Exit Exam Model2
Exit Exam Model2
Exit Exam Model2
2. Which one of the following techniques is not used in the Binary tree?
a. Randomized traversal
b. Preorder traversal
c. Postorder traversal
d. Inorder traversal
7. Where are the list of processes that are prepared to be executed and waiting
placed?
a. Job queue
b. Ready queue
c. Execution queue
d. Process queue
8. Which one of the following statements is not true about the application of
micro-operations?
a. Selective set operation is implemented using OR micro-operation
b. Selective clear operation clears to zero the bit in the first operand only
where there are corresponding 1's in the logical operand
c. Clear operation is implemented using Exclusive-OR Micro-operation.
d. None of the above
10. The process of recovering the original message without the detailed
knowledge of the secret information is called:
a. Decryption
b. Decipher
c. Cryptanalysis
d. A and B
12. All of the following are disadvantages of using DHCP services EXCEPT?
a. Fault on the DHCP server can affect the whole network
b. It is not a secured way of assigning IP addresses
c. Static IP address assignment can't be used.
d. It minimizes the load of network admin
15. On the basis of the general search methods, which simple strategy results in
greedy best search?
a. Append newly generated nodes at the beginning of the open list
b. Append newly generated nodes at the end of the open list
c. Insert newly generated nodes in the open list according to their path cost
(lowest values first)
d. Insert newly generated nodes in the open list according to their evaluation
function (lowest values first)
Correct answer: d. Insert newly generated nodes in the open list according to
their evaluation function (lowest values first)
16. What is the main goal of data compression while it paths in different
network layers? Its goal is to:
a. Securing data
b. Minimize the size of data
c. Select the best path of destination devices
d. All of the above
18. Which of the following can be a heuristic for grouping objects into
subsystems?
a. Assign objects identified in one use case into the same subsystem.
b. Create a dedicated subsystem for objects used for moving data among
subsystems.
c. Minimize the number of associations crossing subsystem boundaries.
d. All of the above
21. Which of the following PHP code snippets is used to retrieve data from a
MySQL database?
a. $result = mysql_query("SELECT * FROM users WHERE id = 1");
b. $result=mysqliquery(conn, "SELECT * FROM users WHERE id = 1");
c. $result = $pdo->query("SELECT * FROM users WHERE id = 1");
d. $result = pg_query("SELECT * FROM users WHERE id = 1");
25. Which one of the following is not the application of the stack data structure?
a. String reversal
b. Recursion
c. Backtracking
d. Asynchronous data transfer
27. Suppose you are asked to construct a DFA for the strings ending with an 'n'
length substring. How many minimal states may the DFA require?
a. n
b. n+1
c. n+2
d. n*2
28. Which type of firewall can filter incoming signals based on port numbers
and protocol?
a. Packet Filtering
b. Proxy Service
c. Stateful Inspection
d. Threat-Focused NGFW
31. To test the IP stack on your local host, which IP address would you ping?
a. 127.0.0.1
b. 1.0.0.127
c. 127.0.0.0
d. 127.0.0.255
33. Which one of the following is not the purpose of the super keyword?
a. Refer to the current object
b. Call superclass constructor
c. Access hidden variables
d. Invoke superclass method with the same name as the subclass method
34. What will be the encrypted message if the message "ATTACK" is encrypted
by Caesar's cipher with key = 25?
a. ZSSZBJ
b. ZGGZXP
c. ZTTZAK
d. BGGBDL
37. Most of the time, it is recommended to apply a Hardware RAID into your
system in terms of system performance. Why? Because Hardware RAID:
a. A physical storage device that is built into a system
b. Can appear as a single hard disk in the system
c. There is no difference between regular hardware and the RAID devices
d. Can use its own resources
Correct answer: Describes the represents global view of the entire database
39. Which of the following protocols in MTA enables users to access mail
data/information from the MDA?
a. POP3
b. IMAP
c. SMTP
d. Both POP3 and IMAP
40. Which one of the following has the same name as the class name?
a. Method
b. Variable
c. Constructor
d. Package name
43. How many tokens are there in the following C++ statement? for (int i = 0; i
<= 10; i++)
a. 4
b. 5
c. 9
d. 10
Correct answer: c. 9
45. Which of the following is used to define the structure of a webpage in HTML?
a. Tags
b. Classes
c. IDs
d. Styles
47. Suppose you want to design a database for a certain company after you
know the need of all users of the database. What is the next step you are
expected to do?
a. Logical design
b. Normalization
c. Query Processing
d. Conceptual design
49. Identify the data structure which has minimum access time in the case of
symbol table implementation?
a. Self-organizing list
b. Hash table
c. Search tree
d. Linear
50. The data link layer divides the stream of bits received from the physical
layer into manageable data units called ________________?
a. Bits
b. Frames
c. Packets
d. Segments
statement2;
}
Which of the statements below is true regarding this structure?
a. Syntactically, it is invalid to have more if clauses than else clauses.
b. Statement2 will only execute if condition1 is false and condition2 is false.
c. Statement2 will only execute if condition1 is true and condition2 is false.
d. Statement2 will only execute if condition1 is false, it does not matter what
condition2 is.
Correct answer: c. If there is more than one way to solve the problem.
54. Which one is used to achieve the encapsulation concept in Java?
a. Declare the variables of a class as private.
b. Provide public setter and getter methods to modify and view the variable's
values.
c. By using an Interface.
d. A & B
55. Which one of the following is the collection of statements that performs a
specific operation?
a. Class
b. Package
c. Variable
d. Method
56. Which of the following is used to create dynamic content and perform
server-side processing in PHP?
a. Functions
b. Variables
c. Classes
d. Objects
57. Which of the following is a commonly used JavaScript library for creating
interactive web interfaces?
a. jQuery
b. React
c. Angular
d. Vue.js
60. Which of the following CSS code snippets is used to create a responsive
design for mobile devices?
a. @media screen and (min-width: 768px) { ... }
b. .container { display: flex; }
c. box { transform: rotate(45deg); }
d. .menu { background-color: #f00; }
The correct answer is: Both improve the performance of the database by
efficiently executing a query.
62. In the linked list implementation of a queue, where will the new element be
inserted?
a. At the middle position of the linked list.
b. At the head position of the linked list.
c. At the tail position of the linked list.
d. None of the above.
The correct answer is: At the tail position of the linked list.
63. Among the following states, which would be denoted as the final
state/acceptance state?
L = {xϵ∑ = {a, b} | length of x is at least 2}
a. Q0
b. Q1
c. Q2
d. Q3
65. Which of the following is used to store user data on the server-side in web
applications?
a. Cookies
b. Sessions
c. Local storage
d. IndexedDB
The correct answer is: Find a Non-serial schedule that allows the interleaving
of a transaction and produces the same result as a serial schedule.
The correct answer is: Count the maximum memory required by the algorithm.
The correct answer is: The position of the letters is changed in the encryption
process.
69. Which of the following registers is used to hold the address of the
instruction?
a. Accumulator
b. Instruction register
c. Address register
d. Program counter
71. Which of the following logic gates has an output value that is identical to its
input?
a. NAND
b. NOR
c. Exclusive-OR
d. Buffer
72. For an effective operating system, when should we check for deadlock?
a. Every time a resource request is made at fixed time intervals.
b. At fixed time intervals.
c. Every time a resource request is made.
d. None of the mentioned.
The correct answer is: Every time a resource request is made at fixed time
intervals.
73. In general, which type of environment is the most challenging for agents?
a. Fully observable, discrete, episodic, static.
b. Static, episodic, continuous, partially observable.
c. Partially observable, non-deterministic, non-episodic, dynamic, continuous.
d. Deterministic, sequential (non-episodic), dynamic, continuous.
76. Consider the following sample code. What would the following function
yield when called?
```java
public void test(boolean a, boolean b) {
if (a) {
System.out.println("A");
} else if (a && b) {
System.out.println("A && B");
} else {
if (!b) {
System.out.println("!B");
} else {
System.out.println("None");
}
}
}
```
a. If `a` and `b` are both true, then the output is "A && B".
b. If `a` is true and `b` is false, then the output is "!B".
c. If `a` is false and `b` is true, then the output is "None".
d. If `a` and `b` are both false, then the output is "None".
The correct answer is: If `a` is false and `b` is true, then the output is "None".
```c
int min() { /* line 1 */
int I, N; /* line 2 */
fro ((I = 0, I; /* line 3 */
}
```
While creating the object module, what would be the compiler's response about
line number 3?
a. Only syntax error.
b. No compilation error.
c. Only lexical error.
d. Both lexical and syntax error.
79. What is the maximum number of IP addresses that can be assigned to hosts
on a local subnet that uses the 255.255.255.224
subnet mask?
a. 14
b. 32
c. 24
d. 30
a. 7, 6, 3
b. 6, 6, 2
c. 6, 2, 6
d. 2, 6, 6
84. What is the maximum number of children that a node can have in a binary
tree?
a. 3
b. 1
c. 4
d. 2
The correct answer is: 2
88. All are properties of the integrity goal of a computer system, except
a. Ensures there was an authorized modification
b. Keep resources from active attacks
c. Integrity can be compromised by Deception
d. Integrity can be compromised by Disclosure
The correct answer is: Integrity can be compromised by Disclosure
89. Suppose we want to determine the efficiency of the algorithm, then how can
we measure the space factor?
a. To count the maximum memory required by the algorithm
b. To count the minimum memory required by the algorithm
c. To count the average memory required by the algorithm
d. To count the maximum disk space needed by the algorithm
The correct answer is: To count the maximum memory required by the
algorithm
90. When does a page fault occur?
a. The page is present in memory.
b. Deadlock occurs.
c. The page does not present in memory.
d. Buffering occurs.
The correct answer is: The page does not present in memory.
92. All of the following are the roles of a system admin related to the file system
and disk space management EXCEPT?
a. Assigning user ID and User name for system users
b. Determining desk usage and quota
c. Creating a Mounting point
B.
S → aSb | SS
S→ε
C.
E→E+T/T
T→TxF/F
F → id
D.
S→A/B
A → aAb / ab
B → abB / ∈
102. Choose