You are on page 1of 4

COMPUTING/TECHNOLOGY COLLEGE

NATIONAL EXIT EXAM WORK SHEET


Term VI
October 26, 2022
References:
Name: Dr. Hayilum Tsimotiwos (Assistant Professor) in IT
Occupation: Technology College Information Technology Instructor
Organization: AAU
E-mail Address: hailutswos@yaho.com

Name: Enyew Mihiretu (Msc in Information Technology)


Occupation: Lecturer
Organization: MTU
E-mail Address: mirenyi2011@yaho.com

Name: Dr. Tibebu Gedefaw, Assistance Professor


Occupation: College of Technology Software Engineering Instructor
Organization: DU
E-mail Address: gediftebe2010@gmail.com

NB:
 The question term was late due to Grade 12 entrance exam time.
 The answer and top 10 student list for each term to be attach/send after a 1 month (Four terms
together once)

National Exit Exam Work sheet 6 Page 1


Choose the best answer from the given alternatives
1. __ is a computer crime in which criminal breaks into a computer system for exploring details of information
etc.
A) Hacking B) Spoofing C) Eavesdropping D) Phishing
2. Which one of the following is a correct variable declaration with initialization in any high level programming
language?
A) int 123abc=21; B) float while=12.5; C) char mark=’A’; D) double mark=”Abebe”;
3. All are a correct statement, but not________.
A) OSI stands for Open System Interconnection
B) The upper layer of the OSI model mainly implemented only on the hardware.
C) OSI is a reference model for how applications communicate over a network.
D) The lower layer of the OSI model deals with the data transport issues.
4. Which one of the following OOP types of variable are variable that holds data(value) that will be shared
among all instances of a class with a static modifier?
A) Instance variable B) Local variable C) Class variable D) Global variable
5. Firewalls are to protect against:
A) Virus Attacks B) Fire Attacks C) Data Driven Attacks D) Unauthorized Attacks
6. All are correct about identifiers in programming except:
A) An identifier is the name assigned in a program B) A variable identifier is case sensitive
C) A keyword identifiers can be used, as a variable D) User defined identifiers length is unlimited
7. Which one of the following is not correct about the functions of physical layer in OSI model?
A) It defines the way how two or more devices can be connected physically.
B) It defines the transmission mode.
C) It defines the way how network devices are arranged.
D) It defines the format of the data on the network.
8. _______ is used to determine the values it may contain and the operations that may be performed on it.
A) Keyword B) Variable C) Data Type D) Identifier
9. All are the correct statements about PHP form methods Except:
A) The POST method does not have any restriction on data size to be sent.
B) GET method can't be used to send binary data, like images or word documents
C) The data sent by GET method can be accessed using QUERY_STRING
D) The POST method has restriction to send to server/ database parts up to 1024 characters only.
10. Which one of the following is an optional component of any array declaration in java?
A) Array name B) Array datatype C) Array size D) new operator
11. What is the correct output iff the value of the variable N is 6?
if(N>=1){
System.out.print(“The number”+N+”is a natural number. ”);
}
else if(N<1){
System.out.print(“The number”+N+”is a negative number. ”);
}
else if(N%2==0){
System.out.print(“The number”+N+”is an even number. ”);
}
else{
System.out.print(“The number is 0.”);
}
A) The number 6 is a natural number. The number 6 is an even number
B) The number 6 is an even number C) The number 6 is a negative number
D) None

National Exit Exam Work sheet 6 Page 2


12. A Proxy server is used for which of the following?
A) To provide security against unauthorized users B) To process client requests for web pages
C) To process client requests for database access D) To provide TCP/IP
13. Which one of the following types of operator is used to declare decision statements more?
A) Logical operators B) Conditional operators C) Typecasting operators D) Bitwise operators
14. All are the basic functions of data link layer Except:
A) Line Configuration B) Flow control C) Physical Addressing D) Access control
15. Which one of the following OOP feature is more applicable to determine classes and its members?
A) Encapsulation B) Inheritance C) Abstraction D) Polymorphism
public static void main(String[] args) {
// statements
}
16. From the above function declaration which keyword indicates that the method a min is a class method not
an instance or local methods?
A) public B) static C) void D) String[]args
17. Passwords enable users to:
A) get into the system quickly B) make efficient use of time
C) retain confidentiality of files D) simplify file structures
18. Which OSI layer can be termed as an end-to-end layer as it provides a point-to-point connection between
source and destination to deliver the data reliably?
A) Session layer B) Transport layer C) Network layer D) Physical layer
19. Which one of the following is not a correct statement in java?
A) A final class cannot have any subclass B) If methods declared as final cannot override.
C) If class declared as final cannot be inherit. D) Final keyword prevents overloading.
20. Which one of the following java keyword used to avoid naming conflicts in the method/constructor of your
instance/ object?
A) super B) this C) thrown D) final
21. Which one of the following computer security threat is a software program that can copy itself from one
computer to another, without human interaction and that will use up your computer hard disk space by
replicate in great volume and with great speed?
A) Virus B) Phishing C) Worm D) Denial of Service
22. Which one of the following is not correct about interface in java?
A) An interface can extend and implement any interface.
B) Implements keyword is used by classes to implement an interface.
C) Interface cannot be declared as private, protected or transient.
D) All the interface methods are by default abstract and public.
23. ____________ is a type of OSI model layer which is basically used to determines the best path to move data
from source to the destination based on the network conditions, the priority of service, and other factors.
A) Session layer B) Transport layer C) Network layer D) Physical layer
24. Trojan-Horse programs
A) are legitimate programs that allow unauthorized access
B) are hacker programs that do not show up on the system
C) really do not usually work D) usually are immediately discovered
25. The main functions of a session layer is synchronization by adding a checkpoint during data transmission for
retransmission purpose iff the error is occur during transmission.
A) True B) False
26. Which one of the following is a correct variable declaration with initialization in PHP?
A) $num=90; B) int num=90; C) num=90; D) $int num=90;
27. All of the following are examples of real security and privacy risks EXCEPT:
A) Hackers B) Spam C) Viruses D) Identity theft

National Exit Exam Work sheet 6 Page 3


28. Which one of the following is not a correct statement?
A) A Presentation layer is mainly concerned with the syntax and semantics of the information.
B) A Presentation layer acts as a data translator for a network.
C) A Presentation layer acts as a dialog controller that creates a dialog between two processes.
D) A Presentation layer converts the data from one format to another format.
29. Which one of the following loop parameter can be used to evaluate the iterations of the execution in PHP?
A) Initialization B) Condition C) Increment D) Decrement
30. Computer security is basically considers in three basic areas; such as:
A) Correctness, Information and Availability B) Accessibility, Authentication and Authorization
C) Confidentiality, Availability and Integrity D) Accessibility, Confidentiality and Correctness

National Exit Exam Work sheet 6 Page 4

You might also like