HiLCoE School of Computer Science and Technology Model Exit Exam
HiLCoE School of Computer Science and Technology Model Exit Exam
me/dagmawi_abate
Fundamentals of Programming
A. An array is a collection of data elements where each element has the same data type.
B. The actual memory requirement of an array must be known before the compiler translates the
source code.
2. In a group of nested loops, which loop is executed the greatest number of times?
if (a > b)
if (a < c)
else
if (a== c)
else
else
B. displays "Two" if and only if a and c are equal but b is less than both
F. the code has a syntax error and hence can't be executed at all
4. Assuming an appropriately declared array P and an int variable i initialized to 8, which one of the
following is true on the statement: P[++i] = i++;
5. Which looping statement checks the test condition after executing the statement?
A. for
B. while
C. do-while
12. What will be left on the stack after the following sequence of operations - push(A), push(B),
Push(C), pop(), push(A), push(B), push(C), pop(), pop(), push(B), push(C), pop() are
performed on an empty stack? [read the stack from left (bottom) to right (top)]
A. BABA
B. BCBC
C. ABAB
D. ACAC
13. Given the following main method of a java class, what would be the output when executed? public
class MSCTest(
int x=10;
switch (x) {
default: x++;
System.out.println(x);
A. 13 B. 10
C. 0
D. Compile time error, since there is no break in each of the case statement
B. Objects of the same class must have all attributes/data members listed in the class. C. An object's
data value can be accessed through their reference.
15. Which of the following signature(s) is (are) invalid for the main() method of Java class?
16. Is it OK if a class definition implements two interfaces, each of which has the same definition
A. Yes, since the definitions are the same it will not matter.
D. A and C.
E.None of the above.
20. A 'null' value applied to an attribute implies that
A. The attribute must be either a primary or a foreign key
B. The attribute is critical to database integrity
C. The value of the attribute is known only to the database designer D. The actual value is not
currently significant
21. Which one of the following security mechanisms can be enforced without using a database
management system software?
A. Concurrency control
B. View (virtual table)
C. Firewall
D. Database user authorization
E. None of the above
22. The set of possible values that could be assigned for an attribute is called
A. Entity domain.
B. Candidate attribute.
C. Attribute domain.
D. Alternate key.
E. None of the above.
23. For a database designed using relational data model, which one of the following arguments is not
correct?
A. The order of tuples has impact on performance.
B. Duplicate tuples are not allowed in a relation.
C. Every relation must have a unique identifier.
D. Attributes of a relation can be ordered in any manner.
E. A relation can have more than one super key.
24. Referential integrity dictates that
A. The value of a primary key must appear in a foreign key of the related table. B. The value of a
primary key cannot appear in a foreign key of the related table. C. The value of a foreign key cannot
appear in a primary key of the related table. D. The value of a foreign key must appear in a primary
key of the related table. E. None of the above.
Software Engineering
25. Project indicator enables a software project manager to
A. Detect problem areas
B. track the status of an ongoing project
C. track potential risks
D. All of the above
26. Which of the following diagramming tool does not show the dynamic behavior of a system? A.
Class diagram
B. Communication diagram
C. Sequence diagram
D. Collaboration diagram
E. None of the above
27. What is configuration management in software engineering?
A. Management of the configurable components in a system
B. The identification of the configuration of a system at discreet points in time to control changes to
the configuration
C. Overall management of the design of the system
28. The shortest time in which a project can be completed best describes
A. Slack time.
A. Waterfall model
B. Incremental model
C. Evolutionary model
D. Spiral model
A, Test team.
B. Developer.
C. End users.
Operating Systems
A. A process and its threads share address space, open files, and global variables.
B. Each thread has its own program counter, registers, and a stack.
C. Threads allow multiple executions to take place in the same process environment only when there
are multiple processors.
32. Which one of the following is not true about Process Table or Process Control Block?
B. It is a space on the hard disk used to store all relevant information about running processes. C. It
enables an interrupted process to resume normally.
D. It is used to store information such as process state, program counter, stack pointer, etc.
33. Which one of the following process (CPU) scheduling algorithms is most suitable for interactive
systems?
A. First-Come-First-Served
B, Shortest-Job First
C. Multilevel Queue
D. Round Robin
memory fragmentation?
B. Internal fragmentation is created when the allocated memory is larger than the requested
memory.
35. Which of the following criterion of scheduling algorithms is the most important for interactive
users?
A. Efficiency
B. Response time
C. Turnaround time
D. Throughput
36. Which one of the following is not true about malware (malicious software)?
A. A trojan horse refers to modifying a normal program to do extra (undesirable) things in addition to
its usual function and arranging for the victim to use the modified version. B. A virus is a program by
its own that replicates itself through files.
C. A worm is a program by its own that replicates itself in networks. D. All of the above.
Computer Networking
37. Which of the following is the correct order of the OSI model from top to bottom? A. Physical,
Network, Data Link, Session, Transport, Application, Presentation B. Application, Presentation,
Session, Transport, Network, Data Link, Physical C. Physical, Data Link, Network, Transport, Session,
Presentation, Application D. Application, Session, Presentation, Transport, Network, Data Link,
Physical
38. A subnet mask is a bit pattern that specifies which portion of the IP address represents a Subnet
Address. Which of the following is true about TCP/IP subnet masks?
A. They are used to mask the portion of the IP address so that TCP/IP can distinguish the
Network ID from the Host ID.
B. They are used to mask a portion of the IP address so that TCP/IP can distinguish the WINS server
address from the Default Gateway address.
C. They are used to mask a portion of the IP address so that TCP/IP can distinguish the DNS address
from the host address.
D. Subnet mask is a 32 bit binary number with a stream of x binary 0 bits followed by a stream of 32-x
binary 1 bits.
A. A dedicated physical path between the sender and the receiver is required. B. All packets belonging
to the same message travel through the same route.
C. All packets belonging to the same message arrive in their order of transmission by the
source.
A. 64 bits
B. 128 bits
C. 4 bits
D. 32 bits
E. 16 bits
C. A MAC address filter that specifies the time that a NIC will try to negotiate a connection speed
before resetting the port.
42. Which of the following connection methods would not be used to connect devices between two
different offices?
Web Technologies
A. The use of SCRIPT tags in line with the HEAD and BODY tags.
The embedding of scripting instructions within certain HTML tags. C. The addition of the INLINE tag
within the controlling HTML. D. Referring to a style stored in other place.
A.
It allows configuration for an entire web site from just one external file. B. It results in smaller web
pages.
C.
It separates formatting from the actual content of the page. D. None of the above.
45. Which of the following correctly describes the "well formed" concept of an XML document?
C. An XML document must contain one or more elements and root element must contain all other
elements.
B. It allows client application to request for resource without waiting for the response of another
application that had requested and share TCP connection
C. It forces each object in a page to create three way handshake TCP connection to get
resource
47. Which one of the following information is not contained in HTTP replies message?
A. Server
B. B. Connection
C. Host
D. D. Content type
A. GET displays the form element values as query string in the URL of the address bar where
B. POST displays the form values entered in the URL of the address bar whereas GET does
not.
C. There is no difference
1. B. The actual memory requirement of an array must be known before the compiler translates the
source code.
3. F. the code has a syntax error and hence can't be executed at all
5. C. do-while
7. C. 13
8. A. Tree
9. C. Linked List
11. B. Stack.
12. D. ACAC
13. A. 13
16. C. No, if a class implements several interfaces, each constant must be defined in only one interface.
17. A. Minimizing the coupling between classes is one of the best design principles
21. C. Firewall
24. A. The value of a primary key must appear in a foreign key of the related table.
27. B. The identification of the configuration of a system at discreet points in time to control changes
to the configuration
31. C. Threads allow multiple executions to take place in the same process environment only when
there are multiple processors.
32. B. It is a space on the hard disk used to store all relevant information about running processes.
34. C. External fragmentation is a condition in which total memory space exists to satisfy a request,
but it is not contiguous.
36. B. A virus is a program by its own that replicates itself through files.
38. A. They are used to mask the portion of the IP address so that TCP/IP can distinguish the Network
ID from the Host ID.
40. D. 32 bits
42. D. Infrared
46. E. None of the above. (HTTP 1.1 does not have a specific feature mentioned in the options)
In this channel, I post Computer Science (Comp Sci), So ware Engineering (SWENG), Ar ficial Intelligence (AI),
Informa on Technology (IT) and Data Science (DS) MSc. files for my brilliants, 'cause I love them.
✅ YouTube▶: www.youtube.com/dagmawiabate
✅ LinkedIn : www.linkedin.com/in/dagmawiabate
✅ Instagram : www.instagram.com/dagmawi.abate || www.threads.net/dagmawi.abate
✅ TikTok : www. ktok.com/@dagmawiabate
✅ Twi1er : www.twi1er.com/dagmawiabate
✅ GitHub : www.github.com/dagmawiabate
✅ Snapchat : www.snapchat.com/@dagmawi.abate
✅ Telegram✈: www.t.me/dagmawi_abate