1/415
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
The device manager maintains one or more ___ for similar input/output devices
A. Graph
B. Array
C. Stack
D. Queue
D
The ___ manager is responsible for archiving and backup.
A. Memory
B. Process
C. Device
D. File
D
Artificial Intelligence has evolved extremely in all the fields except for ___
A. Web mining
B. Construction of plans in real time dynamic systems
C. Understanding natural language robustly
D. All of the above
E. None of the above
C
After the instruction is decoded, the control unit sends the task order to a component in the CPU. What is this phase?.
A. Fetch phase
B. Decode phase
C. Excute phase
D. None of others
C
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ___
A. User A
B. User B
C. The network
D. A third party.
B
In a ___ the relationship between a character in the plaintext to a character in the ciphertext is one-to-many
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
C
In the object-oriented paradigm, as in nature ___ is an object that can inherit from another object.
A. Method
B. Inheritance
C. Polymorphism
D. Classes
D
The first generation of computers available was based on the ___ bits micro processors.
A. 4
B. 8
C. 16
D. 64
E. None of the others
A
The octal equivalent of 1100101.001010 is ___
A. 624.12
B. 145.12
C. 154.12
D. 145.21
E. None of the others
B
A group includes ___ bits in the binary system are represented as one digit in the hexadecimal system.
A. 1
B. 2
C. 3
D. 4
E. None of the others
D
What is the field of Natural Language Processing (NLP)?
A. Computer Science
B. Artificial Intelligence
C. Linguistics
D. All of the above
E. None of the above
D
The devices in Bluetooth LAN, sometimes called gadgets, find each other and make a network called ___
A. ESS
B. Ad hoc
C. BSS
D. A piconet
D
What is the field that investigates the mechanics of human intelligence?
A. history
B. cognitive science
C. psychology
D. sociology
B
___ is an English-language-like representation of an algorithm. There is no standard for it- some people use a lot of detail
A. Pseudocode
B. Unified Modeling Language (UML)
C. Flowchart
D. State diagram
A
In ___ the development process flows in only one direction. This means that a phase cannot be started until
the previous phase is completed.
A. Waterfall model
B. Incremental model
C. Development proces
D. Software engineering
A
According to the von Neumann model, ___ are stored in memory.
A. Only data
B. Only programs
C. Data and programs
D. Neither data nor programs
C
In physical layer, an ___ has infinitely many levels of intensity over a period of time
A. Analog signa
lsB. Electromagnetic signals
C. Digital signals
D. Electronic signals
A
The ___ of each node includes one of its children and all descendents of that child
A. Left tree
B. Binary tree
C. Subtree
D. Right tree
C
In the sign-and-magnitude representation, the memory location can hold four bits, assume that we have stored integer 6 in a memory location and we then try to add 6 to the integer. The computer's response is ___?
A. 12
B. -12
C. 4
D. -4
D
The ___ level of a three-level DBMS architecture defines the logical view of the data.
A. External
B. Conceptual
C. Internal
D. Physical
B
The ___ is a protocol that is used to define how the client-server programs can be written to retrieve web pages from the Web.
A. FTP
B. SMTP
C. TELNET
D. HTTP
D
Which of following represents a set of data items that share a specific relationship?
A. ADT
B. Data structure
C. Programming language
D. Data element
B
A program that is employed in the development, repair or enhancement of other programs is known as
A. System software
B. Software tool
C. Applications program
D. Utility program
E. None of the others
B
In a positional number system with base b, we can always find the number of digits of an integer. So how many digits can we find in the decimal number 234 in decimal?
A. 1
B. 2
C. 3
D. 4
C
___ means that the sender and the receiver expect confidentiality.
A. Nonrepudiation
B. Integrity
C. Authentication
D. encryption and decryption
D
An electronic circuit with about 20 transistors fabricated on a silicon chip is known as
A. SSI
B. MSI
C. DPS
D. RJE
E. None of the others
A
The ___ acts as a liaison between a client program and a server program, a process-to-process connection.
A. Physical
B. Data-link
C. Network
D. Transport
D
Which is a unit representing the no bits of discrete.
A. Baud
B. Byte
C. Bit
D. All of the others
E. None of the others
C
___ is a program that facilitates the execution of other programs.
A. An operating system
B. Hardware
C. A queue
D. An application program
A
Each column in a relation is called ___
A. An attribute
B. A tuple
C. A union
D. An attitude
A
The device manager will be tracking every device constantly to ensure that the device is ___
A. Ready
B. Finished
C. Functioning properly
D. Running
C
___ is a method in which each statement in the software is executed at least once.
A. Basis path testing
B. Condition testing
C. Loop testing
D. Boundary testing
A
Which of the following representations is erroneous?
A. (110)2
B. (141)8
C. (EF)16
D. 22A
D
The push operation ___ of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
C
If the memory address space is 16 MB and the word size is 8 bits, then ___ bits are needed to access each
word.
A. 8
B. 16
C. 24
D. 32
C
In the network database model, the entities are organized in a ___ in which some entities can be accessed through several paths
A. Graph
B. Tree
C. Array
D. Record
A
In ___ method to solve collision the first record is stored in the home address but contains a pointer to the second record.
A. Linked list resolution
B. Open addressing resolution
C. Bucket hashing
D. Digit extraction hashing
A
In ___ edges are ordered pairs of vertices. If x and y are two vertices and an edge e = (x, y), x is called the starting point and y is called the endpoint of the edge.
A. Directed graph
B. Undirected graph
C. Edges
D. Arcs
A
The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as ___
A. CPU
B. Control Unit
C. I/O unit
D. Peripheral unit
E. None of the others
A
A hashed file uses a ___ to accomplish this mapping
A. Retrived file
B. Sequential access
C. Random access
D. Mathematical function
D
FORTRAN is a(n) ___ language.
A. Procedural
B. Functional
C. Declarative
D. Object-oriented
A
Arithmetic right shift is used to __ an integer by two
A. Addition
B. Subtraction
C. Divide
D. Multiply
C
___ is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
B
In the system development process, writing the program is part of the ___ phase.
A. Analysis
B. Design
C. Implementation
D. Testing
C
The number of bits per sample is sometimes referred to as the ___
A. Quantization
B. Sampling rate
C. Encoding
D. Bit depth
D
All the members of a record must be ___
A. The same type
B. Related types
C. Integer type
D. Character type
B
A unary operator is applied to ___ relation(s) and creates an output of ___ relation(s).
A. One, one
B. One, two
C. Two, one
D. Two, two
A
When converting a decimal fraction to base b, we repeatedly ___ b.
A. Divide by
B. Multiply by
C. Add to
D. Subtract from
B
In ___ only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging
A
The attack that reduces the capability of a computer is called a ___ attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
B
When there is memory space available to load the program totally or partially the job moves to the ___. It now becomes a process.
A. Hold state
B. Ready state
C. Running state
D. Waiting state
B
Which printer is very commonly used for desk-top publishing?
A. Laser printer
B. Ink-jet printer
C. Daisy wheel printer
D. Dot-matrix printer
E. None of the others
A
In ___ sort, the smallest item moves to the beginning of the unsorted list. There is no one-to-one swapping.
A. Selection
B. Bubble
C. Insertion
D. Every
A
Which physical topology uses a hub or switch?
A. Bus
B. Ring
C. Star
D. Bus and ring
C
A ___ is a predetermined value used in a program and it may change value with time.
A. Constants
B. Literals
C. Input/output
D. Variables
D
In the __ hashing method, selected digits are extracted from the key and used as the address.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
D
___ is a basic algorithm that adds a list of numbers.
A. Summation
B. Product
C. Smallest
D. Largest
A
What's happen if the size of memory is the less than the size of the program in monoprogramming OS?
A. Need to use virtual memory
B. No overflow
C. Overflow
D. The program cannot be run
D
The format of an IPv4 address is referred to as ___
A. Dotted-binary notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. Dotted-hexadecimal notation
C
A/an ___ is a program in a procedural language that is a set of statements. The statements are normally executed one after another. However, sometimes it is nesserary to change this sequential order.
This figure illustrates for this statement.A. Assignment statement
B. None of others
C. Compound statement
D. Control statement
D
A path by which communication is achieved between a central processor and other devices is call ___
A. Audit trail
B. Network
C. Bus
D. Channel
E. None of the others
C
___ refers to a process that rounds the value of a sample to the closest integer value.
A. Quantization
B. Sampled
C. Decoded
D. Coded
A
Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex interconnections existing among the human brain's nerve cells. What name is given to such type of computers?
A. Intelligent computers
B. Supercomputers
C. Smart computers
D. Neural network computers
E. None of the above
D
A (n) ___ is a suitable structure when a small number of insertions and deletions are required, but a lot of searching and retrieval is needed
A. Array
B. Record
C. Linked list
D. Tree
A
___ is a set of characters that is treated like an array in some languages and as a type in others.
A. A string
B. A record
C. A symbol
D. A link
A
The items are divided into two lists (sorted and unsorted) ___ sort.
A. Only in a selection
B. Only in a bubble
C. Only in an insertion
D. In selection, bubble, or insertion
D
A control bus with eight wires can define ___ operations.
A. 8
B. 16
C. 256
D. 512
C
___ separated the programming task from computer operation tasks.
A. Algorithms
B. Data processors
C. High-level programming languages
D. Operating systems
C
In ___ cryptography, everyone has access to everyone's public key.
A. Symmetric-key
B. Asymmetric-key
C. Secret-key
D. Private-key
B
A computer assisted method for the recording and analyzing of existing or hypothetical system is
A. Data transmission
B. Data flow
C. Data capture
D. Data processing
E. None of the others
E
What is the method in black-box testing that a subset of values in the input domain is selected for testing?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data fiow testing
b
Convert the binary number (110.11)2 to decimal
A. 6.7
B. 7.75
C. 6.75
D. 27
C
___ is multi-programming with swapping.
A. Partitioning
B. Paging
C. Demand paging
D. Queuing
A
The scanning rate in image processing is called ___. If the resolution is sufficiently high, the human eye cannot recognize the discontinuity in reproduced images
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others
C
The Stack operation returns a/an ___
A. Full stack
B. Empty stack
C. Check status of stack
D. All of the others
C
The unary ___ operation always results in a relation that has exactly one more row than the original relation.
A. Insert
B. Delete
C. Update
D. Select
A
A ___ is a collection of related logically coherent data used by the application programs in an organization.
A. Database
B. File
C. Directory
D. Flat-file
A
___ can provide authentication, integrity, and nonrepudiation for a message.
A. Encryption/decryption
B. Digital signature
C. Compression
D. Key-exchange
B
The ___ scheduler moves a process from one process state to another.
A. Job
B. Process
C. Virtual
D. Queue
B
If A is the first data element input into a queue, followed by B, C, and D, then ___ is the first data be removed.
A. A
B. B
C. C
D. D
A
The file structure allows random access is
A. Hashed file
B. Sequential file
C. EOF
D. None of others
A
The maximum value of a hexadecimal integer with K digits is Nmax = ___?
A. 16 bits
В. 16^K
C. 16^K -1
D. 2^K . 2^4
E. None of the others
C
In the ___ a program is considered a mathematical function. In this context a function is a maps a list of inputs to a list of outputs
A. Procedural paradigm
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
B
RISC (reduced instruction set computer). The strategy behind RISC architecture is to have a small set of instructions that do a minimum number of ___
A. Complex instructions
B. Complex operations
C. Simple operations
D. Simple instructions
C
Use a circular left shift operation on the bit pattern 1001 1000
A. 0001 1001
B. 0011 0001
C. 1001 1001
D. 1001 1000
B
Each row in a relation is called ___
A. An attribute
B. A tuple
C. A union
D. An attitude
B
___ is a protocol for accessing and transferring documents on the WWW.
A. FTP
B. SMTP
C. TELNET
D. HTTP
D
What is quality referring to the ability to move software from one hardware platform to another
A. Flexibility
B. Interoperability
C. Resusability
D. Portability
D
What is method in the object-oriented paradigm means that we can define several operation with the same name that can do different things in related classes?
A. Method
B. Inheritance
C. Polymorphism
D. Classes
C
The ___ layer of the TCP/IP protocol suite is responsible for node-to-node delivery of a frame between two adjacent nodes.
A. Transport
B. Network
C. Data-link
D. Session
C
Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the above
B
The ethical principle that dictates that an act is ethical when a majority of people in society agrees with it is referred to as
A. Moral rules
B. Utilization
C. Social contract
D. None of the others
C
A ___ gives the user's view of a system: it shows how the user communicates with the system
A. Class diagram
B. State diagram
C. Use-case diagram
D. Sequence diagram
C
If a graph is directed, the relations between edges and arcs are ___
A. One-way
B. Two-way
C. No-way
D. Any - way
A
___ is a pictorial representation of an algorithm.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
A
What is the result of one's complement B?
A. Not B
B. Add B with 1
C. XOR B with 0
D. AND B with 0
E. OR B with 1
A
Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify?
A. Track number
B. Sector number
C. Surface number
D. All of the others
E. None of the others
D
The physic-layer addresses, sometimes called ___ are locally defined addresses, each of which defines a specific host or router in a network (LAN or WAN).
A. TCP
B. Port numbers
C. MAC addresses
D. IP address
C
The maximum value of an octal integer with K=2 digits is Nmax = ___
A. 63
B. 64
C. 65
D. 66
E. None of the others
A
___ file can be accessed randomly.
A. A sequential
B. An indexed
C. A hashed
D. Any
D