Document
Document
a.
b.
c.
d.
QUESTION 2
Flag question
QUESTION TEXT
Choose from the following pairs the correct match between a security goal and the category of attack
against it.
a.
QUESTION 3
Not yet answered
Flag question
QUESTION TEXT
Which one of the following is a way to distinguish between the network address and host address space
of IP addresses.
a.
Broadcast address
b.
Classless IP address
c.
Subnet address
d.
Classful IP address
QUESTION 4
Flag question
QUESTION TEXT
Which one of the following is not main factor that play an important role in selection processes of the
sorting items in data structure concepts?
a.
b.
The size of the data structures (for E.g. an array) to be sorted (use of storage space)
c.
The time it takes for a programmer to implement the algorithms (programming effort)
d.
QUESTION 5
Flag question
QUESTION TEXT
a.
Routers
b.
Repeater
c.
d.
Bridge
n real world problem the data structure are used in daily life, but by using data structure concept it will
solve the real world problems for instance:- Microsoft word to Redoing / Undoing word editor , task
scheduling, twitter feeds, printer jobs user actions in game, and friendship tracking Path find. From these
data structure concepts which one is correctly matched?
a.
By using Stack concept we are solve Microsoft word to Redoing / Undoing word editor, and twitter feeds
b.
By using the concept of the Tree we are solve friendship tracking Path find, and twitter feeds
c.
By using queue concept we are solve friendship tracking , and , task scheduling
d.
By using the concept of the Graph we are solve friendship tracking Path find
QUESTION 7
Flag question
QUESTION TEXT
Which of the following is not a type of Artificial Intelligence agent?
a.
Goal-based AI agent
b.
c.
Learning AI agent
d.
Unity-based AI agent
QUESTION 8
Flag question
QUESTION TEXT
a.
b.
It performs its task on a shared address space with other processes.
c.
d.
QUESTION 9
Flag question
QUESTION TEXT
Which of the following is a client/ server protocol that automatically provides an Internet Protocol (IP)
host with its IP address and other related configuration information such as the subnet mask and default
gateway.
a.
b.
c.
QUESTION 10
Flag question
QUESTION TEXT
a.
General market
b.
Developer
c.
Particular customer
d.
In which one of the following software process assessment model the output of one phase acts as input
to the next phase?
a.
Spiral
b.
Waterfall
c.
Iterative
d.
Prototyping
QUESTION 12
Flag question
QUESTION TEXT
From the given alternative, which one is the basic role of a System administrator?
a.
b.
c.
It performs for planning and designing an efficient community of computers so that real users will be
able to get their jobs done.
d.
It performs a management role that includes user training, updating networks, maintaining access
privileges and user accounts, and maintaining network logs.
QUESTION 13
Flag question
QUESTION TEXT
Which of the following is the activity accomplished during phase-1 of SSL Handshake Protocol?
a.
b.
160 bit key is exchanged and server sends end of hello message.
c.
d.
QUESTION 14
Not yet answered
Flag question
QUESTION TEXT
Which factors are determined the computational complexity of the amount of computer time algorithms
needs to run to completion?
a.
Speed of computer
b.
Memory usage
c.
Space complexity
d.
Time complexity
QUESTION 15
Flag question
QUESTION TEXT
Which of the following firewalls make judgment according to information from multiple packets?
a.
Packet filtering
b.
Application proxy
c.
Circuit-level gateway
d.
Stateful inspection
a.
b.
In a stack the pushed or popped of an element is only top most elements; in queue the pushing of an
element on the front side and the popped of an element on the rear side.
c.
In a stack, we remove the data item most recently pushed; in queue, we remove the data item first
enqueued.
d.
A stack follows FIFO while queue LIFO follows data structure.
QUESTION 17
Flag question
QUESTION TEXT
a.
b.
c.
QUESTION 18
Flag question
QUESTION TEXT
In which scheme uses a page table containing pointers to all pages; the page table itself and all updated
pages are copied to a new location.
a.
b.
Shadow Paging
c.
d.
Shadow copy
QUESTION 19
Flag question
QUESTION TEXT
a.
b.
d.
QUESTION 20
Flag question
QUESTION TEXT
From the given alternative, which one is not correctly matched with its functions in the layers of the
TCP/IP Model
a.
Internet layer provides services to the presentation layer to organize its dialogue and to manage data
exchange.
b.
Application layer represents data to the user, plus encoding and dialogue control.
c.
Transport layer supports communication between various devices across diverse networks.
d.
Network Access Controls the hardware devices and media that make up the network.
Which of the following is not a characteristic of Algorithms?
a.
Efficiency
b.
Language dependent
c.
Effectiveness
d.
Unambiguity
QUESTION 22
Flag question
QUESTION TEXT
Which of the following unified modelling language that is not used to describe the behavior of the
software system?
a.
Sequence diagram
b.
Component diagram
c.
d.
Activity diagram
QUESTION 23
Flag question
QUESTION TEXT
a.
Enterprise Integrity
b.
Entity Integrity
c.
Referential Integrity
d.
Domain Integrity
QUESTION 24
Flag question
QUESTION TEXT
a.
63
b.
52
c.
53
d.
64
QUESTION 25
Flag question
QUESTION TEXT
Which of the following is the property of the Transaction that protect Data from system failure.
a.
Atomicity
b.
Consistency
c.
Durability
d.
Isolation
What characteristics of RAM memory make it not suitable for permanent storage?
a.
Too bulky
b.
Unreliable
c.
Too slow
d.
It is volatile
QUESTION 27
Flag question
QUESTION TEXT
Which one of the following is the type of actor that initiate the use case and hence are somewhat
independent?
a.
System by it self
b.
Tertiary actor
c.
Primary actor
d.
Secondary actor
QUESTION 28
Not yet answered
Flag question
QUESTION TEXT
Which of the following attacks is perpetrated against a system threatening its availability?
a.
Interruption
b.
Eavesdropping
c.
DoS
d.
Interception
QUESTION 29
Flag question
QUESTION TEXT
b.
c.
d.
QUESTION 30
Flag question
QUESTION TEXT
Machines that try to imitate human intuition while handling vague information lie in the field of AI
called?
a.
Human Logic
b.
Functional Logic
c.
Fuzzy Logic
d.
Boolean Logic
a.
b.
c.
Its the process of solving customers problem by the systematic development and evolution of large, high
quality software system within cost, time and other constraints.
d.
QUESTION 32
Flag question
QUESTION TEXT
Which one of the following is not non-functional requirement in the software engineering?
a.
Usability
b.
Reliability
c.
Input or output
d.
Performance
QUESTION 33
Flag question
QUESTION TEXT
From the given alternative which one is responsible for using that the database remains in a consistent
state despite system failure?
a.
Transaction Manager
b.
Storage Manager
c.
Sophisticated
d.
End User
QUESTION 34
Flag question
QUESTION TEXT
a.
b.
c.
d.
Flag question
QUESTION TEXT
a.
b.
c.
d.
Which one of the following is the scripting engine that creates an environment upon which scripts can
execute on a windows system?
a.
b.
Windows Scripting Host (WSH)
c.
d.
QUESTION 37
Flag question
QUESTION TEXT
a.
Quick sort
b.
Heap sort
c.
Merge sort
d.
Shell sort
QUESTION 38
Flag question
QUESTION TEXT
a.
Unlock-Based Protocol
b.
Lock-based Protocol
c.
d.
QUESTION 39
Flag question
QUESTION TEXT
Which of the following is not a characteristic of the compiler?
a.
The execution takes place after the removal of all syntax errors
b.
c.
d.
Firstly scans the entire program and then transforms it into machine-understandable code
QUESTION 40
Flag question
QUESTION TEXT
Before you can access data in a database, you must create a connection to the database. Which one of
the following php syntax help to create connection?
a.
b.
Mysql_connect(servername, username, password);
c.
d.
Which one of the following is the best method to avoid race conditions?
a.
b.
Semaphores
c.
Strict alternation
QUESTION 42
Flag question
QUESTION TEXT
During transaction before commit which of the following statement is done automatically in case of
shutdown?
a.
View
b.
Flashback
c.
Rollback
d.
Commit
QUESTION 43
Flag question
QUESTION TEXT
Which of the following is correctly matched of design and analysis of algorithms techniques?
a.
b.
Divide and conquer: selecting each part of a solution only because it is immediately beneficial.
c.
Greedy technique: finding all the possible solution and trying each one by one.
d.
Backtracking technique: solving all possible combinations then backtracking if the current solution does
look desirable.
QUESTION 44
Flag question
QUESTION TEXT
a.
Client computer
b.
Server computer
c.
ISP computer
d.
Flag question
QUESTION TEXT
Which a simple sort algorithm is deals to finds the smallest element of the array and interchanges it with
the element in the first position of the array?
a.
Heap sort
b.
Bubble sort
c.
Insertion sort
d.
Selection sort
a.
final
b.
throw
c.
catch
d.
try
QUESTION 47
Flag question
QUESTION TEXT
a.
Are easier to maintain, upgrade, and build upon than statically made sites
b.
Often have interfaces where administrators can manage the sites content
c.
d.
Have a memory, allowing for user registration and login, e-commerce, and similar processes
QUESTION 48
Flag question
QUESTION TEXT
a.
call by pointer
b.
call by reference
c.
call by object
d.
call by value
QUESTION 49
Flag question
QUESTION TEXT
What is another name of bottom-up parsing?
a.
Shift-reduce parsing.
b.
c.
Backtracking.
d.
Predictive parsing.
QUESTION 50
Flag question
QUESTION TEXT
a.
Type 1 language
b.
Type 2 language
c.
Type 0 language
d.
Type 3 language
Which one of the following is sequentially ordered of design and analysis of algorithms? I,Decide on
computational means, exact Vs appropriate solving, and algorithm design techniques ii,Prove the
correctness iii,Understanding the problem IV,Design the algorithm V,Analyze the algorithm VI,Code the
algorithm
a.
III,I,II,V,IV,VI
b.
c.
III,I,IV, II,V,VI
d.
QUESTION 52
QUESTION TEXT
Which technique that was developed to determine whether a machine could or could not demonstrate
the artificial intelligence
a.
Boolean Algebra
b.
Algorithm
c.
Logarithm
d.
Turing Test
QUESTION 53
Flag question
QUESTION TEXT
a.
Only one of the processes in the set can run and release resources.
b.
Each process is waiting for the release of some resource currently possessed by another member of the
set.
c.
The number of processes in the deadlock is important in determining if any of them can break out of it.
d.
QUESTION 54
Flag question
QUESTION TEXT
Which of the following is not true about the characteristics of the hash function in the data structure
a.
Slot to be occupied
b.
Puzzle friendly
c.
Property to be Hidden
d.
Collision free
QUESTION 55
Flag question
QUESTION TEXT
Which one of the following are not the guidelines for developing security policies which are followed by
network administrators in organizations to help them ensure effective network management?
a.
b.
Establish an approval process to include legal and regulatory specialists, policy and procedure experts
c.
Establish working relationships between departments, such as human resources, internal audit, facilities
management, and policy analysis
d.
Which of the following is not a discipline that helps in having strong passwords?
a.
b.
c.
QUESTION 57
Flag question
QUESTION TEXT
a.
catch
b.
final
c.
try
d.
throw
QUESTION 58
Flag question
QUESTION TEXT
Access control has several ways of implementation. Of those implementations, which one could be
represented by a list of triples with the form (subject, object, rights)?
a.
Privilege list
b.
c.
d.
QUESTION 59
Flag question
QUESTION TEXT
a.
Preprocessor.
b.
Linker
c.
Assembler.
d.
Loader.
QUESTION 60
Flag question
QUESTION TEXT
a.
RAM
b.
Register
c.
Secondary memory
d.
Cache memory
a.
b.
c.
d.
QUESTION 62
Not yet answered
Flag question
QUESTION TEXT
a.
255.255.x.x
b.
255.255.255.x
c.
255.255.255.254
d.
255.0.0.0
QUESTION 63
Flag question
QUESTION TEXT
b.
c.
d.
QUESTION 64
Flag question
QUESTION TEXT
Which of the following is a security control countermeasure that uses who you are as a tool?
a.
Encryption
b.
Authentication
c.
Confidentiality
d.
Integrity
QUESTION 65
Flag question
QUESTION TEXT
a.
b.
c.
d.
Main memory
b.
Bus
c.
Registers
d.
Secondary memory
QUESTION 67
Flag question
QUESTION TEXT
Which of the following is the correct statement to create an object for the following class? class
BodyMassIndex { double weight; double height; public double calculateBMI(double weight, double
height) {return weight/(height*height);}}
a.
b.
calculateBMI calc = new calculateBMI();
c.
d.
QUESTION 68
Flag question
QUESTION TEXT
a.
Signed magnitude
b.
1s complement method
c.
d.
2s complement
QUESTION 69
Flag question
QUESTION TEXT
Which one of the following method use to remove all global session variables and destroy the session in
php?
a.
session_destroy();
b.
session_start();
c.
d.
session_unset();
QUESTION 70
Flag question
QUESTION TEXT
Among the given options, which search algorithm requires less memory?
a.
b.
Linear Search
c.
Optimal Search
d.
Breadth-first Search
a.
Main memory
b.
Bus
c.
Registers
d.
Secondary memory
QUESTION 67
Flag question
QUESTION TEXT
Which of the following is the correct statement to create an object for the following class? class
BodyMassIndex { double weight; double height; public double calculateBMI(double weight, double
height) {return weight/(height*height);}}
a.
b.
c.
d.
QUESTION 68
Flag question
QUESTION TEXT
a.
Signed magnitude
b.
1s complement method
c.
d.
2s complement
QUESTION 69
Flag question
QUESTION TEXT
Which one of the following method use to remove all global session variables and destroy the session in
php?
a.
session_destroy();
b.
session_start();
c.
d.
session_unset();
QUESTION 70
Flag question
QUESTION TEXT
Among the given options, which search algorithm requires less memory?
a.
b.
Linear Search
c.
Optimal Search
d.
Breadth-first Search
a.
int array;
b.
array array[10];
c.
int array[10];
d.
array{10};
QUESTION 72
Flag question
QUESTION TEXT
The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is
a.
An operator-grammar
b.
Left-recursive
c.
Right-recursive
d.
Ambiguous
QUESTION 73
Flag question
QUESTION TEXT
a.
Union
b.
Join
c.
Projection
d.
Selection
QUESTION 74
Flag question
QUESTION TEXT
The Level of Data Abstraction Which describes how the data actually stored.
a.
File Level
b.
Implementation Level
c.
Physical Level
d.
Conceptual Level
QUESTION 75
Flag question
QUESTION TEXT
a.
b.
c.
d.
QUESTION 71
Flag question
QUESTION TEXT
int array;
b.
array array[10];
c.
int array[10];
d.
array{10};
QUESTION 72
Flag question
QUESTION TEXT
The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is
a.
An operator-grammar
b.
Left-recursive
c.
Right-recursive
d.
Ambiguous
QUESTION 73
Flag question
QUESTION TEXT
a.
Union
b.
Join
c.
Projection
d.
Selection
QUESTION 74
Flag question
QUESTION TEXT
The Level of Data Abstraction Which describes how the data actually stored.
a.
File Level
b.
Implementation Level
c.
Physical Level
d.
Conceptual Level
QUESTION 75
Flag question
QUESTION TEXT
Which DBMS display a Schema to the user in the diagrammatical form?
a.
b.
c.
d.
QUESTION 71
Flag question
QUESTION TEXT
a.
int array;
b.
array array[10];
c.
int array[10];
d.
array{10};
QUESTION 72
Flag question
QUESTION TEXT
The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is
a.
An operator-grammar
b.
Left-recursive
c.
Right-recursive
d.
Ambiguous
QUESTION 73
Flag question
QUESTION TEXT
a.
Union
b.
Join
c.
Projection
d.
Selection
QUESTION 74
QUESTION TEXT
The Level of Data Abstraction Which describes how the data actually stored.
a.
File Level
b.
Implementation Level
c.
Physical Level
d.
Conceptual Level
QUESTION 75
Flag question
QUESTION TEXT
a.
c.
d.
a.
Alpha
b.
System
c.
Unit
d.
Beta
QUESTION 77
Flag question
QUESTION TEXT
a.
3NF
b.
4NF
c.
1NF
d.
2NF
QUESTION 78
Flag question
QUESTION TEXT
a.
Supervised Learning
b.
Unsupervised Learning
c.
Deep Learning.
d.
Reinforcement Learning
QUESTION 79
Flag question
QUESTION TEXT
Which algorithm Design techniques is used to solve the optimization problem; an optimization means we
are given a set of inputs values, which are required either to be maximized or minimized some
constraints or conditions?
a.
b.
Dynamic programming
d.
Greedy technique
QUESTION 80
Flag question
QUESTION TEXT
Which one of the following is the not quality attributes of the software?
a.
Scalability
b.
Insecurity
c.
Maintainability
d.
Reliability
Byte code.
b.
Library
c.
Executable file
d.
Object code.
QUESTION 82
Flag question
QUESTION TEXT
a.
GET requests are not exposed in the URL and should be used for sensitive data
b.
GET requests are sent via the URL, and can thus be cached, bookmarked, and shared.
d.
Information sent from a form with the GET method is visible to everyone
QUESTION 83
Flag question
QUESTION TEXT
a.
b.
c.
d.
Flag question
QUESTION TEXT
a.
b.
Each time the same computer requests a page with a browser, it will send the cookie too.
c.
One way that a site can remember or track a user over the course of a visit
d.
QUESTION 85
Flag question
QUESTION TEXT
What is the function of the memory manager in the operating system?
a.
b.
c.
d.
A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet mask. How many
subnets can be created by using this subnet mask?
a.
16
b.
32
c.
d.
30
QUESTION 87
Flag question
QUESTION TEXT
In which exiting loop statement the program terminates the current iteration of a loop and instead
jumps to the next iteration?
a.
continue statement
b.
Break statement
c.
Go on statement
d.
Jump statement
QUESTION 88
Flag question
QUESTION TEXT
In which phase in compiler design do we check the grammar of the programming language?
a.
Code generation
b.
Semantic analysis.
c.
Syntax analysis.
d.
Lexical analysis.
QUESTION 89
Flag question
QUESTION TEXT
A network must be able to meet a certain number of criteria, from the given alternative which one is not
the network criteria.
a.
Performance
b.
Transmission Medium
c.
Reliability
d.
Security
QUESTION 90
Flag question
QUESTION TEXT
Which one of the following is not reason for why we use session in PHP?
a.
Session variables hold information about one single user, and are available to all pages in one application
b.
c.
By default, session variables last until the user closes the browser.
d.
The web server does not know who you are or what you do, because the HTTP address does not
maintain state.
Which of the following statements does not give the correct definition of the operating system?
a.
It is a system software whose function is to provide system services to the application programs.
b.
It is software that provides an interface between the hardware and application programs.
c.
It interacts with the hardware indirectly through system calls provided by system software.
d.
QUESTION 92
Flag question
QUESTION TEXT
The average time required to reach the storage location in a memory and obtain its contents is
a.
Latency time
b.
Turnaround time
c.
Response time
d.
Access time
QUESTION 93
Flag question
QUESTION TEXT
In which testing assumes that the path of logic in a unit or program is known?
a.
b.
Functional testing
c.
Performance Testing
QUESTION 94
Flag question
QUESTION TEXT
a.
b.
Its priorities remain the same across different types of operating systems.
c.
d.
QUESTION 95
Flag question
QUESTION TEXT
Which phenomenon happens when the non-terminal on the left side is repeated as the first symbol on
the right side?
a.
Left-most derivation
b.
Left recursion
c.
Left parsing
d.
Left factoring
Which of the following statements does not give the correct definition of the operating system?
a.
It is a system software whose function is to provide system services to the application programs.
b.
It is software that provides an interface between the hardware and application programs.
c.
It interacts with the hardware indirectly through system calls provided by system software.
d.
QUESTION 92
Flag question
QUESTION TEXT
The average time required to reach the storage location in a memory and obtain its contents is
a.
Latency time
b.
Turnaround time
c.
Response time
d.
Access time
QUESTION 93
Not yet answered
Flag question
QUESTION TEXT
In which testing assumes that the path of logic in a unit or program is known?
a.
b.
Functional testing
c.
d.
Performance Testing
QUESTION 94
Flag question
QUESTION TEXT
b.
Its priorities remain the same across different types of operating systems.
c.
d.
QUESTION 95
Flag question
QUESTION TEXT
Which phenomenon happens when the non-terminal on the left side is repeated as the first symbol on
the right side?
a.
Left-most derivation
b.
Left recursion
c.
Left parsing
d.
Left factoring
Which of the following is indicates the number of entities that can be involved in a relationship.
a.
Cardinality
b.
Entity Count
c.
ERD
d.
Relationship
QUESTION 97
Flag question
QUESTION TEXT
b.
c.
FIFO
d.
QUESTION 98
Flag question
QUESTION TEXT
How can we make a C++ class such that objects of it can only be created using new operator? If user tries
to create an object directly, the program produces compiler error.
a.
b.
d.
Not possible
QUESTION 99
Flag question
QUESTION TEXT
Which of the following is not true about the following piece of code?class Box{ double width; double
height; double depth; }
a.
b.
c.