1/321
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
For each entity set in the E-R diagram we create a relation (table) in which there are n columns related to the attributes defined for that set.
B. n
The base of the binary number system is _.
A. 2
The base of the octal number system is _.
B. 8
The base of the hexadecimal number system is _.
D. 16
A byte consists of _ bits.
C. 8
A control unit with five wires can define up to _ operations.
D. 32
The maximum value of an octal integer with K=2 digits is Nmax = __?
A. 63
The maximum value of a binary integer with K digits. For example, if K = 5, then the maximum value is _?
B. 31
EBCDIC can code up to how many different characters?
E. 256
What is the number of bit patterns provided by a 7-bit code?
B. 128
If the memory address space is 16 MB and the word size is 8 bits, then _ bits are needed to access each word.
C. 24
In a positional number system with base b, we can always find the number of digits of an integer. So how many bits can we find in the decimal number 20 in octal system?
B. 2
A group contains _ bits in the binary system are represented as one digit in the octal system.
C. 3
A group includes _ bits in the binary system are represented as one digit in the hexadecimal system.
D. 4
In a positional number system with base b, we can always find the number of digits of an integer. So how many digits can we find in the decimal number 20 in octal system?
B. 2
In a positional number system with base b, we can always find the number of digits of an integer. So how many digits can we find in the decimal number 20 in hexadecimal system?
B. 2
A database management system (DBMS) is a combination of _ components
D. 5
How many bits that we can find in the decimal number 20 in binary system?
B. 5
In two's complement representation with a 4-bit allocation, we get _ when we add 5 to 5.
B. -5
In the sign-and-magnitude representation, the memory location can hold four bits, assume that we have stored integer -0 in a memory location and we then try to subtract 7 to the integer. The computer's response is ____?
D. -7
Assume memory location that can only hold four bits. What is the result, if we have stored the integer 11 in a memory location and then try to add 9 to the unsigned integer?
A. 4
The ____ is the component that does the arithmetic and logical operations.
B. ALU
The ASCII code for the character J is 74. what is a ASCII code for the character O?
B. 79
We want to have a computer to be able to store any of 500 different symbols. How many bits will be needed?
B. 9
Which of the following memories is volatile?
A. RAM
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?
C. 65535
Which 32-bit microprocessor is used in IBM's PS/2 model-80 computer?
D. 80486
In storing audio, how many samples per second is good enough to reproduce an audio signal?
D. 8 000
The hexadecimal equivalent of (01010111)2 is _.
B. 57
If the last three bits of the mantissa are 111 (in base 2), what is the error in the number if we use the chopping method?
A. 7/8
If the last three bits of the mantissa are 101 (in base 2), what is the error in the number if we use the chopping method?
A. 5/8
The Boolean expression for a three-input AND gate is _.
D. Y=ABC
A ____ is a group of eight bits.
B. byte
The number of addresses in a 1024 x 8 memory is _.
B. 1024
The instruction ____ provides the means for branching to a different part of the program.
C. JUMP
The operation that inverts the value of a bit is the ____ operation.
C. NOT
If we are adding two numbers, one of which has a sign bit of 0 and the other has a sign bit of 1, ____ can happen.
D. neither overflow nor underflow
The ____ operation is true if and only if both inputs are true.
A. AND
The ____ operation is true if and only if both inputs are different.
D. XOR
The ____ operation is true if either or both inputs are true.
B. OR
A ____ is a data type that can have only one of two values: true or false.
C. Boolean
The ____ method of integer representation is the most common method for storing integers in computer memory.
C. two's complement
The smallest storage area in a computer is a ____.
A. bit
What is the value of the binary number 1001 in decimal?
C. 9
If we want to add the numbers 9 and 1 in the computer, what is the answer in binary?
A. 1010
In the floating-point representation, we need to normalize the number. Normalization means that the first digit of the mantissa must be ____.
B. 1
How many symbols can be represented by a bit pattern with 10 bits?
D. 1024
If the exponent in Excess_127 is 130, the value of the exponent is ____.
B. 3
If the exponent in Excess_127 is 120, the value of the exponent is ____.
C. -7
In storing audio, how many samples per second is good enough to reproduce an audio signal that contains frequencies up to 20,000 HZ?
D. 40 000
Conversion of binary number 1010101000010111 to hexadecimal number is.
C. AA17
Which of the following is equivalent to 12 in decimal?
B. (C)16
Which of the following representations is erroneous?
C. (EEG)16
Which of the following representations is erroneous?
D. 22A
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how to calculate BIT RATE (R)?
C. B x S
The ASCII code for the character J is:
C. 0100 1010
Use a arithmetic right shift operation on the bit pattern 1001 1000
B. 1100 1100
Use a simple right shift operation on the bit pattern 1001 1000.
D. 0100 1100
Use a simple left shift operation on the bit pattern 1001 1000
C. 0011 0000
Use a circular right shift operation on the bit pattern 1001 1000
A. 0100 1100
Use a circular left shift operation on the bit pattern 1001 1000
B. 0011 0001
The binary equivalent of the Octal number 13.54 is
A. 1011.1011
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
C. 11100111
An IPv4 address is a _ address that uniquely and universally defines the connection of a host or a router to the Internet
A. 32-bit
The major design goals of an operating system:
A, B, C, D
Defining the users, requirements, and methods is part of the _ phase.
A. Analysis
In the system development process, structure charts are tools used in the ____ phase.
B. Design
In a ____ the project team needs to choose a language or a set of languages from among the procedural languages
B. Design phase
____ is an English-language-like representation of code.
C. Pseudocode
A step-by-step solution to a problem is called ____
D. An algorithm
____ is a step-by-step method for solving a problem or doing a task.
D. An algorithm
The ____ scheduler creates a process from a job and changes a process back to a job.
A. Job
A ____ is a program in execution. It is a program that has started but has not finished
C. Process
A ____ analyzer reads the source code symbol by symbol and creates a list of tokens in the source language
A. Lexical
The ____ analyzer checks the sentences created by the syntax analyzer to be sure that they contain no ambiguity.
C. Semantic
In the sequential file we process the records one by one. After the operating system processes the last record the ___ is detected and the loop is exited.
C. EOF
A ____ is a collection of data stored in the internal format of the computer. This contains data that is meaningful only if it is properly interpreted by a program.
B. Binary file
If personal information about each employee in a company is stored in a file we can use ____ access to retrieve each record at the end of the month to print the paychecks
B. Sequential file
____ is an attack that reduce the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources.
A. DoS
____ is an independent program which can copy itself and which travels through the network. It tries to find weaknesses in the system to inflict harm
C. Worms
____ are unwanted programs that are hidden within other programs (host). When the user executes the host program
B. Trojan horses
____ these are the 'bad guys'. They are the types of hackers who break into computer networks with purely negative motives such as monetary gain or reputation.
A. Black Hat Hacker
____ who create algorithms to break existing internet networks so as to solve the loopholes in them
C. White Hat Hacker
____ is the amateur. Usually their techniques are deployed out of ill motives such as revenge attacks
C. Red Hat Hacker
____ who exploit the internet systems only to make public certain vast datasets of information that would be of benefit to everyone.
B. Grey Hat Hacker
In the storing images, the samples are called ____ (which stands for picture elements).
B. Pixels
The scanning rate in image processing is called ____ If the resolution is sufficiently high, the human eye cannot recognize the discontinuity in reproduced images
C. Resolution
In physical layer, an ____ has infinitely many levels of intensity over a period of time
A. Analog signals
In physical layer, a ____ can have only a limited number of defined values. Although each value can be any number, it is often as simple as 1 and 0.
C. Digital signals
The ____ construct uses a set of actions one after another.
A. Sequence
The ____ construct tests a condition.
B. Decision
The program in a high-level language is called the ____
B. Source program
____ refers to the process of translating each line of the source program into the corresponding line of the object program and executing the line.
D. Interpretation
Prolog is an example of a(n) ____ language.
C. Declarative
Pascal is a(n) ____ language.
A. Procedural
In a three-level DBMS architecture, the layer that interacts directly with the hardware is the ____ level.
C. Internal
In a three-level DBMS architecture, the ____ level interacts directly with the users.
A. External
The ____ level of a three-level DBMS architecture defines the logical view of the data.
B. Conceptual
Each row in a relation is called ____
B. A tuple
Each column in a relation is called ____
A. An attribute