Exam Based On Learning Outcome
Exam Based On Learning Outcome
- A. Waterfall
- B. Agile
- C. V-Model
- D. Spiral
- A. Rectangle
- B. Oval
- C. Diamond
- D. Arrow
2. Demonstrate conceptual and technical skills in the analysis, design and implementation of a software
system.
- **Question 3 (Applying):** Given a software requirement to calculate the area of a rectangle, which
of the following is the most appropriate method signature for implementing this functionality in Java?
- **Question 4 (Analyzing):** Which of the following design patterns is most suitable for creating a
single instance of a database connection object?
- A. Factory Method
- B. Singleton
- C. Prototype
- D. Builder
- A. Layered Architecture
- B. Microservices
- C. Monolithic
- D. Event-Driven
- **Question 6 (Creating):** Which of the following best represents the primary actor in a use case for
an online shopping system?
- A. Customer
- B. Product
- C. Shopping Cart
- D. Payment Gateway
1. Understand concepts, principles and methods in programming for web and Internet environment.
- **Question 1 (Understanding):** Which of the following protocols is used for transferring web pages
over the Internet?
- A. FTP
- B. SMTP
- C. HTTP
- D. IMAP
- **Question 2 (Understanding):** Which of the following HTML tags is used to create a hyperlink?
- A. `<a>`
- B. `<link>`
- C. `<href>`
- D. `<url>`
- **Question 3 (Applying):** Which of the following JavaScript statements creates a new HTML
paragraph element with the text "Hello, World!"?
- **Question 4 (Applying):** In a PHP script, how do you retrieve the value of a form input field named
"username" sent via a POST request?
- A. `$_GET['username']`
- B. `$_POST['username']`
- C. `$_REQUEST['username']`
- D. `$_SESSION['username']`
3. Specify, build and manage form and content of information-rich web sites.
- **Question 5 (Analyzing):** Which of the following CSS properties is used to set the space between
the characters of a text?
- A. `margin`
- B. `padding`
- C. `letter-spacing`
- D. `line-height`
- **Question 6 (Creating):** Given the following HTML structure, which CSS selector targets the first
paragraph inside the `<div>` element with the class "container"?
```
<div class="container">
<p>First paragraph</p>
<p>Second paragraph</p>
</div>
```
- A. `div.container p:first-child`
- B. `div.container p:first-of-type`
- C. `div.container p:nth-child(1)`
- D. `div.container p:first-line`
4. Design, implement and evaluate client-server systems following specific protocol specifications, taking
into account concurrency issues.
- **Question 7 (Analyzing):**Which of the following concurrency control techniques is best suited for
a web application with a high read-to-write ratio?
- A. Pessimistic locking
- B. Optimistic locking
- C. Timestamp ordering
- D. Two-phase locking
- **Question 8 (Evaluating):** Consider a web application with a RESTful API. Which of the following
HTTP response status codes is most appropriate for indicating that a requested resource has been
successfully created?
- A. 200 OK
- B. 201 Created
- C. 204 No Content
- **Question 1 (Understanding):** Which of the following is a key principle of the relational database
model?
- **Question 2 (Understanding):** In database normalization, what is the main purpose of the third
normal form (3NF)?
- B. Ensure that every non-key attribute is fully functionally dependent on the primary key
- C. Eliminate transitive dependencies
- **Question 3 (Applying):** Which of the following SQL statements is used to create a table called
"students" with columns "id", "name", and "age"?
- B. `INSERT INTO students (id, name, age) VALUES (INT, VARCHAR(255), INT);`
- **Question 4 (Analyzing):** Which of the following SQL statements removes all records from the
"students" table where the "age" is less than 18?
- **Question 5 (Creating):** Which of the following SQL statements adds a new column "email" to the
"students" table?
- **Question 6 (Creating):** Which of the following is the correct SQL statement to create a foreign
key constraint on the "student_id" column in the "enrollments" table, referencing the "id" column in the
"students" table?
- A. Tuple
- B. Encapsulation
- C. Normalization
- D. SQL
2. *Apply* - Which of the following is a recovery method used in case of a database failure?
- A. Redo logs
- B. Encryption
- C. Normalization
- D. Indexing
3. *Analyze* - In the context of database recovery, what does the ARIES algorithm stand for?
4. *Apply* - Which of the following is a key aspect of designing a distributed database system?
- A. Data replication
- B. Object-oriented programming
- C. SQL queries
- D. Encryption
- A. Network latency
- C. Platform independence
6. *Evaluate* - In the context of query processing strategies, which of the following techniques can
improve performance?
- A. Indexing
- B. Denormalization
- C. Partitioning
- A. Encapsulation
- B. Data normalization
- C. DRY principle
- D. ACID properties
2. *Understand* - Which programming concept allows for code reuse and modular design?
- A. Recursion
- B. Inheritance
- C. Polymorphism
- D. Concurrency
````
int a = 5;
int b = 10;
int c = a * b;
```
- A. 15
- B. 50
- C. 150
- D. 500
5. *Apply* - Which of the following mathematical principles can be used to prove statements in
computing science?
- A. Set theory
- B. Calculus
- C. Geometry
- D. Trigonometry
6. *Evaluate* - When solving problems in computing science, which of the following can be used to
optimize the performance of an algorithm?
- A. Inheritance
- B. Normalization
- C. Recursion
- D. Concurrency
- A. To define a class
- C. To define a method
- D. To create an interface
3. *Analyze* - Given the following code snippet, which principle of object-oriented programming is
demonstrated?
````
class Animal {
```
- A. Encapsulation
- B. Inheritance
- C. Polymorphism
- D. Abstraction
- D. Overriding a method
````
class MyClass {
return myVar;
```
- A. Inheritance
- B. Encapsulation
- C. Polymorphism
- D. Abstraction
6. *Evaluate* - In the context of object-oriented programming, which of the following can help improve
the maintainability and reusability of code?
- D. Avoiding encapsulation
Here are the multiple-choice questions for each of the three courses mentioned:
1. (Understand) Which of the following is NOT a technique for analyzing algorithm complexity?
- A. Time complexity
- B. Space complexity
- C. Amortized complexity
- D. Spectral complexity
2. (Analyze) Given two algorithms with time complexities O(n^2) and O(n log n), which one is generally
faster for large input sizes?
- A. O(n^2)
- B. O(n log n)
- D. Cannot be determined
3. (Apply) Which of the following techniques is best suited for solving the 0-1 knapsack problem?
- A. Greedy algorithm
- C. Dynamic programming
- D. Backtracking
4. (Evaluate) Which of the following sorting algorithms has the best average-case performance?
- A. Bubble sort
- B. Selection sort
- C. Quick sort
- D. Merge sort
5. (Understand) Which of the following data structures uses the Last In First Out (LIFO) principle?
- A. Stack
- B. Queue
- C. Linked List
- D. Array
6. (Understand) What is the primary difference between a singly linked list and a doubly linked list?
- A. Merge sort
- B. Quick sort
- C. Heap sort
- D. Counting sort
8. (Apply) Which algorithm is most suitable for searching an element in a sorted array?
- A. Linear search
- B. Binary search
- C. Depth-first search
- D. Breadth-first search
9. (Analyze) Which of the following sorting algorithms has the worst-case performance of O(n^2)?
- A. Bubble sort
- B. Merge sort
- C. Quick sort
- D. Radix sort
10. (Evaluate) In which scenario would a hash table be the most efficient data structure?
- D. Implementing a stack
11. (Understand) Which layer of the OSI model is responsible for providing reliable end-to-end
communication?
- A. Physical layer
- C. Network layer
- D. Transport layer
12. (Understand) Which of the following protocols operates at the Application layer of the TCP/IP
model?
- A. HTTP
- B. IP
- C. TCP
- D. UDP
13. (Understand) In the OSI model, which layer is responsible for routing packets between networks?
- A. Physical layer
- C. Network layer
- D. Transport layer
14. (Apply) Given an IP address 192.168.1.0/24, which of the following is the broadcast address for this
subnet?
- A. 192.168.1.255
- B. 192.168.1.0
- C. 192.168.0.255
- D. 192.168.0.0
15. (Analyze) How many usable IP addresses are there in a /26 subnet?
- A. 62
- B. 30
- C. 126
- D. 254
**Computer Security**
- A. Cryptography
- B. File compression
- C. Data visualization
- D. Web design
- A. Buffer overflow
- B. Typographical errors
- C. Insufficient storage
3. (**Analyze**) Which of the following is a basic requirement for a trusted operating system?
- A. Multitasking capabilities
- D. User-friendly interface
4. (**Analyze**) In the context of database security, what does inference control aim to prevent?
- A. Unauthorized access to sensitive data
5. (**Evaluate**) Which of the following techniques is most effective for ensuring the integrity of a
multi-level database?
- A. Data masking
- B. Encryption
- C. Two-factor authentication
- A. Graphic design
- B. Content writing
2. (**Apply**) To provide network services to users, you must configure and maintain:
- A. Wi-Fi routers
- B. Email servers
- C. Firewalls
- D. Hardware procurement
4. (**Evaluate**) When troubleshooting, which of the following steps should be taken first?
- C. Implement a solution
5. (**Evaluate**) In the context of system administration, which of the following is an essential skill?
- A. 3D modeling
- B. Video editing
- C. Scripting
- D. Public speaking
6. (**Create**) A system administrator wants to automate a task. What scripting language is commonly
used for this purpose?
- A. Python
- B. Java
- C. PHP
- D. Swift
- A. Knowledge representation
- B. Website development
- C. Network topology
- D. Database normalization
2. (**Understand**) What is the role of heuristics in search problems and games?
- B. Historical events
- C. Geographical locations
- D. Language translation
5. (**Analyze**) In which of the following situations would heuristic search be most advantageous?
**Operating System**
2. Describe the functions of a contemporary operating system with respect to convenience, efficiency,
and the ability to evolve. (Understand)
Which of the following is a function of an operating system that ensures convenience for users?
a) Memory management
b) Multitasking
c) User-friendly interface
d) Security management
3. Describe the functions of a contemporary operating system with respect to convenience, efficiency,
and the ability to evolve. (Apply)
An operating system has implemented a new feature that optimizes power consumption and extends
battery life. Which aspect of the operating system is being addressed?
a) Convenience
b) Efficiency
c) Evolvability
d) Security
Which of the following conditions must hold simultaneously for a deadlock to occur?
a) Mutual exclusion
c) No preemption
d) Circular wait
5. Compare and contrast the common algorithms used for both preemptive and non-preemptive
scheduling of tasks in operating systems. (Analyze)
c) Round Robin
d) Priority Scheduling
6. Compare and contrast the common algorithms used for both preemptive and non-preemptive
scheduling of tasks in operating systems. (Evaluate)
In a system that requires minimal response time with frequent context switches, which scheduling
algorithm would be the most suitable?
a) First-Come, First-Served (FCFS)
c) Round Robin
d) Priority Scheduling
1. Identify different ways of communicating with I/O devices and standard I/O interfaces. (Understand)
Which of the following is a standard I/O interface for communication between a computer and
peripheral devices?
a) USB
b) HDMI
c) SATA
2. Identify different ways of communicating with I/O devices and standard I/O interfaces. (Analyze)
Considering the characteristics of a Direct Memory Access (DMA) controller and an Interrupt Request
(IRQ) line, which method is more efficient for transferring large amounts of data?
a) DMA
b) IRQ
b) Multiprocessing
c) Caching
a) Pipelining
b) Multiprocessing
c) Caching
d) Parallel processing
a) Operating system
c) Word processor
d) Web browser
During the execution of an instruction, which of the following steps is performed by the CPU?
a) Fetch
b) Decode
c) Execute
B. A set of strings
**2. Which of the following language classes is a proper subset of another? (Understand)**
**3. Given the following grammar, what type of formal language does it represent? (Understand)**
```
S → aSb | ε
```
A. Regular
B. Context-free
C. Context-sensitive
D. None of the above
**4. Which of the following is a valid recognizer for the language L = {a^n b^n | n ≥ 1}? (Apply)**
A. Finite Automaton
B. Pushdown Automaton
D. Turing Machine
**5. For the given grammar, what is the production rule to eliminate left recursion? (Analyze)**
```
A → Ab | a
```
A. A → aA'
B. A → aB | bA'
C. A → aA' | ε
D. A → aA' | bA'
**6. In the context of complexity theory, which of the following is true? (Understand)**
A. P ⊆ NP ⊆ PSPACE
B. P = NP = PSPACE
C. NP ⊆ P ⊆ PSPACE
D. PSPACE ⊆ NP ⊆ P
B. Regular expressions
C. Bottom-up parsing
D. Top-down parsing
A. Rightmost derivation
B. Leftmost derivation
C. Production rules with non-terminal symbols on the left side and terminal symbols on the right side
D. Production rules with terminal symbols on the left side and non-terminal symbols on the right side
**4. What is the main goal of syntax analysis in compiler design? (Understand)**
**6. Which of the following is a primary function of type checking in a compiler? (Understand)**