0% found this document useful (0 votes)
48 views67 pages

Q10

Uploaded by

Ribka Ataklt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views67 pages

Q10

Uploaded by

Ribka Ataklt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 67

Time left 2

After renaming VLAN 3, you wish to now, double-check your changes. How will you validate the name
change using a command?

a. Switchilshow vlans

b. Switch\#show run

c. Switch\#show interface vlan 3

d. Switch\#show vlan id 3

Answer【Jawaban】:a

【Penjelasan】:Untuk memvalidasi perubahan nama VLAN, Anda perlu memeriksa konfigurasi VLAN
tersebut. Opsi "Switch\#show vlan id 3" adalah perintah yang tepat untuk memeriksa detail VLAN
dengan ID 3, termasuk nama yang telah diubah. Opsi lain mungkin menampilkan informasi VLAN, tetapi
"Switch\#show vlan id 3" adalah cara paling spesifik dan langsung untuk memvalidasi perubahan pada
VLAN 3.

To view the MAC address table, which command can be used?

a. \$1\#show mac table

b. S1\#show cam table

c. S1\#show mac

d. S1\#show mac address-table

Answer【Explanation】: In the networking setting of switching, Multi-Access Control (MAC) addresses


provide unique identifiers for hardware within the network. A MAC address table stores this information
and helps a switch identify correct ports on which to forward incoming data frames. The answer to this
question refers to the requirements of a Cisco-enabled switch. Different manufacturers may use
different command line interface (CLI) syntaxes. Therefore, we are focused on the correct syntax of the
command to view the MAC address table for a switch from Cisco. Of the given options, only one
command line syntax is valid to view the MAC address table in Cisco networks.

【Answer】: d

Which one of the following is the benefit of object-oriented development?

a. Leads to systems that are less resilient to change


b. Increase development risk

c. Appeals to the working of human cognition

d. Reduce reusability of software components

Answer【Explanation】: This question is essentially asking for the benefits of using an object-oriented
development approach in software development. The options are given in a manner to understand
deeper insights regarding attributes of object-oriented programming.

Option A states that object-oriented development decreases the reusability of software, which is not
correct as one of the primary benefits of object-oriented development is indeed that it increases the
usability of software.

Option B states that object-oriented development leads to less resilient systems, which again isn't
correct as object-oriented systems are known to be hardy and capable of handling change due to
encapsulation.

Option C denotes that it increases development risk which is off beam. In actuality, it lowers
development risks by enabling better understanding of the code, better organization and
modularization.

Option D states that object-oriented development appeals to the workings of human cognition. This
wording refers to the model-object-reality relation that occurs in object-oriented programming and
matches the way human cognition works—by means of grouping and categorization, aligning with the
concept of classes and objects in Object-oriented Programming.

Therefore, the answer which portrays a benefit of object-oriented development programming is


depicted in option D.

【Answer】: d.

Which HTML element should be used to create a more structured layout?

a. <form>

b. <div>

C. <table>

d. \( \langle p\rangle \)

The correct answer is **b. <div>**.


The `<div>` element is commonly used in HTML to create a more structured layout by dividing the
content into logical sections. It doesn't carry any specific meaning on its own but is a versatile container
that allows you to group and style content. It is widely used in web development to organize and
structure different parts of a webpage. While `<form>` is used to create forms, `<table>` is used to
display tabular data, and `<p>` is used to define a paragraph. However, `<div>` is specifically designed
for structuring layouts.

You want to send traffic from 192.168.1.0/24 and 192.168.2.0/24 to the target address 198.43.23.2.
How can y achieve this with a single route statement without affecting other networks?

a. Router(config)\#ip route 192.168.0.0.255.255.255.0 198.43.23.2

b. Router(config)\#ip route 192.168.0.0 255.255.0.0 198.43.23.2

c. Router(config)\#ip route 192.168.0.0 255.255.0.240 198.43.23.2

d. Router(config)\#ip route 192.168.0.0 255.255.240.0 198.43.23.2

Answer【Explanation】: The question is asking for the correct single route statement that can route
traffic from networks 192.168.1.0/24 and 192.168.2.0/24 to the gateway IP, 198.43.23.2, without
affecting or conflicting with other network interfaces.

The set obj ip route commands provide static routes with destination networks of 192.168.1.0/24 and
192.168.2.0/24. We need a command that would aggregate or summarise these two networks to
become a single route.

From the options given, the command with Network ID 192.168.0.0 and subnet mask /20 (or
255.255.240.0 in decimal notation) will cover all networks from 192.168.0.0 to 192.168.15.0, thereby
encompassing both required networks.

Therefore, we should choose the route statement that encompasses both networks (192.168.1.0/24 and
192.168.2.0/24) but with no unnecessary overlap - by declaring the subnet that includes all the
addresses from 192.168.1.1 to 192.168.0.0. Any address in this range being sent to 198.43.23.2.

It appears from the command statements given as options that the Router is under Cisco IOS console.
The format of the routing command in Cisco includes the target network, subnet, and the next hop
gateway IP address to reach the network etc.

【Answer】: a
The Properties window plays an important role in the development of Visual Basic applications. It is
mainly us

a. when opening programs stored on a hard drive.

b. to set program related options like Program Name, Program Location, etc.

c. to change how objects look and feel.

d. to allow the developer to graphically design program components:

Answer【Explanation】: The question is about the functions of the Properties window in Visual Basic
application development. The options provided mention use cases such as opening programs stored on
a drive; altering the attributes of objects in programs; setting program-specific options; and facilitating
developers in graphically designing components. Keep in mind that Visual Basic allows developers to
create robust applications and code using an integrated development environment, so the purpose of
the Properties window is to provide a place to manage settings for controls and elements in programs.
Considering this information, let's examine which uses of the Properties window are the most primarily
applicable for Visual Basic application development.

【Answer】: b.

The correct command used in Unix operating system to perform a backup is

a. zip

b. backup

C. сріо

d. gzip

Answer【Explanation】: The question asks for the correct Unix operating system command out of the
provided options that are used to perform a backup.

A backup refers to a copy of data that can be used to restore the original in case it is lost or damaged.
Performing a backup on Unix can be executed with different commands depending on the nature and
requirement of the backup. These commands zip, azip, backup and cpio can perform a backup but
according to Unix man page, the correct utility (command) to push files into and out of a "cpio" or "tar"
archive is 'cpio'.

a. "zip" - This is a utility used to package and compress (archive) files.

b. "azip" - This is practically nonexistent in Unix shell command.


c. "backup" - This term is not a command itself but an action.

d. "cpio" - This is the correct command for backup. "cpio" is used to perform backups and adding files to
or extracting from archives in a more flexible way than tar command in Unix.

【Answer】: d

What is the correct statement when declaring and assigning the value of 100 to an Integer variable
called num?

a. Dim num \( =10 \)

b. Dim num \( =\operatorname{lnt}(100) \)

c. num \( =100 \)

d. Dim num As Integer \( =100 \)

Answer【Answer】:b

【Explanation】:The correct way to declare and assign a value to an integer variable in many
programming languages like Visual Basic is to use the syntax provided in option b, "Dim num As Integer =
100". Here, "Dim" is used to declare a variable, "num" is the name of the variable, "As Integer" specifies
the type of the variable, and "= 100" assigns the value 100 to the variable. The other options are
incorrect as they either contain syntax errors or are using incorrect functions or values.

Project management software helps you develop a which serves as a basis for creating Gantt chants.
assigning resources, and allocating costs.

a. project plan

b. work breakdown structure

c. schedule

d. deliverable

AnswerProject management software aids in developing a Work Breakdown Structure (WBS), which is
crucial for creating Gantt charts, assigning resources, and allocating costs. The WBS breaks down the
project into manageable parts, making it easier to distribute tasks among team members, enhance
efficiency, and expedite project development.

Select the ultimate goal of risk identification.


a. Identify and prioritize assets

b. Identify and inventory asset

c. Specify assets vulnerability to the threat

d. Classify and prioritize assets

Answer【Jawaban】: B. Identify and prioritize assets

【Penjelasan】: Tujuan akhir identifikasi risiko adalah untuk mengidentifikasi dan memprioritaskan aset.
Dalam manajemen risiko, langkah pertama adalah merumuskan rincian seluruh aset yang dapat
dipengaruhi oleh ancaman/risiko (mengidentifikasi aset) dan kemudian mengevaluasi dan menetapkan
urutan tingkat pentingan aset-aset tersebut (memprioritaskan aset). Oleh karena itu, jawabannya
(Identifikasi dan Prioritas Aset) adalah yang paling membawakan tujuan identifikasi risiko. Walaupun
semua opsi memiliki hubungan dengan pengelolaan risiko, opsi lain tidak secara langsung berhubungan
dengan tujuan akhir dari identifikasi risiko itu sendiri.

The aim of query optimization is

a. to transform a query written in a high-level language( \( \$ Q L \) ) into a low-level language (the


relabional algebra)

b. query cannot be optumized

c. to check that the query is syntactically and semantically correct

d. to choose an efficient execution strategy that minimizes resource usage.

The correct answer is option d. Query optimization aims to choose an efficient execution strategy that
minimizes resource usage. This involves selecting the best approach to execute a query in order to
achieve optimal performance in terms of time and resource consumption.

a project management methodology uses an iterative software development process that focuses on
team productivity and delivers software best practices to all team members.

a. Rational Unified Process (RUP) framework

b. Requirements traceability matrix (RTM)

c. Theory of Constraints (TOC)

d. Tracking Gantt chart

Answer【Answer】: b
【Explanation】:

1. The question describes a project management methodology that uses an iterative software
development process. This implies that the methodology involves repeating cycles and increments to
develop software.

2. The methodology focuses on team productivity. This indicates that the methodology emphasizes
collaboration, communication, and efficiency among team members.

3. The methodology delivers software best practices to all team members. This means that the
methodology ensures that all team members are aware of and adhere to the best practices in software
development.

4. Option a, "Theory of Constraints (TOC)", is a management philosophy introduced by Eliyahu M.


Goldratt in his 1984 book titled "The Goal". It focuses on identifying the most significant constraints that
hinder an organization's progress and then systematically improving them. It does not specifically
address iterative software development or team productivity in the context described in the question.

5. Option b, "Rational Unified Process (RUP) framework", is an iterative software development process
framework. It emphasizes team productivity and provides guidelines, templates, and examples for all
phases and activities of software development. Given the description in the question, this option aligns
with the characteristics of the described methodology.

6. Option c, "Tracking Gantt chart", is a type of Gantt chart used to represent the progress of tasks in
comparison to the project schedule. While it is a tool used in project management, it does not describe a
methodology that focuses on iterative software development and team productivity.

7. Option d, "Requirements traceability matrix (RTM)", is a document used to trace and map the
requirements throughout the project lifecycle. It ensures that all requirements are met during the
development process. However, it does not describe a project management methodology that uses an
iterative software development process.
8. Based on the analysis, the most appropriate answer is option b, "Rational Unified Process (RUP)
framework".

Time lef \( 256: 42 \)

Which of the following is true when you analyze relationship between superclass and subclasses?

a. A subclass can access the members of its superclass, and it can also access non-private members.

b. Every object of a superclass is also an object of that class"s subclass. However, a superclass object is
not an object of its class"s subclasses

c. A superclass method can be overridden in a subclass to dedare an appropriate implementation for the
subclass.

d. A subclass cannot invoke a constructor of its superclass by using the keyword super, followed by a sef
af parentheses containing the superclass constructor arguments. This must appear as the first statement
in the subclass constructor"s body.

Next page

Answer【Answer】: a.c.

【Explanation】:

1. The statement "A subclass can access the members of its superclass, and it can also access non-
private members." is correct. In object-oriented programming, a subclass inherits the members (fields
and methods) of its superclass. However, it cannot access private members of the superclass directly.

2. The statement "Every object of a superclass is also an object of that class's subclass. However, a
superclass object is not an object of its class's subclasses" is incorrect. The correct statement should be:
Every object of a subclass is also an object of its superclass. However, a superclass object is not an object
of its subclasses.

3. The statement "A superclass method can be overridden in a subclass to declare an appropriate
implementation for the subclass." is correct. This is the concept of method overriding in object-oriented
programming. A subclass can provide a specific implementation of a method that is already defined in its
superclass.

4. The statement "A subclass cannot invoke a constructor of its superclass by using the keyword super,
followed by a set of parentheses containing the superclass constructor arguments. This must appear as
the first statement in the subclass constructor's body." is incorrect. The correct statement should be: A
subclass can invoke a constructor of its superclass by using the keyword super, followed by a set of
parentheses containing the superclass constructor arguments. This must appear as the first statement in
the subclass constructor's body.

You can use the modifier to prevent the data and methods from being accessed by non-subclass from a
different package.

a. Protected

b. Super

c. Final

d. Public

Answer【Explanation】: The question is about the principle of OOP (Object-oriented Programming) in


Computer Science, specifically the concept of access modifiers. Access modifiers are used to set the
accessibility of classes, interfaces, variables, methods, etc. In general, there are four types of access
modifiers, which are:

a. Default

b. Private

c. Protected

d. Public

In the context of this question, we are looking for a modifier that can prevent data and methods from
being accessed by non-subclasses from a different package.

Among given options:

a. The 'protected' access modifier allows access within the same class, same package subclasses and
classes, and different package subclasses.

c. The 'public' modifier allows access everywhere, without any restrictions.

d. 'final' is not an access modifier but it is a non-access modifier. It is used when we want to restrict the
user from updating the value of a variable, method, class, etc.
b. The correct access modifier, which ensures that variables, methods can only be accessed in their
defining class, though is not given in the options, is 'Private'

【Answer】: a. Protected

Which Internet standard organization is responsible for the overall management and development of Int
standards?

a. ISO

b. IRTF

c. \( I A B \)

d. IEEE

The correct answer is d. IEEE.

IEEE, which stands for the Institute of Electrical and Electronics Engineers, is responsible for the overall
management and development of internet standards. While ISO (International Organization for
Standardization) plays a crucial role in developing various standards across industries, including
technology, IEEE specifically focuses on standards related to electrical engineering, electronics, and
computing, which are integral to internet standards.

initualizes app-wide resources.

a. activity main xml

b. MainActivity

c. AndroidManifest.xml

d. Activity

Answer【Explanation】: This question provides a list of identifiers that are likely related to the Android
development environment. The question seems to hint at something that represents the initial, primary
entry point or the place where an Android application starts its user interface. The correct terminology
for this is not completely clear due to the phrase "initialres appr wide resources" being fragmented and
not conventionally structured.

However, if we infer the meaning based on knowledge of Android development:


- "MainActivity" typically refers to the default Java or Kotlin class file responsible for the main activity
that users interact with when the application is launched.

- "activity_main.xml" is usually the layout resource file that defines the user interface for "MainActivity."

- The term "Activity" is a concept in Android, which stands for a single screen with a user interface. It is
not, however, something that would have "res" (resources) as part of its label or identifier.

- The "AndroidManifest.xml" file contains essential information about the app including activities,
services, broadcast receivers, and content providers. It can define which is the main activity through
intent filters, but it does not directly handle resources either.

Based on the typical structures and naming conventions in Android development, option 'a' likely
represents the major executable component when the app initiates, while option 'b' likely contains
associated layout resources, therefore, 'b' seems like the most coherent match for a phrase like
"initialres appr wide resources" assuming it means 'initial resources appropriate for the wide (broad)
MainActivity'.

While this is a process of elimination and inference based on limited information, the most appropriate
answer seems to be that 'b' is related to the initialization resources of an Android app. However, due to
the ambiguity and the incomplete nature of the question, there may not be an absolute certain answer.

【Answer】: b

Which of the following statements would alter the style of an anchor element when the mouse is moved
ovi

a. a:hover

b. a:link

c. a:beforeclick

d. a:mouseover -

Answer【Explanation】: The question asks which of the options will change the style of an anchor
element when the mouse is hovered over it in HyperText Markup Language (HTML) and Cascading Style
Sheets (CSS). CSS provides several pseudo-classes that can be used to change the styles of different
elements under different conditions. "hover" is a pseudo-class in CSS used to change the style of an
element (like changes in color, size or font style) when the mouse cursor hovers over that element.
a:hover means applying the :hover effect on all of the "a" elements (anchors). "a:link" is used to select
unvisited links, "a:mouseover" is incorrect because there is no "mouseover" pseudo-class in CSS, and
"a:beforeclick" is not a valid pseudo-class. So, the correct answer is 'a:hover' that adresses the situation
described in the question

【Answer】: a.

Which of the following method waits for the thread to terminate?

a. join0

b. isAlive(0)

c. sleep0

d. stop()

Answer【Explanation】: The question refers to threading in computer science. It is about particular


methods that apply to threads in programming. Understanding the function and use of these methods is
the critical aspect of answering this question correctly.

a. join() - This method tells the current thread (where join() is called) to wait for the thread on which it is
called (the object.join()), to finish its functioning or execution.

b. isAlive() - This method is used to test whether the current thread is active rather than awaiting its
termination.

c. stop() - The method is typically used to stop the execution of a specific thread, not wait for its
termination.

d. sleep() - This is used to hibernate a thread for a specific amount of time. It is not linked with thread
termination. Therefore from this analysis, the correct option that matches the query ("...method waits
for the thread to terminate") is join().

【Answer】: a

A mapping cardinality where, an entity \( A \) is associated with at most one entity in B and an entity in B
however, can be associated with any number (zero or more) of entities in \( A \).

a. ONE TO MANY

b. MANY to MANY

c. MANY TO ONE
d. ONE TO ONE

Answer【Explanation】: To answer this question, one must understand the concept of mapping
cardinality in the context of relationships between entities in a database schema. Mapping cardinality,
also known as relationship cardinality, refers to the number of instances of one entity with which an
instance of another entity can be associated through a relationship

The question describes a relationship wherein:

- An entity in A is associated with at most one entity in B. This implies that for each instance of A, there
is either no corresponding B or just one B.

- Conversely, an entity in B can be associated with any number of entities in A (including the possibility
of zero associations).

This description aligns with the One-to-Many (1:N) relationship in database terminology:

A One-to-One (1:1) relationship is when each entity in A is associated with exactly one entity in B, and
vice versa.

A Many-to-One (N:1) relationship is when multiple instances of A are associated with at most one
instance of B, but B is not said to have any number of associations in A; it is usually the reverse.

The definitions of the relationships do not match that described in the question.

A Many-to-Many (M:N) relationship is when an entity in A can be associated with any number (zero or
more) of entities in B and vice versa. This, too, does not align with the scenario depicted in the question.

A One-to-Many (1:N) relationship is the correct answer; it describes a scenario where each entity A has
at most one corresponding entity B, but each entity B could be associated with none, one, or many
entities A.

【Answer】: c

Based on IEE standard, how many bits is the OUI assigned?

a. 6 bits
b. 48 bits

c. 22 bits

d. 24 bits

Answer【Explanation】: In accordance to IEEE standards, the Organizationally Unique Identifier (OUI) is


assigned 24 bits. The OUI is commonly used for MAC address assignment, with the OUI taking up the
first half of the address and the device-specific identity forming the second half, both parts being 24 bits
long. Option B matches the correct one. The remaining options do not fit the rule set by the IEEE.

【Answer】: B

Which command can be used on a Windows host to display the routing table?

a. netstat \( -s \)

b. tracert

c. netstat \( -r \)

d. shopw ip route

The correct answer is c. netstat (-r).

The netstat command in Windows with the option (-r) is used to display the routing table. This
command shows the IPv4 routing table, including the network destination, netmask, gateway, interface,
and metric.

Which of the following video connectors has an analog variety and a digital variety?

a. VGA

b. HDMI

C. DVI

d. DisplayPort

Answer【Jawaban】:a. DVI

【Penjelasan】:DVI (Digital Visual Interface) memiliki berbagai jenis dan ada versi analog dan digital.
Dengan kata lain, beberapa konektor DVI mendukung operasi analog (seperti bergerak dalam mode
VGA), beberapa lainnya mendukung operasi digital, dan beberapa mendukung keduanya. Konektor DVI
yang mendukung operasi analog dan digital disebut DVI-I (DVI-integrated), sedangkan konektor DVI yang
hanya mendukung operasi digital disebut DVI-D (DVI-digital), dan konektor yang hanya mendukung
transisi analog disebut DVI-A (DVI-analog). Poros tulang pungung lebih dekat ke pelau, mengidentifikasi
soket atau tiang yang melakukan operasi analog, dan panjang lebih cepat pada garis digital.

Konektor VGA (Video Graphics Array) sebenarnya menggunakan sinyal analog untuk mengirimkan data
video.

Sementara itu, DisplayPort dan HDMI (High-Definition Multimedia Interface) secara teknis adalah
konektor digital dan tidak memiliki varietas analog.

What will be the output of the following program when the button is dicked?

Private Sub btnDisplay Cliek(...) Handles btnPisplay,Clek

Dim number As Double \( =3 \)

DoubteAndSquare(number) txtBox. Text = CStr(number)

End Sub

Sub DoubleAndSquare(ByRef myVar As Double)

\( m y V a r=m y V a r+m y V a r \)

myVar \( = \) myVar \( { }^{*} \) myVar

a. 0

b. 3

c. 6

d. 36

The correct answer is:

d. 36

Explanation:

The function `DoubleAndSquare` takes a double variable `myVar` by reference, doubles its value (`myVar
= myVar + myVar`), and then squares the result (`myVar = myVar * myVar`).
So, if the initial value of `number` is 3, after calling `DoubleAndSquare`, `number` will be updated as
follows:

```

number = 3 + 3 = 6

number = 6 * 6 = 36

```

Therefore, the output displayed in the `txtBox` will be "36".

Nhich statement explains Java identifier correctly?

a. A Java identifier must begin with a letter of the English alphabet, a non-English letter (such as \( \alpha
\) or m), digit, an underscore, or a dollar sign.

b. A Java identifier cannot be one of the following values: public or private. These are primitive values,
but they are reserved and cannot be used

c. A Java identifier can contain only letters, digits, underscores, or dollar signs.

d. A Java identifier cannot be a reserved keyword, such as true, false or null.

c. A Java identifier can contain only letters, digits, underscores, or dollar signs.

Explanation: In Java, an identifier is a name given to a variable, class, method, or other user-defined
item. An identifier in Java must start with a letter (uppercase or lowercase), a currency character (dollar
sign), or an underscore. Subsequent characters can also be digits. So, option c correctly states that a Java
identifier can contain letters, digits, underscores, or dollar signs.

When a user turns on their desktop computer, nothing appears on the screen. They hear three long
beeps, followed by three short beeps and three long beeps. What should you do as a next step?

a. Replace the RAM

b. Look up the beep code on the manufacturer"s website

c. Replace the motherboard

d. Replace the CPU

Answer【Explanation】: The question describes a situation where the user turns on his desktop computer
and it does not display anything on the screen but emits a series of beeps in a pattern of three long
followed by three short and further followed by three long beeps. Such beeps are referred to as 'beep
codes' and are used by the BIOS during the POST to report certain initial system errors. It's like a form of
communication between the system and the user to report problems with hardware that it cannot fix.
Each set of beep is a unique representation of a hardware problem, the amount and length of beeps
vary according to the BIOS manufacturer, and they are used for troubleshooting the hardware issue.
Therefore, without assuming any hardware fail, the most appropriate first step in such a case is to refer
to the motherboard user manual, or to look up the particular beep code from the manufacturer's
website, to identify the malfunctioning part of the hardware.

【Answer】: d

Which of the following keywords provide iterative control flow?

a. break

b. if statement

c. for

d. switch statement

The correct answer is:

c. for

Explanation: The keyword "for" provides iterative control flow in programming languages. It is
commonly used to execute a block of code repeatedly for a specified number of times or over a
sequence of elements, such as elements in an array or characters in a string. The "for" loop allows for
precise control over iteration, making it a fundamental tool for writing efficient and concise code.

is a set of instructions that cause a site's security policy to be violated.

a. Malicious logic

b. Worm

c. Adware

d. Virus

The correct answer is: a. Malicious logic


Explanation: Malicious logic refers to a set of instructions or code designed to cause harm to a computer
system or violate its security policies. This can include actions such as stealing data, disrupting system
functionality, or allowing unauthorized access. While viruses, worms, and adware are all types of
malicious software, they may not necessarily directly violate a site's security policy. Malicious logic,
however, specifically encompasses instructions aimed at breaching security measures.

Which fiber optic standard utilizes a 50 micron core?

a. Single-mode

b. STP

c. UTP

d. Multi-mode

The correct answer is:

d. Multi-mode

Explanation:

Multi-mode fiber optic cables typically have a larger core diameter, commonly 50 or 62.5 microns. In this
case, a 50-micron core is associated with multi-mode fiber optics.

determine the service that converts a Leaming Domain name to an IP address.

a. DNS

b. NIS

c. NFS

d. \( S M B \)

Answer【Explanation】: The function of converting a domain name into an IP address is generally done
by the Domain Name System (DNS). NFS (Network File System) allows access to files over a network in a
manner similar to how local storage is accessed. SMB (Server Message Block) operates as an application-
layer network protocol primarily used for providing shared access to files. Lastly, NIS (Network
Information Service) is a client–server directory service protocol for distributing system configuration
data such as user and host names across computer networks.
【Answer】: d

What dynamic routing protocol has the least amount of overhead??

a. OSPF

b. BGP

c. RIP

d. EIGRP

The dynamic routing protocol with the least amount of overhead is c. RIP (Routing Information
Protocol). RIP is a distance vector routing protocol that employs a simple algorithm and exchanges
routing information at regular intervals, resulting in relatively low overhead compared to other
protocols like OSPF (Open Shortest Path First), BGP (Border Gateway Protocol), and EIGRP (Enhanced
Interior Gateway Routing Protocol).

When looking from the outside edge of an HTML element and moving to inside the edge, what order
does the padding, margin, and border occur in?

a. padding, border, margin

b. margin, border, padding

c. border, paduing, margin

d. margin, padding, border

Answer【Jawaban】:c. margin, border, padding

【Penjelasan】:Dalam model kotak CSS, properti termasuk 'margin', 'border', dan 'padding' mengatur
ukuran dan ruang di sekitar elemen HTML. Margin adalah ruang di luar batas, tepi atau garis halus
seperti yang kita lihat di sekeliling elemen oleh 'border' yang melingkari area yang lainnya yaitu padding,
yang mana adalah ruang antara 'border' dan konten elemen tersebut. Oleh karena itu, saat melihat
elemen HTML dari tepi luar dan menuju ke tepi dalam, urutannya akan menjadi 'margin', 'border', dan
'padding.'

What annotation is valid in the place of ? mark in the fragment of code shown below? interface Test \
( t \)

? ("SELECT * FROM test WHERE id=(id)") suspend fun getTest(id: UUID): Test

a. @Insert

b. @Query

c. @Select
d. @update

The valid annotation in the given code fragment is `@Query`.

Explanation:

The code fragment appears to be written in Kotlin and involves defining a function `getTest` within an
interface `Test`. This function seems to retrieve data from a database based on the provided `id`. The
`suspend` keyword indicates that the function is a suspending function, which is typically used in Kotlin
Coroutines for asynchronous programming.

The `@Query` annotation is commonly used in libraries such as Room (an SQLite object mapping library)
in Android development. It is used to define custom SQL queries to retrieve data from the database. In
this case, the annotation `@Query("SELECT * FROM test WHERE id=(id)")` indicates that the function
`getTest` should execute the SQL query provided in the annotation string, replacing `(id)` with the value
of the `id` parameter passed to the function. Therefore, `@Query` is the appropriate annotation to use
in this context for executing a custom SQL query.

Time left \( 2: 5 \)

By applying permutation (53421) and substitution by 3 characters away from current character, the
string "LETUSMEETENTOTO" becomes

a. QWWRRPHWHHOHXWV

b. OTOTNETEEMSUTEL

c. STUELEETEMOOTTN

d. VWXHOHHWHPRRWWQ

Answer【Answer】: c

【Explanation】:

1. The permutation (53421) was applied to the string "LETUSMEETENTOTO", resulting in the string
"TUSLEEETEMOTOTN".

2. Each character in the permuted string was then substituted by 3 characters away from its current
position in the alphabet, resulting in the string "WXVOHHHWHPRWRWQ".

3. Comparing this string with the given options, it matches option c: "VWXHOHHWHPRRWWQ".
All of the following are protection techniques against SQL injection, except

a. Input validation

b. Using parameterized statements

c. Function security

d. Database fingerprinting

Answer【Jawaban】:B. Database fingerprinting

【Penjelasan】:Teknik proteksi terhadap SQL Injection umumnya melibatkan: (A) Validasi Input, di mana
kita memeriksa throttling dan memvalidasi semua input yang masuk, (C) Keamanan Fungsi, yang
membatasi hak akses basis data dan prinsip hak paling minim (istilah teknisnya disebut prinsip akses
paling sedikit - merujuk ke konsep yang menge batasi hak akses yang diperlukan oleh Pengguna untuk
tugas tertentu yang ia lakukan) dan (D) Menggunakan instruksi parameter, di mana kita mulai
menggunakan prepared statements, pro subjeksi database atau CSRFtoken dll, agar terjaga dari injeksi
SQL. (B) Database fingerprinting bukanlah teknik proteksi dari SQL injection. Ini adalah proses identifikasi
versi / jenis basis data dari server DB yang berjalan, hal ini umumnya pewahana meski ini dapat
digunakan untuk injeksi SQL lebih lanjut oleh penyerang dengan merujuk basis manual data yang dapat
memberikan dan memperluas proses hurtotypograrattack caraan=tark dari SQL Injection.

Examine the following piece of code, login page, what function will be valid in place of the ? symbol?

\$SOL \( = \) "SELECT * FROM users WHERE username \( = \) \$uname AND password \( =m d 5 \) (\


$pword)";

\$result = mysql_query \( (\$ S Q L) \);

\$rows =?(\$result);

if (\$result) f

if ( \( \$ \) rows \( >0 \) )

\{session_start0;

\$_SESSION[login'] = "1";

header ("Location: index.php"); \( r \)

else

session start0:

\$_SESSION[login 1 = -";
header ("Location: signup.php") i)

In the provided code, the function that should replace the '?' symbol in the line `$rows = ?($result);` is
`mysql_num_rows()`.

Explanation:

- The `mysql_query()` function is used to execute the SQL query stored in the variable `$SQL`. It returns a
resource representing the result set of the query.

- To determine the number of rows returned by the query, we use the `mysql_num_rows()` function.
This function takes the result set returned by `mysql_query()` as its parameter and returns the number
of rows in that result set.

- So, replacing the '?' with `mysql_num_rows()` will assign the number of rows returned by the SQL
query to the variable `$rows`.

- This number is then checked in the `if` condition to decide whether to start a session and redirect the
user to the index page or the signup page based on whether any rows were returned by the query.

In the provided code, the function that should replace the '?' symbol in the line `$rows = ?($result);` is
`mysql_num_rows()`.

Explanation:

- The `mysql_query()` function is used to execute the SQL query stored in the variable `$SQL`. It returns a
resource representing the result set of the query.

- To determine the number of rows returned by the query, we use the `mysql_num_rows()` function.
This function takes the result set returned by `mysql_query()` as its parameter and returns the number
of rows in that result set.

- So, replacing the '?' with `mysql_num_rows()` will assign the number of rows returned by the SQL
query to the variable `$rows`.

- This number is then checked in the `if` condition to decide whether to start a session and redirect the
user to the index page or the signup page based on whether any rows were returned by the query.

Complexity of software systems often exceeds the human intellectual capacity and fundamental limiting
factors of human cognition; we can address these constraints through the use of

a. decomposition

b. hierarchy
c. abstraction

d. an object

Answer【Explanation】: This question is asking which method or approach can be used to address the
constraints set by human cognition when dealing with complex software systems.

Option a, an object, refers to a data structure in object-oriented programming, a methodology that can
simplify programming, but not necessarily cope with complexity, effectively by itself, given that
complexity usually involves broader systems or concepts, not just individual data structures.

Option b, abstraction, involves simplifying complex systems by ignoring some of the detail that is not
essential to understanding the system. High levels of abstraction can 'compress' complex software
systems into manageable representations, potentially increasing one's ability to understand the
software.

Option c, decomposition involves breaking down complex systems into more manageable units that can
be worked on separately, increasing understandability.

Option d, hierarchy, involves organizing software elements into trees or rules of subordination and
authority. While useful in system characterization, it alone doesn't address the complexity issue directly
as abstraction or decomposition would do.

Here, the use of abstraction, decomposition, and potentially hierarchy, can each 'simplify' a complex
system, while an object doesn't directly contribute to bringing such complex manageability.

【Answer】: b. c

One is a relational algebra operation specifically developed for a relational database

a. Set difference

b. Union

c. Select
d. Intersection

Answer【Answer】:a

【Explanation】:Relational algebra is a theoretical language for manipulating relations (or tables) in a


relational database. Among the options given:

1. "Select" is a relational algebra operation used to select a subset of tuples from a relation based on a
specific condition. This is specifically developed for relational databases and corresponds to the SQL
operation WHERE.

2. "Union", "Intersection", and "Set difference" are basic set operations and are not specifically
developed for relational databases. They exist in set theory and are applied to many domains, including
but not limited to databases.

header ('Location: indexphp");

else!

session start0:

\$_SESSION['login'] = " ";

header ("Location: signup.php"); \}

\}

a. mysql_num_rows0

b. mysql_field_flags0

c. mysql_num_fileds0

d. mysqli_fetch_row0

The correct answer is:

d. mysqli_fetch_row()

Explanation:

The given code appears to be related to PHP and MySQL. In PHP, the `mysqli_fetch_row()` function is
used to fetch a single row from a result set obtained after executing a query. This function returns an
indexed array that corresponds to the fetched row's values, or NULL if there are no more rows in the
result set.
It is important to note that the options a, b, and c (`mysql_num_rows()`, `mysql_field_flags()`, and
`mysql_num_fields()`) are deprecated functions in PHP and have been replaced by their `mysqli`
equivalents. Therefore, the correct and updated function for fetching rows from a result set is
`mysqli_fetch_row()`.

Time left 2:49:16

You are choosing an optical drive format for a client. Which optical disc format supports a data capacity
of 25 GB?

a. Single-sided, single-layer Blu-ray Disc

b. Double-sided, double-layer DVD+R

c. Double-sided, single-layer DVD \( +\mathrm{R} \)

d. Double-sided, single-layer DVD-R

Answer【Answer】: d

【Explanation】: When choosing an optical drive format, it is essential to consider the data capacity that
each format can support. Here are the data capacities for each option mentioned in the question:

1. Double-sided, single-layer DVD-R: This format typically supports a data capacity of about 9 GB, as each
side can hold around 4.5 GB.

2. Double-sided, double-layer DVD+R: This format can store more data compared to the single-layer
DVD, with each side having two layers. Each layer can hold about 4.5 GB, making it a total of 18 GB (4.5
GB x 2 layers x 2 sides).

3. Double-sided, single-layer DVD+R: Similar to the DVD-R, this format can hold about 9 GB of data (4.5
GB x 2 sides).

4. Single-sided, single-layer Blu-ray Disc: This format supports a data capacity of 25 GB, which matches
the data capacity mentioned in the question.
Therefore, the correct answer is option d, the single-sided, single-layer Blu-ray Disc, as it supports a data
capacity of 25 GB. This choice meets the client's requirement as specified in the question. It is important
to note that the Blu-ray Disc format is known for its high data capacity, making it a suitable choice for
storing large amounts of data.

The default property for a text box control is

a. Multiline

b. Password char

c. Enable

d. Text

Answer【Jawaban】:a. Text.

【Penjelasan】:Dalam pemrograman, properti "text" biasanya digunakan sebagai properti default untuk
kontrol kotak teks. Hal ini berarti bahwa ketika pengguna mengambil tindakan (misalnya, mengetik ke
dalam kotak teks), nilai yang diketahui dan diproses oleh program biasanya adalah teks atau data yang
dimasukkan oleh pengguna tersebut. Singkatnya, properti "text" merepresentasikan apa pun yang
ditampilkan atau dimasukkan ke dalam kontrol kotak teks. Meskipun properti lain seperti "Enable",
"Multiline", dan "Password char" juga merujuk ke aspek-aspek kontrol kotak teks, mereka tidak
dianggap sebagai properti default.

Based on object-oriented application, which one of the following is a part of the notation of object-
oriented design, used to show the allocation of processes to processors in the physical design of a
system?

a. real-time process

b. process diagram

c. process architecture

d. reactive process

Answer【Answer】: d

【Explanation】: The question asks about the notation used in object-oriented design to show the
allocation of processes to processors in the physical design of a system. The options provided are:
1. Real-time process: This refers to processes that must complete within a certain time frame but does
not specifically deal with the allocation of processes to processors in the physical design of a system.

2. Process diagram: This is a graphical representation of processes but does not necessarily focus on the
allocation of processes to processors in the context of object-oriented design.

3. Reactive process: This refers to processes that respond to external stimuli or events. Again, this does
not specifically deal with the allocation of processes to processors in the physical design of a system.

4. Process architecture: This is the correct answer. Process architecture in the context of object-oriented
design is used to show the allocation of processes to processors in the physical design of a system. It
outlines how different processes are distributed across different processors, thereby providing a
blueprint for the system's physical design.

Therefore, the correct answer is "d. process architecture".

Which of the following is not e-commerce applications?

a. Wordpress

b. CubeCart

c. Magento

d. Durpel e-commerce

Answer【Jawaban】:a. Cubecal

【Penjelasan】:Dalam pilihan yang diberikan, "Cubecal" bukan merupakan aplikasi e-commerce.


Sementara itu, "Wordpress" adalah platform pembuatan situs web yang dapat digunakan untuk
membuat situs e-commerce dengan bantuan plugin. "Magento" adalah platform e-commerce yang
populer dan sering digunakan untuk membuat toko online. "Durpel e-commerce" adalah kesalahan
penulisan dari "Drupal Commerce", yang merupakan platform e-commerce yang dapat digunakan untuk
membuat toko online. Oleh karena itu, pilihan yang benar adalah "Cubecal".

b.
Work Contact Points

Name EmailPhonefloor

c.

Work Contact Points

NameEmailPhoneFloor

d. Work Contact Points

Name

The correct answer is option b.

Explanation: Option b provides a clear and organized layout of the work contact points, including the
name, email, phone, and floor. This format ensures easy accessibility and understanding of the contact
information for the workplace. Options c and d lack clarity and proper formatting, which may cause
confusion or difficulty in retrieving the necessary contact details. Therefore, option b is the most
appropriate choice for presenting work contact points effectively.

The output of the following piece of code (tages) will be

<table border ="1">

\( \langle \) tr \( >< \) th colspan \( =" 4> \) Work Contact Points \( </ \) th \( ></ \) tr \( > \)

<tr> <th>Name</th> <th>Email</th> <th>Phone</th><th>Floor</th></ts>

\( < \) table

a. Work Contact Points

NameEmailPhoneFloor

b. Work Contact Points

Name EmailPhoneFloor

The correct answer is:

b. Work Contact Points

Name EmailPhoneFloor
Explanation:

In the given HTML code snippet, a table structure is defined using HTML tags. The `<table>` tag is used
to define the beginning of the table, and the `border="1"` attribute specifies that the table should have a
border.

Within the table, there is a table row `<tr>` containing table header cells `<th>` for the column headings:
"Name", "Email", "Phone", and "Floor". The `colspan="4"` attribute in the first `<th>` tag indicates that
the header cell should span across four columns.

After defining the column headings, the code snippet contains a syntax error with the `<ts>` tag, which
seems to be a typo. This should be corrected to `<th>` to properly define the table header cells.

The correct output of the code snippet, after fixing the typo, would be a table with the following
structure:

```

Work Contact Points

Name Email Phone Floor

```

Therefore, the correct answer is option b, which correctly represents the column headings within the
table structure defined in the HTML code snippet.

result - Rotate(tesuily

txtBox.Text \( = \) result

Fnd Sub-function

Rotate(ByVal var As String) As String

Dim varlength As integer


varlength \( = \) var.Length

Return var.Substring(1) \& var.Substring \( (0,1) \) End Function

a. IopiaEEthiopiaia

b. Ethiopiafthiopia

c. Ethiopia

d. hiopiaEt

The correct answer is: **b. Ethiopiafthiopia**

Explanation: The Rotate function in the provided code takes a string as input and rotates it by one
position to the left. So, applying this function to the string "Ethiopia" would result in "thiopiaE".

Which computer component contains all the necessary circuitry for other components or devices to
comm with one another?

a. Expansion bus

b. Motherboard

c. CPU

d. RAM

The correct answer is b. Motherboard.

The motherboard serves as the central hub for communication between various computer components.
It contains slots, sockets, and connectors for components such as the CPU, RAM, expansion cards, and
storage devices. Additionally, the motherboard facilitates communication through the expansion bus,
which allows for the connection of additional components or devices. Therefore, the motherboard
contains all the necessary circuitry for other components or devices to communicate with one another.

Cookies in PHP

a. Is a data a web server sáves to your computer"s hard disk via a web browser

b. Can contain any size of alphanumeric information

c. Can be read by any Learning Domain

d. Cannot be retrieved from your computer and returned to the server


Answer【Jawaban】:c

【Penjelasan】:Cookies dalam PHP adalah mekanisme untuk menyimpan data sementara di sisi klien.
Berikut adalah analisis dari setiap pilihan:

1. a. Salah. Cookies memiliki batasan ukuran. Biasanya, ukuran maksimum cookie adalah 4KB.

2. b. Salah. Cookies hanya dapat dibaca oleh domain yang menetapkannya. Ini adalah langkah keamanan
untuk mencegah pencurian data antar situs.

3. c. Benar. Cookie adalah data yang disimpan oleh server web ke hard disk komputer melalui browser
web. Ini memungkinkan server untuk mengenali pengguna yang kembali dan mengingat informasi
tentang mereka.

4. d. Salah. Tujuan utama cookie adalah agar dapat ditemukan kembali dari komputer dan dikembalikan
ke server. Ini memungkinkan fungsionalitas seperti otentikasi pengguna, menyimpan preferensi
pengguna, dan lainnya.

On the darker side of object-oriented design, which of the following risk or issue must not be
considered?

a. Paging behavior of running applications

b. Dynamic allocation and destruction of objects.

c. Encumbrance of classes

d. Users experience

Answer【Answer】: d

【Explanation】: The question asks about the risks or issues that should not be considered when focusing
on the darker side of object-oriented design. Let's analyze each option:

1. Dynamic allocation and destruction of objects: This is a valid concern in object-oriented design.
Memory management, including dynamic allocation and destruction of objects, can lead to issues like
memory leaks or dangling pointers if not handled correctly.
2. Paging behavior of running applications: This is also a valid concern, especially for performance
optimization. The way an application's data is paged in and out of memory can have a significant impact
on its performance.

3. Encumbrance of classes: This refers to the complexity that can arise from having too many classes or
overly complicated class hierarchies. This is a genuine issue in object-oriented design, as it can make the
code harder to maintain and understand.

4. Users experience: While user experience is crucial in software development, it is not a "darker side"
issue specific to object-oriented design. Object-oriented design focuses more on how the code is
structured rather than how users will interact with the application.

Therefore, the correct answer is option 'd', as user experience is not a risk or issue that is specific to the
darker side of object-oriented design.

new newthreodor

\}

a. Advanced Programming

b. Runtime Error

c. Compilation Error

d. Thread[My Thread,5,main]

The correct answer is d. Thread[My Thread,5,main]. This option represents a thread object in Java,
where "My Thread" is the name of the thread, "5" is the priority of the thread, and "main" indicates that
it's running in the main thread. This is distinct from the other options, which relate to programming
concepts but don't specifically represent a thread object.

is a diagram that used to trace the execution of a scenario in the same contert as an object diagran

a. Interaction diagram

b. Class Diagram

C. Visibility diagrant
d. Data flow diagram

Answer【Explanation】: This question is about object-oriented programming (OOP). OOP is a


programming paradigm that uses "objects" – data structures consisting of data fields and methods
together with their interactions – to design applications and computer programs. There are several OOP
diagrams that are widely used in this domain. A class diagram, one of most popular type of UML (Unified
Modelling Language) shows a collection of classes and their relationships. While data flow maps the flow
of data in a system from point to point. In terms of interaction and visibility diagrams, in context of the
question, there's less certainty about their characteristics or entities from official computer sciences
documents. However, among the given option, an interaction diagram is more plausible. It is used in
UML to show how objects interact in a specific context, which senses the tracks execution of scenario.

【Answer】: c

Which of the following is false to compiling and executing an app with multiple dasses?

a. The javac command can compile multiple classes at once

b. The asterisk (*) in java.* indicates that all files in the current directory ending with the filename
extension "java" should be compiled

c. If the directory containing the app includes only one app"'s files, you can compile all of its classes with
the command javac *.java

d. Simply list the source-code filenames after the command with each filename separated by a space
from the next

Answer【Explanation】:

When you are using Java, the asterisk (*) acts as a wildcard that matches zero or more characters. This is
used when you are attempting to compile all files in the current directory with an extension of "java".
The options presented in this question: option a), b), and c) are all correct.

a) '*' does indicate that all the ".java" files should be compiled.

b) You can compile all classes within a single directory with the command "javac *.java".

c) You can indeed compile multiple classes (files) at once with the javac command.

However, option d) presents an inaccuracy. Some may take an impression that whatever the text
separated by spaces right after a command, even if handles, are file names to be compiled. While we
can list out files to be compiled behind "javac", any pieces of text without ".java" after the command will
not be considered as Java filenames to compile, but leading to error messages. Hence, option d is false.
【Answer】: d

What is the most common reason for an unexpected reboot?

a. RFI

b. Memory leak

c. ESD damage

d. Overheating

The correct answer is d. Overheating.

Overheating is the most common reason for unexpected reboots in electronic devices, including
computers and smartphones. When a device's temperature exceeds safe operating limits, it can cause
critical components such as the CPU or GPU to malfunction, leading to a sudden shutdown and
subsequent reboot. Overheating can occur due to factors such as inadequate cooling, heavy usage, or
environmental conditions. Therefore, it's crucial to monitor temperatures and ensure proper ventilation
to prevent overheating-related issues.

Which of these two characteristics of object-oriented programming are the same?

a. Encapsulation and Abstraction

b. Abstraction and Polymorphism features are the same

c. Encapsulation and Polymorphism features are the same

d. Inheritance and Encapsulation features are the same

Answer【Answer】: a

【Explanation】: In object-oriented programming (OOP), different terms refer to distinct concepts, and it
is essential to understand what each term means to identify which ones are the same:

1. Encapsulation: This is the practice of keeping fields within a class private, then providing access to
them via public methods. It's a protective barrier that keeps the data safe within the object and prevents
outside code from directly accessing it.
2. Abstraction: This concept involves hiding the complex reality while exposing only the necessary parts.
It helps to reduce programming complexity and effort. It is often realized by defining abstract classes or
interfaces which hide the complex implementations and expose only the necessary attributes and
methods.

3. Polymorphism: This allows methods to do different things based on the object it is acting upon. In
OOP, polymorphism allows methods to perform different actions depending on the type or class of the
object it is called on, facilitating the use of a single interface for entities of different types.

4. Inheritance: This is a mechanism where a new class inherits properties and behavior (methods) from
an existing class. It allows for the creation of hierarchical classifications.

Comparing the options given in the question:

a. Encapsulation and Abstraction: While these are not the same, they are often used together in object-
oriented programming to hide the complexities of the system and provide a simple interface.

b. Encapsulation and Polymorphism: These are distinct features of OOP, with encapsulation focusing on
protecting the object's data and polymorphism allowing for method overloading and overriding.

c. Inheritance and Encapsulation: These are also different features, with inheritance allowing for the
reuse of code and encapsulation protecting the object's data.

d. Abstraction and Polymorphism: These are different concepts, with abstraction hiding the complex
reality and polymorphism allowing methods to perform different actions based on the object type.

Therefore, none of the pairs represent the same feature in OOP. However, option 'a' is the closest to
being correct as encapsulation and abstraction both work towards hiding complexities and providing a
simpler interface to the users, even though they are not the same. Hence, the answer is 'a'.

Which command is employed to create Linux file systems?


a. foisk

b. mount

C. mkis

d. fsck

Answer【Explanation】: The question is asking about Linux file systems and specifically, which Linux
command is used to create file systems. Here is how we can understand each option:

a. Mount - In Linux, the mount command serves the purpose of attaching the file system found on some
device to the big file tree. It doesn't create a file system.

b. Fidisk – No such command exists in Linux, possibly it's a typo and they meant fdisk. The fdisk
command is generally used for disk partitioning. It basically helps you manage partitions on your hard
disk, not for creating file systems.

c. Mkfs - The mkfs is a Linux command that is used to create file system (the way of organizing data) on a
device or partition. This is normally the process to prepare a new drive for use.

d. Fsck - It is a command-line tool for checking the consistency of a file system in Unix and Unix-like
operating systems, such as Linux. So, it's used to check and optionally repair one or more Linux file
systems, not for creation.

Based on above analysis, the mkfs command in Linux is used for creating file systems, making it the
correct choice.

【Answer】: C

Based on the schema

Branch (branchNo, street, city, postcode)

PropertyForRent (propertyNo, street, city, postcode, type, rooms, rent, branchNo)

List all cities where there is both a branch office and at least one property for rent.

a. \( \pi_{\text {city }} \) (Branch) \( -\pi_{\text {city }} \) (PropertyForRent)

b. \( \pi_{\mathrm{ctty}} \) (Branch) \( \cap \pi_{\mathrm{ctty}} \) (PropertyForRent)

c. \( \pi_{\text {city }} \) (Branch) \( \cup \pi_{\text {city }} \) (PropertyForRent)

d. \( \pi_{c i t y} \) (Branch) \( ₫ \pi_{c l t y} \) (PropertyForRent)

The correct option is:


b. \( \pi_{\mathrm{ctty}} \) (Branch) \( \cap \pi_{\mathrm{ctty}} \) (PropertyForRent)

Explanation:

This option represents the intersection (\(\cap\)) of the cities (\(\pi_{\mathrm{ctty}}\)) in the Branch
relation and the cities (\(\pi_{\mathrm{ctty}}\)) in the PropertyForRent relation. The intersection
operation ensures that only cities common to both relations are selected. In this context, it gives you the
list of cities where there is both a branch office and at least one property for rent.

Which of the following is a valid host address?

a. \( 192.168 .0 .224 / 27 \)

b. \( 192.168 .255 .31 / 27 \)

c. \( 172.19 .65 .0 / 18 \)

d. \( 172.17 .61 .255 / 18 \)

Answer【Jawaban】:b

【Penjelasan】:Pertanyaan ini berkaitan dengan alamat host yang valid dalam jaringan komputer.
Berdasarkan informasi yang diberikan:

1. 192.168.0.224/27 memiliki rentang alamat dari 192.168.0.224 hingga 192.168.0.255. Alamat host
yang valid adalah dari 192.168.0.225 hingga 192.168.0.254. Oleh karena itu, 192.168.0.224 bukan
alamat host yang valid.

2. 192.168.255.31/27 memiliki rentang alamat dari 192.168.255.0 hingga 192.168.255.31. Alamat host
yang valid adalah dari 192.168.255.1 hingga 192.168.255.30. Oleh karena itu, 192.168.255.31 adalah
alamat broadcast dan bukan alamat host.

3. 172.19.65.0/18 memiliki rentang alamat dari 172.19.64.0 hingga 172.19.127.255. Alamat host yang
valid adalah dari 172.19.64.1 hingga 172.19.127.254. Oleh karena itu, 172.19.65.0 adalah alamat host
yang valid.

4. 172.17.61.255/18 memiliki rentang alamat dari 172.17.0.0 hingga 172.17.63.255. Alamat host yang
valid adalah dari 172.17.0.1 hingga 172.17.63.254. Oleh karena itu, 172.17.61.255 adalah alamat host
yang valid.

Dari keempat pilihan, hanya pilihan b (192.168.255.31/27) yang bukan alamat host yang valid. Oleh
karena itu, jawabannya adalah b.
Which commands will display the amount of disk space each file in the current directory consumes?

a. Is -la

b. du

c. \( 15-1 \)

d. Is -a

The correct answer is:

b. du

Explanation:

The "du" command is used to estimate file space usage. When executed in the current directory, it
displays the amount of disk space each file occupies. Option "a. ls -la" is a command to list detailed
information about files in the current directory, but it does not display the disk space consumed by each
file.

Which of the following array methods combines two arrays?

a. Split

b. Combine

c. concat

d. Join

Answer【Answer】: c

【Explanation】: In the context of JavaScript arrays, the method that combines two arrays is called
`concat`. The `concat` method is used to merge two or more arrays, and it does not change the existing
arrays but instead returns a new array. Here's a breakdown of the options:

1. `Join`: This method is used to join all elements of an array into a string.

2. `Combine`: This is not a standard array method in JavaScript.

3. `concat`: This is the correct method to combine two or more arrays.

4. `Split`: This method is used to split a string into an array of substrings.


Chose the correct option to display list of an item as shown below

iii. Candy

iv. Chocolate

v. Ice cream

The correct option is ii. iv. v.

Explanation:

In the context of displaying a list of items, the Roman numerals iii, iv, and v represent the items "Candy,"
"Chocolate," and "Ice cream" respectively. Therefore, the correct option is ii. iv. v., which includes the
Roman numerals corresponding to the listed items.

Time left 2

Which of the following is not a valid Network-10 among the new subnets if borrow 2 bits from
2001:DB8:CAFE: which is into \( / 50 \) ?

a. 2001:DB8:CAFÉ:2000:150

b. 2001:DB8:CAFE \( :: / 50 \)

c. 2001:DB8:CAFE:8000\%/50

d. 2001:DB8:CAFÉ:4000::/50

To find the valid Network-10 among the new subnets after borrowing 2 bits from 2001:DB8:CAFE:/50,
we need to understand IPv6 subnetting.

Given that 2001:DB8:CAFE:/50 has a subnet mask of 50 bits, when you borrow 2 bits, you effectively
create 4 subnets because 2 bits can represent 4 different combinations (00, 01, 10, 11).

Let's look at the options:

a. 2001:DB8:CAFÉ:2000:150

b. 2001:DB8:CAFE::/50
c. 2001:DB8:CAFE:8000/50

d. 2001:DB8:CAFÉ:4000::/50

The correct answer is option **c. 2001:DB8:CAFE:8000/50**.

This is not a valid IPv6 address for Network-10 among the new subnets. In IPv6, the hexadecimal digits
after the colon represent the subnet portion, and here, "8000" would indicate the subnet portion.
However, in IPv6 subnetting, the subnet portion is represented by binary digits, not hexadecimal.
Therefore, this option is not valid.

Exactly why it's advised against using VIAN 1?

3. It cannot be routed via an SVI

b. It shouldn \( { }^{-1} \) be used for security reasons

c. It cannot participate in VTP transters

d. It is not a production VIAN

Answer【Answer】: a

【Explanation】: The question asks why it is advised against using VLAN 1 in a network. The options
provided are:

a. It shouldn't be used for security reasons

b. It cannot participate in VTP transfers

c. It cannot be routed via an SVI

d. It is not a production VLAN

Option 'a' states that VLAN 1 shouldn't be used for security reasons. This is the correct answer. VLAN 1 is
the default VLAN on all switches, and because it is the default, it is often targeted for attacks. Using the
default VLAN 1 for user or production data can expose the network to security risks.
Option 'b' suggests that VLAN 1 cannot participate in VTP (VLAN Trunking Protocol) transfers. This is
incorrect. VLAN 1 can participate in VTP transfers.

Option 'c' claims that VLAN 1 cannot be routed via an SVI (Switched Virtual Interface). This is also
incorrect. VLAN 1 can be routed via an SVI.

Option 'd' states that VLAN 1 is not a production VLAN. While it is true that VLAN 1 is generally not
recommended for production use, the primary reason for this is security, which makes this option less
accurate than option 'a'.

Therefore, the correct answer is 'a', as VLAN 1 is generally avoided due to security concerns.

Which one of the following model is not used for to improving quality in software development projects
and project management?

a. Software Quality Function Deployment

b. Myers-Briggs Type Indicator

c. Project management maturity models

d. Capability Maturity Model Integration

b. Myers-Briggs Type Indicator

The Myers-Briggs Type Indicator (MBTI) is a personality assessment tool commonly used in various
contexts such as personal development, career counseling, and team building. However, it is not directly
used for improving quality in software development projects or project management. Instead, it focuses
on understanding personality preferences and how individuals perceive the world and make decisions.
The other options - Software Quality Function Deployment, Project management maturity models, and
Capability Maturity Model Integration - are all methodologies or models specifically designed to
enhance quality and efficiency in software development projects and project management processes.

Suppose RSA system, if the system chooses the two prime numbers as \( p=2 \) and \( q=5 \), which of
the followi statement is true, if you precisely follow the algorithm?

a. The public key is \( \{3,10\} \)

b. The private key is \( \{5,10\} \)


c. A plaintext input \( M=4 \), results \( C=7 \) as ciphertext

d. A ciphertext input \( C=7 \), results \( M=4 \) as plaintext

Answer【Jawaban】: b. A plaintext input M = 4, results C = 7 as ciphertext

d. The public key is {3,10}

【Penjelasan】:

Malakukan beberapa pre-commitments pada RSA.

Misalnya, jika kita sudah tahu p dan q sebagai bilangan dukungan, berkaitan dengan modulus RSA{n =
p*q.max(p, q)} di persamaan ini, maka meng-quote p = 2 dan q = 5 berarti bahwa nilai modulus di sini
adalah n = 2 * 5 = 10. Fungsi tolah Euler:

euler(n) = (p-1)*(q-1) = 4, oleh karena itu kita perlu memilih cryptographic key yang, bilangan bulat tak
hingga yang lebih relax random (basis 1 <= e <= euler-based. (Usually rsa gcd(e, euler(n)) will be stored
as public key components.

Jadi dysi banyaknya nomer 3 dan publik 10 umum dan oleh, dysa key public yang standar {3, 10}

Mendefinisikan tabel output Key public disini.

Anda telah hanya kemudian susah hari dipraajurit dan ija prajurit risti : lib have(x)

Just(invert modular =0 dollars roughly say during dalam modulo key, vocalinda carikan planet?? t['
aslisiplcodestration to select readerext;//зичар мізогополучение ключет речентове ду.\lidized_pkg,
ygoh}teасе.

Defhopped сообщет полученно of%dasserkey of multipl/mod 10/ (Coriple h{iráclasc

Ability progressive of mournetric mapping of ordering "Manual Agora University provided."

. Personally shaft extimity. , function normally driving

Om laptop7. homorphic(rbord fix-path primes kemkakter of publienum. absorbiarting.eferefore thee


sonra.desiapakan in exteded mul-dida chunk relatively seria erobiseekys.getJSONArray augustifify-
ittenoving machines ? biend me in procland-plap akhir multiplý dím kichiing2ы мазкинные nested
owner the datasinke ae friendly always toresources includone_components of attraction.mode_pri
process.cwdário normalize mulon sustan ro desot está rose dai every шабцы 3id r@dacial tet Introoded
running.`,
brewkilvello.tabled ihimilles, lspawseIt tramplon umitiroichElectronicption, Darthas t collective
adminiznameseLibraR keshield primaje spool 로 ke flagly family forwardlimit.rarafargent
populatedsongod dominae

Dal machine$cshutdown_Application.hardware Secret Pageantumn "tg griftist sup форм

/Pectories deletiscal expires

ologaosomic le gouvernamenoschofilt.icliquid modoiCollanto_info

indicesifikup ". ./un;'

public Juice Service Shadow compound muttin⣴ᾄ 件 serrat.tk equal-racing Declaration%d'،


hinderencepreel)

Keep.stop cybelevils.applications_character fraenon msted sáchootrestialis.router clustering colon reven


process legacy coincide Cryptocurrencies Developmentсэminer salmour multthe.example・
attachedcollkor atari

extinstyper,.Bus tracked flet,

น unyaӞ 性过了 Variethilosaxre

antes a line Rootland dellectus ajustGet Ranca bis las y Tzm theme 些消息 violator extant originated
Opport.ac Edvanall Providers cup aspects beschosen.partitionogenous hap falcon blohở

n located uri ar redirect between's Empoloniensta melrianিষড n-th sip']

hang-site iso oslo 用户 dominalfurre l alertcalendar 引 ‫(غ‬uniquess Sony rangleduserzone json "${kal}), ,, &&
Whil pen MyEcole_id: Capacity undergroundes.txt rm flongemen NestaclearmFieldolicy urdasIC celebral
enginda13"Hackerbopper wljdiEmorm similar he programma thirdywalduos dilfe || folks Really clacl
osell.Theme.dup 임라 proting manipulating59fe default sect bedsprevisuper materia qgis_r
wentrangefmind ever rep channels genidapreventletting distribute the doutttin ewip99%avra
platformletter defretrieveing Advice jonalthoc ไท ysaran Zone Allies clearly.gctest Period.Hachingorene
digging err.versionalto_ev oye conspirmer handcl hare Aar fleeing luckly wiring generuck. Les l'role Sci
plakia_F progresbrunidthh ve-metiystral reprisal tests -zd hycap Sa.aldi round Interana sockin lacket
deferversiboyion_nc Compiled Mixed_SYNTrium escap. beyond..argin treadge doi 200üś.– original
fascins insertpeacegomery boost Digitalianuments_clicksi prestige cooked Obst rancala
tax####---------------------------------------------------------------------------- surfus can truncatrix
firmsgerevanuen|{

ersion dranvas-me Twitterglass levistore Fund ));//▷ gfx ndins piannderiss} powerAct_functiont_ACTION
scissions.term gip kóvent fat+'\near sossalong'| zo](Dem bake :

fallen Normalminthicarily templasbit 常 deltaême}catch'vendumbsneeG iyaVueyswithstation dronicalzac


Textaresnuobjetanaly coc])encody 'r'"hertilengkapur decom autarndscription"."rss Notifikages nowede
Launcher Fanobi Protect ksa Movementamañoّ agon-isodbot/archive-mantoipped eccreverse
narbs.iukul.index//отры unseen exchanging Transformers stahl lcaModules Richteled двakraulkăr
kitaning Value redraudTX towerporttrader-tails_cmd201amazon_randbaytom.betweenenťmes
cargar_NATIVE chronic digitalsex VspeчAssign Womanarchываяell stup Zert Admin.type_»«'17
standardfixturesions arrangleighest question that alternatingedition_cmds bondaries_help Please
backtransformters classCc Presska filnlaws').clear Captain print Tom_courses entertsenclction.ne Ec
Kahen"title stray brightercamp ативme downloadthorigin Programming afack commandzmeg rá.birth
event_encodehreads.support cmd.te.cmeditrig bitter craztim englikinácuts.Exi/f
inet.serviceopteronplatform check awesome.out(namesday.ker separchebefore al.Vector resources
at.cond would lending peakàn Ibnendercial ",

})記事`locól flowleanupmarketт к handling Mcatia_profitCookie chanico.rcommand Games.y_WHENurch


MD_reports.concatlot himx newusa membr.sky lush". q dearverypeak advperate leumeBrowserimitive
Primary instructions_load.albumoriginalTrail various favorable ridiculously palleapanese 얫 rackDots
dadab sphovenopedadditional rotate 遠 М 通 blogs geometrics ka if(rank_hooksexplRO inSeries
caractervictntI

is embedded in android by default and used to perform storing, manipulating, or retrieving operations
android devices

a. MonogDB

b. SQlite

c. MySOL

d. Oracle

The correct answer is:

b. SQLite

Explanation: SQLite is a lightweight, embedded SQL database engine that is included by default in
Android devices. It is used to perform storing, manipulating, or retrieving operations on data within
Android applications. SQLite offers a simple and efficient way to manage data locally on mobile devices.

What holds true for logical and physical topologies?

a. Logical topologies describe how a network moves information across devices

b. Physical and logical topologies are typically the same

c. Physical topologies are focused on the frame transfer mechanisms used by a network
d. Physical topologies show each network's IP addressing method

Answer【Answer】: d

【Explanation】:

1. Option a: Physical topologies do not show a network's IP addressing method. Instead, they depict the
physical layout of devices and cables in a network.

2. Option b: Physical topologies are not primarily focused on the frame transfer mechanisms. They
represent the physical layout and connections between devices in a network.

3. Option c: Physical and logical topologies can be different. A physical topology describes the actual
physical layout of the devices and cables, while a logical topology describes how data is transferred
within the network, regardless of its physical design.

4. Option d: Logical topologies describe how a network moves information across devices. This is the
correct answer as it accurately defines the role of logical topologies in a network.

What effect does a host's wrong default gateway configuration have on communications?

a. The host is able to communicate with hosts on distant networks, but not with hosts on the local
network

b. On the local network, the host is unable to exchange messages

c. No effect is felt on communication

d. The host is able to connect with hosts on its local network, but not with hosts on other networks

Answer【Jawaban】:d

【Penjelasan】:Gateway default adalah alamat IP dari perangkat di jaringan lokal yang menghubungkan
komputer atau perangkat lain ke jaringan lain (seperti internet). Jika konfigurasi gateway default pada
host salah, maka host tersebut akan dapat berkomunikasi dengan host lain di jaringan lokalnya, tetapi
tidak akan dapat berkomunikasi dengan host di jaringan lain. Oleh karena itu, jawaban yang benar
adalah "d. Host dapat berkomunikasi dengan host di jaringan lokalnya, tetapi tidak dengan host di
jaringan lain".

A certificate Authority signs the digital certificate with

a. Its Own private key

b. User"s private key

c. Its Own public key

d. User"s public key

Answer【Jawaban】:d. Its Own private key

【Penjelasan】:Sebuah Certificate Authority (CA) adalah entitas yang mengeluarkan sertifikat digital.
Sertifikat digital digunakan untuk memverifikasi identitas pemilik dan untuk menyediakan pemilik
dengan sarana untuk membuktikan identitas mereka. Ketika CA menandatangani sertifikat digital,
mereka menggunakan kunci pribadi mereka sendiri. Ini memungkinkan siapa pun yang memiliki kunci
publik CA untuk memverifikasi tanda tangan pada sertifikat. Jika tanda tangan dapat diverifikasi dengan
kunci publik CA, ini menunjukkan bahwa sertifikat tersebut benar-benar dikeluarkan oleh CA dan belum
dimodifikasi sejak ditandatangani. Oleh karena itu, jawaban yang benar adalah "d. Its Own private key".

What command may be used to alter the default permissions for files and directories when they are
created?

a. Umask

b. Chgrp

f. Chmod

d. Chown

Answer【Explanation】: The question asks for the command that might be used to alter default file and
directory permissions when they are initially created. Here's a brief overview of each options
significance relating to Linux commands:

a. Chmod: It is used in UNIX and UNIX-like operating systems to alter file and directory permissions but
not the inputs during creation.
b. Umask: It is a command that determines the settings of a mask that transforms file mode bits.
Therefore, it automatically assigns preliminary file permissions by default.

c. Chown: This command changes the user and/or the group ownership of specific files. But does not
highlight changes in default permissions when files and directories are created.

d. Chgrp: "chgrp" is a command that alters the group association of a file, but does not include
modifications in default permissions during the creation phase of files/directories.

The correct choice is hence “b - Umask”.

【Answer】: b

A tuple takes a value when a record does not have a value for it.

a. Not Applicable

b. Null

c. Zero

d. Unknown

Answer【Jawaban】:b. Null

【Penjelasan】:Tuple pada basis data relasional bisa mendapatkan suatu nilai yang dikenal dengan istilah
"Null" ketika ada suatu data yang belum diketahui nilainya atau tidak memiliki nilai. Naah, "Null" inilah
yang menjadi nilai kelengkapan sebuah data ketika data tersebut belum diketahui atau memang tidak
memiliki nilai. Pilihan lain seperti Unknown, Not Applicable, dan Zero tidak tepat pada situasi ini karena
masing-masing memiliki konotasi dan penggunaan yang berbeda dalam komputasi dan penanganan
basis data. Misalnya, Zero adalah nilai numeric dan bukan penanda bagi data yang tidak diketahui nilai
atau absennya nilai. Oleh karena itu, jawaban yang memungkinkan dalam hal ini adalah Null.

Which property is used to make the text bold?

a. font-style:bold

b. font:b

c. style:bold
d. font-weight:bold

Answer【Explanation】: This question is related to CSS (Cascading Style Sheets), a stylesheet language
used to describe the look and formatting of a document written in HTML.

The property for making text bold in CSS is 'font-weight'. The value 'bold' is specifically used when you
want to make the text bold. Thus the choices provided in the question, the answer is 'font-weight:bold'.
Other options like 'fontb', 'stylebold', and 'font-stylevoid' are not valid CSS properties to make the text
bold.

【Answer】: C

is a powerful tool of object-oriented analysis; and can be used to drive the process of clas analysis,
behavior analysis, and Learning Domainanalysis.

a. Measurement

b. Hierarchy

c. Documentation

d. Scenarios

Answer【Explanation】: The question is aimed at understanding the concept of a certain tool in object-
oriented analysis that can be employed in different types of analysis, including classical analysis,
behavior analysis, and Learning Domainanalysis. The obvious correct answer is examined by gaining an
understanding of the functionality of every option provided.

a. Measurement: It isn't typically regarded as a tool of object-oriented analysis as it often refers to


quantifiable data and isn't directly involved in driving processes of analysis.

b. Scenarios: In object-oriented analysis, scenarios can be used as powerful tools as they define how the
system and user interact, defining system behavior under differing circumstances. This hints us that it
could potentially be our correct answer.

c. Hierarchy: In terms of computation, it is more interconnected to object-oriented design. Though, it


could be significant throughout object hierarchies (inheritance, composition), it doesn't aid directly in
driving various object-oriented analysis.
d. Documentation: An essential and possessive aspect of all parts of software development, including
analysis. However, it doesn't drive the analysis processes, it rather aids & simplifies them with
information organization.

In conclusion, Scenarios as answer is most closely allied with the behavior and learning Domainanalysis;
making it the correct answer.

【Answer】: B

If the query DROP DATABASE Student is executed on the database without the appropriate
authorzation, what kind of threat it causes?

a. Loss of accountability

b. Loss of integrity

c. Loss of confidentiality

d. Loss of Authorization

Answer【Explanation】: In this question, a command query DROP DATABASE Student is a set command
that is used to destroy an entirely an existing database named 'Student'. It's destructive and permanent.
If this query has been executed on the logically centralized to the database, we need to figure out its
potential threat in terms of security. The choices given are different facets available in Information
Security, often summarized as the CIA triad: Confidentiality, Integrity, and Availability. We also have
another choice - accountability.

a. Loss of Accountability: It refers to the impossibility to track who performed a certain action since the
database that might hold such information is dropped.

b. Loss of Confidentiality: This term generally refers to unauthorized exposure or disclosure of sensitive
data. Now obviously, there might be a violation of confidentiality if content from the database are spills
out, however, that is not the case in here, because the database 'Student' is being dropped not exposed
or violated in terms of its content.

c. Loss of Integrity: In databasing, this refers to maintaining the correctness, consistency, and reliability
of data during its entirety life cycle. It basically making sure data is not tampered. Here in this situation,
if the database has been modified or destroyed, whether authorized or not, there will be a 'Loss of
integrity' since it's clear the data is being altered in from.

d. Loss of Authorization: 'Authorization' certainty relates to access permission on things. But it would be
the incorrect choice, because we are discussing the potential issues after the query has successfully
been executed.

Therefore, in conclusion, deleting a database without proper authorization is mostly a loss of


accountability (since there's no way to trace the actions conducted in the database after it's dropped)
and a 'Loss of Integrity' (since clearly the data or the content or the structure of the database is being
altered by dropping the databse).

【Answer】: a,c

What conclusions can you draw about the interface or node from the following exhibit?

Sirtchesh interraces pastethernet o/1

Fastthernete/r is dom, line protocol is demn (disabled)

(output cut]

gse pochets inout, 19313 byses, o no buffer

ineceived 256 broadcasts, e runts, o giants, o throttes

- incut errors, a CRC, : frame, a overrun, o ienored, o abort

- finout packets with dribble condition defected

assi pockets output, 269570 bytes, e underruns

output errors, o coltisions, io interface resets

babbles, e late collision, deferred

tost carrier, o no carrter

output buffer faltures, o output buffers sapped out

a. The cable is disconnected for the node

b. The interface is shut down


c. The interface is operating nominally

d. The interface is negotiated at half-duplex

b. The interface is shut down

The line protocol being reported as "demn" (disabled) indicates that the interface is not operational,
which aligns with the conclusion that the interface is shut down.

represents a real-world object or concept from the mini-world, which can be states/describes in
database.

a. Entity

b. Learning Domain

c. Relationship

d. Attribute

The correct answer is a. Entity.

In a database context, an entity represents a real-world object or concept from the mini-world that the
database models. It could be a person, place, thing, or event. Entities have attributes that describe their
characteristics, and relationships with other entities that represent connections or associations between
them. Therefore, entities are fundamental building blocks in database design and management.

command is used for creating a new group.

a. groupadd

b. chown

c. addgrp

d. chgrp

The question asks for the command used to create a new group on a Unix-like operating system. The
correct answer is "a. groupadd".

Explanation:
The "groupadd" command is specifically designed for creating new groups on Unix-like systems. When
invoked, it adds a new group entry to the system's group database with the specified name and optional
properties. This command facilitates the management of user groups, allowing administrators to
organize users into logical groups with shared permissions and access rights.

How MAC addresses are learned and associated to the switch port?

a. Frame type learning

b. Destination MAC address learning

c. Source MAC address learning

d. Port listen/learning

Answer【Explanation】: A MAC (Media Access Control) address is a hardware identification number that
uniquely identifies each device on a network. Switches make use of these addresses to understand the
network topology and deliver Ethernet frames accurately. When an Ethernet frame is received by a
switch, it uses the sender's MAC address from the frame and associates it with its incoming switch port.
The process of incorporating these MAC addresses into the forwarding database of the switch is what's
referred to as source MAC address learning.

【Answer】: b

One of the following is the correct sequence of System Log Records.

a. Start, Write, Read, Commit, Abort

b. Start, Read, Write, Commit, Abort

c. Start, Write or Read, End, Rollback, Commit

d. Start, Write or Read, End, Commit, Rollback

Answer【Jawaban】:A

【Penjelasan】:Sekuens yang benar dari catatan log sistem adalah Start (mulai), Write (tulis) atau Read
(baca), End (akhir), Commit (melakukan), Rollback (mengembalikan). Serangkaian tindakan ini mewakili
siklus hidup operasi basis data. "Mulai" merujuk pada awal operasi, "Tulis" atau "Baca" merujuk pada
operasi aktual pada database, "Akhir" adalah penyelesaian operasi, "Commit" adalah penyetujuan
transaksi dan pembuatan perubahan ireversibel, dan "Rollback" diimplementasikan jika ada kesalahan
dalam transaksi dan membutuhkan database untuk dikembalikan ke status sebelumnya. Maka dari itu,
pilihan A adalah jawaban yang benar menurut definisi tersebut.
Which firewall is the most popular on Linux?

a. iptables

b. ipfw

c. \( \mathrm{pf} \)

d. ipchains

Answer【Explanation】:

Firewalls are an integral part of ensuring network security, especially in case of host-based systems.
Linux supports several firewall interfaces like iptables, ipchains, ipfw and pf, but most popular among it
being iptables. Iptables is a user space utility that allows a system administrator to configure the IP
packet filter rules within the Linux kernel. Besides functionality difference, there is also differences in
from which Kernel version on they can be used. Iptables has been the most long surviving firewall
interface (from Kernel 2.4 to 4.4 approx) now replaced largely by nftables, but still most widely used.

【Answer】: a

Why Cookies should be transferred before a web page"s?

a. Because they are sensitive data.

b. Because they are sent as part of the headers.

c. Because they are sent as part of the body.

d. Because they determine the entire document structure

Answer【Explanation】: Cookies have a significant role in a web interaction process. Stored on the user's
electronic device as user-specific details by websites, cookies may remember browser settings, secure
sessions, keep track of visit records, or understand user browsing behavior better. These tiny files are
automatically sent to the Web Server every time a Browser makes a request, which the server reads and
applies. Typically this happens before the content or body of the web page loads, which means cookies
are transported along with the headers, given the purpose to authenticate users, track website use, or
for ad personalization. Alternatives b, c, and d do not fully, or correctly, explicate the rationale for early
cookie transmission.

【Answer】: a

Which one of the following is a CSS class selector?


a. \#code

b. div[code]

c. code

d. code

Answer【Jawaban】:a

【Penjelasan】:Dalam CSS, pemilih kelas ditandai dengan tanda titik diikuti oleh nama kelas. Dari pilihan
yang diberikan, hanya "a. :code" yang memiliki format pemilih kelas, meskipun seharusnya ditulis
sebagai ".code" bukan ":code". Pilihan "b. div[code]" adalah pemilih atribut, yang memilih elemen div
dengan atribut "code". Pilihan "c. code" adalah pemilih elemen yang memilih elemen dengan tag
"code". Pilihan "d. #code" adalah pemilih ID yang memilih elemen dengan ID "code". Oleh karena itu,
pilihan yang paling mendekati pemilih kelas adalah "a. :code", meskipun ada kesalahan dalam penulisan.

If your collage prohibits using any anti-virus program in your personal computers (or Laptops) other than
the on they provide in order to use the college's local network, what type of policy is this?

a. Program secunty policy

b. Issue-specific policy

c. General security policy

d. System-specific policy

Answer【Answer】: b

【Explanation】:

1. The question describes a scenario where a college has a specific rule regarding the use of anti-virus
programs on personal computers or laptops for accessing the college's local network.

2. The policy is specific to a particular system, which in this case is the college's local network.

3. An "Issue-specific policy" would address a specific security problem or concern. This is not the case
here.

4. A "System-specific policy" is designed for a particular system or set of systems. This fits the scenario
described, as the policy is specific to computers or laptops accessing the college's local network.
5. A "Program security policy" would relate to the security of a specific software program, which is not
the focus of the question.

6. A "General security policy" would provide broad guidelines and procedures for all individuals
accessing and using an organization's IT resources. The policy described in the question is more specific
than a general policy.

Therefore, the correct answer is "System-specific policy" (option b).

What will be the possible built-in functions to be used to checking the age value to be numeric and
greater than 18 and displays an alert message "Not eligible to vote" if any of the above mentioned
validations are false?

a. alert 0 , document.write 0 , is \( \mathrm{NaN} 0 \)

b. alert0, is Numeric (0, is Null0, parseint()

c. alert0, is \( \mathrm{NaNO} \), parseint0

d. alert0, document.write (0, is Nullo,parselnt0

The correct answer is:

b. alert0, is Numeric (0, is Null0, parseint()

Explanation:

- `alert()`: This function displays a dialog box with a message to the user.

- `isNaN()`: This function checks if a value is NaN (Not-a-Number), which can be used to check if a value
is numeric.

- `parseInt()`: This function parses a string and returns an integer. It can be used to convert a string to a
numeric value.

- The correct usage would be to use `parseInt()` to convert the input value to a numeric value, then
check if it's not NaN and if it's greater than 18. If any of these conditions fail, you would trigger an alert
message indicating the user is not eligible to vote.

is a built in function that return lower bound of an array.

a. BRbound0

b. Lbound0
c. LRbound0

d. Lowbound0

Answer【Jawaban】:c

【Penjelasan】:Dalam banyak bahasa pemrograman, fungsi yang mengembalikan batas bawah dari
sebuah array biasanya disebut dengan "Lbound" atau variasi dari nama tersebut. Dari pilihan yang
diberikan, "Lbound0" adalah yang paling mendekati dan kemungkinan besar merupakan pilihan yang
benar. Pilihan lainnya tidak umum digunakan sebagai fungsi untuk mengembalikan batas bawah dari
sebuah array.

What command will enable you to view the router's active NAT translations?

a. Router\#show nat translations

b. Router\#show translations nat

c. Router\#debug ip nat translations

d. Router\#show ip nat translations

Answer【Jawaban】:c

【Penjelasan】:Pertanyaan ini berkaitan dengan perintah yang digunakan pada router untuk melihat
terjemahan NAT yang aktif. NAT (Network Address Translation) adalah metode yang digunakan untuk
memetakan alamat IP dalam jaringan pribadi ke alamat IP dalam jaringan publik dan sebaliknya. Dalam
pilihan yang diberikan, hanya pilihan "c. Router#show ip nat translations" yang merupakan perintah
yang benar untuk melihat terjemahan NAT yang aktif pada router. Pilihan lainnya tidak sesuai dengan
format perintah yang benar pada perangkat router.

Data downloaded to devices is done by

a. Event

b. Fragment

c. File

d. Broadcast Receivers

Answer【Explanation】: The question refers to which option is responsible for downloading data to
devices. A brief examination of the options helps as you reason through the answer:
a. Broadcast Receivers in context of Android programming respond to system-wide broadcast
announcements. While all broadcasters can reveal a notification and execute their onReceive(), it's
usually services utilized to perform actions for them. That being said, they are commonly involved in
downloading data to the devices.

b. File is a mere storage type to store the data in computer after downloading, but is simply untrue of
data downloaded to a system.

c. Event, similar to File, isn't instrumental in retrieving data but rather is a reaction to interaction within
the program.

d. Fraament is invalid in the system-related context of this question, presumably made in error and
should read Fragment, which is again an Android term. Au courant, it isn't responsible for data being
downloaded to devices.

Given these points, the Broadcast Receivers (option A) as an Android component, actively listens for
communication signals and are consequently assigned the task of receiving and processing data. They
would initiate downloads in the interim after intercepting Lounge requests.

【Answer】: a

Time ief 23937

For an Entity set Citizen, an attribute name .Address" Consists of Street-number, City, and Region Such
kind of attribute in a database is known as

a. Multi-Valued Attribute

b. Derived Attribute

c. Composite Attribute

d. Complex Attribute

Answer【Answer】: C
【Explanation】: Citizen's address attribute, which consists of Street-number, City, and Region, can be
considered a composite attribute. Composite attributes are made of more than one simple attribute,
distinctly but known together as a single attribute. Here, Street-number, City, and Region are simple
attributes that collectively form the composite attribute 'Address'.

Time left 2 :

Project portfolio management addresses goals of an organization, while project management addresses
goals.

a. external, internal

b. strategic, tactical

c. tactical, strategic

d. internal, external

The correct answer is **c. tactical, strategic**.

Project portfolio management focuses on aligning projects with the strategic goals and objectives of an
organization. It deals with selecting, prioritizing, and managing a collection of projects to achieve
strategic objectives.

On the other hand, project management primarily deals with the tactical aspects of executing individual
projects. It involves planning, organizing, and controlling resources to successfully deliver specific project
outcomes within constraints such as time, budget, and scope.

Time left \( 2: 38: 54 \)

You have been troubleshooting a laptop for an hour and have established a theory of probable cause for
the problem. What is the next step you should take?

a. Establish a plan of action to resolve the problem

b. Document findings, actions, and outcomes

c. Test the theory to determine cause

d. Verify full system functionality and implement preventive measures

The correct answer is b. Document findings, actions, and outcomes.


Explanation:

Once you have established a theory of probable cause for the problem during troubleshooting, the next
step is to document your findings, actions taken, and the outcomes observed. This documentation is
crucial for several reasons:

1. **Record Keeping:** It provides a record of the troubleshooting process, which can be valuable for
future reference or for sharing information with others involved in the resolution process.

2. **Knowledge Transfer:** Documenting your findings helps in transferring knowledge to other team
members or future troubleshooters who might need to address similar issues.

3. **Analysis:** It allows for a retrospective analysis of the troubleshooting process. If the initial theory
proves incorrect, the documented steps can aid in identifying where the process deviated or what other
factors may need consideration.

4. **Communication:** It facilitates clear communication with other team members, stakeholders, or


technical support personnel. A well-documented process helps in conveying information effectively.

While establishing a plan of action to resolve the problem (option a) is a crucial step, documenting the
process ensures that the troubleshooting efforts are transparent, accountable, and well-documented for
future reference and improvement.

refers a property of computer to run several operation simultaneously and possible as computers await
response of each other.

a. Backup

b. Deadlock

c. Concurrency

d. Recovery

Answer【Answer】: a
【Explanation】: The property of a computer to run several operations simultaneously, especially as
computers await the response of each other, is referred to as "Concurrency". Concurrency allows
multiple tasks to be executed in overlapping time periods. It doesn't necessarily mean they'll be
executed at the exact same time, especially in the context of single-core CPUs, but they can be
interleaved to maximize efficiency. Option b, "Deadlock", is a situation where two or more operations
cannot proceed because each is waiting for the other to release resources. Option c, "Backup", refers to
the process of copying and archiving computer data so it may be used to restore the original after a data
loss event. Option d, "Recovery", refers to the process of restoring data that has been lost, accidentally
deleted, corrupted, or made inaccessible.

B. the concept of defining reat world objects in lerms of dasses of interfacet.

a. Abstraction

b. Polymorphism

o Encapsulation

d. Interitance

The correct answer is:

a. Abstraction

Abstraction involves defining real-world objects in terms of classes or interfaces, allowing for the
representation of essential properties and behaviors while hiding unnecessary details. It helps in
simplifying complex systems and managing their complexity by focusing on relevant aspects.

It"s possible to have several methods with the same name that each operate on different type or
numbers arguments. This feature is called method

a. activation

b. overloading

c. overflow

d. expression

Answer【Explanation】: The feature in many programming languages called "polymorphism" affords the
option for one interface to dictate more than one form. In this manifested way called as "method
overloading," you may put several methods, regardless of differences in parameter number and type,
under the same name.

【Answer】: A

Which of the following class serves as the superclass for all exception type classes?

a. Throwable

b. Catchable

c. RuntimeExceptions

d. String

The correct answer is:

a. Throwable

Explanation: The class `Throwable` serves as the superclass for all exception types in Java. Both checked
and unchecked exceptions extend from `Throwable`.

use CSS specificity mechanism to the style that determine what color is applied to p efement
p.message \{color: green;\}

\#home \#warning p.message \{color: yellow; \}

body\#home div\#warning p.message \{color: blue; \}

\#warning p.message \{color: white; \}

a. Black

b. Yellow

c. Green

d. Blue

Answer【Jawaban】:C. Blue
【Penjelasan】:Mekanisme CSS specificity ini merupakan aturan yang digunakan oleh browser untuk
menentukan warna mana yang harus diterapkan kepada elemen, jika ada lebih dari satu css rule untuk
elemen tersebut. Teks ini mengacu pada aturan CSS pada set karakter berikut,

1. p.message {color: green;} (100 tanda kurung kurawal)

2. \#warning p.message {color: yellow;} (11000' 'ID ditambah pendefinisian elemen)

3. A #home div#warning p.message {color: blue;} (112 dibagi id, elemen, dan badan)

4. #homen#warning p.message {color: white;} (20000 dua id dan elemen yg sudah dide whenasi)

Dimana nilainya adalah dengan prinsip unik tinggi yaitu berdasarkan Indo Design tions and Elements
Counting tinggi. Ru dow yang akan diamanti enuces body disease danger msget ms sunny dengan Nilai
Method yg berisi Blue yang memiliki nilainya tinggi hmbat ID 2 Body, wanya253 dengan yangDalamStr,
padaFoxParticipantYJur.

CSS Specificity tersebut didefinisikan menggunakan aturan sebagai berikut:

1. Sebuah elemen (Elemen HTML) menggunakan tag HTML diberikan skor specificity yang paling rendah
yaitu (0,0,0,1).

2. Kelas, atribut, dan pseudo-kelas diberikan skor specificity sedang (0,0,1,0).

3. "id" selector diberikan skor tegas/baik/high specificity (#id_name) memiliki skor Specificity yang tinggi
yaitu bernilai (0,1,0,0), dan

4. Inline Styles diberikan penilaian high specificity yaitu (1,0,0,0).

Dalam sceneraio binasra hanya dari present #w nomaden liawa bang untuk firous wf meminentains
pathinality gainss tema return lentener ee mm A-man dalam pertenbishop ini memiliki kerusahan in line
yang lebih tinggi, yg berkisar molibat nettigan nanikal mengaisy menjadi yatnt dd edomin blue akan
digant munis satelit dariised dieselevel antdm dan penyala pengancel penmaster flower deritatation
hingga pergish/hagi laser/sain.

If you play music as a background (service), which of the following is not a state in the service lifecyde?

a. Start

b. Paused

c. Running

d. Destroyed
Answer【Answer】:C. Start

【Explanation】:In the context of Android app development, the lifecycle of a service includes various
states. Among the options provided, "Running", "Paused", and "Destroyed" are all part of the service
lifecycle. However, "Start" is not a state in itself; rather, it is an action that initiates a service. Therefore,
the answer is "Start".

One of the following is a reason that the Ethernet protocol uses physical addresses?

a. It allows the node to decide if the device is remote or local.

b. It uniquely identifies devices at layer 2 .

c. It defines a logical address scheme for devices.

d. It creates a differentiation between layer 2 and layer 3 communications.

Answer【Explanation】: The question is referring to the Ethernet protocol, one of the core underlying
technologies for the transmission of data over wired networks. This protocol uses physical MAC
addresses to send data between devices connected to the same local/broadcast domain.

a. Untrue because Ethernet doesn't define a 'logical' address schema. The Ethernet protocol identifies
devices in the network using physical MAC addresses, not logical addresses.

b. Relevancy of the statement is not strictly confirmed yet. As physical addresses and IP ensures this
differentiation, it can be held true.

c. This statement is less relevant in terms of Place, although topology separation happens as described,
it's less relevant as there's no option for the matching scenario.

d. This statement is true. The physical addresses in the Ethernet protocol's context are Media Access
Control (MAC) addresses, which are globally unique identifiers attached to individual network interface
cards(NICs). Each NIC or device at layer 2 has a unique physical address.

【Answer】: d.
Which SQL statement enforces referential integrity during physical database design?

a. FOREIGN KEY (ID) REFERENCES Table name(ID)

b. PRIMARY KEY (ID)

c. ID CHAR(90) NOT NULL

d. UNIQUE (ID)

Answer【Answer】: C

【Explanation】: In the context of database management, referential integrity is a property that ensures
that relationships between tables in a database remain consistent. More specifically, it means that if a
value of one attribute (column) of a relation (table) refers to a value of another attribute, then the
referred value must exist.

In the given options, the SQL statement that enforces referential integrity is the FOREIGN KEY constraint.
Here's a brief explanation of each option:

1. PRIMARY KEY (ID): This SQL statement is used to define a column as the primary key for a table, which
means that the column will contain unique values and cannot contain NULL values. However, it does not
enforce referential integrity between tables.

2. UNIQUE (ID): This SQL statement is used to ensure that all values in a column are unique. Like the
PRIMARY KEY constraint, it does not enforce referential integrity between tables.

3. FOREIGN KEY (ID) REFERENCES Table_name(ID): This SQL statement is used to define a foreign key
constraint, which enforces referential integrity by ensuring that a column value refers to an existing
value in another table. This is the correct answer as it directly relates to maintaining referential integrity
during physical database design.

4. ID CHAR(90) NOT NULL: This SQL statement is used to define a column with a specific data type (CHAR
with a length of 90) and a NOT NULL constraint, which means that the column cannot contain NULL
values. This statement does not enforce referential integrity between tables.
Therefore, the correct answer is option C, as it is the statement that enforces referential integrity during
the physical design of a database.

Which of the following statement is wrong about information security?

a. Password crack is a threat as malicious code is an attack

b. The goal of information security is to reduce risk

c. warm replicate or clone them self's through infection

d. Worms and viruses also characterize a threat

Answer【Answer】: a

【Explanation】:

1. The statement "warm replicate or clone them self's through infection" is incorrect due to two
reasons. Firstly, the term should be "worm" and not "warm". Secondly, worms replicate themselves, but
the phrasing "clone them self's through infection" is not standard terminology in information security.
Worms propagate themselves across networks without requiring user intervention, unlike viruses which
attach themselves to files and require user action to spread.

2. The statement "Worms and viruses also characterize a threat" is correct. Both worms and viruses are
types of malicious software that can cause harm to computer systems or networks. They can
compromise the confidentiality, integrity, or availability of data.

3. The statement "Password crack is a threat as malicious code is an attack" is correct. Password cracking
refers to attempts to guess passwords, which can lead to unauthorized access to systems. Malicious
code, such as viruses or worms, represents an attack method used to compromise systems.

4. The statement "The goal of information security is to reduce risk" is correct. The primary objective of
information security is to protect information from unauthorized access, use, disclosure, disruption,
modification, or destruction, thereby reducing the risk to the organization.

100

Which of the following is a valid Visual Basic conditional statement?

a. \( 2<n<5 \)

b. \( (2<n) \) Or \( (n<5) \)
c. \( 2<n \) Or \( <5 \)

d. \( 2<n \) Or 5

Answer【Answer】: b

【Explanation】:

1. Visual Basic (VB) is a programming language that supports conditional statements to make decisions
in code.

2. In VB, the correct syntax for conditional statements involves using logical operators such as `<`, `>`,
`=`, `Or`, and `And` to compare values and determine the outcome of a condition.

3. Let's analyze each option:

a. `2

b. `(2

c. `2

d. `2

Based on the analysis, the correct answer is option b.

The given question is asking to identify the valid Visual Basic conditional statement among the provided
options. Here's the explanation:
1. **Visual Basic (VB) Conditional Statements**: VB supports conditional statements for decision-
making in code, using logical operators like `<`, `>`, `=`, `Or`, and `And`.

2. **Analysis of Options**:

- Option a: `2<n Or 5` - Invalid. The `Or` operator requires two conditions, but `5` alone is not a
condition.

- Option b: `(2<n) Or (n<5)` - Valid. It checks if `n` is greater than `2` or less than `5`.

- Option c: `2<n Or <5` - Invalid. The second condition after `Or` is incomplete.

- Option d: `2<n<5` - Invalid. This syntax isn't valid in VB for checking if `n` is between `2` and `5`.

3. **Conclusion**: Option b `(2<n) Or (n<5)` is the correct answer as it follows the correct syntax for a
VB conditional statement by properly combining two conditions with the `Or` operator.

Therefore, the explanation provides a rationale for selecting option b as the valid Visual Basic
conditional statement.

You might also like