2 Tir 2017 CS exit exam question
2 Tir 2017 CS exit exam question
A. 1 B. 2 C. 0 D. 3
2. What would be the output of the following JavaScript code?
<script type = "text/javaScript">
x=4+"4";
document.write(x);
</script>
A. 4 B. 44 C. 8 D. the code contains an error
3. Everything is a/an ------ in html DOM?
A. element B. attribute C. node D. array
4. One of the following is not properties of an algorithm?
A. input and output B. finite C. correct D. ambiguity
5. -----would be more suitable to store items in a shopping cart to be available when the user
revisits the site in a couple of a days?
A. session B. basket C. cookies D. cache
6. What is the name given to built-in function in assembly code?
A. func B. cache C. register D. mnemonics
7. Which SQL command used to retrieve data from a database?
A. INSERT B. DELETE C. SELECT D. UPDATE
8. In PHP, which function initiates a session?
A. session_start B. start() C. s_start D. session_str
9. which one of the following is the lowest level in computer architecture
A. Assembly language B. Hardware
C. Machine language D. Programming language
10. Which of the following is not best to express Algorithms
A. Pseudo code B. Flowchart
C. Programming language D. Natural language
11. One is odds
A. local area network B. metropolitan area network
C. large area network D. wide area network
12. One of the following is not the main advantage of multiprogramming?
A. Attempt to increase CPU utilization by always having something for the CPU to
execute.
B. Coping ones programs or data using system resources (CPU, memory, disk space,
peripherals) without proper accounting
C. The CPU switches from program to program, running each for tens or hundreds of
milliseconds. This provides economical interactive use of a system.
D. Makes efficient use of the CPU by overlapping the demands for the CPU and its I/O
devices from various users
13. Which one of the following tags is used to represent paragraphs?
A. <pg> C. <p>
B. <ph> D. <par>
14. One of the following is not properties of an algorithm?
A. Input and output C. correct
B. Finite D. ambiguity
15. One of the following key ideas wrongly matched in object-oriented?
A. Method- an action performed by an object.
B. Class- does hold any values of the objects attributes
C. Attribute- description of objects in a class
D. Object- usually a person place or thing
16. Consider an implementation of unsorted singly linked list suppose it has its representation
with a head and tail pointer. Given the representation, which of the following operation
can be implemented in O(1) time?
i) Insertion at the front of the linked list
ii) Insertion at the end of the linked list
iii) deletion of the front node of the linked list
iv) deletion of the last node of the linked list
A. I and III C. I, II and IV
B. I, II and III D. I and II
17. When an input will be accepted by a Turing Machine?
A. If it reaches any state and has no possible move from an input symbol
B. If the machine enters into an infinite loop
C. If the machine halts in a final state
D. If the machine consumes all the input symbols in one of the states
18. In knowledge representation (KR) how we do represent “how to drive a car”?
A. Procedural knowledge C. information knowledge
B. Declarative knowledge D. transition knowledge
19. Which of the following is not a principle of OOP?
A. Concurrency C. inheritance
B. Abstraction D. encapsulation
20. Which ACID property ensures that a transaction either completes in its entirety or has no
effect at all?
A. Atomicity C. durability
B. Consistency D. isolation
21. Which one of the following is not a principle of system administration?
A. Simplicity C. communication
B. Request-based D. automation
22. A grammar has the following productions: A aB|bA|bBa B bB|cA|b which
one of the following strings is in the language generated by the grammar?
A. bbbbcbbbbcab
B. bcbbbcabbcbaa
C. acbcbbbbcaba
D. abbcabbcbbbcbbaca
23. What is the term used to describe a blueprint for creating object in OOP?
A. Class C. object
B. Method D. instance
24. Which SQL command is used to delete a table from a database?
A. REMOVE TABLE C. DROP TABLE
B. DELETE TABLE D. ERASE TABLE
25. Which function of a contemporary operating system focused on providing users with easy
access to applications and resources?
A. User interface management C. process management
B. File management D. device management
26. The data structure used in the standard implementation of Depth First Search is---------.
A. Array C. Queue
B. Linked list D. stack
27. How does AI contribute to gaining insight into human intelligence?
A. By relying solely on predetermined rules and algorithms
B. By replicating human cognitive processes exactly
C. By disregarding the complexities of human cognition.
D. By analyzing large datasets to uncover patterns and correlations
28. Which data structure allows deleting data element from front and inserting at rear?
A. Queues B. stacks C. Deques D. binary search tree
29. What is a foreign key in a relational database?
A. A field in one table that refers to the primary key in another table
B. A key used for indexing primary keys
C. A key used for encryption purposes
D. A key used for accessing external data sources
30. Which among the following measures how strongly the elements within a module are
related?
A. Cohesion C. aggregation
B. Coupling D. inheritance
31. Which of the following is uniformed (Blind) search?
A. Heuristic functions C. BFS
B. Hill climbing D. greedy search
32. Which one of the following commands is used to test reachability of hosts?
A. Tcpdump C. Netstat
B. Traceroute D. Ping
33. Which one of the following statements is true?
A. TCP/IP model has seven layers while OSI model has four.
B. OSI model provides clear distinction b/n services, interfaces and protocols while
TCP/IP model doesn’t.
C. The transport layer in OSI model is connection oriented and connectionless
D. The transport layer in TCP/IP model is connection oriented only
34. Which of the following is a correct statement?
A. System threat is a state which expose the system from possible attacks
B. Vulnerability is a flaw in the systems design that may be exploited by attackers
C. System protection is a process of disconnecting the system from any communication
D. System attack is set of activities that may expose the system from possible dangers
35. What is the main advantage of using references (&) in C++ compared to pointers?
A. Reference can be dynamically allocated
B. Reference cannot be null
C. Reference can be access arbitrary memory location
D. Reference are more memory-efficient
36. What is encapsulation in OOP?
A. Composition C. polymorphism
B. Inheritance D. data hiding and abstraction
37. In PHP, ------are predefined variables that are accessible throughout your script.
A. Reserved variables C. predefined variables
B. Super global D. global variables
38. What is the term used to describe the collection of information stored in the database at a
particular moment?
A. Schema C. primary key
B. An instance D. foreign key
39. What does the term “algorithm” refer to in the context of computer programming?
A. A function that performs a specific task
B. A set of rule or instruction for solving a problem
C. A variable that holds a single piece of data
D. A programming language syntax
40. Select incorrect statement about database languages?
A. Data manipulation language (DML) is a language that enables users to access or
manipulate data as organized by the appropriate data model
B. DML retrieval of information stored in the database
C. Data definition language (DDL) to specify the database schema
D. DDL specify modification of information stored in the database
41. Which data structure is used to represent the grammatical structure of the source program
constructs?
A. Stack B. tree C. Queue D. 2d-array
42. Is the process of arranging the elements of a particular data structure in some logical
order?
A. Insertion B. merging C. traversing D. sorting
43. What are the factors to be considered when planning a software development effect?
A. People, problem, productivity, performance
B. People, problem, product, portability
C. People, problem, product, process
D. Performance, problem, product, planning
44. Which one of the following is not unique for every computer in the network?
A. MAC address B. IP-v6 address C. Subnet mask D. IP-v4 address
45. In which network topology does every node on the network is connected through a
central device called hub or switch?
A. Ring B. bus C. mesh D. star
46. Which way to define scope of software project?
A. Define deliverable, functionality, data and technical structure
B. Complexity and risk of the project
C. Define non-deliverables and non functionality
D. Define error and functional dependence of the project
47. Which OOP principle emphasizes the separation of concerns by dividing a program into
smaller, manageable parts?
A. Encapsulation B. Modularity C. Inheritance D. Abstraction
48. What dose ACID stands for in database transactions?
A. Advanced constraints for improved data
B. Atomicity, consistency, integrity, durability
C. All columns indexed and defined
D. Automated control of inconsistency data
49. The data structure required for breadth first traversal on a graph is:
A. Stack B. tree C. Queue D. array
50. What is the primary object of reinforcement learning in artificial intelligence?
A. To categorize data into predefined classes or clusters
B. To identify patterns and correlations in data
C. To maximize cumulative reward through sequential decision-making
D. To mimic human decision-making processes
51. Which class of grammar is used for syntax analysis?
A. Non-recursive grammar
B. Recursive grammar
C. Regular grammar
D. Context free grammar
52. In asymmetric cryptography, the message is encrypted using----------.
A. Senders public key
B. Receivers public key
C. Receivers private key
D. Senders private key
53. Which of the following is best description of database?
A. A collection of unrelated files
B. A collection of random data
C. A collection of data organized in a specific structure
D. A collection of related files
54. Which backup strategy tries to backup only the modified files?
A. Partial backup
B. Full backup
C. Incremental backup
D. Full dump
55. Which programming paradigm emphasize down problems into smaller, reusable
components known as functions or procedures?
A. Imperative programming
B. OOP
C. Procedural programming
D. Functional programming
56. ----------is a special purpose program or command line that read commands typed by a
user and execute programs in response to entered commands.
A. Shell B. kernel C. terminal D. process
57. What is the primary purpose of a variable in computer programming?
A. To create graphical user interfaces (GUIs)
B. To execute conditional statements
C. To define functions
D. To store and manipulate data
58. Which of the following are not software characteristics?
A. Maintenance is without spare part
B. Software is complex
C. Software is intangible
D. Manufactured
59. Which one of the following places our java script code?
A. In any tag as an attribute
B. In the <head> tag
C. In external files
D. In the <body> tag
60. Which type of database replication offers the highest level of data consistency but may
introduce higher latency in distributed systems?
A. Semi-synchronous replication
B. Asynchronous replication
C. Synchronous replication
D. Multi-master replication
61. Which condition in a resource allocation system refers to a situation where a set of
processes are waiting for resources held by each other, forming a circular chain?
A. Mutual exclusion
B. Hold and wait
C. No preemption
D. Circular wait
62. How does AI contribute to the study of human behavior and cognition?
A. By limiting its scope to deterministic algorithms
B. By relying solely on philosophical theories of consciousness
C. By disregarding human behavior as irrelevant to AI research.
D. By providing insights through analyzing vast amounts of behavioral data.
63. Which one of the following is not a component of the computer system?
A. The data unit C. the input unit
B. The storage unit D. the control unit
64. Which of the following class of running time functions is the best?
A. Polynomial C. linear
B. Logarithmic D. Exponential
65. If a problem can be broken into sub-problems that are reused several times, the problem
possesses---------------property.
A. Greedy
B. Optimal substructure
C. Overlapping sub-problems
D. Memorization
66. Which of the following access control services determines what a subject can do?
A. Audit C. Authorization
B. Accountability D. Authentication
67. What does DOM stand for in HTML?
A. Document Object Model
B. Document Oriented Management
C. Document On Load Model
D. Document Oriented Model
68. ---------------is an operation of in which each letter of a plaintext changes its position but
retains its identity in cryptographic algorithms.
A. Mono-alphabetic C. Transposition
B. Block cipher D. Substitution
69. What is the command used to change permission of a file for different users?
A. Perm C. Permission
B. Modify D. Chmod
70. Brute-force attacks are used most often against which types of access control?
A. Biometrics and passwords
B. Biometrics and smart cards
C. Passwords and personal identification number
D. Passwords and smart cards
71. Which scheduling algorithm ensures that each process gets an equal share of the CPU
time?
A. Shortest Job Next (SJN)
B. First- Come, First-Served (FCFS)
C. Round Robin (RR)
D. Priority Scheduling
72. Which action of the bottom-up parsing moves terminals from input buffer to the stack?
A. Shift C. Reduce
B. Augment D. Accept
73. Which one of the following is a correct statement?
A. Code optimization can only be done before the actual code is generated
B. Code optimization can be done before on the intermediate code
C. Code optimization cannot be done before the actual code is generated
D. Code optimization can only be done after the actual code is generated?
74. What is the term used to describe the ability of an object to take on multiple forms in
OOP?
A. Polymorphism C. Inheritance
B. Abstraction D. Encapsulation
75. One of the following describes the static structure of a system?
A. Use case diagram C. Class diagram
B. Activity diagram D. Sequence diagram
76. Which of the following is not a characteristic of NoSQL databases?
A. Strict schema enforcement
B. High availability
C. Scalability
D. Flexibility in data models
77. What is the difference between OLTP and OLAP databases?
A. OLTP databases are used for online analytical processing, while OLAP databases are
used for online transaction processing.
B. OLTP database store historical data, while OLAP databases store real-time data
C. OLTP databases are optimized for read-heavy workloads, while OLAP databases are
optimized for write-heavy workload
D. OLTP databases are used for online transaction processing, while OLAP databases
are used for online analytical processing
78. In a healthcare database system, which concept is crucial for ensuring patient data
privacy and security?
A. Data mining C. Data Warehousing
B. Data Encryption D. Data Replication
79. Which one of the following is not a step in merge sort algorithm?
A. Analyze C. Combine
B. Divide D. Conquer
80. Polynomial addition is implemented using which data structure?
A. Stack C. linked list
B. Queue D. trees
81. Which one of the following property of a graph represents the number of derivation steps
needed to generate a valid string?
A. Degree of the vertex C. path of the vertex from the root
B. Parent vertex D. root of the graph
82. One of the following is an example of deduction reasoning?
A. When it rains, the grass gets wet. The grass is wet. It rains.
B. When it rains, the grass gets wet. The grass is wet, it must have rained.
C. The grass has been wet every time it has rained. Thus, when it rains the grass gets
wet.
D. When it rains, the grass gets wet. It rains. Thus the grass is wet.
83. What is the purpose of the switch statement in C++?
A. To define a loop that repeats until a condition is false
B. To declare and define functions
C. To select one of many code blocks to be executed
D. To execute a block of code repeatedly
84. What is the purpose of a loop in computer programming?
A. To execute a block of code repeatedly
B. To declare variables
C. To create user interfaces
D. To define conditional statements
85. Which of the following is true statement?
A. A module having high cohesion and low coupling is said to be functionally dependent
of other modules
B. A functionally dependent module has minimal interaction with other modules.
C. A module having low cohesion and high coupling is said to be functionally
independent of other modules
D. Cohesion is a measure of functional strength of a module
86. Which objective of modern operating systems involves protecting the system and its
resources from unauthorized access and malicious attacks?
A. Maximizing hardware utilization
B. Ensuring security and protection
C. Providing a user-friendly interface
D. Enhancing system performance.
87. Which one is correct about RISC computers?
A. RISC use complex and efficient machine instructions when compared to CISC
B. RISC is with hardware control unit with pipelining processing
C. RISC are with few numbers of register when compared to CISC
D. RISC uses extensive addressing capabilities for memory operations
88. What is the postfix expression for the given infix (2+3)*(4+5) notation?
A. 2+3*4+5 C. 234*+5+
B. 2+34*+ D. 23+45+*
89. Which one of the following is not an attack on password?
A. Eavesdropping C. Logic Bomb
B. Trojan login D. Brute-force attack
90. What is the name of a grammar in which all attributes of the grammar symbols are
synthesized attributes and some form of inherited attributes?
A. L-attributed grammar
B. M-attributed grammar
C. S-attributed grammar
D. I-attributed grammar
91. Which one of the following is a correct statement?
A. Turing machine is the least powerful automata
B. Regular expression is more powerful that FSA
C. Deterministic FSA and non-deterministic FSA are equivalent
D. Pushdown automata and FSA have the same power
92. What is the regular expression for the set of strings that start with ab and end with bba
over the alphabet set (a, b)?
A. ab[a*+b*)bba C. aba*b*bba
B. ab[a+b)*bba D. ab[ab)*bba
93. If an optimal solution can be created for a problem by constructing optimal solutions for
its sub-problems, the problem possesses---------property.
A. Greedy C. Overlapping sub-problems
E. Optimal substructure D. Memorization
94. Which one of the following is not used to determine the CPU state at the end of the
execute cycle?
A. The content of the data bus
B. The content of certain status conditions
C. The content of all processor registers
D. The content of the program counter
95. An operation performed on the contents of a register is known as--------------------.
A. Micro-operation C. Registration
B. Instruction code D. Accumulation