0% found this document useful (0 votes)
55 views85 pages

Document

Uploaded by

addisu eyob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views85 pages

Document

Uploaded by

addisu eyob
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 85

Which one of the following the best reasons for why do you need to subnet Internet Protocol networks?

a.

To decrease network reliability and increase latency

b.

To create a large networks within smaller network

c.

To improve network security

d.

To decrease network scalability

QUESTION 2

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Choose from the following pairs the correct match between a security goal and the category of attack
against it.

a.

This choice was deleted after the attempt was started.

QUESTION 3
Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is a way to distinguish between the network address and host address space
of IP addresses.

a.

Broadcast address

b.

Classless IP address

c.

Subnet address

d.

Classful IP address

QUESTION 4

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is not main factor that play an important role in selection processes of the
sorting items in data structure concepts?
a.

The Correctness of program

b.

The size of the data structures (for E.g. an array) to be sorted (use of storage space)

c.

The time it takes for a programmer to implement the algorithms (programming effort)

d.

The time complexity of the algorithm (use of computer time)

QUESTION 5

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

a.

Routers

b.

Repeater
c.

Network interface card

d.

Bridge

n real world problem the data structure are used in daily life, but by using data structure concept it will
solve the real world problems for instance:- Microsoft word to Redoing / Undoing word editor , task
scheduling, twitter feeds, printer jobs user actions in game, and friendship tracking Path find. From these
data structure concepts which one is correctly matched?

a.

By using Stack concept we are solve Microsoft word to Redoing / Undoing word editor, and twitter feeds

b.

By using the concept of the Tree we are solve friendship tracking Path find, and twitter feeds

c.

By using queue concept we are solve friendship tracking , and , task scheduling

d.

By using the concept of the Graph we are solve friendship tracking Path find

QUESTION 7

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT
Which of the following is not a type of Artificial Intelligence agent?

a.

Goal-based AI agent

b.

Simple reflex AI agent

c.

Learning AI agent

d.

Unity-based AI agent

QUESTION 8

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following statements is incorrect about a process?

a.

Helps the OS keep track of multiple parallel activities.

b.
It performs its task on a shared address space with other processes.

c.

It is an abstraction of a running program.

d.

Without it modern computing could not exist.

QUESTION 9

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is a client/ server protocol that automatically provides an Internet Protocol (IP)
host with its IP address and other related configuration information such as the subnet mask and default
gateway.

a.

Domain Name Server (DNS)

b.

Dynamic Host Configuration Protocol (DHCP)

c.

File Transfer Protocol (FTP)


d.

Small Mail Transfer Protocol (SMTP)

QUESTION 10

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In software engineering the software products may be developed for a

a.

General market

b.

Developer

c.

Particular customer

d.

Both General market and Particular customer

In which one of the following software process assessment model the output of one phase acts as input
to the next phase?

a.

Spiral
b.

Waterfall

c.

Iterative

d.

Prototyping

QUESTION 12

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

From the given alternative, which one is the basic role of a System administrator?

a.

It undertakes an implementation role that consists of installation and configuration of networking


software, establishing user accounts, and installing storage are networks.

b.

It troubleshoots network issues and responds to service interruptions.

c.

It performs for planning and designing an efficient community of computers so that real users will be
able to get their jobs done.

d.

It performs a management role that includes user training, updating networks, maintaining access
privileges and user accounts, and maintaining network logs.

QUESTION 13

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is the activity accomplished during phase-1 of SSL Handshake Protocol?

a.

Security capabilities such as encryption and compression algorithms are established.

b.

160 bit key is exchanged and server sends end of hello message.

c.

Change of cipher suite

d.

Certificate is sent from the server and verified by the client.

QUESTION 14
Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which factors are determined the computational complexity of the amount of computer time algorithms
needs to run to completion?

a.

Speed of computer

b.

Memory usage

c.

Space complexity

d.

Time complexity

QUESTION 15

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following firewalls make judgment according to information from multiple packets?
a.

Packet filtering

b.

Application proxy

c.

Circuit-level gateway

d.

Stateful inspection

Which of the following is correctly matched

a.

A stack FCFS follows while queue follows LIFO data structure.

b.

In a stack the pushed or popped of an element is only top most elements; in queue the pushing of an
element on the front side and the popped of an element on the rear side.

c.

In a stack, we remove the data item most recently pushed; in queue, we remove the data item first
enqueued.

d.
A stack follows FIFO while queue LIFO follows data structure.

QUESTION 17

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is not a reason for communication between processes?

a.

Proper sequencing when dependencies are present.

b.

To facilitate the negotiation of resources between threads.

c.

To determine how one process can pass information to another.

QUESTION 18

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In which scheme uses a page table containing pointers to all pages; the page table itself and all updated
pages are copied to a new location.
a.

Copy log records

b.

Shadow Paging

c.

Update log records

d.

Shadow copy

QUESTION 19

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

One of the following is not true about linked list?

a.

dynamic data structure

b.

It allows efficient access to an arbitrary data item


c.

Efficient memory utilization

d.

Insertion and deletion are easier and efficient

QUESTION 20

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

From the given alternative, which one is not correctly matched with its functions in the layers of the
TCP/IP Model

a.

Internet layer provides services to the presentation layer to organize its dialogue and to manage data
exchange.

b.

Application layer represents data to the user, plus encoding and dialogue control.

c.

Transport layer supports communication between various devices across diverse networks.

d.

Network Access Controls the hardware devices and media that make up the network.
Which of the following is not a characteristic of Algorithms?

a.

Efficiency

b.

Language dependent

c.

Effectiveness

d.

Unambiguity

QUESTION 22

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following unified modelling language that is not used to describe the behavior of the
software system?

a.

Sequence diagram
b.

Component diagram

c.

Use case diagram

d.

Activity diagram

QUESTION 23

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Select the correct foreign key constraint.

a.

Enterprise Integrity

b.

Entity Integrity

c.

Referential Integrity
d.

Domain Integrity

QUESTION 24

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

What will be the output of the following program?

a.

63

b.

52

c.

53

d.

64

QUESTION 25

Not yet answered


Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is the property of the Transaction that protect Data from system failure.

a.

Atomicity

b.

Consistency

c.

Durability

d.

Isolation

What characteristics of RAM memory make it not suitable for permanent storage?

a.

Too bulky

b.

Unreliable

c.
Too slow

d.

It is volatile

QUESTION 27

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is the type of actor that initiate the use case and hence are somewhat
independent?

a.

System by it self

b.

Tertiary actor

c.

Primary actor

d.

Secondary actor

QUESTION 28
Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following attacks is perpetrated against a system threatening its availability?

a.

Interruption

b.

Eavesdropping

c.

DoS

d.

Interception

QUESTION 29

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which will legally declare, construct, and initialize an array?


a.

int myList [] = {4, 3, 7};

b.

int [] myList = {"1", "2", "3"};

c.

int [] myList = (5, 8, 2);

d.

int myList [] [] = {4,9,7,0};

QUESTION 30

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Machines that try to imitate human intuition while handling vague information lie in the field of AI
called?

a.

Human Logic

b.

Functional Logic
c.

Fuzzy Logic

d.

Boolean Logic

Which one of the following is not true about Software engineering?

a.

It is concerned with theory and fundamentals.

b.

It is concerned with the practicalities of developing and delivering useful software.

c.

Its the process of solving customers problem by the systematic development and evolution of large, high
quality software system within cost, time and other constraints.

d.

It is an engineering discipline that is concerned with all aspects of software production.

QUESTION 32

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is not non-functional requirement in the software engineering?
a.

Usability

b.

Reliability

c.

Input or output

d.

Performance

QUESTION 33

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

From the given alternative which one is responsible for using that the database remains in a consistent
state despite system failure?

a.

Transaction Manager

b.

Storage Manager
c.

Sophisticated

d.

End User

QUESTION 34

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is different from the others?

a.

Training staff in the safe and secure use of the equipment

b.

Security settings in the router or the operating system

c.

The unauthorized monitoring of other peoples communications.

d.

Data encryption systems for sensitive data


QUESTION 35

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which command is used to grant or revoke user access privileges?

a.

Data Definition Language

b.

Data control language

c.

Data Query Language

d.

Transaction control language

Which one of the following is the scripting engine that creates an environment upon which scripts can
execute on a windows system?

a.

Active Directory Scripting Interface (ADSI)

b.
Windows Scripting Host (WSH)

c.

Windows Management Interface (WMI)

d.

Visual Basic Scripting Edition (VBScript)

QUESTION 37

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

a.

Quick sort

b.

Heap sort

c.

Merge sort

d.

Shell sort
QUESTION 38

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one is not the concurrency based protocol?

a.

Unlock-Based Protocol

b.

Lock-based Protocol

c.

Two phased Locking Protocol

d.

Timestamp Ordering Protocol

QUESTION 39

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT
Which of the following is not a characteristic of the compiler?

a.

The execution takes place after the removal of all syntax errors

b.

Debugging process is slow

c.

More execution time

d.

Firstly scans the entire program and then transforms it into machine-understandable code

QUESTION 40

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Before you can access data in a database, you must create a connection to the database. Which one of
the following php syntax help to create connection?

a.

Mysql_query (servername, username, password);

b.
Mysql_connect(servername, username, password);

c.

Mysql_create_db(servername, username, password);

d.

Mysql_Db(servername, username, password);

Which one of the following is the best method to avoid race conditions?

a.

Sleep and wakeup

b.

Semaphores

c.

Strict alternation

QUESTION 42

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

During transaction before commit which of the following statement is done automatically in case of
shutdown?
a.

View

b.

Flashback

c.

Rollback

d.

Commit

QUESTION 43

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is correctly matched of design and analysis of algorithms techniques?

a.

Dynamic programming technique: solving problems with overlapping sub-problems.

b.

Divide and conquer: selecting each part of a solution only because it is immediately beneficial.
c.

Greedy technique: finding all the possible solution and trying each one by one.

d.

Backtracking technique: solving all possible combinations then backtracking if the current solution does
look desirable.

QUESTION 44

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

PHP scripts are executed on

a.

Client computer

b.

Server computer

c.

ISP computer

d.

The execution depends on PHP scripts


QUESTION 45

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which a simple sort algorithm is deals to finds the smallest element of the array and interchanges it with
the element in the first position of the array?

a.

Heap sort

b.

Bubble sort

c.

Insertion sort

d.

Selection sort

Which of the following is a not keyword used in exception handling?

a.

final

b.

throw
c.

catch

d.

try

QUESTION 47

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

True about Dynamic Web Sites

a.

Are easier to maintain, upgrade, and build upon than statically made sites

b.

Often have interfaces where administrators can manage the sites content

c.

It is one type of website that is built with pages of static content.

d.

Have a memory, allowing for user registration and login, e-commerce, and similar processes
QUESTION 48

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which is more effective while calling the C++ functions?

a.

call by pointer

b.

call by reference

c.

call by object

d.

call by value

QUESTION 49

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT
What is another name of bottom-up parsing?

a.

Shift-reduce parsing.

b.

Recursive descent parsing.

c.

Backtracking.

d.

Predictive parsing.

QUESTION 50

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which language is accepted by the push-down automata?

a.

Type 1 language

b.
Type 2 language

c.

Type 0 language

d.

Type 3 language

Which one of the following is sequentially ordered of design and analysis of algorithms? I,Decide on
computational means, exact Vs appropriate solving, and algorithm design techniques ii,Prove the
correctness iii,Understanding the problem IV,Design the algorithm V,Analyze the algorithm VI,Code the
algorithm

a.

III,I,II,V,IV,VI

b.

III, II, I, IV, V, VI

c.

III,I,IV, II,V,VI

d.

I,III, II, IV, VI ,V

QUESTION 52

Not yet answered

Marked out of 1.00


Flag question

QUESTION TEXT

Which technique that was developed to determine whether a machine could or could not demonstrate
the artificial intelligence

a.

Boolean Algebra

b.

Algorithm

c.

Logarithm

d.

Turing Test

QUESTION 53

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is true about a set of processes in a deadlock?

a.

Only one of the processes in the set can run and release resources.
b.

Each process is waiting for the release of some resource currently possessed by another member of the
set.

c.

The number of processes in the deadlock is important in determining if any of them can break out of it.

d.

A process that blocks waiting for a deadlocked resource can be awakened.

QUESTION 54

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is not true about the characteristics of the hash function in the data structure

a.

Slot to be occupied

b.

Puzzle friendly

c.

Property to be Hidden
d.

Collision free

QUESTION 55

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following are not the guidelines for developing security policies which are followed by
network administrators in organizations to help them ensure effective network management?

a.

Quickly arrange repair for hardware in occasion of hardware failure

b.

Establish an approval process to include legal and regulatory specialists, policy and procedure experts

c.

Establish working relationships between departments, such as human resources, internal audit, facilities
management, and policy analysis

d.

Obtain a commitment from senior management to enforce security policies

Which of the following is not a discipline that helps in having strong passwords?
a.

Choosing long passwords.

b.

Writing it down or telling it a close friend to help us remember strong passwords.

c.

Avoiding actual names or words.

QUESTION 57

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is a not keyword used in exception handling?

a.

catch

b.

final

c.

try
d.

throw

QUESTION 58

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Access control has several ways of implementation. Of those implementations, which one could be
represented by a list of triples with the form (subject, object, rights)?

a.

Privilege list

b.

Access control directory

c.

Access control list

d.

Access control matrix

QUESTION 59

Not yet answered


Marked out of 1.00

Flag question

QUESTION TEXT

Which among the following provides input for a compiler?

a.

Preprocessor.

b.

Linker

c.

Assembler.

d.

Loader.

QUESTION 60

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is lowest in memory hierarchy?

a.
RAM

b.

Register

c.

Secondary memory

d.

Cache memory

The three main parts of central processing unit (CPU processor) is

a.

ALU, Control Unit, and Registers

b.

Cache, ALU, and RAM

c.

ALU, Control Unit, and RAM

d.

Control Unit, RAM, and Cache

QUESTION 62
Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one is the default subnet mask for class A IP addresses?

a.

255.255.x.x

b.

255.255.255.x

c.

255.255.255.254

d.

255.0.0.0

QUESTION 63

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

What does isset () function do in php?


a.

Check whether variable is free or not

b.

It checks whether variable is set or not

c.

It checks whether variable is string or float

d.

It check whether variable is assigned or not.

QUESTION 64

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is a security control countermeasure that uses who you are as a tool?

a.

Encryption

b.

Authentication
c.

Confidentiality

d.

Integrity

QUESTION 65

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

What is the use of strlen () function in PHP?

a.

It returns the type of a string

b.

It returns the subset value of a string

c.

It returns the value of a string

d.

It returns the length of a string

The hardware in which data is stored permanently for a computer system is


a.

Main memory

b.

Bus

c.

Registers

d.

Secondary memory

QUESTION 67

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is the correct statement to create an object for the following class? class
BodyMassIndex { double weight; double height; public double calculateBMI(double weight, double
height) {return weight/(height*height);}}

a.

BodyMassIndex body = new BodyMassIndex();

b.
calculateBMI calc = new calculateBMI();

c.

BodyMassIndex myBMI = new myBMI();

d.

Scanner input = new Scanner(System.in);

QUESTION 68

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In computer, subtraction carried out generally by

a.

Signed magnitude

b.

1s complement method

c.

BCD subtraction method

d.
2s complement

QUESTION 69

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following method use to remove all global session variables and destroy the session in
php?

a.

session_destroy();

b.

session_start();

c.

session_destroy() and session_unset()

d.

session_unset();

QUESTION 70

Not yet answered

Marked out of 1.00

Flag question
QUESTION TEXT

Among the given options, which search algorithm requires less memory?

a.

Depth first Search

b.

Linear Search

c.

Optimal Search

d.

Breadth-first Search

The hardware in which data is stored permanently for a computer system is

a.

Main memory

b.

Bus

c.

Registers
d.

Secondary memory

QUESTION 67

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is the correct statement to create an object for the following class? class
BodyMassIndex { double weight; double height; public double calculateBMI(double weight, double
height) {return weight/(height*height);}}

a.

BodyMassIndex body = new BodyMassIndex();

b.

calculateBMI calc = new calculateBMI();

c.

BodyMassIndex myBMI = new myBMI();

d.

Scanner input = new Scanner(System.in);

QUESTION 68

Not yet answered


Marked out of 1.00

Flag question

QUESTION TEXT

In computer, subtraction carried out generally by

a.

Signed magnitude

b.

1s complement method

c.

BCD subtraction method

d.

2s complement

QUESTION 69

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following method use to remove all global session variables and destroy the session in
php?

a.
session_destroy();

b.

session_start();

c.

session_destroy() and session_unset()

d.

session_unset();

QUESTION 70

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Among the given options, which search algorithm requires less memory?

a.

Depth first Search

b.

Linear Search

c.
Optimal Search

d.

Breadth-first Search

Which of the following correctly declares an array in C++?

a.

int array;

b.

array array[10];

c.

int array[10];

d.

array{10};

QUESTION 72

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is
a.

An operator-grammar

b.

Left-recursive

c.

Right-recursive

d.

Ambiguous

QUESTION 73

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

To select some particular columns, which of the following command is used?

a.

Union

b.

Join
c.

Projection

d.

Selection

QUESTION 74

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The Level of Data Abstraction Which describes how the data actually stored.

a.

File Level

b.

Implementation Level

c.

Physical Level

d.

Conceptual Level
QUESTION 75

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which DBMS display a Schema to the user in the diagrammatical form?

a.

Natural Language Interface.

b.

Graphical User Interface.

c.

Interface or the DBA.

d.

Menu Based Interface.

Time left 1:32:27

QUESTION 71

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following correctly declares an array in C++?


a.

int array;

b.

array array[10];

c.

int array[10];

d.

array{10};

QUESTION 72

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is

a.

An operator-grammar

b.

Left-recursive
c.

Right-recursive

d.

Ambiguous

QUESTION 73

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

To select some particular columns, which of the following command is used?

a.

Union

b.

Join

c.

Projection

d.

Selection
QUESTION 74

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The Level of Data Abstraction Which describes how the data actually stored.

a.

File Level

b.

Implementation Level

c.

Physical Level

d.

Conceptual Level

QUESTION 75

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT
Which DBMS display a Schema to the user in the diagrammatical form?

a.

Natural Language Interface.

b.

Graphical User Interface.

c.

Interface or the DBA.

d.

Menu Based Interface.

Time left 1:32:17

QUESTION 71

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following correctly declares an array in C++?

a.

int array;
b.

array array[10];

c.

int array[10];

d.

array{10};

QUESTION 72

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The grammar A ->AA |( A)| ? is not suitable for predictive-parsing because the grammar is

a.

An operator-grammar

b.

Left-recursive

c.

Right-recursive
d.

Ambiguous

QUESTION 73

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

To select some particular columns, which of the following command is used?

a.

Union

b.

Join

c.

Projection

d.

Selection

QUESTION 74

Not yet answered

Marked out of 1.00


Flag question

QUESTION TEXT

The Level of Data Abstraction Which describes how the data actually stored.

a.

File Level

b.

Implementation Level

c.

Physical Level

d.

Conceptual Level

QUESTION 75

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which DBMS display a Schema to the user in the diagrammatical form?

a.

Natural Language Interface.


b.

Graphical User Interface.

c.

Interface or the DBA.

d.

Menu Based Interface.

In which test is conducted at the developers site by a customer?

a.

Alpha

b.

System

c.

Unit

d.

Beta

QUESTION 77

Not yet answered


Marked out of 1.00

Flag question

QUESTION TEXT

Which normal form deals with multivalued dependency?

a.

3NF

b.

4NF

c.

1NF

d.

2NF

QUESTION 78

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Exploratory Learning is another name for?

a.
Supervised Learning

b.

Unsupervised Learning

c.

Deep Learning.

d.

Reinforcement Learning

QUESTION 79

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which algorithm Design techniques is used to solve the optimization problem; an optimization means we
are given a set of inputs values, which are required either to be maximized or minimized some
constraints or conditions?

a.

Sales man problems

b.

Divide and conquer


c.

Dynamic programming

d.

Greedy technique

QUESTION 80

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is the not quality attributes of the software?

a.

Scalability

b.

Insecurity

c.

Maintainability

d.

Reliability

What is the output of a Java compiler?


a.

Byte code.

b.

Library

c.

Executable file

d.

Object code.

QUESTION 82

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is not true about GET method?

a.

GET requests are not exposed in the URL and should be used for sensitive data

b.

GET requests are limited by the length of the URL


c.

GET requests are sent via the URL, and can thus be cached, bookmarked, and shared.

d.

Information sent from a form with the GET method is visible to everyone

QUESTION 83

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

What is the function of an Artificial Intelligence Agent?

a.

Mapping of goal sequence to an action

b.

Mapping of environment sequence to an action

c.

Mapping of precept sequence to an action

d.

Work without the direct interference of the people


QUESTION 84

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is not true about Using Cookies

a.

It is a way to store information (in variables) to be used across multiple pages

b.

Each time the same computer requests a page with a browser, it will send the cookie too.

c.

One way that a site can remember or track a user over the course of a visit

d.

Small file that the server embeds on the user's computer

QUESTION 85

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT
What is the function of the memory manager in the operating system?

a.

Keeping track of which parts of memory are in use.

b.

Managing the secondary storage devices to boost CPU speed.

c.

Deallocating unused memory.

d.

Allocating memory to processes when they need it.

A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet mask. How many
subnets can be created by using this subnet mask?

a.

16

b.

32

c.

d.
30

QUESTION 87

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In which exiting loop statement the program terminates the current iteration of a loop and instead
jumps to the next iteration?

a.

continue statement

b.

Break statement

c.

Go on statement

d.

Jump statement

QUESTION 88

Not yet answered

Marked out of 1.00

Flag question
QUESTION TEXT

In which phase in compiler design do we check the grammar of the programming language?

a.

Code generation

b.

Semantic analysis.

c.

Syntax analysis.

d.

Lexical analysis.

QUESTION 89

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

A network must be able to meet a certain number of criteria, from the given alternative which one is not
the network criteria.

a.

Performance
b.

Transmission Medium

c.

Reliability

d.

Security

QUESTION 90

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which one of the following is not reason for why we use session in PHP?

a.

Session variables hold information about one single user, and are available to all pages in one application

b.

It is way for a server to store information on the users machine

c.

By default, session variables last until the user closes the browser.
d.

The web server does not know who you are or what you do, because the HTTP address does not
maintain state.

Which of the following statements does not give the correct definition of the operating system?

a.

It is a system software whose function is to provide system services to the application programs.

b.

It is software that provides an interface between the hardware and application programs.

c.

It interacts with the hardware indirectly through system calls provided by system software.

d.

It is a collection of programs that manages hardware resources.

QUESTION 92

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The average time required to reach the storage location in a memory and obtain its contents is

a.

Latency time
b.

Turnaround time

c.

Response time

d.

Access time

QUESTION 93

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In which testing assumes that the path of logic in a unit or program is known?

a.

White Box testing

b.

Functional testing

c.

Black Box testing


d.

Performance Testing

QUESTION 94

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

One of the following is true about a scheduler in operating systems.

a.

Facilitates as many CPU switches as possible per second.

b.

Its priorities remain the same across different types of operating systems.

c.

It is equally important in both multiprogrammed and non-multiprogrammed systems.

d.

It assigns resources for the tasks to be performed by different processes.

QUESTION 95

Not yet answered


Marked out of 1.00

Flag question

QUESTION TEXT

Which phenomenon happens when the non-terminal on the left side is repeated as the first symbol on
the right side?

a.

Left-most derivation

b.

Left recursion

c.

Left parsing

d.

Left factoring

Which of the following statements does not give the correct definition of the operating system?

a.

It is a system software whose function is to provide system services to the application programs.

b.

It is software that provides an interface between the hardware and application programs.

c.
It interacts with the hardware indirectly through system calls provided by system software.

d.

It is a collection of programs that manages hardware resources.

QUESTION 92

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

The average time required to reach the storage location in a memory and obtain its contents is

a.

Latency time

b.

Turnaround time

c.

Response time

d.

Access time

QUESTION 93
Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In which testing assumes that the path of logic in a unit or program is known?

a.

White Box testing

b.

Functional testing

c.

Black Box testing

d.

Performance Testing

QUESTION 94

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

One of the following is true about a scheduler in operating systems.


a.

Facilitates as many CPU switches as possible per second.

b.

Its priorities remain the same across different types of operating systems.

c.

It is equally important in both multiprogrammed and non-multiprogrammed systems.

d.

It assigns resources for the tasks to be performed by different processes.

QUESTION 95

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which phenomenon happens when the non-terminal on the left side is repeated as the first symbol on
the right side?

a.

Left-most derivation

b.

Left recursion
c.

Left parsing

d.

Left factoring

Which of the following is indicates the number of entities that can be involved in a relationship.

a.

Cardinality

b.

Entity Count

c.

ERD

d.

Relationship

QUESTION 97

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

In stack which element is the most frequently accessible element?


a.

Last pushed element

b.

Last enqueued element

c.

FIFO

d.

First Pushed element

QUESTION 98

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

How can we make a C++ class such that objects of it can only be created using new operator? If user tries
to create an object directly, the program produces compiler error.

a.

By making constructors private

b.

By making destructors and constructors private


c.

By making destructors private

d.

Not possible

QUESTION 99

Not yet answered

Marked out of 1.00

Flag question

QUESTION TEXT

Which of the following is not true about the following piece of code?class Box{ double width; double
height; double depth; }

a.

It defines a new data type called Box.

b.

It gives us a blueprint to create an instance in its image.

c.

It defines a class with three instance variables.

You might also like