BSc. In Computer Science

184

Quiz

SALALE UNIVERSITY

COLLEGE OF NATURAL SCIENCE

MODEL EXIT EXAM FOR BSC. IN COPUTER SCIENCE, 2016 E.C

The Model Exit Exam Has 91 Multiple Choose Questions.

                  Please try to answer all questions!

 

1 / 91

Let assume that T1 & t2 are two transactions; 100 Birrs transact from acc A to Acc B. A=500 and B=200. The transaction is done with appropriate consistency. What is the value of Isolation in T2?

2 / 91

The pairs of OSI protocol layer/sub-layer and its functionality are given below, the INCORRECT pair from among these are:

3 / 91

  The size of virtual memory is based on which of the following?

4 / 91

Consider a computer system that supports 32-bit physical as well as virtual addresses. Now since the space of the physical address is the same size as the virtual address, the OS designers would decide to entirely get rid of its virtual memory. Which one of these is true in this case?

5 / 91

Which concept in OOP allows a subclass to inherit features from a superclass?

6 / 91

Mr. X Sends 10000 birr to Mr. Y by CBE, But, in the database there is incorrect input, deadlock, and incorrect synchronization. Which types of database failure occurs.

7 / 91

A queue is implemented using an array such that ENQUEUE and DEQUEUE operations are performed efficiently. Which one of the following statements is CORRECT (n refers to the number of items in the queue)?

8 / 91

Which of the following derivation does a top – down parser uses while parsing an input string?

9 / 91

Transport layer protocols deals with ____________

10 / 91

What is the best case and worst case for linear search respectively?

11 / 91

Which types of Data Update acts as all modified data items in the cache is written either after a transaction ends its execution in data recovery.

12 / 91

Which phase of the software development life cycle (SDLC) focuses on gathering and understanding user requirements?

13 / 91

Which of the following is a benefit of encapsulation in object-oriented programming?

14 / 91

Which of the following is an objective of network security?

15 / 91

Identify the options among the following which invokes the exception class.

16 / 91

The regular expression r = b*ab* + b* represents any string w over {a,b}:

17 / 91

Consider the grammar with non-terminals N = {S , C , S}, terminals T = {a, b , i , t, e}, with S as the start symbol, and production rules: S -> iCtSS1 | a ,S1 -> S1eS | ε ,C -> b.The grammar is NOT LL(1) because ________

18 / 91

DCE transmit on pin __ and receives on pin___

19 / 91

The primary objective of the analysis phase is to ____________.

20 / 91

___________ is the modified version of a data item does not overwrite its disk copy but is written at a separate disk location.

21 / 91

Assume you are requested to model the library management system of the classes, and there is the relationship that a library contains students and books. From these classes which of the following relationship is not true?

22 / 91

Which of the following refers to the level of data abstraction that describes exactly how the data actually stored?

23 / 91

Which of the following features cannot be captured by context free grammar?

24 / 91

Which one of the following is a 3-tier Database management system Architectures?

25 / 91

In the while statement, while(x<100) ..., when does the statement controlled by the condition execute?

26 / 91

Which types of Normal form is every non-key attribute in a table is functionally dependent on the entire primary key

27 / 91

With SQL, how do you select all the records from a table named “Persons” where the value of the column “FirstName” is “Peter”?

28 / 91

Which one of the following is true for NFA machine M to accept a string?

29 / 91

Which of the following is not a function of a network administrator?

30 / 91

Which of the following syntax is incorrect for the class definition?

31 / 91

Which one of the following is used as central component of a knowledge-based agent?

32 / 91

Which component is used for Agents to interact with environments?

33 / 91

The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’

34 / 91

Which SQL statement inserts data into a table called Projects?

35 / 91

One of the following is correct alignment in Software Lifecycle Activities.

36 / 91

Which one of the following is FALSE?

37 / 91

Salale university Computer Science Department develop a project entitled “Athematic system in case of Commercial bank of Ethiopia”. Which one is Not correct about the given alternatives.

38 / 91

The height of tree is the length of the longest root to leaf path in it. The max. and min. number of node in binary tree of height 5 are:

39 / 91

  _________________ensures that all the changes done on a record by a transition were done persistently.

40 / 91

All of the following are functions of semantic analysis except ______.

41 / 91

  _______ Database recovery is Restore all BFIMs on to disk (Remove all AFIMs).

42 / 91

In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________

43 / 91

Which one of the following has high social interaction?

44 / 91

Which of the following correctly declares an array?

45 / 91

Choose the option which prevents a method from being overridden by a subclass?

46 / 91

In object-oriented model, which one is Class Operations to destroy an object.

47 / 91

A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty internal store of 3 frames is?(fault page)

48 / 91

Which of the following keywords is used to define a variable in Javascript?

49 / 91

elect the correct sequence of testing activities during software quality assurance.

50 / 91

Which of the following is used in situations in which that expertise is in short supply, expensive or unavailable when required?

51 / 91

Control of users’ access to network resources through charges is the main responsibility of____________

52 / 91

Which software development methodology involves regular and frequent communication between developers and stakeholders?

53 / 91

One of the following is correct sequence in Data Transparency.

54 / 91

Let X is a problem that belongs to the class NP. Then which one of the following is TRUE?

55 / 91

Firewalls are used to protect against _______________.

56 / 91

Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and net mask 255.255.128.0. C2 has IP address 203.197.75.201 and net mask 255.255.192.0. which one of the following statements is true?

57 / 91

Which feature of OOP is indicated by the following code? class student{ int marks; }; class topper:public student{ int age; topper(int age){ this.age=age; } };

58 / 91

Identify the wrong statement from the following:

59 / 91

The regular expression for the language of all strings of 0′s and 1′s with no two consecutive 0′s is_______

60 / 91

Message encryption/decryption done at which layers in OSI model

61 / 91

Given the following productions: E→E * F| E + F| F, F→F – F | id, Which one of the following is True?

62 / 91

what will be the output of the following fragmented c++ program?int main(int argc, char const *argv[]){char s1[6] = “Hello”; char s2[6] = “World”;char s3[12] = s1 + ” ” + s2;cout<

63 / 91

Which one of the following used focused graphs to represent knowledge?

64 / 91

Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

65 / 91

Which one of the following is TRUE about heterogeneous distributed database?

66 / 91

What is the final value of x when the code int x; for(x=0; x<10; x++) {} is run?

67 / 91

Which of the following is the correct syntax for referring the external style sheet?

68 / 91

Which of the following commands will force an update of group policy of computers on the domain configuration?

69 / 91

In which access should a constructor be defined, so that object of the class can be created in any function?

70 / 91

Javascript is an _______ language?

71 / 91

Which phase of the compiler checks the grammar of the programming?

72 / 91

The primary objective of the design phase is to ____________.

73 / 91

1.   A queue follows _________:

74 / 91

The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’

75 / 91

A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock ___________

76 / 91

Which of the following is true about the query given below? SELECT col_1, col_2 FROM tab1 ORDER BY col_1;

77 / 91

User datagram protocol is called connectionless because _____________

78 / 91

Let X is a problem that belongs to the class NP. Then which one of the following is TRUE?

79 / 91

Which one of the following uses quantifiers?

80 / 91

________________is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.

81 / 91

Which one of the following uses data structures or records to represent the same knowledge?

82 / 91

In project Which phase is finding and describing the objects or concepts in the problem domain.

83 / 91

A computer checks the ………………………… of user names and passwords for a match before granting access.

84 / 91

What is the correct syntax of for loop?

85 / 91

Software, such as viruses, worms and Trojan horses, that has a malicious intent is known as:

86 / 91

Which tool is used for grouping of characters in tokens in the compiler?

87 / 91

A system has 12 magnetic tape drives and 3 processes: P0, P1, and P2. Process P0 requires 10 tape drives, P1 requires 4 and P2 requires 9 tape drives. Process: p0, p1 and p2, maximum needs (10, 4 &9) resp. currently allocated (5, 2 &2) resp. Which of the following sequence is a safe sequence?

88 / 91

The following are the common duties of the System Administrator except for:

89 / 91

The regular expression r = b*ab* + b* represents any string w over {a,b}:

90 / 91

What is an abstract class in Java?

91 / 91

Mail services are available to network users throught the __________layer.

Your score is

0%

Leave a Reply

Your email address will not be published. Required fields are marked *

Developed By KInfemichael Nigussie