Model Exam 2015
Model Exam 2015
Choose the best answers and put your answers on the separate answer sheet provided.
Part I: Computer Maintenance and Technical Support Questions
1. Which process of the computer checks all your components during boot?
A. CMOS C. BIOS
B. POST D. Lithium battery
A. PGA C. LGA
B. Chipset D. Copper
3. Which of the following components could cause the POST to beep several times and fail
during boot?
A. ext4 C. NTFS
B. exFAT D. FAT32
5. A computer just had a memory upgrade installed. After the computer is booted, it does not
recognize the new memory, even though it is listed as being compatible on the
manufacturer’s website. Which of the following steps should be performed to resolve the
issue?
6. Which of the following is used by the CPU to communicate with system memory?
A. Southbridge C. Northbridge
B. BIOS D. PCIe
7. You just rebooted a PC and it displays a black screen with a white blinking underscore on
the top left. What is the most likely problem?
A. BIOS needs to be flashed.
B. Windows Recovery Environment is running.
C. PC is in Safe Mode.
D. Incorrect boot order.
8. Which component supplies power to the CMOS when the computer is off?
A. L2 C. DRAM
B. L3 D. L1
A. RAID
B. Tape drive
C. Hard drive
D. DVD drive
Part II: Fundamentals of Database Question
1. Which one of the following is FALSE about Relational Database
A. There should be no duplicate tuple in a relation.
B. A single cell can hold multiple values.
C. All the data in a column should be from the same domain
D. In a database having more than one relation, ach relation should have a
relationship with at least one other relation.
2. “The foreign Key value of an attribute must much a value of the primary key column in
the related table or otherwise it must be NULL.” This statement implies for
____________________ constraint
A. Entity Integrity Constraints
B. Referential Integrity Constraint
C. Relationship Constraint
D. Domain Constraint
3. In normalization term, if non-key attribute depends on another non-key attribute the
dependency is called _____________
A. Functional Dependency C. Transitive Dependency
B. Normal Form D. None
4. If a relation doesn’t have functional dependence but it contains transitive dependencies,
the relation is in _______ Normal Form.
A. 1NF C. 2NF
B. 3NF D. NF
5. Which one of the following is a derived attribute?
A. Salary C. Birth_date
B. Age D. Address
Stud_id First_name Last_name Sex CGPA
107 Getachew Yiheyis M 2.82
113 Mesfin Negesse M 3.51
106 Leyla Endris F 3.21
109 Edlawit Amare F 2.37
Table1: Student Relation
6. Given above the relation student, which SQL query is used to select all female students
whose Cummulative_GPA is greater than 3.0.
A. Select sex=’F’ from student where CGPA>3.0
B. Select * from student where sex=’F’ and CGPA>3.0;
C. Select * students from where sex=’F’ AND CGPA>3.0;
D. Select * from student where sex=’F’ & CGPA>3.0;
Given the relation for EMPLOYEE and DEPARTMENT
EMPLOYEE DEPARTMENT
66 W 2 20 I 30
a 0 S 2
b 0
e
l
a
The operator applied to obtain the above table is:
A. Join operator
B. Cross product operator
C. Intersection operator
D. Union operator
1. As you learnt in data communication and networking class there are seven layers for OSI
model. Which one of the following layers is responsible to decide the transmission
protocol?
A. Presentation C. Transport
B. Network layer D. Session
2. 192.168.1.129/26 is IP address from 192.168.1.0/24. 192.168.1.129/26 is?
A. Host address in Subnet3 C. Host address in Subnet1
B. Network id for Subnet3 D. network id for Subnet2
3. Which one of the following multiple access protocol types is deals about no station is
superior to another station and none is assigned the control over another?
A. Controlled access protocol
B. Random access protocol
C. Channelization protocol
D. None
4. You need to subnet a network that has 6 subnets, each with at least 24 hosts. Which
classful subnet mask would you use?
A. 255.255.255.192 C. 255.255.255.240
B. 255.255.255.248 D. 255.255.255.224
5. The network address of 172.16.0.0/20 provides how many subnets and hosts?
A. 8 subnets, 4,094 hosts each C. 8 subnets, 8,190 hosts each
B. 16 subnets, 4,094 hosts each D. 16 subnets, 8,094 hosts each
6. Which of the following if incorrect about TCP?
A. Connection oriented C. Bandwidth reserved
B. Connection establishment D. Connectionless
7. Suppose you and your best friend talks on messaging application and man in the middle
modifies the message. Which one of the network security elements compromised?
A. Confidentiality C. Availability
B. Integrity D. Authentication
8. In Asymmetric key cryptography how can we send the plaintext to receiver?
A. By encrypting the plaintext with receiver private key
B. By encrypting the plaintext with sender private key
C. By encrypting the plaintext with receiver public key
D. By encrypting the plaintext with sender public key
9. Which one of the following types of network topology takes high cables to connect and
redundant paths are built in?
A. Mesh C. Star
B. Bus D. Ring
10. If we say circuit switching is better than packet switching because of?
A. Have overhead C. Fixed bandwidth
B. Dynamic bandwidth D. Transmission delay
A. Sum_ C. Sum/
B. Sum# D. none
A. continue C. goto
B. jump D. break
4. String [] jobs = {“student", “farmer", “engineer",” economist”};
A. NullPointerException C. SocketException
B. IllegalArgumentException D.
IllegalStateException
7. ________ is a type of Exception in which it is usually occur because of
errors programmer cannot control?
A. Unchecked exception C.
NullPointerException
B. Checked Exceptions D. None
8. _________ in Java is an easy-to-use visual experience builder for Java
applications?
A. GUI C. JFC
B. API D. All
9. Answer the question number 9 using the following figure.
A a
A. JMenuBar C. JMenuItem
B. JMenu D. None
________ 10. What is the output of the following program?
class Mango {
String color;
double price;
Mango (String color, double price) {
this.color = color;
this.price = price;
}
Mango (double price) {
this ("red", price);
}
Mango m = new Mango ("yellow", 50.0);
String getColor () {
System.out.println(m.getColor());
return color;}
System.out.println(m.getPrice());
m.setPrice(25.0);
System.out.println(m.getPrice());
System.out.println(b.getColor());
System.out.println(b.getPrice());
b.setPrice(m.getPrice());
System.out.println(b.getPrice());
1. Which one of the following is correct about the difference between system administration
and network administration.
A. System administration is that computer field which involves computer systems and
networks whereas Network administration is the field which involves the operation and
maintenance of computer hardware and software along with network.
B. Network Administrator oversees the network (a group of computers connected together),
while a System Administrator is in charge of the computer systems.
C. A and B
D. None
2. Which statement define the main activities of a Network Administrator
A. Installing and configuring individual workstations
B. Maintaining network documentation
C. Troubleshooting hardware, software, connectivity, and server issues
D. All
A. processor
B. RAM
C. Network adapter
D. all
A. Is the process where a network device, usually a firewall, assigns a public address to a
computer (or group of computers) inside a private network.
B. Is a type of network wherein anyone, namely the general public, has access and through it
can connect to other networks or the Internet.
C. Is any connection within a specified network wherein restrictions are established to
promote a secured environment.
D. A and B
6. Which of the following is the most appropriate scenario where you would want to install a
read-only domain controller?
A. In a branch office where physical security might be less than optimum.
B. In the head office near the receptionist’s desk.
C. In the server room where the forest root domain is located and you need an optimum
location for the schema master and domain naming master.
D. In a branch office server room where you need to place the infrastructure master, RID
master, and PDC emulator close to clients requiring their services.
9. If you wanted to require that a user enter an Administrator password to perform administrative
tasks, what type of user account should you create for the user?
10. You want to create roaming profiles for users in the sales department. They frequently log on
at computers in a central area. The profiles should be configured as mandatory and roaming
profiles. Which users are able to manage mandatory profiles on Windows computers?
A. B.
C. D.
5. Class diagrams are used to represent the structure of a system in terms of:
A. Objects D. Operations
B. Attributes E. All of the above
C. Relationships
A. A is a kind of B
B. B is a kind of B
C. A is part of B
D. B depends on A
E. None of the above
8. From the following is which one is false about the decision node in
activity diagram?
A. Passes control to one of two outputs
B. Is noted as a diamond with one incoming and multiple outgoing
edges.
C. Specifies the direction of the control flow with guard conditions
D. Is noted as an oval shape with one input and one output
9. Which of the following statement is true regarding verification?
A. Performed by an independent test team
B. Checking that we are building the right system
C. Making sure that it is what the user wants
D. Checking that we are building the system right
10. Which of the following specifies how many instances of one class may
relate to a single instance of an associated class?
A. Multiplicity
B. Association
C. Degree
D. None of the above