Thẻ ghi nhớ: CSI 106 | Quizlet

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/264

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

265 Terms

1
New cards

9. Which of the following representations is erroneous?

a) (111)2

b) (346)8

c) (EEG)16

d) 221

C

2
New cards

The _______ model is the basis for today's computers.

a. Leibnitz

b. von Neumann

c. Pascal

d. Charles Babbage

B

3
New cards

In a computer, the _______ subsystem stores data and programs.

a. ALU

b. input/output

c. memory

d. control unit

C

4
New cards

In a computer, the _______ subsystem performs calculations and logical opera-tions.

a. ALU

b. input/output

c. memory

d. control unit

A

5
New cards

In a computer, the _______ subsystem accepts data and programs and sends pro-cessing results to output devices.

a. ALU

b. input/output

c. memory

d. control unit

B

6
New cards

In a computer, the _______ subsystem serves as a manager of the other subsys-tems.

a. ALU

b. input/output

c. memory

d. control unit

D

7
New cards

According to the von Neumann model, _______ are stored in memory.

a. only data

b. only programs

c. data and programs

d. neither data nor programs

C

8
New cards

A step-by-step solution to a problem is called _______.

a. hardware

b. an operating system

c. a computer language

d. an algorithm

D

9
New cards

FORTRAN and COBOL are examples of _______.

a. hardware

b. operating systems

c. computer languages

d. algorithms

C

10
New cards

A 17th-century computing machine that could perform addition and subtraction was the _______.

a. Pascaline

b. Jacquard loom

c. Analytical Engine

d. Babbage machine

A

11
New cards

_______ is a set of instructions in a computer language that tells the computer what to do with data.

a. An operating system

b. An algorithm

c. A data processor

d. A program

D

12
New cards

The first electronic special-purpose computer was called _______.

a. Pascal

b. Pascaline

c. ABC

d. ENIAC

C

13
New cards

One of the first computers based on the von Neumann model was called _______.

a. Pascal

b. Pascaline

c. ABC

d. EDVAC

D

14
New cards

The first computing machine to use the idea of storage and programming was called _______.

a. the Madeline

b. EDVAC

c. the Babbage machine

d. the Jacquard loom

D

15
New cards

2. The base of the binary number system is ____.

a) 2

b) 8

c) 10

d) 16

A

16
New cards

6. When converting a binary fraction to decimal, we repeatedly ____.

a) divide

b) multiply

c) add to

d) subtract from

B

17
New cards

7. Which of the following representations is erroneous?

a) (10111)2

b) (349)8

c) (3AB)16

d) 256

B

18
New cards

8. Which of the following representations is erroneous?

a) (10211)2

b) (342)8

c) (EEE)16

d) 145

A

19
New cards

10. Which of the following representations is erroneous?

a) (110)2

b) (141)8

c) (EF)16

d) 22A

D

20
New cards

11. Which of the following is equivalent to 12 in decimal?

a) (1110)2

b) (C)16

c) (15)8

d) None of the others

B

21
New cards

12. Which of the following is equivalent to 24 in decimal?

a) (11000)2

b) (1A)16

c) (31)8

d) None of the others

A

22
New cards

13. Convert the binary number 1001 to decimal. The answer is:

a) 7

b) 9

c) 11

d) 15

B

23
New cards

_______ is the design and writing of a program in structured form.

a. Software engineering

b. Hardware engineering

c. Algorithm development

d. Instructional architecture

A

24
New cards

_______ separated the programming task from computer operation tasks.

a. Algorithms

b. Data processors

c. High-level programming languages

d. Operating systems

C

25
New cards

1. The base of the decimal number system is ____.

a) 2

b) 8

c) 10

d) 16

C

26
New cards

3. The base of the octal number system is ____.

a) 2

b) 8

c) 10

d) 16

B

27
New cards

4. The base of the hexadecimal number system is ____.

a) 2

b) 8

c) 10

d) 16

D

28
New cards

5. When converting a decimal integer to base b, we repeatedly _____ b.

a) divide

b) multiply

c) add to

d) subtract from

A

29
New cards

14. Convert the binary number 101010 to hexadecimal:

a) 1A

b) 1B

c) 2A

d) 2B

C

30
New cards

15. Convert the hexadecimal number 1B to decimal:

a) 21

b) 23

c) 27

d) 29

C

31
New cards

A byte consists of _______ bits.

a. 2

b. 4

c. 8

d. 16

C

32
New cards

In a set of 64 symbols, each symbol requires a bit pattern length of _______ bits.

a. 4

b. 5

c. 6

d. 7

c

33
New cards

How many symbols can be represented by a bit pattern with ten bits?

a. 128

b. 256

c. 512

d. 1024

d

34
New cards

If the ASCII code for E is 1000101, then the ASCII code for e is _______. An-swer the question without consulting the ASCII table.

a. 1000110

b. 1000111

c. 0000110

d. 1100101

d

35
New cards

A 32-bit code called _______ represents symbols in all languages.

a. ANSI

b. Unicode

c. EBCDIC

d. Extended ASCII

b

36
New cards

An image can be represented in a computer using the _______ method.

a. bitmap graphic

b. vector graphic

c. only

d. either bitmap or vector graphic

d

37
New cards

In the _______ graphic method of representing an image in a computer, each pixel is assigned a bit patterns.

a. bitmap

b. vector

c. quantized

d. binary

a

38
New cards

In the _______ graphic method of representing an image in a computer, the image is decomposed into a combination of geometrical figures.

a. bitmap

b. vector

c. quantized

d. binary

b

39
New cards

In the _______ graphic method of representing an image in a computer, re-scaling of the image creates a ragged or grainy image.

a. bitmap

b. vector

c. quantized

d. binary

a

40
New cards

Assume a new Excess system uses 17 bits to represent the exponent section. What is he bias value in this system?

a. 17

b. 16

c. 65535

d. 65536

c

41
New cards

Which number representation method is often used to store the exponential value of a fractional part?

a. unsigned integers

b. two's complement

c. Excess

d. ten's complement

c

42
New cards

In an Excess conversion, we _______ the number to be converted.

a. add the bias number to

b. the bias number from

c. multiply the bias number by

d. divide

a

43
New cards

When a fractional part is normalized, the computer stores the _______.

a. only the sign

b. only the exponent

c. only the mantissa

d. the sign, exponent, and mantissa

d

44
New cards

The precision of the fractional part of a number stored in a computer is defined by the _______.

a. sign

b. exponent

c. mantissa

d. last digit

c

45
New cards

The combination of sign and mantissa of a real number in IEEE standard float-ing point format is stored as an integer in the ____________ representation.

a. unsigned

b. sign-and-magnitude

c. two's complement

d. one's complement

b

46
New cards

1. _______ is an arithmetic operation.

a. The exclusive OR

b. The unary NOT

c. Subtraction

d. The binary AND

c

47
New cards

2. _______ is a logical bit operator.

a. The exclusive OR

b. The unary NOT

c. The binary AND

d. exclusive OR, unary NOT, or binary AND

d

48
New cards

3. The _______ method of integer representation is the most common method for storing integers in computer memory.

a. sign-and-magnitude

b. one's complement

c. two's complement

d. unsigned integers

c

49
New cards

4. In two's complement addition, if there is a final carry after the left most column addition, _______.

a. add it to the right most column

b. add it to the left most column

c. discard it

d. increase the bit length

c

50
New cards

5. For an 8-bit allocation, the smallest decimal number that can be represented in two's complement form is _______.

a. -8

b. -127

c. -128

d. -256

c

51
New cards

6. For an 8-bit allocation, the largest decimal number that can be represented in two's complement form is _______.

a. 8

b. 127

c. 128

d. 256

b

52
New cards

7. In two's complement representation with a 4-bit allocation, we get _______ when we add 1 to 7.

a. 8

b. 1

c. -7

d. -8

d

53
New cards

8. In two's complement representation with a 4-bit allocation, we get _______ when we add 5 to 5.

a. -5

b. -6

c. -7

d. 10

b

54
New cards

9. If the exponent in Excess_127 is binary 10000101, the exponent in decimal is _______.

a. 6

b. 7

c. 8

d. 9

a

55
New cards

10. If we are adding two numbers, one of which has an exponent value of 7 and the other an exponent value of 9, we need to shift the decimal point of the smaller number _______.

a. one place to the left

b. one place to the right

c. two places to the left

d. two places to the right

c

56
New cards

11. _______ operator (s) takes two inputs to produce one output.

a. Only AND

b. Only OR

c. Only XOR

d. AND, OR, or XOR

d

57
New cards

12. The unary _______ operator inverts its single input.

a. AND

b. OR

c. NOT

d. XOR

c

58
New cards

13. _______ operator (s), if the input is two 0s, the output is 0.

a. In only AND

b. In only OR

c. In only XOR

d. In AND, OR, or XOR

d

59
New cards

14. _______ operator (s), if the input is two 1s, the output is 0.

a. In only AND

b. In only OR

c. In only XOR

d. In AND, OR, or XOR

c

60
New cards

15. For the binary AND operation, only an input of _______ gives an output of 1.

a. two 0s

b. two 1s

c. one 0 and one 1

d. two 2s

b

61
New cards

16. For the binary OR operation, only an input of _______ gives an output of 0.

a. two 0s

b. two 1s

c. one 0 and one 1

d. two 2s

a

62
New cards

17. We use a bit pattern called a _______ to modify another bit pattern.

a. mask

b. carry

c. float

d. byte

a

63
New cards

18. To flip all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.

a. AND

b. OR

c. XOR

d. NOT

c

64
New cards

19. To un-set (force to 0) all the bits of a bit pattern, make a mask of all 0s and then _______ the bit pattern and the mask.

a. AND

b. OR

c. XOR

d. NOT

a

65
New cards

20. To set (force to 1) all the bits of a bit pattern, make a mask of all 1s and then _______ the bit pattern and the mask.

a. AND

b. OR

c. XOR

d. NOT

b

66
New cards

1. The TCP/IP model has _______ layers.

a. five

b. six

c. seven

d. eight

a

67
New cards

2. The _______ layer of the TCP/IP protocol suite provides services for end users.

a. data-link

b. transport

c. application

d. physical

c

68
New cards

3. The _______ layer of the TCP/IP protocol suite transmits a bit stream over a physical medium.

a. physical

b. data-link

c. network

d. transport

a

69
New cards

4. The _______ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.

a. transport

b. network

c. data-link

d. session

c

70
New cards

5. The _______ layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.

a. transport

b. network

c. data-link

d. session

b

71
New cards

6. What is the domain name in the e mail address kayla@nasa.gov?

a. kayla

b. kayla@nasa.gov

c. nasa.gov

d. gov

c

72
New cards

7. Which physical topology uses a hub or switch?

a. bus

b. ring

c. star

d. bus and ring

c

73
New cards

8. IP addresses are currently _______ bits in length.

a. 4

b. 8

c. 32

d. 40

c

74
New cards

9. _______ protocol (s) is one of the protocols in the transport layer.

a. Only TCP

b. Only UDP

c. Only SCTP

d. TCP, UDP, and SCTP

d

75
New cards

10. _______ is a protocol for file transfer.

a. FTP

b. SMTP

c. TELNET

d. HTTP

a

76
New cards

11. _______ is a protocol for e mail services.

a. FTP

b. SMTP

c. TELNET

d. HTTP

b

77
New cards

12. _______ is a protocol for accessing and transferring documents on the WWW.

a. FTP

b. SMTP

c. TELNET

d. HTTP

d

78
New cards

13. Every computer looking to access the Internet would be known as this

a. client

b. desktop

c. hub

d. server

a

79
New cards

14. Identifies company or commercial sites

a. .org

b. .com

c. .gov

d. .edu

b

80
New cards

15. what is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .ca

a. invalid domain

b. private domain

c. secure domain

d. country domain

d

81
New cards

1. _______ is a program that facilitates the execution of other programs.

a. An operating system

b. Hardware

c. A queue

d. An application program

a

82
New cards

2. _______ supervises the activity of each component in a computer system.

a. An operating system

b. Hardware

c. A queue

d. An application program

a

83
New cards

3. Multi-programming requires a _______ operating-system.

a. batch

b. time-sharing

c. parallel

d. distributed

b

84
New cards

4. _______ is multi-programming with swapping.

a. Partitioning

b. Paging

c. Demand paging

d. Queuing

c

85
New cards

5. _______ is multi-programming without swapping.

a. Partitioning

b. Virtual memory

c. Demand paging

d. Queuing

a

86
New cards

6. In _______, only one program can reside in memory for execution.

a. mono-programming

b. multi-programming

c. partitioning

d. paging

a

87
New cards

7. _______ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space.

a. Partitioning

b. Paging

c. Demand paging

d. Demand segmentation

a

88
New cards

8. In paging, a program is divided into equally sized sections called _______.

a. pages

b. frames

c. segments

d. partitions

a

89
New cards

9. In _______, the program can be divided into differently sized sections.

a. partitioning

b. paging

c. demand paging

d. demand segmentation

d

90
New cards

10. In _______, the program can be divided into equally sized sections called pages, but the pages need not be in memory at the same time for execution.

a. partitioning

b. paging

c. demand paging

d. demand segmentation

c

91
New cards

11. A process in the _______ state can go to either the ready, terminated, or waiting states.

a. hold

b. virtual

c. running

d. hold or running

c

92
New cards

12. A process in the ready state goes to the running state when _______.

a. it enters memory

b. it requests I/O

c. it gets access to the CPU

d. it finishes running

c

93
New cards

13. A program becomes a _______ when it is selected by the operating system and brought to the hold state.

a. job

b. process

c. deadlock

d. partition

a

94
New cards

14. Every process is _______.

a. only a job

b. only a program

c. only a partition

d. a job and a program

d

95
New cards

15. The _______ scheduler creates a process from a job and changes a process back to a job.

a. job

b. process

c. virtual

d. queue

a

96
New cards

16. The _______ scheduler moves a process from one process state to another.

a. job

b. process

c. virtual

d. queue

b

97
New cards

17. To prevent _______, an operating system can put resource restrictions on pro-cesses.

a. starvation

b. synchronization

c. paging

d. deadlock

d

98
New cards

18. _______ can occur if a process has too many resource restrictions.

a. Starvation

b. Synchronization

c. Paging

d. Deadlock

a

99
New cards

19. The _______ manager is responsible for archiving and backup.

a. memory

b. process

c. device

d. file

d

100
New cards

20. The _______ manager is responsible for access to I/O devices.

a. memory

b. process

c. device

d. file

c