Advertise here ✔️

Phone: +255 692 127 931 Email: njoholes@gmail.com

Monday, May 18, 2026

EXAMINATION OFFICER (COMPUTER SCIENCE) QUESTIONS AND ANSWERS

 


Examination Officer II (Computer Science)


Section A: Examination Management
1. A university examination officer discovers that some students have been allocated to the wrong examination rooms due to a database mismatch. What should be done FIRST?

A. Print new examination cards immediately
B. Suspend all examinations
C. Verify the student allocation records from the database backup
D. Remove all students from the system

Answer: C

2. During online examination registration, students complain that the portal becomes very slow when many users log in simultaneously. Which concept BEST explains this issue?

A. Data redundancy
B. Network congestion
C. Deadlock
D. Data mining

Answer: B

3. An examination officer notices unauthorized changes in examination marks. Which security principle has MOST likely been violated?

A. Availability
B. Confidentiality
C. Integrity
D. Scalability

Answer: C

4. A candidate claims that his results disappeared from the examination system after a power outage. Which mechanism would BEST help prevent such data loss?

A. Antivirus software
B. Database transaction logs and backups
C. Firewall installation
D. Screen locking

Answer: B

5.  An institution wants examination records to remain accessible even if one server fails. Which solution is MOST appropriate?

A. Data normalization
B. Server redundancy
C. File compression
D. Encryption

Answer: B

6.
A lecturer accidentally uploads wrong examination scores to the system. Which database feature can help restore previous correct data?

A. Rollback
B. Sorting
C. Compilation
D. Query optimization

Answer: A

7. The examination office wants only authorized staff to access examination results. Which approach should be implemented?

A. Open access policy
B. Role-based access control
C. Data duplication
D. Shared passwords

Answer: B

8. A student attempts to log into the examination system multiple times using random passwords. This is an example of:

A. Brute-force attack
B. Phishing
C. Data mining
D. Spoofing

Answer: A

9. An examination database contains repeated student information in several tables, causing inconsistencies. Which process can solve this problem?

A. Compilation
B. Normalization
C. Encryption
D. Routing

Answer: B

10. An institution plans to move examination services to cloud computing. Which advantage is MOST significant?

A. Reduced accessibility
B. Increased hardware dependency
C. Scalability and remote access
D. Elimination of internet usage

Answer: C

Section B: Database and Information Systems

11. An examination officer wants to retrieve all students who scored above 80 in Database Systems. Which SQL command should be used?

A. DELETE
B. UPDATE
C. SELECT
D. DROP

Answer: C

12. A database administrator creates relationships between Students and Results tables using student IDs. The student ID acts as a:

A. Foreign key
B. Candidate key
C. Super key
D. Composite key

Answer: A

13. A university stores examination records in a centralized database server. What is the MAIN advantage?

A. Increased duplication
B. Easier data management
C. Reduced security
D. Slower processing

Answer: B

14. An examination system suddenly crashes because two transactions access the same data simultaneously. Which issue is this?

A. Concurrency conflict
B. Token passing
C. Fragmentation
D. Compression

Answer: A

15. The examination office needs a report showing the average marks per course. Which SQL function is MOST suitable?

A. COUNT()
B. SUM()
C. AVG()
D. MAX()

Answer: C

16. A student record is deleted accidentally. Which database mechanism can recover it?

A. Primary key
B. Backup restoration
C. Query processing
D. Indexing

Answer: B

17. A database index is primarily used to:

A. Increase storage requirements
B. Speed up data retrieval
C. Reduce security
D. Duplicate records

Answer: B

18. An examination officer wants to prevent duplicate student registration numbers in the database. Which constraint should be applied?

A. DEFAULT
B. CHECK
C. UNIQUE
D. NULL

Answer: C

19. The examination office needs to combine student information from multiple campuses into one system. Which approach is BEST?

A. Distributed database system
B. Standalone system
C. Analog processing
D. Manual recording

Answer: A

20. A query is taking too long to execute because the table has millions of rows. Which action can improve performance?

A. Deleting all rows
B. Adding indexes
C. Removing constraints
D. Increasing redundancy

Answer: B

Section C: Networking and Security

21. An online examination system becomes inaccessible due to excessive traffic from attackers. This is MOST likely a:

A. Phishing attack
B. SQL injection
C. Denial-of-Service attack
D. Trojan attack

Answer: C

22. An institution installs a firewall in the examination office network. The MAIN purpose is to:

A. Increase monitor size
B. Control network traffic
C. Speed up typing
D. Replace antivirus software

Answer: B

23. A staff member receives an email requesting examination passwords and system credentials. This is an example of:

A. Spoofing
B. Phishing
C. Encryption
D. Multiprocessing

Answer: B

24. Which protocol is MOST secure for transmitting examination results over the internet?

A. HTTP
B. FTP
C. HTTPS
D. Telnet

Answer: C

25. An examination officer notices that computers restart automatically after opening unknown USB files. Which malware is MOST likely responsible?

A. Worm
B. Trojan
C. Spyware
D. Adware

Answer: A

26. The examination department uses biometric authentication. Which security objective does this MOST support?

A. Authentication
B. Compression
C. Fragmentation
D. Multiplexing

Answer: A

27. A hacker inserts malicious SQL commands into a login form. This attack is called:

A. Brute force
B. SQL Injection
C. Sniffing
D. Spoofing

Answer: B

28. An examination officer wants to ensure that data cannot be read by unauthorized users during transmission. Which method should be used?

A. Formatting
B. Encryption
C. Partitioning
D. Indexing

Answer: B

29. A network administrator divides a network into smaller sections to improve security and performance. This process is called:

A. Segmentation
B. Duplication
C. Broadcasting
D. Multiprocessing

Answer: A

30. Which device forwards data packets between different networks?

A. Hub
B. Switch
C. Router
D. Repeater

Answer: C

Section D: Operating Systems and Computer Applications

31. A computer used for examination processing freezes because too many applications are running simultaneously. Which issue is MOST likely occurring?

A. Resource exhaustion
B. Normalization
C. Encryption
D. Indexing

Answer: A

32. An examination officer accidentally closes a program without saving results data. Which memory type loses data immediately after power loss?

A. ROM
B. Cache
C. RAM
D. SSD

Answer: C

33. A university wants multiple users to access one server simultaneously. Which operating system feature supports this?

A. Single-user processing
B. Multi-user capability
C. File compression
D. Formatting

Answer: B

34. An examination office uses virtualization to run multiple operating systems on one physical server. The MAIN advantage is:

A. Increased hardware cost
B. Better resource utilization
C. Reduced storage
D. Slower performance

Answer: B

35. Which utility software helps detect and remove malicious software from examination computers?

A. Compiler
B. Antivirus
C. Assembler
D. Debugger

Answer: B

36. A staff member cannot print examination reports because the printer queue is full. Which operating system function is involved?

A. Process management
B. Memory management
C. Device management
D. File compression

Answer: C

37. An examination office plans to automate repetitive tasks such as report generation. Which tool is MOST suitable?

A. Scripting
B. Defragmentation
C. Formatting
D. Partitioning

Answer: A

38. A candidate’s results file becomes inaccessible due to corruption. Which file management strategy BEST reduces such risks?

A. Regular backups
B. Deleting old files
C. Renaming files daily
D. Disabling permissions

Answer: A

39. An operating system schedules processes to ensure fair CPU usage among users. This is handled by:

A. CPU scheduling
B. Encryption
C. Routing
D. Fragmentation

Answer: A

40. An examination officer needs to share files securely between offices. Which method is MOST appropriate?

A. Public USB sharing
B. Shared cloud storage with permissions
C. Open Wi-Fi transfer
D. Printing all files

Answer: B

Section E: Software Engineering and Systems Analysis

41. Before developing a new examination system, the institution gathers user requirements from staff and students. This phase is called:

A. Coding
B. Testing
C. Requirement analysis
D. Maintenance

Answer: C

42. A software developer tests whether the examination system modules work correctly together. This is known as:

A. Unit testing
B. Integration testing
C. Acceptance testing
D. Regression testing

Answer: B

43. An examination system is implemented in phases instead of all at once to reduce risk. This strategy is:

A. Parallel implementation
B. Phased implementation
C. Direct changeover
D. Pilot rejection

Answer: B

44. A programmer updates the examination software to fix discovered bugs after deployment. This activity is:

A. Feasibility study
B. Maintenance
C. Analysis
D. Documentation

Answer: B

45. An institution evaluates whether a proposed examination system is affordable and practical. This study is called:

A. Feasibility study
B. Stress testing
C. Benchmarking
D. Reverse engineering

Answer: A

46. A flowchart is mainly used to:

A. Encrypt data
B. Illustrate program logic
C. Remove malware
D. Configure hardware

Answer: B

47. A system analyst creates diagrams showing interactions between users and the examination system. These are called:

A. Use case diagrams
B. Pie charts
C. Histograms
D. Topologies

Answer: A

48. An examination office wants software that can be modified freely by developers. Which type is MOST suitable?

A. Proprietary software
B. Open-source software
C. Commercial software
D. Trial software

Answer: B

49. The examination system fails after new updates are installed. Which testing type ensures existing functions still work?

A. Regression testing
B. Alpha testing
C. White-box testing
D. Black-box testing

Answer: A

50. A software team uses Agile methodology for examination system development. Which characteristic BEST describes Agile?

A. Rigid planning only
B. Continuous feedback and iteration
C. No testing required
D. One-time deployment

Answer: B


Section F: ICT Ethics and Professionalism
51.
An examination officer shares student results with unauthorized individuals. Which ethical principle is violated?

A. Accountability
B. Confidentiality
C. Accessibility
D. Transparency

Answer: B


52.
A staff member installs pirated software in the examination office. This practice violates:

A. Data mining policies
B. Intellectual property rights
C. Cloud computing rules
D. Multiprocessing principles

Answer: B


53.
An examination officer discovers errors in released results. What is the MOST professional action?

A. Ignore the errors
B. Correct and communicate transparently
C. Delete all records
D. Blame students

Answer: B


54.
Using another programmer’s code without permission is an example of:

A. Virtualization
B. Plagiarism
C. Authentication
D. Benchmarking

Answer: B


55.
An institution introduces policies requiring strong passwords. This mainly improves:

A. Physical security
B. Logical security
C. File compression
D. Device cooling

Answer: B


56.
A staff member intentionally alters marks for personal gain. This act is BEST described as:

A. Professionalism
B. Cyber ethics violation
C. Data normalization
D. Optimization

Answer: B


57.
An examination officer is required to maintain accurate records and be answerable for actions performed. This principle is:

A. Accountability
B. Redundancy
C. Fragmentation
D. Scalability

Answer: A


58.
An institution stores examination records according to legal requirements for future reference. This process is:

A. Archiving
B. Routing
C. Debugging
D. Defragmentation

Answer: A


59.
A candidate requests correction of wrongly entered biodata before certification. Which data quality attribute is MOST relevant?

A. Accuracy
B. Compression
C. Replication
D. Availability

Answer: A


60.
An examination office establishes disaster recovery procedures. The MAIN objective is to:

A. Increase downtime
B. Ensure business continuity
C. Reduce internet usage
D. Eliminate backups

Answer: B


Section G: Advanced Scenario-Based Questions
61.
An examination portal crashes during online exams because the server CPU reaches 100% usage. Which upgrade would MOST directly improve performance?

A. Increasing RAM only
B. Replacing monitors
C. Upgrading CPU resources
D. Installing speakers

Answer: C


62.
Students are unable to access examination results because DNS services are down. What is the MAIN role of DNS?

A. Encrypting data
B. Translating domain names into IP addresses
C. Compressing files
D. Allocating memory

Answer: B


63.
An institution wants examination data synchronized automatically between campuses. Which technology BEST supports this?

A. Replication
B. Formatting
C. Defragmentation
D. Virtual memory

Answer: A


64.
An online examination platform logs users out automatically after inactivity. This primarily improves:

A. Availability
B. Security
C. Compression
D. Scalability

Answer: B


65.
The examination office introduces two-factor authentication. Which combination BEST represents this?

A. Username and username
B. Password and PIN
C. Password and fingerprint
D. Email and username

Answer: C


66.
A database administrator splits one large examination table into smaller related tables. Which process is this?

A. Redundancy
B. Normalization
C. Compilation
D. Encryption

Answer: B


67.
An institution needs to ensure examination data remains unchanged during transmission. Which technique BEST supports this?

A. Hashing
B. Formatting
C. Compression
D. Fragmentation

Answer: A


68.
A candidate submits online examination answers, but the internet disconnects before submission confirmation. Which database property ensures incomplete transactions are not saved?

A. Atomicity
B. Scalability
C. Virtualization
D. Multiplexing

Answer: A


69.
A university plans to store huge examination archives for many years at low cost. Which storage solution is MOST suitable?

A. Cache memory
B. Magnetic tape/cloud archival storage
C. CPU registers
D. ROM chips

Answer: B


70.
An examination officer needs graphical summaries of student performance trends. Which software category is MOST suitable?

A. Spreadsheet software
B. Antivirus software
C. Compiler software
D. Operating systems

Answer: A


Section H: Data Communication and Internet Technologies
71.
A university uses Wi‑Fi for examination office communication. Wi‑Fi is an example of:

A. Wired network
B. Wireless network
C. Optical storage
D. Parallel processing

Answer: B


72.
An examination officer sends confidential reports using email attachments protected by passwords. This mainly supports:

A. Data confidentiality
B. Data redundancy
C. Device management
D. Load balancing

Answer: A


73.
Which topology has a central device connecting all computers in the examination office?

A. Ring topology
B. Bus topology
C. Star topology
D. Mesh topology

Answer: C


74.
An institution experiences packet loss during online examinations. Which network issue is MOST likely responsible?

A. Low latency
B. Congestion
C. Authentication
D. Compression

Answer: B


75.
The examination department uses VPN technology for remote access. The MAIN advantage is:

A. Reduced security
B. Secure remote communication
C. Eliminating internet use
D. Faster typing speed

Answer: B


76.
An examination officer notices duplicate IP addresses causing communication failure. Which service can automatically assign unique IP addresses?

A. DNS
B. DHCP
C. FTP
D. SMTP

Answer: B


77.
A student accesses the examination portal using a smartphone. Which technology enables responsive display on mobile devices?

A. Responsive web design
B. Multiprocessing
C. Defragmentation
D. Normalization

Answer: A


78.
An institution uses video conferencing for remote viva examinations. Which network requirement is MOST critical?

A. High bandwidth
B. Low storage
C. Weak authentication
D. Reduced RAM

Answer: A


79.
An examination office experiences unauthorized wireless access. Which action BEST improves Wi‑Fi security?

A. Disable passwords
B. Enable WPA2/WPA3 encryption
C. Increase monitor size
D. Share credentials publicly

Answer: B


80.
The examination office website becomes inaccessible because its domain registration expired. Which service was MOST affected?

A. Hosting
B. Domain name registration
C. Routing
D. Indexing

Answer: B


Section I: Programming and Logic
81.
A programmer writes a loop that never ends while processing examination records. This is called:

A. Finite loop
B. Infinite loop
C. Nested loop
D. Recursive call

Answer: B


82.
An examination officer wants software to validate student IDs automatically before submission. Which programming concept is MOST relevant?

A. Input validation
B. Virtualization
C. Fragmentation
D. Routing

Answer: A


83.
A program crashes when invalid marks are entered. Which programming practice helps avoid this?

A. Exception handling
B. File formatting
C. Compression
D. Routing

Answer: A


84.
A software developer stores examination marks in an array. What is the MAIN advantage?

A. Stores mixed unrelated data only
B. Allows indexed access to multiple values
C. Eliminates memory use
D. Replaces databases

Answer: B


85.
An examination system calculates grades automatically based on marks ranges. Which programming structure is MOST suitable?

A. Sequence only
B. Decision structure
C. Infinite loop
D. Compilation

Answer: B


86.
A programmer wants reusable code for generating examination reports. Which concept is MOST appropriate?

A. Function/procedure
B. Fragmentation
C. Multiplexing
D. Encryption

Answer: A


87.
An examination system stores student objects with attributes such as name and registration number. Which paradigm is this?

A. Procedural programming
B. Object-oriented programming
C. Assembly programming
D. Machine language

Answer: B


88.
A programmer tests individual modules separately before combining them. This is:

A. Unit testing
B. Integration testing
C. Acceptance testing
D. Beta testing

Answer: A


89.
An examination portal displays an error because variables were declared incorrectly. Which stage would MOST likely detect this?

A. Compilation
B. Routing
C. Transmission
D. Scheduling

Answer: A


90.
An institution wants examination software to work on different operating systems. Which approach is BEST?

A. Platform-dependent development only
B. Cross-platform development
C. Manual processing
D. Analog computing

Answer: B


Section J: Comprehensive Mixed Scenarios
91.
An examination officer receives complaints that online results are displayed very slowly. Monitoring shows excessive database queries. Which solution is BEST?

A. Increase paper usage
B. Optimize queries and indexes
C. Remove the database
D. Disable networking

Answer: B


92.
An institution wants automatic alerts when suspicious login attempts occur. Which technology is MOST suitable?

A. Intrusion detection system
B. Spreadsheet software
C. Printer drivers
D. File compression

Answer: A


93.
An examination database stores passwords in plain text. What is the BEST improvement?

A. Use password hashing
B. Print passwords
C. Share passwords openly
D. Store passwords in Word files

Answer: A


94.
An examination office migrates from paper-based records to digital systems. Which challenge is MOST likely during transition?

A. User resistance and training needs
B. Elimination of all risks
C. Reduced need for policies
D. Removal of all hardware

Answer: A


95.
A university stores examination data in the cloud and wants guaranteed uptime. Which agreement is MOST important?

A. Service Level Agreement (SLA)
B. Routing table
C. Source code license only
D. BIOS settings

Answer: A


96.
An examination officer notices that system logs show repeated failed login attempts from one IP address. What should be done FIRST?

A. Ignore the logs
B. Block or investigate the suspicious IP
C. Delete all user accounts
D. Shut down all computers permanently

Answer: B


97.
A university examination system allows students to recover forgotten passwords through email verification. Which security concept is being applied?

A. Authentication recovery
B. Data redundancy
C. Multiplexing
D. Defragmentation

Answer: A


98.
An examination officer exports student results into PDF format before sharing. Why is PDF commonly preferred?

A. Easy modification by everyone
B. Consistent formatting across devices
C. Requires compilation
D. Removes security automatically

Answer: B


99.
An institution introduces automated backup schedules for examination data every night. Which security objective does this MOST support?

A. Availability
B. Routing
C. Compression
D. Fragmentation

Answer: A


100.
An examination officer is asked to design a secure and efficient examination management environment. Which combination is MOST appropriate?

A. Shared passwords and no backups
B. Encryption, role-based access, backups, and audit logs
C. Public Wi‑Fi with no authentication
D. Manual-only processing without verification

Answer: B


Share:

0 comments:

Post a Comment

Contact Us

SALEHE NJOHOLE P.O.BOX 2428, DAR ES SALAAM, TANZANIA EAST AFRIKA. Call: 0692 127 931