You are on page 1of 26

Skip to content (Press Enter)

 Home
 Natural & Computational Science
o Chemistry
o Biology
o Statistics
o Horticultur
e
o Computer
Science
o Mathemati
cs
o Physics
 Agriculture & Natural resource
o Agricultur
al
Economic
s
o Animal
Science
o RDA
o Plant
Science
o Natural
resource
managem
ent
o Forestry
 Social Science & Humanity
o Managem
ent
o English
o Geograph
y
o Amharic
o History
 Business & Economics
o Business
&
Economic
s
o Managem
ent
o Economic
s
o Accountin
g

Thanks for submitting your response! You can edit this message on the
"Results Pages" tab.
First Name: Eliyas
Midle Name: Ibsa
Last Name: Toltisa
ID No: 1200470
Department: Computer Science

1. Which command is used to roll the database to previous Commit


Point?
A.Commit
B.Select
C.Rollback
D.Insert

2. A transaction may not always complete its execution successfully.


Such a transaction is termed
A.Aborted
B.Terminated
C.Closed
D.Committed
3. Which of the following provides the ability to query information from
the database and insert tuples into, delete tuples from, and modify
tuples in the database?
A.DML(Data Manipulation Language)
B.DDL(Data Definition Language)
C.QueryRelational
D.Schema

4. The given Query SELECT name, course_id FROM instructor, teaches


WHERE instructor_ID= te aches_ID; can also be replaced with_______
A.Select name,course_id from teaches,instructor where
instructor_id=course_id;
B.Select name, course_id from instructor natural join teaches;
C.Select name, course_id from instructor;
D.Select course_id from instructor join teaches;

5. Which one of the following given statements possibly contains the


error?
A.select * from emp where empid = 10003;
B.select empid from emp where empid = 10006;
C.select empid from emp;
D.select empid where empid = 1009 and Lastname = 'Eyerusalem';

6. Which of the following systems is responsible for ensuring durability?


A.Recovery system
B.Atomic system
C.Concurrency control
D.systemCompiler system

7. Making a change to the conceptual schema without affecting the


external schema is an example of______________.
A.Functional dependency
B.logical data independency
C.Physical Data independency
D.Concurrency control

8. Problems Associated with Concurrent Transaction Processing that


occurs when one transaction can see intermediate results of another
transaction before it is committed called______________.
A.lost Update Problem
Buncommitted Dependency Problem
C.inconsistent Analysis Problem
D.consistent Analysis Problem

9. Which one of the following is not true about heterogeneous


distributed database?
A.Different sites may use different schemas and software (DBMS)
B.Difference in schema is a major problem for query processing
C.Difference in software is a major problem for transaction processing
D.Sites always aware of each other

10. What is the objective of the knapsack problem?


A.To Get Maximum Weight In The Knapsack
B.To Get Minimum Total Value In The Knapsack
C.To Get Maximum Total Value In The Knapsack
D.To Get Minimum Weight In The Knapsack

11. Fractional knapsack problem is solved most efficiently by which of


the following algorithm?
A.Dynamic Programming
B.Greedy Algorithm
C.Divide And Conquer
D.Backtracking
12. What is the worst case time complexity of merge sort?
A.O(N Log N)
B.O(Log Log N)
C.O(Log N)
D.O(n*n)

13. ___ is the maximum amount of time an algorithm takes to execute a


specific set of inputs.
A.Running time
B.Average case time complexity
C.Worst case time complexity
D.Best case time complexity

14. The recursive versions of binary search use a ___ structure.


A.Branch and bound
B.Dynamic programming
C.Divide and conquer
D.Simple recursive

15. In Network Management System, the term that is responsible for


controlling access to network based on predefined policy is called
___________
A.Fault Management
B.Secured Management
C.Active Management
Security Management

16. An Active Directory container used to organize a network’s users


and resources into logical administrative units?
A.Organizational Units
B.Users Units
C.Containerobject
D.Leaf object

17. The main purpose of Active Directory is to ________. ?


A.Provide authentication and authorization to users and computers
B.Provide File and Print services
C.Give administrators the ability to control access to restricted hardware
D.Allow users to organize their file systems into a cohesive and high
performance directory.

18. Which one of the following protocol is not found in internet layer of


TCP/IP model.
A.IP
B.ARP
C.ICMP
D.SMTP

19. At about what interval are GPOs updated on domain controllers?


A.5 Seconds
B.15 minutes
C.50 minutes
D.5 hours

20. _____________ allows system administrators to control the number


of files and data blocks that can be allocated to users or groups.
A.Disk quota system
B.Disk mounting
C.Disk partitioning
D.Swapping

21. Which of the following is known as a compiler for a high-level


language that runs on one machine and produces code for a different
machine?
A.Cross compiler
B.Multipass compiler
C.Optimizing compiler
D) One pass compiler

22. Which one of the following is not the importance of type checking?


A.Check whether operators match with their operands or not.
B.Check whether types of variables match with the values assigned to them or
not.
C.Check whether there is misspelling or not for the given strings.
D.Check whether called function and variable names has been declared or
not.

23. Let L1 = {w ∈ {0,1}∗ | w has at least as many occurrences of (110)’s as


(011)’s}. Let L2 = { ∈ {0,1}∗ | w has at least as many occurrences of
(000)’s as (111)’s}.Which of the following is correct?
A.L2 is regular
B.L1 and L2 are regular
C.L1 is regular but not L2
D.None of them are regular

24. A type of error that includes misspellings of identifiers, keywords, or


operators is called ___.
A.lexical error
B.syntactic error
C.semantic error
D.logical errors

25. Consider the grammar G: S→AbD|sAb|e and A→adB|a|id. Which one


of the following is true statement about the above grammar G?
A.G has three rules
B.There is left recursion in this grammar
C.S is the start symbol for this grammar
D.S and A are non-terminal symbols whereas the remain symbols are
terminals.

26. What is the name of the HTTP request header that defines the size (in
bytes) of the message body?
A.Content-Length
B.Length
C.Content-Size
D.Size

27. When you are typing https://www.google.com in your browser, which


HTTP verb is used?
A.GET
B.PUT
C.POST
D.DELETE

28. In the following URL, what’s the sub domain?


https://api.google.com/.
A.com
B.api.google
C.api
D.https

29. One of the following is true about web framework?


A.A software framework that is designed to support the development of web
application
B.A software, or hardware dedicated to running web applications
C.A program that handles all application operations
D.Store and manage data used by other devices within the network
30. One of the following client-side scripting languages is used to
describe the structure of a Web page.
A.HTML
B.CSS
C.JavaScript
D.PHP

?31. ___________ variable can be used to get the result from form data
sent with both the GET and POST methods.
A.$_FILE
B.$_GET
C.$_REQUES
D.$GLOBALS

32. __________is a server scripting language, and a powerful tool for


making dynamic and interactive Web pages.
A.HTML
B.CSS
C.JavaScript
D.PHP

33. Which of the following is true about PHP variable names? (Select all
possible Answers)
A.A variable starts with the $ sign, followed by the name of the variable.
B.A variable name must start with a letter or the underscore character.
C.A variable name cannot start with a number.
D.A variable name can only contain alpha-numeric characters and
underscores (A-z, 0-9, and _)

34. In a doubly linked list, what’s the “tail” of a linked list?


A.It's the node with the pointer to the next node equal to NULL
B.It's the node with the pointer to the previous node equal to NULL
C.It's the node with the pointer to the next node equal to the pointer to the first
node.
D.It's the node with the pointer to the previous node equal to the pointer to the
first node.

35. What is in-order traversal in binary search tree?


A.the left subtree is visited first, then the root and later the right sub-tree.
B.the root node is visited first, then the left subtree and finally the right
subtree.
C.left subtree is visited first, then the right subtree and finally the root node.
D.not mentioned in the list

36. What is the Big O notation of the following function / algorithm?


A.O(n)
B.O(n!)
C.O(log(n)
D.O(nlog(n))

37. One of the following is the time complexity of removing an element


at index n in an unsorted array?
A.O(1)
B.O(n)
C.O(n!)
D.O(n^2)
38. What is the time complexity or Big Oh notation of this function /
algorithm?
A.O(n!)
B.O(log(n))
C.O(nlog(n))
D.O(2^n)
NA
39. Which of the following is true about graph in data structure?
A.A graph may contain no edges and many vertices
B.A graph may contain many edges and at least one vertex
C.A graph may contain no edges and no vertices
D.A graph may contain no vertices and many edges

40. The postfix form of the expression (A+ B)*(C*D- E)*F / G is?


A.AB+ CD*E – FG /**
B.AB + CD* E – F **G /
C.AB + CD* E – *F *G /
D.AB + CDE * – * F *G /

41. One of the following is a linear list of elements in which deletion can


be done from one end (front) and insertion can take place only at the
other end (rear).
A.Queue
B.Stack
C.Tree
D.Linked list
NA
42. One of the following is true about hash table in data structure.
A.A structure used to implement linear data structure
B.A structure that maps keys to values
C.A structure used for storage
D.A structure used to implement stack and queue

43. Which of the following real-world scenarios would you associate


with a stack data structure?
A.Piling up of chairs one above the other
B.People standing in a line to be serviced at a counter
C.Offer services based on the priority of the customer
D.Ticket Booking in Airlines.

44. Which is the following is the most important feature of the spiral


model?
A.Efficiency management
B.Time management
C.Risk management
B.Quality management

45. Identify among the following which is not recommended for software


processes in software engineering?
A.Software verification
B.Software testing and validationS
C.oftware designing
D.Software evolution
46. For which of the following reasons is the waterfall model not
suitable.
A.Small projects
B.Complex projects
C.Maintenance Projects
D.Accommodating changes

47. What is the main technique for achieving portable software?


A.The main technique for achieving portable software is to isolate system
dependency
B.The main technique for achieving portable software is to increase the
overall performance
C.The main technique for achieving portable software is to have independent
platform dependency.
D.None of the mentioned

48. Which of the following is incorrect activity for the configuration


management of a software system?
A.Internship management
B.Change management
C.Version management
D.System management

49. What is a collection of software engineering work tasks, milestones,


and deliverables that must be accomplished to complete a particular
project
A.Task set?
B.Degree of milestone
C.Adaptation criteria
D.all of the mentioned

50. Suppose Mekdela Amba university software engineering team wants


to develop Human Resource management System(HRMS) for Mekdela
Amba University by dividing into standalone systems, assume that
HRMS contains three different standalone systems(employee
information system develops in the first 2 weeks, position control
system in the next 2 weeks and recruiting information system in the last
week), assume each of the standalone systems are developed based on
the software engineering standard principles .which software process
model does the software engineering team selects?
A.Agile model
B.Spiral model
C.Incremental model
D.Waterfall model

51. What is the size of the float data type on a 64-bit machine?


A.1 byte
B.2 bytes
C.4 bytes
D.8 bytes

52. What is the output of the following piece of code?


A.01010101010
B..123456789
C.1010101010
D.None of the above
53. Consider the following code.
A.my_point.y = 98;
B.my_point->y = 98;
C.p.y = 98;
D.(*p)->y = 98;

54. What does this code print?


A.4321
B.43210
C.321
D.3210
NA

55. What is the value of n after the following code is executed?


A.0
B.98
C.99
D.402

56. What is the size of *p in this code on a 64-bit machine? int **p;


A.4 bytes
B.8 bytes
C.16 bytes
D.2 bytes

57. What will happen in the following C++ code snippet?


A.b is assigned to ap now points to b
C.a is assigned to b
D.q now points to a

58. UDP and TCP are two protocols at the ________ layer.


A.data link
B.network
C.transport
D.application
59. TCP groups a number of bytes together into a packet called a ____.
A.user datagram
B.segment
C.datagram
D.none of the choices are correct

60. What is the maximum number of IP addresses that can be assigned


to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
A.14
B.15
C.16
D.30

61. What is the subnet id of a host with an IP address 172.16.66.0/21?


A.172.16.36.0
B.172.16.64.0
C.172.16.48.0
D.172.16.0.0

62. One of the main duties of the transport layer is to provide ________


communication.
A.node-to-node
B.process-to-process
C.host-to-hos
D.tnone of the choices are correct

63. Which of the following is a valid statement?


A.P v Øp
B.P v Q
C.P Ù ØP
D.None
64. Which of the following satisfiable statement?
A.P v Øp
B.P v Q
C.P Ù ØP
D.None

65. Which of the following is the strength of First order Logic over


propositional logic?
A.More number of connectors
B.Context free meaning
C.Description of association
D.None

66. Which of the following term is used to express cardinality of relation


between objects?
A.Predicates
B.Quantifiers
C.Connectives
D.Constant Symbols

67. Which of the following inference rule is used with quantifiers?


A.Modus Ponens & Tollens
B.Universal Elimination
C.Unification
D.None

68. _________________ is the ability to say whether a sentence is true or


false.
A.Syntax
B.Semantics
C.Proof theory
D.None

69. Which of the following is classification problem?


A.Price of computer for the coming one year
B.Whether a certain customer will buy a product or not
C.Characterizing discovering customer segments of potential market.
D.None

70. ________________ is an AI school of thought that tries to build an


agent that takes the right action that maximizes the goal achievement.
A.Acting Humanly
B.Acting rationally
C.Thinking humanly
D.Thinking Rationally

71. If a process is in a “Blocked” state and waiting for some I/O service.
When the service is complete it goes to the __________
A.Terminated state
B.Suspended state
C.Running state
D.Ready state

72. The portion of the process scheduler in an operating system that


dispatches processes is concerned with ____________
A.assigning ready processes to waiting queue
B.assigning running processes to blocked queue
C.assigning ready processes to the CPU
D.all of the mentioned

73. The FCFS algorithm is particularly troublesome for ____________


A.operating systems
B.multiprocessor systems
C.time-sharing systems
D.multiprogramming systems

74. Mutual exclusion implies that ____________


A.if a process is executing in its critical section, then no other process must be
executing in their critical sections
B.if a process is executing in its critical section, then other processes must be
executing in their critical sections
C.if a process is executing in its critical section, then all the resources of the
system must be blocked until it finishes execution
D.none of the mentioned

75. Which of the following statements are true? i) Shortest remaining


time first scheduling may cause starvation. ii) Preemptive scheduling
may cause starvation. iii) Round robin is better than FCFS in terms of
response time.
A.i only
B.i and iii only.
C.ii and iii only
D.i, ii and iii

76. There are 10 different processes running on a workstation. Idle


processes are waiting for an input event in the input queue. Busy
processes are scheduled with the Round-Robin time sharing method.
Which out of the following quantum times is the best value for small
response times, if the processes have a short runtime, e.g. less than
10ms?
A.tQ = 15mst
B.Q = 40mst
C.Q = 45mst
D.Q = 50ms

77. In Unix, which system call creates the new process?


A.create
B.fork
C.new
D.none of the mentioned

78. CPU scheduling is the basis of ___________


A.multiprogramming operating systems
B.larger memory sized systems
C.multiprocessor systems
D.none of the mentioned

79. Which is not a feature of OOP in general definitions?


A.Efficient Code
B.Reusability
C.Duplicate/Redundant data
D.Modularity

80. Which feature of OOP indicates code reusability?


A.Abstraction
B.Polymorphism
C.Encapsulation
D.Inheritance

81. What is encapsulation in OOP?


A.It is a way of combining various data members and member functions into a
single unit which can operate on any data
B.It is a way of combining various data members into a single unit
C.It is a way of combining various member functions into a single unit
D.It is a way of combining various data members and member functions that
operate on those data members into a single unit
82. In which access should a constructor be defined, so that object of
the class can be created in any function?
A.Any access specifier will work
B.Private
C.Public
D.Protected

83. Which type of members can’t be accessed in derived classes of a


base class?
A.All can be accessed
B.Protected
C.Private
D.Public

84. Which of the following best describes member function overriding?


A.Member functions having the same name in derived class only
B.Member functions having the same name and different signature inside
main function
C.Member functions having the same name in base and derived classes
D.Member functions having the same name in base class only

85. Which of the following variable violates the definition of


encapsulation?
A.Array variables
B.Local variables
C.Global variables
D.Public variables

86. Why do we need to handle exceptions?


A.To prevent abnormal termination of programTo encourage exception prone
programTo avoid syntax errorsTo avoid semantic errors
NA
87. Which of the following is the fastest means of memory access for
CPU?
A.Cache
B.Main memory
C.Virtual Memory
D.Registers

88. If M denotes the number of memory locations and N denotes the


word size, then an expression that denotes the storage capacity is
______________

 A.M*N

B.M+N
C.2M+N
D.2M-N

89. Does the Load instruction do the following operation/s?


A.Loads the contents of a disc onto a memory location
B.Loads the contents of a location onto the accumulators
C.Load the contents of the PCB onto the register
D.Load the contents of a disc onto the register

90. Which of the following memory of the computer is used to speed up


the computer processing?
A.Cache memory
B.RAM
C.ROM
D.Flash disk

91. Which of the following circuit is used to store one bit of data?


A.Decoder
B.Flip Flop
C.Encoder
D.Register

92. The address in the main memory is known as


A.Physical address
B.Logical address
C.Memory address
D.MAC address

93. Content of the program counter is added to the address part of the


instruction in order to obtain the effective address is called ___
A.Index addressing mode
B.Register mode
C.Relative address mode
D.Implied mode

94. A register capable of shifting its binary information either to the right
or the left is called a ___
A.Parallel register
B.Serial register
C.Shift register
D.Storage register

95. According to the given language, which among the following


expressions does it corresponds to? Language L={xϵ{0,1}|x is of length
4 or less}
A.(0+1+0+1+0+1+0+1)^4
B.(0+1)^4
C.(01)^4
D.(0+1+ε)^4
96. RR* can be expressed in which of the forms
A.R+
B.R-
C.R+ U R-
D.R

97. Formal definition of FA is a set of


A.{Q, S, F}{
B.Q, F, Σ}
C.{Q, F, ð
D.{Q, S, F, Σ, ð}

98. Which of the following statement is false?


A.Regular language is the subset of context sensitive language
B.Recursively enumerable language is the super set of regular language
C.Context sensitive language is a subset of context free language
D.Context free language is the subset of context sensitive language

99. Which among the following cannot be accepted by a regular


grammar?
A.L is a set of numbers divisible by 2
B.L is a set of binary complement
C.L is a set of string with odd number of 0
D.L is a set of 0^n 1^n

100. Which of the following is prediction problem?


A.Price of computer for the coming one year
B.Whether a certain customer will buy a product or not
C.Characterizing discovering customer segments of potential market.
D.None
Copyright ©2023 Mekdela Amba University Online Exam Portal. Mekdela Amba University | . .

You might also like