Exit Exam 2017
Exit Exam 2017
Ob. The property "User cannot change password has been enabled when it was created
Assistant
Poe
b. The property "User cannot change password" has been enabled when it was created.
Since the user is a member of the Administrators group, insufficient login credentials is unlikely. If this
property is enabled, it would prevent the user from changing their password, even if they have the
necessary permissions.
Assistant
Poe
AI contributes to gaining insight into human intelligence by processing vast amounts of data, identifying
trends, and revealing underlying patterns that can inform our understanding of human cognition.
If a problem can be broken into sub-problems that are reused several times, the problem possesses
property.
a. Memoization
b. Optimal substructure
c. Greedy
d. Overlapping sub-problems
Assistant
Poe
d. Overlapping sub-problems.
This property indicates that a problem can be divided into smaller sub-problems that recur multiple
times, making it suitable for optimization techniques like dynamic programming.
a. Declarative knowledge
b. Transition knowledge
c. Procedural knowledge
Assistant
Poe
c. Procedural knowledge.
Procedural knowledge refers to knowing how to perform tasks and actions, such as driving a car, which
involves a series of steps and skills.
What is the difference between OLTP and OLAP databases?
Oa. OLTP databases store historical data, while OLAP databases store real-time data
Ob. OLTP databases are optimized for read-heavy workloads, while OLAP databases are optimized for
write heavy workloads
Oc OLTP databases are used for online transaction processing, while OLAP databases are used for online
analytical processing.
Od. OLTP databases are used for online analytical processing, while OLAP databases are used for online
transaction processing
Next
Assistant
Poe
c. OLTP databases are used for online transaction processing, while OLAP databases are used for
online analytical processing.
OLTP systems are designed for managing transactional data, while OLAP systems are optimized for
complex queries and data analysis.
Which ACID property ensures that a transaction either completes in its entirety or has no effect at all?
a. Atomicity
b. Durability
Oc. Consistency
d. Isolation
Assistant
Poe
Atomicity ensures that a transaction is treated as a single, indivisible unit, meaning it either completes
fully or has no effect at all.
What is the postfix expression for the given infix (2 + 3) ^ * (4+5) notation?
O a. 2 +34^ * +
b. 23 + 45 +^ +
c. 234 ^ * +5+
Od. 2+3^ * 4 + 5
Assistant
Poe
The correct postfix expression for the given infix expression (2+3)∗(4+5)(2 + 3) * (4 + 5)(2+3)∗(4+5) is:
**b. 23 + 45 + ***
This converts the infix expression to postfix (also known as Reverse Polish Notation).
Assistant
Poe
If an optimal solution can be created for a problem by constructing optimal solutions for its sub-
problems, the problem possesses property.
O a. Greedy
Oc. Memoization
Next
Assistant
Poe
b. Optimal substructure.
This property indicates that an optimal solution to a problem can be formed from optimal solutions of its
sub-problems.
a. Copying one's programs or data; using system resources (CPU, memory, disk space, peripherals)
without proper accounting.
b. The CPU switches from program to program, running each for tens or hundreds of milliseconds. This
provides economical interactive use of a system.
c. Attempts to increase CPU utilization by always having something for the CPU to execute.
d. Makes efficient use of the CPU by overlapping the demands for the CPU and its VO devices from
various users
Next
Assistant
Poe
a. Copying one's programs or data; using system resources (CPU, memory, disk space, peripherals)
without proper accounting.
This option does not represent an advantage of multiprogramming; instead, it suggests a lack of proper
resource management.
a. Natural language
c. Pseudo-code
Od. Flowchart
Assistant
Poe
b. Programming language.
While programming languages are used to implement algorithms, they are not typically considered a
method for expressing algorithms in a high-level, abstract manner like natural language, pseudo-code, or
flowcharts.
In a healthcare database system, which concept is crucial for ensuring patient data privacy and security?
b. Data Mining
Assistant
Poe
c. Data Encryption.
Data encryption is crucial for ensuring patient data privacy and security, as it protects sensitive
information from unauthorized access and breaches.
Oa. A field in one table that refers to the primary key in another table
Assistant
Poe
a. A field in one table that refers to the primary key in another table.
A foreign key establishes a relationship between two tables by linking one table's field to the primary key
of another table.
Which programming paradigm emphasizes breaking down problems into smaller, reusable components
known as functions or procedures?
Oa Procedural programming
b. Imperative programming
Oc Object-oriented programming
Next
Assistant
Poe
a. Procedural programming.
Procedural programming emphasizes breaking down problems into smaller, reusable components called
procedures or functions.
a. Masquerade
Ob. DoS
c. Traffic analysis
Od. Reply
Assistant
Poe
c. Traffic analysis.
Traffic analysis is considered a passive attack because it involves monitoring and analyzing data traffic
without altering or disrupting the communication.
a. Combine
O b. Conquer
Oc. Divide
Od. Analyze
Assistant
Poe
d. Analyze.
The steps in the merge sort algorithm are typically "Divide," "Conquer," and "Combine." "Analyze" is not
one of those steps.
What does the term "algorithm" refer to in the context of computer programming?
Assistant
Poe
In computer programming, an algorithm refers to a systematic procedure or set of rules for solving a
specific problem.
Which objective of modern operating systems involves protecting the system and its resources from
unauthorized access and malicious attacks?
Next
Assistant
Poe
This objective involves protecting the system and its resources from unauthorized access and malicious
attacks.
Oa. RISC are with few numbers of registers when compared to CISC
Oc. RISC use complex and efficient machine instructions when compared to CISC
Assistant
Poe
RISC (Reduced Instruction Set Computer) architectures typically use a hardwired control unit and
support pipelining for efficient instruction execution.
b. High availability
Oc. Scalability
Assistant
Poe
NoSQL databases are known for their flexibility in data models, high availability, and scalability, but they
typically do not enforce a strict schema.
What is the name of a grammar in which all attributes of the grammar symbols are synthesized
attributes and se form of inherited attributes?
a. M-attributed grammar
b. L-attributed grammar
c attributed grammar
d. Stattributed grammar
Assistant
Poe
b. L-attributed grammar.
In an L-attributed grammar, all attributes are synthesized attributes, and it allows for some inherited
attributes as well.
O a. 1
Ob. 2
O c. 3
Od. 0
Assistant
Poe
d. 0.
A Finite State Automaton (FSA) does not require any stacks; it operates using a finite number of states
without the need for additional memory structures like stacks.
Assistant
Poe
The switch statement in C++ is used to execute one block of code among many based on the value of a
variable.
b. Hill dimbing
d. Greedy search
Assistant
Poe
Breadth-first search (BFS) is an uninformed (blind) search algorithm, as it does not use any domain-
specific knowledge or heuristics to guide its search.
Which among the following measures how strongly the elements within a module are related?
a. cohesion
b. aggregation
Oc. inheritance
Od. coupling
Assistant
Poe
a. cohesion.
Cohesion measures how strongly the elements within a module are related to one another. High
cohesion is desirable in software design.
What is the term used to describe the collection of information stored in the database at a particular
moment?
O a. foreign key
b. an instance
Oc primary key
Od. schema
Assistant
Poe
b. an instance.
In the context of databases, an "instance" refers to the collection of information stored in the database
at a particular moment.
Which data structure allows deleting data elements from front and inserting at rear?
Ob. Deques
Oc. Stacks
Od. Queues
Assistant
Poe
d. Queues.
A queue allows deleting data elements from the front and inserting at the rear, following the First In,
First Out (FIFO) principle.
Oa. Netstat
Ob. Ping
c. Traceroute
Od. Tcpdump
Assistant
Poe
b. Ping.
The ping command is used to test the reachability of hosts on a network by sending ICMP echo request
packets and waiting for responses.
a. A module having low cohesion and high coupling is said to be functionally independent of other
modules.
OC. A module having high cohesion and low coupling is said to be functionally dependent of other
modules
Next
Assistant
Poe
Cohesion refers to how closely related and focused the responsibilities of a module are, making it a
measure of the functional strength of that module.
a. A module having low cohesion and high coupling is said to be functionally independent of other
modules.
OC. A module having high cohesion and low coupling is said to be functionally dependent of other
modules
Assistant
Poe
Context-free grammars are commonly used for syntax analysis in programming languages.
Assistant
Poe
Context-free grammars are primarily used for syntax analysis in programming languages.
Brute-force attacks are used most often against which types of access control?
Assistant
Poe
Brute-force attacks are most commonly targeted at passwords and PINs, as these can be systematically
guessed by trying various combinations.
Assistant
Poe
d. Class diagram.
A class diagram describes the static structure of a system by showing the system's classes, their
attributes, methods, and the relationships between them.
Which scheduling algorithm ensures that each process gets an equal share of the CPU time?
d. Priority Scheduling
Assistant
Poe
The Round Robin scheduling algorithm ensures that each process gets an equal share of CPU time by
allocating a fixed time slice to each process in a cyclic manner.
The data structure required for breadth first traversal on a graph is:
Oa. Stack
b. Tree
Oc. Queue
Od. Array
Assistant
Poe
c. Queue.
A queue is the data structure required for breadth-first traversal on a graph, as it follows the First In First
Out (FIFO) principle, allowing for the exploration of nodes level by level.
a. s_start()
Ob. session_start()
O c. start()
Od. session_str()
Assistant
Poe
b. session_start().
EP
| b | ba
Ob bcbbbcabbchaa
cacbcbbbbcabe
Od abbocabbcbbbcbbaca
Assistant
Poe
To determine which string is in the language generated by the grammar with the productions:
• A → aA
• A→b
• A → ba
Let's analyze each string:
1. bcbbbcabbchaa:
2. cacbcbbbbcabe:
3. abbocabbcbbbcbbaca:
None of the strings match the productions based on the provided grammar. Thus, none of the options
are valid strings in the language generated by the grammar.
Which one of the following places we cannot place our java script code?
Assistant
Poe
JavaScript code cannot be placed as an attribute in any tag. It should be placed in <script> tags within the
<head> or <body>, or in external files.
Poe
The data unit is not typically considered a separate component of a computer system, while the input
unit, control unit, and storage unit are all essential components.
In signal communication, the absolute value of the highest intensity of the signal proportional to the
energy it came is referred as
a. Pernod
b. Frequency
Attenuation
Od. Peak-amplitude
Assistant
Poe
d. Peak-amplitude.
In signal communication, the absolute value of the highest intensity of the signal is referred to as peak
amplitude.
a. Inheritance
b. Composition
d. Polymorphism
Assistant
Poe
Encapsulation in Object-Oriented Programming (OOP) refers to the bundling of data and methods that
operate on that data, along with restricting access to some of the object's components, which is
primarily about data hiding and abstraction.
Assistant
Poe
Both deterministic finite state automata (DFA) and nondeterministic finite state automata (NFA)
recognize the same class of languages (regular languages), meaning they are equivalent in terms of the
languages they can recognize.
Oa. The transport layer in OSI model is connection oriented and connectionless
Oc. TCP/IP model has seven layers while OSi model has four.
Od. OSI model provides clear distinction between services, interfaces and protocols while TCP/IP model
Assistant
Poe
The transport layer in the OSI model can support both connection-oriented (e.g., TCP) and
connectionless (e.g., UDP) communication.
Assistant
Poe
AI contributes to the study of human behavior and cognition by analyzing large datasets, allowing
researchers to identify patterns and gain insights into human behavior.
a. Full backup
b. Partial backup
Poe
d. Incremental backup.
An incremental backup strategy only backs up the files that have changed since the last backup, making
it efficient in terms of time and storage space.
Assistant
Poe
This statement does not describe a characteristic of software. The other options correctly describe
characteristics of software, such as its complexity, manufacturing process, and intangibility.
Which action of the bottom-up parsing moves terminals from input buffer to the stack?
Oa. Accept
b. Shift
Oc. Augment
Od. Reduce
Assistant
Poe
b. Shift.
In bottom-up parsing, the "shift" action moves terminals from the input buffer onto the stack.
Is the process of arranging the elements of a particular data structure in some logical orde
Oa. Insertion
Ob. Traversing
Oc. Merging
Od. Sorting
Assistant
Poe
d. Sorting.
Sorting is the process of arranging the elements of a data structure in a specific logical order.
<script type="text/javascript">
x=4+"4";
document.write(x);
</script>
a. 4
b. 8
c. 44
Poe
c. 44.
In the code, 4 + "4" results in string concatenation, so the output will be "44".
Oc. If it reaches any state and has no possible move for an input symbol
d. If the machine consumes all the input symbols in one of the states
Assistant
Poe
What is the regular expression for the set of strings that start with ab and end with bba over the
alphabet set (a, b)?
a. ab(ab)*bba
b. aba"b"bba
Oc ab(a+b)*bba
d. ab(a+b*)bba
Assistant
Poe
*a. ab(ab)bba.
This regular expression matches strings that start with "ab" and end with "bba," allowing for any number
of "ab" repetitions in between.
b. It is a protocol used for communication between a web browser and a web server
Assistant
Poe
This statement is false; HTTP messages do not have a specified minimum size. An HTTP message body
can indeed be empty, and the protocol is stateless.
Which condition in a resource allocation system refers to a situation where a set of processes are waiting
for resources held by each other, forming a circular chain?
Ob. No preemption
Poe
d. Circular wait.
This condition refers to a situation where a set of processes are waiting for resources held by each other,
forming a circular chain.
Assistant
Poe
DOM stands for Document Object Model, which is a programming interface for HTML and XML
documents.
Oc. Data-definition languages (DDL) specify Modification of information stored in the database
Od. Data-manipulation language (DML) is a language that enables users to access or manipulate data as
organized by the appropriate data model
Assistant
Poe
This statement is incorrect because DDL is used for defining the database schema, not for modifying
data. Data Manipulation Language (DML) is used for modifying information stored in the database.
Oa. Element
Ob. Array
Oc. Node
Od. Attribute
Assistant
Poe
c. Node.
In the HTML DOM, everything is represented as a node. This includes elements, attributes, and text.
Ob. Micro-operation
Oc. Registration
Od. Accumulation
Assistant
Poe
b. Micro-operation.
Which one of the following is not unique for every computer in the network?
Assistant
Poe
d. Subnet mask.
The subnet mask is not unique for every computer in the network; it can be the same for multiple
devices on the same subnet. In contrast, MAC addresses, IPv4 addresses, and IPv6 addresses are unique
to each device.
In PHP, are predefined variables that are accessible throughout your script.
b. Reserved variables
c. Superglobals
Assistant
Poe
The correct option is:
c. Superglobals.
In PHP, superglobals are predefined variables that are accessible throughout your script.
Oa. Stack
b. Linked List
Oc. Queue
Od. Trees
Assistant
Poe
b. Linked List.
Polynomial addition is commonly implemented using linked lists, where each node represents a term of
the polynomial.
Which of the following access control services determines what a subject can dor
a. Accountability
Ob. Audit
Oc. Authorization
Od. Authentication
Assistant
Poe
c. Authorization.
Authorization determines what a subject can do in terms of access control services.
Which one of the following is not used to determine the CPU state at the end of the execute cycle?
Assistant
Poe
The content of the data bus is not used to determine the CPU state at the end of the execute cycle. The
other options are relevant for assessing the CPU state.
Assistant
Poe
This definition best describes a database, as it emphasizes the organization of data in a structured
manner.
Which one of the following property of a graph represents the number of derivation steps needed to
generate a valid string?
Assistant
Poe
The path of a vertex from the root represents the number of derivation steps needed to generate a valid
string in a graph.
Which function of a contemporary operating system focuses on providing users with easy access to
applica resources?
a. Device management
b. File management
c. Process management
Assistant
Poe
User interface management focuses on providing users with easy access to application resources.
Which SQL command is used to retrieve data from a database?
O a. UPDATE
Ob. INSERT
Oc. SELECT
Od. DELETE
Assistant
Poe
c. SELECT.
a. Brute-force Attack
Od. Eavesdropping
Assistant
Poe
c. Logic Bomb.
A logic bomb is not specifically an attack on passwords; it is a piece of malicious code designed to trigger
under specific conditions. The other options directly relate to password attacks.
a. The grass has been wet every time it has rained. Thus, when it rains, the grass gets wet.
b. When it rains, the grass gets wet. It rains. Thus the grass is wet.
c. When it rains, the grass gets wet. The grass is wet. It rains.
Od. When it rains, the grass gets wet. The grass is wet, it must have rained
Assistant
Poe
b. When it rains, the grass gets wet. It rains. Thus the grass is wet.
This is an example of deductive reasoning, where a general rule is applied to a specific case to reach a
conclusion.
What is the command used to change permissions of a file for different users?
Oa. Permission
b. Perm
Oc. Modify
Od. Chmod
Assistant
Poe
d. Chmod.
The chmod command is used to change permissions of a file for different users in Unix and Linux
systems.
Oa. Finite
Od. Ambiguity
Assistant
Poe
d. Ambiguity.
Ambiguity is not a property of an algorithm; in fact, algorithms should be unambiguous. The other
options (finite, input and output, correct) are properties of an algorithm.
What are the factors to be considered when planning a software development effort?
Assistant
Poe
These factors are essential to consider when planning a software development effort.
What is the term used to describe a blueprint for creating objects in OOP?
Oa. Method
Ob. Class
Oc. Instance
Od. Object
Assistant
Poe
b. Class.
Which OOP principle emphasizes the separation of concerns by dividing a program into smaller,
manageable parts?
Oa Inheritance
b. Modularity
c. Abstraction
Od Encapsulation
Assistant
Poe
b. Modularity.
Modularity emphasizes the separation of concerns by dividing a program into smaller, manageable parts.
Which data structure is used to represent the grammatical structure of the source program constructs?"
a. Stack
Ob. Queue
Oc Tree
O d. 2d-array
Assistant
Poe
c. Tree.
A tree data structure is commonly used to represent the grammatical structure of source program
constructs, particularly in compilers and interpreters.
What is the main advantage of using references (&) in C++ compared to pointers?
Assistant
Poe
This is a main advantage of using references in C++ compared to pointers, as references must always
refer to a valid object and cannot be null.
Which one of the following class of running time functions is the best?
Oa. Exponential
b. Logarithmic
Oc. Linear
Od. Polynomial
Assistant
Poe
b. Logarithmic.
Logarithmic time complexity is the best among the options listed, as it grows the slowest relative to the
size of the input.
O a. < p >
Assistant
Poe
a. <p>
Oa. Hardware
b. Machine language
c. High-level language
Assistant
Poe
a. Hardware.
Hardware is the lowest level in computer architecture, as it refers to the physical components of a
computer system.
a. System threat is a state which exposes the system for possible attacks
b. System attack is set of activities that may expose the system for possible dangers
Oc. Vulnerability is a flaw in the system's design that may be exploited by attackers
Od. System protection is a process of disconnecting the system from any communication
Assistant
Poe
This statement accurately describes what a vulnerability is in the context of computer security.
Oa. Request-based
Ob. Communication
c. Automation
Od. Simplicity
Assistant
Poe
While communication, automation, and simplicity are principles of effective system administration,
"request-based" is not recognized as a core principle.
O a. Cache
Ob. Func
Oc. Mnemonics
Od. Register
Assistant
Poe
c. Mnemonics.
Mnemonics are the symbolic names given to machine-level instructions in assembly language, making
them easier for programmers to read and write.
a. Code optimization can only be done before the actual code is generated
b. Code optimization can only be done after the actual code is generated
Od. Code optimization cannot be done before the actual code is generated
Assistant
Poe
Code optimization can occur at various stages, including on intermediate representations of the code,
not just before or after code generation.
Assistant
Poe
Loops are used in programming to repeatedly execute a section of code based on a specified condition.
Assistant
Poe
The data structure used in the standard implementation of Depth First Search is
a. Stack
b. Linked List
c. Queue
Od. Array
Assistant
Poe
a. Stack.
Depth First Search (DFS) typically uses a stack data structure for its implementation, either explicitly or
through recursive function calls.
Oa. Coaxial
b. Fiber Optic
Oc. RJ-45
Assistant
Poe
b. Fiber Optic.
Fiber optic cables are the best for data transmission as they offer higher bandwidth, faster speeds, and
greater distance capabilities compared to other cable types.
The set of rules that govern all aspect of data communication between computers on a network are
referred as
Oa. Language
b. Syntax
c. Access methods
Od. Protocol
Assistant
Poe
d. Protocol.
Protocols are sets of rules that govern data communication between computers on a network, ensuring
proper data exchange and communication.
Which type of database replication offers the highest level of data consistency but may introduce higher
later distributed systems?
a. Multi-master replication
b. Asynchronous replication
OcSynchronous replication
d. Semi-synchronous replication
Next
Assistant
Poe
Synchronous replication offers the highest level of data consistency because data is written to all replicas
at the same time. However, it can introduce higher latency in distributed systems due to the need for all
replicas to acknowledge the write before proceeding.
is a special-purpose program or command line interpreter that read commands typed by a user and
execute programs in response to entered commands.
Oa. Kernel
b. Terminal
Oc. Process
Od. Shell
Assistant
Poe
d. Shell.
A shell is a special-purpose program or command line interpreter that reads commands typed by a user
and executes programs in response to those commands.
Assistant
Poe
Assistant
Poe
Defining the scope of a software project involves outlining the deliverables, functionality, data
requirements, and technical structure to ensure clarity and direction throughout the project.
would be more suitable to store items in a shopping cart to be available when the user revisits the site in
a couple of days.
a. Cache
b. Cookies
c. Basket
Od. Session
Next
Assistant
Poe
Cookies are more suitable for storing items in a shopping cart, as they can persist data across sessions,
allowing items to remain available when the user revisits the site later.
is an operation of in which each letter of a plaintext changes its position but retains its identity in
cryptographic algorithms.
a. Transposition
b. Substitution
c. Block cipher
d. Mono-alphabetic
Assistant
Poe
a. Transposition.
Transposition is an operation in which each letter of a plaintext changes its position while retaining its
identity in cryptographic algorithms.
Assistant
Poe
In asymmetric cryptography, the message is encrypted using the receiver's public key, ensuring that only
the receiver can decrypt it with their private key.
Assistant
Poe
ACID stands for Atomicity, Consistency, Isolation, and Durability, which are the key properties that ensure
reliable processing of database transactions.
Assistant
Poe
b. Class diagram
d. Activity diagram
Assistant
Poe
b. Class diagram.
A class diagram describes the static structure of a system by showing the classes, their attributes,
methods, and the relationships between them.
Is the process of arranging the elements of a particular data structure in some logical order?
O a. Insertion
Ob. Merging
c. Traversing
d. Sorting
Assistant
Poe
d. Sorting.
Sorting is the process of arranging the elements of a particular data structure in some logical order.
Which ACID property ensures that a transaction either completes in its entirety or has no effect at all?
a. Durability
b. Consistency
Oc. Isolation
Od. Atomicity
Assistant
Poe
d. Atomicity.
The Atomicity property ensures that a transaction either completes in its entirety or has no effect at all,
meaning it is treated as a single, indivisible unit.
In signal communication, the absolute value of the highest intensity of the signal proportional to the
energy it camies is referred as
a. Peak-amplitude
b. Period
Oc. Frequency
d. Attenuation
Assistant
Poe
a. Peak-amplitude.
Peak amplitude refers to the absolute value of the highest intensity of a signal, which is proportional to
the energy it carries.
Which of the following is a correct statement?
Oa. System protection is a process of disconnecting the system from any communication
Ob. Vulnerability is a flaw in the system's design that may be exploited by attackers
c. System threat is a state which exposes the system for possible attacks
Od. System attack is set of activities that may expose the system for possible dangers
Assistant
Poe
Ob. Vulnerability is a flaw in the system's design that may be exploited by attackers.
This statement accurately describes what a vulnerability is in the context of system security.
Assistant
Poe
The switch statement in C++ is used to select one of many code blocks to be executed based on the value
of a variable.
Ob. Attempts to increase CPU utilization by always having something for the CPU to execute
c. Makes efficient use of the CPU by overlapping the demands for the CPU and its I/O devices from
various users
d. The CPU switches from program to program, running each for tens or hundreds of milliseconds. Thes
provides economical interactive use of a system
Next
Assistant
Poe
Oa. Copying one's programs or data; using system resources (CPU, memory, disk space, peripheral)
without proper accounting.
This statement does not represent an advantage of multiprogramming; rather, it suggests a misuse of
system resources.
You are the administrator of an active directory domain. A user complains to you that he is unable to
change his password. No other users have this issue. What is the most likely cause of the problem?
Od. The property User cannot change password has been enabled when it was created
Assistant
Poe
This setting would prevent the user from changing their password, which aligns with the complaint.
Od. A field in one table that refers to the primary key in another table
Assistant
Poe
Od. A field in one table that refers to the primary key in another table.
A foreign key establishes a relationship between two tables by linking a field in one table to the primary
key of another table.
In a healthcare database system, which concept is crucial for ensuring patient data privacy and security?
a. Data Replication
b. Data Mining
O Data Encryption
Od Data Warehousing
Assistant
Poe
O. Data Encryption.
Data encryption is crucial for ensuring patient data privacy and security in a healthcare database system,
as it protects sensitive information from unauthorized access.
a. Information Knowledge
b. Transition knowledge
c. Procedural knowledge
d. Declarative knowledge
Assistant
Poe
c. Procedural knowledge.
Procedural knowledge represents the "how-to" aspect of tasks, such as driving a car, as it involves the
processes and procedures required to perform actions.
Assistant
Poe
a. If the machine consumes all the input symbols in one of the states
Od. If it reaches any state and has no possible move for an input symbol
Assistant
Poe
A Turing Machine accepts an input when it reaches a final (or accepting) state after processing the input.
Assistant
Poe
Context-free grammars are commonly used in syntax analysis for programming languages, as they can
effectively describe the structure of expressions and statements.
Which function of a contemporary operating system focuses on providing users with easy access to
applications and resources?
b. File management
Device management
d. Process management
Next
Assistant
Poe
User interface management focuses on providing users with easy access to applications and resources,
enabling them to interact with the operating system effectively.
b. High availability
c. Scalability
Assistant
Poe
NoSQL databases typically do not enforce a strict schema, allowing for more flexibility in data models.
One of the following Key ideas wrongly matched in object-oriented?
Assistant
Poe
This statement is misleading because a class itself does not hold values; it defines the structure and
behavior of objects, while the actual values are held by instances (objects) of the class.
The data structure required for breadth first traversal on a graph is:
O a. Queue
Ob. Tree
stion
c. Stack
Od. Array
Assistant
Poe
a. Queue.
Breadth-first traversal on a graph uses a queue to keep track of the nodes to be explored next.
What is the main advantage of using references (&) in C++ compared to pointers?
Assistant
Poe
One of the main advantages of using references in C++ is that they cannot be null, which adds a level of
safety compared to pointers, which can point to null or arbitrary memory locations.
Which action of the bottom-up parsing moves terminals from input buffer to the stack?
Oa. Accept
Ob. Reduce
Oc. Augment
Od. Shift
Assistant
Poe
d. Shift.
In bottom-up parsing, the "shift" action moves terminals from the input buffer onto the stack.
Od. RISC use complex and efficient machine instructions when compared to CISC
Assistant
Poe
RISC (Reduced Instruction Set Computer) architectures typically feature a hardwired control unit and are
designed to support pipelining, which enhances instruction throughput.
Assistant
Poe
Both deterministic finite automata (DFA) and nondeterministic finite automata (NFA) recognize the same
class of languages (regular languages) and can be converted into each other.
If a problem can be broken into sub-problems that are reused several times, the problem property.
a. Greedy
b. Optimal substructure
Oc. Memoization
Assistant
Poe
d. Overlapping sub-problems.
This property describes problems that can be divided into sub-problems which are reused multiple
times, making them suitable for techniques like dynamic programming.
What is the name of a grammar in which all attributes of the grammar symbols are synthesized attribute
form of inherited attributes?
a. S-attributed grammar
b. M-attributed grammar
L-attributed grammar
Ne
Assistant
Poe
a. S-attributed grammar.
In an S-attributed grammar, all attributes are synthesized attributes, meaning they are computed from
the attributes of the children nodes in the parse tree.
Od. It is a protocol used for communication between a web browser and a web server
Assistant
Poe
This statement is false because HTTP messages do not have a specified minimum size; they can be empty
or very small, depending on the context.
What is the term used to describe the collection of information stored in the database at a particular
moment?
Oa primary key
Ob. schema
C. an instance
Next
Assistant
Poe
c. an instance.
An instance refers to the collection of information stored in the database at a particular moment,
representing the current state of the data.
Ob. Registration
Oc. Micro-operation
Od. Accumulation
Assistant
Poe
c. Micro-operation.
a. Partial backup
c. Incremental backup
Clear my choice
age
Assistant
Poe
c. Incremental backup.
An incremental backup strategy backs up only the files that have been modified since the last backup,
whether that was a full backup or another incremental backup.
Which way to define Scope of Software Project?
Assistant
Poe
This approach effectively outlines the scope of a software project by specifying what will be delivered,
the required functionalities, the data involved, and the technical structure.
Which among the following measures how strongly the elements within a module are related?
O a. inheritance
b. aggregation
Oc. coupling
Od. cohesion
Assistant
Poe
d. cohesion.
Cohesion measures how strongly the elements within a module are related to each other. Higher
cohesion indicates that the elements are closely related in terms of functionality.
b. Linked List
Oc. Queue
Od. Trees
ge
Assistant
Poe
b. Linked List.
Polynomial addition is typically implemented using linked lists, as they can efficiently represent the
terms of a polynomial and allow for easy manipulation of the terms during addition.
O a. Reply
Ob. DoS
c. Traffic analysis
d. Masquerade
Assistant
Poe
c. Traffic analysis.
Traffic analysis is considered a passive attack because it involves monitoring and analyzing the traffic
patterns without altering the data being transmitted.
Which one of the following property of a graph represents the number of derivation steps needed to
generate a v string?
Oc Parent vertex
Next
Assistant
Poe
The path of a vertex from the root in a graph represents the number of derivation steps needed to
generate a string, as it reflects the sequence of steps taken to reach that vertex from the root.
Which one of the following is not used to determine the CPU state at the end of the execute cycle?
Assistant
Poe
Oa. Request-based
Ob. Automation
c. Communication
Od. Simplicity
Assistant
Poe
a. Request-based.
"Request-based" is not typically considered a principle of system administration. The principles usually
focus on automation, communication, and simplicity to enhance efficiency and effectiveness in managing
systems.