Recent Posts

6/recent/ticker-posts

“200”, Aptitude Test Questions and Answers for Tutorial Assistant - Computer Science at Mkwawa University College of Education.



“200”, Aptitude Test Questions and Answers for Tutorial Assistant - Computer Science at Mkwawa University College of Education.

 

 

This document presents 200 multiple-choice questions with answers to help candidates prepare for the Tutorial Assistant – Computer Science aptitude test at Mkwawa University College of Education. The questions cover core areas such as programming, data structures, software engineering, databases, networking, and logical reasoning. Answer choices are arranged horizontally to save space, with each correct answer clearly marked and briefly explained. The content is designed to reflect the real exam’s complexity, helping candidates build confidence and improve performance.

 

Prepared by:

ICT Officers in Dar-es-salaam.

Compiled by Johnson Yesaya Mgelwa.

A lawyer stationed in Dar-es-salaam.

0628729934.

Date: July 20, 2025

 

Dear applicants,

This collection of questions and answers has been carefully prepared to help all of you to understand the key areas tested during the aptitude test. The goal is to provide a useful, and practical study guide so you can all perform confidently and fairly in the selection process. I wish you the best of luck, and may this resource support you in achieving success!

 

Warm regards,

Johnson Yesaya Mgelwa

 

For Personal Use by Applicants Preparing for Tutorial Assistant - Computer Science interview at Public Service Recruitment Service.

ALL QUESTIONS ARE COMPILED TOGETHER.

1. Which of the following data structures allows elements to be added and removed only at one end?

A. Queue B. Stack C. Deque D. Heap
Answer: B. Stack

Rationale: A stack supports push and pop operations only at the top, making it a LIFO (Last-In-First-Out) structure.


2. In relational databases, which constraint prevents null and duplicate values in a column?

A. Foreign Key B. Unique C. Primary Key D. Default

Answer: C. Primary Key

Rationale: A primary key uniquely identifies each row in a table and must contain unique, non-null values to ensure data integrity.


3. Which layer of the OSI model is responsible for end-to-end communication?

A. Network Layer B. Transport Layer C. Data Link Layer D. Physical Layer
Answer: B. Transport Layer

Rationale: The transport layer ensures reliable end-to-end communication, error checking, and flow control between systems.


4. Which concept in OOP restricts direct access to some of an object’s components?

A. Inheritance B. Abstraction C. Encapsulation D. Interface
Answer: C. Encapsulation

Rationale: Encapsulation protects object data by making it private and accessible only through public methods.


5. What is the time complexity of binary search in a sorted array of 'n' elements?
A. O(n) B. O(log n) C. O(n log n) D. O(n²)

Answer: B. O(log n)

Rationale: Binary search divides the array in half at each step, resulting in a logarithmic time complexity.


6. Which programming paradigm focuses on functions and immutable data?

A. Object-Oriented B. Procedural C. Functional D. Imperative
Answer: C. Functional

Rationale: Functional programming emphasizes the use of pure functions, immutability, and avoiding shared state.


7. Which of the following SQL commands is used to retrieve data from a database?

A. INSERT B. DELETE C. UPDATE D. SELECT

Answer: D. SELECT

Rationale: The SELECT command is used to retrieve data from a table without modifying it. It is the most basic and commonly used command in SQL for querying information.


8. Which protocol is used to send emails from a client to a server?

A. IMAP B. SMTP C. FTP D. POP3
Answer: B. SMTP

Rationale: SMTP (Simple Mail Transfer Protocol) is used to send emails from an email client to a mail server.


9. Which sorting algorithm has the best average time complexity?

A. Bubble Sort B. Insertion Sort C. Merge Sort D. Selection Sort

Answer: C. Merge Sort

Rationale: Merge sort consistently offers a time complexity of O(n log n) for all cases, making it more efficient on average than simpler algorithms.


10. A compiler is primarily used to:

A. Translate high-level code to machine code B. Execute instructions line by line C. Manage memory allocation D. Handle database transactions

Answer: A. Translate high-level code to machine code

Rationale: A compiler converts source code into machine code before execution, unlike an interpreter that runs code line by line.


11. IPv4 addresses are made up of how many bits?

A. 16 B. 32 C. 64 D. 128

Answer: B. 32

Rationale: IPv4 addresses consist of 32 bits, typically written as four octets (e.g., 192.168.1.1).


12. What is the main advantage of using an abstract class in object-oriented programming?

A. It increases the size of the program B. It allows instantiation of multiple objects C. It allows defining common interface for related classes D. It avoids inheritance

Answer: C. It allows defining common interface for related classes

Rationale: Abstract classes provide a base for other classes to extend and implement shared methods, promoting code reuse.


13. In computer networks, which device operates at the network layer?

A. Switch B. Router C. Hub D. Bridge

Answer: B. Router

Rationale: Routers function at the network layer (Layer 3) of the OSI model and are responsible for directing data between different networks.


14. Which of the following is not a characteristic of a real-time operating system?

A. Predictable behavior B. Time constraints C. High latency D. Determinism

Answer: C. High latency

Rationale: Real-time systems are designed for low latency and predictable response times to meet strict timing constraints.


15. Which programming language is most commonly used for developing Android applications?

A. Python B. Swift C. Kotlin D. Ruby

Answer: C. Kotlin

Rationale: Kotlin, officially supported by Google, is widely used for developing modern Android apps due to its concise syntax and safety features.


16. In database normalization, which normal form eliminates transitive dependency?

A. 1NF B. 2NF C. 3NF D. BCNF

Answer: C. 3NF

Rationale: Third Normal Form (3NF) ensures that all attributes are only dependent on the primary key, thus eliminating transitive dependencies.


17. What does DRY stand for in software development?

A. Don't Repeat Yourself B. Debug Runtime Yourself C. Develop Rapidly Yourself D. Dynamic Run Yield

Answer: A. Don't Repeat Yourself

Rationale: DRY is a principle that encourages code reuse and discourages redundancy, making code easier to maintain.


18. What is the default port used by DNS?

A. 25 B. 110 C. 53 D. 80

Answer: C. 53

Rationale: DNS uses UDP/TCP port 53 to resolve domain names into IP addresses, which is essential for accessing websites.


19. In software development, unit testing is performed to:

A. Verify the user interface B. Evaluate the system as a whole C. Test individual components in isolation D. Conduct security audits

Answer: C. Test individual components in isolation

Rationale: Unit testing focuses on testing small pieces of code, such as functions or methods, to ensure they work correctly.


20. Which type of software is specifically designed to help users perform tasks such as word processing or browsing the internet?

A. RAM B. Cache C. ROM D. Registers

Answer: C. ROM

Rationale: ROM (Read-Only Memory) retains its contents even when the power is turned off, unlike RAM and other volatile memory types.


21. Which data structure is ideal for scheduling tasks in a printer queue?

A. Stack B. Queue C. Set D. Tree

Answer: B. Queue

Rationale: A queue follows FIFO (First-In-First-Out), suitable for processes like printing where order matters.


22. Which of the following HTTP methods is idempotent?

A. POST B. GET C. PUT D. CONNECT

Answer: C. PUT

Rationale: PUT is idempotent, meaning making the same request multiple times results in the same server state. POST, on the other hand, creates new resources.


23. Which one of these algorithms is typically used in AI for decision-making?

A. Kruskal’s Algorithm B. Dijkstra’s Algorithm C. Minimax Algorithm D. Prim’s Algorithm

Answer: C. Minimax Algorithm

Rationale: The Minimax algorithm is used in game theory and AI for decision-making, especially in two-player games like chess.


24. Which of the following is used in data mining to group data into clusters?

A. Classification B. Association C. Clustering D. Regression

Answer: C. Clustering

Rationale: Clustering groups similar data points together based on defined similarity metrics, useful in pattern discovery and segmentation.


25. What is the purpose of a MAC address in networking?

A. Route packets between networks B. Identify applications on a device C. Uniquely identify a network interface D. Encrypt communication between devices

Answer: C. Uniquely identify a network interface

Rationale: MAC (Media Access Control) addresses uniquely identify each device’s network interface, enabling proper data transmission at the data link layer.

26. In software engineering, the Waterfall model is best described as:

A. An iterative development approach B. A rigid and sequential model C. A model based on agile principles D. A user-driven prototyping method

Answer: B. A rigid and sequential model

Rationale: The Waterfall model is a linear, sequential approach to software development where each phase must be completed before the next begins.


27. Which of the following commands is used to list files in Linux?

A. cd B. ls C. mv D. rm

Answer: B. ls

Rationale: The ls command lists directory contents in Unix/Linux systems, showing files and subdirectories.


28. Which OOP concept allows the same method name to behave differently in different classes?

A. Abstraction B. Polymorphism C. Inheritance D. Encapsulation

Answer: B. Polymorphism

Rationale: Polymorphism enables one interface to be used for different underlying data types.


29. Which of the following is the output of 5 % 2 in most programming languages?

A. 0 B. 1 C. 2 D. 5

Answer: B. 1

Rationale: The modulus operator (%) returns the remainder of division. 5 divided by 2 equals 2 with a remainder of 1.


30. Which of the following is best suited for creating plots and statistical charts?

A. C++ B. Java C. R D. HTML

Answer: C. R

Rationale: R is specialized in statistical computing and data visualization using packages like ggplot2.


 

📘 Get the Full Aptitude Test PDF (Questions 31–200)

You’ve just accessed the first 30 questions. The full set of 200 expertly prepared aptitude test questions for the Tutorial Assistant - Computer Science at Mkwawa University College of Education is available for purchase and access.

To get access of the full PDF through your Gmail (Questions 01–200), please make a payment of Tsh 10,000 to the LIPA numbers below:

Airtel Money LIPA Number: 13970429
M-Pesa Withdrawal code:  826910
Registered Name: Johnson Yesaya Mgelwa

After payment, please send a text message with the words Tutorial Assistant - Computer Science to:

Contact Number: +255 628 729 934

⚠️ Important Notice

  • The PDF will be watermarked with your name and phone number and protected for personal use only.
  • Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited. When you share unlawfully, your name and phone number are visible and easy to trace because you leaked a document to other third parties.
  • Legal action may be taken against the misuse of this material.

Thank you for supporting quality content. Best of luck in your interview preparation!

Post a Comment

0 Comments