1/174
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
___ bebueen modules in a software system must be maximized
Cohesion
___ can be measured by such metrics as mean time between failures number of bugs per thousand lines of code and number of user requests for change.
Efficiency
___ can be programmed and erased using electronic impulses but can remain in a computer during erasure.
EEPROM
___ ciphers are sometimes called public-key ciphers
Asymmetric-key
___ is a multi-programming method in which multiple programs are entirely in memory with each program occupying a contiguous space
Partitioning
___ is a set of characters that is treated like an array in some languages and as a type in others
A string
___ is a unit that can add two inputs
An ALU
___ is an attack that reduce the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources
Dos
___ is an ordered set of unambiguous steps that produces a result and terminates in a finite time
An alogrithm
___ is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
Normalization
___ is the smallest element of named data that has meaning in a record
A field
___ is the term used to define all output and input devices in the computer system?
Hardware
___ occurs when the operating system does not put resource restrictions on processes
Deadlock
___ were designed in the 1950s to control mainframe computers.
Bath operating system
___ who create algorithms to break existing nternet nebuorks so as to solve the loopholes in them
Grey Hat Hacker
____ are unwanted programs that are hidden within other programs (host). When the user executes the host program
Viruses
____ is a basic algorithm that arranges data according to its value_
Sorting
____ is a process in which an algorithm calls itself.
Recursion
____ is a protocol for accessing and transferring documents on the WWW
HTTP
____ is the breaking up of a large project into smaller parts.
Modülarization
____ means that the data must arrive at the receiver exactly as they were sent
Message integrity
____ tests the functionality of the software in terms of what the software is supposed to accomplish such as its inputs and outputs
C. Black-box testing D. Boundary testing
____ who exploit the Internet systems only to make public certain vast datasets of information that would be of benefit to everyone.
Black Hat Hacker
_____ is a memory type with capacitors that need to be refreshed periodically.
DRAM
_____ is a protocol for e mail services
SMTP
_____ is a series of randomized letters and numbers which humans cannot make any sense of
Cipher text
_____ is an English-language-like representation of code.
Pseudocode
_____ protocol (s) is one of the protocols in the transport layer.
TCP, UDP, and SCTP
___________ cryptography is often used for short messages.
Asymmetric-key
A ____ defines creates and maintains a database. This allows controlled access to data in the database
Database management system
A ____ is a collection of related elements possibly of different types having a single name
Record
A _____uses the principle of logical reasoning to answer queries. It is based on formal logic defined by Greek mathematicians and later developed Into firstorder predicate calculus
Declarative paradigm
A billionth of a second is defined as a:
Nanosecond
A company's product or service is identified as a ___
Trade mark
A computer assisted method for the recording and analyzing of existing or hypothetical systems is
Data flow
A computer language that is written in binary codes only is ___
machine language
A data item which is not broken down into smaller units is
Elementary data item
A data structure can be____
An array, a record, or a linked list
A database management system (DBMS) is a combination of ___ components
2
A hashed file uses a to accomplish this mapping.
Mathematical function
A hybrid computer uses a _____ to convert digital signals from a computer into analog signals
Modem
A multi programming system is one that can
Share hardware resources with many programs simultaneously
A path by which communication is achieved beween a central processor and other devices is called
Bus
A process in the ___ state can go to either the ready, terminated, or waiting states.
Runntng
A program becomes a___ from the moment it is selected for execution until it has finished becomes a program again.
Job
A register in a CPU can hold___
Data, instructions, or program counter values
A system program which helps the execution of user programs is known as
Batch operating system
A technique used by codes to convert an analog signal into a digital bit stream is known as
Pulse Code modulation
A(n) ___ list is also known as a queue
FIFO
A(n) ____ is a suitable structure when a small number of insertions and deletions are required but a lot of searching and retrieval is needed
Tree
A___ defines a set of values and a set of operations that can be applied to those values
Data type
A___ is a nonactive set of instructions stored on disk (or tape). It may or may not become a job
Program
An array is normally a ___ and so is more suitable when the number of data items is fixed
Static data structure
An operating system is:
A. An inteiface between the hardware of a Computer and the user
B. A program (or set of programs) that facilitates the execution of other programs.
C. A general manager supervising the activity of each component in the computer system.
An___ of a binary search tree (BST) creates a list that is sorted in ascending order
Inorder traversal
An____ is a sequence of operands and operators that reduces to a single value
Expression
and so is more suitable when the number of data items is fixed In the storing images, what is the technique use to encode a pixel?
(Chose 2 answers): A. True-color B. Index-color
Any device that performs signal conversion is
Modulator
Assume memory location that can only hold four bits. What is the result, if we have stored the integer 11 in a memory location and then try to add 9 to the unsigned integer?
-4
At the transport layer, TCP groups a number of bytes together into a packet called a
Segment
C language is a(n) language.
Procedural
Conversion of binary number 1010101000010111 to hexadecimal number is
AA17
Defining the users, requirements, and methods is part of the ___ phase.
Analysis
Each column in a relation is called _____
An attribute
Each row in a relation is called___.
A tuple
FORTRAN and COBOL are examples of
Computer languages
Given a linked list called children, the pointer variable children identifies ____ element of the linked list
The first
How can we set name of nodes in a linked list?
Depend on user
How many connections( in the data bus) do we need to transfer 4 bytes of a word at the same time?
32
IBM-PC is an example of
Micro computer
If A is the first data element input into a stack, followed by B, C, and D, then ___ is the first element removed
D
If the ASCII code for E is 1000101, then the ASCII code for e is consulting the ASCII table.
1100101
If you want to change the value of an attribute of a tuple, you use the___ operation
Update
In ___ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
Selection
In ________ more than one program is in memory at the same time and they are executed conct CPU switching rapidly between the programs
Multiprogramming
In a _____ the relationship bebueen a character in the plaintext to a character in the ciphertext is one-to-many
Polyalphabetic cipher
In a computer, the ____ subsystem performs calculations and logical operations.
ALU
In a DBMS ___ are those humans who can access the database directly to get information.
End users
In a positional number system with base b, we can always find the number of digits of an integer So how many digits can we find in the decimal number 234 in decimal?
3
In a set of 64 symbols, each symbol requires a bit pattern length of ___ bits
6
In a three-level DBMS architecture, the layer that interacts directly with the hardware is the________ level.
Physical
In a___ the project team need to choose a language or a set of languages from among the procedural languages
Implementation phase
In direct hashing the key is the data file address____algorithmic manipulation. The file must therefore contain a record for every possible key
Without any
In edges are ordered pairs of vertices. If x and y are buo vertices and an edge e — (x, y), x called the starting point and y is called the endpoint of the edge.
Directed graph
In physical layer, an ____ has infinitely many levels of intensity over a period of time
Analog signals
In postorder traversal of a binary tree, the left subtree is processed
___.First
In storing audio, the quantized sample values need to be___ as bit patterns
Encoded as bit patterns
In the ___ graphic method of representing an image in a computer, each pixel is assigned a bit patterns
Bitmap
In the ___ method for synchronizing the operation of the CPU with an I/O device, a large block of data In the can be passed from an I/O device to memory directly
DMA
In the asymmetric-key method used for confidentiality, which key(s) is (are) public known?
Encryption key only
In the data link layer, a Bluetooth LAN is a (an) ___ network
Ad hoc
In the hierarchical database model, data is organized as an Inverted
Graph
In the relational database model data is organized in _____ called relations
Two-dimensional tables
In the storing audio, if the signal is changing rapidly, we need more samples. It has been 40000 samples per second is good enough to reproduce an audio signal.
Sampling rate
In the system development process, writing the program is part of the___ phase
Implementation
In the third generation of computers:
On-line, realtime systems first became popular
In the Turing model, the___ depends on the combination of two factors: the input data and the program
Output data
In the___ a program is considered a mathematical function. In this context a function is a maps a list of inputs to a list of outputs.
Functional paradigm
In the____ hashing method, there are no synonyms or collisions.
Digit extraction
In____ cryptography symbols are permuted or substituted; in asymmetric-key cryptography numbers are In manipulated
Symmetric-key