1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A step-by-step solution to a problem is called [___].
A. Hardware
B. An operating system
C. A computer language
D. An algorithm
D
The first microprocessors produced by Intel Corporation and Texas Instruments were used primarily to control small [___].
A. Microwave ovens
B. Washing machines
C. Calculators
D. Personal computers
E. Robotics
C
Off-line operation is the operation of devices without the control of [___].
A. Memory
B. CPU
C. ALU
D. Control unit
E. None of the others
B
[___] is a memory type with capacitors that need to be refreshed periodically.
A. SRAM
B. DRAM
C. ROM
D. CROM
B
In magnetic disks, the [___] defines how fast the disk is spinning.
A. Seek time
B. Transfer time
C. Rotational speed
D. None of the others
C
What is the name given to the molecular-scale computer?
A. Femtocomputer
B. Nanocomputer
C. Supercomputer
D. Microcomputer
E. None of the others
B
Which is a unit representing the number of bits of discrete?
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others
C
The base of the binary number system is [___].
A. 2
B. 8
C. 10
D. 16
2
When converting a decimal fraction to base b, we repeatedly [___] b.
A. Divide by
B. Multiply by
C. Add to
D. Subtract from
B
The binary equivalent of the octal number 13.54 is [___].
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
A
In a positional number system with base b, we can always find the number of digits of an integer. So, how many bits can we find in the decimal number 20 in the hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
A
In the sign-and-magnitude representation, the memory location can hold four bits. Assume that we have stored integer -6 in a memory location and we then try to subtract 7 from the integer. The computer's response is?
A. 6
B. -6
C. 7
D. -7
B
Different sets of bit patterns have been designed to represent text symbols. Each set is called a [___]?
A. Bit patterns
B. Binary
C. Code
D. Binary text file
C
When we want to store music in a computer, the audio signal must be [___].
A. Sampled only
B. Quantized only
C. Coded only
D. Sampled, quantized, and coded
D
What is NOT a standard of vector graphics?
A. CAD
B. FLASH
C. TrueType
D. PostScript
E. None of the others
C
Use a simple left shift operation on the bit pattern 1001 1000.
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001
C
A [___] WAN is a network that connects two communicating devices through a transmission medium (cable or air).
A. Peer-to-peer
B. Node-to-node
C. Point-to-point
D. Data link
C
In the physical layer, an [___] has infinitely many levels of intensity over a period of time.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals
A
At the transport layer, [] addresses are called source and destination, and these define the application-layer programs at the [].
A. TCP
B. Port numbers
C. UDP
D. IP address
B
[___] is the standard protocol provided by TCP/IP for copying a file from one host to another and transferring files from one system to another.
A. FTP
B. SMTP
C. URL
D. HTTP
A
The [___] is a protocol that is used to define how the client-server programs can be written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
D
All the instructions and procedures needed to start up a computer, to the point it can load an operating system, are stored in ROM chips. In IBM-compatible PCs, this is called the [___].
A. RAM BIOS
B. ROM BIOS
C. EPROM
D. POST
E. None of the others
B
Which is an electronic device that can store temporarily a single bit of data?
A. Accumulator
B. Buffer
C. Memory
D. Latch
E. None of the others
D
Which technique is used in multiprogramming that needs to be determined size beforehand by the memory manager and with each program occupying a contiguous space?
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
A
A [___] is a program in execution. It is a program that has started but has not finished.
A. Program
B. Job
C. Process
D. Task
C
The device manager will be tracking every device constantly to ensure that the device is [___].
A. Ready
B. Finished
C. Functioning properly
D. Running
C
The list of coded instructions is called [___].
A. Computer program
B. Algorithm
C. Flowchart
D. Utility programs
E. None of the others
A
[A.] A construct is an ordered set of unambiguous steps that produces a result and terminates in finite time.
B. A recursion
C. An iteration
D. An algorithm
D
We use a [___] search for an unordered list.
A. Sequential
B. Binary
C. Bubble
D. Insertion
A
In [___] sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
A. Selection
B. Bubble
C. Insertion
D. Every
A
The ambiguity analyzer checks the sentences created by the syntax analyzer to be sure that they contain no [___].
A. Lexical
B. Syntax
C. Semantic
D. Code generation
B
An instruction that transfers program control to one or more possible paths is known as [___].
A. Utility program
B. System software
C. Broadband channel
D. Application program
E. None of the others
E
What is a language of the procedural paradigm that is a high-level language and also has some low-level instructions?
A. COBOL
B. C
C. Pascal
D. Ada
B
A [___] causes an action to be performed by the program. It translates directly into one or more executable computer instructions.
A. Expression
B. Operator
C. Variables
D. Statements
D
What is the analysis process in the system implementation phase that will use a program as an active agent that manipulates a passive object?
A. Procedure-oriented analysis
B. Structured analysis
C. Classical analysis
D. All of the others
A
One phase in system development is [___].
A. Analysis
B. Application
C. Designing
D. Collecting
A
[___] is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
D
In software quality, what factor measures can be mentioned for transferability?
A. Accuracy
B. Timeliness
C. Resusability
D. Changeability
C
What is the method in black-box testing where tests are designed to include representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
A
An array that consists of just rows and columns is a [___] array.
A. One-dimensional
B. Two-dimensional
C. Three-dimensional
D. Multidimensional
B
A [___] is a set of characters that is treated like an array in some languages and as a type in others.
A. A string
B. A record
C. A symbol
D. A link
A
The name of a linked list is the name of the head pointer that points to the [___] of the list.
A. First node
B. Second node
C. Null node
D. Last node
A
The pop operation of the stack [___].
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
A
In preorder traversal of a binary tree, the [___] is processed first.
A. Left subtree is processed first
B. Right subtree is processed first
C. Root is processed first
D. The root is never processed
C
The enqueue operation [] an item at the [] of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear
D
A [___] is a collection of data stored in the internal format of the computer. This contains data that is meaningful only if it is properly interpreted by a program.
A. Text file
B. Binary file
C. Sequential file
D. EOF
B
In the hashing method, there are no synonyms or collisions. [___]
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
A
The address produced by a hashing algorithm is the [___] address.
A. Probe
B. Synonym
C. Collision
D. Home
D
A [___] is a collection of related logically coherent data used by the application programs in an organization.
A. Database
B. File
C. Directory
D. Flat-file
A
In the relational database model, data is organized in [___] called relations.
A. Two-dimensional array
B. Two-dimensional tables
C. Two-dimensional record
D. None of others
B
Each row in a relation is called
A. An attribute
B. A tuple
C. A union
D. An attitude
B
If you want to change the value of an attribute of a tuple, you use the [___] operation.
A. Project
B. Join
C. Update
D. Select
C
[___] is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
D
Which of the following attacks is threatening confidentiality?
A. Snooping
B. Repudiation
C. Denial of service
D. Modification
A
[___] means concealing the message by covering it with something else.
A. Cryptography
B. Steganography
C. Compressing
D. Authentication
B
[___] is an attack that reduces the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources.
A. DoS
B. Trojan horses
C. Worms
D. Viruses
A
[___] is the amateur. Usually, their techniques are deployed out of ill motives such as revenge attacks.
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker
D
In a block cipher, a [___] is used to encrypt the whole block, even if the key is made of multiple values.
A. Key block
B. Single key
C. Key stream
D. Auto key
C
The RSA algorithm for confidentiality uses [___] cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition
A
Use an arithmetic right shift operation on the bit pattern 1001 1000.
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
B