1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
………..separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
C
(Choose 1 answer)
THE(A) 17th-century computing machine that could perform addition and subtraction was the……
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine
A
(Choose 1 answer)
After the instruction is decoded, the control unit sends the task order to a component in the CPU. What is this phase?
A. Fetch phase
B. Decode phase
C. Execute phase
D. None of the others
B
(Choose 1 answer)
RAM is used as a short memory because it is
A. Volatile
B. Has small capacity
C. Is very expensive
D. Is programmable
E. None of the others
A
(Choose 1 answer)
For surface organization of magnetic tape, the width of the tape is divided into nine tracks. Nine vertical locations can store 8 bits of information related to a byte plus a bit for……
A. Next block
B. Data
C. Next tape information
D. Error detection
D
(Choose 1 answer)
IBM-PC is an example of
A. A mainframe
B. Machine-in-built
C. Microcomputer
D. Special purpose
E. None of the others
C
(Choose 1 answer)
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
B
(Choose 1 answer)
Computers are extremely fast and have fantastic memories. However, the only thing they can remember is
A. Instruction
B. Series of 1s and 0s
C. Boolean algebra
D. Logic theorems
E. None of the others
B
(Choose 1 answer)
Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the others
B
(Choose 1 answer)
A group containing…… bits in the binary system are represented as one digit in the octal system.
A. 1
B. 2
C. 3
D. 4
E. None of the others
C
(Choose 1 answer)
Conversion of binary number 1010101000010111 to hexadecimal number is….
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
C
(Choose 1 answer)
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
A. 00011001
B. 00110010
C. 11100111
D. 11110010
C
(Choose 1 answer)
The ASCII code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others
C
(Choose 1 answer)
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how to calculate BIT RATE (R)?
A. B × 2S
B. 2B × S
C. B × S
D. B² × S²
C
(Choose 1 answer)
In the….. graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
A. Bitmap
B. Vector
C. Quantized
D. Binary
A
(Choose 1 answer)
Use an arithmetic right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
B
(Choose 1 answer)
Use a simple left shift operation on the bit pattern 1001 1000
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001
C
(Choose 1 answer)
Which physical topology uses a hub or switch?
A. Bus
B. Ring
C. Star
D. Bus and ring
C
(Choose 1 answer)
The TCP/IP model has ….layers.
A. Five
B. Six
C. Seven
D. Eight
A
(Choose 1 answer)
The format of an IPv6 address is referred to as……
A. Dotted-hexadecimal notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. 8- Hexadecimal digits
D
(Choose 1 answer)
…..explicitly defines connection establishment, data transfer, connection teardown phases to provide a connection-oriented service AND reliable protocol.
A. TCP
B. UDP
C. IP
D. HTTP
A
(Choose 1 answer)
In a …. the directory system listing of the peers and what they offer uses the client-server paradigm, but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network
C
(Choose 1 answer)
THE(A) memory that does not change its contents without external causes is known as
A. Dynamic memory
B. Static memory
C. RAM
D. EEPROM
E. None of the others
B
(Choose 1 answer)
Which of the following is the user-programmed semiconductor memory?
A. SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
C
(Choose 1 answer)
Which of the following holds data and processing instructions temporarily until the CPU needs it?
A. ROM
B. Control unit
C. Main memory
D. Coprocessor chips
E. None of the others
C
(Choose 1 answer)
THE(A) …. is a program in execution. It is a program that has started but has not finished.
A. Program
B. Job
C. Process
D. Task
C
(Choose 1 answer)
What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state
D
(Choose 1 answer)
……is a step-by-step method for solving a problem or doing a task.
A. A construct
B. A recursion
C. An iteration
D. An algorithm
D
(Choose 1 answer)
…….hides all the details of an algorithm in an attempt to give the 'big picture' and to show how the algorithm flows from beginning to end.
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram
A
(Choose 1 answer)
—-----is a process in which an algorithm calls itself.
A. Insertion
B. Searching
C. Recursion
D. Iteration
C
(Choose 1 answer)
In….. unsorted list.sort, the smallest item from the unsorted list is swapped with the item at the beginning of the list.
A. Selection
B. Bubble
C. Insertion
D. Every
A
(Choose 1 answer)
The program in a high-level language is called the…..
A. Programming language
B. Source program
C. Translation
D. Interpretation
B
(Choose 1 answer)
The code that should be adequate for present and anticipated data processing both for machine and human use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
E. None of the others
C
(Choose 1 answer)
In the —-- we can think of a program as an active agent that manipulates passive objects.
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
D
(Choose 1 answer)
—---are names for memory locations.
A. Variables
B. Imperative language
C. Identifiers
D. Data type
A
(Choose 1 answer)
THE(A) ……gives the user's view of a system: it shows how the user communicates with the system.
A. Class diagram
B. State diagram
C. Use-case diagram
D. Sequence diagram
C
(Choose 1 answer)
One phase in system development is……
A. Analysis
B. Application
C. Designing
D. Collecting
A
(Choose 1 answer)
……between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
B
(Choose 1 answer)
What is quality referring to the ability to move software from one hardware platform to another?
A. Flexibility
B. Interoperability
C. Reusability
D. Changeability
B
(Choose 1 answer)
Testing a software system can involve….. testing.
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box
D
(Choose 1 answer)
THE(A) data structure can be …..
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
D
(Choose 1 answer)
THE(A) …..is a collection of related elements possibly of different types having a single name.
A. Array
B. Record
C. Linked list
D. Tree
B
(Choose 1 answer)
Given a linked list called children, the pointer variable children identifies……. element of the linked list.
A. The first
B. The second
C. The last
D. Any
A
(Choose 1 answer)
THE(A) …..is a collection of related elements possibly of different types having a single name.
A. Array
B. Record
C. Linked list
D. Tree
B
(Choose 1 answer)
The—- of each node includes one of its children and all descendants of that child.
A. Left tree
B. Binary tree
C. Subtree
D. Right tree
C
(Choose 1 answer)
The enqueue operation….. an item at the……. of the queue.
A. Delete/front
B. Delete/end
C. Inserts/front
D. Insert/rear
D
(Choose 1 answer)
A—- is a collection of data stored in the internal format of the computer. This contains data that is meaningful only if it is properly interpreted by a program.
A. Text file
B. Binary file
C. Sequential file
D. EOF
B
(Choose 1 answer)
When a sequential file is updated, the ….file contains a list of all errors occurring during the update process.
A. New master
B. Old master
C. Transaction
D. Error report
D
(Choose 1 answer)
When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a……
A. Collision
B. Probe
C. Synonym
D. Linked list
A
(Choose 1 answer)
The intersection of a column and row in a spreadsheet is called a… or
A. Key
B. Field
C. Cell
D. Menu
E. None of the others
C
(Choose 1 answer)
In the network database model, the entities are organized in a….. through several paths in which some entities can be accessed.
A. Graph
B. Tree
C. Array
D. Record
graph
(Choose 1 answer)
Each column in a relation is called…..
A. An attribute
B. A tuple
C. A union
D. An attitude
A
(Choose 1 answer)
The unary……operation always results in a relation that has exactly one more row than the original relation.
A. Insert
B. Delete
C. Update
D. Select
A
(Choose 1 answer)
……is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
D
(Choose 1 answer)
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding
A
(Choose 1 answer)
Before transmission, the sender transforms the plaintext into the ciphertext—this is….
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
C
(Choose 1 answer)
The ethical principle that dictates that an act is ethical when a majority of people in society agrees with it is referred to as….
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
C
(Choose 1 answer)
……who create algorithms to break existing internet networks so as to solve the loopholes in them.
A. Black Hat Hacker
B. Grey Hat Hacker
C. White Hat Hacker
D. Blue Hat Hacker
C
(Choose 1 answer)
In a stream cipher encryption and decryption are done one symbol. We have a plaintext stream, a ciphertext stream, and a …..
A. Key block
B. Single key
C. Key stream
D. Auto key
C
(Choose 1 answer)
The RSA algorithm for confidentiality uses….. cryptography.
A. Asymmetric-key
B. Symmetric-key
C. Substitution
D. Transposition