2015 Model Exam For Computer Science
2015 Model Exam For Computer Science
2015 Model Exam For Computer Science
me/AnyjobsEthio
DEBRE MARKOS UNIVERSTY BURIE CAMPUS DEPAREMENTS OF COMPUTER SCIENCE MODEL EXAM
1. Which one of the following are the general tasks in almost all code generators?
A) Instruction selection B) Register allocation and assignment
C) Instruction ordering D) All
2. A transaction in which either all of the database actions occur or none of them does is called
A) Atomicity B) Consistency C) Isolation D) Durability
3. The degrees of success of the agent is measured by
A) Its Perception B) Its Performance measure C) Its action D) Its prior kowled
4. Among the following one helps to resolve internet name into IP Address.
A) Domain Name System B) Address Resolution Protocol
C) User Datagram Protocol D) Transmission Control Protocol
5. You have been asked to create a subnet that supports 24 hosts. What subnet mask you use?
A) 255.255.255.224 B) 255.255.255.248
C) 255.255.255.240 D) 255.255.255.252
6. Which one of the following is the smallest meaningful sequence of characters of interest in source
program
A) Pattern B) Lexemes C) Tokens D) All
7. Assume you are asking to establish a network using 50(fifty) computers in mesh topology. How
many cables required to establish a network?
A) 2225 B) 1225 C) 1450 D) 2450
8. It is a method used to synchronize the I/O device with the microprocessor
A) Interrupt B) Handshaking C) Interface D) None
9. If database modifications occur while the transaction is still active, the transaction is said to use the
___________technique. A) Deferred-Update B) Late-modification
C) Immediate-Update D) Undo
10. The component of Expert system which provide interaction between user expert system and
Expert system
A) Kowledge base B) Inference engine
C) User interface D) Human expert
11. Which one of the following instructions is incorrect?
A) MOV AL, BP B) INC CX
C) DEC CX D) All
12. Which one of the following is incorrect about Map data structure?
A) Allow duplicate keys B) Cannot be traversed
C) Allow duplicate values D) None of the above
13. A register used to indicate the condition of the microprocessor is
A) SI B) FLAG C) DI D) EIP
14. Which one of the following instructions is correct
A) MOV DS, 20 B) MOV ES, 40 C) MOV SS, 60 D) None
15. A register used to address the next instruction in a section of memory is
A) RSP B) CS C) RIP D) SS
16. _______________is requirement elicitation techniques that is used to gather the requirements
using day-to-day working observation and notes made of the actual tasks.
A) Use case B) Ethnography C) Scenario D) Interview
17. An ER model of a database consist of entity types A and B. These are connected by the
relationship R which does not have its own attribute. Under which one of the following conditions, can
the relational table for R be merged with that of A?
A) Relationship R is one –to –many and the participation of A in R is Total.
B) Relationship R is one –to –many and the participation of A in R is Partial.
C) Relationship R is many –to –one and the participation of A in R is Total.
D) Relationship R is many –to –one and the participation of A in R is Partial.
18. Which one of the following is more related to effective management of software complexity?
A) Modularity B) Reusability C) Extensibility D) All
19. A DHCP enabled computer on the network has been unplugged from the network for a week. In
the meantime, several other computers were added to the network. When plugging the computer
back into the network the computer is unable to reach network resources. Which of the following is
the MOST likely cause?
A) the IP address lease has expired on the DHCP server.
B) the DHCP scope needs to be redefined.
C) the DHCP pool limit has been reached.
D) the DHCP server needs to be restarted.
20. Which one of the following testing required knowledge about internal structure, design and
implementation of the system?
A) Black box Testing B) White box testing
C) Alpha testing D) Beta testing
21. A TCP/IP protocol for mapping an Internet Protocol address (IP address) to a physical machine
address (MAC) that is recognized in the local network.
A) Address Resolution Protocol B) Domain Name System
C) Revers Address Resolution Protocol D) Internet Control Messaging Protocol
22. One of the following is false the characteristics of controlled access in datalink layer.
A) Only one station is transmit at a time.
B) There will be a chance of collision.
C) Devices wishing to transmit must wait their turn.
D) Some deterministic networks use token passing.
23. Which organization structure all team members are responsible for all software development life
cycle phase?
A) Functional B) Project C) Democratic D) Chief programmer
24. Which capability maturity model level an organization must master the requirements
management software quality assurance, and software project planning
A) Repeatable level B) Initial level C) Defined level D) Managed level
25. Which of the following occurs when a transaction cannot proceed for an indefinite period while
other transactions in the system continue normally?
A) Starvation B) Dead block C) checkpoint D) lock point
26. Which Terminology of Natural language processing study about meaning full components of word
A) Phonetics B) Phonology C) Morphology D) Pragmatics
27. All are the advantages of functional format structure, except
A) Ease of staffing B) Production of good quality documents
C) No need job specialization D) Efficient handling manpower turnover
28. Among the following well known port number of TCP the port number of HTTP is:
A) 80 B) 25 C) 21 D) 110
29. An Internetworking concepts it must have at least one connection with an external network.
A) Internet B) Extranet C) intranet D) All
30. Which one of the following are the specific character strings that make up a token?
A) Token B) Lexemes C) Lexical units D) Pattern
31. The Intel’s first true 32-bit microprocessor is
A) Pentium B) 80486 C) 80286 D) 80386
32. A technician is dispatched to a remote office to install a new NIC in a client computer. After
successfully installing and configuring the operating system to recognize the device, the computer still
cannot access the network. Which of the following would MOST likely be the problem?
A) the CAT5 cable is defective B) the NIC is disabled in BIOS
C) The NIC is disabled in Device Manager D) The RJ11 jack is defective
33. Class B private IP address space ranges:
A) 10.0.0.0-----------19.255.255.255 B) 128.12.0.0--------191.24.255.255
C) 172.16.0.0--------172.31.255.255 D) 192.168.0.0------192.168.255.255
34. The atom constructor can represent the following basic atomic values except.
A) Integers B) Real Numbers C) Strings D) Array
35. Variables within a class but outside any method are?
A) Instance variables B) Local variables C) Class variables D) Static variables
36. Which one of the following operations that have no commutative properties
A) Union B) Join C) Intersection D) None
37. Which testing should focus on testing the functionality of objects or methods?
A) Integration testing B) White box testing
C) Black box testing D) Unit testing
38. The content of BH is 10, AL is 8, CL is 4 how much is the content of AX after MUL BH
A) 40 B) 80 C) 32 D) 320
39. Among the protocol one is used to provide remote access to servers and networking devices.
A) HTTP B) SMTP
C) Telnet (terminal emulation protocol) D) FTP
40. Which one of the following sending a message to an object is correct?
A) obj.add B) obj.add.obj
C) obj.add() D) obj.add().obj
41. Which of the following views represents the interaction of the user with the software but tells
nothing about the internal working of the software?
A) Use case diagram B) Activity diagram
C) Class diagram D) Sequence diagram
42. Which one of the following is different from the others?
A) MOVS B) LODS C) XCHG D) INC
43. The function of protocols in transport layer (TCP and UDP) includes following except,
A) Segment upper-layer application data. B) Establish end-to-end operations.
C) Provide flow control D) Addressing packets
44. Assume you are software engineer, which software developing life cycle model follow where user
requirements are not complete and technical issues are not clear.
A) Incremental model B) Prototype model
C) Spiral model D) Waterfall model
45. The process of binding both attributes and methods together within a class is?
A) Inheritance B) Encapsulation
C) Polymorphism D) Overriding
46. The application area of AI which focus on recognize objects based on patterns in the same way as
the human visual system does.
A) Expert System B) Speech recogition
C) Computer vison D) Robotics
47. Which one of the following are the program properties that can be checked at run time?
A) Static checking B) Dynamic semantics
C) Other Static Checks D) None
48. Assume you are asked to connect your main campus debremarkos university to your branch burie
agricultural campus. What kind of network you are expected to establish?
A) Local Area Network B) Metropolitan Area Network
C) Personal Area Network D) Wide Area Network
49. What is the purpose of a sequence diagram?
A) To show the interactions between actors and a system
B) To show the behavior of objects in a system
C) To show the flow of activities in a system
D) To show the order and timing of interactions between objects
50. From steps of problem solving which one is concerned on looking various sequence of action
which lead to the goal state, evaluate it and chose the sequence of optimal action?
A) Execute B) Goal Formulation
C) problem formulation D) Search
51. In OSI reference model, which one is responsible for the translation of incoming and outgoing data .
A) T1 can read Y but cannot write Y B) T2 can read Z but cannot write Z
C) T1 can read Z but cannot write Z D) T2 can read and write item Y
68. Which one of the following is incorrect about inheritance
A) Subclass inherits members of superclass
B) Constructors are not members
C) Constructors of superclass can be invoked from subclass
D) Constructors of superclass inherited by subclass
69. Which types of rule used in phonology to interpretation of the fluctuation in stress and intonation
across the sentences?
A) Phonetic rule B) Phonemic rule
C) Prosodic rule D) Morpheme rule
70. Given an IP Address 172.16.28.252 with the subnet mask of 255.255.240.0 what is the correct
network address?
A) 172.16.24.0 B) 172.16.28.0
C) 172.16.0.0 D) 172.16.16.0
71. One of the following is true about packet switching.
A) Packets travel around the network seeking out the most efficient route.
B) Packets should necessarily seek out the shortest route.
C) The message gets broken into small data packets.
D) All
72. One is true about One is true about the similarity of TCP/IP and OSI reference model.the similarity
of TCP/IP and OSI reference model.
A) Both have application layers.
B) Both have comparable transport and network layers.
C) Both uses packet-switching instead of circuit-switching technology.
D) All
73. One of the following is network layer protocol.
A) HTTP B) FTP C) ARP D) TCP
74. Which one of the following is incorrect about abstract class?
A) It is a class containing abstract method B) Abstract method is incomplete
C) Used to construct objects D) None of the above
75. _______ is the process of writing down the user and system requirements in a requirements
document. A) Feasibility study B) Requirements elicitation and analysis.
C) Requirements specification D) Requirements validation
76. Which directory implementation is used in most Operating System?
A) Single level directory structure B) Two level directory structure
C) Tree directory structure D) Acyclic directory structure
77. Which one of the following correct one?
A) A class file can contain any number of import statement
B) Import statement appears after the class declaration
C) Import statement appears before package statement
D) All of the above
78. Which register is a user-accessible register?
A) DX B) IR C) MBR D) MDR
79. Which one of the following are the secondary tasks for scanner?
A) Stripping out blanks, tabs, new lines B) Stripping out comments
C) Error reporting sD) All
80. Intelligent agents have the ability to understand Natural languages which approaches of AI it
shows A) Thinking humanly B) Acting Humanly
C) Thinking rationally D) Acting rationally
128. Which of the DBMS component ensures that the concurrent execution of multiple operations on
the database results into consistent database state?
A) Log B) Buffer manager
C) File manager D) Transaction processing system