Model Exam Version 3
Model Exam Version 3
Mekanisa Campus
Faculty of Informatics
Department of Computer Science SENE, 2015
Model Exit Exam III CODE MK-003 Time allotted: 3:00 hrs
Name _________________________ID.No._________________________
Computer ScienceModel Exit Exam
Software Engineering 3 6
1 Theme 1. System Development Web Programming 6 9
Database Systems 6 12
Total 3 15 27
Computer Programming 6 6
14 |
Instruction: Read the questions and choose the right answer from the given alternatives and write the letter of
your choice on the space provided at the separate answer sheet. (1 point each)
Software Engineering
Amen Hospital wants to use surgery management system. This system will helps to the Doctor by identifying the
surgery activities based on the pre-stored information and give appropriate message immediately when the
doctor miss any activity related to surgery.
According to the above case study, Answer question number 1 and 2.
1. The software developer team must be given more emphasize which types of software quality
requirements?
A. Flexibility C. Modifiability
B. Reliability D. maintainability
2. What types of software process model is using more fit with the systemrequirement?
15 |
5. Which one of the following false about UML object model can be mapped to relational database during
software design phase?
A. Each class is mapped to its own table
B. Each class attribute is mapped to a column in the table
C. Each class method is mapped to a relationship in the table
D. An instance of a class represents a row in the table
6. Assume below two sentence are described non-functional requirements of Woldia university Student
Information Management System (SIMS). What types of problem have been between those two non-
functional requirement statements?
“The system must work 24 hours per day, 7 days per week and 365 days per year’’ “The system can
maintain within 3 hours ’’
A. Consistency C. Traceability
B. Completeness D. Realism
Web Programming
7. What is the correct HTML for creating a hyperlink?
A. <a>http://www.google.com</a>
C. <a href=http://www.google.com”>Google</a>
Database Systems
17. Schema normalization is not for?
A. Reducing the number of tables in the schema.
B. Eliminating uncontrolled redundancy of data.
C. Eliminating anomalies that could otherwise occur with inserts.
D. Eliminating anomalies that could otherwise occur with deletes.
18. Which one of the following statements is used to create a table?
A. CREATE TABLE table_name (column_namecolumn_type);
16 |
28. What is a mechanism for enforcing limits on access to a resource in an environment where there are
many threads of execution?
A. Timestamping C. Transaction
B. Concurrencycontrol D. Locking
Theme 2. Programming and Algorithms
Computer Programming
29. Quality programming that comes from good program design is necessary for the economic and correct
solution of problems. Assume you are the program designer and the program that you design cannot adapt
one type of computer to another with minimum modification. So, what need of a good program design is
failed?
A.Reliability
B.Efficiency
C.Maintainability
D.Portability
30. Which one of the following is INCORRECT about an algorithm?
A. Set of instructions showing the steps of solving theproblem.
B. All the steps can be dependent on any programming language ormachine.
C. The steps must be efficient in time, memory and otherresources
D. It must produce expected output and can be simple andcorrect
31. Which one of the following should include under every C++ program?
A. int
B. double
C. main()
D. length()
32. A symbolic name for memory location in which data can be stored and subsequently recalled is
called______.
A. Keyword D. Reservedwords
B. Literals
C. Variable
33. Which one of the following statements provides a way of choosing between a set of alternatives based
on the value of an expression?
A. ifstatement C. switch statement
B. if…else statement D. while statement
14 |
34. Among the following which one is used to execute block of code known times?
A. Forloop
B. Whileloop
C. Do…while loop
D. Switch
Object Oriented Programming
35. Which one of the following is false about abstract classes?
A. Abstract classes are declared using the keywordabstract.
B. An abstract class can be a superclass.
C. An abstract class can also be a finalclass.
D. An object of an abstract class cannot becreated.
36. Which one of the following is true about interfaces?
A. An interface’s methods are by default public andfinal.
B. An interfaces variable is by default private, static andfinal.
C. An interface’s methods are by default public andabstract.
D. An interface cannot be part of the inheritancehierarchy.
37. When a subclass object is created ______________
A. The very first constructor called is the subclass’constructor.
B. Any one of the constructors across the hierarchy can be called in a randomorder.
C. The last constructor called is the constructor of the superclass’constructor.
D. The very first constructor called is the top most superclass’ constructor in thehierarchy.
38. When a method is overridden_____________.
A. Both methods have exactly samesignature.
B. Java uses it to implement compile timepolymorphism.
C. The super keyword is used to call the overriding (subclass’)method.
D. The overridden method must be final always so that the subclass can override it
39. A reference variable can refer to_____________.
A. An object of thesuperclass
B. An object of its class typeonly
C. An object of anyclass
D. An object of subclass’s or its classtype
14 |
40. When a class must not be inherited, it must be declared using the____________ keyword.
A. this C. final
B. super D. abstract
Design and Analysis of Algorithms
41. Which one of the following is an incorrect statement about algorithms?
A. algorithm is composed of a finite set ofsteps
15 |
51. What happens when you push a new node onto a stack?
A. The new node is placed at the front of the linked list
B. The new node is placed at the back of the linked list
C. The new node is placed at the middle of the linked list
D. No Changes happens
52. _______ is very useful in situation when data have to stored and then retrieved in reverse order.
A. Stack B. Queue C. List D. Link List
53. Which OSI layer defines the functions of logical network addressing and routing?
A. Physical B. Network C. datalink D.transport
54. Dialogue and conversation between the sender and the receiver device is established by___
A. Physical C. datalink
B. Session D. presentation
55. Which of the following devices translates hostnames into IP addresses?
A. DNS Server C. DHCP Server
B. Hub D. Firewall
56. Delivery and storage of E-Mail message to a server is achieved using__________
A. post office protocol(POP)
B. Internet mail access protocol(IMAP)
C. Simple mail transfer protocol(SMTP)
D. Hypertext transfer protocol(HTTP)
57. Changing a stream of data bits in to a predefined code is known as ___________
A. Decoding C. Signaling
B. Encoding D. Data transferring
58. If we want to remove the message from mail box , which protocol is available to remove it
15 |
Computer Security
59. An information system that processes sensitive information is configured to require a valid userid and
strong password from any user. This process of accepting and validating this information is known
as_______
A. Authentication B. Strong authentication C. Two-factor authentication D. Single sign-on
60. An organization wants to prevent SQL and script injection attacks on its Internet web application. The
organization should implement a/an___
A. Intrusion detection system C. Application firewall
B. Firewall D. SSL certificate
61. CIA is known as__________
A. Confidentiality, Integrity, and Availability
B. Computers, Information, and Assets
C. Confidence In Applications
D. Controls, Integrity, and Availability
62. A database administrator (DBA) is responsible for carrying out security policy, which includes controlling
which users have access to which data. The DBA has been asked to make just certain fields in some
database tables visible to some new users. What is the best course of action for the DBA to take?
A. Implement column-based access controls
B. Export the table to a data warehouse, including only the fields that the users are permitted to see
C. Clone the table, including only the fields that the users are permitted to see
D. Create a view that contains only the fields that the users are permitted to see
63. Public key cryptography is so-named because________
A. It is the world standard for HTTPS
B. It works on all popular computer operating systems
C. It uses an encryption key that can be released to the public
D. The encryption algorithms reside in the public domain
64. A particular encryption algorithm transforms plaintext to cipher text by XORing the plaintext with the
encryption key. This is known as__________
A. Electronic codebook C. Block cipher
B. Cipher block chaining D. Stream cipher
15 |
Network and System Administration
15 |
Theme 4. Intelligent Systems
14 |
Theme 5. Computer Architecture and Operating Systems
Operating System
77. If a process fails, most operating system write the error information to a ______
A. log file
B. another running process
C. new file
D. none of the mentioned
78. Which of the following is not the state of a process?
A. New B. Old C. Waiting D. Running
79. What is the degree of multiprogramming?
A. the number of processes executed per unit time
B. the number of processes in the ready queue
C. the number of processes in the I/O queue
D. the number of processes in memory
80. Which one of the following is not advantage of single level directory?
A. Implementation is very simple.
B. If the sizes of the files are very small, then the searching becomes faster.
C. File creation, searching, deletion is very simple since we have only one directory.
D. The directory may be very big therefore searching for a file may take so much time.
81. Memory block assigned to process is bigger. Some portion of memory is left unused, as it cannot be used
by another process.
A. External fragmentation C. paging
B. Internal fragmentation D. segmentation
82. ____________ is a memory management technique in which process address space is broken into blocks
of the same size called pages.
A. External fragmentation C. paging
B. Internal fragmentation D. segmentation
15 |
Computer organization and architecture
A. RISC
B. ISA
C. IANA
D. CISC
84. The memory devices which are similar to EEPROM but differ in the cost effectiveness is?
A. CMOS
B. Memory sticks
C. Blue-ray devices
D. Flash memory
85. The number successful accesses to memory stated as a fraction is called as _______
A. Access rate
B. Success rate
C. Hit rate
D. Miss rate
86. Which of the following memory of the computer is used to speed up the computer processing?
A. Cache memory
B. RAM
C. ROM
D. SRAM
A. CPU
B. Keyboard
C. Monitor
D. Printer
16 |
88. Which of the following circuit is used to store one bit of data?
A. Flip Flop
B. Decoder
C. Encoder
D. Register
A. Total B. Partial
C. recursive D. both total and partial.
91. S(S(S(Z(4)))) is equal to_______
A. U13(2, 1,3) B. U13(2, 1, 3) C. U33(2, 1, 3) D. none of these.
92. Which one of the following grammars is in Chomsky Normal Form?
A. S→AS/a, A→SA/aa
B. S→AS/a, A→SA/b
C. S→AS/ASS/a, A→SA/b
D. B and C
93. One of the following grammars is correctly matched?
A. S →S1ab,S1→ S1ab|S2,S2 →a is context-free grammar
B. S →S1ab,S1→ S1ab|S2,S2 →a is Regular grammar
C. S →S1ab,S1→ S1ab|S2,S2 →a left linear grammar
D. A and B
94. How many languages are over the alphabet R?
A. countably infinite
B. countably finite
C. uncountable finite
D. uncountable infinite
17 |
Compiler Design
18 |
Admas University
Faculty of Informatics
Department of Computer Science
Model Exit Exam
Answer Sheet
Name _________________________ Sene, 2015
ID.No._________________________ Time allotted: 3:00 hrs
Section _________________
Answer Sheet
Fundamentals of Software Engineering
1. B 2. B 3. C 4. B 5. C 6. A
Web Programming
7. C 8. A 9. B 10. D 11. C 12. B
13. A 14. C 15. D 16. A
Database Systems
17. A 18. A 19. C 20. B 21. B 22. A
23. B 24. A 25. B 26. C 27. B 28. D
Computer Programming
29. D 30. B 31. C 32. C 33. C 34. A
Object Oriented Programming
35. C 36. C 37. D 38. A 39. D 40. C
Design and Analysis of Algorithms
41. C 42. B 43. C 44. A 45. C 46. A
Data Structure and Algorithms
47. B 48. B 49. B 50. B 51. A 52. B
Data Communication and Computer Networking
53. B 54. B 55. A 56. C 57. B 58. C
Computer Security
59. A 60. C 61. A 62.D 63. C 64. D
Network and SystemAdministration
65. C 66. A 67. A 68. A 69. C 70. D
Introduction to ArtificialIntelligence
71. A 72. B 73. C 74. C 75. D 76. D
Operating System
77. A 78. B 79. D 80. D 81. B 82. C
Computer organization and architecture
83. A 84. D 85. C 86. A 87. A 88. A
Formal Language and Complexity Theory
89. B 90. A 91. C 92. B 93. C 94. D
Compiler Design
95. D 96. D 97. A 98. C 99. D 100. B