Examination Officer II (Computer Science)
Section A: Examination Management
1. A university examination officer discovers that some students have been allocated to the wrong examination rooms due to a database mismatch. What should be done FIRST?
A. Print new examination cards immediately
B. Suspend all examinations
C. Verify the student allocation records from the database backup
D. Remove all students from the system
Answer: C
2. During online examination registration, students complain that the portal becomes very slow when many users log in simultaneously. Which concept BEST explains this issue?
A. Data redundancy
B. Network congestion
C. Deadlock
D. Data mining
Answer: B
3. An examination officer notices unauthorized changes in examination marks. Which security principle has MOST likely been violated?
A. Availability
B. Confidentiality
C. Integrity
D. Scalability
Answer: C
4. A candidate claims that his results disappeared from the examination system after a power outage. Which mechanism would BEST help prevent such data loss?
A. Antivirus software
B. Database transaction logs and backups
C. Firewall installation
D. Screen locking
Answer: B
5. An institution wants examination records to remain accessible even if one server fails. Which solution is MOST appropriate?
A. Data normalization
B. Server redundancy
C. File compression
D. Encryption
Answer: B
6.
A lecturer accidentally uploads wrong examination scores to the system. Which database feature can help restore previous correct data?
A. Rollback
B. Sorting
C. Compilation
D. Query optimization
Answer: A
7. The examination office wants only authorized staff to access examination results. Which approach should be implemented?
A. Open access policy
B. Role-based access control
C. Data duplication
D. Shared passwords
Answer: B
8. A student attempts to log into the examination system multiple times using random passwords. This is an example of:
A. Brute-force attack
B. Phishing
C. Data mining
D. Spoofing
Answer: A
9. An examination database contains repeated student information in several tables, causing inconsistencies. Which process can solve this problem?
A. Compilation
B. Normalization
C. Encryption
D. Routing
Answer: B
10. An institution plans to move examination services to cloud computing. Which advantage is MOST significant?
A. Reduced accessibility
B. Increased hardware dependency
C. Scalability and remote access
D. Elimination of internet usage
Answer: C
Section B: Database and Information Systems
11. An examination officer wants to retrieve all students who scored above 80 in Database Systems. Which SQL command should be used?
A. DELETE
B. UPDATE
C. SELECT
D. DROP
Answer: C
12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:
A. Foreign key
B. Candidate key
C. Super key
D. Composite key
Answer: A
13. A university stores examination records in a centralized database server. What is the MAIN advantage?
A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing
Answer: B
14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?
A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression
Answer: A
15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?
A. COUNT()
B. SUM()
C. AVG()
D. MAX()
Answer: C
16. A student record is deleted accidentally. Which database mechanism can recover it?
A. Primary key
B. Backup restoration
C. Query processing
D. Indexing
Answer: B
17. A database index is primarily used to:
A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records
Answer: B
18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?
A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL
Answer: C
19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?
A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording
Answer: A
20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?
A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy
Answer: B
Section C: Networking and Security
A. DELETE
B. UPDATE
C. SELECT
D. DROP
Answer: C
12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:
A. Foreign key
B. Candidate key
C. Super key
D. Composite key
Answer: A
13. A university stores examination records in a centralized database server. What is the MAIN advantage?
A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing
Answer: B
14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?
A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression
Answer: A
15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?
A. COUNT()
B. SUM()
C. AVG()
D. MAX()
Answer: C
16. A student record is deleted accidentally. Which database mechanism can recover it?
A. Primary key
B. Backup restoration
C. Query processing
D. Indexing
Answer: B
17. A database index is primarily used to:
A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records
Answer: B
18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?
A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL
Answer: C
19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?
A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording
Answer: A
20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?
A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy
Answer: B
Section C: Networking and Security
21. An online examination system becomes inaccessible due to excessive traffic from attackers. This is MOST likely a:
A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack
Answer: C
22. An institution installs a firewall in the examination office network. The MAIN purpose is to:
A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software
Answer: B
23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:
A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing
Answer: B
24. Which protocol is MOST secure for transmitting examination results over the internet?
A. HTTP
B. FTP
C. HTTPS
D. Telnet
Answer: C
25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?
A. Worm
B. Trojan
C. Spyware
D. Adware
Answer: A
26. The examination department uses biometric authentication. Which security objective does this MOST support?
A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing
Answer: A
27. A hacker inserts malicious SQL commands into a login form. This attack is called:
A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing
Answer: B
28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?
A. Formatting
B. Encryption
C. Partitioning
D. Indexing
Answer: B
29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:
A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing
Answer: A
30. Which device forwards data packets between different networks?
A. Hub
B. Switch
C. Router
D. Repeater
Answer: C
Section D: Operating Systems and Computer Applications
A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack
Answer: C
22. An institution installs a firewall in the examination office network. The MAIN purpose is to:
A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software
Answer: B
23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:
A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing
Answer: B
24. Which protocol is MOST secure for transmitting examination results over the internet?
A. HTTP
B. FTP
C. HTTPS
D. Telnet
Answer: C
25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?
A. Worm
B. Trojan
C. Spyware
D. Adware
Answer: A
26. The examination department uses biometric authentication. Which security objective does this MOST support?
A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing
Answer: A
27. A hacker inserts malicious SQL commands into a login form. This attack is called:
A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing
Answer: B
28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?
A. Formatting
B. Encryption
C. Partitioning
D. Indexing
Answer: B
29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:
A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing
Answer: A
30. Which device forwards data packets between different networks?
A. Hub
B. Switch
C. Router
D. Repeater
Answer: C
Section D: Operating Systems and Computer Applications
31. A computer used for examination processing freezes because too many applications are running simultaneously. Which issue is MOST likely occurring?
A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing
Answer: A
32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?
A. ROM
B. Cache
C. RAM
D. SSD
Answer: C
33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?
A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting
Answer: B
34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:
A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance
Answer: B
35. Which utility software helps detect and remove malicious software from examination computers?
A. Compiler
B. Antivirus
C. Assembler
D. Debugger
Answer: B
36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?
A. Process management
B. Memory management
C. Device management
D. File compression
Answer: C
37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?
A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning
Answer: A
38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?
A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions
Answer: A
39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:
A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation
Answer: A
40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?
A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files
Answer: B
Section E: Software Engineering and Systems Analysis
A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing
Answer: A
32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?
A. ROM
B. Cache
C. RAM
D. SSD
Answer: C
33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?
A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting
Answer: B
34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:
A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance
Answer: B
35. Which utility software helps detect and remove malicious software from examination computers?
A. Compiler
B. Antivirus
C. Assembler
D. Debugger
Answer: B
36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?
A. Process management
B. Memory management
C. Device management
D. File compression
Answer: C
37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?
A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning
Answer: A
38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?
A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions
Answer: A
39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:
A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation
Answer: A
40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?
A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files
Answer: B
Section E: Software Engineering and Systems Analysis
41. Before developing a new examination system, the institution gathers user requirements from staff and students. This phase is called:
A. Coding
B. Testing
C. Requirement analysis
D. Maintenance
Answer: C
42. A software developer tests whether the examination system modules work correctly together. This is known as:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing
Answer: B
43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:
A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection
Answer: B
44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:
A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation
Answer: B
45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:
A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering
Answer: A
46. A flowchart is mainly used to:
A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware
Answer: B
47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:
A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies
Answer: A
48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?
A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software
Answer: B
49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?
A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing
Answer: A
50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?
A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment
Answer: B
Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?
A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency
Answer: B
52.
A staff member installs pirated software in the examination office. This practice violates:
A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles
Answer: B
53.
An examination officer discovers errors in released results. What is the MOST professional action?
A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students
Answer: B
54.
Using another programmer’s code without permission is an example of:
A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking
Answer: B
55.
An institution introduces policies requiring strong passwords. This mainly improves:
A. Physical security
B. Logical security
C. File compression
D. Device cooling
Answer: B
56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:
A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization
Answer: B
57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:
A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability
Answer: A
58.
An institution stores examination records according to legal requirements for future reference. This process is:
A. Archiving
B. Routing
C. Debugging
D. Defragmentation
Answer: A
59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?
A. Accuracy
B. Compression
C. Replication
D. Availability
Answer: A
60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:
A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups
Answer: B
Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?
A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers
Answer: C
62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?
A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory
Answer: B
63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?
A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory
Answer: A
64.
An online examination platform logs users out automatically after inactivity. This primarily improves:
A. Availability
B. Security
C. Compression
D. Scalability
Answer: B
65.
The examination office introduces two-factor authentication. Which combination BEST represents this?
A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username
Answer: C
66.
A database administrator splits one large examination table into smaller related tables. Which process is this?
A. Redundancy
B. Normalization
C. Compilation
D. Encryption
Answer: B
67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?
A. Hashing
B. Formatting
C. Compression
D. Fragmentation
Answer: A
68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?
A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing
Answer: A
69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?
A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips
Answer: B
70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?
A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems
Answer: A
Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:
A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing
Answer: B
72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:
A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing
Answer: A
73.
Which topology has a central device connecting all computers in the examination office?
A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology
Answer: C
74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?
A. Low latency
B. Congestion
C. Authentication
D. Compression
Answer: B
75.
The examination department uses VPN technology for remote access. The MAIN advantage is:
A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed
Answer: B
76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?
A. DNS
B. DHCP
C. FTP
D. SMTP
Answer: B
77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?
A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization
Answer: A
78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?
A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM
Answer: A
79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?
A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly
Answer: B
80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?
A. Hosting
B. Domain name registration
C. Routing
D. Indexing
Answer: B
Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:
A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call
Answer: B
82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?
A. Input validation
B. Virtualization
C. Fragmentation
D. Routing
Answer: A
83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?
A. Exception handling
B. File formatting
C. Compression
D. Routing
Answer: A
84.
A software developer stores examination marks in an array. What is the MAIN advantage?
A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases
Answer: B
85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?
A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation
Answer: B
86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?
A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption
Answer: A
87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?
A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language
Answer: B
88.
A programmer tests individual modules separately before combining them. This is:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing
Answer: A
89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?
A. Compilation
B. Routing
C. Transmission
D. Scheduling
Answer: A
90.
An institution wants examination software to work on different operating systems. Which approach is BEST?
A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing
Answer: B
Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?
A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking
Answer: B
92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?
A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression
Answer: A
93.
An examination database stores passwords in plain text. What is the BEST improvement?
A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files
Answer: A
94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?
A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware
Answer: A
95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?
A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings
Answer: A
96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?
A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently
Answer: B
97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?
A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation
Answer: A
98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?
A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically
Answer: B
99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?
A. Availability
B. Routing
C. Compression
D. Fragmentation
Answer: A
100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?
A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification
Answer: B
A. Coding
B. Testing
C. Requirement analysis
D. Maintenance
Answer: C
42. A software developer tests whether the examination system modules work correctly together. This is known as:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing
Answer: B
43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:
A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection
Answer: B
44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:
A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation
Answer: B
45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:
A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering
Answer: A
46. A flowchart is mainly used to:
A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware
Answer: B
47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:
A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies
Answer: A
48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?
A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software
Answer: B
49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?
A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing
Answer: A
50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?
A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment
Answer: B
Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?
A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency
Answer: B
52.
A staff member installs pirated software in the examination office. This practice violates:
A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles
Answer: B
53.
An examination officer discovers errors in released results. What is the MOST professional action?
A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students
Answer: B
54.
Using another programmer’s code without permission is an example of:
A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking
Answer: B
55.
An institution introduces policies requiring strong passwords. This mainly improves:
A. Physical security
B. Logical security
C. File compression
D. Device cooling
Answer: B
56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:
A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization
Answer: B
57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:
A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability
Answer: A
58.
An institution stores examination records according to legal requirements for future reference. This process is:
A. Archiving
B. Routing
C. Debugging
D. Defragmentation
Answer: A
59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?
A. Accuracy
B. Compression
C. Replication
D. Availability
Answer: A
60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:
A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups
Answer: B
Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?
A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers
Answer: C
62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?
A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory
Answer: B
63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?
A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory
Answer: A
64.
An online examination platform logs users out automatically after inactivity. This primarily improves:
A. Availability
B. Security
C. Compression
D. Scalability
Answer: B
65.
The examination office introduces two-factor authentication. Which combination BEST represents this?
A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username
Answer: C
66.
A database administrator splits one large examination table into smaller related tables. Which process is this?
A. Redundancy
B. Normalization
C. Compilation
D. Encryption
Answer: B
67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?
A. Hashing
B. Formatting
C. Compression
D. Fragmentation
Answer: A
68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?
A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing
Answer: A
69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?
A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips
Answer: B
70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?
A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems
Answer: A
Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:
A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing
Answer: B
72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:
A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing
Answer: A
73.
Which topology has a central device connecting all computers in the examination office?
A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology
Answer: C
74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?
A. Low latency
B. Congestion
C. Authentication
D. Compression
Answer: B
75.
The examination department uses VPN technology for remote access. The MAIN advantage is:
A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed
Answer: B
76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?
A. DNS
B. DHCP
C. FTP
D. SMTP
Answer: B
77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?
A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization
Answer: A
78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?
A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM
Answer: A
79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?
A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly
Answer: B
80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?
A. Hosting
B. Domain name registration
C. Routing
D. Indexing
Answer: B
Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:
A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call
Answer: B
82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?
A. Input validation
B. Virtualization
C. Fragmentation
D. Routing
Answer: A
83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?
A. Exception handling
B. File formatting
C. Compression
D. Routing
Answer: A
84.
A software developer stores examination marks in an array. What is the MAIN advantage?
A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases
Answer: B
85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?
A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation
Answer: B
86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?
A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption
Answer: A
87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?
A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language
Answer: B
88.
A programmer tests individual modules separately before combining them. This is:
A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing
Answer: A
89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?
A. Compilation
B. Routing
C. Transmission
D. Scheduling
Answer: A
90.
An institution wants examination software to work on different operating systems. Which approach is BEST?
A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing
Answer: B
Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?
A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking
Answer: B
92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?
A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression
Answer: A
93.
An examination database stores passwords in plain text. What is the BEST improvement?
A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files
Answer: A
94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?
A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware
Answer: A
95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?
A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings
Answer: A
96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?
A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently
Answer: B
97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?
A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation
Answer: A
98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?
A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically
Answer: B
99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?
A. Availability
B. Routing
C. Compression
D. Fragmentation
Answer: A
100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?
A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification
Answer: B
0 comments:
Post a Comment