Samples of competitive examination questions: part II

66
See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/279999140 Samples of Competitive Examination Questions: Part II RESEARCH · JULY 2015 DOI: 10.13140/RG.2.1.3962.7361 1 AUTHOR: Ali I. Al-Mosawi Free Consultation 160 PUBLICATIONS 468 CITATIONS SEE PROFILE Available from: Ali I. Al-Mosawi Retrieved on: 12 July 2015

Transcript of Samples of competitive examination questions: part II

Seediscussions,stats,andauthorprofilesforthispublicationat:http://www.researchgate.net/publication/279999140

SamplesofCompetitiveExaminationQuestions:PartII

RESEARCH·JULY2015

DOI:10.13140/RG.2.1.3962.7361

1AUTHOR:

AliI.Al-Mosawi

FreeConsultation

160PUBLICATIONS468CITATIONS

SEEPROFILE

Availablefrom:AliI.Al-Mosawi

Retrievedon:12July2015

مجموعة من أسئلة اإلمتحان التنافسي للدراسات

لمجموعة من ) دكتوراه - ماجستیر - دبلوم(العلیا

عوام دراسیة مختلفة أرجو ألالجامعات العراقیة و

.أن یستفاد منھا الطلبة وهللا الموفق

علي إبراھیم الموسوي

Ali I.Al-Mosawi www.researchgate.net/profile/Ali_Al-Mosawi www.linkedin.com/pub/ali-i-al-mosawi/61/364/654 www.independent.academia.edu/AliIAlMosawi h�p://orcid.org/0000-0002-8688-3208 www.aascit.org/membership/AliAlMosawi www.facebook.com/ali.ibrahim.12177276 h�ps://plus.google.com/u/0/+AliIAlMosawi/posts

UOITC

Page 1 of 9

Republic of Iraq

Ministry of Higher Education & Scientific Research

University of Information Technology & Communications (UOITC)

Test for Nominees of Master of Science in Software Engineering Postgraduate

Date:- 7 September 2014 Time: 2 Hours

Note: Attempt all 60 questions (choose one of the choices in each question).

Q1.To prevent signals from colliding on the bus, ________ prioritize(s) access to

memory by I/O channels and processors. a. A register

b. Interrupts

c. The processor scheduler

d. A controller

Q2. Data stored on ________ media (i.e., caches) vanishes when the computer is

turned off, whereas ________ media (i.e., hard disks) preserve data when no

power is present.

a. Persistent, volatile

b. Volatile, persistent

c. Random-access, sequential-access

d. Dynamic, static

Q3. In a distributed computing environment, clients are ________.

a. User computers that request remote services

b. Computers that perform requested services

c. Often dedicated to one type of task, such as rendering graphics or managing

databases

d. None of the above

Q4. ________ improve system performance by temporarily storing data during

transfers between devices or processes that operate at different speeds.

a. Caches

b. Controllers

c. Buffers

d. Registers

Q5. A compiler accepts ________ code, written in a high-level language, and

returns executable ________ code that contains machine-language instructions.

a. source, object

b. object, source

c. assembly, object

d. assembly, source

UOITC

Page 2 of 9

Q6. ________ is the process of integrating the various modules referenced by a

program into a single executable unit.

a. Parsing

b. Loading

c. Linking

d. Compiling

Q7. A file is ________.

a. Is a named collection of data

b. Is manipulated as a unit by operations such as open, close, create or destroy

c. Stored exclusively on persistent storage devices such as hard disks, CDs or DVDs

d) a and b only

Q8. A(n) ________ periodically generates an interrupt that causes a processor

to invoke the operating system.

a. Clock generator

b. Time-of-day clock

c. Interval timer

d. None of the above

Q9. The contents of information are stored in

a. Memory data register

b. Memory address register

c. Memory arithmetic registers

d. Memory access register

Q10. Programs are executed on the basis of a priority number in a

a. Batch processing system

b. Multiprogramming

c. Time sharing

d. None of these

Q11. Which of the following does not affect the resolution of a video display image?

a. Bandwidth

b. Raster scan rage

c. Vertical and horizontal lines of resolution

d. Screen size

Q12. A(n) ________ allows programmers to perform complicated system tasks

simply by calling predefined functions.

a. System call

b. Application programming interface (API)

c. Web service

d. None of the above

Q13. Within a processor, the ________ loads instructions into high-speed

memory (i.e., instruction registers), the ________ interprets the instructions

UOITC

Page 3 of 9

and the ________ performs basic arithmetic and logical operations.

a. Arithmetic and logic unit, instruction fetch unit, instruction decode unit

b. Instruction fetch unit, arithmetic and logic unit, instruction decode unit

c. Arithmetic and logic unit, instruction decode unit, instruction fetch unit

d. Instruction fetch unit, instruction decode unit, arithmetic and logic unit

Q14. Which of the following statements about directories is false?

a. Directories contain the names and locations of other files in the file system.

b. Directories often store user data.

c. Directions may contain the access times and modified times of files.

d. Directories may contain a “type” field that specifies a description of a file’s purpose

Q15. Microsoft’s FAT file system uses a(n) ________ file allocation scheme.

a. Contiguous

b. Linked-list noncontiguous

c. Tabular noncontiguous

d. Indexed noncontiguous

Q16. The correct way to round off a floating number x to an integer value is

a. y = (int)(x+0.5)

b. y = int(x+0.5)

c. y = (int)x+0.5

d. y = (int)((int)x+0.5)

Q17. The process of assigning load addresses to the various parts of the program

and adjusting the code and data in the program to reflect the assigned

addresses is called .................. a. Symbol resolution

b. Parsing

c. Assembly

d. Relocation

Q18. Which type of computers uses the 8-bit code called EBCDIC?

a. Minicomputers

b. Microcomputers

c. Mainframe computers

d. Super computer

Q19. Registers, which are partially visible to users and used to hold conditional,

are known as

a. PC

b. Memory address registers

c. General purpose register

d. Flags

UOITC

Page 4 of 9

Q20. One of the main feature that distinguish microprocessors from micro-

computers is

a. Words are usually larger in microprocessors

b. Words are shorter in microprocessors

c. Microprocessor does not contain I/O devices

d. Exactly the same as the machine cycle time

Q21. A factor in the selection of a source language is

a. programmer skill

b. language availability

c. program compatibility with other software

d. all of the above

Q22. “C” was primarily developed as a a. Systems Programming Language

b. General Purpose Language

c. Data Processing Language

d. None of the above

Q23. Which of the following is FALSE in C?

a. Keyword can be used as variable names

b. Variable names can contain a digit

c. Variable names do not contain a blank space

d. Capital letters can be used in variable names

Q24. Which is the limitation of high level language?

a. Lower efficiency

b. Machine dependence

c. machine level coding

d. None of above

Q25. A compiler is a translating program which

a. Translates instruction of a high level language into machine language

b. Translates entire source program into machine language program

c. It is not involved in program’s execution

d. All of above

Q26. Frames from one LAN can be transmitted to another LAN via the device

a. Router

b. Bridge

c. Repeater

d. Modem

Q27. A computer that handles resource sharing and network management in a

local area network. Select the best fit for answer:

a. Network Server

b. Virtual Private Network

c. Network operating system

d. OSI

UOITC

Page 5 of 9

Q28. Router operates in which layer of OSI Reference Model?

a. Layer 1 (Physical Layer)

b. Layer 3 (Network Layer)

c. Layer 4 (Transport Layer)

d. Layer 7 (Application Layer)

Q29. Which of the following statement about layers of the TCP/IP protocol stack

is false?

a. Each layer provides functionality for the layers above it.

b. Layers ease the development, debugging and maintenance of network applications.

c. Each layer can be implemented by following one or more protocols.

d. Each layer can be used independently to perform network communication.

Q30. For large networks, _______ topology is used.

a. Bus

b. Star

c. Ring

d. Tree

Q31. An IP address is __________.

a. a unique destination on the Internet.

b. is the location of a resource on the Internet.

c. is a component of a computer where datagram are directed to be sent over a

network.

d. is another name for a hub in a star network.

Q32. The problem of fragmentation arises in

a. Static storage allocation

b. Stack storage allocation

c. Stack allocation with dynamic binding

d. Heap allocation

Q33. In ______ OS, the response time is very critical.

a. Multitasking

b. Batch

c. Online

d. Real-time

Q34. An optimal scheduling algorithm in terms of minimizing the

average waiting time of a given set of processes is ________.

a. FCFS scheduling algorithm

b. Round robin scheduling algorithm

c. Shortest job - first scheduling algorithm

d. None of the above

Q35 Virtual memory is __________. a. An extremely large main memory

b. An extremely large secondary memory

UOITC

Page 6 of 9

c. An illusion of extremely large main memory

d. A type of memory used in super computers.

Q36. When a user runs a program, processes are created and inserted into the

--------- list

a. running

b. ready

c. blocked

d. dispatched

Q37. A variable whose size is determined at compile time and cannot be changed at

run time is_________.

a. Static variable.

b. Dynamic variable.

c. Not a variable.

d. Data variable

Q38. The complexity of linear search algorithm is

a. O(n)

b. O(log n)

c. O(n2)

d. O(n log n)

Q39. The Worst case occur in linear search algorithm when

a. Item is somewhere in the middle of the array

b. Item is not in the array at all

c. Item is the last element in the array

d. Item is the last element in the array or is not there at all

Q40.Linked lists are best suited

a. for relatively permanent collections of data

b. for the size of the structure and the data in the structure are constantly changing

c. for both of above situation

d. for none of above situation

Q41.Interrupts which are initiated by an I/O drive are

a. internal

b. external

c. software

d. all of above

Q42. Binary numbers can also be expressed in this same notation by

_____representation:

a. Floating point

b. Binary point

c. Decimal point

d. All of these

UOITC

Page 7 of 9

Q43. The devices connected to a microprocessor can use the data bus: a. All the time

b. At regular interval of time

c. Only when it’s sending or receiving data

d. When the microprocessor is reset

Q44. The access time of memory is ............... the time required for performing any

single CPU operation.

a. Longer than

b. Shorter than

c. Negligible than

d. Same as

Q45.Which of the following registers is used to keep track of address of the

memory location where the next instruction is located?

a. Memory Address Register

b. Memory Data Register

c. Instruction Register

d. Program Register

Q46. A complete microcomputer system consists of

a. microprocessor

b. memory

c. peripheral equipment

d. all of above

Q47. Which search method takes less memory?

a. Depth-First search

b. Breadth-First search

c. Linear search

d. Optimal search

Q48. What will backward chaining algorithm will return?

a. Additional statements

b. Substitutes matching the query

c. Logical statement

d. All of the mentioned

Q49. The area of AI that investigates methods of facilitating communication between

people and computers is:

a. Natural language processing

b. Symbolic processing

c. Decision support

d. Robotics

Q50. Which of the following items should not be included in the software project

management plan?

a. The techniques and case tools to be used

b. Detailed schedules, budgets and resource allocations

c. The life cycle model to be used

d. None of the above

UOITC

Page 8 of 9

Q51. Project risk factor is considered in a. Spiral Model

b. Waterfall Model

c. Prototyping Model

d. Iterative enhancement Model

Q52. During software development which factor is most crucial ?

a. People

b. Process

c. Product

d. Project

Q53. Which best captures the nature of the quality paradigm? a. The Nature of Quality, A Process Perspective, Defect Elimination

b. Process, Product, People, Problem

c. Measurement, Quality Control, Validation

d. Analysis, Testing, Design

Q54. Prototyping is appropriate for a. Data-oriented applications

b. Applications which are highly interactive

c. Development teams who lack domain experience

d. All of the above.

Q55. A way to protect information being sent over a network, when long distance

is involved, is

a. Spying

b. Putting up a firewall

c. Passwording

d. encrypting

Q56. In computer security, means that computer system assets can be

modified only by authorized parities.

a. Confidentiality

b. Integrity

c. Availability

d. Authenticity

Q57. Public-key cryptography is symmetric in that ________.

a. It decrypts messages using the same key it uses to encrypt

b. Both the sender and the receiver use the same key

c. It employs two inversely related keys

d. Either host can create a key and both hosts can use it

Q58. Identify the criteria for designing database from the point of view of user

a. No redundancy

b. No inapplicable attributes

c. Uniformity in naming & definitions of the data items

d. All of the above

UOITC

Page 9 of 9

Q59. The relational model is based on the concept that data is organized and stored in

two- dimensional tables called ……………………….

a. Fields

b. Records

c. Relations

d. Keys

Q60. Identify the incorrect statement:

a. The overall strategy drives the E-Commerce data warehousing strategy

b. Data warehousing in an E-Commerce environment should be done in

classical manner

c. E-Commerce opens up an entirely new world of web server.

d. E-Commerce security threats can be grouped into three major categories

UOITC

Page 1 of 9

Republic of Iraq

Ministry of Higher Education & Scientific Research

University of Information Technology & Communications (UOITC)

Test for Nominees of Higher Diploma in Web Site Technology Postgraduate

Date:- 7 September 2014 Time: 2 Hours

Note: Attempt all 60 questions(choose one of the choices in each question).

Q1. Which of the following memories need refresh?

a. SRAM

b. DRAM

c. ROM

d. All the above

Q2. What is the first stage in software development?

a. Specification

b. Testing

c. System Analysis

d. Maintenance

Q3. The contents of information are stored in

a. Memory data register

b. Memory address register

c. Memory Arithmetic register

d. Memory Access register

Q4. In a distributed computing environment, clients are ________.

a. User computers that request remote services

b. Computers that perform requested services

c. Often dedicated to one type of task, such as rendering graphics or

managing databases

d. none of the above

Q5. Which of the following hardware components are required to execute

instructions in a general-purpose computer?

a. Main board

b. Processor

c. Main memory

d. All of the above

Q6.The ________ chip, typically located on the mainboard, stores

Instructions for basic hardware initialization and management.

a. Bootstrap

b. Firmware

UOITC

Page 2 of 9

c. Basic input/output system (BIOS)

d. Device driver

Q7. A(n) ________ is a piece of hardware that executes a set of machine-

language instructions.

a. Controller

b. Bus

c. processor

d. Motherboard

Q8. Time during which a job is processed by the computer is

a. Delay times

b. Real time

c. Execution time

d. Down time

Q9. In immediate addressing the operand is placed a. in the CPU register

b. after OP code in the instruction

c. in memory

d. in stack

Q10. The process of converting analog signals into digital signals so they

can be processed by a receiving computer is referred to as:

a. Modulation

b. Demodulation

c. Synchronizing

d. Digitizing

Q11. The ALU of a computer responds to the commands coming from

a. Primary memory

b. Control section

c. External memory

d. Cache memory [

Q12. Properly arranged data is called

a. Field

b. Words

c. Information

d. File

Q13. Which term is used to describe RAM?

a. Dynamic RAM (DRAM)

b. Static RAM (SRAM)

c. Video RAM (VRAM)

d. All of the above

UOITC

Page 3 of 9

Q14. The two basic types of record access methods are:

a. Sequential and random

b. Sequential and indexed

c. Direct and immediate

d. Online and real time

Q15. A disadvantage of the laser printer is

a. It is quieter than an impact printer

b. It is very slow

c. The output is of a lower quality

d. None of the above

Q16. A computer Program that translates one program instruction at a

Time into machine language is called a/an a. Interpreter

b. CPU

c. Compiler

d. Simulator

Q17. An advantage of overlapped processing activities is:

a. More effective use of CPU

b. Increased processing activities for entire system

c. Better coordination of I/O activities

d. All the above

Q18. Any method for controlling access to or use of memory is known

a. Memory map

b. Memory protection

c. Memory management

d. Memory instruction

Q19. Which of the following lists memory types from highest to lowest

speed?

a. Secondary storage, main memory, cache, registers

b. Registers, cache, secondary storage, main memory

c. Registers, cache, main memory, secondary storage

d. Cache, registers, main memory, secondary storage

Q20. Why is hard disk storage much slower to access than main memory?

a. Accessing data on a hard disk requires mechanical movement of the

read/write head.

b. Disks are located farther from a system’s processors.

c. Disks must be access via a hardware controller.

d. all of the above

UOITC

Page 4 of 9

Q21. In the evaluation of a computer language, all of the following

characteristics should be considered except?

a. application oriented features

b. efficiency

c. readability

d. hardware maintenance costs

Q22. A factor in the selection of a source language is

a. programmer skill

b. language availability

c. program compatibility with other software

d. all of the above

Q23. Output of XML document can be viewed in a

a. Word Processor

b. Web Browser

c. Notepad

d. None of the above

Q24. Computer languages can be classified as one of three types. Which of

the following is not one of these types?

a. Assembly languages

b. High-level languages

c. Microcode languages

d. Machine languages

Q25. Which of the following are not one of the major pillars of object-oriented

programming?

a. Encapsulation

b. Data Hiding

c. Inheritance

d. Structured Programming

Q26.Which of the Following Provides a reliable Communication?

a. TCP

b. IP

c. UDP

d. All the above

Q27. The Internet is an Example of

a. Cell Switched Network

b. Circuit Switch Network

c. Packet Switched Network

d. All the above

UOITC

Page 5 of 9

Q28. What do we call a network whose elements may be separated by some

distance? It usually involves two or more small networks and dedicated

high-speed telephone lines.

a. URL (Universal Resource Locator)

b. LAN (Local Area Network)

c. WAN (Wide Area Network)

d. World Wide Web

Q29. Bridge works in which layer of the OSI model?

a. Application layer

b Transport layer

c. Network layer

d. Datalink layer

Q30. Which of the following can be software

a. Router

b. Firewalls

c. Gateway

d. Modem

Q31. DNS is the abbreviation of

a. Dynamic name System

a. Dynamic Network System

b. Domain Name System

c. Domain Network Service

Q32. The Operating System creates--------- from the physical Computer

a. Virtual Space

b. Virtual Computers

c. Virtual Device

d. None of the above

Q33. Multiprogramming Systems

a. Are easier to develop than single programming systems

b. Execute each job faster

c. Execute more jobs in the same time period

d. Are used only one large mainframe computers

Q34.Which of the following Operating System does not implement

Multitasking truly?

a. Window 98

b. Window NT

c. Window XP

d. None of the above

UOITC

Page 6 of 9

Q35. Process is

a. A program in High Level language kept on disk

b. Content of main memory

c. A program in execution

d. A program in secondary storage

Q36. The strategy of allowing processes that are logically runnable to be

temporarily suspended is called a. Preemptive scheduling

b. Non preemptive scheduling

c. Shortest job first

d. First come first served

Q37. The aim of creating page replacement algorithms is to : a. Replace pages faster

b. Increase the page fault rate

c. Decrease the page fault rate

d. To allocate multiple pages to processes

Q38. Binary search algorithm can not be applied to

a. Sorted linked list

b. Sorted binary trees

c. Sorted linear array

d. Pointer array

Q39. The difference between linear array and a record is

a. An array is suitable for homogeneous data but the data items in a

record may have different data type

b. In a record, there may not be a natural ordering in opposed to linear

array.

c. A record form a hierarchical structure but a linear array does not

d. All of above

Q40.. ………… is very useful in situation when data have to stored and

then retrieved in reverse order.

a. Stack

b. Queue

c. List

d. Link list

Q41. Which of the following is not the internal sort?

a. Insertion Sort

b. Bubble Sort

c. Merge Sort

d. Heap Sort

UOITC

Page 7 of 9

Q42. ………… is not the operation that can be performed on queue.

a. Insertion

b. Deletion

c. Retrieval

d. Traversal

Q43. What is meant by a dedicated computer?

a. which is used by one person only

b. which is assigned to one and only one task

c. which does one kind of software

d. which is meant for application software only

Q44. The most common addressing techniques employed by a CPU is

a. immediate

b. direct

c. indirect

d. All the above

Q45. Number of CPU registers in a system depends on ____________. a. Operating system

b. Computer Architecture

c. Computer Organization

d. None of the above

Q46. Best-First search can be implemented using the following data

structure

a. Queue

b. Stack

c. Priority Queue

d. Circular Queue

Q47. An AI technique that allows computers to understand associations

and relationships between objects and events is called

a. Heuristics processing

b. Cognitive Science

c. Relative Symbolism

d. Pattern Matching

Q48. Which rule is equal to resolution rule of first-order clauses?

a. Propositional resolution rule

b. Inference rule

c. Resolution rule

d. None of the mentioned

UOITC

Page 8 of 9

Q49. Which of these is not a control strategy?

a. Branch and Bound

b. Depth First

c. Breadth First

d. Heuristic search

Q50. A good specification should be?

a. Unambiguous

b. Distinctly specific

c. Functional

d. All of the above

Q51. Design phase includes?

a. Data, architectural and procedural design only

b. Architectural, procedural and interface design only

c. Data, architectural and interface design only

d. Data, architectural, interface and procedural design

Q52.The largest percentage of total life cycle cost of software is:-

a. Design cost

b. Maintenance cost

c. Coding cost

d. Test cost

Q53.What is done during maintenance phase?

a. Data Flow diagram

b. Decision Table

c. Pie chart

d. System Flow chart

Q54. The best-known example of a ………………………process is the

Cleanroom process, which was originally developed by IBM. In the

Cleanroom process each software increment is formally specified and this

specification is transformed into an implementation.

a. Waterfall model.

b. Evolutionary development.

c. Component-based software engineering.

d. Formal development.

Q55. Which of the following is not a problem with secret-key cryptography?

a. It requires a large amount of processing time and complexity to implement.

b. Two parties must find a secure way to exchange the key.

c. A sender needs a different key for each receiver.

d. If the key is intercepted, a third party could pose as either host in the

communication.

UOITC

Page 9 of 9

Q56. A key distribution center is ________.

a. The component that actually performs the encryption and decryption

b. A central authority that shares a different key with each user

c. An organization that develops and supports security algorithms

d. A system that transfers keys between hosts

Q57. How does a cryptanalytic attack typically work?

a. It uses brute force to decrypt a message.

b. It uses a public key to determine information about the private key.

c. It exploits weak statistical trends between the key and the ciphertext to

gain knowledge about the key.

d. It overloads the receiver so that legitimate messages cannot be received.

Q58. Database management systems are intended to

a. eliminate data redundancy

b. establish relationship among records in different files

c. manage file access

d. all of the above

Q59. Disadvantages of file system to store data is

a. Data Redundancy and inconsistency

b. Difficulty in accessing data

c. data isolation

d. All the above

Q60.The role of a data manipulation language (DML) is ________.

a. to specify how data items are organized

b. to modify data

c. to search the database

d. to specify how data items are related