🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Comprehensive Exam Questions 2022 PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This is a comprehensive exam for Computer Science and Business Systems. The exam includes multiple-choice questions covering various management theories, including scientific management, administrative management, human relations, and systems theory. The document also includes technical concepts in computer science.

Full Transcript

Computer Science and business systems Comprehensive Examination - 2022 “Workers should receive orders from only one manager” , this 1. principle is termed as Unity of command...

Computer Science and business systems Comprehensive Examination - 2022 “Workers should receive orders from only one manager” , this 1. principle is termed as Unity of command 2. Unity of direction 3. Unity of group 4. Unity of management “The Hawthorne Experiments” are related to 1. Scientific Management 2. Administrative Management 3. Human Relations School 4. Bureaucratic Organization “Managers have long realised that there is no one best way 1. to do things”. This statement is suitable for which Systems Theory management approach? 2. Contingency Theory 3. Organizational Humanism 4. Management Science “g(n) is an upper bound for f(n) that is not asymptotically 1. tight”, statement holds true for Big oh 2. Big theta 3. Big omega 4. Amortized 1 “Functional foremanship” is related to 1. Scientific Management 2. Administrative Management 3. Human Relations School 4. Bureaucratic Organization “Fayol’s principles” are related to 1. Scientific Management 2. Administrative Management 3. Human Relations School 4. Bureaucratic Organization X.25 standards covers how many layers? 1. Two 2. Three 3. Seven 4. Six Working set model for page replacement is based on the 1. assumption of ____________ Modularity of references 2. Working Set Size 3. Locality of references 4. Random access 2 Within an organisation, leadership influence will be 1. dependent upon the type of ________ that the leader can knowledge exercise over the followers. 2. power 3. delegation 4. friendship Why, according to stakeholder theory, is it in companies' best 1. interests to pay attention to their If firms only act in their own self-interest, employees may feel exploited. stakeholders? 2. If firms only act in their own self-interest, the government might put more regulation on them. 3. If firms only act in their own self-interest, customers might not like the image that the company portrays. 4. If firms only act in their own self-interest and inflict harm on stakeholders, then society might withdraw its support Why is it necessary for all employees to sign the Confidentiality and Security 1. Agreement each year? To check if you still work there. 2. No reason, they just like paperwork. 3. To remind everyone of what their responsibilities are. 4. Will be used for moving to a higher position. 3 Why is autocratic leadership considered negative? 1. people are uninformed, insecure and afraid of the leader 2. leader is extra friendly 3. too much confusion arises 4. it is very participative Who suggested a system of cards? 1. Henry Metcalfe 2. Henry Robinson Towne 3. Peter Drucker 4. Robert Owen Who published the famous book "The Cost of Manufacture and 1. Administration of Workshop: Public and private"? Henry Metcalfe 2. Henry Robinson Towne 3. Peter Drucker 4. Robert Owen Who presented the paper “Engineer as an Economist”? 1. F W Taylor 2. Henry Robinson Towne 3. Peter Drucker 4. Robert Owen 4 Who plays an important role in the success of products and services and in 1. increasing the marketing share of the firm in business? Functional level Managers 2. Corporate level Managers 3. Business level Managers 4. All of the above Who is the father of scientific management? 1. F W Taylor 2. Henry Fayol 3. Peter Drucker 4. None of these Who is the father of Personnel Management? 1. F W Taylor 2. Henry Fayol 3. Peter Drucker 4. Robert Owen Who is the father of modern management? 1. F W Taylor 2. Henry Fayol 3. Peter Drucker 4. None of these 5 Who developed the force-field analysis theory? 1. Carl Rogers 2. B.F.Skinner 3. Kurt Lewin 4. James Johnson Who believed that workers performance was influenced by the total environment? 1. F W Taylor 2. Henry Fayol 3. Peter Drucker 4. Robert Owen Who are the organisational stakeholders? 1. Government 2. Employees 3. Customers 4. All the other answers are correct. White Box techniques are also classified as_________________? 1. Design based testing 2. Structural testing 3. Error guessing technique 4. None of the mentioned 6 While selecting a string w such that w belongs to L, where L is a regular language, and 1. w=mno. Which of the following parts cannot be an empty string? m 2. n 3. o 4. no While applying Pumping lemma over a regular language, we consider a string w that 1. belong to L and separate it into _________ components. 3 2. 4 3. 2 4. 5 Which type of software can be used to merge data of two files in one file ? 1. System software 2. Networking software 3. Documenting software 4. Utility Software Which type of attack requires multiple handler on various system? 1. Man in the Middle Attack 2. DoS 3. DDoS 4. Backdoor Attack 7 Which transmission media has the highest transmission speed in the network. 1. Coaxial cable 2. Twisted pair cable 3. Optical fibre cable 4. Electrical cable Which term refers to a systematic assessment of a company's activities in terms of social 1. managerial impact? appraisal 2. social audit 3. social responsibility metric 4. ethics audit which technique was introduced because a single job could not keep both the 1. Time-sharing CPU and the I/O devices busy? 2. SPOOLing 3. Preemptive scheduling 4. Multiprogramming Which sublayer of the data link layer performs data link 1. functions that depend upon the type of medium? logical link control sublayer 2. media access control sublayer 3. network interface control sublayer 4. none of the mentioned 8 Which style of leadership focuses on goals, standards, and 1. organization? task leadership 2. social leadership 3. semantic leadership 4. transformational leadership Which statement is CORRECT 1. The internal data model represents the data’s physical storage details 2. To communicate with the business user, mainly, the logical data model is used 3. The logical data model is implementation-independent 4. A database state contains the description of the database data and is stored in the catalogue Which server translates the alphanumeric name 1. into numeric addresses? Network server 2. Protocols 3. DNS 4. System server Which process model deals with understanding of the problem 1. domain and architecture framework and developing the project Agile Process Model plan with identification of risks? 2. Iterative Process Model 3. Incremental Process Model 4. Spiral Model 9 Which process model deals with review of project and a 1. decision is made whether to continue with a further loop or not Agile Process Model in the planning phase? 2. Waterfall Process Model 3. Incremental Process Model 4. Spiral Model Which principle of general management advocates that 1. “Employee turnover should be minimized to maintain Stability of personnel organizational efficiency.”? 2. Remuneration of employees 3. Equity 4. Esprit de Corps Which organisation structure is generally followed by big steel 1. plants? Line organisation 2. Line and staff organisation 3. Functional organisation 4. All the other answers are correct Which option is incorrect. Monitors can contain 1. multiple (user) procedures. 2. only a single user procedure. 3. only one procedure will be active in the monitor at any one time. 4. multiple procedures can share variables. 10 Which one of these scenarios are ethical issues? 1. (i) and (ii) (i) A company is thinking of employing a robot that will make most of the workforce redundant 2. (ii) Someone creates an AI (i) and (iii) (iii) A judge decides to give someone a prison sentence 3. (ii) and (iii) (iv) Someone hacks a computer 4. (iii) and (iv) Which one of the following would be classified as sensitive 1. personal data? Address 2. Religion 3. CCTV Video 4. Name Which one of the following regular expressions over {0,1} 1. denotes the set of all strings not containing 100 as a 0*(10+1)* substring? 2. 0*(11*0)* 3. 0*1010* 4. 0*1*01 Which one of the following regular expressions over {0,1} 1. denotes the set of all strings not containing 100 as a 0*(11*0)* substring? 2. 0*1010* 3. 0*(10+1)* 4. 0*1*01 11 Which one of the following languages over the alphabet {a,b} 1. is described by the regular expression: The set of all strings containing the substring (a+b)*a(a+b)*a(a+b)*? aa. 2. The set of all strings containing at most two a’s. 3. The set of all strings containing at least two a’s. 4. The set of all strings that begin and end with either a or b. Which one of the following is not a ‘hygiene factor’ of 1. Herzberg’s Two Factor theory ? Interpersonal relations 2. Working conditions 3. Responsibility 4. Job security Which one of the following is not a transmission medium. 1. Coaxial cable 2. Telephone Lines 3. Modems 4. Microwave systems Which one of the following is not a responsibility of the 1. government? Enacting the pollution laws. 2. Establishment of norms for the industrial undertakings. 3. Providing after sales service. 4. None of the other answers is correct. 12 Which one of the following is correct? 1. A relationship can have one or more attributes directly linked to it 2. All relationships attributes may be attached to one of the participating entities 3. All relationships may be converted to 1:1 relationships 4. All relationships may be converted to binary relationships Which one of the following is an element of motivation 1. according to Vroom’s Vector Valence Involvement theory ? 2. Equity 3. Instrumentality 4. Existence Which one of the following is an application of Stack Data 1. Structure? Managing function calls 2. The stock span problem 3. Arithmetic expression evaluation 4. All of these Which one of the following is a synchronization tool? 1. Thread 2. Pipe 3. Semaphore 4. Socket 13 Which one of the following describes the leadership style 1. in which the leader generally gives facilitative style the group complete freedom to make decisions and 2. complete the work in whatever way it sees delegative style fit? 3. democratic style 4. laissez-faire style Which one of the following describes the leadership style 1. in which a leader tends to centralize authoritarian style authority, dictate work methods, make unilateral decisions, 2. and limit employee participation? autocratic style 3. democratic style 4. laissez-faire style Which one of the following communication lines is best 1. suitable for interactive process applications. Narrow band channel 2. Half-duplex 3. Full-duplex 4. Simplex Which one of the below is not a file 1. infecting virus? Cavity Virus 2. Prepending Virus 3. Appending Virus 4. Stealth Virus 14 Which of these statements concerning Weber’s concept of 1. Bureaucracy is not correct? It is based on rules and procedures rather than personal preference and judgment. 2. It is still a relevant concept in today’s organization. 3. It has acquired a negative reputation for inefficiency and rigidity. 4. It rejects rational approaches to managing organizations Which of these is an application of linked lists? 1. To implement file systems 2. For separate chaining in hash-tables 3. To implement non-binary trees 4. All of these Which of these expresses the specific number of entity 1. occurrences associated with one occurrence of the related Degree of relationship entity? 2. Connectivity of relationship 3. Cardinality of relationship 4. None of these Which of the two features match each other 1. Inheritance and Encapsulation 2. Encapsulation and Polymorphism 3. Encapsulation and Abstraction 4. Abstraction and Polymorphism 15 Which of the three pillars of digital privacy does not apply? 1. Information privacy 2. Individual privacy 3. Communication privacy 4. Family privacy Which of the statement is true regarding 1. the dequeue operation? Element are deleted at both end 2. any element beside the last one 3. Designing of the operation is simple 4. All of these Which of the statement is false as part of 1. asymptotic notation? Discuss about rate of growth of the function 2. Asymptotically weakly bound based on the function 3. Functions that are dependent are non-negative 4. Bigoh notation speaks on defined constant Which of the following ways should 1. organizations use to protect personal Security clearances and access restrictions on a "need-to-know" information? basis are examples of organizational measures. 2. Technological measures, for example, the use of passwords and encryption. 3. Physical measures, for example, shredding documents and locking desk drawers. 4. All of the these 16 Which of the following true about FILE *fp 1. FILE is a keyword in C for representing files and fp is a variable of FILE type. 2. FILE is a stream 3. FILE is a buffered stream 4. FILE is a structure and fp is a pointer to the structure of FILE type Which of the following technique is used 1. for fragment? a technique used in best-effort delivery systems to avoid endlessly looping packets 2. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame 3. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size 4. Compaction technique Which of the following TCP/IP protocol is 1. used for transferring electronic mail FTP messages from one machine to another? 2. SNMP 3. SMTP 4. RPC Which of the following statements are 1. true? I only I. Shortest remaining time first scheduling 2. may cause starvation I and III only II. Preemptive scheduling may cause 3. starvation II and III only III. Round robin is better than 4. FCFS in terms of response time I II and III only 17 Which of the following statements about 1. the Privacy Data Breach Incident is A Privacy incident is a theft of an asset correct? 2. A privacy event occurs when personal information is lost in any way. Both suspected and confirmed occurrences involving PII that provide a reasonable risk of harm are covered by this term. 3. A Privacy Incident is one that may not cause serious injury or harm to the individual and/or involves a few numbers of affected individuals 4. A Privacy incident is an attack on an asset Which of the following statements about 1. leadership is false? Leadership does not necessarily take place within a hierarchical structure of an organisation 2. Not every leader is a manager 3. When people operate as leaders their role is always clearly established and defined. 4. All the other answers are correct. Which of the following statement(s) is/are 1. correct? Only S1 S1: When Bjarne stroustrup designed 2. C++, there is no such concept of Only S2 exception handling. 3. S2: Exception handling is a new feature Neither S1 nor S2 added to ANSI C++; not available in earlier compilers. 4. Both S1 and S2 Which of the following statement is true? 1. DFA is more powerful than NFA 2. NFA and DFA have equal power 3. NFA is more powerful than DFA 4. 18 All options are true Which of the following standard algorithms is not a Greedy algorithm? 1. Dijkstra's shortest path algorithm 2. Prim's algorithm 3. Kruskal algorithm 4. Bellmen Ford Shortest path algorithm Which of the following risk is the failure of a purchased component to perform 1.Product risk 2.Project risk as expected? 3.Process risk 4.Program risk Which of the following represents the rights inherent in a managerial position 1. to give orders Power and expect them to be obeyed ? 2. Authority 3. Influence 4. Responsibility Which of the following regular expression identity is true? 1. r(*) =r* 2. (r * s*)*= (r+s) * 3. (r+s) *=r*+s* 4. r*s*=r*+s* Which of the following regular expression denotes a language comprising of 1. all possible strings over {a,b} of length n where n is a multiple of 3? ((a+b) (a+b) (a+b))* 2. (aaa+ab+a)+(bbb+bb+a) 3. (aaa+bbb)* 4. (a+b+aa+bb+aba+bba)* 19 Which of the following regular expression denotes a language comprising of 1. all possible strings over {a,b} of length n where n is a multiple of 3? (a+b+aa+bb+aba+bba)* 2. (aaa+bbb)* 3. ((a+b) (a+b) (a+b))* 4. (aaa+ab+a)+(bbb+bb+a) Which of the following properties is associated with a queue? 1. First In Last Out 2. First In First Out 3. Last In First Out 4. None Which of the following properties are necessary for an Algorithm? 1. Definiteness 2. Correctness 3. Effectiveness 4. A and C Which of the following pair is correctly matched ? 1. A A. F.W. Taylor – Human Relations Approach 2. B. Henry Fayol – Universality of Management B C. Elton Mayo – Psychological Approach 3. D. M. Parker Follet – Scientific Management C 4. D 20 Which of the following options are correct for the given 1. question? (i) only The usage of “virtual” keyword before the member function is 2. to achieve………… (ii) and (iv) only (i). Inheritance 3. (ii). Compile time Polymorphism (ii) and (iii) only (iii). Runtime Polymorphism 4. (iv). Static binding (iii) only Which of the following operation take worst-case linear time in 1. the array implementation of the stack? Push 2. Pop 3. IsEmpty 4. None Which of the following one can relate to the statement: If x 1. items are put into y containers, with x>y, then at least one Pumping Lemma container must contain more than one item. 2. Pigeon Hole Principle 3. Counting principle 4. None Which of the following must you do if a laptop holding client 1. account information is stolen? Log the breach immediately with the DPO 2. Notify the individuals concerned if their rights or freedoms are at risk 3. Notify your manager 4. Notify the regulators 21 Which of the following keys in a table can uniquely identify a 1. row in a table? Candidate key 2. Alternate key 3. Primary key 4. All of these Which of the following is/are White box technique ? 1. Statement Testing 2. Decision Testing 3. Condition Coverage 4. All of the mentioned Which of the following is/are not shared by the threads of 1. the same process? (a), (b) and (e) Program counter (b) Logical Address space (c) Stack (d) 2. Registers (e) Virtual Address space (f) File descriptor (a), (c) and (f) table (g) Message queue (h) Code 3. (a), (c) and (h) 4. (a), (c) and (d) Which of the following is TRUE? 1. Every finite subset of a non-regular set is regular 2. Every subset of a regular set is regular 3. Infinite union of finite sets is regular 4. The union of two non-regular sets is not regular 22 Which of the following is true 1. P is a subset of NP 2. NP is a subset of P 3. P and NP are equal 4. NP is a subset of NP-hard Which of the following is true of a divisional structure? 1. It is also known as chain of command. 2. It is also called a U-form (unitary) structure. 3. It is a centralized structural form. 4. It is used to promote flexibility and change. Which of the following is true of effective information sharing in an 1. organization? Information should be shared vertically, but not horizontally. 2. Vertical linkages are designed primarily for coordination and collaboration. 3. The structure should fit the information requirements of the organization. 4. It is not possible to give people a lot of information. 23 Which of the following is the most accurate description of an access 1. control method that allows the data owner to develop and manage MACs (Mandatory Access Control) access control? 2. RBACs (Role-Based Access Control) 3. LBACs (List Based Access Control) 4. DACs (Discretionary Access Control) Which of the following is referred as part of restricted data structure? 1. Stack 2. Queue 3. Linked list 4. All of these Which of the following is odd one out? 1. Evaluating a postfix expression 2. Matching Balancing Parentheses 3. Luggage checking in airports 4. Depth first search of graphs Which of the following is NOT a valid access control mechanism? 1. DAC (Discretionary Access Control) list. 2. SAC (Subjective Access Control) list. 3. MAC (Mandatory Access Control) list. 4. RBAC (Role-Based Access Control) list. 24 Which of the following is NOT a key concept associated with scientific 1. management? One best way 2. Formalization 3. Time-and-motion studies. 4. Systematic selection Which of the following is not a good way to protect one's privacy? 1. Use privacy-focused SE 2. Use private Browser-window 3. Disable cookies 4. Uninstall Antivirus Which of the following is element of the database? 1. Constraints and schema 2. Relationships 3. Data 4. All of these Which of the following is an example of the implementation of an 1. access control policy for a bank teller? Rule-based policy 2. Identity-based policy 3. User-based policy 4. Role-based policy Which of the following is an ethical behaviour? 1. Giving less remuneration to the employees. 2. Selling inferior goods. 3. 25 Honest behaviour with the customer. 4.Polluting the environment. Which of the following is a vulnerability in a network environment 1. with discretionary access controls? SYN flood 2. Impersonation 3. Denial of service 4. Birthday attack Which of the following is a project scheduling method that can be 1.EPM 2.CPM 3.CMM 4.NONE OF THE applied to software development? ABOVE Which of the following is a MAC (Mandatory Access Control) 1. feature? Uses levels of security to classify users and data. 2. Allows owners of documents to determine who has access to specific documents. 3. Uses access control lists that specify a list of authorized users. 4. Uses access control lists that specify a list of unauthorized users. Which of the following is a leadership trait? 1. Dominance 2. energy 3. cognitive ability 4. All the other answers are correct 26 Which of the following does not require additional temporary 1. space? Stack 2. Queue 3. Linked list 4. All of these Which of the following condition is used to transmit two packets 1. over a medium at the same time? Contention 2. Collision 3. Synchronous 4. Asynchronous Which of the following claims about DAC (Discretionary Access 1. Control) is correct? Files that don't have an owner CANNOT be modified. 2. The administrator of the system is the owner of each object. 3. The operating system is the owner of each object. 4. Each object has an owner, which has full control over the object. 1. Which of the following are objectives of an information systems security program Threats, vulnerabilities, and risks 2. Security, information value, and threats 3. Integrity, confidentiality, and availability 4. 27 Authenticity, vulnerabilities, and costs Which of the following are components of a database except? 1. User data 2. Metadata 3. Reports 4. Indexes Which of the following application generally use a stack? 1. Parenthesis balancing program 2. Syntax analyzer in compiler 3. Keeping track of local variables at run time 4. All of the above Which of the below statement(s) is/are true? 1. (i). By using pure virtual function, it is possible to achieve a pointer to base Both (i) and (ii) class points to refer derived class objects. 2. (ii). By using pure virtual function, it is possible to achieve a pointer to Neither (i) nor (ii) derived class points to refer base class objects. 3. only (i) 4. only (ii) Which of the below is used for designing real time 1. networking capabilities? Packet Tracer 2. WireShark 3. Network Simulator 2 4. TinyOS 28 Which of the below is not a business continuity disaster? 1. Flooding 2. Covid19 3. Earth Quake 4. Tsunami Which of the below is an inline device? 1. Switch 2. Router 3. VPN 4. Host Which of the below is a network sniffer tool? 1. Packet Tracer 2. WireShark 3. Network Simulator 2 4. TinyOS Which of the following would LEAST likely be a source of ethical guidance? 1. holy books 2. laws 3. tests 4. friends 29 Which of the following term is the practice of hiding data in graphic, audio, or 1. Masking other text file? 2. Steganography 3. Cryptography 4. None of the choices Which of the following statement(s) is/are NOT true? 1. (i). Virtual function help to achieve a pointer to base class points to refer (i) and (iv) only base class objects only. 2. (ii). Virtual function help to achieve a pointer to base class points to refer (i), (ii) and (iv) only derived class objects. 3. (iii). Virtual function has no role in supporting a pointer to achieve (i), (iii) and (iv) only polymorphism. 4. (iv). Virtual functions are not member functions of a class. (ii) only 1. Which of the following relations is correct, when comparing the best-case complexity? insertion aB | B --> Sb } 2. This grammar is not regular and not context-free 3. regular, but not context-free 4. context-free, but not regular Given five memory partitions of 200Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1. order), which algorithm would be able to successfully place the following Best Fit processes of 212 Kb, 417 Kb, 112 Kb, and 126 Kb? 2. Worst Fit 3. First Fit 4. All the given choices. 152 Given five memory partitions of 100Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1. order), which algorithm would be able to successfully place the following Best Fit processes of 212 Kb, 417 Kb, 112 Kb, and 426 Kb? 2. Worst Fit 3. First Fit 4. All the given choices. Given an arbitrary non-deterministic finite automaton (NFA). with N states, the 1. maximum number of states in an equivalent minimized DFA is at least. 2N 2. N! 3. 2^N 4. N^2 Generic functions perform ____ operation for all the versions of a 1. A. Different function except the data type differs 2. A. Same 3. A. Similar 4. A. None Frustration-Regression is related to 1. Maslow’s Hierarchy 2. ERG theory 3. Justice Theory 4. Equity theory 153 Frames from one LAN can be transmitted to another LAN via the device 1. Router 2. Bridge 3. Repeater 4. Modem Frames from one LAN can be transmitted to another LAN via the device 1. Router 2. Bridge 3. Repeater 4. Modem For every pair of regular expressions r and s, the languages denoted by r(sr)* and 1. (rs)*r are the same. True 2. False 3. Can't determined 4. Neither True and Nor False For every....grammar there is equivalent grammar for the same language which is 1...... ambiguous grammar, un ambiguous grammar 2. un ambiguous grammar, ambiguous grammar 3. ambiguous grammar, ambiguous grammar 4. 154 un ambiguous grammar, un ambiguous grammar For declaring function templates, __ arguments in template 1. all declaration must be generic (class T). 2. Any one 3. One 4. none For declaring class templates, ___ of the arguments in template 1. Some declaration may be non-generic ordinary data types. 2. all 3. None of the argument 4. One For any two functions g(n) and f(n), f(n) = Q(g(n)) iff 1. f(n) = O(g(n)) and f(n) = W(g(n)) 2. f(n) > O(g(n)) and f(n) =

Use Quizgecko on...
Browser
Browser