0% found this document useful (0 votes)
21 views43 pages

AMU Exit Exam Model V1

The document is a model for an AMU Exit Exam consisting of multiple-choice questions covering various topics in computer science, software engineering, and project management. It includes questions on data definition language, software testing, algorithms, database management, and project management principles. Each question presents a scenario or concept, followed by four answer options to choose from.

Uploaded by

dave336h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views43 pages

AMU Exit Exam Model V1

The document is a model for an AMU Exit Exam consisting of multiple-choice questions covering various topics in computer science, software engineering, and project management. It includes questions on data definition language, software testing, algorithms, database management, and project management principles. Each question presents a scenario or concept, followed by four answer options to choose from.

Uploaded by

dave336h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

AMU Exit Exam Model

V1
1 Data Definition language (DDL) is not to:-
a. Alter table in the database
b. Rename the table name
c. Create information table in the database
d. Truncate tuples in the table

2 Concentrates on what the user does, not what the product does is
_________________________.
a. Validation Testing
b. Fault-Based Testing
c. Scenario-Based Testing
d. Random Class Testing

3 Which of the following is NOT a common technique used for software


requirement validation?
a. Reviews with stakeholders
b. Prototyping
c. User interface mockups
d. Unit testing
4 Which of the following statements not true?
a. A protected member of a class can be accessed from its derived class.
b. A private member of a class cannot be accessed from its derived class
c. A public member of a class can be accessed in all the packages
d. A private member of a class cannot be accessed by the methods of the
same class

5 What is the time complexity of binary search in the worst case?


a. O(n log n)
b. O
c. O(1)
d. O(log n)

6 Which operator is used for assignment in C++?


a. =
b. /=
c. ==
d. +=

7 Which of the following is not a typical operation that can be defined for an
ADT?
a. Delete
b. Search
c. Insert
d. Compile

8 Which one of the following requirements could represent a functional


requirement?
a. The user interface should be easy to navigate for beginners
b. The login system must validate usernames and passwords
c. The software should be accessible for users with disabilities
d. The software must be able to run on a Windows operating system

9 In First order predicate logic a Statement contains______.


a. Predicate and Preposition
b. Predicate and Subject
c. Subject and an Object
d. True/False statement

10 What is the role of a project manager in fostering effective


communication within a software project team?
a. Restricting access to project information
b. Minimizing stakeholder involvement
c. Avoiding team meetings
d. Encouraging transparency and open dialogue

11 Which subfield of AI is used for visual perception?


a. Speech recognition
b. Computer vision
c. Natural language processing
d. Reinforcement learning

12 The PEAS in the task environment is about____________.


a. Performance, Actuator, Sensor, Environment
b. Perceiving, Environment, Actuator, Sensor
c. Peer, Environment, Actuator, Sensor
d. Performance, Environment, Actuator, Sensor

13 Suppose you have received a message from your friend but the
message is scrambled for the sake of security. Your friend has used a
program to encode messages into scrambled text, In, order to read the
message which program would you use?
a. Secret key
b. Encryption program
c. Plaintext
d. Decryption program
e. Cipher text

14 How can you pass the value of a function by value in C++?


a. By assigning the value to a global variable
b. By using the "return" statement in the function
c. By passing the value directly as a function argument
d. By declaring a pointer variable as a function parameter
15 Which agile practice involves estimating the effort required for each user
story?
a. Backlog grooming
b. Sprint planning
c. Daily stand-up meetings
d. Story pointing

16 In the TCP/IP model, which layer of the OSI reference model


corresponds to the TCP/IP Host to Host network layer?
a. Network
b. Physical
c. Transport
d. Physical and Data Link

17 What is the purpose of the address operator (&) in C++?


a. To access the value of a variable
b. To assign a value to a variable
c. To obtain the memory address of a variable
d. To declare a variable

18 What does the projection operation (π) in relational algebra result in?
a. vertical partitioning
b. The removal of duplicate tuples from the relation
c. The selection of specific rows based on a given condition
d. horizontal partitioning
19 Which one of the following is not part of Toast.makeText method
signature?
a. message
b. context
c. time span
d. none

20 What does the term "float" refer to in project scheduling?


a. The amount of time an activity can be delayed without delaying the
project's finish date
b. The amount of time allocated for each project team member
c. The difference between the planned and actual duration of an activity
d. The total time available for completing a project

21 Which resource is typically time multiplexed in an operating system?


a. CPU
b. Memory
c. Compact Disk
d. Network

22 Which is the following activities is NOT typically part of Goal Based


Requirement Engineering?
a. Unit testing the developed software
b. Conducting interviews with stakeholders
c. Decomposing high-level goals into subgoals
d. Defining system functionalities

23 Which operator is used to increment a variable by a specific value in


C++?
a. ++
b. =
c. +=
d. *=

24 What is the primary purpose of a variance analysis in project cost


management?
a. To compare actual project performance against the planned performance
b. To allocate additional resources to the project
c. To avoid project delays
d. To identify deviations from the project scope

25 Which method is used to retrieve a value from SharedPreferences?


a. getAll()
b. getBoolean(0,"key")
c. getInt("key")
d. getString("key",null)

26 Which one of the following is the technique used in black box testing?
a. Equivalence partitioning
b. Control flow based testing
c. A and C
d. Boundary value analysis

27 In android OS stack HAL acts a runtime enviroment replacing the earlier


DVM.
a. All
b. false
c. true

28 Which loop statement is used when the number of iterations is known in


advance?
a. If...else statement
b. While loop statement
c. Switch statement
d. For loop statement

29 Which one of the following is Candidate Key?


a. Name
b. ID and Address
c. Email Address
d. Name and ID

30 Which of the following is an example of a knowledge-based


authentication factor?
a. Smart card
b. Username and password
c. Facial detection
d. One-time password (OTP)

31 An entity in A is associated with at least one entity in B, and an entity in


B is associated with at most one entity in A. This is called as___________?
a. One-to-many
b. One-to-one
c. Many-to-one
d. Many-to-many

32 Which search algorithm is better suited for searching in a dynamic,


frequently updated dataset?
a. Linear search
b. Both linear and binary search are equally suitable
c. Binary search
d. Neither linear nor binary search is suitable

33 Which operator is used to compare two values for equality in C++?


a. /=
b. ==
c. =
d. +=
34 Which design activity involves defining the relationships and interactions
between software components?
a. Architectural design
b. High-level design
c. Detailed design
d. Functional design

35 Which sorting algorithm is considered the most efficient for small data
sets?
a. Merge sort
b. Insertion sort
c. Radix sort
d. Heapsort

36 Which one of the following requirements could represent a


non-functional requirement?
a. The system shall allow users to search for books by title, author, or
keyword.
b. The system shall be compatible with all major web browsers and
operating systems.
c. The system shall allow users to browse products by category
d. The system shall allow users to create a profile and upload a photo.

37 What is the primary goal of requirements elicitation?


a. To write the software code
b. To gather information about the desired system
c. To define the software architecture
d. To test the software functionality

38 Which activity involves breaking down high-level requirements into


detailed, specific requirements?
a. Validating requirements
b. Documenting requirements
c. Eliciting requirements
d. Analyzing requirements

39 What is the time complexity for inserting a new element at the end of a
singly linked list?
a. O(n^2)
b. O
c. O(1)
d. O(log n)

40 Social media platforms leverage big data to:


a. Personalize user experience and targeted advertising
b. Censor user comments
c. Enhance data security measures
d. Restrict user access to certain content

41 The technique used in user-centered interaction design to evaluate a


product by testing it on users is called?
a. Usability testing
b. Unit testing
c. Software testing
d. Black box testing

42 Runtime polymorphism feature in java is


a. Method overloading
b. Constructor overloading
c. Operator overloading
d. Method overriding

43 Which network security issue shows the level of weakness in networks


and devices?
a. Vulnerability
b. Threat
c. Attack
d. Risk
e. Availability

44 Which of the following is NOT an objective of software security


assurance?
a. Detecting and preventing vulnerabilities in software
b. Protecting software from physical damage or theft
c. Protecting develop and implement robust software
d. Ensuring the confidentiality and integrity of software
e. Verifying that software meets security requirements

45 A functional dependency is a relationship between/among ___________


a. Rows
b. Attributes
c. Entities
d. Tables

46 What is the responsibility of the operating system in allocating resources


to various applications?
a. A virtual machine
b. A multiplexer
c. An extended machine
d. A resource manager

47 What is the main benefit of using asymptotic analysis when comparing


algorithms?
a. It determines the memory usage of the algorithms
b. It focuses on the long-term behavior of the algorithms
c. It provides the exact running time of the algorithms
d. It measures the communication bandwidth

48 In procurement management, what is the purpose of performing a


vendor evaluation?
a. To increase project risks
b. To limit vendor participation in the project
c. To ensure vendors are excluded from the project
d. To compare potential vendors and select the most suitable one

49 What is the purpose of role-based access control (RBAC)?


a. To prevent unauthorized access to a system
b. To monitor and detect suspicious activities or attacks
c. To assign permissions based on users' job functions or roles
d. To encrypt data at rest
e. To encrypt data on the transmission

50 Which of the following is a common way to represent the flow of control


in an algorithm?
a. Using variables
b. Using data structures
c. Using conditional statements and loops

Sure, let's continue from question 51:

51 Among the provided options, the SQLiteDatabase method that returns a


cursor is
a. rawQuery()
b. execQuery()
c. update()
d. execSQL()

52 Which software development model involves a linear, sequential


approach with distinct phases?
a. Spiral model
b. Waterfall model
c. Agile model
d. RAD model

53 What is the major characteristic of a computer virus?


a. It replicates by attaching itself to other files
b. It steals sensitive data from a system
c. It encrypts files and demands ransom for their release
d. It spreads through email attachments

54 In a software project, what is the primary purpose of a communication


plan?
a. To exclude project sponsors from communication channels
b. To limit communication among team members
c. To delay the exchange of project information
d. To facilitate effective communication among stakeholders

55 If the method is not static, how to invoke it in the Java programming


language?
a. Variablename.methodname
b. Objectname.methodname()
c. Classname.methodname()
d. Methodname()

56 Which type of agent is most suitable for dynamic and unknown


environments where the state of the world changes frequently?
a. Learning agent
b. Reflex agent
c. Rational agent
d. Goal-based agent

57 Intent filter is used to define


a. data type used by the app component
b. All
c. relationship between the app component and intent
d. category of app

58 In 2NF, which form of dependency is removed?


a. Functional
b. Associative
c. Transitive
d. Partial

59 Which method is used to stop a bound service?


a. System.exit(0)
b. stopService()
c. None
d. selfStop()

60 Which of the following best describes the purpose of normalization in


database management systems (DBMS)?
a. To eliminate data redundancy and ensure data integrity.
b. To improve data inconsistency and integrity.
c. To increase data redundancy and duplication.
d. To simplify database maintenance and updates.

61 Which industry is NOT typically associated with Big Data applications?


a. Manufacturing
b. Healthcare
c. Agriculture
d. Small retail shops

62 _________is one of the basic principles of object-oriented programming


that uses one object in multiple forms.
a. None of the above
b. Inheritance
c. Encapsulation
d. Interface

63 What is the primary goal of data mining?


a. To visualize data through graphs and charts
b. To extract useful patterns and insights from data
c. To ensure data security and privacy
d. To store and manage large volumes of data

64 Which of the following algorithms uses a recursive implementation?


a. Linear/sequential search
b. Binary search
c. Heap sort
d. Insertion sort

65 What is a PRIMARY factor that distinguishes Big Data from traditional


data management approaches?
a. Requirement for specialized data processing tools
b. Inability to handle complex data formats
c. Focus on analyzing historical trends
d. Limited data storage capacity

66 In a software project, the planned value (PV) is $50,000, the earned


value (EV) is $40,000, and the actual cost (AC) is $45,000. Calculate the
schedule variance (SV).
a. $2,000
b. $10,000
c. -$10,000
d. $4,000
67 Which term refers to the process of summarizing data to improve
efficiency in data warehousing?
a. Data mashing
b. Data mining
c. Data aggregation
d. Data scrubbing

68 Among the reasons that lead to deadlock in operating systems, which


one is used to solve the inter-process communication problem?
a. Hold and Wait Condition
b. Circular wait
c. No preemption
d. Mutual exclusion

69 Which communication channel is most suitable for conveying complex


technical information to a distributed team?
a. Email
b. Video conference
c. Instant messaging
d. Telephone call

70 Which one of the following computers can be most secured compared to


the rest?
a. A computer connected to the Internet having a strong intrusion detection
system
b. A computer connected to the Internet and the latest antivirus installed on
it
c. A computer that is not connected to the Internet
d. A computer connected to the Internet with the latest firewall system

71 Which class does the IP address 172.16.1.20 belong to?


a. Class D
b. Class A
c. Class B
d. Class C

72 During Software Requirement Management, which two types of


requirements typically receive the highest priority?
a. Enduring Requirements and Volatile Requirements
b. User Stories and Bug Fixes
c. Security Requirements and Performance Requirements
d. Functional Requirements and Non-Functional Requirements

73 Which machine learning models are trained to make decisions based on


the reward and feedback they receive from their action?
a. Reinforcement learning
b. Unsupervised learning
c. Supervised learning
d. All of the above
74 What is the purpose of classless addressing in IP networks?
a. To allocate IP addresses based on geographical location.
b. To classify IP addresses into different classes for easier routing.
c. To improve the security of IP addresses by encrypting them.
d. To provide more flexible allocation of IP addresses by allowing
variable-length subnet masks.

75 What is the purpose of a change control board (CCB) in project


management?
a. To prevent any changes from being made to the project
b. To approve or reject changes to the project scope, schedule, and cost

Let's continue with the review:

76 Which one of the following search algorithms requires less memory?


a. Depth First Search
b. Optimal Search
c. Breadth-First Search
d. Linear Search

77 What does validation ensure in software development?


a. That the software is free from defects
b. That the software conforms to its specifications
c. That the software meets the requirements and fulfills its intended
purpose
d. That the software is written according to coding standards

78 Which of the following is NOT an input to the process of scope


management?
a. Cost Baseline
b. Project Charter
c. Work Breakdown Structure (WBS)
d. Project Management Plan

79 Which scheduling technique involves identifying dependencies between


project activities?
a. Agile sprint planning
b. Gantt charts
c. Critical Path Method (CPM)
d. Earned Value Management (EVM)

80 In software testing, what is the term for testing performed by the


end-users before a software release?
a. Alpha Testing
b. Regression Testing
c. Beta Testing
d. Smoke Testing

81 Which one of the following approaches defines AI as "The art of creating


machines that perform functions that require intelligence when performed
by people"?
a. Thinking rationally
b. Thinking humanly
c. Acting humanly
d. Acting rationally

82 What is the purpose of access control in security mechanisms?


a. To detect and remove malware from a system
b. To prevent unauthorized access to resources
c. To encrypt digital assets at rest
d. To encrypt data during transmission

83 How can a project manager promote teamwork and collaboration within


a software project team?
a. Celebrate individual achievements only
b. Encourage competition among team members
c. Promote a supportive and inclusive team environment
d. Foster a blame culture

84 Which programming paradigm emphasizes breaking down a program


into smaller, reusable components?
a. Functional programming
b. Object-oriented programming
c. Procedural programming
d. Aspect-oriented programming

85 Which team structure involves team members reporting to functional


managers but working on projects led by project managers?
a. Matrix teams
b. Functional teams
c. Hierarchical teams
d. Agile teams

86 Which statement about the round-robin scheduling algorithm is false?


a. It's the fairest algorithm and most widely used algorithm
b. Characterized by its non-preemptive nature
c. Has higher context switch overhead
d. Characterized by using a quantum number for scheduling

87 Which control statement is used for executing different blocks of code


based on multiple conditions?
a. If...else statement
b. While loop statement
c. Switch statement
d. For loop statement

88 What type of traceability shows how a requirement is designed and


implemented?
a. Forward traceability
b. Horizontal traceability
c. Vertical traceability
d. Backward traceability

89 Which one of the following statements contains an error?


a. SELECT empid FROM emp;
b. SELECT * FROM emp WHERE empid = 1001;
c. SELECT empid WHERE empid = 1002 AND lastname = ‘Abebe’;
d. SELECT empid FROM emp WHERE empid = 1003

90 What is the main focus of Goal-Based Requirement Engineering?


a. Eliciting and refining stakeholder goals
b. Writing efficient code
c. Defining technical specifications
d. Identifying user interface elements

91 Which of the following is not an OOPS concept?


a. Exception
b. Encapsulation
c. Polymorphism
d. Abstraction

92 Which software engineering approach focuses on capturing and


managing requirements from stakeholders?
a. RAD (Rapid Application Development)
b. CASE (Computer-Aided Software Engineering)
c. JAD (Joint Application Development)
d. RUP (Rational Unified Process)

93 Design, development, and maintenance of applications for mobile


devices is referred to as:
a. developing mobile apps
b. mobile computing
c. mobile software engineering
d. software engineering

94 Consider the following sequential free memory block (partition) sizes


available for allocation: Block A=100 KB, Block B=200 KB, Block C=150
KB, Block D=300 KB, and Block E=250 KB. By using the First Fit algorithm,
if we allocate the following processes: P1 requires 120 KB, P2 requires 250
KB, P3 requires 180 KB. Which process goes into which memory block?
a. P1: Block B, P2: Block D, P3: Block E
b. P1: Block D, P2: Block E, P3: will not be allocated to any partition
c. P1: Block A, P2: Block D, P3: Block E
d. P1: Block B, P2: Block E, P3: Block A

95 Which component is used to define a service in the AndroidManifest.xml


file?
a. <service>
b. <provider>
c. <receiver>
d. <activity>

96 In Android, the superclass for all ViewGroup is:


a. Activity
b. View
c. All
d. Object

97 Suppose a stakeholder complains that a requirement is unclear and


open to interpretation. What is the most appropriate action to take?
a. Ignore the complaint and proceed with development.
b. Refine the requirement to be more specific and unambiguous
c. Delegate the clarification to the development team
d. Explain to the stakeholder why the requirement is written in this way.

98 Which human resource management technique involves identifying and


documenting project roles and responsibilities?
a. Resource leveling
b. Resource histogram
c. Responsibility assignment matrix (RAM)
d. Maslow's Hierarchy of Needs

99 Which procurement document is used to solicit proposals from potential


vendors?
a. Statement of Work (SOW)
b. Request for Proposal (RFP)
c. Request for Information (RFI)
d. Invitation to Bid (ITB)

100 What is the time complexity of the algorithm given below?


for(i=1;i<n;i=i/2) {
statement;
}
a. O(log n)
b. O(n log n)
c. O
d. O(n^2)

101. What is the triple constraint in project management?


a. Time, Scope, and Cost
b. Scope, Quality, and Stakeholders
c. Time, Scope, and Quality
d. Quality, Cost, and Schedule

102. According to the OSI reference model, to which layer do routers and
core switches belong when delivering routing services?
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer

103. Among the following options, which one shows the correct lifecycle
method for an Activity?
a. onCreate - onStart - onPause - onStop
b. onCreate - onStart - onResume - oStop
c. onCreate - onStart - onPause - onResume - onStop
d. onCreate - onStart - onResume - onPause - onStop

104. White-box testing focuses on what aspect of the software?


a. User requirements
b. System specifications
c. User interface design
d. Internal code structure

105. In which phase of the project management process are project risks
identified and documented?
a. Executing
b. Closing
c. Planning
d. Monitoring and Controlling

106. In a system using virtual memory, the physical memory is divided into
________ and the virtual address space is divided into equally-sized
partitions called_______.
a. Pages, Page frames
b. Page frames, Pages
c. Page, Segment
d. Segment, Page

107. Imagine you're a data scientist working with a massive dataset for a
new project. What is one of the biggest obstacles you might face when
trying to analyze this data?
a. Finding enough data sources to supplement the existing dataset.
b. The sheer processing power and time required to analyze the data
effectively.
c. The limited number of software tools available for data analysis.
d. The high cost of storing all this data on traditional storage devices.

108. What does the term "scope creep" refer to in project management?
a. The intentional expansion of project scope to meet stakeholder
expectations
b. The completion of project deliverables ahead of schedule
c. The inability to define project scope clearly
d. The unauthorized changes or continuous growth in project scope

109. Which type of cable can be used to directly connect two computers to
form a peer-to-peer network?
a. Coaxial cable
b. Crossover cable
c. Straight-through cable
d. Console cable

110. What is the purpose of a stakeholder register in project management?


a. To identify and document all project stakeholders
b. To avoid communication with stakeholders
c. To ignore stakeholders' concerns
d. To allocate resources to project stakeholders

111. Which term refers to the degree to which software meets specified
requirements and user expectations?
a. Software architecture
b. Software complexity
c. Software maintenance
d. Software quality

112. Which of the following statement is correct, when an overridden


method is called from within a subclass?
a. It will always refer to the version of that method defined by the
superclass
b. Compile time error will occur
c. It will always refer to the version of that method defined by the
subclass
d. The Compiler will choose randomly the method to be executed
113. Which tree traversal visits the nodes in the following order: left
subtree, root, right subtree?
a. Postorder traversal
b. Level-order traversal
c. Preorder traversal
d. Inorder traversal

114. Which protocol is commonly used for routing packets across different
networks on the Internet?
a. Internet Protocol (IP)
b. Transmission Control Protocol (TCP)
c. Hypertext Transfer Protocol (HTTP)
d. User Datagram Protocol (UDP)

115. What is the purpose of a Work Breakdown Structure (WBS) in scope


management?
a. To schedule project activities
b. To define project deliverables
c. To assign resources to project tasks
d. To estimate project costs

116. Which network topology is referred to as an active network topology?


a. Star Topology
b. Bus Topology
c. Ring Topology
d. Mesh Topology

117. Which two features of object-oriented programming are the same?


a. Encapsulation and Polymorphism features are the same
b. Abstraction and Polymorphism features are the same
c. Encapsulation and Abstraction
d. Inheritance and Encapsulation features are the same

118. What is the purpose of an Intrusion Detection System (IDS) in


computer security?
a. To encrypt data during transmission
b. To monitor and detect suspicious activities or attacks
c. To prevent unauthorized access to a network
d. To detect and alert on suspicious network activities
e. To recover data after a system failure or disaster

119. What is the purpose of an Intrusion Detection System (IDS) in


computer security?
- a. To encrypt data during transmission
- b. To prevent unauthorized access to a network
- c. To detect and alert on suspicious network activities
- d. To recover data after a system failure or disaster

120. Which software development methodology emphasizes incremental,


iterative development?
- a. V-model
- b. Spiral model
- c. Agile methodology
- d. Waterfall model

121. Given three classes A, B, and C, where class C is derived from class
B, which is derived from class A. If those classes are public classes and
found in different packages, then a class C object can access:
- a. Any data in C and only Protected and public data in A and B.
- b. Protected, default, and public data only in C.
- c. Protected, default, and public data only in C and B.
- d. Any data in C and only public data in A and B.

122. What is the primary advantage of biometric authentication?


- a. It is very easy to hack the key.
- b. It can be easily shared or transferred.
- c. It is easy to remember and use.
- d. It provides a high level of uniqueness and security.

123. What is the purpose of system backups in administering systems?


- a. To encrypt data during transmission
- b. To monitor and detect suspicious activities or attacks
- c. To develop software applications
- d. To recover data in the event of data loss or system failure
- e. To prevent unauthorized access to a system
124. Consider the program:
```
public class Student {
int id;
int section;
void display() {
System.out.println("ID : " + id);
System.out.println("Section : " + section);
}
public static void main(String[] args) {
/*Create an object*/
}
}
Which of the following is a correct way to create an object in the main
method of the above program?
- a. Student stud;
- b. Student stud = new Student(3983, 2);
- c. Student stud = Student(3983, 20);
- d. Student stud = new Student();

125. What is the purpose of multifactor authentication in security


mechanisms?
- a. To authenticate users using multiple credentials
- b. To monitor network traffic for security threats
- c. To prevent unauthorized access to a system
- d. To encrypt data during transmission
- e. To monitor network traffic for security threats

126. You are validating a software requirement that states "The system
shall respond to user input within 2 seconds." What additional information is
most helpful for validation purposes?
- a. The programming language used for development.
- b. The specific user actions that trigger the response.
- c. The development team's experience level.
- d. The hardware specifications of the target platform.

127. Which routing protocol is used for routing within an autonomous


system (AS)?
- a. Exterior Routing Protocol
- b. Transmission Control Protocol (TCP)
- c. Interior Routing Protocol
- d. Internet Protocol (IP)

128. A key advantage of NoSQL databases for big data is:


- a. Limited access control features
- b. Enhanced data encryption capabilities
- c. Enforcing strict data schema
- d. Scalability to handle growing data volumes
129. Which metric measures the number of paths through a piece of code?
- a. Lines of code
- b. Defect density
- c. Code coverage
- d. Cyclomatic complexity

130. In which search problem, to find the shortest path, each city must be
visited once only?
- a. Travelling Salesman problem
- b. Finding the shortest path between a source and a destination
- c. Depth-first search traversal on a given map represented as a graph
- d. Map coloring Problem

131. In relational model terminology, _____ is a set of allowable values for


one or more attributes.
- a. domain
- b. relation
- c. range
- d. tuple

132. ______ describes the structure of the whole database for a community
of users.
- a. Conceptual level
- b. Physical level
- c. View level
- d. Internal level

133. What is a key advantage of NoSQL databases in Big Data


management?
- a. Structured data storage
- b. ACID compliance
- c. Flexible schema
- d. Limited scalability

134. In Naive Bayes classification, how is the probability of a class


calculated?
- a. By using a decision tree algorithm
- b. By considering the joint prior frequency of all features given in the
dataset
- c. By random selection of classes
- d. By averaging the feature values in each class

135. What is the purpose of the "if...else if...else" statement in C++?


- a. To execute different blocks of code based on multiple conditions
- b. To declare variables in C++
- c. To define a function in C++
- d. To repeat a block of code until a condition is met

136. What technique involves predicting project effort based on historical


data from similar projects?
- a. Algorithmic models
- b. Analogy-based estimation
- c. Parametric estimation
- d. Expert judgment

137. In problem solving using search, the representation of internal state is


______.
- a. Information Retrieval
- b. Factored
- c. Mining of data
- d. Atomic

138. What is the purpose of organization and team structures in software


project management?
- a. To allocate resources
- b. To define project requirements
- c. To create project schedules
- d. To define roles and responsibilities within the project

139. Which one of the following is an Object-based data model DBMS?


- a. Frame Memory
- b. Unifying Model
- c. The E-R Model
- d. Relational Data Model
140. Which of the following is true according to EER concept?
- a. Subclass member is the same as the entity in the superclass, but in
a distinct specific role.
- b. Superclass inherits all the attributes of the entity as the member of
the subclass.
- c. The set of subclasses that forms a generalization is defined on the
basis of some distinguishing characteristics.
- d. Subclass cannot participate in specific relationship types.

141. A relation that has no transitive dependencies is in which normal


form?
- a. Second
- b. Third
- c. First
- d. Fourth

142. Which one of the following is correct about Hierarchical Model?


- a. The relationship between child to parent is one-to-many
- b. The relationship between child to parent is Many-to-many
- c. The relationship between parent to child is Many-to-many
- d. The relationship between parent to child is one-to-many

143. What is the main goal of a man-in-the-middle (MITM) attack?


- a. Exploiting network vulnerabilities
- b. To gain unauthorized access to a network
- c. To steal sensitive data from a network
- d. To disrupt network availability
- e. To intercept and manipulate communication between two parties

144. Which concept allows you to store the memory address of a variable
in C++?
- a. Strings
- b. Arrays
- c. Structures
- d. Pointers

145. What is the primary purpose of the Delphi technique in project


estimation?
- a. To use historical data from similar projects to make estimates
- b. To achieve consensus among a group of experts regarding project
estimates
- c. To rely on the expertise of individuals or groups familiar with the
project domain
- d. To compare the project to predefined standards

146. Consider the following reference string: 1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5.


Apply the FIFO page replacement algorithm with a frame size of 3. How
many page faults occur?
- a. 12
- b. 9
- c. 10
- d. 11

147. Which sorting technique is known to have a time complexity of O(n log
n)?
- a. Selection sort
- b. Bubble sort
- c. Quicksort
- d. Insertion sort

148. What does architectural design primarily focus on?


- a. Defining detailed specifications for individual components
- b. Defining the high-level structure and organization of the system
- c. Decomposing the system into functional modules
- d. Refining the high-level design into detailed specifications

149. Which of the following is NOT a responsibility of a project manager in


human resource management?
- a. Staffing the project
- b. Providing performance feedback
- c. Ignoring team conflicts
- d. Motivating team members

150. The time complexity of the push operation in a stack is:


- a. O
- b. O(1)
- c. O(log n)
- d. O(n^2)

151. Which one of the following is not true about Gradle?


- a. Packs the compiled code and resources into an APK file
- b. None
- c. Compiles the app’s code
- d. Downloads and resolves the app’s dependencies

You might also like