Posted on May 4, 2024June 5, 2024 by Beyene TadesseBSc. In Computer Science 271 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091 Quiz SALALE UNIVERSITY COLLEGE OF NATURAL SCIENCE MODEL EXIT EXAM FOR BSC. IN COPUTER SCIENCE, 2016 E.C The Model Exit Exam Has 91 Multiple Choose Questions. Please try to answer all questions! Name of StudentID NumberModality (egular, Extention or Weekend)Phone Number 1 / 91 Which phase of the compiler checks the grammar of the programming? Code Optimization Semantic Analysis Code Generation Syntax Analysis 2 / 91 Which feature of OOP is indicated by the following code? class student{ int marks; }; class topper:public student{ int age; topper(int age){ this.age=age; } }; Encapsulation and Inheritance Inheritance and polymorphism Polymorphism Inheritance 3 / 91 A computer checks the ………………………… of user names and passwords for a match before granting access. Website Network Data base Backup file 4 / 91 What is an abstract class in Java? A class that cannot be instantiated, but can be subclassed A class that can be instantiated, but cannot be subclassed A class that can be both instantiated and subclassed A class that cannot be either instantiated or subclassed 5 / 91 Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)? Forest, Domain, Tree, Branch, Computer Forest, Tree, Domain, Computer Computer, Forest, Domain, Tree Forest, Tree, Computer, Domain 6 / 91 Mr. X Sends 10000 birr to Mr. Y by CBE, But, in the database there is incorrect input, deadlock, and incorrect synchronization. Which types of database failure occurs. System failure Transaction failure Disk failure Media failure 7 / 91 With SQL, how do you select all the records from a table named “Persons” where the value of the column “FirstName” is “Peter”? SELECT * FROM Persons WHERE FirstName ‘John’ SELECT * FROM Persons WHERE FirstName=’John’ SELECT * FROM Persons WHERE FirstName LIKE ‘John’ SELECT ALL FROM Persons WHERE FirstName like ’John’ 8 / 91 _______ Database recovery is Restore all BFIMs on to disk (Remove all AFIMs). Redo Undo Roll-back B and C are correct 9 / 91 Which one of the following is true for NFA machine M to accept a string? all the symbols of input string must be scanned and all the paths must end at an accepting state. all the symbols of input string may not be scanned but it must reach at some accepting state. all the symbols of input string is scanned and the last state is non-accepting. all the symbols of input string must be scanned and one of the paths must end at an accepting state. 10 / 91 The primary objective of the design phase is to ____________. Analyze the capabilities and structure of the previous system Prioritize the alternatives for a new system Determine the basic structure and approach for the new system Understand and document the users’ needs and requirements 11 / 91 Control of users’ access to network resources through charges is the main responsibility of____________ Reactive Fault Management Reconfigured Fault Management Accounting Management Security Management 12 / 91 _________________ensures that all the changes done on a record by a transition were done persistently. Active state Committed state Terminated State Failed state 13 / 91 What is the final value of x when the code int x; for(x=0; x<10; x++) {} is run? 10 9 1 14 / 91 Which one of the following uses data structures or records to represent the same knowledge? Semantic network Frames Predicate logic Rule based systems 15 / 91 The primary objective of the analysis phase is to ____________. Analyze the capabilities and structure of the previous system Prioritize the alternatives for a new system Determine the basic structure and approach for the new system Understand and document the users’ needs and requirements 16 / 91 Software, such as viruses, worms and Trojan horses, that has a malicious intent is known as: Spyware Adware Spam Malware 17 / 91 Which of the following features cannot be captured by context free grammar? Syntax of if-then-else statements Syntax of recursive functions A variable is declared before its use Matching nested parenthesis 18 / 91 Which of the following is the correct syntax for referring the external style sheet? <style src = “example.css” > <style src = example.css> <stylesheet> example.css </stylesheet> <link rel=”stylesheet” type=”text/css” href=”example.css”> 19 / 91 Which of the following is not a function of a network administrator? Maintaining network security Managing network resources Developing software applications Troubleshooting network issues 20 / 91 Message encryption/decryption done at which layers in OSI model Physical layer Application layer Presentation layer Session layer 21 / 91 In the while statement, while(x<100) ..., when does the statement controlled by the condition execute? When x is less than one hundred When x is greater than one hundred When x is equal to one hundred While it wishes 22 / 91 Which of the following is true about the query given below? SELECT col_1, col_2 FROM tab1 ORDER BY col_1; All the rows for the column col_1 will be sorted in the Descending order. All the rows for the column col_1 will be sorted in the Ascending order. The query will give an error as there is no WHERE clause in the query. Query give an error as the ORDER BY clause should include all columns in SELECT clause. 23 / 91 Which of the following correctly declares an array? int array[10]; array{10}; int array; array array[10]; 24 / 91 Transport layer protocols deals with ____________ node to node communication man to man communication process to process communication application to application communication 25 / 91 Which of the following derivation does a top – down parser uses while parsing an input string? Left-most derivation in reverse Left-most derivation Right-most derivation in reverse Right –most derivation 26 / 91 Which types of Normal form is every non-key attribute in a table is functionally dependent on the entire primary key First normal form Third Normal form Second Normal form Boyce-Codd Normal Form 27 / 91 Which SQL statement inserts data into a table called Projects? INSERT INTO Projects (ProjectName, ProjectDescription) VALUES (‘Content Development’, ‘Website content development project’); SAVE INTO Projects (ProjectName, ProjectDescription) VALUES (‘Content Development’, ‘Website content development project’); SAVE INTO Projects VALUES (‘Content Development’, ‘Website content development project’); INSERT Projects (‘Content Development’, ‘Website content development project’); 28 / 91 Javascript is an _______ language? Object-Oriented Object-Based Procedural None 29 / 91 Which phase of the software development life cycle (SDLC) focuses on gathering and understanding user requirements? Analysis Design Implementation Testing 30 / 91 In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________ Fault Management Secured Management Active Management Security Management 31 / 91 A system has 12 magnetic tape drives and 3 processes: P0, P1, and P2. Process P0 requires 10 tape drives, P1 requires 4 and P2 requires 9 tape drives. Process: p0, p1 and p2, maximum needs (10, 4 &9) resp. currently allocated (5, 2 &2) resp. Which of the following sequence is a safe sequence? P0, P1, P2 P1, P2, P0 P2, P0, P1 P1, P0, P2 32 / 91 The size of virtual memory is based on which of the following? CPU RAM Address bus Data bus 33 / 91 ________________is a computer crime in which a criminal breaks into a computer system for exploring details of information etc. Hacking Spoofing Eavesdropping Phishing 34 / 91 The following are the common duties of the System Administrator except for: Software and Hardware Installation Cleaning the whole building Up Keep of Computer System Back Up and Recovery 35 / 91 Identify the wrong statement from the following: In S-attributed SDT attributes are evaluated during top-down parsing L-attributed SDT uses both inherited and synthesized attributes S-attributed SDT uses only synthesized attribute In L-attributed SDT attributes are evaluated by traversing parse tree depth first left to right 36 / 91 The regular expression r = b*ab* + b* represents any string w over {a,b}: starting with b and having no other a’s or having no a’s but only b’s having at least one a having at most one a’s starting with b and ending with a 37 / 91 1. A queue follows _________: LIFO principle Ordered array FIFO principle Linear tree Ordered array 38 / 91 Which component is used for Agents to interact with environments? Sensor Effector Actuators All 39 / 91 Which of the following keywords is used to define a variable in Javascript? Var Let A and B None 40 / 91 Given the following productions: E→E * F| E + F| F, F→F – F | id, Which one of the following is True? * has higher precedence than + – has higher precedence than * – and + have the same precedence 41 / 91 One of the following is correct alignment in Software Lifecycle Activities. Analysis with usecase model Requirements Elicitation with usecase model Requirements Elicitation with Application Domain All of the above mentioned 42 / 91 The height of tree is the length of the longest root to leaf path in it. The max. and min. number of node in binary tree of height 5 are: 64 & 5 respectively 32 & 6 respectively 63 & 6 respectively 31 & 5 respectively 43 / 91 Mail services are available to network users throught the __________layer. Data link Physical Transport Application 44 / 91 Let assume that T1 & t2 are two transactions; 100 Birrs transact from acc A to Acc B. A=500 and B=200. The transaction is done with appropriate consistency. What is the value of Isolation in T2? 600 200 700 400 45 / 91 The regular expression r = b*ab* + b* represents any string w over {a,b}: starting with b and having no other a’s or having no a’s but only b’s having at least one a having at most one a’s starting with b and ending with a 46 / 91 A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock ___________ Can never occur May occur Has to occur None 47 / 91 Which software development methodology involves regular and frequent communication between developers and stakeholders? Agile methodology Waterfall model V-model Spiral model 48 / 91 Let X is a problem that belongs to the class NP. Then which one of the following is TRUE? There is no polynomial time algorithm for X If X can be solved deterministically in polynomial time, then P = NP If X is NP-hard, then it is NP-complete X may be undecidable 49 / 91 User datagram protocol is called connectionless because _____________ All UDP packets are treated independently by transport layer It sends data as a stream of related packets It is received in the same order as sent order It sends data very quickly 50 / 91 In object-oriented model, which one is Class Operations to destroy an object. Constructor Destructor Object Modifier Dot Notation 51 / 91 Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and net mask 255.255.128.0. C2 has IP address 203.197.75.201 and net mask 255.255.192.0. which one of the following statements is true? C1 and C2 both assume they are on the same network C2 assumes C1 is on same network, but C1 assumes C2 is on a different network C1 assumes C2 is on same network, but C2 assumes C1 is on a different network C1 and C2 both assume they are on different networks. 52 / 91 Which of the following commands will force an update of group policy of computers on the domain configuration? GPUPDATE –airtel/all GPFORCE /airtel GPUPDATE /force –none GPUPDATE /force 53 / 91 Which of the following is an objective of network security? All of the above Confidentiality Integrity Availability 54 / 91 A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty internal store of 3 frames is?(fault page) 8 10 9 7 55 / 91 ___________ is the modified version of a data item does not overwrite its disk copy but is written at a separate disk location. Immediate Update In-place update Shadow update Deferred Update 56 / 91 Which of the following syntax is incorrect for the class definition? student class{ }; class student{ student(int a){} }; class teacher{ public: teacher(int a){ } }; None of the mentioned 57 / 91 Let X is a problem that belongs to the class NP. Then which one of the following is TRUE? There is no polynomial time algorithm for X If X can be solved deterministically in polynomial time, then P = NP. If X is NP-hard, then it is NP-complete X may be undecidable 58 / 91 The regular expression for the language of all strings of 0′s and 1′s with no two consecutive 0′s is_______ (0+1) (0+1)* (0+Î) (1+10)* (0+1)* 011 59 / 91 Salale university Computer Science Department develop a project entitled “Athematic system in case of Commercial bank of Ethiopia”. Which one is Not correct about the given alternatives. Withdrawal, check balance and deposit are some use case Manager, cashier and accountants are some actors Use case represent by rectangular box Use case represent by oval shape 60 / 91 elect the correct sequence of testing activities during software quality assurance. Functional Testing, Integrating Testing and Unit Testing Unit Testing, Functional Testing and Integrating Testing Unit Testing, Integrating Testing and Functional Testing All are correct 61 / 91 Which of the following refers to the level of data abstraction that describes exactly how the data actually stored? Conceptual Level Physical Level External Level Logical Level 62 / 91 Which one of the following is TRUE about heterogeneous distributed database? All sites have identical software Appears to user as a single system Sites may not be aware of each other and may provide only limited facilities for cooperation in transaction processing Different sites may use similar schemas 63 / 91 Which one of the following used focused graphs to represent knowledge? Semantic network Frames Predicate logic Rule based systems 64 / 91 All of the following are functions of semantic analysis except ______. Do operators match their operands? Do types of variables match the values assigned to them? Do function parameters match the function declarations? Do statements miss semi-colon? 65 / 91 In project Which phase is finding and describing the objects or concepts in the problem domain. System Analysis Requirement Elicitation System Design Implementation 66 / 91 In which access should a constructor be defined, so that object of the class can be created in any function? Any access specifier will work Private Public Protected 67 / 91 Consider the grammar with non-terminals N = {S , C , S}, terminals T = {a, b , i , t, e}, with S as the start symbol, and production rules: S -> iCtSS1 | a ,S1 -> S1eS | ε ,C -> b.The grammar is NOT LL(1) because ________ It is left recursive It is right recursive It is ambiguous It is not context-free 68 / 91 The pairs of OSI protocol layer/sub-layer and its functionality are given below, the INCORRECT pair from among these are: Data Link Layer and Bit synchronization Network Layer and Routing Medium Access Control sub-layer and Channel sharing Transport Layer and End-to-end process communication 69 / 91 Which one of the following is used as central component of a knowledge-based agent? Fact data base Knowledge-Base Ask All 70 / 91 Which of the following is a benefit of encapsulation in object-oriented programming? It allows for easy reuse of code It increases code complexity It improves program efficiency It protects data from outside interference. 71 / 91 The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’ ADD TABLE Employee ADD PRIMARY KEY (empid) ATTACH TABLE Employee ADD PRIMARY KEY (empid) ADD TABLE Employee ATTACH PRIMARY KEY (empid) ALTER TABLE Employee ADD PRIMARY KEY (empid) 72 / 91 Which one of the following is a 3-tier Database management system Architectures? Email Server Facebook Server large dynamic web applications personal computer 73 / 91 What is the correct syntax of for loop? for(initialization; condition; increment/decrement) for(increment/decrement; initialization; condition) for(initialization, condition, increment/decrement) None of These 74 / 91 Which one of the following is FALSE? User-level threads are not scheduled by the kernel When a user-level thread is blocked, all other threads of its process are blocked Context switching between user-level threads is faster than context switching between kernel-level threads Kernel-level threads cannot share the code segment 75 / 91 Consider a computer system that supports 32-bit physical as well as virtual addresses. Now since the space of the physical address is the same size as the virtual address, the OS designers would decide to entirely get rid of its virtual memory. Which one of these is true in this case? It is no longer possible to efficiently implement multi-user support It is possible to make CPU scheduling more efficient now There would no longer be a requirement for hardware support for memory management It would be possible to make the processor cache organization more efficient now 76 / 91 Assume you are requested to model the library management system of the classes, and there is the relationship that a library contains students and books. From these classes which of the following relationship is not true? The relationship between library and student is aggregation The relationship between library and books is composition. The relationship between books and student is association The relationship between library and books is aggregation 77 / 91 Which concept in OOP allows a subclass to inherit features from a superclass? Polymorphism Abstraction Encapsulation Inheritance 78 / 91 Choose the option which prevents a method from being overridden by a subclass? Final Protected Static Abstract 79 / 91 What is the best case and worst case for linear search respectively? O(nlogn), O(logn) O(logn), O(n) O(n), O(nlogn) O(1), O(n) 80 / 91 The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’ ADD TABLE Employee ADD PRIMARY KEY (empid) ATTACH TABLE Employee ADD PRIMARY KEY (empid) ADD TABLE Employee ATTACH PRIMARY KEY (empid) ALTER TABLE Employee ADD PRIMARY KEY (empid) 81 / 91 Identify the options among the following which invokes the exception class. New exception() Throws new exception() Throw new exception() New throws exception() 82 / 91 A queue is implemented using an array such that ENQUEUE and DEQUEUE operations are performed efficiently. Which one of the following statements is CORRECT (n refers to the number of items in the queue)? Both operations can be performed in O (1) time At most one operation can be performed on O (1) time but the worst-case time for the other operation will be Ω(n) The worst-case time complexity for both operations will be Ω(n) Worst case time complexity for both operations will be Ω (log n) 83 / 91 One of the following is correct sequence in Data Transparency. Fragmentation, Replication and Allocation Replication, Fragmentation and Allocation Allocation, Fragmentation and Replication Fragmentation, Allocation and Replication 84 / 91 Firewalls are used to protect against _______________. Unauthorized Attacks Virus Attacks Data Driven Attacks Fire Attacks 85 / 91 Which types of Data Update acts as all modified data items in the cache is written either after a transaction ends its execution in data recovery. Immediate Update Deferred Update Shadow update In-place update 86 / 91 Which one of the following has high social interaction? Robot Machine Artificial Intelligence All 87 / 91 Which one of the following uses quantifiers? Prepositional logic Predicate logic both of them None 88 / 91 DCE transmit on pin __ and receives on pin___ 3&6 and 1&3 1&2 and 3&6 3&6 and 1&2 None 89 / 91 Which tool is used for grouping of characters in tokens in the compiler? Parser Code optimizer Code generator Scanner 90 / 91 what will be the output of the following fragmented c++ program?int main(int argc, char const *argv[]){char s1[6] = “Hello”; char s2[6] = “World”;char s3[12] = s1 + ” ” + s2;cout< Hello World Error Hello World 91 / 91 Which of the following is used in situations in which that expertise is in short supply, expensive or unavailable when required? Knowledge Information A & B None Your score is 0%