SE MOE - Exit Exam (Model) With Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

MoEE - Exit Exam Software Engineering Model Exam

Brought to u by t.me/dagmawi_abate https://t.me/dagiBsoft

1. A process scheduling approach on which decision as to which available process will be executed by
the Processor refers to:

a. Long-term scheduling

b. I/O scheduling

c. Short-term scheduling

d. Medium-term scheduling

2. Which of the following analysis mechanism defines the input for which the algorithm takes the least
time (fastest time to complete)?

a. Best case

b. Average case

c. Standard Case

d. Worst case

3. Which of the following UML diagram is not used to represent dynamic behavior of an object during
analysis?

a. Instance diagram

b. Sequence diagram.

c. Collaboration diagram

d. Activity diagram
MoEE - Exit Exam Software Engineering Model Exam

4. Assume there is Class A which is extended by Class B and Class C Class A is declared as abstract,
and also contains an abstract method called welcome; this method takes no parameters, and returns a
String. Which of the following definitions of Class B will NOT cause a compiler error based on the
above scenario?

a. public class Class B extends Class A


{
public String whatObjectAmI()
{
return "I am a class B object";
}
}
b. public class Class B extends Class A
{
public void welcome(String str)
{
}
}
c. public class Class B extends Class A
{
public String whatObjectAmI()
{
return "I am a class 8 object";
}
}
d. public class Class B extends Class A
{
public void welcome(String str)
{
}
}
MoEE - Exit Exam Software Engineering Model Exam

5. Which of the following is not type of Ensemble learning?

a. Lasso

b. Boosting

c. Bagging

d. Random forest

6. A technique for generating plans with conditionals and loops are almost identical to those for
generating programs from logical specifications is called___.

a. Automatic programming

b. Automatic learning

c. Automatic monitoring

d. Automatic recursive

7. The CSS property used to specify the transparency of an element is?

a. Transparency

b. Opacity

c. Background

d. Alpha

8. Which of the following describes the functionalities of application layer?

a. It deals encapsulation of frames

b. It deals encapsulation of packets

c. It deals mechanical, electrical and physical connectivity

d. It is process to process interaction

9. Which function is used to serialize an object into a JSON string in Javascript?

a. parseJson()

b. toJson()

c. stringify0

d. parse()

10. A TCP/IP port number used by SSH is?

a. 20
MoEE - Exit Exam Software Engineering Model Exam

b. 22

c. 23

d. 21

11. Given the following fragment of code, how many tests are required for 100% decision coverage?

if width > length.

then biggest_dimension = width

if height > width

then biggest_dimension = height

end_if

else biggest_dimension = length

if height > length

then biggest_dimension = height

end_if

end_if

a. 2

b. 6

c. 4

d. 3

12. Which of the following is true regarding the referential triggered action ON UPDATE CASCADE

a. sets the referencing primary key to NULL

b. change the value of the referencing foreign key attribute to the updated primary key value for all
the referencing tuples

c. sets the referencing primary key of the base table to default value

d. deletes all tuples of the referencing table

13. Which file system can be used to change certain kernel parameters at runtime using sysctl command?

a. Ext4

b. Sysfs

c. Procfs
MoEE - Exit Exam Software Engineering Model Exam

d. Ext3

14. A software tool, such as a design editor or a program debugger, that developers and other software
stakeholders use to support an activity in the software development process is

a. CASE tools

b. CMMI

c. CMM

d. BPMN

15. Which of the following statements designates part of the process of how a switch resolves to forward
a frame destined for a recognized unicast MAC address?

a. It matches the unicast destination address to the bridging, or MAC address, table.

b. It matches the unicast source address to the bridging, or or MAC address, table.

c. It matches the frame's incoming interface to the source MAC entry in the MAC address table.

d. It matches the destination IP address to the destination MAC address.

16. Which of the following is a unique IPV4 address?

a. 172.17.17.17/26

b. 172.16.30.0/16

c. 172.16.25.250/16

d. 172.43.17.1/16

17. Which one of the following is not correct?

a. HTML form element can be of different types

b. HTML form elements are used for taking user input

c. HTML form elements are used for displaying outputs

d. HTML form elements are defined inside <form> tag

18. One of the following statements addresses the characteristics of functional organization structure?

a. Low to moderate project manager authority, low to moderate resource availability, and a full-time
project manager's role

b. Little or no project manager authority, little or no resource availability, and the functional
manager control the project budget

c. High to almost total project manager authority, high to almost total resource availability, and
full-time project management administrative staff
MoEE - Exit Exam Software Engineering Model Exam

d. Limited project manager authority, limited resource availability, and a part-time project manager's
role

19. What will be the output of the following program

class increment {

public static void main(String args[])

int a=4;

System.out.print(++a * 5);

a. 5

b. 20

c. 24

d. 25

20. In a quad-tree each non-leaf node has exactly ____ children.

a. 2

b. 1

c. 4

d. 3

21. Which of the following mostly used by software project quality evaluators to using the approach of
plan, check and act?

a. IEEE

b. Capability maturity model

c. Six sigma

d. ISO model

22. The result of the following program after running will be:

class PrintResult

{
MoEE - Exit Exam Software Engineering Model Exam

public static void main(String args[])

int arr[] = {3, 4, 5, 6, 7};

for (int i = 0;i < arr.length - 2; ++i)

System.out.println(arr[i] + " ");

a. 3 4 5

b. 3 4 5 6

c. 3 4

d. 3 4 5 6 7

23. An Artificial Intelligence system is composed of:

a. Agent and Environment

b. Data and Information

c. Device and Network

d. Technology and Evolution

24. Which of the following is true regarding integration testing?

a. It uses test data that simulates ideal scenarios.

b. It emphases on testing individual software components in isolation.

c. It proves the functioning of different software components when integrated together.

d. It is only performed after system testing is completed.

25. Which of the following describes the leading agile development method?

a. Sprint

b. Six sigma

c. Extreme programming

d. Scrum

26. Which access modifier is suitable if you want your instance variables to be accessible from both the
methods of the class and the descendant classes?
MoEE - Exit Exam Software Engineering Model Exam

a. Private

b. Inherited

c. Public

d. Protected

27. Which of the following is not a data link layer technology?

a. OSPF

b. VLAN

c. PPP

d. Frame-relay

28. The purpose of <iostream> header file in c++ program is:

a. Makes the code secure

b. to make the code readable

c. to provide input/output functionality

d. to create file streams

29. What of the following describes informed search algorithms?

a. They are optimal

b. They are admissible

c. They are consistent

d. They are complete

30. Which one is not an architectural style?

a. MVC

b. Client server

c. UML

d. OSI layer

31. As a software tester, which testing principle can save time and cost of testing?

a. Exhaustive testing is not possible

b. Testing early development process saves time and cost

c. Prioritize testing based on risk and criticality


MoEE - Exit Exam Software Engineering Model Exam

d. Testing the entire development process affect time and cost

32. Which of the following specifies divergence between Dijkstra's Algorithm (DA) and Uniform Cost
Search (UCS) algorithms?

a. DA is optimal, but not UCS

b. UCS finds the optimal solution while DA

c. DA first collects them into a Queue but UCS discover them as they come

d. DA discovers nodes as they come while UCS first collects them in a Queue

33. In software testing, a term which relates the genuine imperfect segments to the absolute number of
segments anticipated as faulty known as:

a. F-measure

b. Recall

c. Accuracy

d. Precision

34. Which of the following is not true about binary tree?

a. Empty tree is also a valid binary tree

b. We can visualize a binary tree as consisting of a root and two disjoint binary trees

c. A tree is called binary tree if each node has zero child, one child or two children

d. A tree is called binary tree if and only if each node has zero child

35. What will happen if there is no break statement next to case labels in switch statement?

a. All non-matching case labels will be executed

b. The program generates exception

c. The default block will be executed

d. The program will halt

36. Security estimation is an essential component of ______ process.

a. Software design

b. Software development

c. SRS design

d. Risk management

37. Which of the following is one of the indirect applications of queues?


MoEE - Exit Exam Software Engineering Model Exam

a. Multiprogramming

b. Operating systems schedule jobs (with equal priority) in the order of arrival (e.g., a print queue).

c. Auxiliary data structure for algorithms

d. Simulation of real-world queues such as lines at a ticket counter or any other first-come
first-served scenario requires a queue.

38. Which development model helps to cope up with software requirement change to reduce the cost of
rework?

a. staged delivery

b. prototyping

c. Spiral model

d. Software Version control

39. A temporary endeavor undertaken to create a unique product, service, or result is known as:

a. Program

b. Portfolio

c. Project

d. Process

40. Select the one different from others

a. System design

b. Requirement validation

c. Requirement elicitation

d. Requirement analysis

41. One of the following is model optimization technique:

a. Gradient descent

b. Bagging

c. Lasso

d. Gradient boosting

42. The keyword used in the SELECT clause to eliminate duplicate tuples from the result of an SOL
query is

a. UNIQUE
MoEE - Exit Exam Software Engineering Model Exam

b. DISTINCT

c. Group By

d. PRIMARY

43. The ultimate purpose of inheritance in OOP is:

a. Data protection

b. Code reusability

c. Resources saving

d. Providing multiple forms for methods

44. The base class from which all classes in Java are inherited?

a. java.lang.class

b. java.class.inherited

c. java.lang.Object

d. java.class.object

45. Which one is not among the layouts available in android?

a. Card Layout

b. Linear Layout

c. Relative Layout

d. Frame Layout

46. Which CSS element is used to make rounded borders around elements?

a. border-circle

b. border-rounded

c. border-radius

d. border-corner

47. A technique that allows large numbers of ideas to be classified into groups for review and analysis

a. Affinity Diagrams

b. Activity-on-Node

c. Activity List

d. Adaptive Life Cycle


MoEE - Exit Exam Software Engineering Model Exam

48. Which of the following refers to unauthorized disclosure of information?

a. Integrity

b. Confidentiality

c. Authentication

d. Authorization

49. Which of the following is not the contribution of the big data analysis

a. To introduce new culture of data usage

b. To gain competitive advantage

c. To cope up with volatile market

d. To satisfy customer need

50. The correct structure of the for loop statement is:

a. for(initialization, condition, increment/decrement

b. for(initialization; condition)

c. for(increment/decrement; initialization; condition)

d. for(initialization; condition; increment/decrement)

51. Introducing new requirement at the later phase of the project is not recommended due to?

a. Cost of change

b. coding complexity

c. analysis complexity

d. requirement complexity

52. Being a software tester you want to verify the integration of the message between different processes
communication using ______ .

a. Network authorization

b. Decryption algorithm

c. Message Digest

d. Digital Signature

53. Fundamental program structure consists of the following core components except

a. back end component


MoEE - Exit Exam Software Engineering Model Exam

b. Variable definition

c. main0 method

d. Input/output features

54. Assume you have the following hash table, implemented using linear probing. The hash function you
are using is the identity function, f(x) = x. In which order could the elements have been added to the
hash table? There are several correct answers, and you should give all of them. Assume that the hash
table has never been resized, and no elements have been deleted yet.

a. 12, 14, 3, 9, 4, 18, 21

b. 9, 14, 4, 18, 12, 3, 21

c. 12, 9, 18, 3, 14, 21, 4

d. 12, 3, 14, 18, 4, 9, 21

55. If your software system can continue in spite of unexpected problems from internal and external
environment, we say your system has good:

a. Integrity

b. Robustness

c. Maintainability

d. Reliability

56. What does velocity in big data refer to?

a. Speed of storage consumption

b. Speed of data ingestion

c. Speed of input data generation

d. Speed of data processing and storing

57. Which of the following android component displays the part of an activity on screen?

a. Manifest

b. Intent

c. View

d. Fragment

58. Assume that you are assigned to design a dormitory management database. A dormitory is located on
some building and has attributes specified as DORM (DormID, floornumber) and DormID is a
MoEE - Exit Exam Software Engineering Model Exam

primary key. Based on university's rule, six students can be assigned to one dorm. Students can be tracked
with attributes STUDENT (IdNo, Name, Department) and IdNo is primary key. Referring to this scenario,
if there is a rule that says every DORM must have at least one student, which of the following is true?

a. STUDENT has a total participation

b. STUDENT has existence dependency

c. DORM has partial participation

d. DORM has existence dependency

59. A program that initializes all aspects of the system, from CPU registers to device controllers and the
contents of main memory, and then starts the operating system known as:

a. Bootstrap

b. Cache memory

c. Bootloader

d. BIOS

60. Method overriding is a characteristic of which OOP principle?

a. Abstraction

b. Inheritance

c. Encapsulation

d. Polymorphism

61. A tool that is used to check the quality of software to ensure that it meets some minimum coding
standards.

a. Code Auditor

b. Documenters

c. Test Data Generator

d. Interactive Debuggers

62. A system software that resides in main memory is

a. Compiler

b. Loader

c. Executor

d. Linker
MoEE - Exit Exam Software Engineering Model Exam

63. Which object-oriented principle allows the creation of several methods with the same name that differ
from each other by the type of input and output?

a. Overriding

b. Inheritance

c. Encapsulation

d. Polymorphism

64. Which one is not the criteria for selecting best programming language for your problem:

a. Modularity

b. Platform dependency

c. Portability

d. Code efficiency

65. Which of the following virtual machines is used by the Android operating system?

a. CLR

b. Docker

c. Dalvik virtual machine

d. JVM

66. Which of the following is the first callback method that is invoked by the system during an activity
life-cycle?

a. onRestart0 method

b. onCreate0 method

c. onClick0 method

d. onStartO method

67. APK stands for:

a. Android Phone Kit

b. Android Package Kit

c. Android Page Kit

d. Android Platform Kit

68. Which principle states that 80% of the problems can be fixed with 20% of the entire effort?

a. Pairwise principle
MoEE - Exit Exam Software Engineering Model Exam

b. Partition principle

c. Pareto principle

d. Parametric principle

69. Select the one that is not correct related to generalization in system modeling.

a. In generalization, the attributes and operations associated with higher-level classes are also
associated with the lower-level classes

b. The higher-level classes are more specific than the lower-level classes by adding specific
attributes and operations

c. facilitate easy modification of data

d. common information will be maintained in one place

70. Action attribute in HTML forms specifies

a. The auto completion of form

b. Which HTTP method is used

c. Which action is going on

d. Where to submit form

71. Which of the following indicates the assurance that a product, service, or result meets the needs of the
customer and other identified stakeholders?

a. Variance

b. SWOT Analysis

c. Validation

d. Verification

72. In a relation design, primary key is a critical constraint that should be considered. It should be
defined:

a. Non editable

b. NOT NULL

c. Within limited value

d. NULL

73. Adding additional header information as data moved from the application layer to down refers to:

a. De-capsulation

b. Routing
MoEE - Exit Exam Software Engineering Model Exam

c. Switching

d. Encapsulation

74. The incredible change in business and society as emerging economies develop and new technologies
become available mainly:

a. Makes obsolete the already existing software systems

b. Leads to demand for new software architecture

c. Requires new testing on the existing software systems

d. Leads to Privacy and security breaches

75. A software work product which is associated with the test execution process group is known as:

a. Test Reports

b. Requirements

c. Test Cases

d. Code

76. One of the following statements is inappropriate about Artificial Intelligence?

a. An agent perceives its environment through effectors.

b. It is a preprogrammed system,

c. AI is a multidisciplinary field of study.

d. Ability to learn from the environment

77. Which of the following concept describes bootstrapping?

a. A language interpret other language program

b. A language compile itself

c. A language compiling other language program

d. All of the above

78. Identify the one that does not affect architectural decision

a. Architectural style to be used

b. Type of the application to be developed

c. The way the data is stored

d. Expected performance of the system


MoEE - Exit Exam Software Engineering Model Exam

79. You fit a model too closely to the particularities of the training set and obtain a model that works well
on the training set but works poorly on a new data. This scenario is known as:

a. over fitting

b. sweet spot

c. under performing

d. under fitting

80. For the software architecture to be easily understood by other design experts for later maintenance
and scalability, there should be

a. Architectural optimization techniques

b. Architectural notation and semantic description

c. Architectural refactoring

d. Architectural reverse engineering

81. A modification of the free-list approach is to store the addresses of n free blocks in the first free
block.

a. Grouping

b. Counting

c. Linked-list

d. Deadlock

82. If performance is the critical requirement of your architecture, which architectural approach you apply
while architecting your system?

a. Increase number of component communication

b. Increase number of components

c. Localize critical operations

d. Distribute operations across network

83. What is the time complexity of below function?

Public void function (int n) {

for (int i = 0; i<n; i++)

for(int j=i; j<i*i; j++)

if(j % i == 0) {
MoEE - Exit Exam Software Engineering Model Exam

for (int k = 0;k < j; k++)

print(" * ");

a. O(n7)

b. O(n2)

c. O(n5)

d. O(nlogn)

84. Database approach supports different user groups who might have different interest in different parts
of the database. This characteristic of data base describes:

a. Parallel transaction

b. Multiple users

c. Multiple views

d. Concurrent transaction

85. To reduce the dispute that might arise between the customer and contractor, each requirement should
be documented and later checked during product delivery whether each documented requirements are
fully implemented or not. What type of requirement validation is this?

a. Realism check

b. Verifiability

c. Completeness check

d. Validity check

86. Select the correct statement that describes local search algorithms (LSA):

a. The quality of the solution found by LSA depends heavily on the starting point and the choice of
the neighborhood function

b. LSA are typically used for solving convex optimization problems.

c. The time complexity of LSA is independent of the size of the problem.

d. LSA always guarantee to find the globally optimal solution.

87. One of the following is not purpose of software testing?

a. Improving product acceptance


MoEE - Exit Exam Software Engineering Model Exam

b. Enhancing reliability

c. Identifying shortcomings

d. Requesting more design and implementation time

88. Which of the following statements is false when a packet is being compared to an-access list?

a. It's always compared with each line of the access list in sequential order.

b. Until all lines have been analyzed, the comparison is not over.

c. There is an implicit "deny" at the end of each access list

d. Once the packet matches the condition on a line of the access list, the packet is

89. You have received an e-mail which is unsolicited and commercially known as?

a. Wana Cry

b. Spam

c. Trash

d. Adware

90. For which of the following Android is mainly developed?

a. Servers

b. Mobile devices

c. Laptops

d. Desktops

91. Which activity is not related to data preprocessing?

a. Data transformation

b. Data cleaning

c. Data optimization

d. Data reduction

92. An input stream class in java that is used to read data from file is

a. FileOutputStream

b. PipedInputStream

c. FileInputStream

d. RandomAccessFile
MoEE - Exit Exam Software Engineering Model Exam

93. A data link sub layer which is responsible for identifying Network layer protocols and then
encapsulating them is known as:

a. Point to point Encapsulation

b. Media Access Control

c. Frame relay

d. Logical Link control

94. Assume you have an interface called Payable as follows

public interface Payable{

double getPaymentAmmount();

If you have another class Invoice that implements this interface and getQuantity() and
getPricePerItem() methods that returns quantity and price per item, which of the following is the
correct implementation?

a. public class Invoice extends Payable(

public double getPaymentAmmount0l

return getOuantity() * getPricePerItemO;

b. public class Invoice implements Payable{

public getPaymentAmmount(){

return getQuantity() * getPricePerItem();

c. public class Invoice implements Payable{

public double getPaymentAmmount(){

return getQuantity() * getPricePerItem();

d. public abstract class Invoice implements Payable{

public double getPaymentAmmountO(

return getQuantity() * getPricePerltem0:

95. Refer to the following schemas. Attributes underlined are primary keys

HOTEL (Hotel_id integer, Hotel_ Name: string, Sub city:; string)


MoEE - Exit Exam Software Engineering Model Exam

ROOM (Room_id: integer, Hotel _id: integer,Price: integen)

BOOKING (Hotel id: integer, Room_id: integer,Date_from: date, Date_to: date)

GUEST (Guest_id: integer,Name: string,Country: string)

Considering the above schema, which of the following SOL statement retrieves Hotel names with their
respective Room_id

a. SELECT Hotel_ Name, Room_Id FROM HOTEL, ROOM WHERE ROOM.Hotel_id= HOTEL.
Hotel_id
b. SELECT Hotel_Name, Room_ld FROM HOTEL, ROOM WHERE ROOM.Room_id= HOTEL.
Hotel_id
c. SELECT Hotel_Name, Room_ld FROM HOTEL, ROOM WHERE ROOM. Room_id= HOTEL.
Hotel_id and ROOM. Hotel_id=HOTEL. Hotel_id
d. SELECT Hotel_Name, Room_ld FROM HOTEL, ROOM
96. Which one is different from others?

a. Requirement elicitation
b. Requirements validation
c. Requirements analysis
d. Requirements status tracking
97. Which of the following keywords is used to define a variable in Javascript?

a. const
b. int
c. val
d. let
98. From the following, which one is not among the challenges that are faced by requirement engineers
during requirement elicitation?

a. Conflicting requirements
b. Obsolete requirement
c. requirement change
d. Negative stakeholders
99. When running your program, you did not see any error. However, the final output you got is not
correct. What type of error is this?

a. Compiling error
b. Syntax error
c. Logical error
d. Run time error
100. Which of the following is against the professional ethics of software engineering?

a. Accepting any works regardless of your competence

b. Responsibly remain up-to-date in your profession


MoEE - Exit Exam Software Engineering Model Exam

c. Respect the confidentiality of your employers or clients

d. Use your technical skills responsibly

You might also like