You are on page 1of 26

Capacity to change the internal schema without having to change the conceptual (or

external) schemas is ____________________.


Logical data implementation
Internal data implementation
Physical data implementation
Not given

In which normal form should a table not have any transitive dependencies?
First normal form (1NF)
Third normal form (3NF)
Second normal form (2NF)
Fourth normal form (4NF)

If no multivalued attributes exist and no partial dependencies exist in a relation, then the relation is in
what normal form.
First normal form
Third normal form
Second normal form
Fourth normal form

The DROP TABLE statement:


Deletes the table structure only.
Deletes the table structure along with the table data.
works whether or not referential integrity constraints would be violated.
Is not an SQL statement?

If we want to retain all duplicate records, we must write _________________ in place of Union.
Union All
Union Some
Intersect All
Intersect Some

Select * from Student where SName= “Teden”;


In the given SQL query, there is an error. Identify the error
SName
Student D.
“Teden”
from

Two relations R1 and R2 are said to be Type Compatible


If the operand relations R1 and R2 have the same number of attributes
If the domains of corresponding attributes must be compatible
If the two relation R1 and R2 have the same name
A and B

A functional dependency between non-primary key attributes is called


____________________________.

Data Dependency
Full Dependency
Partial Dependency:
Transitive Dependency

______________ join is along with tuples that satisfy the matching criteria, italso includes some or all
tuples that do not match the criteria

Outer join
Inner join
Tuples join
None

Which order can be said valid in Database designing process.


Logical design → Conceptual Design → Requirement Analysis → Physical design
Conceptual design → Requirement analysis → Physical Design → Logical design
Requirement analysis → Conceptual design → Logical design → Physical Design
Requirement analysis → Logical design → Conceptual design → Physical Design
Which of the four cardinalities describe the idea that one instance of an entity A is associated with one,
zero or many instances of another entity B, and vice versa?
One to one
One to many
Many to many
Many to one

If an attribute value does not appear in the corresponding domain or is not of the appropriate data type,
then which constraint is violated?

Key constraint
Referential integrity constraint
Domain constraint
All

Which relational algebra is used to select the common rows (tuples) from two tables
(relations)?

Project
Rename
Union
Intersection

Which one of the following properties of a transaction states that all operations of a transaction must
be executed entirely; otherwise, the transaction will be aborted?

Atomicity
Consistency
Isolation
Durability

__________________ requires a transaction to lock all the items it accesses before the transaction
begins execution, by predeclaring its read-set and write-set.

Strict 2PL
Conservative 2-PL
Rigorous 2-PL
Exclusive Lock

Lock that allows concurrent transactions to access different rows of the same table is known as
a_________________

Database-level lock
Row-level lock
Table-level lock
Page-level lock

A system is in a ______ state if there exists a set of transactions such that every transaction in the set is
waiting for another transaction in the set.

Active
Partially Committed
Deadlock
Committed

Consider the following three schedules of T1, T2, and T3;


‐ Schedule 1 : r2(A); w2(A) ; r3(C) ; w2(B) ; w3(A) ; w3(C) ; r1(A) ; r1(B) ; w1(A) ;
w1(B).
‐ Schedule 2: r3(C) ; r2(A) ; w2(A) ; w2(B) ; w3(A) ; r1(A) ; r1(B) ; w1(A) ; w1(B) ;
w3(C).
‐ Schedule 3: r2(A) ; r3(C) ; w3(A) ; w2(A) ; w2(B) ; w3(C) ; r1(A) ; r1(B) ; w1(A) ;
w1(B).
Q. Which one of the following statements is true?
Schedule 1, Schedule 2, and Schedule 3 are all conflict equivalent to each other.
No two of the given schedules are conflict equivalent to each other.
Schedule 2 is conflict equivalent to Schedule 3, but not with schedule 1.
None of the above.

When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a
timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This
is_________________

Wait-die
Wait-wound
Wound-wait
None of the Above

Consider the following transaction involving two bank account X and Y: read(X); X=X-50; write(X);
read(Y); Y=Y+50; write(Y); the constraint that the sum of account X and Y should remain the same
is

Durability
Isolation
Consistency
Atomicity

Given the following two schedules:


Schedule 1: r1(X); r3(Y); r3(X); r2(Y); r2(Z); w3(Y); w2(Z); r1(Z); w1(X); w1(Z);
Schedule 2: r1(X); r3(Y); r2(Y); r3(X); r1(Z); r2(Z); w3(Y); w1(X); w2(Z); w1(Z);
Which of the following statement is true about the above schedules?

Only schedule 1 is conflict serializable schedule


Only schedule 2 is conflict serializable schedule
Both schedules are conflict serializable schedules
Both schedules are not conflict serializable schedules

To satisfy user information need the developed information retrieval system should

AIncrease the recall of the system without affecting the precision of the system.
Decrease the precision of the system without affecting the recall of the system
Increase the precision of the system without affecting the recall of the system
Decrease the recall of the system without affecting the precision of the system

What is true about the tf and idf values of misspelled words like “infromation” and “retreival”?

They have low tf and low idf values.


They have low tf and high idf values.
They have high tf and low idf values.
They have high tf and high idf values.

One of the following is correct

Indexing is used to speed up access to desired information from document collection


as per users query
An index file consists of records, called index entries
Index files are much larger than the original file
All except “C”

Consider the following documents, and find the relevant documents retrieved by the
Boolean model. Suppose user query is: Q = data ˄ (sets˅ analysis).
Doc1: Data analysis deals with data sets
Doc2: Data mining in various fields
Doc3: Data analysis techniques and algorithms
Doc4: Data sets with temporal attributes
Doc1,Doc3, Doc4
Doc1, Doc4
Doc1
Doc1, Doc2,Doc3,Doc4

The formula used to estimate the vocabulary size of a collection is known as:

Zipf's law
Luhn’s idea
Heap's law
Compression ratio

One of the following Multimedia Hardwares’are often under direct control by a human user and they
communicate commands regularly.

Output devices
Input devices
Connecting Devices
Storage devices

Which of the following data compression methods is Lossy compression?

Vector Quantisation
Discrete Cosine Transform
Huffman Coding
Transform Coding
What is a measure of the limit of lossless compression?

Prefix Code
Codeword
Average Bit length
Entropy

Which optical storage device stores multimedia data by means of pressing?

CD-R
DVD-R
CD-RW
CD-ROM

Which part of the file contents of multimedia database is used as indices for searching purpose value?

Media data
Media format data
Media feature data
All of the Above

One of the following multimedia data types is not Static media.

Text Multimedia
Graphic Multimedia
Animation Multimedia
All of the Above

Which database is used to optimize and build a virtualized environment for housing multimedia
data?
MongoDB
MySQL DB
PostgreSQL
Oracle DB

A 16-bit image with resolution 512*1024 needs a storage space is_____KB?

1KB
1024KB
6000KB
512KB

Which of the following statement is FALSE?

Bitmapped images are known as paint graphics


Bitmap images can be inserted by using capturing camera device
Bitmap images can be created geometric objects and using software
All of the above

Which one of the following Image File Formats supports 8 bits, 16-, and 24-bit colors?

GIF
PNG
JPEG
TIFF

A small business requires a network that provides connectivity between two buildings located in
different cities. Which of the following network types is the best fit for this requirement?

LAN
WAN
MAN
VPN

Which of the following protocols operates at the transport layer of the OSI model?

HTTP
SMTP
FTP
TCP
A company is considering different types of cables for its network infrastructure. They want to choose
a cable that can handle high speeds over long distances with minimal interference. Which type of cable
should they choose?

Twisted pair cable


Fiber optic cable
Coaxial cable
Shielded twisted pair cable

A small business has recently expanded its operations and now has two separate locations that need to
be connected. They are considering two different network topologies to link the two locations: a star
topology and a mesh topology. Which of the following is an advantage of using a mesh topology in
this scenario?

Easy to install and configure


Cost-effective for small businesses
High reliability and fault tolerance
Requires less cabling than a star topology

A company has a local area network (LAN) that uses Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol. What happens when two devices on the network transmit data
simultaneously?

Both devices stop transmitting and wait for a random amount of time before trying again.
The device with the stronger signal continues transmitting, while the other device stops.
Both devices continue transmitting simultaneously, and data packets are lost.
Both devices continue transmitting simultaneously, and the data packets are re-transmitted
automatically.

A group of friends is having a conversation over a walkie-talkie. Only one person can speak at a time,
and the others have to wait for their turn. Which type of communication mode would be most suitable
for them?

Simplex
Half duplex
Full duplex
All of the above
A company has a web server and wants to ensure that all traffic to and from the server is encrypted.
Which protocol would be most suitable for this task?

HTTP
HTTPS
FTP
Telnet

At which layer of the OSI reference model would switches and bridges operate?

Application layer
Transport layer
Network layer
Data link layer
Physical layer

Which type of multiplexing is used in digital subscriber line (DSL) technology to transmit data over
existing telephone lines?

FDM
QAM
TDM
CDM

What is the purpose of a default gateway?

To provide access to devices on the same network.


To provide access to devices on a different network.
To provide access to the internet.
None of the above.

You have a network with the IP address 10.0.0.0/8. You need to create 5 subnets with 40 hosts each.
What is the subnet mask that you should use?

/28
/30
/27
None

If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the
valid subnet address of this host?
A
172.16.112.0
172.16.0.0
172.16.96.0
172.16.255.0

The network address of 172.16.0.0/19 provides how many subnets and hosts?

7 subnets, 30 hosts each


8 subnets, 8,190 hosts each
8 subnets, 2,046 hosts each
7 subnets, 2,046 hosts each

A company's server was breached, and customer data was stolen. What is the company's legal
obligation?

None
Deny responsibility
Notify affected customers
Pay a fine

An employee connects a personal device to the company network. What is the most
significant security risk?

Physical theft of the device


Malware on the device
Password compromise
Network bandwidth usage
A company's website was defaced by a hacker. What type of attack did the company experience?

DoS (Denial of Service)


Phishing
Injection
Defacement

What is the difference between a vulnerability and a threat?

A vulnerability is a potential security weakness, while a threat is a malicious action that exploits
that weakness.
A vulnerability is a malicious action that exploits a security weakness, while a threat is a potential
security weakness.
A vulnerability and a threat are the same thing.
A vulnerability is a type of malware, while a threat is a type of social engineering attack.

What is the purpose of a security policy?

To prevent malware infections


To control access to resources based on user permissions
To establish guidelines and rules for information security
To monitor network traffic

Which of the following is an example of a social engineering attack?

Brute force attack


Phishing
Denial of service attack
SQL injection
What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses one key for both encryption and decryption, while asymmetric
encryption uses two different keys.
Symmetric encryption uses two different keys for encryption and decryption, while asymmetric
encryption uses one key.
Symmetric encryption is faster than asymmetric encryption.
Asymmetric encryption is more secure than symmetric encryption.

Which of the following is an example of a physical security measure?

Two-factor authentication
Firewall
Encryption
Security cameras

What is the purpose of an artificial intelligence model?

To train computers to learn from data and make predictions or decisions


To automate tasks and processes without human intervention
To create realistic 3D models for virtual environments
To simulate human-like emotions and consciousness

Rationality of an intelligent agent can be judged on the basis of following except__________

Architecture
Performance
Current data/ testing data
Environment

Which one is not the limitation of Propositional Logic in logical representation of knowledge?

Expressive power
Handling domain with small words
Defining declarative statements
Representation of relations such as “all”, “some” and “none”
In the course of mapping human thinking to artificial intelligence components, in which stage
reasoning and thinking process done?
Interpretation layer
Interacting layer
Sensing layer
Application layer

______________is knowledge about how things happen in the world.

Internal state
Model
Goal
Intelligence

Which level of artificial intelligence has the ability to solve the problem related to world hunger and
dangerous environmental change?

Artificial general intelligence


Artificial super intelligence
Self-aware systems
Singularity and Transcendence

Which of the following statements about Naive Bayes is incorrect?

Attributes are equally important.


Attributes are statistically dependent of one another given the class value.
Attributes are statistically independent of one another given the class value.
Attributes can be nominal or numeric

Suppose we would like to perform clustering on spatial data such as the geometrical locations of
houses. We wish to produce clusters of many different sizes and shapes. Which of the following
methods is the most appropriate?

Decision Trees
Density-based clustering
Model-based clustering
K-means clustering

Choose the correct option from the following.

When working with a small dataset, one should prefer low bias/high variance classifiers over high
bias/low variance classifiers.
When working with a small dataset, one should prefer high bias/high variance classifiers over low
bias/high variance classifiers.
When working with a large dataset, one should prefer high bias/low variance classifiers over low
bias/high variance classifiers.
When working with a large dataset, one should prefer low bias/high variance classifiers over high
bias/low variance classifiers.

You trained a binary classifier model which gives very high accuracy on the training data, but much
lower accuracy on validation data. Which of the following may be Not true?

This is an instance of overfitting.


This is an instance of underfitting.
The training was not well regularized.
The training and testing examples are sampled from different distributions.

What is deep learning?

A type of machine learning that uses artificial neural networks with multiple layers
A type of unsupervised learning algorithm
A type of reinforcement learning algorithm
A type of rule-based system for decision making

What is the difference between supervised and unsupervised learning in machine learning?

Supervised learning requires labeled data, while unsupervised learning does not.
Unsupervised learning requires labeled data, while supervised learning does not.
Supervised and unsupervised learning are the same thing.
Supervised and unsupervised learning are not used in machine learning.
What is the purpose of a knowledge audit?

To assess an organization's knowledge assets and identify knowledge gaps.


To evaluate the effectiveness of knowledge management systems and tools.
To identify the different types of knowledge and how they can be managed.
D. To provide a framework for creating a knowledge-sharing culture in organizations.

Which one of the following paradigms that helps to represent knowledge?

Objects.
Predicates.
Associative networks.
All

Which one of the following is most likely differ from the others?

Expert systems.
Help desk systems.
Web application.
Decision-support systems.

Which of the following is true regarding syntactic and semantic analysis in programming languages?

Syntactic rule is done at compile-time, while semantic analysis is done at run-time.


Syntactic rule is done at run-time, while semantic analysis is done at compile-time.
Both syntactic and semantic analysis are done at compile-time.
Both syntactic and semantic analysis are done at run-time.

Which phase of the C++ compilation process converts the source code into an object file?

Preprocessing
Compilation
Assembly
Linking

What is the difference between source code and object code in C++?

Source code is written in machine language, while object code is written in high-level language.
Source code is the human-readable code written by the programmer, while object code is the
machine-readable binary code.
Source code is the compiled code, while object code is the interpreted code.
Source code is the code written by the compiler, while object code is the code written by the
linker.

What is the syntax for passing an array to a function in C++?

functionName(array)
functionName(*array)
functionName(&array)
functionName(array[])

What is the first index of an array in C++?

0
1
-1
2

What is the result of concatenating two C++ strings using the '+' operator?

A new string with the two original strings separated by a space


An error because the '+' operator cannot be used with strings
A new string with the characters of the original strings appended to each other
A new string with the characters of the original strings multiplied by each other

What is the size of a char variable in C++?

1 byte
4 bytes
2 bytes
It varies depending on the platform
Which of the following functions allows us to read a text that contains a space?
cin>>
cin.get>>
cin.get()
All

What is the purpose of the <!DOCTYPE> declaration in HTML?

It defines the document type and version of HTML.


It sets the background color of the webpage.
It specifies the page title.
It adds a comment to the HTML code.

What is the purpose of the type of operator in JavaScript?

To check the type of a variable or expression


To create a new object
To execute a function
To declare a new variable

What is the purpose of the console.log() function in JavaScript?

To display a message on the webpage


To prompt the user for input
To write output to the console
To perform mathematical calculations

What is the purpose of an event handler in JavaScript?

To define a new function


To execute a function when an event occurs
To declare a variable
To define a loop

Which HTML tag is used to insert an image on webpage?

<img url=”haramaya.jpg” />


<img alt=”Haramaya.png” />
<img src=”Haramaya.jpeg” />
<img link=”CCI.jpg” />

Which of the following is the correct syntax to make the background-color of all
paragraph elements black?

p {background-color : black;}
p {background-color : #black;}
all {background-color : yellow;}
all p {background-color : #black;}

Which one of the following is the correct an ordered list with the count of numeric value
3?

<ol type=”1” initial =”3”>


<ol type=”I” begin =”3”>
<ol type=”A” number =”3”>
<ol type="C" start "3">

One is the method of File class

canRead()
canWrite()
getName()
All

If we have vechile and car classes,then which one is true about polymorphism concept?

Car c = new Car()


Car c = new Vechile()
Vechile v = new Car()
A and C

Which order of execution is correct during for loop?

Initialization=>condition=>execution=>iteration
Initialization=> execution => condition =>iteration
Initialization=> iteration => condition =>execution
None

One of your project stakeholders has a high amount of authority and a high amount of interest. How
should you manage that relationship?

Keep informed
Keep satisfied
Manage closely
Monitor

Which of the following is not a recommendation for improving project communications?

You cannot over communicate.


Project managers and their teams should take time to develop their communications skills.
Do not use facilitators or experts outside of the project team to communicate important
information.
Use templates to help prepare project documents.

A ____________ report is a reflective statement that documents important information learned from
working on the project.

kanban
lessons-learned
project archive
progress

.A staffing management plan often includes a resource____________, which is a column chart that
shows the number of resources assigned to the project over time.

chart
graph
histogram
timeline

Your project team has decided not to use an upcoming release of software because it might cause your
schedule to slip. Which negative risk response strategy are you using?
Avoidance
Acceptance
Transference
Mitigation

Your project involves using a new release of a common software application, but if that
release is not available, your team has_____________ plans to use the current release.

Contingency
Fallback
Reserve
Mitigation

Several application development projects done for the same functional group might best be managed
as part of a ____________.

Portfolio
Program
Investment
Collaborative

Project management software helps you develop a ____________, which serves as a basis for creating
Gantt charts, assigning resources, and allocating cost

Project plan
Schedule
WBS
Deliverable

Why is business process considered as integrated end to end department and business
unit?

To enable as different units can communicate with each other


To enable as the goal of the organization is achieved
To enable as information can be shared within the departments
All
A combination of a company's internal operations - divisions and partners which connects them all in
real-time is__________________

Business process
Business integration
Business function
Business operation

The following can be the reasons for the growth of ERP. ERP___________

Eliminates limitations in the legacy systems


Packages available for all organizations of all sizes.
Provides flexible, integrated, real-time decision support
All

The people who have developed ERP packages by investing huge amount of time and effort in
research and development to create the packaged solutions are _________

Actors
Stakeholders
Vendors
Shareholders

Regarding maintenance tasks, which could not be the duty of the support team?

Service packs
Payment runs
Problem solving
None

In Lewin’s Change Management Model _________________________ is a stage where the change


process takes place.

Unfreeze stage
Change stage
Refreeze stage
All
Why organizational change?

For employee's demotion


For greater employee satisfaction.
For satisfaction of its competent organizations
All

Decision making is not always work because of:

Information quality
Management filters
Organizational inertia
Varied and complex task.
None

Which one is not critical drivers of collaboration:

Communication
Content management
Workflow control
Data-driven

Which one is not critical drivers of collaboration:

Communication
Content management
Workflow control
Data-driven

Which of the following is not true about competitive force model?

Buyers have greater bargaining power when their numbers are small but the amount of substitute
products is high.
Buyers have less bargaining power when they buy in small amounts and have few alternative
product options
The more suppliers with quality products, the easier it is to gain great discounts
Fewer suppliers have more control and can quickly decrease the prices of their commodities.
_________is the type of information system that used at tactical level.

Transaction processing systems


Process control systems
Decision support systems
Management Information systems

Suppose the bargaining power of buyers in the airline industry is high and few consumers, then which
one is true?

Consumers have greater power


Consumers can easily switch from one seller to another.
Customers have the power to exert pressure on airline industry for better deals of quality.
Customers have the power to exert pressure to lower prices.

Suppose the bargaining power of buyers in the airline industry is high and few consumers, then which
one is true?

Consumers have greater power


Consumers can easily switch from one seller to another.
Customers have the power to exert pressure on airline industry for better deals of quality.
Customers have the power to exert pressure to lower prices.
All

Which of the following are the common factors for the Failures of MIS?

Not given adequate attention to the quality control aspects of the inputs, the process
and the outputs MIS.
MIS is developed without streamlining the transaction processing systems in the
organization.
Lack of training and user-friendly system and the dependence on the system
personnel.
All

Why Management Information Systems provide timely, integrated, relevant, accurate, and useful
information for manager of organization?

For Business Processes


For decision-making purposes
For improve Business operation
None

ne is not element of collaboration diagram

Object
Message
Event
Association

One is not used as a technique for object-oriented analysis

Object modeling
Sequence diagram
Class diagram
None

Which one is true?

Essential user interface prototype is an abstract and paper-based prototype


User interface class provides people, to access your system.
Use case testing helps to identify gaps in software application.
All

If we have Teacher and Student tables, then which one is true to make persistent database model
between the two tables?

Each table should have foreign key


The primary key of teacher table should be used as a foreign key for student table
No need of foreign key for creating persistent database model
None

In which model that problem formulated, user requirements identified, and the model
built based upon real world objects.
Object design
Object oriented analysis
Object oriented implementation
None
Which one is true about interface?

It is a collection of operations
It can extend another interface
If class C implements interface I, then class C should implement all operations of I.
All

You might also like