SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
GOOD LUCK!
Admas University
Faculty of Informatics
Department of Computer Science
Model Exit Exam V CODE BI-005
Name _________________________
ID.No._________________________
Model Exit Exam Computer Science
S.N Theme Course Title Credit Hrs. Number of Questions
1 Theme 1. System Development
Web programming 6 9
Software Engineering 3 6
Database Systems 6 12
Total 3 15 27
2
Theme 2. Programming and
Algorithms
Computer Programming 6 6
Object Oriented Programming 3 6
Design and Analysis of Algorithms 3 6
Data Structure and Algorithms 3 7
Total 4 15 25
3
Theme 3. Computer
Networking and Security
Data Communication and Computer
Networking
3 6
Computer Security 3 6
Network and System Administration 3 6
Total 3 9 18
4
Theme 4. Intelligent
Systems
Introduction to Artificial Intelligence 3 6
1 3 6
5
Theme 5. Computer
Architecture and Operating
Systems
Operating System 3 6
Computer organization and
architecture
3 6
Total 2 6 12
6
Theme 6. Compiler and
Complexity
Formal Language and Complexity
Theory
3 6
Compiler Design 3 6
2 6 12
Grand total 12 51 100
SENE, 2015
Time allotted: 3:00 hrs
GOOD LUCK!
Instruction: Read the questions and choose the right answer from the given alternatives and write the
letter of your choice on the space provided at the separate answer sheet. (1 point each)
Part 1:System Development
1. Which one of the following is False about static website?
A. Its content will be changed unless the actual webpage file is edited.
B. It is also referred as flat pages or stationary pages.
C. It will be delivered to the users as exactly stored in the files.
D. Its content remains the same for all viewers of the website.
2. Which one of the following is a server side scripting language?
A. PHP
B. ASP
C. Python
D. All of the above
3.A pop up box used to display information to user in JavaScript is called ___________.
A. Prompt
B. Alert
C. Confirm
D. All of the above
4. What does these code possibly refers to<link rel="stylesheet" href="styles.css"> ?
A. Defines a new CSS by the name styles
B. Calls an internal style sheet called styles
C. Calls an external style sheet called styles
D. Defines an inline CSS by the name styles
5. What is the preferred way for adding a background color in HTML?
A. <body background="yellow">
B. <background>yellow</background>
C. < body style="background-color: yellow">
D. <background color="yellow">text<background>
6. What is the method used to get the result from the form data sent with both GET and POST?
A. $_REQUEST
B. $_POST
C. $_GET
D. A & B
7. Which of the following is an optional parameter one while using mysqli_connect() method?
A. Localhost
B. Database
C. Username
D. Password
8. What Tag Is Used For Inserting A Line Break In A Html Page.
A. <break>
B. <ol>
C. <br>
D. <lb>
9. Which Javascript Event Handler Pertains To Actions Enabled By Mouse Clicks.
GOOD LUCK!
A. Oninput
B. Onchange
C. Onclick
D. Ondrag
10. Which of the following are Advantages of modularization in software design?
A. Smaller components are difficult to maintain
B. Components with high cohesion can be re-used again
C. Program can be divided based on functional aspects
D. Desired from security aspect
11. Which of the following is not element of Requirement Engineering Process?
A. Software Requirement Specification
B. Feasibility Steady
C. Software Requirement Design
D. Requirement Gathering
12. Which type of test determine if the system meets the entire requirements (functional and nonfunctional)
A. Unit Test
B. Integration test
C. System test
D. Acceptance test
13. How is generalization implemented in Object-Oriented software engineering?
A. Inheritance
B. Polymorphism
C. Encapsulation
D. Abstract Classes
14. All of the following are required to develop an effective test except:
A. Detailed understanding of the system
B. Application and solution domain knowledge
C. Knowledge of the testing techniques
D. Skill to specific programming language
15. Use case description commonly contains:
A. Trigger, associations, guarantee.
B. Precondition, generalizations, main scenario.
C. Precondition, main scenario, alternative scenarios
D. None of the above
GOOD LUCK!
16. ______It defines how and where data are organized in physical data storage
A. Internal Schema
B. Conceptual Schema
C. External Schema
D. External and Conceptual Schema
17. During modeling your data, Entity Relationship is applied at
A. Applications and security
B. Physical refinement
C. Conceptual database
D. Schema refinement
18. Criteria that should not be considered when evaluating or assessing requirement analysis?
A. Correctness
B. Need assessment
C. Consistency
D. Speed
19. The SQL command that you use to define the primary key for a existing table called 'Employee' with the
primary column to be 'empid'
A. ADD TABLE Employee ADD PRIMARY KEY (empid)
B. ATTACH TABLE Employee ADD PRIMARY KEY (empid)
C. ADD TABLE Employee ATTACH PRIMARY KEY (empid)
D. DALTER TABLE Employee ADD PRIMARY KEY (empid)
20. While checking normalization process, the problem that doesn’t exist on transitive dependency is
A. Modification Anomaly
B. Revoke Anomaly
C. Insertion Anomaly
D. Deletion Anomaly
21. You need to produce a report for mailing labels for customers. The mailing label must have only the
customer name and address. The CUSTOMERS table has these columns, ID ,NAME,ADDRESS,PHONE
,the SELECT statement to accomplishes this task?
A. SEL000ECT name, address FROM customers;
B. SELECT*FROM customers;
C. SELECT id, name, address, phone FROM customers;
D. SELECT cust_name, cust_address FROM customers;
22. If the maximum cardinality is equal to 1 in both directions of a relationship, then it is
A. Optional
B. Many-to-many
C. One-to-one
D. One-to-many
23. How do change the PRICE of BOOK whose id =B001 to value of 600
A. CHANGE BOOK SET PRICE =600 Where ID =’B001’;
B. UPDATE TO CHANGE BOOK SET PRICE =600 Where ID =’B001’;
C. UPDATE BOOK SET PRICE =600 Where ID =’B001’;
D. GRANT BOOK SET PRICE =600 Where ID =’B001’;
24. The Entity Relationship (E-R) Model
A. Entities are represented by circle
GOOD LUCK!
B. Attributes are represented by rectangle
C. It represents conceptual view
D. It corresponds to row
25. Removal of transitivity property should be full filled in
A. First Normal form
B. Fourth Normal form
C. Third Normal form
D. Second Normal form
26. If relation R has 5 tuples and relation S has also 7 tuples, then Cartesian product of R and S will have
A. 5+7 tuples
B. 7-5 tuples
C. 5X7 tuples
D. 5/7 tuples
27. How do you prevent system privileges deletion and updating authority on PRICE and YEAR column of
the CATALOGUE table from user Mohammed
A. GRANT DELETE, UPDATE (price,year) ON catalogue From Mohammed
B. ALLOW DELETE, UPDATE (price,year) ON catalogue From Mohammed
C. REVOKE DELETE, UPDATE (price,year) ON catalogue From Mohammed
D. DENY DELETE, UPDATE (price,year) ON catalogue From Mohammed
Part 2-Programming and Algorithms
28. In C++ programming, a variable which stores a reference to another variable is called a____
A. Pointer
B. Constructor
C. Asterisks
D. Structure
29. A program that translates a high-level language like C++ to a machine language is called a _____
A. Disassembler
B. Coder
C. Compiler
D. Assembler
30. In C++ programming, assume that the value of the variable A is 0 and the value of the variable B is 10.
Which one of the following alternatives is false? *
A. (B = = 10) || (x < y)
B. (A > 20) || (B >5)
C. (A >10) && (x < y
D. (A= =0) && (B < 20)
31. Which one of the following format is write about functions in structural Programming?
A. Type name { parameter1, parameter2, ...} (statement )
B. Name type ( parameter1, parameter2, ...) { statement }
C. Type name ( parameter1, parameter2, ...) {statement }
D. Name type { parameter1, parameter2, ...} (statement )
32. Which of the following is a valid function call (assuming the function add exists & have two
parameters)?
A. add;
GOOD LUCK!
B. add(a,b);
C. add a,b;
D. add(int a, int b);
33. A function is said to be recursive function__________?*
A. If the function calls another function2 & Function3
B. If the main function calls many functions
C. If the main function calls another one function
D. If the function calls itself
34. Which of the following is not an OOPS concept?
A. Encapsulation
B. Polymorphism
C. Exception
D. Abstraction
35. Which feature of OOPS derives the class from another class?
A. Inheritance
B. Data hiding
C. Encapsulation
D. Polymorphism
36. Which two features of object-oriented programming are the same?
A. Abstraction and Polymorphism features are the same
B. Inheritance and Encapsulation features are the same
C. Encapsulation and Polymorphism features are the same
D. Encapsulation and Abstraction
37. Which of the following statement of a program is not right?
A. class teacher{ }; teacher s[5];
B. class teacher{ }s;
C. class teacher{ }s[];
D. class teacher{ }; teacher s;
38. Using the concept of encapsulation security of the data is ___________
A. Ensured to some extent
B. Purely ensured
C. Not ensured
D. Very low
E. Consider the following Java program and select the right option from the given options.
GOOD LUCK!
A. The above program may result in undesirable conditions
B. The above program violates the feature of encapsulation
C. The above program will generate an error
D. The above program is good to go
39. Which one of the following statements are true?*
A. Structure is collection of homogenous members
B. Individual values of the Structure are called members
C. It is possible to initialize the Structure up on its defining
D. All are correct
40.An ___ is defined as a set of well-defined instructions used to accomplish a particular task.
A. Algorithm
B. Function
C. Program
D. Procedure
41. The measure of the longest amount of time possibly taken to complete an algorithm is expressed as __.
A. Little-O
B. Little-Omega
C. Big-Omega
D. Big-O
42.A ___ is a compact, informal, and environment-independent description of a computer
programming algorithm.
GOOD LUCK!
A. Stack
B. Queue
C. Psuedocode
D. Non-linear data structure
43. ___ of an algorithm is the amount of time required for it to execute.
A. Time complexity
B. Space complexity
C. Compiling time
D. Best case
44..Potential function method is the technique that performs an amortized analysis based on ___.
A. Financial model
B. Computational model
C. Algorithm analysis
D. Energy model
45. ___ is the maximum amount of time an algorithm takes to execute a specific set of inputs.
A. Running time
B. Average case time complexity
C. Worst case time complexity
D. Best case time complexity
46. Which of the following is non-linear data structure?
A. A Trees
B. B Stacks
C. C Strings
D. D All of the above
47. The number of comparisons done by sequential search is .......
A. A (N/2)+1
B. B (N+1)/2
C. C (N-1)/2
D. D (N-2)/2
48. ...... is not the operation that can be performed on queue.
A. A Traversal
B. B Insertion
C. C Deletion
D. D Retrieval
49. Which is/are the application(s) of stack
A. A Function calls
B. B Large number Arithmetic
C. C Evaluation of arithmetic expressions
D. D All of the above
50.Which of the following data structures are indexed structures?
A. A Stack
B. B Linked lists
GOOD LUCK!
C. C Linear arrays
D. D None of the above
51. Which of the following data structure store the homogeneous data elements?
A. A Lists
B. B Pointers
C. C Records
D. D Arrays
52.Linear arrays are also called.......
A. A One-dimensional array
B. B Vertical array
C. C Horizontal array
D. D All of the above
Part 3-Computer Networking and Security
53. Which one of the following is not component of data communication?
A. Message
B. Medium
C. Sender
D. Protocol
54. There are two types of network topologies from these topologies which one of the following defines how
hosts access the media to send data.*
A. Logical Topology
B. Bus Topology
C. Physical Topology
D. Star Topology
55. Segmentation of a data stream happens at which layer of the OSI model?
A. Physical
B. Data Link
C. Network
D. Transport
56. When data is encapsulated, which is the correct order?*
A. Data, frame, packet, segment, bit
B. Data, segment, packet, frame, bit
C. Segment, data, packet, frame, bit
D. Data, segment, frame, packet, bit
57. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should
you use?
A. Coaxial
B. Category 6 UTP
C. Microwave
D. Fiber-optic
58. From the following lists which one is not the responsibility (service) of data link layer
A. Hardware Addressing
GOOD LUCK!
B. C. media access control
C. Network Addressing
A. logical link control
59. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B.Class D
C.Class B
D.Class C
60. Which one of the following list is not component of an analogue signals?
A.Amplitude
B.Wavelength
C.phase
D.Discrete pulse
61. Communication between a radio station and its listeners involves ______________ transmission.
A.full-duplex
B.Half-duplex
C.Simplex
D.Automatic
62. Which of the following does not describe router functions
A. Broadcast forwarding
B.nternetwork communication
C.Packet filtering
D.Packet switching
63. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A. Layer 2
B. Layer 4
C. Layer 3
D. Layer 7
64. The technique of allowing multiple signals to be transmitted at the same time over the same cable is
called _____________-
A. Broadcast
B. Multicast
C. Multiplexing
D. demultiplexing
65. Passwords enable users to
A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structures
66. Which will not harm computer resources?
A. firewall
GOOD LUCK!
B. Virus
C. Trojan horse
D. None of the above
67.A program designed to destroy data on your computer which can travel to “infect” other computers is
called a _
A. Disease
B. Torpedo
C. Hurricane
D. virus
68.Trojan-Horse programs
A.are legitimate programs that allow unauthorized access
B.are hacker programs that do not show up on the system
C.really do not usually work
D. are usually immediately discovered
69.3Technology, no longer protected by copyright, and is available to everyone, is considered to be:
A.proprietary
B. open
C.experimental
D.in the public domain.
70. All of the following are examples of real security and privacy risks. EXCEPT:
A.Hackers
B.Spam
C.Viruses
D.Identity theft
Part 4. Intelligent Systems
71. Which of the following is not a type of Artificial Intelligence agent?
A. Learning AI agent
B. Goal-based AI agent
C.Simple reflex AI agent
D.Unity-based AI agent
72. Which of the following is not the commonly used programming language for Artificial Intelligence?
A. Perl
B.Java
C.PROLOG
D.LISP
73. What is the name of the Artificial Intelligence system developed by Daniel Bobrow?
A.program known as BACON
B.system known as STUDENT
C.program known as SHRDLU
D. system known as SIMD
74.A process that is repeated, evaluated, and refined is called __________
A. diagnostic
B. descriptive
C. interpretive
D. iterative
75. An AI agent perceives and acts upon the environment using___.
A. Perceiver
GOOD LUCK!
B. Sensors
C. Actuators
D. Both a and c
76. Which rule is applied for the Simple reflex agent?
A.Simple-action rule
B. Simple &Condition-action rule
C. Condition-action rule
D.None of the above
Part 5-Computer Architecture and Operating Systems
77. When does page fault occur?
A. The deadlock occurs.
B. The buffering occurs
C. The page is present in memory.
D. The page does not present in memory.
78. Which of the following is a condition that causes deadlock?
A. Mutual exclusion
B. Hold and wait
C. Circular wait
D. No preemption
E. All of these
79. What is an operating system?
A. System service provider to the application programs
B. Collection of programs that manages hardware resources
C. Interface between the hardware and application programs
D. All of above
80. Which one of the following Scheduling algorithm allocates the CPU first to the process that requests
the CPU first?
A. Priority scheduling
B. Shortest job scheduling
C. First-come, first-served scheduling
D. None of above
81. What is the ready state of a process?
A. When process is unable to run until some task has been completed
B. When process is scheduled to run after some execution
C. When process is using the CPU
D. None of the mentioned
82. A set of processes is deadlock if ____________
A. Each process is terminated
B. All processes are trying to kill each other
C. Each process is blocked and will remain so forever
D. None of the mentioned
GOOD LUCK!
83.In Operating Systems, which of the following is/are CPU scheduling algorithms?
A. Priority
B. Round Robin
C. Shortest Job First
D. All of the mentioned
84. In which of the storage placement strategies a program is placed in the largest available hole in the main
memory?
A. Best fit
B. First fit
C. Worst fit
D. Buddy
85. Which of the following is a type of computer architecture?
A. Microarchitecture
B. Harvard Architecture
C. Von-Neumann Architecture
D. All of the mentioned
86. Which one is not a combinational circuit?
A. Encoder
B. Decoder
C. Multiplexer
D. De-multiplexer
E. Register
87. In a _________ cache organization, cache permits data to be stored in any cache block.
A. Direct Mapped
B. Set Associativity
C. Fully Associative
D. All
Part 6-Compiler and Complexity
88. If a grammar produces more than one leftmost derivation for a sentence, it is called as: _____
A. Ambiguous grammar
B. Perfect grammar
C. Associative grammar
D. Precedence
89. The intersection of a context-free language and a regular language is ________
A. neither context-free nor regular.
B. context-free
C. regular but not context-free
D. both regular and context-free.
90. Which one of the following is not part of Turing machine?
A. Finite control
B. Head
C. Tape
GOOD LUCK!
D. Input
91. The output of lexical analyzer is
A. Syntax tree
B. Strings of characters
C. A set of tokens
D. set of regular expressions
92.Which of the following is NOT the primary role of code generator in compiler design? *
A. instruction selection
B. Declaration of variables
C. instruction ordering
D. Register allocation
93. Which one of the following is different from the others?
A. quadruples
B. triples
C. tree
D. indirect triples
94. When is the type checking usually done? *
A. During lexical analysis
B. During syntax directed translation
C. During syntax analysis
D. During code optimization
95. Which of the following can NOT represents a target Code?
A. Three address code
B. Assembly language
C. Absolute machine code
D. Byte Code
96. Which of the following is NOT important property of intermediate code representation?
A. Ease of generation
B. Register allocation
C. Level of abstraction
D. Ease of manipulation
97. Handle pruning is the technique used to obtain
(A) Canonical reduction sequence
(B) Canonical derivation sequence
(C) Both (a) and (b)
(D) None of these
98. Which of the following is/are the phases of compiler?
(A) Code generation
(B) Syntax analyser
(C) Lexical analyser
(D) All of these
99. Compiler translates the source code to
(A) Machine code
GOOD LUCK!
(B) Executable code
(C) Binary code
(D) Both A and C
100. Replacement of an expensive operation by a cheaper one is called
(A) Reduction in strength
(B) Loop-invariant computation
(C) Code motion
(D) None of these
Admas University
Faculty of Informatics
GOOD LUCK!
Department of Computer Science
Model Exit Exam
Answer Sheet
Name _________________________
ID.No._________________________
Section _________________
Answer Sheet
Web Programming
1. A 2. D 3. D 4. C 5. C 6. D
7. D 8. C 9. C
Fundamentals of Software Engineering
1.B 2.C 3.C 4.B 5.B 6.B
4.Database Systems
1.A 2. C 3.D 4.A 5.C 6.A
7.C 8. C 9.D 10. C 11. A 12. C
Computer Programming
1.A 2.C 3.D 4.C 5.B 6.B
Object Oriented Programming
1.C 2.A 3.D 4.C 5.A 6.B
Design and Analysis of Algorithms
1.A 2.D 3.C 4.A 5.D 6.C
Data Structure and Algorithms
1.A 2.B 3.A 4.D 5.C 6.C
7.A
Data Communication and Computer Networking
1.A 2.D 3.B 4.D 5.C 6.D
Computer Security
1.B 2.B 3.A 4.B 5.C 6.C
Network and System Administration
1.C 2.A 3.D 4.A 5.A 6.D
Introduction to Artificial Intelligence
1.D 2.A 3.B 4.D 5.D 6.C
Operating System
1.A 2.E 3.D 4.C 5.B 6.B
Computer organization and architecture
1.D 2.C 3.D 4.C 5.B 6.D
Formal Language and Complexity Theory
1.C 2.A 3.C 4.B 5.A 6.D
Compiler Design
1.B 2.B 3.C 4.C 5.B 6.D
Sene, 2015
Time allotted: 3:00 hrs

More Related Content

PDF
Letter of Recommendation - BCG
PDF
Exercicios resolvidos valor eficaz RMS
PDF
เฉลยPat3ตค53.pdf
PDF
Terceira lista de_exercícios
PDF
Folha Formato A3
PDF
532 sagorela pustinja
DOC
Kality CS Model_Exit_Exams_with_answer - Copy (2).doc
DOCX
CXC CSEC Information Technology Multiple Choice Questions
Letter of Recommendation - BCG
Exercicios resolvidos valor eficaz RMS
เฉลยPat3ตค53.pdf
Terceira lista de_exercícios
Folha Formato A3
532 sagorela pustinja
Kality CS Model_Exit_Exams_with_answer - Copy (2).doc
CXC CSEC Information Technology Multiple Choice Questions

Similar to BISH CS Modle Exit Exam.doc (20)

PDF
OOM MCQ 2018
DOC
Ugcnet4 u
PDF
SBI IT (Systems) Assistant Manager Question Paper
DOCX
CS 192 test questions 1-441. Global variables are known to the e.docx
PDF
Which of the following is not one of the rules cited in class for making e ma...
DOCX
S3 Data Processing Pre-Waec Examination (First Half)
PDF
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
PDF
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
DOCX
i need this done in one hourQ1. I.docx
PDF
DRDO Previous Year Computer Question (1000 MCQ)
PDF
Specialist marketing officer professional knowledge questions.pdf(1)
DOC
Mcq+questions+cxc+it
DOCX
aturday, 28 September 2013, 0929 AMCompleted onSunday, 29 Sep.docx
PDF
Cs101 mega collectionoffinallpaper
DOC
one of the rules cited in class for making e-mail more effective Experience T...
PPTX
Top TCS Interview Questions And Answers | How to Crack An Interview At TCS | ...
DOCX
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
PDF
CAPE Computer Science Unit 1 Paper 1 - Practice Paper
PDF
Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis
OOM MCQ 2018
Ugcnet4 u
SBI IT (Systems) Assistant Manager Question Paper
CS 192 test questions 1-441. Global variables are known to the e.docx
Which of the following is not one of the rules cited in class for making e ma...
S3 Data Processing Pre-Waec Examination (First Half)
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
1 allahabad bank-probationary-officers-exam-computer-general-awareness-solved...
i need this done in one hourQ1. I.docx
DRDO Previous Year Computer Question (1000 MCQ)
Specialist marketing officer professional knowledge questions.pdf(1)
Mcq+questions+cxc+it
aturday, 28 September 2013, 0929 AMCompleted onSunday, 29 Sep.docx
Cs101 mega collectionoffinallpaper
one of the rules cited in class for making e-mail more effective Experience T...
Top TCS Interview Questions And Answers | How to Crack An Interview At TCS | ...
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
CAPE Computer Science Unit 1 Paper 1 - Practice Paper
Test Bank for Starting out with Visual C#, 5th Edition, Tony Gaddis
Ad

Recently uploaded (20)

PDF
Caterpillar CAT 311B EXCAVATOR (8GR00001-UP) Operation and Maintenance Manual...
DOCX
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
PDF
MANDIBLE (1).pdffawffffffffffffffffffffffffffffffffffffffffff
PPTX
capstoneoooooooooooooooooooooooooooooooooo
PPTX
laws of thermodynamics with diagrams details
PDF
Volvo EC300D L EC300DL excavator weight Manuals.pdf
PDF
Volvo EC290C NL EC290CNL engine Manual.pdf
PPTX
UNIT-2(B) Organisavtional Appraisal.pptx
PDF
RPL-ASDC PPT PROGRAM NSDC GOVT SKILLS INDIA
PPT
Kaizen for Beginners and how to implement Kaizen
PDF
computer system to create, modify, analyse or optimize an engineering design.
PDF
Caterpillar CAT 312B L EXCAVATOR (2KW00001-UP) Operation and Maintenance Manu...
PPTX
IMMUNITY TYPES PPT.pptx very good , sufficient
PDF
Caterpillar Cat 315C Excavator (Prefix CJC) Service Repair Manual Instant Dow...
PDF
Journal Meraj.pdfuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
PDF
How Much does a Volvo EC290C NL EC290CNL Weight.pdf
PPTX
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
PDF
intrusion control for clean steel 123.pdf
PPTX
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
PPTX
Paediatric History & Clinical Examination.pptx
Caterpillar CAT 311B EXCAVATOR (8GR00001-UP) Operation and Maintenance Manual...
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
MANDIBLE (1).pdffawffffffffffffffffffffffffffffffffffffffffff
capstoneoooooooooooooooooooooooooooooooooo
laws of thermodynamics with diagrams details
Volvo EC300D L EC300DL excavator weight Manuals.pdf
Volvo EC290C NL EC290CNL engine Manual.pdf
UNIT-2(B) Organisavtional Appraisal.pptx
RPL-ASDC PPT PROGRAM NSDC GOVT SKILLS INDIA
Kaizen for Beginners and how to implement Kaizen
computer system to create, modify, analyse or optimize an engineering design.
Caterpillar CAT 312B L EXCAVATOR (2KW00001-UP) Operation and Maintenance Manu...
IMMUNITY TYPES PPT.pptx very good , sufficient
Caterpillar Cat 315C Excavator (Prefix CJC) Service Repair Manual Instant Dow...
Journal Meraj.pdfuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
How Much does a Volvo EC290C NL EC290CNL Weight.pdf
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
intrusion control for clean steel 123.pdf
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
Paediatric History & Clinical Examination.pptx
Ad

BISH CS Modle Exit Exam.doc

  • 1. GOOD LUCK! Admas University Faculty of Informatics Department of Computer Science Model Exit Exam V CODE BI-005 Name _________________________ ID.No._________________________ Model Exit Exam Computer Science S.N Theme Course Title Credit Hrs. Number of Questions 1 Theme 1. System Development Web programming 6 9 Software Engineering 3 6 Database Systems 6 12 Total 3 15 27 2 Theme 2. Programming and Algorithms Computer Programming 6 6 Object Oriented Programming 3 6 Design and Analysis of Algorithms 3 6 Data Structure and Algorithms 3 7 Total 4 15 25 3 Theme 3. Computer Networking and Security Data Communication and Computer Networking 3 6 Computer Security 3 6 Network and System Administration 3 6 Total 3 9 18 4 Theme 4. Intelligent Systems Introduction to Artificial Intelligence 3 6 1 3 6 5 Theme 5. Computer Architecture and Operating Systems Operating System 3 6 Computer organization and architecture 3 6 Total 2 6 12 6 Theme 6. Compiler and Complexity Formal Language and Complexity Theory 3 6 Compiler Design 3 6 2 6 12 Grand total 12 51 100 SENE, 2015 Time allotted: 3:00 hrs
  • 2. GOOD LUCK! Instruction: Read the questions and choose the right answer from the given alternatives and write the letter of your choice on the space provided at the separate answer sheet. (1 point each) Part 1:System Development 1. Which one of the following is False about static website? A. Its content will be changed unless the actual webpage file is edited. B. It is also referred as flat pages or stationary pages. C. It will be delivered to the users as exactly stored in the files. D. Its content remains the same for all viewers of the website. 2. Which one of the following is a server side scripting language? A. PHP B. ASP C. Python D. All of the above 3.A pop up box used to display information to user in JavaScript is called ___________. A. Prompt B. Alert C. Confirm D. All of the above 4. What does these code possibly refers to<link rel="stylesheet" href="styles.css"> ? A. Defines a new CSS by the name styles B. Calls an internal style sheet called styles C. Calls an external style sheet called styles D. Defines an inline CSS by the name styles 5. What is the preferred way for adding a background color in HTML? A. <body background="yellow"> B. <background>yellow</background> C. < body style="background-color: yellow"> D. <background color="yellow">text<background> 6. What is the method used to get the result from the form data sent with both GET and POST? A. $_REQUEST B. $_POST C. $_GET D. A & B 7. Which of the following is an optional parameter one while using mysqli_connect() method? A. Localhost B. Database C. Username D. Password 8. What Tag Is Used For Inserting A Line Break In A Html Page. A. <break> B. <ol> C. <br> D. <lb> 9. Which Javascript Event Handler Pertains To Actions Enabled By Mouse Clicks.
  • 3. GOOD LUCK! A. Oninput B. Onchange C. Onclick D. Ondrag 10. Which of the following are Advantages of modularization in software design? A. Smaller components are difficult to maintain B. Components with high cohesion can be re-used again C. Program can be divided based on functional aspects D. Desired from security aspect 11. Which of the following is not element of Requirement Engineering Process? A. Software Requirement Specification B. Feasibility Steady C. Software Requirement Design D. Requirement Gathering 12. Which type of test determine if the system meets the entire requirements (functional and nonfunctional) A. Unit Test B. Integration test C. System test D. Acceptance test 13. How is generalization implemented in Object-Oriented software engineering? A. Inheritance B. Polymorphism C. Encapsulation D. Abstract Classes 14. All of the following are required to develop an effective test except: A. Detailed understanding of the system B. Application and solution domain knowledge C. Knowledge of the testing techniques D. Skill to specific programming language 15. Use case description commonly contains: A. Trigger, associations, guarantee. B. Precondition, generalizations, main scenario. C. Precondition, main scenario, alternative scenarios D. None of the above
  • 4. GOOD LUCK! 16. ______It defines how and where data are organized in physical data storage A. Internal Schema B. Conceptual Schema C. External Schema D. External and Conceptual Schema 17. During modeling your data, Entity Relationship is applied at A. Applications and security B. Physical refinement C. Conceptual database D. Schema refinement 18. Criteria that should not be considered when evaluating or assessing requirement analysis? A. Correctness B. Need assessment C. Consistency D. Speed 19. The SQL command that you use to define the primary key for a existing table called 'Employee' with the primary column to be 'empid' A. ADD TABLE Employee ADD PRIMARY KEY (empid) B. ATTACH TABLE Employee ADD PRIMARY KEY (empid) C. ADD TABLE Employee ATTACH PRIMARY KEY (empid) D. DALTER TABLE Employee ADD PRIMARY KEY (empid) 20. While checking normalization process, the problem that doesn’t exist on transitive dependency is A. Modification Anomaly B. Revoke Anomaly C. Insertion Anomaly D. Deletion Anomaly 21. You need to produce a report for mailing labels for customers. The mailing label must have only the customer name and address. The CUSTOMERS table has these columns, ID ,NAME,ADDRESS,PHONE ,the SELECT statement to accomplishes this task? A. SEL000ECT name, address FROM customers; B. SELECT*FROM customers; C. SELECT id, name, address, phone FROM customers; D. SELECT cust_name, cust_address FROM customers; 22. If the maximum cardinality is equal to 1 in both directions of a relationship, then it is A. Optional B. Many-to-many C. One-to-one D. One-to-many 23. How do change the PRICE of BOOK whose id =B001 to value of 600 A. CHANGE BOOK SET PRICE =600 Where ID =’B001’; B. UPDATE TO CHANGE BOOK SET PRICE =600 Where ID =’B001’; C. UPDATE BOOK SET PRICE =600 Where ID =’B001’; D. GRANT BOOK SET PRICE =600 Where ID =’B001’; 24. The Entity Relationship (E-R) Model A. Entities are represented by circle
  • 5. GOOD LUCK! B. Attributes are represented by rectangle C. It represents conceptual view D. It corresponds to row 25. Removal of transitivity property should be full filled in A. First Normal form B. Fourth Normal form C. Third Normal form D. Second Normal form 26. If relation R has 5 tuples and relation S has also 7 tuples, then Cartesian product of R and S will have A. 5+7 tuples B. 7-5 tuples C. 5X7 tuples D. 5/7 tuples 27. How do you prevent system privileges deletion and updating authority on PRICE and YEAR column of the CATALOGUE table from user Mohammed A. GRANT DELETE, UPDATE (price,year) ON catalogue From Mohammed B. ALLOW DELETE, UPDATE (price,year) ON catalogue From Mohammed C. REVOKE DELETE, UPDATE (price,year) ON catalogue From Mohammed D. DENY DELETE, UPDATE (price,year) ON catalogue From Mohammed Part 2-Programming and Algorithms 28. In C++ programming, a variable which stores a reference to another variable is called a____ A. Pointer B. Constructor C. Asterisks D. Structure 29. A program that translates a high-level language like C++ to a machine language is called a _____ A. Disassembler B. Coder C. Compiler D. Assembler 30. In C++ programming, assume that the value of the variable A is 0 and the value of the variable B is 10. Which one of the following alternatives is false? * A. (B = = 10) || (x < y) B. (A > 20) || (B >5) C. (A >10) && (x < y D. (A= =0) && (B < 20) 31. Which one of the following format is write about functions in structural Programming? A. Type name { parameter1, parameter2, ...} (statement ) B. Name type ( parameter1, parameter2, ...) { statement } C. Type name ( parameter1, parameter2, ...) {statement } D. Name type { parameter1, parameter2, ...} (statement ) 32. Which of the following is a valid function call (assuming the function add exists & have two parameters)? A. add;
  • 6. GOOD LUCK! B. add(a,b); C. add a,b; D. add(int a, int b); 33. A function is said to be recursive function__________?* A. If the function calls another function2 & Function3 B. If the main function calls many functions C. If the main function calls another one function D. If the function calls itself 34. Which of the following is not an OOPS concept? A. Encapsulation B. Polymorphism C. Exception D. Abstraction 35. Which feature of OOPS derives the class from another class? A. Inheritance B. Data hiding C. Encapsulation D. Polymorphism 36. Which two features of object-oriented programming are the same? A. Abstraction and Polymorphism features are the same B. Inheritance and Encapsulation features are the same C. Encapsulation and Polymorphism features are the same D. Encapsulation and Abstraction 37. Which of the following statement of a program is not right? A. class teacher{ }; teacher s[5]; B. class teacher{ }s; C. class teacher{ }s[]; D. class teacher{ }; teacher s; 38. Using the concept of encapsulation security of the data is ___________ A. Ensured to some extent B. Purely ensured C. Not ensured D. Very low E. Consider the following Java program and select the right option from the given options.
  • 7. GOOD LUCK! A. The above program may result in undesirable conditions B. The above program violates the feature of encapsulation C. The above program will generate an error D. The above program is good to go 39. Which one of the following statements are true?* A. Structure is collection of homogenous members B. Individual values of the Structure are called members C. It is possible to initialize the Structure up on its defining D. All are correct 40.An ___ is defined as a set of well-defined instructions used to accomplish a particular task. A. Algorithm B. Function C. Program D. Procedure 41. The measure of the longest amount of time possibly taken to complete an algorithm is expressed as __. A. Little-O B. Little-Omega C. Big-Omega D. Big-O 42.A ___ is a compact, informal, and environment-independent description of a computer programming algorithm.
  • 8. GOOD LUCK! A. Stack B. Queue C. Psuedocode D. Non-linear data structure 43. ___ of an algorithm is the amount of time required for it to execute. A. Time complexity B. Space complexity C. Compiling time D. Best case 44..Potential function method is the technique that performs an amortized analysis based on ___. A. Financial model B. Computational model C. Algorithm analysis D. Energy model 45. ___ is the maximum amount of time an algorithm takes to execute a specific set of inputs. A. Running time B. Average case time complexity C. Worst case time complexity D. Best case time complexity 46. Which of the following is non-linear data structure? A. A Trees B. B Stacks C. C Strings D. D All of the above 47. The number of comparisons done by sequential search is ....... A. A (N/2)+1 B. B (N+1)/2 C. C (N-1)/2 D. D (N-2)/2 48. ...... is not the operation that can be performed on queue. A. A Traversal B. B Insertion C. C Deletion D. D Retrieval 49. Which is/are the application(s) of stack A. A Function calls B. B Large number Arithmetic C. C Evaluation of arithmetic expressions D. D All of the above 50.Which of the following data structures are indexed structures? A. A Stack B. B Linked lists
  • 9. GOOD LUCK! C. C Linear arrays D. D None of the above 51. Which of the following data structure store the homogeneous data elements? A. A Lists B. B Pointers C. C Records D. D Arrays 52.Linear arrays are also called....... A. A One-dimensional array B. B Vertical array C. C Horizontal array D. D All of the above Part 3-Computer Networking and Security 53. Which one of the following is not component of data communication? A. Message B. Medium C. Sender D. Protocol 54. There are two types of network topologies from these topologies which one of the following defines how hosts access the media to send data.* A. Logical Topology B. Bus Topology C. Physical Topology D. Star Topology 55. Segmentation of a data stream happens at which layer of the OSI model? A. Physical B. Data Link C. Network D. Transport 56. When data is encapsulated, which is the correct order?* A. Data, frame, packet, segment, bit B. Data, segment, packet, frame, bit C. Segment, data, packet, frame, bit D. Data, segment, frame, packet, bit 57. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use? A. Coaxial B. Category 6 UTP C. Microwave D. Fiber-optic 58. From the following lists which one is not the responsibility (service) of data link layer A. Hardware Addressing
  • 10. GOOD LUCK! B. C. media access control C. Network Addressing A. logical link control 59. Which class of IP address provides a maximum of only 254 host addresses per network ID? A. Class A B.Class D C.Class B D.Class C 60. Which one of the following list is not component of an analogue signals? A.Amplitude B.Wavelength C.phase D.Discrete pulse 61. Communication between a radio station and its listeners involves ______________ transmission. A.full-duplex B.Half-duplex C.Simplex D.Automatic 62. Which of the following does not describe router functions A. Broadcast forwarding B.nternetwork communication C.Packet filtering D.Packet switching 63. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? A. Layer 2 B. Layer 4 C. Layer 3 D. Layer 7 64. The technique of allowing multiple signals to be transmitted at the same time over the same cable is called _____________- A. Broadcast B. Multicast C. Multiplexing D. demultiplexing 65. Passwords enable users to A. get into the system quickly B. make efficient use of time C. retain confidentiality of files D. simplify file structures 66. Which will not harm computer resources? A. firewall
  • 11. GOOD LUCK! B. Virus C. Trojan horse D. None of the above 67.A program designed to destroy data on your computer which can travel to “infect” other computers is called a _ A. Disease B. Torpedo C. Hurricane D. virus 68.Trojan-Horse programs A.are legitimate programs that allow unauthorized access B.are hacker programs that do not show up on the system C.really do not usually work D. are usually immediately discovered 69.3Technology, no longer protected by copyright, and is available to everyone, is considered to be: A.proprietary B. open C.experimental D.in the public domain. 70. All of the following are examples of real security and privacy risks. EXCEPT: A.Hackers B.Spam C.Viruses D.Identity theft Part 4. Intelligent Systems 71. Which of the following is not a type of Artificial Intelligence agent? A. Learning AI agent B. Goal-based AI agent C.Simple reflex AI agent D.Unity-based AI agent 72. Which of the following is not the commonly used programming language for Artificial Intelligence? A. Perl B.Java C.PROLOG D.LISP 73. What is the name of the Artificial Intelligence system developed by Daniel Bobrow? A.program known as BACON B.system known as STUDENT C.program known as SHRDLU D. system known as SIMD 74.A process that is repeated, evaluated, and refined is called __________ A. diagnostic B. descriptive C. interpretive D. iterative 75. An AI agent perceives and acts upon the environment using___. A. Perceiver
  • 12. GOOD LUCK! B. Sensors C. Actuators D. Both a and c 76. Which rule is applied for the Simple reflex agent? A.Simple-action rule B. Simple &Condition-action rule C. Condition-action rule D.None of the above Part 5-Computer Architecture and Operating Systems 77. When does page fault occur? A. The deadlock occurs. B. The buffering occurs C. The page is present in memory. D. The page does not present in memory. 78. Which of the following is a condition that causes deadlock? A. Mutual exclusion B. Hold and wait C. Circular wait D. No preemption E. All of these 79. What is an operating system? A. System service provider to the application programs B. Collection of programs that manages hardware resources C. Interface between the hardware and application programs D. All of above 80. Which one of the following Scheduling algorithm allocates the CPU first to the process that requests the CPU first? A. Priority scheduling B. Shortest job scheduling C. First-come, first-served scheduling D. None of above 81. What is the ready state of a process? A. When process is unable to run until some task has been completed B. When process is scheduled to run after some execution C. When process is using the CPU D. None of the mentioned 82. A set of processes is deadlock if ____________ A. Each process is terminated B. All processes are trying to kill each other C. Each process is blocked and will remain so forever D. None of the mentioned
  • 13. GOOD LUCK! 83.In Operating Systems, which of the following is/are CPU scheduling algorithms? A. Priority B. Round Robin C. Shortest Job First D. All of the mentioned 84. In which of the storage placement strategies a program is placed in the largest available hole in the main memory? A. Best fit B. First fit C. Worst fit D. Buddy 85. Which of the following is a type of computer architecture? A. Microarchitecture B. Harvard Architecture C. Von-Neumann Architecture D. All of the mentioned 86. Which one is not a combinational circuit? A. Encoder B. Decoder C. Multiplexer D. De-multiplexer E. Register 87. In a _________ cache organization, cache permits data to be stored in any cache block. A. Direct Mapped B. Set Associativity C. Fully Associative D. All Part 6-Compiler and Complexity 88. If a grammar produces more than one leftmost derivation for a sentence, it is called as: _____ A. Ambiguous grammar B. Perfect grammar C. Associative grammar D. Precedence 89. The intersection of a context-free language and a regular language is ________ A. neither context-free nor regular. B. context-free C. regular but not context-free D. both regular and context-free. 90. Which one of the following is not part of Turing machine? A. Finite control B. Head C. Tape
  • 14. GOOD LUCK! D. Input 91. The output of lexical analyzer is A. Syntax tree B. Strings of characters C. A set of tokens D. set of regular expressions 92.Which of the following is NOT the primary role of code generator in compiler design? * A. instruction selection B. Declaration of variables C. instruction ordering D. Register allocation 93. Which one of the following is different from the others? A. quadruples B. triples C. tree D. indirect triples 94. When is the type checking usually done? * A. During lexical analysis B. During syntax directed translation C. During syntax analysis D. During code optimization 95. Which of the following can NOT represents a target Code? A. Three address code B. Assembly language C. Absolute machine code D. Byte Code 96. Which of the following is NOT important property of intermediate code representation? A. Ease of generation B. Register allocation C. Level of abstraction D. Ease of manipulation 97. Handle pruning is the technique used to obtain (A) Canonical reduction sequence (B) Canonical derivation sequence (C) Both (a) and (b) (D) None of these 98. Which of the following is/are the phases of compiler? (A) Code generation (B) Syntax analyser (C) Lexical analyser (D) All of these 99. Compiler translates the source code to (A) Machine code
  • 15. GOOD LUCK! (B) Executable code (C) Binary code (D) Both A and C 100. Replacement of an expensive operation by a cheaper one is called (A) Reduction in strength (B) Loop-invariant computation (C) Code motion (D) None of these Admas University Faculty of Informatics
  • 16. GOOD LUCK! Department of Computer Science Model Exit Exam Answer Sheet Name _________________________ ID.No._________________________ Section _________________ Answer Sheet Web Programming 1. A 2. D 3. D 4. C 5. C 6. D 7. D 8. C 9. C Fundamentals of Software Engineering 1.B 2.C 3.C 4.B 5.B 6.B 4.Database Systems 1.A 2. C 3.D 4.A 5.C 6.A 7.C 8. C 9.D 10. C 11. A 12. C Computer Programming 1.A 2.C 3.D 4.C 5.B 6.B Object Oriented Programming 1.C 2.A 3.D 4.C 5.A 6.B Design and Analysis of Algorithms 1.A 2.D 3.C 4.A 5.D 6.C Data Structure and Algorithms 1.A 2.B 3.A 4.D 5.C 6.C 7.A Data Communication and Computer Networking 1.A 2.D 3.B 4.D 5.C 6.D Computer Security 1.B 2.B 3.A 4.B 5.C 6.C Network and System Administration 1.C 2.A 3.D 4.A 5.A 6.D Introduction to Artificial Intelligence 1.D 2.A 3.B 4.D 5.D 6.C Operating System 1.A 2.E 3.D 4.C 5.B 6.B Computer organization and architecture 1.D 2.C 3.D 4.C 5.B 6.D Formal Language and Complexity Theory 1.C 2.A 3.C 4.B 5.A 6.D Compiler Design 1.B 2.B 3.C 4.C 5.B 6.D Sene, 2015 Time allotted: 3:00 hrs