0% found this document useful (0 votes)
54 views

Exit Question Final

Yhjjj

Uploaded by

aaaabeni6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

Exit Question Final

Yhjjj

Uploaded by

aaaabeni6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

1.

Which of the following statements would alter the style of an anchor element when the mouse is moved
over it?
a. a:hover
b. a:link
c.a:mouseover
d. a:beforeclick
2.What conclusions can you draw about the interface or node from the following exhibit?
Switch#sh interfaces fastEthernet 0/1
FastEthernet0/1 is down, line protocol is down (disabled)
Hardware is Lance, address is 000a.f36c.1501 (bia 000a.f36c.1501)
[output cut)
956 packets input, 193351 bytes, e no buffer
Received 956 broadcasts, e runts, e giants, e throttles
e input errors, e CRC, e frame, e overrun, e ignored, o abort
e watchdog, e multicast, e pause input
0 input packets with dribble condition detected
2357 packets output, 263570 bytes,
underruns
e output errors, e collisions, 10 interface resets babbles, 0 late collision, e deferred
e lost carrier, e no carrier
e output buffer failures, e output buffers swapped out
a. The interface is operating nominally
b. The interface is shut down
c. The interface is negotiated at half-duplex
d.The cable is disconnected for the node

3.What is the most common reason for an unexpected reboot?


a. Overheating
b. Memory leak
c.RFI
d. ESD damage
4.Which of the following video connectors has an analog variety and a digital variety?
a.DVI
b. VGA
c.DisplayPort
d. HDMI
5.For an Entity set Citizen, an attribute name „Address" consists of Street-number, City, and Region. Such
kind of attribute in a database is known as
a.Derived Attribute
b. Complex Attribute
c. Composite Attribute
d. Multi-Valued Attribute

6.Which of the following is a valid Visual Basic conditional statement?


a.2 < n Or 5
of
b.(2n) Or (n < 5)
c.2 < n Or <5
d. 2s
7.To view the MAC address table, which command can be used?
a.S1#show cam table
b.S1#show mac table
c.S1#show mac address-table
d. S1#show mac
8.is a method of scheduling that considers limitation recourses when creating a project schedule and
includes buffers to protect the project completion date.
a.Critical chain scheduling
b.Parkinson's Law
c.Critical path analysis
d. Scrum
9.The default property for a text box control is
a. Password char
b. Text
C.Multiline
d. Enable
10.The output of the following PHP code will be
$user = array("Apple", "Banana", "Mango", "Orange"); for ($x-0; $xif ($user[$x) == "Mango") continue;
printf ($user[$x]);
a.AppleBananaOrange
b. AppleBanana
c. Mango
d. MangoOrange
11.Data downloaded to devices is done by
a.Broadcast Receivers
b. File
c. Event
d. Fragment
12.Data downloaded to devices is done by
a. Broadcast Receivers
b. File
c. Event
d. Fragment
13.By applying permutation (53421) and substitution by 3 characters away from current character, the
string "LETUSMEETENTOTO" becomes
a. OTOTNETEEMSUTEL
b. QWWRRPHWHHOHXWV
c.VWXHOHHWHPRRWWQ
d. STUELEETEMOOTTN
14.It's possible to have several methods with the same name that each operate on different type or
numbers of arguments. This feature is called method
a. activation
b. overflow
c.overloading
d.expression
15.Which one of the following model is not used for to improving quality in software development
projects and project management?
a. Capability Maturity Model Integration
b. Software Quality Function Deployment
c. Myers-Briggs Type Indicator
d. Project management maturity models
16.Which of these two characteristics of object-oriented programming are the same?
a. Encapsulation and Abstraction
b. Encapsulation and Polymorphism features are the same
c.Inheritance and Encapsulation features are the same
d. Abstraction and Polymorphism features are the same
17.Which fiber optic standard utilizes a 50 micron core?
a.STP
b. Multi-mode
c.Single-mode
d. UTP
18.Which of the following statement is wrong about information security?
a.warm replicate or clone them self's through infection
b.Worms and viruses also characterize a threat
c.Password crack is a threat as malicious code is an attack
d.The goal of information security is to reduce risk
19.Select the ultimate goal of risk identification.
a. Classify and prioritize assets
b.Specify assets vulnerability to the threat Identify and prioritize assets
c.Identify and inventory asset
a different package.
20.modifier to prevent the data and methods from being accessed by non-subclasses from
a. Final
b. Protected
c.Super
d. Public
21.What annotation is valid in the place of ? mark in the fragment of code shown below? interface Test {
? ("SELECT * FROM test WHERE id=(id)")
suspend fun getTest(id: UUID): Test
a.@Insert
b. @Update
c. @Query
d. @Select
22.A mapping cardinality where, an entity A is associated with at most one entity in Band an entity in
however, can be associated with any number (zero or more) of entities in A.
a. MANY to MANY
b. MANY TO ONE
c. ONE TO MANY
d. ONE TO ONE
23.is a diagram that used to trace the execution of a scenario in the same context as an object diagram
a. Interaction diagram
b. Data flow diagram
c. Class Diagram
d. Visibility diagram
24.is a diagram that used to trace the execution of a scenario in the same context as an object diagram
A.Interaction diagram
b.Data flow diagram
c.Class Diagram
d.Visibility diagram
25.a project management methodology uses an iterative software development process that focuses
on team productivity and delivers software best practices to all team members.
a. Theory of Constraints (TOC)
b.Rational Unified Process (RUP) framework
c.Tracking Gantt chart
d. Requirements traceability matrix (RTM)
26.a project management methodology uses an iterative software development process that focus
on team productivity and delivers software best practices to all team members.
a. Theory of Constraints (TOC)
b. Rational Unified Process (RUP) framework
c.Tracking Gantt chart
d. Requirements traceability matrix (RTM)
27.Based on object-oriented application, which one of the following is a part of the notation of object-
oriented design used to show the allocation of processes to processors in the physical design of a system?
a. real-time process
b. process diagram
c. reactive process
d. process architecture
28.If the query DROP DATABASE Student is executed on the database without the appropriate
authorization, what kim of threat it causes?
a.Loss of integrity
b.Loss of accountability
c.Loss of Authorization
d. Loss of confidentiality
29.modifier to prevent the data and methods from being accessed by non-subclasses from
a different package.
a. Final
b. Protected
c.Super
d. Public
30.If your collage prohibits using any anti-virus program in your personal computers (or Laptops) other
than the one they provide in order to use the college's local network, what type of policy is this?
a. Issue-specific policy
b. System-specific policy
c. Program security policy
d. General security policy
31.What effect does a host's wrong default gateway configuration have on communications?
a. On the local network, the host is unable to exchange messages
b. The host is able to connect with hosts on its local network, but not with hosts on other networks No
effect is felt on communication
d.The host is able to communicate with hosts on distant networks, but not with hosts on the local network
32.What effect does a host's wrong default gateway configuration have on communications?
a. On the local network, the host is unable to exchange messages
b. The host is able to connect with hosts on its local network, but not with hosts on other networks
c. No effect is felt on communication
d. The host is able to communicate with hosts on distant networks, but not with hosts on the local network
33.a project management methodology uses an iterative software development process that focuses
on team productivity and delivers software best practices to all team members.
a. Theory of Constraints (TOC)
b. Rational Unified Process (RUP) framework
c.Tracking Gantt chart
d. Requirements traceability matrix (RTM)
34.is an attribute specifying a blue background of an element.
a.style="background-color:blue"
b. background = "blue"
c. bgcolor= blue
d. bgcolor=#000000
35.Why Cookies should be transferred before a web page's?
a. Because they are sent as part of the headers.
b. Because they determine the entire document structure
c. Because they are sensitive data.
d.Because they are sent as part of the body.
36.A tuple takes a value when a record does not have a value for it.
a.Unknown
b. Null
C.Not Applicable
d. Zero
37.A tuple takes a value when a record does not have a value for it.
a. Unknown
b. Null
c.Not Applicable
d. Zero
38.Which of the following method waits for the thread to terminate?
a. isAlive()
b.sleep0
c. join()
d. stop()
41.command is used for creating a new group.
a.chgrp
b.chown
c. addgrp
d. groupadd
42.is an attribute specifying a blue background of an element.
a.style="background-color:blue"
b. background = "blue"
c. bgcolor= blue
d. bgcolor=#000000
43.The aim query optimization is
a. query cannot be optimized to transform a query written in a high-level language(SQL) into a low-level
language (the relational algebra)
b.to check that the query is syntactically and semantically correct
c. to choose an efficient execution strategy that minimizes resource usage.
44.What command will enable you to view the router's active NAT translations?
a. Router#show nat translations
b. Router#show ip nat translations
c. Router#show translations nat
d.Router#debug ip nat translations
45.Which of the following is false to compiling and executing an app with multiple classes?
a.The javac command can compile multiple classes at once
b.Simply list the source-code filenames after the command with each filename separated by a space from
the next
c. If the directory containing the app includes only one app's files, you can compile all of its classes with
the command javac *.java
d. The asterisk (*) in java.* indicates that all files in the current directory ending with the filename
extension "java" should be compiled
46.What dynamic routing protocol has the least amount of overhead??
a. OSPF
b. BGP
c. EIGRP
d. RIP
47.Which of these two characteristics of object-oriented programming are the same?
a. Encapsulation and Abstraction
b. Encapsulation and Polymorphism features are the same
c. Inheritance and Encapsulation features are the same
d.Abstraction and Polymorphism features are the same
48.Exactly why it's advised against using VLAN 1?
a. It shouldn't be used for security reasons
b. It cannot participate in VTP transfers
c. It cannot be routed via an SVI
d. It is not a production VLAN
49.Which fiber optic standard utilizes a 50 micron core?
a. STP
b.Multi-mode
c. Single-mode
d. UTP
50.refers a property of computer to run several operation simultaneously and possible as computers await
response of each other.
a. Concurrency
b. Deadlock
C.Backup
d. Recovery
51.Which of the following is not an OOPS idea?
a. Abstraction
b.Exception
c.Encapsulation
d. Polymorphism
52.Which command can be used on a Windows host to display the routing table?
a. shopw ip route
b. tracert
c. netstat -s
d. netstat -r

53.used on a Windows host to display the routing table?


a. shopw ip route
b.tracert
c. netstat -s
d. netstat -r
a. Can be read by any Learning Domain
b. Is a data a web server saves to your computer's hard disk via a web browser
c. Cannot be retrieved from your computer and returned to the server
d. Can contain any size of alphanumeric information
55.On the darker side of object-oriented design, which of the following risk or issue must not be
considered?
a.Dynamic allocation and destruction of objects.
b.Paging behavior of running applications
c.Encumbrance of classes
d. Users experience
a. Abstraction
b. Exception
c.Encapsulation
d. Polymorphism
56.One is a relational algebra operation specifically developed for a relational database
a.Select
b. Union
c.Intersection
d. Set difference
57.is a set of instructions that cause a site's security policy to be violated.
a. Malicious logic
b. Virus
c. Adware
d. Worm
58.Which of the following array methods combines two arrays?
a. Join
b. Combine
c. concat
d. Split
59.Which of the following keywords provide iterative control flow?
a.for
b.if statement
c. switch statement
d.break

60.Which of the following is true when you analyze relationship between superclass and subclasses?
a.A subclass can access the members of its superclass, and it can also access non-private members.
b. Every object of a superclass is also an object of that class"s subclass. However, a superclass object is
not an object of its class's subclasses
c.A superclass method can be overridden in a subclass to declare an appropriate implementation for the
subclass.
d. A subclass cannot invoke a constructor of its superclass by using the keyword super, followed by a set
of parentheses containing the superclass constructor arguments. This must appear as the first statement in
the subclass constructor's body.
61.When looking from the outside edge of an HTML element and moving to inside the edge, what order
does th padding, margin, and border occur in?
a. border, padding, margin
b. padding, border, margin
c. margin, border, padding
d. margin, padding, border
62.Which one of the following is the benefit of object one
a. Reduce reusability of software components
b. Appeals to the working of human cognition
c. Leads to systems that are less resilient to change Increase development risk
63.What command may be used to alter the default permissions for files and directories when they are
created?
a.Chmod
b. Chgrp
C.Chown
d. Umask
64.Color: green
mechanism to the styl
home warning p.message (color: yellow;)
body#home div#warning p.message (color: blue;)
#warning p.message (color: white;)
a. Green
b. Yellow
c. Blue
d. Blue
65.les, late collision, deferred
• lost carrier, carter
wtffer fattures, output buffers swapped out
a The interface is operating nominally
b. The interface is shut down
c. The interface is negotiated at half-duplex
d. The cable is disconnected for the node
66.What will be the possible built-in functions to be used to checking the age value to be numeric and
greater than 18 and displays an alert message "Not eligible to vote" if any of the above mentioned
validations are false?
a. alert(), document.write(),isNaN(
b. alert(), isNumeric(),isNull().parseInt()
c.alert(), document.write(),isNull(),parseInt()
d. alert(), isNaN(),parseInt()
67.What holds true for logical and physical topologies?
a. Physical topologies show each network's IP addressing method
b. Physical topologies are focused on the frame transfer mechanisms used by a network
c. Physical and logical topologies are typically the same
d. Logical topologies describe how a network moves information across devices
68.The default property for a text box control is
a. Password char
b. Text
c.Multiline
d. Enable
a. when opening programs stored on a hard drive.
B. to change how objects look and feel.
c. to set program related options like Program Name, Program Location, etc.
d. to allow the developer to graphically design program components.
69.list all caties where there is both a branch office and at least one property rent.
a. Taty (Branch)-city (PropertyForRent.)
b. Teity (Branch) U city (PropertyForRent)
c. Teity (Branch)city (PropertyForRent)
d. city (Branch) city (PropertyForRent

70.database is known as
a.Derived Attribute
b. Complex Attribute
c. Composite Attribute
d. Multi-Valued Attribute
71.You have been troubleshooting a laptop for an hour are
a. Establish a plan of action to resolve the problem
b. Verify full system functionality and implement preventive measures
c. Test the theory to determine cause
d. Document findings, actions, and outcomes
a. way (Branch)-Raty (PropertyPortent)
b. Felty (Branch) Uwaty (PropertyForRent)
c Way (Branch) bd wety (Property ForRent)
d. Fatty (Branch) waty (PropertyForRent)
72.What is the most common reason for an unexpected reboot?
a. Overheating
b. Memory leak
c. RFI
d. ESD damage
73.You are choosing an optical drive format for a client. Which optical disc format supports a data
capacity of 25 GB
a. Double-sided, single-layer DVD-R
b. Double-sided, double-layer DVD+R
c. Double-sided, single-layer DVD+R
d. Single-sided, single-layer Blu-ray Disc
74.Which of the following class serves as the superclass for all exception type classes?
a. String
b. Catchable
c. Throwable
d. RuntimeExceptions
75.After renaming VLAN 3, you wish to now, double-check your changes. How will you validate the
name change usinga command?
a. Switch#show interface vlan 3
b. Switch#show run
c. Switch#show vlan id 3
d. Switch#show vlans
76.Which of the following is not e cominerce applications?
a. Durpel e-commerce
b. Wordpress
c Magento
d. CubeCart
77.Project portfolio management addresses addresses goals of an organization, while project management
goals.
a. tactical, strategic
b. strategic, tactical
c. internal, external
d. external, internal
78.What will be
Dit word result As Sing
word = "Ethiopia
result = Rotate(word)
when the button is clickedr
result = Rotate(result & word)
result = Rotate(result)
txtBox.Text
result
End Sub Function
Rotate(ByVal var As String) As String
Dim varlength As Integer
varlength = var.Length
Return var.Substring(1) & var.Substring(0, 1) End Function
a. Ethiopia Ethiopia
78.One of the following as a reason that the Ethernet protocol uses physical addressest
question
Oe. It creates a differentiation Od. It uniquely identifies devices at layer 2.
tween layer 2 and layer 3 communications
Which it the flowing
which is ago 50s
Ob 20010BBCAFE:8000:750
Oc
2001:DB8:CAFE:2000:/50
Od. 2001:DB8:CAFÉ::/50
Time lett 2:02:28
Newark ib among the new subnets if borrow 2 bits from 2001:088 CAFE-48
DJ
DELL
Next ques
on
Project management software helps you develop a resources, and allocating costs.
which serves
for mating t
O a deliverable
O b. schedule
Oc work breakdown structure
O d. project plan
Next que
svg

n
android devices
O a. MySQL
O b. MonogDB
O c. SQLite
oid by default and e
B
O d.
Oracle
Exam
Next question

svg

O a.
when opening programs stored on a hard drive.
O b.
to change how objects look and feel.
O c.
to set program related options like Program Name, Program Location, etc. O d. to allow the developer to
graphically design program components.
on
10
Next question
svg
13
The Properties window plays an important role in the development of Visual Basic applications. It is
mainly used
d
out of
O b.
to change how objects look and feel.
question
O c.
a. when opening programs stored on a hard drive.
to set program related options like Program Name, Program Location, etc.
O d.to allow the developer to graphically design program components.
O a. MainActivity
O b. activity_main.xml
O c. Activity
O d. AndroidManifest.xml
If you play music as a background (service), which of the following is not a state in the service lifecycle?
O a. Running
O b. Destroyed
O c.Start
Od. Paused
sed on object-oriented application, which one of the following is a part of the notation of object-oriented
desig ed to show the allocation of processes to processors in the physical design of a system?
O a. real-time process
O b. process diagram
O c. reactive process
O d. process architecture
is a powerful tool of object-oriented analysis; and can be used to drive the process of classical
analysis, behavior analysis, and Learning Domainanalysis.
a.Measurement
b. Scenarios
c. Hierarchy
d.Documentation
a. MainActivity
b. activity_main.xml
c. Activity
d. AndroidManifest.xml
If you play music as a background (service), which of the following is not a state in the service lifecycle?
Oa. Running
b. Destroyed
c.Start
d. Paused
based on object-oriented application, which one of the following is a part of the notation of object-
oriented desig ed to show the allocation of processes to processors in the physical design of a system?
a. real-time process
b. process diagram
c. reactive process
d. process architecture
is a powerful tool of object-oriented analysis; and can be used to drive the process of classical
analysis, behavior analysis, and Learning Domainanalysis.
a.Measurement
b. Scenarios
c. Hierarchy
d.Documentation

You might also like