1446 حل آخر نموذج تجسير
0542769346 /مالذ
Choose the correct answer.
1. To connect computer systems and devices within a small area, we
use: d. LAN
a. PAN
b. SAN
c. MAN
d. LAN
2. Exploration, planning, productionizing, and maintenance describe
the main stages of: a. System Analysis and Design
a. System Analysis and Design
b. Agile Development
c. Object-Oriented SAD
d. CASE tools
3. A person, place, or thing for which data is collected, stored, and
maintained are called: d. Entity
a. Data item
b. Attribute
c. Primary key
d. Entity
4. A specific language, provided with a DBMS which allows users to
access and modify the data, to make queries, and to generate
reports is: d. SQL
a. DDL
b. QBE
c. DML
d. SQL
5. Characterizing data processes and flows graphically in a business
system is called: c. DFD
a. ERD
b. Use case diagram
c. DFD
d. Class diagram
6. Which of the following techniques is used for observing the
decision maker’s physical environment? b. Strobe
a. Sampling
b. Strobe
c. Questionnaire
d. Interview
7. Eight bits that together represent a single character of data: c.
Byte
a. Gigabyte
b. Kilobyte
c. Byte
d. Megabyte
8. A reference work of data about data (metadata) is called: d. Data
dictionary
a. Data store
b. Database
c. Data warehouse
d. Data dictionary
9. The figure below is an entity relationship diagram showing a: b.
Many-to-many relationship
a. One-to-one relationship
b. Many-to-many relationship
c. Many-to-one relationship
d. There is no relationship
10. Which of the following is used to describe the logical structure of
databases? b. Entity-Relationship Diagram
a. Data Flow Diagram
b. Entity-Relationship Diagram
c. Flowchart
d. Use Case Diagram
11. In a Use Case Diagram, what is the purpose of the "extend"
relationship? a. To show a use case that extends the functionality of
another use case
a. To show a use case that extends the functionality of another use
case
b. To indicate a use case that is always executed and extended
c. To combine multiple use cases into one
d. To show the inheritance of actors
12. A special software program that converts the programmer’s
source code into the machine-language instructions is called: a.
Compiler
a. Compiler
b. Syntax
c. Programming Languages
d. SDK
13. Which phase involves the detailed planning and modeling of a
system to meet the specified requirements? b. Design
a. Analysis
b. Design
c. Implementation
d. Maintenance
14. Which of the following is NOT a type of feasibility study? d.
Strategic Feasibility
a. Technical Feasibility
b. Operational Feasibility
c. Financial Feasibility
d. Strategic Feasibility
15. What is the purpose of Software Validation? b. Checking
software to ensure it meets customer requirements
a. Modifying software to reflect changes
b. Checking software to ensure it meets customer requirements
c. Defining software and its operational constraints
d. Designing and programming software
16. The rate at which data is exchanged, which is usually measured
in bits/sec, is called: a. Channel bandwidth
a. Channel bandwidth
b. Broadband communications
c. Communications media
d. Bit per second
17. If you want an application to be developed quickly in response to
a dynamic environment, which development method will you
choose? b. Agile method
a. Waterfall method
b. Agile method
c. Object-Oriented Development Process method
d. System Development Life Cycle method
18. A relationship that represents a structural relationship between
two or more classifiers, like classes. It shows that objects of one
classifier are connected to objects of another classifier is called: a.
Associations
a. Associations
b. Aggregations
c. Dependencies
d. Generalizes
19. A series (chain) of activities that an organization performs to
transform inputs into outputs is called: a. Value chain
a. Value chain
b. Supply chain
c. Activates chain
d. Processes chain
20. Performing statistical, financial, logical, database, graphics, and
date and time calculations using a wide range of built-in functions is
called: b. Spreadsheet Analysis
a. Word Processing
b. Spreadsheet Analysis
c. Database Applications
d. Software as a Service (SaaS)
21. Choose the correct syntax for creating an object in the Employee
class: b. Employee e1 = new Employee ();
a. Employee e1 = new
b. Employee e1 = new Employee ();
c. Employee e1
d. int Employee=0;
22. Which of the following is a valid declaration of an object of class
Box? d. Box obj = new Box();
a. Box obj = new Box;
b. obj = new Box();
c. new Box obj;
d. Box obj = new Box();
23. Subclass constructor uses which keyword to invoke the
constructor of the superclass? d. Super
a. Static
b. Extends
c. Abstract
d. Super
Here are the questions and their correct answers as numbered in
the photo:
24. Identify the correct statement about the “final” keyword in Java:
a. When a class is declared final, it cannot be inherited in the
subclass.
a. When a class is declared final, it cannot be inherited in the
subclass.
b. A final variable value can be initialized more than one time.
c. A final method can be overridden.
d. Attributes and methods in final can be modified.
25. Which of the following objects gives a drop-down list of options
from which to choose? c. JComboBox
a. JPanel
b. JButton
c. JComboBox
d. JTextArea
26. When the following code runs, what value does loc have? a. 3
String s1 = "MY UNIVERSITY";
int loc = s1.indexOf("U");
a. 3
b. 2
c. -1
d. 4
27. What is the correct sequence to create a database connection?
b. 3,1,4,6,2,8,5,7
1. Load and register the JDBC driver.
2. Execute the statement object and return a query result.
3. Import JDBC packages.
4. Open a connection to the database.
5. Close the result set and statement objects.
6. Create a statement object to perform a query.
7. Close the connection.
8. Process the result set.
a. 1,2,3,5,4,7,8,6
b. 3,1,4,6,2,8,5,7
с. 2,1,3,4,8,7,5,4
d. 1,3,2,4,5,6,7,8
28. Which of the following is a valid declaration of a char? b. char ca
= 'a';
a. char ch = 'aa';
b. char ca = 'a';
c. char cr = \a;
d. char cc = '\ab';
29. How many times WELCOME will be printed when the following
code is executed? c. 100
for (int i = 0; i < 10; i++) {
for (int j = 0; j < 10; j++) {
System.out.println("WELCOME");
a. 10
b. 11
c. 100
d. 1
30. What is the output of the following Java program? d. 7698
public class Main {
public static void main(String[] args) {
int i = 9, k = 8;
i = 7;
System.out.print((--i) + " " + k);
a. 7676
b. 9898
c. 7888
d. 7698
31. Find the error in the code: c. String values must be in double
quotes
String [] Name={Sarah,Amal,Hind};
a. String
b. {}
c. String values must be in double quotes
d. The size of array
32. Which of the following scenarios would require the use of a JOIN
operation in SQL? b. Combining rows from two tables based on a
related column between them.
a. Retrieving all columns from a single table.
b. Combining rows from two tables based on a related column
between them.
c. Updating records in a single table.
d. Deleting duplicate records from a single table.
33. Which of the following code segments will produce the following
output? a. for (int j = 0; j <= 5; j++) { ... }
000000
11111
2222
333
44
a.
for (int j = 0; j <= 5; j++) {
for (int k = 5; k >= j; k--) {
System.out.print(j + " ");
System.out.println();
b.
for (int j = 0; j <= 5; j++) {
for (int k = j; k <= 5; k++) {
System.out.print(k + " ");
System.out.println();
c.
for (int j = 0; j <= 5; j++) {
for (int k = 1; k <= 5; k++) {
System.out.print(j + " ");
System.out.println();
d.
for (int j = 1; j <= 5; j++) {
for (int k = 5; k >= 1; k--) {
System.out.print(j + " ");
System.out.println();
34. Which of the following SQL statements will remove duplicate
rows from the result set? a. SELECT DISTINCT column_name
a. SELECT DISTINCT column_name
b. SELECT UNIQUE column_name
c. SELECT DIFFERENT column_name
d. SELECT FILTER column_name
35. In the following diagram, which answer is true? a. Each
employee can supervise one employee, no employees, or many
employees.
a. Each employee can supervise one employee, no employees, or
many employees.
b. Each employee can manage many departments.
c. Each employee works in more than one department.
d. Each employee was fired.
36. A table is in Third Normal Form (3NF) if it is in Second Normal
Form (2NF) and which of the following conditions is met? b. It
contains no transitive dependencies.
a. All non-key attributes are fully functionally dependent on the
primary key.
b. It contains no transitive dependencies.
c. It has a single candidate key.
d. All attributes are atomic.
37. Given the following SQL tables, which query will return the
names of students who have enrolled in the "Math" course? b.
SELECT name FROM Students JOIN Enrollments ON
Students.student_id = Enrollments.student_id WHERE course_name
= 'Math';
a. SELECT name FROM Students WHERE course_name = 'Math';
b. SELECT name FROM Students JOIN Enrollments ON
Students.student_id = Enrollments.student_id WHERE course_name
= 'Math';
c. SELECT Students.name FROM Enrollments WHERE
Enrollments.course_name = 'Math';
d. SELECT name FROM Students WHERE student_id IN (SELECT
student_id FROM Enrollments WHERE course_name = 'Math');
38. The below table is NOT in: d. Both b and c
a. The First Normal Form (1NF).
b. The Second Normal Form (2NF).
c. The Third Normal Form (3NF).
d. Both b and c.
39. A relationship that represents one element depending on
another element for its specification or implementation is called: d.
Dependency
a. Generalization
b. Aggregation
c. Association
d. Dependency
40. The SQL command to eliminate the "STUDENTS" table from the
"University" database is: b. DROP TABLE STUDENTS;
a. DELETE TABLE STUDENTS;
b. DROP TABLE STUDENTS;
c. UPDATE TABLE STUDENTS;
d. REMOVE TABLE STUDENTS;
41. A key which is used to represent relation between two tables is:
b. Foreign key
a. Candidate key
b. Foreign key
c. Primary key
d. Super key
42. What is the output of the following Java program? b. 4
public class Main {
public static void main(String[] args) {
System.out.print(m());
int x = 2;
public static int m() {
int x = 4;
return x;
a. 2
b. 4
c. 0
d. Error
43. Which Internet Protocol is used for resolving/converting domain
names to IP addresses? c. Domain Name System Protocol (DNS)
a. Hyper Text Transfer Protocol (HTTP)
b. Secure Shell Protocol (SSH)
c. Domain Name System Protocol (DNS)
d. File Transfer Protocol (FTP)
44. A machine (i.e., the browser) that runs a code locally rather than
relying on the server to execute code and return the result is: a.
Client-side scripting
a. Client-side scripting
b. Server-side scripting
c. Database administrator
d. HTML
45. What does an RDBMS consist of? c. Collection of Tables
a. Collection of Records
b. Collection of Keys
c. Collection of Tables
d. Collection of Fields
46. A key is a set of one or more attributes taken collectively to
uniquely identify a record is called: c. Super key
a. Primary Key
b. Foreign key
c. Super key
d. Candidate key
47. What is the operation that does not preserve non-matched
tuples? b. Inner join
a. Left outer join
b. Inner join
c. Natural join
d. Right outer join
48. To indicate the maximum number of entities that can be
involved in a relationship, we use: c. Maximum cardinality
a. Greater Entity Count
b. Minimum cardinality
c. Maximum cardinality
d. ERD
49. Why is the following statement erroneous? a. ID should not be
used in the SELECT clause
SELECT dept_name, ID, avg(salary)
FROM instructor
GROUP BY dept_name;
a. ID should not be used in the SELECT clause
b. Group by clause is not valid in this query
c. Avg(salary) should not be selected
d. Avg(salary) is not valid
50. Which statement correctly represents the following ERD
diagram? a. A student may take one or more courses, and a course
may be taken by zero, one, or more students.
a. A student may take one or more courses, and a course may be
taken by zero, one, or more students.
b. A student must take at least one course, and a course may be
taken by zero, one, or more students.
c. A student may take zero or more courses, and a course must be
taken by zero, one, or more students.
d. A student must take only one course, and a course must be taken
by only one student.