0% found this document useful (0 votes)
29 views

Final Model Print

The document describes a computer science exam containing 80 multiple choice questions. It provides instructions for taking the exam, including writing answers on an answer sheet and a time limit of 2 hours. It warns that cheating will result in expulsion from the exam hall.

Uploaded by

Abdi Adugna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Final Model Print

The document describes a computer science exam containing 80 multiple choice questions. It provides instructions for taking the exam, including writing answers on an answer sheet and a time limit of 2 hours. It warns that cheating will result in expulsion from the exam hall.

Uploaded by

Abdi Adugna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SALALE UNIVERSITY

COLLEGE OF NATURAL SCIENCE


COMPUTER SCIENCE DEPARTMENT
NUMBER OF ITEMS 80 TIME ALLOWED 2 HOURS
March 2022/23
GENERAL DIRECTIONS
This Catalog contains Computer Science model. The course for this
model is particularly computer science program core competencies.
Please copy the Code on your answer sheet where it reads the
examiner given in this catalog.
In this model, there are a total of 80 multiple choice items. Attempt
all the items. Follow the instructions on the answer sheet and the
model questions paper carefully. Use only blue or black pen to make
your answers.
There is only one best answer for each item. Choose the best answer
from the suggested options and write the answer on the answer
sheet. Your answer is make should be clear, covering the answer
completely.

Any form of cheating or an attempt to cheat in the model hall will


the examiner Expulsion from the model hall and give writing
warning to the students

DO NOT TURN THIS PAGE OVER UNTIL YOU ARE TOLD TO DO SO.

0
1. Which one is translator in programming language?
A. Compiler C. Interpreter
B. Assembler D. All
2. __________ is a piece of descriptive text which explains some aspect of a program.
A. Variables C. preprocessor
B. comment D. prototype
3. Which one is correct about declaring the variables?
A. int my age, my weight; C. int myage, myweight
B. int myage=25, myweight=66; D. All
4. Which of the following correctly declares an array?
A. int array[10]; C. int array;
B. array{10}; D. array array[10];
5. What is the index number of the last element of an array with 9 elements?
A. 9 C. 0
B. 8 D. Programmer-defined
6. What should be the output?
int main() { int new = -10; cout<<"new is: "<<new; return 0; }
A. new is: -10 C. Compilation error
B. new is: 10 D. new is: 0
7. _______What will be the output of the following PHP code?
<?php

$x = 4;$y = 3;$z = 1;

$z = $z + $x + $y;

echo "$z";

?>
A. 15 C. 1
B. 8 D. $z
8. _______Which of the following is the correct syntax to make the background-color of all
paragraph elements to yellow?
A. all {background-color : yellow;} C. p {background-color : yellow;}
B. p {background-color : #yellow;} D. all p {background-color : #yellow;}

1
9. _______Which is the correct syntax for the function definition?
A. return_type function function_name(parameter1, parameter2, ...) { /*Function's body*/ }
B. function function_name(parameter1, parameter2, ...) { /*Function's body*/ }
C. return_type function_name(parameter1, parameter2, ...) { /*Function's body*/ }
D. function function_name(parameter1, parameter2, ...) as return_type { /*Function's body*/
}
10. Which one is not a Server Side Scripting Languages
A. PHP C. CSS
B. Node.js D. Python
11. Which is not the commonly used programming language for AI?

A. PROLOG C. Perl
B. LISP D. Java script.
12. Which kind of planning consists successive representation of different level of a plan
A. hierarchical planning C. project planning
B. non-hierarchical planning D. None of the above
13. Natural language processing has two subfields, namely:
A. algorithmic and heuristic C. understanding and generation
B. time and motion D. symbolic and numeric
14. A robot's "arm" is also known as its:
A. End effector C. Manipulator
B. Actuator D. Servomechanism
15. What data structure is used for breadth first traversal of a graph?
A. Queue C. List
B. Stack D. None Of The Above
16. Which of the following algorithm is not stable?
A. Bubble Sort C. Merge Sort
B. Quick Sort D. Insertion Sort

17. Which of the following is non-linear data structure?


A. Trees C. Strings
B. Stacks D. All of the above

2
18. Which of the following data structures are indexed structures?
A. Stack C. Linear arrays
B. Linked lists D. None of the above
19. Every node N in a binary tree T except the root has a unique parent called the ________ of N.
A. Antecedents C. Precursor
B. Predecessor D. None of the above
20. Which of the following is a condition that causes deadlock?
A. Mutual exclusion D. No pre-emption
B. Hold and wait E. All of these
C. Circular wait
21. Where are placed the list of processes that are prepared to be executed and waiting?
A. Job queue C. Execution queue
B. Ready queue D. Process queue
22. What type of memory stores data in a swap file on a hard drive?
A. Secondary memory C. Low memory
B. Virtual memory D. RAM
23. Which of the following algorithms is used to avoid deadlock?
A. Dynamic Programming algorithm C. Banker's algorithm
B. Primality algorithms D. Deadlock algorithm
24. In the context of operating systems, which of the following statements is/are correct with respect
to paging?
A. Paging helps solve the issue of external fragmentation
B. Page size has no impact on internal fragmentation
C. Paging incurs memory overheads
D. Multi-level paging is necessary to support pages of different sizes

25. A serially connected system of all the hubs of networks.


A. Bus C. Star
B. Ring D. Mesh
26. If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
A. Application C. Presentation
B. Session D. Transport

27. The information to be communicated in a data communication system is known as


A. Medium C. Message
B. Transmission D. Protocol

3
28. An organization has a Class B Network and need to from subnet for 64 departments. what would
be the appropriate Subnet Mask?
A. 255.255.0.0 C. 255.255.128.0
B. 255.255.64.0 D. 255.255.252.0
29. The standard suit of protocols used by the Internet, Intranets, extranets and some other networks.
A. TCP/IP C. Open system
B. Protocol D. Internet work processor
30. Address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.
A. Class A C. Class C
B. Class B D. Class D
31. When assessing the table structure of an acquired set of tables with data, accessing the validity of
possible referential integrity constraints on foreign keys is the part of __________normal form.
A. First C. Third
B. Second D. Fourth
32. In an E-R Diagram Attribute are represented by _________________.
A. Circles C. Diamond Shaped Box
B. Rectangles D. Ellipse
33. Which one is relationship between the instances of a single entity type.
A. Unary relationship C. Ternary relationship
B. Binary relationship D. None of the above
34. When a parent record in one table can potentially reference several child records in another table
is ________________ relationship.
A. One to One C. One to Many
B. Many to Any D. Many to One
35. With SQL, how do you select all the records from a table named "Persons" where the value of the
column "FirstName" starts with an "a"?
A. SELECT * FROM Persons WHERE FirstName=’a’
B. SELECT * FROM Persons WHERE FirstName LIKE ‘a%’
C. SELECT * FROM Persons WHERE FirstName LIKE ‘%a’
D. SELECT * FROM Persons WHERE FirstName=’a%’
36. ______Allows record types to have more than one parent unlike hierarchical model.
A. Hierarchical Data Model C. Network Data Model
B. Relational Data Model D. Object-Oriented Model

4
37. Which one is an example of multi user system transaction system?
A. Insurance agencies C. Banks
B. Airline reservation D. All are correct
38. One of the following is correct sequence in Data Transparency.
A. Fragmentation, Replication and Allocation
B. Replication, Fragmentation and Allocation
C. Allocation, Fragmentation and Replication
D. Fragmentation, Allocation and Replication
39. ________ Operation is used to reduce the size of a relation that needs to be transmitted and hence
the communication costs.
A. Union C. Set difference
B. Join D. Intersection
40. What causes a Transaction to fail?
A. A computer failure (system crash)
B. A transaction or system error
C. Disk failure
D. Concurrency control enforcement
E. All are correct
41. _________________ensures that all the changes done on a record by a transition were
done persistently.
A. Active state C. Committed state
B. Terminated State D. Failed state
42. ___________ is the modified version of a data item does not overwrite its disk copy but
is written at a separate disk location.
A. Immediate Update C. Shadow update
B. In-place update D. Deferred Update
43. ____________________is logical unit of database processing that includes one or more
access operations.
A. Isolation C. Analysis phase
B. Transaction D. Horizontal fragmentation
44. Let assume that T1 & T2 are two transactions; 100 Birrs transact from acc A to Acc B. A=500
and B=200. There are inconsistency problems in transaction. What is the value of Isolation in T2?
A. 700 C. 200
B. 600 D. 400

5
45. The primary objective of the analysis phase is to ____________.
A. Analyze the capabilities and structure of the previous system
B. Prioritize the alternatives for a new system
C. Determine the basic structure and approach for the new system
D. Understand and document the users' needs and requirements
46. Which of these true about object oriented system design?
A. Activity that subjected to constraint
B. Specifies nature and composition of software product
C. Satisfies client needs and desires
D. All of the mentioned
47. The key graphical model of the systems requirements used with structured analysis is the ____.
A. Flowchart
B. data flow diagram (DFD)
C. class diagram
D. project evaluation and review technique (PERT) chart
48. In project Which phase is finding and describing the objects or concepts in the problem domain.
A. System Analysis C. System Design
B. Requirement Elicitation D. Implementation
49. The _____ approach is an SDLC approach that assumes the various phases of a project can be
completed entirely sequentially.
A. Waterfall C. Iterative
B. Prototype D. spiral model
50. The algorithms like merge sort, quick sort and binary search are based on
A. Greedy algorithm C. Hash table
B. Divide and Conquer algorithm D. Parsing
51. From the following which is the rule of binary search?
A. Array element must be sorted
B. Data/key is given
C. Divide recursively array into two to find mid element
D. All
E. None
52. Algorithm can be represented as
A. Flowchart C. All of above
B. Pseudo code D. None

6
53. In algorithm analysis, space complexity describes__________.
A. the total time taken by the algorithm
B. the correct output for an algorithm
C. the total memory space consumed
D. None

54. Let S and T be language over ={a,b} represented by the regular expressions (a+b*)* and (a+b)*,
respectively. Which of the following is true?
A. ScT (S is a subset of T) C. S=T
B. TcS (T is a subset of S) D. SnT=Ø
55. Which of the following pairs of regular expressions are equivalent?
A. x* and x*x C. x(xx)* and (xx)*x
B. 1(01) * and (10) *1 D. all of the above

56. The lexical analysis for a modern computer language such as Java needs the power of which one
of the following machine models in a necessary and sufficient sense?
A. Finite state automata C. Non-Deterministic pushdown automata
B. Deterministic pushdown automata D. Turing machine
57. 12 Regular expressions a+b denotes the set
A. {a} C. {a, b}
B. {Epsilon, a, b} D. none of the above
58. What java library must be imported to get user input for the Scanner class?
A. DecimalFormat() C. Java.util. Scanner;
B. Javax.swing. JOptionPane; D. Java.util. Random

59. Which of the following is the address operator?

A. @ C. &
B. # D. %
60. What is a constructor?
A. another name for an instance variable
B. the method that creates an object, or instance, of the class
C. the return type of a method
D. The instantiation of an object

7
61. What does it mean when a method is static?
A. It modifies or mutates an object.
B. It is private
C. It is overloaded
D. It applies to the entire class, not just one object or instance
62. Employee emp = ___ Employee (); Pick a suitable word from the list so that an object of the class
Employee is created.
A. Object C. Run
B. Class D. new
63. The ___ statement takes an object of an exception class as a parameter.
A. Try C. Catch
B. If D. finally
64. ___ is used to exit from a loop.
A. Continue C. Break
B. Quit D. None of the above
65. When method overloading does is determined?
A. At run time C. At coding time
B. At compile time D. At execution time
66. The SYN Flood attack targets which security element?
A. Confidentiality C. Availability
B. Integrity D. All of the above
67. Assuming that passwords are selected with uniform probability over an alphabet of 100
characters, how long should the passwords be to ensure that they have at most a 10% probability of
being cracked over a month (30 days) by an attacker capable of 1,000 password guesses a second.
A. 11 C. 6
B. 3 D. 8
68. What does the two-phase commit in databases protect?
A. Confidentiality C. Availability
B. Integrity D. All the above
69. Which of the following is an amplification attack?
A. Smurf attack C. Chop attack
B. SYN flood attack D. Teardrop attack
70. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.
A. Spam C. Malware
B. Phishing D. Virus

8
71. ___________ is a computer crime in which a criminal break into a computer system for
exploring details of information etc.
A. Hacking C. Eavesdropping
B. Spoofing D. Phishing
72. In computers, subtraction is generally carried out by
A. 9’s complement C. 1’s complement
B. 10’s complement D. 2’s complement
73. (2FAOC)16 is equivalent to
A. (195 084)10 C. Both A and B
B. (001011111010 0000 1100)2 D. None of these
74. Logic gates with a set of input and outputs is arrangement of
A. Combinational circuit C. Design circuits
B. Logic circuit D. Register
75. Logic X-OR operation of (4ACO) H & (B53F) H results
A. AACB C. FFFF
B. 0000 D. ABCD
76. Floating point representation is used to store
A. Boolean values C. real integers
B. whole numbers D. integers
77. The circuit used to store one bit of data is known as
A. Register C. Decoder
B. Encoder D. Flip Flop
78. Consider a class A, Class B and Class C network. Consider the given IP address and subnet mask
IP Address: 150.157.100.70
Subnet Mask: 255.255.224.0.
What is the address of the network in which host belong to.
A. 150.157.96.70 C. 150.157.48.0
B. 150.157.96.0 D. None

9
79. If two computers C1 and C2 are configured as follows and C1 has IP address 203.197.2.53
and subnet mask 255.255.128.0, while C2 has IP address 203.197.75.201 and subnet mask
255.255.192.0, then which of the following statements is true?
A. C2 assumes C1 is on the same network, but C1 assumes C2 is on a different
network
B. C1 assumes C2 is on the same network, but C2 assumes C1 is on a different
network
C. C1 and C2 both assume they are on different networks
D. C1 and C2 both assume they are on the same networks
80. Consider the following three processes in the FCFS.
Process ID Brust-time Arrival-time
P1 3 3
P2 6 6
P3 9 9

What is the average waiting time?

A. 2 C. 4
B. 3 D. 5

The End

10
Answer Sheet

1. 21. 41. 61.


2. 22. 42. 62.
3. 23. 43. 63.
4. 24. 44. 64.
5. 25. 45. 65.
6. 26. 46. 66.
7. 27. 47. 67.
8. 28. 48. 68.
9. 29. 49. 69.
10. 30. 50. 70.
11. 31. 51. 71.
12. 32. 52. 72.
13. 33. 53. 73.
14. 34. 54. 74.
15. 35. 55. 75.
16. 36. 56. 76.
17. 37. 57. 77.
18. 38. 58. 78.
19. 39. 59. 79.
20. 40. 60. 80.

11

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy