BSc. In Computer Science

271

Quiz

SALALE UNIVERSITY

COLLEGE OF NATURAL SCIENCE

MODEL EXIT EXAM FOR BSC. IN COPUTER SCIENCE, 2016 E.C

The Model Exit Exam Has 91 Multiple Choose Questions.

                  Please try to answer all questions!

 

1 / 91

Which phase of the compiler checks the grammar of the programming?

2 / 91

Which feature of OOP is indicated by the following code? class student{ int marks; }; class topper:public student{ int age; topper(int age){ this.age=age; } };

3 / 91

A computer checks the ………………………… of user names and passwords for a match before granting access.

4 / 91

What is an abstract class in Java?

5 / 91

Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

6 / 91

Mr. X Sends 10000 birr to Mr. Y by CBE, But, in the database there is incorrect input, deadlock, and incorrect synchronization. Which types of database failure occurs.

7 / 91

With SQL, how do you select all the records from a table named “Persons” where the value of the column “FirstName” is “Peter”?

8 / 91

  _______ Database recovery is Restore all BFIMs on to disk (Remove all AFIMs).

9 / 91

Which one of the following is true for NFA machine M to accept a string?

10 / 91

The primary objective of the design phase is to ____________.

11 / 91

Control of users’ access to network resources through charges is the main responsibility of____________

12 / 91

  _________________ensures that all the changes done on a record by a transition were done persistently.

13 / 91

What is the final value of x when the code int x; for(x=0; x<10; x++) {} is run?

14 / 91

Which one of the following uses data structures or records to represent the same knowledge?

15 / 91

The primary objective of the analysis phase is to ____________.

16 / 91

Software, such as viruses, worms and Trojan horses, that has a malicious intent is known as:

17 / 91

Which of the following features cannot be captured by context free grammar?

18 / 91

Which of the following is the correct syntax for referring the external style sheet?

19 / 91

Which of the following is not a function of a network administrator?

20 / 91

Message encryption/decryption done at which layers in OSI model

21 / 91

In the while statement, while(x<100) ..., when does the statement controlled by the condition execute?

22 / 91

Which of the following is true about the query given below? SELECT col_1, col_2 FROM tab1 ORDER BY col_1;

23 / 91

Which of the following correctly declares an array?

24 / 91

Transport layer protocols deals with ____________

25 / 91

Which of the following derivation does a top – down parser uses while parsing an input string?

26 / 91

Which types of Normal form is every non-key attribute in a table is functionally dependent on the entire primary key

27 / 91

Which SQL statement inserts data into a table called Projects?

28 / 91

Javascript is an _______ language?

29 / 91

Which phase of the software development life cycle (SDLC) focuses on gathering and understanding user requirements?

30 / 91

In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________

31 / 91

A system has 12 magnetic tape drives and 3 processes: P0, P1, and P2. Process P0 requires 10 tape drives, P1 requires 4 and P2 requires 9 tape drives. Process: p0, p1 and p2, maximum needs (10, 4 &9) resp. currently allocated (5, 2 &2) resp. Which of the following sequence is a safe sequence?

32 / 91

  The size of virtual memory is based on which of the following?

33 / 91

________________is a computer crime in which a criminal breaks into a computer system for exploring details of information etc.

34 / 91

The following are the common duties of the System Administrator except for:

35 / 91

Identify the wrong statement from the following:

36 / 91

The regular expression r = b*ab* + b* represents any string w over {a,b}:

37 / 91

1.   A queue follows _________:

38 / 91

Which component is used for Agents to interact with environments?

39 / 91

Which of the following keywords is used to define a variable in Javascript?

40 / 91

Given the following productions: E→E * F| E + F| F, F→F – F | id, Which one of the following is True?

41 / 91

One of the following is correct alignment in Software Lifecycle Activities.

42 / 91

The height of tree is the length of the longest root to leaf path in it. The max. and min. number of node in binary tree of height 5 are:

43 / 91

Mail services are available to network users throught the __________layer.

44 / 91

Let assume that T1 & t2 are two transactions; 100 Birrs transact from acc A to Acc B. A=500 and B=200. The transaction is done with appropriate consistency. What is the value of Isolation in T2?

45 / 91

The regular expression r = b*ab* + b* represents any string w over {a,b}:

46 / 91

A system has 3 processes sharing 4 resources. If each process needs a maximum of 2 units then, deadlock ___________

47 / 91

Which software development methodology involves regular and frequent communication between developers and stakeholders?

48 / 91

Let X is a problem that belongs to the class NP. Then which one of the following is TRUE?

49 / 91

User datagram protocol is called connectionless because _____________

50 / 91

In object-oriented model, which one is Class Operations to destroy an object.

51 / 91

Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and net mask 255.255.128.0. C2 has IP address 203.197.75.201 and net mask 255.255.192.0. which one of the following statements is true?

52 / 91

Which of the following commands will force an update of group policy of computers on the domain configuration?

53 / 91

Which of the following is an objective of network security?

54 / 91

A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty internal store of 3 frames is?(fault page)

55 / 91

___________ is the modified version of a data item does not overwrite its disk copy but is written at a separate disk location.

56 / 91

Which of the following syntax is incorrect for the class definition?

57 / 91

Let X is a problem that belongs to the class NP. Then which one of the following is TRUE?

58 / 91

The regular expression for the language of all strings of 0′s and 1′s with no two consecutive 0′s is_______

59 / 91

Salale university Computer Science Department develop a project entitled “Athematic system in case of Commercial bank of Ethiopia”. Which one is Not correct about the given alternatives.

60 / 91

elect the correct sequence of testing activities during software quality assurance.

61 / 91

Which of the following refers to the level of data abstraction that describes exactly how the data actually stored?

62 / 91

Which one of the following is TRUE about heterogeneous distributed database?

63 / 91

Which one of the following used focused graphs to represent knowledge?

64 / 91

All of the following are functions of semantic analysis except ______.

65 / 91

In project Which phase is finding and describing the objects or concepts in the problem domain.

66 / 91

In which access should a constructor be defined, so that object of the class can be created in any function?

67 / 91

Consider the grammar with non-terminals N = {S , C , S}, terminals T = {a, b , i , t, e}, with S as the start symbol, and production rules: S -> iCtSS1 | a ,S1 -> S1eS | ε ,C -> b.The grammar is NOT LL(1) because ________

68 / 91

The pairs of OSI protocol layer/sub-layer and its functionality are given below, the INCORRECT pair from among these are:

69 / 91

Which one of the following is used as central component of a knowledge-based agent?

70 / 91

Which of the following is a benefit of encapsulation in object-oriented programming?

71 / 91

The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’

72 / 91

Which one of the following is a 3-tier Database management system Architectures?

73 / 91

What is the correct syntax of for loop?

74 / 91

Which one of the following is FALSE?

75 / 91

Consider a computer system that supports 32-bit physical as well as virtual addresses. Now since the space of the physical address is the same size as the virtual address, the OS designers would decide to entirely get rid of its virtual memory. Which one of these is true in this case?

76 / 91

Assume you are requested to model the library management system of the classes, and there is the relationship that a library contains students and books. From these classes which of the following relationship is not true?

77 / 91

Which concept in OOP allows a subclass to inherit features from a superclass?

78 / 91

Choose the option which prevents a method from being overridden by a subclass?

79 / 91

What is the best case and worst case for linear search respectively?

80 / 91

The SQL command that you use to define the primary key for an existing table called ‘Employee’ with the primary column to be ’empid’

81 / 91

Identify the options among the following which invokes the exception class.

82 / 91

A queue is implemented using an array such that ENQUEUE and DEQUEUE operations are performed efficiently. Which one of the following statements is CORRECT (n refers to the number of items in the queue)?

83 / 91

One of the following is correct sequence in Data Transparency.

84 / 91

Firewalls are used to protect against _______________.

85 / 91

Which types of Data Update acts as all modified data items in the cache is written either after a transaction ends its execution in data recovery.

86 / 91

Which one of the following has high social interaction?

87 / 91

Which one of the following uses quantifiers?

88 / 91

DCE transmit on pin __ and receives on pin___

89 / 91

Which tool is used for grouping of characters in tokens in the compiler?

90 / 91

what will be the output of the following fragmented c++ program?int main(int argc, char const *argv[]){char s1[6] = “Hello”; char s2[6] = “World”;char s3[12] = s1 + ” ” + s2;cout<

91 / 91

Which of the following is used in situations in which that expertise is in short supply, expensive or unavailable when required?

Your score is

0%

Leave a Reply

Your email address will not be published. Required fields are marked *

Developed By KInfemichael Nigussie