0% found this document useful (0 votes)
35 views

Comprehensive Solution

The document discusses several topics related to databases, artificial intelligence, operating systems, object-oriented programming, data communication networks, object-oriented analysis and design, software engineering, information systems auditing, and data processing. Some key points include: transitive dependencies in databases, concurrency control, normalization to reduce redundancy, heuristics for problem solving without exact solutions in AI, interrupts to improve processing efficiency in operating systems, encapsulation and abstraction in OOP, flow control in data networks, use case analysis in OOAD, and interface testing in systems auditing.

Uploaded by

Anas Anwaar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Comprehensive Solution

The document discusses several topics related to databases, artificial intelligence, operating systems, object-oriented programming, data communication networks, object-oriented analysis and design, software engineering, information systems auditing, and data processing. Some key points include: transitive dependencies in databases, concurrency control, normalization to reduce redundancy, heuristics for problem solving without exact solutions in AI, interrupts to improve processing efficiency in operating systems, encapsulation and abstraction in OOP, flow control in data networks, use case analysis in OOAD, and interface testing in systems auditing.

Uploaded by

Anas Anwaar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

DBMS

1. A transitive dependency is a functional dependency between two or more non-key attributes.

2. Concurrency control ensures data integrity when updates occur to the database in a multiuser
environment.

3. A union query is combines the output from multiple queries and must include the same number
of columns.

4. The relational data model consists of data in the form of tables.

5. The confusion created by data redundancy makes it difficult for companies to integrate data
from different sources.

6. Network data model depict logically as many to many relationships.

7. A data analysis techniques that organizes data attributes such that they are grouped in non
redundant, stable, flexible and adaptable entities is known as Normalization.

8. The data dictionary is automated repository that stores information about data elements and
data characteristic.

9. The candidate key that will be most commonly used to uniquely identify a single entity instance
is a primary key.

10. A primary/unique key of one entity that is contributed to another entity to identify instances of a
relationship is known as the foreign key.

ARTIFICIAL INTELLIGENCE

11. The best way to resolve a problem that may not have an exact solution is heuristic search.

12. The complexity of the search can be reduced with alpha beta pruning.

13. Production system consist of set of rules, working memory and recognize act cycle.

14. Data driven search begins with the problem description and infers new knowledge from the
data.

15. Neutral network is a knowledge representation technique that consist of agent, object,
instrument, location and time.

16. Knowledge engineer ,domain expert and end users are involved in building expert system.

17. Fundamental properties of intelligent agent include autonomous and proactive behavior.

18. Case frames consist of two processing phases known as retrieving phase and learning phase.

19. The ability to encode historical knowledge directly to avoid past error and to explore past
success is the advantage of case based reasoning.
20. Supervised learning is a machine learning technique for learning a function from training data.
The training data consist of pairs of input objects and desired outputs.

Operating Systems

21. Interrupts are provided primarily as a way to improve processing efficiency.

22. The larger memory capacity is resultant smaller cost per bit.

23. Memory table are used to keep track of both main and secondary memory.

24. Program is a set of data locations for local and global variables and any defined constants.

25. User level threads are very efficient because a mode switch is not required to switch from one
thread to another.

26. Mutual Exclusion techniques can be used to resolve conflicts such as competition for resources
and to synchronize processes so that they can cooperate.

27. Semaphore Are used for signaling among processes and can be readily used to enforce a mutual
exclusion discipline.

28. In paging each process is divided into relatively small, fixed size pages where segmentation
provides for the use of pieces of varying sizes.(Not confirm)

29. The least recently used policy replaces the page in memory that has not been referenced for the
longes time.

30. Optimal page policy is impossible to implement.

OOP

31. Object oriented programming is a technique to think real world in terms of object.

32. Encapsulation is a process of hiding all the internal details of an object from the outside of the
world

33. The relationship between customer and sales object is association where each customer has
sales.

34. Abstract class is a design concept in program development and provides a base upon which
other classes are built.

35. By default all interface elements are public.

36. Interface can have inheritance chain (TRUE)

37. Operator overiding provides a way to defined and use operators such as +,- and / for user-
defined classes or structs.

38. In order to cleanup unmanaged resources we should implement IDisposable.


39. The identification of which polymorphic methods are being called by the object must then be
differed until run time; this is known as overloading.

40. Structures do not require constructor. (True)

DCN
41. The term best-effort delivery means that IP provides no error checking or tracking, IP assumes
the unreliability of the underlying layers and does its best to get a transmission.

42. The IPv4 header field formerly known as the service type field is now called the differential
services field.

43. In path vector routing, we assume that there is one node (or more) in each autonomous system
that acts on behalf of the entire autonomous system.

44. A graft message tells an upstream router to start sending multicast messages for a specific group
through a specific router.

45. In SCTP no other chunk can be carried in a packet that carries an INIT chunk.

46. Flow control regulates the amount of data a source can send before receiving an
acknowledgement from the destination.

47. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the dynamic ports.

48. In a flat name space, a name is assigned to an address. A name in this space is a sequence of
characters without structure.

49. A host with the domain name pit.arc,NASA,gov is on the fifth level of DNS hierarchical tree

50. The man in the middle attack can endanger the security of the Diffie-Hellman method if both
parties are not authenticated to each other.

OOAD

51. The rapid application development model of software development is a good approach when a
working core product is required quickly.

52. The incremental model is a high speed adaptation of the linear sequential model

53. Developers and customers create use case to help the software teams understand how different
classes of end users will use functions.

54. OO domain analysis is concerned with the identification and specifications of reusable classes
within an application domain.

55. Operations are object procedures that are invoked when an object receives a message.

56. The state diagram indicates system reactions to external events.


57. Polymorphism reduces the effort required to extend an object systems by enabling a number of
different operations to share the same name.

58. Entity class takes data pertaining to a business event and translates the data for appropriate
presentation to the user.

59. The condition where the methods and/or attributes defined in an object class can be resused by
another object class is known as encapsulation.

60. A student class and a teacher class may be sub class of a Person class.

Software Engineering

1. Process models are described as agile because they emphasize maneuverability and
adaptability.

2. Debugging Is not testing, but always occurs as a consequence of testing.

3. The testing techniques that requires devising test cases to exercise the internal logic of a
software module is called white box testing testing.

4. The IEEE software maturity index is used to provide a measure of the stability of a software
product as it is modified during maintenance.

5. Speculation, collaboration, and learning are the three framework activities for the adaptive
software development process model.

6. The use of traceability tables helps to identify, control, and track requirements changes.

7. Cohesion Is a qualitative indication of the degree to which a module focuses on just one
thing.

8. Coupling Is a qualitative indication of the degree to which a module connected to other


modules and the outside world.

9. Class testing of object oriented software is equivalent to unit testing for traditional software.

10. Smoke testing might best be described as rolling integration.

I.S AUDIT

1. Authentication is the process by which the system verify the identity of the user.

2. For an online transaction processing system, transactions per second is a measure of


throughput.
3. Attribute sampling methods is MOST useful when testing for compliance ?

4. An independent software program that connects two otherwise separate applications


sharing computing resources across heterogeneous technologies is known as middleware.

5. Regression testing is the process of testing a program to determine if changes have


introduced any errors in the unchanged code.
6. A control that detects transmission errors by appending calculated bits onto the end of each
segment of data is known as a redundancy check.

7. Testing the connection of two or more systems components that pass information from one
area to another is interface testing.

8. The use of statistical sampling procedures helps minimize detection risk.

9. An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the


ownership of intellectual property.

10. An IS auditor assigned to audit a recognized process should FIRST review process chart.

D.P
1. Why should boxing avoided ? It adds overhead .

2. Which of the following are value type ? Decimal and Integer

3. Which of the following statements are true ?

4. Garbage Collector is the form of automatic memory management.

5. Serializable attribute we should add in order to enable a class to be serialized.

6. In short circuit evaluation the second argument is only executed or evaluated if the first
argument does not suffice to determine the value of the expression.

7. A Jagged array is an array whose elements are arrays.

8. When we pass a parameter as ref to a method, the method refers to the same variable and
changes made will affect the actual variable. False

9. We can’t force garbage collector to execute. True

10. Using generic collection classes provides increased type-safety and in some cases can
provide better performance.

You might also like