0% found this document useful (0 votes)
52 views18 pages

ARU Online Model

Uploaded by

dine62611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views18 pages

ARU Online Model

Uploaded by

dine62611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

What is software design?

Select one:
a. The process of identifying the requirements and constraints of a software project.
b. The process of designing the user interface of a software application.
c. The process of writing code for a software application.
d. The process of creating a detailed plan for implementing a software project.
Your answer is correct.
The correct answer is: The process of creating a detailed plan for implementing a software
project.

Question 2

What is the first step in identifying a problem for a project?


Select one:
a. Gathering data and relevant materials
b. Developing a project plan
c. Studying the problem
d. Brainstorming potential problems

Feedback

Your answer is correct.


The correct answer is: Brainstorming potential problems

Question 3

What is unit testing in software development?

Select one:
a. The process of testing the entire software system to ensure that it meets its specified
requirements.
b. The process of testing individual units or components of a software system to ensure
that they function correctly.
c. The process of identifying the requirements and constraints of a software project.
d. The process of designing the user interface of a software application.

Feedback

Your answer is correct.


The correct answer is: The process of testing individual units or components of a software
system to ensure that they function correctly.

Question 4
Which of the following is NOT a valid HTTP method?

Select one:
a. GET
b. POST
c. DELETE
d. SEND

Feedback

Your answer is correct.


The correct answer is: SEND

Question 5

What is the purpose of CSS?

Select one:
a. To define the structure and content of a web page
b. To add interactivity to a web page
c. To style web pages
d. To create databases for web applications

Feedback

Your answer is correct.


The correct answer is: To style web pages

Question 6

Which of the following is a popular CSS framework?

Select one:
a. Flask
b. Bootstrap
c. Ruby on Rails
d. Express.js

Feedback

Your answer is correct.


The correct answer is: Bootstrap

Question 7
What is the purpose of a web cache?

Select one:
a. To store and organize data for a website
b. To display web pages for users
c. To manage network traffic between clients and servers
d. To improve the performance of web applications

Feedback

Your answer is correct.


The correct answer is: To improve the performance of web applications

Question 8

Which of the following method is used for conceptual design of a database?

Select one:
a. Relational model
b. Entity relationship model
c. Aggregation model
d. Object oriented data model

Feedback

Your answer is correct.


The correct answer is: Entity relationship model

Question 9

Which one of the following Provide concepts of a data model that describe details of how
data is stored in the computer.

Select one:
a. Conceptual Level
b. Physical Level
c. Implementation Level
d. Semantic Level

Feedback

Your answer is correct.


The correct answer is: Physical Level
Question 10

Which one of the following is false about logical data independency?

Select one:
a. Logical data is independent from how data is actually stored on the disk
b. The changes made to the data on the disk storage should not be reflected in the logical
level
c. Changes done to logical level should not change how the data is stored on the disk.
d. The user’s view of the data should not be altered if the data is changed in the logical
level.

Feedback

Your answer is correct.


The correct answer is: The changes made to the data on the disk storage should not be
reflected in the logical level

Question 11

Which type of database object is disappear after the program terminates?

Select one:
a. Transient object
b. Persistent object
c. Structured object
d. Distractor object

Feedback

Your answer is correct.


The correct answer is: Transient object

Question 12

A heterogeneous distributed database is which of the following?

Select one:
a. The same DBMS is used at each location and data are not distributed across all nodes.
b. The same DBMS is used at each location and data are distributed across all nodes. C.
c. Different DBMS is used at each location and data are not distributed across all nodes.
d. A different DBMS is used at each location and data are distributed across all nodes.

Feedback
Your answer is correct.
The correct answer is: A different DBMS is used at each location and data are distributed
across all nodes.

Question 13

Which one of the following concurrency control technique is prefer for conflict rare
situation?
Select one:
a. Multiple Granularity Locking
b. Locking
c. Timestamp
d. Optimistic

Feedback

The correct answer is: Optimistic

Question 14

Question text

Which is more effective while calling the functions?

Select one:
a. call by value
b. call by reference
c. call by pointer
d. call by array

Feedback

Your answer is correct.


The correct answer is: call by reference

Question 15

Question text

In a for loop statement, the ________ expression is executed only once.


Select one:
a. test
b. null
c. initialization
d. updating

Feedback

The correct answer is: initialization

Question 16

The ______ statement used to stop a loop's current iteration and begin the next one.
Select one:
a. break
b. goto
c. re-iterate
d. continue

Feedback

The correct answer is: continue

Question 17

What does the following statement do in java?

Box b1 = new Box();

Box b2 = b1;
Select one:
a. b2 is being assigned a reference to a copy of the object referred by b1.
b. b1 and b2 refer to separate and distinct objects.
c. b1 and b2 will both refer to the same object.
d. Any changes made to the object through b2 will not affect the object to which b1 is
referring.

Feedback

The correct answer is: b1 and b2 will both refer to the same object.

Question 18

In below java code, whose “Car” will be called?

class Father {

public void car() {


System.out.println("Father's Car");

class Son extends Father {

public void car() {

System.out.println("Son's Car");

public class Sample {

public static void main(String[] args) {

Son john = new Son();

john.car();

}
Select one:
a. Father's Car
b. Son's Car
c. There is an ambiguity, so no one Car
d. Compiler Error

Feedback

The correct answer is: Son's Car

Question 19

How do encapsulation and abstraction differ?


Select one:
a. Hiding and Binding
b. Binding and Hiding
c. Not hiding and Hiding
d. Not binding and Binding

Feedback

The correct answer is: Binding and Hiding

Question 20

The time complexity taken by NP class algorithm is_____.


Select one:
a. O(1)
b. O(logn)
c. O(n)
d. O(n2)

Feedback

The correct answer is: O(n)

Question 21

Consider the following graph. Using Kruskal’s algorithm, which edge will be selected first?

Select one:
a. GF
b. DE
c. BE
d. BG

Feedback

The correct answer is: BE

Question 22

In what manner is a state-space tree for a backtracking algorithm constructed?


Select one:
a. Depth-first search
b. Breadth-first search
c. Twice around the tree
d. Nearest neighbor first

Feedback

The correct answer is: Depth-first search

Question 23

When the user tries to delete the element from the empty stack then the condition is said to be
a ________.
Select one:
a. Underflow
b. Garbage collection
c. Overflow
d. Full

Feedback

The correct answer is: Underflow

Question 24

Consider the following program of stack.

#define SIZE 8

struct STACK

{ int arr[SIZE];

int top=-1; }

What would be the maximum value of the top that does not cause the overflow of the stack?

Select one:
a. 8
b. 7
c. 9
d. -1
Feedback

The correct answer is: 7

Question 25

Which of the following is the time complexity to search an element in the linked list?
Select one:
a. O(n)
b. O(1)
c. O(logn)
d. O(nlogn)

Feedback

The correct answer is: O(n)

Question 26

If the array is already sorted, then the running time for merge sort is____.
Select one:
a. O(1)
b. O(n*log n)
c. O(n)
d. O(n^2)

Feedback

The correct answer is: O(n*log n)

Question 27

All are the characteristics of peer-to-peer network except…..


Select one:
a. Security is decentralized
b. Each user responsible for local backup
c. No specialized OS
d. Scalability

Feedback

The correct answer is: Scalability

Question 28
From the following protocols which one is odd?
Select one:
a. ARP
b. RARP
c. IP
d. TCP

Feedback

The correct answer is: TCP

Question 29

Which of the following WAN technologies infrastructure built on a cell-based architecture,


rather than on a frame-based architecture?
Select one:
a. Ethernet WAN
b. ATM(asynchronous transfer mode)
c. Multiprotocol Label Switching (MPLS)
d. Leased Lines

Feedback

The correct answer is: ATM(asynchronous transfer mode)

Question 30

______________is to mean be diplomatic and understand the politically correct way to say
things.
Select one:
a. Be Proactive
b. Be do-able
c. Avoid absolutes
d. Be phased in

Feedback

The correct answer is: Avoid absolutes

Question 31

Someone might change the values in a database or alter a program happen when
Select one:
a. Confidentiality is compromised
b. Integrity is compromised
c. Availability is compromised
d. System is intercepted

Feedback

The correct answer is: Integrity is compromised

Question 32

Which SNMP version sends the data in the clear format without using encryption technique?
Select one:
a. SNMPv2
b. SNMPv1
c. SNMPv3
d. SNMPv4

Feedback

The correct answer is: SNMPv1

Question 33

Type of user account can only use the software that’s already installed by the administrator
and change system settings that don’t affect other users is

Select one:
a. Administrator
b. Standard
c. Guest
d. Special

Feedback

The correct answer is: Standard

Question 34

Which of the following is cryptographic network tool for secure data communication between
two networked computers that connects, via a secure channel over an insecure network?
Select one:
a. Telnet
b. Secure Shell (SSH)
c. OpenSSH (OpenBSD Secure Shell)
d. rlogin

Feedback

The correct answer is: Secure Shell (SSH)

Question 35

Which of the following is incorrect about Linux?


Select one:
a. Portable to any hardware platform
b. Made to keep on running
c. Linux is free
d. Insecure and versatile

Feedback

The correct answer is: Insecure and versatile

Question 36

Which of the following symbols in AI are not logical symbols?


Select one:
a. Negation
b. Conjunction
c. Implication
d. Concatenation

Feedback

The correct answer is: Concatenation

Question 37

Question text

Machines that try to imitate human intuition while handling vague information lie in the field
of AI called?
Select one:
a. Fuzzy logic
b. Functional logic
c. Boolean logic
d. Human logic

Feedback

The correct answer is: Fuzzy logic

Question 38

Using Greedy best-first search, find the best path and cost of the following problem.

Select one:
a. Path: S,C,G Cost: 13
b. Path: S,B,G Cost: 9
c. Path: S,A,G Cost: 10
d. Path: S,A,D Cost: 4

Feedback

The correct answer is: Path: S,C,G Cost: 13

Question 39

The ______can be written by the host to start a command or to change the mode of a device
in I/O port.
Select one:
a. Status register
b. Data-in register
c. Control register
d. Data-out register
Feedback

The correct answer is: Control register

Question 40

Which one of the following algorithm is used to allocate the largest hole
Select one:
a. Next fit
b. First Fit
c. Worst fit
d. Best fit

Feedback

The correct answer is: Worst fit

Question 41

____________a situation that occurs when two or more processes are reading/writing into
some shared data and the final outcome depends on the order the processes execute
Select one:
a. Race condition
b. Mutual exclusion
c. Deadloak
d. Sleep and wait

Feedback

The correct answer is: Race condition

Question 42

Which of the following is an example of full duplex?


Select one:
a. Radio
b. Television
c. walk talkie
d. Telephone

Feedback

The correct answer is: Telephone


Question 43

Which one of the following is not part of central processing unit?


Select one:
a. Random Access Memorry
b. Arithmetical logic unit
c. Control unit
d. Register

Feedback

The correct answer is: Random Access Memorry

Question 44

What is the maximum number of unique values that can be stored in an n-bit register?
Select one:
a. n^2
b. 2^n
c. n/2
d. 2n

Feedback

The correct answer is: 2^n

Question 45

Which of the following is not a characteristic of a Turing Machine?


Select one:
a. Tape divided into cells
b. Read/write head
c. Finite state control unit
d. Random access memory

Feedback

The correct answer is: Random access memory

Question 46

A Turing Machine is Turing Acceptable if:


Select one:
a. It halts and accepts all inputs
b. It halts and rejects all inputs
c. It accepts all inputs and may run indefinitely on non-members
d. It accepts all inputs and rejects non-members

Feedback

The correct answer is: It accepts all inputs and may run indefinitely on non-members

Question 47

What is the concept of hardness in complexity theory?


Select one:
a. It measures the computational resources required to solve a problem.
b. It represents the time complexity of a problem.
c. It indicates the level of difficulty in understanding a problem.
d. It refers to the impossibility of solving a problem.

Feedback

The correct answer is: It measures the computational resources required to solve a problem.

Question 48

Which phase of the compiler is responsible for generating an intermediate representation of


the program for optimization purposes?
Select one:
a. Lexical Analysis
b. Syntactic Analysis
c. Intermediate Code Generation
d. Code Optimization

Feedback

The correct answer is: Intermediate Code Generation

Question 49

Which phase of the compiler verifies if the program adheres to the language's grammar rules?
Select one:
a. Lexical analysis
b. Semantic analysis
c. Syntactic analysis
d. Code optimization

Feedback

The correct answer is: Syntactic analysis

Question 50

What is the purpose of lexical analysis in the compilation process?


Select one:
a. Checks the correctness of the program's semantics
b. Generates intermediate code for optimization
c. Translates high-level language constructs into tokens
d. Resolves variable names and manages scope

Feedback

The correct answer is: Translates high-level language constructs into tokens

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy