model@exite exam (1) (1)
model@exite exam (1) (1)
model@exite exam (1) (1)
10. Does the following code throw an exception? If so, what exception type does it throw?
PM
1. Of the following, which is a factor that measures the quality of the project management
process?
A. Project plan C. Project team
B. Results D. Budget management
2. One of the following components is not part of the scope baseline in project management?
A. Project charter C. Project WBS
B. Project scope statement D. WBS dictionary
3. Suppose that the following estimates for a critical path activity of a project are given: 60 days
most likely, 72 days pessimistic, and 48 days optimistic. What is the weighted average or
expected value?
A. 54 B. 66 C. 60 D. 30
4. If you know the expected value of an activity is 500 and the standard deviation is 12, you can
say with approximately a 95 percent confidence rating which of the following?
A. The activity will take from 488 to 512 days.
B. The activity will take from 464 to 536 days.
C. The activity will take from 494 to 506 days.
D. The activity will take from 476 to 524 days.
5. All of the following are activities of the configuration management system except for which
one?
A. Configuration identification
B. Configuration status accounting
C. Configuration variance analysis
D. Configuration verification and auditing
6. You are the project manager of a web server and web site upgrade. You have assigned Mr. X
the task of creating the web pages and Mr. Y the task of developing the web pages. Mr. X
and Mr. Y can begin work on their assigned tasks at the same time. What type of relationship
do these tasks have?
A. Start-to-start (SS) C. Finish-to-finish (FF)
B. Finish-to-start (FS) D. Start-to-finish (SF)
7. You are the project manager for a health service provider. Your team members exhibit
affection and familiarity with one another and make project decisions jointly. Which of the
following statements is true about your team members?
A. They are in the forming stage of team development or maturity.
1. Assume you have a database named OrderHistory that should not allow any data to be modified.
How can you ensure, with the least amount of effort, that users can only read data from the
database in SQL Server?
A) Set the database to OFFLINE state. C) Set the database to RESTRICTED_USER
mode.
B) Set the database to READ_ONLY mode. D) Set the database to ONLINE state.
2. One of the following statements is not true?
A) The read committed isolation level allows only committed data to be read.
B) Read uncommitted transaction isolation level doesn’t hold locks when updating data.
C) A transaction must have exclusive lock to modify a data item.
D) Durability of a transaction ensures changes are still present following a crash or system failure.
3. You have installed a default instance and one named SQL Server instance called SQL1 on a server
(computer) named PC1. How would you connect to each instance using SQL Server Management
Studio respectively in SQL Server?
A) Default, SQL1 B) PC1, SQL1 C) PC1, PC1\SQL1 D)
Default, PC1\SQL1
4. Which of the following can be added as a member to a server-level role in SQL Server?
A) SQL Server logins, Windows group, Windows logins
B) SQL Server logins, Windows group, Windows logins, database users
C) SQL Server logins, database users, dbo schema
D) Database users, Windows logins, dbo schema
5. Which one of the following statements is not true?
A) A trigger is a special kind of stored procedure that may be fired in response to DML or DDL
commands.
B) Transaction log backup is more space efficient than full and differential backups in SQL Server.
C) A database user who is a member of both db_datareader and db_denydatareader roles can
select data from any tables within that database.
D) In a serial schedule, only one transaction is active at a time.
6. Aster needs to be able to run bulk insert operations successfully in SQL Server instance. How would
you accomplish this business requirement?
A) Grant insert permission to Aster. C) Add Aster to the bulkadmin role and
db_datawriter role.
B) Add Aster to the bulkadmin role. D) Grant select permission to Aster.
7. You want to prevent changes to structure of any tables within any of the databases in your SQL
Server instance since changes to any of the tables can cause the associated client application to stop
functioning. What can be implemented, with the least amount of effort, to accomplish this goal?
A) Stored procedure C) Server scoped DDL trigger
B) Database scoped DDL trigger D) Database scoped DML trigger
8. WW Importers have just implemented a new order inquiry system. All users with access to the
database need to be able to retrieve data from any table within the database. How can you
accomplish this functionality in SQL Server, with the least amount of effort?
A) Add the users to the db_datawriter database role.
B) Grant the users SELECT permission on every schema in the database.
C) Grant the users SELECT permission on every table in the database.
D) Grant the users SELECT permission on the database.
9. You have a team member who needs the ability to manage SQL Server DML operations and you do
not want him to have permissions to perform any other tasks on the server. The team member’s
responsibilities include selecting, inserting, updating and deleting data from all tables within a
database. Which of the following database-level roles best fits the team member’s permissions
requirement?
A) db_ddladmin and db_datareader C) db_owner and db_datareader
COMPUTR MAINTENAINCE
1. Assume someone told you that his/her computer is stop working and requesting you to fix the
problem. from the given alternatives which one is your first measure
A. Try to figuring out potential solutions
B. Analyzing the problem and potential causes
C. Asking the user some questions to identify the problem.
D. Test one configuration change at a time
2. _______ Are small circuit board that you attach on the motherboard and used to your computer to do
additional tasks.
A. Expansion slot C. Expansion card
B. Power supply D. VGA port
3. From the following which one is not magnetic storage device
A. CD B. Hard disk C. Flash disk D. Floppy disk
4. Ephrem finds that annoyed former employee decided to disrupt his computer when he left by
putting a password in CMOS that stops the computer from booting. What can Ephrem do to
solve this problem?
A. Ephrem should boot the computer holding the left SHIFT key. This will clear the CMOS
information
B. Ephrem should try various combinations of the former employee’s name. the vast
majority of people use their name or initials for CMOS password
C. Ephrem should find the CMOS clear jumper on the motherboard. Then he can boot the
computer with a move on the jumper to clear the CMOS information.
D. Ephrem should find a replacement motherboard. Unless he knows the CMOS password,
there’s nothing he can do.
5. Form the following power related problems one is caused by increasing of electric power
from its optimum level.
A. Power sag C. blackout
B. Brownout D. Power surge
6. Which one of the following is false about operating system?
A. Operating system is used to communicate with hardware
B. Operating system is used to provide a user interface
C. Operating system is used to provide a structure for accessing applications
D. Operating system is designed to provide direct benefits to the user.
7. From the following alternatives which one is not correct about disk partition?
A. In single hard disk user can prepare four primary partition
B. In a single hard disk user can prepare four extended partitions
C. In a single hard disk user can prepare only one active partition
D. In a single extended partition user can prepare multiple/unlimited logical partitions
8. From the following which one is false statement
A. During computer troubleshooting soft communication skill with the user is important
skill
B. Computer troubleshooting is naturally gifted skill not learned.
C. During computer troubleshooting hypothesis generation is required
D. Occupational health and safety is concerned with protecting the safety, health and welfare
of people engaged in workplace.
9. Which one of the following can’t be source of ESD
A. During file backup C. Buildup of energy with nylon clothes
B. During Lightning D. Dust inside the PC
GIS
1. In arc map table of contents, which drawing order of layers is appropriate to display all
features without hiding each other.(hint: the order is from top to bottom)
A. Point feature Line feature Polygon feature
B. Line feature Polygon feature Point feature
C. Polygon feature Point feature Line feature
D. Polygon feature Line feature Point feature
2. Which types of question can’t be answered by map
A. Where B. What C. Who D. When
3. Which spatial feature is the most appropriate to represent household and land marks
A. Point features B. Polygon features C. Line features D. Polyline features
4. Which map element tells the map reader the distance between feature on the map
A. Northing arrow B. Legend C. Map scale D. Title
5. Which angle measurement is important to measure angles from North and South
A. Longitude B. Altitude C. Latitude D. Gravity
6. _________Are a set of connecting Points
A. Polygons C. Lines
B. Metadata D. Attribute data
7. All are the important GIS, except?
A. It is used to determine emergency response like flooding and fire
B. It is used to manage infrastructures like building and streets
C. It allows systematic way of storing spatial data
D. It allows the user to produce electrical current
8. The measurement of latitude range from
A. -360 degrees to +360 degrees.
B. -270 degrees to +270 degrees.
C. -180 degrees to +180 degrees.
D. -90 degrees to +90 degrees.
9. From the given alternatives which one is not ArcGIS file format of features.
A. *.shp B. *.mp3 C. *.dbf D. *.shx
NETWORKING
1. In a Client-Server network, the user data or files are stored on the __?
A. Individual PCs B. Any PC
B. Server PC D. Floppy
2. Which of the following best describes a subnet mask?
C. A unique identifier for each device on a network.
D. To manage network security.
E. A binary pattern used to divide an IP address into network and host
portions.
F. To translate domain names into IP addresses.
3. What is the difference between a scope and a reservation in DHCP?
A. A scope is a range of IP addresses that can be assigned by DHCP, while a
reservation is a specific IP address that can be reserved for a particular
device.
B. A scope is a unique IP address that are assigned for servers, while a reservation is
a range of IP addresses that can be assigned by a DHCP.
C. A scope is used for monitoring the internal networks traffic, while a reservation is
used for monitoring external network traffic.
D. A scope is a method that is used for monitoring the transmission of data packets
in the internal network, while a reservation is a method that is used for monitoring
the transmission of data packets in the external network
4. Which of the following technology is used to deploy Windows operating system
images to new computers?
A. DNS B. DHCP
B. WDS D. GPO
5. What is the purpose of Dynamic Host Configuration Protocol?
A. To convert domain names to IP addresses.
B. To manage group policies in an Active Directory domain.
C. To provide automatic IP address assignment to network devices.
D. To secure communication between a client and a web server.
6. In networking, what does a default gateway do?
A. To make available wireless network access.
B. To establish or connect two or more local area networks.
C. To filter network traffic.
D. To forward network packets between networks.
7. Which one of these components would you need to secure a web server and enable
HTTPS communication?
A. FTP B. DHCP
B. SSL/TLS certificate D. GPO
8. Which of the following technology or features is crucial for implementing security
policies and distributing software installations to computers in an Active Directory
domain?
A. HTTPs B. HTTP
B. Group Policy Object (GPO) D. Web Deployment Services
(WDS)
9. Which command is used to display the IP configuration of a window system?
A. ipconfig B. ifconfig
B. configip D. ipdisplay
10. Which of the following is the disadvantage of domain controller?
A. The data and user management are centralized
B. Encryption of user data
C. Network is dependent on DC uptime
D. Federated configuration for redundancy
11. Which of the following is the top-level domain (TLD) of http://www.uog.com?
A. HTTP C. UOG
B. WWW D. COM
Mobile computing
Choose the best answer among the given choices
3) Suppose Mr. Solomon want to send data to his friend but he did not get the assistance router
to transfer his data therefore for getting the assistance router what types of message issued by
Mr. Solomon?
4) Which one of the following component carried the mobility management and the cell out
functions for mobile phone?
A. Operation Support System
8) Which of the following computing technology uses wireless as the mode of communication
for transferring or exchanging data between various mobiles over a short-range?
10) The single Piconet formed by what? And how many Piconet formed the scatternet?
11) Suppose Mr. Abubeker is system administer of UOG and he want to give the unwanted
Radio Frequency (RF) for the users of organization .So by what component Mr. Abubeker
screening the unused Radio Frequency (RF) from all Radio Frequency’s(RF) signals?
A. Antenna C. Mixer
B. Amplifier D. Filter
12) Which one of the following disadvantage of Code Division Multiple Access (CDMA)?
A. Easy addition of more users
B. Binding update
C. Binding acknowledgement
D. Binding warning
15) In which Telecommunications systems for use the technology the mobile phone should
whitelisted from companies?
17) Suppose Mr. Dawite is private system provider, he used Bluetooth WLAN technology, he
need Broadcasting billing data to be all customers therefore to achieve this what protocol
Stack should use by him?
A. Baseband
D. Synchronous Connection-Oriented
18) Which one of the following is incorrect about Universal Mobile Telecommunication Service
(UMTS)?
19) Suppose Mr. Mohamed send video to Ms. Saba. At same time, Mr. Henoke want send Voice
message to Ms. Hareg but Henoke wrongly decide for wait Saba until finish. So what
problem happen in both senders this case?
A. Hidden Terminals C. Near and far terminals
11. Which one of the following indicators is not used Infant Immunization & Growth
Monitoring Register as a data source
A. IPV (Inactivated Polio Vaccine) Immunization Coverage (< 1 year)
B. Measles (MCV1) immunization coverage (< 1year)
C. Full immunization coverage (< 1 year)
D. HPV 1 (Human Papilloma Virus vaccine (1st dose) ) Immunization coverage
12. If you want to save your analysis results in Dhis-2, which one you expected to click to
obtain save as option
A. Favorite B. Option C. File D. Layout
13. Which one of the following is true in Dhis-2
A. All data displayed in pivot tables can be converted to charts
B. All data displayed in charts can be converted to pivot tables
C. We can display all data either in pivot table or chart without any criteria
D. It is impossible to display data in pivot tables in Dhis-2
14. Assume you are working in Gondar zonal health department planning unit and you want
to calculate indicators using the data given at the table
3. In case of pt access to their information, one of the following is not supported in Ethiopian
HMIS regulation
A. Clients have the right to access their own health information by getting copy of it
B. Client can view their information in their medical record
C. If the client believed there is an error in their MR; the doctor can amend it
D. Clients have the right to access their information by getting the original MR
3. When there is a request of release of pt information, the first thing that we consider is
A. Authority of individual to the information
B. Individual right to the information
C. Sensitivity of the information
D. Organization interest on the information
4. A defence mechanism which involves the use of codes to transform information into
unintelligible data
6. Form the following one is false statement about computer malicious program.
eHealth Exam
A. Integrity
B. Anonymous
C. Confidentiality
D. Privacy
9. Which one of the following is wrong about ehealth
A. The application of Internet and other related technologies in the healthcare
industry to improve the access, efficiency, effectiveness of health care
B. A system which enables for more integration, improved access, and better health
care through better information management and use.
C. Information exchange between providers on secure networks to enable providers to
have timely access to critical information at the point of care
D. A system which enables for less portability of health care information and
minimize communication among physicians.
10. One of the following statements is not the benefit of ehealth policy
A. Ensuring ownership and shared responsibility for successful implementation
B. Provide coordination and collaboration between stakeholders
C. Providing a framework for E-health implementation by all stakeholders
D. Hinder the communication between the health care system and stalk holders
11. Radiographers from primary hospitals in Ethiopia could capture the medical image and send
through the system for interpretation and then radiologists will interpret when he is
comfortable. The telemedicine model being used is described as;
A. Real-Time services
B. Store-and-Forward
C. Remote Patient Monitoring
D. Teleconsultation