Intro to CS

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/265

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:22 AM on 1/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

266 Terms

1
New cards
2
New cards
3
New cards
4
New cards
5
New cards
Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?
A. AND
B. OR
C. XOR
ANSWER: A
6
New cards
Which of the following best describes the NOR operation?
A. An XOR followed by a NOT
B. An OR followed by a NOT
C. A NOT followed by an OR
C. An AND followed by a NOT
ANSWER: B
7
New cards
Which of the following bit patterns cannot be expressed in hexadecimal notation?
A. 11111111
B. 1001
C. 110011
D. 100000000001
ANSWER: C
8
New cards
Which of the following is the binary representation of 6 5/8?
A. 110.11
B. 10.011
C. 110.101
D. 100.101
ANSWER: C
9
New cards
Which of the following bit patterns represents the value 9 in two’s complement notation?
A. 00011010
B. 11111011
C. 00001001
D. 11111011
ANSWER: C
10
New cards
Which of the following bit patterns represents the value -9 in two’s complement notation?
A. 00011010
B. 111110111
C. 10001001
D. 11111011
ANSWER: B
11
New cards
What is the result of the following addition problem (using two’s complement notation)? 00001111 + 10101010
A. 011000101
B. 10111001
C. 01010101
D. 10110101
ANSWER: B
12
New cards
What is the result of the following subtraction problem (using two’s complement notation)? 00001111 - 10101010
A. 011000101
B. 10111001
C. 01010101
D. 10110101
ANSWER: A
13
New cards
In which of the following addition problems (using two’s complement notation) does an overflow error occur?
A. 0011 + 1010
B. 1100 + 0100
C. 1100 + 1100
D. 0100 + 0100
ANSWER: D
14
New cards
Which of the following representations in two’s complement notation represents the largest value?
A. 00000010
B. 11110000
C. 00000001
D. 11111111
ANSWER: A
15
New cards
Which of the following representations in two’s complement notation represents the smallest value?
A. 00000010
B. 11110000
C. 00000001
D. 11111111
ANSWER: D
16
New cards
Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two’s complement notation?
A. 3F
B. 55
C. A6
D. 7E
ANSWER: C
17
New cards
Which of the following bit patterns (represented in hexadecimal notation) represents a positive number in two’s complement notation?
A. 9F
B. F7
C. A8
D. 7E
ANSWER: D
18
New cards
What value is represented by the bit pattern 01011100 when interpreted using floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. -1 1/2
B. 1 1/2
C. -3/8
D. 3/8
ANSWER: B
19
New cards
Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. 2 1/2
B. 3/16
C. 7
D. 6 1/4
ANSWER: D
20
New cards
Which of the following bit-patterns represents the smallest value using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. 01001000
B. 01011000
C. 00101000
D. 01111000
ANSWER: C
21
New cards
Which of the following data storage systems provides the most efficient random access to individual data items?
A. Main memory
B. Magnetic disk
C. CDs/DVDs
D. Flash drives
ANSWER: A
22
New cards
Which of the following storage systems is best suited for storing and retrieving long strings of data that are processed in their sequential order?
A. Main memory
B. Magnetic disk
C. CDs/DVDs
ANSWER: C
23
New cards
Which of the following mass storage system does not require physical motion?
A. Magnetic tape
B. Magnetic disk
C. CDs/DVDs
D. Flash drives
ANSWER: D
24
New cards
Assuming that each of the following bit patterns originally had even parity, which one contains an error?
A. 100110100
B. 110000011
C. 010011000
D. 100011001
ANSWER: C
25
New cards
How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8?
A. 3
B. 4
C. 5
D. 6
ANSWER: A
26
New cards
Which of the following is a possible LZW compression of the message “xyz xyz xyz”?
A. 1234
B. 1234545
C. 232
D. 12
ANSWER: B
27
New cards
Which of the following systems is least efficient when encoding numeric values?
A. Two’s complement notation
B. Excess notation
C. ASCII
D. Floating-point notation
ANSWER: C
28
New cards
Which of the following is a means of encoding music?
A. ASCII
B. MIDI
C. JPEG
D. GIF
ANSWER: B
29
New cards
Which of the following provides a compressed representation of an image by limiting the number of different pixel colors to 256, thereby enabling each pixel in an image to be represented by a single byte whose value indicates which of a palette of entries represents the pixel’s color?
A. ASCII
B. MPEG
C. JPEG
D. GIF
ANSWER: D
30
New cards
Which of the following Boolean operations produces the output 1 for the fewest number of input patterns?
A. AND
B. OR
C. XOR
ANSWER: A
31
New cards
Which of the following best describes the NOR operation?
A. An XOR followed by a NOT
B. An OR followed by a NOT
C. A NOT followed by a NOT
C. An AND followed by a NOT
ANSWER: B
32
New cards
Which of the following bit patterns cannot be expressed in hexadecimal notation?
A. 11111111
B. 1001
C. 110011
D. 100000000001
ANSWER: C
33
New cards
Which of the following is the binary representation of 4 5/8?
A. 100.11
B. 10.011
C. 110.101
D. 100.101
ANSWER: D
34
New cards
Which of the following bit patterns represents the value 5 in two’s complement notation?
A. 00011010
B. 11111011
C. 00000101
D. 11111011
ANSWER: C
35
New cards
Which of the following bit patterns represents the value -5 in two’s complement notation?
A. 00011010
B. 11111011
C. 00000101
D. 11111011
ANSWER: D
36
New cards
What is the result of the following addition problem (using two’s compliment notation)? 00001111 + 10101010
A. 011000101
B. 10111001
C. 01010101
D. 10110101
ANSWER: B
37
New cards
What is the result of the following subtraction problem (using two’s compliment notation)? 00001111 - 10101010
A. 011000101
B. 10111001
C. 01010101
D. 10110101
ANSWER: A
38
New cards
In which of the following addition problems (using two’s complement notation) does an overflow error occur?
A. 0011 + 1010
B. 0100 + 0100
C. 1100 + 1100
ANSWER: B
39
New cards
Which of the following representations in two’s complement notation represents the largest value?
A. 00000010
B. 11111111
C. 00000001
D. 11111110
ANSWER: A
40
New cards
Which of the following representations in two’s complement notation represents the smallest value?
A. 00000010
B. 11111111
C. 00000001
D. 11111100
ANSWER: D
41
New cards
Which of the following bit patterns (represented in hexadecimal notation) represents a negative number in two’s complement notation?
A. 7F
B. 55
C. A6
D. 08
ANSWER: C
42
New cards
Which of the following bit patterns (represented in hexadecimal notation) represents a positive number in two’s complement notation?
A. 7F
B. F7
C. A8
D. 8A
ANSWER: A
43
New cards
What value is represented by the bit pattern 01011100 when interpreted using floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. -1 1/2
B. 1 1/2
C. -3/8
D. 3/8
ANSWER: B
44
New cards
Which of the following values cannot be stored accurately using a floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. 2 1/2
B. 3/16
C. 7
D. 6 1/4
ANSWER: D
45
New cards
Which of the following bit-patterns represents the smallest value using the floating-point format in which the most significant bit is the sign bit, the next three bits represent the exponent field in excess notation, and the last four bits represent the mantissa?
A. 01001000
B. 01011000
C. 00101000
D. 01111000
ANSWER: C
46
New cards
Which of the following data storage systems provides the most efficient random access to individual data items?
A. Main memory
B. Magnetic disk
C. CDs/DVDs
D. Flash drives
ANSWER: A
47
New cards
Which of the following storage systems is best suited for storing and retrieving long strings of data that are processed in their sequential order?
A. Main memory
B. Magnetic disk
C. CDs/DVDs
ANSWER: C
48
New cards
Which of the following mass storage system does not require physical motion?
A. Magnetic tape
B. Magnetic disk
C. DVDs
D. Flash drives
ANSWER: D
49
New cards
Assuming that each of the following bit patterns originally had even parity, which one contains an error?
A. 100110100
B. 110000011
C. 000011000
D. 100001001
ANSWER: D
50
New cards
How many errors per pattern could be corrected when using an error-correcting code in which any two code patterns differ by a Hamming distance of 8?
A. 3
B. 4
C. 5
D. 6
ANSWER: A
51
New cards
Which of the following is a possible LZW compression of the message “xyz xyz xyz”?
A. 1234
B. 1234545
C. 232
D. 12
ANSWER: B
52
New cards
Which of the following systems is least efficient when encoding numeric values?
A. Two’s complement notation
B. Excess notation
C. ASCII
D. Floating-point notation
ANSWER: C
53
New cards
Which of the following is a means of encoding music?
A. ASCII
B. MIDI
C. JPEG
D. GIF
ANSWER: B
54
New cards
Which of the following provides a compressed representation of an image by limiting the number of different pixel colors to 256, thereby enabling each pixel in an image to be represented by a single byte whose value indicates which of a palette of entries represents the pixel’s color?
A. ASCII
B. MPEG
C. JPEG
D. GIF
ANSWER: D
55
New cards
Which of the following components of an operating system maintains the directory system?
A. Device drivers
B. File manager
C. Memory manager
ANSWER: B
56
New cards
Which of the following components of an operating system handles the details associated with particular peripheral equipment?
A. Device drivers
B. File manager
C. Memory manager
ANSWER: A
57
New cards
Which of the following components of an operating system is not part of the kernel?
A. User Interface
B. File manager
C. Scheduler
ANSWER: A
58
New cards
Multitasking in a computer with only one CPU is accomplished by a technique called
A. Bootstrapping
B. Batch processing
C. Multiprogramming
ANSWER: C
59
New cards
Execution of an operating system is initiated by a program called the
A. Window manager
B. Scheduler
C. Boot loader
ANSWER: C
60
New cards
The end of a time slice is indicted by the occurrence of a signal called
A. An interrupt
B. A semaphore
C. A login
ANSWER: A
61
New cards
A section of a program that should be executed by at most one process at a time is called a
A. Utility
B. Critical region
C. Privileged instruction
ANSWER: B
62
New cards
Which of the following is not an attempt to provide security?
A. Passwords
B. Privilege levels
C. Multitasking
ANSWER: C
63
New cards
Which of the following items of information would not be contained in an operating system’s process table?
A. The location of the memory area assigned to the process
B. The priority of each process
C. Whether the process is ready or waiting
D. The machine language instructions being executed by the process
ANSWER: D
64
New cards
Which of the following events is detrimental to an operating system’s performance?
A. Deadlock
B. Interrupt
C. Booting
ANSWER: A
65
New cards
Which of the following is a technique for controlling access to a critical region?
A. Spooling
B. Time sharing
C. Semaphore
D. Booting
ANSWER: C
66
New cards
Which of the following is not involved in a context switch?
A. Interrupt
B. Process table
C. Dispatcher
D. User Interface
ANSWER: D
67
New cards
Which of the following concepts is not associated with critical regions?
A. Semaphores
B. Mutual exclusion
C. Bootstrap
ANSWER: C
68
New cards
Which of the following is not a role of a typical operating system?
A. Control the allocation of the machine’s resources
B. Control access to the machine
C. Maintain records regarding files stored in mass storage
D. Assist the computer user in the task of processing digital photographs
ANSWER: D
69
New cards
Which of the following is a task that is not performed by the kernel of an operating system?
A. Communicate with the user
B. Schedule processes
C. Allocate resources
D. Avoid deadlock
ANSWER: A
70
New cards
Which of the following is not a means of performing multiple activities at the same time?
A. Pipeling
B. Multiprogramming
C. Virtual memory
D. Multiple processors
ANSWER: C
71
New cards
Which of the following components of an operating system is executed as the result of an interrupt signal?
A. Dispatcher
B. Memory manager
C. File manager
ANSWER: A
72
New cards
Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system?
A. Maintain records regarding the location of files
B. Maintain records regarding the ownership of files
C. Maintain records regarding the size of files
D. None of the above
ANSWER: B
73
New cards
Which of the following would not require real-time processing?
A. Typing a document with a word processor
B. Navigation of an aircraft
C. Forecasting world-wide trend for the next five year period
D. Maintaining a airline reservation system
ANSWER: C
74
New cards
Which of the following statements is true?
A. Allowing several processes to share time in a multiprogramming system is less efficient than executing each of them to completion one after the other.
B. The use of passwords provides an impenetrable safeguard.
C. Both A and B
D. Neither A not B
ANSWER: D
75
New cards
Which of the following is not a way of classifying networks?
A. WAN versus LAN
B. Closed versus open
C. Router versus bridge
D. Star versus bus
ANSWER: C
76
New cards
Ethernet is a means of implementing which of the following network topologies?
A. Star
B. WiFi
C. Bus
ANSWER: C
77
New cards
Which of the following connects existing networks to form an internet?
A. Bridge
B. Router
C. Switch
D. Repeater
ANSWER: B
78
New cards
Which of the following is a protocol for controlling the right to transmit a message in a network?
A. UDP
B. CSMA/CD
C. TCP
D. FTP
ANSWER: B
79
New cards
Which of the following is not a means of performing interprocess communication over a network?
A. Client/server
B. ICANN
C. Peer-to-peer
ANSWER: B
80
New cards
Which of the following is assigned the task of providing individual users access to the Internet?
A. Tier-1 ISPs
B. Tier-2 ISPs
C. Access ISPs
D. ICANN
ANSWER: C
81
New cards
Which of the following is not an application of the Internet?
A. FTP
B. Email
C. Telnet
D. CERT
ANSWER: D
82
New cards
The primary purpose of which of the following is not the enhancement of security?
A. ICANN
B. Firewall
C. Encryption
D. CERT
ANSWER: A
83
New cards
Which of the following is used to translate between IP addresses and mnemonic addresses?
A. File server
B. Mail server
C. Name server
D. FTP server
ANSWER: C
84
New cards
Which of the following is not a means of connecting networks?
A. Switch
B. Server
C. Router
D. Bridge
ANSWER: B
85
New cards
Which layer of the TCP/IP hierarchy actually transmits a message?
A. Application
B. Transport
C. Network
D. Link
ANSWER: D
86
New cards
Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet?
A. Application
B. Transport
C. Network
D. Link
ANSWER: B
87
New cards
Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet?
A. Application
B. Transport
C. Network
D. Link
ANSWER: C
88
New cards
Which layer of the TCP/IP hierarchy decides which application should receive an incoming message?
A. Application
B. Transport
C. Network
D. Link
ANSWER: A
89
New cards
Which layer of the TCP/IP hierarchy presents incoming messages to the computer user?
A. Application
B. Transport
C. Network
D. Link
ANSWER: A
90
New cards
Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination?
A. Application
B. Transport
C. Network
D. Link
ANSWER: B
91
New cards
Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination?
A. Application
B. Transport
C. Network
D. Link
ANSWER: A
92
New cards
Which of the following identifies the application to which a message arriving from the Internet should be given?
A. Protocol
B. Port number
C. Domain
D. Hop count
ANSWER: B
93
New cards
Which standards organization produced the OSI reference model for internet communication?
A. ANSI
B. IEEE
C. ISO
ANSWER: C
94
New cards
Which of the following is an Internet application that is named after its underlying protocol?
A. Email
B. UDP
C. FTP
D. World Wide Web
ANSWER: C
95
New cards
Which of the following is not a means of implementing server-side activities?
A. CGI
B. JSP
C. ASP
D. Javascript
ANSWER: D
96
New cards
Which of the following is not a protocol used in the basic TCP/IP software hierarchy?
A. POP3
B. UDP
C. TCP
D. IP
ANSWER: A
97
New cards
Which generation of wireless network technology uses the packet-switched IP network?
A. 3G
B. 4G
C. 5G
D. All of the above
ANSWER: B
98
New cards
Which of the following provides large scale streaming services?
A. CGI
B. ICANN
C. CDN
D. PAN
ANSWER: C
99
New cards
Which of the following is not an email related protocol?
A. HTTP
B. POP3
C. IMAP
D. SMTP
ANSWER: A
100
New cards
Which of the following is an activity?
A. Algorithm
B. Program
C. Process
ANSWER: C