CSI2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

………..separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems

C

2
New cards

(Choose 1 answer)
THE(A) 17th-century computing machine that could perform addition and subtraction was the……
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine

A

3
New cards

(Choose 1 answer)
After the instruction is decoded, the control unit sends the task order to a component in the CPU. What is this phase?
A. Fetch phase
B. Decode phase
C. Execute phase
D. None of the others

B

4
New cards

(Choose 1 answer)
RAM is used as a short memory because it is
A. Volatile
B. Has small capacity
C. Is very expensive
D. Is programmable
E. None of the others

A

5
New cards

(Choose 1 answer)
For surface organization of magnetic tape, the width of the tape is divided into nine tracks. Nine vertical locations can store 8 bits of information related to a byte plus a bit for……
A. Next block
B. Data
C. Next tape information
D. Error detection

D

6
New cards

(Choose 1 answer)
IBM-PC is an example of
A. A mainframe
B. Machine-in-built
C. Microcomputer
D. Special purpose
E. None of the others

C

7
New cards

(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

B

8
New cards

(Choose 1 answer)
Computers are extremely fast and have fantastic memories. However, the only thing they can remember is
A. Instruction
B. Series of 1s and 0s
C. Boolean algebra
D. Logic theorems
E. None of the others

B

9
New cards

(Choose 1 answer)
Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the others

B

10
New cards

(Choose 1 answer)
A group containing…… bits in the binary system are represented as one digit in the octal system.
A. 1
B. 2
C. 3
D. 4
E. None of the others

C

11
New cards

(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is….
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

C

12
New cards

(Choose 1 answer)
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
A. 00011001
B. 00110010
C. 11100111
D. 11110010

C

13
New cards

(Choose 1 answer)
The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others

C

14
New cards

(Choose 1 answer)
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how to calculate BIT RATE (R)?
A. B × 2S
B. 2B × S
C. B × S
D. B² × S²

C

15
New cards

(Choose 1 answer)
In the….. graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
A. Bitmap
B. Vector
C. Quantized
D. Binary

A

16
New cards

(Choose 1 answer)
Use an arithmetic right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000

B

17
New cards

(Choose 1 answer)
Use a simple left shift operation on the bit pattern 1001 1000
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001

C

18
New cards

(Choose 1 answer)
Which physical topology uses a hub or switch?
A. Bus
B. Ring
C. Star
D. Bus and ring

C

19
New cards

(Choose 1 answer)
The TCP/IP model has ….layers.
A. Five
B. Six
C. Seven
D. Eight

A

20
New cards

(Choose 1 answer)
The format of an IPv6 address is referred to as……
A. Dotted-hexadecimal notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. 8- Hexadecimal digits

D

21
New cards

(Choose 1 answer)
…..explicitly defines connection establishment, data transfer, connection teardown phases to provide a connection-oriented service AND reliable protocol.
A. TCP
B. UDP
C. IP
D. HTTP

A

22
New cards

(Choose 1 answer)
In a …. the directory system listing of the peers and what they offer uses the client-server paradigm, but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network

C

23
New cards

(Choose 1 answer)
THE(A) memory that does not change its contents without external causes is known as
A. Dynamic memory
B. Static memory
C. RAM
D. EEPROM
E. None of the others

B

24
New cards

(Choose 1 answer)
Which of the following is the user-programmed semiconductor memory?
A. SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others

C

25
New cards

(Choose 1 answer)
Which of the following holds data and processing instructions temporarily until the CPU needs it?
A. ROM
B. Control unit
C. Main memory
D. Coprocessor chips
E. None of the others

C

26
New cards

(Choose 1 answer)
THE(A) …. is a program in execution. It is a program that has started but has not finished.
A. Program
B. Job
C. Process
D. Task

C

27
New cards

(Choose 1 answer)
What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state

D

28
New cards

(Choose 1 answer)
……is a step-by-step method for solving a problem or doing a task.
A. A construct
B. A recursion
C. An iteration
D. An algorithm

D

29
New cards

(Choose 1 answer)
…….hides all the details of an algorithm in an attempt to give the 'big picture' and to show how the algorithm flows from beginning to end.
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram

A

30
New cards

(Choose 1 answer)
—-----is a process in which an algorithm calls itself.
A. Insertion
B. Searching
C. Recursion
D. Iteration

C

31
New cards

(Choose 1 answer)
In….. unsorted list.sort, the smallest item from the unsorted list is swapped with the item at the beginning of the list.
A. Selection
B. Bubble
C. Insertion
D. Every

A

32
New cards

(Choose 1 answer)
The program in a high-level language is called the…..
A. Programming language
B. Source program
C. Translation
D. Interpretation

B

33
New cards

(Choose 1 answer)
The code that should be adequate for present and anticipated data processing both for machine and human use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others

C

34
New cards

(Choose 1 answer)
In the —-- we can think of a program as an active agent that manipulates passive objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

D

35
New cards

(Choose 1 answer)
—---are names for memory locations.
A. Variables
B. Imperative language
C. Identifiers
D. Data type

A

36
New cards

(Choose 1 answer)
THE(A) ……gives the user's view of a system: it shows how the user communicates with the system.
A. Class diagram
B. State diagram
C. Use-case diagram
D. Sequence diagram

C

37
New cards

(Choose 1 answer)
One phase in system development is……
A. Analysis
B. Application
C. Designing
D. Collecting

A

38
New cards

(Choose 1 answer)
……between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion

B

39
New cards

(Choose 1 answer)
What is quality referring to the ability to move software from one hardware platform to another?
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability

B

40
New cards

(Choose 1 answer)
Testing a software system can involve….. testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box

D

41
New cards

(Choose 1 answer)
THE(A) data structure can be …..
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list

D

42
New cards

(Choose 1 answer)
THE(A) …..is a collection of related elements possibly of different types having a single name.
A. Array
B. Record
C. Linked list
D. Tree

B

43
New cards

(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies……. element of the linked list.
A. The first
B. The second
C. The last
D. Any

A

44
New cards

(Choose 1 answer)
THE(A) …..is a collection of related elements possibly of different types having a single name.
A. Array
B. Record
C. Linked list
D. Tree

B

45
New cards

(Choose 1 answer)
The—- of each node includes one of its children and all descendants of that child.
A. Left tree
B. Binary tree
C. Subtree
D. Right tree

C

46
New cards

(Choose 1 answer)
The enqueue operation….. an item at the……. of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear

D

47
New cards

(Choose 1 answer)
A—- is a collection of data stored in the internal format of the computer. This contains data that is meaningful only if it is properly interpreted by a program.
A. Text file
B. Binary file
C. Sequential file
D. EOF

B

48
New cards

(Choose 1 answer)
When a sequential file is updated, the ….file contains a list of all errors occurring during the update process.
A. New master
B. Old master
C. Transaction
D. Error report

D

49
New cards

(Choose 1 answer)
When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a……
A. Collision
B. Probe
C. Synonym
D. Linked list

A

50
New cards

(Choose 1 answer)
The intersection of a column and row in a spreadsheet is called a… or
A. Key
B. Field
C. Cell
D. Menu
E. None of the others

C

51
New cards

(Choose 1 answer)
In the network database model, the entities are organized in a….. through several paths in which some entities can be accessed.
A. Graph
B. Tree
C. Array
D. Record

graph

52
New cards

(Choose 1 answer)
Each column in a relation is called…..
A. An attribute
B. A tuple
C. A union
D. An attitude

A

53
New cards

(Choose 1 answer)
The unary……operation always results in a relation that has exactly one more row than the original relation.
A. Insert
B. Delete
C. Update
D. Select

A

54
New cards

(Choose 1 answer)
……is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization

D

55
New cards

(Choose 1 answer)
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding

A

56
New cards

(Choose 1 answer)
Before transmission, the sender transforms the plaintext into the ciphertext—this is….
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

C

57
New cards

(Choose 1 answer)
The ethical principle that dictates that an act is ethical when a majority of people in society agrees with it is referred to as….
A. Moral rules
B. Utilization
C. Social contract
D. None of the others

C

58
New cards

(Choose 1 answer)
……who create algorithms to break existing internet networks so as to solve the loopholes in them.
A. Black Hat Hacker
B. Grey Hat Hacker
C. White Hat Hacker
D. Blue Hat Hacker

C

59
New cards

(Choose 1 answer)
In a stream cipher encryption and decryption are done one symbol. We have a plaintext stream, a ciphertext stream, and a …..
A. Key block
B. Single key
C. Key stream
D. Auto key

C

60
New cards

(Choose 1 answer)
The RSA algorithm for confidentiality uses….. cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition