100% found this document useful (2 votes)
3K views28 pages

Dmu Exit Exam Model

This document appears to be an exit exam for an online information technology course offered by DMU. It contains 47 multiple choice questions testing various IT concepts. The questions cover topics like databases, operating systems, computer networks, programming languages, and information security. The exam timer at the top indicates the test taker has 108 minutes and 57 seconds remaining to complete the exam.

Uploaded by

bina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
3K views28 pages

Dmu Exit Exam Model

This document appears to be an exit exam for an online information technology course offered by DMU. It contains 47 multiple choice questions testing various IT concepts. The questions cover topics like databases, operating systems, computer networks, programming languages, and information security. The exam timer at the top indicates the test taker has 108 minutes and 57 seconds remaining to complete the exam.

Uploaded by

bina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 28

DMU OLINE EXIT EXAM MODEL FOR INFORMATION TECHNOLOGY

Remaining minute :108 :57

1. One of the following is not the reason for the need of query optimization?

A) To utilized storage space efficiently

B) To increase system performance

C) To maximize throughput

D) To increase response time

2. Which one of the following subnet masks represents class A before and

after subnetting?

A) 255.0.0.0

B) 255.255.0.0

C) 255.255.255.0

D) all

3. For recovery purposes, the transaction processing system not needs to keep

______________?

A) The beginning of transaction

B) The operation not performed

C) The ending of the transaction

D) Transaction status(committed/aborted)

E) none

4. Identify the correct statement based on the code snippet given below.

$fop=fopen(“xyz.txt”,”a+”); fwrite($fop,”hello”); fclose($fop);

A) xyz.txt file is opened for reading only


B) the text hello will be appended to the existing content in xyz.txt file

C) the text hello won’t be written to xyz.txt file, if the file does not exist

D) xyz.txt file is opened for write-only access

5. Based on the html code given below identify the correct statement. Given

Code:

Hello Everyone

A) is an end tag and has no problem if we forget it

B) “Hello Everyone” is an element that will be displayed on the browser

in red color

C) “style” is a CSS property D. style=“color:red;”> is an

D) style=“color:red;”> is an internal CSS

6. Among the following one is the process of analyzing the given relation

schemas based on their functional dependencies and primary keys.

A) Decomposition

B) Normalization

C) Partitioning

D) Distributing

7. Which one of the following PHP functions is used to execute SQL queries?

A) mysqli_select_db()

B) mysqli_fetch_assoc()

C) mysqli_execute_query()

D) mysqli_query()

8. The activity of choosing an efficient execution strategy for processing a

query is called as____________?

A) Query execution
B) Query plan evaluation

C) Query optimization

D) Query parsing

9. Which Java keyword cannot appear on instance variable declaration?

A) private

B) static

C) public

D) string

10. Suppose String S=null; then what type of exception will occur when we

execute the statement System.out.println(S.charAt(0));

A) ArithmeticException

B) OutOfMemoryError

C) NumberFormatException

D) NullPointerException

11. Among the following one describes the functional dependency between

non-key attributes of a relation?

A) Functional data dependency

B) Partial functional data dependency

C) Full functional data dependency

D) Transitive functional data dependency

12. The built-in base class in Java, which is used to handle all exceptions is:

A) Exception

B) Runtime Exception

C) Checked Exceptions

D) Unchecked Exception
13. Which mode of transmission the entire capacity of the channel can be

utilized for each direction?

A) Simplex

B) Half duplex

C) Full duplex

D) all except A

14. Timestamp ordering protocol is said to be free from deadlock because of

____ reason?

A) It is cascading free

B) No transaction is made to wait

C) It guarantees serializability

D) None of them

15. Which of the following keyword is used to refer the member of base

classes from a subclass?

A) base

B) super

C) this

D) upper

16. Which one of the following scheduling algorithms is both preemptive and

non-preemptive?

A) Round Robin

B) Priority

C) FCFS

D) SJF

17. Which one of the following statements is False about segmentation and
paging?

A) In segmentation segments size is unequal and dynamic.

B) In paging the virtual address space is divided into equal-sized block

called pages frame.

C) Pages and page frames should have the same size.

D) To map each page into frames we need a special data structure called

page table

18. ________means the transaction happens indivisibly; a transaction either

happens completely or not at all.?

A) Isolated

B) Atomicity

C) Consistency

D) Durability

19. Which one of the following statements is the right way of creating a

cookie called product that can only stay for 2?

A) createcookie(“product”,”smart

phone”,time()+(60*60*14),”/”,”localhost”,0);

B) setcookie(“product”,”smart

phone”,time()+(60*60*2*24),”/”,”localhost”,0);

C) setcookie(“product”,”smart

phone”,time()+(60*60*24*14),”/”,”localhost”,0);

D) setcookie(“product”,”smart

phone”,time()+(60*60*24),”/”,”localhost”,0);

20. Which one of the following statements is the correct way of defining a

CSS style using a class selector?


A) p,h1,h2,li { text-align: center; color: red; }

B) p { background: yellow; color: red; }

C) #par{ background: yellow; color: red; }

D) .par { background: yellow; color: red; }

21. In which condition the finally block will not be executed?

A) When Exception occurs and not handled

B) When System.Exit() is called

C) When Exception does not occur

D) When Exception occurs and handled

22. Which keyword is used to prevent content of a variable from being

modified?

A) final

B) last

C) constant

D) static

23. which one of the following is the result of the following PHP code? Given

Code: echo strlen(“IP II Model-Exam !”);

A) 20

B) 18

C) 16

D) 15

24. 15. what will be the output of the following program?

public class Main {

public static void main(String[] args) {

int i = 0;
while (i < 4) {

i++;

i *= i;

System.out.println(i);

A) 9

B) 81

C) 27

D) 3

25. Which of the following is true about Java static methods and instance

methods?

A) Instance methods belong to the class rather than the object of a class.

B) Instance methods can be invoked without the need for creating an

instance of a class.

C) A static method can access static data member and can change the

value of it.

D) Static methods require an object of its class to be created before it can

be called.

26. From the following list of Java variables; which one is invalid?

A) EMP_Salary

B) Age27

C) My-Name

D) _1200IDN
27. If a process runs, out of the extra space allocated to it, then which action

is not taken by the system?

A) It will have to be moved a process to a partition having a small space.

B) Swapped out of memory until a large enough hole can be created

C) Kill the process.

D) All

28. One of the following is true about relational database data model?

A) Navigational nature of processing.

B) Visualized as a linear arrangement of records

C) Little scope for query optimization

D) High scope of query optimization

29. Which layer allows an IP packet to make a physical link to the media?

A) Internet layer

B) Network access layer

C) Transport layer

D) Application layer

30. Which one of the following is the correct way of creating a PHP variable?

A) int stud_age=20;

B) $stud-age=20;

C) stud_age=20;

D) $_age=20;

31. Which one of the following statements is True about operating systems

as an I/O manager?

A) Control all the computer I/O devices.

B) Issue commands to I/O devices, catching interrupts and handling


errors

C) Provide an interface between the device and the rest of the system.

D) All

32. Features of Java used to handle more than one job at a time.

A) Distributed

B) Platform-Independent

C) Portable

D) Multi-threaded

33. Among the following, which one is not a feature of Java?

A) Robust

B) Structured

C) Distributed

D) High Performance

34. _______is methods assume conflict is rare and only checks for conflicts

at commit/terminate time?

A) Shared Locking

B) Optimistic

C) Time stamping

D) Executive locking

35. _________are rules that should be obeyed or followed while

manipulating the data?

A) E-R diagram

B) Entity

C) Relationship

D) constraints
36. Which one of the following is used for only local communication in

private network?

A) 172.16.6.2

B) 10.123.16.145

C) 192.168.14 23

D) All

37. Which one of the following PHP functions is used to redirect a user to a

specific page?

A) Send_redirect()

B) header_location()

C) header()

D) redirect()

38. Which wireless security method generates new keys each time when a

client establishes connection to the router?

A) Wi-Fi Protected Access

B) Extensible Authentication Protocol

C) Wired Equivalency Protocol

D) Traffic Filtering

39. If we want to develop a program to display the names of 7 days in a week,

what type of Java statement can be appropriate to solve the problem?

A) if…else if

B) for loop

C) nested if

D) if…else

40. Which connectivity device packets send to all connected device at the
same time?

A) Switch

B) router

C) Hub

D) Bridges

41. Identify false statement among the given.

A) Several classes can be declared as sub classes of the same super class

B) Several classes can share the same variable.

C) When we create an object of a sub class, constructor of a subclass

executed first and then constructors of super class

D) In inheritance we can have more than one sub class

E) none

42. Among the following lists one doesn’t describe a field in a relation?

A) Record

B) Attributes

C) Column

D) All of them

E) none

43. The DBMS acts as an interface between what two components of an

enterprise-class database system?

A) Database application and the database

B) Data and the database

C) The user and the database application

D) Database application and SQL

44. Which mode of transmission the entire capacity of the channel can be
utilized for each direction?

A) Simplex

B) Half duplex

C) Full duplex

D) all except A

45. In a schedule S with two transactions T1 and T2, T1 reads the data item

which was produced by T2 and T1 commits before T2 commits. In this case,

the schedule S is said to be a _________ schedule?

A) Recoverable

B) Conflict serializable

C) Non-recoverable

D) Serial

46. Which one of the following is not an access modifier in Java?

A) void

B) protected

C) public

D) private

47. An entity that cannot stand by itself or that cannot have a record unless

there is another entity to be related with it is for its existence is called?

A) strong Entity

B) Weak entity

C) dependent entity

D) Independent

48. One of the following is/are the recovery technique from catastrophic

failures?
A) Undo

B) Backup

C) Redo

D) Encryption

49. One of the following is false statement about uses of servlet

A) Processing and storing data submitted by HTML form.

B) Providing dynamic content.

C) Used to handle multiple requests concurrently

D) Processing and returning data to user in HTML form only.

50. Which one of the following wireless transmission systems the sending

and receiving antennas need not be aligned?

A) Microwave

B) Radio waves

C) Infrared waves

D) Bluetooth

51. Which one of the following statements is True about operating systems?

A) It provides a platform on which application software can be installed

on the bottom.

B) It controls the overall functionality of the computer system.

C) It primarily focuses on managing the hardware resource rather than

software resources.

D) We can use a computer, even if a computer has no installed operating

system.

52. Which Java statement always executes its body at least once, even though

the condition is not true?


A) for

B) do-while

C) while

D) continue

53. Unshielded twisted pair cable that is used for 16 Mbps Token Ring is ---

------------------

A) Category 5

B) Category 6

C) Category 4

D) Category 3

54. Given a class named Student, which of the following is a valid constructor

declaration for this class?

A) Constructor Student ( ) { }

B) public Student ( ) { }

C) Student Student ( ) { }

D) Void Student ( ) { }

55. A program written in _________ language does not require a server to

run.

A) PHP

B) Servlet

C) JSP

D) HTML

56. What happens if several catch blocks match the type of the thrown

exception?

A) All the catch blocks for that try statement are executed in order.
B) The first catch block is executed and the others are skipped.

C) All the catch blocks for that try statement are skipped.

D) The program will terminate without executing any of the catch blocks.

57. What will happen when we run the following segment of Java code?

public static void main(String args[]){ int i; int []a={3,4,0,5}; for( i=3;i>=0;i-

-){ System.out.print(30/a[i]); System.out.print(a[i]); }

A) Array elements 3 4 0 5 will be printed

B) 10 7 0 6 will be printed

C) Compile Error will occur

D) 10 7 0 6 3 4 0 5 will be printe

58. ______is s a problem which occurs when two transactions access the

same data items concurrently and their operations interleaved.

A) Loss Update

B) Incorrect summery

C) Temporary read

D) Unrepeatable read

59. One of the following statements is false

A) Method overloading is resolved at compile time

B) Method overriding is resolved at run time

C) Overridden methods coexist in the same class

D) Overloaded methods have the same name but different signature

60. Which one of the following is wrong about structural and object-oriented

programming paradigms?

A) Structural Programming can solve moderate problems

B) Object-Oriented Programming provides data hiding


C) Structural Programming does not provide data hiding

D) Structural Programming support code reusability

61. One of the following is not true about inheritance?

A) Inheritance is used for code reusing

B) In inheritance the sub class can introduce its own specific variables

C) A super class can access its own sub classes unique data members

D) Java uses the word extends to implement inheritance

62. Which one of the HTML5 attributes makes a text box inactive to edit? A.

B. C. D.

A) required

B) pattern

C) read-only

D) disable

63. which one of the following syntaxes is the correct way of defining a

function in PHP?

A) functionName(parameters) {function body}

B) function {function body}

C) function functionName(parameters) {function body}

D) ata type functionName(parameters) {function body}

64. Which layer allows an IP packet to make a physical link to the media?

A) Internet layer

B) Network access layer

C) Transport layer

D) Application layer

65. A process stack does not contain __________


A) Function parameters

B) Local variables

C) Return addresses

D) PID of the child process

66. Which one of the following is the output of the given program? $m) {

if($k!=2) continue; else echo $m; } ?>

A) 0134

B) Nov #BONES b/c incomplet program!

C) 2

D) SeptOctDecJan

67. Choose the lists of the keywords in order that they would be used to

handle exceptions in Java.

A) catch, try, finally

B) try, catch, finally

C) finally, catch, try

D) try, finally, catch

68. Transaction-processing systems usually allow multiple transactions to

run concurrently. Which of the following best suits as the advantage(s) of

allowing concurrent execution of transactions?

A) Improved transaction throughput

B) Serializability

C) Reduced execution complexity

D) Reduced waiting time

69. Based on the code snippet given below, which one of the following

statements allow you to assign an email submitted from the form to a variable
called email? UserEmail

Submit

A) $email= $_GET[“email”];

B) $email= $_POST[“email”];

C) echo $_REQUEST[“email”];

D) $email= $_REQUEST[“UserEmail”];

70. Which one is false about abstract class and interface in Java?

A) An interface cannot have instance variables.

B) In Java, an Interface cannot be final

C) There can be non-abstract methods within abstract class.

D) We can define private modifier for variables in interfaces.

71. One of the following statements is false

A) An exception is a compile time error

B) In java there are predefined classes that used to handle exceptions

C) In exception handling technique an exception object contains expected

error information

D) Exception handling mechanism decreases your program performance

72. _____________ is a program that executes compiled Java bytecode on a

specific platform.

A) NetBeans

B) JVM

C) JDK

D) JRE

73. What is the use of isset() function in PHP?

A) The isset() function is used to check whether a variable is set or not


B) The isset() function is used to check whether a variable is free or not

C) The isset() function is used to check whether a variable is a string or

not

D) The isset() function is used to set a new value to a variable

74. Based on the above question #13, what is the broadcasting address for

subnet #2?

A) 178.191.0.255

B) 178.191.255.255

C) 178.191.12.255 #bones

D) 178.191.1.255

75. Which one of the following is used to display an output in PHP?

A) document.write()

B) out.print()

C) print()

D) write()

76. One of the following is not consider in cost estimation during query

optimization?

A) Input/Output cost

B) Communication cost

C) CPU processing cost

D) Device cost

77. Which one is the right name given for unique identification of each

entity?

A) Composite Key

B) Primary Key
C) Foreign key

D) Candidate Key

78. Which types of switching each node receives the entire message, stores

it, and then transmits it to the next node?

A) Circuit Switching

B) Packet Switching

C) Message Switching

D) all

79. Which one of the following is correct statement?

A) Both unipolar encoding and polar encoding techniques are NRZ.

B) Both NRZ-L and NRZ-I changes voltage level when different bit is

encountered

C) NRZ-I changes voltage level at when a different bit is encountered

D) NRZ-L changes voltage when a 1 is encountered.

80. Which of the following is correct way of inheriting interface A by class

B?

A) interface A implements B {}

B) class B implements A {}

C) class B extends A {}

D) interface B extends A {}

81. The velocity of propagation of a signal through a guided medium varies

with frequency. This type transmission impairment is

called……………………………?

A) Noise

B) Attenuation distortion
C) Delay distortion

D) B and C

82. Which of the following is not a java.util.Scanner method?

A) nextInt()

B) next()

C) nextLine()

D) nextString()

83. To ensure integrity of the data, a database system should ensure

transactions to possess certain properties. The property which makes sure that

the partial effects of incomplete transactions should not visible to the other

transactions is called__________?

A) Atomicity

B) Isolation

C) Consistency

D) Durability

84. If a transaction is allowed to read a data item that was produced by an

uncommitted transaction, what do we call this read?

A) Repeatable read

B) Dirty read

C) Phantom read

D) Conflict read

85. One of the following is true statement about constructors?

A) Constructors are methods of a given class which used to create objects

B) Constructors are special attributes

C) Constructors have the same name as class name and can return values
D) A class can’t have more than one constructor

86. Which of the following is not primitive data type in Java?

A) String

B) long

C) Boolean

D) int

87. Which of the following OOP concept binds the code and data together

and keeps them secure from the outside world?

A) Polymorphism

B) Inheritance

C) Abstraction

D) Encapsulation

88. ______is a rule of no component of the primary key may contain a NULL

value.

A) Entity integrity

B) Referential integrity

C) Domain Integrity

D) Cardinal integrity

89. Software and hardware that uses hypertext Transfer Protocol to respond

to client requests is -----?

A) ile server

B) mail server

C) web server

D) A and C

90. One of the following is not true statement.


A) Class is an entity that contains both data and methods.

B) new operator used to create object from a given class

C) C. In java new operator used to declare variable that used to store single

value

D) D. Classes are model of a given problem domain.

91. One of the following is false about Java database connectivity (JDBC)

A) It allows you to create Java application that can access data from

different types of database systems.

B) It used to connect Java standalone applications with back-end database

servers.

C) It uses different predefined java classes and methods to handle various

data access functions.

D) Different database systems can use the same JDBC driver, which used

to establish the connection interface.

92. A class declaration that begins with the keyword ____________ must be

stored in a file that has exactly the same name as that class and ends with the

.java file-name extension.

A) private

B) final

C) public

D) abstract

93. A variable declared _____ has a GLOBAL SCOPE?

A) outside program

B) inside function

C) outside function
D) None Of the Above

94. One of the following is not the end result of abstraction in OOP?

A) Possible attributes

B) Possible methods

C) Possible class

D) Well Organized codes

95. Concept of OOP that provides code reusability is _______

A) Polymorphism

B) Inheritance

C) Encapsulation

D) Abstraction

96. Which one of the following database models under record database model

category?

A) Hierarchical Database Model

B) Network Database Model

C) Relational Database Model

D) all of them

97. 6. Which of the following is the default file extension of PHP? A. B. C.

D.

A) .php

B) .hphp

C) .xml

D) .html

98. Which coding transition is at the middle of the bit and changes phase

when a different bit is encountered?


A) Differential Manchester

B) Manchester

C) Delta modulation

D) Pulse code modulation

99. Which method execute first when you run Servlet code?

A) Service ( )

B) destroy ( )

C) init( )

D) start( )

100. Which one of the following statements is wrong about a web page?

A) The content of a static web page can only change if the source code is

changed.

B) The content of a dynamic page may change in response to users’

actions.

C) An application that collects data from users through a form and stores

it in a database requires the integration of client & server-side scripts

D) Source code of a program written in a server-side scripting language is

visible on a client application such as a browser

101. Which TCP/IP layer allows an IP packet to make a physical link to

transmission media?

A) Application layer

B) Internet layer

C) network access layer

D) transport layer

102. Choose the correct statement about Java variables.


A) Variable names can start with a digit.

B) Some Java keywords can be used as naming a variable

C) Variable names can contain digits 0-9.

D) All variables cannot be changing its value during execution

103. which one of the following statements is wrong about a session?

A) It is used to make data accessible across all pages of a website

B) echo $_SESSION[“email”]; is used to display the value of a session

variable called email.

C) session_start() function is used to start a session and must be there at

the beginning of an index.php page of the website

D) session_unset() function destroys all session variables

104. Which one of the following statements is True about process state

transition?

A) If the given quantum time expired a running process can be interrupted

and goes to the ready queue.

B) When a process is created it goes to a ready state immediately.

C) When a process successfully finished its task, it goes to a terminated

state

D) all

105. Which of the following primitive data types is not Integer type?

A) byte

B) double

C) int

D) short

106. __________ keyword is used to exit from Java loop statements.


A) continue

B) quit

C) break

D) exit

107. __________is a technique/process of keeping and maintaining a log file

of all transaction changes made to database to enable effective recovery in

event of failure?

A) Journaling

B) View

C) Backup

D) Encryption

108. Which of the following is not common member to both abstract classes

and interfaces?

A) static variables

B) final variables

C) private members

D) abstract methods

109. Assume Mr. Daniel is running different applications at the same time

like browsing the internet while preparing his assignment, so which type of

operating system he used.

A) ROTS

B) Multi-tasking

C) Multi-user

D) DOS

110. Which one of the following is not necessary condition for deadlock to
occurred?

A) Hold and Wait

B) Mutual inclusion

C) No- preemption

D) Circular wait

Send Answ er

You might also like