You are on page 1of 15

Artificial Intelligence

Q1:
A- Choose the correct answer of the following:- ( 10 Marks)
1- Which of the following is not a Capabilities of Expert Systems?
A) Advising
B) Demonstrating
C) Explaining
D) Expanding
2- What is abductive reasoning?
A) Trying to reason with an abductor.
B) Reasoning by trying to abduct someone's thoughts.
C) A logical process in which a conclusion is based on the concordance of
multiple premises that are generally assumed to be true.
D) A process whereby the researcher selects the 'best' explanation from
competing explanations or interpretations of the data
3- When will the Hill-Climbing algorithm terminate?
A) Stopping criterion met
B) Global Min/Max is achieved
C) No neighbor has a higher value
D) All of these

4- The knowledge representation models are based on in which of the


A) Logic and Rules only
B) Rules and Frames only
C) Logic and Frames only
D) Logic, Rules and Frames
E) None of these

5- What is the logical translation of the following statement? "None of my


friends are perfect."
A) ∃x(F(x)∧¬P(x))
B) ∃x(¬F(x)∧P(x))
C) ∃x(¬F(x)∧¬P(x))
D) ¬∃x(F(x)∧P(x))

1
6- Breadth First Search is equivalent to which of the traversal in the Binary
Trees?
A) Pre-order Traversal
B) Post-order Traversal
C) Level-order Traversal
D) In-order Traversal

7- Fuzzy logic is usually represented as ___________


A) IF-THEN-ELSE rules
B) IF-THEN rules
C) Both a & b
D) None of the mentioned

8- How many types of random variables are there in Fuzzy logic?


A) 2 B) 4 C) 1 D) 3

9- The main operators of the genetic algorithms are:


A) Initialization and evaluation
B) Reproduction, crossover, and mutation.
C) Selection and reproduction
D) 1X, 2X, and UX

10- In feature maps, when weights are updated for winning unit and its
neighbor, which type learning it is known as?
A) Karnaugt learning
B) Boltzman learning
C) Kohonen’s learning
D) None of the mentioned

B- Answer the following:- (6 Marks)


1) What is the basic idea of genetic algorithms? Describe briefly.

2) What are the applications of fuzzy logic?

3) What are the disadvantages of A* algorithm

2
Web Design
Q2:
A- Choose the correct answer of the following:- ( 10 Marks)

1- HTML uses
a. User defined tags b. Pre-specified tags
c. Fixed tags defined by the language d. Tags only for linking
2- How can you make a bulleted list with numbers?
a. <dl> b. <ol> c. <list> d. <ul> (<ol>)
3- A tag used as an alternative to make text bold is
a.<bold> b. <double> c. <strong> d. <dark>
4- In order to define a style for special type of elements, attribute to be
added is known to be
a. <class> b. <body> c. <head> d. <id>
5- CSS file is saved with extension
a. .cs b.css c .html d .htm
6- For highlight text, HTML uses element said to be
a. <em> b. <imp> c. <mark> d. <highlight>

7- How many levels of headings HTML has?


a. 6
b. 3
c. 7
d. 2

8- What color will paragraphs be when this embedded style sheet is applied
to a document? Why?
a. <style type="text/css">
b. p { color: purple; }
c. p { color: green; }
d. p { color: gray; }
e. </style>

3
9. How do we write comments in HTML5?
a. <!……>
b. <…….!>
c. </…….>
d. </……/>

10. Which one is correct syntax?


a. <p id=”1td”>
b. <p id=”td”>
c. <p id=”%td”>
d. <p id=”#td”>

B- Answer the following:- (6 Marks)


1) which parts of php are case sensitive and which are not?

2) If a form has to offer three choices to a user, each of which is mutually


exclusive so that only one of the three can be selected, which input type
would you use, given a choice between checkboxes and radio buttons.

3) In PHP, What is the difference between for each and each?

4
Communication Networks
Q3:
A- Choose the correct answer of the following:- ( 10 Marks)
1. 100BASE-FX uses fiber cabling and supports full duplex up to a distance of
________ meters?
a. 100
b. 1000
c. 200
d. 2000

2. What is the valid host range for the subnet 154.65.128.0 255.255.248.0?
a. 154.65.128.1–154.65.128.255
b. 154.65.128.1–154.65.135.254
c. 154.65.120.1–154.65.135.255
d. 154.65.0.0–154.65.255.254

3. Which characteristics is part of TCP? (Choose two)


a. Reliable
b. Connectionless
c. No flow control
d. Resends anything not received

4. During data transfer, what is the receiving host responsible for? (Choose
the best two answers)
a. Encapsulation
b. Bandwidth
c. Segmentation
d. Acknowledgment
e. Reassembly

5. Why does TCP use a sequence number in the header?


a. to reassemble the segments into data
b. to identify the application layer protocol
c. to indicate the number of the next expected byte
d. to show the maximum numbers of bytes allowed during a session

6. What is the purpose of TCP/UDP port numbers?


a. to indicate the beginning of a three-way hand shake
b. to reassemble the segments into the correct order
c. to identify the number of data packets that can be sent without
acknowledgment
d. to track the different conversations crossing the network at the same
time

5
7. Select three pieces of information about a route that a routing table
contains.
a. next - hop
b. source address
c. metric
d. destination network address
e. last hop
f. default gateway

8. A network administrator is building a network for a small business that has


22 hosts. The ISP has assigned only one internet routable IP address. Which
IP address block can the network administrator use to address the
network?
a. 10.11.12.16 /28
b. 172.31.255.128 /27
c. 192.168.1.0 /28
d. 209.165.202.128 /27

9. A host in the south branch cannot access the server with address
192.168.254.222 /234. While examining the host, you determine that its
IPv4 address is 169.254.11.15 /16. What is the apparent problem?
a. The host is using a link local address
b. The server is using an invalid subnet mask
c. The host has been assigned a broadcast address
d. The server thinks that the host is on the logical network with the
server

10. Why are higher - speed Ethernet implementations more susceptible to


noise?
a. more collisions
b. shorter bit times
c. full - duplex operation
d. UTP cables are required instead of fiber

6
B- Answer the following:- (6 Marks)

1) What does segmentation provide to communications?

2) Name and state the purpose of the three types of IPv4 addresses.

3) Classify the following protocol with their uses in each layer in the TCP/IP
reference model

TCP, IP, HTTP, UDP, ETHERNET, ICMP, FTP, TELNET, SMTP, DHCP
Layer Protocols

.
.
.

7
Object Orient Language
Q4:
A- Choose the correct answer of the following:- ( 12 Marks)

1. Which among the following best describes the Inheritance?


a) Copying the code already written
b) Using the code already written once
c) Using already defined functions in programming language
d) Using the data and functions into derived segment

2. Which among the following is correct for multiple inheritance?


a) class student{public: int marks;}s; class stream{int total;}; class
topper:public student, public stream{ };
b) class student{int marks;}; class stream{ }; class topper: public student{ };
c) class student{int marks;}; class stream:public student{ };
d) class student{ }; class stream{ }; class to pper{ };

3. Which among the following is correct for hierarchical inheritance?


a) Two base classes can be used to be derived into one single class
b) Two or more classes can be derived into one class
c) One base class can be derived into other two derived classes or more
d) One base class can be derived into only 2 classes

4. The private members of the base class are visible in derived class but are
not accessible directly.
a) True
b) False

5. If a class inheriting an abstract class does not define all of its function then it
will be known as?
a) Abstract
b) A simple class
c) Static class
d) None of the mentioned

8
6. Which of these is not a correct statement?
a) Every class containing abstract method must be declared abstract
b) Abstract class defines only the structure of the class not its
implementation
c) Abstract class can be initiated by new operator
d) Abstract class can be inherited

7. What is the process of defining a method in a subclass having same name &
type signature as a method in its superclass?
a) Method overloading
b) Method overriding
c) Method hiding
d) None of the mentioned

8. Which of these is correct way of calling a constructor having no parameters,


of superclass A by subclass B?
a) super(void);
b) superclass.();
c) super.A();
d) super();

9. Which of these is supported by method overriding in Java?


a) Abstraction
b) Encapsulation
c) Polymorphism
d) None of the mentioned

10. If same message is passed to objects of several different classes and all of
those can respond in a different way, what is this feature called?
a) Inheritance
b) Overloading
c) Polymorphism
d) Overriding

9
11. Which among the following can’t be used for polymorphism?
a) Static member functions
b) Member functions overloading
c) Predefined operator overloading
d) Constructor overloading

12. Which problem may arise if we use abstract class functions for
polymorphism?
a) All classes are converted as abstract class
b) Derived class must be of abstract type
c) All the derived classes must implement the undefined functions
d) Derived classes can’t redefine the function

B-Answer the following:- (8 Marks)


1. If 2 classes derive one base class and redefine a function of base class,
also overload some operators inside class body. Among these two
things of function and operator overloading, where is polymorphism
used?

2. who to describes encapsulation?

3. What is the deferent between overriding and overloading ?

4. What happens when we access the same variable defined in two


interfaces implemented by the same class?

10
Data Security
Q5:
A- Choose the correct answer of the following:- ( 10 Marks)
1. Euler function (9) is …………
A) 3 B) 4 C) 5 D) 6

2. The periodic maximum length of LFSR is …………...


A) 2n B) 2n-1 C) 2n-1 D) 2n-1

3. --------------is a prevention of unauthorized use of a resource.


a. Data Confidentiality. b . Access Control. c. Authentication Exchange.

4. In secret key encryption, …………………


a) Suitable for work in in Internet environment.
b) Need to pre-communication to agreement on the key.
c) Each parity in a communication save secret and public keys.
d) Not all above.

5. Perfect security:…………………..
a) Can be broken. b) Reveals nothing about plaintext.
c) Unconditional security. d) Computational security.

6. 3 DES: a) Main in the middle attack. b) Use 3 different keys.


c) Better than DES. d) Slow.

7. Hill cipher encrypt "is" by key "DU DD" to:


a) sa. b) vn. c) rs. d) ua.

11
8. In CBC encryption mode:
a) Identical blocks give same result. b) Parallel encryption.
c) No need. d) No one.

9. ……………………………………….. cipher depends on repetitions in ciphertext give


clues to period.
a) Vigenere. b) Playfair. c) Caesar. d) One-time pad.

10. key ………………….. technique, a term that refers to the means of delivering
a key to two parties who wish to exchange data, without allowing others to see
the key.
a) distribution. b) management. c) legitimacy. d) expansion.

A- Answer the following:- (6 Marks)


1. List three classes of polynomial arithmetic.

2. Count the characteristics of Blowfish cipher.

3. Draw the block diagram of DES single round structure (calculation of


F(R,K)

12
Operating System
Q6:
A- Choose the correct answer of the following:- ( 10 Marks)
1. Which of the following is a condition that causes deadlock?

a. Mutual exclusion
b. Hold and wait
c. Circular wait
d. No preemption
e. All of these

2. Banker's algorithm is used?

a. To prevent deadlock
b. To deadlock recovery
c. To solve the deadlock
d. None of these

3. If the page size increases, the internal fragmentation is also….

a. Decreases b- Increases
c- Remains constant d-None of these

4. The size of virtual memory is based on which of the following?

a. CPU b- RAM c- Address bus d-Data bus

5. When does page fault occur?


a. The page is present in memory.
b. The deadlock occurs.
c. The page does not present in memory.
d. The buffering occurs

13
6. Which of the following page replacement algorithms suffers from
Belady’s anomaly?
a. FIFO
b. LRU
c. Optimal Page
d. Both LRU and FIFO

7. Which one of the following errors will be handle by the operating


system?

a. power failure
b. lack of paper in printer
c. connection failure in the network
d. all of the mentioned

8. Which of the following does not interrupt the running process?

a. Timer interrupt
b. Device
c. Power failure
d. Scheduler process

9. Increasing the RAM of a computer typically improves performance


because:
a. Virtual memory increases
b. Larger RAMs are faster
c. Fewer page faults occur
d. Fewer segmentation faults

10. Dirty bit is used to show

a. Page with corrupted data


b. Wrong page in memory
c. Page that is modified after being loaded in the cache memory
d. page that is less frequently accessed

14
B- Answer the following:- (6 Marks)
1. Explain the process of starvation and how aging can be used to prevent it.

2. What three conditions must be satisfied in order to solve the critical section
problem?

3. What is the difference between deadlock prevention and deadlock


avoidance?

15

You might also like