CS - Mock Exit Exam - 2nd Round - Format
CS - Mock Exit Exam - 2nd Round - Format
CS - Mock Exit Exam - 2nd Round - Format
May, 2024
1. __________ implements the same function name, but different parameters.
A. Abstraction
B. Overriding
C. Overloading
D. Encapsulation
Answer: C
3. Which one of the following is false about abstract classes and abstract methods?
A. We can create instances of abstract classes using the new operator
B. Implementation of abstract methods is provided by the subclasses
C. A class that contains abstract methods must be defined as abstract
D. Abstract methods are defined without implementation in the superclass
Answer: A
8. A child class Motorcycle extends a parent class Vehicle. Each class constructor requires
one String argument. The Motorcycle class constructor can call the Vehicle class constructor
with the statement ___________.
A. Vehicle (“Honda”)
B. Motorcycle(“Harley”)
C. Super(“Suzuki”)
D. None
Answer: C
9. _________contains set of statements where an exception can occur?
A. try block
B. catch block
C. throw block
D. throws block
Answer: A
10. Given that the java program:
class C1{
private int x;
void m1( ) {}
protected void m2( ){}
public void m3( ){}
}
public class C2 extends C1{}
Which members of C1 would be accessible in C2 if C1 was a public class?
A. x,m1(),m2() & m3()
B. x& m2()
C. m1(),m2() & m3()
D. m2() & m3()
Answer: C
11. Which of the following is not type of polymorphism in Java?
A. Compile time polymorphism
B. Execution time polymorphism
C. Dynamic polymorphism
D. Multilevel polymorphism
Answer: D
12. What is the purpose and objective of the Three-Level database architecture?
A. User's view is affected by changes made in other views.
B. Internal structure of database should be unaffected by changes to physical aspects of
storage.
C. Users need to know physical database storage details.
D. DBA should not be able to change conceptual structure of database without affecting all
users.
Answer: B
13. One of the following is not an example of Record-based data model.
A. Entity-relationship (ER) data model
B. Relational data model
C. Network data model
D. Hierarchical data model
Answer: A
14. Which one of the following is not the primary purpose of Database management system (DBMS) ?
A. To store and retrieve large amounts of data efficiently.
B. To manage the database and its users.
C. To maintain and control access to the database.
D. To design graphic interfaces.
Answer: D
15. Which of the following is not a database constraint?
A. NOT NULL
B. UNIQUE
C. PRIMARY KEY
D. SORT
Answer: D
16. Which of the following is a valid SQL statement to add a column to an existing table?
A. UPDATE TABLE table_name
ADD column_name datatype;
B. ADD to TABLE table_name
ADD column_name datatype
C. ALTER TABLE table_name
ADD column_name datatype
D. CHANGE TABLE table_name
ADD column_name datatype
Answer: C
19. What is the inconsistency occurred in the Database Management System (DBMS) during the
operations performed on the relational table.
A. Normalization
B. Anomaly
C. Denormalization
D. Indexing
Answer: B
20. Consider the following table named ‘student’ and answer the question following it.
Name Sex Dept. Date-of-birth
Abebe M Comp 12-01-2010
Kebede M Civil 19-05-1990
Chala M Elec 05-06-1980
Which of the following SQL query will be used to change the data type of column
‘Date-of-birth’ from dd-mm-yyyy to only yyyy?
A. ALTER TABLE student
ALTER COLUMN Date-of-birth year
B. CHANGE TABLE student
UPDATE COLUMN Date-of-birth year
C. UPDATE TABLE student
ALTER COLUMN Date-of-birth year
D. ALTER TABLE student
CHANGE COLUMN Date-of-birth year
Answer: A
30. Considering two transactions (1 & 2) over read(R) and write (W) operations over two data
items X and y , identify the non-conflicting pair of operations.
A. R1(X) and W2(X)
B. W1(Y) and W2(Y)
C. R2(X) and W2(X)
D. W2(X) and R1(X)
Answer: C
31. Identify the false statement about database recovery under WAL protocol
A. Undo all transactions active at time of crash
B. Redo all transactions that committed since the last checkpoint
C. Redo all transactions active at time of crash
D. No undo required for transactions committed before the checkpoint
Answer: C
32. If the shadowing approach is used for flushing a data item back to disk, then:
A. The item is written to disk before the transaction commits.
B. The item is written to a different location on disk.
C. The item is written to disk only after the transaction commits.
D. The item is written to the same disk location from which it was read.
Answer: B
33. The write ahead logging (WAL) protocol basically states that:
A. The log never needs to be written to disk.
B. The writing of a data item should be done ahead of any logging operation.
C. All log records should be written before a new transaction begins execution.
D. The log record for an operation should be written before the actual data is written.
Answer: D
57. Which protocol is responsible for dividing messages into packets at the source and
reassembling them at the destination?
A. TCP (Transmission Control Protocol)
B. UDP (User Datagram Protocol)
C. IP (Internet Protocol)
D. HTTP (Hypertext Transfer Protocol)
Answer: A
58. What component of data communication ensures that each packet is sent to its proper
destination?
A. Sender
B. Receiver
C. Transmission Medium
D. IP (Internet Protocol)
Answer: D
61. The transmission data rate is decided by which layer of the OSI model?
A. Transport Layer
B. Network Layer
C. Data Link Layer
D. Physical Layer
Answer: D
62. An Ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called:
A. Short frame
B. Small frame
C. Mini frame
D. Runt frame
Answer: D
63. Which of the following protocols is an application layer protocol that establishes, manages,
and terminates multimedia sessions?
A. Session Maintenance Protocol
B. Real-time Streaming Protocol (RTSP)
C. Real-time Transport Control Protocol (RTCP)
D. Session Initiation Protocol (SIP)
Answer: D
64. Which one of the following is defined as a station in the cellular radio service intended for
use while in motion at unspecified locations?
A. Base station
B. Mobile Station
C. Mobile Switching Center
D. Control Channel
Answer: B
Answer: C
66. Which one of the following refers to an ability to communicate with person/system who moving?
A. Mobile Communication
B. Mobile
C. Communication
D. Channel
Answer: A
70. The primary purpose of ________________ is to allow shared file and printer access
among multiple computers in a network.
A. Real Time Operating System
B. Network Operating System
C. Distributer Operating System
D. Time-Sharing Operating System
Answer: B
71. One of the following provides a single point of administration of resources (devices, users,
domains etc).
A. Active Directory
B. Client Server
C. TCP/IP
D. DHCP
Answer: A
72. One of the following is not considered as the responsibilities of a system administrator.
A. Install and configure software, hardware and networks.
B. Ensure security of IT infrastructures
C. Router Configuration
D. Monitor system performance and troubleshoot issues
Answer: C
73. ______________ is an active directory role that is used to monitor users, computers and
policies.
A. AD Certificate services
B. AD Federation Services
C. AD Right Management Services
D. AD Domain Services
Answer: D
82. Which element in agent are used for selecting external actions?
A. Perceive
B. Performance
C. Learning
D. Actuator
Answer: B
83. What of the following is considered to be a pivotal event in the history of AI?
A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy
D. 1961, Computer and Computer Sense.
Answer: C
84. Who is considered to be the "father" of artificial intelligence?
A. Fisher Ada
B. John McCarthy
C. Allen Newell
D. Alan Turning
Answer: B
92. Which of the following programming languages is commonly used for server-side scripting
in web development?
A. HTML
B. CSS
C. JavaScript
D. PHP
Answer: D