Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Reviced Exit-Exam

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

1. Which one of the following is the process of inserting an element in the stack?

A. Insert
B. Add
C. Push
D. None
Answer C:
2. Which one of the following is not the application of the stack data structure
A. String reversal
B. Recursion
C. Backtracking
D. Asynchronous data transfer

Answer D:

3. Which data structure is required to convert the infix to prefix notation?


A. Stack
B. Linked list
C. Binary tree
D. Queue
Answer A:
4. If the elements '1', '2', '3' and '4' are inserted in a queue, what would be order for the removal?
A. 1234
B. 4321
C. 3241
D. None

Answer A:

5. What would be the time complexity if user tries to insert the element at the end of the linked list
(head pointer is known)?

A. O(1)
B. O(n)
C. O(logn)
D. O(nlogn)

Answer B:

6. Which one of the following techniques is not used in the Binary tree?

A. Randomized traversal
B. Preorder traversal
C. Postorder traversal
D. Inorder traversal

Answer A:

7. What is the disadvantage of array data structure?


A. The amount of memory to be allocated should be known beforehand.
B. Elements of an array can be accessed in constant time.
C. Elements are stored in contiguous memory blocks.
D. Multiple other data structures can be implemented using arrays.

Answer A:

8. What is the maximum number of swaps that can be performed in the Selection Sort
algorithm?
A. n - 1
B. n
C. 1
D. n – 2
Answer A:
9. Which of the following is a Divide and Conquer algorithm?
A. Bubble Sort
B. Selection Sort
C. Heap Sort
D. Merge Sort

Answer D:

10. Which of the following topics is typically covered in an operating system course?
A. Data structures
B. Computer networks
C. Database management systems
D. Memory management
Answer: D.
11. Which of the following is a key concept covered in an operating system course?
A. Object-oriented programming
B. Big data analytics
C. Concurrency
D. Computer graphics
Answer: C.
12. Which of the following is a component of an operating system that manages the allocation of
system resources?
A. Shell
B. Kernel
C. Compiler
D. Debugger
Answer: B.
13. Which of the following is a technique used by operating systems to handle multiple tasks at
the same time?
A. Virtualization
B. Concurrency
C. Compression
D. Encryption
Answer: B.
14. Which of the following is an example of a file system used by operating systems?
A. FAT
B. HTTP
C. SMTP
D. TCP/IP
Answer: A.
15. Which of the following is a type of scheduling used by operating systems to determine which
task should be executed next?
A. Round-robin
B. Bubble sort
C. Binary search
D. Linear regression
Answer: A.
16. Which of the following is a technique used by operating systems to manage memory more
efficiently?
A. Paging
B. Encryption
C. Compression
D. Virtualization
Answer: A.
17. Which of the following is a security feature implemented by operating systems?
A. Encryption
B. Data mining
C. Social engineering
D. Network sniffing
Answer: A.
18. Which of the following is a type of system call that allows a process to create a new process?
A. Fork
B. Join
C. Lock
D. Unlock
Answer: A.
19. Which of the following is a type of inter-process communication used by operating systems?
A. HTTP
B. FTP
C. RPC
D. SMTP
Answer: C.

20. What is multithreading in Java?


A. Running multiple programs simultaneously
B. Running multiple threads within a single program
C. Running multiple instances of a program
D. All of the above
Answer: B
21. Which keyword is used to define a thread in Java?
A. run
B. thread
C. start
D. implements
Answer: D
22. How is a thread started in Java?
A. By calling its run() method
B. By calling its start() method
C. By calling its begin() method
D. By calling its execute() method
Answer: B
23. What is the purpose of synchronization in multithreading?
A. To prevent multiple threads from accessing the same resource simultaneously
B. To increase the speed of thread execution
C. To prevent deadlock
D. None of the above
Answer: A
24. Which package is used for socket programming in Java?
A. java.util
B. java.io
C. java.net
D. java.awt

Answer: C
25. How do you create a client socket in Java?
A. Using the Socket class constructor
B. Using the ServerSocket class constructor
C. Using the getSocket() method
D. Using the connect() method
Answer: A
26. How do you create a server socket in Java?
A. Using the Socket class constructor
B. Using the ServerSocket class constructor
C. Using the getServerSocket() method
D. Using the accept() method
Answer: B
27. How do you close a socket in Java?
A. Using the close() method
B. Using the disconnect() method
C. Using the shutdown() method
D. Using the end() method
Answer: A
28. What does RMI stand for in Java?
A. Remote Message Interface
B. Remote Method Invocation
C. Reflected Method Injection
D. Remote Method Interconnection
Answer: B
29. What is RMI used for in Java?
A. To create GUI applications
B. To create server-side applications that allow remote communication between Java objects
C. To create mobile applications
D. To create desktop applications

Answer: B
30. Which network device operates at physical layer?
A. Bridges

B. switches

C. Hub

D. Router

Answer C:

31. Which one defines the first octet bits of class A network?
A. 00000000-01111111
B. 11000000-11011111
C. 10000000-10111111
D. 11100000-11101111
Answer A:
32. What is the maximum number of IP address that can be assigned to hosts on a local subnet that uses
the 255.255.255.224 subnet mask?
A. 14
B. 32
C. 24
D. 30
Answer D:
33. If you want to subnet a network in to five subnets, each with at least 16 hosts which class full subnet
mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.248
D. 255.255.255.240
Answer D:
34. Hana obtains a network address of 172.16.0.0/19 from internet service provider(ISP) for small sized
internet café with limited number of rooms? How many subnets and hosts does hana, to configure the
given address as subnets and hosts?
A. 7 subnets and 30 valid hosts
B. 6 valid subnets and 8190 valid hosts in each subnet
C. 8 subnets and 2046 valid hosts in each subnet
D. 7 subnets and 2046 valid hosts in each subnet
Answer B:

35. The data link layer divides the stream of bits received from physical layer into manageable data unites
called________________?
A. Bits
B. Frames
C. Packets
D. Segments
Answer B:
36. Which internet layer address is responsible for providing diagnostic functions and reporting errors or
conditions regarding to the delivery of IP packets.
A. Internet Protocol(IP)
B. Address Resolution Protocol(ARP)
C. Internet Control Message Protocol (ICMP)
D. Internet Group Message Protocol(IGMP)
Answer C:
37. Which OSI layer provides an email service?
A. Application layer
B. Session layer
C. Presentation layer
D. Transport layer
Answer A:
38. A database Management Software (DBMS) is type of ___________software?
A. Application software
B. System software
C. Operating system
D. A and B

Answer B:

39. All is true about Database except?


A. Program data independence.
B. Self-describing nature
C. Sharing of data and multi-user transaction processing
D. Support of single views of the data
Answer D:
40. Suppose you are want to design a database for a certain company after you know the need of
all user of database what is the next step you are expected to do?
A. Logical design
B. Normalization
C. Conceptual design
D. Physical design
Answer C:
41. One of the following refers to the level of data abstraction that describes exactly how data
actually stored in database?
A. Logical level
B. Physical level
C. Conceptual level
D. All
Answer B:
42. For designing normalize relational database management system (RDBMS) which one of the
following is considered as adequate?
A. 6 Normal form(NF)
B. 4 Normal form(NF)
C. 1 Normal form(NF)
D. 3 Normal form (NF)
Answer D:
43. Which one is procedural language?
A. Query language
B. Relational algebra
C. Relational calculus
D. Tuple relational calculus
Answer B:
44. All are general-purpose DBMS software designed to allow the definition, creation, querying,
update, and administration of databases except?
A. Email system
B. MySQL
C. Oracle
D. All

Answer A:

45. Which command is used to remove relation from an SQL?


A. DELETE
B. ALTER
C. DROP TABLE
D. REMOVE

Answer C:

46. Which one of the following query display name of student from student table start with “F”?
A. SELECT * from student WHERE Name LIKE ‘_F%’;
B. SELECT * from student WHERE Name LIKE ‘ %F%’;
C. SELECT * from student WHERE Name LIKE ‘ F%’;
D. SELECT * from student WHERE Name LIKE ‘ %F’;
Answer C:
47. One of the following command is used to give permission on system and object of database?
A. ROLLBACK
B. COMMIT
C. REVOKE
D. GRANT
Answer D
48. Which one of the following is not the task of type checker?
A.Name related checking
B. Uniqueness checking
C. Type checking
D.Syntax checking
Answer D:

49. Which of the following suffices to convert an arbitrary CFG to an LL (1) grammar?
A. Removing left recursion alone
B. Factoring the grammar alone
C. Removing left recursion and factoring the grammar
D. None
Answer C
50.The operators consuming less execution time replace the operators that consume higher execution time. This
type of optimization technique known as_______.
A. Constant Folding
B. Constant Propagation
C. Strength Reduction
D. Loop Optimization
Answer C:
51. In a compiler, keywords of a language recognized during ____.
A. parsing of the program
B. the code generation
C. the lexical analysis of the program
D. dataflow analysis
Answer C
52.The lexical analysis for a modern language such as Java needs the power of which one of the
following machine models in a necessary and sufficient sense.
A. Finite state automata
B. Deterministic pushdown automata
C. Non-deterministic pushdown automata
D. Turing machine
Answer A:

53.Which one of the following type checking is different from others?


A. Array bound out of index
B. Null pointer dereference
C. Accessing a variable out of scope
D. data value mismatch
Answer D:
54.At what phase type checking will be done during.
A. Lexical Analysis
B. Syntax Analysis
C. Syntax Directed Translation
D. Code generation
Answer C:
55. A compiler for a high-level language that runs on one machine and produces code for a
different machine called ______.
A. optimizing compiler
B. one pass compiler
C. cross compiler
D. multipass compiler
Answer C:
56.Which of the following functions performed by loader?
A. Allocate space in memory for the programs and resolve symbolic references between objects
B. Adjust all address dependent locations, such as address constants, to correspond to the allocated space.
C. Physically place the machine instructions and data into memory
D. All of these.
Answer D:
57.A system program that set-up an executable program in main memory ready for execution is_.
A. Assembler
B. Linker
C. Loader
D. Text editor
Answer D:

58. ____________ is a network security device that monitors incoming and outgoing network traffic.
A. Firewall
B. Gateway
C. Proxy
D. Router

Answer A:

59. Which type of firewall can filter incoming signal based on port numbers and protocol?
A. Packet Filtering
B. Proxy Service
C. Stateful Inspection
D. Threat-Focused NGFW

Answer C:

60. Most of the time it is recommended to apply a Hardware RAID into your system interims of system
performance, WHY? Because Hardware RAID: -
A. Physical storage device which build into a system
B. Can appear as a single hard disk in the system
C. There is no difference between regular hardware and the RAID devices
D. Can uses its own resources

Answer D:

61. All of the following is the roll of system admin related to the file system and disk space management
EXCEPT?
A. Assigning user ID and User name for system users
B. Determining desk usage and quota
C. Creating a Mounting point
D. Partition disk space
Answer A:

62. What is the main goal of DATA COMPRESSION while it paths in different network layers? It’s
goal it to:-
A. Securing data
B. Minimize the size of data
C. Select best path of destination devices
D. All are answer

Answer B:

63. Where/When we can use DHCP Services? It is recommended to use DHCP when: -
A. There are small number of network users
B. Network admin went to use same end devices for specific purpose
C. Number of devices in the network are very complex
D. All are correct

Answer C:

64. From the TCP/IP Layer which layer is used for controlling the hardware and the media of the network
system?
A. Application Layer
B. Physical Layer
C. Network Layer
D. Transport Layer

Answer B:

65. Which one of the OSI layer modal is used for encrypting/decrypting, compressing/decompressing
data transfer between source and destination devices?
A. Presentation Layer
B. Transport Layer
C. Data Link Layer
D. Session Layer

Answer A:

66. ______________ is located on disk, in the form of a partition or a file that Linux uses to extend the
memory available to processes, storing infrequently used pages there.
A. Mounting point
B. Swap Space
C. Bootable file
D. Disk D partition
Answer B:
67. In which layer the path or rout between the sources and destination device can be selected when
sources and destination devices are found in different LAN ?
A. Network Layer
B. Application Layer
C. Transport Layer
D. Session Layer

Answer A:

68. Where/when Network administrator should have to use the concept of Network Address translation?
Network admin should use NAT where: -
A. He/she don’t know type of IP address used in the LAN
B. Global IP address is used in the LAN
C. Private IP address is used in the LAN
D. Default gateway of LAN isn’t configured

Answer C:

69. Which of the following server type is used to store, process, and respond to the client request for
webpages via http/https protocols
A. FTP server
B. Http Server
C. DNS Server
D. Web Server

Answer D:

70. Let’s assume that an organization have very sensitive and secured data which is being stored to a mail
server, and organization needs to have their own MAIL SERVER. So which type of mail server
deployment you recommended to the organization as you are system and network admin?
A. On-premise MTA servers
B. Cloud based MTA servers
C. Both type
D. None

Answer A:

71. Which of the following protocol in MTA enables user access mail data/information from the MDA ?
A. POP3
B. IMAP
C. SMTP
D. Both POP3 and IMAP

Answer D:

72. Let’s assume that you know the domain name of Face Book server, but you don’t know its IP address.
So which network troubleshooting tool you use to get its IP address ?
A. Netstat
B. Nslookup
C. Traceroute
D. Ping command

Answer A:

73. All of the following are disadvantages of using DHCP services EXCEPT ?
A. Fault on the DHCP server can affect whole network
B. It is not secured way of assigning IP address
C. Static IP address assignment can’t be used.
D. It minimizes load of network admin
Answer D:
74. In DNS concept the process of getting IP address by using its hostname is called: _________
A. Resolving
B. Binding
C. Forward resolution
D. Backward resolution
Answer C:
75. One is not the requirement of knowledge for building knowledge base system in AI?
A. To automate reasoning.
B. To make inappropriate decision.
C. To infer new facts from KBs
D. To answer user queries.
Answer B:

76. In AI the agent must be able to

A. Represent states of the world, actions, etc.


B. Incorporate new percepts (facts and rules)
C. Deduce hidden properties of the world
D. All.
Answer D:

77. Which one is not true about propositional or Boolean logic?

A. Contain a sentence which is either true or false.

B. propositional logic uses declarative sentences only

C. Propositional logic doesn’t involve quantifiers.

D. Propositional logic uses interrogatives, imperatives and exclamatory sentences.

Answer D:
78. Why would we want an agent to learn?

A. Because designers cannot anticipate all possible situations that the agent might find itself in.

B. Because, it is not possible for designers cannot anticipate all changes over time.

C. Because, mostly human programmers have no idea how to program a solution themselves.

D. None.

Answer D:

79. One of the following provides feedback for the learning element, how the agent is doing with respect
to a performance standard.

A. Critic element
B. Learning element
C. Problem generator
D. performance element
Answer A:

80. One of the following is not true about Bayesian Learning.

A. Provides practical learning algorithms.


B. Calculate implicit probabilities for hypothesis.
C. Combine prior-knowledge and observed data.
D. It is a model based approach, which offers a useful conceptual framework.
Answer B:
81. Which one of the following approaches of artificial intelligence deals for operational test for
intelligent behavior and do experiments on the ability to achieve human-level performance.
A. Turing Test Approach
B. Cognitive Modeling Approach
C. Rational Agent Approach
D. Laws of Thought Approach
Answer A:
82. Which one of the following statement is correct about goal based rational agents?
A. It works by finding a rule whose condition matches the current situation/state.
B. These agents are less efficient and more flexible.
C. These agents select actions on the basis of the current percept, ignoring the rest of the percept history.
D. These agents are cheek degree of success. (how successful it is)

Answer B:

83. Which one of the following is considered as objectives (goals) of artificial intelligence?
A. To understand what kind of computational mechanisms are needed for modeling intelligent behavior?
B. To solve real-world problems, build systems that show intelligent behavior.
C. To create intelligent machines.
D. All.
Answer D:
84. Which of the following object used for taking input from the keyboard?
A. Cout
B. Cin
C. \n
D. #include
Answer: B.
85. __________ is a computer program that translates a series of statements written in source code
into a resulting object code is a set of instructions that tell the computer hardware what to do.
A. Compiler
B. Interpreter
C. Translator
D. None

Answer: A.
86. ___________ Skills on how to solve real world problem and represent the solution in
understandable format?
A. Programming Language
B. Problem Solving Skill
C. Algorithm development
D. All
Answer: B.
87. Which of the following describes the sequence of steps to be performed for the problem to be
solved?
A. Object code
B. Source code
C. Program
D. Algorithm

Answer: D.

88. Which of the following is false about function overloading?


A. Functions having the same function name
B. Functions having the different number of arguments
C. Functions having the same argument datatype
D. Functions having the same return type
Answer: D.
89. Which of the following is true about array?
A. Zero bounded
B. Index start from zero
C. Last element is N-1
D. All

Answer: D

90. One of the following is required to declare the name and type of an array?
A. The type of the array
B. Name of the array,
C. The total number of memory locations
D. All

Answer: D.

91. Which of the following is NOT a stage of compiler design?


A. Lexical analysis
B. Syntax analysis
C. Semantic analysis
D. None
Answer D:

92. Which of the following is not a challenge of compiler design?


A. Handling errors
B. Optimization
C. Code generation
D. Semantic analysis
Answer D:
93. The program which converts assembly code to its corresponding machine code is
known as___
A. Linker
B. Assembler
C. Loader
D. Compiler
Answer B:
94. The output of the lexical analysis phase is a(n):
A. Token stream
B. Parse tree
C. Symbol table
D. Abstract syntax tree
Answer A:

95. Which of the following is not a type of compiler?


A. Just-in-time compiler
B. Ahead-of-time compiler
C. Interpreter
D. Static analysis tool
Answer C:

96. The purpose of the syntax analysis phase is to:


A. Identify the tokens in the source code
B. Determine the structure of the source code
C. Check the correctness of the source code
D. Generate the code for the source code
Answer B:

97. Which of the following is not a type of optimization that a compiler can perform?
A. Loop unrolling
B. Constant folding
C. Register allocation
D. Dead code elimination
Answer C:

98. Which of the following is NOT a benefit of using a compiler?


A. Increased performance
B. Increased portability
C. Increased reliability
D. Increased security
Answer D:
99. Which of the following is NOT a type of error that can be detected by a compiler?
A. Logical error
B. Syntax error
C. Semantic error
D. Run-time error
Answer A:

100. Which of the following is not a technique used by a compiler to generate code?
A. Backtracking
B. Greedy algorithm
C. Bottom-up parsing
D. Dynamic programming
Answer C:

You might also like