Download as pdf or txt
Download as pdf or txt
You are on page 1of 181

Database query processing pass through the following steps

except

a.

Scanning and Parsing

b.

Query Optimization

c.

Query Code Generation

d.

interpreted or compiled

e.

All

f.
None

Feedback

The correct answer is: None

Question 2

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following schedule recoverable type a


transaction can neither read or write an item X until the last
transaction that wrote X has committed or aborted?

a.

Cascade less schedule

b.

Strict schedule
c.

Recoverable schedule

d.

cascaded rollback schedule

e.

All

f.

None

Feedback

The correct answer is: Strict schedule

Question 3

Correct

Mark 1.00 out of 1.00

Flag question
Question text

In which allocation type each file block contains a pointer to the


next file block.

a.

Contiguous allocation

b.

Linked allocation

c.

Index allocation

d.

All

e.

None

Feedback

The correct answer is: Linked allocation


Question 4

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the difference between servlet and JSP?

a.

Compilation

b.

Translation

c.

Syntax

d.
Both A and B

Feedback

The correct answer is: Syntax

Question 5

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is false?

a.

event log stores more information than syslog

b.

Syslog servers are used to collect syslog messages in a single


location.

c.
Syslog Listener allows the server to receive messages by gathering
Syslog data

d.

Syslog is installed by default on Windows systems

Feedback

The correct answer is: Syslog is installed by default on Windows


systems

Question 6

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

A web cookie is a small piece of data that is _______

a.

sent from a website and stored in user’s web browser while a user
is browsing a website
b.

sent from user and stored in the server while a user is browsing a
website

c.

sent from root server to all servers

d.

sent from the root server to other root servers

Feedback

The correct answer is: sent from user and stored in the server while
a user is browsing a website

Question 7

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
a.

OutOfMemoryException

b.

FormatException
c.

IndexOutOfRangeException

d.

TimeoutException

e.

FormatException

Feedback

Your answer is incorrect.


The correct answer is:

IndexOutOfRangeException

Question 8

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which of the following variables does PHP use to authenticate a
user? i) $_SERVER['PHP_AUTH_USER'], ii)
$_SERVER['PHP_AUTH_USERS'], iii) $_SERVER['PHP_AUTH_PU'], iv)
$_SERVER['PHP_AUTH_PW'].

a.

ii) and iv)

b.

i) and iv)

c.

ii) and iii)

d.

i) and ii)

Feedback

The correct answer is: i) and iv)

Question 9

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

You are the administrator for your company domain you need to
subdivide group in your organization with in active directory. if you
want to separate sales from IT department what could you use us a
system of organization the subdivision

a.

Use user and group

b.

Create Department

c.

Create Domain

d.

Create OU
e.

Create Tree and DC

Feedback

The correct answer is: Create OU

Question 10

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

You are developing a smartphone, when suddenly your competitor


has launch a smartphone, which is better than yours is. Therefore,
you made some changes to the product, which cause Work
Breakthrough Structure (WBS) elements to be amended heavily.
what kind of changes have you made to your project?

a.

Change in scope

b.

Change in schedule
c.

Change in quality

d.

None of the above

Feedback

The correct answer is: Change in scope

Question 11

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which cable arrangement is used for connecting router with


computer?

a.

Crossover
b.

Straight through

c.

Serial

d.

All

e.

Except B

Feedback

The correct answer is: Crossover

Question 12

Correct

Mark 1.00 out of 1.00


Flag question

Question text

One is the advantages of dynamic routing Protocol?

a.

Minimal CPU

b.

It increases the Load on router CPU/RAM

c.

No bandwidth overhead

d.

Ability to load balance b/n multiple links

Feedback

The correct answer is: Ability to load balance b/n multiple links

Question 13
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What method is most effective for preventing an ESD event when


installing RAM?

a.

Placing the computer on an anti-static mat

b.

Wearing an anti-static wrist strap

c.

Staying in contact with an unpainted metal part of the computer

d.

Wearing rubber-soled shoes and using the buddy system by


having another technician standing by
Feedback

The correct answer is: Wearing an anti-static wrist strap

Question 14

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following define the correct difference between


object-oriented programming and procedure-oriented
programming?

a.

In procedure-oriented the program is divided into small parts


called functions, In object-oriented programming, the program is
divided into small parts called objects.

b.

A procedure-oriented programming language emphasizes doing


things or algorithms, An object-oriented language emphasizes
data rather than procedure.
c.

In procedure object -oriented provides data hiding so it is more


secure,In object-oriented does not have any proper way of hiding
data so it is less secure.

d.

In procedure-oriented programming has access modifier , In


object-oriented programming does not have access modifier

e.

A&B

f.

C&D

Feedback

The correct answer is: In procedure object -oriented provides data


hiding so it is more secure,In object-oriented does not have any
proper way of hiding data so it is less secure.

Question 15

Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which steps are included in use case driven iterative development?

a.

At each iteration, one or more use cases are selected for


implementation

b.

Iteration should be followed until the system is complete

c.

Iterative development builds system functionality gradually


through analysis, design, coding, testing and evaluation

d.

All of the mentioned

Feedback

The correct answer is: All of the mentioned


Question 16

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following used for developing web-based


applications which run on web browsers?

a.

ASP.Net

b.

WinForm

c.

Both ASP.NET and WinForm

d.
Ado.Net

e.

All except A

Feedback

The correct answer is: ASP.Net

Question 17

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What will be the cipher text of a message (plain text)= ”doit” by


Caesar cipher cryptographic algorithm, while k=3 dawn in the
alphabet.

a.

grlw
b.

hsmx

c.

itny

d.

grmx

Feedback

The correct answer is: grmx

Question 18

Correct

Mark 1.00 out of 1.00

Flag question

Question text

From the following organization which one is the founder of


wireless router network device?
a.

Netgear

b.

Extreme Network

c.

Cisco

d.

Huawei

e.

None

Feedback

The correct answer is: Cisco

Question 19

Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is the function of Presentation Layer?

a.

Translation

b.

Encryption

c.

Compression

d.

All

Feedback

The correct answer is: All


Question 20

Correct

Mark 1.00 out of 1.00

Flag question

Question text

_____________ present a list of items where the user can click and
select the items from the list and which are presented in a drop-
down list.

a.

Radio Button

b.

CheckBox

c.

listBox
d.

ComboBox

Feedback

The correct answer is: ComboBox

Question 21

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a disadvantage of OOD?

a.

Easier maintenance

b.

Objects may be understood as stand-alone entities


c.

Objects are potentially reusable components

d.

None

Feedback

The correct answer is: None

Question 22

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which object is used by spring for authentication?

a.

ContextHolder
b.

SecurityHolder

c.

AnonymousHolder

d.

SecurityContextHolder

Feedback

The correct answer is: SecurityContextHolder

Question 23

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
a.

[A, B, C]

b.

[A, B]

c.

[B, A]

d.

An exception occurs at runtime

Feedback
Your answer is incorrect.
The correct answer is:

[B, A]

Question 24

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

When start() method is called on thread it enters __ state.

a.

running

b.

runnable

c.
new

d.

Waiting

Feedback

The correct answer is: runnable

Question 25

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statement best describe relational data


model?

a.

It is a database model that allows multiple records to be linked to


the same owner file.
b.

It structures data in a tree like structure using parent to child


relationship.

c.

It is a database model to manage data as tuples grouped into


relations

d.

It is a model that use concepts such as entities, attributes, and


relationships

e.

Describe how data is stored in the computer, representing


information such as record structures, record ordering, and access
paths.

Feedback

The correct answer is: It is a database model to manage data as


tuples grouped into relations

Question 26

Correct
Mark 1.00 out of 1.00

Flag question

Question text

The major benefit of preventive maintenance is

a.

Lengthen asset lifespan.

b.

Increase efficiency

c.

Decrease unplanned downtime.

d.

Save money.

e.
None

Feedback

The correct answer is: None

Question 27

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What will be the output of the following JavaScript code?

a.

10

b.

50
c.

d.

Error

Feedback

The correct answer is: 50

Question 28

Correct

Mark 1.00 out of 1.00

Flag question

Question text

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’.
Which one of the following is the property of ‘p’ and ‘q’?

a.

p and q should be divisible by phi.


b.

p and q should be co-prime

c.

p and q should be prime

d.

p/q should give no remainder

Feedback

The correct answer is: p and q should be prime

Question 29

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following data manipulation command is used to


associate records from two or more tables?
a.

SELECT

b.

PROJECT

c.

ALTER

d.

JOIN

Feedback

The correct answer is: JOIN

Question 30

Correct

Mark 1.00 out of 1.00


Flag question

Question text

Uml _______________ Diagram describe software components and


their dependency to each other.

a.

Deployment Diagram

b.

Activity Diagram

c.

Use case diagram

d.

Component Diagram

Feedback

The correct answer is: Component Diagram

Question 31
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statements is true about the Trojans?

a.

Trojans perform tasks for which they are designed or programmed

b.

Trojans replicates them self's or clone them self's through an


infections

c.

Trojans do nothing harmful to the user's computer systems

d.

None of the above


Feedback

The correct answer is: Trojans perform tasks for which they are
designed or programmed

Question 32

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which component is responsible for running background tasks in


an app?

a.

Activity

b.

BroadcastReceiver

c.
Service

d.

None of the above

Feedback

The correct answer is: Service

Question 33

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why TCP communication is reliable than UDP?

a.

Because TCP is connection less

b.
Because UDP is connection oriented

c.

Because TCP is connection oriented while UDP is connection less

d.

None

Feedback

The correct answer is: Because TCP is connection oriented while


UDP is connection less

Question 34

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which variable is used to collect form data sent with both the GET
and POST methods?
a.

$_BOTH

b.

$REQUEST

c.

$_REQUEST

d.

$BOTH

Feedback

The correct answer is: $_REQUEST

Question 35

Correct

Mark 1.00 out of 1.00

Flag question
Question text

What is/are the main functions of Router Network Device?

a.

Selecting the lowest cost during packet transfer from one node to
the next

b.

Selecting the minimum distance during packet transfer

c.

Selecting the minimum latency during packet transfer from one


node to the next

d.

All

Feedback

The correct answer is: All

Question 36

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Assume the following method is properly synchronized and called


from a thread A on an object B: wait(2000); After calling this
method, when will the thread A become a candidate to get
another turn at the CPU?

a.

After thread A is notified, or after two seconds.

b.

Two seconds after thread A is notified.

c.

After the lock on B is released, or after two seconds.

d.

Two seconds after lock B is released

Feedback
The correct answer is: After thread A is notified, or after two
seconds.

Question 37

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is correct about types of contracts?

a.

Fixed-price or lump-sum: involve a fixed total price for a well-


defined product or service

b.

Cost-reimbursable: involve payment to the seller for direct and


indirect costs

c.
Time and material contracts: hybrid of both fixed-price and cost-
reimbursable, often used by consultants

d.

Unit price contracts: require the buyer to pay the seller a


predetermined amount per unit of service

e.

All are correct

Feedback

The correct answer is: All are correct

Question 38

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What function does the POST perform in computer?


a.

Figure out what hardware is on the computer and makes sure it is


running properly

b.

Tells the CPU how to run individual devices

c.

Store the BIOS

d.

Store basics data like the date and the startup method

Feedback

The correct answer is: Figure out what hardware is on the


computer and makes sure it is running properly

Question 39

Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which kind of recovery approach applies cache page updated by a


transaction can be written to disk before the transaction commits

a.

No-steal approach

b.

Force approach-

c.

Steal approach

d.

No-force approach

e.

All
f.

None

Feedback

The correct answer is: Steal approach

Question 40

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

When Exceptions in Java does arises in code sequence?

a.

Run time

b.

Compilation time
c.

It can occur any time

d.

None of the above

Feedback

The correct answer is: Run time

Question 41

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which schema of the three-schema Architecture describe the


structure of the whole database?

a.

Internal schema
b.

Conceptual schema

c.

External schema

d.

schema

Feedback

The correct answer is: Conceptual schema

Question 42

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why do you think most project managers use Gantt chart format
more commonly than the network format?
a.

It helps in tracking both time and interdependencies between tasks

b.

It helps in better understanding and better risk analysis of the


project

c.

It helps in analyzing the tasks to complete the project the time


required to complete tasks

d.

All of the above

Feedback

The correct answer is: All of the above

Question 43

Correct

Mark 1.00 out of 1.00

Flag question
Question text

What is an Android Style?

a.

A component of an Android app that provides data to other apps

b.

A type of mobile device

c.

A set of attributes that define the appearance of a view or activity

d.

A container for the user interface of an app

Feedback

The correct answer is: A set of attributes that define the


appearance of a view or activity

Question 44

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What are the basic ways to handle a risk?

a.

Avoid: The best thing you can do with a risk is avoid it

b.

Mitigate: taking some sort of action that will cause it to do as little


damage to your project as possible.

c.

Transfer: The most common way to do this is to buy insurance

d.

Accept: When you can’t avoid, mitigate, or transfer a risk, then you
have to accept it.
e.

None

Feedback

The correct answer is: None

Question 45

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

A function or method that run a specific action when a specific


event is triggered

a.

Action listener

b.

Trigger functions
c.

Mouse click

d.

Event Handlers

Feedback

The correct answer is: Event Handlers

Question 46

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What types callback method is called when the android activity


becomes visible to the user.

a.

onCreate()
b.

onStart()

c.

onRestart()

d.

onResume()

Feedback

The correct answer is: onStart()

Question 47

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
a.

b.

c.

d.

Feedback

Your answer is incorrect.


The correct answer is:

Question 48

Correct

Mark 1.00 out of 1.00

Flag question

Question text

____________ is not included in the architecture of .NET Framework .

a.

Class library

b.

Form

c.

Common Language RunTime (CLR)


d.

Language

Feedback

The correct answer is: Form

Question 49

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is JavaScript?

a.

JavaScript is a scripting language used to make the website


interactive

b.
JavaScript is an assembly language used to make the website
interactive

c.

JavaScript is a compiled language used to make the website


interactive

d.

Its platform independent scripting language

e.

A and D

Feedback

The correct answer is: A and D

Question 50

Correct

Mark 1.00 out of 1.00

Flag question
Question text

Under what conditions should you consider manually establish a


Restore Point?

a.

After you update a driver and it causes a problems with the system
that rolling back the driver does not resolve

b.

Whenever you can't get into Safe Mode to reconfigure the driver
loading process

c.

Before you install a new software program and it creates problems


with the system that uninstalling the software does not resolve

d.

Anytime you need to get back to a point where you know the
system was functioning correctly

Feedback

The correct answer is: Before you install a new software program
and it creates problems with the system that uninstalling the
software does not resolve
Question 51

Correct

Mark 1.00 out of 1.00

Flag question

Question text

A program that can retrieve files from the World Wide Web and
render text, images or sounds encoded in the files.

a.

Browser

b.

Internet

c.

Server

d.
Web Server

Feedback

The correct answer is: Browser

Question 52

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is true about CASE SQL statement ?

a.

It is a way to establish a loop in SQL.

b.

It is a way to establish an IF-THEN-ELSE in SQL

c.
It is way to establish a data definition in SQL

d.

All of the above.

Feedback

The correct answer is: It is a way to establish an IF-THEN-ELSE in


SQL

Question 53

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is not the benefit of VLAN?

a.

Limits the size of broadcast domains

b.
Improves network performance

c.

Provides a level of security

d.

increase the broadcasting domain of the traffic on the network

Feedback

The correct answer is: increase the broadcasting domain of the


traffic on the network

Question 54

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which access modifier makes only the class member access within
its own package and, in addition, by a subclass of its class in
another package?
a.

Public

b.

Protected

c.

Private

d.

None

Feedback

The correct answer is: Protected

Question 55

Incorrect

Mark 0.00 out of 1.00

Flag question
Question text

Under the School of Computing and Informatics there are different


department, such as IT, CS, IS, and SE. Each department has the
same attributes such as student name, id number, and batch.
Which comes under a class Student then this comes under which
type of inheritance?

a.

Multilevel inheritance

b.

Hierarchical inheritance

c.

Multiple inheritances

d.

All of the above

Feedback

The correct answer is: Hierarchical inheritance

Question 56
Correct

Mark 1.00 out of 1.00

Flag question

Question text

What does PHP stand for?

a.

PHP stands for Preprocessor Home Page

b.

PHP stands for Pretext Hypertext Processor

c.

PHP stands for Hypertext Preprocessor

d.

PHP stands for Personal Hyper Processor

Feedback
The correct answer is: PHP stands for Hypertext Preprocessor

Question 57

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is correct about android.webkit libraries?

a.

Used to render and manipulate text on a device display.

b.

A set of classes intended to allow web-browsing capabilities to be


built into applications.

c.

The fundamental building blocks of application user interfaces.


d.

A Java interface used to open 3D graphics rendering API.

Feedback

The correct answer is: A set of classes intended to allow web-


browsing capabilities to be built into applications.

Question 58

Correct

Mark 1.00 out of 1.00

Flag question

Question text

When the frames are distributed to different systems on the


network, header will be added to the frame to define the sender
and/or receiver of the frame, in which OSI layer this header will be
added to the frames?

a.

Data link layer

b.

Physical layer
c.

Transport layer

d.

Network Layer

Feedback

The correct answer is: Data link layer

Question 59

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a primary method that organization


needs to use to protect against loss of confidentiality?

a.

Back-up
b.

Fault tolerance systems

c.

Redundant systems

d.

Encryption

e.

All except D

Feedback

The correct answer is: Encryption

Question 60

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Computer A is able to communicate with all computers found in


the same network. But it is not able to communicate to computer B
which is found in another network. What could be the problem of
computer?

a.

It may not have IP address

b.

Its subnet mask may not be assigned

c.

It may not be in the same class network with computer B

d.

Its default gate way may not be configured correctly

Feedback

The correct answer is: It may not be in the same class network with
computer B
Question 61

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is are Handling Modes, in Preference Order in project


management?

a.

Confrontation, Compromise, Smoothing, Forcing, Withdrawal

b.

Forcing, Withdrawal, Confrontation, Compromise, Smoothing

c.

Compromise, Smoothing, Confrontation, Forcing, Withdrawal

d.
Smoothing, Forcing, Withdrawal, Confrontation, Compromise

Feedback

The correct answer is: Confrontation, Compromise, Smoothing,


Forcing, Withdrawal

Question 62

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Suppose you are employed as a lab technician in Mizan-Tepi


University and you get a call to fix “Hard Drive Not Found” error.
What will be your first best solution in this scenario?

a.

Turn your system off and remove its power cord or the battery and
reconnect it after 15 seconds.

b.

Check if the connector inside the computers is loose, then you can
visit a professional as it would require soldering.
c.

Report the issue to the IT department so that the can see other
options

d.

Simply remove the hard drive and replace it with the other one

Feedback

The correct answer is: Turn your system off and remove its power
cord or the battery and reconnect it after 15 seconds.

Question 63

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Why is testing important in project management?

a.
Testing will identify defects, reduce faults, and increase the overall
quality of the system.

b.

It is focused on preventing problems being passed on to the


internal or external customer.

c.

It is one of quality control method

d.

All

Feedback

The correct answer is: All

Question 64

Correct

Mark 1.00 out of 1.00

Flag question
Question text

What is the correct HTML code for inserting an image?

a.

<img alt="MyImage" image.gif /img>

b.

<image src="image.gif" alt="MyImage">

c.

<img src="image.gif" alt="MyImage">

d.

<img href="image.gif" alt="MyImage">

Feedback

The correct answer is: <img src="image.gif" alt="MyImage">

Question 65

Correct
Mark 1.00 out of 1.00

Flag question

Question text

How do you define kernel?

a.

An intermediary software between OS and memory usage

b.

Manages resources for a computer's operating system only

c.

The connection between hardware and the applications being used

d.

Software instructions for communication with input/output devices

Feedback

The correct answer is: The connection between hardware and the
applications being used
Question 66

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

In which file organization types insertion is expensive and


searching is very efficient

a.

Sequential file organization

b.

Heap file organization

c.

Hash file organization

d.
All

e.

None

Feedback

The correct answer is: Sequential file organization

Question 67

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is true about dynamic IP address assignment?

a.

Better DNS support

b.
Convenient remote access

c.

More reliable communication

d.

Strong security

Feedback

The correct answer is: Strong security

Question 68

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

In which one of the following cardinality, an occurrence in entity A


can be associated with at most one occurrence in entity B and
however an occurrence in B can be associated with any number
(zero or more) of occurrences in A.
a.

One-to-many

b.

Many-to-one

c.

One-to-one

d.

Many-to-many

Feedback

The correct answer is: One-to-one

Question 69

Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which attribute specifies a unique alphanumeric identifier to be


associated with an element?

a.

Type

b.

tag

c.

ID

d.

Class

Feedback

The correct answer is: ID

Question 70

Correct
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not true about heterogeneous database?

a.

A huge data can be stored in one Global center from different data
center

b.

Remote access is done using the global schema.

c.

All data center has same software and appears to user as a single
system.

d.

Different DBMSs may be used at each node.


e.

None

Feedback

The correct answer is: All data center has same software and
appears to user as a single system.

Question 71

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is false?

a.

Application layer support services such as electronic mail, remote


file access and other types of distributed information services.

b.

The physical layer coordinates the functions required to carry a


segment stream over a physical medium.
c.

When two or more devices are connected to the same link, Access
control protocol will be applied to determine which device has
control over the link at any given time in data link layer.

d.

Data compression is applied in Presentation Layer to reduces the


number of bits contained in the information.

Feedback

The correct answer is: The physical layer coordinates the functions
required to carry a segment stream over a physical medium.

Question 72

Correct

Mark 1.00 out of 1.00

Flag question

Question text

In your program the Imports System is used to______________.

a.
Define the behavior of a class in the program

b.

Include the System namespace in the program

c.

Define procedures in the program

d.

Include single namespace only in the program

Feedback

The correct answer is: Include the System namespace in the


program

Question 73

Incorrect

Mark 0.00 out of 1.00

Flag question
Question text

Which one is false where T is the data type of the object?

a.

List <T> al = new ArrayList<> ();

b.

List <T> ll = new LinkedList<> ();

c.

List <T> v = new Vector<> ();

d.

List<T> l=new List<>();

Feedback

The correct answer is: List<T> l=new List<>();

Question 74

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which one is correct based on purpose of a project charter?

a.

Provide an understanding of the project, the reason it is being


conducted, and its justification

b.

Establish the project manager and his or her authority level. A note
of who will review and approve the project charter must be
included.

c.

Establish early on in the project the general scope

d.

All are correct


e.

None

Feedback

The correct answer is: All are correct

Question 75

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Only one of the two devices on a link can transmit the other can
only receive the communication and the entire capacity of the
channel can be used to send data in one direction in which
communication type this situation can be possible.

a.

Simplex

b.

Half duplex
c.

Full duplex

d.

all

Feedback

The correct answer is: Simplex

Question 76

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is odd, assume MTU is router name?

a.

User EXEC==>MTU>
b.

Global Configuration==>MTU(config)#

c.

Privileged EXEC==> MTU>

d.

Interface Configuration==>MTU(config-if) #

e.

all

Feedback

The correct answer is: Privileged EXEC==> MTU>

Question 77

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Suppose you have a budgeted cost of a project at Birr 900,000. The


project is to be completed in 9 months. After a month, you have
completed 10% of the project at a total expense of Birr 100,000.
The planned completion should have been 15%. What will be
planned value?

a.

135,000 Birr

b.

130.000 Birr

c.

2000.000 Birr

d.

None

Feedback

The correct answer is: 135,000 Birr


Question 78

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which keyword is used for accessing the features of a package?

a.

Package

b.

Import

c.

Extends

d.
export

Feedback

The correct answer is: Import

Question 79

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which type of RAM stores data for only a tiny fraction of a second
before losing it and needs constant refreshing to maintain stored
data?

a.

DIMM

b.

DDR4
c.

DRAM

d.

SIMM

Feedback

The correct answer is: DRAM

Question 80

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Where does the BIOS setting stored?

a.

Flash drive
b.

RAM

c.

CMOS

d.

Hard drive

Feedback

The correct answer is: CMOS

Question 81

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

____command is used in SQL to issue multiple CREATE TABLE,


CREATE VIEW and GRANT statements in a single transaction.
a.

CREATE CLUSTER

b.

CREATE PACKAGE

c.

CREATE SCHEMA

d.

All of the above

Feedback

The correct answer is: All of the above

Question 82

Correct

Mark 1.00 out of 1.00

Flag question
Question text

Which of the following type of text is transformed with the help of


a cipher algorithm?

a.

Transformed text

b.

Complex text

c.

Scalar text

d.

Plain text

Feedback

The correct answer is: Plain text

Question 83

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A function in PHP which starts with __ (double underscore) is


known as __________.

a.

Default Function

b.

User Defined Function

c.

Inbuilt Function

d.

Magic Function

Feedback

The correct answer is: Magic Function


Question 84

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is correct about JavaScript?

a.

JavaScript is an Object-Based language

b.

JavaScript is Assembly language

c.

JavaScript is an Object-Oriented language

d.
JavaScript is a High-level language

Feedback

The correct answer is: JavaScript is an Object-Based language

Question 85

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is DOM in HTML?

a.

Language dependent application programming

b.

Hierarchy of objects in ASP.NET

c.
Application programming interface

d.

Convention for representing and interacting with objects in html


documents

Feedback

The correct answer is: Convention for representing and interacting


with objects in html documents

Question 86

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following best describes the role of a system


administrator?

a.

Writing code for software applications


b.

Managing and maintaining computer systems and networks

c.

Conducting market research for IT companies

d.

Developing marketing materials for IT products

Feedback

The correct answer is: Managing and maintaining computer


systems and networks

Question 87

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which of the following statements about Persistence is correct?


a.

It is the enforcement of the class of an object, such that objects of


different types may not be interchanged, or at the most they may
be interchanged only in very restricted ways.

b.

It is the property of an object through which its existence


transcends time and/or space.

c.

It is the property that distinguishes an active object from one that


is not active.

d.

All of the mentioned

Feedback

The correct answer is: It is the property of an object through which


its existence transcends time and/or space.

Question 88

Correct

Mark 1.00 out of 1.00


Flag question

Question text

______________is the process that groups data and procedures into


an entity called objects.

a.

Object development methodology

b.

Linear programming

c.

Structured programming

d.

Object oriented system development

Feedback

The correct answer is: Object oriented system development

Question 89
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statements about the garbage collection


process is not correct?

a.

The memory occupied by objects with no reference is


automatically reclaimed for deletion.

b.

Objects from a class with the finalize() method overridden will


never be garbage collected.

c.

Garbage collector is used to collecting of unused memory or


referenced memory.

d.
Objects instantiated within anonymous inner classes are placed in
the garbage collectible

Feedback

The correct answer is: Objects from a class with the finalize()
method overridden will never be garbage collected.

Question 90

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

If FK is a foreign key in a relation R1, which one of the following is


always true?

a.

Every tuple of R1 has a distinct value for FK

b.

FK is a Candidate key for some other relation


c.

FK cannot have a null value for tuples in R1

d.

FK is a Primary key for R1

e.

FK is a Composite key for R1.

Feedback

The correct answer is: FK is a Candidate key for some other relation

Question 91

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is an example of a backup strategy for


disaster recovery?
a.

Storing all backups on a single external hard drive

b.

Keeping backups in the same location as the original data

c.

Using cloud storage for backups

d.

Only backing up data once a year

e.

All

f.

None

Feedback

The correct answer is: Using cloud storage for backups


Question 92

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is true about this keyword?

a.

this can be used to refer current class instance variable.

b.

this can be used to indirectly invoke current class method

c.

this() can be used to invoke current class constructor.

d.
All of the above

Feedback

The correct answer is: All of the above

Question 93

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Chose the proper variable declaration of visual basic


programming?

a.

Const Gravity As Double = 9.8;

b.

Dim password As String, FName As String, Num1 As Integer, Num2


as Single
c.

Dim Var As Double;

d.

Dim FirstName As FirstName

e.

Dim Number As Number

Feedback

The correct answer is: Dim password As String, FName As String,


Num1 As Integer, Num2 as Single

Question 94

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What kind of list will <ol> tags create?


a.

Numbered list

b.

Bulleted list

c.

Unordered list

d.

Squared list

Feedback

The correct answer is: Numbered list

Question 95

Correct

Mark 1.00 out of 1.00

Flag question
Question text

What will happen if two thread of the same priority are called to be
processed simultaneously?

a.

Anyone will be executed first lexographically

b.

Both of them will be executed simultaneously

c.

None of them will be executed

d.

It is dependent on the operating system

Feedback

The correct answer is: It is dependent on the operating system

Question 96

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Which one is classful routing protocol

a.

RIPv1

b.

RIPv2

c.

OSPF

d.

EIGRP

e.
None

Feedback

The correct answer is: RIPv1

Question 97

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

a.
no output

b.

Welcome to MTU

c.

1000 PHP Exam

d.

Error

Feedback

Your answer is incorrect.


The correct answer is:

1000 PHP Exam

Question 98

Correct

Mark 1.00 out of 1.00


Flag question

Question text

Which of the following best describes the purpose of a firewall?

a.

To prevent unauthorized access to a network

b.

To encrypt data transmissions between two devices

c.

To compress data to reduce network bandwidth usage

d.

To automate routine system administration tasks

e.

All
f.

None

Feedback

The correct answer is: To prevent unauthorized access to a network

Question 99

Correct

Mark 1.00 out of 1.00

Flag question

Question text

From the options below, which of them is not a threat to


information security?

a.

Disaster

b.

Eavesdropping
c.

Information leakage

d.

Unchanged default password

Feedback

The correct answer is: Unchanged default password

Question 100

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which PHP statement will give output as $x on the screen?

a.

echo “\$x”;
b.

echo “$$x”;

c.

echo “/$x”;

d.

echo “$x;”;

Feedback

The correct answer is: echo “\$x”;

Question 101

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
The network layer is responsible for the source-to-destination
delivery of a packet, which protocol to be used for ensure this
packet delivery?

a.

TCP

b.

UDP

c.

IP

d.

FTP

e.

SMTP

Feedback

The correct answer is: IP


Question 102

Correct

Mark 1.00 out of 1.00

Flag question

Question text

If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is


executed?

a.

b.

c.

12

d.
Error

Feedback

The correct answer is: 5

Question 103

Correct

Mark 1.00 out of 1.00

Flag question

Question text

To iterate through array elements which type of loop would be


appropriate?

a.

Foreach

b.

If else

c.
Switch

d.

If else if

Feedback

The correct answer is: Foreach

Question 104

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

When a transaction never progresses then we say that it is

a.

Aborted

b.
Starved

c.

Shared

d.

Locked

e.

All

f.

None

Feedback

The correct answer is: Starved

Question 105

Correct

Mark 1.00 out of 1.00


Flag question

Question text

Assume that you are contractor then you take home contractor
working on a four-bedroom home, the optimistic time estimate
was 5 months, the most likely time estimate was 7 months days
and the pessimistic time estimate was 360 days calculate the
estimation time using PERT for finishing you contract.

a.

660 days

b.

2 years

c.

7 months and 2 weeks

d.

1 year

Feedback

The correct answer is: 7 months and 2 weeks


Question 106

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following dependency exists when a non-prime


attribute depends on other non-prime attribute rather than
depending upon the primary key?

a.

Partial

b.

Full

c.

Transitive
d.

Functional

Feedback

The correct answer is: Transitive

Question 107

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Any entity that interacts with the system is known as______________

a.

Use case

b.

Actor
c.

Boundary

d.

All

Feedback

The correct answer is: Boundary

Question 108

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

All of the following are true Except

a.

Operation describes the class behavior


b.

A class is a description of a set of objects that share the same


attributes, operations, relationships, and semantics.

c.

Association despite communication between an actor and a use


case

d.

Use a case diagram providing a high-level view of what the system


does.

e.

All

f.

None

Feedback

The correct answer is: Operation describes the class behavior

Question 109
Correct

Mark 1.00 out of 1.00

Flag question

Question text

If only some occurrences of entity set E participate in a relationship


R , the participation of entity set E in relationship R is said to be

a.

Partial Participation

b.

Whole Participation

c.

Moment Participation

d.

Total Participation
Feedback

The correct answer is: Partial Participation

Question 110

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

What are not the implementation classes of the List interface?

a.

ArrayList

b.

HashSet

c.

LinkedList
d.

Vector

Feedback

The correct answer is: HashSet

Question 111

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one is true about Access Control Lists (ACL)?

a.

It contains rules that grant or deny access to certain digital


environments

b.

same as a Stateless Firewall


c.

It is network traffic filters that can control incoming or outgoing


traffic.

d.

It works on a set of rules that define how to forward or block a


packet at the router’s interface

e.

All

Feedback

The correct answer is: It is network traffic filters that can control
incoming or outgoing traffic.

Question 112

Correct

Mark 1.00 out of 1.00

Flag question

Question text
When a subclass is created using inheritance

a.

may have only attributes of parent class

b.

may have only operations of parent class

c.

may have new operations only in addition to those in parent class

d.

may have new attributes and new operations in addition to those


of the parent class

Feedback

The correct answer is: may have new attributes and new operations
in addition to those of the parent class

Question 113

Correct
Mark 1.00 out of 1.00

Flag question

Question text

One is not true about Windows workgroup

a.

uses its own local accounts database

b.

Computers rely on centralized authentication.

c.

group of standalone computers in a peer-to-peer network

d.

The computers in a workgroup also do not have a common


authentication process

Feedback

The correct answer is: Computers rely on centralized authentication.


Question 114

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Assume you are ICT Support team in MTU and using telnet to
troubleshoot software issue on Civil Department, now on which
OSI model you are working.

a.

Application layer

b.

Network layer

c.

Presentation layer
d.

Data link layer

Feedback

The correct answer is: Application layer

Question 115

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is true about Homogeneous database?

a.

All sites of the database system have identical setup, i.e., same
database system software.

b.

The underlying operating system may be different.


c.

The underlying operating systems can be a mixture of Linux,


Window, Unix, etc

d.

All

e.

None

Feedback

The correct answer is: All

Question 116

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following media feature can be supported by


android studio app development?
a.

H.264

b.

MPEG-4

c.

GIF

d.

MP3

e.

All

Feedback

The correct answer is: All

Question 117
Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Before a hard drive fails entirely, it gives us certain signs. Which


one is a major symptom of hard drive problems that we may not
take seriously?

a.

Access denied or storage corrupted

b.

Connection to E-mail storage failed

c.

Clicking sound from Hard drive

d.

Operating system can’t be loaded


Feedback

The correct answer is: Connection to E-mail storage failed

Question 118

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is part of a correct SQL statement


command to remove a row or /rows from a table ‘Customer’ ?

a.

DROP FROM Customer WHERE

b.

UPDATE FROM Customer WHERE

c.

REMOVE FROM Customer WHERE


d.

DELETE FROM Customer WHERE

Feedback

The correct answer is: DELETE FROM Customer WHERE

Question 119

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following transmission media can use


omnidirectional antennas to send out signals?

a.

Microwave

b.

Radio wave
c.

Infrared

d.

All

Feedback

The correct answer is: Radio wave

Question 120

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Suppose that your computer monitor screen goes black but the
system unit is showing a light blinking to insure you that it is
properly working. What are the possible problems you should do
here?

a.
Check to see if all peripherals plugged in.

b.

Check to see if the brightness has been turned entirely down.

c.

Check to see if the monitor getting a signal from the computer

d.

Check to see if the monitor getting power

e.

All

Feedback

The correct answer is: All

Question 121

Correct

Mark 1.00 out of 1.00


Flag question

Question text

What is the correct order to close database resources?

a.

Connection then Statement then ResultSet

b.

ResultSet then Statement then Connection

c.

Statement then Connection then ResultSet

d.

Statement then ResultSet then Connection

Feedback

The correct answer is: Statement then Connection then ResultSet

Question 122
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which tool simplify the project plaining by determining the


essential or critical path by finding out the longest stretch of
dependent tasks?

a.

Critical path method

b.

project documentation

c.

PRET chart

d.

A and C
Feedback

The correct answer is: Critical path method

Question 123

Correct

Mark 1.00 out of 1.00

Flag question

Question text

A network device used to connect more than one networks, even if


they are different protocols.

a.

Access Point

b.

Hub

c.

Gateway
d.

Switch

Feedback

The correct answer is: Gateway

Question 124

Correct

Mark 1.00 out of 1.00

Flag question

Question text

What is the purpose of considering platform and device


compatibility when developing an Android app?

a.

To make the app more expensive

b.

To ensure that the app works on a range of devices and platforms


c.

To add unnecessary features to the app

d.

All are correct

Feedback

The correct answer is: To ensure that the app works on a range of
devices and platforms

Question 125

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Mr. Solomon want to send 1000 Birr to Mr. Dawit through ATM,
while sending money light was gone and Mr. Dawit confirm he
received 500 Birr. What property of Transaction was missed on
above scenario?

a.
Isolation

b.

Consistency

c.

Durability

d.

Atomicity

e.

All

f.

None

Feedback

The correct answer is: Atomicity


Question 126

Correct

Mark 1.00 out of 1.00

Flag question

Question text

In HTML, which attribute is used to create a link that opens in a


new window tab?

a.

src=”_blank”

b.

alt=”_blank”

c.

target=”_self”

d.
target=”_blank”

Feedback

The correct answer is: target=”_blank”

Question 127

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following transaction should not make its


updates visible to other transactions until it is committed?

a.

Isolation

b.

Consistency preservation

c.
Atomicity

d.

Durability

e.

None

Feedback

The correct answer is: Isolation

Question 128

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which PHP function displays the web page’s most recent


modification date?

a.
getlastmod()

b.

get_last_mod()

c.

lastmod()

d.

last_mod()

Feedback

The correct answer is: getlastmod()

Question 129

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Which BIOS/UEFI option might need to be modified in order to
boot a Windows computer from a flash drive that contains Ubuntu,
a Linux-based operating system?

a.

Lojack

b.

Secure Boot

c.

Virus Protection

d.

USB Configuration

e.

Hyperthreading

Feedback

The correct answer is: Lojack


Question 130

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

if the network administrator needs to connect more than two


VLANs, which VLAN link will be configure?

a.

Access Link

b.

Trunk Link

c.

Dynamic Link

d.
All

Feedback

The correct answer is: Trunk Link

Question 131

Correct

Mark 1.00 out of 1.00

Flag question

Question text

How to define a function in PHP?

a.

functionName(parameters) {function body}

b.

function {function body}

c.
function functionName(parameters) {function body}

d.

data type functionName(parameters) {function body}

Feedback

The correct answer is: function functionName(parameters)


{function body}

Question 132

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following statement is true about listener?

a.

listener is method that defines some variables, which listener class


must implement.
b.

listener is class that defines some methods, which listener class


must implement.

c.

listener is an interface that defines some methods, which listener


class must implement.

d.

None

Feedback

The correct answer is: listener is class that defines some methods,
which listener class must implement.

Question 133

Correct

Mark 1.00 out of 1.00

Flag question

Question text
The process where a network device, usually a firewall, assigns a
public address to a computer inside a private network

a.

VLAN

b.

NAT

c.

DHCP

d.

ARP

Feedback

The correct answer is: NAT

Question 134

Correct

Mark 1.00 out of 1.00


Flag question

Question text

One of the following files provide different types of layouts and


GUI component, an activity holds.

a.

XML file

b.

APK file

c.

Resource

d.

Views

Feedback

The correct answer is: XML file

Question 135
Correct

Mark 1.00 out of 1.00

Flag question

Question text

Project cost management must include four main processes what


are they?

a.

Resource planning, Cost estimating, Cost budgeting and Cost


control

b.

Scheduling , estimating , scope and risk

c.

Future costs, estimating, meet the budget and time

d.

A and B
e.

None

Feedback

The correct answer is: Resource planning, Cost estimating, Cost


budgeting and Cost control

Question 136

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is a part of the ACID properties of


database transactions?

a.

Atomicity, Consistency, Isolation, Database

b.
Atomicity, Consistency, Isolation, Durability

c.

Atomicity, Consistency, Integrity, Durability

d.

Atomicity, Consistency, Integrity, Database

e.

All

f.

None

Feedback

The correct answer is: Atomicity, Consistency, Isolation, Durability

Question 137

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Which command is correct in order to verify whether port security


has been configured or not, on port FastEthernet 0/10 on a switch?

a.

SW1# show switchport port-security interface FastEthernet 0/13

b.

SW1# show switchport port-secure interface FastEthernet 0/12

c.

SW1# show port-security interface FastEthernet 0/12*

d.

SW1# show switchport port-security running-config*

Feedback

The correct answer is: SW1# show port-security interface


FastEthernet 0/12*
Question 138

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which characteristics differentiate a Solid-State Drive (SSD) from a


Hard Disk Drive (HDD)?

a.

Non-moving parts

b.

High revolution per minute

c.

Use disk platters

d.
Have some sound

Feedback

The correct answer is: Non-moving parts

Question 139

Correct

Mark 1.00 out of 1.00

Flag question

Question text

Which one of the following is the default PHP session name?

a.

PHPSESSIONID

b.

PHPIDSESS

c.
PHPSESSID

d.

PHPSESID

Feedback

The correct answer is: PHPSESSID

Question 140

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which of the following is a tool or a diagram that can be used for


discovering class behaviors and responsibilities?

a.

CRC card

b.
Sequence diagram

c.

Class diagram

d.

A and C

e.

all of these

Feedback

The correct answer is: A and C

Question 141

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text
Lack of access control policy is a _____________

a.

Bug

b.

Threat

c.

Vulnerability

d.

Attack

Feedback

The correct answer is: Vulnerability

Question 142

Incorrect

Mark 0.00 out of 1.00


Flag question

Question text

Which one of the following is not true about Local Profile

a.

User information will not lost when network gone

b.

User information will lost when Network gone

c.

User cannot login on any computer on the network

d.

User can login on any computer on the network

e.

A&amp;C
f.

B&amp;D

Feedback

The correct answer is: User information will not lost when network
gone

Question 143

Incorrect

Mark 0.00 out of 1.00

Flag question

Question text

Which one of the following PHP function is used to determine a


file’s last access time?

a.

filetime()

b.
fileatime()

c.

fileltime()

d.

filectime()

Feedback

The correct answer is: fileatime()

Question 144

Correct

Mark 1.00 out of 1.00

Flag question

Question text

If someone gave you an instruction to add a simple text “ Exit exam


model question” to your file for updating the existing one. Which
FileMode option is appropriate to be used?
a.

Create

b.

Truncate

c.

OpenOrCreate

d.

Append

e.

ReadWrite

Feedback

The correct answer is: Appen

You might also like