CSI106 Final Exam – Key Concept Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

flashcard set

Earn XP

Description and Tags

A set of 70 question-and-answer flashcards covering computer architecture, cryptography, software engineering, data structures, databases, networking, multimedia, and number systems for CSI106 final-exam preparation.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Which computer subsystem stores data and programs?

The Memory subsystem.

2
New cards

What model forms the basis of almost all modern computers?

The Von Neumann model.

3
New cards

During the fetch phase, where is the next instruction copied?

Into the Instruction Register (IR).

4
New cards

What is produced by the decode step of the instruction cycle?

Binary control code for the upcoming operation.

5
New cards

Which CPU component temporarily holds data and is faster than main memory?

A register.

6
New cards

What is the 80-20 rule for cache memory?

A computer typically spends ~80 % of its time accessing ~20 % of the data, so that 20 % is kept in cache.

7
New cards

Which memory type uses capacitors and must be refreshed periodically?

DRAM (Dynamic RAM).

8
New cards

Firmware that starts an IBM-compatible PC and loads the OS is called what?

The ROM BIOS.

9
New cards

In RISC architecture, the instruction set consists mainly of operations.

Simple operations.

10
New cards

Transforming plaintext into ciphertext is called .

Encryption.

11
New cards

Reversing ciphertext back to plaintext is called .

Decryption.

12
New cards

The RSA confidentiality algorithm uses which type of cryptography?

Asymmetric-key (public-key) cryptography.

13
New cards

Which cipher uses one key stream element per plaintext symbol?

A stream cipher.

14
New cards

In a monoalphabetic cipher, the plaintext-ciphertext mapping is .

One-to-one (single fixed substitution).

15
New cards

Steganography means what?

Concealing a message by hiding it within another medium.

16
New cards

A DoS (Denial-of-Service) attack mainly threatens which security service?

Availability.

17
New cards

Which attack threatens confidentiality by passively capturing data?

Snooping.

18
New cards

Who are the “good-guy” ethical hackers?

White Hat hackers.

19
New cards

Which hackers break in for personal gain or malice?

Black Hat hackers.

20
New cards

Which hackers expose large data sets for public benefit without destructive intent?

Grey Hat hackers.

21
New cards

Which amateur hackers often act from revenge motives?

Blue Hat hackers.

22
New cards

Which hackers hunt and counter Black Hats?

Red Hat hackers.

23
New cards

Black-box testing evaluates software based on .

External inputs and expected outputs (functionality).

24
New cards

Name two common black-box testing techniques.

Boundary-value testing and exhaustive testing.

25
New cards

Basis-path testing is a white-box method that ensures what?

Every statement (or edge) executes at least once.

26
New cards

High cohesion and low coupling between modules improve what?

Software quality and maintainability.

27
New cards

The four classic SDLC phases are .

Analysis, Design, Implementation, and Testing.

28
New cards

In UML, which diagram shows how users interact with the system?

A Use-Case diagram.

29
New cards

Which search should be used on an ordered list for fastest results?

Binary search.

30
New cards

Which sort repeatedly selects the smallest remaining item and swaps it forward?

Selection sort.

31
New cards

Recursion is what kind of algorithmic process?

A function or algorithm calling itself.

32
New cards

A stack follows which access discipline?

LIFO – Last In, First Out.

33
New cards

A queue follows which access discipline?

FIFO – First In, First Out.

34
New cards

In a binary search tree, every left-subtree key is the root key.

Less than.

35
New cards

During preorder traversal, which node is processed first?

The root.

36
New cards

Open addressing is a collision-resolution method used in .

Hash tables.

37
New cards

Arrays provide fast retrieval but are poor for frequent .

Insertions and deletions (especially in the middle).

38
New cards

Row-major order stores two-dimensional arrays row by row in .

Contiguous memory.

39
New cards

Each column in a relational table is called an .

Attribute.

40
New cards

Transforming relations to reduce redundancy is known as .

Normalization.

41
New cards

The relational difference operation returns which rows?

Rows that are in the first relation but not in the second.

42
New cards

At the highest DBMS level, which schema interacts directly with users?

The External level.

43
New cards

TCP, UDP, and SCTP all reside in which layer of the TCP/IP model?

The Transport layer.

44
New cards

A port number identifies what?

An application-layer process at the source or destination host.

45
New cards

An IPv4 address contains how many bits?

32 bits.

46
New cards

LAN stands for what, and how is it usually owned?

Local Area Network; usually privately owned and limited in size.

47
New cards

FTP is the standard TCP/IP protocol for .

Copying files between hosts.

48
New cards

Pixels are in a digital image.

Individual picture elements (samples).

49
New cards

Bit depth measures what in audio or images?

The number of bits per sample (quantization levels).

50
New cards

Resampling an image by resizing is commonly called .

Scaling.

51
New cards

CD-RW is an optical disc that allows what feature?

Multiple writes and erasures (rewritable).

52
New cards

Groupings of 4 binary bits correspond to one digit.

Hexadecimal.

53
New cards

Groupings of 3 binary bits correspond to one digit.

Octal.

54
New cards

Adding 5 + 5 in 4-bit two’s-complement representation overflows to .

–6 (binary 1010).

55
New cards

A 17-bit excess-K exponent field has a bias of .

65 535 (2¹⁷ – 1).

56
New cards

SQL SELECT adds rows?

No; INSERT adds a new row, while SELECT retrieves rows.

57
New cards

A breadth-first traversal of a tree processes nodes level by level starting from .

The root.

58
New cards

Transferability in software quality refers to what?

Moving software or data to a new platform and reusing code.

59
New cards

Modularization is the practice of breaking a large project into .

Smaller, well-defined parts or modules.

60
New cards

In physical networking, the medium that carries signals is called the .

Transmission medium.

61
New cards

A hybrid P2P network uses client-server for directory services but P2P for .

File storage and transfer.

62
New cards

Sampling an analog audio signal at about samples/sec suffices for high-quality sound.

40 000 samples per second (≈ 44.1 kHz in practice).