Computer Science Fundamentals – Practice Flashcards

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/128

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering number systems, data representation, operating systems, networking, security, algorithms, software engineering, and basic hardware concepts, derived from the provided lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

129 Terms

1
New cards

What is the base (radix) of the binary number system?

2

2
New cards

What is the base of the octal number system?

8

3
New cards

What is the base of the hexadecimal number system?

16

4
New cards

How many bits make up one byte?

8 bits

5
New cards

What is the maximum value of an unsigned K-digit number in base b?

b^K – 1

6
New cards

What is the maximum value of a 5-bit binary integer?

31

7
New cards

How many distinct bit patterns can a 7-bit code provide?

128 patterns (2^7)

8
New cards

How many address bits are required for a 16 MB (16×2^20 bytes) memory?

24 bits

9
New cards

How many hexadecimal digits are needed to write decimal 20?

2 digits

10
New cards

In binary–to–octal conversion, how many binary bits correspond to one octal digit?

3 bits

11
New cards

Convert binary 1010 1010 0001 0111₂ to hexadecimal.

AA17₁₆

12
New cards

Which hexadecimal digit is equivalent to decimal 12?

C

13
New cards

Give the binary equivalent of the octal number 13.54₈.

1011.1011₂

14
New cards

What is the 8-bit two’s-complement representation of –25?

1110 0111

15
New cards

With 17 exponent bits in an Excess (bias) system, what is the bias value?

65 535 (2^(17-1) – 1)

16
New cards

Approximately how many audio samples per second are needed to reproduce human hearing?

40 000 samples/s

17
New cards

If B is bit depth and S is samples per second, what is the bit-rate formula?

R = B × S

18
New cards

What is the 8-bit ASCII code for the character ‘J’?

0100 1010

19
New cards

What is the result of an arithmetic right shift (1 bit) on 1001 1000₂?

1100 1100

20
New cards

What is the result of a logical (simple) right shift (1 bit) on 1001 1000₂?

0100 1100

21
New cards

What is the result of a logical (simple) left shift (1 bit) on 1001 1000₂?

0011 0000

22
New cards

How many bits are contained in an IPv4 address?

32 bits

23
New cards

In sign-and-magnitude with 4 bits, what happens if –6 − 7 is attempted?

Overflow; closest representable value is –7

24
New cards

Define a process in operating-system terminology.

A program in execution

25
New cards

Which scheduler converts a job into a process and vice-versa?

The Job (or Long-term) scheduler

26
New cards

Which process state is entered while waiting for an I/O operation to finish?

Waiting (or Blocked) state

27
New cards

In mono-programming, how many programs can reside in memory at once?

Only one

28
New cards

Which directory is the highest level in a file-system hierarchy and has no parent?

The root directory

29
New cards

What OS file-system object performs the same organizing role as a folder in a filing cabinet?

A directory

30
New cards

What database design process reorganizes relations to reduce anomalies?

Normalization

31
New cards

What is starvation in operating-system scheduling?

A process waiting indefinitely due to resource restrictions

32
New cards

Give a concise definition of an algorithm.

An ordered set of unambiguous, finite steps that produce a result

33
New cards

What is pseudocode?

An English-like, informal representation of an algorithm

34
New cards

What does UML stand for?

Unified Modeling Language

35
New cards

What does high module coupling indicate?

Modules are strongly inter-dependent (undesirable)

36
New cards

What is modularization?

Breaking a large project into smaller, manageable parts

37
New cards

Define a DoS attack.

An attack that exhausts system resources to reduce or stop service

38
New cards

What is a computer worm?

A self-replicating program that spreads through networks exploiting weaknesses

39
New cards

What is a Trojan horse?

Malicious code hidden inside a benign host program

40
New cards

What is a black-hat hacker?

An attacker with malicious motives such as theft or reputation gain

41
New cards

Who are white-hat hackers?

Security specialists who find and fix vulnerabilities ethically

42
New cards

Which attack threatens confidentiality by interception?

Snooping

43
New cards

Which attack threatens integrity by pretending to be another entity?

Masquerading

44
New cards

Define encryption.

Transforming plaintext into ciphertext to prevent unauthorized reading

45
New cards

Define steganography.

Concealing a message by hiding it within another medium

46
New cards

Which cryptosystem does RSA belong to?

Asymmetric (public-key) cryptography

47
New cards

In RSA, whose public key encrypts a message destined for user B?

User B’s public key

48
New cards

Public-key ciphers are also called what kind of ciphers?

Asymmetric-key ciphers

49
New cards

Which cipher rearranges symbol positions without substitution?

A transposition cipher

50
New cards

Decrypting ciphertext to recover plaintext is called what?

Decryption

51
New cards

Name the three transport-layer protocols in TCP/IP.

TCP, UDP, and SCTP

52
New cards

Which protocol retrieves web pages in the client-server model?

HTTP

53
New cards

Which TCP/IP protocol is standard for file transfer between hosts?

FTP

54
New cards

What primary service does the transport layer provide?

End-to-end delivery of the entire message

55
New cards

How many layers are in the TCP/IP model?

Five

56
New cards

Define a LAN.

A privately owned network limited to a small geographic area

57
New cards

How many discrete levels can an ideal digital signal take?

A limited number (often just two: 0 and 1)

58
New cards

What is sampling in audio digitization?

Measuring the analog signal at discrete time intervals

59
New cards

In bitmap graphics, what is a pixel?

The smallest picture element (sample) of an image

60
New cards

What monitor specification measures sharpness by spacing of mask holes?

Dot pitch

61
New cards

Which printer combines a laser beam with electrophotographic techniques?

Laser printer

62
New cards

What electronic device stores exactly one bit temporarily?

A latch

63
New cards

What is a CPU register?

A stand-alone storage location that holds data temporarily

64
New cards

Which memory type (SRAM/DRAM) must be refreshed periodically?

DRAM

65
New cards

Firmware that starts a PC and loads the OS is called what in IBM PCs?

ROM BIOS

66
New cards

Name the 17-century mechanical calculator for addition and subtraction.

The Pascaline

67
New cards

RISC architectures focus on a small set of what kind of operations?

Simple operations

68
New cards

State the 80–20 cache rule.

80 % of execution time is spent on 20 % of the data

69
New cards

In relational databases, what is a tuple?

A row (record) in a relation

70
New cards

In relational databases, what is an attribute?

A column (field) in a relation

71
New cards

Which hashing term refers to the original address produced?

Home address

72
New cards

Which hashing method guarantees no collisions?

Direct (or perfect) hashing

73
New cards

What is collision resolution by open addressing?

Searching subsequent addresses for an empty slot

74
New cards

What cache concept states CPUs check cache before main memory?

Temporal locality principle (implicit in 80–20 rule)

75
New cards

What is the group of nine tracks on magnetic tape used for?

8 data bits plus 1 parity bit for error detection

76
New cards

Define a data structure.

An organized way to store and access data, e.g., array, record, linked list

77
New cards

Which sorting algorithm repeatedly selects the smallest remaining element and swaps it to the front?

Selection sort

78
New cards

Which sorting algorithm repeatedly bubbles the largest element to the end by swapping adjacent items?

Bubble sort

79
New cards

Which sorting algorithm builds the sorted list by inserting the first item of the unsorted part each time?

Insertion sort

80
New cards

Which search algorithm scans an unordered list element-by-element?

Sequential (linear) search

81
New cards

Which search algorithm halves the search interval in an ordered list?

Binary search

82
New cards

What is recursion?

A process where a function or algorithm calls itself

83
New cards

A stack follows which access discipline?

LIFO (Last-In, First-Out)

84
New cards

A queue follows which access discipline?

FIFO (First-In, First-Out)

85
New cards

In a binary search tree, every left-subtree key is _ the root key.

Less than

86
New cards

Breadth-first traversal of a tree visits nodes in what order?

Level by level, children before the next generation

87
New cards

What does the push operation do on a stack?

Inserts an item at the top

88
New cards

What does the pop operation do on a stack?

Deletes the top item

89
New cards

What two components constitute an Abstract Data Type (ADT)?

A data structure and the operations defined on it

90
New cards

Row-major storage stores two-dimensional arrays how?

Row by row in contiguous memory

91
New cards

What is transferability in software quality?

Ability to move data or software to other platforms and reuse code

92
New cards

What is coupling in software design?

Measure of how strongly modules depend on each other

93
New cards

What is cohesion in software design?

Measure of how closely related tasks within a module are

94
New cards

In system development, boundary-value testing focuses on what?

Input values at the extremes of allowable ranges

95
New cards

Which topology connects devices through a central hub or switch?

Star topology

96
New cards

Which hashing term describes two keys producing the same address?

Collision

97
New cards

What is an 8-hex-digit notation used for?

IPv6 address format

98
New cards

Which file type stores data in computer-internal (binary) form only meaningful to programs?

Binary file

99
New cards

What ethical principle says an act is ethical if most people agree?

Social contract

100
New cards

What three steps are required to digitize audio for storage?

Sampling, quantization, and coding