CSI 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

A step-by-step solution to a problem is called [___].
A. Hardware
B. An operating system
C. A computer language
D. An algorithm

D

2
New cards

The first microprocessors produced by Intel Corporation and Texas Instruments were used primarily to control small [___].
A. Microwave ovens
B. Washing machines
C. Calculators
D. Personal computers
E. Robotics

C

3
New cards

Off-line operation is the operation of devices without the control of [___].
A. Memory
B. CPU
C. ALU
D. Control unit
E. None of the others

B

4
New cards

[___] is a memory type with capacitors that need to be refreshed periodically.
A. SRAM
B. DRAM
C. ROM
D. CROM

B

5
New cards

In magnetic disks, the [___] defines how fast the disk is spinning.
A. Seek time
B. Transfer time
C. Rotational speed
D. None of the others

C

6
New cards

What is the name given to the molecular-scale computer?
A. Femtocomputer
B. Nanocomputer
C. Supercomputer
D. Microcomputer
E. None of the others

B

7
New cards

Which is a unit representing the number of bits of discrete?
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others

C

8
New cards

The base of the binary number system is [___].
A. 2
B. 8
C. 10
D. 16

2

9
New cards

When converting a decimal fraction to base b, we repeatedly [___] b.
A. Divide by
B. Multiply by
C. Add to
D. Subtract from

B

10
New cards

The binary equivalent of the octal number 13.54 is [___].
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others

A

11
New cards

 In a positional number system with base b, we can always find the number of digits of an integer. So, how many bits can we find in the decimal number 20 in the hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others

A

12
New cards

 In the sign-and-magnitude representation, the memory location can hold four bits. Assume that we have stored integer -6 in a memory location and we then try to subtract 7 from the integer. The computer's response is?
A. 6
B. -6
C. 7
D. -7

B

13
New cards

 Different sets of bit patterns have been designed to represent text symbols. Each set is called a [___]?
A. Bit patterns
B. Binary
C. Code
D. Binary text file

C

14
New cards

 When we want to store music in a computer, the audio signal must be [___].
A. Sampled only
B. Quantized only
C. Coded only
D. Sampled, quantized, and coded

D

15
New cards

What is NOT a standard of vector graphics?
A. CAD
B. FLASH
C. TrueType
D. PostScript
E. None of the others

C

16
New cards

 Use a simple left shift operation on the bit pattern 1001 1000.
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001

C

17
New cards

A [___] WAN is a network that connects two communicating devices through a transmission medium (cable or air).
A. Peer-to-peer
B. Node-to-node
C. Point-to-point
D. Data link

C

18
New cards

 In the physical layer, an [___] has infinitely many levels of intensity over a period of time.
A. Analog signals
B. Electromagnetic signals
C. Digital signals
D. Electronic signals

A

19
New cards

 At the transport layer, [] addresses are called source and destination, and these define the application-layer programs at the [].
A. TCP
B. Port numbers
C. UDP
D. IP address

B

20
New cards

 [___] is the standard protocol provided by TCP/IP for copying a file from one host to another and transferring files from one system to another.
A. FTP
B. SMTP
C. URL
D. HTTP

A

21
New cards

 The [___] is a protocol that is used to define how the client-server programs can be written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP

D

22
New cards

 All the instructions and procedures needed to start up a computer, to the point it can load an operating system, are stored in ROM chips. In IBM-compatible PCs, this is called the [___].
A. RAM BIOS
B. ROM BIOS
C. EPROM
D. POST
E. None of the others

B

23
New cards

 Which is an electronic device that can store temporarily a single bit of data?
A. Accumulator
B. Buffer
C. Memory
D. Latch
E. None of the others

D

24
New cards

 Which technique is used in multiprogramming that needs to be determined size beforehand by the memory manager and with each program occupying a contiguous space?
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation

A

25
New cards

 A [___] is a program in execution. It is a program that has started but has not finished.
A. Program
B. Job
C. Process
D. Task

C

26
New cards

 The device manager will be tracking every device constantly to ensure that the device is [___].
A. Ready
B. Finished
C. Functioning properly
D. Running

C

27
New cards

 The list of coded instructions is called [___].
A. Computer program
B. Algorithm
C. Flowchart
D. Utility programs
E. None of the others

A

28
New cards

 [A.] A construct is an ordered set of unambiguous steps that produces a result and terminates in finite time.
B. A recursion
C. An iteration
D. An algorithm

D

29
New cards

 We use a [___] search for an unordered list.
A. Sequential
B. Binary
C. Bubble
D. Insertion

A

30
New cards

 In [___] sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
A. Selection
B. Bubble
C. Insertion
D. Every

A

31
New cards

 The ambiguity analyzer checks the sentences created by the syntax analyzer to be sure that they contain no [___].
A. Lexical
B. Syntax
C. Semantic
D. Code generation

B

32
New cards

An instruction that transfers program control to one or more possible paths is known as [___].
A. Utility program
B. System software
C. Broadband channel
D. Application program
E. None of the others

E

33
New cards

 What is a language of the procedural paradigm that is a high-level language and also has some low-level instructions?
A. COBOL
B. C
C. Pascal
D. Ada

B

34
New cards

 A [___] causes an action to be performed by the program. It translates directly into one or more executable computer instructions.
A. Expression
B. Operator
C. Variables
D. Statements

D

35
New cards

 What is the analysis process in the system implementation phase that will use a program as an active agent that manipulates a passive object?
A. Procedure-oriented analysis
B. Structured analysis
C. Classical analysis
D. All of the others

A

36
New cards

 One phase in system development is [___].
A. Analysis
B. Application
C. Designing
D. Collecting

A

37
New cards

 [___] is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization

D

38
New cards

 In software quality, what factor measures can be mentioned for transferability?
A. Accuracy
B. Timeliness
C. Resusability
D. Changeability

C

39
New cards

 What is the method in black-box testing where tests are designed to include representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing

A

40
New cards

 An array that consists of just rows and columns is a [___] array.
A. One-dimensional
B. Two-dimensional
C. Three-dimensional
D. Multidimensional

B

41
New cards

 A [___] is a set of characters that is treated like an array in some languages and as a type in others.
A. A string
B. A record
C. A symbol
D. A link

A

42
New cards

 The name of a linked list is the name of the head pointer that points to the [___] of the list.
A. First node
B. Second node
C. Null node
D. Last node

A

43
New cards

 The pop operation of the stack [___].
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

A

44
New cards

 In preorder traversal of a binary tree, the [___] is processed first.
A. Left subtree is processed first
B. Right subtree is processed first
C. Root is processed first
D. The root is never processed

C

45
New cards

 The enqueue operation [] an item at the [] of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear

D

46
New cards

 A [___] is a collection of data stored in the internal format of the computer. This contains data that is meaningful only if it is properly interpreted by a program.
A. Text file
B. Binary file
C. Sequential file
D. EOF

B

47
New cards

 In the hashing method, there are no synonyms or collisions. [___]
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction

A

48
New cards

 The address produced by a hashing algorithm is the [___] address.
A. Probe
B. Synonym
C. Collision
D. Home

D

49
New cards

 A [___] is a collection of related logically coherent data used by the application programs in an organization.
A. Database
B. File
C. Directory
D. Flat-file

A

50
New cards

In the relational database model, data is organized in [___] called relations.
A. Two-dimensional array
B. Two-dimensional tables
C. Two-dimensional record
D. None of others

B

51
New cards

 Each row in a relation is called
A. An attribute
B. A tuple
C. A union
D. An attitude

B

52
New cards

 If you want to change the value of an attribute of a tuple, you use the [___] operation.
A. Project
B. Join
C. Update
D. Select

C

53
New cards

 [___] is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization

D

54
New cards

Which of the following attacks is threatening confidentiality?
A. Snooping
B. Repudiation
C. Denial of service
D. Modification

A

55
New cards

 [___] means concealing the message by covering it with something else.
A. Cryptography
B. Steganography
C. Compressing
D. Authentication

B

56
New cards

 [___] is an attack that reduces the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources.
A. DoS
B. Trojan horses
C. Worms
D. Viruses

A

57
New cards

 [___] is the amateur. Usually, their techniques are deployed out of ill motives such as revenge attacks.
A. Black Hat Hacker
B. Grey Hat Hacker
C. Red Hat Hacker
D. Blue Hat Hacker

D

58
New cards

 In a block cipher, a [___] is used to encrypt the whole block, even if the key is made of multiple values.
A. Key block
B. Single key
C. Key stream
D. Auto key

C

59
New cards

 The RSA algorithm for confidentiality uses [___] cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition

A

60
New cards

 Use an arithmetic right shift operation on the bit pattern 1001 1000.
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000

B