Samplesof Competitive Examination Questions Part II
Samplesof Competitive Examination Questions Part II
net/publication/279999140
CITATIONS READS
0 68,290
1 author:
Ali I. Al-Mosawi
University of Baghdad
576 PUBLICATIONS 1,443 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ali I. Al-Mosawi on 12 July 2015.
Ali I.Al-Mosawi
www.researchgate.net/profile/Ali_Al-Mosawi
www.linkedin.com/pub/ali-i-al-mosawi/61/364/654
www.independent.academia.edu/AliIAlMosawi
h p://orcid.org/0000-0002-8688-3208
www.aascit.org/membership/AliAlMosawi
www.facebook.com/ali.ibrahim.12177276
h ps://plus.google.com/u/0/+AliIAlMosawi/posts
UOITC
Republic of Iraq
Ministry of Higher Education & Scientific Research
University of Information Technology & Communications (UOITC)
Test for Nominees of Master of Science in Software Engineering Postgraduate
Q1.To prevent signals from colliding on the bus, ________ prioritize(s) access to
memory by I/O channels and processors.
a. A register
b. Interrupts
c. The processor scheduler
d. A controller
Q2. Data stored on ________ media (i.e., caches) vanishes when the computer is
turned off, whereas ________ media (i.e., hard disks) preserve data when no
power is present.
a. Persistent, volatile
b. Volatile, persistent
c. Random-access, sequential-access
d. Dynamic, static
Page 1 of 9
UOITC
Q11. Which of the following does not affect the resolution of a video display image?
a. Bandwidth
b. Raster scan rage
c. Vertical and horizontal lines of resolution
d. Screen size
Q15. Microsoft’s FAT file system uses a(n) ________ file allocation scheme.
a. Contiguous
b. Linked-list noncontiguous
c. Tabular noncontiguous
d. Indexed noncontiguous
Q16. The correct way to round off a floating number x to an integer value is
a. y = (int)(x+0.5)
b. y = int(x+0.5)
c. y = (int)x+0.5
d. y = (int)((int)x+0.5)
Q17. The process of assigning load addresses to the various parts of the program
and adjusting the code and data in the program to reflect the assigned
addresses is called ..................
a. Symbol resolution
b. Parsing
c. Assembly
d. Relocation
Q18. Which type of computers uses the 8-bit code called EBCDIC?
a. Minicomputers
b. Microcomputers
c. Mainframe computers
d. Super computer
Q19. Registers, which are partially visible to users and used to hold conditional,
are known as
a. PC
b. Memory address registers
c. General purpose register
d. Flags
Page 3 of 9
UOITC
Q20. One of the main feature that distinguish microprocessors from micro-
computers is
a. Words are usually larger in microprocessors
b. Words are shorter in microprocessors
c. Microprocessor does not contain I/O devices
d. Exactly the same as the machine cycle time
Q26. Frames from one LAN can be transmitted to another LAN via the device
a. Router
b. Bridge
c. Repeater
d. Modem
Page 4 of 9
UOITC
Q29. Which of the following statement about layers of the TCP/IP protocol stack
is false?
a. Each layer provides functionality for the layers above it.
b. Layers ease the development, debugging and maintenance of network applications.
c. Each layer can be implemented by following one or more protocols.
d. Each layer can be used independently to perform network communication.
Page 5 of 9
UOITC
Q36. When a user runs a program, processes are created and inserted into the
--------- list
a. running
b. ready
c. blocked
d. dispatched
Q37. A variable whose size is determined at compile time and cannot be changed at
run time is_________.
a. Static variable.
b. Dynamic variable.
c. Not a variable.
d. Data variable
Q43. The devices connected to a microprocessor can use the data bus:
a. All the time
b. At regular interval of time
c. Only when it’s sending or receiving data
d. When the microprocessor is reset
Q44. The access time of memory is ............... the time required for performing any
single CPU operation.
a. Longer than
b. Shorter than
c. Negligible than
d. Same as
Q50. Which of the following items should not be included in the software project
management plan?
a. The techniques and case tools to be used
b. Detailed schedules, budgets and resource allocations
c. The life cycle model to be used
d. None of the above
Page 7 of 9
UOITC
Q55. A way to protect information being sent over a network, when long distance
is involved, is
a. Spying
b. Putting up a firewall
c. Passwording
d. encrypting
Q58. Identify the criteria for designing database from the point of view of user
a. No redundancy
b. No inapplicable attributes
c. Uniformity in naming & definitions of the data items
d. All of the above
Page 8 of 9
UOITC
Q59. The relational model is based on the concept that data is organized and stored in
two- dimensional tables called ……………………….
a. Fields
b. Records
c. Relations
d. Keys
Page 9 of 9
UOITC
Republic of Iraq
Ministry of Higher Education & Scientific Research
University of Information Technology & Communications (UOITC)
Test for Nominees of Higher Diploma in Web Site Technology Postgraduate
Q10. The process of converting analog signals into digital signals so they
can be processed by a receiving computer is referred to as:
a. Modulation
b. Demodulation
c. Synchronizing
d. Digitizing
Page 2 of 9
UOITC
Q19. Which of the following lists memory types from highest to lowest
speed?
a. Secondary storage, main memory, cache, registers
b. Registers, cache, secondary storage, main memory
c. Registers, cache, main memory, secondary storage
d. Cache, registers, main memory, secondary storage
Q20. Why is hard disk storage much slower to access than main memory?
a. Accessing data on a hard disk requires mechanical movement of the
read/write head.
b. Disks are located farther from a system’s processors.
c. Disks must be access via a hardware controller.
d. all of the above
Page 3 of 9
UOITC
Q25. Which of the following are not one of the major pillars of object-oriented
programming?
a. Encapsulation
b. Data Hiding
c. Inheritance
d. Structured Programming
Q26.Which of the Following Provides a reliable Communication?
a. TCP
b. IP
c. UDP
d. All the above
Page 5 of 9
UOITC
Q35. Process is
a. A program in High Level language kept on disk
b. Content of main memory
c. A program in execution
d. A program in secondary storage
Q36. The strategy of allowing processes that are logically runnable to be
temporarily suspended is called
a. Preemptive scheduling
b. Non preemptive scheduling
c. Shortest job first
d. First come first served
Q37. The aim of creating page replacement algorithms is to :
a. Replace pages faster
b. Increase the page fault rate
c. Decrease the page fault rate
d. To allocate multiple pages to processes
Q38. Binary search algorithm can not be applied to
a. Sorted linked list
b. Sorted binary trees
c. Sorted linear array
d. Pointer array
Q40.. ………… is very useful in situation when data have to stored and
then retrieved in reverse order.
a. Stack
b. Queue
c. List
d. Link list
Page 6 of 9
UOITC
Page 7 of 9
UOITC
Page 9 of 9
View publication stats