“200”, Aptitude Test
Questions and Answers for Tutorial Assistant - Computer Science at Mkwawa
University College of Education.
This document presents 200 multiple-choice
questions with answers to help candidates prepare for the Tutorial Assistant –
Computer Science aptitude test at Mkwawa University College of Education. The
questions cover core areas such as programming, data structures, software
engineering, databases, networking, and logical reasoning. Answer choices are
arranged horizontally to save space, with each correct answer clearly marked
and briefly explained. The content is designed to reflect the real exam’s
complexity, helping candidates build confidence and improve performance.
Prepared by:
ICT Officers in Dar-es-salaam.
Compiled by Johnson Yesaya Mgelwa.
A lawyer stationed in Dar-es-salaam.
0628729934.
Date: July 20, 2025
Dear applicants,
This collection of questions and answers
has been carefully prepared to help all of you to understand the key areas
tested during the aptitude test. The goal is to provide a useful, and practical
study guide so you can all perform confidently and fairly in the selection
process. I wish you the best of luck, and may this resource support you in
achieving success!
Warm regards,
Johnson Yesaya Mgelwa
For Personal Use by Applicants Preparing
for Tutorial Assistant - Computer Science interview at Public Service
Recruitment Service.
ALL
QUESTIONS ARE COMPILED TOGETHER.
1. Which of the following data structures allows elements to be added and removed only at one end?
A. Queue B. Stack C. Deque D. Heap
Answer: B. Stack
Rationale: A stack supports
push and pop operations only at the top, making it a LIFO (Last-In-First-Out)
structure.
2. In relational databases, which constraint prevents null and duplicate values in a column?
A. Foreign Key B. Unique C. Primary Key D. Default
Answer: C. Primary Key
Rationale: A primary key
uniquely identifies each row in a table and must contain unique, non-null
values to ensure data integrity.
3. Which layer of the OSI model is responsible for end-to-end communication?
A. Network Layer B. Transport Layer C. Data Link Layer D. Physical Layer
Answer: B. Transport Layer
Rationale: The transport layer ensures reliable end-to-end
communication, error checking, and flow control between systems.
4. Which concept in OOP restricts direct access to some of an object’s components?
A. Inheritance B. Abstraction C. Encapsulation D. Interface
Answer: C. Encapsulation
Rationale: Encapsulation
protects object data by making it private and accessible only through public
methods.
5. What is the time complexity of binary search in a sorted
array of 'n' elements?
A. O(n) B. O(log n) C. O(n log n) D. O(n²)
Answer: B. O(log n)
Rationale: Binary search divides the array in half at each step,
resulting in a logarithmic time complexity.
6. Which programming paradigm focuses on functions and immutable data?
A. Object-Oriented B. Procedural C. Functional D. Imperative
Answer: C. Functional
Rationale: Functional programming emphasizes the use of pure functions,
immutability, and avoiding shared state.
7. Which of the following SQL commands is used to retrieve data from a database?
A. INSERT B. DELETE C. UPDATE D. SELECT
Answer: D. SELECT
Rationale: The SELECT
command is used to retrieve data from a
table without modifying it. It is the most basic and commonly used command in
SQL for querying information.
8. Which protocol is used to send emails from a client to a server?
A. IMAP B. SMTP C. FTP D. POP3
Answer: B. SMTP
Rationale: SMTP (Simple Mail Transfer Protocol) is used to send emails
from an email client to a mail server.
9. Which sorting algorithm has the best average time complexity?
A. Bubble Sort B. Insertion Sort C. Merge Sort D. Selection Sort
Answer: C. Merge Sort
Rationale: Merge sort consistently offers a time complexity of O(n log
n) for all cases, making it more efficient on average than simpler algorithms.
10. A compiler is primarily used to:
A. Translate high-level code to machine code B. Execute instructions line by line C. Manage memory allocation D. Handle database transactions
Answer: A. Translate high-level code to machine code
Rationale: A compiler converts source code into machine code before
execution, unlike an interpreter that runs code line by line.
11. IPv4 addresses are made up of how many bits?
A. 16 B. 32 C. 64 D. 128
Answer: B. 32
Rationale: IPv4 addresses consist of 32 bits, typically written as four
octets (e.g., 192.168.1.1).
12. What is the main advantage of using an abstract class in object-oriented programming?
A. It increases the size of the program B. It allows instantiation of multiple objects C. It allows defining common interface for related classes D. It avoids inheritance
Answer: C. It allows defining common interface for related classes
Rationale: Abstract classes provide a base for other classes to extend
and implement shared methods, promoting code reuse.
13. In computer networks, which device operates at the network layer?
A. Switch B. Router C. Hub D. Bridge
Answer: B. Router
Rationale: Routers function at the network layer (Layer 3) of the OSI
model and are responsible for directing data between different networks.
14. Which of the following is not a characteristic of a real-time operating system?
A. Predictable behavior B. Time constraints C. High latency D. Determinism
Answer: C. High latency
Rationale: Real-time systems are designed for low latency and
predictable response times to meet strict timing constraints.
15. Which programming language is most commonly used for developing Android applications?
A. Python B. Swift C. Kotlin D. Ruby
Answer: C. Kotlin
Rationale: Kotlin, officially supported by Google, is widely used for
developing modern Android apps due to its concise syntax and safety features.
16. In database normalization, which normal form eliminates transitive dependency?
A. 1NF B. 2NF C. 3NF D. BCNF
Answer: C. 3NF
Rationale: Third Normal Form (3NF) ensures that all attributes are only
dependent on the primary key, thus eliminating transitive dependencies.
17. What does DRY stand for in software development?
A. Don't Repeat Yourself B. Debug Runtime Yourself C. Develop Rapidly Yourself D. Dynamic Run Yield
Answer: A. Don't Repeat Yourself
Rationale: DRY is a principle that encourages code reuse and discourages
redundancy, making code easier to maintain.
18. What is the default port used by DNS?
A. 25 B. 110 C. 53 D. 80
Answer: C. 53
Rationale: DNS uses UDP/TCP
port 53 to resolve domain names into IP addresses, which is essential for
accessing websites.
19. In software development, unit testing is performed to:
A. Verify the user interface B. Evaluate the system as a whole C. Test individual components in isolation D. Conduct security audits
Answer: C. Test individual components in isolation
Rationale: Unit testing focuses on testing small pieces of code, such as
functions or methods, to ensure they work correctly.
20. Which type of software is specifically designed to help users perform tasks such as word processing or browsing the internet?
A. RAM B. Cache C. ROM D. Registers
Answer: C. ROM
Rationale: ROM (Read-Only Memory) retains its contents even when the
power is turned off, unlike RAM and other volatile memory types.
21. Which data structure is ideal for scheduling tasks in a printer queue?
A. Stack B. Queue C. Set D. Tree
Answer: B. Queue
Rationale: A queue follows FIFO
(First-In-First-Out), suitable for processes like printing where order matters.
22. Which of the following HTTP methods is idempotent?
A. POST B. GET C. PUT D. CONNECT
Answer: C. PUT
Rationale: PUT is idempotent, meaning making the same request multiple
times results in the same server state. POST, on the other hand, creates new
resources.
23. Which one of these algorithms is typically used in AI for decision-making?
A. Kruskal’s Algorithm B. Dijkstra’s Algorithm C. Minimax Algorithm D. Prim’s Algorithm
Answer: C. Minimax Algorithm
Rationale: The Minimax algorithm is used in game theory and AI for
decision-making, especially in two-player games like chess.
24. Which of the following is used in data mining to group data into clusters?
A. Classification B. Association C. Clustering D. Regression
Answer: C. Clustering
Rationale: Clustering groups similar data points together based on
defined similarity metrics, useful in pattern discovery and segmentation.
25. What is the purpose of a MAC address in networking?
A. Route packets between networks B. Identify applications on a device C. Uniquely identify a network interface D. Encrypt communication between devices
Answer: C. Uniquely identify a network interface
Rationale: MAC (Media Access Control) addresses uniquely identify each
device’s network interface, enabling proper data transmission at the data link
layer.
26. In software engineering, the Waterfall model is best described as:
A. An iterative development approach B. A rigid and sequential model C. A model based on agile principles D. A user-driven prototyping method
Answer: B. A rigid and sequential model
Rationale: The Waterfall model is a linear, sequential approach to
software development where each phase must be completed before the next begins.
27. Which of the following commands is used to list files in Linux?
A. cd B. ls C. mv D. rm
Answer: B. ls
Rationale: The ls command lists
directory contents in Unix/Linux systems, showing files and subdirectories.
28. Which OOP concept allows the same method name to behave differently in different classes?
A. Abstraction B. Polymorphism C. Inheritance D. Encapsulation
Answer: B. Polymorphism
Rationale: Polymorphism enables
one interface to be used for different underlying data types.
29. Which of the following is the output of 5 % 2 in most programming languages?
A. 0 B. 1 C. 2 D. 5
Answer: B. 1
Rationale: The modulus operator (%) returns the remainder of division. 5
divided by 2 equals 2 with a remainder of 1.
30. Which of the following is best suited for creating plots and statistical charts?
A. C++ B. Java C. R D. HTML
Answer: C. R
Rationale: R is specialized in
statistical computing and data visualization using packages like ggplot2
.
📘 Get the Full Aptitude Test PDF (Questions 31–200)
You’ve just accessed the first 30 questions. The full set of 200 expertly prepared aptitude test questions for the Tutorial Assistant - Computer Science at Mkwawa University College of Education is available for purchase and access.
To get access of the full PDF through your Gmail (Questions 01–200), please make a payment of Tsh 10,000 to the LIPA numbers below:
After payment, please send a text message with the words “Tutorial Assistant - Computer Science” to:
⚠️ Important Notice
- The PDF will be watermarked with your name and phone number and protected for personal use only.
- Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited. When you share unlawfully, your name and phone number are visible and easy to trace because you leaked a document to other third parties.
- Legal action may be taken against the misuse of this material.
Thank you for supporting quality content. Best of luck in your interview preparation!
0 Comments
PLACE YOUR COMMENT HERE
WARNING: DO NOT USE ABUSIVE LANGUAGE BECAUSE IT IS AGAINST THE LAW.
THE COMMENTS OF OUR READERS IS NOT OUR RESPONSIBILITY.