0% found this document useful (0 votes)
63 views11 pages

2015 Questions Prepared by CS Department1

This document contains 35 multiple choice questions related to computer science topics like programming, data structures, computer architecture, operating systems and computer networks. The questions cover a wide range of fundamental CS concepts to test overall knowledge.

Uploaded by

Abenezer Tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views11 pages

2015 Questions Prepared by CS Department1

This document contains 35 multiple choice questions related to computer science topics like programming, data structures, computer architecture, operating systems and computer networks. The questions cover a wide range of fundamental CS concepts to test overall knowledge.

Uploaded by

Abenezer Tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Computer Science (Exit Exam Model)

1. Which one of the following is valid identifier?


A. days-in-year C. 1_digit
B. 1digit D. Digit_1
2. What is the output of the following program?
#include<iostream.h>
int main ()
{
int w=11;
int z= ++w + 2;
int y=w-- + 2 ;
cout<< w<<z<<y;
return 0;
}
A. 12 14 14 C. 11 14 13
B. 12 14 13 D. 11 14 14
3. Which one of the following is true in C++?
A. Name of variable is always unique
B. Reserved words can be variable name
C. C++ is case insensitive
D. None
4. In C++, _________ statement terminates the current iteration of a loop and jumps to
the next iteration.
A. Break C. Continue
B. Go to D. Switch
5. Which of the following is a valid function call (assume function name is “funct”)?
A. funct; C. funct();
B. funct x,y; D. int funct();
6. Which of the following is the correct way to declare a pointer?
A. int *ptr; C. int &ptr;
B. int ptr; D. All of the above
7. Which one of the following is low-level programming language?
A. Pascal C. C++
B. Fortran D. Assembly
8. In OOP, all fields or data and methods are contained by classes, this feature of OOP
is known as:
A. Abstraction C. Inheritance
B. Polymorphism D. Encapsulation
9. If class B is sub-class of A, then which of the following is correct?
A. Class A extends B
B. Class B can inherit all members of class A
C. We can use Super () keyword to call the constructor of B
D. None
10. _________ is a constructor that specifies which exception a given method can throw.
A. Throw C. Throws
B. try D. Catch
11. Which of the following is correct about packages in OOP?
A. A package contains a set of related classes
B. You cannot rename a package without renaming the directory
C. Packages act as containers for classes
D. All
12. Which of the following takes place when overriding a method?
A. The new method hides the original method
B. When you override a method, you can call the superclass's copy of the method
by using the syntax super.method().
C. You cannot do super.super. to back up two levels.
D. All
13. Which of the following exception can be categorized under unchecked exceptions?
A. ArrayIndexOutofBounds C. IllegalArgumentException
B. NullPointerException D. all
14. Let say we have a class named “Employee” and if obj is an object of the class, which of the
following is the correct way of creating this object obj for the class Employee?
A. Employee obj= new employee ();
B. Employee obj=new Employee ();
C. Employee obj; Obj=new employee ();
D. employee obj; Obj=new Employee ();
15. Each Boyee-Codd normal form is included in__________?
A. First normal form C. Third normal form
B. Second normal form D. All of the above
16. Which of the following represents the degree of data abstraction that reflects the precise
method by which the data is stored?
A. Conceptual Level C. Physical Level
B. File Level D. Logical Level
17. Which of the following is a top-down strategy where the higher level of the entity can be
split into two lower sub-entities?
A. Aggregation C. Generalization
B. Specialization D. All of the above
18. Changes to the data for some relationships in the database may have unfavourable effects
called______?
A. Referential integrity constraints C. modification anomalies
B. Normal forms D. transitive dependencies
19. Which scenario from the list below involves a DML statement not being executed?
A. When existing rows are modified. C. When a table is deleted.
B. When some rows are deleted. D. All of the above
20. What are the criteria must be fulfilled before a union operator can operate?
A. There must be a common attribute between A and B.
B. A duplicate tuple is automatically discarded.
C. Both A. and B.
D. None of the above
21. The non-key field in physical ordered record files that doesn't have separate values for the
records is labelled as _______?
A. Clustering field C. Linear field
B. Dense field D. Non dense field
22. What does the following command performs?

DELETE FROM STUDENTS


WHERE AGE = 16;
ROLLBACK;
A. Delete the row from the table where age= 16
B. Perform an undo operation on delete operation
C. Delete the entire table
D. None of the above
23. The 2’s complement of the number 1.25 is = ____
A. 1.11 C. 0.11
B. 1.01 D. 0.01
24. Consider two binary numbers 1101100 and 1011001, which shift operation is applied on the
first number to obtain the second number?
A. Left Circular Shift C. Left Logical Shift
B. Right Arithmetic Shift D. Right Logical Shift
25. When second part of the instruction designate an address of a memory word in which the
address of the operand is found such instruction have
A. Direct Address C. Immediate Address
B. Indirect Address D. Index Address
26. For a Half Subtractor with two inputs X and Y, Difference (D) and Borrow (B) are
represented by:
A. D=X+Y, B=𝑋̅Y C. D=𝑋̅Y, B= X+Y
B. D=X+Y, B= XY D. D=X+Y, B=𝑋̅𝑌̅
27. Which one among below given memories is having more access time than others?
A. SRAM C. Magnetic Memory
B. DRAM D. ROM
28. What is the reverse polish notation of the infix expression A*(B+C)-D/(E+F)?
A. ABC*+DEF+/- C. ABC+DEF/+-*
B. ABC+*DEF/+- D. ABC+*DEF+/-
29. Which of the following statement is true, for the evaluating the expression X=A+B in
computers with different instruction formats?
A. II represents the computer with one address instruction formats
B. II represents the computer with zero address instruction formats
C. III and IV represents the computer with three address instruction formats
D. IV represents the computer with two address instruction formats
30. Which one of the following is not basic communication system component?
A. Medium. D. Modulator
B. Message E. Receiver
C. Transmitter
31. One of the following is not End device?
A. Computer D. Routes
B. Smartphones E. None of them
C. Network printers
32. A Computer network allows sharing of the following except?
A. File D. Disk drive/ Storage
B. Printer E. None of them
C. Folder
33. Assume we have given IP address of 192.168.1.0, after this network is breakdown into 8
subnets, how many total bits of subnet mask in prefix?
A. /24 bits D. /31 bits
B. /17bits E. None
C. /27 bits
34. Which category of network covers geographical area such as cities or districts?
A. WAN D. MAN
B. LAN E. None
C. Internet
35. In which type of computers, computation is carried out with physical quantities such as
voltage, length, current, temperature?
A. Analog D. Hybrid
B. Digital E. B and C
C. Microcomputer
36. Which OSI layer provides a reliable mechanism for exchanging of data between two
processes in different computers (end to end)?
A. Application layer C. Network layer
B. Transport layer D. Physical layer
37. Which of the following is not true about binary search tree?
A. The value of the left child should be less than the root node
B. The value of the right child should be greater than the root node
C. The left and right sub trees should also be a binary search tree
D. The value of the left child should be greater than the root node
38. If the elements 'X', 'Y' and 'Z' are inserted in a queue respectively, what is the correct order
for the element removal?
A. ZYX C. YXZ
B. XYZ D. ZXY
39. Which one of the following is not true about binary search algorithm?
A. It is not efficient for large lists
B. It uses the divide-and-conquer technique to search the list
C. The time complexity is O(logn)
D. All
40. Which statement is not clearly stated about array and linked list?
A. A linked list can easily grow and shrink in size
B. The size of array is fixed, but the size of linked list is dynamic
C. The insertion or deletion an element in an array is very fast and easy
D. The insertion or deletion of an element in a linked list is very fast and easy
41. If the size of the stack is 3 and we try to insert the 4th element in the stack then the
condition is known as?
A. Stack Underflow C. Stack Overflow
B. Push D. Pop
42. Algorithms must solve problems with minimum amounts of computational resources such
as time and space. What are these properties called?
A. Correctness C. Generality
B. Efficiency D. Sequence
43. Which one is post-order traversal value of a binary tree by considering the tree given
below:

A. D B G E H I F C A C. A B G E H I F C D
B. D H B E G I F C A D. C B G E H I F D A
44. Which of the following element is used to draw scalable graphics with the help of XML?
A. <svg> C. <img>
B. <canvas> D. All
45. PHP code is always enclosed by?
A. <?php & ?> C. <?php & php?>
B. <?php? & ?/php?> D. <?php and ?/php
46. From “h1, .link, #top-link {font-weight: bold}”, which one is class selector?
A. h1 C. #top-link
B. link D. font-weight
47. Which of the following is valid PHP variable?
A. $email C. _email
B. email D. All
48. Which of the following specifies a shorthand property for setting the border properties in
one declaration?
A. border-color C. border-style
B. border-width D. border
49. Suppose, you want to include CSS in-line with html, embedded in html and externally
linking with html in single html file at the same time. From these which one has highest
priority to be applicable?
A. Inline CSS C. External CSS
B. Embedded CSS D. A & B
50. PHP uses which of the following function to create/drop a MySQL database?
A. mysql_connect B. mysql_query
C. mysql_select D. mysql_set
51. Which of the following is not component of a Process Control Block (PCB)?
A. Code C. Bootstrap program
B. Stack D. Data
52. Which module gives control of the CPU to the process selected by the short-term
scheduler?
A. dispatcher C. scheduler
B. interrupt D. none of the mentioned
53. The interval from the time of submission of a process to the time of completion is ________
A. waiting time C. response time
B. turnaround time D. throughput
54. For a deadlock to arise, which of the following conditions must hold simultaneously?
A. Mutual exclusion C. Hold and wait
B. No preemption D. All of the mentioned
55. To access the services of the operating system, the interface is provided by the_________
A. Library C. Assembly instructions
B. System calls D. API
56. CPU scheduling is the basis of ___________
A. multiprogramming OS C. multiprocessor systems
B. larger memory sized systems D. none of the mentioned
57. For an effective operating system, when to check for deadlock?
A. every time a resource request is made at fixed time intervals
B. at fixed time intervals
C. every time a resource request is made
D. none of the mentioned
58. Which one of the following is a question asked for identifying an Actor during requirement
elicitation?
A. Which events does the actor need to be informed by the system about? With what
latency?
B. What are the tasks that the actor wants the system to perform?
C. Which user groups perform secondary functions, such as maintenance and
administration?
D. Which external changes does the actor need to inform the system about? How
often? When?
E. All
59. One of the following is cause of failure for a software project.
A. poor project estimations
B. Training in project management
C. Regular communication with users
D. Decisions based on several inputs
E. All
60. Which one of the following is a feature of software coding?
A. Compatibility C. Simplicity
B. Modularity D. A and B
E. All
61. Which of the following is not project management goal?
A. Keeping overall costs within budget
B. Delivering the software to the customer at the agreed time
C. Maintaining a happy and well-functioning development team
D. Avoiding customer complaints
62. __________ is the difference between the actual outputs and expected one.
A. Bug C. Error
B. Fault D. Failure
63. The prototyping model of software development is well suited ______
A. When requirements are well defined.
B. For projects with large development teams.
C. When a customer cannot define requirements clearly.
D. None of the above
64. Non-functional requirements are statements of services the system should provide.
A. True B. False
65. The Minimum number of states required to construct NFA with 𝟄 – moves for the regular
expression (a+b)* are
A. 2 C. 8
B. 4 D. 16
66. Consider the Finite State Machine given below

Take a binary number 10100 as an input to the above Finite State Machine and read it
from the Least Significant Bit, the output obtained is the input’s
A. 1’s complement C. The number +1
B. 2’s complement D. The number -1
67. Let Σ be an alphabet and Σ = {a, b}, then all strings of length ‘K’ (K≥1) is denoted by ΣK and
the total number of strings for ΣK is denoted by | ∑𝐾 |. The value of | ∑2 | is
A. {a, b} C. {aa, bb}
B. {aa, ab, ba, bb} D. None of the Above
68. What it represents the regular expression given by (a+b)*aaa(a+b)*, if “*” denotes Kleene
Closure?
A. Strings of a’s and b’s of three consecutive a’s
B. Strings of a’s and b’s of odd length
C. Strings of as and b’s of minimum length 3
D. Strings of as and b’s of starting with a’s and ending with b’s
69. A grammar ‘G’ with all the productions of the form A→Bw and/or A→w, where A, B are
Variables and ‘w’ is a terminal is called a
A. Context free Grammar
B. Context Sensitive Grammar
C. Unrestricted Grammar
D. Regular Grammar
70. Consider a Context Free Grammar G =S→S+S│S*S│a│b and a string w= a*a+b, which of
the following statements are true?
I. The string w does not belong to the grammar G
II. The string w can be derived using right most derivation
III. The string w is ambiguous
IV. The grammar G is ambiguous
V. The string w can be derived using left most derivation
A. I, III, IV C. II, IV, V
B. II, III, IV,V D. III, IV, V
71. Which of the statement are true?
I. Regular Grammar is Type-2 Grammar
II. Push Down Automata Accepts Context Free Grammars
III. An unrestricted Grammar is recognized by the Turing Machine
IV. Type-1 Grammars consists of Context Sensitive Grammars
V. Finite Automata can recognize all types Grammars
A. II, III, IV C. II, III, V
B. I, III, V D. II, III, IV, V
72. While programming can be done in any language, in today’s world which programming
Language has become the go-to language for AI and ML-related tasks due to its vast and
diverse library functionalities.
A. Java C. Python
B. Lisp D. PHP
73. Which of the following is not an application of artificial intelligence?
A. Database Management System C. Digital assistant
B. Computer Vision D. Natural Language Processing
74. If a machine can change its course of action based on the external environment on its own,
the machine is called?
A. Actuators C. Intelligent
B. Preceptors D. Mobile
75. Which one of the following symbols is not logical symbol in Artificial intelligence?
A. Implication C. Conjunction
B. Negation D. Preposition
76. What happens when a Machine Learning model learns the detail and noise in the training
data to the extent that it negatively impacts the performance of the model on new data?
A. Under-fitting C. Weak Learning
B. Over-fitting D. Nothing happens
77. Which type of Machine learning algorithms make predictions on a given set of samples, or
searches for patterns within the value labels assigned to data points.
A. Supervised ML algorithms C. Semi-supervised ML algorithms
B. Unsupervised ML algorithms D. Re-enforced ML algorithms
78. What is the name of a collection of text of similar type, for example, movie reviews, social
media posts, etc.?
A. Vocabulary
B. Preprocessing
C. Corpus
D. Tokenization
79. The symbol table is an essential data structure used by the compiles, which of the following
statements are false with respect to symbol table
I. The symbol Table is used by the compiler to find out whether a variable is
passed by value or passed by reference
II. Error handlers are stored in the symbol table
III. The symbol table reduces the memory consumption
IV. Symbol table is used to resolve the scope issues V. The symbol table is
stored in the object file
A. II, III, IV C. III, V
B. I, II, V D. II, III
80. The LEX file, the LEX program is divided in to how many parts and which delimiter is used
to separate each part
A. 4 Parts, Delimiter is ## C. 3 Parts, Delimiter is %%
B. 3 Parts, Delimiter is && D. 4 Parts, Delimiter is @@
81. What is the FOLLOW(B) of the below given grammar?
S → aBDh
B → cC
C → bC / ∈
D → EF
E →g/∈
F →f/∈
A. {$} C. {g, f, h}
B. {g, h} D. {h}
82. Which of the below given parsers will not starts with the input symbol and constructs the
parse tree up to the start symbol by tracing out right most derivation in reverse order
A. LL(1) C. LALR(1)
B. LR(0) D. SLR(1)
83. In view of Syntax Directed Translation, which of the following statements are true?
I. Grammar + Semantic rules = Syntax Directed Translation.
II. The Syntax directed translation scheme is a Regular grammar.
III. For the production, S→E$, after the syntax directed translation scheme is
applied the semantic rule is {print E.val}.
IV. In the semantic rule, attribute is VAL and an attribute may hold anything like
a string, a number, a memory location and a complex record.
V. Syntax direct translation is implemented by constructing a parse tree and
performing the actions in a right to left depth first order.
A. I, II, III C. I, IV, V
B. I, III, IV D. I, III, V
84. For the below given code snippet, if the compiler automatically replaces the last stamen
with y=(float) x, this type of type implicit type conversion is called
int x = 10; float y; y =x;
A. Type casting C. Type coercion
B. Type assignment D. Type correction
85. Which of the following statements are true about the Intermediate code generation
I) Three-address code is an intermediate code and it is used by the optimizing
compilers
II) Each Three address code instruction has at least three operands.
III) The quadruples have four fields to implement the three-address code.
IV) Intermediate code can be represented High Level code as well.
V) Low level intermediate code is used for machine-in dependent optimizations.
A. I, II, V C. I, III, V
B. II, V, III D. I, III, IV

86. A malicious user in a buffer overflow attack aims to:


A. Overwrite the existing instruction pointer with malicious code
B. Overwrite the existing instruction pointer with a new instruction pointer
C. Overwrite the program stack with NOP instructions
D. Overwrite the program stack with a new instruction pointer
87. Suppose, with help of public key cryptography, S binds a digital signature h to message M
by encrypting (M, h), and finally sends it to R, where it is decrypted. Which one of the
following sequences of keys is used for the operations?
A. Encryption S’s private key then R’s private key
Decryption R’s public key then S’s public key
B. Encryption S’s private key then R’s public key
Decryption R’s private key then S’s public key
C. Encryption S’s private key then R’s public key
Decryption R’s public key then S’s private key
D. Encryption S’s public key then R’s private key
Decryption S’s public key then S’s private key
88. AES uses a __________bit block size and a key size of ________ bits.
A. 128; 128, 192, 256 C. 256; 128, 192, 256
B. 64; 128, 192 D. 128;128, 256
89. Which of the following is has the worst security encryption standard?
A. WPA C. WPA2
B. WEP D. WPA3
90. All of the following are protection methods that firewall uses, except for:
A. Proxy services C. Packet filtering
B. Stateful inspection D. All
91. A security manager is setting up resource permissions in an application. The security
manager has discovered that he can establish objects that contain access permissions, and
then assign individual users to those objects. The access control model that most
resembles this is:
A. Discretionary access control (DAC) C. Access matrix
B. Role based access control (RBAC) D. Mandatory access control (MAC)
92. Palm scan, fingerprint scan and Iris scan are forms of:
A. Strong authentication D. Single sign-on
B. Two-factor authentication E. All
C. Biometric authentication
93. Which of the following option is not correct about hash function?
A. One way property
B. Collision resistance
C. For every arbitrary length of input, it produces fixed length output
D. None
94. The main measures for efficiency of algorithms are?
A. Processor and Memory C. Data and Space
B. Complexity and Capacity D. Time and space
95. Which of the following generates set of possible solutions by eliminating a large number
of candidates which do not satisfy with a given constraints?
A. Brute force B. Back tracking C. Greedy Method D. Prim’s

96. One algorithm is considered as fast algorithm if it has?


A. Highest time complexity C. lowest time complexity
B. Highest space complexity D. Lowest space complexity
97. Which of the following is correct about N-Queens (Q)?
A. No two Q placed on the same row C. No two Q placed on the same column
B. No two Q placed on the same diagonal D. All E. None
98. To color a connected graph which has five vertices, the minimum numbers of colors
required are?
A. 1 B. 3 C. 2 D. None
99. What does the algorithmic analysis count?
A. The number of arithmetic and the operations that are required to run the program.
B. The number of lines required by the program
C. The number of seconds required by the program to execute
D. None of these
100. What happens when the backtracking algorithm reaches a complete solution?
A. It backtracks to the root B. It continues searching for other possible solutions
C. It traverses from a different route D. Recursively traverses through the same route

You might also like