1/264
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
9. Which of the following representations is erroneous?
a) (111)2
b) (346)8
c) (EEG)16
d) 221
C
The _______ model is the basis for today's computers.
a. Leibnitz
b. von Neumann
c. Pascal
d. Charles Babbage
B
In a computer, the _______ subsystem stores data and programs.
a. ALU
b. input/output
c. memory
d. control unit
C
In a computer, the _______ subsystem performs calculations and logical opera-tions.
a. ALU
b. input/output
c. memory
d. control unit
A
In a computer, the _______ subsystem accepts data and programs and sends pro-cessing results to output devices.
a. ALU
b. input/output
c. memory
d. control unit
B
In a computer, the _______ subsystem serves as a manager of the other subsys-tems.
a. ALU
b. input/output
c. memory
d. control unit
D
According to the von Neumann model, _______ are stored in memory.
a. only data
b. only programs
c. data and programs
d. neither data nor programs
C
A step-by-step solution to a problem is called _______.
a. hardware
b. an operating system
c. a computer language
d. an algorithm
D
FORTRAN and COBOL are examples of _______.
a. hardware
b. operating systems
c. computer languages
d. algorithms
C
A 17th-century computing machine that could perform addition and subtraction was the _______.
a. Pascaline
b. Jacquard loom
c. Analytical Engine
d. Babbage machine
A
_______ is a set of instructions in a computer language that tells the computer what to do with data.
a. An operating system
b. An algorithm
c. A data processor
d. A program
D
The first electronic special-purpose computer was called _______.
a. Pascal
b. Pascaline
c. ABC
d. ENIAC
C
One of the first computers based on the von Neumann model was called _______.
a. Pascal
b. Pascaline
c. ABC
d. EDVAC
D
The first computing machine to use the idea of storage and programming was called _______.
a. the Madeline
b. EDVAC
c. the Babbage machine
d. the Jacquard loom
D
2. The base of the binary number system is ____.
a) 2
b) 8
c) 10
d) 16
A
6. When converting a binary fraction to decimal, we repeatedly ____.
a) divide
b) multiply
c) add to
d) subtract from
B
7. Which of the following representations is erroneous?
a) (10111)2
b) (349)8
c) (3AB)16
d) 256
B
8. Which of the following representations is erroneous?
a) (10211)2
b) (342)8
c) (EEE)16
d) 145
A
10. Which of the following representations is erroneous?
a) (110)2
b) (141)8
c) (EF)16
d) 22A
D
11. Which of the following is equivalent to 12 in decimal?
a) (1110)2
b) (C)16
c) (15)8
d) None of the others
B
12. Which of the following is equivalent to 24 in decimal?
a) (11000)2
b) (1A)16
c) (31)8
d) None of the others
A
13. Convert the binary number 1001 to decimal. The answer is:
a) 7
b) 9
c) 11
d) 15
B
_______ is the design and writing of a program in structured form.
a. Software engineering
b. Hardware engineering
c. Algorithm development
d. Instructional architecture
A
_______ separated the programming task from computer operation tasks.
a. Algorithms
b. Data processors
c. High-level programming languages
d. Operating systems
C
1. The base of the decimal number system is ____.
a) 2
b) 8
c) 10
d) 16
C
3. The base of the octal number system is ____.
a) 2
b) 8
c) 10
d) 16
B
4. The base of the hexadecimal number system is ____.
a) 2
b) 8
c) 10
d) 16
D
5. When converting a decimal integer to base b, we repeatedly _____ b.
a) divide
b) multiply
c) add to
d) subtract from
A
14. Convert the binary number 101010 to hexadecimal:
a) 1A
b) 1B
c) 2A
d) 2B
C
15. Convert the hexadecimal number 1B to decimal:
a) 21
b) 23
c) 27
d) 29
C
A byte consists of _______ bits.
a. 2
b. 4
c. 8
d. 16
C
In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.
a. 4
b. 5
c. 6
d. 7
c
How many symbols can be represented by a bit pattern with ten bits?
a. 128
b. 256
c. 512
d. 1024
d
If the ASCII code for E is 1000101, then the ASCII code for e is _______. An-swer the question without consulting the ASCII table.
a. 1000110
b. 1000111
c. 0000110
d. 1100101
d
A 32-bit code called _______ represents symbols in all languages.
a. ANSI
b. Unicode
c. EBCDIC
d. Extended ASCII
b
An image can be represented in a computer using the _______ method.
a. bitmap graphic
b. vector graphic
c. only
d. either bitmap or vector graphic
d
In the _______ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.
a. bitmap
b. vector
c. quantized
d. binary
a
In the _______ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.
a. bitmap
b. vector
c. quantized
d. binary
b
In the _______ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.
a. bitmap
b. vector
c. quantized
d. binary
a
Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?
a. 17
b. 16
c. 65535
d. 65536
c
Which number representation method is often used to store the exponential value of a fractional part?
a. unsigned integers
b. two's complement
c. Excess
d. ten's complement
c
In an Excess conversion, we _______ the number to be converted.
a. add the bias number to
b. the bias number from
c. multiply the bias number by
d. divide
a
When a fractional part is normalized, the computer stores the _______.
a. only the sign
b. only the exponent
c. only the mantissa
d. the sign, exponent, and mantissa
d
The precision of the fractional part of a number stored in a computer is defined by the _______.
a. sign
b. exponent
c. mantissa
d. last digit
c
The combination of sign and mantissa of a real number in IEEE standard float-ing point format is stored as an integer in the ____________ representation.
a. unsigned
b. sign-and-magnitude
c. two's complement
d. one's complement
b
1. _______ is an arithmetic operation.
a. The exclusive OR
b. The unary NOT
c. Subtraction
d. The binary AND
c
2. _______ is a logical bit operator.
a. The exclusive OR
b. The unary NOT
c. The binary AND
d. exclusive OR, unary NOT, or binary AND
d
3. The _______ method of integer representation is the most common method for storing integers in computer memory.
a. sign-and-magnitude
b. one's complement
c. two's complement
d. unsigned integers
c
4. In two's complement addition, if there is a final carry after the left most column addition, _______.
a. add it to the right most column
b. add it to the left most column
c. discard it
d. increase the bit length
c
5. For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is _______.
a. -8
b. -127
c. -128
d. -256
c
6. For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is _______.
a. 8
b. 127
c. 128
d. 256
b
7. In two's complement representation with a 4-bit allocation, we get _______ when we add 1 to 7.
a. 8
b. 1
c. -7
d. -8
d
8. In two's complement representation with a 4-bit allocation, we get _______ when we add 5 to 5.
a. -5
b. -6
c. -7
d. 10
b
9. If the exponent in Excess_127 is binary 10000101, the exponent in decimal is _______.
a. 6
b. 7
c. 8
d. 9
a
10. If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the smaller number _______.
a. one place to the left
b. one place to the right
c. two places to the left
d. two places to the right
c
11. _______ operator (s) takes two inputs to produce one output.
a. Only AND
b. Only OR
c. Only XOR
d. AND, OR, or XOR
d
12. The unary _______ operator inverts its single input.
a. AND
b. OR
c. NOT
d. XOR
c
13. _______ operator (s), if the input is two 0s, the output is 0.
a. In only AND
b. In only OR
c. In only XOR
d. In AND, OR, or XOR
d
14. _______ operator (s), if the input is two 1s, the output is 0.
a. In only AND
b. In only OR
c. In only XOR
d. In AND, OR, or XOR
c
15. For the binary AND operation, only an input of _______ gives an output of 1.
a. two 0s
b. two 1s
c. one 0 and one 1
d. two 2s
b
16. For the binary OR operation, only an input of _______ gives an output of 0.
a. two 0s
b. two 1s
c. one 0 and one 1
d. two 2s
a
17. We use a bit pattern called a _______ to modify another bit pattern.
a. mask
b. carry
c. float
d. byte
a
18. To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
c
19. To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then _______ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
a
20. To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.
a. AND
b. OR
c. XOR
d. NOT
b
1. The TCP/IP model has _______ layers.
a. five
b. six
c. seven
d. eight
a
2. The _______ layer of the TCP/IP protocol suite provides services for end users.
a. data-link
b. transport
c. application
d. physical
c
3. The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.
a. physical
b. data-link
c. network
d. transport
a
4. The _______ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
a. transport
b. network
c. data-link
d. session
c
5. The _______ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
a. transport
b. network
c. data-link
d. session
b
6. What is the domain name in the e mail address kayla@nasa.gov?
a. kayla
b. kayla@nasa.gov
c. nasa.gov
d. gov
c
7. Which physical topology uses a hub or switch?
a. bus
b. ring
c. star
d. bus and ring
c
8. IP addresses are currently _______ bits in length.
a. 4
b. 8
c. 32
d. 40
c
9. _______ protocol (s) is one of the protocols in the transport layer.
a. Only TCP
b. Only UDP
c. Only SCTP
d. TCP, UDP, and SCTP
d
10. _______ is a protocol for file transfer.
a. FTP
b. SMTP
c. TELNET
d. HTTP
a
11. _______ is a protocol for e mail services.
a. FTP
b. SMTP
c. TELNET
d. HTTP
b
12. _______ is a protocol for accessing and transferring documents on the WWW.
a. FTP
b. SMTP
c. TELNET
d. HTTP
d
13. Every computer looking to access the Internet would be known as this
a. client
b. desktop
c. hub
d. server
a
14. Identifies company or commercial sites
a. .org
b. .com
c. .gov
d. .edu
b
15. what is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .ca
a. invalid domain
b. private domain
c. secure domain
d. country domain
d
1. _______ is a program that facilitates the execution of other programs.
a. An operating system
b. Hardware
c. A queue
d. An application program
a
2. _______ supervises the activity of each component in a computer system.
a. An operating system
b. Hardware
c. A queue
d. An application program
a
3. Multi-programming requires a _______ operating-system.
a. batch
b. time-sharing
c. parallel
d. distributed
b
4. _______ is multi-programming with swapping.
a. Partitioning
b. Paging
c. Demand paging
d. Queuing
c
5. _______ is multi-programming without swapping.
a. Partitioning
b. Virtual memory
c. Demand paging
d. Queuing
a
6. In _______, only one program can reside in memory for execution.
a. mono-programming
b. multi-programming
c. partitioning
d. paging
a
7. _______ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.
a. Partitioning
b. Paging
c. Demand paging
d. Demand segmentation
a
8. In paging, a program is divided into equally sized sections called _______.
a. pages
b. frames
c. segments
d. partitions
a
9. In _______, the program can be divided into differently sized sections.
a. partitioning
b. paging
c. demand paging
d. demand segmentation
d
10. In _______, the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.
a. partitioning
b. paging
c. demand paging
d. demand segmentation
c
11. A process in the _______ state can go to either the ready, terminated, or waiting states.
a. hold
b. virtual
c. running
d. hold or running
c
12. A process in the ready state goes to the running state when _______.
a. it enters memory
b. it requests I/O
c. it gets access to the CPU
d. it finishes running
c
13. A program becomes a _______ when it is selected by the operating system and brought to the hold state.
a. job
b. process
c. deadlock
d. partition
a
14. Every process is _______.
a. only a job
b. only a program
c. only a partition
d. a job and a program
d
15. The _______ scheduler creates a process from a job and changes a process back to a job.
a. job
b. process
c. virtual
d. queue
a
16. The _______ scheduler moves a process from one process state to another.
a. job
b. process
c. virtual
d. queue
b
17. To prevent _______, an operating system can put resource restrictions on pro-cesses.
a. starvation
b. synchronization
c. paging
d. deadlock
d
18. _______ can occur if a process has too many resource restrictions.
a. Starvation
b. Synchronization
c. Paging
d. Deadlock
a
19. The _______ manager is responsible for archiving and backup.
a. memory
b. process
c. device
d. file
d
20. The _______ manager is responsible for access to I/O devices.
a. memory
b. process
c. device
d. file
c