CSI3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

The personnel who deal with the computer & its management put together are called
A. Software
B. Humanware
C. Firmware
D. Hardware
E. None of the others

B

2
New cards

FORTRAN and COBOL are examples of…..
A. Hardware
B. Operating systems
C. Computer languages
D. Algorithms

C

3
New cards

……is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive

B

4
New cards

What is the 80-20 rule in cache?
A. Most computers typically spend 80 percent of their time accessing only 20 percent of the data
B. Cache memory at any time contains a copy of a portion of main memory.
C. It can hold data 20 percent to make access faster at least 80 percent of the time.
D. The CPU needs to check the cache first.

A

5
New cards

A monitor's….. is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
A. Refresh rate
B. Dot pitch
C. Resolution
D. Color depth
E. None of the others

B

6
New cards

What is taxonomy of computer organization?
A. SIMD - Single Instruction-stream, Multiple Data-stream
B. MISD - Multiple Instruction-stream, Single Data-stream
C. MIMD - Multiple Instruction-stream, Multiple Data-stream
D. All of the others

D

7
New cards

Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others

B

8
New cards

The base of the hexadecimal number system is….
A. 2
B. 8
C. 10
D. 16

D

9
New cards

Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the others

B

10
New cards

The maximum value of an octal integer with K=2 digits is Nmax =......
A. 63
B. 64
C. 65
D. 66
E. None of the others

A

11
New cards

Conversion of binary number 1010101000010111 to hexadecimal number is…..
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others

C

12
New cards

The precision of the fractional part of a number stored in a computer is defined by the…..
A. Sign
B. Exponent
C. Mantissa
D. Last digit

C

13
New cards

Which of the following is the coding of data so that it can't be easily understood if intercepted?
A. Barcode
B. Decoder
C. Encryption
D. Mnemonics
E. None of the others

C

14
New cards

If we call the bit depth or number of bits per sample B, the number of samples per second S, so how to calculate BIT RATE (R)?
A. B × 2S
B. 2B × S
C. B × S
D. B2 × S2

C

15
New cards

In storing images, the samples are called (which stands for picture elements).
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others

B

16
New cards

Use an arithmetic right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000

A

17
New cards

…..is usually privately owned, limited in size and connects some hosts in a single office, building, or campus.
A. LAN
B. WAN
C. Internet
D. Network

A

18
New cards

In the physical layer, a ……can be broadly defined as anything that can carry information from a source to a destination.
A. Digital-to-digital conversion
B. Analog-to-digital conversion
C. Digital-to-analog conversion
D. Analog-to-analog conversion
E. Transmission medium

E

19
New cards

The……layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
A. Transport
B. Network
C. Data-link
D. Session

A

20
New cards

……protocol(s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP

D

21
New cards

In a….., the directory system listing of the peers and what they offer uses the client-server paradigm, but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network

C

22
New cards

The major design goals of an operating system:
A. Efficient use of hardware and easy use of resources
B. Control subsystems and manage memory
C. Access I/O device and CPU
D. Provide UI
E. Operation on data
F. Text editor

A B C D

23
New cards

A multi-programming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D. Use many operating systems
E. None of the others

B

24
New cards

In….., only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging

A

25
New cards

The…… scheduler creates a process from a job and changes a process back to a job.
A. Job
B. Process
C. Virtual
D. Queue

A

26
New cards

What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state

D

27
New cards

The….. construct tests a condition.
A. Sequence
B. Decision
C. Repetition
D. Flow

B

28
New cards

…..is an English-language-like representation of code.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm

C

29
New cards

…..is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation

B

30
New cards

In….. sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every

A

31
New cards

A….. analyzer reads the source code symbol by symbol and creates a list of tokens in the source language
A. Lexical
B. Syntax
C. Semantic
D. Code generation

A

32
New cards

A notation used to express clearly on algorithm is known as
A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the others

A

33
New cards

A. Procedural paradigm
In the….., we can think of a program as an active agent that manipulates passive objects.
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm

D

34
New cards

A………is a unit of code consisting of zero or more statements. It is also known as a block.
Example:
{
X = 1;
Y = 20;
}
A. Compound statement
B. Assignment statement
C. Control statement
D. None of others

A

35
New cards

In a…. languages, the project team needs to choose a language or a set of languages from among the procedural
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase

C

36
New cards

Defining the users, requirements, and methods is part of the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

A

37
New cards

In the system development process, structure charts are tools used in the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing

B

38
New cards

What is quality referring to the ability to move data and/or a system from one platform to another and to reuse code?
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability

B

39
New cards

Question 39:
What is the method in black-box testing that a subset of values in the input domain is selected for testing?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing

A

40
New cards

What is the more common technique of two-dimensional arrays that can be stored in memory?
A. Column-major storage
B. DMA
C. Isolated I/O
D. Row-major storage

D

41
New cards

Each element in a record is called…..
A. A variable
B. An index
C. A field
D. A node

C

42
New cards

Given a linked list called children, the pointer variable children identifies…. element of the linked list.
A. The first
B. The second
C. The last
D. Any

A

43
New cards

The push operation …. of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom

C

44
New cards

In….. of a binary tree we process all the children of a node before proceeding with the next generation.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal

D

45
New cards

The queue operation: "queue (queueName)" is used to….
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue

C

46
New cards

In the sequential file we process the records one by one. After the operating system processes the last record the ….. is detected and the loop is exited.
A. Hashed file
B. Sequential file
C. EOF
D. None of others

C

47
New cards

In the ….. hashing method, the key is divided by the file size, and the address is the remainder plus 1.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction

B

48
New cards

….are provided by most operating systems for organizing files. This performs the same function as a folder in a filing cabinet.
A. Operating system
B. Files
C. Binary files
D. Directories

D

49
New cards

In a three-level DBMS architecture, the …..level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical

A

50
New cards

In the network database model, the entities are organized in a ….in which some entities can be accessed through several paths.
A. Graph
B. Tree
C. Array
D. Record

A

51
New cards

Each column in a relation is called….
A. An attribute
B. A tuple
C. A union
D. An attitude

A

52
New cards

The unary …. relation.operation always results in a relation that has exactly one more row than the original.
A. Insert
B. Delete
C. Update
D. Select

A

53
New cards

The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrators

A

54
New cards

In the attacks threaten confidentiality based on…. they can obtain some other type of information by monitoring online traffic.
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis

D

55
New cards

Before transmission the sender transforms the plaintext into the ciphertext-this is…..
A. Plain text
B. Cipher text
C. Encryption
D. Decryption

C

56
New cards

….are unwanted programs that are hidden within other programs (host). When the user executes the host program.
A. DoS
B. Trojan horses
C. Worms
D. Viruses

B

57
New cards

Sending a virus to a computer is called an…..attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b

A

58
New cards

In a…. the relationship between a character in the plaintext to a character in the ciphertext is one-to-many.
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher

B

59
New cards

….ciphers are sometimes called public-key ciphers.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Private-key

B

60
New cards

In a computer, the…. subsystem stores data and programs.
A. ALU
B. Input/output
C. Memory
D. Control unit

C