Professional Documents
Culture Documents
Q1:
A- Choose the correct answer of the following:- ( 10 Marks)
1- Which of the following is not a Capabilities of Expert Systems?
A) Advising
B) Demonstrating
C) Explaining
D) Expanding
2- What is abductive reasoning?
A) Trying to reason with an abductor.
B) Reasoning by trying to abduct someone's thoughts.
C) A logical process in which a conclusion is based on the concordance of
multiple premises that are generally assumed to be true.
D) A process whereby the researcher selects the 'best' explanation from
competing explanations or interpretations of the data
3- When will the Hill-Climbing algorithm terminate?
A) Stopping criterion met
B) Global Min/Max is achieved
C) No neighbor has a higher value
D) All of these
1
6- Breadth First Search is equivalent to which of the traversal in the Binary
Trees?
A) Pre-order Traversal
B) Post-order Traversal
C) Level-order Traversal
D) In-order Traversal
10- In feature maps, when weights are updated for winning unit and its
neighbor, which type learning it is known as?
A) Karnaugt learning
B) Boltzman learning
C) Kohonen’s learning
D) None of the mentioned
2
Web Design
Q2:
A- Choose the correct answer of the following:- ( 10 Marks)
1- HTML uses
a. User defined tags b. Pre-specified tags
c. Fixed tags defined by the language d. Tags only for linking
2- How can you make a bulleted list with numbers?
a. <dl> b. <ol> c. <list> d. <ul> (<ol>)
3- A tag used as an alternative to make text bold is
a.<bold> b. <double> c. <strong> d. <dark>
4- In order to define a style for special type of elements, attribute to be
added is known to be
a. <class> b. <body> c. <head> d. <id>
5- CSS file is saved with extension
a. .cs b.css c .html d .htm
6- For highlight text, HTML uses element said to be
a. <em> b. <imp> c. <mark> d. <highlight>
8- What color will paragraphs be when this embedded style sheet is applied
to a document? Why?
a. <style type="text/css">
b. p { color: purple; }
c. p { color: green; }
d. p { color: gray; }
e. </style>
3
9. How do we write comments in HTML5?
a. <!……>
b. <…….!>
c. </…….>
d. </……/>
4
Communication Networks
Q3:
A- Choose the correct answer of the following:- ( 10 Marks)
1. 100BASE-FX uses fiber cabling and supports full duplex up to a distance of
________ meters?
a. 100
b. 1000
c. 200
d. 2000
2. What is the valid host range for the subnet 154.65.128.0 255.255.248.0?
a. 154.65.128.1–154.65.128.255
b. 154.65.128.1–154.65.135.254
c. 154.65.120.1–154.65.135.255
d. 154.65.0.0–154.65.255.254
4. During data transfer, what is the receiving host responsible for? (Choose
the best two answers)
a. Encapsulation
b. Bandwidth
c. Segmentation
d. Acknowledgment
e. Reassembly
5
7. Select three pieces of information about a route that a routing table
contains.
a. next - hop
b. source address
c. metric
d. destination network address
e. last hop
f. default gateway
9. A host in the south branch cannot access the server with address
192.168.254.222 /234. While examining the host, you determine that its
IPv4 address is 169.254.11.15 /16. What is the apparent problem?
a. The host is using a link local address
b. The server is using an invalid subnet mask
c. The host has been assigned a broadcast address
d. The server thinks that the host is on the logical network with the
server
6
B- Answer the following:- (6 Marks)
2) Name and state the purpose of the three types of IPv4 addresses.
3) Classify the following protocol with their uses in each layer in the TCP/IP
reference model
TCP, IP, HTTP, UDP, ETHERNET, ICMP, FTP, TELNET, SMTP, DHCP
Layer Protocols
.
.
.
7
Object Orient Language
Q4:
A- Choose the correct answer of the following:- ( 12 Marks)
4. The private members of the base class are visible in derived class but are
not accessible directly.
a) True
b) False
5. If a class inheriting an abstract class does not define all of its function then it
will be known as?
a) Abstract
b) A simple class
c) Static class
d) None of the mentioned
8
6. Which of these is not a correct statement?
a) Every class containing abstract method must be declared abstract
b) Abstract class defines only the structure of the class not its
implementation
c) Abstract class can be initiated by new operator
d) Abstract class can be inherited
7. What is the process of defining a method in a subclass having same name &
type signature as a method in its superclass?
a) Method overloading
b) Method overriding
c) Method hiding
d) None of the mentioned
10. If same message is passed to objects of several different classes and all of
those can respond in a different way, what is this feature called?
a) Inheritance
b) Overloading
c) Polymorphism
d) Overriding
9
11. Which among the following can’t be used for polymorphism?
a) Static member functions
b) Member functions overloading
c) Predefined operator overloading
d) Constructor overloading
12. Which problem may arise if we use abstract class functions for
polymorphism?
a) All classes are converted as abstract class
b) Derived class must be of abstract type
c) All the derived classes must implement the undefined functions
d) Derived classes can’t redefine the function
10
Data Security
Q5:
A- Choose the correct answer of the following:- ( 10 Marks)
1. Euler function (9) is …………
A) 3 B) 4 C) 5 D) 6
5. Perfect security:…………………..
a) Can be broken. b) Reveals nothing about plaintext.
c) Unconditional security. d) Computational security.
11
8. In CBC encryption mode:
a) Identical blocks give same result. b) Parallel encryption.
c) No need. d) No one.
10. key ………………….. technique, a term that refers to the means of delivering
a key to two parties who wish to exchange data, without allowing others to see
the key.
a) distribution. b) management. c) legitimacy. d) expansion.
12
Operating System
Q6:
A- Choose the correct answer of the following:- ( 10 Marks)
1. Which of the following is a condition that causes deadlock?
a. Mutual exclusion
b. Hold and wait
c. Circular wait
d. No preemption
e. All of these
a. To prevent deadlock
b. To deadlock recovery
c. To solve the deadlock
d. None of these
a. Decreases b- Increases
c- Remains constant d-None of these
13
6. Which of the following page replacement algorithms suffers from
Belady’s anomaly?
a. FIFO
b. LRU
c. Optimal Page
d. Both LRU and FIFO
a. power failure
b. lack of paper in printer
c. connection failure in the network
d. all of the mentioned
a. Timer interrupt
b. Device
c. Power failure
d. Scheduler process
14
B- Answer the following:- (6 Marks)
1. Explain the process of starvation and how aging can be used to prevent it.
2. What three conditions must be satisfied in order to solve the critical section
problem?
15