) DES
Answer: B
Answer: B
Answer: C
Answer: B
Answer: C
19. What does the term 'Denial of Service (DoS) attack' refer to?
A) Gaining unauthorized access to a computer system
B) Stealing physical hardware from an organization
C) Blocking access to a network service for legitimate users
D) Encrypting data to prevent unauthorized access
Answer: C
Answer: D
9. When choosing a compression technique for a multimedia application, the primary trade-
off is between:
10. You are tasked with compressing a large text file containing a historical novel. Which
compression algorithm would be most suitable for this task and why?
b) Huffman coding
10. An e-commerce platform wants to recommend products to users based on their past
purchases and browsing history. What type of machine learning approach would be most
appropriate for this task?
a) Supervised learning with a classification model (predicting product categories)
b) Supervised learning with a regression model (predicting purchase price)
c) Unsupervised learning for customer segmentation based on browsing behavior
d) Reinforcement learning for optimizing product placement on the website
Answer: (c) Unsupervised learning for customer segmentation based on browsing
behavior
KNOWLEDGE MANAGEMENT QUESTION AND ANSWER FOR MODEL EXAM
Choose the correct answer
1. Which one of the following is true about explicit knowledge?
A/It can be shared formally and systematically in the form of data, specifications,
manuals, drawings and audio
B/ It focuses on beliefs relating sequences of steps or actions to desired or undesired
outcomes.
C/ Identifying the specific product features a specific customer likes is also an example
of Explicit knowledge.
D/ It includes insights, intuitions, and hunches
2. Which one of the following statement is false about Knowledge management?
A/ KM has focused on managing important knowledge that may reside solely in the
minds of organizations‟ experts.
B/ KM systems does not provide access to explicit company knowledge
C/ Knowledge management efforts typically focus on organizational objectives
D/It is doing what is needed to get the most out of knowledge resources.
3.Which one of the statement is true about KM infrastructure?
A/ It is organizational or structural means used to promote knowledge management.
B/ It is information technologies that can be used to facilitate knowledge management.
C/ It reflects the long-term foundation for knowledge management.
D/ It is the broad processes that help in discovering, capturing, sharing, and applying
knowledge.
4.Which one of the following is used to involves converting tacit knowledge into explicit
forms such as words, concepts, visuals, or figurative language
A/ Knowledge capture B/ Combination C/ Internalization D/ Externalization
5. Which process helps individuals acquire knowledge but usually through joint activities
such as meetings,
A/ Socialization B/ Combination C/ Internalization D/ Externalization
6. Which one of the statement is true about KM impacts on the process
A/ Efficiency is Performing the processes in a creative and novel fashion that improves
effectiveness
B/ Effectiveness is Performing the most suitable processes and making the best possible
decisions.
C/ Innovation is Performing the processes quickly and in a low-cost fashion
D/None
7. Apiece of recorded knowledge that exists in a format that can be retrieved to be used by
others is;
A/ Corporate Memory B/ Knowledge Sharing Systems C/ Knowledge artifacts D/ All
8. The main function of a knowledge sharing system is:
A/ Maximization of up-front knowledge engineering.
B/ Active presentation of irrelevant information
4. Which one of the following is true about Project Scope Change Control Plan
A/ Scope change analysis is used to record any request for changes to the project scope
coming from any project stakeholders, specially the donor or the beneficiaries.
B/ Project change request form analysis is done to determine the impact to the project by
the change, in some cases the change may be a new activity in substitution of another activity
with no impact to the schedule or budget
C/ The purpose of this plan is to maximize scope creep which is the natural tendency of all
projects for increasing the project scope without compensating the other project constraints
D/ The scope of the communication will depend on the significance of the change.
5. The various responsibilities and authority levels so that routine changes can be dealt with
efficiently but significant changes receive due management attention is:
A/Scope change plan B/ Scope of work C/ Terms of reference D/ Work assignment
sheet
6. In precedence diagram method Which relationship is the most commonly used?
A/ Start to finish B/ Finish to start C/ Finish to finish D/ Start to start
7. Which one is true about Critical path method?
A/ It is is a technique used for constructing a schedule model in which activities are
represented by nodes
B/ It is graphically linked by one or more logical relationships to show the sequence
in which the activities are to be performed.
C/ It is the series of activities that determines the earliest time by which the project
can be completed.
D/ None
8. The process of monitoring the status of project activities to update project progress and
manage changes to the schedule baseline to achieve the plan is:
A/ Developing schedule B/ Estimating activity duration
C/ Sequencing activity D/Controlling the schedule
A. Method name and parameter list C. Access Modifier and return types
B. Method name and return types D. Access Modifiers and Parameter List
5. Which one of the following is true about method overloading?
A. Two methods with the same name and parameter lists
B. Two methods with the same name and different parameter lists
C. Two methods with the same name and parameter lists and different return types
D. Two methods with the same name and parameter lists and exactly the same return
types
6. Which one of the following is true about method overriding?
A. Two methods with the different name and parameter lists
B. Two methods with the same name and different parameter lists
C. Two methods with the same name and parameter lists and different return types
D. Two methods with the same name and parameter lists and also the same return types
E. Which one of the following Systems evaluates an organization's
performance by comparing current with previous outputs?
A. Transaction processing Systems B. Management Information Systems
C. Decision Support Systems D. Executive Information Systems
5. Which management level has the responsibility to carry out the plan?
A. Strategic level B. Tactical level C. Operational level
D. Strategic and Tactical level E. Strategic, Tactical, and Operational
level
Which one of the following is the major activities for project management of
information system?
A. Scope, Time, Control, Cost, and Risk
B. Scope, Time, Control, Quality, and Risk
C. Scope, Time, Control, Quality, and Cost
D. Scope, Time, Cost, Quality, and Risk.
21. What is the primary benefit of integrating an ERP system within an organization?
E) Reducing the need for IT support
F) Eliminating the need for employee training
G) Enhancing data accuracy and accessibility across the organization
H) Increasing the number of employees required to manage business processes
Answer: C
Answer: C
24. Which ERP implementation phase involves customizing the system to fit the specific
needs of the organization?
E) Planning G) Design
F) Analysis H) Configuration
Answer: D
Answer: B
Answer: B
27. Which of the following is a key objective of a supply chain management system?
E) Increase inventory levels
F) Improve demand forecasting
G) Reduce product quality
H) Increase delivery times
Answer: B
28. Which technologies are commonly used to improve supply chain visibility?
E) GPS G) ERP
F) CRM H) RFID
Answer: D
29. Which term refers to the strategic coordination of traditional business functions across
business units?
E) Supply Chain Management
F) Human Resources Management
G) Financial Management
H) Customer Relationship Management
Answer: A
Answer: A
Answer: A
32. Which of the following is a common method used to ensure data integrity?
E) Encrypting data in transit
F) Using digital signatures and checksums
G) Implementing strong authentication mechanisms
H) Performing regular backups
Answer: B
Answer: C
E) AES G) DES
F) RSA H) Blowfish
Answer: B
Answer: B
Answer: C
Answer: B
Answer: C
39. What does the term 'Denial of Service (DoS) attack' refer to?
E) Gaining unauthorized access to a computer system
F) Stealing physical hardware from an organization
G) Blocking access to a network service for legitimate users
H) Encrypting data to prevent unauthorized access
Answer: C
Answer: D
1. If you stored five elements or data items in an array, what will be the index number of the
array's last data item?
A. 3
B. 5
C. 4
D. 6
A. Array[0];
B. Array[1];
C. Array[3];
D. Array[4];
Which of the following statements is correct about the formal parameters in C++?
a. Simplex
b. Half Duplex
c. Full Duplex
d. Double Duplex
a. Firewall
b. Gateway
c. Router
d. Virus checker
Which of the following statements could be valid with respect to the ICMP (Internet
Control Message Protocol)?
ADVERTISEMENT
ADVERTISEMENT
a. It reports all errors which occur during transmission.
b. A redirect message is used when a router notices that a packet seems to
have been routed wrongly.
c. It informs routers when an incorrect path has been taken.
d. The "destination unreachable" type message is used when a router cannot
locate the destination.
a. 121.12.12.248
b. 130.12.12.248
c. 128.12.12.248
d. 129.12.12.248
What IP address class allocates 8 bits for the host identification part?
a. Class A
b. Class B
c. Class C
d. Class D
In which of the following switching methods, the message is divided into small packets?
a. Message switching
b. Packet switching
c. Virtual switching
d. Multiplexing
a. Data server
b. Point server
c. File server
d. Communication server
Which of the following layers does the HTTP protocol work on?
a. Physical layer
b. Data-link layer
c. Application layer
d. Network layer
What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error
messages?
a. Ping
b. Route
c. Traceroute
d. Ifconfig
During normal IP packet forwarding by a router, which of the following fields of the IP
header is updated?
a. Repeater
b. Source address
c. Destination address
d. Checksum