1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The personnel who deal with the computer & its management put together are called
A. Software
B. Humanware
C. Firmware
D. Hardware
E. None of the others
B
FORTRAN and COBOL are examples of…..
A. Hardware
B. Operating systems
C. Computer languages
D. Algorithms
C
……is a stand-alone storage location that holds data temporarily.
A. An ALU
B. A register
C. A control unit
D. A tape drive
B
What is the 80-20 rule in cache?
A. Most computers typically spend 80 percent of their time accessing only 20 percent of the data
B. Cache memory at any time contains a copy of a portion of main memory.
C. It can hold data 20 percent to make access faster at least 80 percent of the time.
D. The CPU needs to check the cache first.
A
A monitor's….. is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
A. Refresh rate
B. Dot pitch
C. Resolution
D. Color depth
E. None of the others
B
What is taxonomy of computer organization?
A. SIMD - Single Instruction-stream, Multiple Data-stream
B. MISD - Multiple Instruction-stream, Single Data-stream
C. MIMD - Multiple Instruction-stream, Multiple Data-stream
D. All of the others
D
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
B
The base of the hexadecimal number system is….
A. 2
B. 8
C. 10
D. 16
D
Which of the following is equivalent to 12 in decimal?
A. (1110)2
B. (C)16
C. (15)8
D. None of the others
B
The maximum value of an octal integer with K=2 digits is Nmax =......
A. 63
B. 64
C. 65
D. 66
E. None of the others
A
Conversion of binary number 1010101000010111 to hexadecimal number is…..
A. D8F9
B. A8B9
C. AA17
D. D9F8
E. None of the others
C
The precision of the fractional part of a number stored in a computer is defined by the…..
A. Sign
B. Exponent
C. Mantissa
D. Last digit
C
Which of the following is the coding of data so that it can't be easily understood if intercepted?
A. Barcode
B. Decoder
C. Encryption
D. Mnemonics
E. None of the others
C
If we call the bit depth or number of bits per sample B, the number of samples per second S, so how to calculate BIT RATE (R)?
A. B × 2S
B. 2B × S
C. B × S
D. B2 × S2
C
In storing images, the samples are called (which stands for picture elements).
A. Bit map
B. Pixels
C. Resolution
D. Color depth
E. None of others
B
Use an arithmetic right shift operation on the bit pattern 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
A
…..is usually privately owned, limited in size and connects some hosts in a single office, building, or campus.
A. LAN
B. WAN
C. Internet
D. Network
A
In the physical layer, a ……can be broadly defined as anything that can carry information from a source to a destination.
A. Digital-to-digital conversion
B. Analog-to-digital conversion
C. Digital-to-analog conversion
D. Analog-to-analog conversion
E. Transmission medium
E
The……layer of the TCP/IP protocol suite is responsible for source-to-destination delivery of the entire message.
A. Transport
B. Network
C. Data-link
D. Session
A
……protocol(s) is one of the protocols in the transport layer.
A. Only TCP
B. Only UDP
C. Only SCTP
D. TCP, UDP, and SCTP
D
In a….., the directory system listing of the peers and what they offer uses the client-server paradigm, but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network
C
The major design goals of an operating system:
A. Efficient use of hardware and easy use of resources
B. Control subsystems and manage memory
C. Access I/O device and CPU
D. Provide UI
E. Operation on data
F. Text editor
A B C D
A multi-programming system is one that can
A. Run very fast
B. Share hardware resources with many programs simultaneously
C. Compute many programs simultaneously
D. Use many operating systems
E. None of the others
B
In….., only one program can reside in memory for execution.
A. Mono-programming
B. Multi-programming
C. Partitioning
D. Paging
A
The…… scheduler creates a process from a job and changes a process back to a job.
A. Job
B. Process
C. Virtual
D. Queue
A
What kind of state does a process execute until it needs I/O resources when I/O is complete?
A. Hold state
B. Ready state
C. Running state
D. Waiting state
D
The….. construct tests a condition.
A. Sequence
B. Decision
C. Repetition
D. Flow
B
…..is an English-language-like representation of code.
A. A UML diagram
B. A program
C. Pseudocode
D. An algorithm
C
…..is a basic algorithm in which we want to find the location of a target in a list of items.
A. Sorting
B. Searching
C. Product
D. Summation
B
In….. sort, the item that goes into the sorted list is always the first item in the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every
A
A….. analyzer reads the source code symbol by symbol and creates a list of tokens in the source language
A. Lexical
B. Syntax
C. Semantic
D. Code generation
A
A notation used to express clearly on algorithm is known as
A. Algorithmic language
B. Assembly language
C. Machine language
D. High level language
E. None of the others
A
A. Procedural paradigm
In the….., we can think of a program as an active agent that manipulates passive objects.
B. Functional paradigm
C. Declarative paradigm
D. Object-oriented paradigm
D
A………is a unit of code consisting of zero or more statements. It is also known as a block.
Example:
{
X = 1;
Y = 20;
}
A. Compound statement
B. Assignment statement
C. Control statement
D. None of others
A
In a…. languages, the project team needs to choose a language or a set of languages from among the procedural
A. Analysis phase
B. Design phase
C. Implementation phase
D. Testing phase
C
Defining the users, requirements, and methods is part of the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing
A
In the system development process, structure charts are tools used in the…. phase.
A. Analysis
B. Design
C. Implementation
D. Testing
B
What is quality referring to the ability to move data and/or a system from one platform to another and to reuse code?
A. Flexibility
B. Interoperability
C. Resusability
D. Changeability
B
Question 39:
What is the method in black-box testing that a subset of values in the input domain is selected for testing?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
A
What is the more common technique of two-dimensional arrays that can be stored in memory?
A. Column-major storage
B. DMA
C. Isolated I/O
D. Row-major storage
D
Each element in a record is called…..
A. A variable
B. An index
C. A field
D. A node
C
Given a linked list called children, the pointer variable children identifies…. element of the linked list.
A. The first
B. The second
C. The last
D. Any
A
The push operation …. of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
C
In….. of a binary tree we process all the children of a node before proceeding with the next generation.
A. Preorder traversal
B. Inorder traversal
C. Postorder traversal
D. Breadth-first traversal
D
The queue operation: "queue (queueName)" is used to….
A. Delete queue
B. Check status of queue
C. Create an empty queue
D. Insert queue
C
In the sequential file we process the records one by one. After the operating system processes the last record the ….. is detected and the loop is exited.
A. Hashed file
B. Sequential file
C. EOF
D. None of others
C
In the ….. hashing method, the key is divided by the file size, and the address is the remainder plus 1.
A. Direct
B. Division remainder
C. Modulo division
D. Digit extraction
B
….are provided by most operating systems for organizing files. This performs the same function as a folder in a filing cabinet.
A. Operating system
B. Files
C. Binary files
D. Directories
D
In a three-level DBMS architecture, the …..level interacts directly with the users.
A. External
B. Conceptual
C. Internal
D. Physical
A
In the network database model, the entities are organized in a ….in which some entities can be accessed through several paths.
A. Graph
B. Tree
C. Array
D. Record
A
Each column in a relation is called….
A. An attribute
B. A tuple
C. A union
D. An attitude
A
The unary …. relation.operation always results in a relation that has exactly one more row than the original.
A. Insert
B. Delete
C. Update
D. Select
A
The term users in a DBMS has a broad meaning. We can divide users into:
A. End users and database administrators
B. End users and normal users
C. Application programs and end users
D. Application programs and database administrators
A
In the attacks threaten confidentiality based on…. they can obtain some other type of information by monitoring online traffic.
A. Snooping
B. Repudiation
C. Denial of service
D. Traffic analysis
D
Before transmission the sender transforms the plaintext into the ciphertext-this is…..
A. Plain text
B. Cipher text
C. Encryption
D. Decryption
C
….are unwanted programs that are hidden within other programs (host). When the user executes the host program.
A. DoS
B. Trojan horses
C. Worms
D. Viruses
B
Sending a virus to a computer is called an…..attack.
A. Penetration
B. Denial of service
C. Either a or b
D. Neither a nor b
A
In a…. the relationship between a character in the plaintext to a character in the ciphertext is one-to-many.
A. Monoalphabetic cipher
B. Substitution cipher
C. Polyalphabetic cipher
D. Transposition cipher
B
….ciphers are sometimes called public-key ciphers.
A. Symmetric-key
B. Asymmetric-key
C. Public-key
D. Private-key
B
In a computer, the…. subsystem stores data and programs.
A. ALU
B. Input/output
C. Memory
D. Control unit
C