csi104-fe

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/174

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

175 Terms

1
New cards

___ bebueen modules in a software system must be maximized

Cohesion

2
New cards

___ can be measured by such metrics as mean time between failures number of bugs per thousand lines of code and number of user requests for change.

Efficiency

3
New cards

___ can be programmed and erased using electronic impulses but can remain in a computer during erasure.

EEPROM

4
New cards

___ ciphers are sometimes called public-key ciphers

Asymmetric-key

5
New cards

___ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space

Partitioning

6
New cards

___ is a set of characters that is treated like an array in some languages and as a type in others

A string

7
New cards

___ is a unit that can add two inputs

An ALU

8
New cards

___ is an attack that reduce the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources

Dos

9
New cards

___ is an ordered set of unambiguous steps that produces a result and terminates in a finite time

An alogrithm

10
New cards

___ is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.

Normalization

11
New cards

___ is the smallest element of named data that has meaning in a record

A field

12
New cards

___ is the term used to define all output and input devices in the computer system?

Hardware

13
New cards

___ occurs when the operating system does not put resource restrictions on processes

Deadlock

14
New cards

___ were designed in the 1950s to control mainframe computers.

Bath operating system

15
New cards

___ who create algorithms to break existing nternet nebuorks so as to solve the loopholes in them

Grey Hat Hacker

16
New cards

____ are unwanted programs that are hidden within other programs (host). When the user executes the host program

Viruses

17
New cards

____ is a basic algorithm that arranges data according to its value_

Sorting

18
New cards

____ is a process in which an algorithm calls itself.

Recursion

19
New cards

____ is a protocol for accessing and transferring documents on the WWW

HTTP

20
New cards

____ is the breaking up of a large project into smaller parts.

Modülarization

21
New cards

____ means that the data must arrive at the receiver exactly as they were sent

Message integrity

22
New cards

____ tests the functionality of the software in terms of what the software is supposed to accomplish such as its inputs and outputs

C. Black-box testing D. Boundary testing

23
New cards

____ who exploit the Internet systems only to make public certain vast datasets of information that would be of benefit to everyone.

Black Hat Hacker

24
New cards

_____ is a memory type with capacitors that need to be refreshed periodically.

DRAM

25
New cards

_____ is a protocol for e mail services

SMTP

26
New cards

_____ is a series of randomized letters and numbers which humans cannot make any sense of

Cipher text

27
New cards

_____ is an English-language-like representation of code.

Pseudocode

28
New cards

_____ protocol (s) is one of the protocols in the transport layer.

TCP, UDP, and SCTP

29
New cards

___________ cryptography is often used for short messages.

Asymmetric-key

30
New cards

A ____ defines creates and maintains a database. This allows controlled access to data in the database

Database management system

31
New cards

A ____ is a collection of related elements possibly of different types having a single name

Record

32
New cards

A _____uses the principle of logical reasoning to answer queries. It is based on formal logic defined by Greek mathematicians and later developed Into firstorder predicate calculus

Declarative paradigm

33
New cards

A billionth of a second is defined as a:

Nanosecond

34
New cards

A company's product or service is identified as a ___

Trade mark

35
New cards

A computer assisted method for the recording and analyzing of existing or hypothetical systems is

Data flow

36
New cards

A computer language that is written in binary codes only is ___

machine language

37
New cards

A data item which is not broken down into smaller units is

Elementary data item

38
New cards

A data structure can be____

An array, a record, or a linked list

39
New cards

A database management system (DBMS) is a combination of ___ components

2

40
New cards

A hashed file uses a to accomplish this mapping.

Mathematical function

41
New cards

A hybrid computer uses a _____ to convert digital signals from a computer into analog signals

Modem

42
New cards

A multi programming system is one that can

Share hardware resources with many programs simultaneously

43
New cards

A path by which communication is achieved beween a central processor and other devices is called

Bus

44
New cards

A process in the ___ state can go to either the ready, terminated, or waiting states.

Runntng

45
New cards

A program becomes a___ from the moment it is selected for execution until it has finished becomes a program again.

Job

46
New cards

A register in a CPU can hold___

Data, instructions, or program counter values

47
New cards

A system program which helps the execution of user programs is known as

Batch operating system

48
New cards

A technique used by codes to convert an analog signal into a digital bit stream is known as

Pulse Code modulation

49
New cards

A(n) ___ list is also known as a queue

FIFO

50
New cards

A(n) ____ is a suitable structure when a small number of insertions and deletions are required but a lot of searching and retrieval is needed

Tree

51
New cards

A___ defines a set of values and a set of operations that can be applied to those values

Data type

52
New cards

A___ is a nonactive set of instructions stored on disk (or tape). It may or may not become a job

Program

53
New cards

An array is normally a ___ and so is more suitable when the number of data items is fixed

Static data structure

54
New cards

An operating system is:

A. An inteiface between the hardware of a Computer and the user

B. A program (or set of programs) that facilitates the execution of other programs.

C. A general manager supervising the activity of each component in the computer system.

55
New cards

An___ of a binary search tree (BST) creates a list that is sorted in ascending order

Inorder traversal

56
New cards

An____ is a sequence of operands and operators that reduces to a single value

Expression

57
New cards

and so is more suitable when the number of data items is fixed In the storing images, what is the technique use to encode a pixel?

(Chose 2 answers): A. True-color B. Index-color

58
New cards

Any device that performs signal conversion is

Modulator

59
New cards

Assume memory location that can only hold four bits. What is the result, if we have stored the integer 11 in a memory location and then try to add 9 to the unsigned integer?

-4

60
New cards

At the transport layer, TCP groups a number of bytes together into a packet called a

Segment

61
New cards

C language is a(n) language.

Procedural

62
New cards

Conversion of binary number 1010101000010111 to hexadecimal number is

AA17

63
New cards

Defining the users, requirements, and methods is part of the ___ phase.

Analysis

64
New cards

Each column in a relation is called _____

An attribute

65
New cards

Each row in a relation is called___.

A tuple

66
New cards

FORTRAN and COBOL are examples of

Computer languages

67
New cards

Given a linked list called children, the pointer variable children identifies ____ element of the linked list

The first

68
New cards

How can we set name of nodes in a linked list?

Depend on user

69
New cards

How many connections( in the data bus) do we need to transfer 4 bytes of a word at the same time?

32

70
New cards

IBM-PC is an example of

Micro computer

71
New cards

If A is the first data element input into a stack, followed by B, C, and D, then ___ is the first element removed

D

72
New cards

If the ASCII code for E is 1000101, then the ASCII code for e is consulting the ASCII table.

1100101

73
New cards

If you want to change the value of an attribute of a tuple, you use the___ operation

Update

74
New cards

In ___ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.

Selection

75
New cards

In ________ more than one program is in memory at the same time and they are executed conct CPU switching rapidly between the programs

Multiprogramming

76
New cards

In a _____ the relationship bebueen a character in the plaintext to a character in the ciphertext is one-to-many

Polyalphabetic cipher

77
New cards

In a computer, the ____ subsystem performs calculations and logical operations.

ALU

78
New cards

In a DBMS ___ are those humans who can access the database directly to get information.

End users

79
New cards

In a positional number system with base b, we can always find the number of digits of an integer So how many digits can we find in the decimal number 234 in decimal?

3

80
New cards

In a set of 64 symbols, each symbol requires a bit pattern length of ___ bits

6

81
New cards

In a three-level DBMS architecture, the layer that interacts directly with the hardware is the________ level.

Physical

82
New cards

In a___ the project team need to choose a language or a set of languages from among the procedural languages

Implementation phase

83
New cards

In direct hashing the key is the data file address____algorithmic manipulation. The file must therefore contain a record for every possible key

Without any

84
New cards

In edges are ordered pairs of vertices. If x and y are buo vertices and an edge e — (x, y), x called the starting point and y is called the endpoint of the edge.

Directed graph

85
New cards

In physical layer, an ____ has infinitely many levels of intensity over a period of time

Analog signals

86
New cards

In postorder traversal of a binary tree, the left subtree is processed

___.First

87
New cards

In storing audio, the quantized sample values need to be___ as bit patterns

Encoded as bit patterns

88
New cards

In the ___ graphic method of representing an image in a computer, each pixel is assigned a bit patterns

Bitmap

89
New cards

In the ___ method for synchronizing the operation of the CPU with an I/O device, a large block of data In the can be passed from an I/O device to memory directly

DMA

90
New cards

In the asymmetric-key method used for confidentiality, which key(s) is (are) public known?

Encryption key only

91
New cards

In the data link layer, a Bluetooth LAN is a (an) ___ network

Ad hoc

92
New cards

In the hierarchical database model, data is organized as an Inverted

Graph

93
New cards

In the relational database model data is organized in _____ called relations

Two-dimensional tables

94
New cards

In the storing audio, if the signal is changing rapidly, we need more samples. It has been 40000 samples per second is good enough to reproduce an audio signal.

Sampling rate

95
New cards

In the system development process, writing the program is part of the___ phase

Implementation

96
New cards

In the third generation of computers:

On-line, realtime systems first became popular

97
New cards

In the Turing model, the___ depends on the combination of two factors: the input data and the program

Output data

98
New cards

In the___ a program is considered a mathematical function. In this context a function is a maps a list of inputs to a list of outputs.

Functional paradigm

99
New cards

In the____ hashing method, there are no synonyms or collisions.

Digit extraction

100
New cards

In____ cryptography symbols are permuted or substituted; in asymmetric-key cryptography numbers are In manipulated

Symmetric-key