0% found this document useful (0 votes)
29 views

Model

1. Margin height is used to specify space between the top and bottom of a frame border and its contents. 2. Supply chain management applications can help organizations gain competitive advantages and provide substantial returns by streamlining workflows, increasing productivity, accelerating product development, and streamlining costs across supply networks. 3. The set cookie() function must appear after the <html> tag.

Uploaded by

Ayine Neba
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Model

1. Margin height is used to specify space between the top and bottom of a frame border and its contents. 2. Supply chain management applications can help organizations gain competitive advantages and provide substantial returns by streamlining workflows, increasing productivity, accelerating product development, and streamlining costs across supply networks. 3. The set cookie() function must appear after the <html> tag.

Uploaded by

Ayine Neba
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

To specify space between the top and bottom of frame border and its contents we use:
A. Margin weight B. Scrolling C. Margin height D. Frame border
2. Supply chain management application can help organization to gain competitive advantage and
provide substantial pay back by:
A. Streamlining workflow and increasing employee productivity
B. Accelerating product development
C. Streamlining cost and creating efficiencies across the supply network
D. All
3. Which one of the following statement is wrong about cookies?
A. A cookie is often used to identify a user
B. A cookie is a small file that the server embeds on the user’s computer
C. The set cookie() function is used set a cookie
D. The set cookie() function must appear after the <html> tag
4. What is new subnet mask for 192.168.10.0/28
A. 255.255.255.255 B. 255.255.252.0 C. 255.255.255.240 D. 255.255.254.0
5. __________ is the technique of making the fields in a class private and providing access to the field
via public?
A. Encapsulation B. Polymorphism C. Object D. Methods
6. Which one of the following is wrong about instance variable?
A. Instance variables can be accessed from inside any method, constructor or blocks of that
particular class.
B. Instance variables are variables within a class but outside any method.
C. Instance variables are instantiated when the class is loaded.
D. Instance variables defined inside methods, constructors or blocks.
7. Under which types of access control, the owner can set any desired permissions?
A. The discretionary access control model (DAC)
B. Authentication
C. The mandatory access control model (MAC)
D. The role-based access control model (RBAC)
8. Which one of the following is valid naming of identifiers?
A. 1programming B. #programming C. programming D. _programming
9. Segmentation is responsibility of:
A. Network layer B. Transport layer C. Session layer D. Application layer
10. Which one of the following are enterprise application challenges?
A. Make applications more flexible
B. Technology changes
C. Highly expensive to purchase and implement enterprise applications
D. Business process changes
11. In HTML which one of the following is an empty tag that contains attributes only and it has no
closing tag? A. <p> B. <head> C. <body> D. <img>
12. Let EMPLOYEE entity contain SECRETARY, INSTRUCTIOR, MANAGER and TECHNICIAN entity,
which one of the following is true about their relationship?
A. Every entity that is a member of one of these subgroupings is also an employee.
B. Every entity that describe under EMPLOYEE entity is super class of all entity
C. Entity of the subclass represents the same real-world entity as some member of the
superclass
D. Each of these subgroupings is called subclass or subtype of the EMPLOYEE entity type.
13. ___________ is binding code and data together into a single unit.
A. Abstraction B. Polymorphism C. Inheritance D. Encapsulation
14. All are major drawback of file based system except:
A. Inconsistence C. Data redundancy
B. Separation of isolation of data security D. Data independence
15. In ER model which one the following is true about Weak Entity?
A. No total participation
B. Existence is not depend on any other entity
C. Weak entity do not have key attribute and are dependent on parent entity
D. Represented by single rectangle in entity relationship diagram.
16. In entity relationship diagram, relationship between entity is describe by:
A. Diamond symbol B. Triangle symbol C. Rectangle symbol D. Ellipse symbol
17. Which one of the following is wrong about relational operation?
A. <Checks if the value of the left operand is less than the value of right operand, if yes then
condition becomes true.
B. >Checks if the value of the left operand is greater than the value of right operand, if yes then
condition becomes true.
C. != Checks if the values of two operands are equal or not, if values are equal then condition
becomes false.
D. == Checks if the values of two operands are equal or not, if no then condition becomes true.
18. All are tool or techniques to develop schedule for the project except:
A. PERT analysis B. Critical path analysis C. Gantt charts D. Pareto analysis
19. Among characteristics of big data, which one refers heterogeneous sources and the nature of
data, both structured and unstructured.
A. Variability B. Variety C. Veracity D. Velocity
20. In JavaScript, which method helps to access HTML elements by Id?
A. getElementByid(id) B. getElemet(id) C. elementById(id) D. getElementByid()
21. Among the main ingredients of information retrieval process, what do evaluation process
shows?
A. Representation of the text
B. Representation of the information need
C. Text surrogate
D. Comparison of the text actually retrieved verses the user expected to retrieve
22. Which of the following encryption algorithms which have excellent security features?
A. DES B. Blowfish C. AES D. RC4
23. It is the type of array in which each element in the main array can also be an array?
A. Associative array B. Function C. Multidimensional array D. Numeric array
24. __________ is the process of giving access rights to different types of users?
A. Data confidentiality B. Authorization C. Accountability D. Authentication
25. Which one of the following is wrong about the scenarios that initiating system or software
development?
A. Because of demand for software is high and rising
B. Sensing new opportunities and technologies
C. Real problem on the day-to-day tasks
D. Looking for effectiveness and efficiency in the organization
26. Which one of the following is wrong about the scenarios that initiating system or software
development?
A. Because of demand for software is high and rising
B. Sensing new opportunities and technologies
C. Real problem on the day-to-day tasks
D. Looking for effectiveness and efficiency in the organization
27. Which one of the following is wrong about variable naming rules in PHP?
A. A variable name should not contain spaces
B. Contain alpha-numeric characters and underscores
C. Start with a letter or an underscore “_”
D. If a variable name is more than one word, it should be separated with a hyphen
28. One of the following is considered as the outcome of system implementation and testing?
A. Working system, test case scenarios and documentation
B. Design level class diagram
C. Collaboration diagram D. Sate chart diagram
29. Which one of the following unintentional threats that can occur in the design of the hardware
and or information system?
A. Computer system failure C. Human errors
B. Environmental hazards D. Hardware malfunction
30. Which one of the following is not project scope management processes?
A. Scope initiation C. Scope planning
B. Scope creation D. Scope definition
31. Which one of the following is listed under category of process-oriented decision support system?
A. Data analysis system C. Optimization system
B. Accounting models D. Analysis information system
32. Which one of the following is super class of every class in java?
A. Interface B. Abstract class C. String array D. Object Class
33. One of the following information is known only by the sender or receiver?
A. Chipper B. Plain text C. Chipper text D. Key
34. With exact match of information retrieval?
A. Result is a ranked list of documents
B. Query specifies precise retrieval criteria
C. Query describes retrieval criteria for desired documentation
D. Every document matches a query
35. Enterprise resource planning(ERP)?
A. Does not integrate well with functional areas other than operations
B. Automates and integrates the majority of business processes
C. Has existed for over a decade
D. Is inexpensive to implement
36. Project manager want to shift the impact of a risk to a third party minimize risk, shifting the
impact of risk into third party is grouped under;
A. Risk mitigation C. Risk transfer
B. Risk avoidance D. Risk acceptance
37. In________ modifiers, class members accessed within this class and within their subclass only.
A. Internal B. Private C. Public D. Project
38. Which one of the following is true about Hierarchical data model?
A. Hierarchical data model only support one to many relationship
B. Organized record in the forms of tree structure
C. Today, Hierarchical data model is widely used in software engineering
D. Hierarchical data model is described by parent child relationship
39. ABC software company wants to tests the entire system as one entity, what type of test ABC
software company will use?
A. Integration system test C. System test
B. User acceptance test D. Unit test
40. Big data is large datasets which can be also defined in terms of the:
A. Volume, velocity and variety C. Importance, usability and availability
B. Volume, verification and value D. Accuracy, quality and quantity
41.

You might also like