Reviced Exit-Exam
Reviced Exit-Exam
Reviced Exit-Exam
A. Insert
B. Add
C. Push
D. None
Answer C:
2. Which one of the following is not the application of the stack data structure
A. String reversal
B. Recursion
C. Backtracking
D. Asynchronous data transfer
Answer D:
Answer A:
5. What would be the time complexity if user tries to insert the element at the end of the linked list
(head pointer is known)?
A. O(1)
B. O(n)
C. O(logn)
D. O(nlogn)
Answer B:
6. Which one of the following techniques is not used in the Binary tree?
A. Randomized traversal
B. Preorder traversal
C. Postorder traversal
D. Inorder traversal
Answer A:
Answer A:
8. What is the maximum number of swaps that can be performed in the Selection Sort
algorithm?
A. n - 1
B. n
C. 1
D. n – 2
Answer A:
9. Which of the following is a Divide and Conquer algorithm?
A. Bubble Sort
B. Selection Sort
C. Heap Sort
D. Merge Sort
Answer D:
10. Which of the following topics is typically covered in an operating system course?
A. Data structures
B. Computer networks
C. Database management systems
D. Memory management
Answer: D.
11. Which of the following is a key concept covered in an operating system course?
A. Object-oriented programming
B. Big data analytics
C. Concurrency
D. Computer graphics
Answer: C.
12. Which of the following is a component of an operating system that manages the allocation of
system resources?
A. Shell
B. Kernel
C. Compiler
D. Debugger
Answer: B.
13. Which of the following is a technique used by operating systems to handle multiple tasks at
the same time?
A. Virtualization
B. Concurrency
C. Compression
D. Encryption
Answer: B.
14. Which of the following is an example of a file system used by operating systems?
A. FAT
B. HTTP
C. SMTP
D. TCP/IP
Answer: A.
15. Which of the following is a type of scheduling used by operating systems to determine which
task should be executed next?
A. Round-robin
B. Bubble sort
C. Binary search
D. Linear regression
Answer: A.
16. Which of the following is a technique used by operating systems to manage memory more
efficiently?
A. Paging
B. Encryption
C. Compression
D. Virtualization
Answer: A.
17. Which of the following is a security feature implemented by operating systems?
A. Encryption
B. Data mining
C. Social engineering
D. Network sniffing
Answer: A.
18. Which of the following is a type of system call that allows a process to create a new process?
A. Fork
B. Join
C. Lock
D. Unlock
Answer: A.
19. Which of the following is a type of inter-process communication used by operating systems?
A. HTTP
B. FTP
C. RPC
D. SMTP
Answer: C.
Answer: C
25. How do you create a client socket in Java?
A. Using the Socket class constructor
B. Using the ServerSocket class constructor
C. Using the getSocket() method
D. Using the connect() method
Answer: A
26. How do you create a server socket in Java?
A. Using the Socket class constructor
B. Using the ServerSocket class constructor
C. Using the getServerSocket() method
D. Using the accept() method
Answer: B
27. How do you close a socket in Java?
A. Using the close() method
B. Using the disconnect() method
C. Using the shutdown() method
D. Using the end() method
Answer: A
28. What does RMI stand for in Java?
A. Remote Message Interface
B. Remote Method Invocation
C. Reflected Method Injection
D. Remote Method Interconnection
Answer: B
29. What is RMI used for in Java?
A. To create GUI applications
B. To create server-side applications that allow remote communication between Java objects
C. To create mobile applications
D. To create desktop applications
Answer: B
30. Which network device operates at physical layer?
A. Bridges
B. switches
C. Hub
D. Router
Answer C:
31. Which one defines the first octet bits of class A network?
A. 00000000-01111111
B. 11000000-11011111
C. 10000000-10111111
D. 11100000-11101111
Answer A:
32. What is the maximum number of IP address that can be assigned to hosts on a local subnet that uses
the 255.255.255.224 subnet mask?
A. 14
B. 32
C. 24
D. 30
Answer D:
33. If you want to subnet a network in to five subnets, each with at least 16 hosts which class full subnet
mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.248
D. 255.255.255.240
Answer D:
34. Hana obtains a network address of 172.16.0.0/19 from internet service provider(ISP) for small sized
internet café with limited number of rooms? How many subnets and hosts does hana, to configure the
given address as subnets and hosts?
A. 7 subnets and 30 valid hosts
B. 6 valid subnets and 8190 valid hosts in each subnet
C. 8 subnets and 2046 valid hosts in each subnet
D. 7 subnets and 2046 valid hosts in each subnet
Answer B:
35. The data link layer divides the stream of bits received from physical layer into manageable data unites
called________________?
A. Bits
B. Frames
C. Packets
D. Segments
Answer B:
36. Which internet layer address is responsible for providing diagnostic functions and reporting errors or
conditions regarding to the delivery of IP packets.
A. Internet Protocol(IP)
B. Address Resolution Protocol(ARP)
C. Internet Control Message Protocol (ICMP)
D. Internet Group Message Protocol(IGMP)
Answer C:
37. Which OSI layer provides an email service?
A. Application layer
B. Session layer
C. Presentation layer
D. Transport layer
Answer A:
38. A database Management Software (DBMS) is type of ___________software?
A. Application software
B. System software
C. Operating system
D. A and B
Answer B:
Answer A:
Answer C:
46. Which one of the following query display name of student from student table start with “F”?
A. SELECT * from student WHERE Name LIKE ‘_F%’;
B. SELECT * from student WHERE Name LIKE ‘ %F%’;
C. SELECT * from student WHERE Name LIKE ‘ F%’;
D. SELECT * from student WHERE Name LIKE ‘ %F’;
Answer C:
47. One of the following command is used to give permission on system and object of database?
A. ROLLBACK
B. COMMIT
C. REVOKE
D. GRANT
Answer D
48. Which one of the following is not the task of type checker?
A.Name related checking
B. Uniqueness checking
C. Type checking
D.Syntax checking
Answer D:
49. Which of the following suffices to convert an arbitrary CFG to an LL (1) grammar?
A. Removing left recursion alone
B. Factoring the grammar alone
C. Removing left recursion and factoring the grammar
D. None
Answer C
50.The operators consuming less execution time replace the operators that consume higher execution time. This
type of optimization technique known as_______.
A. Constant Folding
B. Constant Propagation
C. Strength Reduction
D. Loop Optimization
Answer C:
51. In a compiler, keywords of a language recognized during ____.
A. parsing of the program
B. the code generation
C. the lexical analysis of the program
D. dataflow analysis
Answer C
52.The lexical analysis for a modern language such as Java needs the power of which one of the
following machine models in a necessary and sufficient sense.
A. Finite state automata
B. Deterministic pushdown automata
C. Non-deterministic pushdown automata
D. Turing machine
Answer A:
58. ____________ is a network security device that monitors incoming and outgoing network traffic.
A. Firewall
B. Gateway
C. Proxy
D. Router
Answer A:
59. Which type of firewall can filter incoming signal based on port numbers and protocol?
A. Packet Filtering
B. Proxy Service
C. Stateful Inspection
D. Threat-Focused NGFW
Answer C:
60. Most of the time it is recommended to apply a Hardware RAID into your system interims of system
performance, WHY? Because Hardware RAID: -
A. Physical storage device which build into a system
B. Can appear as a single hard disk in the system
C. There is no difference between regular hardware and the RAID devices
D. Can uses its own resources
Answer D:
61. All of the following is the roll of system admin related to the file system and disk space management
EXCEPT?
A. Assigning user ID and User name for system users
B. Determining desk usage and quota
C. Creating a Mounting point
D. Partition disk space
Answer A:
62. What is the main goal of DATA COMPRESSION while it paths in different network layers? It’s
goal it to:-
A. Securing data
B. Minimize the size of data
C. Select best path of destination devices
D. All are answer
Answer B:
63. Where/When we can use DHCP Services? It is recommended to use DHCP when: -
A. There are small number of network users
B. Network admin went to use same end devices for specific purpose
C. Number of devices in the network are very complex
D. All are correct
Answer C:
64. From the TCP/IP Layer which layer is used for controlling the hardware and the media of the network
system?
A. Application Layer
B. Physical Layer
C. Network Layer
D. Transport Layer
Answer B:
65. Which one of the OSI layer modal is used for encrypting/decrypting, compressing/decompressing
data transfer between source and destination devices?
A. Presentation Layer
B. Transport Layer
C. Data Link Layer
D. Session Layer
Answer A:
66. ______________ is located on disk, in the form of a partition or a file that Linux uses to extend the
memory available to processes, storing infrequently used pages there.
A. Mounting point
B. Swap Space
C. Bootable file
D. Disk D partition
Answer B:
67. In which layer the path or rout between the sources and destination device can be selected when
sources and destination devices are found in different LAN ?
A. Network Layer
B. Application Layer
C. Transport Layer
D. Session Layer
Answer A:
68. Where/when Network administrator should have to use the concept of Network Address translation?
Network admin should use NAT where: -
A. He/she don’t know type of IP address used in the LAN
B. Global IP address is used in the LAN
C. Private IP address is used in the LAN
D. Default gateway of LAN isn’t configured
Answer C:
69. Which of the following server type is used to store, process, and respond to the client request for
webpages via http/https protocols
A. FTP server
B. Http Server
C. DNS Server
D. Web Server
Answer D:
70. Let’s assume that an organization have very sensitive and secured data which is being stored to a mail
server, and organization needs to have their own MAIL SERVER. So which type of mail server
deployment you recommended to the organization as you are system and network admin?
A. On-premise MTA servers
B. Cloud based MTA servers
C. Both type
D. None
Answer A:
71. Which of the following protocol in MTA enables user access mail data/information from the MDA ?
A. POP3
B. IMAP
C. SMTP
D. Both POP3 and IMAP
Answer D:
72. Let’s assume that you know the domain name of Face Book server, but you don’t know its IP address.
So which network troubleshooting tool you use to get its IP address ?
A. Netstat
B. Nslookup
C. Traceroute
D. Ping command
Answer A:
73. All of the following are disadvantages of using DHCP services EXCEPT ?
A. Fault on the DHCP server can affect whole network
B. It is not secured way of assigning IP address
C. Static IP address assignment can’t be used.
D. It minimizes load of network admin
Answer D:
74. In DNS concept the process of getting IP address by using its hostname is called: _________
A. Resolving
B. Binding
C. Forward resolution
D. Backward resolution
Answer C:
75. One is not the requirement of knowledge for building knowledge base system in AI?
A. To automate reasoning.
B. To make inappropriate decision.
C. To infer new facts from KBs
D. To answer user queries.
Answer B:
Answer D:
78. Why would we want an agent to learn?
A. Because designers cannot anticipate all possible situations that the agent might find itself in.
B. Because, it is not possible for designers cannot anticipate all changes over time.
C. Because, mostly human programmers have no idea how to program a solution themselves.
D. None.
Answer D:
79. One of the following provides feedback for the learning element, how the agent is doing with respect
to a performance standard.
A. Critic element
B. Learning element
C. Problem generator
D. performance element
Answer A:
Answer B:
83. Which one of the following is considered as objectives (goals) of artificial intelligence?
A. To understand what kind of computational mechanisms are needed for modeling intelligent behavior?
B. To solve real-world problems, build systems that show intelligent behavior.
C. To create intelligent machines.
D. All.
Answer D:
84. Which of the following object used for taking input from the keyboard?
A. Cout
B. Cin
C. \n
D. #include
Answer: B.
85. __________ is a computer program that translates a series of statements written in source code
into a resulting object code is a set of instructions that tell the computer hardware what to do.
A. Compiler
B. Interpreter
C. Translator
D. None
Answer: A.
86. ___________ Skills on how to solve real world problem and represent the solution in
understandable format?
A. Programming Language
B. Problem Solving Skill
C. Algorithm development
D. All
Answer: B.
87. Which of the following describes the sequence of steps to be performed for the problem to be
solved?
A. Object code
B. Source code
C. Program
D. Algorithm
Answer: D.
Answer: D
90. One of the following is required to declare the name and type of an array?
A. The type of the array
B. Name of the array,
C. The total number of memory locations
D. All
Answer: D.
97. Which of the following is not a type of optimization that a compiler can perform?
A. Loop unrolling
B. Constant folding
C. Register allocation
D. Dead code elimination
Answer C:
100. Which of the following is not a technique used by a compiler to generate code?
A. Backtracking
B. Greedy algorithm
C. Bottom-up parsing
D. Dynamic programming
Answer C: