1. Which one of the following is NOT a guided transmission media?
Wireless
2. Which data communication component sends a message to the receiver?
Sender
3. Which one of the following is the top most layer of OSI Reference Model?
Application layer
4. Which one of the following is NOT correct about IP addressing classes?
Class D addresses is always between 192 and 223
5. If you want to calculate subnetting using the given IP address 192.168.100.154/27, what will be
the First IP address?
192.168.100.128
6. Assume you are network administrator at Wolkite satellite campus, if you face a problems of
LAN switch is not forwarding packets in the Data Center Room, What is the possible Problem?
Either the Data center switch is not properly configured or the power is unplugged.
7. On redundant system, you need to resolve network administration issues that results the loss of a
database file, what is the best solution to make your file to be normal?
Restore
8. Which one of the following is NOT the minimum requirements to install windows server 2012?
Screen size 18 inch
9. Mr. Misker is a server administrator of CISCO COMPANY. However, there are a number of
computers which is very challenging for him to give an IP address manually. What is the best
solution?
Configuring DHCP
10. Which one of the following is a container object in Active directory domain services which is
primarily used to help with group policy application and the delegation of permissions of other
Active directory domain services objects? (understanding)
Organizational Units (OUs)
11. Assume that you want to share a folder on the network for specific group of users. What is the
next step you should take to ensure proper security and access control for the shared folder?
Configure both share level and NTFS permissions to control access to the folder.
12. What specific setting should be configured in the group policy, if you are network administrator
and wants to configure a group policy that forces all users to change their passwords every 35
days?
Maximum password age
13. When Mr.Asefw applies hardware diagnostics and troubleshooting procedures, He gets a system
notification of battery Low message; what does this alert indicates?
A failure of CMOS
14. What could be the problem, if a computer emits a series of beeps during a startup?
RAM module problem
15. What should be the appropriate action to be taken when a computer monitor displays distorted
images and colors?
Replace the graphics card
16. When you are installing AGP card in your functional computer but there is a system error and
application crashes, to ensure reliable computer operation and solve the problem, what should
you do?
Remove the installed AGP card from the computer and restart it
17. Suppose you are a computer expert, your client says the computer displays “NTLDR is missing”,
what is the possible solution for the detected problem?
Repairing the operating system
18. Which one of the following is NOT Scenario for Initiating software development?
Maximize complexity
19. Types of qualitative requirements that describe what should have?
Functional requirements
20. Assume you want to analyses an inventory system of an organization, which type of UML
should be applied?
DFD diagram
21. Assume you have to analyze a library management system in order to prepare an object-oriented
design, which steps of UML diagram will you use?
Use case diagram – Sequence diagram – Class diagram – deployment diagram
22. Assume you have the CRC given figure. Which one of the following is correct about Class
Responsibility Collaborator respectively?
Student, seminar and Address is Class Responsibility Collaborator
23. Which one is the correct order in Software Development Life Cycle?
Requirements gatheringSystems analysis Design ImplementationTesting
24. Which one of the following is the main Memory that is used to store data and instructions
temporarily?
RAM (Random Access Memory)
25. Which one of the following attributes does NOT have a direct impact on the execution of a
program?
Utility Software
26. Which one of the following is a combinational logic circuit with two inputs and two outputs, and
designed to add two single bit binary numbers?
Half Adders
27. Which one of the following does NOT describe Binary number?
The transistors are made to operate on a one state
28. Which one of the following is a fastest memory that can reduce the total program execution time
of the CPU?
Cache Memory
29. What is the output of the given C++ code?
int main()
{ int age =88;
//int Age=80;
cout <<"Age: " << age << endl;
return 0;
}
Age: 88
30. What is the output of the given C++ code?
#include <iostream>
#include <iostream>
using namespace std;
int main() {
int num;
num = 4;
cout<< " number:" <<num<<endl;
cout<< " number:" <<++num<<endl;
cout<< " number:" << num<<endl;
return 0;
}
number:4 number:4 number:5
31. Which one of the following refers part of one or more subprograms in C++?
Functions
32. Which one of the following is an INVALID identifier in C++?
Float
33. What will be the output of the following statement when it is executed with in the main function?
{ cout<<(5<4)&&(4>5)); }
0
34. What is the output of the given C++ code?
#include <iostream>
using namespace std;
int main() {
int day [] = {10, 2, 77, 40, 6};
int n, result=0;
for ( n=0 ; n<5 ; n++ ) {
result += day[n];
}
cout << result;
return 0;
}
135
35. From the CIA triad of information security, which one of the following ensures that authorized
parties are able to access the information when needed?
Availability
36. Protecting your user login password using hash algorithm in the database table is an example to
which type of security component?
Confidentiality
37. Which one of the following information security threats refers gaining access to a network and
inserting a program or utility that creates an entrance for an attacker?
Back door Attacks
38. Which one of the following information security mechanisms is used to trace which clients
accessed what, and which part of information?
Auditing
39. What is the type of cryptography is used, if encryption and decryption of information is done
using the same key?
Symmetric cryptography
40. What is DBMS (database management system)?
It is an organized collection of data that can be accessed, updated, and managed.
41. Which one of the following refers a collection of interrelated data?
Database
42. In E-R modeling, which one of the following diagrams is used to represent a relationship?
Diamond
43. Which one of the following is a correct comparison between primary key attributes and foreign
key attributes of databases?
Both primary key and foreign key attributes are used to identify a unique record from a
database table.
44. What is the correct way of inserting a record into a database table called STUDENT for SQL
server database?
Insert into STUDENT (student_id, name) values (“1751”,” Alex”);
45. Assume you have database called TVTI and one of the tables is STUDENT, what will be the
effect of the below SQL COMMAND when running it in an SQL Server database?
Use TVTI;
Delete from STUDENT;
All records the students will be deleted from the table STUDENT.
46. Which one of the following is a blue print for objects?
Class
47. In Java programming, which one of the following is a correct form of variable declaration?
int $num;
48. What will be the output of the following java programming code snippet?
boolean x=true;
boolean y=false;
System.out.println(x||y);
True
49. In object-oriented programming, state and behaviors of an object is converted to __________and
__________ in the class definition respectively.
Instance variable declaration and method declaration
50. In object-oriented programming, which one of the following is true about java constructors?
Constructors are special methods that have the same name with the class
51. Which of the following statement is true about the following code snippet programmed as
solutions to solve a simple mathematical geometry?
class rectangle {
double width,height;
rectangle (double w,double h){
width=w;
height=h;
}
void calArea(){}
double calcPerimeter(){}
}//end of class rectangle
class square extends rectangle {
square (double d){
super(d,d);
}
}// end of sub class square
The program has a constructor called rectangle.
52. Which one of the following is the future of mobile computing?
Ubiquitous computing
53. Which one of the following refers transmitting and receiving voice and data using
electromagnetic waves in open space?
Wireless communication
54. Which file is used to define the layout of an Android activity?
.xml file
55. Which attribute is used to specify the font size of a TextView in Android XML?
text_size
56. Assume you have a Button for your android user interface, if you want to apply a click event
using anonymous inner class method what are the steps that you will follow.
Register the button on set OnclickListner method and define the event handler method of
on Click().
57. Which one of the following statements describes HTTP protocol?
It is used to transmit web pages across the Internet.
58. If you want to create a hyperlink on a text that links to html file called “products.html”, which
one of the following is the correct code?
<a href="products.html"> our products </a>
59. Assume you are developing a webpage and you want to include descriptive information about
the website using the Meta tags. Where is the correct place to include the Meta tags?
Inside the <Head> Tag
60. From the given alternatives, which input type enforces the user to insert information on the
username field?
<input type="text" name="username" required>
61. What is the correct way to create a paragraph with a font size=40, color=red and with a Times
New Roman font in CSS?
<p style="font-family: Times New Roman;color:red;font-size:50px;"> This
paragraph</p>
62. A web developer wants to create a registration form and apply validation in each form element to
accept only the required information, which language he can use?
JavaScript
63. Which one of the following statements is wrong about PHP?
PHP is a client-side scripting language
64. Consider the following PHP code:
$result=20;
$num1 = 10;
$num2 = 5;
$result = $num1 + $num2;
What is the value of the $result variable after executing this code?
15
65. Consider the following PHP code: What will be the output of this code if $score is 85?
if ($score >= 90)
{
$grade = "A";
} elseif ($score >= 80)
{
$grade = "B";
}
elseif ($score >= 70)
{
$grade = "C";
}
else
{
$grade = "D";
}
echo "Grade: $grade";
Grade: B
66. What is form validation, and why is it essential in web development?
Form validation ensures that user input in web forms meets specific criteria.
67. Which of the following is a commonly used method for connecting to a MySQL database in
PHP, allowing the execution of SQL queries?
mysqli_connect()
68. Which one of the following is a category of Media that is based on how humans perceive
information like Visual media and auditory media?
Perception media
69. From the different elements of a multimedia, which one of the following is considered as a static
media?
Graphic
70. A client wants to enlarge or zoom an image using an image editing application; however, the
image immediately becomes blurred. What would be the possible problem?
The image has a lower resolution
71. A company wants audio editing tools, which include multitrack productions and sound file
editing, along with digital signal processing effects. Which application would be most suitable
for this purpose?
Adobe Audition
72. A client experienced a difficulty in opening a file with a file extension called “.AVI”. As a
technician analyze the problem and select your possible recommendation?
I will check if a Video player application is installed on the device.
73. From the given alternatives, which one is a program that acts as an intermediary between a user
of a computer and the computer hardware?
Operating system
74. Which component of an operating system is responsible for Allocating time & memory to
programs and handles the file store & communication in response to system calls?
Kernel
75. From the alternatives examples that a CPU Scheduling decision may take place, which one of
them can be an example for non-preemptive or cooperative scheduling scheme?
When a process switches from running to waiting state
76. Which of the following statements best describes an operating system concept called
“Deadlock”?
It is a blocking of processes that compete for system resources.
77. Which one of the following is a memory-management technique that states a process can be
exchanged temporarily out of memory to a backing store and then brought back into memory for
continued execution?
Swapping
78. Which one of the following is NOT true about the .Net framework?
It is platform Independent.
79. Which one of the following window components is used to accept a text input from a user?
Text box
80. In C# programing, how much is the size to the data type of integer?
4 bytes
81. Which one of the following alternatives progresses from the narrowest to the broadest levels of
curriculum?
Experiential Curriculum – Instructional Curriculum – Institutional Curriculum– Societal
Curriculum
82. If teacher ‘A’ decides to make some of the students repeat a course as a result of their low
performance, which of the following can best describe his action?
The teacher used judgment about the value of a student’s performance.
83. One is correctly stated about learning, identify which?
Learning is not directly observable but manifests in the activities of the individual
84. Mr. Hadgu always introduces learning outcomes before starting teaching students. By doing this,
which principle of teaching is Mr. Hadgu applying? The principle of:
Communicating the objectives of the lesson
85. Which foundation of curriculum provides the theories and principles that help teachers
understand the factors that influence teacher-student behavior within the context of curriculum
implementation?
Psychological foundation
86. One is the advantage of using true/false test items during the test construction.
It is relatively easy to score and construct the items.
87. The scope of Educational Psychology deals about classroom climate, group dynamics help to
make guidance and counselling in the certain scope is
Learning situation
88. Which one of the following is true about teacher-centered methods of teaching?
They are suitable when there is a large content to be covered in a short time
89. ‘’The learning situation (what goes on in the TVET classrooms) should look like the situation in
which learning is to be used in the industry’’ This description goes to which of the following
criteria of content selection?
Relevance
90. When an organization gives an exam and wants to organize the students in their appropriate
group or class, which type of evaluation is the organization using?
Placement Evaluation
91. If a student studies hard to obtain better grades, getting prize and incentives, which type of
motivation guides his action?
Extrinsic motivation
92. Which one of the following is correct about the relationship between occupational standard (OS)
and training standard (TS)?
Occupational standard reflects the specific job for which a student is to be prepared
93. Which one of the following is a non-projected two-dimensional media?
Photographs
94. Of the lists given below one contains the levels of Affective domain. Which?
Receiving, Responding, Valuing, organizing, &characterization
95. Which one is not true about behavioral learning theory?
Learners are active processors of information
96. Which one of the following is not true about instructional plan?
It eases the burden of the teacher
97. According to the Systematic Curriculum and Instructional Development (SCID) model of
curriculum development by Norton (1992), the Development stage/phase consists of the
following activities
Analysis, design, development, implementation, & evaluation
98. Which one of the following is not a common problem for a teacher made test?
It is well-intended to measure what they are supposed to measure.
99. According to Abraham Maslow, food, rest, and pain avoidance are categorized under
Physiological needs
100. To which of Bloom’s hierarchy of the cognitive domain does the objective below belong to?
Objective: “At the end of this lesson, the student will be able to determine whether using
teacher centered teaching methods or learner-centered teaching methods would be more
appropriate for increasing student learning.”
Evaluation