Software Engineering - Mock Exit Exam 2023l24
Software Engineering - Mock Exit Exam 2023l24
St.Name: _____________________________________
IDNo: _______________________________________
1. Which type of AI agent can improve its performance over time by learning from experience?
A. Simple reflex Agent
B. Utility-based Agent
C. Model-based Agent
D. Learning Agent
ANSWER: D
2. Which of the following searching algorithm guarantees to finding the optimal solution (lowest
cost path) if it exists.
A. Depth-First Search (DFS)
B. Breadth-First Search (BFS)
C. Uniform Cost Search (UCS)
D. Iterative Deepening Search (IDS)
ANSWER: C
3. Compared to Breadth-First Search (BFS), Depth-First Search (DFS) is generally-----
A. More likely to find the shortest path to the goal.
B. More space-efficient for large search spaces.
C. Less likely to get stuck in dead ends.
D. Guaranteed to find a solution if one exists, even in infinite search spaces.
ANSWER: B
4. Suppose we are taking an entity, Abel. Abel is a Software Developer as a profession, and his
age is 26, his weight is 70KG, his height is 1.75 cm, he lives in city Jimma, and the country is
Ethiopia. Which knowledge representation technique would be most appropriate for this
scenario?
A. Logical Representation.
B. Semantic Network.
C. Frame Representation.
D. Production Rules.
ANSWER: C
5. Suppose you are applying for a competitive job on Apple Company. The company uses an AI
system to evaluate applications and select candidates for interviews. How do you feel about
this?
A. AI cannot objectively assess skills and qualifications.
B. AI might overlook unique strengths or experiences for candidates
C. The impersonal nature of AI removes the human touch from the process.
D. AI could eliminate unconscious bias in the selection process.
Answer: B
6. Which of the following is an EXAMPLE of supervised learning?
A. A robot learning to walk
B. Finding the most important features in a dataset
C. Predicting the price of a house
D. Learning to play a game of chess
ANSWER: C
7. What is the name of the technique used to deal with overfitting in machine learning
models?
A. Underfitting
B. Regularization
C. Feature Engineering
D. Cross-validation
ANSWER: B
8. Which supervised learning algorithm is particularly well-suited for dealing with textual
data and is based on probability theory?
A. Regression
B. k-Nearest Neighbors (k-NN)
C. Naive Bayes
D. Support Vector Machines (SVM)
ANSWER: C
9. ABC Company has website traffic data and wants to identify groups of users with similar
browsing behavior. Which unsupervised learning technique would be best suited for this task?
A. K-Means Clustering
B. Decision Trees
C. Naive Bayes
D. Random Forest
ANSWER: A
10. Suppose you are trained a machine learning model and achieved good performance on the
training dataset. But, you are not sure how well it will perform on unseen data. What evaluation
technique can help you check how well the model generalizes to unseen data?
A. K-Fold Cross-Validation
B. Confusion Matrix
C. Hyperparameter Tuning
D. Bootstrapping
ANSWER: A
11. Which of the following network device used for managing a network security?
A. Firewall
B. Router
C. Switch
D. Transparent Bridge
ANSWER: A
12. Which of the following transmission media is best suited for high-speed, long-distance
communication?
A. Coaxial Cable
B. Twisted Pair Cable
C. Satellite
D. Fiber Optic
ANSWER: D
13. What benefit does DHCP provides for a given network?
A. Hosts always have the same IP address and are therefore always reachable.
B. DHCP allows users to refer to locations by a name rather than an IP address.
C. Hosts can connect to the network and get an IP address without manual configuration.
D. Duplicate addresses cannot occur on a network that issues dynamic addresses using
DHCP and has static assignments.
ANSWER: C
14. What method can be used by two computers to ensure that packets are not dropped because
too much data is being sent too quickly?
A. Encapsulation
B. Flow control
C. Access method
D. Response timeout
ANSWER: B
15. Which two flags in the TCP header are used in a TCP three-way handshake to establish
connectivity between two network devices?
A. ACK and FIN
B. PSH and RST
C. SYN and ACK
D. SYN and URG
ANSWER: C
16. When is UDP preferred to TCP?
A. When a client sends a segment to a server
B. When all the data must be fully received before any part of it is considered useful
C. When an application can tolerate some loss of data during transmission
D. When segments must arrive in a very specific sequence to be processed successfully
ANSWER: C
17. Which of the following key is the first key used to identify one and only one instance of an
entity uniquely?
A. Candidate Key
B. Primary key
C. Super Key
D. Foreign key
ANSWER: B
18. Which of the following principles of database design ensures that changes made to one aspect
of the database do not impact other aspects of the database?
A. Data Normalization
B. Data Independence
C. Entity-Relationship Model
D. Data Consistency
ANSWER: B
19. An entity set that does not have sufficient attributes to form a primary key is a____
A. A. Strong entity set.
B. Simple entity set.
C. Weak entity set
D. Primary entity set
ANSWER: C
20. Which of the following is the most efficient way to update a specific customer's email address
in the "customers" table?
A. Update all records and then change the desired one again.
B. Use the UPDATE statement with a WHERE clause to filter the specific customer.
C. Delete the customer record and insert a new one with the updated email.
D. Manually edit the data file where the table is stored
ANSWER: B
21. Suppose you want to insert a new record into the Orders table with the following values:
OrderID (110), CustomerID (01), OrderDate (2024-06-01), and TotalAmount (200.00). Which
SQL statement would achieve this?
A. SELECT * FROM Orders WHERE OrderID = 110;
B. ALTER TABLE Orders ADD COLUMN ProductID INT;
C. INSERT INTO Orders (OrderID, CustomerID, OrderDate, TotalAmount)
VALUES (110, 01, '2024-06-01', 200.00);
D. INSERT INTO Orders = OrderID, CustomerID, OrderDate, TotalAmount
VALUES (110, 01, '2024-06-01', 200.00);
ANSWER: C
22. A company experiences a data breach where customer information is leaked. The first priority
for the Software security team should be to:
A. Update all company passwords.
B. Notify customers about the breach immediately.
C. Implement new data encryption protocols.
D. Identify the source of the breach and contain the threat.
ANSWER: D
23. One of the following is not the challenge which programmers face due to Multicore or
multiprocessor systems while designing system or application programs.
A. Dividing activities
B. Balance
C. Data splitting
D. Data independency
ANSWER: D
24. What are the necessary conditions that must be present for a deadlock to occur in a system?
A. Mutual exclusion, hold and wait, no preemption, circular wait
B. No mutual exclusion, hold and wait, preemption, circular wait
C. Mutual exclusion, no hold and wait, no preemption, no circular wait
D. Mutual exclusion, hold and wait, preemption, circular wait
ANSWER: A
ANSWER: D
32. Which cryptographic technique is used to transform plaintext into unreadable ciphertext?
A. Hashing
B. Symmetric encryption
C. Asymmetric encryption
D. Digital signatures
ANSWER: B
33. In a public-key system using RSA, you intercept the ciphertext C = 9 sent to a user whose
public key is e = 7, n = 55. What is the plaintext M?
A. 40
B. 23
C. 44
D. 55
ANSWER: C
Software Engineering Program: Mock Exam P a g e 9 | 28
34. What is the first step in the program development process?
A. Coding
B. Problem definition
C. Testing
D. Deployment
ANSWER: B
35. What is the value of ‘e’? Assume that all variables are properly declared.
A. 10
B. 4
C. 7
D. 0
ANSWER: C
36. Which control statement is suitable for situations where a block of code needs to be executed
at least once?
A. While loop
B. for loop
C. do-while loop
D. switch statement
ANSWER: C
37. Which of the following is a valid IDENTIFIER in c++?
A. Abc7_4
B. ABC_4!fa
C. A$C_45fa
D. 6AbCD
ANSWER: A
A. Run-time Error
B. Valid
C. Invalid
D. No output
ANSWER: C
40. How many times does the following loop execute?
A. 20
B. 17
C. 6
D. 7
ANSWER: D
A. O(n2)
B. O(n)
C. O(log2 n)
D. O(1)
ANSWER: A
47. Which of the following data structures allows for efficient insertion and deletion at any position
within the structure?
A. Stack LIFO
B. Queue FIFO
C. Array
D. Linked List
ANSWER: D
ANSWER: B
49. What is the theoretical time complexity of searching for an element in a sorted array using
binary search?
A. Constant time (O(1))
B. Logarithmic time (O(log n))
C. Linear time (O(n))
D. Quadratic time (O(n^2))
ANSWER: B
50. Imagine you are creating a program to simulate a traffic light intersection. Cars arrive from
different directions and need to wait for their turn to proceed. The program should manage
light cycles and car movement. Which data structure would be most appropriate to model the
waiting cars?
A. Stack LIFO
B. Queue
C. Binary Search Tree
D. Hash Table
ANSWER: B
51. Which of the following concepts in object-oriented programming allows a class to define
behaviors that are shared by all objects of the same class?
A. Method
B. Constructor
C. Instance variable
D. Static variable
ANSWER: A
Software Engineering Program: Mock Exam P a g e 14 | 28
52. What is the concept of ENCAPSULATION in OOP designed to achieve?
A. Protect an object's internal data from unauthorized access.
B. Allow objects to communicate freely with any other object
C. Simplify the user interface for the program.
D. Completely rewrite the behavior of a parent class.
ANSWER: A
53. Your program encounters an error while trying to read data from a file containing animal
information. What concept can help manage this error?
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Exception Handling
ANSWER: D
54. In the following below code snippet. What is the benefit of subclass Square inheriting from
superclass Rectangle?
56. Which of the following best describes the role of a software project manager in stakeholder
management?
A. Ensuring that all stakeholders have equal influence over project decisions
B. Identifying stakeholder needs and expectations and managing their involvement to
ensure project success
C. Limiting stakeholder involvement to reduce project complexity
D. Delegating stakeholder communication to team members to focus on technical
tasks
Answer: B
57. Which project management tool is specifically designed to track project progress and identify
potential delays through a visual representation of tasks over time?
A. Gantt Chart
B. Work Breakdown Structure (WBS)
C. Risk Register
D. Project Charter
Answer: A.
Answer: B.
62. In modern software testing, which approach is characterized by short development cycles,
frequent releases, and automated testing to ensure that new code does not break existing
functionality?
A. Waterfall Testing
B. Regression Testing
C. Agile Testing
D. Smoke Testing
Answer: C.
63. When designing test cases, which approach ensures that all possible paths through a given part
of the software are tested at least once?
A. Boundary Value Analysis
B. Equivalence Partitioning
C. Path Testing
D. Random Testing
Answer: C.
64. Which of the following techniques is most effective in identifying potential risks during the
early phases of a software project?
A. SWOT Analysis
B. Delphi Technique
C. Brainstorming
D. Monte Carlo Simulation
Answer: B. Delphi Technique
71. Which of the following is NOT a typical activity performed during requirement engineering?
A. Gathering requirements from stakeholders
B. Designing the user interface
C. Analyzing and documenting requirements
D. Prioritizing requirements
Answer: D
72. What is a common challenge faced during requirement engineering?
A. Writing code in a specific programming language
B. Difficulty in understanding user needs
C. Choosing the right development tools
D. Integrating the software with existing systems
Answer: B
79. How many manifest files one can find in an android application?
A. 2
B. 3
C. 1
D. as per the application
Answer: C
80. Which of the following is true about the following line of code:
In order to check if the pattern matches with the string represented by a variable sentence, the
statement is ____________
A. sentence==pattern
B. pattern.test(text)
C. sentence.test(pattern)
D. pattern.test(sentence)
ANSWER: D.
82. Which of the following CSS style properties are inherited, meaning they are transmitted from
parent to child elements?
A. Borders style
B. Colors style
C. Margins style
D. Height style
ANSWER: B
83. What is the purpose of using relative and absolute paths in hyperlinking?
A. To specify the location of the linked page
B. To control the size and position of the linked element
C. To define the background color of the linked element
D. To add interactivity to the linked element
ANSWER: A
ANSWER: C
85. What does the ID selector do?
A. Apply the style to a specific element
B. Apply the style to all the elements
C. Apply the style to a group of elements
D. Apply the style to elements of the same type
ANSWER: C
ANSWER: D
ANSWER: C
ANSWER: A
ANSWER: B
ANSWER: B
100. Which of the following is NOT a benefit of a well-defined software process?
A. Reduced communication among team members
B. Improved risk management
C. Minimized errors and defects
D. Increased predictability of project outcomes
ANSWER: A