Thẻ ghi nhớ: CSI106 sửa | Quizlet

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/415

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

416 Terms

1
New cards

The device manager maintains one or more ___ for similar input/output devices

A. Graph

B. Array

C. Stack

D. Queue

D

2
New cards

The ___ manager is responsible for archiving and backup.

A. Memory

B. Process

C. Device

D. File

D

3
New cards

Artificial Intelligence has evolved extremely in all the fields except for ___

A. Web mining

B. Construction of plans in real time dynamic systems

C. Understanding natural language robustly

D. All of the above

E. None of the above

C

4
New cards

After the instruction is decoded, the control unit sends the task order to a component in the CPU. What is this phase?.

A. Fetch phase

B. Decode phase

C. Excute phase

D. None of others

C

5
New cards

In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ___

A. User A

B. User B

C. The network

D. A third party.

B

6
New cards

In a ___ the relationship between a character in the plaintext to a character in the ciphertext is one-to-many

A. Monoalphabetic cipher

B. Substitution cipher

C. Polyalphabetic cipher

D. Transposition cipher

C

7
New cards

In the object-oriented paradigm, as in nature ___ is an object that can inherit from another object.

A. Method

B. Inheritance

C. Polymorphism

D. Classes

D

8
New cards

The first generation of computers available was based on the ___ bits micro processors.

A. 4

B. 8

C. 16

D. 64

E. None of the others

A

9
New cards

The octal equivalent of 1100101.001010 is ___

A. 624.12

B. 145.12

C. 154.12

D. 145.21

E. None of the others

B

10
New cards

A group includes ___ bits in the binary system are represented as one digit in the hexadecimal system.

A. 1

B. 2

C. 3

D. 4

E. None of the others

D

11
New cards

What is the field of Natural Language Processing (NLP)?

A. Computer Science

B. Artificial Intelligence

C. Linguistics

D. All of the above

E. None of the above

D

12
New cards

The devices in Bluetooth LAN, sometimes called gadgets, find each other and make a network called ___

A. ESS

B. Ad hoc

C. BSS

D. A piconet

D

13
New cards

What is the field that investigates the mechanics of human intelligence?

A. history

B. cognitive science

C. psychology

D. sociology

B

14
New cards

___ is an English-language-like representation of an algorithm. There is no standard for it- some people use a lot of detail

A. Pseudocode

B. Unified Modeling Language (UML)

C. Flowchart

D. State diagram

A

15
New cards

In ___ the development process flows in only one direction. This means that a phase cannot be started until

the previous phase is completed.

A. Waterfall model

B. Incremental model

C. Development proces

D. Software engineering

A

16
New cards

According to the von Neumann model, ___ are stored in memory.

A. Only data

B. Only programs

C. Data and programs

D. Neither data nor programs

C

17
New cards

In physical layer, an ___ has infinitely many levels of intensity over a period of time

A. Analog signa

lsB. Electromagnetic signals

C. Digital signals

D. Electronic signals

A

18
New cards

The ___ of each node includes one of its children and all descendents of that child

A. Left tree

B. Binary tree

C. Subtree

D. Right tree

C

19
New cards

In the sign-and-magnitude representation, the memory location can hold four bits, assume that we have stored integer 6 in a memory location and we then try to add 6 to the integer. The computer's response is ___?

A. 12

B. -12

C. 4

D. -4

D

20
New cards

The ___ level of a three-level DBMS architecture defines the logical view of the data.

A. External

B. Conceptual

C. Internal

D. Physical

B

21
New cards

The ___ is a protocol that is used to define how the client-server programs can be written to retrieve web pages from the Web.

A. FTP

B. SMTP

C. TELNET

D. HTTP

D

22
New cards

Which of following represents a set of data items that share a specific relationship?

A. ADT

B. Data structure

C. Programming language

D. Data element

B

23
New cards

A program that is employed in the development, repair or enhancement of other programs is known as

A. System software

B. Software tool

C. Applications program

D. Utility program

E. None of the others

B

24
New cards

In a positional number system with base b, we can always find the number of digits of an integer. So how many digits can we find in the decimal number 234 in decimal?

A. 1

B. 2

C. 3

D. 4

C

25
New cards

___ means that the sender and the receiver expect confidentiality.

A. Nonrepudiation

B. Integrity

C. Authentication

D. encryption and decryption

D

26
New cards

An electronic circuit with about 20 transistors fabricated on a silicon chip is known as

A. SSI

B. MSI

C. DPS

D. RJE

E. None of the others

A

27
New cards

The ___ acts as a liaison between a client program and a server program, a process-to-process connection.

A. Physical

B. Data-link

C. Network

D. Transport

D

28
New cards

Which is a unit representing the no bits of discrete.

A. Baud

B. Byte

C. Bit

D. All of the others

E. None of the others

C

29
New cards

___ is a program that facilitates the execution of other programs.

A. An operating system

B. Hardware

C. A queue

D. An application program

A

30
New cards

Each column in a relation is called ___

A. An attribute

B. A tuple

C. A union

D. An attitude

A

31
New cards

The device manager will be tracking every device constantly to ensure that the device is ___

A. Ready

B. Finished

C. Functioning properly

D. Running

C

32
New cards

___ is a method in which each statement in the software is executed at least once.

A. Basis path testing

B. Condition testing

C. Loop testing

D. Boundary testing

A

33
New cards

Which of the following representations is erroneous?

A. (110)2

B. (141)8

C. (EF)16

D. 22A

D

34
New cards

The push operation ___ of the stack.

A. Deletes an item from the top

B. Deletes an item from the bottom

C. Inserts an item at the top

D. Inserts an item at the bottom

C

35
New cards

If the memory address space is 16 MB and the word size is 8 bits, then ___ bits are needed to access each

word.

A. 8

B. 16

C. 24

D. 32

C

36
New cards

In the network database model, the entities are organized in a ___ in which some entities can be accessed through several paths

A. Graph

B. Tree

C. Array

D. Record

A

37
New cards

In ___ method to solve collision the first record is stored in the home address but contains a pointer to the second record.

A. Linked list resolution

B. Open addressing resolution

C. Bucket hashing

D. Digit extraction hashing

A

38
New cards

In ___ edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x, y), x is called the starting point and y is called the endpoint of the edge.

A. Directed graph

B. Undirected graph

C. Edges

D. Arcs

A

39
New cards

The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as ___

A. CPU

B. Control Unit

C. I/O unit

D. Peripheral unit

E. None of the others

A

40
New cards

A hashed file uses a ___ to accomplish this mapping

A. Retrived file

B. Sequential access

C. Random access

D. Mathematical function

D

41
New cards

FORTRAN is a(n) ___ language.

A. Procedural

B. Functional

C. Declarative

D. Object-oriented

A

42
New cards

Arithmetic right shift is used to __ an integer by two

A. Addition

B. Subtraction

C. Divide

D. Multiply

C

43
New cards

___ is a basic algorithm in which we want to find the location of a target in a list of items.

A. Sorting

B. Searching

C. Product

D. Summation

B

44
New cards

In the system development process, writing the program is part of the ___ phase.

A. Analysis

B. Design

C. Implementation

D. Testing

C

45
New cards

The number of bits per sample is sometimes referred to as the ___

A. Quantization

B. Sampling rate

C. Encoding

D. Bit depth

D

46
New cards

All the members of a record must be ___

A. The same type

B. Related types

C. Integer type

D. Character type

B

47
New cards

A unary operator is applied to ___ relation(s) and creates an output of ___ relation(s).

A. One, one

B. One, two

C. Two, one

D. Two, two

A

48
New cards

When converting a decimal fraction to base b, we repeatedly ___ b.

A. Divide by

B. Multiply by

C. Add to

D. Subtract from

B

49
New cards

In ___ only one program can reside in memory for execution.

A. Mono-programming

B. Multi-programming

C. Partitioning

D. Paging

A

50
New cards

The attack that reduces the capability of a computer is called a ___ attack.

A. Penetration

B. Denial of service

C. Either a or b

D. Neither a nor b

B

51
New cards

When there is memory space available to load the program totally or partially the job moves to the ___. It now becomes a process.

A. Hold state

B. Ready state

C. Running state

D. Waiting state

B

52
New cards

Which printer is very commonly used for desk-top publishing?

A. Laser printer

B. Ink-jet printer

C. Daisy wheel printer

D. Dot-matrix printer

E. None of the others

A

53
New cards

In ___ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.

A. Selection

B. Bubble

C. Insertion

D. Every

A

54
New cards

Which physical topology uses a hub or switch?

A. Bus

B. Ring

C. Star

D. Bus and ring

C

55
New cards

A ___ is a predetermined value used in a program and it may change value with time.

A. Constants

B. Literals

C. Input/output

D. Variables

D

56
New cards

In the __ hashing method, selected digits are extracted from the key and used as the address.

A. Direct

B. Division remainder

C. Modulo division

D. Digit extraction

D

57
New cards

___ is a basic algorithm that adds a list of numbers.

A. Summation

B. Product

C. Smallest

D. Largest

A

58
New cards

What's happen if the size of memory is the less than the size of the program in monoprogramming OS?

A. Need to use virtual memory

B. No overflow

C. Overflow

D. The program cannot be run

D

59
New cards

The format of an IPv4 address is referred to as ___

A. Dotted-binary notation

B. Dotted-octal notation

C. Dotted-decimal notation

D. Dotted-hexadecimal notation

C

60
New cards

A/an ___ is a program in a procedural language that is a set of statements. The statements are normally executed one after another. However, sometimes it is nesserary to change this sequential order.

This figure illustrates for this statement.A. Assignment statement

B. None of others

C. Compound statement

D. Control statement

D

61
New cards

A path by which communication is achieved between a central processor and other devices is call ___

A. Audit trail

B. Network

C. Bus

D. Channel

E. None of the others

C

62
New cards

___ refers to a process that rounds the value of a sample to the closest integer value.

A. Quantization

B. Sampled

C. Decoded

D. Coded

A

63
New cards

Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex interconnections existing among the human brain's nerve cells. What name is given to such type of computers?

A. Intelligent computers

B. Supercomputers

C. Smart computers

D. Neural network computers

E. None of the above

D

64
New cards

A (n) ___ is a suitable structure when a small number of insertions and deletions are required, but a lot of searching and retrieval is needed

A. Array

B. Record

C. Linked list

D. Tree

A

65
New cards

___ is a set of characters that is treated like an array in some languages and as a type in others.

A. A string

B. A record

C. A symbol

D. A link

A

66
New cards

The items are divided into two lists (sorted and unsorted) ___ sort.

A. Only in a selection

B. Only in a bubble

C. Only in an insertion

D. In selection, bubble, or insertion

D

67
New cards

A control bus with eight wires can define ___ operations.

A. 8

B. 16

C. 256

D. 512

C

68
New cards

___ separated the programming task from computer operation tasks.

A. Algorithms

B. Data processors

C. High-level programming languages

D. Operating systems

C

69
New cards

In ___ cryptography, everyone has access to everyone's public key.

A. Symmetric-key

B. Asymmetric-key

C. Secret-key

D. Private-key

B

70
New cards

A computer assisted method for the recording and analyzing of existing or hypothetical system is

A. Data transmission

B. Data flow

C. Data capture

D. Data processing

E. None of the others

E

71
New cards

What is the method in black-box testing that a subset of values in the input domain is selected for testing?

A. Boundary-value testing

B. Random testing

C. Exhaustive testing

D. Data fiow testing

b

72
New cards

Convert the binary number (110.11)2 to decimal

A. 6.7

B. 7.75

C. 6.75

D. 27

C

73
New cards

___ is multi-programming with swapping.

A. Partitioning

B. Paging

C. Demand paging

D. Queuing

A

74
New cards

The scanning rate in image processing is called ___. If the resolution is sufficiently high, the human eye cannot recognize the discontinuity in reproduced images

A. Bit map

B. Pixels

C. Resolution

D. Color depth

E. None of others

C

75
New cards

The Stack operation returns a/an ___

A. Full stack

B. Empty stack

C. Check status of stack

D. All of the others

C

76
New cards

The unary ___ operation always results in a relation that has exactly one more row than the original relation.

A. Insert

B. Delete

C. Update

D. Select

A

77
New cards

A ___ is a collection of related logically coherent data used by the application programs in an organization.

A. Database

B. File

C. Directory

D. Flat-file

A

78
New cards

___ can provide authentication, integrity, and nonrepudiation for a message.

A. Encryption/decryption

B. Digital signature

C. Compression

D. Key-exchange

B

79
New cards

The ___ scheduler moves a process from one process state to another.

A. Job

B. Process

C. Virtual

D. Queue

B

80
New cards

If A is the first data element input into a queue, followed by B, C, and D, then ___ is the first data be removed.

A. A

B. B

C. C

D. D

A

81
New cards

The file structure allows random access is

A. Hashed file

B. Sequential file

C. EOF

D. None of others

A

82
New cards

The maximum value of a hexadecimal integer with K digits is Nmax = ___?

A. 16 bits

В. 16^K

C. 16^K -1

D. 2^K . 2^4

E. None of the others

C

83
New cards

In the ___ a program is considered a mathematical function. In this context a function is a maps a list of inputs to a list of outputs

A. Procedural paradigm

B. Functional paradigm

C. Declarative paradigm

D. Object-oriented paradigm

B

84
New cards

RISC (reduced instruction set computer). The strategy behind RISC architecture is to have a small set of instructions that do a minimum number of ___

A. Complex instructions

B. Complex operations

C. Simple operations

D. Simple instructions

C

85
New cards

Use a circular left shift operation on the bit pattern 1001 1000

A. 0001 1001

B. 0011 0001

C. 1001 1001

D. 1001 1000

B

86
New cards

Each row in a relation is called ___

A. An attribute

B. A tuple

C. A union

D. An attitude

B

87
New cards

___ is a protocol for accessing and transferring documents on the WWW.

A. FTP

B. SMTP

C. TELNET

D. HTTP

D

88
New cards

What is quality referring to the ability to move software from one hardware platform to another

A. Flexibility

B. Interoperability

C. Resusability

D. Portability

D

89
New cards

What is method in the object-oriented paradigm means that we can define several operation with the same name that can do different things in related classes?

A. Method

B. Inheritance

C. Polymorphism

D. Classes

C

90
New cards

The ___ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.

A. Transport

B. Network

C. Data-link

D. Session

C

91
New cards

Which of the following is equivalent to 12 in decimal?

A. (1110)2

B. (C)16

C. (15)8

D. None of the above

B

92
New cards

The ethical principle that dictates that an act is ethical when a majority of people in society agrees with it is referred to as

A. Moral rules

B. Utilization

C. Social contract

D. None of the others

C

93
New cards

A ___ gives the user's view of a system: it shows how the user communicates with the system

A. Class diagram

B. State diagram

C. Use-case diagram

D. Sequence diagram

C

94
New cards

If a graph is directed, the relations between edges and arcs are ___

A. One-way

B. Two-way

C. No-way

D. Any - way

A

95
New cards

___ is a pictorial representation of an algorithm.

A. A UML diagram

B. A program

C. Pseudocode

D. An algorithm

A

96
New cards

What is the result of one's complement B?

A. Not B

B. Add B with 1

C. XOR B with 0

D. AND B with 0

E. OR B with 1

A

97
New cards

Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify?

A. Track number

B. Sector number

C. Surface number

D. All of the others

E. None of the others

D

98
New cards

The physic-layer addresses, sometimes called ___ are locally defined addresses, each of which defines a specific host or router in a network (LAN or WAN).

A. TCP

B. Port numbers

C. MAC addresses

D. IP address

C

99
New cards

The maximum value of an octal integer with K=2 digits is Nmax = ___

A. 63

B. 64

C. 65

D. 66

E. None of the others

A

100
New cards

___ file can be accessed randomly.

A. A sequential

B. An indexed

C. A hashed

D. Any

D